Search results for: terrorist profiling
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 441

Search results for: terrorist profiling

351 Content Analysis of Depictions of Terrorism in U.S. Major Motion Pictures: A Social Constructionist Perspective

Authors: Raleigh Blasdell, Amanda M. Sharp Parker, Lauren Waldrop, Brigid Toney

Abstract:

It has been demonstrated that fictional media sources have persuasive effects on public beliefs; this study contributes to the social constructionist literature by conducting a content analysis of U.S. major motion pictures involving terrorism. Using the Unified Film Population Sampling Methodology, the top-grossing films were identified to examine the frequency and context of several constructs of terrorism, including terrorist demographics, type of terrorism, country of origin, organizational affiliation, crime typology, and victim demographics. Comparisons of these constructs, as depicted in the films, were then made with the extant academic literature on terrorism. The data provide notable information regarding the representation of terrorism by the film industry, as well the discrepancies between the scholarly literature and depictions in popular films. The results indicate vast differences between fiction and reality, emphasizing a 'Middle Eastern Islamic male' terrorist stereotype. Using the theoretical foundation of social constructionism, the findings provide insight into how inaccurate depictions in film can influence society’s beliefs about terrorism and terrorists, which subsequently can translate into public support for legislation and policies that are often fueled by misinformation.

Keywords: film, media, social constructionism, terrorism

Procedia PDF Downloads 140
350 Effects of Blast Load on Historic Stone Masonry Buildings in Canada: A Review and Analytical Study

Authors: Abass Braimah, Maha Hussein Abdallah

Abstract:

The global ascendancy of terrorist attacks on building infrastructure with economic and heritage significance has increased awareness of the possibility of terrorism in Canada. Many structures in Canada that are at risk of terrorist attacks include government buildings, built many years ago of historic stone masonry construction. Although many researchers are investigating ways to retrofit masonry stone buildings to mitigate the effect of blast loadings, lack of knowledge on the dynamic behavior of historic stone masonry structures under blast loads makes it difficult to ascertain the effectiveness of the retrofitting techniques. This paper presents a review of open-source literature for the experimental and numerical stone masonry structures under blast loads. This review yielded very little information of the response of the historic stone masonry structures under blast loads. Thus, a comprehensive study is needed to understand the blast load effects on historic stone masonry buildings. The out-of-plane response of historic masonry structures to blast loads is investigated by using single-degree-of-freedom analysis. This approach presents equations that can be used effectively in the analysis of historic masonry walls to out-of-plane blast loading.

Keywords: blast loads, historical buildings, masonry structure, single-degree-of-freedom analysis

Procedia PDF Downloads 149
349 Strengthening Deradicalizing Islamist Extremism in Indonesia: A Victim-Centred Approach

Authors: Milda Istiqomah

Abstract:

Deradicalization program has long been the subject of investigation. There is a steadily growing interest in examining the results on how Islamist terrorists agree to abandon violence and leave radicalism; however, it is argued that de-radicalization program on terrorism in many countries is still questionable for its effectiveness. This article aims to provide an overview of the deradicalization program specifically related to the victim-centred approach conducted by the Indonesian government and investigates critical issues surrounding the analysis of their effectiveness and outcomes. This research employs several case studies of a victim-centred approach conducted by the Indonesian Witness and Victim Protection Agency as well as the Indonesian Counter-terrorism Agency. This paper argues that the victim-centred approach to de-radicalize former terrorist prisoners faces several implemental challenges; however, the initiative may offer promise for future successful de-radicalization program. Furthermore, until more data surrounding the efficacy of this initiative available, the victim-centred approach may also constitute a significant and essential component of disengagement, de-radicalisation, and reintegration of terrorist prisoners. In conclusion, this paper suggests that further empirical research concerning prevention policies and disengagement interventions related to victim-centred approach need to be explored to give more inputs to the Indonesian government to achieve the effectiveness of de-radicalization program.

Keywords: terrorism, victim-centred approach, de-radicalization, Islamist extremism

Procedia PDF Downloads 291
348 Political Coercion from Within: Theoretical Convergence in the Strategies of Terrorist Groups, Insurgencies, and Social Movements

Authors: John Hardy

Abstract:

The early twenty-first century national security environment has been characterized by political coercion. Despite an abundance of political commentary on the various forms of non-state coercion leveraged against the state, there is a lack of literature which distinguishes between the mechanisms and the mediums of coercion. Frequently non-state movements seeking to coerce the state are labelled by their tactics, not their strategies. Terrorists, insurgencies and social movements are largely defined by the ways in which they seek to influence the state, rather than by their political aims. This study examines the strategies of coercion used by non-state actors against states. This approach includes terrorist groups, insurgencies, and social movements who seek to coerce state politics. Not all non-state actors seek political coercion, so not all examples of different group types are considered. This approach also excludes political coercion by states, focusing on the non-state actor as the primary unit of analysis. The study applies a general theory of political coercion, which is defined as attempts to change the policies or action of a polity against its will, to the strategies employed by terrorist groups, insurgencies, and social movements. This distinguishes non-state actors’ strategic objectives from their actions and motives, which are variables that are often used to differentiate between types of non-state actors and the labels commonly used to describe them. It also allows for a comparative analysis of theoretical perspectives from the disciplines of terrorism, insurgency and counterinsurgency, and social movements. The study finds that there is a significant degree of overlap in the way that different disciplines conceptualize the mechanism of political coercion by non-state actors. Studies of terrorism and counterterrorism focus more on the notions of cost tolerance and collective punishment, while studies of insurgency focus on a contest of legitimacy between actors, and social movement theory tend to link political objectives, social capital, and a mechanism of influence to leverage against the state. Each discipline has a particular vernacular for the mechanism of coercion, which is often linked to the means of coercion, but they converge on three core theoretical components of compelling a polity to change its policies or actions: exceeding resistance to change, using political or violent punishments, and withholding legitimacy or consent from a government.

Keywords: counter terrorism, homeland security, insurgency, political coercion, social movement theory, terrorism

Procedia PDF Downloads 153
347 Money Laundering and Terror Financing in the Islamic Banking Sector in Bangladesh

Authors: Md. Abdul Kader

Abstract:

Several reports released by Global Financial Integrity (GFI) in recent times have identified Bangladesh as being among the worst affected countries to the scourge of money laundering (ML) and terrorist financing (TF). The money laundering (ML) and terrorist financing (TF) risks associated with conventional finance are generally well identified and understood by the relevant national authorities. There is, however, no common understanding of ML/TF risks associated with Islamic Banking. This paper attempts to examine the issues of money laundering (ML) and terrorist financing (TF) in Islamic Banks of Bangladesh. This study also investigates the risk factors associated with Islamic Banking system of Bangladesh that are favorable for ML and TF and which prevent the government to control such issues in the Islamic Banks of Bangladesh. Qualitative research methods were employed by studying various reports from journals, newspapers, bank reports and periodicals. In addition, five ex-bankers who were in the policy making bodies of three Islamic Banks were also interviewed. Findings suggest that government policies regarding Islamic Banking system in Bangladesh are not well defined and clear. Shariah law, that is the guiding principle of Islamic Banking, is not well recognized by the government policy makers, and thus they left the responsibility to the governing bodies of the banks. Other challenges that were found in the study are: the complexity of some Islamic banking products, the different forms of relationship between the banks and their clients, the inadequate ability and skill in the supervision of Islamic finance, particularly in jurisdictions, to evaluate their activities. All these risk factors paved the ground for ML and TF in the Islamic Banks of Bangladesh. However, due to unconventional nature of Banking and lack of investigative reporting on Islamic Banking, this study could not cover the whole picture of the ML/TF of Islamic Banks of Bangladesh. However, both qualitative documents and interviewees confirmed that Islamic Banking in Bangladesh could be branded as risky when it comes to money laundering and terror financing. This study recommends that the central bank authorities who supervise Islamic finance and the government policy makers should obtain a greater understanding of the specific ML/TF risks that may arise in Islamic Banks and develop a proper response. The study findings are expected to considerably impact Islamic banking management and policymakers to develop strong and appropriate policy to enhance transparency, accountability, and efficiency in banking sector. The regulatory bodies can consider the findings to disseminate anti money laundering and terror financing related rules and regulations.

Keywords: money laundering, terror financing, islamic banking, bangladesh

Procedia PDF Downloads 58
346 Human Trafficking and Terrorism: A Study on the Security Challenges Imposed upon Countries in Conflict

Authors: Christopher Holroyd

Abstract:

With the various terrorist organizations and drug cartels that are currently active, there is a myriad of security concerns facing countries around the world. Organizations that focus their attacks on others through terror, such as what is seen with the Islamic State of Iraq and the Levant (ISIS), have no boundaries when it comes to doing what is needed to fulfill their desired intent. For countries such as Iraq, who have been trying to rebuild their country since the fall of the Saddam Hussein Regime, organizations such as Al-Qaeda and ISIS have been impeding the country’s efforts toward peace and stability. One method utilized by terrorist organizations around the world is human trafficking. This method is one that is seen around the world; modern slavery is still exploited by those who have no concern for human decency and morality, their only concern is to achieve their goals by any means. It is understandable that some people may not have even heard of 'modern slavery', or they just might not believe that it is even an issue in today’s world. Organizations such as ISIS are not the only ones in the world that seek to benefit from the immoral trading of humans. Various drug cartels in the world, such as those seen in Mexico and Central America, have recently begun to take part in the trade – moving humans from state to state, or country to country, to better fuel their overall operations. This now makes the possibility of human trafficking more real for those in the United States because of the proximity of the cartels to the southern border of the country. An issue that, at one time, might have only seen as a distant threat, is now close to home for those in the United States. Looking at these two examples is how we begin to understand why human trafficking is utilized by various organizations around the world. This trade of human beings and the violation of basic human rights is a plague that effects the entire world and not just those that are in a country other than your own. One of the security issues that stem from the trade includes the movement and recruitment of members of the organizations. With individuals being smuggled from one location to another in secrecy, this only puts those trying to combat this trade at a disadvantage. This creates concern over the accurate number of potential recruits, combatants, and other individuals who are working against the host nation, and for the mission of the cartel or terrorist organization they are a part of. An uphill battle is created, and the goals of peace and stability are now harder to reach. Aside from security aspects, it cannot be forgotten that those being traded and forced into slavery, are being done so against their will. Families are separated, children trained to be fighters or worse. This makes the goal of eradicating human trafficking even more dire and important.

Keywords: human trafficking, reconstruction, security, terrorism

Procedia PDF Downloads 112
345 HPTLC Fingerprint Profiling of Protorhus longifolia Methanolic Leaf Extract and Qualitative Analysis of Common Biomarkers

Authors: P. S. Seboletswe, Z. Mkhize, L. M. Katata-Seru

Abstract:

Protorhus longifolia is known as a medicinal plant that has been used traditionally to treat various ailments such as hemiplegic paralysis, blood clotting related diseases, diarrhoea, heartburn, etc. The study reports a High-Performance Thin Layer Chromatography (HPTLC) fingerprint profile of Protorhus longifolia methanolic extract and its qualitative analysis of gallic acid, rutin, and quercetin. HPTLC analysis was achieved using CAMAG HPTLC system equipped with CAMAG automatic TLC sampler 4, CAMAG Automatic Developing Chamber 2 (ADC2), CAMAG visualizer 2, CAMAG Thin Layer Chromatography (TLC) scanner and visionCATS CAMAG HPTLC software. Mobile phase comprising toluene, ethyl acetate, formic acid (21:15:3) was used for qualitative analysis of gallic acid and revealed eight peaks while the mobile phase containing ethyl acetate, water, glacial acetic acid, formic acid (100:26:11:11) for qualitative analysis of rutin and quercetin revealed six peaks. HPTLC sillica gel 60 F254 glass plates (10 × 10) were used as the stationary phase. Gallic acid was detected at the Rf = 0.35; while rutin and quercetin were not evident in the extract. Further studies will be performed to quantify gallic acid in Protorhus longifolia leaves and also identify other biomarkers.

Keywords: biomarkers, fingerprint profiling, gallic acid, HPTLC, Protorhus longifolia

Procedia PDF Downloads 116
344 Securitizing Terrorism: A Critical Appraisal of Pakistan’s Counter-Terrorism Approach

Authors: Bilal Zubair

Abstract:

In a constantly challenging internal security environment, Pakistan is making ways to improvise and respond to the new variations in the pervasive phenomenon of terrorism. The state’s endeavors towards securitizing terrorism as an existential threat are both extensive and intensive which have systematically incorporated both military and non-military means. Since 2007, the military has been conducting intermittent operations and by 2014 has successfully neutralized the terrorist ability to target vital security installations and security personal. The terrorists have responded by targeting communities which are soft targets and extremely vulnerable to organized assaults. Within this context, the study aims to explain the emerging trends of terrorism in Pakistan, which multi-layered and complex developments are having far-reaching implications for state and society. With a view to explore the underlining reasons, present trends and ensuing ramifications of the emerging trends in terrorism, this study would examine the following: First, the historical processes and development of Terrorism in Pakistan; secondly the processes of securitization which include political consensus, legal frameworks and military operations against the terrorist groups; thirdly , the socio-cultural dimensions and geopolitical influences on the transforming nature of sectarian terrorism. The study will also highlight the grey areas and weak links in the ongoing securitization process. Finally, the study will thoroughly explore the societal insecurity which is manifested in internal displacements, identity crisis and weakening the socio-political fabric of the state.

Keywords: counter-terrorism, terrorism, sectarianism, securitizing

Procedia PDF Downloads 269
343 Mothers, the Missing Link: A Critical Discourse Analysis of the Women-Centric Counterterrorism Measures

Authors: Bukola Solomon

Abstract:

In counterterrorism, policymakers typically design a confined role for women as family members and nurturers. In recent years, they have embraced the idea of mothers as the missing link to preventing and countering violent extremism. This ‘programmed’ role of women is derived from the convictions that women’s central roles in the family and community afford them the ‘unique set of skills’ to detect early signs of radicalization and extremism. This paper attempts to focus on the ‘mother’ narrative that frames women’s agency as mothers of ‘terrorists’ and ‘potential’ terrorists. The general underlying assumption of the ‘mother’ narrative is that naturally, every ‘terrorist’ has or once had a mother, and their radicalization is a maternal ‘oversight.’ By deconstructing the notion of motherhood as a social construct instead of an inherent female desire and ability, this paper argues that the assumption of ‘mothers know best’ is invalid. Also, this paper suggests that the ‘mother’ narrative is a deliberate effort to restrict women’s participation in counterterrorism as ‘preventers.’ Finally, this paper notes a global trend in which mothers are contesting the dominant view of women empowerment that restricts their agency by seeking alternative versions in terrorist organizations. And as such, they create parallel terror cells. Thus, the overemphasis on the role women plays as mothers in counterterrorism limits the scope and potential of counterterrorism programs by marginalizing gender issues and reinforcing gender disparities to the extent that the programs become counterproductive.

Keywords: countering violent extremism, counterterrorism, gender, gender roles, terrorism, women

Procedia PDF Downloads 97
342 De/Reconstructing the Notion of Women as Perpetrators of Terrorism: The Case of Boko Haram

Authors: Damilohun D. Ayoyo, Anthony Mpiani, Temitope B. Oriola

Abstract:

The debate on women’s roles in insurgencies and terrorist organizations continues to garner scholarly attention. While some scholars view women insurgents and terrorists as perpetrators, others have argued that they are non-agents and victims. This paper de/reconstructs the notion of ‘women as perpetrators’ of terrorism. Drawing on the narratives of rescued female Boko Haram operatives, and Boko Haram’s tactics for recruiting and deploying women and girls, the paper advances three main arguments. First, the growing social construction of women as perpetrators of terrorism – particularly radical Islamic terrorism – downplays the socio-cultural and structural processes leading to women’s involvement with terrorist organizations. Second, women agency in Boko Haram activities is better understood when grounded in the cultural and structural contexts of Northern Nigeria, Boko Haram’s construction of ‘female,’ and the experiences of female Boko Haram operatives. Third, the mechanisms through which female Boko Haram operatives are recruited and deployed make them more of non-agents and victims than perpetrators of terrorism. The paper draws on the agency-structure approach and argues that the gendered power asymmetries embedded in the cultures and structures of Northern Nigeria –the base of Boko Haram– contribute to the nature and dynamics of women’s involvement in the insurgency. Although the paper does not negate the agency of women in terrorism, it aligns with the studies that consider women insurgents as more victims than perpetrators of terror.

Keywords: Boko Haram, female agency, Northern Nigeria, patriarchy, perpetrator of terror, radical Islamic terrorism, sharia, victim of terror, women insurgents

Procedia PDF Downloads 103
341 Salicylic Acid Signalling in Relation to Root Colonization in Rice

Authors: Seema Garcha, Sheetal Chopra, Navraj Sarao

Abstract:

Plant hormones play a role in internal colonization by beneficial microbes and also systemic acquired resistance. They define qualitative and quantitative nature of root microbiome and also influence dynamics of root rhizospheric soil. The present study is an attempt to relate salicylic acid (signal molecule) content and qualitative nature of root endophytes at various stages in the growth of rice varieties of commercial value- Parmal 121 and Basmati 1121. Root seedlings of these varieties were raised using tissue culture techniques and then they were transplanted in the fields. Cultivation was done using conventional methods in agriculture. Field soil contained 0.39% N, 75.12 Kg/hectare of phosphorus and 163.0 Kg/hectare of potassium. Microfloral profiling of the root tissue was done using the selective microbiological medium. The salicylic acid content was estimated using HPLC-Agilent 1100 HPLC Series. Salicylic acid level of Basmati 1121 remained relatively low at the time of transplant and 90 days after transplant. It increased marginally at 60 days. A similar trend was observed with Parmal 121 as well. However, Parmal variety recorded 0.935 ug/g of salicylic acid at 60 days after transplant. Salicylic acid content decreased after 90 days as both the rice varieties remained disease free. The endophytic root microflora was established by 60 days after transplant in both the varieties after which their population became constant. Rhizobium spp dominated over Azotobacter spp. Genetic profiling of endophytes for nitrogen-fixing ability is underway.

Keywords: plant-microbe interaction, rice, root microbiome, salicylic acid

Procedia PDF Downloads 172
340 Exploring the Strategy to Identify Seed-Specific Acyl-Hydrolases from Arabidopsis thaliana by Activity-Based Protein Profiling

Authors: M. Latha, Achintya K. Dolui, P. Vijayaraj

Abstract:

Vegetable oils mainly triacylglycerol (TAG) are an essential nutrient in the human diet as well as one of the major global commodity. There is a pressing need to enhance the yield of oil production to meet the world’s growing demand. Oil content is controlled by the balance between synthesis and breakdown in the cells. Several studies have established to increase the oil content by the overexpression of oil biosynthetic enzymes. Interestingly the significant oil accumulation was observed with impaired TAG hydrolysis. Unfortunately, the structural, as well as the biochemical properties of the lipase enzymes, is widely unknown, and so far, no candidate gene was identified in seeds except sugar-dependent1 (SDP1). Evidence has shown that SDP1directly responsible for initiation of oil breakdown in the seeds during germination. The present study is the identification of seed-specific acyl-hydrolases by activity based proteome profiling (ABPP) using Arabidopsis thaliana as a model system. The ABPP reveals that around 8 to 10 proteins having the serine hydrolase domain and are expressed during germination of Arabidopsis seed. The N-term sequencing, as well as LC-MS/MS analysis, was performed for the differentially expressed protein during germination. The coding region of the identified proteins was cloned, and lipases activity was assessed with purified recombinant protein. The enzyme assay was performed against various lipid substrates, and we have observed the acylhydrolase activity towards lysophosphatidylcholine and monoacylglycerol. Further, the functional characteristic of the identified protein will reveal the physiological significance the enzyme in oil accumulation.

Keywords: lipase, lipids, vegetable oil, triacylglycerol

Procedia PDF Downloads 158
339 Border Control and Human Rights Violations: Lessons Learned from the United States and Potential Solutions for the European Union

Authors: María Elena Menéndez Ibáñez

Abstract:

After the terrorist attacks of 9/11, new measures were adopted by powerful countries and regions like the United States and the European Union in order to safeguard their security. In 2002, the US created the Department of Homeland Security with one sole objective; to protect American soil and people. The US adopted new policies that made every immigrant a potential terrorist and a threat to their national security. Stronger border control became one of the key elements of the fight against organized crime and terrorism. The main objective of this paper is to compare some of the most important and radical measures adopted by the US, even those that resulted in systematic violations of human rights, with some of the European measures adopted after the 2015 Paris attacks of 2015, such as unlawful detainment of prisoners and other measures against foreigners. Through the Schengen agreement, the European Union has tried to eliminate tariffs and border controls, in order to guarantee successful economic growth. Terrorists have taken advantage of this and have made the region vulnerable to attacks. Authorities need to strengthen their surveillance methods in order to safeguard the region and its stability. Through qualitative methods applied to social sciences, this research will also try to explain why some of the mechanisms proven to be useful in the US would not be so in Europe, especially because they would result in human rights violations. Finally, solutions will be offered that would not put the whole Schengen Agreement at risk. Europe cannot reinstate border control, without making individuals vulnerable to human rights violations.

Keywords: border control, immigration, international cooperation, national security

Procedia PDF Downloads 107
338 The Role of Moroccan Salafist Radicalism in Creating Threat to Spain’s Security

Authors: Stanislaw Kosmynka

Abstract:

Although the genesis of the activity of fighting salafist radicalism in Spain dates back to the 80’s, the development of extremism of this kind manifested itself only in the next decade. Its first permanently functioning structures in this country in the second half of 90’s of 20th century came from Algieria and Syria. At the same time it should be emphasized that this distinction is in many dimensions conventional, the more so because they consisted also of immigrants from other coutries of Islam, particularly from Morocco. The paper seeks to understand the radical salafist challenge for Spain in the context of some terrorist networks consisted of immigrants from Morocco. On the eve of the new millennium Moroccan jihadists played an increasingly important role. Although the activity of these groups had for many years mainly logistical and propaganda character, the bomb attack carried out on 11 March 2004 in Madrid constituted an expression of open forms of terrorism, directed against the authorities and society of Spain and reflected the narration of representatives of the trend of the global jihad. The people involved in carrying out that act of violence were to a large extent Moroccan immigrants; also in the following years among the cells of radicals in Spain Moroccans stood out many times. That is why the forms and directions of activity of these extremists in Spain, also after 11th March 2004 and in the actual context of the impact of Islamic State, are worth presenting. The paper is focused on threats to the security of Spain and the region and remains connected with the issues of mutual relations of the society of a host country with immigrant communities which to a large degree come from this part of Maghreb.

Keywords: jihadi terrorism, Morocco, radical salafism, security, Spain, terrorist cells, threat

Procedia PDF Downloads 501
337 Progressive Collapse of Cooling Towers

Authors: Esmaeil Asadzadeh, Mehtab Alam

Abstract:

Well documented records of the past failures of the structures reveals that the progressive collapse of structures is one of the major reasons for dramatic human loss and economical consequences. Progressive collapse is the failure mechanism in which the structure fails gradually due to the sudden removal of the structural elements. The sudden removal of some structural elements results in the excessive redistributed loads on the others. This sudden removal may be caused by any sudden loading resulted from local explosion, impact loading and terrorist attacks. Hyperbolic thin walled concrete shell structures being an important part of nuclear and thermal power plants are always prone to such terrorist attacks. In concrete structures, the gradual failure would take place by generation of initial cracks and its propagation in the supporting columns along with the tower shell leading to the collapse of the entire structure. In this study the mechanism of progressive collapse for such high raised towers would be simulated employing the finite element method. The aim of this study would be providing clear conceptual step-by-step descriptions of various procedures for progressive collapse analysis using commercially available finite element structural analysis software’s, with the aim that the explanations would be clear enough that they will be readily understandable and will be used by practicing engineers. The study would be carried out in the following procedures: 1. Provide explanations of modeling, simulation and analysis procedures including input screen snapshots; 2. Interpretation of the results and discussions; 3. Conclusions and recommendations.

Keywords: progressive collapse, cooling towers, finite element analysis, crack generation, reinforced concrete

Procedia PDF Downloads 456
336 Deployment of Armed Soldiers in European Cities as a Source of Insecurity among Czech Population

Authors: Blanka Havlickova

Abstract:

In the last ten years, there are growing numbers of troops with machine guns serving on streets of European cities. We can see them around government buildings, major transport hubs, synagogues, galleries and main tourist landmarks. As the main purpose of armed soldier’s presence in European cities authorities declare the prevention of terrorist attacks and psychological support for tourists and domestic population. The main objective of the following study is to find out whether the deployment of armed soldiers in European cities has a calming and reassuring effect on Czech citizens (if the presence at armed soldiers make the Czech population feel more secure) or rather becomes a stress factor (the presence of soldiers standing guard in full military fatigues recalls serious criminality and terrorist attacks which are reflected in the fears and insecurity of Czech population). The initial hypothesis of this study is connected with the priming theory, the idea that when we are exposed to an image (armed soldier), it makes us unconsciously focus on a topic connected with this image (terrorism). This paper is based on a quantitative public survey, which was carried out in the form of electronic questioning among the citizens of the Czech Republic. Respondents answered 14 questions about two European cities – London and Paris. Besides general questions investigating the respondents' awareness of these cities, some of the questions focused on the fear that the respondents had when picturing themselves leaving next Monday for the given city (London or Paris). The questions asking about respondent´s travel fears and concerns were accompanied by different photos. When answering the question about fear some respondents have been presented with a photo of Westminster Palace and the Eiffel with ordinary citizens while other respondents have been presented with a picture of the Westminster Palace, the and Eiffel's tower not only with ordinary citizens, but also with one soldier holding a machine gun. The main goal of this paper is to analyse and compare data about concerns for these two groups of respondents (presented with different pictures) and find out if and how an armed soldier with a machine gun in front of the Westminster Palace or the Eiffel Tower affects the public's concerns about visiting the site. In other words, the aim of this paper is to confirm or rebut the hypothesis that the look at a soldier with a machine gun in front of the Eiffel Tower or the Westminster Palace automatically triggers the association with a terrorist attack leading to an increase in fear and insecurity among Czech population.

Keywords: terrorism, security measures, priming, risk perception

Procedia PDF Downloads 226
335 The Metabolite Profiling of Fulvestrant-3 Boronic Acid under Biological Oxidation

Authors: Changde Zhang, Qiang Zhang, Shilong Zheng, Jiawang Liu, Shanchun Guo, Qiu Zhong, Guangdi Wang

Abstract:

Fulvestrant was approved by FDA to treat breast cancer as a selective estrogen receptor downregulator (SERD) with intramuscular injection administration. ZB716, a fulvestarnt-3 boronic acid, is an SERD with comparable anticancer effect to fulvestrant, but could produce good pharmacokinetic properties under oral administration with mice or rat models. To understand why ZB716 produced much better oral bioavailability, it was proposed that the boronic acid blocked the phase II direct biotransformation with the hydroxyl group on the 3 position of the aromatic ring on fulvestrant. In this study, ZB716 or fulvestrant was incubated with human liver microsome and oxidation cofactor NADPH in vitro. Their metabolites after oxidation were profiled with the Q-Exactive, a high-resolution mass spectrometer. The result showed that ZB716 blocked the forming of hydroxyl groups on its benzene ring except for the oxidation of C-B bond forming fulvestrant in its metabolites, and the concentration of fulvestrant with one more hydroxyl group found in the metabolites from incubation with fulvestrant was about 34 fold high as that formed from incubation with ZB716. Compared to fulvestrant, ZB716 is expected to be much difficult to be further bio-transformed into more hydrophilic compounds, to be difficult excreted out of blood system, and to have longer residence time in blood, which can lead to higher oral bioavailability. This study provided evidence to explain the high bioavailability of ZB716 after oral administration from the perspective of its difficulty of oxidation, a phase I biotransformation, on positions on its aromatic ring.

Keywords: biotransformation, fulvestrant, metabolite profiling, ZB716

Procedia PDF Downloads 231
334 Design of an Automated Deep Learning Recurrent Neural Networks System Integrated with IoT for Anomaly Detection in Residential Electric Vehicle Charging in Smart Cities

Authors: Wanchalerm Patanacharoenwong, Panaya Sudta, Prachya Bumrungkun

Abstract:

The paper focuses on the development of a system that combines Internet of Things (IoT) technologies and deep learning algorithms for anomaly detection in residential Electric Vehicle (EV) charging in smart cities. With the increasing number of EVs, ensuring efficient and reliable charging systems has become crucial. The aim of this research is to develop an integrated IoT and deep learning system for detecting anomalies in residential EV charging and enhancing EV load profiling and event detection in smart cities. This approach utilizes IoT devices equipped with infrared cameras to collect thermal images and household EV charging profiles from the database of Thailand utility, subsequently transmitting this data to a cloud database for comprehensive analysis. The methodology includes the use of advanced deep learning techniques such as Recurrent Neural Networks (RNN) and Long Short-Term Memory (LSTM) algorithms. IoT devices equipped with infrared cameras are used to collect thermal images and EV charging profiles. The data is transmitted to a cloud database for comprehensive analysis. The researchers also utilize feature-based Gaussian mixture models for EV load profiling and event detection. Moreover, the research findings demonstrate the effectiveness of the developed system in detecting anomalies and critical profiles in EV charging behavior. The system provides timely alarms to users regarding potential issues and categorizes the severity of detected problems based on a health index for each charging device. The system also outperforms existing models in event detection accuracy. This research contributes to the field by showcasing the potential of integrating IoT and deep learning techniques in managing residential EV charging in smart cities. The system ensures operational safety and efficiency while also promoting sustainable energy management. The data is collected using IoT devices equipped with infrared cameras and is stored in a cloud database for analysis. The collected data is then analyzed using RNN, LSTM, and feature-based Gaussian mixture models. The approach includes both EV load profiling and event detection, utilizing a feature-based Gaussian mixture model. This comprehensive method aids in identifying unique power consumption patterns among EV owners and outperforms existing models in event detection accuracy. In summary, the research concludes that integrating IoT and deep learning techniques can effectively detect anomalies in residential EV charging and enhance EV load profiling and event detection accuracy. The developed system ensures operational safety and efficiency, contributing to sustainable energy management in smart cities.

Keywords: cloud computing framework, recurrent neural networks, long short-term memory, Iot, EV charging, smart grids

Procedia PDF Downloads 30
333 Blood Chemo-Profiling in Workers Exposed to Occupational Pyrethroid Pesticides to Identify Associated Diseases

Authors: O. O. Sufyani, M. E. Oraiby, S. A. Qumaiy, A. I. Alaamri, Z. M. Eisa, A. M. Hakami, M. A. Attafi, O. M. Alhassan, W. M. Elsideeg, E. M. Noureldin, Y. A. Hobani, Y. Q. Majrabi, I. A. Khardali, A. B. Maashi, A. A. Al Mane, A. H. Hakami, I. M. Alkhyat, A. A. Sahly, I. M. Attafi

Abstract:

According to the Food and Agriculture Organization (FAO) Pesticides Use Database, pesticide use in agriculture in Saudi Arabia has more than doubled from 4539 tons in 2009 to 10496 tons in 2019. Among pesticides, pyrethroids is commonly used in Saudi Arabia. Pesticides may increase susceptibility to a variety of diseases, particularly among pesticide workers, due to their extensive use, indiscriminate use, and long-term exposure. Therefore, analyzing blood chemo-profiles and evaluating the detected substances as biomarkers for pyrethroid pesticide exposure may assist to identify and predicting adverse effects of exposure, which may be used for both preventative and risk assessment purposes. The purpose of this study was to (a) analyze chemo-profiling by Gas Chromatography-Mass Spectrometry (GC-MS) analysis, (b) identify the most commonly detected chemicals in a time-exposure-dependent manner using a Venn diagram, and (c) identify their associated disease among pesticide workers using analyzer tools on the Comparative Toxicogenomics Database (CTD) website, (250 healthy male volunteers (20-60 years old) who deal with pesticides in the Jazan region of Saudi Arabia (exposure intervals: 1-2, 4-6, 6-8, more than 8 years) were included in the study. A questionnaire was used to collect demographic information, the duration of pesticide exposure, and the existence of chronic conditions. Blood samples were collected for biochemistry analysis and extracted by solid-phase extraction for gas chromatography-mass spectrometry (GC-MS) analysis. Biochemistry analysis reveals no significant changes in response to the exposure period; however, an inverse association between the albumin level and the exposure interval was observed. The blood chemo-profiling was differentially expressed in an exposure time-dependent manner. This analysis identified the common chemical set associated with each group and their associated significant occupational diseases. While some of these chemicals are associated with a variety of diseases, the distinguishing feature of these chemically associated disorders is their applicability for prevention measures. The most interesting finding was the identification of several chemicals; erucic acid, pelargonic acid, alpha-linolenic acid, dibutyl phthalate, diisobutyl phthalate, dodecanol, myristic Acid, pyrene, and 8,11,14-eicosatrienoic acid, associated with pneumoconiosis, asbestosis, asthma, silicosis and berylliosis. Chemical-disease association study also found that cancer, digestive system disease, nervous system disease, and metabolic disease were the most often recognized disease categories in the common chemical set. The hierarchical clustering approach was used to compare the expression patterns and exposure intervals of the chemicals found commonly. More study is needed to validate these chemicals as early markers of pyrethroid insecticide-related occupational disease, which might assist evaluate and reducing risk. The current study contributes valuable data and recommendations to public health.

Keywords: occupational, toxicology, chemo-profiling, pesticide, pyrethroid, GC-MS

Procedia PDF Downloads 68
332 Qualitative Profiling Model and Competencies Evaluation to Fighting Unemployment

Authors: Francesca Carta, Giovanna Linfante, Laura Agneni, Debora Radicchia, Camilla Micheletta, Angelo Del Cimmuto

Abstract:

Overtaking competence mismatches and fostering career pathways congruent with the individual skills profile would significantly contribute to fighting unemployment. The aim of this paper is to examine the usefulness and efficiency of qualitative tools in supporting and improving the quality of caseworkers’ activities during the jobseekers’ profile analysis and career guidance process. The selected target groups are long-term and middle term unemployed, job seekers, young people at the end of the vocational training pathway and unemployed woman with social disadvantages. The experimentation is conducted in Italy at public employment services in 2017. In the framework of Italian labour market reform, the experimentation represents the first step to develop a customized qualitative model profiling; the final general object is to improve the public employment services quality. The experimentation tests the transferability of an OECD self-assessment competences tool in the Italian public employment services. On one hand, the first analysis results will indicate the user’s perception concerning the tool’s application and their different competence levels (literacy, numeracy, problem solving, career interest, subjective well-being and health, behavioural competencies) with reference to the specific target. On the other hand, the experimentation outcomes will show caseworkers understanding regarding the tool’s usability and efficiency for career guidance and reskilling and upskilling programs.

Keywords: career guidance, evaluation competences, reskilling pathway, unemployment

Procedia PDF Downloads 284
331 Counter-Terrorism and De-Radicalization as Soft Strategies in Combating Terrorism in Indonesia: A Critical Review

Authors: Tjipta Lesmana

Abstract:

Terrorist attacks quickly penetrated Indonesia following the downfall of Soeharto regime in May 1998. Reform era was officially proclaimed. Indonesia turned to 'heaven state' from 'authoritarian state'. For the first time since 1966, the country experienced a full-scale freedom of expression, including freedom of the press, and heavy acknowledgement of human rights practice. Some religious extremists previously run away to neighbor countries to escape from security apparatus secretly backed home. Quickly they consolidated the power to continue their long aspiration and dream to establish 'Shariah Indonesia', Indonesia based on Khilafah ideology. Bali bombings I which shocked world community occurred on 12 October 2002 in the famous tourist district of Kuta on the Indonesian island of Bali, killing 202 people (including 88 Australians, 38 Indonesians, and people from more than 20 other nationalities). In the capital, Jakarta, successive bombings were blasted in Marriott hotel, Australian Embassy, residence of the Philippine Ambassador and stock exchange office. A 'drunken Indonesia' is far from ready to combat nationwide sudden and massive terrorist attacks. Police Detachment 88 (Densus 88) Indonesian counter-terrorism squad, was quickly formed following 2002 Bali Bombing. Anti-terrorism Provisional Act was immediately erected, as well, due to urgent need to fight terrorism. Some Bali bombings criminals were deadly executed after sentenced by the court. But a series of terrorist suicide attacks and another Bali bombings (the second one) in Bali, again, shocked world community. Terrorism network is undoubtedly spreading nationwide. Suspicion is high that they had close connection with Al Qaeda’s groups. Even 'Afghanistan alumni' and 'Syria alumni' returned to Indonesia to back up the local mujahidins in their fights to topple Indonesia constitutional government and set up Islamic state (Khilafah). Supported by massive aids from friendly nations, especially Australia and United States, Indonesia launched large scale operations to crush terrorism consisted of various radical groups such as JAD, JAS, and JAADI. Huge energy, money, and souls were dedicated. Terrorism is, however, persistently entrenched. High ranking officials from Detachment 88 squad and military intelligence believe that terrorism is still one the most deadly enemy of Indonesia.

Keywords: counter-radicalization, de-radicalization, Khalifah, Union State, Al Qaedah, ISIS

Procedia PDF Downloads 152
330 Author Profiling: Prediction of Learners’ Gender on a MOOC Platform Based on Learners’ Comments

Authors: Tahani Aljohani, Jialin Yu, Alexandra. I. Cristea

Abstract:

The more an educational system knows about a learner, the more personalised interaction it can provide, which leads to better learning. However, asking a learner directly is potentially disruptive, and often ignored by learners. Especially in the booming realm of MOOC Massive Online Learning platforms, only a very low percentage of users disclose demographic information about themselves. Thus, in this paper, we aim to predict learners’ demographic characteristics, by proposing an approach using linguistically motivated Deep Learning Architectures for Learner Profiling, particularly targeting gender prediction on a FutureLearn MOOC platform. Additionally, we tackle here the difficult problem of predicting the gender of learners based on their comments only – which are often available across MOOCs. The most common current approaches to text classification use the Long Short-Term Memory (LSTM) model, considering sentences as sequences. However, human language also has structures. In this research, rather than considering sentences as plain sequences, we hypothesise that higher semantic - and syntactic level sentence processing based on linguistics will render a richer representation. We thus evaluate, the traditional LSTM versus other bleeding edge models, which take into account syntactic structure, such as tree-structured LSTM, Stack-augmented Parser-Interpreter Neural Network (SPINN) and the Structure-Aware Tag Augmented model (SATA). Additionally, we explore using different word-level encoding functions. We have implemented these methods on Our MOOC dataset, which is the most performant one comparing with a public dataset on sentiment analysis that is further used as a cross-examining for the models' results.

Keywords: deep learning, data mining, gender predication, MOOCs

Procedia PDF Downloads 116
329 The Reliability and Shape of the Force-Power-Velocity Relationship of Strength-Trained Males Using an Instrumented Leg Press Machine

Authors: Mark Ashton Newman, Richard Blagrove, Jonathan Folland

Abstract:

The force-velocity profile of an individual has been shown to influence success in ballistic movements, independent of the individuals' maximal power output; therefore, effective and accurate evaluation of an individual’s F-V characteristics and not solely maximal power output is important. The relatively narrow range of loads typically utilised during force-velocity profiling protocols due to the difficulty in obtaining force data at high velocities may bring into question the accuracy of the F-V slope along with predictions pertaining to the maximum force that the system can produce at a velocity of null (F₀) and the theoretical maximum velocity against no load (V₀). As such, the reliability of the slope of the force-velocity profile, as well as V₀, has been shown to be relatively poor in comparison to F₀ and maximal power, and it has been recommended to assess velocity at loads closer to both F₀ and V₀. The aim of the present study was to assess the relative and absolute reliability of an instrumented novel leg press machine which enables the assessment of force and velocity data at loads equivalent to ≤ 10% of one repetition maximum (1RM) through to 1RM during a ballistic leg press movement. The reliability of maximal and mean force, velocity, and power, as well as the respective force-velocity and power-velocity relationships and the linearity of the force-velocity relationship, were evaluated. Sixteen male strength-trained individuals (23.6 ± 4.1 years; 177.1 ± 7.0 cm; 80.0 ± 10.8 kg) attended four sessions; during the initial visit, participants were familiarised with the leg press, modified to include a mounted force plate (Type SP3949, Force Logic, Berkshire, UK) and a Micro-Epsilon WDS-2500-P96 linear positional transducer (LPT) (Micro-Epsilon, Merseyside, UK). Peak isometric force (IsoMax) and a dynamic 1RM, both from a starting position of 81% leg length, were recorded for the dominant leg. Visits two to four saw the participants carry out the leg press movement at loads equivalent to ≤ 10%, 30%, 50%, 70%, and 90% 1RM. IsoMax was recorded during each testing visit prior to dynamic F-V profiling repetitions. The novel leg press machine used in the present study appears to be a reliable tool for measuring F and V-related variables across a range of loads, including velocities closer to V₀ when compared to some of the findings within the published literature. Both linear and polynomial models demonstrated good to excellent levels of reliability for SFV and F₀ respectively, with reliability for V₀ being good using a linear model but poor using a 2nd order polynomial model. As such, a polynomial regression model may be most appropriate when using a similar unilateral leg press setup to predict maximal force production capabilities due to only a 5% difference between F₀ and obtained IsoMax values with a linear model being best suited to predict V₀.

Keywords: force-velocity, leg-press, power-velocity, profiling, reliability

Procedia PDF Downloads 28
328 Evolution of Bombings against Transportation Infrastructure

Authors: Jonathan K. Hill

Abstract:

The transportation networks throughout Africa remain the only transportation infrastructure system in the world that is attacked by terrorists at a high frequency, so the international community can learn from each attack. The targeting of transportation should be recognized as a direct attack against a civilian population, so the international community should work to better understand the types of attacks utilized, the types of improvised explosive device designs adapted to transportation targets, and the ways the various modes of transportation have been attacked throughout the continent. Some countries have seen grenade attacks that have resulted in only injuries, while some countries have experienced large vehicle bombings that have resulted in hundreds of injuries and numerous deaths. With insurgencies, explosive devices have been small, complex, and generally target an enemy of the insurgency. With terrorist bombings, the explosive devices have been large, brazen, and targeted at civilian populations. And, these civilian populations are easily targeted within the transportation system. The presentation provided by Assess Africa LLC is titled ‘Evolution of Bombings Against Transportation Infrastructure’ and covers improvised explosive device characteristics, how improvised explosive devices have been adapted to transportation targets in Africa, analyses recent incidents, and provides some advice for effective protective measures. A main component of the improvised explosive device characteristics portion of the presentation focuses on the link between explosive device components, the intelligence network, and the bomb-builder’s network. By understanding the components, how the use of various components can be linked to a terrorist group’s capabilities, and how the bomb-builder acquires materials, the analysis of improvised explosive device attacks takes on a new direction – one that focuses on defeating the network instead of merely reviewing incidents of the past.

Keywords: Africa, bombings, critical infrastructure protection, transportation security

Procedia PDF Downloads 394
327 Potential of Croatia as an Attractive Tourist Destination for the Russian Market

Authors: Maja Martinovic, Valentina Zarkovic, Hrvoje Maljak

Abstract:

Europe is one of the most popular tourist destinations in the world, in which tourism occupies a significant place among the most relevant economic activities, and this applies to the Republic of Croatia as well. Based on this study, the authors intended to encourage and support the creation of an effective tourism policy in Croatia that would be based on the profiling of certain target groups. Another objective was to compare the results obtained from the customer analysis with the market analysis of the tourism industry in Croatia. The objective is to adapt the current tourist offer according to the identified needs and expectations of a particular tourist group in order to increase the attractiveness of Croatia as a tourist destination and motivate greater attendance of the targeted tourist groups. The current research was oriented towards the Russian market as the target group. Therefore, the authors wanted to encourage a discussion on how to attract more Russian guests. Consequently, the intention of the research was a detailed analysis of Russian tourists, in order to gain a better understanding of their travelling motives and tendencies. Furthermore, attention was paid to the expectations of Russian customers and to compare them with the Croatian tourist offer, and to determine whether there is a possibility for an overlap. The method used to obtain the information required was a survey conducted among Russian citizens about their travelling habits. The research was carried out on the basis of 166 participants of different age, gender, profession and income group. The sampling and distribution of the survey took place between May and July 2016. The results provided from the research indicate that Croatian tourism has certain unrealized potential considering the popularization of Croatia as a tourist destination, and there is a capacity for increasing the revenues within the group of Russian tourists. Such a conclusion is based on the fact that the Croatian tourist offer and the preferences of the Russian guests are compatible, i.e. they overlap in many aspects. The results demonstrate that beautiful nature, cultural and historical heritage as well as the sun and sea, play a leading role in attracting more Russian tourists. It is precisely these elements that form the three pillars of the Croatian tourist offer. On the other hand, the profiling revealed that the most desirable destinations for the Russian guests are Italy and Spain, both of which provide the same main tourist attractions as Croatia. Therefore, the focus of the strategic ideas given in the paper shifted to other tourism segments, such as type of accommodation, sales channels, travel motives, additional offer and seasonality etc., in order to gain advantage in the Russian market, the Mediterranean region and tourism in general. The purpose of the research is to serve as a foundation for analysing the attractiveness of the other tourist destinations in the Russian market, as well as to be a general basis for a more detailed profiling of the various specific target groups of the Russian and other tourist groups.

Keywords: Croatia, Russian market, target groups, tourism, tourist destination

Procedia PDF Downloads 297
326 Formulating Anti-Insurgency Curriculum Conceptual and Design Principles for Translation into Anti-Terrorist Curriculum Framework for Muslim Secondary Schools

Authors: Saheed Ahmad Rufai

Abstract:

The growing nature of insurgencies in their various forms in the Muslim world is now of great concern to both the leadership and the citizenry. The high sense of insecurity occasioned by the unpleasant experience has in fact attained an alarming rate in the estimation of both Muslims and non-Muslims alike. Consequently, the situation began to attract contributions from scholars and researchers in security-related fields of humanities and social sciences. However, there is little evidence of contribution to the discourse and the scholarship involved by scholars in the field of education. The purpose of this proposed study is to contribute an education dimension to the growing scholarship on the subject. The study which is situated in the broad scholarship of curriculum making and grounded in both the philosophical and sociological foundations of the curriculum, employs a combination of curriculum criticism and creative synthesis, as methods, in reconstructing Muslim schools’ educational blueprint. The significance of the proposed study lies in its potential to contribute a useful addition to the scholarship of curriculum construction in the context of the Muslim world. The significance also lies in its potential to offer an ameliorative proposal over unnecessary insurgency or militancy thereby paving the way for the enthronement of a regime characterized by peaceful, harmonious and tranquil co-existence among people of diverse orientations and ideological persuasions in the Muslim world. The study is restricted to only the first two stages of curriculum making namely the formulation of philosophy which concerns the articulation of objectives, aims, purposes, goals, and principles, as well as the second stage which covers the translation of such principles to an anti-insurgency secondary school curriculum for the Muslim world.

Keywords: education for conflict resolution, anti-insurgency curriculum principles, peace education, anti-terrorist curriculum framework, curriculum for Muslim secondary schools

Procedia PDF Downloads 197
325 The Crossroads of Corruption and Terrorism in the Global South

Authors: Stephen M. Magu

Abstract:

The 9/11 and Christmas bombing attacks in the United States are mostly associated with the inability of intelligence agencies to connect dots based on intelligence that was already available. The 1998, 2002, 2013 and several 2014 terrorist attacks in Kenya, on the other hand, are probably driven by a completely different dynamic: the invisible hand of corruption. The World Bank and Transparency International annually compute the Worldwide Governance Indicators and the Corruption Perception Index respectively. What perhaps is not adequately captured in the corruption metrics is the impact of corruption on terrorism. The World Bank data includes variables such as the control of corruption, (estimates of) government effectiveness, political stability and absence of violence/terrorism, regulatory quality, rule of law and voice and accountability. TI's CPI does not include measures related to terrorism, but it is plausible that there is an expectation of some terrorism impact arising from corruption. This paper, by examining the incidence, frequency and total number of terrorist attacks that have occurred especially since 1990, and further examining the specific cases of Kenya and Nigeria, argues that in addition to having major effects on governance, corruption has an even more frightening impact: that of facilitating and/or violating security mechanisms to the extent that foreign nationals can easily obtain identification that enables them to perpetuate major events, targeting powerful countries' interests in countries with weak corruption-fighting mechanisms. The paper aims to model interactions that demonstrate the cost/benefit analysis and agents' rational calculations as being non-rational calculations, given the ultimate impact. It argues that eradication of corruption is not just a matter of a better business environment, but that it is implicit in national security, and that for anti-corruption crusaders, this is an argument more potent than the economic cost / cost of doing business argument.

Keywords: corruption, global south, identification, passports, terrorism

Procedia PDF Downloads 395
324 Countering Radicalization to Violent Extremism: A Comparative Study of Canada, the UK and South East Asia

Authors: Daniel Alati

Abstract:

Recent high-profile terrorist events in Canada, the United Kingdom and Europe – the London Bridge attacks, the terrorist attacks in Nice, France and Barcelona, Spain, the 2014 Ottawa Parliament attacks and the 2017 attacks in Edmonton – have all raised levels of public and academic concern with so-called “lone-wolf” and “radicalized” terrorism. Similarly, several countries outside of the “Western” world have been dealing with radicalization to violent extremism for several years. Many South East Asian countries, including Indonesia, Malaysia, Singapore and the Philippines have all had experience with what might be described as ISIS or extremist-inspired acts of terrorism. Indeed, it appears the greatest strength of groups such as ISIS has been their ability to spread a global message of violent extremism that has led to radicalization in markedly different jurisdictions throughout the world. These markedly different jurisdictions have responded with counter-radicalization strategies that warrant further comparative analysis. This paper utilizes an inter-disciplinary legal methodology. In doing so, it compares legal, political, cultural and historical aspects of the counter-radicalization strategies employed by Canada, the United Kingdom and several South East Asian countries (Indonesia, Malaysia, Singapore and the Philippines). Whilst acknowledging significant legal and political differences between these jurisdictions, the paper engages in these analyses with an eye towards understanding which best practices might be shared between the jurisdictions. In doing so, it presents valuable findings of a comparative nature that are useful to both academic and practitioner audiences in several jurisdictions.

Keywords: Canada, United Kingdom and South East Asia, comparative law and politics, radicalization to violent extremism, terrorism

Procedia PDF Downloads 319
323 Role of Obama's Administration Counter-Terrorism Strategies towards Pakistan

Authors: Ahmed Bux Jamali

Abstract:

The purpose of this study is to examine and evaluate the overall counterterrorism cooperation during Obama Administration towards Pakistan. It aims and focuses on the performances and measures taken by United States of America during President Obama in office in order to eradicate terrorism from Pakistan. Being a grave national security threat, terrorism played a disastrous role in the domestic peace and stability of both countries. For the sake of curbing this menace in South Asia in general and Pakistan in particular, the role of Obama Administration is viable and results-oriented despite major ups and downs in Pakistan U.S Relations during that period of time. Obama administration formulated policies when he comes to office in 2009 by looking at the already efforts done by Bush Administration to counterterrorism from Pakistan. Obama’s foreign policy was revolving around defense and diplomacy when it comes to dealing with Pakistan. The concept of smart power was indeed a core principle of Obama’s administration to gain the strategic objectives in Pakistan. Obama’s strategies in terms of providing military aid packages and various assistance programs, working on institutional building and strengthening the economy helped Pakistan in strengthening the military capabilities to go for militant operation in the safe havens area in the tribal areas of Pakistan. It further helped building institutional mechanism in the governmental policies to counter terrorism and militancy. The training of combat forces, artillery, and equipment provided by US proved fatal for the militant terrorist organizations seeking hideouts in the tribal areas of Pakistan. Resultantly, many top leaders of al Qaeda and many affiliated militant groups were captured and given to US as well. Despite many ups and downs in the bilateral relations on various domestic and international issues, both countries didn’t compromise the elimination of terrorist phenomena from Pakistan which was indeed a great success of the Obama administration’s counterterrorism and counterinsurgency strategies in the long run.

Keywords: counterterrorism cooperation, national security strategy, Obama administration, Pakistan-US relations

Procedia PDF Downloads 152
322 Nanoprofiling of GaAs Surface in a Combined Low-Temperature Plasma for Microwave Devices

Authors: Victor S. Klimin, Alexey A. Rezvan, Maxim S. Solodovnik, Oleg A. Ageev

Abstract:

In this paper, the problems of existing methods of profiling and surface modification of nanoscale arsenide-gallium structures are analyzed. The use of a combination of methods of local anodic oxidation and plasma chemical etching to solve this problem is considered. The main features that make this technology one of the promising areas of modification and profiling of near-surface layers of solids are demonstrated. In this paper, we studied the effect of formation stress and etching time on the geometrical parameters of the etched layer and the roughness of the etched surface. Experimental dependences of the thickness of the etched layer on the time and stress of formation were obtained. The surface analysis was carried out using atomic force microscopy methods, the corresponding profilograms were constructed from the obtained images, and the roughness of the etched surface was studied accordingly. It was shown that at high formation voltage, the depth of the etched surface increased, this is due to an increase in the number of active particles (oxygen ions and hydroxyl groups) formed as a result of the decomposition of water molecules in an electric field, during the formation of oxide nanostructures on the surface of gallium arsenide. Oxide layers were used as negative masks for subsequent plasma chemical etching by the STE ICPe68 unit. BCl₃ was chosen as the chlorine-containing gas, which differs from analogs in some parameters for the effect of etching of nanostructures based on gallium arsenide in the low-temperature plasma. The gas mixture of reaction chamber consisted of a buffer gas NAr = 100 cm³/min and a chlorine-containing gas NBCl₃ = 15 cm³/min at a pressure P = 2 Pa. The influence of these methods modes, which are formation voltage and etching time, on the roughness and geometric parameters, and corresponding dependences are demonstrated. Probe nanotechnology was used for surface analysis.

Keywords: nanostructures, GaAs, plasma chemical etching, modification structures

Procedia PDF Downloads 124