Search results for: existential threat
946 The Georgians’ Discourses of National Identity in the Context of Europeanisation
Authors: Lia Tsuladze
Abstract:
The paper discusses the Georgians’ online discourses of national identity in the context of Europeanisation focusing on two periods - initialing of the EU-Georgia Association Agreement in November 2013 and signing it in June 2014. Discussing how the Georgians’ aspiration to integrate with the EU is combined with their perception of Europeanisation as a threat to the national identity, the author explores how the national sentiment is expressed in the above discourses while performed for the local vs. international audiences.Keywords: Europeanisation, frontstage, backstage discourses, Georgia, national identity
Procedia PDF Downloads 507945 Living Lab as a Service: Developing Context Induced, Co-creational Innovation Routines as a Process Tool for Nature Based Solutions
Authors: Immanuel Darkwa
Abstract:
Climate change and environmental degradation are existential threats requiring urgent transnational action. The SDGs, as well as regional initiatives the like European Green Deal, as ambitious as they are, put an emphasis on innovatively tackling threats posed by climate change regionally. While co-creational approaches are being propagated, there is no reference blueprint for how potential solutions, particularly nature-based solutions, may be developed and implemented within urban-settings. Using a single case study in Zagreb, Croatia, this paper proposes a workshop-tool for a Living Lab as a Service model for sustainable Nature-Based-Thinking, Nature–Centred-Design and Nature based solutions. The approach is based on a co-creational methodology developed through literature synthesis, expert interviews, focus group discussions, surveys and synthesized through rigorous research analysis and participatory observation. The ensuing tool involves workshop-processes, tested with through-the-process identified stakeholders with distinctive roles and functions. The resulting framework proposes a Nature-Based-Centred-Thinking process tool involving ‘green’ routines supported by a focal unit and a collaborative network, and that allows for the development of nature-based solutions.Keywords: living labs, nature-based solutions, nature- based design, innovation processes, innovation routines and tools
Procedia PDF Downloads 76944 Ideological Stance in Political Discourse: A Transitivity Analysis of Nawaz Sharif's Address at 71st UN Assembly
Authors: A. Nawaz
Abstract:
The present study uses Halliday’s transitivity model to analyze and interpret ideological stance in PM Nawaz Sharif’s political discourse. His famous speech at the 71st UN assembly was analyzed qualitatively using clausal analysis approach to investigate the communicative functions of the linguistic choices made in the address. The study discovers that among the six process types under the transitivity model, material, relational and mental processes appear most frequently in the speech, making up almost 86% of the whole. Verbal processes rank 4th, whereas existential and behavioral are the least occurring processes covering only 2 and 1 percent respectively. The dominant use of material processes suggests that Nawaz Sharif and his government are the main actors working on several concrete projects to produce a sense of developmental progression and continuity. Using relational and mental processes the PM, along with establishing proximity with masses and especially Kashmiri, gives guarantees and promises. The linguistic analysis concludes Kashmir dispute as being the central theme of the address, since it covers more than half of the discourse. The address calls for a strong action instead of formal assurances and wishful thoughts. The study establishes that language structures can yield certain connotations and ideologies which are not overt for readers. This is in affirmation to the supposition that language form performs a communicative function and is not merely fortuitous.Keywords: Hallidian perspective on language, implicit meanings, Nawaz Sharif, political ideologies, political speeches, transitivity, UN Assembly
Procedia PDF Downloads 209943 A Risk-Based Comprehensive Framework for the Assessment of the Security of Multi-Modal Transport Systems
Authors: Mireille Elhajj, Washington Ochieng, Deeph Chana
Abstract:
The challenges of the rapid growth in the demand for transport has traditionally been seen within the context of the problems of congestion, air quality, climate change, safety, and affordability. However, there are increasing threats including those related to crime such as cyber-attacks that threaten the security of the transport of people and goods. To the best of the authors’ knowledge, this paper presents for the first time, a comprehensive framework for the assessment of the current and future security issues of multi-modal transport systems. The approach or method proposed is based on a structured framework starting with a detailed specification of the transport asset map (transport system architecture), followed by the identification of vulnerabilities. The asset map and vulnerabilities are used to identify the various approaches for exploitation of the vulnerabilities, leading to the creation of a set of threat scenarios. The threat scenarios are then transformed into risks and their categories, and include insights for their mitigation. The consideration of the mitigation space is holistic and includes the formulation of appropriate policies and tactics and/or technical interventions. The quality of the framework is ensured through a structured and logical process that identifies the stakeholders, reviews the relevant documents including policies and identifies gaps, incorporates targeted surveys to augment the reviews, and uses subject matter experts for validation. The approach to categorising security risks is an extension of the current methods that are typically employed. Specifically, the partitioning of risks into either physical or cyber categories is too limited for developing mitigation policies and tactics/interventions for transport systems where an interplay between physical and cyber processes is very often the norm. This interplay is rapidly taking on increasing significance for security as the emergence of cyber-physical technologies, are shaping the future of all transport modes. Examples include: Connected Autonomous Vehicles (CAVs) in road transport; the European Rail Traffic Management System (ERTMS) in rail transport; Automatic Identification System (AIS) in maritime transport; advanced Communications, Navigation and Surveillance (CNS) technologies in air transport; and the Internet of Things (IoT). The framework adopts a risk categorisation scheme that considers risks as falling within the following threat→impact relationships: Physical→Physical, Cyber→Cyber, Cyber→Physical, and Physical→Cyber). Thus the framework enables a more complete risk picture to be developed for today’s transport systems and, more importantly, is readily extendable to account for emerging trends in the sector that will define future transport systems. The framework facilitates the audit and retro-fitting of mitigations in current transport operations and the analysis of security management options for the next generation of Transport enabling strategic aspirations such as systems with security-by-design and co-design of safety and security to be achieved. An initial application of the framework to transport systems has shown that intra-modal consideration of security measures is sub-optimal and that a holistic and multi-modal approach that also addresses the intersections/transition points of such networks is required as their vulnerability is high. This is in-line with traveler-centric transport service provision, widely accepted as the future of mobility services. In summary, a risk-based framework is proposed for use by the stakeholders to comprehensively and holistically assess the security of transport systems. It requires a detailed understanding of the transport architecture to enable a detailed vulnerabilities analysis to be undertaken, creates threat scenarios and transforms them into risks which form the basis for the formulation of interventions.Keywords: mitigations, risk, transport, security, vulnerabilities
Procedia PDF Downloads 165942 A Model of Human Security: A Comparison of Vulnerabilities and Timespace
Authors: Anders Troedsson
Abstract:
For us humans, risks are intimately linked to human vulnerabilities - where there is vulnerability, there is potentially insecurity, and risk. Reducing vulnerability through compensatory measures means increasing security and decreasing risk. The paper suggests that a meaningful way to approach the study of risks (including threats, assaults, crisis etc.), is to understand the vulnerabilities these external phenomena evoke in humans. As is argued, the basis of risk evaluation, as well as responses, is the more or less subjective perception by the individual person, or a group of persons, exposed to the external event or phenomena in question. This will be determined primarily by the vulnerability or vulnerabilities that the external factor are perceived to evoke. In this way, risk perception is primarily an inward dynamic, rather than an outward one. Therefore, a route towards an understanding of the perception of risks, is a closer scrutiny of the vulnerabilities which they can evoke, thereby approaching an understanding of what in the paper is called the essence of risk (including threat, assault etc.), or that which a certain perceived risk means to an individual or group of individuals. As a necessary basis for gauging the wide spectrum of potential risks and their meaning, the paper proposes a model of human vulnerabilities, drawing from i.a. a long tradition of needs theory. In order to account for the subjectivity factor, which mediates between the innate vulnerabilities on the one hand, and the event or phenomenon out there on the other hand, an ensuing ontological discussion about the timespace characteristics of risk/threat/assault as perceived by humans leads to the positing of two dimensions. These two dimensions are applied on the vulnerabilities, resulting in a modelling effort featuring four realms of vulnerabilities which are related to each other and together represent a dynamic whole. In approaching the problem of risk perception, the paper thus defines the relevant realms of vulnerabilities, depicting them as a dynamic whole. With reference to a substantial body of literature and a growing international policy trend since the 1990s, this model is put in the language of human security - a concept relevant not only for international security studies and policy, but also for other academic disciplines and spheres of human endeavor.Keywords: human security, timespace, vulnerabilities, risk perception
Procedia PDF Downloads 336941 An Empirical Assessment of Indoor Environmental Quality in Developing Sub-Saharan Countries: Evaluation of Existing Gaps and Potential Risk
Authors: Jean-Paul Kapuya Bulaba Nyembwe, John Omomoluwa Ogundiran, Manuel Carlos Gameiro da Silva
Abstract:
Indoor environmental quality (IEQ) remains a global concern because it impacts people's comfort, health, performance, and general well-being. People spend a significant amount of time in buildings or while commuting, hence ensuring the minimal risk in indoor spaces by ensuring suitable IEQ. IEQ studies are limited regarding developing sub-Saharan countries, whereas there is also a huge risk and concern for the current population and geometric growth as many cities in the region will become mega-cities by 2040 (World Bank report). The absence of suitable IEQ regulations and energy poverty are reasons to assess the IEQ gaps for increased awareness of sustainable interventions to minimize the associated risk. This study evaluates the gaps and potential hazards that exist in the IEQ of sub-Saharan countries using empirical studies of hospital occupants and BRT bus passengers and drivers. The Surveys were conducted in 3 cities of the Democratic Republic of Congo and Lagos metropolis of Nigeria. The results suggest that gaps exist in IEQ for these regions. The gaps indicate existential risk to people’s health, comfort, and well-being. The inferential conclusions are that there is a need for further scientific studies, improvement in IEQ conditions, and ensuring suitable regulations for developing sub-Saharan countries.Keywords: health hazards, hospitals indoor environmental quality, indoor spaces, occupants, sub-Saharan countries, vehicles
Procedia PDF Downloads 71940 Microbial Load, Prevalence and Antibiotic Resistance of Microflora Isolated from the Ghanaian Paper Currency Note: A Potential Health Threat
Authors: Simon Nyarko
Abstract:
This study examined the microbial flora contamination of the Ghanaian paper currency notes and antibiotic resistance in Ejura Municipal, Ashanti Region, Ghana. This is a descriptive cross-sectional study designed to assess the profile of microflora contamination of the Ghanaian paper currency notes and antibiotic-resistant in the Ejura Municipality. The research was conducted in Ejura, a town in the Ejura Sekyeredumase Municipal of the Ashanti region of Ghana. 70 paper currency notes which were freshly collected from the bank, consisting of 15 pieces of GH ¢1, GH ¢2, and GH ¢5, 10 pieces of GH ¢10 and GH ¢20, and 5 pieces of GH ¢50, were randomly sampled from people by exchanging their money in usage with those freshly secured from the bank. The surfaces of each GH¢ note were gently swabbed and sent to the lab immediately in sterile Zip Bags and sealed, and tenfold serial dilution was inoculated on plate count agar (PCA), MacConkey agar (MCA), mannitol salt agar (MSA), and deoxycholate citrate agar (DCA). For bacterial identification, the study used appropriate laboratory and biochemical tests. The data was analyzed using SPSS-IBM version 20.0. It was found that 95.2 % of the 70 GH¢ notes tested positive for one or more bacterial isolates. On each GH¢ note, mean counts on PCA ranged from 3.0 cfu/ml ×105 to 4.8 cfu/ml ×105. Of 124 bacteria isolated. 36 (29.03 %), 32 (25.81%), 16 (12.90 %), 20 (16.13%), 13 (10.48 %), and 7 (5.66 %) were from GH¢1, GH¢2, GH¢10, GH¢5, GH¢20, and GH¢50, respectively. Bacterial isolates were Escherichia coli (25.81%), Staphylococcus aureus (18.55%), coagulase-negative Staphylococcus (15.32%), Klebsiella species (12.10%), Salmonella species (9.68%), Shigella species (8.06%), Pseudomonas aeruginosa (7.26%), and Proteus species (3.23%). Meat shops, commercial drivers, canteens, grocery stores, and vegetable shops contributed 25.81 %, 20.16 %, 19.35 %, 17.74 %, and 16.94 % of GH¢ notes, respectively. There was 100% resistance of the isolates to Erythromycin (ERY), and Cotrimoxazole (COT). Amikacin (AMK) was the most effective among the antibiotics as 75% of the isolates were susceptible to it. This study has demonstrated that the Ghanaian paper currency notes are heavily contaminated with potentially pathogenic bacteria that are highly resistant to the most widely used antibiotics and are a threat to public health.Keywords: microflora, antibiotic resistance, staphylococcus aureus, culture media, multi-drug resistance
Procedia PDF Downloads 107939 Re-Emergence of Religious Militancy in Pakistan after Return of Afghan Taliban to Power Corridors in Afghanistan (2021-2022)
Authors: Syed Sibtain Hussain Shah
Abstract:
The Afghan Taliban returned to power corridors in Afghanistan in August 2021 after waging a twenty-year insurgency in the country. U.S.-led forces completed their withdrawal from Afghanistan on August 30, 2021, but the Taliban took control of the whole country till August 15, 2021. At the same time, some of the militant groups such as Tehrik-e-Taliban Pakistan (TTP) and Islamic State Khurasan (IS-K) reappeared in Pakistan’s borders and other areas and by increasing attacks on the armed forces of Pakistan and minorities communities. These groups once again created a crucial challenge to the internal security of the country. Since mid of 2021, many of the terrorist incidents in the countries specified in the areas of Pakistan bordering Afghanistan were committed by TTP and IS-K. The aim of this paper is to investigate the reappearance of TTP and IS-K in 2021 and 2022 as a crucial threat to the internal security of Pakistan. The author will particularly probe threats to the security of military personnel and their installations and threats to human security, including danger to religious minority communities in the different areas of the country, including border areas such as Waziristan, which was once a hub of TTP and other militant groups in the 2000s. The author will employ the relevant method and appropriate theories of security studies, such as religious extremism and terrorism, in this study. TTP, inspired by the Afghan Taliban, initially emerged in Pakistan in 2007 and this group has so far targeted various religious and ethnic communities and government installations in Pakistan. The group is not only against Pakistan’s government policies, but it also committed terrorist attacks on the communities of the other Muslim sects and as well as non-Muslim communities. Most of the prominent figures of this violent group disappeared or escaped to Afghanistan after military actions, such as the larger “Zarb-e-Azb” operation in Pakistan in 2015. IS-K, which established its branch of Khurasan covering Pakistan and Afghanistan in 2015, with its main formation in Iraq and Syria in 2015, by targeting religious minorities such as Shia Muslims, has so far created a vital security challenge for the security of the country.Keywords: Pakistan, Afghanistan, Afghan Taliban, Pakistani Taliban, Islamic state Khorasan, security threat
Procedia PDF Downloads 140938 The Basic Teachings of the Buddha
Authors: Bhaddiya Tanchangya
Abstract:
This article discusses the Four Noble Truths, the foundational teachings of Buddhism, and their significance to Buddhist philosophy. The Four Noble Truths are the Noble Truth of Suffering, the Noble Truth of the Cause of Suffering, the Noble Truth of the End of Suffering, and the Noble Truth of the Path Leading to the End of Suffering. The first truth, the Noble Truth of Suffering, explains that suffering or dukkha is an inherent part of existence, including emotional, physical, and existential forms of suffering, including the Five Aggregates, which refer to the five components that make up a sentient being's experience of existence, as they are all conditioned, interdependent, subject to the Three Characteristics of Existence: impermanence, unsatisfactoriness and emptiness. The second truth, the Noble Truth of the Cause of Suffering, states that craving or attachment to the sensory experiences of the Five Aggregates leads to suffering and identifies three types of craving: craving for sensual pleasures, craving for existence, and craving for non-existence. Through the doctrine of Dependent Origination (Paṭiccasamuppāda), the Buddha graphically shows how the entire process of suffering arises and ceases. The third truth, the Noble Truth of the End of Suffering, asserts that there is a way to end suffering and attain a state of liberation called Nibbāna that marks the end of the cycle of birth and death by removing that very craving towards the sensory experiences by cultivating the Noble Eightfold Path. The fourth truth, the Noble Truth of the Path Leading to the End of Suffering, describes the Noble Eightfold Path, a set of guidelines to develop insight and wisdom to overcome craving and attachment and attain liberation from suffering. The article emphasizes that the Four Noble Truths are universal, applicable to all people regardless of culture, background, or beliefs, and form the foundation of Buddhist philosophy and practice.Keywords: four noble truths, impermanence, suffering, not-self-ness, interconnectedness, emptiness, morality, concentration, wisdom, nirvana, happiness
Procedia PDF Downloads 88937 Protection of the Object of the Critical Infrastructure in the Czech Republic
Authors: Michaela Vašková
Abstract:
With the increasing dependence of countries on the critical infrastructure, it increases their vulnerability. Big threat is primarily in the human factor (personnel of the critical infrastructure) and in terrorist attacks. It emphasizes the development of methodology for searching of weak points and their subsequent elimination. This article discusses methods for the analysis of safety in the objects of critical infrastructure. It also contains proposal for methodology for training employees of security services in the objects of the critical infrastructure and developing scenarios of attacks on selected objects of the critical infrastructure.Keywords: critical infrastructure, object of critical infrastructure, protection, safety, security, security audit
Procedia PDF Downloads 344936 The Threat of International Terrorism and Its Impact on UK Migration Policy and Practice
Authors: Baljit Soroya
Abstract:
Transnational communities are as a consequence of greater mobility of people, globalization and digitization have had a major impact on international relations and diasporas in the context of external conflicts. To a significant extent conflicts are becoming deterritorialised and informed by both internal (state politics) and external (foreign policy) players such as in Iraq and Syria leading to forced migration of unprecedented levels within the last two decades. The situation of forced migrants has, it is suggested, worsened as a consequence of the neo-liberal policies and requirements of organizations such as the European Bank. A case example of this being that of Greece, and the exacerbation of insecurity for Greek nationals and the demonization of refugees seeking sanctuary. This has been as a consequence, in part, of the neoliberal dogma of the European Bank. The article analyses the complex intersection of the real and perceived threats of international terrorism and the manner in which UK migration policy and Practice is unfolding. The policy and practice developments are explored in the context of the shift in politics in both the UK and wider Europe to the far right and the drift of main stream political parties to the right. In many cases, the mainstream political groupings, have co-opted the fears as presented by far right organization for political their own political gains, such as in the UK and France In its analysis it will be argued that, whilst international terrorism is an issue of concern, however in the context of the UK it is not of the same scale as the effects of climate change or indeed domestic violence. Given that, the question has to be asked why the threat of international terrorism is having such an impact on UK migration policy and practice and, specifically refugees. Furthermore, it is argued that this policy and practice are being formulated within a narrative that portrays migrants as the problem both in relation to terrorism and the disenfranchisement of ‘ordinary white communities’. The intersectionality of social, economic inequalities, fear of international terrorism, increase in conflicts and the political climate have contributed to a lack of trust of political establishments that have in turn sought to impress the public with their anti-immigrant rhetoric and policy agendas. The article ends by suggesting that whilst politics and political affiliations have become fractured there are nevertheless spaces for collective action, particularly in relation to issues of refugees.Keywords: international terrorism, migration policy, conflict, media, community, politics
Procedia PDF Downloads 334935 Winning the “Culture War”: Greater Hungary and the American Confederacy as Sites of Nostalgia, Mythology, and Problem-Making for the Far Right in the US and Hungary
Authors: Grace Rademacher
Abstract:
Trauma” of the Kingdom of Hungary and the “Lost Cause” of the American Confederacy. Applying Nicole Maurantonio’s articulation of “confederate exceptionalism” and Svetlana Boym’s definition of “restorative nostalgia”, this article argues that, via memorialization and public discourse, both far right bodies flood their constituencies with narratives of nostalgia and martyrdom to sow existential anxieties about past and prophetic victimhood, all under the guise of protecting or restoring heritage. Linking this practice to gamification and conspiracy theorizing and following the work of Patrick Jagoda, this article identifies such industries of nostalgia as means by which the far right in both nations can partake in the “immanent and improvisational process of problem making.” Reified through monuments and references to the Trianon Trauma and the American confederacy, political actors “problem make” by alleging that they are victims of the West or the Left, subject to the cruel whims of liberalism and denial of historical legitimacy. In both nations, relying on their victimhood, pundits and politicians can appeal to white supremacists and distract citizens from legitimate active conflicts, such as wars or democratic rollbacks, redirecting them to fictional, mythical attacks on Hungarian or American society and civilization. This article will examine memorials and monuments as “lieux de memoire” and identify the purposeful similarities between the discourse of public figures and politicians such as María Schmidt, János Lázár, and Viktor Orbán, with that of Donald Trump and pundits such as Tucker Carlson.Keywords: nationalism, political memory, white supremacy, trianon
Procedia PDF Downloads 76934 Misconception of the Idea ‘Oshinowoism’ and the Later Development in the ‘Yaba Painting School'
Authors: Irokanulo I. Emmanuel
Abstract:
The idea of ‘Oshinowoism’ is a representational school, which is a concept based on pure and rustic energy in painting. It is described as any painting that depicts the actions of significant through simple illusions. The idea is never to replicate a photographic resemblance with paint but to create an affinity between what one sees and what one artistically intends to create as a representation of that which one beholds in society as an illusion of reality, not as a reality in itself, but as subjective analysis of reality. The disciples of ‘Oshinowoism’ pursue their art from a representational point of view, creating material realities within feels of colours, forms and space, not trying to confuse the art as a substitute for reality nor reality as a substitute for art, but giving each its space and materialism to exist. The depictions of Oshinowo are the constant reminders or perhaps interpretations of those developments that emerged in contemporary African societies because of neocolonialism. This essay has three objectives. First, it examines the misconception around the development of this thought. Secondly, it contextualizes the later contemporary development of painting as art and craft in present-day Lagos, and third, it constructs the misconception and misconstruction of the concept of ‘Oshinowoism’ and offers a correct ideology of this thought with the body of Oshinowo’s work to give the existence to this philosophy. This study looks at the students of Kolade Oshinowo, especially those students who share similar elements and an affinity with the master painting skills, as a way of reconstructing and addressing the misconception in his style. The early works of Olaku, Edosa, and Lara Ige Jacks are plausible evidence of the existential essence of Oshinowo’s artistic philosophy. To this end, therefore, this study would explore the quality of their pictorial techniques and skills in painting as a way of preserving their master’s philosophy.Keywords: Oshinowoism, colour scheme, drawing, philosophy, representations
Procedia PDF Downloads 41933 Quantifying Meaning in Biological Systems
Authors: Richard L. Summers
Abstract:
The advanced computational analysis of biological systems is becoming increasingly dependent upon an understanding of the information-theoretic structure of the materials, energy and interactive processes that comprise those systems. The stability and survival of these living systems are fundamentally contingent upon their ability to acquire and process the meaning of information concerning the physical state of its biological continuum (biocontinuum). The drive for adaptive system reconciliation of a divergence from steady-state within this biocontinuum can be described by an information metric-based formulation of the process for actionable knowledge acquisition that incorporates the axiomatic inference of Kullback-Leibler information minimization driven by survival replicator dynamics. If the mathematical expression of this process is the Lagrangian integrand for any change within the biocontinuum then it can also be considered as an action functional for the living system. In the direct method of Lyapunov, such a summarizing mathematical formulation of global system behavior based on the driving forces of energy currents and constraints within the system can serve as a platform for the analysis of stability. As the system evolves in time in response to biocontinuum perturbations, the summarizing function then conveys information about its overall stability. This stability information portends survival and therefore has absolute existential meaning for the living system. The first derivative of the Lyapunov energy information function will have a negative trajectory toward a system's steady state if the driving force is dissipating. By contrast, system instability leading to system dissolution will have a positive trajectory. The direction and magnitude of the vector for the trajectory then serves as a quantifiable signature of the meaning associated with the living system’s stability information, homeostasis and survival potential.Keywords: meaning, information, Lyapunov, living systems
Procedia PDF Downloads 131932 A Game Theory Analysis of the Effectiveness of Passenger Profiling for Transportation Security
Authors: Yael Deutsch, Arieh Gavious
Abstract:
The threat of aviation terrorism and its potential damage became significant after the 9/11 terror attacks. These attacks have led authorities and leaders to suggest that security personnel should overcome politically correct scruples about profiling and use it openly. However, there is a lack of knowledge about the smart usage of profiling and its advantages. We analyze game models that are suitable to specific real-world scenarios, focusing on profiling as a tool to detect potential violators, such as terrorists and smugglers. We provide analytical and clear answers to difficult questions, and by that help fighting against harmful violation acts.Keywords: game theory, profiling, security, nash equilibrium
Procedia PDF Downloads 109931 Contingent Presences in Architecture: Vitruvian Theory as a Beginning
Authors: Zelal Çınar
Abstract:
This paper claims that architecture is a contingent discipline, despite the fact that its contingency has long been denied through a retreat to Vitruvian writing. It is evident that contingency is rejected not only by architecture but also by modernity as a whole. Vitruvius attempted to cover the entire field of architecture in a systematic form in order to bring the whole body of this great discipline to a complete order. The legacy of his theory hitherto lasted not only that it is the only major work on the architecture of Classical Antiquity to have survived, but also that its conformity with the project of modernity. In the scope of the paper, it will be argued that contingency should be taken into account rather than avoided as a potential threat.Keywords: architecture, contingency, modernity, Vitruvius
Procedia PDF Downloads 295930 Train Cross-Cultural Leaders in Higher Education
Authors: Sarah Abi Raad
Abstract:
Nowadays, one of the challenges faced by many institutions is the continuous changing psychosocial environment. This alteration affects the resources, the organizations and defies the leadership and management of people in charge. As a fact, institutions of higher education differ from many organizations, requiring leadership to be a more shared phenomenon than in most profit-centered enterprises. In these colleges, the leadership must be oriented in a way to empower activities. This said, it is important to train students to take on leadership roles in their personal and professional lives. Thus, leadership training in higher education have to manage a cross-cultural environment in order to get the best out of the whole community that works and studies there. The main directions to follow are the building of a professional identity that manages the cross-cultural public while feeling a personal fulfillment in the workplace. In order to do that, this communication proposal has three objectives: - Explain the aspects of the cross-cultural leadership training logic offered to managers and chairs by allowing them to develop a technical leader style of passionate type with a managerial leadership style of compassionate type. - Define the multiple factors on which depends the leadership, which includes the department’s stage of development, the specific management function, the academic discipline and the chair’s own style of leadership. - Emphasize on the complex nature of leadership and the different facets that results from its role in the higher education. However, different situations require a leader with particular characteristics that can be gathered into three categories: “the innovator”, “the implementer” and the “pacifier”. Each category is linked to a problem organizations normally encounter. This leads to conclude with the following question: are the gender, age and culture taken into consideration during a training?Keywords: benevolent leadership, cross-cultural training, management, unprecedented existential crisis
Procedia PDF Downloads 124929 The Aesthetic and Critiques of Weimar Democracy: The Counter and Complement to Carl Schmitt’s Political Myth
Authors: Peter Jin
Abstract:
Ever since the recent resurgence of interest in political theorist Carl Schmitt’s work, much of the current analysis on Schmitt has fo-cused on evaluating Schmitt’s legacy by exposing contradictions in his rationale. Rather than condemn such contradictions, this paper instead seeks to analyze these contradictions in an effort to better understand the radical shift in Schmitt’s intellectual trajectory from an astute critic of liberal democracy to a fascist apologist towards the end of the Weimar period. An essential part of this change is his interest in what Schmitt called ‘the emergence of aesthetics.’ Schmitt diagnosed the underlying issue with the aesthetic in the political sphere to be its irrationalism, indifference, and indeci-siveness. For Schmitt, the latter two of these were especially prob-lematic for two of his key concepts: the ‘political’ and ‘the shared historical reality.’ Schmitt’s radical depiction of ‘the political’ as an existential opposition of allegiances that necessitated a state of emergency and a decisionist sovereign political struggle required an equally radical justification, or Schmitt’s call for ‘a shared his-torical reality’ not based in historical fact yet able to mobilize the masses. In this way, Schmitt clearly condemns the indifferent, indecisive aesthetic that runs against his decisionist, action-oriented political theory. Yet despite his firm stance against aestheticism, Schmitt himself used the evocative and irrational power of aesthet-icism as a tool to present his own ‘political myth’ that compelled believers to join in decisive unity against a common enemy. In short, Schmitt’s contradictions on aestheticism and his creation of a ‘political myth’ suggest that Schmitt’s underlying conflict with aestheticism was not as much of an issue of irrationality as it was a chronic preoccupation with coercing concrete action at the expense of rational deliberation.Keywords: aesthetics of the political, Carl Schmitt, political myth, Weimar democracy
Procedia PDF Downloads 146928 From the Local to the Global: New Terrorism
Authors: Shamila Ahmed
Abstract:
The paper examines how the fluidity between the local level and the global level is an intrinsic feature of new terrorism. Through using cosmopolitanism, the narratives of the two opposing sides of ISIS and the ‘war on terrorism’ response are explored. It is demonstrated how the fluidity between these levels facilitates the radicalisation process through exploring how groups such as ISIS highlight the perceived injustices against Muslims locally and globally and therefore exploit the globalisation process which has reduced the space between these levels. Similarly, it is argued that the ‘war on terror’ involves the intersection of fear, security, threat, risk and social control as features of both the international ‘war on terror’ and intra state policies.Keywords: terrorism, war on terror, cosmopolitanism, global level terrorism
Procedia PDF Downloads 584927 A Saturation Attack Simulation on a Navy Warship Based on Discrete-Event Simulation Models
Authors: Yawei Liang
Abstract:
Threat from cruise missiles is among the most dangerous considerations to a warship in the modern era: anti-ship cruise missiles are fast, accurate, and extremely destructive. In this paper, the goal was to use an object-orientated environment to program a simulation to model a scenario in which a lone frigate is attacked by a wave of missiles fired at given intervals. The parameters of the simulation are modified to examine the relationships between different variables in the situation, and an analysis is performed on various aspects of the defending ship’s equipment. Finally, the results are presented, along with a brief discussion.Keywords: discrete event simulation, Monte Carlo simulation, naval resource management, weapon-target allocation/assignment
Procedia PDF Downloads 93926 DOS and DDOS Attacks
Authors: Amin Hamrahi, Niloofar Moghaddam
Abstract:
Denial of Service is for denial-of-service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Denial of Service (DoS) attacks have become a major threat to current computer networks. Many recent DoS attacks were launched via a large number of distributed attacking hosts in the Internet. These attacks are called distributed denial of service (DDoS) attacks. To have a better understanding on DoS attacks, this article provides an overview on existing DoS and DDoS attacks and major defense technologies in the Internet.Keywords: denial of service, distributed denial of service, traffic, flooding
Procedia PDF Downloads 392925 Assessing the Threat of Dual Citizenship to State Interests: A Case Study of Sri Lanka
Authors: Kasuri Kaushalya Pathirana Pahamunu Pathirannehelage
Abstract:
Recent changes in the international system challenged the traditional idea of citizenship, prompting a need for a clearer definition. With the rapid globalization and shifting geopolitical dynamics, the concept of dual citizenship has emerged as a focal point of debate regarding its implications for state interests. As borders become less rigid and people identify with multiple nationalities, the traditional idea of citizenship is changing. This change is especially important given the increased connections between countries and the challenges that sovereign states face. While many countries accept dual citizenship, others are hesitant, seeing it as a potential threat to their national goals. This difference underscores the complicated relationship between national interests and the evolving concept of citizenship in the modern world. This study seeks to critically assess whether dual citizenship represents a significant threat to sovereign states by examining its effects across economic, social, and political sectors. Employing qualitative methodologies, including the analysis of published articles, reports, government acts, and a mix of primary and secondary sources, this research delves into the complexities surrounding dual citizenship. The findings reveal a nuanced landscape, showcasing both positive and negative impacts on state sovereignty and international cooperation. By exploring the tension between multinationalism and state interests, particularly through the lens of Sri Lanka’s evolving policies, this study aims to contribute valuable insights to the fields of political science and international relations, ultimately addressing the question of dual citizenship's implications for state interests. The evolving framework of dual citizenship in Sri Lanka provides a unique opportunity to examine its implications for various aspects of the nation. Specifically, this study will analyse the impact of dual citizenship on the country's economy, international cooperation, and social development. By exploring these dimensions, the research aims to provide a comprehensive understanding of how dual citizenship influences not only individual rights but also broader state interests and development goals within the context of globalization. It’s crucial to assess the potential threats posed by dual citizenship, as it can impact national security, economic stability, social unity, and political issues within countries. Understanding these effects is important for policymakers and researchers as they work to balance globalization with the need to protect state sovereignty. Dual citizenship presents a complex interplay of challenges and benefits to state interests, influencing critical areas such as international cooperation and state sovereignty. On the one hand, it can foster stronger ties between nations, enhance economic collaboration, and encourage cultural exchange, ultimately contributing to more robust international relationships. On the other hand, it may create tensions related to national identity, complicate governance, and raise concerns about loyalty and allegiance, which can challenge the notion of state sovereignty. As countries navigate these dual realities, it becomes essential to carefully assess and manage the implications of dual citizenship. By doing so, states can harness the potential advantages while addressing the associated risks, ultimately striving for a balance that promotes both national interests and international relations.Keywords: dual citizenship, globalization, sustainable development, nationalism
Procedia PDF Downloads 19924 Developing Cyber Security Asset Mangement Framework for UK Rail
Authors: Shruti Kohli
Abstract:
The sophistication and pervasiveness of cyber-attacks are constantly growing, driven partly by technological progress, profitable applications in organized crime and state-sponsored innovation. The modernization of rail control systems has resulted in an increasing reliance on digital technology and increased the potential for security breaches and cyber-attacks. This research track showcases the need for developing a secure reusable scalable framework for enhancing cyber security of rail assets. A cyber security framework has been proposed that is being developed to detect the tell-tale signs of cyber-attacks against industrial assets.Keywords: cyber security, rail asset, security threat, cyber ontology
Procedia PDF Downloads 430923 Records of Lepidopteron Borers (Lepidoptera) on Stored Seeds of Indian Himalayan Conifers
Authors: Pawan Kumar, Pitamber Singh Negi
Abstract:
Many of the regeneration failures in conifers are often being attributed to heavy insect attack and pathogens during the period of seed formation and under storage conditions. Conifer berries and seed insects occur throughout the known range of the hosts and also limit the production of seed for nursery stock. On occasion, even entire seed crops are lost due to insect attacks. The berry and seeds of both the species have been found to be infected with insects. Recently, heavy damage to the berry and seeds of Juniper and Chilgoza Pine was observed in the field as well as in stored conditions, leading to reduction in the viability of seeds to germinate. Both the species are under great threat and regeneration of the species is very low. Due to lack of adequate literature, the study on the damage potential of seed insects was urgently required to know the exact status of the insect-pests attacking seeds/berries of both the pine species so as to develop pest management practices against the insect pests attack. As both the species are also under threat and are fighting for survival, so the study is important to develop management practices for the insect-pests of seeds/berries of Juniper and Chilgoza pine so as to evaluate in the nursery, as these species form major vegetation of their distribution zones. A six-year study on the management of insect pests of seeds of Chilgoza revealed that seeds of this species are prone to insect pests mainly borers. During present investigations, it was recorded that cones of are heavily attacked only by Dioryctria abietella (Lepidoptera: Pyralidae) in natural conditions, but seeds which are economically important are heavily infected, (sometimes up to 100% damage was also recorded) by insect borer, Plodia interpunctella (Lepidoptera: Pyralidae) and is recorded for the first time ‘to author’s best knowledge’ infesting the stored Chilgoza seeds. Similarly, Juniper berries and seeds were heavily attacked only by a single borer, Homaloxestis cholopis (Lepidoptera: Lecithoceridae) recorded as a new report in natural habitat as well as in stored conditions. During the present investigation details of insect pest attack on Juniper and Chilgoza pine seeds and berries was observed and suitable management practices were also developed to contain the insect-pests attack.Keywords: borer, chilgozapine, cones, conifer, Lepidoptera, juniper, management, seed
Procedia PDF Downloads 148922 The Work and Life Ethics at the Beginning of the 21st Century and the Vulnerability of Long-Term Unemployed over 45 Years Old in Spain since the Economic Crisis of 2008
Authors: Maria Del Mar Maira Vidal, Alvaro Briales
Abstract:
In this paper, we will conduct an analysis of the results of the I+D+i research project “New types of socio-existential vulnerability, support and care in Spain” (VULSOCU) (2016-20). This project had the objective to analyze the new types of vulnerability that are the result of the combination of several factors as the economic crisis, the unemployment, the transformations of the Welfare State, the individualization, etc. We have, therefore, analyzed the way that Spanish long-term unemployed over 45 years experience vulnerability and its consequences on their lives. We have focused on long-term unemployed over 45 that had previously developed stable career paths and have been looking for a job for two years or more. In order to carry out this analysis, we will try to break the dichotomy between the social and the individual, between the socio-historical and the subjectivity, to overcome some of the limits of the research on unemployment. The fieldwork consisted of more than ten focus groups and fifty in-depth interviews. The work and life ethics completely changed at the turn of the nineteenth and twentieth centuries. In the nineteenth century, companies had trouble maintaining their staff, but in the 21st century, unemployed workers feel that they are useless people. Workers value themselves if they have a job. This unveils that labor is a comprehensive social relationship in capitalist societies. In general, unemployed workers are not able to analyze their unemployment as a social problem. They analyze their unemployment as an individual problem. They blame themselves for their unemployment; instead of taking into account that there are millions of unemployed, they talk about themselves as if they were on their own. And the problems caused by unemployment are explained as psychological problems and are medicalized. Anyway, it is important to highlight that this is the result of an ideology and a social relationship that is part of our historical time.Keywords: life ethics, work ethics, unemployment, unemployed over 45 years old
Procedia PDF Downloads 145921 Fuzzy Expert Approach for Risk Mitigation on Functional Urban Areas Affected by Anthropogenic Ground Movements
Authors: Agnieszka A. Malinowska, R. Hejmanowski
Abstract:
A number of European cities are strongly affected by ground movements caused by anthropogenic activities or post-anthropogenic metamorphosis. Those are mainly water pumping, current mining operation, the collapse of post-mining underground voids or mining-induced earthquakes. These activities lead to large and small-scale ground displacements and a ground ruptures. The ground movements occurring in urban areas could considerably affect stability and safety of structures and infrastructures. The complexity of the ground deformation phenomenon in relation to the structures and infrastructures vulnerability leads to considerable constraints in assessing the threat of those objects. However, the increase of access to the free software and satellite data could pave the way for developing new methods and strategies for environmental risk mitigation and management. Open source geographical information systems (OS GIS), may support data integration, management, and risk analysis. Lately, developed methods based on fuzzy logic and experts methods for buildings and infrastructure damage risk assessment could be integrated into OS GIS. Those methods were verified base on back analysis proving their accuracy. Moreover, those methods could be supported by ground displacement observation. Based on freely available data from European Space Agency and free software, ground deformation could be estimated. The main innovation presented in the paper is the application of open source software (OS GIS) for integration developed models and assessment of the threat of urban areas. Those approaches will be reinforced by analysis of ground movement based on free satellite data. Those data would support the verification of ground movement prediction models. Moreover, satellite data will enable our mapping of ground deformation in urbanized areas. Developed models and methods have been implemented in one of the urban areas hazarded by underground mining activity. Vulnerability maps supported by satellite ground movement observation would mitigate the hazards of land displacements in urban areas close to mines.Keywords: fuzzy logic, open source geographic information science (OS GIS), risk assessment on urbanized areas, satellite interferometry (InSAR)
Procedia PDF Downloads 159920 Obsession Unveiled: A Freud’s Psychoanalytical Analysis of Protagonist Fixations in Nabokov’s Lolita and Pamuk’s The Museum of Innocence
Authors: Kamilya Khamitova
Abstract:
This study analyzes the overarching theme of obsession as portrayed through the two protagonists, Humbert Humbert and Kemal, in Vladimir Nabokov's Lolita and Orhan Pamuk's The Museum of Innocence through the lens of Freudian psychoanalytical theory of “transference.” Their obsessions are channeled into various forms of artistic expression following the loss of their beloved Lolita and Füsun. Employing psychoanalytical literary criticism, firmly grounded in the classical era of psychoanalysis, as pioneered by Sigmund Freud, this research explores the characters' psyches, revealing the concealed desires, conflicts, and symbolic manifestations within their relentless obsessions. The aim of this study is to unravel the psychological complexities of obsession, shedding light on the motivations and behaviors of Humbert and Kemal within the context of their respective narratives. Methodologically, this research employs close textual analysis of the novels, dissecting the protagonists' thoughts, actions, and artistic expressions. Through the lens of Freud's fundamental concept of “transference,” this analysis uncovers the protagonists' mechanisms of projecting their desires onto unattainable objects of desire—Lolita and Füsun. Humbert's pursuit of Lolita mirrors his unresolved emotional traumas and attempts to recapture the lost object of his childhood. In contrast, Kemal's fixation on Füsun is a desperate desire to fill an existential void, address a sense of inadequacy, and construct a semblance of immortality through the meticulous preservation of his memories with her. By adopting a psychoanalytic lens, this research provides a richer understanding of the characters, themes, and symbolism inherent in their artistic expressions of devotion.Keywords: artistic expression, psychoanalysis of obsession, Sigmund Freud, transference
Procedia PDF Downloads 160919 Before Decision: Career Motivation of Teacher Candidates
Authors: Pál Iván Szontagh
Abstract:
We suppose that today, the motivation for the career of a pedagogue (including its existential, organizational and infrastructural conditions) is different from the level of commitment to the profession of an educator (which can be experienced informally, or outside of the public education system). In our research, we made efforts to address the widest possible range of student elementary teachers, and to interpret their responses using different filters. In the first phase of our study, we analyzed first-year kindergarten teacher students’ career motivation and commitment to the profession, and in the second phase, that of final-year kindergarten teacher candidates. In the third phase, we conducted surveys to explore students’ motivation for the profession and the career path of a pedagogue in four countries of the Carpathian Basin (Hungary, Slovakia, Romania and Serbia). The surveys were conducted in 17 campuses of 11 Hungarian teacher’s training colleges and universities. Finally, we extended the survey to practicing graduates preparing for their on-the-job rating examination. Based on our results, in all breakdowns, regardless of age group, training institute or - in part - geographical location and nationality, it is proven that lack of social- and financial esteem of the profession poses serious risks for recruitment and retention of teachers. As a summary, we searched for significant differences between the professional- and career motivations of the three respondent groups (kindergarten teacher students, elementary teacher students and practicing teachers), i.e. the motivation factors that change the most with education and/or with the time spent on the job. Based on our results, in all breakdowns, regardless of age group, training institute or - in part - geographical location and nationality, it is proven that lack of social- and financial esteem of the profession poses serious risks for recruitment and retention of teachers.Keywords: career motivation, career socialization, professional motivation, teacher training
Procedia PDF Downloads 137918 Use of Locally Available Organic Resources for Soil Fertility Improvement on Farmers Yield in the Eastern and Greater Accra Regions of Ghana
Authors: Ebenezer Amoquandoh, Daniel Bruce Sarpong, Godfred K. Ofosu-Budu, Andreas Fliessbach
Abstract:
Soil quality is at stake globally, but under tropical conditions, the loss of soil fertility may be existential. The current rates of soil nutrient depletion, erosion and environmental degradation in most of Africa’s farmland urgently require methods for soil fertility restoration through affordable agricultural management techniques. The study assessed the effects of locally available organic resources to improve soil fertility, crop yield and profitability compared to business as usual on farms in the Eastern and Greater Accra regions of Ghana. Apart from this, we analyzed the change of farmers’ perceptions and knowledge upon the experience with the new techniques; the effect of using locally available organic resource on farmers’ yield and determined the factors influencing the profitability of farming. Using the Difference in Mean Score and Proportion to estimate the extent to which farmers’ perceptions, knowledge and practices have changed, the study showed that farmers’ perception, knowledge and practice on the use of locally available organic resources have changed significantly. This paves way for the sustainable use of locally available organic resource for soil fertility improvement. The Propensity Score Matching technique and Endogenous Switching Regression model used showed that using locally available organic resources have the potential to increase crop yield. It was also observed that using the Profit Margin, Net Farm Income and Return on Investment analysis, it is more profitable to use locally available organic resources than other soil fertility amendments techniques studied. The results further showed that socioeconomic, farm characteristics and institutional factors are significant in influencing farmers’ decision to use locally available organic resources and profitability.Keywords: soil fertility, locally available organic resources, perception, profitability, sustainability
Procedia PDF Downloads 148917 Understanding the Accumulation of Microplastics in Riverbeds and Soils
Authors: Gopala Krishna Darbha
Abstract:
Microplastics (MPs) are secondary fragments of large-sized plastic debris released into the environment and fall in the size range of less than 5 mm. Though reports indicate the abundance of MPs in both riverine and soil environments, their fate is still not completely understood due to the complexity of natural conditions. Mineral particles are ubiquitous in the rivers and may play a vital role in accumulating MPs to the riverbed, thus affecting the benthic life and posing a threat to the river's health. Apart, the chemistry (pH, ionic strength, humics) at the interface can be very prominent. The MPs can also act as potential vectors to transport other contaminants in the environment causing secondary water pollution. The present study focuses on understanding the interaction of MPs with weathering sequence of minerals (feldspar, kaolinite and gibbsite) under batch mode under relevant environmental and natural conditions. Simultaneously, we performed stability studies and transport (column) experiments to understand the mobility of MPs under varying soil solutions (SS) chemistry and the influence of contaminants (CuO nanoparticles). Results showed that the charge and morphology of the gibbsite played an significant role in sorption of NPs (108.1 mg/g) compared to feldspar (7.7 mg/g) and kaolinite (11.9 mg/g). The Fourier transform infrared spectroscopy data supports the complexation of NPs with gibbsite particles via hydrogen bonding. In case of feldspar and kaolinite, a weak interaction with NPs was observed which can be due to electrostatic repulsions and low surface area to volume ration of the mineral particles. The study highlights the enhanced mobility in presence of feldspar and kaolinite while gibbsite rich zones can cause entrapment of NPs accumulating in the riverbeds. In the case of soils, in the absence of MPs, a very high aggregation of CuO NPs observed in SS extracted from black, lateritic, and red soils, which can be correlated with ionic strength (IS) and type of ionic species. The sedimentation rate (Ksed(1/h)) for CuO NPs was >0.5 h−1 in the case of these SS. Interestingly, the stability and sedimentation behavior of CuO NPs varied significantly in the presence of MPs. The Ksed for CuO NPs decreased to half and found <0.25 h−1 in the presence of MPs in all SS. C/C0 values in breakthrough curves increased drastically (black < alluvial < laterite < red) in the presence of MPs. Results suggest that the release of MPs in the terrestrial ecosystem is a potential threat leading to increased mobility of metal nanoparticles in the environment.Keywords: microplastics, minerals, sorption, soils
Procedia PDF Downloads 90