Search results for: military research
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 24379

Search results for: military research

24139 The Duties of the Immortals and the Name of Anauša or Anušiya

Authors: Behzad Moeini Sam, Sara Mohammadi Avandi

Abstract:

One of the reasons for the success of the Achaemenids was the innovation and precise organization used in the administrative and military fields. Of course, these organizations had their roots in the previous governments that had changed in these borrowings. The units of the Achaemenid army are also among the cases that have their origins in the ancient East. In this article, the attempt is to find the sources of the Immortal Army based on the writings of old and current authors and archaeological documents, and the name mentioned by Herodotus and rejected by some authors. Of course, linguistic sources have also been used for better conclusions than the indicated sources. It emphasizes linguistic data to lead to a better deduction. Thus, it was included that ‘anauša’ is more probable than anušiya.

Keywords: army, immortal, ten thousand, Anauša, Anušiya

Procedia PDF Downloads 51
24138 The Role of State Practices and Custom in Outer Space Law

Authors: Biswanath Gupta, Raju Kd

Abstract:

Space law is the new entry in the basket of international law in the latter half of the 20th Century. In the last hundred and fifty years, courts and scholars developed a consensus that, the custom is an important source of international law. Article 38(1) (b) of the statute of the International Court of Justice recognized international custom as a source of international law. State practices and usages have a greater role to play in formulating customary international law. This paper examines those state practices which can be qualified to become international customary law. Since, 1979 (after Moon Treaty) no hard law have been developed in the area of space exploration. It tries to link between state practices and custom in space exploration and development of customary international law in space activities. The paper uses doctrinal method of legal research for examining the current questions of international law. The paper explores different international legal documents such as General Assembly Resolutions, Treaty principles, working papers of UN, cases relating to customary international law and writing of jurists relating to space law and customary international law. It is argued that, principles such as common heritage of mankind, non-military zone, sovereign equality, nuclear weapon free zone and protection of outer space environment, etc. developed state practices among the international community which can be qualified to become international customary law.

Keywords: customary international law, state practice, space law, treaty

Procedia PDF Downloads 318
24137 Representation of Agamben's Concept of 'Homo Sacer': Interpretative Analysis in Turkish TV Series Based on Turkey's 1980 Military Coup

Authors: Oyku Yenen

Abstract:

The notion of biopolitics, as studied by such intellectuals as Foucault, Agamben, and Negri, is an important guide for comprehending the current understanding of politics. While Foucault evaluates biopolitics as a survival policy, Giorgio Agamben, German legist, identifies the theory with death. Agamben claims the fact we can all considered to be homo sacer who are abandoned by the law, left in the field of exception, and whose killing does not require punishment. Agamben defines the person who is tried by the public for committing a crime but is not allowed to be sacrificed and whose killing is not considered a crime, as 'homo sacer'. This study analyzes how the concept of 'homo sacer' is made visible in TV series such as Çemberimde Gül Oya (Cagan Irmak, 2005-2005), Hatırla Sevgili (Ummu Burhan, 2006-2008), Bu Kalp Seni Unutur Mu? (Aydin Bulut, 2009-1010) all of which portray the period Turkey's 1980 military coup, within the framework of Agamben's thoughts and notions about biopolitics. When the main plots of these abovementioned TV series, which constitute the universe of this study, are scrutinized closely, they lay out the understanding of politics that has existed throughout history and prevails today. Although there is a large number of TV series on the coup of 1980, these three series are the only main productions that specifically focused on the event itself. Our final analysis will reveal that the concepts of homo sacer, bare life, exception, camp have been embodied in different ways in these three series. In these three series, which all deal with similar subjects using differing perspectives, the dominant understanding of politics is clearly conveyed to the audience. In all three series, the reigning power always decides on the exceptions, those who will live, those who will die, and those who will be ignored by law. Such characters as Mehmet, Sinan, Yıldız, Deniz, Defne, all of which we come across in these series, are on trial as a criminals of thought and are subjected to various forms of torture while isolated in an area where they are virtually deprived of law. Their citizenship rights are revoked. All of them are left alone with their bare lives (zoe).

Keywords: bare life, biopolitics, homo sacer, sovereign power, state of exception

Procedia PDF Downloads 111
24136 Governance of Inter-Organizational Research Cooperation

Authors: Guenther Schuh, Sebastian Woelk

Abstract:

Companies face increasing challenges in research due to higher costs and risks. The intensifying technology complexity and interdisciplinarity require unique know-how. Therefore, companies need to decide whether research shall be conducted internally or externally with partners. On the other hand, research institutes meet increasing efforts to achieve good financing and to maintain high research reputation. Therefore, relevant research topics need to be identified and specialization of competency is necessary. However, additional competences for solving interdisciplinary research projects are also often required. Secured financing can be achieved by bonding industry partners as well as public fundings. The realization of faster and better research drives companies and research institutes to cooperate in organized research networks, which are managed by an administrative organization. For an effective and efficient cooperation, necessary processes, roles, tools and a set of rules need to be determined. The goal of this paper is to show the state-of-art research and to propose a governance framework for organized research networks.

Keywords: interorganizational cooperation, design of network governance, research network

Procedia PDF Downloads 346
24135 Re-Emergence of Religious Militancy in Pakistan after Return of Afghan Taliban to Power Corridors in Afghanistan (2021-2022)

Authors: Syed Sibtain Hussain Shah

Abstract:

The Afghan Taliban returned to power corridors in Afghanistan in August 2021 after waging a twenty-year insurgency in the country. U.S.-led forces completed their withdrawal from Afghanistan on August 30, 2021, but the Taliban took control of the whole country till August 15, 2021. At the same time, some of the militant groups such as Tehrik-e-Taliban Pakistan (TTP) and Islamic State Khurasan (IS-K) reappeared in Pakistan’s borders and other areas and by increasing attacks on the armed forces of Pakistan and minorities communities. These groups once again created a crucial challenge to the internal security of the country. Since mid of 2021, many of the terrorist incidents in the countries specified in the areas of Pakistan bordering Afghanistan were committed by TTP and IS-K. The aim of this paper is to investigate the reappearance of TTP and IS-K in 2021 and 2022 as a crucial threat to the internal security of Pakistan. The author will particularly probe threats to the security of military personnel and their installations and threats to human security, including danger to religious minority communities in the different areas of the country, including border areas such as Waziristan, which was once a hub of TTP and other militant groups in the 2000s. The author will employ the relevant method and appropriate theories of security studies, such as religious extremism and terrorism, in this study. TTP, inspired by the Afghan Taliban, initially emerged in Pakistan in 2007 and this group has so far targeted various religious and ethnic communities and government installations in Pakistan. The group is not only against Pakistan’s government policies, but it also committed terrorist attacks on the communities of the other Muslim sects and as well as non-Muslim communities. Most of the prominent figures of this violent group disappeared or escaped to Afghanistan after military actions, such as the larger “Zarb-e-Azb” operation in Pakistan in 2015. IS-K, which established its branch of Khurasan covering Pakistan and Afghanistan in 2015, with its main formation in Iraq and Syria in 2015, by targeting religious minorities such as Shia Muslims, has so far created a vital security challenge for the security of the country.

Keywords: Pakistan, Afghanistan, Afghan Taliban, Pakistani Taliban, Islamic state Khorasan, security threat

Procedia PDF Downloads 122
24134 Human Security: The Boko Haram Menace in Northern Nigeria in the 21st Century

Authors: Jimoh Yusuf Amuda

Abstract:

Human security is a great panacea for sustainable development of world societies. Today the whole globe cum human species is living in nightmares of insecurity. This is due to acts of terrorism by various terrorists’ organization worldwide. The situation is on the increase daily. The number of lives and properties lost to religious insurgency cannot be quantifiably analyzed. It is on this note that this paper examine the book haram menace in northern Nigerian vis-à-vis it’s threat to the existence of human lives. The methodology applied for this research is the multi-disciplinary approach, the use journal articles, news papers, magazines, oral interview. Field trips to areas of terrorist attack and the use of text books. The following recommendations were made base on the findings. First of all the Nigerian government should declare total war on the book haram terrorist, then secondly the source of armament coming to this terrorist should be blocked, thirdly the European world should also place an arms embargo on terrorist source arms demands, also security agencies-police, the military, immigration, customs, state security service should work hand-in-hand, in a security tight measures to reduce the penetration of insurgent into the society.

Keywords: human, insecurity, security, terrorism

Procedia PDF Downloads 320
24133 Evaluating the Rate of Return to Peach and Nectarine Research in South Africa: 1971-2012

Authors: Chiedza Z. Tsvakirai, Precious M. Tshabalala, Frikkie Liebenberg, Johann F. Kirsten

Abstract:

Agricultural research conducted by the Agricultural Research Council has played an important role in increasing the productivity and profitability of the South African peach and nectarine industry. However, the importance of this research remains unclear to the industry stakeholders because a rate of return for this research has never been done. As a result, funding for the research at Agricultural Research Council has been waning because it is not clear how much value has been created and how much the industry stands to gain with continued research investment. Therefore, this study seeks to calculate the benefit of research investments in a bid to motivate for an increase in funding. The study utilized the supply response function to do this. The rate of return calculation revealed that agricultural research had a marginal internal rate of return of 55.9%. This means that every R1 invested yields a 56 c increase in value in the industry. Being this high, it can be concluded that investment in agricultural research is worthwhile. Thus justifies for an increase in research funding.

Keywords: Benefits of research investment, productivity.

Procedia PDF Downloads 487
24132 Crossing Borders: In Research and Business Communication

Authors: Edith Podhovnik

Abstract:

Cultures play a role in business communication and in research. At the example of language in international business, this paper addresses the issue of how the research cultures of management research and linguistics as well as cultures as such can be linked. After looking at existing research on language in international business, this paper approaches communication in international business from a linguistic angle and attempts to explain communication issues in businesses based on linguistic research. Thus, the paper makes a step into cross-disciplinary research combining management research with linguistics.

Keywords: language in international business, sociolinguistics, ethnopragmatics, cultural scripts

Procedia PDF Downloads 610
24131 Your Second Step to Understanding Research Ethics: Psycho-Methodological Approach

Authors: Sadeq Al Yaari, Ayman Al Yaari, Adham Al Yaari, Montaha Al Yaari, Aayah Al Yaari, Sajedah Al Yaari

Abstract:

Objective: The study is a summary of a book on research ethics in the scientific field. It aims at investigating ethics that researchers should follow before, during and after doing research. Method: It is an analytic research design wherein the researchers attempted to cover the phenomenon at hand from all specialists’ viewpoints by giving their answers to the most frequent asked questions. Results Questions on the research draft can only be answered when doing the research. This determines understanding the usage of research, questions on the on-line research, specializations and research-related concepts. Questions on the university’s library determines understanding where the library sections do exist, the periodicals, forums, and all about journals, theses and dissertations along with references.

Keywords: research ethics, most frequent questions, scientific answers, journals, library

Procedia PDF Downloads 20
24130 Aromatic Medicinal Plant Classification Using Deep Learning

Authors: Tsega Asresa Mengistu, Getahun Tigistu

Abstract:

Computer vision is an artificial intelligence subfield that allows computers and systems to retrieve meaning from digital images. It is applied in various fields of study self-driving cars, video surveillance, agriculture, Quality control, Health care, construction, military, and everyday life. Aromatic and medicinal plants are botanical raw materials used in cosmetics, medicines, health foods, and other natural health products for therapeutic and Aromatic culinary purposes. Herbal industries depend on these special plants. These plants and their products not only serve as a valuable source of income for farmers and entrepreneurs, and going to export not only industrial raw materials but also valuable foreign exchange. There is a lack of technologies for the classification and identification of Aromatic and medicinal plants in Ethiopia. The manual identification system of plants is a tedious, time-consuming, labor, and lengthy process. For farmers, industry personnel, academics, and pharmacists, it is still difficult to identify parts and usage of plants before ingredient extraction. In order to solve this problem, the researcher uses a deep learning approach for the efficient identification of aromatic and medicinal plants by using a convolutional neural network. The objective of the proposed study is to identify the aromatic and medicinal plant Parts and usages using computer vision technology. Therefore, this research initiated a model for the automatic classification of aromatic and medicinal plants by exploring computer vision technology. Morphological characteristics are still the most important tools for the identification of plants. Leaves are the most widely used parts of plants besides the root, flower and fruit, latex, and barks. The study was conducted on aromatic and medicinal plants available in the Ethiopian Institute of Agricultural Research center. An experimental research design is proposed for this study. This is conducted in Convolutional neural networks and Transfer learning. The Researcher employs sigmoid Activation as the last layer and Rectifier liner unit in the hidden layers. Finally, the researcher got a classification accuracy of 66.4 in convolutional neural networks and 67.3 in mobile networks, and 64 in the Visual Geometry Group.

Keywords: aromatic and medicinal plants, computer vision, deep convolutional neural network

Procedia PDF Downloads 397
24129 An Exploration of Cyberspace Security, Strategy for a New Era

Authors: Laxmi R. Kasaraneni

Abstract:

The Internet connects all the networks, including the nation’s critical infrastructure that are used extensively by not only a nation’s government and military to protect sensitive information and execute missions, but also the primary infrastructure that provides services that enable modern conveniences such as education, potable water, electricity, natural gas, and financial transactions. It has become the central nervous system for the government, the citizens, and the industries. When it is attacked, the effects can ripple far and wide impacts not only to citizens’ well-being but nation’s economy, civil infrastructure, and national security. As such, these critical services may be targeted by malicious hackers during cyber warfare, it is imperative to not only protect them and mitigate any immediate or potential threats, but to also understand the current or potential impacts beyond the IT networks or the organization. The Nation’s IT infrastructure which is now vital for communication, commerce, and control of our physical infrastructure, is highly vulnerable to attack. While existing technologies can address some vulnerabilities, fundamentally new architectures and technologies are needed to address the larger structural insecurities of an infrastructure developed in a more trusting time when mass cyber attacks were not foreseen. This research is intended to improve the core functions of the Internet and critical-sector information systems by providing a clear path to create a safe, secure, and resilient cyber environment that help stakeholders at all levels of government, and the private sector work together to develop the cybersecurity capabilities that are key to our economy, national security, and public health and safety. This research paper also emphasizes the present and future cyber security threats, the capabilities and goals of cyber attackers, a strategic concept and steps to implement cybersecurity for maximum effectiveness, enabling technologies, some strategic assumptions and critical challenges, and the future of cyberspace.

Keywords: critical challenges, critical infrastructure, cyber security, enabling technologies, national security

Procedia PDF Downloads 271
24128 The Impacts of Civil War on Import and Export in Ethiopia: A Case Study of the Tigray Region Conflict

Authors: Simegn Alemayehu Ayele

Abstract:

Abstract: On November 4, 2020, the Ethiopian government launched a military operation against the Tigray People's Liberation Front (TPLF) in Ethiopia's Tigray Province, sparking the beginning of the Tigray War. This study focuses on the most recent Tigray War as it explores the effects of the civil war on Ethiopia's import and export activity. This study examines the consequences of violence on Ethiopia's trade relations, including its trading partners, export volume, and import requirements, using a combination of qualitative and quantitative data. The research outcome showed that Ethiopia's trade activities have suffered significantly as a result of the Tigray conflict, with both imports and exports declining. Particularly, the violence has hampered logistics and transportation networks, which has reduced the number of products exported and imported. Furthermore, the conflict has weakened Ethiopia's trading relationships and reduced demand for Ethiopian commodities. The survey also reveals that some of Ethiopia's major trade routes have been closed as a result of the conflict, severely restricting trade activities. These findings underline the necessity for political stability and conflict resolution procedures to support the nation's import and export activity by indicating that civil war has substantial repercussions for Ethiopia's economic development and trade activities.

Keywords: import demands, logistic networks, trade partiners, trade relatinships

Procedia PDF Downloads 58
24127 Impact Assessment of Plum Research Investments in South Africa

Authors: Precious M. Tshabalala, Thula S. Dlamini, Frikkie Liebenberg, Johann Kirsten

Abstract:

Numerous studies have been conducted, and the evidence has been unambiguous showing that investing in agricultural research and development increases productivity. Continued investments in agricultural research have led to the development of over 26 successful plum cultivars since 1980 at the Agricultural Research Council’s (ARC) Infruitec/Nietvoorbij in South Africa, and more continue to be developed to meet the specific needs of both producers and consumers. Yet very little is known about the returns on any of these research initiatives. The objective of the study was determine the economic impact of plum research investments at the ARC-the main plum breeding research organization in the country. The rate of return to plum research is estimated by estimating parameters in plum production and expressing research investment as an explanatory variable. The marginal rate of return is then determined to be 14.23 per cent. The rate of return to investment being this high is indicative of an under investment in plum research.

Keywords: Agricultural research investments, productivity and rate of return, plum

Procedia PDF Downloads 462
24126 Basics of SCADA Security: A Technical Approach

Authors: Michał Witas

Abstract:

This paper presents a technical approach to analysis of security of SCADA systems. Main goal of the paper is to make SCADA administrators aware of risks resulting from SCADA systems usage and to familiarize with methods that can be adopt to existing or planned system, to increase overall system security level. Because SCADA based systems become a industrial standard, more attention should be paid to the security of that systems. Industrial Control Systems (ICS) like SCADA are responsible for controlling crucial aspects of wide range of industrial processes. In pair with that responsibility, goes a lot of money that can be earned or lost – this fact is main reason of increased interest of attackers. Additionally ICS are often responsible for maintaining resources strategic from the point of view of national economy, like electricity (including nuclear power plants), heating, water resources or military facilities, so they can be targets of terrorist cybernetic attacks. Without proper risk analysis and management, vulnerabilities resulting from the usage of SCADA can be easily exploited by potential attacker. Paper is based mostly on own experience in systems security, gathered during academic studies and professional work in international company. As title suggests, it will cover only basics of topic, because every of points mentioned in the document can be base for additional research and papers.

Keywords: denial of service, SCADA, security policy, distributed network

Procedia PDF Downloads 347
24125 National Security Threat and Fear of Rising Islamic Extremism in Bangladesh due to Influx of Rohingya Refugees

Authors: Afsana Afsar Tuly

Abstract:

The Rohingyas are a group of minority Muslimsin Myanmar who witnessed series of persecution, violence, and torture from Burmese military since 1948. In 2017, around 700,000 Rohingyas fled to the neighboring country Bangladesh and took shelter as refugees after facing clashes with Myanmar security forces. The number increased to 1.8 million in 2020, creating one of the largest refugee crises of recent times. This research focuses on the vulnerability and poverty faced by Rohingyas in refugee camps and how thelack of long-term solution and silence from international communitycan pose national security threat and increasing Islamic extremism in Bangladesh. Islamic religious and terrorist groups have used the Rohingyas position as stateless people to influence them into speaking against the secular government of Bangladesh. There has been increasing crime rates and formation of different rebel groups in refugee camps, causing clashes with Bangladeshi police and authority. Human trafficking, illegal drug dealings, prostitution, and other illicit activities have continuously gone up in the southeastern part of Bangladesh. Some economic, social, and environmental factors are studied and analyzed to show the change in Bangladesh between 2017 and 2020.

Keywords: national security threat, islamic extremism, rohingya refugees, refugee studies, Bangladesh, myanmar

Procedia PDF Downloads 119
24124 Liberation as a Method for Monument Valorisation: The Case of the Defence Heritage Restoration

Authors: Donatella R. Fiorino, Marzia Loddo

Abstract:

The practice of freeing monuments from subsequent additions crosses the entire history of conservation and it is traditionally connected to the aim of valorisation, both for cultural and educational purpose and recently even for touristic exploitation. Defence heritage has been widely interested by these cultural and technical moods from philological restoration to critic innovations. A renovated critical analysis of Italian episodes and in particular the Sardinian case of the area of San Pancrazio in Cagliari, constitute an important lesson about the limits of this practice and the uncertainty in terms of results, towards the definition of a sustainable good practice in the restoration of military architectures.

Keywords: defensive architecture, liberation, Valorisation for tourism, historical restoration

Procedia PDF Downloads 317
24123 Ergonomics and Its Applicability in the Design Process in Egypt Challenges and Prospects

Authors: Mohamed Moheyeldin Mahmoud

Abstract:

Egypt suffers from a severe shortage of data and charts concerning the physical dimensions, measurements, qualities and consumer behavior. The shortage of needed information and appropriate methods has forced the Egyptian designer to use any other foreign standard when designing a product for the Egyptian consumer which has led to many problems. The urgently needed database concerning the physical specifications, measurements of the Egyptian consumers, as well as the need to support the Ergonomics given courses in many colleges and institutes with the latest technologies, is stated as the research problem. Descriptive analytical method relying on the compiling, comparing and analyzing of information and facts in order to get acceptable perceptions, ideas and considerations is the used methodology by the researcher. The research concludes that: 1. Good interaction relationship between users and products shows the success of that product. 2. An integration linkage between the most prominent fields of science specially Ergonomics, Interaction Design and Ethnography should be encouraged to provide an ultimately updated database concerning the nature, specifications and environment of the Egyptian consumer, in order to achieve a higher benefit for both user and product. 3. Chinese economic policy based on the study of market requirements long before any market activities should be emulated. 4. Using Ethnography supports the design activities creating new products or updating existent ones through measuring the compatibility of products with their environment and user expectations, While contracting a joint cooperation between military colleges, sports education institutes from one side, and design institutes from the other side to provide an ultimately updated (annually updated) database concerning some specifications about students of both sexes applying in those institutes (height, weight, etc.) to provide the Industrial designer with the needed information when creating a new product or updating an existing one concerning that category is recommended by the researcher.

Keywords: adapt, ergonomics, ethnography, interaction design

Procedia PDF Downloads 211
24122 A 1.57ghz Mixer Design for GPS Receiver

Authors: Hamd Ahmed

Abstract:

During the Persian Gulf War in 1991s, The confederation forces were surprised when they were being shot at by friendly forces in Iraqi desert. As obvious was the fact that they were mislead due to the lack of proper guidance and technology resulting in unnecessary loss of life and bloodshed. This unforeseen incident along with many others led the US department of defense to open the doors of GPS. In the very beginning, this technology was for military use, but now it is being widely used and increasingly popular among the public due to its high accuracy and immeasurable significance. The GPS system simply consists of three segments, the space segment (the satellite), the control segment (ground control) and the user segment (receiver). This project work is about designing a 1.57GHZ mixer for triple conversion GPS receiver .The GPS Front-End receiver based on super heterodyne receiver which improves selectivity and image frequency. However the main principle of the super heterodyne receiver depends on the mixer. Many different types of mixers (single balanced mixer, Single Ended mixer, Double balanced mixer) can be used with GPS receiver, it depends on the required specifications. This research project will provide an overview of the GPS system and details about the basic architecture of the GPS receiver. The basic emphasis of this report in on investigating general concept of the mixer circuit some terms related to the mixer along with their definitions and present the types of mixer, then gives some advantages of using singly balanced mixer and its application. The focus of this report is on how to design mixer for GPS receiver and discussing the simulation results.

Keywords: GPS , RF filter, heterodyne, mixer

Procedia PDF Downloads 293
24121 Temporal Changes Analysis (1960-2019) of a Greek Rural Landscape

Authors: Stamatia Nasiakou, Dimitrios Chouvardas, Michael Vrahnakis, Vassiliki Kleftoyanni

Abstract:

Recent research in the mountainous and semi-mountainous rural landscapes of Greece shows that they have been significantly changed over the last 80 years. These changes have the form of structural modification of land cover/use patterns, with the main characteristic being the extensive expansion of dense forests and shrubs at the expense of grasslands and extensive agricultural areas. The aim of this research was to study the 60-year changes (1960-2019) of land cover/ use units in the rural landscape of Mouzaki (Karditsa Prefecture, central Greece). Relevant cartographic material such as forest land use maps, digital maps (Corine Land Cover -2018), 1960 aerial photos from Hellenic Military Geographical Service, and satellite imagery (Google Earth Pro 2014, 2016, 2017 and 2019) was collected and processed in order to study landscape evolution. ArcGIS v 10.2.2 software was used to process the cartographic material and to produce several sets of data. Main product of the analysis was a digitized photo-mosaic of the 1960 aerial photographs, a digitized photo-mosaic of recent satellite images (2014, 2016, 2017 and 2019), and diagrams and maps of temporal transformation of the rural landscape (1960 – 2019). Maps and diagrams were produced by applying photointerpretation techniques and a suitable land cover/ use classification system on the two photo-mosaics. Demographic and socioeconomic inventory data was also collected mainly from diachronic census reports of the Hellenic Statistical Authority and local sources. Data analysis of the temporal transformation of land cover/ use units showed that they are mainly located in the central and south-eastern part of the study area, which mainly includes the mountainous part of the landscape. The most significant change is the expansion of the dense forests that currently dominate the southern and eastern part of the landscape. In conclusion, the produced diagrams and maps of the land cover/ use evolution suggest that woody vegetation in the rural landscape of Mouzaki has significantly increased over the past 60 years at the expense of the open areas, especially grasslands and agricultural areas. Demographic changes, land abandonment and the transformation of traditional farming practices (e.g. agroforestry) were recognized as the main cause of the landscape change. This study is part of a broader research project entitled “Perspective of Agroforestry in Thessaly region: A research on social, environmental and economic aspects to enhance farmer participation”. The project is funded by the General Secretariat for Research and Technology (GSRT) and the Hellenic Foundation for Research and Innovation (HFRI).

Keywords: Agroforestry, Forest expansion, Land cover/ use changes, Mountainous and semi-mountainous areas

Procedia PDF Downloads 88
24120 Identity and Citizenship Crises of Rohingya from the Perspective of Diaspora Communities

Authors: Mufizur Rahman

Abstract:

This thesis argues that by the citizenship policies of the Myanmar government, the rights of Rohingya have been taken away and the identity of Rohingya has been marginalized. An emphasis is made on the history, ancestors, homeland, and ideal when an individual seeks recognition for ethnic identity. Ethnic groups hold on to their unique culture, cultural heritage, language, homeland, and historical past not only to act in solidarity but also to reinforce the consciousness of national identity. Rohingya ethnic group in Rakhine state (formerly Arakan state) is in seek for identity and citizenship rights in the country. Even though Rohingya people have been living in Arakan for centuries, they are being marginalized and have been deprived of their rights by the 1982 citizenship law, which was created by the authoritarian leader after the military coup in 1962. This study elaborated marginalized and persecuted life of Rohingyas for decades by the Government of Myanmar (GOM) in their homeland and after the enactment of the 1982 Citizenship Law and citizenship policies enforced by the government. Thereby, every right was deprived systematically from the Rohingya by the GOM. By this circumstance of the country, many Rohingyas have fled from the country and sought asylum in other countries. This study primarily used the qualitative research data of in-depth personal interviews by conducting 18 Rohingya participants from the diaspora community, including male and female participants. The study examined the narrative of the Rohingya identity and citizenship policies of their homeland from the personal experience of the diaspora community.

Keywords: Rohingya, identity, citizenship policies, Diaspora community, homeland, Myanmar

Procedia PDF Downloads 64
24119 A Survey of Attacks and Security Requirements in Wireless Sensor Networks

Authors: Vishnu Pratap Singh Kirar

Abstract:

Wireless sensor network (WSN) is a network of many interconnected networked systems, they equipped with energy resources and they are used to detect other physical characteristics. On WSN, there are many researches are performed in past decades. WSN applicable in many security systems govern by military and in many civilian related applications. Thus, the security of WSN gets attention of researchers and gives an opportunity for many future aspects. Still, there are many other issues are related to deployment and overall coverage, scalability, size, energy efficiency, quality of service (QoS), computational power and many more. In this paper we discus about various applications and security related issue and requirements of WSN.

Keywords: wireless sensor network (WSN), wireless network attacks, wireless network security, security requirements

Procedia PDF Downloads 462
24118 The Human Rights Implications of Arbitrary Arrests and Political Imprisonment in Cameroon between 2016 and 2019

Authors: Ani Eda Njwe

Abstract:

Cameroon is a bilingual and bijural country in West and Central Africa. The current president has been in power since 1982, which makes him the longest-serving president in the world. The length of his presidency is one of the major causes of the ongoing political instability in the country. The preamble of the Cameroonian constitution commits Cameroon to respect international law and human rights. It provides that these laws should be translated into national laws, and respected by all spheres of government and public service. Cameroon is a signatory of several international human rights laws and conventions. In theory, the citizens of Cameroon have adequate legal protection against the violation of their human rights for political reasons. The ongoing political crisis in Cameroon erupted after the Anglophone lawyers and teachers launched a protest against the hiring of Francophone judges in Anglophone courts; and the hiring of Francophone teachers in Anglophone schools. In retaliation, the government launched a military crackdown on protesters and civilians, conducted arbitrary arrests on Anglophones, raped and maimed civilians, and declared a state of emergency in the Anglophone provinces. This infuriated the Anglophone public, causing them to create a secessionist movement, requesting the Independence of Anglophone Cameroon and demanding a separate country called Ambazonia. The Ambazonian armed rebel forces have ever since launched guerrilla attacks on government troops. This fighting has deteriorated into a war between the Ambazonians and the Cameroon government. The arbitrary arrests and unlawful imprisonments have continued, causing the closure of Anglophone schools since November 2016. In October 2018, Cameroon held presidential elections. Before the electoral commission announced the results, the opposition leader, a Francophone, declared himself winner, following a leak of the polling information. This led to his imprisonment. This research has the objective of finding out whether the government’s reactions to protesters and opposition is lawful, under national and international laws. This research will also verify if the prison conditions of political prisoners meet human rights standards. Furthermore, this research seeks detailed information obtained from current political prisoners and detainees on their experiences. This research also aims to highlight the effort being made internationally, towards bringing awareness and finding a resolution to the war in Cameroon. Finally, this research seeks to elucidate on the efforts which human rights organisations have made, towards overseeing the respect of human rights in Cameroon. This research adopts qualitative methods, whereby data were collected using semi-structured interviews of political detainees, and questionnaires. Also, data was collected from secondary sources such as; scholarly articles, newspaper articles, web sources, and human rights reports. From the data collected, the findings were analysed using the content analysis research technique. From the deductions, recommendations have been made, which human rights organisations, activists, and international bodies can implement, to cause the Cameroonian government to stop unlawful arrests and reinstate the respect of human rights and the rule of law in Cameroon.

Keywords: arbitrary arrests, Cameroon, human rights, political

Procedia PDF Downloads 93
24117 The Emerging Post-Islamism and the Politics of Pakistan’s Jamaat-i-Islami in the Contemporary Muslim World

Authors: Shahzada Gulfam

Abstract:

Islamism was considered as a new phenomenon in Muslim World to revolt against static Religious Traditionalists and the Imperialists. Islamist political parties viewed the establishment of an Islamic state within the limits of Sharia’h as their destination. The Islamists movements like Ikhwan-ul Muslimun, Jamaat-i-Islami etc. did appear with revolutionary agenda but were contained by military forces and the secular modernists of Muslim World. The Muslim rulers, historically could not respect the democratic and moral norms and equally emerged as dictators in democracies, military rule as well as in monarchies. The Arab Spring did not follow the Islamists agenda but gathered the common masses against the corrupt rulers to have a just democratic political system. The Islamic State and Sharia’h were not their immediate targets but the achievement of moral norms in Muslim societies and eradication of dictatorial rule were the basic aims. This phenomenon is named as post-Islamism. The political struggle of PAT (Pakistan Awami Tehreek) and the PTI (Pakistan Tehreek-i-Insaf) has been following the footsteps of Arab Spring and can be noted as the extension of Arab Spring in Muslim World. The results of this struggle would define the fate of Post-Islamism in Pakistan. Has Jamaat-i-Islami got the potential to reform its agenda accordingly? This paper intends to study the Jamaat’s struggle and tries to predict Jamaat’s role in post-Islamism scenario. There is a clear distinction between the people of religion and the people following the popular materialistic westernized value system. This division is also evident in political parties. Pakistan has been ruled mostly by the secular parties and rulers. The inability to establish Islamic system by replacing the imperial system has created militancy and revolt which requires the establishment of a sound model Islamic based system in the country. The political parties of Pakistan could not device a modernize agenda, equally acceptable in modernized world and addressing the prevailing issues and also having the indigenous religious and cultural roots. The inability of Jamaat-i-Islami Pakistan to transform its agenda accordingly to serve the post-Islamism has made it irrelevant in Pakistan’s politics. Once Jamaat leaves behind its hard position as an Islamist party and accepts the post-Islamism as beginning to create its idealized state and society, it can pursue its agenda gradually. The phenomenon of post-Islamism does not make Islamists irrelevant but invites them to listen to the priorities of masses rather than insisting on the agenda of their respective ideologues to be followed for all times. The ruling Muslim democrats and military dictators of Pakistan have been following unfair means to sustain their political power which gave rise to space for the new political parties to emerge and organize agitation successfully in Pakistani Politics. Jamaat-i-Islami could not fill that space to be an agent of Post-Islamism and could not break their chains which had been tying them to the prevailing failed democracy of Pakistan. Post-Islamists are the addressers of the rulers corruption and are struggling for reforms in system. Jamaat due to its ideological compulsions could not transform its agenda accordingly. The new scenario indicates that the Post-Islamism which emerged in Arab World can be taken as first step to establish democracy and justice in state and society and then the establishment of Islamic law and the establishment of an Islamic state should have been the next targets. This gradual agenda would have delivered public support to the Jamaat which deserved that but PTI & PAT have cashed this opportunity in Pakistani politics by strengthening their respective vote banks.

Keywords: arab spring, islamic state, islamic political parties, muslim world, post-islamism

Procedia PDF Downloads 348
24116 Technological Developments in Logistics and its Applications in the Army

Authors: Gökhan Balci

Abstract:

“Armies march on their stomachs “mentioned Napoleon, who drew attentıon to the importance of logistics for the armies…In today’s World, in whıch continental trade gained importance, the crucial role of logistics became conspicuous since it was accepted by the business World that an effective logistics system is the key factor for success. Depending of the new developments in technology and techniques of logistics, the modern military institutions increase their effectiveness. The modern national armies or allied forces which operate in overseas, realize the importance of logistics as well. This study will focus on the applications of logistics in civilian business sector and modern armies, which may shed light on logistical problems of the other armies.

Keywords: modern logistics, application in armies, new technology in logistics, new developments in technology

Procedia PDF Downloads 469
24115 Radar Fault Diagnosis Strategy Based on Deep Learning

Authors: Bin Feng, Zhulin Zong

Abstract:

Radar systems are critical in the modern military, aviation, and maritime operations, and their proper functioning is essential for the success of these operations. However, due to the complexity and sensitivity of radar systems, they are susceptible to various faults that can significantly affect their performance. Traditional radar fault diagnosis strategies rely on expert knowledge and rule-based approaches, which are often limited in effectiveness and require a lot of time and resources. Deep learning has recently emerged as a promising approach for fault diagnosis due to its ability to learn features and patterns from large amounts of data automatically. In this paper, we propose a radar fault diagnosis strategy based on deep learning that can accurately identify and classify faults in radar systems. Our approach uses convolutional neural networks (CNN) to extract features from radar signals and fault classify the features. The proposed strategy is trained and validated on a dataset of measured radar signals with various types of faults. The results show that it achieves high accuracy in fault diagnosis. To further evaluate the effectiveness of the proposed strategy, we compare it with traditional rule-based approaches and other machine learning-based methods, including decision trees, support vector machines (SVMs), and random forests. The results demonstrate that our deep learning-based approach outperforms the traditional approaches in terms of accuracy and efficiency. Finally, we discuss the potential applications and limitations of the proposed strategy, as well as future research directions. Our study highlights the importance and potential of deep learning for radar fault diagnosis. It suggests that it can be a valuable tool for improving the performance and reliability of radar systems. In summary, this paper presents a radar fault diagnosis strategy based on deep learning that achieves high accuracy and efficiency in identifying and classifying faults in radar systems. The proposed strategy has significant potential for practical applications and can pave the way for further research.

Keywords: radar system, fault diagnosis, deep learning, radar fault

Procedia PDF Downloads 62
24114 Revisiting Politics of Religion in Muslim Republics of Former Soviet Union and Rise of Extremism, Global Jihadi Terrorism

Authors: Etibar Guliyev

Abstract:

The breakdown of the Soviet Union in 1991 has led to a considerable rise in the religious self-consciousness of Muslim population of the Central Asia. Additionally, huge amount of money spent by various states further facilitated the spread of religious ideas. According to some sources, Saudi Arabia spent 87 billion dollars to propagate Wahhabism abroad during two decades, whereas the Communist Party of the Soviet Union spent just over 7 billion dollars to spread its ideology worldwide between 1921 and 1991. As the result, today once a remote area from international politics has turned into third major source of recruitment of fighters for global terrorist organizations. In order to illustrate to scope of the involvement of the Central Asian residents in international terrorist networks it is enough to mention the name of Colonel Gulmorod Khalimov, the former head of the Tajik special police forces who served as ISIS war minister between 2016 and 2017. The importance of the topic stems from the fact that the above-mentioned republics with a territory of 4 million square km and the population of around 80 million people borders Russia, Iran Afghanistan and China. Moreover, the fact that political and military activities motivated with religious feelings in those countries have implications not only for domestic but also for regional and global political relations and all of them has root in politics of religions adds value to the research. This research aims to provide an in-depth analyses of the marked features of the state policies to regulate religious activities and approach this question both from individual, domestic, regional and global levels of analyses. The research will enable us to better understand what implications have the state of religious freedom in post-Soviet Muslim republics for international relations and the rise of global jihadi terrorism. The paper tries to find a linkage between the mentioned terror attacks and underground rise of religious extremism in Central Asia. This research is based on multiple research methods, mainly on qualitative one. The process tracing method is also employed to review religious policies implemented from 1918-1991 and after the collapse of the Soviet Union in a chronological way. In terms of the quantitative method, it chiefly will be used in a bid to process various statistics disseminated in academic and official sources. The research mostly explored constructivist, securitization and social movement theories. Findings of the research suggests that the endemic problems peculiar to authoritarian regimes of Central Asia such as crackdown on the expression of religious believe and any kind of opposition, economic decline, instrumental use of religion and corruption and tribalism further accelerated the recruitment problem. Paper also concludes that the Central Asian states in some cases misused counter-terrorism campaign as a pretext to further restrict freedom of faith in their respective countries.

Keywords: identity, political Islam, religious extremism, security, terrorism

Procedia PDF Downloads 246
24113 Numerical Study on the Hazards of Gravitational Forces on Cerebral Aneurysms

Authors: Hashem M. Alargha, Mohammad O. Hamdan, Waseem H. Aziz

Abstract:

Aerobatic and military pilots are subjected to high gravitational forces that could cause blackout, physical injuries or death. A CFD simulation using fluid-solid interactions scheme has been conducted to investigate the gravitational effects and hazards inside cerebral aneurysms. Medical data have been used to derive the size and geometry of a simple aneurysm on a T-shaped bifurcation. The results show that gravitational force has no effect on maximum Wall Shear Stress (WSS); hence, it will not cause aneurysm initiation/formation. However, gravitational force cause causes hypertension which could contribute to aneurysm rupture.

Keywords: aneurysm, cfd, wall shear stress, gravity, fluid dynamics, bifurcation artery

Procedia PDF Downloads 352
24112 Mechanical Design of External Pressure Vessel to an AUV

Authors: Artur Siqueira Nóbrega de Freitas

Abstract:

The Autonomous Underwater Vehicles (AUV), as well the Remotely Operated Vehicles (ROV), are unmanned technologies used in oceanographic investigations, offshore oil extraction, military applications, among others. Differently from AUVs, ROVs uses a physical connection with the surface for energy supply e data traffic. The AUVs use batteries and embedded data acquisition systems. These technologies have progressed, supported by studies in the areas of robotics, embedded systems, naval engineering, etc. This work presents a methodology for external pressure vessel design, responsible for contain and keep the internal components of the vehicle, such as on-board electronics and sensors, isolated from contact with water, creating a pressure differential between the inner and external regions.

Keywords: vessel, external pressure, AUV, buckling

Procedia PDF Downloads 496
24111 Modern Era Applications of Mathematics and Computer Science

Authors: Ogunrinde Roseline Bosede, Ogunrinde Rowland Rotimi

Abstract:

Just as the development of ideas of early mathematics was essentially motivated by social needs, the invention of the computer was equally inspired by social needs. The early years of the twenty-first century have been remarkable in advances in mathematical and computer sciences. Mathematical and computer sciences work are fast becoming an increasingly integral and essential components of a growing catalogues of areas of interests in biology, business, military, medicine, social sciences, advanced design, advanced materials, climate, banking and finance, and many other fields of disciplines. This paper seeks to highlight the trend and impacts of the duo in the technological advancements being witnessed in our today's world.

Keywords: computer, impacts, mathematics, modern society

Procedia PDF Downloads 384
24110 Space Debris Mitigation: Solutions from the Dark Skies of the Remote Australian Outback Using a Proposed Network of Mobile Astronomical Observatories

Authors: Muhammad Akbar Hussain, Muhammad Mehdi Hussain, Waqar Haider

Abstract:

There are tens of thousands of undetected and uncatalogued pieces of space debris in the Low Earth Orbit (LEO). They are not only difficult to be detected and tracked, their sheer number puts active satellites and humans in orbit around Earth into danger. With the entry of more governments and private companies into harnessing the Earth’s orbit for communication, research and military purposes, there is an ever-increasing need for not only the detection and cataloguing of these pieces of space debris, it is time to take measures to take them out and clean up the space around Earth. Current optical and radar-based Space Situational Awareness initiatives are useful mostly in detecting and cataloguing larger pieces of debris mainly for avoidance measures. Smaller than 10 cm pieces are in a relatively dark zone, yet these are deadly and capable of destroying satellites and human missions. A network of mobile observatories, connected to each other in real time and working in unison as a single instrument, may be able to detect small pieces of debris and achieve effective triangulation to help create a comprehensive database of their trajectories and parameters to the highest level of precision. This data may enable ground-based laser systems to help deorbit individual debris. Such a network of observatories can join current efforts in detection and removal of space debris in Earth’s orbit.

Keywords: space debris, low earth orbit, mobile observatories, triangulation, seamless operability

Procedia PDF Downloads 139