Search results for: deterrence theory
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4575

Search results for: deterrence theory

4575 From Linear to Nonlinear Deterrence: Deterrence for Rising Power

Authors: Farhad Ghasemi

Abstract:

Along with transforming the international system into a complex and chaotic system, the fundamental question arises: how can deterrence be reconstructed conceptually and theoretically in this system model? The deterrence system is much more complex today than it was seven decades ago. This article suggests that the perception of deterrence as a linear system is a fundamental mistake because it does not consider the new dynamics of the international system, including network power dynamics. The author aims to improve this point by focusing on complexity and chaos theories, especially their nonlinearity and cascading failure principles. This article proposes that the perception of deterrence as a linear system is a fundamental mistake, as the new dynamics of the surrounding international system do not take into account. The author recognizes deterrence as a nonlinear system and introduces it as a concept in strategic studies.

Keywords: complexity, international system, deterrence, linear deterrence, nonlinear deterrence

Procedia PDF Downloads 120
4574 Artificial Intelligence Impact on Strategic Stability

Authors: Darius Jakimavicius

Abstract:

Artificial intelligence is the subject of intense debate in the international arena, identified both as a technological breakthrough and as a component of the strategic stability effect. Both the kinetic and non-kinetic development of AI and its application in the national strategies of the great powers may trigger a change in the security situation. Artificial intelligence is generally faster, more capable and more efficient than humans, and there is a temptation to transfer decision-making and control responsibilities to artificial intelligence. Artificial intelligence, which, once activated, can select and act on targets without further intervention by a human operator, blurs the boundary between human or robot (machine) warfare, or perhaps human and robot together. Artificial intelligence acts as a force multiplier that speeds up decision-making and reaction times on the battlefield. The role of humans is increasingly moving away from direct decision-making and away from command and control processes involving the use of force. It is worth noting that the autonomy and precision of AI systems make the process of strategic stability more complex. Deterrence theory is currently in a phase of development in which deterrence is undergoing further strain and crisis due to the complexity of the evolving models enabled by artificial intelligence. Based on the concept of strategic stability and deterrence theory, it is appropriate to develop further research on the development and impact of AI in order to assess AI from both a scientific and technical perspective: to capture a new niche in the scientific literature and academic terminology, to clarify the conditions for deterrence, and to identify the potential uses, impacts and possibly quantities of AI. The research problem is the impact of artificial intelligence developed by great powers on strategic stability. This thesis seeks to assess the impact of AI on strategic stability and deterrence principles, with human exclusion from the decision-making and control loop as a key axis. The interaction between AI and human actions and interests can determine fundamental changes in great powers' defense and deterrence, and the development and application of AI-based great powers strategies can lead to a change in strategic stability.

Keywords: artificial inteligence, strategic stability, deterrence theory, decision making loop

Procedia PDF Downloads 19
4573 India’s Deterrence Program: Defense or Development

Authors: Aneri Mehta, Krunal Mehta

Abstract:

A doctrine, any doctrine, incorporates a set of beliefs or principles held by a body of persons. A national nuclear doctrine represents, therefore, the collective set of beliefs or principles held by the nation in regard to the utility of its nuclear weapons. India’s foreign policy has been profoundly affected by the nuclear explosions conducted in May 1998. The departure from the professed peaceful nuclear policies has had several implications for India’s defense and foreign policies. The explosions in Pokhran have aggravated tensions in south Asia by disrupting diplomatic initiatives with Pak and China. Diplomacy has been reduced to damage control. The object of India’s nuclear deterrence is to persuade an adversary that the costs to him of seeking a military solution to his political problems with India will far outweigh the benefits. The paper focuses on India’s guidelines governing nuclear policy, development of nuclear materials for effective deterrence as well as civil development purpose. The paper finds that security concerns and technological capabilities are important determinants of whether India develops a nuclear weapons programs, while security concerns, economic capabilities, and domestic politics help to explain the possession of nuclear weapons.

Keywords: foreign policy, nuclear deterrence, nuclear policy, development

Procedia PDF Downloads 505
4572 Investigating a Deterrence Function for Work Trips for Perth Metropolitan Area

Authors: Ali Raouli, Amin Chegenizadeh, Hamid Nikraz

Abstract:

The Perth metropolitan area and its surrounding regions have been expanding rapidly in recent decades and it is expected that this growth will continue in the years to come. With this rapid growth and the resulting increase in population, consideration should be given to strategic planning and modelling for the future expansion of Perth. The accurate estimation of projected traffic volumes has always been a major concern for the transport modelers and planners. Development of a reliable strategic transport model depends significantly on the inputs data into the model and the calibrated parameters of the model to reflect the existing situation. Trip distribution is the second step in four-step modelling (FSM) which is complex due to its behavioral nature. Gravity model is the most common method for trip distribution. The spatial separation between the Origin and Destination (OD) zones will be reflected in gravity model by applying deterrence functions which provide an opportunity to include people’s behavior in choosing their destinations based on distance, time and cost of their journeys. Deterrence functions play an important role for distribution of the trips within a study area and would simulate the trip distances and therefore should be calibrated for any particular strategic transport model to correctly reflect the trip behavior within the modelling area. This paper aims to review the most common deterrence functions and propose a calibrated deterrence function for work trips within the Perth Metropolitan Area based on the information obtained from the latest available Household data and Perth and Region Travel Survey (PARTS) data. As part of this study, a four-step transport model using EMME software has been developed for Perth Metropolitan Area to assist with the analysis and findings.

Keywords: deterrence function, four-step modelling, origin destination, transport model

Procedia PDF Downloads 150
4571 Cyber Warfare and Cyber Terrorism: An Analysis of Global Cooperation and Cyber Security Counter Measures

Authors: Mastoor Qubra

Abstract:

Cyber-attacks have frequently disrupted the critical infrastructures of the major global states and now, cyber threat has become one of the dire security risks for the states across the globe. Recently, ransomware cyber-attacks, wannacry and petya, have affected hundreds of thousands of computer servers and individuals’ private machines in more than hundred countries across Europe, Middle East, Asia, United States and Australia. Although, states are rapidly becoming aware of the destructive nature of this new security threat and counter measures are being taken but states’ isolated efforts would be inadequate to deal with this heinous security challenge, rather a global coordination and cooperation is inevitable in order to develop a credible cyber deterrence policy. Hence, the paper focuses that coordinated global approach is required to deter posed cyber threat. This paper intends to analyze the cyber security counter measures in four dimensions i.e. evaluation of prevalent strategies at bilateral level, initiatives and limitations for cooperation at global level, obstacles to combat cyber terrorism and finally, recommendations to deter the threat by applying tools of deterrence theory. Firstly, it focuses on states’ efforts to combat the cyber threat and in this regard, US-Australia Cyber Security Dialogue is comprehensively illustrated and investigated. Secondly, global partnerships and strategic and analytic role of multinational organizations, particularly United Nations (UN), to deal with the heinous threat, is critically analyzed and flaws are highlighted, for instance; less significance of cyber laws within international law as compared to other conflict prone issues. In addition to this, there are certain obstacles and limitations at national, regional and global level to implement the cyber terrorism counter strategies which are presented in the third section. Lastly, by underlining the gaps and grey areas in the current cyber security counter measures, it aims to apply tools of deterrence theory, i.e. defense, attribution and retaliation, in the cyber realm to contribute towards formulating a credible cyber deterrence strategy at global level. Thus, this study is significant in understanding and determining the inevitable necessity of counter cyber terrorism strategies.

Keywords: attribution, critical infrastructure, cyber terrorism, global cooperation

Procedia PDF Downloads 249
4570 Factors Influencing University Students' Online Disinhibition Behavior: The Moderating Effects of Deterrence and Social Identity

Authors: Wang, Kuei-Ing, Jou-Fan Shih

Abstract:

This study adopts deterrence theory as well as social identities as moderators, and explores their moderating affects on online toxic disinhibition. Survey and Experimental methodologies are applied to test the research model and four hypotheses are developed in this study. The controllability of identity positively influenced the behavior of toxic disinhibition both in experimental and control groups while the fluidity of the identity did not have significant influences on online disinhibition. Punishment certainty, punishment severity as well as social identity negatively moderated the relation between the controllability of the identity and the toxic disinhibition. The result of this study shows that internet users hide their real identities when they behave inappropriately on internet, but once they acknowledge that the inappropriate behavior will be found and punished severely, the inappropriate behavior then will be weakened.

Keywords: seductive properties of internet, online disinhibition, punishment certainty, punishment severity, social identity

Procedia PDF Downloads 491
4569 Effect of Lactone Glycoside on Feeding Deterrence and Nutritive Physiology of Tobacco Caterpillar Spodoptera litura Fabricius (Noctuidae: Lepidoptera)

Authors: Selvamuthukumaran Thirunavukkarasu, Arivudainambi Sundararajan

Abstract:

The plant active molecules with their known mode of action are important leads to the development of newer insecticides. Lactone glycoside was identified earlier as the active principle in Cleistanthus collinus (Roxb.) Benth. (Fam: Euphorbiaceae). It possessed feeding deterrent, insecticidal and insect growth regulatory actions at varying concentrations. Deducing its mode of action opens a possibility of its further development. A no-choice leaf disc bioassay was carried out with lactone glycoside at different doses for different instars and Deterrence Indices were worked out. Using regression analysis concentrations imparting 10, 30 and 50 per cent deterrence (DI10, DI30 & DI50) were worked out. At these doses, effect on nutritional indices like Relative Consumption and Growth Rates (RCR & RGR), Efficiencies of Conversion of Ingested and Digested food (ECI & ECD) and Approximate Digestibility (AD) were worked out. The Relative Consumption and Growth Rate of control and lactone glycoside larva were compared by regression analysis. Regression analysis of deterrence indices revealed that the concentrations needed for imparting 50 per cent deterrence was 60.66, 68.47 and 71.10 ppm for third, fourth and fifth instars respectively. Relative consumption rate (RCR) and relative growth rate (RGR) were reduced. This confirmed the antifeedant action of the fraction. Approximate digestibility (AD) was found greater in treatments indicating reduced faeces because of poor digestibility and retention of food in the gut. Efficiency of conversion of both ingested and digested (ECI and ECD) food was also found to be greatly reduced. This indicated presence of toxic action. This was proved by comparing growth efficiencies of control and lactone glycoside treated larvae. Lactone glycoside was found to possess both feeding deterrent and toxic modes of action. Studies on molecular targets based on this preliminary site of action lead to new insecticide development.

Keywords: Spodoptera litura Fabricius, Cleistanthus collinus (Roxb.) Benth, feeding deterrence, mode of action

Procedia PDF Downloads 133
4568 Pakistan Nuclear Security: Threats from Non-State Actors

Authors: Jennifer Wright

Abstract:

The recent rise of powerful terrorist groups such as ISIS and Al-Qaeda brings up concerns about nuclear terrorism as well as a focus on nuclear security, specifically the physical security of nuclear weapons and fissile material storage sites in countries where powerful nonstate actors are present. Particularly because these non-state actors, who lack their own sovereign territory, cannot be ‘deterred’ in the traditional sense. In light of the current threat environment, it’s necessary to now rethink these strategies in the 21st century – a multipolar world with the presence of powerful non-state actors. As a country in the spotlight for its low ranking on the Nuclear Threat Initiative’s (NTI) Nuclear Security Index, Pakistan is a relevant example to explore the question of whether the presence of non-state actors poses a real risk to nuclear security today. It’s necessary to take a look at their nuclear security policies to determine if they’re robust enough to deal with political instability and violence in the country. After carrying out interviews with experts in May 2017 in Islamabad on nuclear security and nuclear terrorism, this paper aims to highlight findings by providing a Pakistan-centric view on the subject and give experts there a chance to counter criticism. Western media would have us fearful of nuclear security mechanisms in Pakistan after reports that areas such as cybersecurity and accounting and control of materials are weak, as well as sensitive nuclear material being transported in unmarked, unguarded vehicles. Also reported are cases where terrorist groups carried out targeted attacks against Pakistani military bases or secure sites where nuclear material is stored. One specific question asked of each interviewee in Islamabad was Do you feel the threat of nuclear terrorism calls into question the reliance on deterrence? Their responses will be elaborated on in the longer paper, but overall they demonstrate views that deterrence still serves a purpose for state-to-state security strategy, but not for a state in countering nonstate threats. If nuclear security is lax enough for these non-state actors to get their hands on either an intact nuclear weapon or enough military-grade fissile material to build a nuclear weapon, then what would stop them from launching a nuclear attack? As deterrence is a state-centric strategy, it doesn’t work to deter non-state actors from carrying out an attack on another state, as they lack their own territory, and as such, are not fearful of a reprisal attack. Deterrence will need to be addressed, and its relevance analyzed to determine its utility in the current security environment. The aim of this research is to demonstrate the real risk of nuclear terrorism by pointing to weaknesses in global nuclear security, particularly in Pakistan. The research also aims to provoke thought on the weaknesses of deterrence as a whole. Original thinking is needed as we attempt to adequately respond to the 21st century’s current threat environment.

Keywords: deterrence, non-proliferation, nuclear security, nuclear terrorism

Procedia PDF Downloads 201
4567 The Analysis of Computer Crimes Act 1997 in the Circumvention and Prevention of Computer Crimes in Malaysia

Authors: Nooraneda Mutalip Laidey

Abstract:

Computer Crimes Act 1997 (CCA 1997) was conceded by Malaysia’s legislative body in 1997 and the Act was enforced in June 2000. The purpose of CCA 1997 is to provide for offences related to misuse of computers such as hacking, cracking and phishing. CCA 1997 was modelled after United Kingdom’s Computer Misuses Act 1990 as a response to the emerging computer crimes. This legislation is divided into three parts and 12 Sections. The first part outlines preliminary matters that include short title and relevant definitions, second part provides for the offenses related to misuse of computers and specifies penalties for each offences, and the last part deals with ancillary provisions such as jurisdictional and investigational issues of cybercrime. The main objective of this paper is to discuss the development of computer crimes and its deterrence in Malaysia. Specific sections of CCA 1997 will be analysed in details and detail assessment on the prevention and prosecution of computer crimes in Malaysia will be accessed to determine whether CCA 1997 is so far adequate in preventing computer crimes in Malaysia.

Keywords: computer, computer crimes, CCA 1997, circumvention, deterrence

Procedia PDF Downloads 315
4566 Unified Theory of the Security Dilemma: Geography, MAD and Democracy

Authors: Arash Heydarian Pashakhanlou

Abstract:

The security dilemma is one of the key concepts in International Relations (IR), and the numerous engagements with it have created a great deal of confusion regarding its essence. That is why this article seeks to dissect the security dilemma and rebuild it from its foundational core. In doing so, the present study highlights that the security dilemma requires interaction among actors that seek to protect themselves from other's capacity for harm under the condition of uncertainty to operate. In this constellation, actors are confronted with the dilemma of motives, power, and action, which they seek to resolve by acquiring information regarding their opponents. The relationship between the parties is shaped by the harm-uncertainty index (HUI) consisting of geographical distance, MAD, and joint democracy that determines the intensity of the security dilemma. These elements define the unified theory of the security dilemma (UTSD) developed here. UTSD challenges the prevailing view that the security dilemma is a unidimensional paradoxical concept, regulated by the offense-defense balance and differentiation that only occurs in anarchic settings with tragic outcomes and is equivalent to the spiral model.

Keywords: security dilemma, revisionism, status quo, anarchy, uncertainty, tragedy, spiral, deterrence

Procedia PDF Downloads 211
4565 “Japan’s New Security Outlook: Implications for the US-Japan Alliance”

Authors: Agustin Maciel-Padilla

Abstract:

This paper explores the most significant change to Japan’s security strategy since the end of World War II, in particular Prime Minister Fumio Kishida’s government publication, in late 2022, of 3 policy documents (the National Security Strategy [NSS], the National Defense Strategy and the Defense Buildup Program) that basically propose to expand the country’s military capabilities and to increase military spending over a 5-year period. These policies represent a remarkable transformation of Japan’s defense-oriented policy followed since 1946. These proposals have been under analysis and debate since they were announced, as it was also Japan’s historic ambition to strengthening its deterrence capabilities in the context of a more complex regional security environment. Even though this new defense posture has attracted significant international attention, it is far from representing a done deal because of the fact that there is still a long way to go to implement this vision because of a wide variety of political and economic issues. Japan is currently experiencing the most dangerous security environment since the end of World War II, and this situation led Japan to intensify its dialogue with the United States to reflect a re-evaluation of deterrence in the face of a rapidly worsening security environment, a changing balance of power in East Asia, and the arrival of a new era of “great power competition”. Japan’s new documents, for instance, identify China and North Korea’s as posing, respectively, a strategic challenge and an imminent threat. Japan has also noted that Russia’s invasion of Ukraine has contributed to erode the foundation of the international order. It is considered that Russia’s aggression was possible because Ukraine’s defense capability was not enough for effective deterrence. Moreover, Japan’s call for “counterstrike capabilities” results from a recognition that China and North Korea’s ballistic and cruise missiles could overwhelm Japan’s air and missile defense systems, and therefore there is an urgent need to strengthen deterrence and resilience. In this context, this paper will focus on the impact of these changes on the US-Japan alliance. Adapting this alliance to Tokyo’s new ambitions and capabilities could be critical in terms of updating their traditional protection/access to bases arrangement, interoperability and joint command and control issues, as well as regarding the security–economy nexus. While China is Japan’s largest trading partner, and trade between the two has been growing, US-Japan economic relationship has been slower, notwithstanding the fact that US-Japan security cooperation has strengthened significantly in recent years.

Keywords: us-japan alliance, japan security, great power competition, interoperability

Procedia PDF Downloads 43
4564 The Magic Bullet in Africa: Exploring an Alternative Theoretical Model

Authors: Daniel Nkrumah

Abstract:

The Magic Bullet theory was a popular media effect theory that defined the power of the mass media in altering beliefs and perceptions of its audiences. However, following the People's Choice study, the theory was said to have been disproved and was supplanted by the Two-Step Flow Theory. This paper examines the relevance of the Magic Bullet theory in Africa and establishes whether it is still relevant in Africa's media spaces and societies. Using selected cases on the continent, it adopts a grounded theory approach and explores a new theoretical model that attempts to enforce an argument that the Two-Step Flow theory though important and valid, was ill-conceived as a direct replacement to the Magic Bullet theory.

Keywords: magic bullet theory, two-step flow theory, media effects, african media

Procedia PDF Downloads 102
4563 Combating Supplier-Copycatting With Intellectual Property Agreements

Authors: Hubert Pun

Abstract:

When a manufacturer outsources the production of a product, it distributes its intellectual property (IP) into a supply chain that it may not be able to fully control. An IP agreement between a manufacturer and its suppliers is a popular solution to address the challenge of supplier-copycatting. The goal of this paper is to examine the impact of copycatting, from both the supplier and third-party firms, and the effectiveness of an IP agreement. Specifically, we use a game-theoretic approach to examine a system where a manufacturer outsources to a supplier. The supplier and a third-party firm decide whether or not to enter the market with copycat products while the manufacturer selects the level of marketing investment. The manufacturer can reduce the threat of supplier-copycatting by signing an IP agreement. We find that the manufacturer can be worse off from signing an IP agreement with its supplier, even if the IP agreement is costless and perfectly enforceable. We show that a manufacturer can deter copycat products through vertical integration and IP agreements and we outline the instances where each method is preferred. Furthermore, we find that the manufacturer may choose not to invest in quality improvements as a copycat deterrence strategy. We show that the supplier can benefit from the manufacturer’s decision to sign an IP agreement and that the supplier and the consumers can benefit from government regulations against copycat products. Our paper demonstrates the strengths and limitations of various copycat deterrence strategies when a supplier and third-party may produce copycat products.

Keywords: coopetitive supply chain, copycat, government regulation, intellectual property

Procedia PDF Downloads 160
4562 Sustainable Enterprise Theory: A Starting Point for Reporting Sustainable Business Values

Authors: Arne Fagerstrom, Gary Cunningham, Fredrik Hartwig

Abstract:

In this paper, a theory of sustainable enterprises, sustainable enterprise theory (SET), is developed. The sustainable enterprise theory can only be a valid theory if knowledge about life and nature is complete. Knowledge limitations should not stop enterprises from doing business with a goal of better long-term life on earth. Life demands stewardship of the resources used during one’s lifetime. This paper develops a model influenced by (the classical) enterprise theory and resource theory that includes more than money in the business activities of an enterprise. The sustainable enterprise theory is then used in an analysis of accountability and in discussions about sustainable businesses.

Keywords: sustainable business, sustainability reporting, sustainable values, theory of the firm

Procedia PDF Downloads 547
4561 Efficiency of Lavandula angustifolia Mill and Zataria multiflora Boiss essential oils on nutritional indices of Tribolium confusum Jacquelin du Val (Col.: Tenebrionidae)

Authors: Karim Saeidi

Abstract:

One of the most important pests in the warehouses is the flour beetle, Tribolium confusum Jacquelin du Val (Col.: Tenebrionidae). Regarding the high degree of damage of stored product pests and dangerous effects of the chemical control using plant extracts and their components are some of the best approaches to control these pests. Antifeedant activity of plant extracts from Lavandula angustifolia Mill and Zataria multiflora Boiss using hydro-distillation were tested against the flour beetle, Tribolium confusum Jacquelin du Val. The nutritional indices: relative growth rate (RGR), relative consumption rate (RCR), the efficiency of conversion of ingested food (ECI), and feeding deterrence index (FDI) were measured for adult insects. Treatments were evaluated using a flour disk bioassay in the dark; at 25±1ᵒC and 60±5% R. H. Concentrations of 0, 0.1, 0.5, 0.75, 1, 1.5, and 2 μl/disk were prepared from each essential oil. After 72 h, nutritional indices were calculated. L. angustifolia oils were more effective than Z. multiflora oils by significantly decreasing the RGR, RCR, and ECI. Feeding deterrence index (FDI) of L. angustifolia essential oil was increased significantly as essential oil concentration increased. The essential oil of L. angustifolia was more effective on FDI than Z. multiflora in some concentration.

Keywords: essential oil, nutritional indices, Tribolium confusum

Procedia PDF Downloads 381
4560 A Review of Existing Turnover Intention Theories

Authors: Pauline E. Ngo-Henha

Abstract:

Existing turnover intention theories are reviewed in this paper. This review was conducted with the help of the search keyword “turnover intention theories” in Google Scholar during the month of July 2017. These theories include: The Theory of Organizational Equilibrium (TOE), Social Exchange Theory, Job Embeddedness Theory, Herzberg’s Two-Factor Theory, the Resource-Based View, Equity Theory, Human Capital Theory, and the Expectancy Theory. One of the limitations of this review paper is that data were only collected from Google Scholar where many papers were sometimes not freely accessible. However, this paper attempts to contribute to the research in clarifying the distinction between theories and models in the context of turnover intention.

Keywords: Literature Review, Theory, Turnover, Turnover intention

Procedia PDF Downloads 423
4559 From Theory to Practice: Teaching Rhetorical Theory for Effective Argumentative Essay Writing

Authors: Mohammad Ahmadi

Abstract:

Argumentative writing is a highly opinion-based form of discourse that necessitates the ability to address commonly held opinions (endoxa). To enhance the development of persuasive, argumentative essays, the incorporation of classical rhetorical theory, with a specific focus on topics related to the canon of Invention (inventio), can be advantageous. This research investigates the practical application of rhetorical theory in teaching students how to construct compelling argumentative essays. The fundamental premise of this study is the limited familiarity of rhetoric and composition students with rhetorical theory. Consequently, this paper presents an effective pedagogical approach to introduce rhetorical theory to students, beginning from a foundational level. It delineates the procedures and progression that educators should adopt to elucidate and facilitate students' comprehension of rhetorical theory while demonstrating its utilization in the writing of an argumentative essay.

Keywords: argumentative essay, rhetorical theory, pedagogy, invention

Procedia PDF Downloads 52
4558 A Study on Game Theory Approaches for Wireless Sensor Networks

Authors: M. Shoukath Ali, Rajendra Prasad Singh

Abstract:

Game Theory approaches and their application in improving the performance of Wireless Sensor Networks (WSNs) are discussed in this paper. The mathematical modeling and analysis of WSNs may have low success rate due to the complexity of topology, modeling, link quality, etc. However, Game Theory is a field, which can efficiently use to analyze the WSNs. Game Theory is related to applied mathematics that describes and analyzes interactive decision situations. Game theory has the ability to model independent, individual decision makers whose actions affect the surrounding decision makers. The outcome of complex interactions among rational entities can be predicted by a set of analytical tools. However, the rationality demands a stringent observance to a strategy based on measured of perceived results. Researchers are adopting game theory approaches to model and analyze leading wireless communication networking issues, which includes QoS, power control, resource sharing, etc.

Keywords: wireless sensor network, game theory, cooperative game theory, non-cooperative game theory

Procedia PDF Downloads 405
4557 The Grand Unified Theory of Everything as a Generalization to the Standard Model Called as the General Standard Model

Authors: Amir Deljoo

Abstract:

The endeavor to comprehend the existence have been the center of thought for human in form of different disciplines and now basically in physics as the theory of everything. Here, after a brief review of the basic frameworks of thought, and a history of thought since ancient up to present, a logical methodology is presented based on a core axiom after which a function, a proto-field and then a coordinates are explained. Afterwards a generalization to Standard Model is proposed as General Standard Model which is believed to be the base of the Unified Theory of Everything.

Keywords: general relativity, grand unified theory, quantum mechanics, standard model, theory of everything

Procedia PDF Downloads 77
4556 Identifying Chaotic Architecture: Origins of Nonlinear Design Theory

Authors: Mohammadsadegh Zanganehfar

Abstract:

Since the modernism, movement, and appearance of modern architecture, an aggressive desire for a general design theory in the theoretical works of architects in the form of books and essays emerges. Since Robert Venturi and Denise Scott Brown’s published complexity and contradiction in architecture in 1966, the discourse of complexity and volumetric composition has been an important and controversial issue in the discipline. Ever since various theories and essays were involved in this discourse, this paper attempt to identify chaos theory as a scientific model of complexity and its relation to architecture design theory by conducting a qualitative analysis and multidisciplinary critical approach through architecture and basic sciences resources. As a result, we identify chaotic architecture as the correlation of chaos theory and architecture as an independent nonlinear design theory with specific characteristics and properties.

Keywords: architecture complexity, chaos theory, fractals, nonlinear dynamic systems, nonlinear ontology

Procedia PDF Downloads 350
4555 Decreasing Non-Compliance with the Garbage Collection Fee Payment: A Case Study from the Intervention in a Municipality in the Slovak Republic

Authors: Anetta Caplanova, Eva Sirakovova, Estera Szakadatova

Abstract:

Non-payment of taxes and fees represents a problem, which occurs at national and local government levels in many countries. An effective tax collection is key for generating government and local government budget revenues to finance public services and infrastructure; thus, there is the need to address this problem. The standard approach considers as a solution raising taxes/fees to boost public revenues, which may be politically challenging and time-consuming to implement. An alternative approach is related to using behavioral interventions. These can be usually implemented relatively quickly, and in most cases, they are associated with low cost. In the paper, we present the results of the behavioral experiment focused on raising the level of compliance with the payment of garbage collection fees in a selected municipality in the Slovak Republic. The experiment was implemented using the leaflets sent to residential households together with the invoice for the garbage collection in the municipality Hlohovec, Western Slovakia, in Spring 2021. The sample of about 10000 households was divided into three random groups, a control group and two intervention groups. Households in intervention group 1 were sent a leaflet using the social norm nudge, while households in intervention group 2 were sent a leaflet using the deterrence nudge. The social norm framing leaflet pointed out that in the municipality, the prevailing majority of people paid the garbage collection fee and encouraged recipients to join this majority. The deterrent leaflet reminded the recipients that if they did not pay the fee on time, enforcement proceedings would follow. This was aimed to increase the subjective perception of citizens of the enforcement proceedings in case of noncompliance. In the paper, we present and discuss the results from the experiment and formulate relevant generalizations for other municipalities.

Keywords: municipal governments, garbage fee collection, behavioural intervention, social norm, deterrence nudge

Procedia PDF Downloads 165
4554 Inverse Matrix in the Theory of Dynamical Systems

Authors: Renata Masarova, Bohuslava Juhasova, Martin Juhas, Zuzana Sutova

Abstract:

In dynamic system theory a mathematical model is often used to describe their properties. In order to find a transfer matrix of a dynamic system we need to calculate an inverse matrix. The paper contains the fusion of the classical theory and the procedures used in the theory of automated control for calculating the inverse matrix. The final part of the paper models the given problem by the Matlab.

Keywords: dynamic system, transfer matrix, inverse matrix, modeling

Procedia PDF Downloads 495
4553 Chinese Fantasy Novel: New Word Teaching for Non-Native Learners

Authors: Bok Check Meng, Goh Ying Soon

Abstract:

Giving additional learning materials such as Chinese fantasy novel to non-native learners can be strenuous. Instructors have to understand the underpinning theories about cognitive theory for new word instruction. This paper discusses the underpinning theories. Relevant literature reviews are given. There are basically five major areas of cognitive related theories mentioned in this article. These include motivational learning theory, Affective theory of learning, Cognitive psychology theory, Vocabulary acquisition theory and Bloom’s cognitive levels theory. A theoretical framework has been constructed. Thus, this will give a hand in ensuring non-native learners might gain positive outcomes in the instruction process. Instructors who are interested in teaching new word from Chinese fantasy novel in specific to support additional learning might be able to get insights from this article.

Keywords: Chinese fantasy novel, new word teaching, non-native learners, cognitive theory, bloom

Procedia PDF Downloads 708
4552 Contextualizing Theory Z of Motivation Among Indian Universities of Higher Education

Authors: Janani V., Tanika Singh, Bala Subramanian R., Santosh Kumar Sharma

Abstract:

Higher education across the globe is undergoing a sea change. This has created a varied management of higher education in Indian universities, and therefore, we find no universal law regarding HR policies and practices in these universities. As a result, faculty retention is very low, which is a serious concern for educational leaders such as vice-chancellors or directors working in the higher education sector. We can understand this phenomenon in the light of various management theories, among which theory z proposed by William Ouchi is a prominent one. With this backdrop, the present article strives to contextualize theory z in Indian higher education. For the said purpose, qualitative methodology has been adopted, and accordingly, propositions have been generated. We believe that this article will motivate other researchers to empirically test the generated propositions and thereby contribute in the existing literature.

Keywords: education, managemenet, motivation, Theory X, Theory Y, Theory Z, faculty members, universities, India

Procedia PDF Downloads 73
4551 Logic of the Prospect Theory: The Decision Making Process of the First Gulf War and the Crimean Annexation

Authors: Zhengyang Ma, Zhiyao Li, Jiayi Zhang

Abstract:

This article examines the prospect theory’s arguments about decision-making through two case studies, the First Gulf War and Russia’s annexation of Crimea. The article uses the methods of comparative case analysis and process tracing to investigate the prospect theory’s fundamental arguments. Through evidence derived from existing primary and secondary sources, this paper argues that both former U.S. President Bush and Russian President Putin viewed their situations as a domain of loss and made risky decisions to prevent further deterioration, which attests the arguments of the prospect theory. After the two case studies, this article also discusses how the prospect theory could be used in analyzing the decision-making process that led to the current Russia-Ukraine War.

Keywords: the prospect theory, international relations, the first gulf war, the crimea crisis

Procedia PDF Downloads 98
4550 Disintegration of Deuterons by Photons Reaction Model for GEANT4 with Dibaryon Formalism

Authors: Jae Won Shin, Chang Ho Hyun

Abstract:

A disintegration of deuterons by photons (dγ → np) reaction model for GEANT4 is developed in this work. An effective field theory with dibaryon fields Introducing a dibaryon field, we can take into account the effective range contribution to the propagator up to infinite order, and it consequently makes the convergence of the theory better than the pionless effective field theory without dibaryon fields. We develop a hadronic model for GEANT4 which is specialized for the disintegration of the deuteron by photons, dγ → np. For the description of two-nucleon interactions, we employ an effective field theory so called pionless theory with dibaryon fields (dEFT). In spite of its simplicity, the theory has proven very effective and useful in the applications to various two-nucleon systems and processes at low energies. We apply the new model of GEANT4 (G4dEFT) to the calculation of total and differential cross sections in dγ → np, and obtain good agreements to experimental data for a wide range of incoming photon energies.

Keywords: dγ → np, dibaryon fields, effective field theory, GEANT4

Procedia PDF Downloads 352
4549 A Study of Chinese-specific Terms in Government Work Report(2017-2019) from the Perspective of Relevance Theory

Authors: Shi Jiaxin

Abstract:

The Government Work Report is an essential form of document in the government of the People’s Republic of China. It covers all aspects of Chinese society and reflects China’s development strategy and trend. There are countless special terms in Government Work Report. Only by understanding Chinese-specific terms can we understand the content of the Government Work Report. Only by accurately translating the Chinese-specific terms can people come from all across the world know the Chinese government work report and understand China. Relevance theory is a popular theory of cognitive pragmatics. Relevance Translation Theory, which is closely related to Relevance Theory, has crucial and major guiding significance for the translation of Chinese-specific. Through studying Relevance Theory and researching the translation techniques, strategies and applications in the process of translating Chinese-specific terms from the perspective of Relevance Theory, we can understand the meaning and connotation of Chinese-specific terms, then solve various problems in the process of C-E translation, and strengthen our translation ability.

Keywords: government work report, Chinese-specific terms, relevance theory, translation

Procedia PDF Downloads 134
4548 Value from Environmental and Cultural Perspectives or Two Sides of the Same Coin

Authors: Vilem Paril, Dominika Tothova

Abstract:

This paper discusses the value theory in cultural heritage and the value theory in environmental economics. Two economic views of the value theory are compared within the field of cultural heritage maintenance and within the field of the environment. The main aims are to find common features in these two differently structured theories under the layer of differently defined terms as well as really differing features of these two approaches, to clear the confusion which stems from different terminology as in fact these terms capture the same aspects of reality and to show possible inspiration these two perspectives can offer one another. Another aim is to present these two value systems in one value framework. First, important moments of the value theory from the economic perspective are presented, leading to the marginal revolution of (not only) the Austrian School. Then the theory of value within cultural heritage and environmental economics are explored. Finally, individual approaches are compared and their potential mutual inspiration searched for.

Keywords: cultural heritage, environmental economics, existence value, value theory

Procedia PDF Downloads 296
4547 Challenging the Constitutionality of Mandatory Sentences: A South African Perspective

Authors: Alphonso Goliath

Abstract:

With mandatory minimum sentences, even with its qualification of “substantial and compelling circumstances”, the sentence severity for violent crimes has increased substantially to combat crime. Considering the upsurge in violent crime, the paper argues that minimum sentences failed to prevent or curb violent crime. These sentences deprive offenders more than what is reasonably necessary of their freedom to curb the offense and punish the offender. Minimum sentences amount to cruel, inhuman, and degrading punishment unjustified and vulnerable to constitutional challenge.

Keywords: constitutionality, deterrence, incapacitation, minimum sentencing legislation, prison overcrowding, rehabilitation, recidivism, retribution, violent crime

Procedia PDF Downloads 67
4546 Exploring the Nature and Meaning of Theory in the Field of Neuroeducation Studies

Authors: Ali Nouri

Abstract:

Neuroeducation is one of the most exciting research fields which is continually evolving. However, there is a need to develop its theoretical bases in connection to practice. The present paper is a starting attempt in this regard to provide a space from which to think about neuroeducational theory and invoke more investigation in this area. Accordingly, a comprehensive theory of neuroeducation could be defined as grouping or clustering of concepts and propositions that describe and explain the nature of human learning to provide valid interpretations and implications useful for educational practice in relation to philosophical aspects or values. Whereas it should be originated from the philosophical foundations of the field and explain its normative significance, it needs to be testable in terms of rigorous evidence to fundamentally advance contemporary educational policy and practice. There is thus pragmatically a need to include a course on neuroeducational theory into the curriculum of the field. In addition, there is a need to articulate and disseminate considerable discussion over the subject within professional journals and academic societies.

Keywords: neuroeducation studies, neuroeducational theory, theory building, neuroeducation research

Procedia PDF Downloads 430