Search results for: enemy aliens
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 62

Search results for: enemy aliens

32 US-ASEAN Counter Terrorism Cooperation: Maintaining International Security and Avoiding Muslim Stereotypes

Authors: Jordan Daud, Satriya Wibawa, Wahyu Wardhana

Abstract:

The US Global War on Terror has had effect on Southeast Asia as Second Front of Global War on Terror. Since 2001, ASEAN had adopted legal framework to counter the terrorist threat through numerous approach which accommodate various counterterrorism policy of the ten member states. ASEAN have also enhanced multilateral cooperation with US and its allies in Asia Pacific region in addressing terrorist threat, terrorist funding, cyber terrorism and other forms of terrorism. This cooperation is essential to maintain international security and stability and also assure economic development. This work focuses on the US-ASEAN counterterrorism cooperation due to they identified terrorism as a mutual enemy that posed to human security, infrastructure security, and national security. Having in mind that international terrorism usually connected with Muslim community, this paper will also elaborate the concept of Jihad and Islam revivalism in politics to avoid negative image of Islam and Muslim. This paper argues that as region with large Muslim community, Southeast Asia still need to tighten counter terrorism cooperation and also lessening Muslim stereotypes with terrorism through educating public understanding and inter-faith and intra-faith dialogue to create a better world.

Keywords: ASEAN, U.S., counter terrorism, Muslim stereotypes

Procedia PDF Downloads 222
31 Interpretations of Disaster: A Comparative Study on Disaster Film Cycles

Authors: Chi-Ying Yu

Abstract:

In real life, the occurrence of disasters is always dreadful and heartbreaking, yet paradoxically, disaster film is a genre that has been popular at periodic intervals in motion picture history. This study attempts to compare the disaster film cycles of the 1970s, 1990s, and the early 21st century. Two research questions are addressed: First, how this genre has responded to the existing conditions of society in different periods in terms of the disaster proposition? Second, how this genre reflects a certain eternal substance of the human mind in light of its lasting appeal? Through cinematic textual analysis and literature review, this study finds that the emergence of disaster films in the 1970s reflected the turmoil in international relations and domestic politics situation in contemporary American society, and cinema screens showed such disaster stories as shipwrecks, air accidents, and skyscraper blazes due to human negligence. The 1990s saw the fervor of millennial apocalypse legends, and the awakening of environmental consciousness, which, together with the rapid advances in digital technology, once again gave rise to a frenzy of disaster films, with natural disasters and threats from aliens as the major themes of disasters. Since the beginning of the 21st century, the 911 Incident and natural disasters around the world have generated a consciousness of imminent crisis. Cinematic images simulated actual disasters, while aesthetic techniques focused on creating a kind of ‘empathetic’ experience in their exploration of the essence of the disaster experience. At the same time, post-apocalypse films that focus on post-disaster reconstruction have become an even more popular theme. Taking the approach of Jungian/post-Jungian film study, this study also reviews and interprets the commonly exhibited subliminal feelings in the disaster films of the three different periods. The imagination of disaster seems to serve as an underlying state of the human mind.

Keywords: disaster film, Jungian/post-Jungian film studies, stimulation, sublime

Procedia PDF Downloads 234
30 Comparing and Contrasting Western and Eastern Ways of War: Building a Universal Strategic Theory

Authors: Adam Kok Wey Leong

Abstract:

The comparison between the Western ways of war and Eastern ways of war has raised contemporary debates on the validity of these arguments. The Western way of war is popularly propounded by Victor Davis Hanson as originating from the Greek hoplite tactics, direct military maneuvers, democratic principles and social freedom and cohesion that has continued to yield military success for the Western powers for centuries. On the other hand, the Eastern way of war has been deemed as relying on indirect tactics, deception, and ruses. This often accepted notion of the divide between Western and Eastern style does not sustain in view of the available classical strategic texts from both sides from the same period that has proposed similar principles of warfare. This paper analyses the similarities between classical strategic texts on war from the Eastern perspective namely Sun Tzu’s Art of War with a similar temporal strategic text from the West which is Sextus Iuluis Frontinus’s Stratagematon, and deduces answers to this core research question - Does the hypothesis of the existence of distinctive Western and Eastern ways of warfare stands? The main thesis advanced by this research is that ways of warfare share universal principles, and it transcends cultural and spatial boundaries. Warfare is a human endeavour, and the same moral actions guide humans from different geo-cultural spheres in warfare’s objectives, which are winning over an enemy in the most economical way and serve as a mean to an end.

Keywords: ways of warfare, strategic culture, strategy, Sun Tzu, frontinus

Procedia PDF Downloads 389
29 Cyber Operational Design and Military Decision Making Process

Authors: M. Karaman, H. Catalkaya

Abstract:

Due to the complex nature of cyber attacks and their effects ranging from personal to governmental level, it becomes one of the priority tasks for operation planners to take into account the risks, influences and effects of cyber attacks. However it can also be embedded or integrated technically with electronic warfare planning, cyber operation planning is needed to have a sole and broadened perspective. This perspective embodies itself firstly in operational design and then military decision making process. In order to find out the ill-structured problems, understand or visualize the operational environment and frame the problem, operational design can help support cyber operation planners and commanders. After having a broadened and conceptual startup with cyber operational design, military decision making process will follow the principles of design into more concrete elements like reaching results after risk management and center of gravity analysis of our and the enemy. In this paper we tried to emphasize the importance of cyber operational design, cyber operation planning and its integration to military decision making problem. In this foggy, uncertain and unaccountable cyber security environment, it is inevitable to stay away from cyber attacks. Therefore, a cyber operational design should be formed with line of operations, decisive points and end states in cyber then a tactical military decision making process should be followed with cyber security focus in order to support the whole operation.

Keywords: cyber operational design, military decision making process (MDMP), operation planning, end state

Procedia PDF Downloads 559
28 Effect of Cabbage and Cauliflower Emitted Volatile Organic Compounds on Foraging Response of Plutella xylostella

Authors: Sumbul Farhat, Pratyay Vaibhav, Sarah Jain, Kapinder Kumar, Archna Kumar

Abstract:

The Diamondback Moth, Plutella xylostella (Linnaeus), is a major pest of cole crops that causes approximately 50% loss in global production. The utilization of inorganic pesticides is reflected in the development of resistance to this pest. Thus, there is a great need for an eco-friendly, sustainable strategy for the control of this pest. Although this pest, several natural enemies are reported worldwide, none of them can control it efficiently. Therefore, a proposed study is planned to understand the Volatile Organic Compounds (VOCs) mediated signaling interaction mechanism of the plant, pest, and natural enemy. For VOCs collection during different deployment stages of Cabbage POI, Green Ball, Pusa Cabbage, Cabbage Local, Snowball 16, Kanchan Plus, Pusa Meghna, Farm Sona Hybrid F1, and Samridhi F1 Hybrid, the Solid-phase microextraction (SPME) method was employed. Characterization of VOCs was conducted by Gas Chromatography-Mass Spectrometry (GC-MS). The impact of collected VOCs was assessed through Y-Tube Bioassays. The results indicate that the Cabbage variety Green Ball shows maximum repellency for P. xylostella (-100%). The cues present in this variety may be exploited for efficient management of P. xylostella in the cole crop ecosystem.

Keywords: Plutella xylostella, cole crops, volatile organic compounds, GC-MS, Green Ball

Procedia PDF Downloads 87
27 Federal Bureau of Investigation Opposition to German Nationalist Organizations in the United States (1941-45)

Authors: Yaroslav Alexandrovich Levin

Abstract:

In modern research on the history of the United States in World War II, it is quite popular to study the opposition of the American special services and, in particular, the Federal Bureau of Investigation (FBI) to various organizations of the German diasporas in new historical conditions. The appeal to traditional methods of historical research, comparative studies, and the principles of historicism will make it possible to more accurately trace the process of tightening the counterintelligence work of the Bureau and the close connection of concerns about the involvement of public organizations in the intelligence activities of the enemy. The broadcast of nationalist ideas by various communities of Germans under the auspices of their governments quickly attracted the attention of the FBI, which is in the process of consolidating its powers as the main US counterintelligence service. At the same time, the investigations and trials conducted by the John Edgar Hoover Department following these investigations often had an openly political color and increasingly consolidated the beginning of a political investigation in this service. This practice and its implementation ran into a tough contradiction between the legal norms of America, which proclaimed "democratic values," the right to freedom of speech, and the need to strengthen the internal security of the state and society in wartime. All these processes and the associated nuances and complexities are considered in specific examples of the work of federal agents against various pro-German organizations in the period 1941-45.

Keywords: World War II, internal security, countering extremism, counterintelligence, political investigation, FBI

Procedia PDF Downloads 50
26 Life Table and Functional Response of Scolothrips takahashii (Thysanoptera: Thripidae) on Tetranychus urticae (Acari:Tetranychidae)

Authors: Kuang-Chi Pan, Shu-Jen Tuan

Abstract:

Scolothrips takahashii Priesner (Thysanoptera: Thripidae) is a common predatory thrips which feeds on spider mites; it is considered an important natural enemy and a potential biological control agent against spider mites. In order to evaluate the efficacy of S. takahashii against tetranychid mites, life table and functional response study were conducted at 25±1°C, with Tetranychus urticae Priesner as prey. The intrinsic rate of increase (r), finite rate of increase (λ), net reproduction rate (R₀), mean generation time (T) were 0.1674 d⁻¹, 1.1822d⁻¹, 62.26 offspring/individual, and 24.68d. The net consumption rate (C₀) was 846.15, mean daily consumption rate was 51.92 eggs for females and 19.28 eggs for males. S. takahashii exhibited type III functional response when offered T. urticae deutonymphs. Based on the random predator equation, the estimated maximum attack rate (a) and handling time (Th) were 0.1376h⁻¹ and 0.7883h. In addition, a life table experiment was conducted to evaluate the offspring sex allocation and population dynamic of Tetranychus ludeni Zacher under group-rearing conditions with different sex ratios. All bisexual groups produced offspring with similar sex allocation patterns, which started with the majority of females, then transited during the middle of the oviposition period and turned male-biased at the end of the oviposition period.

Keywords: Scolothrips takahashii, Tetranychus urticae, Tetranychus ludeni, two-sex life table, functional response, sex allocation

Procedia PDF Downloads 50
25 A Multi-Science Study of Modern Synergetic War and Its Information Security Component

Authors: Alexander G. Yushchenko

Abstract:

From a multi-science point of view, we analyze threats to security resulting from globalization of international information space and information and communication aggression of Russia. A definition of Ruschism is formulated as an ideology supporting aggressive actions of modern Russia against the Euro-Atlantic community. Stages of the hybrid war Russia is leading against Ukraine are described, including the elements of subversive activity of the special services, the activation of the military phase and the gradual shift of the focus of confrontation to the realm of information and communication technologies. We reveal an emergence of a threat for democratic states resulting from the destabilizing impact of a target state’s mass media and social networks being exploited by Russian secret services under freedom-of-speech disguise. Thus, we underline the vulnerability of cyber- and information security of the network society in regard of hybrid war. We propose to define the latter a synergetic war. Our analysis is supported with a long-term qualitative monitoring of representation of top state officials on popular TV channels and Facebook. From the memetics point of view, we have detected a destructive psycho-information technology used by the Kremlin, a kind of information catastrophe, the essence of which is explained in detail. In the conclusion, a comprehensive plan for information protection of the public consciousness and mentality of Euro-Atlantic citizens from the aggression of the enemy is proposed.

Keywords: cyber and information security, hybrid war, psycho-information technology, synergetic war, Ruschism

Procedia PDF Downloads 103
24 Character Bioacoustics White-Rumped Shama Copsychus malabaricus as a Cage-Bird

Authors: Novia Liza Rahmawaty, Wilson Novarino, Muhammad Nazri Janra

Abstract:

Indonesian people love to keep songbird in cage to be competed, such as White-rumped Shama (Copsychus malabaricus). Each individual White-rumped Shama will be pitted their song and try to imitate the rhythm of the enemy with its songs. This study was conducted to see the natural song characters of White-rumped Shama and song character from birds that had been trained and comparison in three different places in West Sumatra. Individuals were recorded totaling 30 individuals in three areas in West Sumatra namely Padang, Solok and Pariaman and sound recordings of White-rumped Shama in nature were taken in HBW and Xenocanto website. Research has done conducted from June to October 2016 at place group practice of birdsongs and recorded at 16:00 to 18:00 pm. These voices were analyzed by Avisoft SAS-Lab Lite inform of oscillogram and sonogram. Measured parameters included: the length of voice, repertoire size, number of syllable type, syllable repertoire, and song repertoire. The results showed that repertoire composition of White-rumped Shama in nature less than the sound which was trained and has repeat songs composed by the same type of repertoire composition. Comparison of song character White-rumped Shama in three different places in West Sumatra, those birds in Solok had the best quality of voice or song than Padang and Pariaman. It showed by higher repertoire composition in Solok.

Keywords: repertoire composition, song characters, songbird, white-rumped shama

Procedia PDF Downloads 303
23 The Connection between Heroism and Violence in War Narratives from the Aspect of Rituals

Authors: Rita Fofai

Abstract:

The aim of the study is to help peacebuilding by analyzing the symbolical level of fights in the war. Despite the sufferings, war heroism still represents such a noble value in war narratives (especially in literature and films, whether it is high- or popular culture) which can make warfare attractive for every age-group. The questions of the study will revolve around the events when heroism is not a necessary and unselfish act for a greater good, but when the primary aim is to express strength in order to build self-mythology. Since war is a scene where the mythological level can meet reality, and even modern narratives use the elements of rituals and sacral references in even secular contexts, understanding the connection between rites and modern battles will ground this study, and the analysis will follow the logic of the violent rites. From this aspect, war is not merely the fight for different countries and ideas, but the fight of mankind with superhuman and natural or supernatural phenomena, as well. In this context, enemy symbolizes the threat of the world which is unpredictable for mankind, and the fight becomes a ritual combat; therefore the winner’s symbolic reward is to redefine himself or herself not only in the human environment but in the context of the whole world. The analysis of the study reveals that this kind of violence does not represents real heroism and rarely results in recruitment, on the contrary, conserves fear and the feeling of weakness, which is the root cause of this kind of act. The result of this study is a way to reshape the attitude toward so-called heroic war violence which is often a part of war narratives even nowadays. Since stepping out of the war tradition is mainly a cultural question, redefining the connection between society and narratives which has an effect on mentality and emotions, giving a clear guide to making difference between heroism and useless violence is very important in peacebuilding.

Keywords: war, ritual, heroism, violence, narratives, culture

Procedia PDF Downloads 104
22 The Rise of Populist Right-Wing Parties in Western Europe: A Case Study of the Front National in France

Authors: Jessica Da Silva

Abstract:

This paper examines France as a microcosm of the rise of right-wing populism in the broader European context. The attack on the Charlie Hebdo newspaper is arguably, a reaction to the aggressive European secularism spreading throughout Europe that sees its true enemy in the growth of extremist and violent interpretations of Islam. With each terrorist attack, the popularity of anti-immigrant policies and ideologies increases. What ultimately drives movements like the French National Front are the concepts of monoculture and ethnic identity. This paper analyses the character of right-wing populist parties using the National Front as a case study. Such parties generate anxiety and resentment by fomenting an irrational fear of the ‘other’. In this way, populists promote their identity on the basis of xenophobia, Islamophobia, and practices of social exclusion against targeted out-groups. They position immigrants and foreigners as ‘others’, claiming they are a threat to native cultures and a source of social and economic strife. Ultimately, right-wing populism exerts a negative influence over the democratic framework in Europe and opposes the European Union’s integration project. Right-wing populism attacks this supranational model because of its alleged inefficiency and departure from what it considers to be 'authentic' European traditions and citizenship. In this context, understanding the rise of radical right-wing populist parties is extremely important for the future of Europe, democracy and multiculturalism.

Keywords: cultural identity, Europeanization, front national, immigration, integration, Islamophobia, multiculturalism, nationalism, right-wing populist parties, xenophobia

Procedia PDF Downloads 334
21 Design and Modeling of Light Duty Trencher

Authors: Yegetaneh T. Dejenu, Delesa Kejela, Abdulak Alemu

Abstract:

From the earliest time of humankind, the trenches were used for water to flow along and for soldiers to hide in during enemy attacks. Now a day due to civilization, the needs of the human being become endless, and the living condition becomes sophisticated. The unbalance between the needs and resource obligates them to find the way to manage this condition. The attempt to use the scares resource in very efficient and effective way makes the trench an endeavor practice in the world in all countries. A trencher is a construction equipment used to dig trenches, especially for laying pipes or cables, installing drainage, irrigation, installing fencing, and in preparation for trench warfare. It is a machine used to make a ditch by cutting the soil ground and effectively used in agricultural irrigation. The most common types of trencher are wheel trencher, chain trencher, micro trencher, portable trencher. In Ethiopia people have been trenching the ditch for many purposes and the tools they are using are Pickaxe, Shovel and some are using Micro Excavators. The adverse effect of using traditional equipment is, time and energy consuming, less productive, difficult and more man power is required. Hence it is necessary to design and produce low price, and simple machine to narrow this gap. Our objective is to design and model a light duty trencher that is used for trenching the ground or soil for making ditch and used for agricultural, ground cabling, ground piping, and drainage system. The designed machine trenches, maximum of 1-meter depth, 30 cm width, and the required length. The working mechanism is fully hydraulic, and the engine with 12.7 hp will provide suitable power for the pump that delivers 23 l/min at 1500 rpm to drive hydraulic motors and actuators.

Keywords: hydraulics, modelling, trenching, ditch

Procedia PDF Downloads 192
20 The Aesthetic and Critiques of Weimar Democracy: The Counter and Complement to Carl Schmitt’s Political Myth

Authors: Peter Jin

Abstract:

Ever since the recent resurgence of interest in political theorist Carl Schmitt’s work, much of the current analysis on Schmitt has fo-cused on evaluating Schmitt’s legacy by exposing contradictions in his rationale. Rather than condemn such contradictions, this paper instead seeks to analyze these contradictions in an effort to better understand the radical shift in Schmitt’s intellectual trajectory from an astute critic of liberal democracy to a fascist apologist towards the end of the Weimar period. An essential part of this change is his interest in what Schmitt called ‘the emergence of aesthetics.’ Schmitt diagnosed the underlying issue with the aesthetic in the political sphere to be its irrationalism, indifference, and indeci-siveness. For Schmitt, the latter two of these were especially prob-lematic for two of his key concepts: the ‘political’ and ‘the shared historical reality.’ Schmitt’s radical depiction of ‘the political’ as an existential opposition of allegiances that necessitated a state of emergency and a decisionist sovereign political struggle required an equally radical justification, or Schmitt’s call for ‘a shared his-torical reality’ not based in historical fact yet able to mobilize the masses. In this way, Schmitt clearly condemns the indifferent, indecisive aesthetic that runs against his decisionist, action-oriented political theory. Yet despite his firm stance against aestheticism, Schmitt himself used the evocative and irrational power of aesthet-icism as a tool to present his own ‘political myth’ that compelled believers to join in decisive unity against a common enemy. In short, Schmitt’s contradictions on aestheticism and his creation of a ‘political myth’ suggest that Schmitt’s underlying conflict with aestheticism was not as much of an issue of irrationality as it was a chronic preoccupation with coercing concrete action at the expense of rational deliberation.

Keywords: aesthetics of the political, Carl Schmitt, political myth, Weimar democracy

Procedia PDF Downloads 117
19 Evaluating the Use of Manned and Unmanned Aerial Vehicles in Strategic Offensive Tasks

Authors: Yildiray Korkmaz, Mehmet Aksoy

Abstract:

In today's operations, countries want to reach their aims in the shortest way due to economical, political and humanitarian aspects. The most effective way of achieving this goal is to be able to penetrate strategic targets. Strategic targets are generally located deep inside of the countries and are defended by modern and efficient surface to air missiles (SAM) platforms which are operated as integrated with Intelligence, Surveillance and Reconnaissance (ISR) systems. On the other hand, these high valued targets are buried deep underground and hardened with strong materials against attacks. Therefore, to penetrate these targets requires very detailed intelligence. This intelligence process should include a wide range that is from weaponry to threat assessment. Accordingly, the framework of the attack package will be determined. This mission package has to execute missions in a high threat environment. The way to minimize the risk which depends on loss of life is to use packages which are formed by UAVs. However, some limitations arising from the characteristics of UAVs restricts the performance of the mission package consisted of UAVs. So, the mission package should be formed with UAVs under the leadership of a fifth generation manned aircraft. Thus, we can minimize the limitations, easily penetrate in the deep inside of the enemy territory with minimum risk, make a decision according to ever-changing conditions and finally destroy the strategic targets. In this article, the strengthens and weakness aspects of UAVs are examined by SWOT analysis. And also, it revealed features of a mission package and presented as an example what kind of a mission package we should form in order to get marginal benefit and penetrate into strategic targets with the development of autonomous mission execution capability in the near future.

Keywords: UAV, autonomy, mission package, strategic attack, mission planning

Procedia PDF Downloads 518
18 Comparing Literary Publications about Corruption in South Africa to the Legal Position

Authors: Natasha Venter

Abstract:

Recent publications, including Truth to Power by André de Ruyter, Gangster State by Pieter-Louis Myburgh, and Enemy of the People by Pieter du Toit and Adriaan Basson, expose alleged corrupt acts by high-ranking members of State, as well as those in charge of State-owned entities. These literary contributions have gripped the attention of a nation plagued by corruption scandals and the alleged misappropriation of state funds on an almost daily basis. The books, however, leave the populace with the burning question of why “nothing happens” to these individuals who are so directly implicated in the literature. The process followed by the State in the largest successful prosecution of a corrupt state official, Jackie Selebi, sheds some light as to how such high-ranking persons might be brought to book. The Supreme Court of Appeal’s definition of corruption and the interpretation of the facts (as presented by the State prosecutors) by the court is also valuable. Furthermore, some insight into the laws that criminalise corruption in South Africa, as well as applicable international instruments, is necessary. South Africa is ranked as the 70th most corrupt country out of 180 countries by Transparency International’s 2021 Corruption Perceptions Index. This is worrisome as South Africa is a signatory of the United Nations Convention Against Corruption (2004) and, as such, has certain international obligations to fulfil. However, if the political will to prosecute corrupt officials in South Africa exists, there are laws and instruments available to punish these individuals. This would not only vindicate the authors of literature about corruption in the country but also restore the hope of South Africans that, ultimately, crime does not pay.

Keywords: corruption, eskom, state capture, government, literature, united nations, law, legal, Jackie selebi, supreme court of appeal

Procedia PDF Downloads 62
17 Evolution of Bombings against Transportation Infrastructure

Authors: Jonathan K. Hill

Abstract:

The transportation networks throughout Africa remain the only transportation infrastructure system in the world that is attacked by terrorists at a high frequency, so the international community can learn from each attack. The targeting of transportation should be recognized as a direct attack against a civilian population, so the international community should work to better understand the types of attacks utilized, the types of improvised explosive device designs adapted to transportation targets, and the ways the various modes of transportation have been attacked throughout the continent. Some countries have seen grenade attacks that have resulted in only injuries, while some countries have experienced large vehicle bombings that have resulted in hundreds of injuries and numerous deaths. With insurgencies, explosive devices have been small, complex, and generally target an enemy of the insurgency. With terrorist bombings, the explosive devices have been large, brazen, and targeted at civilian populations. And, these civilian populations are easily targeted within the transportation system. The presentation provided by Assess Africa LLC is titled ‘Evolution of Bombings Against Transportation Infrastructure’ and covers improvised explosive device characteristics, how improvised explosive devices have been adapted to transportation targets in Africa, analyses recent incidents, and provides some advice for effective protective measures. A main component of the improvised explosive device characteristics portion of the presentation focuses on the link between explosive device components, the intelligence network, and the bomb-builder’s network. By understanding the components, how the use of various components can be linked to a terrorist group’s capabilities, and how the bomb-builder acquires materials, the analysis of improvised explosive device attacks takes on a new direction – one that focuses on defeating the network instead of merely reviewing incidents of the past.

Keywords: Africa, bombings, critical infrastructure protection, transportation security

Procedia PDF Downloads 390
16 Population Dynamics and Diversity of Beneficial Arthropods in Pummelo (Citrus maxima) under Perennial Peanut, Arachis pintoi Cover Crop

Authors: Larry V. Aceres, Jesryl B. Paulite, Emelie M. Pelicano, J. B. Anciano, J. A. Esteban

Abstract:

Enhancing the population of beneficial arthropods under less diverse agroecosystem is the most sought by many researchers and plant growers. This strategy was done through the establishment of pintoi peanut, Arachis pintoi as live mulch or cover crop in pummelo orchard of the University of Southeastern Philippines (USeP), Mabini, Compostela Valley Province, Philippines. This study was conducted to compare and compute population dynamics and diversity of beneficial arthropods in pummelo in with and without Arachis pintoi cover crop. Data collections were done for the 12-month period (from June 2013 to May 2014) at the pummelo orchard of USeP Mabini Campus, COMVAL Province, Philippines and data were analyzed using the Independent Samples T-Test to compare the effect of the presence and absence of Arachis pintoi on beneficial arthropods incidence in pummelo orchard. Moreover, diversity and family richness analyses were computed using the Margalef’s diversity index for family richness; the Shannon index of general diversity and the evenness index; and the Simpson index of dominance. Results revealed numerically and statistically higher density of important beneficial arthropods such as microhymenopterans, macrohymenopterans, spiders, tachinid flies and ground beetles were recorded in pummelo orchard with Arachis pintoi than from without Arachis pintoi cover crop for the 12-month observation period. Further, the result of the study revealed the high family richness and diversity index with more or less even distribution of individuals within the family and low dominance index were documented in pummelo with Arachis pintoi cover crop than from pummelo without Arachis pintoi cover crop. The study revealed that planting A. pintoi in pummelo orchard could enhance natural enemy populations.

Keywords: Arachis pintoi, cover crop, beneficial arthropods, pummelo

Procedia PDF Downloads 292
15 Aesthetics, Freedom and State in Hegel’s Philosophy

Authors: Akbar Jamali

Abstract:

Many scholars consider Hegel’s philosophy of art as the greatest theory of aesthetics since Aristotle’s Poetics. ‘Freedom’ distinguishes modern, especially German Idealism with Greek philosophy. Therefore, introducing and contemplating on Hegel’s Aesthetics as a whole, freedom as the essence of art, Hegel’s controversial claim on the end of art, and the relation of art and state is the main theme of this study. Hegel’s aesthetics is to be understood in his whole system. According to Hegel’s speculative philosophy, being is to be understood as self-determining Reason or Idea. The self-determining Reason actualizes and realizes himself in the course of history. Idea in the process of self-actualization becomes more and more rational. It first actualizes itself in matter, then in non-conscious life, finally in conscious and self-conscious life. Self-conscious life is the most rational stage of development of Idea in which the subject can think and imagine, use language and exercise freedom. Hegel calls this self-conscious life Spirit (Geist). Therefore, emergence of human being is an essential moment in the process of self-determination of Reason. It is not accidental rather a necessity. The essence of spirit is freedom. Since the history is the process of the self-actualization if spirit, humankind becomes more and more, free. Spirit in its ‘Absolute’ form manifests itself into three forms; Art, Religion and philosophy. Art is the first stage in which Spirit understands itself. In fact, Art is the expression of human spirit, which is comprehended by our senses. Beauty is defined as the sensuous expression of free Spirit. The purpose of art is, therefore, to express, enjoy and contemplate on our freedom. State belongs to the realm of Objective spirit, while Art along with Religion and philosophy belong to the realm of Absolute Spirit. Absolute spirit is superior to Objective Spirit; therefore, state must not interfere in the realm of art. Limitation on art by state directly violates freedom and prevents development of national spirit. Genuine art leads us to freedom and richness of (national) Spirit. Using Hegel’s philosophy of art, we can comprehend why totalitarian states try to limit art and, why artists are the enemy of totalitarian states. In this philosophical system, we contemplate on art as a way to freedom and emancipation.

Keywords: aesthetics, freedom, spirit, state

Procedia PDF Downloads 254
14 Natural Enemies of the Fall Armyworm (Spodoptera frugiperda, Smith) and Comparing Neem Aqueous Extracts against Its Larvae in Gurage Zone, Central Ethiopia

Authors: Abera Hailu Degaga, Emana Getu Degaga

Abstract:

Spodoptera frugiperda is an invasive insect pest that infests and feeds various crops, particularly affecting maize yields. However, nature has its own way of maintaining balance, and in this case, natural enemies play a crucial role in regulating the population of S. frugiperda. Locally available and easily prepared botanical sources, bio-pesticides, are also important. The objectives of the study were to investigate the natural enemies of S. frugiperda in the Gurage zone and to compare Neem aqueous extracts against its larvae in central Ethiopia. S. frugiperda larvae and egg masses were collected randomly from smallholder maize farms infested with pests between June and August 2023. Our findings revealed the existence of diverse types of parasitoids, predators, and entomopathogenic fungi associated with S. frugiperda. Notably, we documented three species of parasitoids, namely Exorista xanthaspis and Tachina spp. (Diptera: Tachinidae) and Charops annulipes (Hymenoptera: Ichneumonidae). All three species of parasitoids were recorded from Ethiopia for the first time. The overall parasitism rate was 5.3%, with individual rates ranging from 1.3 to 4%. Additionally, we identified ten species of predator insects from four different orders, including Hemiptera, Dermaptera, Coleoptera, and Mantodea, in the maize farms infested with S. frugiperda. Aqueous extract of Neem seed and leaf powder and green leaf exhibited similar mortality rates of S. frugiperda larvae at 72 hours even though there was a significant difference at 24 and 48 hours of the test. For effective management of S. frugiperda further research is necessary to fully exploit the potential of these natural enemies and additionally to use botanical source pesticides like Azadirachta indica.

Keywords: bio-pesticide, natural enemy, parasitoids, predators, Tachinid flies

Procedia PDF Downloads 30
13 The Role of the Gut Microbiome of Marine Invertebrates in the Degradation of Complex Algal Substrates

Authors: Yuchen LI, Martyn Kurr, Peter Golyshin

Abstract:

Biological invasion is a global problem. Invasive species can threaten local ecosystems by competing for resources, consuming local species, and reproducing faster than natives. Sargassum muticum is an invasive algae in the UK. It negatively impacts local algae through overshading and can cause reductions in local biodiversity. One possibility for its success is herbivore release. According to the Enemy Release Hypothesis, invasives are less impacted by local herbivores than natives. In many species, gastrointestinal (GI) tract microbes have been found as a key factor in food preference and similar mechanisms may exist in the relationship between local consumers and S. muticum. Some populations of native Littorina snails accept S. muticum as a food source, while others avoid it. This project aims to establish the relationship between GI tract microbes and the feeding preferences of L. littorea, when offered both native algae and S. muticum. Individuals of L. littorea from a site invaded by S. muticum around 18 years ago were compared to those from an un-invaded site nearby. Sargassum-experienced snails are more likely to consume it than those naïve, and pronounced differences were found in the GI-tract microbial communities through 16S (prokaryote) and 18S (eukaryote) sequencing. Sargassum-naïve snails were then exposed to a faecal pellets from experienced snails to ‘inoculate’ them with microbes from the exposed snails. Preliminary results suggest these faecal-pellet-exposed but otherwise Sargassum-naïve snails subsequently begun consuming S. muticum. It is unclear if these results are due to genuine changes in GI-tract microbes or through some other mechanism, such as behavioural responses to chemical cues in the faecal pellets, but these results are nevertheless of significance for invasive ecology, suggesting that foraging preferences for an invasive prey type are malleable and possibly programmable in laboratory settings.

Keywords: invasive algae, sea snails, gut microbiome, biocontrol

Procedia PDF Downloads 48
12 Human Factors Considerations in New Generation Fighter Planes to Enhance Combat Effectiveness

Authors: Chitra Rajagopal, Indra Deo Kumar, Ruchi Joshi, Binoy Bhargavan

Abstract:

Role of fighter planes in modern network centric military warfare scenarios has changed significantly in the recent past. New generation fighter planes have multirole capability of engaging both air and ground targets with high precision. Multirole aircraft undertakes missions such as Air to Air combat, Air defense, Air to Surface role (including Air interdiction, Close air support, Maritime attack, Suppression and Destruction of enemy air defense), Reconnaissance, Electronic warfare missions, etc. Designers have primarily focused on development of technologies to enhance the combat performance of the fighter planes and very little attention is given to human factor aspects of technologies. Unique physical and psychological challenges are imposed on the pilots to meet operational requirements during these missions. Newly evolved technologies have enhanced aircraft performance in terms of its speed, firepower, stealth, electronic warfare, situational awareness, and vulnerability reduction capabilities. This paper highlights the impact of emerging technologies on human factors for various military operations and missions. Technologies such as ‘cooperative knowledge-based systems’ to aid pilot’s decision making in military conflict scenarios as well as simulation technologies to enhance human performance is also studied as a part of research work. Current and emerging pilot protection technologies and systems which form part of the integrated life support systems in new generation fighter planes is discussed. System safety analysis application to quantify the human reliability in military operations is also studied.

Keywords: combat effectiveness, emerging technologies, human factors, systems safety analysis

Procedia PDF Downloads 118
11 Accidental U.S. Taxpayers Residing Abroad: Choosing between U.S. Citizenship or Keeping Their Local Investment Accounts

Authors: Marco Sewald

Abstract:

Due to the current enforcement of exterritorial U.S. legislation, up to 9 million U.S. (dual) citizens residing abroad are subject to U.S. double and surcharge taxation and at risk of losing access to otherwise basic financial services and investment opportunities abroad. The United States is the only OECD country that taxes non-resident citizens, lawful permanent residents and other non-resident aliens on their worldwide income, based on local U.S. tax laws. To enforce these policies the U.S. has implemented ‘saving clauses’ in all tax treaties and implemented several compliance provisions, including the Foreign Account Tax Compliance Act (FATCA), Qualified Intermediaries Agreements (QI) and Intergovernmental Agreements (IGA) addressing Foreign Financial Institutions (FFIs) to implement these provisions in foreign jurisdictions. This policy creates systematic cases of double and surcharge taxation. The increased enforcement of compliance rules is creating additional report burdens for U.S. persons abroad and FFIs accepting such U.S. persons as customers. FFIs in Europe react with a growing denial of specific financial services to this population. The numbers of U.S. citizens renouncing has dramatically increased in the last years. A case study is chosen as an appropriate methodology and research method, as being an empirical inquiry that investigates a contemporary phenomenon within its real-life context; when the boundaries between phenomenon and context are not clearly evident; and in which multiple sources of evidence are used. This evaluative approach is testing whether the combination of policies works in practice, or whether they are in accordance with desirable moral, political, economical aims, or may serve other causes. The research critically evaluates the financial and non-financial consequences and develops sufficient strategies. It further discusses these strategies to avoid the undesired consequences of exterritorial U.S. legislation. Three possible strategies are resulting from the use cases: (1) Duck and cover, (2) Pay U.S. double/surcharge taxes, tax preparing fees and accept imposed product limitations and (3) Renounce U.S. citizenship and pay possible exit taxes, tax preparing fees and the requested $2,350 fee to renounce. While the first strategy is unlawful and therefore unsuitable, the second strategy is only suitable if the U.S. citizen residing abroad is planning to move to the U.S. in the future. The last strategy is the only reasonable and lawful way provided by the U.S. to limit the exposure to U.S. double and surcharge taxation and the limitations on financial products. The results are believed to add a perspective to the current academic discourse regarding U.S. citizenship based taxation, currently dominated by U.S. scholars, while providing sufficient strategies for the affected population at the same time.

Keywords: citizenship based taxation, FATCA, FBAR, qualified intermediaries agreements, renounce U.S. citizenship

Procedia PDF Downloads 178
10 Pioneering Conservation of Aquatic Ecosystems under Australian Law

Authors: Gina M. Newton

Abstract:

Australia’s Environment Protection and Biodiversity Conservation Act (EPBC Act) is the premiere, national law under which species and 'ecological communities' (i.e., like ecosystems) can be formally recognised and 'listed' as threatened across all jurisdictions. The listing process involves assessment against a range of criteria (similar to the IUCN process) to demonstrate conservation status (i.e., vulnerable, endangered, critically endangered, etc.) based on the best available science. Over the past decade in Australia, there’s been a transition from almost solely terrestrial to the first aquatic threatened ecological community (TEC or ecosystem) listings (e.g., River Murray, Macquarie Marshes, Coastal Saltmarsh, Salt-wedge Estuaries). All constitute large areas, with some including multiple state jurisdictions. Development of these conservation and listing advices has enabled, for the first time, a more forensic analysis of three key factors across a range of aquatic and coastal ecosystems: -the contribution of invasive species to conservation status, -how to demonstrate and attribute decline in 'ecological integrity' to conservation status, and, -identification of related priority conservation actions for management. There is increasing global recognition of the disproportionate degree of biodiversity loss within aquatic ecosystems. In Australia, legislative protection at Commonwealth or State levels remains one of the strongest conservation measures. Such laws have associated compliance mechanisms for breaches to the protected status. They also trigger the need for environment impact statements during applications for major developments (which may be denied). However, not all jurisdictions have such laws in place. There remains much opposition to the listing of freshwater systems – for example, the River Murray (Australia's largest river) and Macquarie Marshes (an internationally significant wetland) were both disallowed by parliament four months after formal listing. This was mainly due to a change of government, dissent from a major industry sector, and a 'loophole' in the law. In Australia, at least in the immediate to medium-term time frames, invasive species (aliens, native pests, pathogens, etc.) appear to be the number one biotic threat to the biodiversity and ecological function and integrity of our aquatic ecosystems. Consequently, this should be considered a current priority for research, conservation, and management actions. Another key outcome from this analysis was the recognition that drawing together multiple lines of evidence to form a 'conservation narrative' is a more useful approach to assigning conservation status. This also helps to addresses a glaring gap in long-term ecological data sets in Australia, which often precludes a more empirical data-driven approach. An important lesson also emerged – the recognition that while conservation must be underpinned by the best available scientific evidence, it remains a 'social and policy' goal rather than a 'scientific' goal. Communication, engagement, and 'politics' necessarily play a significant role in achieving conservation goals and need to be managed and resourced accordingly.

Keywords: aquatic ecosystem conservation, conservation law, ecological integrity, invasive species

Procedia PDF Downloads 105
9 Comparative Analysis of the Treatment of the Success of the First Crusade in Modern Arab and Western Historiography

Authors: Oleg Sokolov

Abstract:

Despite the fact that the epoch of the Crusades ended more than 700 years ago, its legacy still remains relevant both in the Middle East and in the West. There was made a comparison of the positions of the most prominent Western and Arab medievalists of XX-XXI centuries, using the example of their interpretations of the success of the First Crusade. The analyzed corpus consists of 70 works. In the modern Arab Historiography, it is often pointed out that the Seljuks' struggle against the crusaders of the First Crusade was seriously hampered by the raids of the Arab Bedouin tribes of Jazira. At the same time, it is emphasized that the Arab rulers of Northern Syria were ‘pleased’ with the defeats of the Turks and made peace with the Crusaders, refusing to fight them. At the same time it is usually underlined that the Fatimid aggression against the Turks led both the first and the second to defeat from the Crusaders and became one of the main reasons for the success of the First Crusade and the Muslims' loss of Jerusalem in 1099. The position of Western historians about the reasons for the success of the First Crusade differs significantly. First of all, in the Western Historiography, it is noted that the deaths of the Fatimid and Abbasid Caliphs and the Seljuk Sultan between 1092 and 1094 years created political vacuum just before the crusaders appeared in the Middle East political arena. In 1097-1099, when the Crusaders advanced through Asia Minor, Syria and Palestine to Jerusalem, there was an active internecine struggle between the parts of the Seljuq state that had broken up by that time, and the crusaders were not perceived as a general threat of all Muslims of this region at that time. It is also pointed out that the main goals of the Crusaders - Antioch, Edessa, and Jerusalem - were at that time periphery since the main struggle for power in the Middle East was at this time in Iran. Thus, Arab historians see the lack of support from Arabs of Syria and Jazira and the aggression from Egypt as a crucial factors preventing the Seljuks from defeating the Crusaders, while their Western counterparts consider the internal power struggle between the Seljuks as a more important reason for the success of the First Crusade. The reason for this divergence in the treatment of the events of the First Crusade is probably the prevailing in much of Arab historiography, the idea of the Franks as an enemy of all peoples and religions of the Middle East. At the same time, in contemporary Western Historiography, the crusaders are described only as one of the many military and political forces that operated in this region at the end of the eleventh century.

Keywords: Arabs, Crusades, historiography, Turks

Procedia PDF Downloads 142
8 Maintenance of Non-Crop Plants Reduces Insect Pest Population in Tropical Chili Pepper Agroecosystems

Authors: Madelaine Venzon, Dany S. S. L. Amaral, André L. Perez, Natália S. Diaz, Juliana A. Martinez Chiguachi, Maira C. M. Fonseca, James D. Harwood, Angelo Pallini

Abstract:

Integrating strategies of sustainable crop production and promoting the provisioning of ecological services on farms and within rural landscapes is a challenge for today’s agriculture. Habitat management, through increasing vegetational diversity, enhances heterogeneity in agroecosystems and has the potential to improve the recruitment of natural enemies of pests, which promotes biological control services. In tropical agroecosystems, however, there is a paucity of information pertaining to the resources provided by associated plants and their interactions with natural enemies. The maintenance of non-crop plants integrated into and/or surrounding crop fields provides the farmer with a low-investment option to enhance biological control. We carried out field experiments in chili pepper agroecosystems with small stakeholders located in the Zona da Mata, State of Minas Gerais, Brazil, from 2011 to 2015 where we assessed: (a) whether non-crop plants within and around chili pepper fields affect the diversity and abundance of aphidophagous species; (b) whether there are direct interactions between non-crop plants and aphidophagous arthropods; and (c) the importance of non-crop plant resources for survival of Coccinellidae and Chrysopidae species. Aphidophagous arthropods were dominated by Coccinellidae, Neuroptera, Syrphidae, Anthocoridae and Araneae. These natural enemies were readily observed preying on aphids, feeding on flowers or extrafloral nectaries and using plant structures for oviposition and/or protection. Aphid populations were lower on chili pepper fields associated with non-crop plants that on chili pepper monocultures. Survival of larvae and adults of different species of Coccinellidae and Chrysopidae on non-crop resources varied according to the plant species. This research provides evidence that non-crop plants in chili pepper agroecosystems can affect aphid abundance and their natural enemy abundance and survival. It is also highlighting the need for further research to fully characterize the structure and function of plant resources in these and other tropical agroecosystems. Financial support: CNPq, FAPEMIG and CAPES (Brazil).

Keywords: Conservation biological control, aphididae, Coccinellidae, Chrysopidae, plant diversification

Procedia PDF Downloads 258
7 For a Poetic Clinic: Experimentations at Risk on the Images in Performances

Authors: Juliana Bom-Tempo

Abstract:

The proposed composition occurs between images, performances, clinics and philosophies. For this enterprise we depart for what is not known beforehand, so with a question as a compass: "would it be in the creation, production and implementation of images in a performance a 'when' for the event of a poetic clinic?” In light of this, there are, in order to think a 'when' of the event of a poetic clinic, images in performances created, produced and executed in partnerships with the author of this text. Faced with this composition, we built four indicators to find spatiotemporal coordinates that would spot that "when", namely: risk zones; the mobilizations of the signs; the figuring of the flesh and an education of the affections. We dealt with the images in performances; Crútero; Flesh; Karyogamy and the risk of abortion; Egg white; Egg-mouth; Islands, threads, words ... germs; Egg-Mouth-Debris, taken as case studies, by engendering risks areas to promote individuations, which never actualize thoroughly, thus always something of pre-individual and also individuating a environment; by mobilizing the signs territorialized by the ordinary, causing them to vary the language and the words of order dictated by the everyday in other compositions of sense, other machinations; by generating a figure of flesh, disarranging the bodies, isolating them in the production of a ground force that causes the body to leak out and undo the functionalities of the organs; and, finally, by producing an education of affections, by placing the perceptions in becoming and disconnecting the visible in the production of small deserts that call for the creation of a people yet to come. The performance is processed as a problematizing of the images fixed by the ordinary, producing gestures that precipitate the individuation of images in performance, strange to the configurations that gather bodies and spaces in what we call common. Lawrence proposes to think of "people" who continually use umbrellas to protect themselves from chaos. These have the function of wrapping up the chaos in visions that create houses, forms and stabilities; they paint a sky at the bottom of the umbrella, where people march and die. A chaos, where people live and wither. Pierce the umbrella for a desire of chaos; a poet puts himself as an enemy of the convention, to be able to have an image of chaos and a little sun that burns his skin. The images in performances presented, thereby, were moving in search for the power of producing a spatio-temporal "when" putting the territories in risk areas, mobilizing the signs that format the day-to-day, opening the bodies to a disorganization and the production of an education of affections for the event of a poetic clinic.

Keywords: Experimentations , Images in Performances, Poetic Clinic, Risk

Procedia PDF Downloads 84
6 Accurate Calculation of the Penetration Depth of a Bullet Using ANSYS

Authors: Eunsu Jang, Kang Park

Abstract:

In developing an armored ground combat vehicle (AGCV), it is a very important step to analyze the vulnerability (or the survivability) of the AGCV against enemy’s attack. In the vulnerability analysis, the penetration equations are usually used to get the penetration depth and check whether a bullet can penetrate the armor of the AGCV, which causes the damage of internal components or crews. The penetration equations are derived from penetration experiments which require long time and great efforts. However, they usually hold only for the specific material of the target and the specific type of the bullet used in experiments. Thus, penetration simulation using ANSYS can be another option to calculate penetration depth. However, it is very important to model the targets and select the input parameters in order to get an accurate penetration depth. This paper performed a sensitivity analysis of input parameters of ANSYS on the accuracy of the calculated penetration depth. Two conflicting objectives need to be achieved in adopting ANSYS in penetration analysis: maximizing the accuracy of calculation and minimizing the calculation time. To maximize the calculation accuracy, the sensitivity analysis of the input parameters for ANSYS was performed and calculated the RMS error with the experimental data. The input parameters include mesh size, boundary condition, material properties, target diameter are tested and selected to minimize the error between the calculated result from simulation and the experiment data from the papers on the penetration equation. To minimize the calculation time, the parameter values obtained from accuracy analysis are adjusted to get optimized overall performance. As result of analysis, the followings were found: 1) As the mesh size gradually decreases from 0.9 mm to 0.5 mm, both the penetration depth and calculation time increase. 2) As diameters of the target decrease from 250mm to 60 mm, both the penetration depth and calculation time decrease. 3) As the yield stress which is one of the material property of the target decreases, the penetration depth increases. 4) The boundary condition with the fixed side surface of the target gives more penetration depth than that with the fixed side and rear surfaces. By using above finding, the input parameters can be tuned to minimize the error between simulation and experiments. By using simulation tool, ANSYS, with delicately tuned input parameters, penetration analysis can be done on computer without actual experiments. The data of penetration experiments are usually hard to get because of security reasons and only published papers provide them in the limited target material. The next step of this research is to generalize this approach to anticipate the penetration depth by interpolating the known penetration experiments. This result may not be accurate enough to be used to replace the penetration experiments, but those simulations can be used in the early stage of the design process of AGCV in modelling and simulation stage.

Keywords: ANSYS, input parameters, penetration depth, sensitivity analysis

Procedia PDF Downloads 362
5 Counter-Terrorism and De-Radicalization as Soft Strategies in Combating Terrorism in Indonesia: A Critical Review

Authors: Tjipta Lesmana

Abstract:

Terrorist attacks quickly penetrated Indonesia following the downfall of Soeharto regime in May 1998. Reform era was officially proclaimed. Indonesia turned to 'heaven state' from 'authoritarian state'. For the first time since 1966, the country experienced a full-scale freedom of expression, including freedom of the press, and heavy acknowledgement of human rights practice. Some religious extremists previously run away to neighbor countries to escape from security apparatus secretly backed home. Quickly they consolidated the power to continue their long aspiration and dream to establish 'Shariah Indonesia', Indonesia based on Khilafah ideology. Bali bombings I which shocked world community occurred on 12 October 2002 in the famous tourist district of Kuta on the Indonesian island of Bali, killing 202 people (including 88 Australians, 38 Indonesians, and people from more than 20 other nationalities). In the capital, Jakarta, successive bombings were blasted in Marriott hotel, Australian Embassy, residence of the Philippine Ambassador and stock exchange office. A 'drunken Indonesia' is far from ready to combat nationwide sudden and massive terrorist attacks. Police Detachment 88 (Densus 88) Indonesian counter-terrorism squad, was quickly formed following 2002 Bali Bombing. Anti-terrorism Provisional Act was immediately erected, as well, due to urgent need to fight terrorism. Some Bali bombings criminals were deadly executed after sentenced by the court. But a series of terrorist suicide attacks and another Bali bombings (the second one) in Bali, again, shocked world community. Terrorism network is undoubtedly spreading nationwide. Suspicion is high that they had close connection with Al Qaeda’s groups. Even 'Afghanistan alumni' and 'Syria alumni' returned to Indonesia to back up the local mujahidins in their fights to topple Indonesia constitutional government and set up Islamic state (Khilafah). Supported by massive aids from friendly nations, especially Australia and United States, Indonesia launched large scale operations to crush terrorism consisted of various radical groups such as JAD, JAS, and JAADI. Huge energy, money, and souls were dedicated. Terrorism is, however, persistently entrenched. High ranking officials from Detachment 88 squad and military intelligence believe that terrorism is still one the most deadly enemy of Indonesia.

Keywords: counter-radicalization, de-radicalization, Khalifah, Union State, Al Qaedah, ISIS

Procedia PDF Downloads 150
4 Restructurasation of the Concept of Empire in the Social Consciousness of Modern Americans

Authors: Maxim Kravchenko

Abstract:

The paper looks into the structure and contents of the concept of empire in the social consciousness of modern Americans. To construct the model of this socially and politically relevant concept we have conducted an experiment with respondents born and living in the USA. Empire is seen as a historic notion describing such entities as the British empire, the Russian empire, the Ottoman empire and others. It seems that the democratic regime adopted by most countries worldwide is incompatible with imperial status of a country. Yet there are countries which tend to dominate in the contemporary world and though they are not routinely referred to as empires, in many respects they are reminiscent of historical empires. Thus, the central hypothesis of the study is that the concept of empire is cultivated in some states through the intermediary of the mass media though it undergoes a certain transformation to meet the expectations of a democratic society. The transformation implies that certain components which were historically embedded in its structure are drawn to the margins of the hierarchical structure of the concept whereas other components tend to become central to the concept. This process can be referred to as restructuration of the concept of empire. To verify this hypothesis we have conducted a study which falls into two stages. First we looked into the definition of empire featured in dictionaries, the dominant conceptual components of empire are: importance, territory/lands, recognition, independence, authority/power, supreme/absolute. However, the analysis of 100 articles from American newspapers chosen at random revealed that authors rarely use the word «empire» in its basic meaning (7%). More often «empire» is used when speaking about countries, which no longer exist or when speaking about some corporations (like Apple or Google). At the second stage of the study we conducted an associative experiment with the citizens of the USA aged 19 to 45. The purpose of the experiment was to find out the dominant components of the concept of empire and to construct the model of the transformed concept. The experiment stipulated that respondents should give the first association, which crosses their mind, on reading such stimulus phrases as “strong military”, “strong economy” and others. The list of stimuli features various words and phrases associated with empire including the words representing the dominant components of the concept of empire. Then the associations provided by the respondents were classified into thematic clusters. For instance, the associations to the stimulus “strong military” were compartmentalized into three groups: 1) a country with strong military forces (North Korea, the USA, Russia, China); 2) negative impression of strong military (war, anarchy, conflict); 3) positive impression of strong military (peace, safety, responsibility). The experiment findings suggest that the concept of empire is currently undergoing a transformation which brings about a number of changes. Among them predominance of positively assessed components of the concept; emergence of two poles in the structure of the concept, that is “hero” vs. “enemy”; marginalization of any negatively assessed components.

Keywords: associative experiment, conceptual components, empire, restructurasation of the concept

Procedia PDF Downloads 286
3 Nuclear Powered UAV for Surveillances and Aerial Photography

Authors: Rajasekar Elangopandian, Anand Shanmugam

Abstract:

Now-a-days for surveillances unmanned aerial vehicle plays a vital role. Not only for surveillances, aerial photography disaster management and the notice of earth behavior UAV1s envisages meticulously. To reduce the maintenance and fuel nuclear powered Vehicles are greater support. The design consideration is much important for the UAV manufacturing industry and Research and development agency. Eventually design is looking like a pentagon shaped fuselage and black rubber coated paint in order to escape from the enemy radar and other targets. The pentagon shape fuselage has large space to keep the mini nuclear reactor inside and the material is carbon – carbon fiber specially designed by the software called cosmol and hyper mesh 14.2. So the weight consideration will produce the positive result for productivity. The walls of the fuselage are coated with lead and protective shield. A double layer of W/Bi sheet is proposed for radiation protection at the energy range of 70 Kev to 90 Kev. The designed W/bi sheet, only 0.14 mm thick and is 36% light. The properties of the fillers were determined from zeta potential and particle size measurements. The Exposes of the radiation can be attenuated by 3 ways such as minimizing exposure time, Maximizing distance from the radiation source and shielding the whole vehicle. The inside reactor will be switched ON when the UAV starts its cruise. The moderators and the control rods can be inserted by automation technique by newly developed software. The heat generated by the reactor will be used to run the turbine which is fixed inside the UAV called mini turbine with natural rubber composite Shaft radiation shield. Cooling system will be in two mode such as liquid and air cooled. Liquid coolant for the heat regeneration is ordinary water, liquid sodium, helium and the walls are made up of regenerative and radiation protective material. The other components like camera and arms bay will be located at the bottom of the UAV high are specially made products in order to escape from the radiation. They are coated with lead Pb and natural rubber composite material. This technique provides the long rang and endurance for eternal flight mission until we need any changeability of parts or product. This UAV has the special advantage of ` land on String` means it`ll land at electric line to charge the automated electronics. Then the fuel is enriched uranium (< 5% U - 235) contains hundreds of fuel pins. This technique provides eternal duty for surveillances and aerial photography. The landing of the vehicle is ease of operation likewise the takeoff is also easier than any other mechanism which present in nowadays. This UAV gives great immense and immaculate technology for surveillance and target detecting and smashing the target.

Keywords: mini turbine, liquid coolant for the heat regeneration, in order to escape from the radiation, eternal flight mission, it`ll land at electric line

Procedia PDF Downloads 381