Search results for: global level terrorism
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 16666

Search results for: global level terrorism

16486 Effectuating Theology of Culture: The Only Weapon to Confront 21st Century Global Godless Culture

Authors: Hram Bik

Abstract:

This is an analytical paper on how to apply theology to the global godless culture. The paper will analyze and materialize theology of culture and come up with theo-cultural principles which will enable Christians to properly engage with today godless culture. If theology and daily life are in any way split apart, Christians will lose the authenticity essential to their calling. Living out godliness in the ungodly culture requires materializing theology into daily life. To do that has become an unbeatable challenge for Christians in 21st century with the overtaking in of global godless culture enforced by Information Technology resulting in rapid and chaotic change of global lifestyles wherein Christianity stands in danger of being swallowed up. Staying away from the culture will rob Christianity of its mission to witness and staying with and like it will rob Christianity of its effectiveness. Thus the question is how should today Christians apply theology to the culture wherein what are said to be sins in the Bible no longer look like sins? Should we forge an all-out war against it or should distance ourselves away from it? The extreme response to it could fruit Christian Jihadism on the right and the apathetic response would let it booming with no one attempting to stop it on the left. This paper calls for global Christians to essentially make theology a part of their daily lives to form a united global force to influence the godless global culture by influencing our own family and community.

Keywords: Christians, global culture, godliness, theology

Procedia PDF Downloads 242
16485 Empirical Model for the Estimation of Global Solar Radiation on Horizontal Surface in Algeria

Authors: Malika Fekih, Abdenour Bourabaa, Rafika Hariti, Mohamed Saighi

Abstract:

In Algeria the global solar radiation and its components is not available for all locations due to which there is a requirement of using different models for the estimation of global solar radiation that use climatological parameters of the locations. Empirical constants for these models have been estimated and the results obtained have been tested statistically. The results show encouraging agreement between estimated and measured values.

Keywords: global solar radiation, empirical model, semi arid areas, climatological parameters

Procedia PDF Downloads 467
16484 Software Transactional Memory in a Dynamic Programming Language at Virtual Machine Level

Authors: Szu-Kai Hsu, Po-Ching Lin

Abstract:

As more and more multi-core processors emerge, traditional sequential programming paradigm no longer suffice. Yet only few modern dynamic programming languages can leverage such advantage. Ruby, for example, despite its wide adoption, only includes threads as a simple parallel primitive. The global virtual machine lock of official Ruby runtime makes it impossible to exploit full parallelism. Though various alternative Ruby implementations do eliminate the global virtual machine lock, they only provide developers dated locking mechanism for data synchronization. However, traditional locking mechanism error-prone by nature. Software Transactional Memory is one of the promising alternatives among others. This paper introduces a new virtual machine: GobiesVM to provide a native software transactional memory based solution for dynamic programming languages to exploit parallelism. We also proposed a simplified variation of Transactional Locking II algorithm. The empirical results of our experiments show that support of STM at virtual machine level enables developers to write straightforward code without compromising parallelism or sacrificing thread safety. Existing source code only requires minimal or even none modi cation, which allows developers to easily switch their legacy codebase to a parallel environment. The performance evaluations of GobiesVM also indicate the difference between sequential and parallel execution is significant.

Keywords: global interpreter lock, ruby, software transactional memory, virtual machine

Procedia PDF Downloads 249
16483 Enhancing the Use of Traditional, Complementary and Alternative Medicines into Global Cancer Treatment and Research

Authors: Alejandro Salicrup, Riacrdo Gelhman, Geetha Gopalakrishna

Abstract:

The main aim of this session is to have a panel to discuss specific steps for the integration of traditional, complementary and alternative medicine (TCAM) with conventional oncology for enhancing treatment practices at the global level, specifically in low-and-middle-income-countries (LMICs). Concrete current and required programs for strengthening Integrative Oncology research in LMICs will also be discussed. Case Studies from Latin America, Asia, Europe and Africa will discuss and highlight 1) What is working regarding treatment practices in integrative oncology in their countries/regions providing concrete examples 2) What is not working on this integration for cancer treatment in their countries/regions with concrete examples and 3) What are the challenges and opportunities for research related to integrative oncology treatment. Discussion will include potential next steps and potential mechanisms to enhance global integrative oncology research aimed to enhance the use of TCAM therapies and strengthening cancer treatment in LMICs.

Keywords: global cancer treatment, integrative oncology research, low and middle income countries, traditional, complementary and alternative medicines

Procedia PDF Downloads 92
16482 Understanding How Money Laundering and Financing of Terrorism Are Conducted through the Real Estate Sector in the Middle East and North Africa Region

Authors: Haytham Yassine

Abstract:

This research seeks to identify how money laundering activities are executed through the real estate sector. This article provides academics with literature on the topic and provides scholars, and practitioners with a better understanding of the risks and challenges involved. Data are gathered through survey in the Middle East and North Africa region and review of the available research. The results of the analysis will help identifying the factors attracting criminals to the real estate sector and develop an understanding of the methods used to launder illicit funds through this sector and the indicators of suspicion for reporting entities. Further analysis reveals the risks posed by money laundering and terrorist financing on the real estate sector and challenges facing states in this regard.

Keywords: money laundering, terrorism financing, real estate sector, Middle East and North Africa

Procedia PDF Downloads 130
16481 Extracting the Atmospheric Carbon Dioxide and Convert It into Useful Minerals at the Room Conditions

Authors: Muthana A. M. Jamel Al-Gburi

Abstract:

Elimination of carbon dioxide (CO2) gas from our atmosphere is very important but complicated, and since there is always an increase in the gas amounts of the other greenhouse ones in our atmosphere, causes by both some of the human activities and the burning of the fossil fuels, which leads to the Global Warming phenomena i.e., increasing the earth temperature to a higher level, creates desertification, tornadoes and storms. In our present research project, we constructed our own system to extract carbon dioxide directly from the atmospheric air at the room conditions and investigated how to convert the gas into a useful mineral or Nano scale fibers made of carbon by using several chemical processes and chemical reactions leading to a valuable building material and also to mitigate the environmental negative change. In the present water pool system (Carbone Dioxide Domestic Extractor), the ocean-sea water was used to dissolve the CO2 gas from the room and converted into carbonate minerals by using a number of additives like shampoo, clay and MgO. Note that the atmospheric air includes CO2 gas has circulated within the sea water by air pump connected to a perforated tubes fixed deep on the pool base. Those chemical agents were mixed with the ocean-sea water to convert the formed acid from the water-CO2 reaction into a useful mineral. After we successfully constructed the system, we did intense experiments and investigations on the CO2 gas reduction level and found which is the optimum active chemical agent to work in the atmospheric conditions.

Keywords: global warming, CO₂ gas, ocean-sea water, additives, solubility level

Procedia PDF Downloads 51
16480 A Model of Preventing Global Financial Crisis: Gauss Law Model Proposal Used in Electrical Field Calculations

Authors: Arzu K. Kamberli

Abstract:

This article examines the relationship between economics and physics, starting with Adam Smith, with a new econophysics approach in Economics-Physics with the Gauss Law model proposal using for the Electric Field calculation, which will allow us to anticipate the Global Financial Crisis. For this purpose, the similarities between the Gauss Law using the electric field calculations and the global financial crisis have been explained on the formula, and a model has been suggested to predict the risks of the financial systems from the electricity field calculations. Thus, this study is expected to help for preventing the Global Financial Crisis with the contribution of the science of economics and physics from the aspect of econophysics.

Keywords: econophysics, electric field, financial system, Gauss law, global financial crisis

Procedia PDF Downloads 252
16479 The Impact of Climate Change on the Spread of Potato Pests in Kazakhstan

Authors: R. Zh. Abdukerim, D. A. Absatarova, A. T. Aitbayeva, M. A. Askarova, S. T. Turuspekova, E. V. Zhunus

Abstract:

The resilience of agricultural systems at the global level to climate change and their ability to recover determines the prospects for food security on a global scale. Since climate change will lead to changes in temperatures, precipitation, weather conditions and mass outbreaks of harmful organisms. The issue of adaptation to climate change in the agricultural sector is one of the priorities of Kazakhstan's Development Strategy for the period up to 2050. Since Kazakhstan is an agroindustrial country in which agriculture plays an important economic role. Kazakhstan is the largest potato producer in Central Asia, accounting for about 60% of the total vegetable production, which determines the urgency of solving the problem of increasing yields and quality. The control harmful organisms plays an important role in solving this issue. Due to the fact that climate change can lead to an increase in the number of harmful organisms and, accordingly, to a complete loss of harvest.

Keywords: potato pests, Colorado potato beetle, soil pests, global climate change

Procedia PDF Downloads 34
16478 Islamophobia: A Study of Unfounded Fear of Islam in Nigeria

Authors: AbdulHameed Badmas Yusuf

Abstract:

Islamophobia is unfounded fear of Islam and, more accurately, of his adherents. This phenomenon has found a fertile terrain in Nigeria given her status as a multireligious society where Muslims and Christians co-exist. Over the years, Islamophobia has taken constitutional, diplomatic, educational, financial, and political dimensions in the country. Any move by Muslims to adhere to their religious dictates, within the constitutional framework, is misconstrued by Christians - their religious counterparts- as a systematic way of Islamizing the country. Against this backdrop, this paper casts a look at Islamophobia from the five dimensions mentioned above. It shall identify possible causes of Islamophobia and proffer solutions accordingly. Available resources as well as events in the recent past reveal that Islamophobia is not unconnected with orientalism and terrorism, which are informed by prejudice and ignorance respectively. As such, the paper suggests adequate knowledge and tolerance as inevitable tools to curtail the menace of Islamophobia. This will go a long way in enhancing mutual tolerance and peaceful co-existence among the adherents of Christianity, Islam, and other religions in Nigeria. Both historical and analytical methods are used in this paper.

Keywords: islamophobia, islam, Nigeria, orientalism, terrorism

Procedia PDF Downloads 398
16477 Location-Domination on Join of Two Graphs and Their Complements

Authors: Analen Malnegro, Gina Malacas

Abstract:

Dominating sets and related topics have been studied extensively in the past few decades. A dominating set of a graph G is a subset D of V such that every vertex not in D is adjacent to at least one member of D. The domination number γ(G) is the number of vertices in a smallest dominating set for G. Some problems involving detection devices can be modeled with graphs. Finding the minimum number of devices needed according to the type of devices and the necessity of locating the object gives rise to locating-dominating sets. A subset S of vertices of a graph G is called locating-dominating set, LD-set for short, if it is a dominating set and if every vertex v not in S is uniquely determined by the set of neighbors of v belonging to S. The location-domination number λ(G) is the minimum cardinality of an LD-set for G. The complement of a graph G is a graph Ḡ on same vertices such that two distinct vertices of Ḡ are adjacent if and only if they are not adjacent in G. An LD-set of a graph G is global if it is an LD-set of both G and its complement Ḡ. The global location-domination number λg(G) is defined as the minimum cardinality of a global LD-set of G. In this paper, global LD-sets on the join of two graphs are characterized. Global location-domination numbers of these graphs are also determined.

Keywords: dominating set, global locating-dominating set, global location-domination number, locating-dominating set, location-domination number

Procedia PDF Downloads 154
16476 The Impact of Global Financial Crises and Corporate Financial Crisis (Bankruptcy Risk) on Corporate Tax Evasion: Evidence from Emerging Markets

Authors: Seyed Sajjad Habibi

Abstract:

The aim of this study is to investigate the impact of global financial crises and corporate financial crisis on tax evasion of companies listed on the Tehran Stock Exchange. For this purpose, panel data in the periods of financial crisis period (2007 to 2012) and without a financial crisis (2004, 2005, 2006, 2013, 2014, and 2015) was analyzed using multivariate linear regression. The results indicate a significant relationship between the corporate financial crisis (bankruptcy risk) and tax evasion in the global financial crisis period. The results also showed a significant relationship between the corporate bankruptcy risk and tax evasion in the period with no global financial crisis. A significant difference was found between the bankruptcy risk and tax evasion in the period of the global financial crisis and that with no financial crisis so that tax evasion increased in the financial crisis period.

Keywords: global financial crisis, corporate financial crisis, bankruptcy risk, tax evasion risk, emerging markets

Procedia PDF Downloads 251
16475 Quality Education as a Tool for Global Poverty Alleviation

Authors: Ibrahim Auwalu

Abstract:

The main thrust of this paper is the examination of Quality Education as opposed to low level knowledge acquisition in the promotion of quality of life, health, individual and national growth and development. The paper reviews the role education plays in developed, developing and third world economies. It further explores the real meaning of poverty in the context it exists. That is poverty in terms of its dimensions– shortened lives, illiteracy, social exclusion and lack of material means to improve family circumstances. The paper concludes that education not only helps individuals escape poverty by developing the skills needed to improve their livelihoods, but also generates productivity gains that fuel economic growth.

Keywords: quality, education, global, poverty alleviation

Procedia PDF Downloads 296
16474 EMS Providers' Ability and Willingness to Respond to Bioterrorism

Authors: Ryan Houser

Abstract:

Introduction: Previous studies have found that public health systems within the United States are inadequately prepared for an act of biological terrorism. As the COVID-19 pandemic continues, few studies have evaluated bioterrorism preparedness of Emergency Medical Services, even in the accelerating environment of biothreats. Methods: This study utilized an Internet-based survey to assess the level of preparedness and willingness to respond to a bioterrorism attack and identify factors that predict preparedness and willingness among Nebraska EMS (Emergency Medical Services ) providers. The survey was available for one month in 2021, during which 190 EMS providers responded to the survey. Results: Only 56.8% of providers were able to recognize an illness or injury as potentially resulting from exposure to a CBRN agent. The provider Clinical Competency levels range from a low of 13.6% (ability to initiate patient care within his/her professional scope of practice and arrange for prompt referral appropriate to the identified condition(s)) to a high of 74% (the ability to respond to an emergency within the emergency management system of his/her practice, institution and community). Only 10% of the respondents are both willing and able to effectively function in a bioterror environment. Discussion: In order to effectively prepare for and respond to a bioterrorist attack, all levels of the healthcare system need to have the clinical skills, knowledge, and abilities necessary to treat patients exposed. Policy changes and increased focus on training and drills are needed to ensure a prepared EMS system which is crucial to a resilient state. EMS entities need to be aware of the extent of their available workforce so that the country can be prepared for the increasing threat of bioterrorism or other novel emerging infectious disease outbreaks. A resilient nation relies on a prepared set of EMS providers who are willing to respond to biological terrorism events.

Keywords: bioterrorism, prehospital, EMS, disaster, emergency, medicine, preparedness, policy

Procedia PDF Downloads 125
16473 Global Indicators of Successful Remote Monitoring Adoption Applying Diffusion of Innovation Theory

Authors: Danika Tynes

Abstract:

Innovations in technology have implications for sustainable development in health and wellness. Remote monitoring is one innovation for which the evidence-base has grown to support its viability as a quality healthcare delivery adjunct. This research reviews global data on telehealth adoption, in particular, remote monitoring, and the conditions under which its success becomes more likely. System-level indicators were selected to represent four constructs of DoI theory (relative advantage, compatibility, complexity, and observability) and assessed against 5 types of Telehealth (Teleradiology, Teledermatology, Telepathology, Telepsychology, and Remote Monitoring) using ordinal logistic regression. Analyses include data from 84 countries, as extracted from the World Health Organization, World Bank, ICT (Information Communications Technology) Index, and HDI (Human Development Index) datasets. Analyses supported relative advantage and compatibility as the strongest influencers of remote monitoring adoption. Findings from this research may help focus on the allocation of resources, as a sustainability concern, through consideration of systems-level factors that may influence the success of remote monitoring adoption.

Keywords: remote monitoring, diffusion of innovation, telehealth, digital health

Procedia PDF Downloads 99
16472 A Survey of Key Challenges of Adopting Agile in Global Software Development: A Case Study with Malaysia Perspective

Authors: Amna Batool

Abstract:

Agile methodology is the current most popular technique in software development projects. Agile methods in software development bring optimistic impact on software performances, quality and customer satisfaction. There are some organizations and small-medium enterprises adopting agile into their local software development projects as well as in distributed software development projects. Adopting agile methods in local software development projects is valuable. However, agile global software deployment needs an attention. There are different key challenges in agile global software development that need to resolve and enhance the global software development cycles. The proposed systematic literature review investigates all key challenges of agile in global software development. Moreover, a quantitative methodology (an actual survey) targeted to present a real case scenario of these particular key challenges faced by one of the software houses that is BestWeb Malaysia. The outcomes of systematic literature and the results of quantitative methodology are compared with each other to evaluate if the key challenges pointed out in systematic review still exist. The proposed research and its exploratory results can assist small medium enterprises to avoid these challenges by adopting the best practices in their global software development projects. Moreover, it is helpful for novice researchers to get valuable information altogether.

Keywords: agile software development, ASD challenges, agile global software development, challenges in agile global software development

Procedia PDF Downloads 128
16471 Polypropylene Fibres Dyeable with Acid Dyes

Authors: H. M. Wang, C. J. Chang

Abstract:

As the threat of global climate change is more seriously, "net zero emissions by 2050" has become a common global goal. In order to reduce the consumption of petrochemical raw materials and reduce carbon emissions, low-carbon fiber materials have become key materials in the future global textile supply chain. This project uses polyolefin raw materials to modify through synthesis and amination to develop low-temperature dyeable polypropylene fibers, endow them with low-temperature dyeability and high color fastness that can be combined with acid dyes, and improve the problem of low coloring strength. The color fastness to washing can reach the requirement of commerce with 3.5 level or more. Therefore, we realize the entry of polypropylene fiber into the clothing textile supply chain, replace existing fiber raw materials, solve the problem of domestic chemical fiber, textile, and clothing industry's plight of no low-carbon alternative new material sources, and provide the textile industry with a solution to achieve the goal of net zero emissions in 2050.

Keywords: acid dyes, dyeing, low-temperature, polypropylene fiber

Procedia PDF Downloads 63
16470 Vegetation Integrated with Architecture: A Comparative Study in Vijayawada

Authors: Clince Rodrigues

Abstract:

Due to high dense areas, there is a continuous increase in the global warming and urban pollution, thus integrating green with the built environment is vital. The paper deals with the understanding of vegetation in architecture and how a proper design strategy can aim at improving not only the performances of buildings but also the outdoor climate. In the present scenario of cities, one cannot inhale pure air. Vegetations combat global warming by absorbing the carbon emitted by vehicles, lowering carbon emissions from fossil fuel-burning plants, and reducing the energy used for climate control in buildings by the use of plants which can reduce the carbon emission and thus, making the environment less polluted. A comparative study of areas, neighborhood and dwelling unit has been used as a scope for understanding different scenarios and scale. By comparing a system (area; building) with and without vegetation, and then finding out the difference. Understanding the Vijayawada city by taking its past and present conditions, and how these changes have affected the environment and people at a macro and micro level. Built environment and climactic performance at the building level and surrounding spaces are the areas that are covered in the study.

Keywords: climate, environment, neighborhood, pollution, vegetation, Vijayawada, urban

Procedia PDF Downloads 121
16469 People’s Perception towards the ASEAN Economic Community (AEC)

Authors: Nopadol Burananuth

Abstract:

The purposes of this research paper were to study the relationship between the economic factor and political factor, the relationship between political and economic factor and social factor, and the effects of economic factor, political factor, and social factor to the people’s perception about ASEAN Economic Community (AEC). A total of 400 samples were selected from four sub-districts from Arunyaprathet District, Srakaow Province. Data analysis method included multiple regression analysis. The findings revealed that political factor depended on trade cooperation, transportation cooperation, and communication cooperation. Social factor was depended on disaster protection, terrorism protection, and international relations. In addition, the people’s perception of the AEC depended on disaster perception, terrorism protection, international relations, transportation cooperation, communication cooperation, interdependence, and labor movement.

Keywords: economic factors, perception, political factors, social factors

Procedia PDF Downloads 554
16468 Political Coercion from Within: Theoretical Convergence in the Strategies of Terrorist Groups, Insurgencies, and Social Movements

Authors: John Hardy

Abstract:

The early twenty-first century national security environment has been characterized by political coercion. Despite an abundance of political commentary on the various forms of non-state coercion leveraged against the state, there is a lack of literature which distinguishes between the mechanisms and the mediums of coercion. Frequently non-state movements seeking to coerce the state are labelled by their tactics, not their strategies. Terrorists, insurgencies and social movements are largely defined by the ways in which they seek to influence the state, rather than by their political aims. This study examines the strategies of coercion used by non-state actors against states. This approach includes terrorist groups, insurgencies, and social movements who seek to coerce state politics. Not all non-state actors seek political coercion, so not all examples of different group types are considered. This approach also excludes political coercion by states, focusing on the non-state actor as the primary unit of analysis. The study applies a general theory of political coercion, which is defined as attempts to change the policies or action of a polity against its will, to the strategies employed by terrorist groups, insurgencies, and social movements. This distinguishes non-state actors’ strategic objectives from their actions and motives, which are variables that are often used to differentiate between types of non-state actors and the labels commonly used to describe them. It also allows for a comparative analysis of theoretical perspectives from the disciplines of terrorism, insurgency and counterinsurgency, and social movements. The study finds that there is a significant degree of overlap in the way that different disciplines conceptualize the mechanism of political coercion by non-state actors. Studies of terrorism and counterterrorism focus more on the notions of cost tolerance and collective punishment, while studies of insurgency focus on a contest of legitimacy between actors, and social movement theory tend to link political objectives, social capital, and a mechanism of influence to leverage against the state. Each discipline has a particular vernacular for the mechanism of coercion, which is often linked to the means of coercion, but they converge on three core theoretical components of compelling a polity to change its policies or actions: exceeding resistance to change, using political or violent punishments, and withholding legitimacy or consent from a government.

Keywords: counter terrorism, homeland security, insurgency, political coercion, social movement theory, terrorism

Procedia PDF Downloads 149
16467 Limiting Freedom of Expression to Fight Radicalization: The 'Silencing' of Terrorists Does Not Always Allow Rights to 'Speak Loudly'

Authors: Arianna Vedaschi

Abstract:

This paper addresses the relationship between freedom of expression, national security and radicalization. Is it still possible to talk about a balance between the first two elements? Or, due to the intrusion of the third, is it more appropriate to consider freedom of expression as “permanently disfigured” by securitarian concerns? In this study, both the legislative and the judicial level are taken into account and the comparative method is employed in order to provide the reader with a complete framework of relevant issues and a workable set of solutions. The analysis moves from the finding according to which the tension between free speech and national security has become a major issue in democratic countries, whose very essence is continuously endangered by the ever-changing and multi-faceted threat of international terrorism. In particular, a change in terrorist groups’ recruiting pattern, attracting more and more people by way of a cutting-edge communicative strategy, often employing sophisticated technology as a radicalization tool, has called on law-makers to modify their approach to dangerous speech. While traditional constitutional and criminal law used to punish speech only if it explicitly and directly incited the commission of a criminal action (“cause-effect” model), so-called glorification offences – punishing mere ideological support for terrorism, often on the web – are becoming commonplace in the comparative scenario. Although this is direct, and even somehow understandable, consequence of the impending terrorist menace, this research shows many problematic issues connected to such a preventive approach. First, from a predominantly theoretical point of view, this trend negatively impacts on the already blurred line between permissible and prohibited speech. Second, from a pragmatic point of view, such legislative tools are not always suitable to keep up with ongoing developments of both terrorist groups and their use of technology. In other words, there is a risk that such measures become outdated even before their application. Indeed, it seems hard to still talk about a proper balance: what was previously clearly perceived as a balancing of values (freedom of speech v. public security) has turned, in many cases, into a hierarchy with security at its apex. In light of these findings, this paper concludes that such a complex issue would perhaps be better dealt with through a combination of policies: not only criminalizing ‘terrorist speech,’ which should be relegated to a last resort tool, but acting at an even earlier stage, i.e., trying to prevent dangerous speech itself. This might be done by promoting social cohesion and the inclusion of minorities, so as to reduce the probability of people considering terrorist groups as a “viable option” to deal with the lack of identification within their social contexts.

Keywords: radicalization, free speech, international terrorism, national security

Procedia PDF Downloads 176
16466 China's Role in Promoting Regionalism in East Asia in Post-Maoist Era: An Analysis through Uneven and Combined Development

Authors: Ali Jibran

Abstract:

China was considered as a revisionist state by the countries of East Asia during Maoist era; but China’s role changed from a revisionist state to a constructive member of East Asian Community in post-Maoist era. This research will mainly investigate the two phenomena: what were reasons of behavioral change of China in East Asia and what role has China played to promote regionalism in East Asia since Open Door Policy of Deng Xiaoping. To understand these two phenomena, this study applies the international relations theory of Uneven and Combined Development (U&CD). The central finding of this study is that ‘whip of external necessity’ posed by the Western dominance during the Chinese ‘century of ignominy’ resulted in a Maoist regime in China in 1948 which was hostile to its neighbors due to ideological tensions. Maoist regime in China could not solve the challenges posed by the ‘international’; therefore after Mao’s death, a new economic approach was introduced in China to deal with the challenges postured by the ‘international’. Due to Deng Xiaoping’s 'Open Door Policy' era, China used its ‘privilege of historic backwardness’ and witnessed unprecedented economic growth. As the societies are multiple and exist in real time, therefore interaction among societies is pertinent. Export oriented domestic policy pushed China to concentrate less on class struggle and improve its relations with its neighbors in East Asia. As China soon become a global hub of trade after market oriented reforms, therefore friendly relations with the states of East Asia was pertinent. This study will investigate Chinese role in regionalism in East Asia in three area: Chinese role in promoting regionalism in East Asia, China’s role in economic integration in East Asia and China’s role in combatting terrorism in East Asia. This study will be divided in two section. The first section will deal with the transformation in Chinese behavior in East Asia in post Maoist era, and the second section will analyze China’s role in East Asia by looking at Chinese role in institutional mechanism, economic integration and combatting terrorism in East Asia.

Keywords: East Asia, regionalism, institutionlism, economic integration

Procedia PDF Downloads 347
16465 Nanotechnology in Construction as a Building Security

Authors: Hanan Fayez Hussein

Abstract:

‘Due to increasing environmental challenges and security problems in the world such as global warming, storms, and terrorism’, humans have discovered new technologies and new materials in order to program daily life. As providing physical and psychological security is one of the primary functions of architecture, so in order to provide security, building must prevents unauthorized entry and harm to occupant and reduce the threat of attack by making building less attractive targets by new technologies such as; Nanotechnology, which has emerged as a major science and technology focus of the 21st century and will be the next industrial revolution. Nanotechnology is control of the properties of matter, and it deals with structures of the size 100 nanometers or smaller in at least one dimension and has wide application in various fields. The construction and architecture sectors were among the first to be identified as a promising application area for nanotechnology. The advantages of using nanomaterials in construction are enormous, and promises heighten building security by utilizing the strength of building materials to make our buildings more secure and get smart home. Access barriers such as wall and windows could incorporate stronger materials benefiting from nano-reinforcement utilizing nanotubes and nano composites to act as protective cover. Carbon nanotubes, as one of nanotechnology application, can be designed up to 250 times stronger than steel. Nano-enabled devices and materials offer both enhanced and, in some cases, completely new defence systems. In the addition, the small amount of carbon nanoparticles to the construction materials such as; cement, concrete, wood, glass, gypson, and steel can make these materials act as defence elements. This paper highlights the fact that nanotechnology can impact the future global security and how building’s envelop can act as a defensive cover for the building and can be resistance to any threats can attack it. Then focus on its effect on construction materials such as; Concrete can obtain by nanoadditives excellent mechanical, chemical, and physical properties with less material, which can acts as a precautionary shield to the building.

Keywords: nanomaterial, global warming, building security, smart homes

Procedia PDF Downloads 45
16464 Models to Estimate Monthly Mean Daily Global Solar Radiation on a Horizontal Surface in Alexandria

Authors: Ahmed R. Abdelaziz, Zaki M. I. Osha

Abstract:

Solar radiation data are of great significance for solar energy system design. This study aims at developing and calibrating new empirical models for estimating monthly mean daily global solar radiation on a horizontal surface in Alexandria, Egypt. Day length hours, sun height, day number, and declination angle calculated data are used for this purpose. A comparison between measured and calculated values of solar radiation is carried out. It is shown that all the proposed correlations are able to predict the global solar radiation with excellent accuracy in Alexandria.

Keywords: solar energy, global solar radiation, model, regression coefficient

Procedia PDF Downloads 369
16463 Targeting Violent Extremist Narratives: Applying Network Targeting Techniques to the Communication Functions of Terrorist Groups

Authors: John Hardy

Abstract:

Over the last decade, the increasing utility of extremist narratives to the operational effectiveness of terrorist organizations has been evidenced by the proliferation of inspired or affiliated attacks across the world. Famous examples such as regional al-Qaeda affiliates and the self-styled “Islamic State” demonstrate the effectiveness of leveraging communication technologies to disseminate propaganda, recruit members, and orchestrate attacks. Terrorist organizations with the capacity to harness the communicative power offered by digital communication technologies and effective political narratives have held an advantage over their targets in recent years. Terrorists have leveraged the perceived legitimacy of grass-roots actors to appeal to a global audience of potential supporters and enemies alike, and have wielded a proficiency in profile-raising which remains unmatched by counter terrorism narratives around the world. In contrast, many attempts at propagating official counter-narratives have been received by target audiences as illegitimate, top-down and impersonally bureaucratic. However, the benefits provided by widespread communication and extremist narratives have come at an operational cost. Terrorist organizations now face a significant challenge in protecting their access to communications technologies and authority over the content they create and endorse. The dissemination of effective narratives has emerged as a core function of terrorist organizations with international reach via inspired or affiliated attacks. As such, it has become a critical function which can be targeted by intelligence and security forces. This study applies network targeting principles which have been used by coalition forces against a range of non-state actors in the Middle East and South Asia to the communicative function of terrorist organizations. This illustrates both a conceptual link between functional targeting and operational disruption in the abstract and a tangible impact on the operational effectiveness of terrorists by degrading communicative ability and legitimacy. Two case studies highlight the utility of applying functional targeting against terrorist organizations. The first case is the targeted killing of Anwar al-Awlaki, an al-Qaeda propagandist who crafted a permissive narrative and effective propaganda videos to attract recruits who committed inspired terrorist attacks in the US and overseas. The second is a series of operations against Islamic State propagandists in Syria, including the capture or deaths of a cadre of high profile Islamic State members, including Junaid Hussain, Abu Mohammad al-Adnani, Neil Prakash, and Rachid Kassim. The group of Islamic State propagandists were linked to a significant rise in affiliated and enabled terrorist attacks and were subsequently targeted by law enforcement and military agencies. In both cases, the disruption of communication between the terrorist organization and recruits degraded both communicative and operational functions. Effective functional targeting on member recruitment and operational tempo suggests that narratives are a critical function which can be leveraged against terrorist organizations. Further application of network targeting methods to terrorist narratives may enhance the efficacy of a range of counter terrorism techniques employed by security and intelligence agencies.

Keywords: countering violent extremism, counter terrorism, intelligence, terrorism, violent extremism

Procedia PDF Downloads 271
16462 The Nexus between Climate Change and Criminality: The Nigerian Experience

Authors: Dagaci Aliyu Manbe, Anthony Abah Ebonyi

Abstract:

The increase in global temperatures is worsened by frequent natural events and human activities. Climate change has taken a prominent space in the global discourse on crime and criminality. Compared to when the subject centred around the discussion on the depletion of the ozone layer and global warming, today, the narrative revolves around the implications of changes in weather and climatic conditions in relations to violent crimes or conflict that traverse vast social, economic, and political spaces in different countries. Global warming and climate change refer to an increase in average global temperatures in the Earth’s near-surface air and oceans, which occurs due to human activities such as deforestation and the burning of fossil fuel such as gas flaring. The trend is projected to continue, if unchecked. This paper seeks to explore the nexus between climate change and criminality in Nigeria. It further examines the main ecological changes that predispose conflict dynamics of security threats factored by climate change to peaceful co-existence in Nigeria. It concludes with some recommendations on the way forward.

Keywords: conflict, climate change, criminality, global warning, peace

Procedia PDF Downloads 140
16461 Global Analysis of Modern Economic Sanctions

Authors: I. L. Yakushev

Abstract:

Economic sanctions are an integral part of the foreign policy repertoire of States. Increasingly, States and international organizations are resorting to sanctions to address a variety of issues -from fighting corruption to preventing the use of nuclear weapons. Over time, the ways in which economic sanctions have been used have changed, especially over the past two decades. In the late 1990s, the recognition of the humanitarian harm of economic sanctions and the "War on Terrorism" after the events of September 11, 2001, led to serious changes in the structure and mechanisms of their application. Questions about how these coercive tools work, when they are applied, what consequences they have, and when they are successful are still being determined by research conducted in the second half of the 20th century. The conclusions drawn from past cases of sanctions may not be fully applicable to the current sanctions policy. In the second half of the 20th century, most cases of sanctions were related to the United States, and it covered restrictions on international trade. However, over the past two decades, the European Union, the United Nations, and China have also been the main initiators of sanctions. Modern sanctions include targeted and financial restrictions and are applied against individuals, organizations, and companies. Changing the senders, targets, stakeholders, and economic instruments used in the sanctions policy has serious implications for effectiveness and results. The regulatory and bureaucratic infrastructure necessary to implement and comply with modern economic sanctions has become more reliable. This evolution of sanctions has provided the scientific community with an opportunity to study new issues of coercion and return to the old ones. The economic sanctions research program should be developed to be relevant for understanding the application of modern sanctions and their consequences.

Keywords: global analysis, economic sanctions, targeted sanctions, foreign policy, domestic policy, United Nations, European Union, USA, economic pressure

Procedia PDF Downloads 34
16460 Understanding Loc Trade in Kashmir: References of Global Episodes in Arena of Economy and Confidence Building Measure

Authors: Aarushi Baloria, Joshina Jamwal

Abstract:

The paper attempts to understand the genesis of the Kashmir conflict, the LoC trade, and the various challenges which impede LoC trade. The paper further understands how this trade assists in mitigating tension between the countries and act as a conference building measure (CBM). The paper discusses later on the positive aspects of LoC trade with the help of statistical data like increase in state's economy along with negatives like smuggling of arms, drugs, swapping and interchanging of Hawala money and other unconstitutional activities like terrorism that took place on trade points across LoC. Moreover, the paper also mentioned in the international context; the episodes of Ireland of Europe, Palestine of Middle East, Uganda of Africa not only as transaction step but also as a peace channel between the fragmented parts. Thus, the paper, in a nutshell, reflects how the trade across LoC benefited in various psychological, economic, and political reasons, and it is worth taking risk, taking its overall positive things into consideration.

Keywords: drugs, economy, international, peace, psychological, trade

Procedia PDF Downloads 110
16459 The Media and Reportage of Boko Haram Insurgency in Nigeria

Authors: Priscilla Marcus

Abstract:

The mass media was a force to reckon with in the struggle and attainment of Nigeria’s independence in 1960 and since then, the Nigerian media has carved a niche for itself in performing its traditional role of education, information, entertainment, shaping of opinions and swinging of views of the society on knotty national issues. Boko Haram insurgency in Nigeria which emerged from an unnoticed, negligible and quiet beginning, has turned out daring, monstrous and unstoppable. This paper examines The Media and Reportage of Boko Haram Insurgency in Nigeria and to suggest strategies the mass media could adopt in combating this form of terrorism. Data for the study were collected from a variety of sources including the print and electronic media. The major observation of this study is that the mass media have an enormous role to play if Boko Haram’s activities are to be combated. It argued that even though the media houses are just doing their job – reporting the incident(s) as they occur, thus keeping the citizens abreast of facts; the rate at which news keeps coming regarding the activities of the sect has portrayed the media as information dissemination and terror campaign spread. It also argued that the ceaseless reporting has not translated to a decrease in the activities of the sect or increase in the level of government actions to check the insurgency. However, the information being disseminated is enlightening the populace and also creating an atmosphere of panic and insecurity. It further argued that the media should move beyond mere recitation of events to providing the public with knowledge needed to make things better. This is because the sect has been accorded too much undeserved and unnecessary publicity while the government on the other hand has been portrayed, albeit indirectly as a weak organization incapable of handling the ‘more organized’ Boko Haram. The study, concluded that, to effectively address the problem of this form of terrorism in Nigeria, the media have to brace up to the task of uncovering activities of the sect in appreciation of their watch-dog role.

Keywords: Boko Haram, insurgency, mass media, Nigeria

Procedia PDF Downloads 286
16458 A Case Study: Teachers Education Program in a Global Context

Authors: In Hoi Lee, Seong Baeg Kim, Je Eung Jeon, Gwang Yong Choi, Joo Sub Lee, Ik Sang Kim

Abstract:

Recently, the interest of globalization in the field of teacher education has increased. In the U.S., the government is trying to enhance the quality of education through a global approach in education. To do so, the schools in the U.S. are recruiting teachers with global capability from countries like Korea where competent teachers are being trained. Meanwhile, in the case of Korea, although excellent teachers have been cultivated every year, due to a low birth rate it is not easy to become a domestic teacher. To solve the trouble that the two countries are facing, the study first examines the demand and necessity of globalization in the field of teacher education between Korea and the U.S. Second, we propose a new project, called the ‘Global Teachers University (GTU)’ program to satisfy the demands of both countries. Finally, we provide its implications to build the future educational cooperation for teacher training in a global context.

Keywords: educational cooperation, globalization, teachers education program, teacher training institutions

Procedia PDF Downloads 468
16457 Pilot-free Image Transmission System of Joint Source Channel Based on Multi-Level Semantic Information

Authors: Linyu Wang, Liguo Qiao, Jianhong Xiang, Hao Xu

Abstract:

In semantic communication, the existing joint Source Channel coding (JSCC) wireless communication system without pilot has unstable transmission performance and can not effectively capture the global information and location information of images. In this paper, a pilot-free image transmission system of joint source channel based on multi-level semantic information (Multi-level JSCC) is proposed. The transmitter of the system is composed of two networks. The feature extraction network is used to extract the high-level semantic features of the image, compress the information transmitted by the image, and improve the bandwidth utilization. Feature retention network is used to preserve low-level semantic features and image details to improve communication quality. The receiver also is composed of two networks. The received high-level semantic features are fused with the low-level semantic features after feature enhancement network in the same dimension, and then the image dimension is restored through feature recovery network, and the image location information is effectively used for image reconstruction. This paper verifies that the proposed multi-level JSCC algorithm can effectively transmit and recover image information in both AWGN channel and Rayleigh fading channel, and the peak signal-to-noise ratio (PSNR) is improved by 1~2dB compared with other algorithms under the same simulation conditions.

Keywords: deep learning, JSCC, pilot-free picture transmission, multilevel semantic information, robustness

Procedia PDF Downloads 89