Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 323

Search results for: irregular warfare

323 Western and Eastern Ways of Special Warfare: The Strategic History of Special Operations from Western and Eastern Sources

Authors: Adam Kok Wey Leong

Abstract:

Special operations were supposedly a new way of irregular warfare that was officially formed during World War 2. For example, the famous British Special Operations Executive (SOE) and the Americans’ Office for Strategic Services (OSS) – the forerunners of modern day CIA were born in World War 2. These special operations units were tasked with the conduct of sabotage and subversion activities behind enemy lines, placing great importance in forming Fifth Column activities and supporting resistance movements. This pointed to a paradoxical argument that modern day special operations is a product of Western modern military innovation but utilizing Eastern ways of ‘ungentlemanly’ warfare. This thesis is superfluous as special operations had been well practised by both ancient Western empires such as the Greeks and Romans, and around the same time in the East, such as in China, and Japan. This paper will describe the practice of special operations, first from the Western military history of the Greeks during the Peloponnesian war. It will then highlight the similar practice of special operations by the Near Eastern Assassins and Eastern militaries by using examples from the Chinese and the Japanese. This paper propounds that special operations, or ways of warfare as a whole, has no cultural and geographical divide, but rather very similarly practiced by men from all over the world. Ideas of fighting, killing and ultimately winning a war have similar undertones – attempts to find ways to win economically and at the least time.

Keywords: special operations, strategic culture, ways of warfare, Sun Tzu, Frontinus

Procedia PDF Downloads 279
322 Vulnerability Assessment of Vertically Irregular Structures during Earthquake

Authors: Pranab Kumar Das

Abstract:

Vulnerability assessment of buildings with irregularity in the vertical direction has been carried out in this study. The constructions of vertically irregular buildings are increasing in the context of fast urbanization in the developing countries including India. During two reconnaissance based survey performed after Nepal earthquake 2015 and Imphal (India) earthquake 2016, it has been observed that so many structures are damaged due to the vertically irregular configuration. These irregular buildings are necessary to perform safely during seismic excitation. Therefore, it is very urgent demand to point out the actual vulnerability of the irregular structure. So that remedial measures can be taken for protecting those structures during natural hazard as like earthquake. This assessment will be very helpful for India and as well as for the other developing countries. A sufficient number of research has been contributed to the vulnerability of plan asymmetric buildings. In the field of vertically irregular buildings, the effort has not been forwarded much to find out their vulnerability during an earthquake. Irregularity in vertical direction may be caused due to irregular distribution of mass, stiffness and geometrically irregular configuration. Detailed analysis of such structures, particularly non-linear/ push over analysis for performance based design seems to be challenging one. The present paper considered a number of models of irregular structures. Building models made of both reinforced concrete and brick masonry are considered for the sake of generality. The analyses are performed with both help of finite element method and computational method.The study, as a whole, may help to arrive at a reasonably good estimate, insight for fundamental and other natural periods of such vertically irregular structures. The ductility demand, storey drift, and seismic response study help to identify the location of critical stress concentration. Summarily, this paper is a humble step for understanding the vulnerability and framing up the guidelines for vertically irregular structures.

Keywords: ductility, stress concentration, vertically irregular structure, vulnerability

Procedia PDF Downloads 160
321 New Requirements of the Fifth Dimension of War: Planning of Cyber Operation Capabilities

Authors: Mehmet Kargaci

Abstract:

Transformation of technology and strategy has been the main factor for the evolution of war. In addition to land, maritime, air and space domains, cyberspace has become the fifth domain with emerge of internet. The current security environment has become more complex and uncertain than ever before. Moreover, warfare has evaluated from conventional to irregular, asymmetric and hybrid war. Weak actors such as terrorist organizations and non-state actors has increasingly conducted cyber-attacks against strong adversaries. Besides, states has developed cyber capabilities in order to defense critical infrastructure regarding the cyber threats. Cyber warfare will be key in future security environment. Although what to do has been placed in operational plans, how to do has lacked and ignored as to cyber defense and attack. The purpose of the article is to put forward a model for how to conduct cyber capabilities in a conventional war. First, cyber operations capabilities will be discussed. Second put forward the necessities of cyberspace environment and develop a model for how to plan an operation using cyber operation capabilities, finally the assessment of the applicability of cyber operation capabilities and offers will be presented.

Keywords: cyber war, cyber threats, cyber operation capabilities, operation planning

Procedia PDF Downloads 255
320 The Evolution of Strike and Intelligence Functions in Special Operations Forces

Authors: John Hardy

Abstract:

The expansion of special operations forces (SOF) in the twenty-first century is often discussed in terms of the size and disposition of SOF units. Research regarding the number SOF personnel, the equipment SOF units procure, and the variety of roles and mission that SOF fulfill in contemporary conflicts paints a fascinating picture of changing expectations for the use of force. A strong indicator of the changing nature of SOF in contemporary conflicts is the fusion of strike and intelligence functions in the SOF in many countries. What were once more distinct roles on the kind of battlefield generally associated with the concept of conventional warfare have become intermingled in the era of persistent conflict which SOF face. This study presents a historical analysis of the co-evolution of the intelligence and direct action functions carried out by SOF in counterterrorism, counterinsurgency, and training and mentoring missions between 2004 and 2016. The study focuses primarily on innovation in the US military and the diffusion of key concepts to US allies first, and then more broadly afterward. The findings show that there were three key phases of evolution throughout the period of study, each coinciding with a process of innovation and doctrinal adaptation. The first phase was characterized by the fusion of intelligence at the tactical and operational levels. The second phase was characterized by the industrial counterterrorism campaigns used by US SOF against irregular enemies in Iraq and Afghanistan. The third phase was characterized by increasing forward collection of actionable intelligence by SOF force elements in the course of direct action raids. The evolution of strike and intelligence functions in SOF operations between 2004 and 2016 was significantly influenced by reciprocity. Intelligence fusion led to more effective targeting, which then increased intelligence collection. Strike and intelligence functions were then enhanced by greater emphasis on intelligence exploitation during operations, which further increased the effectiveness of both strike and intelligence operations.

Keywords: counterinsurgency, counterterrorism, intelligence, irregular warfare, military operations, special operations forces

Procedia PDF Downloads 160
319 Deployment of Attack Helicopters in Conventional Warfare: The Gulf War

Authors: Mehmet Karabekir

Abstract:

Attack helicopters (AHs) are usually deployed in conventional warfare to destroy armored and mechanized forces of enemy. In addition, AHs are able to perform various tasks in the deep, and close operations – intelligence, surveillance, reconnaissance, air assault operations, and search and rescue operations. Apache helicopters were properly employed in the Gulf Wars and contributed the success of campaign by destroying a large number of armored and mechanized vehicles of Iraq Army. The purpose of this article is to discuss the deployment of AHs in conventional warfare in the light of Gulf Wars. First, the employment of AHs in deep and close operations will be addressed regarding the doctrine. Second, the US armed forces AH-64 doctrinal and tactical usage will be argued in the 1st and 2nd Gulf Wars.

Keywords: attack helicopter, conventional warfare, gulf wars

Procedia PDF Downloads 383
318 Comparison of the Seismic Response of Planar Regular and Irregular Steel Frames

Authors: Robespierre Chavez, Eden Bojorquez, Alfredo Reyes-Salazar

Abstract:

This study compares the seismic response of regular and vertically irregular steel frames determined by nonlinear time history analysis and by using several sets of earthquake records, which are divided in two categories: The first category having 20 stiff-soil ground motion records obtained from the NGA database, and the second category having 30 soft-soil ground motions recorded in the Lake Zone of Mexico City and exhibiting a dominant period (Ts) of two seconds. The steel frames in both format regular and irregular were designed according to the Mexico City Seismic Design Provisions (MCSDP). The effects of irregularity throught the height on the maximum interstory drifts are estimated.

Keywords: irregular steel frames, maximum interstory drifts, seismic response, seismic records

Procedia PDF Downloads 243
317 Study the Dynamic Behavior of Irregular Buildings by the Analysis Method Accelerogram

Authors: Beciri Mohamed Walid

Abstract:

Some architectural conditions required some shapes often lead to an irregular distribution of masses, rigidities and resistances. The main object of the present study consists in estimating the influence of the irregularity both in plan and in elevation which presenting some structures on the dynamic characteristics and his influence on the behavior of this structures. To do this, it is necessary to make apply both dynamic methods proposed by the RPA99 (spectral modal method and method of analysis by accelerogram) on certain similar prototypes and to analyze the parameters measuring the answer of these structures and to proceed to a comparison of the results.

Keywords: structure, irregular, code, seismic, method, force, period

Procedia PDF Downloads 223
316 Ultra High Performance Concrete Using Special Aggregates for Irregular Structures (the New Concrete Technology)

Authors: Arjun, A. D. Singh

Abstract:

Concrete the basic material using in construction across the global these days. The purpose of this special concrete is to provide extra strength and stability for irregular structure where the center of gravity is disturbed. In this paper an effort has been made to use different type of material aggregates has been discussed. We named As "STAR Aggregates" which has qualities to resist Shear, tension and compression forces. We have been divided into coarse aggregates and fine aggregates according to their sizes. Star Aggregates has interlocking behavior and cutting edge technology. Star aggregates had been draft and deign in Auto CAD and then analysis in ANSYS software. by using special aggregates we deign concrete grade of M40 for mega structures and irregular structure. This special concrete with STAR aggregates use in construction for irregular structure like Bridges, Skyscrapers or in deigned buildings.

Keywords: star aggregates, high performance concrete, material aggregates, interlocking

Procedia PDF Downloads 473
315 Effect of National Sovereignty of Non-Citizens Human Rights Standards: Mediterranean Irregular Immigrants Case

Authors: Azin Karami, Bahareh Heydari

Abstract:

There is a difference between national sovereignty ( national security guarantee) and human rights standards (human security guarantee). Under the pretext of providing security for the majority, Governments violate human rights standards and lead to populism. This paper illustrates despite the human rights standards of non-citizens, they mostly confront different practical and social realities. (a large gap between the reality and the truth). This paper has focused on one of vulnerable irregular non-citizens immigrants from Mediterranean . In addition, it has considered challenges of the basic and primary human rights standards of this group. It shows how government policies affect the flow of irregular immigration. This paper is based upon UN data about Mediterranean immigrants and polls answered by 68 people who intended to migrate from Mediterranean (28 female and 40 male people, the average age of 30 to 40). The model is supposed to be a convenient one to present objective, real evidence of irregular immigrants and discusses the challenges that this group of immigrants confront them .This paper shows clear concept of immigrants.

Keywords: human rights, human security, national sovereignty, irregular immigrants

Procedia PDF Downloads 87
314 Contemporary Technological Developments in Urban Warfare

Authors: Mehmet Ozturk, Serdal Akyuz, Halit Turan

Abstract:

By the evolving technology, the nature of the war has been changed since the beginning of the history. In the first generation war, the bayonet came to the fore in battlefields; successively; in the second-generation firepower; in the third generation maneuver. Today, in the fourth-generation, fighters, sides, and even fighters’ borders are unclear; consequently, lines of the battles have lost their significance. Furthermore, the actors in the battles can be state or non-state, military, paramilitary or civilian. In order to change the balance according to their interests, parties have utilized the urban areas as warfare. The main reason for using urban areas as a battlefield is the imbalance between parties. To balance the power strength, exploiting technological developments has utmost importance. There are many newly developed technologies for urban warfare such as change in the size of the unmanned aerial vehicle, increased usage of unmanned ground vehicles (especially in supply and evacuation purposes), systems showing the behind of the wall, simulations used for educational purposes. This study will focus on the technological equipment being used for urban warfare.

Keywords: urban warfare, unmanned ground vehicles, technological developments, nature of the war

Procedia PDF Downloads 325
313 Investigation of Changes of Physical Properties of the Poplar Wood in Radial and Longitudinal Axis at Chaaloos Zone

Authors: Afshin Veisi

Abstract:

In this study, the physical properties of wood in poplar wood (Populous sp.) were analyzed in longitudinal and radial directions of the stem. Three Populous Alba tree were cut in chaloos zone and from each tree, 3 discs were selected at 130cm, half of tree and under of crown. The test samples from pith to bark (heartwood to sapwood) were prepared from these discs for measuring the involved properties such as, wet, dry and critical specific gravity, porosity, volume shrinkage and swelling based on the ASTM standard, and data in two radial and longitudinal directions in the trank were statistically analyzed. Such as, variations of wet, dry and critical specific gravity had in radial direction respectively: irregular increase, increase and increase, and in longitudinal direction respectively: irregular decrease, irregular increase and increase. Results of variations to moisture content and porosity show that in radial direction respectively: irregular increasing and decreasing, and in longitudinal direction from down to up respectively: irregular decreasing and stability. Volume shrinkage and swelling variations show in radial direction irregular and in longitudinal axial regular decreasing.

Keywords: poplar wood, physical properties, shrinkage, swelling, critical specific gravity, wet specific gravity, dry specific gravity

Procedia PDF Downloads 204
312 Asymmetric Warfare: Exploratory Study of the Implicit Defense Strategy of the People's Republic of China in 2012-2016

Authors: María Victoria Alvarez Magañini, Lautaro Nahuel Rubbi

Abstract:

According to different theories, the hegemonic war between the United States and the People's Republic of China seems to be imminent. However, nowadays, it is clear that China's conventional military capacity is inferior to that of the United States. Nevertheless, the conditions that in the past were considered to be an indicator of validity in asymmetrical warfare, at present, in a possible asymmetric war scenario, are no longer considered to be taken as such. The military capacity is not the only concept that represents the main indicator of victory. The organisation and the use of forces are also an essential part of it. The present paper aims to analyze the Chinese Defense Strategy in relation to the concept of asymmetric warfare in the face of a possible war with the United States. The starting point will be developed on the basis of application of the theory which corresponds to the concept aforementioned making focus on recent developments of the People’s Republic of China in the field of non-conventional defense. A comparative analysis of the conventional forces of both powers/countries will also be carried out.

Keywords: asymmetric warfare, China, United States, hegemonic warfare

Procedia PDF Downloads 181
311 Qualitative Review of Seismic Response of Vertically Irregular Building Frames

Authors: Abdelhammid Chibane

Abstract:

This study summarizes state-of-the-art knowledge in the seismic response of vertically irregular building frames. Criteria defining vertical irregularity as per the current building codes have been discussed. A review of studies on the seismic behaviour of vertically irregular structures along with their findings has been presented. It is observed that building codes provide criteria to classify the vertically irregular structures and suggest dynamic analysis to arrive at design lateral forces. Most of the studies agree on the increase in drift demand in the tower portion of set-back structures and on the increase in seismic demand for buildings with discontinuous distributions in mass, stiffness, and strength. The largest seismic demand is found for the combined-stiffness-and-strength irregularity.

Keywords: mass irregularity, set-back structure, stiffness irregularity, strength irregularity, vertical irregularity

Procedia PDF Downloads 188
310 Conceptualizing the Cyber Insecurity Risk in the Ethics of Automated Warfare

Authors: Otto Kakhidze, Hoda Alkhzaimi, Adam Ramey, Nasir Memon

Abstract:

This paper provides an alternative, cyber security based a conceptual framework for the ethics of automated warfare. The large body of work produced on fully or partially autonomous warfare systems tends to overlook malicious security factors as in the possibility of technical attacks on these systems when it comes to the moral and legal decision-making. The argument provides a risk-oriented justification to why technical malicious risks cannot be dismissed in legal, ethical and policy considerations when warfare models are being implemented and deployed. The assumptions of the paper are supported by providing a broader model that contains the perspective of technological vulnerabilities through the lenses of the Game Theory, Just War Theory as well as standard and non-standard defense ethics. The paper argues that a conventional risk-benefit analysis without considering ethical factors is insufficient for making legal and policy decisions on automated warfare. This approach will provide the substructure for security and defense experts as well as legal scholars, ethicists and decision theorists to work towards common justificatory grounds that will accommodate the technical security concerns that have been overlooked in the current legal and policy models.

Keywords: automated warfare, ethics of automation, inherent hijacking, security vulnerabilities, risk, uncertainty

Procedia PDF Downloads 284
309 Comparing and Contrasting Western and Eastern Ways of War: Building a Universal Strategic Theory

Authors: Adam Kok Wey Leong

Abstract:

The comparison between the Western ways of war and Eastern ways of war has raised contemporary debates on the validity of these arguments. The Western way of war is popularly propounded by Victor Davis Hanson as originating from the Greek hoplite tactics, direct military maneuvers, democratic principles and social freedom and cohesion that has continued to yield military success for the Western powers for centuries. On the other hand, the Eastern way of war has been deemed as relying on indirect tactics, deception, and ruses. This often accepted notion of the divide between Western and Eastern style does not sustain in view of the available classical strategic texts from both sides from the same period that has proposed similar principles of warfare. This paper analyses the similarities between classical strategic texts on war from the Eastern perspective namely Sun Tzu’s Art of War with a similar temporal strategic text from the West which is Sextus Iuluis Frontinus’s Stratagematon, and deduces answers to this core research question - Does the hypothesis of the existence of distinctive Western and Eastern ways of warfare stands? The main thesis advanced by this research is that ways of warfare share universal principles, and it transcends cultural and spatial boundaries. Warfare is a human endeavour, and the same moral actions guide humans from different geo-cultural spheres in warfare’s objectives, which are winning over an enemy in the most economical way and serve as a mean to an end.

Keywords: ways of warfare, strategic culture, strategy, Sun Tzu, frontinus

Procedia PDF Downloads 207
308 Managing Maritime Security in the Mediterranean Sea: The Roles of the EU in Tackling Irregular Migration

Authors: Shazwanis Shukri

Abstract:

The Mediterranean Sea, at the crossroads of three continents has always been the focus of pan-European and worldwide attention. Over the past decade, the Mediterranean Sea has become a hotbed for irregular migration particularly from the African continent toward the Europe. Among the major transit routes in the Mediterranean Sea include the Strait of Gibraltar, Canary Island and island of Lampedusa. In recent years, Mediterranean Sea has witnessed significant numbers of accidents and shipwrecks involving the irregular migrants and refugees trying to reach Europe via the sea. The shipwrecks and traffickers exploitation of migrants draw most of the attention particularly for the European Union (EU). This incident has been a wakeup call for the EU and become the top political agenda in the EU policy to tackle irregular migration and human smuggling at sea. EU has repeatedly addressed irregular migration as one of the threats the EU and its citizens may be confronted with and therefore immediate measures are crucial to tackle the crisis. In light of this, various initiatives have been adopted by the EU to strengthen external border control and restrict access to irregular migrants, notably through the enforcement of Frontex and Eunavfor Med. This paper analyses current development of counter-migration operations by the EU in response to migration crisis in the Mediterranean Sea. The analysis is threefold. First, this study examines the patterns and trends of irregular migration’s movements from recent perspective. Second, this study concentrates on the evolution of the EU operations that are in place in the Mediterranean Sea, notably by Frontex and Eunavfor Med to curb the influx of irregular migrants to the European countries, including, among others, Greece and Italy. Third, this study investigates the EU approaches to fight against the proliferation of human trafficking networks at sea. This study is essential to determine the roles of the EU in tackling migration crisis and human trafficking in the Mediterranean Sea and the effectiveness of their counter-migration operations to reduce the number of irregular migrants travelling via the sea. Elite interviews and document analysis were used as a methodology in this study. The study discovers that the EU operations have successfully contributed to reduce the numbers of irregular migrant’s arrival to Europe. The study also shows that the operations were effective to disrupt smugglers business models particularly from Libya. This study provides essential understanding about the roles of the EU not limited to tackle the migration crisis and disrupt trafficking networks, but also pledged to prevent further loss of lives at sea.

Keywords: European union, frontex, irregular migration, Mediterranean sea

Procedia PDF Downloads 251
307 Paraplegic Dimensions of Asymmetric Warfare: A Strategic Analysis for Resilience Policy Plan

Authors: Sehrish Qayyum

Abstract:

In this age of constant technology, asymmetrical warfare could not be won. Attuned psychometric study confirms that screaming sometimes is more productive than active retaliation against strong adversaries. Asymmetric warfare is a game of nerves and thoughts with least vigorous participation for large anticipated losses. It creates the condition of paraplegia with partial but permanent immobility, which effects the core warfare operations, being screams rather than active retaliation. When one’s own power is doubted, it gives power to one’s own doubt to ruin all planning either done with superlative cost-benefit analysis. Strategically calculated estimation of asymmetric warfare since the early WWI to WWII, WWII-to Cold War, and then to the current era in three chronological periods exposits that courage makes nations win the battle of warriors to battle of comrades. Asymmetric warfare has been most difficult to fight and survive due to unexpectedness and being lethal despite preparations. Thoughts before action may be the best-assumed strategy to mix Regional Security Complex Theory and OODA loop to develop the Paraplegic Resilience Policy Plan (PRPP) to win asymmetric warfare. PRPP may serve to control and halt the ongoing wave of terrorism, guerilla warfare, and insurgencies, etc. PRPP, along with a strategic work plan, is based on psychometric analysis to deal with any possible war condition and tactic to save millions of innocent lives such that lost in Christchurch New Zealand in 2019, November 2015 Paris attacks, and Berlin market attacks in 2016, etc. Getting tangled into self-imposed epistemic dilemmas results in regret that becomes the only option of performance. It is a descriptive psychometric analysis of war conditions with generic application of probability tests to find the best possible options and conditions to develop PRPP for any adverse condition possible so far. Innovation in technology begets innovation in planning and action-plan to serve as a rheostat approach to deal with asymmetric warfare.

Keywords: asymmetric warfare, psychometric analysis, PRPP, security

Procedia PDF Downloads 51
306 Exploring Causes of Irregular Migration: Evidence from Rural Punjab, India

Authors: Kulwinder Singh

Abstract:

Punjab is one of the major labour exporting states of India. Every year more than 20,000 youths from Punjab attempt irregular migration. About 84 irregular migrants are from rural areas and 16 per cent from urban areas. Irregular migration could only be achieved if be organized through highly efficient international networks with the countries of origin, transit, and destination. A good number of Punjabis continue to immigrate into the UK for work through unauthorized means entering the country on visit visas and overstaying or getting ‘smuggled into’ the country with the help of transnational networks of agents. Although, the efforts are being made by the government to curb irregular migration through The Punjab Prevention of Human Smuggling Rules (2012, 2014) and Punjab Travel Regulation Act (2012), but yet it exists parallel to regular migration. Despite unprecedented miseries of irregular migrants and strict laws implemented by the state government to check this phenomenon, ‘why do Punjabis migrate abroad irregularly’ is the important question to answer. This study addresses this question through the comparison of irregular migration with regular one. In other words, this analysis reveals major causes, specifically economic ones, of irregular migration from rural Punjab. This study is unique by presenting economics of irregular migration, given previous studies emphasize the role of sociological and psychological factors. Addressing important question “why do Punjabis migrate abroad irregularly?”, the present study reveals that Punjabi, being far-sighted, endeavor irregular migration as it is, though, economically nonviable in short run, but offers lucrative economic gains as gets older. Despite its considerably higher cost viz-a-viz regular migration, it is the better employment option to irregular migrants with higher permanent income than local low paid jobs for which risking life has become the mindset of the rural Punjabis. Although, it carries considerably lower economic benefits as compared to regular migration, but provides the opportunity of migrating abroad to less educated, semi-skilled and language-test ineligible Punjabis who cannot migrate through regular channels. As its positive impacts on source and destination countries are evident, it might not be restricted, rather its effective management, through liberalising restrictive migration policies by destination nations, can protect the interests of all involved stakeholders.

Keywords: cost, migration, income, irregular, regular, remittances

Procedia PDF Downloads 53
305 International Humanitarian Law and the Challenges of New Technologies of Warfare

Authors: Uche A. Nnawulezi

Abstract:

Undoubtedly, despite all efforts made to achieve overall peace through the application of the principles of international humanitarian law, crimes against mankind which are of unprecedented concern to the whole world have remained unabated. The fall back on war as a technique for settling disputes between nations, individuals, countries and ethnic groups with accompanying toll of deaths and destruction of properties have remained a conspicuous component of human history. Indeed, to control this conduct of warfare and the dehumanization of individuals, a body of law aimed at regulating the impacts of conflicts and hostilities in the theater of war has become necessary. Thus, it is to examine the conditions in which international humanitarian law will apply and also to determine the extent of the challenges of new progressions of warfare that this study is undertaken. All through this examination, we grasped doctrinal approach wherein we used text books, journals, international materials and supposition of law specialists in the field of international humanitarian law. This paper shall examine the distinctive factors responsible for the rebelliousness to the rules of International Humanitarian Law and furthermore, shall proffer possible courses of action that will address the challenges of new technologies of warfare all over the world. Essentially, the basic proposals made in this paper if totally utilized may go far in ensuring a sufficient standard in the application of the rules of international humanitarian law as it relates to an increasingly frequent phenomenon of contemporary developments in technologies of warfare which has in recent past, made it more difficult for the most ideal application of the rules of international humanitarian law. This paper deduces that for a sustainable global peace to be achieved, the rules of International Humanitarian Law as it relates to the utilization of new technologies of warfare should be completely clung to and should be made a strict liability offense. Likewise, this paper further recommends the introduction of domestic criminal law punishment of serious contraventions of the rules of international humanitarian law.

Keywords: international, humanitarian law, new technologies, warfare

Procedia PDF Downloads 106
304 Unmanned Systems in Urban Areas

Authors: Abdullah Beyazkurk, Onur Ozdemir

Abstract:

The evolution of warfare has been affected from technological developments to a large extent. Another important factor that affected the evolution of warfare is the space. Technological developments became cornerstones for the organization of the forces on the field, while space of the battlefield gained importance with the introduction of urban areas as 'battlefields'. The use of urban areas as battlefields increased the casualty, while technological developments began to play a remedial role. Thus, the unmanned systems drew attention as the remedy. Today's widely used unmanned aerial vehicles have great effects on the operations. On the other hand, with the increasing urbanization, and the wide use of urban areas as battlefields make it a necessity to benefit from unmanned systems on the ground as well. This study focuses on the use of unmanned aerial systems as well as unmanned ground systems in urban warfare, with regards to their performance and cost affectivity. The study defends that the use of unmanned vehicles will be remedial for increasing casualty rates, while their precision and superhuman capacity will manifest the performance advantage. The findings of this study will help modern armies focus on unmanned systems, especially for the urban, anti-terror, or counter insurgency operations.

Keywords: technology, warfare, urban warfare, unmanned systems, unmanned ground vehicles, unmanned aerial vehicles

Procedia PDF Downloads 267
303 Warfare Ships at Ancient Egypt: Since Pre-Historic Era (3700 B.C.) Uptill the End of the 2nd Intermediate Period (1550 B.C.)

Authors: Mohsen Negmeddin

Abstract:

Throughout their history, ancient Egyptians had known several kinds and types of boats, which were made from two main kinds of materials, the local one, as the dried papyrus reeds and the local tree trunks, the imported one, as the boats which were made from Lebanon cedar tree trunks. A varied using of these boats, as the fish hunting small boats, the transportation and trade boats "Cargo Boats", as well as the ceremonial boats, and the warfare boats. The research is intending for the last one, the warfare boats and the river/maritime battles since the beginning of ancient Egyptian civilization at the pre-historic era up till the end of the second intermediate period, to reveal the kinds and types of those fighting ships before establishing the Egyptian navy at the beginning of the New Kingdome (1550-1770 B.C). Two methods will follow at this research, the mention of names and titles of these ships through the texts (ancient Egyptian language) resources, and the depiction of it at the scenes.

Keywords: the warfare boats, the maritime battles, the pre-historic era, the second intermediate period

Procedia PDF Downloads 195
302 Model Estimation and Error Level for Okike’s Merged Irregular Transposition Cipher

Authors: Okike Benjamin, Garba E. J. D.

Abstract:

The researcher has developed a new encryption technique known as Merged Irregular Transposition Cipher. In this cipher method of encryption, a message to be encrypted is split into parts and each part encrypted separately. Before the encrypted message is transmitted to the recipient(s), the positions of the split in the encrypted messages could be swapped to ensure more security. This work seeks to develop a model by considering the split number, S and the average number of characters per split, L as the message under consideration is split from 2 through 10. Again, after developing the model, the error level in the model would be determined.

Keywords: merged irregular transposition, error level, model estimation, message splitting

Procedia PDF Downloads 220
301 Seismic Response of Structures of Reinforced Concrete Buildings: Regular and Irregular Configurations

Authors: Abdelhammid Chibane

Abstract:

Often, for architectural reasons or designs, several buildings have a non-uniform profile in elevation. Depending on the configuration of the construction and the arrangements structural elements, the non-uniform profile in elevation (the recess) is considered concept of a combination of non-uniform distributions of strength, stiffness, weight and geometry along the height of irregular structures. Therefore, this type of configuration can induce irregular distribution load causing a serious concentration stresses at the discontinuity. This therefore requires a serious behavioral treatment buildings in an earthquake. If appropriate measures are not taken into account, structural irregularity may become a major source of damage during earthquakesEarth. In the past, several research investigations have identified differences in dynamic response of irregular and regular porches. Among the most notable differences are the increments of displacements and ductility applications in floors located above the level of the shoulder and an increase in the contribution of the higher modes cisaillement1 efforts, ..., 10. The para -ssismiques codes recommend the methods of analysis Dynamic (or modal history) to establish the forces of calculation instead of the static method equivalent, which is basically applicable only to regular structures without major discontinuities in the mass, rigidity and strength along the height 11, 12 .To investigate the effects of irregular profiles on the structures, the main objective of this study was the assessment of the inelastic response, in terms of applications of ductility four types of non-uniform multi-stage structures subjected to relatively severe earthquakes. In the This study, only the parallel responses are analyzed setback.

Keywords: buildings, concentration stresses, ductility, ductility, designs, irregular structures

Procedia PDF Downloads 198
300 Regular or Irregular: An Investigation of Medicine Consumption Pattern with Poisson Mixture Model

Authors: Lichung Jen, Yi Chun Liu, Kuan-Wei Lee

Abstract:

Fruitful data has been accumulated in database nowadays and is commonly used as support for decision-making. In the healthcare industry, hospital, for instance, ordering pharmacy inventory is one of the key decision. With large drug inventory, the current cost increases and its expiration dates might lead to future issue, such as drug disposal and recycle. In contrast, underestimating demand of the pharmacy inventory, particularly standing drugs, affects the medical treatment and possibly hospital reputation. Prescription behaviour of hospital physicians is one of the critical factor influencing this decision, particularly irregular prescription behaviour. If a drug’s usage amount in the month is irregular and less than the regular usage, it may cause the trend of subsequent stockpiling. On the contrary, if a drug has been prescribed often than expected, it may result in insufficient inventory. We proposed a hierarchical Bayesian mixture model with two components to identify physicians’ regular/irregular prescription patterns with probabilities. Heterogeneity of hospital is considered in our proposed hierarchical Bayes model. The result suggested that modeling the prescription patterns of physician is beneficial for estimating the order quantity of medication and pharmacy inventory management of the hospital. Managerial implication and future research are discussed.

Keywords: hierarchical Bayesian model, poission mixture model, medicines prescription behavior, irregular behavior

Procedia PDF Downloads 58
299 Determination of Complexity Level in Merged Irregular Transposition Cipher

Authors: Okike Benjamin, Garba Ejd

Abstract:

Today, it has been observed security of information along the superhighway is often compromised by those who are not authorized to have access to such information. In order to ensure the security of information along the superhighway, such information should be encrypted by some means to conceal the real meaning of the information. There are many encryption techniques out there in the market. However, some of these encryption techniques are often easily decrypted by adversaries. The researcher has decided to develop an encryption technique that may be more difficult to decrypt. This may be achieved by splitting the message to be encrypted into parts and encrypting each part separately and swapping the positions before transmitting the message along the superhighway. The method is termed Merged Irregular Transposition Cipher. Also, the research would determine the complexity level in respect to the number of splits of the message.

Keywords: transposition cipher, merged irregular cipher, encryption, complexity level

Procedia PDF Downloads 256
298 Determination of Complexity Level in Okike's Merged Irregular Transposition Cipher

Authors: Okike Benjami, Garba Ejd

Abstract:

Today, it has been observed security of information along the superhighway is often compromised by those who are not authorized to have access to such information. In other to ensure the security of information along the superhighway, such information should be encrypted by some means to conceal the real meaning of the information. There are many encryption techniques out there in the market. However, some of these encryption techniques are often decrypted by adversaries with ease. The researcher has decided to develop an encryption technique that may be more difficult to decrypt. This may be achieved by splitting the message to be encrypted into parts and encrypting each part separately and swapping the positions before transmitting the message along the superhighway. The method is termed Okike’s Merged Irregular Transposition Cipher. Also, the research would determine the complexity level in respect to the number of splits of the message.

Keywords: transposition cipher, merged irregular cipher, encryption, complexity level

Procedia PDF Downloads 205
297 Embedded Electrochemistry with Miniaturized, Drone-Based, Potentiostat System for Remote Detection Chemical Warfare Agents

Authors: Amer Dawoud, Jesy Motchaalangaram, Arati Biswakarma, Wujan Mio, Karl Wallace

Abstract:

The development of an embedded miniaturized drone-based system for remote detection of Chemical Warfare Agents (CWA) is proposed. The paper focuses on the software/hardware system design of the electrochemical Cyclic Voltammetry (CV) and Differential Pulse Voltammetry (DPV) signal processing for future deployment on drones. The paper summarizes the progress made towards hardware and electrochemical signal processing for signature detection of CWA. Also, the miniature potentiostat signal is validated by comparing it with the high-end lab potentiostat signal.

Keywords: drone-based, remote detection chemical warfare agents, miniaturized, potentiostat

Procedia PDF Downloads 50
296 Hidden Markov Movement Modelling with Irregular Data

Authors: Victoria Goodall, Paul Fatti, Norman Owen-Smith

Abstract:

Hidden Markov Models have become popular for the analysis of animal tracking data. These models are being used to model the movements of a variety of species in many areas around the world. A common assumption of the model is that the observations need to have regular time steps. In many ecological studies, this will not be the case. The objective of the research is to modify the movement model to allow for irregularly spaced locations and investigate the effect on the inferences which can be made about the latent states. A modification of the likelihood function to allow for these irregular spaced locations is investigated, without using interpolation or averaging the movement rate. The suitability of the modification is investigated using GPS tracking data for lion (Panthera leo) in South Africa, with many observations obtained during the night, and few observations during the day. Many nocturnal predator tracking studies are set up in this way, to obtain many locations at night when the animal is most active and is difficult to observe. Few observations are obtained during the day, when the animal is expected to rest and is potentially easier to observe. Modifying the likelihood function allows the popular Hidden Markov Model framework to be used to model these irregular spaced locations, making use of all the observed data.

Keywords: hidden Markov Models, irregular observations, animal movement modelling, nocturnal predator

Procedia PDF Downloads 163
295 Numerical Simulation of Phase Transfer during Cryosurgery for an Irregular Tumor Using Hybrid Approach

Authors: Rama Bhargava

Abstract:

In the current paper, numerical simulation has been performed for the two-dimensional time dependent Pennes’ heat transfer model which is solved for irregular diseased tumor cells. An elliptic cryoprobe of varying sizes is taken at the center of the computational domain in such a manner that the location of the probe is fixed throughout the computation. The phase transition occurs due to the effect of probe with infusion of different nanoparticles Au, Al₂O₃, Fe₃O₄. The cooling performance of these nanoparticles injected at very low temperature, has been studied by implementing a hybrid FEM/EFGM method in which the whole domain is decomposed into two subdomains. The results are shown in terms of temperature profile inside the computational domain. Rate of cooling is obtained for various nanoparticles and it is observed that infusion of Au nanoparticles is very much efficient in increasing the heating rate than other nanoparticles. Such numerical scheme has direct applications where the domain is irregular.

Keywords: cryosurgery, hybrid EFGM/FEM, nanoparticles, simulation

Procedia PDF Downloads 110
294 Seismic Isolation System for Irregular Structure with the Largest Isolation Building Area in the World

Authors: Houmame Benbouali

Abstract:

This paper introduces the design, analysis, tests and application of a new isolation system used in irregular structure, also briefly introduces the recent research, and development on seismic isolation of civil buildings in China. A very large platform (2 stories RC frame) with plane size 1500m wide and 2000m long was built to cover the city railway communication hub area. About 50 isolation house buildings (9 stories RC frame) with 480,000 M2 were built on the top floor of platform. A new advanced isolation system named Storied-Isolation was used to ensure the seismic safety for this irregular structure with the largest isolation house building area in the world. This new isolation system has been used widely in China. There are over 400 buildings with seismic isolation have been built in China until 2003. This paper will introduce the recent research, and development on seismic isolation of civil buildings in China, including the tendency of application on seismic isolation, different isolation systems, different design level being used, design codes, application status and examples of application. Also the paper makes discussion of some problems on the future development of seismic isolation in China.

Keywords: civil buildings, floor, irregular structure, seismic isolation

Procedia PDF Downloads 211