Search results for: military component
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3059

Search results for: military component

2939 Human Factors Considerations in New Generation Fighter Planes to Enhance Combat Effectiveness

Authors: Chitra Rajagopal, Indra Deo Kumar, Ruchi Joshi, Binoy Bhargavan

Abstract:

Role of fighter planes in modern network centric military warfare scenarios has changed significantly in the recent past. New generation fighter planes have multirole capability of engaging both air and ground targets with high precision. Multirole aircraft undertakes missions such as Air to Air combat, Air defense, Air to Surface role (including Air interdiction, Close air support, Maritime attack, Suppression and Destruction of enemy air defense), Reconnaissance, Electronic warfare missions, etc. Designers have primarily focused on development of technologies to enhance the combat performance of the fighter planes and very little attention is given to human factor aspects of technologies. Unique physical and psychological challenges are imposed on the pilots to meet operational requirements during these missions. Newly evolved technologies have enhanced aircraft performance in terms of its speed, firepower, stealth, electronic warfare, situational awareness, and vulnerability reduction capabilities. This paper highlights the impact of emerging technologies on human factors for various military operations and missions. Technologies such as ‘cooperative knowledge-based systems’ to aid pilot’s decision making in military conflict scenarios as well as simulation technologies to enhance human performance is also studied as a part of research work. Current and emerging pilot protection technologies and systems which form part of the integrated life support systems in new generation fighter planes is discussed. System safety analysis application to quantify the human reliability in military operations is also studied.

Keywords: combat effectiveness, emerging technologies, human factors, systems safety analysis

Procedia PDF Downloads 118
2938 Democracy and Security Challenge in Nigeria, 1999, Till Date

Authors: Abdulsalami M. Deji

Abstract:

Prolonged military incursion in Nigeria politics which favored the oligarchy brought agitation for democratic rule it exacerbated ethnicity integration of minority for fear of domination. The advent of democracy ushered in new breath of life to Nigerians from the shackle of military oppression to democratic governance. Democratic rule became a mirage as a result of prevalent insecurity in Nigeria; effort to bring lasting peace to all sections of the country had not yielded positive result till date. In the process of struggling for democracy among ethnic groups in Nigeria, they had instituted various militia groups defending the interest of their identity due to unequal distribution of wealth by military junta. When democracy came on board, these various militia groups became demons hunting democratic institutions. Quest by the successful government to find lasting solution has proved abortive. The security of politics which guaranteed stability is not visible in Nigeria, what we have now is politics of security. The unrest in Nigeria today has cripple socio-political and economy of the nation; the growth of economy favored elites without meaningful impact on the common man. This paper focus on the effects of democracy on Nigerians and, how security under democratic rule has hindered dividends of democracy since 1999-till date and way forward. The source is strictly base on secondary source from textbook, newspapers, internet, and journals.

Keywords: democracy, interest, militia, security

Procedia PDF Downloads 309
2937 Identifying Missing Component in the Bechdel Test Using Principal Component Analysis Method

Authors: Raghav Lakhotia, Chandra Kanth Nagesh, Krishna Madgula

Abstract:

A lot has been said and discussed regarding the rationale and significance of the Bechdel Score. It became a digital sensation in 2013, when Swedish cinemas began to showcase the Bechdel test score of a film alongside its rating. The test has drawn criticism from experts and the film fraternity regarding its use to rate the female presence in a movie. The pundits believe that the score is too simplified and the underlying criteria of a film to pass the test must include 1) at least two women, 2) who have at least one dialogue, 3) about something other than a man, is egregious. In this research, we have considered a few more parameters which highlight how we represent females in film, like the number of female dialogues in a movie, dialogue genre, and part of speech tags in the dialogue. The parameters were missing in the existing criteria to calculate the Bechdel score. The research aims to analyze 342 movies scripts to test a hypothesis if these extra parameters, above with the current Bechdel criteria, are significant in calculating the female representation score. The result of the Principal Component Analysis method concludes that the female dialogue content is a key component and should be considered while measuring the representation of women in a work of fiction.

Keywords: Bechdel test, dialogue genre, parts of speech tags, principal component analysis

Procedia PDF Downloads 100
2936 Penetration Analysis for Composites Applicable to Military Vehicle Armors, Aircraft Engines and Nuclear Power Plant Structures

Authors: Dong Wook Lee

Abstract:

This paper describes a method for analyzing penetration for composite material using an explicit nonlinear Finite Element Analysis (FEA). This method may be used in the early stage of design for the protection of military vehicles, aircraft engines and nuclear power plant structures made of composite materials. This paper deals with simple ballistic penetration tests for composite materials and the FEA modeling method and results. The FEA was performed to interpret the ballistic field test phenomenon regarding the damage propagation in the structure subjected to local foreign object impact.

Keywords: computer aided engineering, finite element analysis, impact analysis, penetration analysis, composite material

Procedia PDF Downloads 96
2935 Leadership in Future Operational Environment

Authors: M. Şimşek

Abstract:

Rapidly changing factors that affect daily life also affect operational environment and the way military leaders fulfill their missions. With the help of technological developments, traditional linearity of conflict and war has started to fade away. Furthermore, mission domain has broadened to include traditional threats, hybrid threats and new challenges of cyber and space. Considering the future operational environment, future military leaders need to adapt themselves to the new challenges of the future battlefield. But how to decide what kind of features of leadership are required to operate and accomplish mission in the new complex battlefield? In this article, the main aim is to provide answers to this question. To be able to find right answers, first leadership and leadership components are defined, and then characteristics of future operational environment are analyzed. Finally, leadership features that are required to be successful in redefined battlefield are explained.

Keywords: future operational environment, leadership, leadership components

Procedia PDF Downloads 407
2934 Simplified Analysis Procedure for Seismic Evaluation of Tall Building at Structure and Component Level

Authors: Tahir Mehmood, Pennung Warnitchai

Abstract:

Simplified static analysis procedures such Nonlinear Static Procedure (NSP) are gaining popularity for the seismic evaluation of buildings. However, these simplified procedures accounts only for the seismic responses of the fundamental vibration mode of the structure. Some other procedures which can take into account the higher modes of vibration, lack in accuracy to determine the component responses. Hence, such procedures are not suitable for evaluating the structures where many vibration modes may participate significantly or where component responses are needed to be evaluated. Moreover, these procedures were found to either computationally expensive or tedious to obtain individual component responses. In this paper, a simplified but accurate procedure is studied. It is called the Uncoupled Modal Response History Analysis (UMRHA) procedure. In this procedure, the nonlinear response of each vibration mode is first computed, and they are later on combined into the total response of the structure. The responses of four tall buildings are computed by this simplified UMRHA procedure and compared with those obtained from the NLRHA procedure. The comparison shows that the UMRHA procedure is able to accurately compute the global responses, i.e., story shears and story overturning moments, floor accelerations and inter-story drifts as well as the component level responses of these tall buildings with heights varying from 20 to 44 stories. The required computational effort is also extremely low compared to that of the Nonlinear Response History Analysis (NLRHA) procedure.

Keywords: higher mode effects, seismic evaluation procedure, tall buildings, component responses

Procedia PDF Downloads 319
2933 Indo-US Strategic Collaboration in Space Capabilities and its Effect on the Stability of South Asian Region

Authors: Shahab Khan, Damiya Saghir

Abstract:

With the advent of space technology, a new era began where space, considered the new ‘High ground,’ is used for a variety of commercial (communications, weather and navigational information, Earth resources monitoring and imagery) and military applications (surveillance, tracking, reconnaissance and espionage of adversaries). With the ever-evolving geo-political environment, where now the US foreseeing India as a counterbalance to China’s economic and military rise, significant growth in strategic collaboration between US and India has been witnessed, particularly in the space domain. This is creating a strategic imbalance in South Asia with implications for all regional countries. This research explores the present and future of Indo-US strategic collaboration in the space domain with envisaged effects and challenges for countries in the South Asian region.

Keywords: space, satellites, Indo-US strategic agreements in space domain, balance of power in South Asian region

Procedia PDF Downloads 84
2932 CompPSA: A Component-Based Pairwise RNA Secondary Structure Alignment Algorithm

Authors: Ghada Badr, Arwa Alturki

Abstract:

The biological function of an RNA molecule depends on its structure. The objective of the alignment is finding the homology between two or more RNA secondary structures. Knowing the common functionalities between two RNA structures allows a better understanding and a discovery of other relationships between them. Besides, identifying non-coding RNAs -that is not translated into a protein- is a popular application in which RNA structural alignment is the first step A few methods for RNA structure-to-structure alignment have been developed. Most of these methods are partial structure-to-structure, sequence-to-structure, or structure-to-sequence alignment. Less attention is given in the literature to the use of efficient RNA structure representation and the structure-to-structure alignment methods are lacking. In this paper, we introduce an O(N2) Component-based Pairwise RNA Structure Alignment (CompPSA) algorithm, where structures are given as a component-based representation and where N is the maximum number of components in the two structures. The proposed algorithm compares the two RNA secondary structures based on their weighted component features rather than on their base-pair details. Extensive experiments are conducted illustrating the efficiency of the CompPSA algorithm when compared to other approaches and on different real and simulated datasets. The CompPSA algorithm shows an accurate similarity measure between components. The algorithm gives the flexibility for the user to align the two RNA structures based on their weighted features (position, full length, and/or stem length). Moreover, the algorithm proves scalability and efficiency in time and memory performance.

Keywords: alignment, RNA secondary structure, pairwise, component-based, data mining

Procedia PDF Downloads 430
2931 A Comprehensive Approach in Calculating the Impact of the Ground on Radiated Electromagnetic Fields Due to Lightning

Authors: Lahcene Boukelkoul

Abstract:

The influence of finite ground conductivity is of great importance in calculating the induced voltages from the radiated electromagnetic fields due to lightning. In this paper, we try to give a comprehensive approach to calculate the impact of the ground on the radiated electromagnetic fields to lightning. The vertical component of lightning electric field is calculated with a reasonable approximation assuming a perfectly conducting ground in case the observation point does not exceed a few kilometres from the lightning channel. However, for distant observation points the radiated vertical component of lightning electric field is attenuated due finitely conducting ground. The attenuation is calculated using the expression elaborated for both low and high frequencies. The horizontal component of the electric field, however, is more affected by a finite conductivity of a ground. Besides, the contribution of the horizontal component of the electric field, to induced voltages on an overhead transmission line, is greater than that of the vertical component. Therefore, the calculation of the horizontal electric field is great concern for the simulation of lightning-induced voltages. For field to transmission lines coupling the ground impedance is calculated for early time behaviour and for low frequency range.

Keywords: power engineering, radiated electromagnetic fields, lightning-induced voltages, lightning electric field

Procedia PDF Downloads 376
2930 Modern Day Second Generation Military Filipino Amerasians and Ghosts of the U.S. Military Prostitution System in West Central Luzon's 'AMO Amerasian Triangle'

Authors: P. C. Kutschera, Elena C. Tesoro, Mary Grace Talamera-Sandico, Jose Maria G. Pelayo III

Abstract:

Second generation military Filipino Amerasians comprise a formidable contemporary segment of the estimated 250,000-plus biracial Amerasians in the Philippines today. Overall, they are a stigmatized and socioeconomically marginalized diaspora, historically; they were abandoned or estranged by U.S. military personnel fathers assigned during the century-long Colonial, Post-World War II and Cold War Era of permanent military basing (1898-1992). Indeed, U.S. military personnel remain stationed in smaller numbers in the Philippines today. This inquiry is an outgrowth of two recent small sample studies. The first surfaced the impact of the U.S. military prostitution system on formation of the ‘Derivative Amerasian Family Construct’ on first generation Amerasians; a second, qualitative case study suggested the continued effect of the prostitution systems' destructive impetuous on second generation Amerasians. The intent of this current qualitative, multiple-case study was to actively seek out second generation sex industry toilers. The purpose was to focus further on this human phenomenon in the post-basing and post-military prostitution system eras. As background, the former military prostitution apparatus has transformed into a modern dynamic of rampant sex tourism and prostitution nationwide. This is characterized by hotel and resorts offering unrestricted carnal access, urban and provincial brothels (casas), discos, bars and pickup clubs, massage parlors, local barrio karaoke bars and street prostitution. A small case study sample (N = 4) of female and male second generation Amerasians were selected. Sample formation employed a non-probability ‘snowball’ technique drawing respondents from the notorious Angeles, Metro Manila, Olongapo City ‘AMO Amerasian Triangle’ where most former U.S. military installations were sited and modern sex tourism thrives. A six-month study and analysis of in-depth interviews of female and male sex laborers, their families and peers revealed a litany of disturbing, and troublesome experiences. Results showed profiles of debilitating human poverty, history of family disorganization, stigmatization, social marginalization and the ghost of the military prostitution system and its harmful legacy on Amerasian family units. Emerging were testimonials of wayward young people ensnared in a maelstrom of deep economic deprivation, familial dysfunction, psychological desperation and societal indifference. The paper recommends that more study is needed and implications of unstudied psychosocial and socioeconomic experiences of distressed younger generations of military Amerasians require specific research. Heretofore apathetic or disengaged U.S. institutions need to confront the issue and formulate activist and solution-oriented social welfare, human services and immigration easement policies and alternatives. These institutions specifically include academic and social science research agencies, corporate foundations, the U.S. Congress, and Departments of State, Defense and Health and Human Services, and Homeland Security (i.e. Citizen and Immigration Services) It is them who continue to endorse a laissez-faire policy of non-involvement over the entire Filipino Amerasian question. Such apathy, the paper concludes, relegates this consequential but neglected blood progeny to the status of humiliating destitution and exploitation. Amerasians; thus, remain entrapped in their former colonial, and neo-colonial habitat. Ironically, they are unwitting victims of a U.S. American homeland that fancies itself geo-politically as a strong and strategic military treaty ally of the Philippines in the Western Pacific.

Keywords: Asian Americans, diaspora, Filipino Amerasians, military prostitution, stigmatization

Procedia PDF Downloads 456
2929 Contemporary Army Prints for Women’s Wear Kurti

Authors: Shaleni Bajpai, Nancy Stephan

Abstract:

Various designs of women’s kurtis with different styles, motifs and prints were available in market but none of the kurtis was found in army print. Mostly army prints are used for men’s wear like jackets, trousers, caps, bags. The main colours available in military prints were beige, parrot green, red, dark blue, light blue, orange, bottle green, pink and the original military green colour. As the original camouflage is banned in civil wears so the different variety and colours were used in this study to popularize army prints in women’s wear. The aim of this project was to construct different styles of women kurti’s with various colours of different military prints. Mood board, inspiration and colour board was prepared to design the kurtis. The fabric used for construction was army printed poplin and crepe. The designing and construction of kurti’s were divided into two categories such as - casual and party wear. Casual wear had simple silhouette like a-line, high-low and waist coat style whereas party wear included princess line, panelled and bandhani style. Structured questionnaire was prepared to assess the acceptance of newly designed kurtis with respect to colour combination, overall appearance and cost. Purposively sampling method was adopted for selection of respondents. Opinion was taken from 100 women of various age groups. The result and analysis was presented through graph and percentage. Kurtis in army print of both the categories were appreciated by the respondents.

Keywords: army, kurti, casual wear, party wear

Procedia PDF Downloads 274
2928 Using Heat-Mask in the Thermoforming Machine for Component Positioning in Thermoformed Electronics

Authors: Behnam Madadnia

Abstract:

For several years, 3D-shaped electronics have been rising, with many uses in home appliances, automotive, and manufacturing. One of the biggest challenges in the fabrication of 3D shape electronics, which are made by thermoforming, is repeatable and accurate component positioning, and typically there is no control over the final position of the component. This paper aims to address this issue and present a reliable approach for guiding the electronic components in the desired place during thermoforming. We have proposed a heat-control mask in the thermoforming machine to control the heating of the polymer, not allowing specific parts to be formable, which can assure the conductive traces' mechanical stability during thermoforming of the substrate. We have verified our approach's accuracy by applying our method on a real industrial semi-sphere mold for positioning 7 LEDs and one touch sensor. We measured the LEDs' position after thermoforming to prove the process's repeatability. The experiment results demonstrate that the proposed method is capable of positioning electronic components in thermoformed 3D electronics with high precision.

Keywords: 3D-shaped electronics, electronic components, thermoforming, component positioning

Procedia PDF Downloads 64
2927 Estimation of Functional Response Model by Supervised Functional Principal Component Analysis

Authors: Hyon I. Paek, Sang Rim Kim, Hyon A. Ryu

Abstract:

In functional linear regression, one typical problem is to reduce dimension. Compared with multivariate linear regression, functional linear regression is regarded as an infinite-dimensional case, and the main task is to reduce dimensions of functional response and functional predictors. One common approach is to adapt functional principal component analysis (FPCA) on functional predictors and then use a few leading functional principal components (FPC) to predict the functional model. The leading FPCs estimated by the typical FPCA explain a major variation of the functional predictor, but these leading FPCs may not be mostly correlated with the functional response, so they may not be significant in the prediction for response. In this paper, we propose a supervised functional principal component analysis method for a functional response model with FPCs obtained by considering the correlation of the functional response. Our method would have a better prediction accuracy than the typical FPCA method.

Keywords: supervised, functional principal component analysis, functional response, functional linear regression

Procedia PDF Downloads 40
2926 Should the U.S. Rely on Drone Strikes to Combat the Islamic State? Why Deploying a Drone Campaign against ISIS Will Do Nothing to Address the Causes of the Insurgency or Prevent Its Resurgence?

Authors: Danielle Jablanski

Abstract:

This article addresses the use of drone strikes under international law and the intersection between Islamic law and current terrorist trends worldwide. It breaks down the legality of drone strikes under international law and dissects certain aspects of their usage in modern warfare; i.e. concepts of directly participating in hostilities and the role of CIA operators. The article then looks at international paradigms of law enforcement versus the use of military force in relation to terrorism. Lastly, it describes traditional aspects of Islamic law and several interpretations of the law today as applied to widespread campaigns of terrorism, namely that of the recent group ISIS or ISIL operating between the battlegrounds of Iraq and Syria. The piece concludes with appraisals for moving forward on the basis of honing in on reasons for terrorism and negative opinions of solely military campaigns to dismantle or disrupt terror organizations and breeding grounds.

Keywords: international law, terrorism, ISIS, islamic law

Procedia PDF Downloads 444
2925 Efficient Utilization of Unmanned Aerial Vehicle (UAV) for Fishing through Surveillance for Fishermen

Authors: T. Ahilan, V. Aswin Adityan, S. Kailash

Abstract:

UAV’s are small remote operated or automated aerial surveillance systems without a human pilot aboard. UAV’s generally finds its use in military and special operation application, a recent growing trend in UAV’s finds its application in several civil and non military works such as inspection of power or pipelines. The objective of this paper is the augmentation of a UAV in order to replace the existing expensive sonar (sound navigation and ranging) based equipment amongst small scale fisherman, for whom access to sonar equipment are restricted due to limited economic resources. The surveillance equipment’s present in the UAV will relay data and GPS location onto a receiver on the fishing boat using RF signals, using which the location of the schools of fishes can be found. In addition to this, an emergency beacon system is present for rescue operations and drone recovery.

Keywords: UAV, Surveillance, RF signals, fishing, sonar, GPS, video stream, school of fish

Procedia PDF Downloads 432
2924 A Case Study of Physical and Psychological Forces in the Nigerian Criminal and Military Interrogations

Authors: Onimisi Ekuh Abdullahi, Lasbat Omoshalewa Akinsemoyin

Abstract:

In Nigeria, over two decades now, there has been a steady increase in the insecurity of human lives and physical properties. In the South-South Nigeria, there is an acute insecurity of militants destroying oil pipe-lines and kidnapping cases; in the Middle-Belt zone, insecurity centers on kidnapping and in a few states crises between Herdsmen and Farmers range like wildfire; in the South-Western zone, kidnapping is vile, in the North-East zone the issue of Boko Haram has become World-wide concern, and in North-west zone, cattle rustlers and religious crisis are of great concern. At the initial stage, the Nigerian Police Force was called upon to quell the crisis. It soon became obvious that the dimension of the crisis was beyond police force. The Nigerian Armed Forces were called to maintain peace and order because the magnitude of the crisis was threatening the national unity and cohesion. The main objective of this paper, was to examine the investigative techniques of criminal by the military in Nigeria. Specifically to examine the physical and psychological force; the abusive techniques and tactics; and suggest modern psychological techniques of interrogating criminals accepted to Human Right Activists and the rule of law. The process is to create room behaviour and practices that carefully monitored the trust and reliability of admissions produced by Psychological manipulative process in Nigeria.

Keywords: military, Nigerian criminal, physical, psychological force

Procedia PDF Downloads 128
2923 Supervised-Component-Based Generalised Linear Regression with Multiple Explanatory Blocks: THEME-SCGLR

Authors: Bry X., Trottier C., Mortier F., Cornu G., Verron T.

Abstract:

We address component-based regularization of a Multivariate Generalized Linear Model (MGLM). A set of random responses Y is assumed to depend, through a GLM, on a set X of explanatory variables, as well as on a set T of additional covariates. X is partitioned into R conceptually homogeneous blocks X1, ... , XR , viewed as explanatory themes. Variables in each Xr are assumed many and redundant. Thus, Generalised Linear Regression (GLR) demands regularization with respect to each Xr. By contrast, variables in T are assumed selected so as to demand no regularization. Regularization is performed searching each Xr for an appropriate number of orthogonal components that both contribute to model Y and capture relevant structural information in Xr. We propose a very general criterion to measure structural relevance (SR) of a component in a block, and show how to take SR into account within a Fisher-scoring-type algorithm in order to estimate the model. We show how to deal with mixed-type explanatory variables. The method, named THEME-SCGLR, is tested on simulated data.

Keywords: Component-Model, Fisher Scoring Algorithm, GLM, PLS Regression, SCGLR, SEER, THEME

Procedia PDF Downloads 373
2922 Differentiation between Different Rangeland Sites Using Principal Component Analysis in Semi-Arid Areas of Sudan

Authors: Nancy Ibrahim Abdalla, Abdelaziz Karamalla Gaiballa

Abstract:

Rangelands in semi-arid areas provide a good source for feeding huge numbers of animals and serving environmental, economic and social importance; therefore, these areas are considered economically very important for the pastoral sector in Sudan. This paper investigates the means of differentiating between different rangelands sites according to soil types using principal component analysis to assist in monitoring and assessment purposes. Three rangeland sites were identified in the study area as flat sandy sites, sand dune site, and hard clay site. Principal component analysis (PCA) was used to reduce the number of factors needed to distinguish between rangeland sites and produce a new set of data including the most useful spectral information to run satellite image processing. It was performed using selected types of data (two vegetation indices, topographic data and vegetation surface reflectance within the three bands of MODIS data). Analysis with PCA indicated that there is a relatively high correspondence between vegetation and soil of the total variance in the data set. The results showed that the use of the principal component analysis (PCA) with the selected variables showed a high difference, reflected in the variance and eigenvalues and it can be used for differentiation between different range sites.

Keywords: principal component analysis, PCA, rangeland sites, semi-arid areas, soil types

Procedia PDF Downloads 147
2921 Determining a Suitable Maintenance Measure for Gentelligent Components Using Case-Based Reasoning

Authors: Maximilian Winkens, Peter Nyhuis

Abstract:

Components with sensory properties such as gentelligent components developed at the Collaborative Research Center 653 offer a new angle on the full utilization of the remaining service life in case of a preventive maintenance. The developed methodology of component status driven maintenance analyses the stress data obtained during the component's useful life and on the basis of this knowledge assesses the type of maintenance called for in this case. The procedure is derived from the case-based reasoning method and will be elucidated in detail. The method's functionality is demonstrated with real-life data obtained during test runs of a racing car prototype.

Keywords: gentelligent component, preventive maintenance, case-based reasoning, sensory

Procedia PDF Downloads 338
2920 'Marching into the Classroom' a Second Career in Education for Ex-Military Personnel

Authors: Mira Karnieli, Shosh Veitzman

Abstract:

In recent years, due to transitions in teacher education, professional identities are changing. In many countries, the education system is absorbing ex-military personnel. The aim of this research is to investigate the phenomenon of retired officers in Israel who choose education as a second career and the training provided. The phenomenon of retired military permanent-service officers pursuing a career in education is not unique to Israel. In the United States and the United Kingdom, for example, government-supported accelerated programs (Troops to Teachers) are run for ex-military personnel (soldiers and officers) with a view to their entry into the education system. These programs direct the ex-military personnel to teacher education and training courses to obtain teaching certification. The present study, however, focused specifically on senior officers who have a full academic education, most of the participants hold second degrees in a variety of fields. They all retired from a rich military career, including roles in command, counseling, training, guidance, and management. The research included 80 participants' men and women. Data was drowning from in-depth interviews and questioner. The conceptual framework which guided this study was mixed methods. The qualitative-phenomenological methodology, using in-depth interviews, and a questioner. The study attempted to understand the motives and personal perceptions behind the choice of teaching. Were they able to identify prior skills that they had accumulated throughout their years of service? What were these skills? In addition, which (if any) would stand them in good stead for a career in teaching? In addition, they were asked how they perceived the training program’s contribution to their professionalization and integration in the education system. The data was independently coded by the researchers. Subsequently, the data was discussed by both researchers, codes were developed, and conceptual categories were formed. Analysis of the data shows this population to be characterized by the high motivation for studying, professionalization, contribution to society and a deep sense of commitment to education. All of them had a profession which they acquired in the past which is not related to education. However, their motives for choosing to teach are related to their wish to give expression to their leadership experience and ability, the desire to have an influence and to bring about change. This is derived from personal commitment, as well as from a worldview and value system that are supportive of education. In other words, they feel committed and act out of a sense of vocation. In conclusion, it will emphasize that all the research participants began working in education immediately upon completing the training program. They perceived this path as a way of realizing a mission despite the low status of the teaching profession in Israel and low teacher salaries.

Keywords: cross-boundary skills, lifelong learning, professional identities, teaching as a second career, training program

Procedia PDF Downloads 172
2919 Research on Autonomous Controllability of BeiDou Navigation Satellite System Based on Knowledge Transformation

Authors: Hang Ju, Changmin Zhu

Abstract:

The development level of the BeiDou Navigation Satellite System (BDS) can strongly reflect national defense strength as an important spatial information infrastructure. BDS can be not only used for military purposes, such as intelligence gathering, nuclear explosion monitoring, emergency communications, but also for location services, transportation, mapping, precision agriculture. In order to ensure the national defense security and the wide application of BDS in civil and military areas, BDS must be autonomous and controllable. As a complex system of knowledge-intensive, knowledge transformation runs through the whole process of research and development, production, operation, and maintenance of BDS. Based on the perspective of knowledge transformation, this paper expounds on the meaning of socialization, externalization, combination, and internalization of knowledge transformation, and the coupling relationship of autonomy and control on the basis of analyzing the status quo and problems of the autonomy and control of BDS. The autonomous and controllable framework of BDS based on knowledge transformation is constructed from six dimensions of management capability, R&D capability, technical capability, manufacturing capability, service support capability, and application capability. It can provide support for the smooth implementation of information security policy, provide a reference for the autonomy and control of the upstream and downstream industrial chains in Beidou, and provide a reference for the autonomous and controllable research of aerospace components, military measurement test equipment, and other related industries.

Keywords: knowledge transformation, BeiDou Navigation Satellite System, autonomy and control, framework

Procedia PDF Downloads 157
2918 Intelligence Failures and Infiltration: The Case of the Ethiopian Army 1977-1991

Authors: Fantahun Ibrahim

Abstract:

The Ethiopian army was one of the largest and most heavily armed ground forces in Africa between 1974 and 1991. It scored a decisive victory over Somalia’s armed forces in March 1978. It, however, failed to withstand the combined onslaught of the northern insurgents from Tigray and Eritrea and finally collapsed in 1991. At the heart of the problem was the army’s huge intelligence failure. The northern insurgents, on the other hand, had a cutting edge in intelligence gathering. Among other things they infiltrated the army high command and managed to get top secrets about the army. Commanders who had fallen into the hands of the insurgents in several battles were told to send letters to their colleagues in the command structure and persuade them to work secretly for the insurgents. Some commanders did work for the insurgents and played a great role in the undoing of military operations. Insurgent commanders were able to warn their fighters about air strikes before jet fighters took off from airfields in the northern theatre. It was not uncommon for leaders of insurgents to get the full details of military operations days before their implementation. Such intelligence failures led to major military disasters like the fall of Afabet (March, 1988), Enda Sellase (February, 1989), Massawa and Debre Tabor (February, 1990), Karra Mishig, Meragna and Alem Ketema (June, 1990). This paper, therefore, seeks to investigate the army’s intelligence failures using untapped archival documents kept at the Ministry of National Defence in Addis Ababa and interviewing key former commanders of the army and ex-leaders of the insurgents.

Keywords: Ethiopian army, intelligence, infiltration, insurgents

Procedia PDF Downloads 277
2917 Image Segmentation of Visual Markers in Robotic Tracking System Based on Differential Evolution Algorithm with Connected-Component Labeling

Authors: Shu-Yu Hsu, Chen-Chien Hsu, Wei-Yen Wang

Abstract:

Color segmentation is a basic and simple way for recognizing the visual markers in a robotic tracking system. In this paper, we propose a new method for color segmentation by incorporating differential evolution algorithm and connected component labeling to autonomously preset the HSV threshold of visual markers. To evaluate the effectiveness of the proposed algorithm, a ROBOTIS OP2 humanoid robot is used to conduct the experiment, where five most commonly used color including red, purple, blue, yellow, and green in visual markers are given for comparisons.

Keywords: color segmentation, differential evolution, connected component labeling, humanoid robot

Procedia PDF Downloads 574
2916 Attitudes Towards Immigrants: Evidence from Veterans of Colonial Wars in Africa

Authors: Margarida Matos, João Pereira dos Santos, José Tavares

Abstract:

Anti-minority discrimination is a persistent phenomenon with long-run effects. While there is a vast literature in economics and psychology that shows that personality and beliefs are not fixed and can be altered by experience, particularly in the so-called impressionable years in early adulthood, less is known about the long-lasting impacts of major events occurring during this time on minority attitudes. In this paper, we study the impact of serving in the military on long-term attitudes towards minorities. For many, military conscription and serving in war are unique life-shaping events. In the context of military service, individuals from different socioeconomic backgrounds interact and learn with each other, potentially changing their views and attitudes in a persistent manner. A prominent theory about the change of attitudes is the contact theory. It suggests that prejudice can be decreased if members of the groups interact with one another. The present paper adds to the literature by providing evidence from a more complicated setting involving the exposure to combat. We study the attitudes of veterans of the Portuguese Colonial War between 1961 and 1974, what was the latest war between African independence movements and Europeans. More than 70 percent of military age Portuguese men were drafted every year and sent to fight in Africa in the widest draft in post-World War II Western Europe. The contact between Portuguese and African soldiers was both cooperative as well as adversarial. Portuguese fought against but also alongside locally recruited African men, who represented half of the Portuguese contingent for substantial periods. We use data from the European Social Survey to identify Portuguese citizens likely to have been drafted and were send to fight in the former Portuguese colonies in Africa. We show that men likely to have fought in African wars are more accepting of immigrants than women of their same cohort, as well as than males from younger and older cohorts. The use of corresponding cohorts from Spain as placebo tests confirms our results. Our findings also hold in a regression discontinuity design setting.

Keywords: attitudes, immigration, war in Africa, veterans, portugal

Procedia PDF Downloads 52
2915 Optimal Feature Extraction Dimension in Finger Vein Recognition Using Kernel Principal Component Analysis

Authors: Amir Hajian, Sepehr Damavandinejadmonfared

Abstract:

In this paper the issue of dimensionality reduction is investigated in finger vein recognition systems using kernel Principal Component Analysis (KPCA). One aspect of KPCA is to find the most appropriate kernel function on finger vein recognition as there are several kernel functions which can be used within PCA-based algorithms. In this paper, however, another side of PCA-based algorithms -particularly KPCA- is investigated. The aspect of dimension of feature vector in PCA-based algorithms is of importance especially when it comes to the real-world applications and usage of such algorithms. It means that a fixed dimension of feature vector has to be set to reduce the dimension of the input and output data and extract the features from them. Then a classifier is performed to classify the data and make the final decision. We analyze KPCA (Polynomial, Gaussian, and Laplacian) in details in this paper and investigate the optimal feature extraction dimension in finger vein recognition using KPCA.

Keywords: biometrics, finger vein recognition, principal component analysis (PCA), kernel principal component analysis (KPCA)

Procedia PDF Downloads 339
2914 Usage of Military Continuity Management System for Flooding Solution

Authors: Jiri Palecek, Radmila Hajkova, Alena Oulehlova, Hana Malachova

Abstract:

The increase of emergency incidents and crisis situations requires proactive crisis management of authorities and for its solution. Application business continuity management systems help the crisis management authorities quickly and responsibly react to events and to plan more effectively and efficiently powers and resources. The main goal of this article is describing Military Continuity Management System (MCMS) based on the principles of Business Continuity Management System (BCMS) for dealing with floods in the territory of the selected municipalities. There are explained steps of loading, running and evaluating activities in the software application MCMS. Software MCMS provides complete control over the tasks, contribute a comprehensive and responsible approach solutions to solution floods in the municipality.

Keywords: business continuity management, floods plan, flood activity, level of flood activity

Procedia PDF Downloads 251
2913 Development of Management System of the Experience of Defensive Modeling and Simulation by Data Mining Approach

Authors: D. Nam Kim, D. Jin Kim, Jeonghwan Jeon

Abstract:

Defense Defensive Modeling and Simulation (M&S) is a system which enables impracticable training for reducing constraints of time, space and financial resources. The necessity of defensive M&S has been increasing not only for education and training but also virtual fight. Soldiers who are using defensive M&S for education and training will obtain empirical knowledge and know-how. However, the obtained knowledge of individual soldiers have not been managed and utilized yet since the nature of military organizations: confidentiality and frequent change of members. Therefore, this study aims to develop a management system for the experience of defensive M&S based on data mining approach. Since individual empirical knowledge gained through using the defensive M&S is both quantitative and qualitative data, data mining approach is appropriate for dealing with individual empirical knowledge. This research is expected to be helpful for soldiers and military policy makers.

Keywords: data mining, defensive m&s, management system, knowledge management

Procedia PDF Downloads 226
2912 Concept, Design and Implementation of Power System Component Simulator Based on Thyristor Controlled Transformer and Power Converter

Authors: B. Kędra, R. Małkowski

Abstract:

This paper presents information on Power System Component Simulator – a device designed for LINTE^2 laboratory owned by Gdansk University of Technology in Poland. In this paper, we first provide an introductory information on the Power System Component Simulator and its capabilities. Then, the concept of the unit is presented. Requirements for the unit are described as well as proposed and introduced functions are listed. Implementation details are given. Hardware structure is presented and described. Information about used communication interface, data maintenance and storage solution, as well as used Simulink real-time features are presented. List and description of all measurements is provided. Potential of laboratory setup modifications is evaluated. Lastly, the results of experiments performed using Power System Component Simulator are presented. This includes simulation of under frequency load shedding, frequency and voltage dependent characteristics of groups of load units, time characteristics of group of different load units in a chosen area.

Keywords: power converter, Simulink Real-Time, Matlab, load, tap controller

Procedia PDF Downloads 220
2911 The Importance of Information in Psychological Operations for Counterterrorism

Authors: Abbas Fazelinia

Abstract:

Terrorism is not a new phenomenon to the world, yet it remains difficult to define and to counter. Countering terrorism requires several measures that must be taken at the same time. Counterterrorism strategies of most countries depend on military measures. However, those strategies should also focus on nonlethal measures, such as economic, political, and social measures. The psychological dimensions of terrorism must be understood, evaluated, and used in countering terrorism. This study suggests that psychological operations, as nonlethal military operations, can be used to influence individuals not to join terrorist organizations and to facilitate defections from terrorist organizations. However, in order to implement effective psychological operations, one has to have appropriate intelligence about terrorist organizations. Examining terrorist organizations help us to identify their vulnerabilities and obtain this intelligence. This article concludes that terrorists’ motivations, terrorist organizations’ radicalization, recruitment, and conversion processes, ideology, goals, strategies, and general structure form the intelligence requirement for psychological operations in counterterrorism. The methodology used in this article is a mixed method.

Keywords: psychological operations, terrorist, counterterrorism, terrorism

Procedia PDF Downloads 301
2910 China's New "Pivots" in the Indian Ocean: Towards "String of Pearls" Strategy 2.0

Authors: Mike Chia-Yu Huang

Abstract:

China’s port facility construction projects in the Indian Ocean (IO) region, Gwadar Port and Djibouti Port projects in particular, have led to a heated debate among both Chinese and Western strategists over whether the country has literally been carrying out its “string of pearls” strategy, an alleged Chinese plan to challenge America’s military predominance in South Asia. Even though the Chinese government repeatedly denied the existence of such a strategy and highlighted the civilian/commercial nature of its port projects, it has significantly enhanced its strategic cooperation with littoral countries in the IO region since the “One Belt One Road” initiative was introduced by Chinese President Xi Jinping in 2013. Whether China does have a plan to expand its sphere of military influence westward concerns the balance of power in the IO region. If the answer is positive, the security environment there will be changed drastically. This paper argues that rather than simply copying the U.S. model of developing overseas military bases along the IO periphery, Beijing has been deliberating a more sophisticated plan for its physical presence there: creating a new set of “overseas strategic pivots.” These “pivots,” semi-military and semi-commercial in nature, are designed to help Beijing sustain its anti-piracy operations in the Gulf of Aden and serve as forward stations for the transportation of China’s imported energy and merchandise. They can support the Chinese Navy’s operations overseas but are not supposed to undertake face-to-face combat missions. This upgraded Chinese scheme can be identified as “string of pearls” strategy 2.0. Moreover, it is expected to help China deepen its roots in the IO region, implying that Beijing has to a large extent scratched its old diplomatic philosophy which highlighted the merits of non-interference and nonalignment. While a full-scale maritime confrontation between China and the U.S.-India security alliance is unlikely to be witnessed in the near future, an ambitious Chinese plan to step into the global maritime domain has been evidently shown.

Keywords: Chinese navy, Djibouti, Gwadar, Indian Ocean, string of pearls strategy

Procedia PDF Downloads 307