Search results for: root causes of terrorism
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1418

Search results for: root causes of terrorism

1328 Exploring the Determinants of Boko Haram Terrorism in Nigerian Security Systems and Economy

Authors: Abara Onu, Augustine Mina Ephraim, Emmanuel Teidi

Abstract:

Terrorism has been a major challenge and is so dare to the Nigerian government in recent times. The actions and activities of the Islamic sect known as Boko Haram had led to enormous loss of lives and properties in the country, mostly the Northern part of Nigeria. Some of these activities entails bombings, suicide attacks, intimidations, sporadic gunfire of the unarmed, blameless and innocent Nigerians, burning of police stations and churches, kidnappings, raping of school girls and women. Nigeria has also been included amongst one of the terrorist countries of the world. This has serious implications for the development of Nigerian economy. Although, Nigeria had made several worried hard work to deal with these challenges masqueraded by terrorism and insecurity in the country but the rate of insurgency and insecurity is still worrisome. The study looks at exploring the determinants of Boko Haram terrorism in Nigerian security systems and economy. Data used for the study work was from questionnaire administered, using Analysis of Variance (ANOVA) method to analyse the data. The result shows that Ideology and funding are significant basic factors that propelled the Boko Haram group in Nigeria. The Boko Haram disaster poses a significant threat to Nigeria’s economy and the military is the best option and solution in tackling the Boko Haram menace in Nigeria. The work x-rayed the following recommendations; government should declare war on terrorism and as well seek support and cooperation from international communities who in time or the other might have faced with this kind ugly experience and challenge and were able to tackle it. Nigerian Military needs to be more empowered with high dangerous weapons to combat the insurgency as well as beef up security across the Country to curb the threats.

Keywords: terrorism, economy, Boko Haram, Nigeria

Procedia PDF Downloads 237
1327 The Nexus between Socio-Economic Inequalities and the Talibanization in Pakistan’s Federally Administrated Tribal Areas

Authors: Sajjad Ahmed

Abstract:

Since September 2001, the Federally Administered Tribal Areas (FATA) have become a hotbed of Talibanization. The eruption of Talibanization has caused a catastrophic human and socio-economic cost on Pakistan ever since. The vast majority of extant studies have tended to focus on assessing the current disparaging and destructive condition of FATA as a product of the notorious 'Global War on Terrorism' and its consequences in the form of the Afghan war and the rising socio-political unrest in the region. This, however, is not the case. This study argues that the Talibanization has not happened overnight, the magma of current militant volcanic outburst has been stockpiled since the inception of Pakistan in 1947. The study claims that the Talibanization is the expression of the conflict between the privileged and the underprivileged. The prevailing situation in FATA warrants an in-depth analysis of the problem. By using a qualitative and quantitative research principle, this paper attempts to critically examine 'How is Talibanization in Pakistan connected with the political, social, and economic conditions in FATA?' The critical analyses of this study would assist to policymakers in order to formulate all-encompassing anti-radicalization policies to effectively root out Talibanization in FATA. This research intends to explore the undiscovered root causes of the problem and to suggest remedial measures.

Keywords: exclusion, FATA (Federally Administrated Tribal Areas), inequalities, marginalization, Pakistan, socio-economic, talibanization

Procedia PDF Downloads 112
1326 Cone Beam Computed Tomography: A Useful Diagnostic Tool to Determine Root Canal Morphology in a Sample of Egyptian Population

Authors: H. El-Messiry, M. El-Zainy, D. Abdelkhalek

Abstract:

Cone-beam computed tomography (CBCT) provides high-quality 3-dimensional images of dental structures because of its high spatial resolution. The study of dental morphology is important in research as it provides information about diversities within a population. Many studies have shown different shapes and numbers of roots canals among different races, especially in molars. The aim of this study was to determine the morphology of root canals of mandibular first and third molars in a sample of Egyptian population using CBCT scanning. Fifty mandibular first Molars (M1) and fifty mandibular third (M3) extracted molars were collected. Thick rectangular molds were made using pink wax to hold the samples. Molars were embedded in the wax mold by aligning them in rows leaving arbitrary 0.5cm space between them. The molds with the samples in were submitted for CBCT scan. The number and morphology of root canals were assessed and classified according to Vertucci's classification. The mesial and the distal roots were examined separately. Finally, data was analyzed using Fisher exact test. The most prevalent mesial root canal frequency in M1 was type IV (60%) and type II (40 %), while M3 showed prevalence of type I (40%) and II (40%). Distal root canal morphology showed prevalence of type I in both M1 (66%) and M3 (86%). So, it can be concluded that CBCT scanning provides supplemental information about the root canal configurations of mandibular molars in a sample of Egyptian population. This study may help clinicians in the root canal treatment of mandibular molars.

Keywords: cone beam computed tomography, mandibular first molar, mandibular third molar, root canal morphology

Procedia PDF Downloads 289
1325 ASEAN Our Eyes: A Strategic Information Exchange Platform on Counter-Terrorism

Authors: Nila Febri Wilujeng, Helda Risman

Abstract:

Enjoying stable security within its region for the last 50 years, ASEAN nowadays contends with the global context emerging dynamically, which brings about multidimensional challenges and threats such as terrorism, radicalism, armed rebellion, hijacking, and other non-traditional threats. Dealing with these circumstances, ASEAN member states tighten its capacity by enhancing regional cooperation and strategic information exchange among ASEAN member states so-called ASEAN Our Eyes. This initiative adopted for the sake of forestalling any possible threat posed by violent extremism, radicalization, and terrorism through timely strategic information exchange among ASEAN member states. By using qualitative method, this paper will utilize regional security complex and international cooperation theories in analyzing the process to examine ASEAN Our Eyes based on its terms of reference. As a result, it portrays that ASEAN Our Eyes is able to undermine the gaps in the realm of strategic information exchange in monitoring the movement of violent extremism, radicalism, foreign terrorist fighters, and crime-terror nexus. However, it remains premature as a strategic measure to encounter those threats in the years to come.

Keywords: regional cooperation, counter-terrorism, ASEAN our eyes, strategic information exchange

Procedia PDF Downloads 174
1324 Composite Approach to Extremism and Terrorism Web Content Classification

Authors: Kolade Olawande Owoeye, George Weir

Abstract:

Terrorism and extremism activities on the internet are becoming the most significant threats to national security because of their potential dangers. In response to this challenge, law enforcement and security authorities are actively implementing comprehensive measures by countering the use of the internet for terrorism. To achieve the measures, there is need for intelligence gathering via the internet. This includes real-time monitoring of potential websites that are used for recruitment and information dissemination among other operations by extremist groups. However, with billions of active webpages, real-time monitoring of all webpages become almost impossible. To narrow down the search domain, there is a need for efficient webpage classification techniques. This research proposed a new approach tagged: SentiPosit-based method. SentiPosit-based method combines features of the Posit-based method and the Sentistrenght-based method for classification of terrorism and extremism webpages. The experiment was carried out on 7500 webpages obtained through TENE-webcrawler by International Cyber Crime Research Centre (ICCRC). The webpages were manually grouped into three classes which include the ‘pro-extremist’, ‘anti-extremist’ and ‘neutral’ with 2500 webpages in each category. A supervised learning algorithm is then applied on the classified dataset in order to build the model. Results obtained was compared with existing classification method using the prediction accuracy and runtime. It was observed that our proposed hybrid approach produced a better classification accuracy compared to existing approaches within a reasonable runtime.

Keywords: sentiposit, classification, extremism, terrorism

Procedia PDF Downloads 252
1323 Impact of Terrorism as an Asymmetrical Threat on the State's Conventional Security Forces

Authors: Igor Pejic

Abstract:

The main focus of this research will be on analyzing correlative links between terrorism as an asymmetrical threat and the consequences it leaves on conventional security forces. The methodology behind the research will include qualitative research methods focusing on comparative analysis of books, scientific papers, documents and other sources, in order to deduce, explore and formulate the results of the research. With the coming of the 21st century and the rising multi-polar, new world threats quickly emerged. The realistic approach in international relations deems that relations among nations are in a constant state of anarchy since there are no definitive rules and the distribution of power varies widely. International relations are further characterized by egoistic and self-orientated human nature, anarchy or absence of a higher government, security and lack of morality. The asymmetry of power is also reflected on countries' security capabilities and its abilities to project power. With the coming of the new millennia and the rising multi-polar world order, the asymmetry of power can be also added as an important trait of the global society which consequently brought new threats. Among various others, terrorism is probably the most well-known, well-based and well-spread asymmetric threat. In today's global political arena, terrorism is used by state and non-state actors to fulfill their political agendas. Terrorism is used as an all-inclusive tool for regime change, subversion or a revolution. Although the nature of terrorist groups is somewhat inconsistent, terrorism as a security and social phenomenon has a one constant which is reflected in its political dimension. The state's security apparatus, which was embodied in the form of conventional armed forces, is now becoming fragile, unable to tackle new threats and to a certain extent outdated. Conventional security forces were designed to defend or engage an exterior threat which is more or less symmetric and visible. On the other hand, terrorism as an asymmetrical threat is a part of hybrid, special or asymmetric warfare in which specialized units, institutions or facilities represent the primary pillars of security. In today's global society, terrorism is probably the most acute problem which can paralyze entire countries and their political systems. This problem, however, cannot be engaged on an open field of battle, but rather it requires a different approach in which conventional armed forces cannot be used traditionally and their role must be adjusted. The research will try to shed light on the phenomena of modern day terrorism and to prove its correlation with the state conventional armed forces. States are obliged to adjust their security apparatus to the new realism of global society and terrorism as an asymmetrical threat which is a side-product of the unbalanced world.

Keywords: asymmetrical warfare, conventional forces, security, terrorism

Procedia PDF Downloads 235
1322 Growing Acts of Terrorism in Local Conflicts: A Dire Need for International Attention

Authors: Yusuf Abubakar Mamud

Abstract:

Highlighting the imperatives of local conflicts considering the dangerous dimensions of terrorism they are assuming in Africa has not attracted serious academic and political attention. The discourse about conflict in Africa was discussed within five identified conflict zones in the continent. The threats from these local conflicts are diverse and complex and the acts of terrorism in these local conflicts are driven by certain attitudes and behaviours linked to the African leadership. The paper examined and noted that the current conflict resolution model of the African Union (AU) was robust with requisite institutions to address the trends in local conflicts. However, it was observed that the AU peace and security framework lacked the requisite structural and technical capabilities to proactively address the drivers of local conflicts in Africa. It was found that the persistence of local conflicts in the African region may deny her the opportunities of achievement of the targets envisioned in the Sustainable Development Goals (SDGs). Consequently, the paper called on the international community to support Africa through provision of capacity. It urged the African leaders themselves to develop the political will to ensure that all issues concerning peace and security in the continent were guided by the provisions of the AU Constitutive Act. The need to strengthen the APRM in the light of the current trends in local conflicts was also highlighted.

Keywords: conflicts, local conflicts, terrorism, sustainable development

Procedia PDF Downloads 251
1321 Global and Domestic Response to Boko Haram Terrorism on Cameroon 2014-2018

Authors: David Nchinda Keming

Abstract:

The present study is focused on both the national and international collective fight against Boko Haram terrorism on Cameroon and the rule played by the Lake Chad Basin Countries (LCBCs) and the global community to suffocate the sect’s activities in the region. Although countries of the Lake Chad Basin include: Cameroon, Chad, Nigeria and Niger others like Benin also joined the course. The justification for the internationalisation of the fight against Boko Haram could be explained by the ecological and international climatic importance of the Lake Chad and the danger posed by the sect not only to the Lake Chad member countries but to global armed, civil servants and the international political economy. The study, therefore, kick start with Cameroon’s reaction to Boko Haram’s terrorist attacks on its territory. It further expounds on Cameroon’s request on bilateral diplomacy from members of the UN Security Council for an international collective support to staple the winds of the challenging sect. The study relies on the hypothesis that Boko Haram advanced terrorism on Cameroon was more challenging to the domestic military intelligence thus forcing the government to seek for bilateral and multilateral international collective support to secure its territory from the powerful sect. This premise is tested internationally via (multilateral cooperation, bilateral response, regional cooperation) and domestically through (solidarity parade, religious discourse, political manifestations, war efforts, the vigilantes and the way forward). To accomplish our study, we made used of the mixed research methodologies to interpret the primary, secondary and tertiary sources consulted. Our results reveal that the collective response was effectively positive justified by the drastic drop in the sect’s operations in Cameroon and the whole LCBCs. Although the sect was incapacitated, terrorism remains an international malaise and Cameroon hosts a fertile ground for terrorists’ activism. Boko Haram was just weakened and not completely defeated and could reappear someday even under a different appellation. Therefore, to absolutely eradicate terrorism in general and Boko Haram in particular, LCBCs must improve their military intelligence on terrorism and continue to collaborate with advanced experienced countries in fighting terrorism.

Keywords: Boko Haram, terrorism, domestic, international, response

Procedia PDF Downloads 132
1320 The Crossroads of Corruption and Terrorism in the Global South

Authors: Stephen M. Magu

Abstract:

The 9/11 and Christmas bombing attacks in the United States are mostly associated with the inability of intelligence agencies to connect dots based on intelligence that was already available. The 1998, 2002, 2013 and several 2014 terrorist attacks in Kenya, on the other hand, are probably driven by a completely different dynamic: the invisible hand of corruption. The World Bank and Transparency International annually compute the Worldwide Governance Indicators and the Corruption Perception Index respectively. What perhaps is not adequately captured in the corruption metrics is the impact of corruption on terrorism. The World Bank data includes variables such as the control of corruption, (estimates of) government effectiveness, political stability and absence of violence/terrorism, regulatory quality, rule of law and voice and accountability. TI's CPI does not include measures related to terrorism, but it is plausible that there is an expectation of some terrorism impact arising from corruption. This paper, by examining the incidence, frequency and total number of terrorist attacks that have occurred especially since 1990, and further examining the specific cases of Kenya and Nigeria, argues that in addition to having major effects on governance, corruption has an even more frightening impact: that of facilitating and/or violating security mechanisms to the extent that foreign nationals can easily obtain identification that enables them to perpetuate major events, targeting powerful countries' interests in countries with weak corruption-fighting mechanisms. The paper aims to model interactions that demonstrate the cost/benefit analysis and agents' rational calculations as being non-rational calculations, given the ultimate impact. It argues that eradication of corruption is not just a matter of a better business environment, but that it is implicit in national security, and that for anti-corruption crusaders, this is an argument more potent than the economic cost / cost of doing business argument.

Keywords: corruption, global south, identification, passports, terrorism

Procedia PDF Downloads 394
1319 Narrative Therapy as a Way of Terrorist Rehabilitation at Mohammad Bin Naif Counselling and Care Center: A Case Study

Authors: Yasser Almazrua

Abstract:

Terrorism is a multidimensional phenomenon that has increased recently. Many countries started combating terrorism through security forces; however, there has been relatively little attention given to rehabilitation programs for people involved in such terrorism acts. In Saudi Arabia, after facing so many terrorist attacks, they started understanding and countering terrorism differently by establishing Mohammad bin Naif Counselling and Care Center in 2006. The center now is considered one of the top experience centers in the world for terrorist rehabilitation and ideology correction. The center offers different programs such as training, educational, social, art and psychological programs. One of the approaches that have been used by psychological experts at the center is Narrative Therapy. It is a therapeutic approach that focuses on the ability of the client to identify their personal life story. The client during therapy works as a storyteller where he or she gets insight, meaning and better understanding of their own lives. Because each client at the center had a story, it can be better fit method for rehabilitation towards healing and personal development. The case describes a 34-years-old man who was involved in some terrorism activities locally by technically and financially supporting a terrorist group related to Al-Qaida. The beneficiary joined Mohammad bin Naif Counseling and Care Center after serving his sentence. Informed of consent has been given to the beneficiary before starting the therapeutic program. Both qualitative and quantitative data on the beneficiary are collected by self-reporting during the initial session, and by using a psychological measurement. The result found that the beneficiary was not insightful about himself, and he had a high level of repression which relatedly moved him to be targeted for recruitment in the terrorist group. With rehabilitation and by using the therapeutic approach, the beneficiary improved on the level of insight, specifically about himself and also about the experience. This case illustrates the importance of considering the effect of Narrative Therapy in terrorist rehabilitation programs.

Keywords: narrative therapy, rehabilitation, Saudi Arabia, terrorism

Procedia PDF Downloads 266
1318 The Effects of Root Zone Supply of Aluminium on Vegetative Growth of 15 Groundnut Cultivars Grown in Solution Culture

Authors: Mosima M. Mabitsela

Abstract:

Groundnut is preferably grown on light textured soils. Most of these light textured soils tend to be highly weathered and characterized by high soil acidity and low nutrient status. One major soil factor associated with infertility of acidic soils that can negatively depress groundnut yield is aluminium (Al) toxicity. In plants Al toxicity damages root cells, leading to inhibition of root growth as a result of the suppression of cell division, cell elongation and cell expansion in the apical meristem cells of the root. The end result is that roots become stunted and brittle, root hair development is poor, and the root apices become swollen. This study was conducted to determine the effects of aluminium (Al) toxicity on a range of groundnut varieties. Fifteen cultivars were tested in incremental aluminum (Al) supply in an ebb and flow solution culture laid out in a randomized complete block design. There were six aluminium (Al) treatments viz. 0 µM, 1 µM, 5.7 µM, 14.14 µM, 53.18 µM, and 200 µM. At 1 µM there was no inhibitory effect on the growth of groundnut. The inhibition of groundnut growth was noticeable from 5.7 µM to 200 µM, where the severe effect of aluminium (Al) stress was observed at 200 µM. The cultivars varied in their response to aluminium (Al) supply in solution culture. Groundnuts are one of the most important food crops in the world, and its supply is on a decline due to the light-textured soils that they thrive under as these soils are acidic and can easily solubilize aluminium (Al) to its toxic form. Consequently, there is a need to develop groundnut cultivars with high tolerance to soil acidity.

Keywords: aluminium toxicity, cultivars, reduction, root growth

Procedia PDF Downloads 119
1317 Predicting Root Cause of a Fire Incident through Transient Simulation

Authors: Mira Ezora Zainal Abidin, Siti Fauzuna Othman, Zalina Harun, M. Hafiz M. Pikri

Abstract:

In a fire incident involving a Nitrogen storage tank that over-pressured and exploded, resulting in a fire in one of the units in a refinery, lack of data and evidence hampered the investigation to determine the root cause. Instrumentation and fittings were destroyed in the fire. To make it worst, this incident occurred during the COVID-19 pandemic, making collecting and testing evidence delayed. In addition to that, the storage tank belonged to a third-party company which requires legal agreement prior to the refinery getting approval to test the remains. Despite all that, the investigation had to be carried out with stakeholders demanding answers. The investigation team had to devise alternative means to support whatever little evidence came out as the most probable root cause. International standards, practices, and previous incidents on similar tanks were referred. To narrow down to just one root cause from 8 possible causes, transient simulations were conducted to simulate the overpressure scenarios to prove and eliminate the other causes, leaving one root cause. This paper shares the methodology used and details how transient simulations were applied to help solve this. The experience and lessons learned gained from the event investigation and from numerous case studies via transient analysis in finding the root cause of the accident leads to the formulation of future mitigations and design modifications aiming at preventing such incidents or at least minimize the consequences from the fire incident.

Keywords: fire, transient, simulation, relief

Procedia PDF Downloads 68
1316 Field Application of Trichoderma Harzianum for Biological Control of Root-Knot Nematodes in Summer Tomatoes

Authors: Baharullah Khattak, Saifullah

Abstract:

To study the efficacy of the selected Trichoderma isolates, field trials were conducted in the root-knot nematode-infested areas of Dargai and Swat, Pakistan. Four isolates of T. harzianum viz, Th-1, Th-2, Th-9 and Th-15 were tested against root knot nematodes on summer tomatoes under field conditions. The T. harzianum isolates, grown on wheat grains substrate, were applied @ 8 g plant-1, either alone or in different combinations. Root weight of tomato plants was reduced Th-9 as compared to 26.37 g in untreated control. Isolate Th-1 was found to enhance shoot and root lengths to the maximum levels of 78.76 cm and 19.59 cm, respectively. Tomato shoot weight was significantly increased (65.36g) in Th-1-treated plots as compared to 49.66 g in control. Maximum (156) number of flowers plant-1 and highest (48.18%) fruit set plant-1 was observed in Th-1 treated plots, while there were 87 flowers and 35.50% fruit set in the untreated control. Maximum fruit weight (70.97 g) plant-1 and highest (17.99 t ha-1) marketable yield were recorded in the treatments where T. harzianum isolate Th-1 was used, in comparison to 51.33 g tomato fruit weight and 9.90 t ha-1 yield was noted in the control plots. It was observed that T. harzianum isolates significantly reduced the nematode populations. The fungus enhanced plant growth and yield in all the treated plots. Jabban isolate (Th-1) was found as the most effective in nematode suppression followed by Shamozai (Th-9) isolate. It was concluded from the present findings that T. harzianum has a potential bio control capability against root-knot nematodes.

Keywords: biological control, Trichoderma harzianum, root-knot nematode, meloidogyne

Procedia PDF Downloads 466
1315 Deradicalization for Former Terrorists through Entrepreneurship Program

Authors: Jamal Wiwoho, Pujiyono, Triyanto

Abstract:

Terrorism is a real enemy for all countries, including Indonesia. Bomb attacks in some parts of Indonesia are proof that Indonesia has serious problems with terrorism. Perpetrators of terror are arrested and imprisoned, and some of them were executed. However, this method did not succeed in stopping the terrorist attacks. Former terrorists continue to carry out bomb attacks. Therefore, this paper proposes a program towards deradicalization efforts of former terrorists through entrepreneurship. This is necessary because it is impossible to change their radical ideology. The program is also motivated by understanding that terrorists generally come from poor families. This program aims to occupy their time with business activities so there is no time to plan and carry out bomb attacks. This research is an empirical law study. Data were collected by literature study, observation, and in-depth interviews. Data were analyzed with the Miles and Huberman interactive model. The results show that the entrepreneurship program is effective to prevent terrorist attack. Former terrorists are busy with their business. Therefore, they have no time to carry out bomb attacks.

Keywords: deradicalization, terrorism, terrorists, entrepreneurship

Procedia PDF Downloads 240
1314 A Fast and Cost-Effective Method to Monitor Microplastics in Compost and Soiduration of Enterococcus Faecalis Penetration in Environmentally Exposed Root Canals Obturated With Lateral Condensation Technique

Authors: N. Thawornwisit, P. Pradoo, S. Nuypree, L. Jarukasetrporn, S. Jitpukdeebodintra

Abstract:

Objective: The aim of this study was to evaluate the duration of the Enterococcus faecalis (E. faecalis) penetration into the gap between root canal wall and filling material at a 3 to 6 mm distance from the cementoenamel junction (CEJ) in the dislodged temporary filling, in vitro. Material and methods: Thirty-four single root canal mandibular premolars were divided into two experimental groups (N = 15) and one negative control (N = 4). Root canals were prepared and obturated with gutta-percha using lateral condensation technique, X-ray checked, and sterilized. Leakages were set up using the modified bacterial leakage model, and E. faecalis was used as a microbial marker. Leakages were evaluated at 3 and 7 days by culturing gutta-percha and dentine drilled from a 3-6 mm distance from CEJ. Broth turbidity was recorded and compared. Result: All four negative control and the 3-day experimental group showed no broth turbidity. For the 7-day experimental group, there was 33.3% leakage. Conclusion: Penetration of E. faecalis into the gap between root canal wall and filling material at a 3 to 6 mm distance from CEJ in the dislodged temporary filling were not found at three days. However, at seven days of exposure, bacteria could penetrate into the interface of the root canal and filling materials.

Keywords: coronal leakage, bacterial leakage model, enterococcus faecalis

Procedia PDF Downloads 69
1313 Terrorism and National Development: A Critique of Its Aftermath on Educational Attainment

Authors: David Chapola Nggada

Abstract:

Although the concept of terrorism is not a new phenomenon to Nigeria, the protracted terrorist activities experiencing in the north-eastern part of the country since 2009, had left an indelible mark on virtually every aspects of lives whether directly or indirectly, particularly the educational sector. Indeed, since the abduction of over 200 schoolgirls at Chibok in 2014 by the insurgence, education had witnessed a setback as most school remains closed for sometimes. The aftermath of this development on education and its future multiplier effect on national development is a source of concern. Consequently, this paper is designed to examine the consequences of terrorism on educational attainment and national development among the Chibok community of Borno State. The technique employed involves a mixture of both qualitative and quantitative research work on a sample size of 79 secondary school students currently displaced from Chibok, Damboa and Askira-Uba, now residing as internally displaced persons(IDPs) in Biu, Gombe, Maiduguri. A random sample technique is used. Structured and semi-unstructured questionnaire were administered. The result shows that, a significant number of students over these years, lacked access to education and this posed a great danger to national development. Recommendations towards reinvigorating education as a panacea to social, economic cum political vices were articulated. Concerted effort should be made to create confidence in the community.

Keywords: education, effect, terrorism, national, development

Procedia PDF Downloads 235
1312 Allelopathic Effects of Eucalyptus camaldulensis and E. gomphocephala on Seed Germination and Seedling Growth of Barley

Authors: Sallah S. El-Ammari, Mona. S. Hasan

Abstract:

This research is aimed to study allelopathic effects of two wind breakers Eucalyptus camaldulensis and E.gomphocephala on germination and growth of barley using aqueous extracts of leaves at 0.5, 1, 5, and 10% concentrations for treatment of barley caryopsis in petri dishes incubated in growth chamber. Distilled water was used in the experiment as a control. Seed germination was recorded on daily basis for five days. After ten days measurements of root length, shoot length, fresh and dry weight of root and shoot were taken. With the exception of 0.5% E. gomphocephala extract effect on length and dry weight of barley root, all the tested extract concentrations for both eucalyptus species significantly decreased the percent and speed of germination, root and shoot length, fresh and dry weight of root and shoot of barley compared to the control. For both species the allelopathic effect was significantly increasing with the increase of the extract concentration. Although, higher allelopathic effect was shown by E. camaldulensis, the results indicating that both eucalyptus species should not be recommended as wind breakers for barley fields.

Keywords: allelopathy, eucalyptus, barley, Libya

Procedia PDF Downloads 310
1311 Financial Risk Tolerance and Its Impact on Terrorism-Tourism Relation in Pakistan

Authors: Sania Sana, Afnan Nasim, Usman Malik, Maroof Tahir

Abstract:

The aim of this research is to scrutinize the interdependent relationship between terrorism and behavioral changes in the tourism activities in Pakistan with the moderating impact of a unique variable titled 'Financial Risk Tolerance'. The article looks at the inter-reliant relationship with the alleged political and economic aspects and behavioral changes in the tourists and the consumers by these variables over time. The researchers used many underlying theories like the catastrophe theory by (Svyantek, Deshon and Siler 1991), information integration theory (Anderson 1981, 1982) and prospect theory (Kahneman and Tversky 1979) to shape the study’s framework as per tourist decision making model. A sample of around 110 locals was used for this purpose and the data was gathered by convenience sampling. The responses were analyzed using regression analysis. The results exhibited how terrorism along with the influence of financial risk tolerance had inclined a behavioral shift in the travelling patterns and vacation destination choice of the local tourists. Lastly, the paper proposes a number of suggestive measures for the tourism industry and the legislative bodies to ensure the safety of travelers and to boost the tourist activities in the vacation industry of Pakistan.

Keywords: terrorism, tourism, financial risk tolerance, tourist decision-making, destination choice

Procedia PDF Downloads 210
1310 The Threat of International Terrorism and Its Impact on UK Migration Policy and Practice

Authors: Baljit Soroya

Abstract:

Transnational communities are as a consequence of greater mobility of people, globalization and digitization have had a major impact on international relations and diasporas in the context of external conflicts. To a significant extent conflicts are becoming deterritorialised and informed by both internal (state politics) and external (foreign policy) players such as in Iraq and Syria leading to forced migration of unprecedented levels within the last two decades. The situation of forced migrants has, it is suggested, worsened as a consequence of the neo-liberal policies and requirements of organizations such as the European Bank. A case example of this being that of Greece, and the exacerbation of insecurity for Greek nationals and the demonization of refugees seeking sanctuary. This has been as a consequence, in part, of the neoliberal dogma of the European Bank. The article analyses the complex intersection of the real and perceived threats of international terrorism and the manner in which UK migration policy and Practice is unfolding. The policy and practice developments are explored in the context of the shift in politics in both the UK and wider Europe to the far right and the drift of main stream political parties to the right. In many cases, the mainstream political groupings, have co-opted the fears as presented by far right organization for political their own political gains, such as in the UK and France In its analysis it will be argued that, whilst international terrorism is an issue of concern, however in the context of the UK it is not of the same scale as the effects of climate change or indeed domestic violence. Given that, the question has to be asked why the threat of international terrorism is having such an impact on UK migration policy and practice and, specifically refugees. Furthermore, it is argued that this policy and practice are being formulated within a narrative that portrays migrants as the problem both in relation to terrorism and the disenfranchisement of ‘ordinary white communities’. The intersectionality of social, economic inequalities, fear of international terrorism, increase in conflicts and the political climate have contributed to a lack of trust of political establishments that have in turn sought to impress the public with their anti-immigrant rhetoric and policy agendas. The article ends by suggesting that whilst politics and political affiliations have become fractured there are nevertheless spaces for collective action, particularly in relation to issues of refugees.

Keywords: international terrorism, migration policy, conflict, media, community, politics

Procedia PDF Downloads 305
1309 'Propaganda by the Deed', 'Armed Propaganda' and Mass Mobilization: The Missing Link in the Left-Wing Terrorist Thinking

Authors: Ersun N. Kurtulus

Abstract:

One of the strategic goals of left-wing terrorism, both in its Anarchist and Marxist-Leninist forms, was mobilization of masses as a first step in launching a revolution. However, in the canonical texts of left-wing terrorist literature (such as the works of Brousse, Nachaev, Bakunin, Kropotkin, Most, Heinzen, Guevara and Marighella) it is not clear how resort to terrorist tactics such as assassinations or bomb attacks will lead to mobilization of masses. This link is usually presumed and taken for granted. However, in other, less known terrorist texts, where there is some elaboration upon this link, two conflicting views emerge: (i) terrorist attacks are supposed to cause state repression which in turn radicalizes masses and opens up the way for recruitment and mobilization versus (ii) terrorist attacks are supposed to demonstrate the hollowness of the already existent state repression and thereby encourage mobilization of masses that are already radicalized but inactive due fear caused by state repression. The paper argues that terrorism studies have largely overemphasized the former while the latter has remained more or less unnoticed.

Keywords: terrorism, repression, radical left, mobilization of masses

Procedia PDF Downloads 187
1308 A Variant of Newton's Method with Free Second-Order Derivative

Authors: Young Hee Geum

Abstract:

In this paper, we present the iterative method and determine the control parameters to converge cubically for solving nonlinear equations. In addition, we derive the asymptotic error constant.

Keywords: asymptotic error constant, iterative method, multiple root, root-finding, order of convergent

Procedia PDF Downloads 265
1307 Accounting as Addressed in the Qur’aan

Authors: Shahriar M. Saadullah, Abdul-Quddoos Abdul-Basith, Zaki K. Abushawish

Abstract:

As a part of academic research in Islamic Accounting it is important to know how the word Accounting is discussed in the Qur’aan. This paper identifies and analyzes the word Accounting in the Qur’aan, which is significant to know and understand. The paper uses a methodology of identifying the root word of Accounting Hasaba (حسب) in the Qur’aan with the help of Islam 360 software and analyzes the use of the relevant words derived from the root word. Then the paper attempts to connect the findings to the contemporary Accounting issues. The paper finds that the root word of Accounting Hasaba (حسب) appears in the Qur’aan 109 times but it is only used in the sense Account, Accountable, or Accounting 45 times. These words appear in 44 different verses in the Qur’aan, appearing twice in one of the verses. The paper divides these verses into 8 different themes namely, Day of Accounting, without any Accounting, Accounting of Time, Self-Accounting, Swift in Accounting, Accounting is only with God, Awareness and the Good Accounting, and Heedlessness and the Bad Accounting. The way the words Account, Accounting, and Accountable is discussed in the Qur’aan links to the contemporary accounting issues including Ethics, Agency Theory, and Internal Control. The links discovered in the paper clearly shows the timeless nature of the message of the Qur’aan.

Keywords: accounting, contemporary accounting issues, Qur'aan, root word of accounting hasaba

Procedia PDF Downloads 390
1306 Investigation of Clubroot Disease Occurrence under Chemical and Organic Soil Environment

Authors: Zakirul Islam, Yugo Kumokawa, Quoc Thinh Tran, Motoki Kubo

Abstract:

Clubroot is a disease of cruciferous plant caused by soil born pathogen Plasmodiophora brassicae and can significantly limit the production through rapid spreading. The present study was designed to investigate the effect of cultivation practices (chemical and organic soils) on clubroot disease development in Brassica rapa. Disease index and root bacterial composition were investigated for both chemical and organic soils. The bacterial biomass and diversity in organic soil were higher than those in chemical soil. Disease severity was distinct for two different cultivation methods. The number of endophytic bacteria decreased in the infected root for both soils. The increased number of endophytic bacterial number led to reduce the proliferation of pathogen spore inside the root and thus reduced the disease severity in organic plants.

Keywords: clubroot disease, bacterial biomass, root infection, disease index, chemical cultivation, organic cultivation

Procedia PDF Downloads 52
1305 Inhibitory Effects of Ambrosia trifida L. on the Development of Root Hairs and Protein Patterns of Radicles

Authors: Ji-Hyon Kil, Kew-Cheol Shim, Kyoung-Ae Park, Kyoungho Kim

Abstract:

Ambrosia trifida L. is designated as invasive alien species by the Act on the Conservation and Use of Biodiversity by the Ministry of Environment, Korea. The purpose of present paper was to investigate the inhibitory effects of aqueous extracts of A.trifida on the development of root hairs of Triticum aestivum L., and Allium tuberosum Rottler ex Spreng and the electrophoretic protein patterns of their radicles. The development of root hairs was inhibited by increasing of aqueous extract concentrations. Through SDS-PAGE, the electrophoretic protein bands of extracted proteins from their radicles were appeared in controls, but protein bands of specific molecular weight disappeared or weakened in treatments. In conclusion, inhibitory effects of A. trifida made two receptor species changed morphologically, and at the molecular level in early growth stage.

Keywords: Ambrosia trifida L., invasive alien species, inhibitory effect, root hair, electrophoretic protein, radicle

Procedia PDF Downloads 321
1304 Islam, Tolerance and Anti-Terrorism: A Critical Assessment with Reference to the Royal 'Amman Message'

Authors: Adnan M. Al Assaf

Abstract:

This research project aims to assess the methods of enhancing tolerant thinking and behavior among Muslim societies. This is in addition to spreading the anti-terrorist approach in their communities. The critical assessment for the Islamic major texts in question is the selected way for convincing, as Muslims adopt these sources as the authentic references for their lives and cultures. Moreover, this research devotes a special room to the analysis of the royal ‘Amman Message’ as a contemporary Islamic approach for enhancing tolerance and anti-terrorism from an Islamic perspective. The paper includes the study of the related concepts, texts, practical applications, with some reference to the history of Islam in human interaction, accepting the others, mercy with minorities, protecting human rights. Furthermore, it assesses the methods of enhancing tolerance and minimizing the terrorist thinking and behavior practically, in the view of Amman message, as well.

Keywords: Islam, tolerance, anti-terrorism, coexistence, Amman Message

Procedia PDF Downloads 432
1303 Countering Terrorism and Defending Human Right after 9/11: The European Perspective

Authors: Anita Blagojević

Abstract:

It is well known that the terrorist attacks on the New York City and Washington, D.C. prompted unprecedented international action to enhance international cooperation in the prevention and suppression of terrorism. In the months (and years) after September 11, the world community focused on two main efforts: first, on efforts to bring those responsible for terrorist attacks to justice, and second, on efforts to prevent future terrorist attacks. In that sense, many governments took advantage of these efforts to strengthen their national security. In that process, however, human rights and civil liberties of certain groups of people were alleged. As a consequence, part of the price paid for protecting national security against terrorist attacks was the threat of infringement on people's fundamental rights and freedoms. The aim of this paper is to analyze the role of the European Union and the Council of Europe in finding the answer to the one of the main security dilemma for the present era: how to find the balance between the protection of national security and guarantee of the people's rights and fundamental freedoms?

Keywords: terrorism, antiterrorism, European Union, Council of Europe, human rights

Procedia PDF Downloads 348
1302 Counter-Terrorism and De-Radicalization as Soft Strategies in Combating Terrorism in Indonesia: A Critical Review

Authors: Tjipta Lesmana

Abstract:

Terrorist attacks quickly penetrated Indonesia following the downfall of Soeharto regime in May 1998. Reform era was officially proclaimed. Indonesia turned to 'heaven state' from 'authoritarian state'. For the first time since 1966, the country experienced a full-scale freedom of expression, including freedom of the press, and heavy acknowledgement of human rights practice. Some religious extremists previously run away to neighbor countries to escape from security apparatus secretly backed home. Quickly they consolidated the power to continue their long aspiration and dream to establish 'Shariah Indonesia', Indonesia based on Khilafah ideology. Bali bombings I which shocked world community occurred on 12 October 2002 in the famous tourist district of Kuta on the Indonesian island of Bali, killing 202 people (including 88 Australians, 38 Indonesians, and people from more than 20 other nationalities). In the capital, Jakarta, successive bombings were blasted in Marriott hotel, Australian Embassy, residence of the Philippine Ambassador and stock exchange office. A 'drunken Indonesia' is far from ready to combat nationwide sudden and massive terrorist attacks. Police Detachment 88 (Densus 88) Indonesian counter-terrorism squad, was quickly formed following 2002 Bali Bombing. Anti-terrorism Provisional Act was immediately erected, as well, due to urgent need to fight terrorism. Some Bali bombings criminals were deadly executed after sentenced by the court. But a series of terrorist suicide attacks and another Bali bombings (the second one) in Bali, again, shocked world community. Terrorism network is undoubtedly spreading nationwide. Suspicion is high that they had close connection with Al Qaeda’s groups. Even 'Afghanistan alumni' and 'Syria alumni' returned to Indonesia to back up the local mujahidins in their fights to topple Indonesia constitutional government and set up Islamic state (Khilafah). Supported by massive aids from friendly nations, especially Australia and United States, Indonesia launched large scale operations to crush terrorism consisted of various radical groups such as JAD, JAS, and JAADI. Huge energy, money, and souls were dedicated. Terrorism is, however, persistently entrenched. High ranking officials from Detachment 88 squad and military intelligence believe that terrorism is still one the most deadly enemy of Indonesia.

Keywords: counter-radicalization, de-radicalization, Khalifah, Union State, Al Qaedah, ISIS

Procedia PDF Downloads 151
1301 The International Fight against the Financing of Terrorism: Analysis of the Anti-Money Laundering and Combating Financing of Terrorism Regime

Authors: Loukou Amoin Marie Djedri

Abstract:

Financing is important for all terrorists – from the largest organizations in control of territories, to the smallest groups – not only for spreading fear through attacks, but also to finance the expansion of terrorist dogmas. These organizations pose serious threats to the international community. The disruption of terrorist financing aims to create a hostile environment for the growth of terrorism and to limit considerably the terrorist groups capacities. The World Bank (WB), together with the International Monetary Fund (IMF), decided to include in their scope the Fight against the money laundering and the financing of terrorism, in order to assist Member States in protecting their internal financial system from terrorism use and abuse and reinforcing their legal system. To do so, they have adopted the Anti-Money Laundering /Combating Financing of Terrorism (AML/CFT) standards that have been set up by the Financial Action Task Force. This set of standards, recognized as the international standards for anti-money laundering and combating the financing of terrorism, has to be implemented by States Members in order to strengthen their judicial system and relevant national institutions. However, we noted that, to date, some States Members still have significant AML/CFT deficiencies, which can constitute serious threats not only to the country’s economic stability but also for the global financial system. In addition, studies stressed out that repressive measures are more implemented by countries than preventive measures, which could be an important weakness in a state security system. Furthermore, we noticed that the AML/CFT standards evolve slowly, while techniques used by terrorist networks keep developing. The goal of the study is to show how to enhance the AML/CFT global compliance through the work of the IMF and the WB, to help member states to consolidate their financial system. To encourage and ensure the effectiveness of these standards, a methodology for assessing the compliance with the AML/CFT standards has been created to follow up the concrete implementation of these standards and to provide accurate technical assistance to countries in need. A risk-based approach has also been adopted as a key component of the implementation of the AML/CFT Standards, with the aim of strengthening the efficiency of the standards. Instead, we noted that the assessment is not efficient in the process of enhancing AML/CFT measures because it seems to lack of adaptation to the country situation. In other words, internal and external factors are not enough taken into account in a country assessment program. The purpose of this paper is to analyze the AML/CFT regime in the fight against the financing of terrorism and to find lasting solutions to achieve the global AML/CFT compliance. The work of all the organizations involved in this combat is imperative to protect the financial network and to lead to the disintegration of terrorist groups in the future.

Keywords: AML/CFT standards, financing of terrorism, international financial institutions, risk-based approach

Procedia PDF Downloads 255
1300 Technique and Use of Machine Readable Dictionary: In Special Reference to Hindi-Marathi Machine Translation

Authors: Milind Patil

Abstract:

Present paper is a discussion on Hindi-Marathi Morphological Analysis and generating rules for Machine Translation on the basis of Machine Readable Dictionary (MRD). This used Transformative Generative Grammar (TGG) rules to design the MRD. As per TGG rules, the suffix of a particular root word is based on its Tense, Aspect, Modality and Voice. That's why the suffix is very important for the word meanings (or root meanings). The Hindi and Marathi Language both have relation with Indo-Aryan language family. Both have been derived from Sanskrit language and their script is 'Devnagari'. But there are lots of differences in terms of semantics and grammatical level too. In Marathi, there are three genders, but in Hindi only two (Masculine and Feminine), the Natural gender is absent in Hindi. Likewise other grammatical categories also differ in their level of use. For MRD the suffixes (or Morpheme) are of particular root word for GNP (Gender, Number and Person) are based on its natural phenomena. A particular Suffix and Morphine change as per the need of person, number and gender. The design of MRD also based on this format. In first, Person, Number, Gender and Tense are key points than root words and suffix of particular Person, Number Gender (PNG). After that the inferences are drawn on the basis of rules that is (V.stem) (Pre.T/Past.T) (x) + (Aux-Pre.T) (x) → (V.Stem.) + (SP.TM) (X).

Keywords: MRD, TGG, stem, morph, morpheme, suffix, PNG, TAM&V, root

Procedia PDF Downloads 293
1299 In vitro Environmental Factors Controlling Root Morphological Traits of Pineapple (Ananas comosus L. Merr)

Authors: S. Mohajer , R. M. Taha, M. Adel

Abstract:

Developing our knowledge of when pineapple roots grow can lead to improved water, fertilizer applications, and more precise culture management. This paper presents current understanding of morphological traits in pineapple roots, highlighting studies using incubation periods and various solid MS media treated with different sucrose concentrations and pH, which directly assess in vitro environmental factors. Rooting parameters had different optimal sucrose concentrations and incubation periods. All shoots failed to root in medium supplemented with sucrose at 5 g/L and no roots formed within the first 45 days in medium enriched with sucrose at 10 g/L. After 75 days, all shoots rooted in medium enriched with 10 and 20 g/L sucrose. Moreover, MS medium supplied with 20 g/L sucrose resulted in the longest and the highest number of roots with 27.3 mm and 4.7, respectively. Root function, such as capacity for P and N uptake, declined rapidly with root length. As a result, the longer the incubation period, the better the rooting responses would be.

Keywords: environmental factors, in vitro rooting, pineapple, tissue culture

Procedia PDF Downloads 358