CINXE.COM
Search results for: battlefield
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: battlefield</title> <meta name="description" content="Search results for: battlefield"> <meta name="keywords" content="battlefield"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="battlefield" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="battlefield"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 28</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: battlefield</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">28</span> Leadership in Future Operational Environment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20%C5%9Eim%C5%9Fek">M. Şimşek</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Rapidly changing factors that affect daily life also affect operational environment and the way military leaders fulfill their missions. With the help of technological developments, traditional linearity of conflict and war has started to fade away. Furthermore, mission domain has broadened to include traditional threats, hybrid threats and new challenges of cyber and space. Considering the future operational environment, future military leaders need to adapt themselves to the new challenges of the future battlefield. But how to decide what kind of features of leadership are required to operate and accomplish mission in the new complex battlefield? In this article, the main aim is to provide answers to this question. To be able to find right answers, first leadership and leadership components are defined, and then characteristics of future operational environment are analyzed. Finally, leadership features that are required to be successful in redefined battlefield are explained. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=future%20operational%20environment" title="future operational environment">future operational environment</a>, <a href="https://publications.waset.org/abstracts/search?q=leadership" title=" leadership"> leadership</a>, <a href="https://publications.waset.org/abstracts/search?q=leadership%20components" title=" leadership components "> leadership components </a> </p> <a href="https://publications.waset.org/abstracts/24624/leadership-in-future-operational-environment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/24624.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">434</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27</span> Augmented Reality Aplications for Armed Forces</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Murat%20S%C3%B6zen">Murat Sözen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It is not at all difficult to estimate which level today’s technology reaches considering that humankinds space-faring in early 1950s. Technology is a means to help achieve goals and people can produce systems on their physical and mental abilities. Needed and used as tools in all areas of life and became a necessity and dependency, technology, widely used in the military field. To be a revolutionary change in the military matters, opportunities offered by technology should be put into practice. Tech makes weapons, sensors, platforms and soldiers carrying them more effective. To increase this efficiency in the battlefield defense industry is seeking every advantage of technology. In this study, the applicability of existing and on-going augmented reality applications for Armed Forces will be evaluated. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=augmented%20reality" title="augmented reality">augmented reality</a>, <a href="https://publications.waset.org/abstracts/search?q=battlefield" title=" battlefield"> battlefield</a>, <a href="https://publications.waset.org/abstracts/search?q=military" title=" military"> military</a>, <a href="https://publications.waset.org/abstracts/search?q=virtual%20reality" title=" virtual reality"> virtual reality</a> </p> <a href="https://publications.waset.org/abstracts/39617/augmented-reality-aplications-for-armed-forces" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/39617.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">266</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26</span> Repetitive Compulsions of Trauma: Critically Analyzing Damages Done When Perpetuating Heroic White Masculinity at Federally Managed United States Civil War Battlefields</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Cait%20M.%20Henry">Cait M. Henry</a>, <a href="https://publications.waset.org/abstracts/search?q=Sarah%20Jackson"> Sarah Jackson</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Abstract-This study is built from the culmination of four years of research into the cultural interpretation of Civil War heritage at a National Park Service (NPS) site, namely the Manassas National Battlefield Park, within an increasingly contentious political landscape surrounding the U.S. Civil War. Originating as questions regarding the relevancy of historic battlefields to the current culture within the United States soon evolved into more philosophical questions about what it means to feel welcome at a battlefield site, and what are considered appropriate actions and behaviors at what was once a mass gravesite. In trying to answer these questions, this work aims to critically analyze the confluence between the cultural authority of the NPS and collective memories of the U.S. Civil War. Operationalizing trauma as repeated violent acts within public spaces, the authors posit that the normalization of violence from white or white-passing men partially stems from the glorification of heroic white masculinity at National Park Service Civil War battlefield sites—especially those which also commemorate Confederate military strategy and prowess. From here the study moves outward to focus on the prevalence of heroic white masculinity within the nation’s current social zeitgeist, and particularly the notion that to take back masculinity one must utilize violence as a means of symbolic restoration from perceptions of white victimhood. The study ends with case studies of dark tourism framing at international battlefields as models for expanding heritage interpretation at the NPS site to foster narratives of empathy and responsibility within an increasingly contentious political landscape within the United States of America. Visitors do not leave Manassas National Battlefield Park with answers about the social and moral implications of the U.S. Civil War, but the tools for championing their own (predominantly white) heroic masculinity. As such, it is only logical that one common reaction when masculinity is symbolically threatened is to enact violence against Others as a restorative force within the United States. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=confederate%20heritage" title="confederate heritage">confederate heritage</a>, <a href="https://publications.waset.org/abstracts/search?q=military%20history" title=" military history"> military history</a>, <a href="https://publications.waset.org/abstracts/search?q=national%20park%20service" title=" national park service"> national park service</a>, <a href="https://publications.waset.org/abstracts/search?q=trauma" title=" trauma"> trauma</a>, <a href="https://publications.waset.org/abstracts/search?q=United%20States%20civil%20war" title=" United States civil war"> United States civil war</a> </p> <a href="https://publications.waset.org/abstracts/193101/repetitive-compulsions-of-trauma-critically-analyzing-damages-done-when-perpetuating-heroic-white-masculinity-at-federally-managed-united-states-civil-war-battlefields" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/193101.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">11</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25</span> The Lethal Autonomy and Military Targeting Process</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Serdal%20Aky%C3%BCz">Serdal Akyüz</a>, <a href="https://publications.waset.org/abstracts/search?q=Halit%20Turan"> Halit Turan</a>, <a href="https://publications.waset.org/abstracts/search?q=Mehmet%20%C3%96zt%C3%BCrk"> Mehmet Öztürk</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The future security environment will have new battlefield and enemies. The boundaries of battlefield and the identity of enemies cannot be noticed easily. The politicians may not want to lose their soldiers in very risky operations. This approach will pave the way for smart machines like war robots and new drones. These machines will have the decision-making ability and act simultaneously. This ability can change the military targeting process. Military targeting process (MTP) benefits from a wide scope of lethal and non-lethal weapons to reach an intended end-state. This process is now managed by people but in the future smart machines can do it by themselves. At first sight, this development seems useful for humanity owing to decrease the casualties in war. Using robots -which can decide, detect, deliver and asses without human support- for homeland security and against terrorist has very crucial risks and threats. Besides, it can decrease the havoc but also increase the collateral damages. This paper examines the current use of smart war machines, military targeting process and presents a new approach to MTP from lethal autonomy concept's point of view. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=the%20autonomous%20weapon%20systems" title="the autonomous weapon systems">the autonomous weapon systems</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20lethal%20autonomy" title=" the lethal autonomy"> the lethal autonomy</a>, <a href="https://publications.waset.org/abstracts/search?q=military%20targeting%20process%20%28MTP%29" title=" military targeting process (MTP)"> military targeting process (MTP)</a> </p> <a href="https://publications.waset.org/abstracts/39562/the-lethal-autonomy-and-military-targeting-process" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/39562.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">428</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">24</span> Reading Knowledge Development and Its Phases with Generation Z</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Onur%20%C3%96zdemir">Onur Özdemir</a>, <a href="https://publications.waset.org/abstracts/search?q=M.Erhan%20ORHAN"> M.Erhan ORHAN</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Knowledge Development (KD) is just one of the important phases of Knowledge Management (KM). KD is the phase in which intelligence is used to see the big picture. In order to understand whether information is important or not, we have to use the intelligence cycle that includes four main steps: aiming, collecting data, processing and utilizing. KD also needs these steps. To make a precise decision, the decision maker has to be aware of his subordinates’ ideas. If the decision maker ignores the ideas of his subordinates or participants of the organization, it is not possible for him to get the target. KD is a way of using wisdom to accumulate the puzzle. If the decision maker does not bring together the puzzle pieces, he cannot get the big picture, and this shows its effects on the battlefield. In order to understand the battlefield, the decision maker has to use the intelligence cycle. To convert information to knowledge, KD is the main means for the intelligence cycle. On the other hand, the “Z Generation” born after the millennium are really the game changers. They have different attitudes from their elders. Their understanding of life is different - the definition of freedom and independence have different meanings to them than others. Decision makers have to consider these factors and rethink their decisions accordingly. This article tries to explain the relation between KD and Generation Z. KD is the main method of target managing. But if leaders neglect their people, the world will be seeing much more movements like the Arab Spring and other insurgencies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=knowledge%20development" title="knowledge development">knowledge development</a>, <a href="https://publications.waset.org/abstracts/search?q=knowledge%20management" title=" knowledge management"> knowledge management</a>, <a href="https://publications.waset.org/abstracts/search?q=generation%20Z" title=" generation Z"> generation Z</a>, <a href="https://publications.waset.org/abstracts/search?q=intelligence%20cycle" title=" intelligence cycle "> intelligence cycle </a> </p> <a href="https://publications.waset.org/abstracts/19492/reading-knowledge-development-and-its-phases-with-generation-z" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/19492.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">517</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">23</span> Pain Control by Ketamine in Combat Situation; Consideration and Outcomes</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20Javad%20Behzadnia">Mohammad Javad Behzadnia</a>, <a href="https://publications.waset.org/abstracts/search?q=Hamidreza%20Javadzadeh"> Hamidreza Javadzadeh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: Pain management is essential to surmounting multi-injured people in an overcrowded emergency setting. Its role would be more apparent when the physician encounters a mass casualty in a war zone or even a military prehospital. Having sedative and analgesic properties, rapid onset and offset effects, and maintaining the cardiovascular and respiratory contain are the main reason for selecting Ketamine as a good choice in the war zone. Methods: In a prospective interventional study in a war zone, we have selected and followed two groups of casualties for pain management. All were men with an average age of 26.6±8 y/o and 27.5 ±7 y/o in A and B groups, respectively. Group A received only Ketamine and Group B received Ketamine and diazepam. Results: This study showed that all of the injured patients who received Ketamine had experienced some agitation, and they may finally need benzodiazepines for sedation, but in group B that received benzodiazepine before or simultaneous with Ketamine, the agitation was significantly reduced. (P Value ≤0.05) Conclusion: Various factors may affect pain score and perception; patients' culture, mental health, previous drug usage, and addiction could alter the pain score in similar situations. It seems that the significant agitation is due to catecholamine release in stressful Moments of the battlefield. Accordingly, this situation could be exacerbated due to ketamine properties. Nonetheless, as a good choice in the war zone, Ketamine is now recommended to combine with benzodiazepines for procedural sedation and analgesia (PSA). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=battlefield" title="battlefield">battlefield</a>, <a href="https://publications.waset.org/abstracts/search?q=ketamine" title=" ketamine"> ketamine</a>, <a href="https://publications.waset.org/abstracts/search?q=benzodiazepine" title=" benzodiazepine"> benzodiazepine</a>, <a href="https://publications.waset.org/abstracts/search?q=pain%20control" title=" pain control"> pain control</a> </p> <a href="https://publications.waset.org/abstracts/163166/pain-control-by-ketamine-in-combat-situation-consideration-and-outcomes" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/163166.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">102</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">22</span> Heuristic Algorithms for Time Based Weapon-Target Assignment Problem</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hyun%20Seop%20Uhm">Hyun Seop Uhm</a>, <a href="https://publications.waset.org/abstracts/search?q=Yong%20Ho%20Choi"> Yong Ho Choi</a>, <a href="https://publications.waset.org/abstracts/search?q=Ji%20Eun%20Kim"> Ji Eun Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Young%20Hoon%20Lee"> Young Hoon Lee</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Weapon-target assignment (WTA) is a problem that assigns available launchers to appropriate targets in order to defend assets. Various algorithms for WTA have been developed over past years for both in the static and dynamic environment (denoted by SWTA and DWTA respectively). Due to the problem requirement to be solved in a relevant computational time, WTA has suffered from the solution efficiency. As a result, SWTA and DWTA problems have been solved in the limited situation of the battlefield. In this paper, the general situation under continuous time is considered by Time based Weapon Target Assignment (TWTA) problem. TWTA are studied using the mixed integer programming model, and three heuristic algorithms; decomposed opt-opt, decomposed opt-greedy, and greedy algorithms are suggested. Although the TWTA optimization model works inefficiently when it is characterized by a large size, the decomposed opt-opt algorithm based on the linearization and decomposition method extracted efficient solutions in a reasonable computation time. Because the computation time of the scheduling part is too long to solve by the optimization model, several algorithms based on greedy is proposed. The models show lower performance value than that of the decomposed opt-opt algorithm, but very short time is needed to compute. Hence, this paper proposes an improved method by applying decomposition to TWTA, and more practical and effectual methods can be developed for using TWTA on the battlefield. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=air%20and%20missile%20defense" title="air and missile defense">air and missile defense</a>, <a href="https://publications.waset.org/abstracts/search?q=weapon%20target%20assignment" title=" weapon target assignment"> weapon target assignment</a>, <a href="https://publications.waset.org/abstracts/search?q=mixed%20integer%20programming" title=" mixed integer programming"> mixed integer programming</a>, <a href="https://publications.waset.org/abstracts/search?q=piecewise%20linearization" title=" piecewise linearization"> piecewise linearization</a>, <a href="https://publications.waset.org/abstracts/search?q=decomposition%20algorithm" title=" decomposition algorithm"> decomposition algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=military%20operations%20research" title=" military operations research"> military operations research</a> </p> <a href="https://publications.waset.org/abstracts/51706/heuristic-algorithms-for-time-based-weapon-target-assignment-problem" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/51706.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">336</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">21</span> Dual-use UAVs in Armed Conflicts: Opportunities and Risks for Cyber and Electronic Warfare</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Piret%20Pernik">Piret Pernik</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Based on strategic, operational, and technical analysis of the ongoing armed conflict in Ukraine, this paper will examine the opportunities and risks of using small commercial drones (dual-use unmanned aerial vehicles, UAV) for military purposes. The paper discusses the opportunities and risks in the information domain, encompassing both cyber and electromagnetic interference and attacks. The paper will draw conclusions on a possible strategic impact to the battlefield outcomes in the modern armed conflicts by the widespread use of dual-use UAVs. This article will contribute to filling the gap in the literature by examining based on empirical data cyberattacks and electromagnetic interference. Today, more than one hundred states and non-state actors possess UAVs ranging from low cost commodity models, widely are dual-use, available and affordable to anyone, to high-cost combat UAVs (UCAV) with lethal kinetic strike capabilities, which can be enhanced with Artificial Intelligence (AI) and Machine Learning (ML). Dual-use UAVs have been used by various actors for intelligence, reconnaissance, surveillance, situational awareness, geolocation, and kinetic targeting. Thus they function as force multipliers enabling kinetic and electronic warfare attacks and provide comparative and asymmetric operational and tactical advances. Some go as far as argue that automated (or semi-automated) systems can change the character of warfare, while others observe that the use of small drones has not changed the balance of power or battlefield outcomes. UAVs give considerable opportunities for commanders, for example, because they can be operated without GPS navigation, makes them less vulnerable and dependent on satellite communications. They can and have been used to conduct cyberattacks, electromagnetic interference, and kinetic attacks. However, they are highly vulnerable to those attacks themselves. So far, strategic studies, literature, and expert commentary have overlooked cybersecurity and electronic interference dimension of the use of dual use UAVs. The studies that link technical analysis of opportunities and risks with strategic battlefield outcomes is missing. It is expected that dual use commercial UAV proliferation in armed and hybrid conflicts will continue and accelerate in the future. Therefore, it is important to understand specific opportunities and risks related to the crowdsourced use of dual-use UAVs, which can have kinetic effects. Technical countermeasures to protect UAVs differ depending on a type of UAV (small, midsize, large, stealth combat), and this paper will offer a unique analysis of small UAVs both from the view of opportunities and risks for commanders and other actors in armed conflict. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=dual-use%20technology" title="dual-use technology">dual-use technology</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20attacks" title=" cyber attacks"> cyber attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=electromagnetic%20warfare" title=" electromagnetic warfare"> electromagnetic warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=case%20studies%20of%20cyberattacks%20in%20armed%20conflicts" title=" case studies of cyberattacks in armed conflicts"> case studies of cyberattacks in armed conflicts</a> </p> <a href="https://publications.waset.org/abstracts/159847/dual-use-uavs-in-armed-conflicts-opportunities-and-risks-for-cyber-and-electronic-warfare" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/159847.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">102</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">20</span> Conceptual Design of Unmanned Aerial Targets</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20Adamski">M. Adamski</a>, <a href="https://publications.waset.org/abstracts/search?q=J.%20Cwiklak"> J. Cwiklak</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The contemporary battlefield creates a demand for more costly and highly advanced munitions. Training personnel responsible for operations, as well as an immediate execution of combat tasks, which engage real assets, is unrealistic and economically not feasible. Owing to a wide array of exploited simulators and various types of imitators, it is possible to reduce the costs. One of the effective elements of training, which can be applied in the training of all service branches, are imitators of aerial targets. This research serves as an introduction to the commencement of design analysis over a real aerial target imitator. Within the project, the basic aerodynamic calculations were made, which enabled to determine its geometry, design layout, performance, as well as the mass balance of individual components. The conducted calculations of the parameters of flight characteristics come closer to the real performance of such unmanned aerial vehicles. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=aerial%20target" title="aerial target">aerial target</a>, <a href="https://publications.waset.org/abstracts/search?q=aerodynamics" title=" aerodynamics"> aerodynamics</a>, <a href="https://publications.waset.org/abstracts/search?q=imitator" title=" imitator"> imitator</a>, <a href="https://publications.waset.org/abstracts/search?q=performance" title=" performance"> performance</a> </p> <a href="https://publications.waset.org/abstracts/32414/conceptual-design-of-unmanned-aerial-targets" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/32414.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">397</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">19</span> Modelling of the Fire Pragmatism in the Area of Military Management and Its Experimental Verification</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ivana%20Mokr%C3%A1">Ivana Mokrá</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The article deals with modelling of the fire pragmatism in the area of military management and its experimental verification. Potential approaches are based on the synergy of mathematical and theoretical ideas, operational and tactical requirements and the military decision-making process. This issue has taken on importance in recent times, particularly with the increasing trend of digitized battlefield, the development of C4ISR systems and intention to streamline the command and control process at the lowest levels of command. From fundamental and philosophical point of view, these new approaches seek to significantly upgrade and enhance the decision-making process of the tactical commanders. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=military%20management" title="military management">military management</a>, <a href="https://publications.waset.org/abstracts/search?q=decision-making%20process" title=" decision-making process"> decision-making process</a>, <a href="https://publications.waset.org/abstracts/search?q=strike%20modeling" title=" strike modeling"> strike modeling</a>, <a href="https://publications.waset.org/abstracts/search?q=experimental%20evaluation" title=" experimental evaluation"> experimental evaluation</a>, <a href="https://publications.waset.org/abstracts/search?q=pragmatism" title=" pragmatism"> pragmatism</a>, <a href="https://publications.waset.org/abstracts/search?q=tactical%20strike%20modeling" title=" tactical strike modeling"> tactical strike modeling</a> </p> <a href="https://publications.waset.org/abstracts/19392/modelling-of-the-fire-pragmatism-in-the-area-of-military-management-and-its-experimental-verification" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/19392.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">388</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18</span> Study on Wireless Transmission for Reconnaissance UAV with Wireless Sensor Network and Cylindrical Array of Microstrip Antennas</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chien-Chun%20Hung">Chien-Chun Hung</a>, <a href="https://publications.waset.org/abstracts/search?q=Chun-Fong%20Wu"> Chun-Fong Wu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It is important for a commander to have real-time information to aware situations and to make decision in the battlefield. Results of modern technique developments have brought in this kind of information for military purposes. Unmanned aerial vehicle (UAV) is one of the means to gather intelligence owing to its widespread applications. It is still not clear whether or not the mini UAV with short-range wireless transmission system is used as a reconnaissance system in Taiwanese. In this paper, previous experience on the research of the sort of aerial vehicles has been applied with a data-relay system using the ZigBee modulus. The mini UAV developed is expected to be able to collect certain data in some appropriate theaters. The omni-directional antenna with high gain is also integrated into mini UAV to fit the size-reducing trend of airborne sensors. Two advantages are so far obvious. First, mini UAV can fly higher than usual to avoid being attacked from ground fires. Second, the data will be almost gathered during all maneuvering attitudes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mini%20UAV" title="mini UAV">mini UAV</a>, <a href="https://publications.waset.org/abstracts/search?q=reconnaissance" title=" reconnaissance"> reconnaissance</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20transmission" title=" wireless transmission"> wireless transmission</a>, <a href="https://publications.waset.org/abstracts/search?q=ZigBee%20modulus" title=" ZigBee modulus"> ZigBee modulus</a> </p> <a href="https://publications.waset.org/abstracts/105615/study-on-wireless-transmission-for-reconnaissance-uav-with-wireless-sensor-network-and-cylindrical-array-of-microstrip-antennas" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/105615.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">194</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">17</span> Contemporary Technological Developments in Urban Warfare</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mehmet%20Ozturk">Mehmet Ozturk</a>, <a href="https://publications.waset.org/abstracts/search?q=Serdal%20Akyuz"> Serdal Akyuz</a>, <a href="https://publications.waset.org/abstracts/search?q=Halit%20Turan"> Halit Turan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> By the evolving technology, the nature of the war has been changed since the beginning of the history. In the first generation war, the bayonet came to the fore in battlefields; successively; in the second-generation firepower; in the third generation maneuver. Today, in the fourth-generation, fighters, sides, and even fighters’ borders are unclear; consequently, lines of the battles have lost their significance. Furthermore, the actors in the battles can be state or non-state, military, paramilitary or civilian. In order to change the balance according to their interests, parties have utilized the urban areas as warfare. The main reason for using urban areas as a battlefield is the imbalance between parties. To balance the power strength, exploiting technological developments has utmost importance. There are many newly developed technologies for urban warfare such as change in the size of the unmanned aerial vehicle, increased usage of unmanned ground vehicles (especially in supply and evacuation purposes), systems showing the behind of the wall, simulations used for educational purposes. This study will focus on the technological equipment being used for urban warfare. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=urban%20warfare" title="urban warfare">urban warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=unmanned%20ground%20vehicles" title=" unmanned ground vehicles"> unmanned ground vehicles</a>, <a href="https://publications.waset.org/abstracts/search?q=technological%20developments" title=" technological developments"> technological developments</a>, <a href="https://publications.waset.org/abstracts/search?q=nature%20of%20the%20war" title=" nature of the war"> nature of the war</a> </p> <a href="https://publications.waset.org/abstracts/39663/contemporary-technological-developments-in-urban-warfare" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/39663.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">419</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">16</span> Vibration Control of a Tracked Vehicle Driver Seat via Magnetorheological Damper</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wael%20Ata">Wael Ata</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Tracked vehicles are exposed to severe operating conditions during their battlefield. The suspension system of such vehicles plays a crucial role in the mitigation of vibration transmitted from unevenness to vehicle hull and consequently to the crew. When the vehicles are crossing the road with high speeds, the driver is subjected to a high magnitude of vibration dose. This is because of the passive suspension system of the tracked vehicle lack the effectiveness to withstand induced vibration from irregular terrains. This paper presents vibration control of a semi-active seat suspension incorporating Magnetorheological (MR) damper fitted to a driver seat of an amphibious tracked vehicle (BMP-1). A half vehicle model featuring the proposed semi-active seat suspension is developed and its governing equations are derived. Two controllers namely; skyhook and fuzzy logic skyhook based to suppress the vibration dose at driver’s seat are formulated. The results show that the controlled MR suspension seat along with the vehicle model has substantially suppressed vibration levels at the driver’s seat under bump and sinusoidal excitations <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tracked%20Vehicles" title="Tracked Vehicles">Tracked Vehicles</a>, <a href="https://publications.waset.org/abstracts/search?q=MR%20dampers" title=" MR dampers"> MR dampers</a>, <a href="https://publications.waset.org/abstracts/search?q=Skyhook%20%20controller" title=" Skyhook controller"> Skyhook controller</a>, <a href="https://publications.waset.org/abstracts/search?q=fuzzy%20logic%20controller" title=" fuzzy logic controller"> fuzzy logic controller</a> </p> <a href="https://publications.waset.org/abstracts/118209/vibration-control-of-a-tracked-vehicle-driver-seat-via-magnetorheological-damper" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/118209.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">121</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">15</span> Unmanned Systems in Urban Areas </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abdullah%20Beyazkurk">Abdullah Beyazkurk</a>, <a href="https://publications.waset.org/abstracts/search?q=Onur%20Ozdemir"> Onur Ozdemir</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The evolution of warfare has been affected from technological developments to a large extent. Another important factor that affected the evolution of warfare is the space. Technological developments became cornerstones for the organization of the forces on the field, while space of the battlefield gained importance with the introduction of urban areas as 'battlefields'. The use of urban areas as battlefields increased the casualty, while technological developments began to play a remedial role. Thus, the unmanned systems drew attention as the remedy. Today's widely used unmanned aerial vehicles have great effects on the operations. On the other hand, with the increasing urbanization, and the wide use of urban areas as battlefields make it a necessity to benefit from unmanned systems on the ground as well. This study focuses on the use of unmanned aerial systems as well as unmanned ground systems in urban warfare, with regards to their performance and cost affectivity. The study defends that the use of unmanned vehicles will be remedial for increasing casualty rates, while their precision and superhuman capacity will manifest the performance advantage. The findings of this study will help modern armies focus on unmanned systems, especially for the urban, anti-terror, or counter insurgency operations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=technology" title="technology">technology</a>, <a href="https://publications.waset.org/abstracts/search?q=warfare" title=" warfare"> warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=urban%20warfare" title=" urban warfare"> urban warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=unmanned%20systems" title=" unmanned systems"> unmanned systems</a>, <a href="https://publications.waset.org/abstracts/search?q=unmanned%20ground%20vehicles" title=" unmanned ground vehicles"> unmanned ground vehicles</a>, <a href="https://publications.waset.org/abstracts/search?q=unmanned%20aerial%20vehicles" title=" unmanned aerial vehicles"> unmanned aerial vehicles</a> </p> <a href="https://publications.waset.org/abstracts/30438/unmanned-systems-in-urban-areas" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/30438.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">354</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14</span> An Entropy Based Novel Algorithm for Internal Attack Detection in Wireless Sensor Network </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20R.%20Ahmed">Muhammad R. Ahmed</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohammed%20Aseeri"> Mohammed Aseeri</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Wireless Sensor Network (WSN) consists of low-cost and multi functional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. In this paper we present an internal attack detection method based on maximum entropy model. The final experimental works showed that the proposed algorithm does work well at the designed level. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=internal%20attack" title="internal attack">internal attack</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20sensor%20network" title=" wireless sensor network"> wireless sensor network</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20security" title=" network security"> network security</a>, <a href="https://publications.waset.org/abstracts/search?q=entropy" title=" entropy"> entropy</a> </p> <a href="https://publications.waset.org/abstracts/26980/an-entropy-based-novel-algorithm-for-internal-attack-detection-in-wireless-sensor-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/26980.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">455</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13</span> Low Probability of Intercept (LPI) Signal Detection and Analysis Using Choi-Williams Distribution</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=V.%20S.%20S.%20Kumar">V. S. S. Kumar</a>, <a href="https://publications.waset.org/abstracts/search?q=V.%20Ramya"> V. Ramya</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the modern electronic warfare, the signal scenario is changing at a rapid pace with the introduction of Low Probability of Intercept (LPI) radars. In the modern battlefield, radar system faces serious threats from passive intercept receivers such as Electronic Attack (EA) and Anti-Radiation Missiles (ARMs). To perform necessary target detection and tracking and simultaneously hide themselves from enemy attack, radar systems should be LPI. These LPI radars use a variety of complex signal modulation schemes together with pulse compression with the aid of advancement in signal processing capabilities of the radar such that the radar performs target detection and tracking while simultaneously hiding enemy from attack such as EA etc., thus posing a major challenge to the ES/ELINT receivers. Today an increasing number of LPI radars are being introduced into the modern platforms and weapon systems so these LPI radars created a requirement for the armed forces to develop new techniques, strategies and equipment to counter them. This paper presents various modulation techniques used in generation of LPI signals and development of Time Frequency Algorithms to analyse those signals. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anti-radiation%20missiles" title="anti-radiation missiles">anti-radiation missiles</a>, <a href="https://publications.waset.org/abstracts/search?q=cross%20terms" title=" cross terms"> cross terms</a>, <a href="https://publications.waset.org/abstracts/search?q=electronic%20attack" title=" electronic attack"> electronic attack</a>, <a href="https://publications.waset.org/abstracts/search?q=electronic%20intelligence" title=" electronic intelligence"> electronic intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=electronic%20warfare" title=" electronic warfare"> electronic warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=intercept%20receiver" title=" intercept receiver"> intercept receiver</a>, <a href="https://publications.waset.org/abstracts/search?q=low%20probability%20of%20intercept" title=" low probability of intercept"> low probability of intercept</a> </p> <a href="https://publications.waset.org/abstracts/4226/low-probability-of-intercept-lpi-signal-detection-and-analysis-using-choi-williams-distribution" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/4226.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">471</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12</span> The Role of the Defense and Future War in Ukraine</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Matthew%20J.%20Flynn">Matthew J. Flynn</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In early 2022, a thirty-mile column of Russian armor and assault vehicles sat poised to move south on the road to Kiev. That force has withdrawn as the Russians concentrate on attacking eastern Ukraine. Vladimir Putin’s armies appear content to destroy cities in an effort to attrit the Ukrainian will to continue fighting. That pivot signifies the acceptance of the ascendancy of the defense that now dictates any battlefield world-wide. To defeat what military theorist Carl von Clausewitz labeled “the stronger form of war” with a successful offensive requires an exercise in future war. In the past, the ascendancy of the defense has been overcome by a number of things including the application of superior leadership, better technology, organizational adaptation, and surpassing environmental limitations. A look at how each of these factors came to impact battle can tell us a great deal about what Ukraine means to tomorrow’s fight, and where the focus should lie to win the next war. Civilians presently secure the defensive ascendancy impacting warfare by dominating the shifts from domain to domain thanks to controlling access to cyberspace. That mandate will be tested and eventually falter. This paper tests the desirability of that proposition, as well as hoping for something more from humanity other than repeated and frequent wars making future war look much like past wars. As nations struggle to control cyberspace, a referendum on war as part of the human condition comes into focus. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber" title="cyber">cyber</a>, <a href="https://publications.waset.org/abstracts/search?q=domains" title=" domains"> domains</a>, <a href="https://publications.waset.org/abstracts/search?q=future%20war" title=" future war"> future war</a>, <a href="https://publications.waset.org/abstracts/search?q=Putin" title=" Putin"> Putin</a>, <a href="https://publications.waset.org/abstracts/search?q=Ukraine" title=" Ukraine"> Ukraine</a> </p> <a href="https://publications.waset.org/abstracts/154053/the-role-of-the-defense-and-future-war-in-ukraine" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/154053.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">113</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11</span> Carl von Clausewitz and Foucault on War and Power</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Damian%20Winczewski">Damian Winczewski</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Carl von Clausewitz’s political theory of war was criticized in the 20th century in several ways. It was also the source of many disagreements over readings of its most popular theses. Among them, the reflections of thinkers categorized as part of the broader postmodern current stand out, such as Michael Foucault and his successors, who presented a nuanced and critical approach to strategy theory. Foucault viewed it as part of a broader political–legal discourse of sovereignty rooted in the Middle Ages, which underlies modern biopower. Clausewitz’s theory of strategy underpinned a new humanist discourse rationalizing the phenomenon of war while, in a methodological sense, becoming an epistemic model of how Foucault conceived power strategy. Foucault’s contemporary commentators try to develop his position by arguing the analogy between the discourse prevailing in Clausewitz’s time and the contemporary neoliberal discourse and technological revolution on the battlefield, which create a new order of power. Meanwhile, they recognize that the modern development of strategy was to make Clausewitz’s understanding of war obsolete. However, postmodernists focusing on showy stylistics in their assessments rely on a mythologized narrative about Clausewitz, reducing his theories to a discourse of war as a way for nation-states to conduct foreign policy. In this article, Clausewitz shows that his theory goes much deeper and provides a critical perspective on the relationship between war and politics. The dialectical structure makes it possible to understand war as a historically variable but constantly policy-dependent phenomenon. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Clausewitz" title="Clausewitz">Clausewitz</a>, <a href="https://publications.waset.org/abstracts/search?q=Foucault" title=" Foucault"> Foucault</a>, <a href="https://publications.waset.org/abstracts/search?q=Virilio" title=" Virilio"> Virilio</a>, <a href="https://publications.waset.org/abstracts/search?q=postmodernism" title=" postmodernism"> postmodernism</a>, <a href="https://publications.waset.org/abstracts/search?q=war%20and%20politics" title=" war and politics"> war and politics</a>, <a href="https://publications.waset.org/abstracts/search?q=power" title=" power"> power</a> </p> <a href="https://publications.waset.org/abstracts/176732/carl-von-clausewitz-and-foucault-on-war-and-power" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/176732.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">71</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10</span> The Innovative Leadership in Air Forces</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ahmet%20Emre%20Yonder">Ahmet Emre Yonder</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The concept of present time is inevitably and rapidly changing. That provokes unbalanced, uncertain and elusive platform in the world order. Keeping up with this fluctuation requires a willingness to step beyond the comfort zones and to take a step through unknown. That is the perspectives of organizations in which the shareholders persistently create and then they share their creation. Moreover they are adapted to the unpredictable shifts and they establish vision. These are the meaning of innovation which is a process that converts new ideas to invaluable outcomes and that process can be ensured via innovative leaders. Leaders’ creativity is needed when challenging against countless complicated and unsteady situations in the battlefield. However, little attention has been paid to the importance of being innovative leader apart from innovating new technologies so far. Additionally, in most situation militarist organizations are hesitant to welcome different attitudes and that may discourage new ideas. Furthermore military leaders may complain about the lack of sources in today's world where the sources are very rare. In that point military leaders should change the strategies they apply from conventional views to the innovation of different point of views. But the constant occupation in Air Forces can be counted as a huge obstacle for innovative thinking. An organizational structure is needed to be developed for solutions of the problems which the creative leaders will encounter.This article focuses on how to raise innovative military leaders with innovative thinking skills and the need for a change from conventional to the innovative leadership in Air Forces. It also gives important suggestions to encourage raising innovative military leaders. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=air%20force" title="air force">air force</a>, <a href="https://publications.waset.org/abstracts/search?q=creativity" title=" creativity"> creativity</a>, <a href="https://publications.waset.org/abstracts/search?q=leadership" title=" leadership"> leadership</a>, <a href="https://publications.waset.org/abstracts/search?q=military" title=" military"> military</a>, <a href="https://publications.waset.org/abstracts/search?q=innovation" title=" innovation"> innovation</a> </p> <a href="https://publications.waset.org/abstracts/27258/the-innovative-leadership-in-air-forces" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/27258.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">313</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9</span> A Physiological Approach for Early Detection of Hemorrhage </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rabie%20Fadil">Rabie Fadil</a>, <a href="https://publications.waset.org/abstracts/search?q=Parshuram%20Aarotale"> Parshuram Aarotale</a>, <a href="https://publications.waset.org/abstracts/search?q=Shubha%20Majumder"> Shubha Majumder</a>, <a href="https://publications.waset.org/abstracts/search?q=Bijay%20Guargain"> Bijay Guargain</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Hemorrhage is the loss of blood from the circulatory system and leading cause of battlefield and postpartum related deaths. Early detection of hemorrhage remains the most effective strategy to reduce mortality rate caused by traumatic injuries. In this study, we investigated the physiological changes via non-invasive cardiac signals at rest and under different hemorrhage conditions simulated through graded lower-body negative pressure (LBNP). Simultaneous electrocardiogram (ECG), photoplethysmogram (PPG), blood pressure (BP), impedance cardiogram (ICG), and phonocardiogram (PCG) were acquired from 10 participants (age:28 ± 6 year, weight:73 ± 11 kg, height:172 ± 8 cm). The LBNP protocol consisted of applying -20, -30, -40, -50, and -60 mmHg pressure to the lower half of the body. Beat-to-beat heart rate (HR), systolic blood pressure (SBP), diastolic blood pressure (DBP), and mean aerial pressure (MAP) were extracted from ECG and blood pressure. Systolic amplitude (SA), systolic time (ST), diastolic time (DT), and left ventricle Ejection time (LVET) were extracted from PPG during each stage. Preliminary results showed that the application of -40 mmHg i.e. moderate stage simulated hemorrhage resulted significant changes in HR (85±4 bpm vs 68 ± 5bpm, p < 0.01), ST (191 ± 10 ms vs 253 ± 31 ms, p < 0.05), LVET (350 ± 14 ms vs 479 ± 47 ms, p < 0.05) and DT (551 ± 22 ms vs 683 ± 59 ms, p < 0.05) compared to rest, while no change was observed in SA (p > 0.05) as a consequence of LBNP application. These findings demonstrated the potential of cardiac signals in detecting moderate hemorrhage. In future, we will analyze all the LBNP stages and investigate the feasibility of other physiological signals to develop a predictive machine learning model for early detection of hemorrhage. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blood%20pressure" title="blood pressure">blood pressure</a>, <a href="https://publications.waset.org/abstracts/search?q=hemorrhage" title=" hemorrhage"> hemorrhage</a>, <a href="https://publications.waset.org/abstracts/search?q=lower-body%20negative%20pressure" title=" lower-body negative pressure"> lower-body negative pressure</a>, <a href="https://publications.waset.org/abstracts/search?q=LBNP" title=" LBNP"> LBNP</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning "> machine learning </a> </p> <a href="https://publications.waset.org/abstracts/114872/a-physiological-approach-for-early-detection-of-hemorrhage" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/114872.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">167</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8</span> The Evolution of Strike and Intelligence Functions in Special Operations Forces</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=John%20Hardy">John Hardy</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The expansion of special operations forces (SOF) in the twenty-first century is often discussed in terms of the size and disposition of SOF units. Research regarding the number SOF personnel, the equipment SOF units procure, and the variety of roles and mission that SOF fulfill in contemporary conflicts paints a fascinating picture of changing expectations for the use of force. A strong indicator of the changing nature of SOF in contemporary conflicts is the fusion of strike and intelligence functions in the SOF in many countries. What were once more distinct roles on the kind of battlefield generally associated with the concept of conventional warfare have become intermingled in the era of persistent conflict which SOF face. This study presents a historical analysis of the co-evolution of the intelligence and direct action functions carried out by SOF in counterterrorism, counterinsurgency, and training and mentoring missions between 2004 and 2016. The study focuses primarily on innovation in the US military and the diffusion of key concepts to US allies first, and then more broadly afterward. The findings show that there were three key phases of evolution throughout the period of study, each coinciding with a process of innovation and doctrinal adaptation. The first phase was characterized by the fusion of intelligence at the tactical and operational levels. The second phase was characterized by the industrial counterterrorism campaigns used by US SOF against irregular enemies in Iraq and Afghanistan. The third phase was characterized by increasing forward collection of actionable intelligence by SOF force elements in the course of direct action raids. The evolution of strike and intelligence functions in SOF operations between 2004 and 2016 was significantly influenced by reciprocity. Intelligence fusion led to more effective targeting, which then increased intelligence collection. Strike and intelligence functions were then enhanced by greater emphasis on intelligence exploitation during operations, which further increased the effectiveness of both strike and intelligence operations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=counterinsurgency" title="counterinsurgency">counterinsurgency</a>, <a href="https://publications.waset.org/abstracts/search?q=counterterrorism" title=" counterterrorism"> counterterrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=intelligence" title=" intelligence"> intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=irregular%20warfare" title=" irregular warfare"> irregular warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=military%20operations" title=" military operations"> military operations</a>, <a href="https://publications.waset.org/abstracts/search?q=special%20operations%20forces" title=" special operations forces"> special operations forces</a> </p> <a href="https://publications.waset.org/abstracts/94241/the-evolution-of-strike-and-intelligence-functions-in-special-operations-forces" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/94241.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">268</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7</span> Keratin Fiber Fabrication from Biowaste for Biomedical Application</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ashmita%20Mukherjee">Ashmita Mukherjee</a>, <a href="https://publications.waset.org/abstracts/search?q=Yogesh%20Harishchandra%20Kabutare"> Yogesh Harishchandra Kabutare</a>, <a href="https://publications.waset.org/abstracts/search?q=Suritra%20Bandyopadhyay"> Suritra Bandyopadhyay</a>, <a href="https://publications.waset.org/abstracts/search?q=Paulomi%20Ghosh"> Paulomi Ghosh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Uncontrolled bleeding in the battlefield and the operation rooms can lead to serious injuries, trauma and even be lethal. Keratin was reported to be a haemostatic material which rapidly activates thrombin followed by activation of fibrinogen leading to the formation of insoluble fibrin. Also platelets, the main initiator of haemostasis are reported to adhere to keratin. However, the major limitation of pure keratin as a biomaterial is its poor physical property and corresponding low mechanical strength. To overcome this problem, keratin was cross-linked with alginate to increase its mechanical stability. In our study, Keratin extracted from feather waste showed yield of 80.5% and protein content of 8.05 ± 0.43 mg/mL (n=3). FTIR and CD spectroscopy confirmed the presence of the essential functional groups and preservation of the secondary structures of keratin. The keratin was then cross-linked with alginate to make a dope. The dope was used to draw fibers of desired diameters in a suitable coagulation bath using a customized wet spinning setup. The resultant morphology of keratin fibers was observed under a brightfield microscope. The FT-IR analysis implied that there was a presence of both keratin and alginate peaks in the fibers. The cross-linking was confirmed in the keratin alginate fibers by a shift of the amide A and amide B peaks towards the right and disappearance of the peak for N-H stretching (1534.68 cm-1). Blood was drawn in citrate vacutainers for whole blood clotting test and blood clotting kinetics, which showed that the keratin fibers could accelerate blood coagulation compared to that of alginate fibers and tissue culture plate. Additionally, cross-linked keratin-alginate fiber was found to have lower haemolytic potential compared to alginate fiber. Thus, keratin cross-linked fibers can have potential applications to combat unrestrained bleeding. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=biomaterial" title="biomaterial">biomaterial</a>, <a href="https://publications.waset.org/abstracts/search?q=biowaste" title=" biowaste"> biowaste</a>, <a href="https://publications.waset.org/abstracts/search?q=fiber" title=" fiber"> fiber</a>, <a href="https://publications.waset.org/abstracts/search?q=keratin" title=" keratin"> keratin</a> </p> <a href="https://publications.waset.org/abstracts/105510/keratin-fiber-fabrication-from-biowaste-for-biomedical-application" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/105510.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">194</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6</span> Artificial Intelligence Impact on Strategic Stability</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Darius%20Jakimavicius">Darius Jakimavicius</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Artificial intelligence is the subject of intense debate in the international arena, identified both as a technological breakthrough and as a component of the strategic stability effect. Both the kinetic and non-kinetic development of AI and its application in the national strategies of the great powers may trigger a change in the security situation. Artificial intelligence is generally faster, more capable and more efficient than humans, and there is a temptation to transfer decision-making and control responsibilities to artificial intelligence. Artificial intelligence, which, once activated, can select and act on targets without further intervention by a human operator, blurs the boundary between human or robot (machine) warfare, or perhaps human and robot together. Artificial intelligence acts as a force multiplier that speeds up decision-making and reaction times on the battlefield. The role of humans is increasingly moving away from direct decision-making and away from command and control processes involving the use of force. It is worth noting that the autonomy and precision of AI systems make the process of strategic stability more complex. Deterrence theory is currently in a phase of development in which deterrence is undergoing further strain and crisis due to the complexity of the evolving models enabled by artificial intelligence. Based on the concept of strategic stability and deterrence theory, it is appropriate to develop further research on the development and impact of AI in order to assess AI from both a scientific and technical perspective: to capture a new niche in the scientific literature and academic terminology, to clarify the conditions for deterrence, and to identify the potential uses, impacts and possibly quantities of AI. The research problem is the impact of artificial intelligence developed by great powers on strategic stability. This thesis seeks to assess the impact of AI on strategic stability and deterrence principles, with human exclusion from the decision-making and control loop as a key axis. The interaction between AI and human actions and interests can determine fundamental changes in great powers' defense and deterrence, and the development and application of AI-based great powers strategies can lead to a change in strategic stability. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=artificial%20inteligence" title="artificial inteligence">artificial inteligence</a>, <a href="https://publications.waset.org/abstracts/search?q=strategic%20stability" title=" strategic stability"> strategic stability</a>, <a href="https://publications.waset.org/abstracts/search?q=deterrence%20theory" title=" deterrence theory"> deterrence theory</a>, <a href="https://publications.waset.org/abstracts/search?q=decision%20making%20loop" title=" decision making loop"> decision making loop</a> </p> <a href="https://publications.waset.org/abstracts/186282/artificial-intelligence-impact-on-strategic-stability" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/186282.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">41</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5</span> Evaluation of Natural Gums: Gum Tragacanth, Xanthan Gum, Guar Gum and Gum Acacia as Potential Hemostatic Agents</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Himanshu%20Kushwah">Himanshu Kushwah</a>, <a href="https://publications.waset.org/abstracts/search?q=Nidhi%20Sandal"> Nidhi Sandal</a>, <a href="https://publications.waset.org/abstracts/search?q=Meenakshi%20K.%20Chauhan"> Meenakshi K. Chauhan</a>, <a href="https://publications.waset.org/abstracts/search?q=Gaurav%20Mittal"> Gaurav Mittal</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Excessive bleeding is the primary factor of avoidable death in both civilian trauma centers as well as the military battlefield. Hundreds of Indian troops die every year due to blood loss caused by combat-related injuries. These deaths are avoidable and can be prevented to a large extent by making available a suitable hemostatic dressing in an emergency medical kit. In this study, natural gums were evaluated as potential hemostatic agents in combination with calcium gluconate. The study compares the hemostatic activity of Gum Tragacanth (GT), Guar Gum (GG), Xanthan Gum (XG) and Gum Acacia (GA) by carrying out different in-vitro and in-vivo studies. In-vitro studies were performed using the Lee-White method and Eustrek method, which includes the visual and microscopic analysis of blood clotting. MTT assay was also performed using human lymphocytes to check the cytotoxicity of the gums. The in-vivo studies were performed in Sprague Dawley rats using tail bleeding assay to evaluate the hemostatic efficacy of the gums and compared with a commercially available hemostatic sponge, Surgispon. Erythrocyte agglutination test was also performed to check the interaction between blood cells and the natural gums. Other parameters like blood loss, adherence strength of the developed hemostatic dressing material incorporating these gums, re-bleeding, and survival of the animals were also studied. The data obtained from the MTT assay showed that Guar gum, Gum Tragacanth, and Gum Acacia were not significantly cytotoxic, but substantial cytotoxicity was observed in Xanthan gum samples at high concentrations. Also, Xanthan gum took the least time with its minimum concentration to achieve hemostasis, (approximately 50 seconds at 3mg concentration). Gum Tragacanth also showed efficient hemostasis at a concentration of 35mg at the same time, but the other two gums tested were not able to clot the blood in significantly less time. A sponge dressing made of Tragacanth gum was found to be more efficient in achieving hemostasis and showed better practical applicability among all the gums studied and also when compared to the commercially available product, Surgispon, thus making it a potentially better alternative. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cytotoxicity" title="cytotoxicity">cytotoxicity</a>, <a href="https://publications.waset.org/abstracts/search?q=hemostasis" title=" hemostasis"> hemostasis</a>, <a href="https://publications.waset.org/abstracts/search?q=natural%20gums" title=" natural gums"> natural gums</a>, <a href="https://publications.waset.org/abstracts/search?q=sponge" title=" sponge"> sponge</a> </p> <a href="https://publications.waset.org/abstracts/112924/evaluation-of-natural-gums-gum-tragacanth-xanthan-gum-guar-gum-and-gum-acacia-as-potential-hemostatic-agents" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/112924.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">147</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4</span> Technological Exploitation and User Experience in Product Innovation: The Case Study of the High-Tech Mask</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Venere%20Ferraro">Venere Ferraro</a>, <a href="https://publications.waset.org/abstracts/search?q=Silvia%20%20Ferraris"> Silvia Ferraris</a> </p> <p class="card-text"><strong>Abstract:</strong></p> We live in a world pervaded by new advanced technologies that have been changing the way we live and experience the surrounded. Besides, new technologies enable product innovation at different levels. Nevertheless, innovation does not lie just in the technological development and in its hard aspects but also in the meaningful use of it for the final user. In order to generate innovative products, a new perspective is needed: The shift from an instrument-oriented view of the technology towards a broader view that includes aspects like aesthetics, acceptance, comfort, and sociability. In many businesses, the user experience of the product is considered the key battlefield to achieve product innovation. (Holland 2011) The use of new technologies is indeed useless without paying attention to the user experience. This paper presents a workshop activity conducted at Design School of Politecnico di Milano in collaboration with Chiba University and aimed at generating innovative design concepts of high-tech mask. The students were asked to design the user experience of a new mask by exploiting emerging technologies such as wearable sensors and information communication technology (ICT) for a chosen field of application: safety or sport. When it comes to the user experience, the mask is a very challenging design product, because it covers aspects of product interaction and, most important, psychological and cultural aspects related to the impact on the facial expression. Furthermore, since the mask affects the face expression quite a lot, it could be a barrier to hide with, or it could be a mean to enhance user’s communication to others. The main request for the students was to take on a user-centered approach: To go beyond the instrumental aspects of product use and usability and focus on the user experience by shaping the technology in a desirable and meaningful way for the user reasoning on the metaphorical and cultural level of the product. During the one-week workshop students were asked to face the design process through (i) the research phase: an in-deep analysis of the user and field of application (safety or sport) to set design spaces (brief) and user scenario; (ii) the idea generation, (iii) the idea development. This text will shortly go through the meaning of the product innovation, the use and application of wearable technologies and will then focus on the user experience design in contrast with the technology-driven approach in the field of product innovation. Finally authors will describe the workshop activity and the concepts developed by the students stressing the important role of the user experience design in new product development. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=product%20innovation" title="product innovation">product innovation</a>, <a href="https://publications.waset.org/abstracts/search?q=user%20experience" title=" user experience"> user experience</a>, <a href="https://publications.waset.org/abstracts/search?q=technological%20exploitation" title=" technological exploitation"> technological exploitation</a>, <a href="https://publications.waset.org/abstracts/search?q=wearable%20technologies" title=" wearable technologies"> wearable technologies</a> </p> <a href="https://publications.waset.org/abstracts/51783/technological-exploitation-and-user-experience-in-product-innovation-the-case-study-of-the-high-tech-mask" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/51783.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">345</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3</span> Islamic Extremist Groups' Usage of Populism in Social Media to Radicalize Muslim Migrants in Europe</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Irfan">Muhammad Irfan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The rise of radicalization within Islam has spawned a new era of global terror. The battlefield Successes of ISIS and the Taliban are fuelled by an ideological war waged, largely and successfully, in the media arena. This research will examine how Islamic extremist groups are using media modalities and populist narratives to influence migrant Muslim populations in Europe towards extremism. In 2014, ISIS shocked the world in exporting horrifically graphic forms of violence on social media. Their Muslim support base was largely disgusted and reviled. In response, they reconfigured their narrative by introducing populist 'hooks', astutely portraying the Muslim populous as oppressed and exploited by unjust, corrupt autocratic regimes and Western power structures. Within this crucible of real and perceived oppression, hundreds of thousands of the most desperate, vulnerable and abused migrants left their homelands, risking their lives in the hope of finding peace, justice, and prosperity in Europe. Instead, many encountered social stigmatization, detention and/or discrimination for being illegal migrants, for lacking resources and for simply being Muslim. This research will examine how Islamic extremist groups are exploiting the disenfranchisement of these migrant populations and using populist messaging on social media to influence them towards violent extremism. ISIS, in particular, formulates specific encoded messages for newly-arriving Muslims in Europe, preying upon their vulnerability. Violence is posited, as a populist response, to the tyranny of European oppression. This research will analyze the factors and indicators which propel Muslim migrants along the spectrum from resilience to violence extremism. Expected outcomes are identification of factors which influence vulnerability towards violent extremism; an early-warning detection framework; predictive analysis models; and de-radicalization frameworks. This research will provide valuable tools (practical and policy level) for European governments, security stakeholders, communities, policy-makers, and educators; it is anticipated to contribute to a de-escalation of Islamic extremism globally. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=populism" title="populism">populism</a>, <a href="https://publications.waset.org/abstracts/search?q=radicalization" title=" radicalization"> radicalization</a>, <a href="https://publications.waset.org/abstracts/search?q=de-radicalization" title=" de-radicalization"> de-radicalization</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20media" title=" social media"> social media</a>, <a href="https://publications.waset.org/abstracts/search?q=ISIS" title=" ISIS"> ISIS</a>, <a href="https://publications.waset.org/abstracts/search?q=Taliban" title=" Taliban"> Taliban</a>, <a href="https://publications.waset.org/abstracts/search?q=shariah" title=" shariah"> shariah</a>, <a href="https://publications.waset.org/abstracts/search?q=jihad" title=" jihad"> jihad</a>, <a href="https://publications.waset.org/abstracts/search?q=Islam" title=" Islam"> Islam</a>, <a href="https://publications.waset.org/abstracts/search?q=Europe" title=" Europe"> Europe</a>, <a href="https://publications.waset.org/abstracts/search?q=political%20communication" title=" political communication"> political communication</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorism" title=" terrorism"> terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=migrants" title=" migrants"> migrants</a>, <a href="https://publications.waset.org/abstracts/search?q=refugees" title=" refugees"> refugees</a>, <a href="https://publications.waset.org/abstracts/search?q=extremism" title=" extremism"> extremism</a>, <a href="https://publications.waset.org/abstracts/search?q=global%20terror" title=" global terror"> global terror</a>, <a href="https://publications.waset.org/abstracts/search?q=predictive%20analysis" title=" predictive analysis"> predictive analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=early%20warning%20detection" title=" early warning detection"> early warning detection</a>, <a href="https://publications.waset.org/abstracts/search?q=models" title=" models"> models</a>, <a href="https://publications.waset.org/abstracts/search?q=strategic%20communication" title=" strategic communication"> strategic communication</a>, <a href="https://publications.waset.org/abstracts/search?q=populist%20narratives" title=" populist narratives"> populist narratives</a>, <a href="https://publications.waset.org/abstracts/search?q=Islamic%20extremism" title=" Islamic extremism"> Islamic extremism</a> </p> <a href="https://publications.waset.org/abstracts/104677/islamic-extremist-groups-usage-of-populism-in-social-media-to-radicalize-muslim-migrants-in-europe" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/104677.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">119</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2</span> Ascribing Identities and Othering: A Multimodal Discourse Analysis of a BBC Documentary on YouTube</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shomaila%20Sadaf">Shomaila Sadaf</a>, <a href="https://publications.waset.org/abstracts/search?q=Margarethe%20Olbertz-Siitonen"> Margarethe Olbertz-Siitonen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study looks at identity and othering in discourses around sensitive issues in social media. More specifically, the study explores the multimodal resources and narratives through which the other is formed, and identities are ascribed in online spaces. As an integral part of social life, media spaces have become an important site for negotiating and ascribing identities. In line with recent research, identity is seen hereas constructions of belonging which go hand in hand with processes of in- and out-group formations that in some cases may lead to othering. Previous findings underline that identities are neither fixed nor limited but rather contextual, intersectional, and interactively achieved. The goal of this study is to explore and develop an understanding of how people co-construct the ‘other’ and ascribe certain identities in social media using multiple modes. In the beginning of the year 2018, the British government decided to include relationships, sexual orientation, and sex education into the curriculum of state funded primary schools. However, the addition of information related to LGBTQ+in the curriculum has been met with resistance, particularly from religious parents.For example, the British Muslim community has voiced their concerns and protested against the actions taken by the British government. YouTube has been used by news companies to air video stories covering the protest and narratives of the protestors along with the position ofschool officials. The analysis centers on a YouTube video dealing with the protest ofa local group of parents against the addition of information about LGBTQ+ in the curriculum in the UK. The video was posted in 2019. By the time of this study, the videos had approximately 169,000 views andaround 6000 comments. In deference to multimodal nature of YouTube videos, this study utilizes multimodal discourse analysis as a method of choice. The study is still ongoing and therefore has not yet yielded any final results. However, the initial analysis indicates a hierarchy of ascribing identities in the data. Drawing on multimodal resources, the media works with social categorizations throughout the documentary, presenting and classifying involved conflicting parties in the light of their own visible and audible identifications. The protesters can be seen to construct a strong group identity as Muslim parents (e.g., clothing and reference to shared values). While the video appears to be designed as a documentary that puts forward facts, the media does not seem to succeed in taking a neutral position consistently throughout the video. At times, the use of images, soundsand language contributes to the formation of “us” vs. “them”, where the audience is implicitly encouraged to pick a side. Only towards the end of the documentary this problematic opposition is addressed and critically reflected through an expert interview that is – interestingly – visually located outside the previously presented ‘battlefield’. This study contributes to the growing understanding of the discursive construction of the ‘other’ in social media. Videos available online are a rich source for examining how the different social actors ascribe multiple identities and form the other. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=identity" title="identity">identity</a>, <a href="https://publications.waset.org/abstracts/search?q=multimodal%20discourse%20analysis" title=" multimodal discourse analysis"> multimodal discourse analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=othering" title=" othering"> othering</a>, <a href="https://publications.waset.org/abstracts/search?q=youtube" title=" youtube"> youtube</a> </p> <a href="https://publications.waset.org/abstracts/147345/ascribing-identities-and-othering-a-multimodal-discourse-analysis-of-a-bbc-documentary-on-youtube" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/147345.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">113</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1</span> Extension of Moral Agency to Artificial Agents</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sofia%20Quaglia">Sofia Quaglia</a>, <a href="https://publications.waset.org/abstracts/search?q=Carmine%20Di%20Martino"> Carmine Di Martino</a>, <a href="https://publications.waset.org/abstracts/search?q=Brendan%20Tierney"> Brendan Tierney</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Artificial Intelligence (A.I.) constitutes various aspects of modern life, from the Machine Learning algorithms predicting the stocks on Wall streets to the killing of belligerents and innocents alike on the battlefield. Moreover, the end goal is to create autonomous A.I.; this means that the presence of humans in the decision-making process will be absent. The question comes naturally: when an A.I. does something wrong when its behavior is harmful to the community and its actions go against the law, which is to be held responsible? This research’s subject matter in A.I. and Robot Ethics focuses mainly on Robot Rights and its ultimate objective is to answer the questions: (i) What is the function of rights? (ii) Who is a right holder, what is personhood and the requirements needed to be a moral agent (therefore, accountable for responsibility)? (iii) Can an A.I. be a moral agent? (ontological requirements) and finally (iv) if it ought to be one (ethical implications). With the direction to answer this question, this research project was done via a collaboration between the School of Computer Science in the Technical University of Dublin that oversaw the technical aspects of this work, as well as the Department of Philosophy in the University of Milan, who supervised the philosophical framework and argumentation of the project. Firstly, it was found that all rights are positive and based on consensus; they change with time based on circumstances. Their function is to protect the social fabric and avoid dangerous situations. The same goes for the requirements considered necessary to be a moral agent: those are not absolute; in fact, they are constantly redesigned. Hence, the next logical step was to identify what requirements are regarded as fundamental in real-world judicial systems, comparing them to that of ones used in philosophy. Autonomy, free will, intentionality, consciousness and responsibility were identified as the requirements to be considered a moral agent. The work went on to build a symmetrical system between personhood and A.I. to enable the emergence of the ontological differences between the two. Each requirement is introduced, explained in the most relevant theories of contemporary philosophy, and observed in its manifestation in A.I. Finally, after completing the philosophical and technical analysis, conclusions were drawn. As underlined in the research questions, there are two issues regarding the assignment of moral agency to artificial agent: the first being that all the ontological requirements must be present and secondly being present or not, whether an A.I. ought to be considered as an artificial moral agent. From an ontological point of view, it is very hard to prove that an A.I. could be autonomous, free, intentional, conscious, and responsible. The philosophical accounts are often very theoretical and inconclusive, making it difficult to fully detect these requirements on an experimental level of demonstration. However, from an ethical point of view it makes sense to consider some A.I. as artificial moral agents, hence responsible for their own actions. When considering artificial agents as responsible, there can be applied already existing norms in our judicial system such as removing them from society, and re-educating them, in order to re-introduced them to society. This is in line with how the highest profile correctional facilities ought to work. Noticeably, this is a provisional conclusion and research must continue further. Nevertheless, the strength of the presented argument lies in its immediate applicability to real world scenarios. To refer to the aforementioned incidents, involving the murderer of innocents, when this thesis is applied it is possible to hold an A.I. accountable and responsible for its actions. This infers removing it from society by virtue of its un-usability, re-programming it and, only when properly functioning, re-introducing it successfully <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=artificial%20agency" title="artificial agency">artificial agency</a>, <a href="https://publications.waset.org/abstracts/search?q=correctional%20system" title=" correctional system"> correctional system</a>, <a href="https://publications.waset.org/abstracts/search?q=ethics" title=" ethics"> ethics</a>, <a href="https://publications.waset.org/abstracts/search?q=natural%20agency" title=" natural agency"> natural agency</a>, <a href="https://publications.waset.org/abstracts/search?q=responsibility" title=" responsibility"> responsibility</a> </p> <a href="https://publications.waset.org/abstracts/135477/extension-of-moral-agency-to-artificial-agents" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/135477.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">188</span> </span> </div> </div> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>