CINXE.COM

Search results for: multi-layered defense

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: multi-layered defense</title> <meta name="description" content="Search results for: multi-layered defense"> <meta name="keywords" content="multi-layered defense"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="multi-layered defense" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="multi-layered defense"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 492</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: multi-layered defense</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">492</span> A Framework for Embedding Industry 4.0 in the UAE Defence Manufacturing Industry</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Khalifa%20Al%20Baloushi">Khalifa Al Baloushi</a>, <a href="https://publications.waset.org/abstracts/search?q=Hongwei%20Zhang"> Hongwei Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Terrence%20Perera"> Terrence Perera</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Over the last few decades, the government of the UAE has been taking actions to consolidate defense manufacturing entities with the view to build a coherent and modern defense manufacturing base. Whilst these actions have significantly improved the overall capabilities of defense manufacturing; further opportunities exist to radically transform the sector. A comprehensive literature review and data collected from a survey identified three potential areas of improvements, (a) integration of Industry 4.0 technologies and other smart technologies, (b) stronger engagement of small and Medium-sized defense manufacturing companies and (c) Enhancing the national defense policies by embedding best practices from other nations. This research paper presents the design and development of a conceptual framework for the UAE defense industrial ecosystem. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=industry%204.0" title="industry 4.0">industry 4.0</a>, <a href="https://publications.waset.org/abstracts/search?q=defense%20manufacturing" title=" defense manufacturing"> defense manufacturing</a>, <a href="https://publications.waset.org/abstracts/search?q=eco-systems" title=" eco-systems"> eco-systems</a>, <a href="https://publications.waset.org/abstracts/search?q=integration" title=" integration"> integration</a> </p> <a href="https://publications.waset.org/abstracts/145808/a-framework-for-embedding-industry-40-in-the-uae-defence-manufacturing-industry" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/145808.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">207</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">491</span> Design of Compact UWB Multilayered Microstrip Filter with Wide Stopband</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=N.%20Azadi-Tinat">N. Azadi-Tinat</a>, <a href="https://publications.waset.org/abstracts/search?q=H.%20Oraizi"> H. Oraizi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Design of compact UWB multilayered microstrip filter with E-shape resonator is presented, which provides wide stopband up to 20 GHz and arbitrary impedance matching. The design procedure is developed based on the method of least squares and theory of N-coupled transmission lines. The dimensions of designed filter are about 11 mm × 11 mm and the three E-shape resonators are placed among four dielectric layers. The average insertion loss in the passband is less than 1 dB and in the stopband is about 30 dB up to 20 GHz. Its group delay in the UWB region is about 0.5 ns. The performance of the optimized filter design perfectly agrees with the microwave simulation softwares. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=method%20of%20least%20square" title="method of least square">method of least square</a>, <a href="https://publications.waset.org/abstracts/search?q=multilayer%20microstrip%20filter" title=" multilayer microstrip filter"> multilayer microstrip filter</a>, <a href="https://publications.waset.org/abstracts/search?q=n-coupled%20transmission%20lines" title=" n-coupled transmission lines"> n-coupled transmission lines</a>, <a href="https://publications.waset.org/abstracts/search?q=ultra-wideband" title=" ultra-wideband"> ultra-wideband</a> </p> <a href="https://publications.waset.org/abstracts/51257/design-of-compact-uwb-multilayered-microstrip-filter-with-wide-stopband" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/51257.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">392</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">490</span> Literature Review: Adversarial Machine Learning Defense in Malware Detection</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Leidy%20M.%20Aldana">Leidy M. Aldana</a>, <a href="https://publications.waset.org/abstracts/search?q=Jorge%20E.%20Camargo"> Jorge E. Camargo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Adversarial Machine Learning has gained importance in recent years as Cybersecurity has gained too, especially malware, it has affected different entities and people in recent years. This paper shows a literature review about defense methods created to prevent adversarial machine learning attacks, firstable it shows an introduction about the context and the description of some terms, in the results section some of the attacks are described, focusing on detecting adversarial examples before coming to the machine learning algorithm and showing other categories that exist in defense. A method with five steps is proposed in the method section in order to define a way to make the literature review; in addition, this paper summarizes the contributions in this research field in the last seven years to identify research directions in this area. About the findings, the category with least quantity of challenges in defense is the Detection of adversarial examples being this one a viable research route with the adaptive approach in attack and defense. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Malware" title="Malware">Malware</a>, <a href="https://publications.waset.org/abstracts/search?q=adversarial" title=" adversarial"> adversarial</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=defense" title=" defense"> defense</a>, <a href="https://publications.waset.org/abstracts/search?q=attack" title=" attack"> attack</a> </p> <a href="https://publications.waset.org/abstracts/177946/literature-review-adversarial-machine-learning-defense-in-malware-detection" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/177946.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">63</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">489</span> Performance Based Logistics and Applications in Turkey</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ferhat%20Yilmaz">Ferhat Yilmaz</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Defense sector is one of the most important areas where logistics is used extensively. Nations give importance to their defense spending in order to survive in their geography. Parallel to the rising crises around the world, governments increase their defense spending; however, resources are limited while the needs are infinite. Therefore, countries try to develop a more effective use of their defense budget. In order to make logistics more effective and efficient, performance- based logistical system was developed. This article tries to explain the Performance-based Logistical System, its employment process, employment areas, and how it will be used along with other main systems in the Turkey. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=performance" title="performance">performance</a>, <a href="https://publications.waset.org/abstracts/search?q=performance%20based%20logistics%20applications" title=" performance based logistics applications"> performance based logistics applications</a>, <a href="https://publications.waset.org/abstracts/search?q=logistical%20system" title=" logistical system"> logistical system</a>, <a href="https://publications.waset.org/abstracts/search?q=Turkey" title=" Turkey"> Turkey</a> </p> <a href="https://publications.waset.org/abstracts/31834/performance-based-logistics-and-applications-in-turkey" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31834.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">482</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">488</span> Self-denigration in Doctoral Defense Sessions: Scale Development and Validation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Alireza%20Jalilifar">Alireza Jalilifar</a>, <a href="https://publications.waset.org/abstracts/search?q=Nadia%20Mayahi"> Nadia Mayahi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The dissertation defense as a complicated conflict-prone context entails the adoption of elegant interactional strategies, one of which is self-denigration. This study aimed to develop and validate a self-denigration model that fits the context of doctoral defense sessions in applied linguistics. Two focus group discussions provided the basis for developing this conceptual model, which assumed 10 functions for self-denigration, namely good manners, modesty, affability, altruism, assertiveness, diffidence, coercive self-deprecation, evasion, diplomacy, and flamboyance. These functions were used to design a 40-item questionnaire on the attitudes of applied linguists concerning self-denigration in defense sessions. The confirmatory factor analysis of the questionnaire indicated the predictive ability of the measurement model. The findings of this study suggest that self-denigration in doctoral defense sessions is the social representation of the participants’ values, ideas and practices adopted as a negotiation strategy and a conflict management policy for the purpose of establishing harmony and maintaining resilience. This study has implications for doctoral students and academics and illuminates further research on self-denigration in other contexts. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=academic%20discourse" title="academic discourse">academic discourse</a>, <a href="https://publications.waset.org/abstracts/search?q=politeness" title=" politeness"> politeness</a>, <a href="https://publications.waset.org/abstracts/search?q=self-denigration" title=" self-denigration"> self-denigration</a>, <a href="https://publications.waset.org/abstracts/search?q=grounded%20theory" title=" grounded theory"> grounded theory</a>, <a href="https://publications.waset.org/abstracts/search?q=dissertation%20defense" title=" dissertation defense"> dissertation defense</a> </p> <a href="https://publications.waset.org/abstracts/143887/self-denigration-in-doctoral-defense-sessions-scale-development-and-validation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/143887.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">137</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">487</span> Defense Mechanism Maturity and the Severity of Mood Disorder Symptoms</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Maja%20Pand%C5%BEa">Maja Pandža</a>, <a href="https://publications.waset.org/abstracts/search?q=Sanjin%20Lovri%C4%87"> Sanjin Lovrić</a>, <a href="https://publications.waset.org/abstracts/search?q=Iva%20%C4%8Colak"> Iva Čolak</a>, <a href="https://publications.waset.org/abstracts/search?q=Josipa%20Mandari%C4%87"> Josipa Mandarić</a>, <a href="https://publications.waset.org/abstracts/search?q=Miro%20Klari%C4%87"> Miro Klarić</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study explores the role of symptoms related to mood disorders salience on different types of defense mechanisms (mature, neurotic, immature) predominance. Total of 177 both clinical and non-clinical participants in Mostar, Bosnia & Herzegovina, completed a battery of questionnaires associated with defense mechanisms and self-reported depression and anxiety symptoms. The sample was additionally divided into four groups, given the level of symptoms experienced: 1. minimal, 2. mild, 3. moderate, 4. severe depression/anxiety. Participants with minimal anxiety and depression symptoms use mature defense mechanisms more often than other three groups. Immature mechanisms are most commonly used by the group with severe depression/anxiety levels in comparison with other groups. These differences are discussed on the dynamic level of analysis to have a better understanding of the relationship between defense mechanisms' maturity and degree of mood disorders' symptom severity. Also, results given could serve as an implication for the psychotherapeutic treatment plans. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anxiety%2Fdepression%20symptoms" title="anxiety/depression symptoms">anxiety/depression symptoms</a>, <a href="https://publications.waset.org/abstracts/search?q=clinical%2Fnon-clinical%20sample" title=" clinical/non-clinical sample"> clinical/non-clinical sample</a>, <a href="https://publications.waset.org/abstracts/search?q=defense%20mechanism%20maturity" title=" defense mechanism maturity"> defense mechanism maturity</a>, <a href="https://publications.waset.org/abstracts/search?q=dynamic%20approach" title=" dynamic approach"> dynamic approach</a> </p> <a href="https://publications.waset.org/abstracts/34314/defense-mechanism-maturity-and-the-severity-of-mood-disorder-symptoms" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/34314.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">457</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">486</span> [Keynote Talk]: A Comparative Study on Air Permeability Properties of Multilayered Nonwoven Structures </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20Kucukali%20Ozturk">M. Kucukali Ozturk</a>, <a href="https://publications.waset.org/abstracts/search?q=B.%20Nergis"> B. Nergis</a>, <a href="https://publications.waset.org/abstracts/search?q=C.%20Candan"> C. Candan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Air permeability plays an important role for applications such as filtration, thermal and acoustic insulation. The study discussed in this paper was conducted in an attempt to investigate air permeability property of various combinations of nonwovens. The PROWHITE air permeability tester was used for the measurement of the air permeability of the samples in accordance with the relevant standards and a comparative study of the results were made. It was found that the fabric mass per unit area was closely related to the air-permeability. The air permeability decreased with the increase in mass per unit area. Additionally, the air permeability of nonwoven fabrics decreased with the increase in thickness. Moreover, air permeability of multilayered SMS nonwoven structures was lower than those of single layered ones. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=air%20permeability" title="air permeability">air permeability</a>, <a href="https://publications.waset.org/abstracts/search?q=mass%20per%20unit%20area" title=" mass per unit area"> mass per unit area</a>, <a href="https://publications.waset.org/abstracts/search?q=nonwoven%20structure" title=" nonwoven structure"> nonwoven structure</a>, <a href="https://publications.waset.org/abstracts/search?q=polypropylene%20nonwoven" title=" polypropylene nonwoven"> polypropylene nonwoven</a>, <a href="https://publications.waset.org/abstracts/search?q=thickness" title=" thickness"> thickness</a> </p> <a href="https://publications.waset.org/abstracts/62811/keynote-talk-a-comparative-study-on-air-permeability-properties-of-multilayered-nonwoven-structures" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/62811.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">346</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">485</span> A Macroeconomic Analysis of Defense Industry: Comparisons, Trends and Improvements in Brazil and in the World</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=J.%20Fajardo">J. Fajardo</a>, <a href="https://publications.waset.org/abstracts/search?q=J.%20Guerra"> J. Guerra</a>, <a href="https://publications.waset.org/abstracts/search?q=E.%20Gonzales"> E. Gonzales</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper will outline a study of Brazil's industrial base of defense (IDB), through a bibliographic research method, combined with an analysis of macroeconomic data from several available public data platforms. This paper begins with a brief study about Brazilian national industry, including analyzes of productivity, income, outcome and jobs. Next, the research presents a study on the defense industry in Brazil, presenting the main national companies that operate in the aeronautical, army and naval branches. After knowing the main points of the Brazilian defense industry, data on the productivity of the defense industry of the main countries and competing companies of the Brazilian industry were analyzed, in order to summarize big cases in Brazil with a comparative analysis. Concerned the methodology, were used bibliographic research and the exploration of historical data series, in order to analyze information, to get trends and to make comparisons along the time. The research is finished with the main trends for the development of the Brazilian defense industry, comparing the current situation with the point of view of several countries. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=economics%20of%20defence" title="economics of defence">economics of defence</a>, <a href="https://publications.waset.org/abstracts/search?q=industry" title=" industry"> industry</a>, <a href="https://publications.waset.org/abstracts/search?q=trends" title=" trends"> trends</a>, <a href="https://publications.waset.org/abstracts/search?q=market" title=" market"> market</a> </p> <a href="https://publications.waset.org/abstracts/99239/a-macroeconomic-analysis-of-defense-industry-comparisons-trends-and-improvements-in-brazil-and-in-the-world" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/99239.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">155</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">484</span> Implementation of Gender Policy in the Georgian National Defence: Key Issues and Challenges</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vephkhvia%20Grigalashvili">Vephkhvia Grigalashvili</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The defense of Georgia is every citizen’s duty. The present article reviews the principles and standards of gender policy in the Georgian national defense sector. In addition, it looks at mechanisms for ensuring gender equality, going through the relevant Georgian legislation. Furthermore, this work aims to conduct a comparative analysis of defense models of Georgia, Finland, and the Baltic States in order to identify core institutional challenges. The study produced the following findings:(a) The national defense planning is based on the Total Defense approach, which implies a wide involvement of the country`s population in state defense. (b) This political act does not specify gender equality aspects of the Total Defense strategy; (c) According to the Constitution of Georgia, irrespective of gender factors, every citizen of Georgia is legally obliged to participate in state security activities. However, the state has an authority (power of choice) to decide which gender group (male or/and female citizen) must fulfill above mentioned their constitutional commitment. For instance, completion of compulsory military and reserve military services is a male citizen’s duty, whereas professional military service is equally accessible to both genders. The study concludes that effective implementation of the Total Defense concept largely depends on how Georgia uses its capabilities and human resources. Based on the statistical fact that more than 50% of the country’s population are women, Georgia has to elaborate on relevant institutional mechanisms for implementation of gender equality in the national defense organization. In this regard, it would be advisable: (i) to give the legal opportunity to women to serve in compulsory military service, and (ii) to develop labor reserve service as a part of the anti-crisis management system of Georgia. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=gender%20in%20defense%20organisation" title="gender in defense organisation">gender in defense organisation</a>, <a href="https://publications.waset.org/abstracts/search?q=gender%20mechanisms" title=" gender mechanisms"> gender mechanisms</a>, <a href="https://publications.waset.org/abstracts/search?q=gender%20in%20defense%20policy" title=" gender in defense policy"> gender in defense policy</a>, <a href="https://publications.waset.org/abstracts/search?q=gender%20policy" title=" gender policy"> gender policy</a> </p> <a href="https://publications.waset.org/abstracts/111949/implementation-of-gender-policy-in-the-georgian-national-defence-key-issues-and-challenges" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/111949.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">161</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">483</span> The Limits to Self-Defense Claims in Case of Domestic Violence Homicides</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Maria%20Elisabete%20Costa%20Ferreira">Maria Elisabete Costa Ferreira</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Domestic violence is a serious social issue in which victims are mostly women. Domestic violence develops in cycles, starting with the building of tension, passing through the incident of abuse and ending with reconciliation, also known as honeymoon. As time goes by, the shorter these phases become, and the greater and more severe the attacks, rarely leading to the death of the victim of abuse. Sometimes, the victim stops the abuse by killing the aggressor, usually after the immediate aggression has taken place. This poses an important obstacle to the claim of self-defense by the victim of domestic violence pending trial for the homicide of her long-time abuser. The main problem with self-defense claims in such cases is that the law requires the act of aggression to be present or imminent (imminent threat or immediate danger) so that it permits the victim to take her defense into her own hands. If the episode of aggression has already taken place, this general requirement for the admissibility of self-defense is not satisfied. This paper sheds new light on the concept of the actuality of the aggression, understanding that, since domestic violence is a permanent offense, for as long as the victim stays under the domain of the aggressor, imminent threat will be present, allowing the self-defense claim of a woman who kills her abuser in such circumstances to be admissible. An actualist interpretation of the requirement of the necessity of the means used in self-defense will be satisfied when evaluated from the subjective perspective of the intimate partner victim. Necessity will be satisfied if it is reasonable for the victim to perceive the use of lethal force as the only means to release herself from the abuser. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=domestic%20violence" title="domestic violence">domestic violence</a>, <a href="https://publications.waset.org/abstracts/search?q=homicide" title=" homicide"> homicide</a>, <a href="https://publications.waset.org/abstracts/search?q=self-defense" title=" self-defense"> self-defense</a>, <a href="https://publications.waset.org/abstracts/search?q=imminent%20threat" title=" imminent threat"> imminent threat</a>, <a href="https://publications.waset.org/abstracts/search?q=necessity%20of%20lethal%20force" title=" necessity of lethal force"> necessity of lethal force</a> </p> <a href="https://publications.waset.org/abstracts/171695/the-limits-to-self-defense-claims-in-case-of-domestic-violence-homicides" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/171695.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">65</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">482</span> Predicting the Relationship Between Childhood Trauma on the Formation of Defense Mechanisms with the Mediating Role of Object Relations in Traders</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ahmadreza%20Jabalameli">Ahmadreza Jabalameli</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20Ebrahimpour%20Borujeni"> Mohammad Ebrahimpour Borujeni</a> </p> <p class="card-text"><strong>Abstract:</strong></p> According to psychodynamic theories, the major personality structure of individuals is formed in the first years of life. Trauma is an inseparable and undeniable part of everyone's life and they inevitably struggle with many traumas that can have a very significant impact on their lives. The present study deals with the relationship between childhood trauma on the formation of defense mechanisms and the role of object relations. The present descriptive study is a correlation with structural equation modeling (SEM). Sample selection is available and consists of 200 knowledgeable traders in Jabalameli Information Technology Company. The results indicate that the experience of childhood trauma with a demographic moderating effect, through the mediating role of object relations can lead to vulnerability to ego reality functionality and immature and psychically disturbed defense mechanisms. In this regard, there is a significant negative relationship between childhood trauma and object relations with mature defense mechanisms. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=childhood%20trauma" title="childhood trauma">childhood trauma</a>, <a href="https://publications.waset.org/abstracts/search?q=defense%20mechanisms" title=" defense mechanisms"> defense mechanisms</a>, <a href="https://publications.waset.org/abstracts/search?q=object%20relations" title=" object relations"> object relations</a>, <a href="https://publications.waset.org/abstracts/search?q=trade" title=" trade"> trade</a> </p> <a href="https://publications.waset.org/abstracts/148276/predicting-the-relationship-between-childhood-trauma-on-the-formation-of-defense-mechanisms-with-the-mediating-role-of-object-relations-in-traders" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/148276.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">132</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">481</span> Enhancing the Effectiveness of Air Defense Systems through Simulation Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=F.%20Felipe">F. Felipe</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Air Defense Systems contain high-value assets that are expected to fulfill their mission for several years - in many cases, even decades - while operating in a fast-changing, technology-driven environment. Thus, it is paramount that decision-makers can assess how effective an Air Defense System is in the face of new developing threats, as well as to identify the bottlenecks that could jeopardize the security of the airspace of a country. Given the broad extent of activities and the great variety of assets necessary to achieve the strategic objectives, a systems approach was taken in order to delineate the core requirements and the physical architecture of an Air Defense System. Then, value-focused thinking helped in the definition of the measures of effectiveness. Furthermore, analytical methods were applied to create a formal structure that preliminarily assesses such measures. To validate the proposed methodology, a powerful simulation was also used to determine the measures of effectiveness, now in more complex environments that incorporate both uncertainty and multiple interactions of the entities. The results regarding the validity of this methodology suggest that the approach can support decisions aimed at enhancing the capabilities of Air Defense Systems. In conclusion, this paper sheds some light on how consolidated approaches of Systems Engineering and Operations Research can be used as valid techniques for solving problems regarding a complex and yet vital matter. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=air%20defense" title="air defense">air defense</a>, <a href="https://publications.waset.org/abstracts/search?q=effectiveness" title=" effectiveness"> effectiveness</a>, <a href="https://publications.waset.org/abstracts/search?q=system" title=" system"> system</a>, <a href="https://publications.waset.org/abstracts/search?q=simulation" title=" simulation"> simulation</a>, <a href="https://publications.waset.org/abstracts/search?q=decision-support" title=" decision-support"> decision-support</a> </p> <a href="https://publications.waset.org/abstracts/125149/enhancing-the-effectiveness-of-air-defense-systems-through-simulation-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/125149.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">156</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">480</span> The Role of Defense Mechanisms in Treatment Adherence in Type 2 Diabetes Mellitus: An Exploratory Study</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=F.%20Marchini">F. Marchini</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Caputo"> A. Caputo</a>, <a href="https://publications.waset.org/abstracts/search?q=J.%20Balonan"> J. Balonan</a>, <a href="https://publications.waset.org/abstracts/search?q=F.%20Fedele"> F. Fedele</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Napoli"> A. Napoli</a>, <a href="https://publications.waset.org/abstracts/search?q=V.%20Langher"> V. Langher</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Aim: The present study aims to explore the specific role of defense mechanisms in persons with type 2 diabetes mellitus in treatment adherence. Materials and methods: A correlational study design was employed. Thirty-two persons with type 2 diabetes mellitus were enrolled and assessed with Defense Mechanism Inventory, Beck Depression Inventory-II, Toronto Alexithymia Scale and Self-Care Inventory-Revised. Bivariate correlation and two-step regression analyses were performed. Results: Treatment adherence negatively correlates with hetero-directed hostility (r= -.537; p < .01), whereas it is positively associated with principalization (r= .407; p < .05). These two defense mechanisms overall explain an incremental variance of 26.9% in treatment adherence (ΔF=4.189, df1=2, df2 =21, p < .05), over and above the control variables for depression and alexithymia. However, only higher hetero-directed hostility is found to be a solid predictor of a decreased treatment adherence (β=-.497, p < .05). Conclusions: Despite providing preliminary results, this pilot study highlights the original contribution of defense mechanisms in adherence to type 2 diabetes regimens. Specifically, hetero-directed hostility may relate to an unconscious process, according to which disease-related painful feelings are displaced onto care relationships with negative impacts on adherence. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=alexithymia" title="alexithymia">alexithymia</a>, <a href="https://publications.waset.org/abstracts/search?q=defense%20mechanisms" title=" defense mechanisms"> defense mechanisms</a>, <a href="https://publications.waset.org/abstracts/search?q=treatment%20adherence" title=" treatment adherence"> treatment adherence</a>, <a href="https://publications.waset.org/abstracts/search?q=type%202%20diabetes%20mellitus" title=" type 2 diabetes mellitus"> type 2 diabetes mellitus</a> </p> <a href="https://publications.waset.org/abstracts/93212/the-role-of-defense-mechanisms-in-treatment-adherence-in-type-2-diabetes-mellitus-an-exploratory-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/93212.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">319</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">479</span> Parallel Evaluation of Sommerfeld Integrals for Multilayer Dyadic Green&#039;s Function</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Duygu%20Kan">Duygu Kan</a>, <a href="https://publications.waset.org/abstracts/search?q=Mehmet%20Cayoren"> Mehmet Cayoren</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Sommerfeld-integrals (SIs) are commonly encountered in electromagnetics problems involving analysis of antennas and scatterers embedded in planar multilayered media. Generally speaking, the analytical solution of SIs is unavailable, and it is well known that numerical evaluation of SIs is very time consuming and computationally expensive due to the highly oscillating and slowly decaying nature of the integrands. Therefore, fast computation of SIs has a paramount importance. In this paper, a parallel code has been developed to speed up the computation of SI in the framework of calculation of dyadic Green’s function in multilayered media. OpenMP shared memory approach is used to parallelize the SI algorithm and resulted in significant time savings. Moreover accelerating the computation of dyadic Green’s function is discussed based on the parallel SI algorithm developed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sommerfeld-integrals" title="Sommerfeld-integrals">Sommerfeld-integrals</a>, <a href="https://publications.waset.org/abstracts/search?q=multilayer%20dyadic%20Green%E2%80%99s%20function" title=" multilayer dyadic Green’s function"> multilayer dyadic Green’s function</a>, <a href="https://publications.waset.org/abstracts/search?q=OpenMP" title=" OpenMP"> OpenMP</a>, <a href="https://publications.waset.org/abstracts/search?q=shared%20memory%20parallel%20programming" title=" shared memory parallel programming"> shared memory parallel programming</a> </p> <a href="https://publications.waset.org/abstracts/73819/parallel-evaluation-of-sommerfeld-integrals-for-multilayer-dyadic-greens-function" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/73819.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">247</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">478</span> Investigation of Stoneley Waves in Multilayered Plates</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bing%20Li">Bing Li</a>, <a href="https://publications.waset.org/abstracts/search?q=Tong%20Lu"> Tong Lu</a>, <a href="https://publications.waset.org/abstracts/search?q=Lei%20Qiang"> Lei Qiang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Stoneley waves are interface waves that propagate at the interface between two solid media. In this study, the dispersion characteristics and wave structures of Stoneley waves in elastic multilayered plates are displayed and investigated. With a perspective of bulk wave, a reasonable assumption of the potential function forms of the expansion wave and shear wave in nth layer medium is adopted, and the characteristic equation of Stoneley waves in a three-layered plate is given in a determinant form. The dispersion curves and wave structures are solved and presented in both numerical and simulation results. It is observed that two Stoneley wave modes exist in a three-layered plate, that conspicuous dispersion occurs on low frequency band, that the velocity of each Stoneley wave mode approaches the corresponding Stoneley wave velocity at interface between two half infinite spaces. The wave structures reveal that the in-plane displacement of Stoneley waves are relatively high at interfaces, which shows great potential for interface defects detection. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=characteristic%20equation" title="characteristic equation">characteristic equation</a>, <a href="https://publications.waset.org/abstracts/search?q=interface%20waves" title=" interface waves"> interface waves</a>, <a href="https://publications.waset.org/abstracts/search?q=potential%20function" title=" potential function"> potential function</a>, <a href="https://publications.waset.org/abstracts/search?q=Stoneley%20waves" title=" Stoneley waves"> Stoneley waves</a>, <a href="https://publications.waset.org/abstracts/search?q=wave%20structure" title=" wave structure"> wave structure</a> </p> <a href="https://publications.waset.org/abstracts/45214/investigation-of-stoneley-waves-in-multilayered-plates" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/45214.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">319</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">477</span> An Approach for Multilayered Ecological Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=N.%20F.%20F.%20Ebecken">N. F. F. Ebecken</a>, <a href="https://publications.waset.org/abstracts/search?q=G.%20C.%20Pereira"> G. C. Pereira</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Although networks provide a powerful approach to the study of a wide variety of ecological systems, their formulation usually does not include various types of interactions, interactions that vary in space and time, and interconnected systems such as networks. The emerging field of 'multilayer networks' provides a natural framework for extending ecological systems analysis to include these multiple layers of complexity as it specifically allows for differentiation and modeling of intralayer and interlayer connectivity. The structure provides a set of concepts and tools that can be adapted and applied to the ecology, facilitating research in high dimensionality, heterogeneous systems in nature. Here, ecological multilayer networks are formally defined based on a review of prior and related approaches, illustrates their application and potential with existing data analyzes, and discusses limitations, challenges, and future applications. The integration of multilayer network theory into ecology offers a largely untapped potential to further address ecological complexity, to finally provide new theoretical and empirical insights into the architecture and dynamics of ecological systems. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ecological%20networks" title="ecological networks">ecological networks</a>, <a href="https://publications.waset.org/abstracts/search?q=multilayered%20networks" title=" multilayered networks"> multilayered networks</a>, <a href="https://publications.waset.org/abstracts/search?q=sea%20ecology" title=" sea ecology"> sea ecology</a>, <a href="https://publications.waset.org/abstracts/search?q=Brazilian%20Coastal%20Area" title=" Brazilian Coastal Area"> Brazilian Coastal Area</a> </p> <a href="https://publications.waset.org/abstracts/104637/an-approach-for-multilayered-ecological-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/104637.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">155</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">476</span> Criteria for Good Governance in Georgian Defense Sector:Standards and Principles</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vephkhvia%20Grigalashvili">Vephkhvia Grigalashvili</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper provides an overview of criteria for good governance in Georgian defense sector and scientific outcomes of comparative research. A respect for good governance and its realization into Georgian national defense sector represents a fundamental institutional necessity as well as country`s politico-legal obligation within the framework of the existing collaboration mechanisms with NATO (especially Building Integrity (BI) Programme) and the Association Agreement between the EU and Georgia. Furthermore good governance is considered as a democracy measuring criterion in country`s Euro-Atlantic integration process. Accordingly, integration and further development of the contemporary approaches of good governance into Georgian defense management model represents a burning issue of the country. The assessment of an existing model of the country, identification of defects and determination of course of institutional reforms in a mutual comparison format of good governance mechanisms of NATO or/and the EU member Eastern European or Baltic countries positively assessed by the international organizations is considered as a precondition for its effective realization. Scientific aims of this study are: (a) to conduct comparative analysis of Georgian national principles and generalized standards of NATO or/and the EU member Eastern European and Baltic countries in following segments of good governance: open governance; anticorruption policy; conflict of interests; integrity; internal and external control bodies; (b) to formulate theoretical and practical recommendations on reforms to be implemented in the country`s national defence sector. As research reveals, although, institutional / legal pillars of good governance in Georgian defense sector generally are in compliance with international principles, the quality of implementation of good government norms still remains as an area that needs further development by raising awareness of public servants and community. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anti-corruption%20policy%20within%20Georgian%20defense%20governance" title="anti-corruption policy within Georgian defense governance">anti-corruption policy within Georgian defense governance</a>, <a href="https://publications.waset.org/abstracts/search?q=conflict%20of%20interests%20within%20Georgian%20defense%20governance" title=" conflict of interests within Georgian defense governance"> conflict of interests within Georgian defense governance</a>, <a href="https://publications.waset.org/abstracts/search?q=good%20governance%20in%20Georgian%20defense%20sector" title=" good governance in Georgian defense sector"> good governance in Georgian defense sector</a>, <a href="https://publications.waset.org/abstracts/search?q=principles%20of%20integrity%20in%20Georgian%20defense%20management" title=" principles of integrity in Georgian defense management"> principles of integrity in Georgian defense management</a> </p> <a href="https://publications.waset.org/abstracts/94977/criteria-for-good-governance-in-georgian-defense-sectorstandards-and-principles" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/94977.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">162</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">475</span> Effect of Multilayered MnBi Films on Magnetic and Microstructural Properties</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hyun-Sook%20Lee">Hyun-Sook Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=Hongjae%20Moon"> Hongjae Moon</a>, <a href="https://publications.waset.org/abstracts/search?q=Hwaebong%20Jung"> Hwaebong Jung</a>, <a href="https://publications.waset.org/abstracts/search?q=Sumin%20Kim"> Sumin Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Wooyoung%20Lee"> Wooyoung Lee</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Low-temperature phase (LTP) of MnBi has attracted much attention because it has a larger coercivity than that of Nd-Fe-B at high temperature, which gives high potential as a permanent magnet material that can be used at such high temperature. We present variation in magnetic properties of MnBi films by controlling the numbers of Bi/Mn bilayer. The thin films of LTP-MnBi were fabricated onto glass substrates by UHV sputtering, followed by in-situ annealing process at an optimized condition of 350 °C and 1.5 hours. The composition ratio of Bi/Mn was adjusted by varying the thickness of Bi and Mn layers. The highest value of (BH)max ~ 8.6 MGOe at room temperature was obtained in one Bi/Mn bilayer with 34 nm Bi and 16 nm Mn. To investigate the effect of Bi/Mn multilayers on the magnetic properties, we increased the numbers of Bi/Mn bilayer up to five at which the total film thicknesses of Bi and Mn were fixed with 34 nm and 16 nm. The increase of coercivity was observed up to three layers from 4.8 kOe to 15.3 kOe and then suppression was appeared. A reversed behavior was exhibited in the magnetization. We found that these were closely related to a microstructural change of LTP-MnBi and a reduction of growth rate of LTP-MnBi by analyzing XRD and TEM results. We will discuss how the multilayered MnBi affects the magnetic properties in details. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=coercivity" title="coercivity">coercivity</a>, <a href="https://publications.waset.org/abstracts/search?q=MnBi" title=" MnBi"> MnBi</a>, <a href="https://publications.waset.org/abstracts/search?q=multilayer%20film" title=" multilayer film"> multilayer film</a>, <a href="https://publications.waset.org/abstracts/search?q=permanent%20magnet" title=" permanent magnet"> permanent magnet</a> </p> <a href="https://publications.waset.org/abstracts/51229/effect-of-multilayered-mnbi-films-on-magnetic-and-microstructural-properties" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/51229.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">334</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">474</span> Fusion Models for Cyber Threat Defense: Integrating Clustering, Random Forests, and Support Vector Machines to Against Windows Malware</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Azita%20Ramezani">Azita Ramezani</a>, <a href="https://publications.waset.org/abstracts/search?q=Atousa%20Ramezani"> Atousa Ramezani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the ever-escalating landscape of windows malware the necessity for pioneering defense strategies turns into undeniable this study introduces an avant-garde approach fusing the capabilities of clustering random forests and support vector machines SVM to combat the intricate web of cyber threats our fusion model triumphs with a staggering accuracy of 98.67 and an equally formidable f1 score of 98.68 a testament to its effectiveness in the realm of windows malware defense by deciphering the intricate patterns within malicious code our model not only raises the bar for detection precision but also redefines the paradigm of cybersecurity preparedness this breakthrough underscores the potential embedded in the fusion of diverse analytical methodologies and signals a paradigm shift in fortifying against the relentless evolution of windows malicious threats as we traverse through the dynamic cybersecurity terrain this research serves as a beacon illuminating the path toward a resilient future where innovative fusion models stand at the forefront of cyber threat defense. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=fusion%20models" title="fusion models">fusion models</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20threat%20defense" title=" cyber threat defense"> cyber threat defense</a>, <a href="https://publications.waset.org/abstracts/search?q=windows%20malware" title=" windows malware"> windows malware</a>, <a href="https://publications.waset.org/abstracts/search?q=clustering" title=" clustering"> clustering</a>, <a href="https://publications.waset.org/abstracts/search?q=random%20forests" title=" random forests"> random forests</a>, <a href="https://publications.waset.org/abstracts/search?q=support%20vector%20machines%20%28SVM%29" title=" support vector machines (SVM)"> support vector machines (SVM)</a>, <a href="https://publications.waset.org/abstracts/search?q=accuracy" title=" accuracy"> accuracy</a>, <a href="https://publications.waset.org/abstracts/search?q=f1-score" title=" f1-score"> f1-score</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title=" cybersecurity"> cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=malicious%20code%20detection" title=" malicious code detection"> malicious code detection</a> </p> <a href="https://publications.waset.org/abstracts/179650/fusion-models-for-cyber-threat-defense-integrating-clustering-random-forests-and-support-vector-machines-to-against-windows-malware" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/179650.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">71</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">473</span> Disclosure in the Defence of Sexual Assault</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tony%20Zipp">Tony Zipp</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper will identify developments in the law in British Columbia, Canada, to disclosure to be provided to the defense in cases of sexual misconduct and sexual assault. Disclosure is the keystone to providing a full and robust defense to such charges. The investigation of sexual misconduct and sexual assault involving children usually involves multiple government agencies. This includes child welfare agencies, police and other social service participants. This paper will examine situations in which Courts have ordered disclosure of material from non-police agencies in criminal cases of charges of sexual assault when that material is ‘obviously relevant’ to the charges to enable the defense to present full answer and defense to the charges. The methodology of the oral presentation/paper will be a case analysis of decisions of the Supreme Court of British Columbia, the British Columbia Court of Appeal and the Supreme Court of Canada in the area of disclosure to the defense in criminal trials, including those for sexual assault and sexual misconduct. The emphasis will be on the decisions that expand the disclosure available. The robust defense of these charges is significant to the rule of law as it engenders public confidence in the Judicial system by remembering to protect the innocent while prosecuting these allegations. As such, disclosure is fundamental to human rights and human security. Human rights and human security cannot exclusively be confined to alleged victims but must also protect the rights of those charged to a fair Judicial process. This oral presentation/paper will illustrate that fulsome disclosure enhances the rule of law and law enforcement rather than hinders the prosecution of charges. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=defence" title="defence">defence</a>, <a href="https://publications.waset.org/abstracts/search?q=law" title=" law"> law</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20rights" title=" human rights"> human rights</a>, <a href="https://publications.waset.org/abstracts/search?q=sexual%20assault" title=" sexual assault"> sexual assault</a>, <a href="https://publications.waset.org/abstracts/search?q=sexual%20misconduct" title=" sexual misconduct"> sexual misconduct</a> </p> <a href="https://publications.waset.org/abstracts/189376/disclosure-in-the-defence-of-sexual-assault" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/189376.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">24</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">472</span> Human Factors Interventions for Risk and Reliability Management of Defence Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chitra%20Rajagopal">Chitra Rajagopal</a>, <a href="https://publications.waset.org/abstracts/search?q=Indra%20Deo%20Kumar"> Indra Deo Kumar</a>, <a href="https://publications.waset.org/abstracts/search?q=Ila%20Chauhan"> Ila Chauhan</a>, <a href="https://publications.waset.org/abstracts/search?q=Ruchi%20Joshi"> Ruchi Joshi</a>, <a href="https://publications.waset.org/abstracts/search?q=Binoy%20Bhargavan"> Binoy Bhargavan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Reliability and safety are essential for the success of mission-critical and safety-critical defense systems. Humans are part of the entire life cycle of defense systems development and deployment. The majority of industrial accidents or disasters are attributed to human errors. Therefore, considerations of human performance and human reliability are critical in all complex systems, including defense systems. Defense systems are operating from the ground, naval and aerial platforms in diverse conditions impose unique physical and psychological challenges to the human operators. Some of the safety and mission-critical defense systems with human-machine interactions are fighter planes, submarines, warships, combat vehicles, aerial and naval platforms based missiles, etc. Human roles and responsibilities are also going through a transition due to the infusion of artificial intelligence and cyber technologies. Human operators, not accustomed to such challenges, are more likely to commit errors, which may lead to accidents or loss events. In such a scenario, it is imperative to understand the human factors in defense systems for better systems performance, safety, and cost-effectiveness. A case study using Task Analysis (TA) based methodology for assessment and reduction of human errors in the Air and Missile Defense System in the context of emerging technologies were presented. Action-oriented task analysis techniques such as Hierarchical Task Analysis (HTA) and Operator Action Event Tree (OAET) along with Critical Action and Decision Event Tree (CADET) for cognitive task analysis was used. Human factors assessment based on the task analysis helps in realizing safe and reliable defense systems. These techniques helped in the identification of human errors during different phases of Air and Missile Defence operations, leading to meet the requirement of a safe, reliable and cost-effective mission. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=defence%20systems" title="defence systems">defence systems</a>, <a href="https://publications.waset.org/abstracts/search?q=reliability" title=" reliability"> reliability</a>, <a href="https://publications.waset.org/abstracts/search?q=risk" title=" risk"> risk</a>, <a href="https://publications.waset.org/abstracts/search?q=safety" title=" safety"> safety</a> </p> <a href="https://publications.waset.org/abstracts/111674/human-factors-interventions-for-risk-and-reliability-management-of-defence-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/111674.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">135</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">471</span> The Overexpression of Horsegram MURLK Improves Regulation of Cell Death and Defense Responses to Microbial Pathogens</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shikha%20Masand">Shikha Masand</a>, <a href="https://publications.waset.org/abstracts/search?q=Sudesh%20Kumar%20Yadav"> Sudesh Kumar Yadav</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Certain protein kinases have been shown to be crucial for plant cell signaling pathways associated with plant immune responses. Here we identified a horsegram [Macrotyloma uniflorum (Lam.) Verdc.] malectin-like leucine rich receptor-like protein kinase (RLK) gene MuRLK. The functional MuRLK protein preferentially binds to mannose and N-acetyl glucosamine residues. MuRLK exists in the cytoplasm and also localizes to the plasma membrane of plant cells via its N-terminus. Over-expression of MuRLK in Arabidopsis enhances the basal resistance to infection with Pseudomonas syringae pv. tomato, Alternaria brassicicola and Hyaloperonospora arabidopsidis, are associated with elevated ROS bursts, MAPK activation, thus ultimately leading to hypersensitive cell death. Moreover, salicylic acid-dependent and jasmonic acid-dependent defense responses are also enhanced in the MuRLK-overexpressed plants that lead to HR-induced cell death. Together, these results suggest that MuRLK plays a key role in the regulation of plant cell death, early and late defense responses after the recognition of microbial pathogens. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=horsegram" title="horsegram">horsegram</a>, <a href="https://publications.waset.org/abstracts/search?q=Pseudomonas%20syringae%20pv.%20tomato" title=" Pseudomonas syringae pv. tomato"> Pseudomonas syringae pv. tomato</a>, <a href="https://publications.waset.org/abstracts/search?q=MuRLK" title=" MuRLK"> MuRLK</a>, <a href="https://publications.waset.org/abstracts/search?q=ROS%20burst" title=" ROS burst"> ROS burst</a>, <a href="https://publications.waset.org/abstracts/search?q=cell%20death" title=" cell death"> cell death</a>, <a href="https://publications.waset.org/abstracts/search?q=plant%20defense" title=" plant defense"> plant defense</a> </p> <a href="https://publications.waset.org/abstracts/44317/the-overexpression-of-horsegram-murlk-improves-regulation-of-cell-death-and-defense-responses-to-microbial-pathogens" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/44317.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">248</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">470</span> Multifield Problems in 3D Structural Analysis of Advanced Composite Plates and Shells</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Salvatore%20Brischetto">Salvatore Brischetto</a>, <a href="https://publications.waset.org/abstracts/search?q=Domenico%20Cesare"> Domenico Cesare</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Major improvements in future aircraft and spacecraft could be those dependent on an increasing use of conventional and unconventional multilayered structures embedding composite materials, functionally graded materials, piezoelectric or piezomagnetic materials, and soft foam or honeycomb cores. Layers made of such materials can be combined in different ways to obtain structures that are able to fulfill several structural requirements. The next generation of aircraft and spacecraft will be manufactured as multilayered structures under the action of a combination of two or more physical fields. In multifield problems for multilayered structures, several physical fields (thermal, hygroscopic, electric and magnetic ones) interact each other with different levels of influence and importance. An exact 3D shell model is here proposed for these types of analyses. This model is based on a coupled system including 3D equilibrium equations, 3D Fourier heat conduction equation, 3D Fick diffusion equation and electric and magnetic divergence equations. The set of partial differential equations of second order in z is written using a mixed curvilinear orthogonal reference system valid for spherical and cylindrical shell panels, cylinders and plates. The order of partial differential equations is reduced to the first one thanks to the redoubling of the number of variables. The solution in the thickness z direction is obtained by means of the exponential matrix method and the correct imposition of interlaminar continuity conditions in terms of displacements, transverse stresses, electric and magnetic potentials, temperature, moisture content and transverse normal multifield fluxes. The investigated structures have simply supported sides in order to obtain a closed form solution in the in-plane directions. Moreover, a layerwise approach is proposed which allows a 3D correct description of multilayered anisotropic structures subjected to field loads. Several results will be proposed in tabular and graphical formto evaluate displacements, stresses and strains when mechanical loads, temperature gradients, moisture content gradients, electric potentials and magnetic potentials are applied at the external surfaces of the structures in steady-state conditions. In the case of inclusions of piezoelectric and piezomagnetic layers in the multilayered structures, so called smart structures are obtained. In this case, a free vibration analysis in open and closed circuit configurations and a static analysis for sensor and actuator applications will be proposed. The proposed results will be useful to better understand the physical and structural behaviour of multilayered advanced composite structures in the case of multifield interactions. Moreover, these analytical results could be used as reference solutions for those scientists interested in the development of 3D and 2D numerical shell/plate models based, for example, on the finite element approach or on the differential quadrature methodology. The correct impositions of boundary geometrical and load conditions, interlaminar continuity conditions and the zigzag behaviour description due to transverse anisotropy will be also discussed and verified. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=composite%20structures" title="composite structures">composite structures</a>, <a href="https://publications.waset.org/abstracts/search?q=3D%20shell%20model" title=" 3D shell model"> 3D shell model</a>, <a href="https://publications.waset.org/abstracts/search?q=stress%20analysis" title=" stress analysis"> stress analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=multifield%20loads" title=" multifield loads"> multifield loads</a>, <a href="https://publications.waset.org/abstracts/search?q=exponential%20matrix%20method" title=" exponential matrix method"> exponential matrix method</a>, <a href="https://publications.waset.org/abstracts/search?q=layer%20wise%20approach" title=" layer wise approach"> layer wise approach</a> </p> <a href="https://publications.waset.org/abstracts/170453/multifield-problems-in-3d-structural-analysis-of-advanced-composite-plates-and-shells" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/170453.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">67</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">469</span> Bilateral Relations in Matter of Defense between Argentina-United States and Argentina-China along the Period 2005-2015: Advice to Develop a Rational Defense Foreign Policy for Peripheral Countries</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Alvarez%20Maga%C3%B1ini">Alvarez Magañini</a>, <a href="https://publications.waset.org/abstracts/search?q=Mar%C3%ADa%20Victoria-Rubbi"> María Victoria-Rubbi</a>, <a href="https://publications.waset.org/abstracts/search?q=Lautaro%20Nahuel"> Lautaro Nahuel</a> </p> <p class="card-text"><strong>Abstract:</strong></p> At present, we are facing an unstable international context, conditioned by a relative decline of the US power, primarily in the economic sphere and, to a lesser extent, in the military sphere. This scenario of multipolarity creates tension and uncertainty in the peripheral countries when the issue of their foreign policy arises. This paper presents an analysis of the bilateral relations that were maintained by the Argentine Republic, a peripheral country, along with the United States and China during the period of 2005-2015 in matters of defense in order to identify the empirical consequences resulted from the Argentine actions. Based on the conceptual framework of Peripheral Realism, we analyze indicators related to the weapon trade, defense loans, joint exercises, and personnel training, among others. There will also be a comparative analysis of the conventional military forces of the two powers in question, United States and China. As a conclusion, the cost of having closer relations with China instead of the United States in the defense agenda has been clearly higher than the benefits obtained. The conclusions drawn are empirically aligned with the theoretical paradigm of peripheral realism. Although there are certain conceptual and methodological digressions, these conclusions they could be useful to update and adapt the theory to the current complex international scenario. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=China" title="China">China</a>, <a href="https://publications.waset.org/abstracts/search?q=United%20States" title=" United States"> United States</a>, <a href="https://publications.waset.org/abstracts/search?q=Argentine" title=" Argentine"> Argentine</a>, <a href="https://publications.waset.org/abstracts/search?q=peripheral%20country" title=" peripheral country"> peripheral country</a>, <a href="https://publications.waset.org/abstracts/search?q=peripheral%20realism" title=" peripheral realism"> peripheral realism</a> </p> <a href="https://publications.waset.org/abstracts/79272/bilateral-relations-in-matter-of-defense-between-argentina-united-states-and-argentina-china-along-the-period-2005-2015-advice-to-develop-a-rational-defense-foreign-policy-for-peripheral-countries" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/79272.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">379</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">468</span> Effects of Coastal Structure Construction on Ecosystem</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Afshin%20Jahangirzadeh">Afshin Jahangirzadeh</a>, <a href="https://publications.waset.org/abstracts/search?q=Shatirah%20Akib"> Shatirah Akib</a>, <a href="https://publications.waset.org/abstracts/search?q=Keyvan%20Kimiaei"> Keyvan Kimiaei</a>, <a href="https://publications.waset.org/abstracts/search?q=Hossein%20Basser"> Hossein Basser</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Coastal defense structures were built to protect part of shore from beach erosion and flooding by sea water. Effects of coastal defense structures can be negative or positive. Some of the effects are beneficial in socioeconomic aspect, but environment matters should be given more concerns because it can bring bad consequences to the earth landscape and make the ecosystem be unbalanced. This study concerns on the negative impacts as they are dominant. Coastal structures can extremely impact the shoreline configuration. Artificial structures can influence sediment transport, split the coastal space, etc. This can result in habitats loss and lead to noise and visual disturbance of birds. There are two types of coastal defense structures, hard coastal structure and soft coastal structure. Both coastal structures have their own impacts. The impacts are induced during the construction, maintaining, and operation of the structures. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ecosystem" title="ecosystem">ecosystem</a>, <a href="https://publications.waset.org/abstracts/search?q=environmental%20impact" title=" environmental impact"> environmental impact</a>, <a href="https://publications.waset.org/abstracts/search?q=hard%20coastal%20structures" title=" hard coastal structures"> hard coastal structures</a>, <a href="https://publications.waset.org/abstracts/search?q=soft%20coastal%20structures" title=" soft coastal structures"> soft coastal structures</a> </p> <a href="https://publications.waset.org/abstracts/9173/effects-of-coastal-structure-construction-on-ecosystem" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/9173.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">485</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">467</span> Energy in the Nexus of Defense and Border Security: Securing Energy Deposits in the Natuna Islands of Indonesia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Debby%20Rizqie%20Amelia%20Gustin">Debby Rizqie Amelia Gustin</a>, <a href="https://publications.waset.org/abstracts/search?q=Purnomo%20Yusgiantoro"> Purnomo Yusgiantoro</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Hydrocarbon energy is still pivotal to today’s economy, but its existence is continually declining. Thus, preserving future energy supply has become the national interest of many countries, which they cater in various way, from importing to expansion and occupation. Underwater of Natuna islands in Indonesia deposits great amount of natural gas reserved, numbered to 46 TCF (trillion cubic feet), which is highly potential to meet Indonesia future energy demand. On the other hand, there could be a possibility that others also seek this natural resources. Natuna is located in the borderline of Indonesia, directly adjacent to the South China Sea, an area which is prolonged to conflict. It is a challenge for Indonesia government to preserve their energy deposit in Natuna islands and to response accordingly if the tension in South China Sea rises. This paper examines that nowadays defense and border security is not only a matter of guarding a country from foreign invasion, but also securing its resources accumulated on the borderline. Countries with great amount of energy deposits on their borderline need to build up their defense capacity continually, to ensure their territory along with their energy deposits is free from any interferences. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=border%20security" title="border security">border security</a>, <a href="https://publications.waset.org/abstracts/search?q=defense" title=" defense"> defense</a>, <a href="https://publications.waset.org/abstracts/search?q=energy" title=" energy"> energy</a>, <a href="https://publications.waset.org/abstracts/search?q=national%20interest" title=" national interest"> national interest</a>, <a href="https://publications.waset.org/abstracts/search?q=threat" title=" threat"> threat</a> </p> <a href="https://publications.waset.org/abstracts/61497/energy-in-the-nexus-of-defense-and-border-security-securing-energy-deposits-in-the-natuna-islands-of-indonesia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/61497.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">482</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">466</span> Molecular Characterization and Identification of C-Type Lectin in Red Palm Weevil, Rhynchophorus ferrugineus Oliver</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hafiza%20Javaria%20Ashraf">Hafiza Javaria Ashraf</a>, <a href="https://publications.waset.org/abstracts/search?q=Xinghong%20Wang"> Xinghong Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Zhanghong%20Shi"> Zhanghong Shi</a>, <a href="https://publications.waset.org/abstracts/search?q=Youming%20Hou"> Youming Hou</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Insect’s innate immunity depends on a variety of defense responses for the recognition of invading pathogens. Pathogen recognition involves particular proteins known as pattern recognition receptors (PRRs). These PRRs interact with pathogen-associated molecular patterns (PAMPs) present on the surface of pathogens to distinguish between self and non-self. C-type lectins (CTLs) belong to a superfamily of PPRs which involved in insect immunity and defense mechanism. Rhynchophorus ferrugineus Olivier is a devastating pest of Palm cultivations in China. Although studies on R. ferrugineus immune mechanism and host defense have conducted, however, the role of CTL in immune responses of R. ferrugineus remains elusive. Here, we report RfCTL, which is a secreted protein containing a single-CRD domain. The open reading frame (ORF) of CTL is 226 bp, which encodes a putative protein of 168 amino acids. Transcript expression analysis revealed that RfCTL highly expressed in immune-related tissues, i.e., hemolymph and fat body. The abundance of RfCTL in the gut and fat body dramatically increased upon Staphylococcus aureus and Escherichia coli bacterial challenges, suggesting a role in defense against gram-positive and gram-negative bacterial infection. Taken together, we inferred that RfCTL might be involved in the immune defense of R. ferrugineus and established a solid foundation for future studies on R. ferrugineus CTL domain proteins for better understanding of insect immunity. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=biological%20invasion" title="biological invasion">biological invasion</a>, <a href="https://publications.waset.org/abstracts/search?q=c-type%20lectin" title=" c-type lectin"> c-type lectin</a>, <a href="https://publications.waset.org/abstracts/search?q=insect%20immunity" title=" insect immunity"> insect immunity</a>, <a href="https://publications.waset.org/abstracts/search?q=Rhynchophorus%20ferrugineus%20Oliver" title=" Rhynchophorus ferrugineus Oliver"> Rhynchophorus ferrugineus Oliver</a> </p> <a href="https://publications.waset.org/abstracts/118350/molecular-characterization-and-identification-of-c-type-lectin-in-red-palm-weevil-rhynchophorus-ferrugineus-oliver" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/118350.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">157</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">465</span> The Value of Dynamic Priorities in Motor Learning between Some Basic Skills in Beginner&#039;s Basketball, U14 Years</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Guebli%20Abdelkader">Guebli Abdelkader</a>, <a href="https://publications.waset.org/abstracts/search?q=Regiueg%20Madani"> Regiueg Madani</a>, <a href="https://publications.waset.org/abstracts/search?q=Sbaa%20Bouabdellah"> Sbaa Bouabdellah</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The goals of this study are to find ways to determine the value of dynamic priorities in motor learning between some basic skills in beginner’s basketball (U14), based on skills of shooting and defense against the shooter. Our role is to expose the statistical results in compare & correlation between samples of study in tests skills for the shooting and defense against the shooter. In order to achieve this objective, we have chosen 40 boys in middle school represented in four groups, two controls group’s (CS1, CS2) ,and two experimental groups (ES1: training on skill of shooting, skill of defense against the shooter, ES2: experimental group training on skill of defense against the shooter, skill of shooting). For the statistical analysis, we have chosen (F & T) tests for the statistical differences, and test (R) for the correlation analysis. Based on the analyses statistics, we confirm the importance of classifying priorities of basketball basic skills during the motor learning process. Admit that the benefits of experimental group training are to economics in the time needed for acquiring new motor kinetic skills in basketball. In the priority of ES2 as successful dynamic motor learning method to enhance the basic skills among beginner’s basketball. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=basic%20skills" title="basic skills">basic skills</a>, <a href="https://publications.waset.org/abstracts/search?q=basketball" title=" basketball"> basketball</a>, <a href="https://publications.waset.org/abstracts/search?q=motor%20learning" title=" motor learning"> motor learning</a>, <a href="https://publications.waset.org/abstracts/search?q=children" title=" children"> children</a> </p> <a href="https://publications.waset.org/abstracts/92495/the-value-of-dynamic-priorities-in-motor-learning-between-some-basic-skills-in-beginners-basketball-u14-years" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/92495.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">170</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">464</span> National Defense and Armed Forces Development in the Member States of the Visegrad Group </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=E.%20Hronyecz">E. Hronyecz</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Guaranteeing the independence of the V4 Member States, the protection of their national values and their citizens, and the security of the Central and Eastern European region requires the development of military capabilities in terms of the capabilities of nations. As a result, European countries have begun developing capabilities and forces, within which nations are seeking to strengthen the capabilities of their armies and make their interoperability more effective. One aspect of this is the upgrading of military equipment, personnel equipment, and other human resources. Based on the author's preliminary researches - analyzing the scientific literature, the relevant statistical data and conducting of professional consultations with the experts of the research field – it can clearly claimed for all four states of Visegrad Group that a change of direction in the field of defense has been noticeable since the second half of the last decade. Collective defense came to the forefront again; the military training, professionalism, and radical modernization of technical equipment becoming crucial. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=armed%20forces" title="armed forces">armed forces</a>, <a href="https://publications.waset.org/abstracts/search?q=cooperation" title=" cooperation"> cooperation</a>, <a href="https://publications.waset.org/abstracts/search?q=development" title=" development"> development</a>, <a href="https://publications.waset.org/abstracts/search?q=Visegrad%20Group" title=" Visegrad Group"> Visegrad Group</a> </p> <a href="https://publications.waset.org/abstracts/122825/national-defense-and-armed-forces-development-in-the-member-states-of-the-visegrad-group" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/122825.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">133</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">463</span> “Referral for re-submission” – The Case of EFL Applied Linguistics Doctoral Defense Sessions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Alireza%20Jalilifar">Alireza Jalilifar</a>, <a href="https://publications.waset.org/abstracts/search?q=Nadia%20Mayahi"> Nadia Mayahi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> An oral defense is the examination of a doctoral program in which the candidates display their academic capacity through sharing and disseminating the findings of their study and defending their position. In this challenging criticism-generating context, the examiners evaluate the PhD dissertation critically so as to confirm its scholarly merit or lack of it. To identify the examiners’ expectations of the viva, this study used a conversation analytic approach for analyzing the data. The research is inductive in that it seeks to develop theory that is grounded in the data. The data comprised transcripts of the question and answer section of two applied linguistics doctoral defense sessions from two accredited Iranian state universities in 2019, both of which are among the top Iranian universities on the list of Times Higher Education World University Rankings. In spite of the similar shortcomings and deficiencies, for instance, in terms of innovation, development, sampling, and treatment, raised by the examiners, one of these defenses passed with distinction while the other was referred for re-submission. It seems that the outcome of a viva, in an EFL context, not only depends on adherence to the rules and regulations of doctoral research but is also influenced to a certain extent by the strictness of the examiners and the candidates’ language proficiency and effective negotiation and communication skills in this confrontational communicative event. The findings of this study provide evidence for the issues determining the success or failure of PhD candidates in displaying their claims of scholarship during their defense sessions. This study has implications for both applied linguistics doctoral students and academics in EFL contexts who try to prove and authenticate the doctorateness of a dissertation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=academic%20discourse" title="academic discourse">academic discourse</a>, <a href="https://publications.waset.org/abstracts/search?q=conversation%20analysis" title=" conversation analysis"> conversation analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=doctoral%20defense" title=" doctoral defense"> doctoral defense</a>, <a href="https://publications.waset.org/abstracts/search?q=doctorateness" title=" doctorateness"> doctorateness</a>, <a href="https://publications.waset.org/abstracts/search?q=EFL" title=" EFL"> EFL</a> </p> <a href="https://publications.waset.org/abstracts/143882/referral-for-re-submission-the-case-of-efl-applied-linguistics-doctoral-defense-sessions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/143882.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">156</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=multi-layered%20defense&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=multi-layered%20defense&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=multi-layered%20defense&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=multi-layered%20defense&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=multi-layered%20defense&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=multi-layered%20defense&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=multi-layered%20defense&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=multi-layered%20defense&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=multi-layered%20defense&amp;page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=multi-layered%20defense&amp;page=16">16</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=multi-layered%20defense&amp;page=17">17</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=multi-layered%20defense&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10