CINXE.COM

Search results for: jihad

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: jihad</title> <meta name="description" content="Search results for: jihad"> <meta name="keywords" content="jihad"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="jihad" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="jihad"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 34</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: jihad</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">34</span> Understanding the Caliphate and Jihad to Prevent Radicalization That Lead to Terrorism: The Role of Social Community in Southeast Asia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jordan%20Daud">Jordan Daud</a>, <a href="https://publications.waset.org/abstracts/search?q=Satriya%20Wibawa"> Satriya Wibawa</a>, <a href="https://publications.waset.org/abstracts/search?q=Wahyu%20Wardhana"> Wahyu Wardhana</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the summer of 2014, the leaders of the Islamic State of Iraq and Syria proclaimed the founding of religious-political system known as the caliphate which titled Islamic State (IS). As Caliph, Abu Bakr Baghdadi advocated Jihad from the Ummah (the Muslim community) to defend the Islamic state from unbelievers. This call for Jihad by IS had encouraged some radical organization in Southeast Asia pledge allegiance to IS and established bases for IS operation in Southeast Asia. This development had increased security concern for possible terrorism action in Southeast Asia, which currently not very active due to counterterrorism efforts from ASEAN member states and its cooperation with the world. This paper firstly tries to draw understanding from Ulema (Muslim cleric) about the conception of caliphate and Jihad based on Quran and Hadith. Secondly, this paper will elaborate counterterrorism efforts from ASEAN countries to prevent radicalization and terrorism act in addressing the call for jihad to establish IS in Southeast Asia. The third, this paper will recommend the role of the social community, especially Ulema, in Southeast Asia to prevent the misunderstanding of Jihad which usually used by terrorist to justify their action. Hopefully, this social community role will decrease the radicalization of Muslim community in Southeast Asia alongside with the counterterrorism efforts to create secure and stable ASEAN community based on shared norm and values. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=caliphate" title="caliphate">caliphate</a>, <a href="https://publications.waset.org/abstracts/search?q=jihad" title=" jihad"> jihad</a>, <a href="https://publications.waset.org/abstracts/search?q=ASEAN" title=" ASEAN"> ASEAN</a>, <a href="https://publications.waset.org/abstracts/search?q=counterterrorism" title=" counterterrorism"> counterterrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20community" title=" social community"> social community</a> </p> <a href="https://publications.waset.org/abstracts/88339/understanding-the-caliphate-and-jihad-to-prevent-radicalization-that-lead-to-terrorism-the-role-of-social-community-in-southeast-asia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/88339.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">233</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">33</span> Presuppositions and Implicatures in Four Selected Speeches of Osama Bin Laden&#039;s Legitimisation of &#039;Jihad&#039;</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sawsan%20Al-Saaidi">Sawsan Al-Saaidi</a>, <a href="https://publications.waset.org/abstracts/search?q=Ghayth%20K.%20Shaker%20Al-Shaibani"> Ghayth K. Shaker Al-Shaibani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper investigates certain linguistics properties of four selected speeches by Al-Qaeda’s former leader Osama bin Laden who legitimated the use of jihad by Muslims in various countries when he was alive. The researchers adopt van Dijk’s (2009; 1998) Socio-Cognitive approach and Ideological Square theory respectively. Socio-Cognitive approach revolves around various cognitive, socio-political, and discursive aspects that can be found in political discourse as in Osama bin Laden’s one. The political discourse can be defined in terms of textual properties and contextual models. Pertaining to the ideological square, it refers to positive self-presentation and negative other-presentation which help to enhance the textual and contextual analyses. Therefore, among the most significant properties in Osama bin Laden’s discourse are the use of presuppositions and implicatures which are based on background knowledge and contextual models as well. Thus, the paper concludes that Osama bin Laden used a number of manipulative strategies which augmented and embellished the use of ‘jihad’ in order to develop a more effective discourse for his audience. In addition, the findings have revealed that bin Laden used different implicit and embedded interpretations of different topics which have been accepted as taken-for-granted truths for him to legitimate Jihad against his enemies. There are many presuppositions in the speeches analysed that result in particular common-sense assumptions and a world-view about the selected speeches. More importantly, the assumptions in the analysed speeches help consolidate the ideological analysis in terms of in-group and out-group members. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Al-Qaeda" title="Al-Qaeda">Al-Qaeda</a>, <a href="https://publications.waset.org/abstracts/search?q=cognition" title=" cognition"> cognition</a>, <a href="https://publications.waset.org/abstracts/search?q=critical%20discourse%20analysis" title=" critical discourse analysis"> critical discourse analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=Osama%20Bin%20Laden" title=" Osama Bin Laden"> Osama Bin Laden</a>, <a href="https://publications.waset.org/abstracts/search?q=jihad" title=" jihad"> jihad</a>, <a href="https://publications.waset.org/abstracts/search?q=implicature" title=" implicature"> implicature</a>, <a href="https://publications.waset.org/abstracts/search?q=legitimisation" title=" legitimisation"> legitimisation</a>, <a href="https://publications.waset.org/abstracts/search?q=presupposition" title=" presupposition"> presupposition</a>, <a href="https://publications.waset.org/abstracts/search?q=political%20discourse" title=" political discourse"> political discourse</a> </p> <a href="https://publications.waset.org/abstracts/85958/presuppositions-and-implicatures-in-four-selected-speeches-of-osama-bin-ladens-legitimisation-of-jihad" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/85958.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">239</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">32</span> Islamic State: Franchising Jihad through the New Caliphate</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Janiel%20David%20Melamed%20Visbal">Janiel David Melamed Visbal</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Islamic State has become one of the most remarkable threats for international security through their religious extremism and their establishment of a new caliphate by force. The main objective of this organization is to obtain territorial expansions beyond the Middle East and eventually to consolidate an Islamic global order based on their extremist ideology. This paper will conduct an analysis regarding how, over the past year, many jihadist organizations worldwide have pledged their alliagance to the Islamic State, transforming it into the most important jihadist franchise globally. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Islamic%20state" title="Islamic state">Islamic state</a>, <a href="https://publications.waset.org/abstracts/search?q=franchise" title=" franchise"> franchise</a>, <a href="https://publications.waset.org/abstracts/search?q=jihad" title=" jihad"> jihad</a>, <a href="https://publications.waset.org/abstracts/search?q=Islamic%20fundamentalism" title=" Islamic fundamentalism"> Islamic fundamentalism</a>, <a href="https://publications.waset.org/abstracts/search?q=caliphate" title=" caliphate"> caliphate</a> </p> <a href="https://publications.waset.org/abstracts/46178/islamic-state-franchising-jihad-through-the-new-caliphate" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/46178.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">358</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">31</span> West African Islamic Civilization: Sokoto Caliphate and Science Education</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hassan%20Attahiru%20Gwandu">Hassan Attahiru Gwandu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study aims at surveying and analyzing the contribution of Sokoto scholars or Sokoto Caliphate in the development of science and technology in West Africa. Today, it is generally accepted that the 19<sup>th </sup>century Islamic revivalism in Hausaland was a very important revolution in the history of Hausa society and beyond. It is therefore, as a result of this movement or Jihad; the Hausaland (West Africa in general) witnessed several changes and transformations. These changes were in different sectors of life from politics, economy to social and religious aspect. It is these changes especially on religion that will be given considerations in this paper. The jihad resulted is the establishment of an Islamic state of Sokoto Caliphate, the revival Islam and development of learning and scholarship. During the existence of this Caliphate, a great deal of scholarship on Islamic laws were revived, written and documented by mostly, the three Jihad leaders; Usmanu Danfodiyo, his brother Abdullahi Fodiyo and his son Muhammad Bello. The trio had written more than one thousand books and made several verdicts on Islamic medicine. This study therefore, seeks to find out the contributions of these scholars or the Sokoto caliphate in the development of science in West Africa. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sokoto%20caliphate" title="Sokoto caliphate">Sokoto caliphate</a>, <a href="https://publications.waset.org/abstracts/search?q=scholarship" title=" scholarship"> scholarship</a>, <a href="https://publications.waset.org/abstracts/search?q=science%20and%20technology" title=" science and technology"> science and technology</a>, <a href="https://publications.waset.org/abstracts/search?q=West%20Africa" title=" West Africa"> West Africa</a> </p> <a href="https://publications.waset.org/abstracts/45987/west-african-islamic-civilization-sokoto-caliphate-and-science-education" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/45987.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">293</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">30</span> Chamba Encroachment into Jukum Territory and Its Impact 1830-1900</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Iliya%20Ibrahim%20%20Gimba">Iliya Ibrahim Gimba</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The period between the late 18th and early 19th centuries was characterized by conflict of ethnic nationalities in the Benue valley region. This conflict was exacerbated by the introduction of the Fulani jihad that began in Hausa land into the Benue valley region. Fulani in this region launched the Jihad movement which pushed out some ethnic groups from their natural abode or ancestral home to live a nomad live until they could settle and established a stayed in a particular place. The Chamba were being displaced by the Fulani jihad that took place around Faro deo in about 1809. It was from there that most of the Chamba migrated out, some into the Cameroon republic, while others moved into the Benue valley region. Among those that entered into the Benue valley region are the Sama, Kola, Gayam etc, and could be found in Donga local Government area of Taraba state. Those Chamba clan that later on cameo into the Benue Valley are Pyeri, Kashimbila etc. The sudden movement of the Chamba or migrations into the Jukun territory co-in ceded with the period that the Jihad had already had a severe and consequential effect or impact on the Jukun territory cause by Yakubu Ibrahim of Bzuchi, and Buba Yero of Gombe, and Hamaruwa of Muri Emirate. This ne authorities in Kwararafa Kingdom cut the Jukun King out of contact with Borno and Hausa-land. This paper set to examine the chiefdom that the Chamba established right within the Jukun headquarters of Wukari. Sources to be used are published books, Journals, Archival materials, and M.A. Thesis to enable us know the impact of Chamba migrations on the Jukun territory and reactions of the Jukun’s to this new comers. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chamba%20people" title="Chamba people">Chamba people</a>, <a href="https://publications.waset.org/abstracts/search?q=encroachment" title=" encroachment"> encroachment</a>, <a href="https://publications.waset.org/abstracts/search?q=migration" title=" migration"> migration</a>, <a href="https://publications.waset.org/abstracts/search?q=ethnic%20nationalities" title=" ethnic nationalities"> ethnic nationalities</a> </p> <a href="https://publications.waset.org/abstracts/25899/chamba-encroachment-into-jukum-territory-and-its-impact-1830-1900" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/25899.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">458</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">29</span> The Female Jihad: A Case Study of Jamaah Islamiyah’s Women in Indonesia </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Milda%20Istiqomah">Milda Istiqomah</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The current trends demonstrate that the number of women involved in terrorism is steadily increasing. There are at least two types of roles that women assume in terrorism; the ‘visible role’ and ‘invisible role’. Both roles are very important to the sustainability of terrorism and terrorist organizations. The findings of this paper are based on the analysis of multiple case study from two terrorism verdicts in Indonesia, media reports and academic journals. This paper argues that women in Jemaah Islamiyah (JI) play an important role in both categories. They are involved in this organization by marital and kinship linkages which aim to secure the networks and regenerate the Jihadi ideology within JI. Finally, this paper states that the role of women in JI is significant due to its importance in delivering the idea of Jihad to younger generations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=terrorism" title="terrorism">terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=women" title=" women"> women</a>, <a href="https://publications.waset.org/abstracts/search?q=jihadi%20movement" title=" jihadi movement"> jihadi movement</a>, <a href="https://publications.waset.org/abstracts/search?q=case%20study" title=" case study"> case study</a> </p> <a href="https://publications.waset.org/abstracts/106869/the-female-jihad-a-case-study-of-jamaah-islamiyahs-women-in-indonesia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/106869.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">125</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">28</span> ISIS after the Defeat of the Islamic Caliphate: The Rise of Cyber-Jihad</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Spyridon%20Plakoudas">Spyridon Plakoudas</a> </p> <p class="card-text"><strong>Abstract:</strong></p> After the capture of Al-Raqqah and the defeat of the short-lived Islamic Caliphate in 2017, everyone predicted the end of ISIS. However, ISIS proved far more resilient than initially thought. The militant group quickly regrouped from its defeat and started a low-intensity guerrilla campaign in central Iraq (near Kirkuk and Mosul) and north-eastern Syria (near Deir ez-Zorr). At the same time, ISIS doubled down on its cyber-campaign; actually, ISIS is as active on the cyber-domain as during the peak of its power in 2015. This paper, a spin-off paper from a co-authored book on the Syrian Civil War (due to be published by Rowman and Littlefield), intends to examine how ISIS operates in the cyber-domain and how this "Cyber-Caliphate" under re-construction is associated with its post-2017 strategy. This paper will draw on the discipline of War Studies (with an emphasis on Cyber-Security and Insurgency / Counter-Insurgency) and will benefit from the insights of interviewed experts on the field (e.g., Hassan Hasssan). This paper will explain how the successful operation of ISIS in the cyber-space preserves the myth of the “caliphate” amongst its worldwide followers (against the odds) and sustains the group’s ongoing insurgency in Syria and Iraq; in addition, this paper will suggest how this cyber-threat can be countered best. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ISIS" title="ISIS">ISIS</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-jihad" title=" cyber-jihad"> cyber-jihad</a>, <a href="https://publications.waset.org/abstracts/search?q=Syrian%20Civil%20War" title=" Syrian Civil War"> Syrian Civil War</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-terrorism" title=" cyber-terrorism"> cyber-terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=insurgency%20and%20counter-insurgency" title=" insurgency and counter-insurgency"> insurgency and counter-insurgency</a> </p> <a href="https://publications.waset.org/abstracts/117835/isis-after-the-defeat-of-the-islamic-caliphate-the-rise-of-cyber-jihad" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/117835.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">134</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27</span> Contributions of Women to the Development of Hausa Literature as an Effective Means of Public Enlightenment: The Case of a 19th Century Female Scholar Maryam Bint Uthman Ibn Foduye</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Balbasatu%20Ibrahim">Balbasatu Ibrahim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the 19th century, Hausaland an Islamic revolution known as the Sokoto Jihad took place that led to the establishment of the Sokoto Caliphate in 1804 under the leadership of the famous Sheik Uthman Bn Fodiye. Before the Jihad movement in Hausaland (now Northern Nigeria), women were left in ignorance and were used and dumped like old kitchen utensils. The sheik and his followers did their best to actualising women’s right to education by using their female family members as role models who were highly educated and renowned scholars. After the Jihad with the establishment of an Islamic state, the women scholars initiated different strategies to teach the generality of the women. The most efficient strategy was the ‘Yantaru Movement founded by Nana Asma’u the daughter of Sheikh Uthman Bn Fodiye in collaboration with her sisters around 1840. The ‘Yantaru movement is a women’s educational movement aimed at enlightening women in rural and urban areas. The move helped in massively mobilizing women for education. In addition to town pupils, women from villages and throughout the nooks and crannies of metropolitan Sokoto participated in the movement in the search for knowledge. Thus, the birth of the ‘Yantaru system of women’s education. The ‘Yantaru operates the three-tier system at village, town and the metropolitan capital of Sokoto. ‘Yantaru functions include imparting knowledge to elderly women and young girls. Step down enlightenment program on returning home. The most effective medium of communication in the ‘Yantaru movement was through poetry where scholars composed educational poems which were memorized by the ‘Yantaru, who on return recite it to fellow women at home. Through this system, many women were educated. This paper translated and examines one of such educative poems written by the second leader of the ‘Yantaru Movement Maryam Bn Uthman Bn Fodiye in 1855. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=English" title="English">English</a>, <a href="https://publications.waset.org/abstracts/search?q=Hausa%20language" title=" Hausa language"> Hausa language</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20enlightenment" title=" public enlightenment"> public enlightenment</a>, <a href="https://publications.waset.org/abstracts/search?q=Maryam%20Bint%20Uthman%20Ibn%20Foduye" title=" Maryam Bint Uthman Ibn Foduye"> Maryam Bint Uthman Ibn Foduye</a> </p> <a href="https://publications.waset.org/abstracts/20168/contributions-of-women-to-the-development-of-hausa-literature-as-an-effective-means-of-public-enlightenment-the-case-of-a-19th-century-female-scholar-maryam-bint-uthman-ibn-foduye" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/20168.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">364</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26</span> Remarks on the Lattice Green&#039;s Function for the Anisotropic Face Cantered Cubic Lattice</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jihad%20H.%20Asad">Jihad H. Asad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> An expression for the Green’s function (GF) of anisotropic face cantered cubic (IFCC) lattice is evaluated analytically and numerically for a single impurity problem. The density of states (DOS), phase shift and scattering cross section are expressed in terms of complete elliptic integrals of the first kind. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=lattice%20Green%27s%20function" title="lattice Green&#039;s function">lattice Green&#039;s function</a>, <a href="https://publications.waset.org/abstracts/search?q=elliptic%20integral" title=" elliptic integral"> elliptic integral</a>, <a href="https://publications.waset.org/abstracts/search?q=physics" title=" physics"> physics</a>, <a href="https://publications.waset.org/abstracts/search?q=cubic%20lattice" title=" cubic lattice"> cubic lattice</a> </p> <a href="https://publications.waset.org/abstracts/5976/remarks-on-the-lattice-greens-function-for-the-anisotropic-face-cantered-cubic-lattice" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/5976.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">466</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25</span> Revenge: Dramaturgy and the Tragedy of Jihad</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Myriam%20Benraad">Myriam Benraad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> On 5 July 2016, just days before the bloody terrorist attack on the Promenade des Anglais in Nice, the Al-Hayat media centre, one of the official propaganda branches of the Islamic State, broadcast a French nasheed which paid tribute to the Paris and Brussels attacks of November 2015 and March 2016. Entitled 'My Revenge', the terrorist anthem was of rare vehemence. It mentioned, sequentially, 'huddled bodies', in a reference to the civilian casualties of Western air strikes in the Iraqi-Syrian zone, 'explosive belts', 'sharp knives', 'large-calibre weapons' as well as 'localised targets'. France was accused of bearing the responsibility for the wave of attacks on its territory since the Charlie Hebdo massacre of January 2015 due to its 'ruthless war' against the Muslim world. Evoking an 'old aggression' and the 'crimes and spoliations' of which France has made itself guilty, the jihadist hymn depicted the rebirth of the caliphate as 'laudable revenge'. The notion of revenge has always been central to contemporary jihadism, understood both as a revolutionary ideology and a global militant movement. In recent years, the attacks carried out in Europe and elsewhere in the world have, for most, been claimed in its name. Whoever says jihad, says drama, yet few studies, if any, have looked at its dramatic and emotional elements, most notably its tragic vengefulness. This seems all the more astonishing that jihad is filled with drama; it could even be seen as a drama in its own right. The jihadists perform a script and take on roles inspired by their respective group’s culture (norms, values, beliefs, and symbols). The militants stage and perform such a script for a designated audience, either partisan, sympathising or hostile towards them and their cause. This research paper will examine the dramaturgy of jihadism and in particular, the genre that best characterises its violence: revenge tragedy. Theoretically, the research will rely on the tools of social movement theory and the sociology of emotions. Methodologically, it will draw from dramaturgical analysis and a combination of qualitative and quantitative tools to attain valuable observations of a number of developments, trends, and patterns. The choice has been made to focus mainly – however not exclusively – on the attacks which have taken place since 2001 in the European Union and more specific member states that have been significantly hit by jihadist terrorism. The research looks at a number of representative longitudinal samples identifying continuities and discontinuities, similarities, but also substantial differences. The preliminary findings tend to establish the relevance and validity of this approach in helping make better sense of sensitisation, mobilisation, and survival dynamics within jihadist groups, and motivations among individuals who have embraced violence. Besides, they illustrate their pertinence for counterterrorism policymakers and practitioners. Through drama, jihadist groups ensure the unceasing regeneration of their militant cause as well as their legitimation among their partisans. Without drama, and without the spectacular ideological staging of reality, they would not be able to maintain their attraction potential and power of persuasion. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jihadism" title="Jihadism">Jihadism</a>, <a href="https://publications.waset.org/abstracts/search?q=dramaturgy" title=" dramaturgy"> dramaturgy</a>, <a href="https://publications.waset.org/abstracts/search?q=revenge" title=" revenge"> revenge</a>, <a href="https://publications.waset.org/abstracts/search?q=tragedy" title=" tragedy"> tragedy</a> </p> <a href="https://publications.waset.org/abstracts/109167/revenge-dramaturgy-and-the-tragedy-of-jihad" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/109167.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">135</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">24</span> The Impacts of Technology on Operations Costs: The Mediating Role of Operation Flexibility</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fazli%20Idris">Fazli Idris</a>, <a href="https://publications.waset.org/abstracts/search?q=Jihad%20Mohammad"> Jihad Mohammad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The study aims to determine the impact of technology and service operations flexibility, which is divided into external flexibility and internal robustness, on operations costs. A mediation model is proposed that links technology to operations costs via operation flexibility. Drawing on a sample of 475 of operations managers of various service sectors in Malaysia and South Africa, Structural Equation Modeling (SEM) was employed to test the relationship using Smart-PLS procedures. It was found that a significant relationship was established between technologies to operations costs via both operations flexibility dimensions. Theoretical and managerial implications are offered to explain the results. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Operations%20flexibility" title="Operations flexibility">Operations flexibility</a>, <a href="https://publications.waset.org/abstracts/search?q=technology" title=" technology"> technology</a>, <a href="https://publications.waset.org/abstracts/search?q=costs" title=" costs"> costs</a>, <a href="https://publications.waset.org/abstracts/search?q=mediation" title=" mediation"> mediation</a> </p> <a href="https://publications.waset.org/abstracts/18185/the-impacts-of-technology-on-operations-costs-the-mediating-role-of-operation-flexibility" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/18185.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">613</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">23</span> Boko Haram Insurrection and Religious Revolt in Nigeria: An Impact Assessment-{2009-2015}</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Edwin%20Dankano">Edwin Dankano</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Evident by incessant and sporadic attacks on Nigerians poise a serious threat to the unity of Nigeria, and secondly, the single biggest security nightmare to confront Nigeria since after amalgamation of the Southern and Northern protectorates by the British colonialist in 1914 is “Boko Haram” a terrorist organization also known as “Jama’atul Ahli Sunnah Lidda’wati wal Jihad”, or “people committed to the propagation of the Prophet’s teachings and jihad”. The sect also upholds an ideology translated as “Western Education is forbidden”, or rejection of Western civilization and institutions. By some estimates, more than 5,500 people were killed in Boko Haram attacks in 2014, and Boko Haram attacks have already claimed hundreds of lives and territories {caliphates}in early 2015. In total, the group may have killed more than 10,000 people since its emergence in the early 2000s. More than 1 million Nigerians have been displaced internally by the violence, and Nigerian refugee figures in neighboring countries continue to rise. This paper is predicated on secondary sources of data and anchored on the Huntington’s theory of clash of civilization. As such, the paper argued that the rise of Boko Haram with its violent disposition against Western values is a counter response to Western civilization that is fast eclipsing other civilizations. The paper posits that the Boko Haram insurrection going by its teachings, and destruction of churches is a validation of the propagation of the sect as a religious revolt which has resulted in dire humanitarian situation in Adamawa, Borno, Yobe, Bauchi, and Gombe states all in north eastern Nigeria as evident in human casualties, human right abuses, population displacement, refugee debacle, livelihood crisis, and public insecurity. The paper submits that the Nigerian state should muster the needed political will in terms of a viable anti-terrorism measures and build strong legitimate institutions that can adequately curb the menace of corruption that has engulfed the military hierarchy, respond proactively to the challenge of terrorism in Nigeria and should embrace a strategic paradigm shift from anti-terrorism to counter-terrorism as a strategy for containing the crisis that today threatens the secular status of Nigeria. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Boko%20Haram" title="Boko Haram">Boko Haram</a>, <a href="https://publications.waset.org/abstracts/search?q=civilization" title=" civilization"> civilization</a>, <a href="https://publications.waset.org/abstracts/search?q=fundamentalism" title=" fundamentalism"> fundamentalism</a>, <a href="https://publications.waset.org/abstracts/search?q=Islam" title=" Islam"> Islam</a>, <a href="https://publications.waset.org/abstracts/search?q=religion%20revolt" title=" religion revolt"> religion revolt</a>, <a href="https://publications.waset.org/abstracts/search?q=terror" title=" terror "> terror </a> </p> <a href="https://publications.waset.org/abstracts/30287/boko-haram-insurrection-and-religious-revolt-in-nigeria-an-impact-assessment-2009-2015" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/30287.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">398</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">22</span> Literature and the Extremism: Case Study on and Qualitative Analysis of the Impact of Literature on Extremism in Afghanistan</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohibullah%20Zegham">Mohibullah Zegham</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In conducting a case study to analyze the impact of literature on extremism and fundamentalism in Afghanistan, the author of this paper uses qualitative research method. For this purpose the author of the paper has a glance at the history of extremism and fundamentalism in Afghanistan, as well the major causes and predisposing factors of it; then analyzes the impact of literature on extremism and fundamentalism using qualitative method. This study relies on the moral engagement theory to reveal how some extreme-Islamists quit the ideological interpretation of Islam and return to normal life by reading certain literary works. The goal of this case study is to help fighting extremism and fundamentalism by using literature. The research showed that literary works are useful in this regard and there are several evidences of its effectiveness. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=extremism" title="extremism">extremism</a>, <a href="https://publications.waset.org/abstracts/search?q=fundamentalism" title=" fundamentalism"> fundamentalism</a>, <a href="https://publications.waset.org/abstracts/search?q=communist" title=" communist"> communist</a>, <a href="https://publications.waset.org/abstracts/search?q=jihad" title=" jihad"> jihad</a>, <a href="https://publications.waset.org/abstracts/search?q=madrasa" title=" madrasa"> madrasa</a>, <a href="https://publications.waset.org/abstracts/search?q=literature" title=" literature"> literature</a> </p> <a href="https://publications.waset.org/abstracts/75864/literature-and-the-extremism-case-study-on-and-qualitative-analysis-of-the-impact-of-literature-on-extremism-in-afghanistan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/75864.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">274</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">21</span> Statistical Modeling of Mobile Fading Channels Based on Triply Stochastic Filtered Marked Poisson Point Processes</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jihad%20S.%20Daba">Jihad S. Daba</a>, <a href="https://publications.waset.org/abstracts/search?q=J.%20P.%20Dubois"> J. P. Dubois</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Understanding the statistics of non-isotropic scattering multipath channels that fade randomly with respect to time, frequency, and space in a mobile environment is very crucial for the accurate detection of received signals in wireless and cellular communication systems. In this paper, we derive stochastic models for the probability density function (PDF) of the shift in the carrier frequency caused by the Doppler Effect on the received illuminating signal in the presence of a dominant line of sight. Our derivation is based on a generalized Clarke&rsquo;s and a two-wave partially developed scattering models, where the statistical distribution of the frequency shift is shown to be consistent with the power spectral density of the Doppler shifted signal. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Doppler%20shift" title="Doppler shift">Doppler shift</a>, <a href="https://publications.waset.org/abstracts/search?q=filtered%20Poisson%20process" title=" filtered Poisson process"> filtered Poisson process</a>, <a href="https://publications.waset.org/abstracts/search?q=generalized%20Clark%E2%80%99s%20model" title=" generalized Clark’s model"> generalized Clark’s model</a>, <a href="https://publications.waset.org/abstracts/search?q=non-isotropic%20scattering" title=" non-isotropic scattering"> non-isotropic scattering</a>, <a href="https://publications.waset.org/abstracts/search?q=partially%20developed%20scattering" title=" partially developed scattering"> partially developed scattering</a>, <a href="https://publications.waset.org/abstracts/search?q=Rician%20distribution" title=" Rician distribution"> Rician distribution</a> </p> <a href="https://publications.waset.org/abstracts/65000/statistical-modeling-of-mobile-fading-channels-based-on-triply-stochastic-filtered-marked-poisson-point-processes" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/65000.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">372</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">20</span> Timbuktu Pattern of Islamic Education: A Role Model for the Establishment of Islamic Educational System in Sokoto Caliphate</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=A.%20M.%20Gada">A. M. Gada</a>, <a href="https://publications.waset.org/abstracts/search?q=H.%20U.%20Malami"> H. U. Malami</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Timbuktu is one of the eight regions in the present day the Republic of Mali. It flourished as one of the earliest centres of Islamic learning in West Africa in the eleventh century CE. The famous Islamic centre in Timbuktu is situated in the Sankore mosque, which is known to be one of the earliest established Islamic University. This centre produced scholars who were zealous in disseminating Islamic education to different parts of West Africa and beyond. As a result, most of these centres adopted the Timbuktu pattern of learning. Some of the beneficiaries of this noble activity are Muslim scholars which are responsible for the establishment of the Sokoto Caliphate in the early nineteenth century. This paper intends to reflect on the pattern of Islamic education of the Timbuktu scholars and see how it impacted on the Islamic centres of learning established by these Jihad-scholars who were successful in the establishment of an Islamic state known as the Sokoto Caliphate. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Timbuktu" title="Timbuktu">Timbuktu</a>, <a href="https://publications.waset.org/abstracts/search?q=Sankore" title=" Sankore"> Sankore</a>, <a href="https://publications.waset.org/abstracts/search?q=Islamic%20educational%20system" title=" Islamic educational system"> Islamic educational system</a>, <a href="https://publications.waset.org/abstracts/search?q=Sokoto%20Caliphate" title=" Sokoto Caliphate"> Sokoto Caliphate</a>, <a href="https://publications.waset.org/abstracts/search?q=centres%20of%20Islamic%20learning" title=" centres of Islamic learning"> centres of Islamic learning</a> </p> <a href="https://publications.waset.org/abstracts/5824/timbuktu-pattern-of-islamic-education-a-role-model-for-the-establishment-of-islamic-educational-system-in-sokoto-caliphate" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/5824.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">417</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">19</span> US-ASEAN Counter Terrorism Cooperation: Maintaining International Security and Avoiding Muslim Stereotypes</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jordan%20Daud">Jordan Daud</a>, <a href="https://publications.waset.org/abstracts/search?q=Satriya%20Wibawa"> Satriya Wibawa</a>, <a href="https://publications.waset.org/abstracts/search?q=Wahyu%20Wardhana"> Wahyu Wardhana</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The US Global War on Terror has had effect on Southeast Asia as Second Front of Global War on Terror. Since 2001, ASEAN had adopted legal framework to counter the terrorist threat through numerous approach which accommodate various counterterrorism policy of the ten member states. ASEAN have also enhanced multilateral cooperation with US and its allies in Asia Pacific region in addressing terrorist threat, terrorist funding, cyber terrorism and other forms of terrorism. This cooperation is essential to maintain international security and stability and also assure economic development. This work focuses on the US-ASEAN counterterrorism cooperation due to they identified terrorism as a mutual enemy that posed to human security, infrastructure security, and national security. Having in mind that international terrorism usually connected with Muslim community, this paper will also elaborate the concept of Jihad and Islam revivalism in politics to avoid negative image of Islam and Muslim. This paper argues that as region with large Muslim community, Southeast Asia still need to tighten counter terrorism cooperation and also lessening Muslim stereotypes with terrorism through educating public understanding and inter-faith and intra-faith dialogue to create a better world. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ASEAN" title="ASEAN">ASEAN</a>, <a href="https://publications.waset.org/abstracts/search?q=U.S." title=" U.S."> U.S.</a>, <a href="https://publications.waset.org/abstracts/search?q=counter%20terrorism" title=" counter terrorism"> counter terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=Muslim%20stereotypes" title=" Muslim stereotypes"> Muslim stereotypes</a> </p> <a href="https://publications.waset.org/abstracts/86978/us-asean-counter-terrorism-cooperation-maintaining-international-security-and-avoiding-muslim-stereotypes" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/86978.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">246</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18</span> Peak Data Rate Enhancement Using Switched Micro-Macro Diversity in Cellular Multiple-Input-Multiple-Output Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jihad%20S.%20Daba">Jihad S. Daba</a>, <a href="https://publications.waset.org/abstracts/search?q=J.%20P.%20Dubois"> J. P. Dubois</a>, <a href="https://publications.waset.org/abstracts/search?q=Yvette%20Antar"> Yvette Antar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the exponential growth of cellular users, a new generation of cellular networks is needed to enhance the required peak data rates. The co-channel interference between neighboring base stations inhibits peak data rate increase. To overcome this interference, multi-cell cooperation known as coordinated multipoint transmission is proposed. Such a solution makes use of multiple-input-multiple-output (MIMO) systems under two different structures: Micro- and macro-diversity. In this paper, we study the capacity and bit error rate in cellular networks using MIMO technology. We analyse both micro- and macro-diversity schemes and develop a hybrid model that switches between macro- and micro-diversity in the case of hard handoff based on a cut-off range of signal-to-noise ratio values. We conclude that our hybrid switched micro-macro MIMO system outperforms classical MIMO systems at the cost of increased hardware and software complexity. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cooperative%20multipoint%20transmission" title="cooperative multipoint transmission">cooperative multipoint transmission</a>, <a href="https://publications.waset.org/abstracts/search?q=ergodic%20capacity" title=" ergodic capacity"> ergodic capacity</a>, <a href="https://publications.waset.org/abstracts/search?q=hard%20handoff" title=" hard handoff"> hard handoff</a>, <a href="https://publications.waset.org/abstracts/search?q=macro-diversity" title=" macro-diversity"> macro-diversity</a>, <a href="https://publications.waset.org/abstracts/search?q=micro-diversity" title=" micro-diversity"> micro-diversity</a>, <a href="https://publications.waset.org/abstracts/search?q=multiple-input-multiple%20output%20systems" title=" multiple-input-multiple output systems"> multiple-input-multiple output systems</a>, <a href="https://publications.waset.org/abstracts/search?q=orthogonal%20frequency%20division%20multiplexing" title=" orthogonal frequency division multiplexing"> orthogonal frequency division multiplexing</a> </p> <a href="https://publications.waset.org/abstracts/64999/peak-data-rate-enhancement-using-switched-micro-macro-diversity-in-cellular-multiple-input-multiple-output-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/64999.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">311</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">17</span> Performance Analysis in 5th Generation Massive Multiple-Input-Multiple-Output Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jihad%20S.%20Daba">Jihad S. Daba</a>, <a href="https://publications.waset.org/abstracts/search?q=Jean-Pierre%20Dubois"> Jean-Pierre Dubois</a>, <a href="https://publications.waset.org/abstracts/search?q=Georges%20El%20Soury"> Georges El Soury</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Fifth generation wireless networks guarantee significant capacity enhancement to suit more clients and services at higher information rates with better reliability while consuming less power. The deployment of massive multiple-input-multiple-output technology guarantees broadband wireless networks with the use of base station antenna arrays to serve a large number of users on the same frequency and time-slot channels. In this work, we evaluate the performance of massive multiple-input-multiple-output systems (MIMO) systems in 5<sup>th</sup> generation cellular networks in terms of capacity and bit error rate. Several cases were considered and analyzed to compare the performance of massive MIMO systems while varying the number of antennas at both transmitting and receiving ends. We found that, unlike classical MIMO systems, reducing the number of transmit antennas while increasing the number of antennas at the receiver end provides a better solution to performance enhancement. In addition, enhanced orthogonal frequency division multiplexing and beam division multiple access schemes further improve the performance of massive MIMO systems and make them more reliable. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=beam%20division%20multiple%20access" title="beam division multiple access">beam division multiple access</a>, <a href="https://publications.waset.org/abstracts/search?q=D2D%20communication" title=" D2D communication"> D2D communication</a>, <a href="https://publications.waset.org/abstracts/search?q=enhanced%20OFDM" title=" enhanced OFDM"> enhanced OFDM</a>, <a href="https://publications.waset.org/abstracts/search?q=fifth%20generation%20broadband" title=" fifth generation broadband"> fifth generation broadband</a>, <a href="https://publications.waset.org/abstracts/search?q=massive%20MIMO" title=" massive MIMO"> massive MIMO</a> </p> <a href="https://publications.waset.org/abstracts/96696/performance-analysis-in-5th-generation-massive-multiple-input-multiple-output-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/96696.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">258</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">16</span> Arabic Literature as a Tool for Educational Transformation in Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abdulfatah%20A%20Raji">Abdulfatah A Raji</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper started with the definitions of literature, Arabic literature, transformation and went further to highlight the components of educational transformation. The general history of Arabic literature was discussed with focus on how it undergoes some transformations from pre-Islamic period through Quranic era, Abbasid literature to renaissance period in which the modernization of Arabic literature started in Egypt. It also traces the spread of Arabic literature in Nigeria from the pre-colonial era during the Kanuri rulers to Jihad of Usman Dan Fodio and the development of literature which manifested to the Teacher&rsquo;s Colleges and Bayero University in Northern Nigeria. Also, the establishment of primary and post-primary schools by Muslim organizations in many cities and towns of the Western part of Nigeria. Literary criticism was also discussed in line with Arabic literature. Poetry work of eminent poets were cited to show its importance in line with educational transformation in Nigerian literature and lessons from the cited Arabic poetry works were also highlighted to include: motivation to behave well and to tolerate others, better spirits of interaction, love and co-existence among different sexes, religion etc. All these can help in developing a better educational transformation in Nigeria which can in turn help in how to conduct researches for national development. The paper recommended compulsory Arabic literature at all levels of the nations&rsquo; educational system as well as publication of Arabic books and journals to encourage peace in this era of conflicts and further transform Nigeria&rsquo;s educational system for better. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Arabic" title="Arabic">Arabic</a>, <a href="https://publications.waset.org/abstracts/search?q=literature" title=" literature"> literature</a>, <a href="https://publications.waset.org/abstracts/search?q=peace" title=" peace"> peace</a>, <a href="https://publications.waset.org/abstracts/search?q=development" title=" development"> development</a>, <a href="https://publications.waset.org/abstracts/search?q=Nigeria" title=" Nigeria"> Nigeria</a> </p> <a href="https://publications.waset.org/abstracts/34037/arabic-literature-as-a-tool-for-educational-transformation-in-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/34037.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">475</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">15</span> Radical Islam and Transnational Security: West Africa and the Asia Pacific in View</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Olumide%20A.%20Fafore">Olumide A. Fafore</a>, <a href="https://publications.waset.org/abstracts/search?q=Khondlo%20Mtshali"> Khondlo Mtshali</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The beginning of the 21st century saw the emergence of new and global threats to national and transnational security in West Africa and the Asia Pacific regions as a result of the spread of jihadist terrorism across borders, a manifestation of the rise of radical Islam. Extremist and armed Islamic movements influenced by Salafism, the Jihad in Afghanistan and the Muslim Brotherhood are prevalent in Northern Nigeria, Niger, Cameroon, Mali, Chad, Pakistan, Afghanistan, and India. Carrying out attacks across borders, including assassinations, murders, armed robberies, and kidnapping, assisted by open and porous borders and large flow of illegal immigrants across borders. This paper examines the effect of Radical Islam on Transnational security through a review of past literature and the social and security consequences on the people of the regions. Our findings indicate that the activities of armed Islamic movements such as Boko Haram, Ansaru and Al-Qaeda are having a negative impact on the economy, development, and security of the states and people of West Africa and the Asia Pacific. It stresses the importance of regional, transnational and international cooperation, as these threats to national and transnational security can no longer be solved in a national or regional framework. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Islamic%20movements" title="Islamic movements">Islamic movements</a>, <a href="https://publications.waset.org/abstracts/search?q=jihadist%20terrorism" title=" jihadist terrorism"> jihadist terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=radical%20Islam" title=" radical Islam"> radical Islam</a>, <a href="https://publications.waset.org/abstracts/search?q=transnational%20security" title=" transnational security"> transnational security</a> </p> <a href="https://publications.waset.org/abstracts/102740/radical-islam-and-transnational-security-west-africa-and-the-asia-pacific-in-view" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/102740.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">163</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14</span> An Enhanced SAR-Based Tsunami Detection System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jean-Pierre%20Dubois">Jean-Pierre Dubois</a>, <a href="https://publications.waset.org/abstracts/search?q=Jihad%20S.%20Daba"> Jihad S. Daba</a>, <a href="https://publications.waset.org/abstracts/search?q=H.%20Karam"> H. Karam</a>, <a href="https://publications.waset.org/abstracts/search?q=J.%20Abdallah"> J. Abdallah</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Tsunami early detection and warning systems have proved to be of ultimate importance, especially after the destructive tsunami that hit Japan in March 2012. Such systems are crucial to inform the authorities of any risk of a tsunami and of the degree of its danger in order to make the right decision and notify the public of the actions they need to take to save their lives. The purpose of this research is to enhance existing tsunami detection and warning systems. We first propose an automated and miniaturized model of an early tsunami detection and warning system. The model for the operation of a tsunami warning system is simulated using the data acquisition toolbox of Matlab and measurements acquired from specified internet pages due to the lack of the required real-life sensors, both seismic and hydrologic, and building a graphical user interface for the system. In the second phase of this work, we implement various satellite image filtering schemes to enhance the acquired synthetic aperture radar images of the tsunami affected region that are masked by speckle noise. This enables us to conduct a post-tsunami damage extent study and calculate the percentage damage. We conclude by proposing improvements to the existing telecommunication infrastructure of existing warning tsunami systems using a migration to IP-based networks and fiber optics links. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=detection" title="detection">detection</a>, <a href="https://publications.waset.org/abstracts/search?q=GIS" title=" GIS"> GIS</a>, <a href="https://publications.waset.org/abstracts/search?q=GSN" title=" GSN"> GSN</a>, <a href="https://publications.waset.org/abstracts/search?q=GTS" title=" GTS"> GTS</a>, <a href="https://publications.waset.org/abstracts/search?q=GPS" title=" GPS"> GPS</a>, <a href="https://publications.waset.org/abstracts/search?q=speckle%20noise" title=" speckle noise"> speckle noise</a>, <a href="https://publications.waset.org/abstracts/search?q=synthetic%20aperture%20radar" title=" synthetic aperture radar"> synthetic aperture radar</a>, <a href="https://publications.waset.org/abstracts/search?q=tsunami" title=" tsunami"> tsunami</a>, <a href="https://publications.waset.org/abstracts/search?q=wiener%20filter" title=" wiener filter"> wiener filter</a> </p> <a href="https://publications.waset.org/abstracts/12662/an-enhanced-sar-based-tsunami-detection-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/12662.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">392</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13</span> Arabic Scholar’s Governance Advocacy and Nigeria’s National Security in Nigeria: Perspective of Al-Shaykh Usman Bin Fodio</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20Jamiu%20Abdullahi">Mohammad Jamiu Abdullahi</a>, <a href="https://publications.waset.org/abstracts/search?q=Shykh%20Ahmed%20Abdussalam"> Shykh Ahmed Abdussalam</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The emergence of Arabic on the shore of West Africa heralded the practise of Islam and advocation for a just and egalitarian society. Islam, it was argued, has been perverted and subverted by the Hausa leadership. This necessitated the call for reforming Islam. Al-Shaykh Usman Bin Fodio grabbed the opportunity and fought the perverts to restore the glory of Islam and establish shari'ah way of life. This was the practice, especially in the northern part of Nigeria until the incursion of colonialism. The conquest of the colonial master halted the rule of jihadi leaderships and subjected them to colonialism under which only some aspects of Islamic system considered potentially beneficial to the British interest were retained. The current socio-political and economic crises in Nigeria has necessitated the need to look inwardly to the bulk of works, in Arabic, left behind by the Muslim scholars to help to salvage the country from its present political crisis, economic paralysis and legal decadence. This paper, therefore, examines the relevance of Arabic literary works that housed political/legal theories to salvaging the country from its present political crises, economic paralysis and legal decadence. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Arabic%20Fodio%20Nigeria%20security" title="Arabic Fodio Nigeria security">Arabic Fodio Nigeria security</a>, <a href="https://publications.waset.org/abstracts/search?q=advocacy%20governance%20scholar%20Usman" title=" advocacy governance scholar Usman"> advocacy governance scholar Usman</a>, <a href="https://publications.waset.org/abstracts/search?q=British%20colonial%20perspective%20shaykh" title=" British colonial perspective shaykh"> British colonial perspective shaykh</a>, <a href="https://publications.waset.org/abstracts/search?q=leadership%20Islam%20jihad%20politics" title=" leadership Islam jihad politics"> leadership Islam jihad politics</a> </p> <a href="https://publications.waset.org/abstracts/71774/arabic-scholars-governance-advocacy-and-nigerias-national-security-in-nigeria-perspective-of-al-shaykh-usman-bin-fodio" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/71774.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">335</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12</span> The Role of Sustainable Development in the Design and Planning of Smart Cities Using GIS Techniques: Models of Arab Cities</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ahmed%20M.%20Jihad">Ahmed M. Jihad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The paper presents the concept of sustainable development, and the role of geographic techniques in the design, planning and presentation of maps of smart cities with geographical vision, and the identification of programs and tools, and models of maps of Arab cities, is the problem of research in how to apply, process and experience these programs? What is the role of geographic techniques in planning and mapping the optimal place for these cities? The paper proposes an addition to the designs of Iraqi cities, as it can be developed in the future to serve as a model for interactive smart cities by developing its services. The importance of this paper stems from the concept of sustainable development dynamic which has become a method of development imposed by the present era in rapid development to achieve social balance and specialized programs in draw paper argues that ensuring sustainable development is achieved through the use of information technology. The paper will follow the theoretical presentation of the importance of the concept of development, design tools and programs. The paper follows the method of analysis of modern systems (System Analysis Approach) through the latest programs will provide results can be said that the new Iraqi cities can be developed with smart technologies, like some of the Arab and European cities that were newly created through the introduction of international investment, and therefore Plans can be made to select the best programs in manufacturing and producing maps and smart cities in the future. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=geographic%20techniques" title="geographic techniques">geographic techniques</a>, <a href="https://publications.waset.org/abstracts/search?q=planning%20the%20cities" title=" planning the cities"> planning the cities</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20cities" title=" smart cities"> smart cities</a>, <a href="https://publications.waset.org/abstracts/search?q=sustainable%20development" title=" sustainable development"> sustainable development</a> </p> <a href="https://publications.waset.org/abstracts/80150/the-role-of-sustainable-development-in-the-design-and-planning-of-smart-cities-using-gis-techniques-models-of-arab-cities" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/80150.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">210</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11</span> India, Pakistan and the US in the Afghan Imbroglio: The Way Forward</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Saroj%20Kumar%20Rath">Saroj Kumar Rath</a> </p> <p class="card-text"><strong>Abstract:</strong></p> When insurgency erupted in Kashmir in 1989, it was quickly backed by Pakistan. Kashmir witnessed terrorism for more than a decade till 2004 when Indian forces decimated militancy. After the US pressure in 1992, terrorist training camps of Pakistan shifted to Afghanistan and al Qaeda and the Taliban had taken over training of Kashmiri militants in Afghanistan after 1997 as part of their global jihad. The Indo-Pak rivalry over Kashmir dispute had taken a new turn in the aftermath of 9/11 developments. Islamabad viewed its Afghan policy through the prism of denying India any advantage in Kabul. Pakistan was successful in refuting Indian presence in Kabul for a decade through the Taliban. After the 9/11 attacks the Inter Services Intelligence (ISI) saw Northern Alliance, supported by the Americans and all of Pakistan’s regional rivals – India, Iran, and Russia – as claiming victory in Kabul. For Pakistan’s military regime, this was a strategic disaster and prompted the ISI to give refuge to the escaping Taliban, while denying full support to Hamid Karzai. The new development in Afghanistan prompted India to establish a foothold it had lost nearly a decade earlier. India established diplomatic contacts with Afghanistan; supported the Karzai government and funded aid programs. Pakistan alleged that Indian agents are training Baloch and Sindhi dissidents in Pakistan through Afghanistan. Kabul had suddenly become the new Kashmir – the new battleground for India-Pakistan rivalry. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Afghan%20imbroglio" title="Afghan imbroglio">Afghan imbroglio</a>, <a href="https://publications.waset.org/abstracts/search?q=Kashmir%20conflict" title=" Kashmir conflict"> Kashmir conflict</a>, <a href="https://publications.waset.org/abstracts/search?q=Indo-Pak%20rivalry" title=" Indo-Pak rivalry"> Indo-Pak rivalry</a>, <a href="https://publications.waset.org/abstracts/search?q=US%20policy%20in%20South%20Asia" title=" US policy in South Asia"> US policy in South Asia</a> </p> <a href="https://publications.waset.org/abstracts/48231/india-pakistan-and-the-us-in-the-afghan-imbroglio-the-way-forward" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/48231.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">433</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10</span> Identity (Mis)Representation and Ideological Struggles in Discourses on Boko Haram in Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Temitope%20Ogungbemi">Temitope Ogungbemi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Jama'atu Ahlis Sunna Lidda'awati wal-Jihad (also called Boko Haram) in the North-East of Nigeria has facilitated ideological binarity in discourses on the crisis. Since its proliferation, media representation of the crisis has facilitated identity contamination and ideological struggle through which other critical issues, such as religious intolerance, ethnic diversity and other forms of class conflict in the Nigerian state, are brought to public notice. Though Boko Haram insurgency is ideological laden, the manifestation of the inherent ideologies requires extensive scholarly attention in order deconstruct the veiled ideologies. Therefore, the thrust of this study is to critically investigate identity (mis)representation as a basis for ideological mapping in discourses on Boko Haram in Nigeria, adopting critical discourse analytical tools supported with insights from systemic functional linguistics and critical discourse analysis. The data for this study consist of articles on Boko Haram in Nigerian newspapers published in English. The data selection is purposive and aimed at responding to challenges that are inherent in Nigeria's multifaithism and multiculturalism, and their effects on the construction of narratives on Boko Haram. The study reveals that identity manipulation is a constructive device for ideological mapping, realised through labeling, agency activation, and transitivity. Identity representation in discourses on Boko Haram depicted four dichotomous binarities using exclusion, generalisation, contrasting and attribution. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=identity%20representation" title="identity representation">identity representation</a>, <a href="https://publications.waset.org/abstracts/search?q=ideology" title=" ideology"> ideology</a>, <a href="https://publications.waset.org/abstracts/search?q=Boko%20Haram" title=" Boko Haram"> Boko Haram</a>, <a href="https://publications.waset.org/abstracts/search?q=newspapers" title=" newspapers"> newspapers</a> </p> <a href="https://publications.waset.org/abstracts/61938/identity-misrepresentation-and-ideological-struggles-in-discourses-on-boko-haram-in-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/61938.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">340</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9</span> Statistical Modeling of Local Area Fading Channels Based on Triply Stochastic Filtered Marked Poisson Point Processes</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jihad%20Daba">Jihad Daba</a>, <a href="https://publications.waset.org/abstracts/search?q=Jean-Pierre%20Dubois"> Jean-Pierre Dubois</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Multi path fading noise degrades the performance of cellular communication, most notably in femto- and pico-cells in 3G and 4G systems. When the wireless channel consists of a small number of scattering paths, the statistics of fading noise is not analytically tractable and poses a serious challenge to developing closed canonical forms that can be analysed and used in the design of efficient and optimal receivers. In this context, noise is multiplicative and is referred to as stochastically local fading. In many analytical investigation of multiplicative noise, the exponential or Gamma statistics are invoked. More recent advances by the author of this paper have utilized a Poisson modulated and weighted generalized Laguerre polynomials with controlling parameters and uncorrelated noise assumptions. In this paper, we investigate the statistics of multi-diversity stochastically local area fading channel when the channel consists of randomly distributed Rayleigh and Rician scattering centers with a coherent specular Nakagami-distributed line of sight component and an underlying doubly stochastic Poisson process driven by a lognormal intensity. These combined statistics form a unifying triply stochastic filtered marked Poisson point process model. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cellular%20communication" title="cellular communication">cellular communication</a>, <a href="https://publications.waset.org/abstracts/search?q=femto%20and%20pico-cells" title=" femto and pico-cells"> femto and pico-cells</a>, <a href="https://publications.waset.org/abstracts/search?q=stochastically%20local%20area%20fading%20channel" title=" stochastically local area fading channel"> stochastically local area fading channel</a>, <a href="https://publications.waset.org/abstracts/search?q=triply%20stochastic%20filtered%20marked%20Poisson%20point%20process" title=" triply stochastic filtered marked Poisson point process"> triply stochastic filtered marked Poisson point process</a> </p> <a href="https://publications.waset.org/abstracts/33952/statistical-modeling-of-local-area-fading-channels-based-on-triply-stochastic-filtered-marked-poisson-point-processes" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/33952.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">448</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8</span> The Role of Moroccan Salafist Radicalism in Creating Threat to Spain’s Security</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Stanislaw%20Kosmynka">Stanislaw Kosmynka</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Although the genesis of the activity of fighting salafist radicalism in Spain dates back to the 80’s, the development of extremism of this kind manifested itself only in the next decade. Its first permanently functioning structures in this country in the second half of 90’s of 20th century came from Algieria and Syria. At the same time it should be emphasized that this distinction is in many dimensions conventional, the more so because they consisted also of immigrants from other coutries of Islam, particularly from Morocco. The paper seeks to understand the radical salafist challenge for Spain in the context of some terrorist networks consisted of immigrants from Morocco. On the eve of the new millennium Moroccan jihadists played an increasingly important role. Although the activity of these groups had for many years mainly logistical and propaganda character, the bomb attack carried out on 11 March 2004 in Madrid constituted an expression of open forms of terrorism, directed against the authorities and society of Spain and reflected the narration of representatives of the trend of the global jihad. The people involved in carrying out that act of violence were to a large extent Moroccan immigrants; also in the following years among the cells of radicals in Spain Moroccans stood out many times. That is why the forms and directions of activity of these extremists in Spain, also after 11th March 2004 and in the actual context of the impact of Islamic State, are worth presenting. The paper is focused on threats to the security of Spain and the region and remains connected with the issues of mutual relations of the society of a host country with immigrant communities which to a large degree come from this part of Maghreb. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=jihadi%20terrorism" title="jihadi terrorism">jihadi terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=Morocco" title=" Morocco"> Morocco</a>, <a href="https://publications.waset.org/abstracts/search?q=radical%20salafism" title=" radical salafism"> radical salafism</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=Spain" title=" Spain"> Spain</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorist%20cells" title=" terrorist cells"> terrorist cells</a>, <a href="https://publications.waset.org/abstracts/search?q=threat" title=" threat"> threat</a> </p> <a href="https://publications.waset.org/abstracts/26004/the-role-of-moroccan-salafist-radicalism-in-creating-threat-to-spains-security" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/26004.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">525</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7</span> Analyzing the Politico-Religious Order of The &#039;Islamic State&#039;</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Galit%20Truman%20Zinman">Galit Truman Zinman</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The 'Islamic State' (IS) is one of the most successful jihadist groups in the modern history. The 'Islamic State' strives to realize the idea of erasing the borders between Muslim countries and establishing a wide Islamic caliphate. The 'Islamic State' is based on religious unity and opposition to existing political order. In this paper, the main argument is that the 'Islamic State' is characterized by two significant tendencies of state-building: preservation and change. The methodology of this study is based on the process tracing method and the analysis of primary sources: decisions, announcements and speeches of religious leaders of the Islamic State, slogans, rituals and symbols, audio and video clips produced by the Al-Hayat Media Center, films distributed on YouTube, as well as the content analysis of Dabiq`s articles (IS official Journal) and nasheeds (jihadi songs). The major findings of this study indicate that in practice the 'Islamic State' uses the same socio-political functions typical to the modern state (preservation), but introduces a different religious-ideological content (change). On the one hand, there is a preservation of the principles of existing modern state. Even with the rejection of secularization, globalization, and nationalism, there is an establishment of typical modern nation-state patterns. It is still a state entity, which has an ideological infrastructure, territory, population, governance and a monopoly on the use of violence, security services, justice system, tax collection, etc. All these functions characterize the modern state, and despite the desire of the 'Islamic State' to create a new kind of state, it reminds patterns of the typical modern nation-state. As for the religious-ideological content of the new state, here we can see a tendency of great change. The 'Islamic State' aims to create an Islamic caliphate which would allow the establishment of religious law and order, under a big commitment to return civilization to a seventh-century environment. The 'Islamic State' favors the fight against Western culture and its liberal ideology. It supports the struggle for global jihad against the unbelievers. Today, despite the territorial 'contraction' and the undermining of the organization's governance in Iraq and Syria, the 'Islamic State' continues to maintain its brand among jihadist activists around the world. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Islamic%20State" title="Islamic State">Islamic State</a>, <a href="https://publications.waset.org/abstracts/search?q=Islamic%20caliphate" title=" Islamic caliphate"> Islamic caliphate</a>, <a href="https://publications.waset.org/abstracts/search?q=modern%20nation-state" title=" modern nation-state"> modern nation-state</a>, <a href="https://publications.waset.org/abstracts/search?q=religious%20law%20and%20order" title=" religious law and order"> religious law and order</a> </p> <a href="https://publications.waset.org/abstracts/81139/analyzing-the-politico-religious-order-of-the-islamic-state" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/81139.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">183</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6</span> Islamic Extremist Groups&#039; Usage of Populism in Social Media to Radicalize Muslim Migrants in Europe</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Irfan">Muhammad Irfan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The rise of radicalization within Islam has spawned a new era of global terror. The battlefield Successes of ISIS and the Taliban are fuelled by an ideological war waged, largely and successfully, in the media arena. This research will examine how Islamic extremist groups are using media modalities and populist narratives to influence migrant Muslim populations in Europe towards extremism. In 2014, ISIS shocked the world in exporting horrifically graphic forms of violence on social media. Their Muslim support base was largely disgusted and reviled. In response, they reconfigured their narrative by introducing populist 'hooks', astutely portraying the Muslim populous as oppressed and exploited by unjust, corrupt autocratic regimes and Western power structures. Within this crucible of real and perceived oppression, hundreds of thousands of the most desperate, vulnerable and abused migrants left their homelands, risking their lives in the hope of finding peace, justice, and prosperity in Europe. Instead, many encountered social stigmatization, detention and/or discrimination for being illegal migrants, for lacking resources and for simply being Muslim. This research will examine how Islamic extremist groups are exploiting the disenfranchisement of these migrant populations and using populist messaging on social media to influence them towards violent extremism. ISIS, in particular, formulates specific encoded messages for newly-arriving Muslims in Europe, preying upon their vulnerability. Violence is posited, as a populist response, to the tyranny of European oppression. This research will analyze the factors and indicators which propel Muslim migrants along the spectrum from resilience to violence extremism. Expected outcomes are identification of factors which influence vulnerability towards violent extremism; an early-warning detection framework; predictive analysis models; and de-radicalization frameworks. This research will provide valuable tools (practical and policy level) for European governments, security stakeholders, communities, policy-makers, and educators; it is anticipated to contribute to a de-escalation of Islamic extremism globally. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=populism" title="populism">populism</a>, <a href="https://publications.waset.org/abstracts/search?q=radicalization" title=" radicalization"> radicalization</a>, <a href="https://publications.waset.org/abstracts/search?q=de-radicalization" title=" de-radicalization"> de-radicalization</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20media" title=" social media"> social media</a>, <a href="https://publications.waset.org/abstracts/search?q=ISIS" title=" ISIS"> ISIS</a>, <a href="https://publications.waset.org/abstracts/search?q=Taliban" title=" Taliban"> Taliban</a>, <a href="https://publications.waset.org/abstracts/search?q=shariah" title=" shariah"> shariah</a>, <a href="https://publications.waset.org/abstracts/search?q=jihad" title=" jihad"> jihad</a>, <a href="https://publications.waset.org/abstracts/search?q=Islam" title=" Islam"> Islam</a>, <a href="https://publications.waset.org/abstracts/search?q=Europe" title=" Europe"> Europe</a>, <a href="https://publications.waset.org/abstracts/search?q=political%20communication" title=" political communication"> political communication</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorism" title=" terrorism"> terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=migrants" title=" migrants"> migrants</a>, <a href="https://publications.waset.org/abstracts/search?q=refugees" title=" refugees"> refugees</a>, <a href="https://publications.waset.org/abstracts/search?q=extremism" title=" extremism"> extremism</a>, <a href="https://publications.waset.org/abstracts/search?q=global%20terror" title=" global terror"> global terror</a>, <a href="https://publications.waset.org/abstracts/search?q=predictive%20analysis" title=" predictive analysis"> predictive analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=early%20warning%20detection" title=" early warning detection"> early warning detection</a>, <a href="https://publications.waset.org/abstracts/search?q=models" title=" models"> models</a>, <a href="https://publications.waset.org/abstracts/search?q=strategic%20communication" title=" strategic communication"> strategic communication</a>, <a href="https://publications.waset.org/abstracts/search?q=populist%20narratives" title=" populist narratives"> populist narratives</a>, <a href="https://publications.waset.org/abstracts/search?q=Islamic%20extremism" title=" Islamic extremism"> Islamic extremism</a> </p> <a href="https://publications.waset.org/abstracts/104677/islamic-extremist-groups-usage-of-populism-in-social-media-to-radicalize-muslim-migrants-in-europe" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/104677.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">119</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5</span> ISIS Women Recruitment in Spain and De-Radicalization Programs in Prisons</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Inmaculada%20Yuste%20Martinez">Inmaculada Yuste Martinez</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Since July 5, 2014, Abubaker al Bagdadi, leader of the Islamic State since 2010 climbed the pulpit of the Great Mosque of Al Nuri of Mosul and proclaimed the Caliphate, the number of fighters who have travelled to Syria to join the Caliphate has increased as never before. Although it is true that the phenomenon of foreign fighters is not a new phenomenon, as it occurred after the Spanish Civil War, Republicans from Ireland and the conflict of the Balkans among others, it is highly relevant the fact that in this case, it has reached figures unknown in Europe until now. The approval of the resolution 2178 (2014) of the Security Council, foreign terrorist fighters placed the subject a priority position on the International agenda. The available data allow us to affirm that women have increasingly assumed operative functions in jihadist terrorism and in the activities linked to it in the development of attacks in the European Union, including minors and young adults. In the case of Spain, one in four of the detainees in 2016 were women, a significant increase compared to 2015. This contrasts with the fact that until 2014 no woman had been prosecuted in Spain for terrorist activities of a jihadist nature. It is fundamental when we talk about the prevention of radicalization and counterterrorism that we do not underestimate the potential threat to the security of countries like Spain that women from the West can assume to the global jihadist movement. This work aims to deepen the radicalization processes of these women and their profiles influencing the female inmate population. It also wants to focus on the importance of creating de-radicalization programs for these inmates since women are a crucial element in radicalization processes. A special focus it is made on young radicalized female inmate population as this target group is the most recoverable and on which it would result more fruitful to intervene. De-radicalization programs must also be designed to fit their profiles and circumstances; a sensitive environment will be prisons and juvenile centers, areas that until now had been unrelated to this problem and which are already hosting the first convicted in judicial offices in Spanish territory. A qualitative research and an empirical and analytical method has been implemented in this work, focused on the cases that took place in Spain of young women and the imaginary that the Islamic State uses for the processes of radicalization for this target group and how it does not fit with their real role in the Jihad, as opposed to other movements in which women do have a real and active role in the armed conflict as YPJ do it as a part of the armed wing of the Democratic Union Party of Syria. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=caliphate" title="caliphate">caliphate</a>, <a href="https://publications.waset.org/abstracts/search?q=de-radicalization" title=" de-radicalization"> de-radicalization</a>, <a href="https://publications.waset.org/abstracts/search?q=foreign%20fighter" title=" foreign fighter"> foreign fighter</a>, <a href="https://publications.waset.org/abstracts/search?q=gender%20perspective" title=" gender perspective"> gender perspective</a>, <a href="https://publications.waset.org/abstracts/search?q=ISIS" title=" ISIS"> ISIS</a>, <a href="https://publications.waset.org/abstracts/search?q=jihadism" title=" jihadism"> jihadism</a>, <a href="https://publications.waset.org/abstracts/search?q=recruitment" title=" recruitment"> recruitment</a> </p> <a href="https://publications.waset.org/abstracts/85000/isis-women-recruitment-in-spain-and-de-radicalization-programs-in-prisons" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/85000.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">171</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=jihad&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=jihad&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10