CINXE.COM

Search results for: irregular warfare

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: irregular warfare</title> <meta name="description" content="Search results for: irregular warfare"> <meta name="keywords" content="irregular warfare"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="irregular warfare" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="irregular warfare"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 413</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: irregular warfare</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">413</span> Western and Eastern Ways of Special Warfare: The Strategic History of Special Operations from Western and Eastern Sources</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Adam%20Kok%20Wey%20Leong">Adam Kok Wey Leong</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Special operations were supposedly a new way of irregular warfare that was officially formed during World War 2. For example, the famous British Special Operations Executive (SOE) and the Americans’ Office for Strategic Services (OSS) – the forerunners of modern day CIA were born in World War 2. These special operations units were tasked with the conduct of sabotage and subversion activities behind enemy lines, placing great importance in forming Fifth Column activities and supporting resistance movements. This pointed to a paradoxical argument that modern day special operations is a product of Western modern military innovation but utilizing Eastern ways of ‘ungentlemanly’ warfare. This thesis is superfluous as special operations had been well practised by both ancient Western empires such as the Greeks and Romans, and around the same time in the East, such as in China, and Japan. This paper will describe the practice of special operations, first from the Western military history of the Greeks during the Peloponnesian war. It will then highlight the similar practice of special operations by the Near Eastern Assassins and Eastern militaries by using examples from the Chinese and the Japanese. This paper propounds that special operations, or ways of warfare as a whole, has no cultural and geographical divide, but rather very similarly practiced by men from all over the world. Ideas of fighting, killing and ultimately winning a war have similar undertones – attempts to find ways to win economically and at the least time. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=special%20operations" title="special operations">special operations</a>, <a href="https://publications.waset.org/abstracts/search?q=strategic%20culture" title=" strategic culture"> strategic culture</a>, <a href="https://publications.waset.org/abstracts/search?q=ways%20of%20warfare" title=" ways of warfare"> ways of warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=Sun%20Tzu" title=" Sun Tzu"> Sun Tzu</a>, <a href="https://publications.waset.org/abstracts/search?q=Frontinus" title=" Frontinus"> Frontinus</a> </p> <a href="https://publications.waset.org/abstracts/61434/western-and-eastern-ways-of-special-warfare-the-strategic-history-of-special-operations-from-western-and-eastern-sources" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/61434.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">472</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">412</span> Deployment of Attack Helicopters in Conventional Warfare: The Gulf War</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mehmet%20Karabekir">Mehmet Karabekir</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Attack helicopters (AHs) are usually deployed in conventional warfare to destroy armored and mechanized forces of enemy. In addition, AHs are able to perform various tasks in the deep, and close operations – intelligence, surveillance, reconnaissance, air assault operations, and search and rescue operations. Apache helicopters were properly employed in the Gulf Wars and contributed the success of campaign by destroying a large number of armored and mechanized vehicles of Iraq Army. The purpose of this article is to discuss the deployment of AHs in conventional warfare in the light of Gulf Wars. First, the employment of AHs in deep and close operations will be addressed regarding the doctrine. Second, the US armed forces AH-64 doctrinal and tactical usage will be argued in the 1st and 2nd Gulf Wars. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=attack%20helicopter" title="attack helicopter">attack helicopter</a>, <a href="https://publications.waset.org/abstracts/search?q=conventional%20warfare" title=" conventional warfare"> conventional warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=gulf%20wars" title=" gulf wars"> gulf wars</a> </p> <a href="https://publications.waset.org/abstracts/29944/deployment-of-attack-helicopters-in-conventional-warfare-the-gulf-war" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29944.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">473</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">411</span> New Requirements of the Fifth Dimension of War: Planning of Cyber Operation Capabilities</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mehmet%20Kargaci">Mehmet Kargaci</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Transformation of technology and strategy has been the main factor for the evolution of war. In addition to land, maritime, air and space domains, cyberspace has become the fifth domain with emerge of internet. The current security environment has become more complex and uncertain than ever before. Moreover, warfare has evaluated from conventional to irregular, asymmetric and hybrid war. Weak actors such as terrorist organizations and non-state actors has increasingly conducted cyber-attacks against strong adversaries. Besides, states has developed cyber capabilities in order to defense critical infrastructure regarding the cyber threats. Cyber warfare will be key in future security environment. Although what to do has been placed in operational plans, how to do has lacked and ignored as to cyber defense and attack. The purpose of the article is to put forward a model for how to conduct cyber capabilities in a conventional war. First, cyber operations capabilities will be discussed. Second put forward the necessities of cyberspace environment and develop a model for how to plan an operation using cyber operation capabilities, finally the assessment of the applicability of cyber operation capabilities and offers will be presented. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber%20war" title="cyber war">cyber war</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20threats" title=" cyber threats"> cyber threats</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20operation%20capabilities" title=" cyber operation capabilities"> cyber operation capabilities</a>, <a href="https://publications.waset.org/abstracts/search?q=operation%20planning" title=" operation planning"> operation planning</a> </p> <a href="https://publications.waset.org/abstracts/31541/new-requirements-of-the-fifth-dimension-of-war-planning-of-cyber-operation-capabilities" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31541.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">335</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">410</span> Contemporary Technological Developments in Urban Warfare</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mehmet%20Ozturk">Mehmet Ozturk</a>, <a href="https://publications.waset.org/abstracts/search?q=Serdal%20Akyuz"> Serdal Akyuz</a>, <a href="https://publications.waset.org/abstracts/search?q=Halit%20Turan"> Halit Turan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> By the evolving technology, the nature of the war has been changed since the beginning of the history. In the first generation war, the bayonet came to the fore in battlefields; successively; in the second-generation firepower; in the third generation maneuver. Today, in the fourth-generation, fighters, sides, and even fighters’ borders are unclear; consequently, lines of the battles have lost their significance. Furthermore, the actors in the battles can be state or non-state, military, paramilitary or civilian. In order to change the balance according to their interests, parties have utilized the urban areas as warfare. The main reason for using urban areas as a battlefield is the imbalance between parties. To balance the power strength, exploiting technological developments has utmost importance. There are many newly developed technologies for urban warfare such as change in the size of the unmanned aerial vehicle, increased usage of unmanned ground vehicles (especially in supply and evacuation purposes), systems showing the behind of the wall, simulations used for educational purposes. This study will focus on the technological equipment being used for urban warfare. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=urban%20warfare" title="urban warfare">urban warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=unmanned%20ground%20vehicles" title=" unmanned ground vehicles"> unmanned ground vehicles</a>, <a href="https://publications.waset.org/abstracts/search?q=technological%20developments" title=" technological developments"> technological developments</a>, <a href="https://publications.waset.org/abstracts/search?q=nature%20of%20the%20war" title=" nature of the war"> nature of the war</a> </p> <a href="https://publications.waset.org/abstracts/39663/contemporary-technological-developments-in-urban-warfare" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/39663.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">419</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">409</span> Asymmetric Warfare: Exploratory Study of the Implicit Defense Strategy of the People&#039;s Republic of China in 2012-2016</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mar%C3%ADa%20Victoria%20Alvarez%20Maga%C3%B1ini">María Victoria Alvarez Magañini</a>, <a href="https://publications.waset.org/abstracts/search?q=Lautaro%20Nahuel%20Rubbi"> Lautaro Nahuel Rubbi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> According to different theories, the hegemonic war between the United States and the People's Republic of China seems to be imminent. However, nowadays, it is clear that China's conventional military capacity is inferior to that of the United States. Nevertheless, the conditions that in the past were considered to be an indicator of validity in asymmetrical warfare, at present, in a possible asymmetric war scenario, are no longer considered to be taken as such. The military capacity is not the only concept that represents the main indicator of victory. The organisation and the use of forces are also an essential part of it. The present paper aims to analyze the Chinese Defense Strategy in relation to the concept of asymmetric warfare in the face of a possible war with the United States. The starting point will be developed on the basis of application of the theory which corresponds to the concept aforementioned making focus on recent developments of the People’s Republic of China in the field of non-conventional defense. A comparative analysis of the conventional forces of both powers/countries will also be carried out. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=asymmetric%20warfare" title="asymmetric warfare">asymmetric warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=China" title=" China"> China</a>, <a href="https://publications.waset.org/abstracts/search?q=United%20States" title=" United States"> United States</a>, <a href="https://publications.waset.org/abstracts/search?q=hegemonic%20warfare" title=" hegemonic warfare"> hegemonic warfare</a> </p> <a href="https://publications.waset.org/abstracts/75287/asymmetric-warfare-exploratory-study-of-the-implicit-defense-strategy-of-the-peoples-republic-of-china-in-2012-2016" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/75287.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">264</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">408</span> Conceptualizing the Cyber Insecurity Risk in the Ethics of Automated Warfare</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Otto%20Kakhidze">Otto Kakhidze</a>, <a href="https://publications.waset.org/abstracts/search?q=Hoda%20Alkhzaimi"> Hoda Alkhzaimi</a>, <a href="https://publications.waset.org/abstracts/search?q=Adam%20Ramey"> Adam Ramey</a>, <a href="https://publications.waset.org/abstracts/search?q=Nasir%20Memon"> Nasir Memon</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper provides an alternative, cyber security based a conceptual framework for the ethics of automated warfare. The large body of work produced on fully or partially autonomous warfare systems tends to overlook malicious security factors as in the possibility of technical attacks on these systems when it comes to the moral and legal decision-making. The argument provides a risk-oriented justification to why technical malicious risks cannot be dismissed in legal, ethical and policy considerations when warfare models are being implemented and deployed. The assumptions of the paper are supported by providing a broader model that contains the perspective of technological vulnerabilities through the lenses of the Game Theory, Just War Theory as well as standard and non-standard defense ethics. The paper argues that a conventional risk-benefit analysis without considering ethical factors is insufficient for making legal and policy decisions on automated warfare. This approach will provide the substructure for security and defense experts as well as legal scholars, ethicists and decision theorists to work towards common justificatory grounds that will accommodate the technical security concerns that have been overlooked in the current legal and policy models. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=automated%20warfare" title="automated warfare">automated warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=ethics%20of%20automation" title=" ethics of automation"> ethics of automation</a>, <a href="https://publications.waset.org/abstracts/search?q=inherent%20hijacking" title=" inherent hijacking"> inherent hijacking</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20vulnerabilities" title=" security vulnerabilities"> security vulnerabilities</a>, <a href="https://publications.waset.org/abstracts/search?q=risk" title=" risk"> risk</a>, <a href="https://publications.waset.org/abstracts/search?q=uncertainty" title=" uncertainty"> uncertainty</a> </p> <a href="https://publications.waset.org/abstracts/71567/conceptualizing-the-cyber-insecurity-risk-in-the-ethics-of-automated-warfare" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/71567.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">357</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">407</span> Comparing and Contrasting Western and Eastern Ways of War: Building a Universal Strategic Theory</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Adam%20Kok%20Wey%20Leong">Adam Kok Wey Leong</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The comparison between the Western ways of war and Eastern ways of war has raised contemporary debates on the validity of these arguments. The Western way of war is popularly propounded by Victor Davis Hanson as originating from the Greek hoplite tactics, direct military maneuvers, democratic principles and social freedom and cohesion that has continued to yield military success for the Western powers for centuries. On the other hand, the Eastern way of war has been deemed as relying on indirect tactics, deception, and ruses. This often accepted notion of the divide between Western and Eastern style does not sustain in view of the available classical strategic texts from both sides from the same period that has proposed similar principles of warfare. This paper analyses the similarities between classical strategic texts on war from the Eastern perspective namely Sun Tzu’s Art of War with a similar temporal strategic text from the West which is Sextus Iuluis Frontinus’s Stratagematon, and deduces answers to this core research question - Does the hypothesis of the existence of distinctive Western and Eastern ways of warfare stands? The main thesis advanced by this research is that ways of warfare share universal principles, and it transcends cultural and spatial boundaries. Warfare is a human endeavour, and the same moral actions guide humans from different geo-cultural spheres in warfare’s objectives, which are winning over an enemy in the most economical way and serve as a mean to an end. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ways%20of%20warfare" title="ways of warfare">ways of warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=strategic%20culture" title=" strategic culture"> strategic culture</a>, <a href="https://publications.waset.org/abstracts/search?q=strategy" title=" strategy"> strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=Sun%20Tzu" title=" Sun Tzu"> Sun Tzu</a>, <a href="https://publications.waset.org/abstracts/search?q=frontinus" title=" frontinus"> frontinus</a> </p> <a href="https://publications.waset.org/abstracts/72152/comparing-and-contrasting-western-and-eastern-ways-of-war-building-a-universal-strategic-theory" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/72152.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">469</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">406</span> Paraplegic Dimensions of Asymmetric Warfare: A Strategic Analysis for Resilience Policy Plan</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sehrish%20Qayyum">Sehrish Qayyum</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this age of constant technology, asymmetrical warfare could not be won. Attuned psychometric study confirms that screaming sometimes is more productive than active retaliation against strong adversaries. Asymmetric warfare is a game of nerves and thoughts with least vigorous participation for large anticipated losses. It creates the condition of paraplegia with partial but permanent immobility, which effects the core warfare operations, being screams rather than active retaliation. When one’s own power is doubted, it gives power to one’s own doubt to ruin all planning either done with superlative cost-benefit analysis. Strategically calculated estimation of asymmetric warfare since the early WWI to WWII, WWII-to Cold War, and then to the current era in three chronological periods exposits that courage makes nations win the battle of warriors to battle of comrades. Asymmetric warfare has been most difficult to fight and survive due to unexpectedness and being lethal despite preparations. Thoughts before action may be the best-assumed strategy to mix Regional Security Complex Theory and OODA loop to develop the Paraplegic Resilience Policy Plan (PRPP) to win asymmetric warfare. PRPP may serve to control and halt the ongoing wave of terrorism, guerilla warfare, and insurgencies, etc. PRPP, along with a strategic work plan, is based on psychometric analysis to deal with any possible war condition and tactic to save millions of innocent lives such that lost in Christchurch New Zealand in 2019, November 2015 Paris attacks, and Berlin market attacks in 2016, etc. Getting tangled into self-imposed epistemic dilemmas results in regret that becomes the only option of performance. It is a descriptive psychometric analysis of war conditions with generic application of probability tests to find the best possible options and conditions to develop PRPP for any adverse condition possible so far. Innovation in technology begets innovation in planning and action-plan to serve as a rheostat approach to deal with asymmetric warfare. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=asymmetric%20warfare" title="asymmetric warfare">asymmetric warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=psychometric%20analysis" title=" psychometric analysis"> psychometric analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=PRPP" title=" PRPP"> PRPP</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a> </p> <a href="https://publications.waset.org/abstracts/122663/paraplegic-dimensions-of-asymmetric-warfare-a-strategic-analysis-for-resilience-policy-plan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/122663.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">136</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">405</span> The Evolution of Strike and Intelligence Functions in Special Operations Forces</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=John%20Hardy">John Hardy</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The expansion of special operations forces (SOF) in the twenty-first century is often discussed in terms of the size and disposition of SOF units. Research regarding the number SOF personnel, the equipment SOF units procure, and the variety of roles and mission that SOF fulfill in contemporary conflicts paints a fascinating picture of changing expectations for the use of force. A strong indicator of the changing nature of SOF in contemporary conflicts is the fusion of strike and intelligence functions in the SOF in many countries. What were once more distinct roles on the kind of battlefield generally associated with the concept of conventional warfare have become intermingled in the era of persistent conflict which SOF face. This study presents a historical analysis of the co-evolution of the intelligence and direct action functions carried out by SOF in counterterrorism, counterinsurgency, and training and mentoring missions between 2004 and 2016. The study focuses primarily on innovation in the US military and the diffusion of key concepts to US allies first, and then more broadly afterward. The findings show that there were three key phases of evolution throughout the period of study, each coinciding with a process of innovation and doctrinal adaptation. The first phase was characterized by the fusion of intelligence at the tactical and operational levels. The second phase was characterized by the industrial counterterrorism campaigns used by US SOF against irregular enemies in Iraq and Afghanistan. The third phase was characterized by increasing forward collection of actionable intelligence by SOF force elements in the course of direct action raids. The evolution of strike and intelligence functions in SOF operations between 2004 and 2016 was significantly influenced by reciprocity. Intelligence fusion led to more effective targeting, which then increased intelligence collection. Strike and intelligence functions were then enhanced by greater emphasis on intelligence exploitation during operations, which further increased the effectiveness of both strike and intelligence operations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=counterinsurgency" title="counterinsurgency">counterinsurgency</a>, <a href="https://publications.waset.org/abstracts/search?q=counterterrorism" title=" counterterrorism"> counterterrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=intelligence" title=" intelligence"> intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=irregular%20warfare" title=" irregular warfare"> irregular warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=military%20operations" title=" military operations"> military operations</a>, <a href="https://publications.waset.org/abstracts/search?q=special%20operations%20forces" title=" special operations forces"> special operations forces</a> </p> <a href="https://publications.waset.org/abstracts/94241/the-evolution-of-strike-and-intelligence-functions-in-special-operations-forces" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/94241.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">268</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">404</span> International Humanitarian Law and the Challenges of New Technologies of Warfare</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Uche%20A.%20Nnawulezi">Uche A. Nnawulezi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Undoubtedly, despite all efforts made to achieve overall peace through the application of the principles of international humanitarian law, crimes against mankind which are of unprecedented concern to the whole world have remained unabated. The fall back on war as a technique for settling disputes between nations, individuals, countries and ethnic groups with accompanying toll of deaths and destruction of properties have remained a conspicuous component of human history. Indeed, to control this conduct of warfare and the dehumanization of individuals, a body of law aimed at regulating the impacts of conflicts and hostilities in the theater of war has become necessary. Thus, it is to examine the conditions in which international humanitarian law will apply and also to determine the extent of the challenges of new progressions of warfare that this study is undertaken. All through this examination, we grasped doctrinal approach wherein we used text books, journals, international materials and supposition of law specialists in the field of international humanitarian law. This paper shall examine the distinctive factors responsible for the rebelliousness to the rules of International Humanitarian Law and furthermore, shall proffer possible courses of action that will address the challenges of new technologies of warfare all over the world. Essentially, the basic proposals made in this paper if totally utilized may go far in ensuring a sufficient standard in the application of the rules of international humanitarian law as it relates to an increasingly frequent phenomenon of contemporary developments in technologies of warfare which has in recent past, made it more difficult for the most ideal application of the rules of international humanitarian law. This paper deduces that for a sustainable global peace to be achieved, the rules of International Humanitarian Law as it relates to the utilization of new technologies of warfare should be completely clung to and should be made a strict liability offense. Likewise, this paper further recommends the introduction of domestic criminal law punishment of serious contraventions of the rules of international humanitarian law. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=international" title="international">international</a>, <a href="https://publications.waset.org/abstracts/search?q=humanitarian%20law" title=" humanitarian law"> humanitarian law</a>, <a href="https://publications.waset.org/abstracts/search?q=new%20technologies" title=" new technologies"> new technologies</a>, <a href="https://publications.waset.org/abstracts/search?q=warfare" title=" warfare"> warfare</a> </p> <a href="https://publications.waset.org/abstracts/82827/international-humanitarian-law-and-the-challenges-of-new-technologies-of-warfare" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/82827.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">304</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">403</span> Unmanned Systems in Urban Areas </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abdullah%20Beyazkurk">Abdullah Beyazkurk</a>, <a href="https://publications.waset.org/abstracts/search?q=Onur%20Ozdemir"> Onur Ozdemir</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The evolution of warfare has been affected from technological developments to a large extent. Another important factor that affected the evolution of warfare is the space. Technological developments became cornerstones for the organization of the forces on the field, while space of the battlefield gained importance with the introduction of urban areas as 'battlefields'. The use of urban areas as battlefields increased the casualty, while technological developments began to play a remedial role. Thus, the unmanned systems drew attention as the remedy. Today's widely used unmanned aerial vehicles have great effects on the operations. On the other hand, with the increasing urbanization, and the wide use of urban areas as battlefields make it a necessity to benefit from unmanned systems on the ground as well. This study focuses on the use of unmanned aerial systems as well as unmanned ground systems in urban warfare, with regards to their performance and cost affectivity. The study defends that the use of unmanned vehicles will be remedial for increasing casualty rates, while their precision and superhuman capacity will manifest the performance advantage. The findings of this study will help modern armies focus on unmanned systems, especially for the urban, anti-terror, or counter insurgency operations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=technology" title="technology">technology</a>, <a href="https://publications.waset.org/abstracts/search?q=warfare" title=" warfare"> warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=urban%20warfare" title=" urban warfare"> urban warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=unmanned%20systems" title=" unmanned systems"> unmanned systems</a>, <a href="https://publications.waset.org/abstracts/search?q=unmanned%20ground%20vehicles" title=" unmanned ground vehicles"> unmanned ground vehicles</a>, <a href="https://publications.waset.org/abstracts/search?q=unmanned%20aerial%20vehicles" title=" unmanned aerial vehicles"> unmanned aerial vehicles</a> </p> <a href="https://publications.waset.org/abstracts/30438/unmanned-systems-in-urban-areas" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/30438.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">354</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">402</span> Warfare Ships at Ancient Egypt: Since Pre-Historic Era (3700 B.C.) Uptill the End of the 2nd Intermediate Period (1550 B.C.) </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohsen%20Negmeddin">Mohsen Negmeddin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Throughout their history, ancient Egyptians had known several kinds and types of boats, which were made from two main kinds of materials, the local one, as the dried papyrus reeds and the local tree trunks, the imported one, as the boats which were made from Lebanon cedar tree trunks. A varied using of these boats, as the fish hunting small boats, the transportation and trade boats "Cargo Boats", as well as the ceremonial boats, and the warfare boats. The research is intending for the last one, the warfare boats and the river/maritime battles since the beginning of ancient Egyptian civilization at the pre-historic era up till the end of the second intermediate period, to reveal the kinds and types of those fighting ships before establishing the Egyptian navy at the beginning of the New Kingdome (1550-1770 B.C). Two methods will follow at this research, the mention of names and titles of these ships through the texts (ancient Egyptian language) resources, and the depiction of it at the scenes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=the%20warfare%20boats" title="the warfare boats">the warfare boats</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20maritime%20battles" title=" the maritime battles"> the maritime battles</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20pre-historic%20era" title=" the pre-historic era"> the pre-historic era</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20second%20intermediate%20period" title=" the second intermediate period"> the second intermediate period</a> </p> <a href="https://publications.waset.org/abstracts/64849/warfare-ships-at-ancient-egypt-since-pre-historic-era-3700-bc-uptill-the-end-of-the-2nd-intermediate-period-1550-bc" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/64849.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">278</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">401</span> Training as a Service for Electronic Warfare</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Toan%20Vo">Toan Vo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Electronic attacks, illegal drones, interference, and jamming are no longer capabilities reserved for a state-sponsored, near-peer adversary. The proliferation of jammers on auction websites has lowered the price of entry for electronics hobbyists and nefarious actors. To enable local authorities and enforcement bodies to keep up with these challenges, this paper proposes a training as a service model to quickly and economically train and equip police departments and local law enforcement agencies. Using the U.S Department of Defense’s investment in Electronic Warfare as a guideline, a large number of personnel can be trained on effective spectrum monitoring techniques using commercial equipment readily available on the market. Finally, this paper will examine the economic benefits to the test and measurement industry if the TaaS model is applied. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=training" title="training">training</a>, <a href="https://publications.waset.org/abstracts/search?q=electronic%20warfare" title=" electronic warfare"> electronic warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=economics" title=" economics"> economics</a>, <a href="https://publications.waset.org/abstracts/search?q=law%20enforcement" title=" law enforcement"> law enforcement</a> </p> <a href="https://publications.waset.org/abstracts/156087/training-as-a-service-for-electronic-warfare" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/156087.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">103</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">400</span> The Social Psychology of Illegal Game Room Addiction in the Historic Chinatown District of Honolulu, Hawaii: Illegal Compulsive Gambling, Chinese-Polynesian Organized Crime Syndicates, Police Corruption, and Loan Sharking Rings</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gordon%20James%20Knowles">Gordon James Knowles</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Historically the Chinatown district in Sandwich Islands has been plagued with the traditional vice crimes of illegal drugs, gambling, and prostitution since the early 1800s. However, a new form of psychologically addictive arcade style table gambling machines has become the dominant form of illegal revenue made in Honolulu, Hawaii. This study attempts to document the drive, desire, or will to play and wager with arcade style video gaming and understand the role of illegal game rooms in facilitating pathological gambling addiction. Indicators of police corruption by Chinese organized crime syndicates related to protection rackets, bribery, and pay-offs were revealed. Information fusion from a police science and sociological intelligence perspective indicates insurgent warfare is being waged on the streets of Honolulu by the People’s Republic of China. This state-sponsored communist terrorism in the Hawaiian Islands used “contactless” irregular warfare entailing: (1) the deployment of psychologically addictive gambling machines, (2) the distribution of the physically addictive fentanyl drug as a lethal chemical weapon, and (3) psychological warfare by circulating pro-China anti-American propaganda newspapers targeted at the small island populace. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chinese%20and%20Polynesian%20organized%20crime" title="Chinese and Polynesian organized crime">Chinese and Polynesian organized crime</a>, <a href="https://publications.waset.org/abstracts/search?q=china%20daily%20newspaper" title=" china daily newspaper"> china daily newspaper</a>, <a href="https://publications.waset.org/abstracts/search?q=electronic%20arcade%20style%20table%20games" title=" electronic arcade style table games"> electronic arcade style table games</a>, <a href="https://publications.waset.org/abstracts/search?q=gaming%20technology%20addiction" title=" gaming technology addiction"> gaming technology addiction</a>, <a href="https://publications.waset.org/abstracts/search?q=illegal%20compulsive%20gambling" title=" illegal compulsive gambling"> illegal compulsive gambling</a>, <a href="https://publications.waset.org/abstracts/search?q=and%20police%20intelligence" title=" and police intelligence"> and police intelligence</a> </p> <a href="https://publications.waset.org/abstracts/168791/the-social-psychology-of-illegal-game-room-addiction-in-the-historic-chinatown-district-of-honolulu-hawaii-illegal-compulsive-gambling-chinese-polynesian-organized-crime-syndicates-police-corruption-and-loan-sharking-rings" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168791.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">74</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">399</span> From an Expectations Crisis to a Mental Disorder: The Consequences of Irregular Journeys on Sub-Saharan Migrants</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Siham%20Soulaimi">Siham Soulaimi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Europe has become a difficult destination due to strict migration policies and border controls, making Morocco an immigration country. Morocco is currently at the center of the international migration debate because it not only hosts regular migrants but also must deal with the problem of irregular migrants entering its territory. Sub-Saharan irregular migration is full of challenges that might cause a delay for the migrants, announcing a death sentence for many others. The journey's hurdles are likely to cause a crisis in expectations, resulting in serious consequences on the migrants' mental health. Our research study emphasizes that sub-Saharan migrants begin irregular journeys with high hopes, only to be disappointed by how unexpectedly cruel it turns out to be. We also pointed to specific physical and, more crucially, mental health problems that they end up with after survival, resulting in somatic disorders. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=irregular%20migration" title="irregular migration">irregular migration</a>, <a href="https://publications.waset.org/abstracts/search?q=Sub-Saharan%20migrants" title=" Sub-Saharan migrants"> Sub-Saharan migrants</a>, <a href="https://publications.waset.org/abstracts/search?q=challenges" title=" challenges"> challenges</a>, <a href="https://publications.waset.org/abstracts/search?q=experiences%20crisis" title=" experiences crisis"> experiences crisis</a>, <a href="https://publications.waset.org/abstracts/search?q=mental%20health" title=" mental health"> mental health</a>, <a href="https://publications.waset.org/abstracts/search?q=somatoform%20disorder" title=" somatoform disorder"> somatoform disorder</a> </p> <a href="https://publications.waset.org/abstracts/165510/from-an-expectations-crisis-to-a-mental-disorder-the-consequences-of-irregular-journeys-on-sub-saharan-migrants" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/165510.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">135</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">398</span> Vulnerability Assessment of Vertically Irregular Structures during Earthquake</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pranab%20Kumar%20Das">Pranab Kumar Das</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Vulnerability assessment of buildings with irregularity in the vertical direction has been carried out in this study. The constructions of vertically irregular buildings are increasing in the context of fast urbanization in the developing countries including India. During two reconnaissance based survey performed after Nepal earthquake 2015 and Imphal (India) earthquake 2016, it has been observed that so many structures are damaged due to the vertically irregular configuration. These irregular buildings are necessary to perform safely during seismic excitation. Therefore, it is very urgent demand to point out the actual vulnerability of the irregular structure. So that remedial measures can be taken for protecting those structures during natural hazard as like earthquake. This assessment will be very helpful for India and as well as for the other developing countries. A sufficient number of research has been contributed to the vulnerability of plan asymmetric buildings. In the field of vertically irregular buildings, the effort has not been forwarded much to find out their vulnerability during an earthquake. Irregularity in vertical direction may be caused due to irregular distribution of mass, stiffness and geometrically irregular configuration. Detailed analysis of such structures, particularly non-linear/ push over analysis for performance based design seems to be challenging one. The present paper considered a number of models of irregular structures. Building models made of both reinforced concrete and brick masonry are considered for the sake of generality. The analyses are performed with both help of finite element method and computational method.The study, as a whole, may help to arrive at a reasonably good estimate, insight for fundamental and other natural periods of such vertically irregular structures. The ductility demand, storey drift, and seismic response study help to identify the location of critical stress concentration. Summarily, this paper is a humble step for understanding the vulnerability and framing up the guidelines for vertically irregular structures. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ductility" title="ductility">ductility</a>, <a href="https://publications.waset.org/abstracts/search?q=stress%20concentration" title=" stress concentration"> stress concentration</a>, <a href="https://publications.waset.org/abstracts/search?q=vertically%20irregular%20structure" title=" vertically irregular structure"> vertically irregular structure</a>, <a href="https://publications.waset.org/abstracts/search?q=vulnerability" title=" vulnerability"> vulnerability</a> </p> <a href="https://publications.waset.org/abstracts/67689/vulnerability-assessment-of-vertically-irregular-structures-during-earthquake" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/67689.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">229</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">397</span> Embedded Electrochemistry with Miniaturized, Drone-Based, Potentiostat System for Remote Detection Chemical Warfare Agents</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amer%20Dawoud">Amer Dawoud</a>, <a href="https://publications.waset.org/abstracts/search?q=Jesy%20Motchaalangaram"> Jesy Motchaalangaram</a>, <a href="https://publications.waset.org/abstracts/search?q=Arati%20Biswakarma"> Arati Biswakarma</a>, <a href="https://publications.waset.org/abstracts/search?q=Wujan%20Mio"> Wujan Mio</a>, <a href="https://publications.waset.org/abstracts/search?q=Karl%20Wallace"> Karl Wallace</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The development of an embedded miniaturized drone-based system for remote detection of Chemical Warfare Agents (CWA) is proposed. The paper focuses on the software/hardware system design of the electrochemical Cyclic Voltammetry (CV) and Differential Pulse Voltammetry (DPV) signal processing for future deployment on drones. The paper summarizes the progress made towards hardware and electrochemical signal processing for signature detection of CWA. Also, the miniature potentiostat signal is validated by comparing it with the high-end lab potentiostat signal. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=drone-based" title="drone-based">drone-based</a>, <a href="https://publications.waset.org/abstracts/search?q=remote%20detection%20chemical%20warfare%20agents" title=" remote detection chemical warfare agents"> remote detection chemical warfare agents</a>, <a href="https://publications.waset.org/abstracts/search?q=miniaturized" title=" miniaturized"> miniaturized</a>, <a href="https://publications.waset.org/abstracts/search?q=potentiostat" title=" potentiostat"> potentiostat</a> </p> <a href="https://publications.waset.org/abstracts/145007/embedded-electrochemistry-with-miniaturized-drone-based-potentiostat-system-for-remote-detection-chemical-warfare-agents" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/145007.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">136</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">396</span> Comparison of the Seismic Response of Planar Regular and Irregular Steel Frames</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Robespierre%20Chavez">Robespierre Chavez</a>, <a href="https://publications.waset.org/abstracts/search?q=Eden%20Bojorquez"> Eden Bojorquez</a>, <a href="https://publications.waset.org/abstracts/search?q=Alfredo%20Reyes-Salazar"> Alfredo Reyes-Salazar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study compares the seismic response of regular and vertically irregular steel frames determined by nonlinear time history analysis and by using several sets of earthquake records, which are divided in two categories: The first category having 20 stiff-soil ground motion records obtained from the NGA database, and the second category having 30 soft-soil ground motions recorded in the Lake Zone of Mexico City and exhibiting a dominant period (Ts) of two seconds. The steel frames in both format regular and irregular were designed according to the Mexico City Seismic Design Provisions (MCSDP). The effects of irregularity throught the height on the maximum interstory drifts are estimated. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=irregular%20steel%20frames" title="irregular steel frames">irregular steel frames</a>, <a href="https://publications.waset.org/abstracts/search?q=maximum%20interstory%20drifts" title=" maximum interstory drifts"> maximum interstory drifts</a>, <a href="https://publications.waset.org/abstracts/search?q=seismic%20response" title=" seismic response"> seismic response</a>, <a href="https://publications.waset.org/abstracts/search?q=seismic%20records" title=" seismic records"> seismic records</a> </p> <a href="https://publications.waset.org/abstracts/42693/comparison-of-the-seismic-response-of-planar-regular-and-irregular-steel-frames" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/42693.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">327</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">395</span> Study the Dynamic Behavior of Irregular Buildings by the Analysis Method Accelerogram</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Beciri%20Mohamed%20Walid">Beciri Mohamed Walid</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Some architectural conditions required some shapes often lead to an irregular distribution of masses, rigidities and resistances. The main object of the present study consists in estimating the influence of the irregularity both in plan and in elevation which presenting some structures on the dynamic characteristics and his influence on the behavior of this structures. To do this, it is necessary to make apply both dynamic methods proposed by the RPA99 (spectral modal method and method of analysis by accelerogram) on certain similar prototypes and to analyze the parameters measuring the answer of these structures and to proceed to a comparison of the results. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=structure" title="structure">structure</a>, <a href="https://publications.waset.org/abstracts/search?q=irregular" title=" irregular"> irregular</a>, <a href="https://publications.waset.org/abstracts/search?q=code" title=" code"> code</a>, <a href="https://publications.waset.org/abstracts/search?q=seismic" title=" seismic"> seismic</a>, <a href="https://publications.waset.org/abstracts/search?q=method" title=" method"> method</a>, <a href="https://publications.waset.org/abstracts/search?q=force" title=" force"> force</a>, <a href="https://publications.waset.org/abstracts/search?q=period" title=" period"> period</a> </p> <a href="https://publications.waset.org/abstracts/15294/study-the-dynamic-behavior-of-irregular-buildings-by-the-analysis-method-accelerogram" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/15294.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">310</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">394</span> Ultra High Performance Concrete Using Special Aggregates for Irregular Structures (the New Concrete Technology)</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Arjun">Arjun</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20D.%20Singh"> A. D. Singh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Concrete the basic material using in construction across the global these days. The purpose of this special concrete is to provide extra strength and stability for irregular structure where the center of gravity is disturbed. In this paper an effort has been made to use different type of material aggregates has been discussed. We named As "STAR Aggregates" which has qualities to resist Shear, tension and compression forces. We have been divided into coarse aggregates and fine aggregates according to their sizes. Star Aggregates has interlocking behavior and cutting edge technology. Star aggregates had been draft and deign in Auto CAD and then analysis in ANSYS software. by using special aggregates we deign concrete grade of M40 for mega structures and irregular structure. This special concrete with STAR aggregates use in construction for irregular structure like Bridges, Skyscrapers or in deigned buildings. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=star%20aggregates" title="star aggregates">star aggregates</a>, <a href="https://publications.waset.org/abstracts/search?q=high%20performance%20concrete" title=" high performance concrete"> high performance concrete</a>, <a href="https://publications.waset.org/abstracts/search?q=material%20aggregates" title=" material aggregates"> material aggregates</a>, <a href="https://publications.waset.org/abstracts/search?q=interlocking" title=" interlocking"> interlocking</a> </p> <a href="https://publications.waset.org/abstracts/23263/ultra-high-performance-concrete-using-special-aggregates-for-irregular-structures-the-new-concrete-technology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23263.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">566</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">393</span> Effect of National Sovereignty of Non-Citizens Human Rights Standards: Mediterranean Irregular Immigrants Case</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Azin%20Karami">Azin Karami</a>, <a href="https://publications.waset.org/abstracts/search?q=Bahareh%20Heydari"> Bahareh Heydari</a> </p> <p class="card-text"><strong>Abstract:</strong></p> There is a difference between national sovereignty ( national security guarantee) and human rights standards (human security guarantee). Under the pretext of providing security for the majority, Governments violate human rights standards and lead to populism. This paper illustrates despite the human rights standards of non-citizens, they mostly confront different practical and social realities. (a large gap between the reality and the truth). This paper has focused on one of vulnerable irregular non-citizens immigrants from Mediterranean . In addition, it has considered challenges of the basic and primary human rights standards of this group. It shows how government policies affect the flow of irregular immigration. This paper is based upon UN data about Mediterranean immigrants and polls answered by 68 people who intended to migrate from Mediterranean (28 female and 40 male people, the average age of 30 to 40). The model is supposed to be a convenient one to present objective, real evidence of irregular immigrants and discusses the challenges that this group of immigrants confront them .This paper shows clear concept of immigrants. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=human%20rights" title="human rights">human rights</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20security" title=" human security"> human security</a>, <a href="https://publications.waset.org/abstracts/search?q=national%20sovereignty" title=" national sovereignty"> national sovereignty</a>, <a href="https://publications.waset.org/abstracts/search?q=irregular%20immigrants" title=" irregular immigrants"> irregular immigrants</a> </p> <a href="https://publications.waset.org/abstracts/92687/effect-of-national-sovereignty-of-non-citizens-human-rights-standards-mediterranean-irregular-immigrants-case" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/92687.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">182</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">392</span> Effect of Particle Shape on Monotonic and Cyclic Biaxial Behaviour of Sand Using Discrete Element Method</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Raj%20Banerjee">Raj Banerjee</a>, <a href="https://publications.waset.org/abstracts/search?q=Y.%20M.%20Parulekar"> Y. M. Parulekar</a>, <a href="https://publications.waset.org/abstracts/search?q=Aniruddha%20Sengupta"> Aniruddha Sengupta</a>, <a href="https://publications.waset.org/abstracts/search?q=J.%20Chattopadhyay"> J. Chattopadhyay</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study proposes a Discrete Element Method (DEM) simulation using a commercial software PFC 2D (2019) for quantitatively simulating the monotonic and cyclic behaviour of sand using irregular shapes of sand grains. A preliminary analysis of the number of particles for optimal Representative Element Volume (REV) simulation of dimension 35mm x 35mm x 70mm using the scaled Grain Size Distribution (GSD) of sand is carried out. Subsequently, the effect of particle shape on the performance of sand during monotonic and cyclic bi-axial tests is assessed using numerical simulation. The validation of the numerical simulation for one case is carried out using the test results from the literature. Further numerical studies are performed in which the particles in REV are simulated by mixing round discs with irregular clumps (100% round disc, 75% round disc 25% irregular clump, 50% round disc 50% irregular clump, 25% round disc 75% irregular clump, 100% irregular clump) in different proportions using Dry Deposition (DD) method. The macro response for monotonic loading shows that irregular sand has a higher strength than round particles and that the Mohr-Coulomb failure envelope depends on the shape of the grains. During cyclic loading, it is observed that the liquefaction resistance curve (Cyclic Stress Ratio (CSR)-Number of cycles (N)) of sand is dependent on the combination of particle shapes with different proportions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=biaxial%20test" title="biaxial test">biaxial test</a>, <a href="https://publications.waset.org/abstracts/search?q=particle%20shape" title=" particle shape"> particle shape</a>, <a href="https://publications.waset.org/abstracts/search?q=monotonic" title=" monotonic"> monotonic</a>, <a href="https://publications.waset.org/abstracts/search?q=cyclic" title=" cyclic"> cyclic</a> </p> <a href="https://publications.waset.org/abstracts/166777/effect-of-particle-shape-on-monotonic-and-cyclic-biaxial-behaviour-of-sand-using-discrete-element-method" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/166777.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">71</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">391</span> Understanding Tacit Knowledge and Its Role in Military Organizations: Methods of Managing Tacit Knowledge</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20Erhan%20Orhan">M. Erhan Orhan</a>, <a href="https://publications.waset.org/abstracts/search?q=Onur%20Ozdemir"> Onur Ozdemir </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Expansion of area of operation and increasing diversity of threats forced the military organizations to change in many ways. However, tacit knowledge still is the most fundamental component of organizational knowledge. Since it is human oriented and in warfare human stands at the core of the organization. Therefore, military organizations should find effective ways of systematically utilizing tacit knowledge. In this context, this article suggest some methods for turning tacit knowledge into explicit in military organizations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=tacit%20knowledge" title="tacit knowledge">tacit knowledge</a>, <a href="https://publications.waset.org/abstracts/search?q=military" title=" military"> military</a>, <a href="https://publications.waset.org/abstracts/search?q=knowledge%20management" title=" knowledge management"> knowledge management</a>, <a href="https://publications.waset.org/abstracts/search?q=warfare" title=" warfare"> warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=technology" title=" technology"> technology</a> </p> <a href="https://publications.waset.org/abstracts/24776/understanding-tacit-knowledge-and-its-role-in-military-organizations-methods-of-managing-tacit-knowledge" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/24776.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">488</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">390</span> Investigation of Changes of Physical Properties of the Poplar Wood in Radial and Longitudinal Axis at Chaaloos Zone</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Afshin%20Veisi">Afshin Veisi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this study, the physical properties of wood in poplar wood (Populous sp.) were analyzed in longitudinal and radial directions of the stem. Three Populous Alba tree were cut in chaloos zone and from each tree, 3 discs were selected at 130cm, half of tree and under of crown. The test samples from pith to bark (heartwood to sapwood) were prepared from these discs for measuring the involved properties such as, wet, dry and critical specific gravity, porosity, volume shrinkage and swelling based on the ASTM standard, and data in two radial and longitudinal directions in the trank were statistically analyzed. Such as, variations of wet, dry and critical specific gravity had in radial direction respectively: irregular increase, increase and increase, and in longitudinal direction respectively: irregular decrease, irregular increase and increase. Results of variations to moisture content and porosity show that in radial direction respectively: irregular increasing and decreasing, and in longitudinal direction from down to up respectively: irregular decreasing and stability. Volume shrinkage and swelling variations show in radial direction irregular and in longitudinal axial regular decreasing. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=poplar%20wood" title="poplar wood">poplar wood</a>, <a href="https://publications.waset.org/abstracts/search?q=physical%20properties" title=" physical properties"> physical properties</a>, <a href="https://publications.waset.org/abstracts/search?q=shrinkage" title=" shrinkage"> shrinkage</a>, <a href="https://publications.waset.org/abstracts/search?q=swelling" title=" swelling"> swelling</a>, <a href="https://publications.waset.org/abstracts/search?q=critical%20specific%20gravity" title=" critical specific gravity"> critical specific gravity</a>, <a href="https://publications.waset.org/abstracts/search?q=wet%20specific%20gravity" title=" wet specific gravity"> wet specific gravity</a>, <a href="https://publications.waset.org/abstracts/search?q=dry%20specific%20gravity" title=" dry specific gravity"> dry specific gravity</a> </p> <a href="https://publications.waset.org/abstracts/49391/investigation-of-changes-of-physical-properties-of-the-poplar-wood-in-radial-and-longitudinal-axis-at-chaaloos-zone" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/49391.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">277</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">389</span> Qualitative Review of Seismic Response of Vertically Irregular Building Frames</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abdelhammid%20Chibane">Abdelhammid Chibane</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study summarizes state-of-the-art knowledge in the seismic response of vertically irregular building frames. Criteria defining vertical irregularity as per the current building codes have been discussed. A review of studies on the seismic behaviour of vertically irregular structures along with their findings has been presented. It is observed that building codes provide criteria to classify the vertically irregular structures and suggest dynamic analysis to arrive at design lateral forces. Most of the studies agree on the increase in drift demand in the tower portion of set-back structures and on the increase in seismic demand for buildings with discontinuous distributions in mass, stiffness, and strength. The largest seismic demand is found for the combined-stiffness-and-strength irregularity. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mass%20irregularity" title="mass irregularity">mass irregularity</a>, <a href="https://publications.waset.org/abstracts/search?q=set-back%20structure" title=" set-back structure"> set-back structure</a>, <a href="https://publications.waset.org/abstracts/search?q=stiffness%20irregularity" title=" stiffness irregularity"> stiffness irregularity</a>, <a href="https://publications.waset.org/abstracts/search?q=strength%20irregularity" title=" strength irregularity"> strength irregularity</a>, <a href="https://publications.waset.org/abstracts/search?q=vertical%20irregularity" title=" vertical irregularity"> vertical irregularity</a> </p> <a href="https://publications.waset.org/abstracts/44373/qualitative-review-of-seismic-response-of-vertically-irregular-building-frames" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/44373.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">265</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">388</span> Managing Maritime Security in the Mediterranean Sea: The Roles of the EU in Tackling Irregular Migration</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shazwanis%20Shukri">Shazwanis Shukri</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Mediterranean Sea, at the crossroads of three continents has always been the focus of pan-European and worldwide attention. Over the past decade, the Mediterranean Sea has become a hotbed for irregular migration particularly from the African continent toward the Europe. Among the major transit routes in the Mediterranean Sea include the Strait of Gibraltar, Canary Island and island of Lampedusa. In recent years, Mediterranean Sea has witnessed significant numbers of accidents and shipwrecks involving the irregular migrants and refugees trying to reach Europe via the sea. The shipwrecks and traffickers exploitation of migrants draw most of the attention particularly for the European Union (EU). This incident has been a wakeup call for the EU and become the top political agenda in the EU policy to tackle irregular migration and human smuggling at sea. EU has repeatedly addressed irregular migration as one of the threats the EU and its citizens may be confronted with and therefore immediate measures are crucial to tackle the crisis. In light of this, various initiatives have been adopted by the EU to strengthen external border control and restrict access to irregular migrants, notably through the enforcement of Frontex and Eunavfor Med. This paper analyses current development of counter-migration operations by the EU in response to migration crisis in the Mediterranean Sea. The analysis is threefold. First, this study examines the patterns and trends of irregular migration’s movements from recent perspective. Second, this study concentrates on the evolution of the EU operations that are in place in the Mediterranean Sea, notably by Frontex and Eunavfor Med to curb the influx of irregular migrants to the European countries, including, among others, Greece and Italy. Third, this study investigates the EU approaches to fight against the proliferation of human trafficking networks at sea. This study is essential to determine the roles of the EU in tackling migration crisis and human trafficking in the Mediterranean Sea and the effectiveness of their counter-migration operations to reduce the number of irregular migrants travelling via the sea. Elite interviews and document analysis were used as a methodology in this study. The study discovers that the EU operations have successfully contributed to reduce the numbers of irregular migrant’s arrival to Europe. The study also shows that the operations were effective to disrupt smugglers business models particularly from Libya. This study provides essential understanding about the roles of the EU not limited to tackle the migration crisis and disrupt trafficking networks, but also pledged to prevent further loss of lives at sea. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=European%20union" title="European union">European union</a>, <a href="https://publications.waset.org/abstracts/search?q=frontex" title=" frontex"> frontex</a>, <a href="https://publications.waset.org/abstracts/search?q=irregular%20migration" title=" irregular migration"> irregular migration</a>, <a href="https://publications.waset.org/abstracts/search?q=Mediterranean%20sea" title=" Mediterranean sea"> Mediterranean sea</a> </p> <a href="https://publications.waset.org/abstracts/61911/managing-maritime-security-in-the-mediterranean-sea-the-roles-of-the-eu-in-tackling-irregular-migration" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/61911.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">328</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">387</span> Exploring Causes of Irregular Migration: Evidence from Rural Punjab, India</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kulwinder%20Singh">Kulwinder Singh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Punjab is one of the major labour exporting states of India. Every year more than 20,000 youths from Punjab attempt irregular migration. About 84 irregular migrants are from rural areas and 16 per cent from urban areas. Irregular migration could only be achieved if be organized through highly efficient international networks with the countries of origin, transit, and destination. A good number of Punjabis continue to immigrate into the UK for work through unauthorized means entering the country on visit visas and overstaying or getting ‘smuggled into’ the country with the help of transnational networks of agents. Although, the efforts are being made by the government to curb irregular migration through The Punjab Prevention of Human Smuggling Rules (2012, 2014) and Punjab Travel Regulation Act (2012), but yet it exists parallel to regular migration. Despite unprecedented miseries of irregular migrants and strict laws implemented by the state government to check this phenomenon, ‘why do Punjabis migrate abroad irregularly’ is the important question to answer. This study addresses this question through the comparison of irregular migration with regular one. In other words, this analysis reveals major causes, specifically economic ones, of irregular migration from rural Punjab. This study is unique by presenting economics of irregular migration, given previous studies emphasize the role of sociological and psychological factors. Addressing important question “why do Punjabis migrate abroad irregularly?”, the present study reveals that Punjabi, being far-sighted, endeavor irregular migration as it is, though, economically nonviable in short run, but offers lucrative economic gains as gets older. Despite its considerably higher cost viz-a-viz regular migration, it is the better employment option to irregular migrants with higher permanent income than local low paid jobs for which risking life has become the mindset of the rural Punjabis. Although, it carries considerably lower economic benefits as compared to regular migration, but provides the opportunity of migrating abroad to less educated, semi-skilled and language-test ineligible Punjabis who cannot migrate through regular channels. As its positive impacts on source and destination countries are evident, it might not be restricted, rather its effective management, through liberalising restrictive migration policies by destination nations, can protect the interests of all involved stakeholders. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cost" title="cost">cost</a>, <a href="https://publications.waset.org/abstracts/search?q=migration" title=" migration"> migration</a>, <a href="https://publications.waset.org/abstracts/search?q=income" title=" income"> income</a>, <a href="https://publications.waset.org/abstracts/search?q=irregular" title=" irregular"> irregular</a>, <a href="https://publications.waset.org/abstracts/search?q=regular" title=" regular"> regular</a>, <a href="https://publications.waset.org/abstracts/search?q=remittances" title=" remittances"> remittances</a> </p> <a href="https://publications.waset.org/abstracts/127161/exploring-causes-of-irregular-migration-evidence-from-rural-punjab-india" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/127161.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">123</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">386</span> Identification of Information War in Lithuania</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vitalijus%20Leibenka">Vitalijus Leibenka</a> </p> <p class="card-text"><strong>Abstract:</strong></p> After 2014 the world of Russia’s actions in annexing Crimea has seen a hybrid war that has helped Russia achieve its goals. The world and NATO nations have pointed out that hybrid action can help achieve not only military but also economic and political goals. One of the weapons of action in hybrid warfare is information warfare tools, the use of which helps to carry out actions in the context of hybrid warfare as a whole. In addition, information war tools can be used alone, over time and for long-term purposes. Although forms of information war, such as propaganda and disinformation, have been used in the past, in old conflicts and wars, new forms of information war have emerged as a result of technological development, making the dissemination of information faster and more efficient. The world understands that information is becoming a weapon, but not everyone understands that both information war and information warfare differ in their essence and full content. In addition, the damage and impact of the use of information war, which may have worse consequences than a brief military conflict, is underestimated. Lithuania is also facing various interpretations of the information war. Some believe that the information attack is an information war and the understanding of the information war is limited to a false message in the press. Others, however, deepen and explain the essence of the information war. Society has formed in such a way that not all people are able to assess the threats of information war, to separate information war from information attack. Recently, the Lithuanian government has been taking measures in the context of the information war, making decisions that allow the development of the activities of the state and state institutions in order to create defense mechanisms in the information war. However, this is happening rather slowly and incompletely. Every military conflict, related to Lithuania in one way or another, forces Lithuanian politicians to take up the theme of information warfare again. As a result, a national cyber security center is being set up, and Russian channels spreading lies are banned. However, there is no consistent development and continuous improvement of action against information threats. Although a sufficiently influential part of society (not a political part) helps to stop the spread of obscure information by creating social projects such as “Demaskuok” and “Laikykis ten su Andriumi tapinu”, it goes without saying that it will not become a key tool in the fight against information threats. Therefore, in order to achieve clean dissemination of information in Lithuania, full-fledged and substantial political decisions are necessary, the adoption of which would change the public perception of the information war, its damage, impact and actions that would allow to combat the spread. Political decisions should cover the educational, military, economic and political areas, which are one of the main and most important in the state, which would allow to fundamentally change the situation against the background of information war. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=information%20war" title="information war">information war</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20warfare" title=" information warfare"> information warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=hybrid%20war" title=" hybrid war"> hybrid war</a>, <a href="https://publications.waset.org/abstracts/search?q=hybrid%20warfare" title=" hybrid warfare"> hybrid warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=NATO" title=" NATO"> NATO</a>, <a href="https://publications.waset.org/abstracts/search?q=Lithuania" title=" Lithuania"> Lithuania</a>, <a href="https://publications.waset.org/abstracts/search?q=Russia" title=" Russia"> Russia</a> </p> <a href="https://publications.waset.org/abstracts/172681/identification-of-information-war-in-lithuania" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/172681.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">62</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">385</span> Model Estimation and Error Level for Okike’s Merged Irregular Transposition Cipher</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Okike%20Benjamin">Okike Benjamin</a>, <a href="https://publications.waset.org/abstracts/search?q=Garba%20E.%20J.%20D."> Garba E. J. D.</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The researcher has developed a new encryption technique known as Merged Irregular Transposition Cipher. In this cipher method of encryption, a message to be encrypted is split into parts and each part encrypted separately. Before the encrypted message is transmitted to the recipient(s), the positions of the split in the encrypted messages could be swapped to ensure more security. This work seeks to develop a model by considering the split number, S and the average number of characters per split, L as the message under consideration is split from 2 through 10. Again, after developing the model, the error level in the model would be determined. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=merged%20irregular%20transposition" title="merged irregular transposition">merged irregular transposition</a>, <a href="https://publications.waset.org/abstracts/search?q=error%20level" title=" error level"> error level</a>, <a href="https://publications.waset.org/abstracts/search?q=model%20estimation" title=" model estimation"> model estimation</a>, <a href="https://publications.waset.org/abstracts/search?q=message%20splitting" title=" message splitting"> message splitting</a> </p> <a href="https://publications.waset.org/abstracts/22331/model-estimation-and-error-level-for-okikes-merged-irregular-transposition-cipher" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/22331.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">314</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">384</span> Seismic Response of Structures of Reinforced Concrete Buildings: Regular and Irregular Configurations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abdelhammid%20Chibane">Abdelhammid Chibane</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Often, for architectural reasons or designs, several buildings have a non-uniform profile in elevation. Depending on the configuration of the construction and the arrangements structural elements, the non-uniform profile in elevation (the recess) is considered concept of a combination of non-uniform distributions of strength, stiffness, weight and geometry along the height of irregular structures. Therefore, this type of configuration can induce irregular distribution load causing a serious concentration stresses at the discontinuity. This therefore requires a serious behavioral treatment buildings in an earthquake. If appropriate measures are not taken into account, structural irregularity may become a major source of damage during earthquakesEarth. In the past, several research investigations have identified differences in dynamic response of irregular and regular porches. Among the most notable differences are the increments of displacements and ductility applications in floors located above the level of the shoulder and an increase in the contribution of the higher modes cisaillement1 efforts, ..., 10. The para -ssismiques codes recommend the methods of analysis Dynamic (or modal history) to establish the forces of calculation instead of the static method equivalent, which is basically applicable only to regular structures without major discontinuities in the mass, rigidity and strength along the height 11, 12 .To investigate the effects of irregular profiles on the structures, the main objective of this study was the assessment of the inelastic response, in terms of applications of ductility four types of non-uniform multi-stage structures subjected to relatively severe earthquakes. In the This study, only the parallel responses are analyzed setback. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=buildings" title="buildings">buildings</a>, <a href="https://publications.waset.org/abstracts/search?q=concentration%20stresses" title=" concentration stresses"> concentration stresses</a>, <a href="https://publications.waset.org/abstracts/search?q=ductility" title=" ductility"> ductility</a>, <a href="https://publications.waset.org/abstracts/search?q=ductility" title=" ductility"> ductility</a>, <a href="https://publications.waset.org/abstracts/search?q=designs" title=" designs"> designs</a>, <a href="https://publications.waset.org/abstracts/search?q=irregular%20structures" title=" irregular structures"> irregular structures</a> </p> <a href="https://publications.waset.org/abstracts/44031/seismic-response-of-structures-of-reinforced-concrete-buildings-regular-and-irregular-configurations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/44031.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">262</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=irregular%20warfare&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=irregular%20warfare&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=irregular%20warfare&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=irregular%20warfare&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=irregular%20warfare&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=irregular%20warfare&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=irregular%20warfare&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=irregular%20warfare&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=irregular%20warfare&amp;page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=irregular%20warfare&amp;page=13">13</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=irregular%20warfare&amp;page=14">14</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=irregular%20warfare&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10