CINXE.COM

Search results for: enemy aliens

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: enemy aliens</title> <meta name="description" content="Search results for: enemy aliens"> <meta name="keywords" content="enemy aliens"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="enemy aliens" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="enemy aliens"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 65</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: enemy aliens</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">65</span> Afghan Refugees as Perpetui Inimici: Revisiting an Early Modern Debate on Enemy Aliens</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Brian%20Smith">Brian Smith</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper seeks to contrast the contemporary anti-immigration rhetoric since the US pullout of Afghanistan with the debate about enemy aliens in the early modern period. In the seventeenth century, Sir Edward Coke declared that “infidels” should be seen as perpetui inimici (perpetual enemies) since their values were inimical to those of Christian states. As such, they could be perpetually excluded and denied legal standing. Even at that time, these anti-“infidel” arguments clashed with the natural law tradition of hospitality, which assumed that states had a moral responsibility to admit and care for strangers. In particular, this paper looks at the conflict between Hugo Grotius, Samuel Pufendorf, and John Locke. Grotius argues that states have a duty to admit foreigners. He goes out of his way to plan for the admittance of Jewish immigrants. In contrast, Pufendorf claimed that sovereigns had a duty exclude foreigners who would alter the constitutional character of the state. Much like Grotius, Locke argued that non-Christian peoples should be treated as friends and admitted without reservation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=enemy%20aliens" title="enemy aliens">enemy aliens</a>, <a href="https://publications.waset.org/abstracts/search?q=perpetual%20enemies" title=" perpetual enemies"> perpetual enemies</a>, <a href="https://publications.waset.org/abstracts/search?q=hospitality" title=" hospitality"> hospitality</a>, <a href="https://publications.waset.org/abstracts/search?q=refugees" title=" refugees"> refugees</a> </p> <a href="https://publications.waset.org/abstracts/156104/afghan-refugees-as-perpetui-inimici-revisiting-an-early-modern-debate-on-enemy-aliens" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/156104.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">107</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">64</span> Rapid and Long-term Alien Language Analysis - Forming Frameworks for the Interpretation of Alien Communication for More Intelligent Life</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Samiksha%20Raviraja">Samiksha Raviraja</a>, <a href="https://publications.waset.org/abstracts/search?q=Junaid%20Arif"> Junaid Arif</a> </p> <p class="card-text"><strong>Abstract:</strong></p> One of the most important abilities in species is the ability to communicate. This paper proposes steps to take when and if aliens came in contact with humans, and how humans would communicate with them. The situation would be a time-sensitive scenario, meaning that communication is at the utmost importance if such an event were to happen. First, humans would need to establish mutual peace by conveying that there is no threat to the alien race. Second, the aliens would need to acknowledge this understanding and reciprocate. This would be extremely difficult to do regardless of their intelligence level unless they are very human-like and have similarities to our way of communicating. The first step towards understanding their mind is to analyze their level of intelligence - Level 1-Low intelligence, Level 2-Human-like intelligence or Level 3-Advanced or High Intelligence. These three levels go hand in hand with the Kardashev scale. Further, the Barrow scale will also be used to categorize alien species in hopes of developing a common universal language to communicate in. This paper will delve into how the level of intelligence can be used toward achieving communication with aliens by predicting various possible scenarios and outcomes by proposing an intensive categorization system. This can be achieved by studying their Emotional and Intelligence Quotient (along with technological and scientific knowledge/intelligence). The limitations and capabilities of their intelligence must also be studied. By observing how they respond and react (expressions and senses) to different kinds of scenarios, items and people, the data will help enable good categorisation. It can be hypothesised that the more human-like aliens are or can relate to humans, the more likely it is that communication is possible. Depending on the situation, either human can teach aliens a human language, or humans can learn an alien language, or both races work together to develop a mutual understanding or mode of communication. There are three possible ways of contact. Aliens visit Earth, or humans discover aliens while on space exploration or through technology in the form of signals. A much rarer case would be humans and aliens running into each other during a space expedition of their own. The first two possibilities allow a more in-depth analysis of the alien life and enhanced results compared. The importance of finding a method of talking with aliens is important in order to not only protect Earth and humans but rather for the advancement of Science through the shared knowledge between the two species. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=intelligence" title="intelligence">intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=Kardashev%20scale" title=" Kardashev scale"> Kardashev scale</a>, <a href="https://publications.waset.org/abstracts/search?q=Barrow%20scale" title=" Barrow scale"> Barrow scale</a>, <a href="https://publications.waset.org/abstracts/search?q=alien%20civilizations" title=" alien civilizations"> alien civilizations</a>, <a href="https://publications.waset.org/abstracts/search?q=emotional%20and%20intelligence%20quotient" title=" emotional and intelligence quotient"> emotional and intelligence quotient</a> </p> <a href="https://publications.waset.org/abstracts/161879/rapid-and-long-term-alien-language-analysis-forming-frameworks-for-the-interpretation-of-alien-communication-for-more-intelligent-life" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/161879.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">72</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">63</span> “Self” and “The Other” in Dunkirk (2017)</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ebtesam%20Dessouki">Ebtesam Dessouki</a>, <a href="https://publications.waset.org/abstracts/search?q=Yasaman%20Mousavi"> Yasaman Mousavi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Christopher Nolan’s Dunkirk (2017) is not a conventional war film. He invites the audience to see the war from within, from the characters’ experiences, through suspense and fear, with the help of talented sound designers and musicians such as Hans Zimmer for an extra dimension creating those feelings. This experience of being among the surviving soldiers makes room for an interpretation of this film using the concept of the Self and the Other. The Self is the soldiers and the audience who try to make sense of their reality given limited information about the enemy and their situation, and the Other is the faceless enemy. However, this film can be taken under an even more detailed analysis theorizing that the Other also exists on different occasions in the film. Overall, Nolan leaves a lot of cues for the audience to track the Other and sometimes breaks the rules for the Other. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=film" title="film">film</a>, <a href="https://publications.waset.org/abstracts/search?q=Dunkirk" title=" Dunkirk"> Dunkirk</a>, <a href="https://publications.waset.org/abstracts/search?q=other" title=" other"> other</a>, <a href="https://publications.waset.org/abstracts/search?q=self" title=" self"> self</a> </p> <a href="https://publications.waset.org/abstracts/166703/self-and-the-other-in-dunkirk-2017" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/166703.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">72</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">62</span> Naturalization of Aliens in Consideration of Turkish Constitutional Law: Recent Governmental Practices</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zeynep%20Ozkan">Zeynep Ozkan</a>, <a href="https://publications.waset.org/abstracts/search?q=Cigdem%20Serra%20Uzunpinar"> Cigdem Serra Uzunpinar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Citizenship is a legal bond that binds a person to a certain state. How constitutions define ‘the citizen’ and how they regulate the elements of citizenship have great importance in terms of individuals’ duties before the state as well as the rights they own. Especially in multi-segmented societies that contain foreign elements, it becomes necessary to examinate the institution of naturalization in terms of individuals’ duty of constitutional citizenship. The meaning of citizenship in Turkey has transformed due to the changes in practices of naturalization, in parallel to receiving huge amount of immagrants with the recent Syrian Crisis, the change in the governmental system and facing economic crisis. This transformation took place in the way of a diversion from the states’ initial motive of building the bond of citizenship with the aim of founding/sustaining political unity. Hence, rising of the economic and political motives in naturalization practices are in question, instead of objective and subjective criterias, that are traditionally used on defining the notion of nation. In this study, firstly the regime of citizenship and the legal regime of aliens in Turkish legislation will be given place. Then, the transformation, that the notion of constitutional citizenship underwent, will be studied, especially on the basis of governmental practices of naturalization. The assessment will be made in the context of legal institutions brought with the new governmental system as a result of recent constitutional amendment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=constitutional%20citizenship" title="constitutional citizenship">constitutional citizenship</a>, <a href="https://publications.waset.org/abstracts/search?q=naturalization" title=" naturalization"> naturalization</a>, <a href="https://publications.waset.org/abstracts/search?q=naturalization%20practices%20in%20Turkish%20legal%20system" title=" naturalization practices in Turkish legal system"> naturalization practices in Turkish legal system</a>, <a href="https://publications.waset.org/abstracts/search?q=transformation%20of%20the%20notion%20of%20constitutional%20citizenship" title=" transformation of the notion of constitutional citizenship"> transformation of the notion of constitutional citizenship</a> </p> <a href="https://publications.waset.org/abstracts/107227/naturalization-of-aliens-in-consideration-of-turkish-constitutional-law-recent-governmental-practices" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/107227.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">118</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">61</span> Double Layer Security Model for Identification Friend or Foe</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Buse%20T.%20Ayd%C4%B1n">Buse T. Aydın</a>, <a href="https://publications.waset.org/abstracts/search?q=Enver%20Ozdemir"> Enver Ozdemir</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this study, a double layer authentication scheme between the aircraft and the Air Traffic Control (ATC) tower is designed to prevent any unauthorized aircraft from introducing themselves as friends. The method is a combination of classical cryptographic methods and new generation physical layers. The first layer has employed the embedded key of the aircraft. The embedded key is assumed to installed during the construction of the utility. The other layer is a physical attribute (flight path, distance, etc.) between the aircraft and the ATC tower. We create a mathematical model so that two layers’ information is employed and an aircraft is authenticated as a friend or foe according to the accuracy of the results of the model. The results of the aircraft are compared with the results of the ATC tower and if the values found by the aircraft and ATC tower match within a certain error margin, we mark the aircraft as a friend. In this method, even if embedded key is captured by the enemy aircraft, without the information of the second layer, the enemy can easily be determined. Overall, in this work, we present a more reliable system by adding a physical layer in the authentication process. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ADS-B" title="ADS-B">ADS-B</a>, <a href="https://publications.waset.org/abstracts/search?q=communication%20with%20physical%20layer%20security" title=" communication with physical layer security"> communication with physical layer security</a>, <a href="https://publications.waset.org/abstracts/search?q=cryptography" title=" cryptography"> cryptography</a>, <a href="https://publications.waset.org/abstracts/search?q=identification%20friend%20or%20foe" title=" identification friend or foe"> identification friend or foe</a> </p> <a href="https://publications.waset.org/abstracts/105521/double-layer-security-model-for-identification-friend-or-foe" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/105521.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">161</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">60</span> Curriculum-Based Multi-Agent Reinforcement Learning for Robotic Navigation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hyeongbok%20Kim">Hyeongbok Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Lingling%20Zhao"> Lingling Zhao</a>, <a href="https://publications.waset.org/abstracts/search?q=Xiaohong%20Su"> Xiaohong Su</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Deep reinforcement learning has been applied to address various problems in robotics, such as autonomous driving and unmanned aerial vehicle. However, because of the sparse reward penalty for a collision with obstacles during the navigation mission, the agent fails to learn the optimal policy or requires a long time for convergence. Therefore, using obstacles and enemy agents, in this paper, we present a curriculum-based boost learning method to effectively train compound skills during multi-agent reinforcement learning. First, to enable the agents to solve challenging tasks, we gradually increased learning difficulties by adjusting reward shaping instead of constructing different learning environments. Then, in a benchmark environment with static obstacles and moving enemy agents, the experimental results showed that the proposed curriculum learning strategy enhanced cooperative navigation and compound collision avoidance skills in uncertain environments while improving learning efficiency. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=curriculum%20learning" title="curriculum learning">curriculum learning</a>, <a href="https://publications.waset.org/abstracts/search?q=hard%20exploration" title=" hard exploration"> hard exploration</a>, <a href="https://publications.waset.org/abstracts/search?q=multi-agent%20reinforcement%20learning" title=" multi-agent reinforcement learning"> multi-agent reinforcement learning</a>, <a href="https://publications.waset.org/abstracts/search?q=robotic%20navigation" title=" robotic navigation"> robotic navigation</a>, <a href="https://publications.waset.org/abstracts/search?q=sparse%20reward" title=" sparse reward"> sparse reward</a> </p> <a href="https://publications.waset.org/abstracts/162478/curriculum-based-multi-agent-reinforcement-learning-for-robotic-navigation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/162478.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">92</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">59</span> Low Probability of Intercept (LPI) Signal Detection and Analysis Using Choi-Williams Distribution</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=V.%20S.%20S.%20Kumar">V. S. S. Kumar</a>, <a href="https://publications.waset.org/abstracts/search?q=V.%20Ramya"> V. Ramya</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the modern electronic warfare, the signal scenario is changing at a rapid pace with the introduction of Low Probability of Intercept (LPI) radars. In the modern battlefield, radar system faces serious threats from passive intercept receivers such as Electronic Attack (EA) and Anti-Radiation Missiles (ARMs). To perform necessary target detection and tracking and simultaneously hide themselves from enemy attack, radar systems should be LPI. These LPI radars use a variety of complex signal modulation schemes together with pulse compression with the aid of advancement in signal processing capabilities of the radar such that the radar performs target detection and tracking while simultaneously hiding enemy from attack such as EA etc., thus posing a major challenge to the ES/ELINT receivers. Today an increasing number of LPI radars are being introduced into the modern platforms and weapon systems so these LPI radars created a requirement for the armed forces to develop new techniques, strategies and equipment to counter them. This paper presents various modulation techniques used in generation of LPI signals and development of Time Frequency Algorithms to analyse those signals. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anti-radiation%20missiles" title="anti-radiation missiles">anti-radiation missiles</a>, <a href="https://publications.waset.org/abstracts/search?q=cross%20terms" title=" cross terms"> cross terms</a>, <a href="https://publications.waset.org/abstracts/search?q=electronic%20attack" title=" electronic attack"> electronic attack</a>, <a href="https://publications.waset.org/abstracts/search?q=electronic%20intelligence" title=" electronic intelligence"> electronic intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=electronic%20warfare" title=" electronic warfare"> electronic warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=intercept%20receiver" title=" intercept receiver"> intercept receiver</a>, <a href="https://publications.waset.org/abstracts/search?q=low%20probability%20of%20intercept" title=" low probability of intercept"> low probability of intercept</a> </p> <a href="https://publications.waset.org/abstracts/4226/low-probability-of-intercept-lpi-signal-detection-and-analysis-using-choi-williams-distribution" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/4226.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">471</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">58</span> A Comparative Human Rights Analysis of Expulsion as a Counterterrorism Instrument: An Evaluation of Belgium</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Louise%20Reyntjens">Louise Reyntjens</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Where criminal law used to be the traditional response to cope with the terrorist threat, European governments are increasingly relying on administrative paths. The reliance on immigration law fits into this trend. Terrorism is seen as a civilization menace emanating from abroad. In this context, the expulsion of dangerous aliens, immigration law’s core task, is put forward as a key security tool. Governments all over Europe are focusing on removing dangerous individuals from their territory rather than bringing them to justice. This research reflects on the consequences for the expelled individuals’ fundamental rights. For this, the author selected four European countries for a comparative study: Belgium, France, the United Kingdom and Sweden. All these countries face similar social and security issues, igniting the recourse to immigration law as a counterterrorism tool. Yet, they adopt a very different approach on this: the United Kingdom positions itself on the repressive side of the spectrum. Sweden on the other hand, also 'securitized' its immigration policy after the recent terrorist hit in Stockholm, but remains on the tolerant side of the spectrum. Belgium and France are situated in between. This paper addresses the situation in Belgium. In 2017, the Belgian parliament introduced several legislative changes by which it considerably expanded and facilitated the possibility to expel unwanted aliens. First, the expulsion measure was subjected to new and questionably definitions: a serious attack on the nation’s safety used to be required to expel certain categories of aliens. Presently, mere suspicions suffice to fulfil the new definition of a 'serious threat to national security'. A definition which fails to respond to the principle of legality; the law, nor the prepatory works clarify what is meant by 'a threat to national security'. This creates the risk of submitting this concept’s interpretation almost entirely to the discretion of the immigration authorities. Secondly, in name of intervening more quickly and efficiently, the automatic suspensive appeal for expulsions was abolished. The European Court of Human Rights nonetheless requires such an automatic suspensive appeal under Article 13 and 3 of the Convention. Whether this procedural reform will stand to endure, is thus questionable. This contribution also raises questions regarding expulsion’s efficacy as a key security tool. In a globalized and mobilized world, particularly in a European Union with no internal boundaries, questions can be raised about the usefulness of this measure. Even more so, by simply expelling a dangerous individual, States avoid their responsibility and shift the risk to another State. Criminal law might in these instances be more capable of providing a conclusive and long term response. This contribution explores the human rights consequences of expulsion as a security tool in Belgium. It also offers a critical view on its efficacy for protecting national security. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Belgium" title="Belgium">Belgium</a>, <a href="https://publications.waset.org/abstracts/search?q=counter-terrorism%20and%20human%20rights" title=" counter-terrorism and human rights"> counter-terrorism and human rights</a>, <a href="https://publications.waset.org/abstracts/search?q=expulsion" title=" expulsion"> expulsion</a>, <a href="https://publications.waset.org/abstracts/search?q=immigration%20law" title=" immigration law"> immigration law</a> </p> <a href="https://publications.waset.org/abstracts/99012/a-comparative-human-rights-analysis-of-expulsion-as-a-counterterrorism-instrument-an-evaluation-of-belgium" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/99012.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">127</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">57</span> Cannabidiol (CBD) Resistant Salmonella Strains Are Susceptible to Epsilon 34 Phage Tailspike Protein</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ibrahim%20Iddrisu">Ibrahim Iddrisu</a>, <a href="https://publications.waset.org/abstracts/search?q=Joseph%20Ayariga"> Joseph Ayariga</a>, <a href="https://publications.waset.org/abstracts/search?q=Junhuan%20Xu"> Junhuan Xu</a>, <a href="https://publications.waset.org/abstracts/search?q=Ayomide%20Adebanjo"> Ayomide Adebanjo</a>, <a href="https://publications.waset.org/abstracts/search?q=Boakai%20K.%20Robertson"> Boakai K. Robertson</a>, <a href="https://publications.waset.org/abstracts/search?q=Michelle%20Samuel-Foo"> Michelle Samuel-Foo</a>, <a href="https://publications.waset.org/abstracts/search?q=Olufemi%20Ajayi"> Olufemi Ajayi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The rise of antimicrobial resistance is a global public health crisis that threatens the effective control and prevention of infections. Due to the emergence of pan drug-resistant bacteria, most antibiotics have lost their efficacy. Bacteriophages or their components are known to target bacterial cell walls, cell membranes, and lipopolysaccharides (LPS) and hydrolyze them. Bacteriophages, being the natural predators of pathogenic bacteria, are inevitably categorized as ‘human friends’, thus fulfilling the adage that ‘the enemy of my enemy is my friend’. Leveraging on their lethal capabilities against pathogenic bacteria, researchers are searching for more ways to overcome the current antibiotic resistance challenge. In this study, we expressed and purified epsilon 34 phage tail spike protein (E34 TSP) from the E34 TSP gene, then assessed the ability of this bacteriophage protein in the killing of two CBD-resistant strains of Salmonella spp. We also assessed the ability of the tail spike protein to cause bacteria membrane disruption and dehydrogenase depletion. We observed that the combined treatment of CBD-resistant strains of Salmonella with CBD and E34 TSP showed poor killing ability, whereas the mono treatment with E34 TSP showed considerably higher killing efficiency. This study demonstrates that the inhibition of the bacteria by E34 TSP was due in part to membrane disruption and dehydrogenase inactivation by the protein. The results of this work provide an interesting background to highlight the crucial role phage proteins such as E34 TSP could play in pathogenic bacterial control. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cannabidiol" title="cannabidiol">cannabidiol</a>, <a href="https://publications.waset.org/abstracts/search?q=resistance" title=" resistance"> resistance</a>, <a href="https://publications.waset.org/abstracts/search?q=Salmonella" title=" Salmonella"> Salmonella</a>, <a href="https://publications.waset.org/abstracts/search?q=antimicrobials" title=" antimicrobials"> antimicrobials</a>, <a href="https://publications.waset.org/abstracts/search?q=phages" title=" phages"> phages</a> </p> <a href="https://publications.waset.org/abstracts/182735/cannabidiol-cbd-resistant-salmonella-strains-are-susceptible-to-epsilon-34-phage-tailspike-protein" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/182735.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">69</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">56</span> The Effects of the “War on Drugs” on Black and Latino Youth</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aniya%20Everette">Aniya Everette</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In June of 1971, President Richard Nixon made his first public declaration regarding the “War on Drugs,” deeming it America’s number one public enemy. Since then, the drug war has been a divisive topic in the US. Black and brown children have been unfairly targeted and imprisoned at alarming rates as a result of this policy, which has had a negative effect on them. Black and Latino youth have faced significant obstacles that have impacted their educational opportunities, employment prospects, and general quality of life due to harsh mandatory sentences, aggressive policing tactics, and racial profiling. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=war" title="war">war</a>, <a href="https://publications.waset.org/abstracts/search?q=drugs" title=" drugs"> drugs</a>, <a href="https://publications.waset.org/abstracts/search?q=crime" title=" crime"> crime</a>, <a href="https://publications.waset.org/abstracts/search?q=racial%20profiling" title=" racial profiling"> racial profiling</a> </p> <a href="https://publications.waset.org/abstracts/166787/the-effects-of-the-war-on-drugs-on-black-and-latino-youth" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/166787.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">82</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">55</span> Defining the Term of Strategy within Military Point of View</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ismail%20Menderes%20Sema">Ismail Menderes Sema</a>, <a href="https://publications.waset.org/abstracts/search?q=Murat%20S%C3%B6zen"> Murat Sözen</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20K.%20Bar%C4%B1%C5%9F"> M. K. Barış </a> </p> <p class="card-text"><strong>Abstract:</strong></p> The strategy is about winning or preventing your enemy from winning. The origin of the term comes from the military. After utilizing the strategy for limited military purposes in early ages, soldiers and statesmen used the term together to achieve the goals of states. In ancient times, those people who made strategy and implemented it was the same. With the industrial revolution, the strategy changed like everything and the term “grand strategy” came forward. Today, from business to economy, management to philosophy there is a broad using of the term strategy. Economic strategy, business strategy, trade strategy, irrigation strategy, and even recruitment strategy are used by professionals. The purpose of this study is to analyze the evolution of the strategy and clarify actually what is about. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=strategy" title="strategy">strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=military" title=" military"> military</a>, <a href="https://publications.waset.org/abstracts/search?q=art" title=" art"> art</a>, <a href="https://publications.waset.org/abstracts/search?q=grand%20strategy" title=" grand strategy"> grand strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=strategist" title=" strategist"> strategist</a> </p> <a href="https://publications.waset.org/abstracts/31137/defining-the-term-of-strategy-within-military-point-of-view" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31137.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">454</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">54</span> Aliens in Space: Reflections on an Applied Theatre Project in a Medium Secure Hospital</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ashley%20Barnes">Ashley Barnes</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper will consider the ways in which varied notions of Space played a central role in a 12-week drama project with patients in a Medium Secure Hospital in the UK. In the project, the patients devised and performed a series of sketches, inspired by Science Fiction films, which echoed their own experience of alienation. During the project, the familiar and rigorously regulated Activity Room became a site of imagination, adventure and laughter; transforming the atmosphere of the hospital and allowing the patients to be transported to another space entirely. A space that was as much in their heads as in the physical domain. It will be argued that, although work created in an institution such as a Medium Secure Hospital is infused with hegemonic associations and meanings, the starting point for such work should be to seek an empty space in which the participants can allow their imaginations to be released. This work sits within a range of contexts and will be consciously interdisciplinary. It will draw from Human Geography and Criminology, as well as Performance and Applied Theatre Literature. It is hoped that this paper will build upon the literature that relates to the very particular environment of Secure Hospitals and to provide a starting point for further practical exploration. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=criminal%20justice" title="criminal justice">criminal justice</a>, <a href="https://publications.waset.org/abstracts/search?q=mental%20health" title=" mental health"> mental health</a>, <a href="https://publications.waset.org/abstracts/search?q=science%20fiction%20films" title=" science fiction films"> science fiction films</a>, <a href="https://publications.waset.org/abstracts/search?q=space%20and%20place" title=" space and place"> space and place</a> </p> <a href="https://publications.waset.org/abstracts/69885/aliens-in-space-reflections-on-an-applied-theatre-project-in-a-medium-secure-hospital" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/69885.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">222</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">53</span> Analyzing and Determining the Ideal Response Force for Combatting Terrorist Groups</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Erhan%20Turgut">Erhan Turgut</a>, <a href="https://publications.waset.org/abstracts/search?q=Salih%20Erg%C3%BCn"> Salih Ergün</a>, <a href="https://publications.waset.org/abstracts/search?q=Abd%C3%BClkadir%20%C3%96z"> Abdülkadir Öz</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Terror is a modern war strategy which uses violence as a means of communication in order to achieve political objectives. In today’s security environment narrowing the propaganda field of terrorist organization is the primary goal for the security forces. In this sense, providing and maintaining public support is the most necessary ability for security units. Rather than enemy and threat-oriented approach, homeland security oriented approach is essential to ensure public support. In this study, terror assumed as a homeland security issue and assigning the law enforcement forces with military status is analyzed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=terrorism" title="terrorism">terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=counter-terrorism" title=" counter-terrorism"> counter-terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=military%20status%20law-enforcement" title=" military status law-enforcement"> military status law-enforcement</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorist%20groups" title=" terrorist groups"> terrorist groups</a> </p> <a href="https://publications.waset.org/abstracts/2383/analyzing-and-determining-the-ideal-response-force-for-combatting-terrorist-groups" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/2383.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">461</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">52</span> The Role of Internal and External Control in the Migrant Related Representations of Right-Wing Extremists</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gabriella%20Kengyel">Gabriella Kengyel</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study aims to describe the differences between the attitudes of the right-wing extremists with internal or external control towards migrants. They both have a significantly higher score on Rotter's Locus of Control Scale, and they are quite xenophobic (54%) according to Bogardus Social Distance Scale. Present research suggests their motives are different. Principle components analysis shows that extremists with internal control reject migrants because of welfare chauvinism and they think that there is some kind of political conspirationism behind the European Refugee Crisis. Contrarily extremist with external control believe in a common enemy and they are significantly more ethnocentric and less skeptical in politics. Results suggest that extremist with internal control shows hostility toward minorities and migrants mainly because of their own reference group. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=control" title="control">control</a>, <a href="https://publications.waset.org/abstracts/search?q=extremist" title=" extremist"> extremist</a>, <a href="https://publications.waset.org/abstracts/search?q=migrant" title=" migrant"> migrant</a>, <a href="https://publications.waset.org/abstracts/search?q=right-wing" title=" right-wing"> right-wing</a> </p> <a href="https://publications.waset.org/abstracts/41807/the-role-of-internal-and-external-control-in-the-migrant-related-representations-of-right-wing-extremists" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/41807.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">278</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">51</span> The Hitchhiker’s Guide to the Galaxy: The Challenges of Translating Science Fiction</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Esteban%20Tremoco">Esteban Tremoco</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This article aims to highlight some specificities of translating Science Fiction (SF literature) and, more particularly, its comic subgenre. Translating SF presupposes the translation of neologisms and gadget names of all kinds, while the translation of humor sometimes implies a need for the translator to slightly modify certain scenes or situations. In the French translation of Douglas Adams' Hitchhiker's Guide to the Galaxy by Jean Bonnefoy (Guide du routard galactique, 1982), the humorous dimension of the book is enhanced through certain choices made by the translator. One of the striking aspects of this translation is that almost all of the characters’ names have been translated, which is not the case in the German, Italian, Spanish and Portuguese translations. While there may be translations of characters’ names outside of the SF literature, there is no denying that by translating them, Jean Bonnefoy added a humorous layer to Adams' work. This work belongs to science fiction literature thanks to gadgets resulting from futuristic technological innovations, but also the presence of space travel, extra-terrestrials and mysterious worlds, which are central elements in SF. These names of planets, aliens, and other gadgets have also been translated, adapted, or at least reinvented, by Jean Bonnefoy in order to amuse the French-speaking readership. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=translation" title="translation">translation</a>, <a href="https://publications.waset.org/abstracts/search?q=translation%20studies" title=" translation studies"> translation studies</a>, <a href="https://publications.waset.org/abstracts/search?q=humour" title=" humour"> humour</a>, <a href="https://publications.waset.org/abstracts/search?q=science%20fiction" title=" science fiction"> science fiction</a> </p> <a href="https://publications.waset.org/abstracts/167393/the-hitchhikers-guide-to-the-galaxy-the-challenges-of-translating-science-fiction" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/167393.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">82</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">50</span> Deployment of Attack Helicopters in Conventional Warfare: The Gulf War</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mehmet%20Karabekir">Mehmet Karabekir</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Attack helicopters (AHs) are usually deployed in conventional warfare to destroy armored and mechanized forces of enemy. In addition, AHs are able to perform various tasks in the deep, and close operations – intelligence, surveillance, reconnaissance, air assault operations, and search and rescue operations. Apache helicopters were properly employed in the Gulf Wars and contributed the success of campaign by destroying a large number of armored and mechanized vehicles of Iraq Army. The purpose of this article is to discuss the deployment of AHs in conventional warfare in the light of Gulf Wars. First, the employment of AHs in deep and close operations will be addressed regarding the doctrine. Second, the US armed forces AH-64 doctrinal and tactical usage will be argued in the 1st and 2nd Gulf Wars. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=attack%20helicopter" title="attack helicopter">attack helicopter</a>, <a href="https://publications.waset.org/abstracts/search?q=conventional%20warfare" title=" conventional warfare"> conventional warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=gulf%20wars" title=" gulf wars"> gulf wars</a> </p> <a href="https://publications.waset.org/abstracts/29944/deployment-of-attack-helicopters-in-conventional-warfare-the-gulf-war" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29944.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">473</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">49</span> The Research of the Game Interface Improvement Due to the Game Operation Dilemma of Player in the Side-Scrolling Shooting Game</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shih-Chieh%20Liao">Shih-Chieh Liao</a>, <a href="https://publications.waset.org/abstracts/search?q=Cheng-Yan%20Shuai"> Cheng-Yan Shuai</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The feature of a side-scrolling shooting game is facing the surrounding enemy and barraging in entire screen. The player will be in trouble when they are trying to do complicated operations because of the physical and system limitations of the joystick in the games. This study designed the prototype of a new type of arcade stick by focus group and assessed by the expert. By filtering the most representative, and build up the control system for the arcade stick, and testing time and bullets consumed in two experiments, try to prove it works in the game. Finally, the prototype of L-1 solves the dilemma of scroll shooting games when the player uses the arcade stick and improves the function of the arcade stick. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=arcade%20stick" title="arcade stick">arcade stick</a>, <a href="https://publications.waset.org/abstracts/search?q=joystick" title=" joystick"> joystick</a>, <a href="https://publications.waset.org/abstracts/search?q=user%20interface" title=" user interface"> user interface</a>, <a href="https://publications.waset.org/abstracts/search?q=2D%20STG" title=" 2D STG"> 2D STG</a> </p> <a href="https://publications.waset.org/abstracts/156576/the-research-of-the-game-interface-improvement-due-to-the-game-operation-dilemma-of-player-in-the-side-scrolling-shooting-game" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/156576.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">80</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">48</span> Effect of Xylophagous On The Productivity Of The Trees Of The Fruit-bearing Pistachio Tree In Algeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chebouti-meziou%20Nadjiba1">Chebouti-meziou Nadjiba1</a>, <a href="https://publications.waset.org/abstracts/search?q=And%20Chebouti%20Yahia2%3A"> And Chebouti Yahia2:</a> </p> <p class="card-text"><strong>Abstract:</strong></p> the cultivation of Pistachios Pistacia vera of rare plants in Algeria and this point to see the lack of knowledge of techniques, which resulted in the proliferation of the tree to obtain a limited benefit does not exceed 0.75 tons / hectare, in addition to the enemy that lead to poor product on the one hand, one of which buds into wood and fruit Chaetoptelius vestitus. Since the tree is the raw sound production, while 25 kg of infected tree produces about 15 kg of any shortage of fact that this insect Chaetoptelius vestitus spend the amount of trouble going in the summer the young twigs of the trees into a sound the product by20% and due to the composition by the problem of spending in the newly formed branches, which lead to this loss in yield <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=chaetoptelius%20vestitus" title="chaetoptelius vestitus">chaetoptelius vestitus</a>, <a href="https://publications.waset.org/abstracts/search?q=pistacia%20vera" title=" pistacia vera"> pistacia vera</a>, <a href="https://publications.waset.org/abstracts/search?q=spending" title=" spending"> spending</a>, <a href="https://publications.waset.org/abstracts/search?q=return" title=" return"> return</a>, <a href="https://publications.waset.org/abstracts/search?q=poor%20product." title=" poor product."> poor product.</a> </p> <a href="https://publications.waset.org/abstracts/168081/effect-of-xylophagous-on-the-productivity-of-the-trees-of-the-fruit-bearing-pistachio-tree-in-algeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168081.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">69</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">47</span> Geovisualisation for Defense Based on a Deep Learning Monocular Depth Reconstruction Approach</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Daniel%20R.%20dos%20Santos">Daniel R. dos Santos</a>, <a href="https://publications.waset.org/abstracts/search?q=Mateus%20S.%20Maldonado"> Mateus S. Maldonado</a>, <a href="https://publications.waset.org/abstracts/search?q=Estev%C3%A3o%20J.%20R.%20Batista"> Estevão J. R. Batista</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The military commanders increasingly dependent on spatial awareness, as knowing where enemy are, understanding how war battle scenarios change over time, and visualizing these trends in ways that offer insights for decision-making. Thanks to advancements in geospatial technologies and artificial intelligence algorithms, the commanders are now able to modernize military operations on a universal scale. Thus, geovisualisation has become an essential asset in the defense sector. It has become indispensable for better decisionmaking in dynamic/temporal scenarios, operation planning and management for the war field, situational awareness, effective planning, monitoring, and others. For example, a 3D visualization of war field data contributes to intelligence analysis, evaluation of postmission outcomes, and creation of predictive models to enhance decision-making and strategic planning capabilities. However, old-school visualization methods are slow, expensive, and unscalable. Despite modern technologies in generating 3D point clouds, such as LIDAR and stereo sensors, monocular depth values based on deep learning can offer a faster and more detailed view of the environment, transforming single images into visual information for valuable insights. We propose a dedicated monocular depth reconstruction approach via deep learning techniques for 3D geovisualisation of satellite images. It introduces scalability in terrain reconstruction and data visualization. First, a dataset with more than 7,000 satellite images and associated digital elevation model (DEM) is created. It is based on high resolution optical and radar imageries collected from Planet and Copernicus, on which we fuse highresolution topographic data obtained using technologies such as LiDAR and the associated geographic coordinates. Second, we developed an imagery-DEM fusion strategy that combine feature maps from two encoder-decoder networks. One network is trained with radar and optical bands, while the other is trained with DEM features to compute dense 3D depth. Finally, we constructed a benchmark with sparse depth annotations to facilitate future research. To demonstrate the proposed method's versatility, we evaluated its performance on no annotated satellite images and implemented an enclosed environment useful for Geovisualisation applications. The algorithms were developed in Python 3.0, employing open-source computing libraries, i.e., Open3D, TensorFlow, and Pythorch3D. The proposed method provides fast and accurate decision-making with GIS for localization of troops, position of the enemy, terrain and climate conditions. This analysis enhances situational consciousness, enabling commanders to fine-tune the strategies and distribute the resources proficiently. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=depth" title="depth">depth</a>, <a href="https://publications.waset.org/abstracts/search?q=deep%20learning" title=" deep learning"> deep learning</a>, <a href="https://publications.waset.org/abstracts/search?q=geovisualisation" title=" geovisualisation"> geovisualisation</a>, <a href="https://publications.waset.org/abstracts/search?q=satellite%20images" title=" satellite images"> satellite images</a> </p> <a href="https://publications.waset.org/abstracts/194582/geovisualisation-for-defense-based-on-a-deep-learning-monocular-depth-reconstruction-approach" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/194582.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">8</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">46</span> Information Society-Education Space</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Monica%20Lia">Monica Lia</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper has set the objective of researching how education is influenced by the information society. The first step was to define more precisely the information space. Second step was to identify how information space intersects the family space and institutional space educational levels represented by pre-school / school and pre-university (kindergarten, at elementary / middle school / high school). Interrelationship between the above-mentioned areas was another objective of the research. All these elements have been investigated through the original intention to identify how the information space can become an educational tool to support for the family space, education and institutional space. In addition, the aim of this research is to offer some solutions in this regard. Often the educational efforts appear to be blocked by the existence of this space. However, this paper demonstrates that Informational space can be an enemy of the educational system or be support systems if we know the internal structure and mechanisms. We can make the Informational Space to work for accomplish the educational objectives. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=informational%20space" title="informational space">informational space</a>, <a href="https://publications.waset.org/abstracts/search?q=education" title=" education"> education</a>, <a href="https://publications.waset.org/abstracts/search?q=educational%20tool" title=" educational tool"> educational tool</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20diagram" title=" social diagram"> social diagram</a>, <a href="https://publications.waset.org/abstracts/search?q=information" title=" information"> information</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20structure" title=" information structure"> information structure</a>, <a href="https://publications.waset.org/abstracts/search?q=lessons" title=" lessons "> lessons </a> </p> <a href="https://publications.waset.org/abstracts/39912/information-society-education-space" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/39912.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">334</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">45</span> Deradicalization for Former Terrorists through Entrepreneurship Program</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jamal%20Wiwoho">Jamal Wiwoho</a>, <a href="https://publications.waset.org/abstracts/search?q=Pujiyono"> Pujiyono</a>, <a href="https://publications.waset.org/abstracts/search?q=Triyanto"> Triyanto</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Terrorism is a real enemy for all countries, including Indonesia. Bomb attacks in some parts of Indonesia are proof that Indonesia has serious problems with terrorism. Perpetrators of terror are arrested and imprisoned, and some of them were executed. However, this method did not succeed in stopping the terrorist attacks. Former terrorists continue to carry out bomb attacks. Therefore, this paper proposes a program towards deradicalization efforts of former terrorists through entrepreneurship. This is necessary because it is impossible to change their radical ideology. The program is also motivated by understanding that terrorists generally come from poor families. This program aims to occupy their time with business activities so there is no time to plan and carry out bomb attacks. This research is an empirical law study. Data were collected by literature study, observation, and in-depth interviews. Data were analyzed with the Miles and Huberman interactive model. The results show that the entrepreneurship program is effective to prevent terrorist attack. Former terrorists are busy with their business. Therefore, they have no time to carry out bomb attacks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=deradicalization" title="deradicalization">deradicalization</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorism" title=" terrorism"> terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorists" title=" terrorists"> terrorists</a>, <a href="https://publications.waset.org/abstracts/search?q=entrepreneurship" title=" entrepreneurship"> entrepreneurship</a> </p> <a href="https://publications.waset.org/abstracts/83652/deradicalization-for-former-terrorists-through-entrepreneurship-program" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/83652.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">269</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">44</span> The Impact of CO2 on Learning and Memory Duration of Bombus terrestris</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gholizadeh%20F.%20F.">Gholizadeh F. F.</a>, <a href="https://publications.waset.org/abstracts/search?q=Goldansaz%20S.%20H."> Goldansaz S. H.</a>, <a href="https://publications.waset.org/abstracts/search?q=Bandani%20A.%20R."> Bandani A. R.</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Ashouri"> A. Ashouri</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study aimed to investigate the direct effects of increasing carbon dioxide (CO₂) concentration on the behavior of Bombus terrestris bumblebees in laboratory conditions to understand the outcomes of the augmentation of this gas in the Earth's atmosphere on the decline of populations of these pollinators. Learning and memory duration of bumblebees were evaluated as two main behavioral factors in social insects at different concentrations of CO₂. In both series of experiments, the behavior of bees under the influence of CO₂ changes compared to the control. Insects kept at high CO₂ concentrations learn less than control bees and spend more time identifying and navigating to discover their food source and access time (nectar consumption). These results showed that bees maybe lose some of their food resources due to poorer identification and act weaker on searching due to less memory and avoiding the enemy in higher CO₂ concentration. Therefore, CO₂ increasing concentration can be one of the reasons for the decline of these pollinating insects' populations by negatively affecting their fitness. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bombus%20terrestris" title="Bombus terrestris">Bombus terrestris</a>, <a href="https://publications.waset.org/abstracts/search?q=CO%E2%82%82" title=" CO₂"> CO₂</a>, <a href="https://publications.waset.org/abstracts/search?q=learning" title=" learning"> learning</a>, <a href="https://publications.waset.org/abstracts/search?q=memory%20duration" title=" memory duration"> memory duration</a> </p> <a href="https://publications.waset.org/abstracts/141408/the-impact-of-co2-on-learning-and-memory-duration-of-bombus-terrestris" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/141408.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">179</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">43</span> Sovereign Characters of Police in Turkey: Discretionary Use of Force on Criminalized Political Opponents</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Emrah%20Denizhan">Emrah Denizhan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Policing studies have drawn attention to the changing role of law enforcement in favour of harsh policing strategies throughout the world. Turkey has become part of this global transition process by restructuring its policing through a series of allegedly democratic amendments to Turkish law. Nevertheless, severe violations of human rights continue to be widely experienced phenomena. This paper suggests problematizing the changing judicial framework of policing together with the persistent aggressive policing in Turkey, by considering Agamben's concept of police as a sovereign entity – sovereign police. In so doing, the paper analytically dissects sovereign police into three premises: the criminalization of the (perceived) enemy, the militarization of the police, and finally, the discretionary use of force. This examination of the state’s early ethno-racial policies and the history of the Turkish police force, and of the changing judicial framework of police-related laws in the 2000s, demonstrates that certain ‘internal enemies’ have been criminalized by increasingly militarized police using escalating discretionary use of force. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=criminalization" title="criminalization">criminalization</a>, <a href="https://publications.waset.org/abstracts/search?q=discretionary%20use%20of%20force" title=" discretionary use of force"> discretionary use of force</a>, <a href="https://publications.waset.org/abstracts/search?q=policing" title=" policing"> policing</a>, <a href="https://publications.waset.org/abstracts/search?q=sovereignty" title=" sovereignty "> sovereignty </a> </p> <a href="https://publications.waset.org/abstracts/127151/sovereign-characters-of-police-in-turkey-discretionary-use-of-force-on-criminalized-political-opponents" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/127151.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">169</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">42</span> Localization of Geospatial Events and Hoax Prediction in the UFO Database </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Harish%20Krishnamurthy">Harish Krishnamurthy</a>, <a href="https://publications.waset.org/abstracts/search?q=Anna%20Lafontant"> Anna Lafontant</a>, <a href="https://publications.waset.org/abstracts/search?q=Ren%20Yi"> Ren Yi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Unidentified Flying Objects (UFOs) have been an interesting topic for most enthusiasts and hence people all over the United States report such findings online at the National UFO Report Center (NUFORC). Some of these reports are a hoax and among those that seem legitimate, our task is not to establish that these events confirm that they indeed are events related to flying objects from aliens in outer space. Rather, we intend to identify if the report was a hoax as was identified by the UFO database team with their existing curation criterion. However, the database provides a wealth of information that can be exploited to provide various analyses and insights such as social reporting, identifying real-time spatial events and much more. We perform analysis to localize these time-series geospatial events and correlate with known real-time events. This paper does not confirm any legitimacy of alien activity, but rather attempts to gather information from likely legitimate reports of UFOs by studying the online reports. These events happen in geospatial clusters and also are time-based. We look at cluster density and data visualization to search the space of various cluster realizations to decide best probable clusters that provide us information about the proximity of such activity. A random forest classifier is also presented that is used to identify true events and hoax events, using the best possible features available such as region, week, time-period and duration. Lastly, we show the performance of the scheme on various days and correlate with real-time events where one of the UFO reports strongly correlates to a missile test conducted in the United States. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=time-series%20clustering" title="time-series clustering">time-series clustering</a>, <a href="https://publications.waset.org/abstracts/search?q=feature%20extraction" title=" feature extraction"> feature extraction</a>, <a href="https://publications.waset.org/abstracts/search?q=hoax%20prediction" title=" hoax prediction"> hoax prediction</a>, <a href="https://publications.waset.org/abstracts/search?q=geospatial%20events" title=" geospatial events"> geospatial events</a> </p> <a href="https://publications.waset.org/abstracts/61710/localization-of-geospatial-events-and-hoax-prediction-in-the-ufo-database" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/61710.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">376</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">41</span> Representative Concentration Pathways Approach on Wolbachia Controlling Dengue Virus in Aedes aegypti</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ida%20Bagus%20Mandhara%20Brasika">Ida Bagus Mandhara Brasika</a>, <a href="https://publications.waset.org/abstracts/search?q=I%20Dewa%20Gde%20Sathya%20Deva"> I Dewa Gde Sathya Deva</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Wolbachia is recently developed as the natural enemy of Dengue virus (DENV). It inhibits the replication of DENV in Aedes aegypti. Both DENV and its vector, Aedes aegypty, are sensitive to climate factor especially temperature. The changing of climate has a direct impact on temperature which means changing the vector transmission. Temperature has been known to effect Wolbachia density as it has an ideal temperature to grow. Some scenarios, which are known as Representative Concentration Pathways (RCPs), have been developed by Intergovernmental Panel on Climate Change (IPCC) to predict the future climate based on greenhouse gases concentration. These scenarios are applied to mitigate the future change of Aedes aegypti migration and how Wolbachia could control the virus. The prediction will determine the schemes to release Wolbachia-injected Aedes aegypti to reduce DENV transmission. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aedes%20aegypti" title="Aedes aegypti">Aedes aegypti</a>, <a href="https://publications.waset.org/abstracts/search?q=climate%20change" title=" climate change"> climate change</a>, <a href="https://publications.waset.org/abstracts/search?q=dengue%20virus" title=" dengue virus"> dengue virus</a>, <a href="https://publications.waset.org/abstracts/search?q=Intergovernmental%20Panel%20on%20Climate%20Change" title=" Intergovernmental Panel on Climate Change"> Intergovernmental Panel on Climate Change</a>, <a href="https://publications.waset.org/abstracts/search?q=representative%20concentration%20pathways" title=" representative concentration pathways"> representative concentration pathways</a>, <a href="https://publications.waset.org/abstracts/search?q=Wolbachia" title=" Wolbachia"> Wolbachia</a> </p> <a href="https://publications.waset.org/abstracts/64262/representative-concentration-pathways-approach-on-wolbachia-controlling-dengue-virus-in-aedes-aegypti" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/64262.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">300</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">40</span> Psychology of Terrorism: Psychology of War </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Saeed%20Wahass">Saeed Wahass</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Terrorism is a universal phenomenon. It is an enemy to the world and humanity, representing the most essential challenges facing developing and developed societies of the world. Terrorism is traumatically a major cause for death and disability. Developing societies are catastrophically suffering more in comparing to developed ones. Importantly, the terrorism may have been emigrated from developing societies; therefore, it cannot be appropriately explained/understood elsewhere. Developing societies have attempts for solutions. These attempts may have contributed somehow to either overcoming temporally terrorism or at least waterless its fountains. It appears these attempts are fallen on personal experiences/local endeavours related to the nature of those societies and cultures. The missing issue is the involvement of the applications of psychological theories for understanding terrorism as a phenomenon. However, terrorism is behaviour, like other behaviours, it can be explained, analysed and predicted while psychology is involved as the science of behaviour and mental process. Later than, solutions whatever they are (intervention/prevention) have to be born from the womb of psychological theories explaining/understanding terrorism. This paper is an endeavour to shed light on psychological theories which may present an explanation for terrorism, as a behavioural phenomenon, looking for the effective evidence-based interventions/prevention. An emphasis will be on the experiences of developing countries which may have made/incubated terrorism. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=psychology" title="psychology">psychology</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorism" title=" terrorism"> terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=humanity" title=" humanity"> humanity</a>, <a href="https://publications.waset.org/abstracts/search?q=developing%20societies" title=" developing societies"> developing societies</a> </p> <a href="https://publications.waset.org/abstracts/2269/psychology-of-terrorism-psychology-of-war" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/2269.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">521</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">39</span> Investigation of Diseases and Enemies of Bees of Breeding Apis mellifera intermissa (Buttel-Reepen, 1906)</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=S.%20Zenia">S. Zenia</a>, <a href="https://publications.waset.org/abstracts/search?q=L.%20Bitta"> L. Bitta</a>, <a href="https://publications.waset.org/abstracts/search?q=O.%20Bouhamam"> O. Bouhamam</a>, <a href="https://publications.waset.org/abstracts/search?q=H.%20Brines"> H. Brines</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Boudriaa"> M. Boudriaa</a>, <a href="https://publications.waset.org/abstracts/search?q=F.%20Haddadj"> F. Haddadj</a>, <a href="https://publications.waset.org/abstracts/search?q=F.%20Marniche"> F. Marniche</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Milla"> A. Milla</a>, <a href="https://publications.waset.org/abstracts/search?q=H.%20Saadi"> H. Saadi</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Smai"> A. Smai</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The bee Apis mellifera intermissa is a major social insect, in addition to its honey production, it is a pillar of our biodiversity. Several living organisms can come into contact with it: bacteria, viruses, protozoa, fungi, mites, and insects. In Algeria, many beekeepers have reported unusual mortality of local bees, loss of foragers and significant losses of their livestock. Despite the presence of a varied honey-bearing flora and a favourable Mediterranean climate, honey production remains low. This phenomenon can be attributed to the excess winter mortality, but also to the increasing difficulties that beekeepers face in maintaining healthy bee colonies, particularly bee diseases and their transmission facilitated by trade and beekeeping practices. Our survey is based on a questionnaire composed of several parts. The results obtained show that the disease that most affects bees according to beekeepers is varroa mite with 93% followed by fungi with 26%. The most replied enemy of bees is the false ringworm with 73%, followed by the bee-eater with 63%. Our goal is to determine the causes of this low production in two areas: Bejaia and Tizi-Ouzou. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=diseases" title="diseases">diseases</a>, <a href="https://publications.waset.org/abstracts/search?q=Apis%20mellifera%20L." title=" Apis mellifera L."> Apis mellifera L.</a>, <a href="https://publications.waset.org/abstracts/search?q=varroa" title=" varroa"> varroa</a>, <a href="https://publications.waset.org/abstracts/search?q=European%20foulbrood" title=" European foulbrood"> European foulbrood</a> </p> <a href="https://publications.waset.org/abstracts/100968/investigation-of-diseases-and-enemies-of-bees-of-breeding-apis-mellifera-intermissa-buttel-reepen-1906" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/100968.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">161</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">38</span> South Asia’s Political Landscape: Precipitating Terrorism</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Saroj%20Kumar%20Rath">Saroj Kumar Rath</a> </p> <p class="card-text"><strong>Abstract:</strong></p> India's Muslims represent 15 percent of the nation's population, the world's third largest group in any nation after Indonesia and Pakistan. Extremist groups like the Islamic State, Al Qaeda, the Taliban and the Haqqani network increasingly view India as a target. Several trends explain the rise: Terrorism threats in South Asia are linked and mobile - if one source is batted down, jihadists relocate to find another Islamic cause. As NATO withdraws from Afghanistan, some jihadists will eye India. Pakistan regards India as a top enemy and some officials even encourage terrorists to target areas like Kashmir or Mumbai. Meanwhile, a stream of Wahhabi preachers have visited India, offering hard-line messages; extremist groups like Al Qaeda and the Islamic State compete for influence, and militants even pay jihadists. Muslims as a minority population in India could offer fertile ground for the extremist recruiters. This paper argues that there is an urgent need for the Indian government to profile militants and examine social media sites to attack Wahhabi indoctrination while supporting education and entrepreneurship for all of India's citizens. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Al%20Qaeda" title="Al Qaeda">Al Qaeda</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorism" title=" terrorism"> terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=Islamic%20state" title=" Islamic state"> Islamic state</a>, <a href="https://publications.waset.org/abstracts/search?q=India" title=" India"> India</a>, <a href="https://publications.waset.org/abstracts/search?q=haqqani%20network" title=" haqqani network"> haqqani network</a>, <a href="https://publications.waset.org/abstracts/search?q=Pakistan" title=" Pakistan"> Pakistan</a>, <a href="https://publications.waset.org/abstracts/search?q=Taliban" title=" Taliban"> Taliban</a> </p> <a href="https://publications.waset.org/abstracts/21186/south-asias-political-landscape-precipitating-terrorism" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21186.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">617</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37</span> Study and Calibration of Autonomous UAV Systems with Thermal Sensing Allowing Screening of Environmental Concerns</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Raahil%20Sheikh">Raahil Sheikh</a>, <a href="https://publications.waset.org/abstracts/search?q=Abhishek%20Maurya"> Abhishek Maurya</a>, <a href="https://publications.waset.org/abstracts/search?q=Priya%20Gujjar"> Priya Gujjar</a>, <a href="https://publications.waset.org/abstracts/search?q=Himanshu%20Dwivedi"> Himanshu Dwivedi</a>, <a href="https://publications.waset.org/abstracts/search?q=Prathamesh%20Minde"> Prathamesh Minde</a> </p> <p class="card-text"><strong>Abstract:</strong></p> UAVs have been an initial member of our environment since it's the first used by Austrian warfare in Venice. At that stage, they were just pilotless balloons equipped with bombs to be dropped on enemy territory. Over time, technological advancements allowed UAVs to be controlled remotely or autonomously. This study shall mainly focus on the intensification of pre-existing manual drones equipping them with a variety of sensors and making them autonomous, and capable, and purposing them for a variety of roles, including thermal sensing, data collection, tracking creatures, forest fires, volcano detection, hydrothermal studies, urban heat, Island measurement, and other environmental research. The system can also be used for reconnaissance, research, 3D mapping, and search and rescue missions. This study mainly focuses on automating tedious tasks and reducing human errors as much as possible, reducing deployment time, and increasing the overall efficiency, efficacy, and reliability of the UAVs. Creation of a comprehensive Ground Control System UI (GCS) enabling less trained professionals to be able to use the UAV with maximum potency. With the inclusion of such an autonomous system, artificially intelligent paths and environmental gusts and concerns can be avoided. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=UAV" title="UAV">UAV</a>, <a href="https://publications.waset.org/abstracts/search?q=drone" title=" drone"> drone</a>, <a href="https://publications.waset.org/abstracts/search?q=autonomous%20system" title=" autonomous system"> autonomous system</a>, <a href="https://publications.waset.org/abstracts/search?q=thermal%20imaging" title=" thermal imaging"> thermal imaging</a> </p> <a href="https://publications.waset.org/abstracts/164386/study-and-calibration-of-autonomous-uav-systems-with-thermal-sensing-allowing-screening-of-environmental-concerns" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/164386.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">75</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">36</span> Study and Calibration of Autonomous UAV Systems With Thermal Sensing With Multi-purpose Roles</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Raahil%20Sheikh">Raahil Sheikh</a>, <a href="https://publications.waset.org/abstracts/search?q=Prathamesh%20Minde"> Prathamesh Minde</a>, <a href="https://publications.waset.org/abstracts/search?q=Priya%20Gujjar"> Priya Gujjar</a>, <a href="https://publications.waset.org/abstracts/search?q=Himanshu%20Dwivedi"> Himanshu Dwivedi</a>, <a href="https://publications.waset.org/abstracts/search?q=Abhishek%20Maurya"> Abhishek Maurya</a> </p> <p class="card-text"><strong>Abstract:</strong></p> UAVs have been an initial member of our environment since it's the first used by Austrian warfare in Venice. At that stage, they were just pilotless balloons equipped with bombs to be dropped on enemy territory. Over time, technological advancements allowed UAVs to be controlled remotely or autonomously. This study shall mainly focus on the intensification of pre-existing manual drones equipping them with a variety of sensors and making them autonomous, and capable, and purposing them for a variety of roles, including thermal sensing, data collection, tracking creatures, forest fires, volcano detection, hydrothermal studies, urban heat, Island measurement, and other environmental research. The system can also be used for reconnaissance, research, 3D mapping, and search and rescue missions. This study mainly focuses on automating tedious tasks and reducing human errors as much as possible, reducing deployment time, and increasing the overall efficiency, efficacy, and reliability of the UAVs. Creation of a comprehensive Ground Control System UI (GCS) enabling less trained professionals to be able to use the UAV with maximum potency. With the inclusion of such an autonomous system, artificially intelligent paths and environmental gusts and concerns can be avoided <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=UAV" title="UAV">UAV</a>, <a href="https://publications.waset.org/abstracts/search?q=autonomous%20systems" title=" autonomous systems"> autonomous systems</a>, <a href="https://publications.waset.org/abstracts/search?q=drones" title=" drones"> drones</a>, <a href="https://publications.waset.org/abstracts/search?q=geo%20thermal%20imaging" title=" geo thermal imaging"> geo thermal imaging</a> </p> <a href="https://publications.waset.org/abstracts/164384/study-and-calibration-of-autonomous-uav-systems-with-thermal-sensing-with-multi-purpose-roles" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/164384.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">85</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=enemy%20aliens&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=enemy%20aliens&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=enemy%20aliens&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10