CINXE.COM

Search results for: anarchy

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: anarchy</title> <meta name="description" content="Search results for: anarchy"> <meta name="keywords" content="anarchy"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="anarchy" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="anarchy"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 13</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: anarchy</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13</span> Critical Analysis of the Caspian: The Role of Identity in Russia&#039;s Foreign Policy</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aidana%20Arynbek">Aidana Arynbek</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper attempts to offer an alternative to the explanation of the politics of great powers in Caspian politics. Since many researchers have analysed the politics of great powers in the region with the focus on materialism, this paper attempts to bring a sociological inquiry into analysing inter-state behaviour. The constructivist concept of Alexander Wendt will be applied to analyse Russia’s relation with The United States, China and Iran; the main argument is emphasis on the power of ideational forces over material ones. Moreover, the innovative contribution of Wendt regarding the understanding of anarchy to the study of International Relations (IR) will be applied; in his words, ‘anarchy is what states make of it’. A neo-realist perspective implies that with the structure of international politics, Russia treats all great powers as rivals through engagement in power politics; however, Wendt’s approach is able to explain the reason behind the state’s behaviour towards power politics, and this is about not only international structure, but also identity. The understanding of identity answers the question of how Russia came about to follow different actions in relation to Iran and China in contrast to The United States. This paper will be divided into five chapters. The first chapter will explain the constructivism of Alexander Wendt; the second chapter will give a brief background to The Caspian Sea Region (CSR); the third chapter will explain the formation of Russia’s identity towards The United States, and this will be applied to analyse Russia’s relation to The U.S in The CSR. Similarly with China, the fourth chapter will explain Russia’s identity and its relations in The CSR, and finally, the fifth chapter will show Russia’s identity towards Iran and its relation to Iran in The CSR. It will be concluded that the analysis of the politics between great powers in seeking to access one of the richest regions, The Caspian Basin, will show that international politics is not fixed, but constructed by human action and cognition. Reality in the politics of great powers in The Caspian Sea Region is socially constructed. This paper is not interested in how things are, but how they became what they are. That is to say, how Russia’s foreign policies towards great powers became what they are. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Alexander%20Wendt" title="Alexander Wendt">Alexander Wendt</a>, <a href="https://publications.waset.org/abstracts/search?q=Caspian%20sea" title=" Caspian sea"> Caspian sea</a>, <a href="https://publications.waset.org/abstracts/search?q=identity" title=" identity"> identity</a>, <a href="https://publications.waset.org/abstracts/search?q=Russia" title=" Russia"> Russia</a>, <a href="https://publications.waset.org/abstracts/search?q=socially%20constructed" title=" socially constructed"> socially constructed</a> </p> <a href="https://publications.waset.org/abstracts/48387/critical-analysis-of-the-caspian-the-role-of-identity-in-russias-foreign-policy" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/48387.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">298</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12</span> Impact of Terrorism as an Asymmetrical Threat on the State&#039;s Conventional Security Forces</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Igor%20Pejic">Igor Pejic</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The main focus of this research will be on analyzing correlative links between terrorism as an asymmetrical threat and the consequences it leaves on conventional security forces. The methodology behind the research will include qualitative research methods focusing on comparative analysis of books, scientific papers, documents and other sources, in order to deduce, explore and formulate the results of the research. With the coming of the 21<sup>st</sup> century and the rising multi-polar, new world threats quickly emerged. The realistic approach in international relations deems that relations among nations are in a constant state of anarchy since there are no definitive rules and the distribution of power varies widely. International relations are further characterized by egoistic and self-orientated human nature, anarchy or absence of a higher government, security and lack of morality. The asymmetry of power is also reflected on countries&#39; security capabilities and its abilities to project power. With the coming of the new millennia and the rising multi-polar world order, the asymmetry of power can be also added as an important trait of the global society which consequently brought new threats. Among various others, terrorism is probably the most well-known, well-based and well-spread asymmetric threat. In today&#39;s global political arena, terrorism is used by state and non-state actors to fulfill their political agendas. Terrorism is used as an all-inclusive tool for regime change, subversion or a revolution. Although the nature of terrorist groups is somewhat inconsistent, terrorism as a security and social phenomenon has a one constant which is reflected in its political dimension. The state&#39;s security apparatus, which was embodied in the form of conventional armed forces, is now becoming fragile, unable to tackle new threats and to a certain extent outdated. Conventional security forces were designed to defend or engage an exterior threat which is more or less symmetric and visible. On the other hand, terrorism as an asymmetrical threat is a part of hybrid, special or asymmetric warfare in which specialized units, institutions or facilities represent the primary pillars of security. In today&#39;s global society, terrorism is probably the most acute problem which can paralyze entire countries and their political systems. This problem, however, cannot be engaged on an open field of battle, but rather it requires a different approach in which conventional armed forces cannot be used traditionally and their role must be adjusted. The research will try to shed light on the phenomena of modern day terrorism and to prove its correlation with the state conventional armed forces. States are obliged to adjust their security apparatus to the new realism of global society and terrorism as an asymmetrical threat which is a side-product of the unbalanced world. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=asymmetrical%20warfare" title="asymmetrical warfare">asymmetrical warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=conventional%20forces" title=" conventional forces"> conventional forces</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorism" title=" terrorism"> terrorism</a> </p> <a href="https://publications.waset.org/abstracts/80242/impact-of-terrorism-as-an-asymmetrical-threat-on-the-states-conventional-security-forces" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/80242.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">262</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11</span> Managing Configuration Management in Different Types of Organizations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dilek%20Bilgi%C3%A7">Dilek Bilgiç</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Configuration Management (CM) is a discipline assuring the consistency between product information the reality all along the product lifecycle. Although the extensive benefits of this discipline, such as the direct impact on increasing return on investment, reducing lifecycle costs, are realized by most organizations. It is worth evaluating that CM functions might be successfully implemented in some organized anarchies. This paper investigates how to manage ambiguity in CM processes as an opportunity within an environment that has different types of complexities and choice arenas. It is not explained how to establish a configuration management organization in a company; more specifically, it is analyzed how to apply configuration management processes when different types of streams exist. From planning to audit, all the CM functions may provide different organization learning opportunities when those applied with the right leadership methods. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=configuration%20management" title="configuration management">configuration management</a>, <a href="https://publications.waset.org/abstracts/search?q=leadership" title=" leadership"> leadership</a>, <a href="https://publications.waset.org/abstracts/search?q=organizational%20analysis" title=" organizational analysis"> organizational analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=organized%20anarchy" title=" organized anarchy"> organized anarchy</a>, <a href="https://publications.waset.org/abstracts/search?q=cm%20process" title=" cm process"> cm process</a>, <a href="https://publications.waset.org/abstracts/search?q=organizational%20learning" title=" organizational learning"> organizational learning</a>, <a href="https://publications.waset.org/abstracts/search?q=organizational%20maturity" title=" organizational maturity"> organizational maturity</a>, <a href="https://publications.waset.org/abstracts/search?q=configuration%20status%20accounting" title=" configuration status accounting"> configuration status accounting</a>, <a href="https://publications.waset.org/abstracts/search?q=leading%20innovation" title=" leading innovation"> leading innovation</a>, <a href="https://publications.waset.org/abstracts/search?q=change%20management" title=" change management"> change management</a> </p> <a href="https://publications.waset.org/abstracts/146303/managing-configuration-management-in-different-types-of-organizations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/146303.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">210</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10</span> Unified Theory of the Security Dilemma: Geography, MAD and Democracy</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Arash%20Heydarian%20Pashakhanlou">Arash Heydarian Pashakhanlou</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The security dilemma is one of the key concepts in International Relations (IR), and the numerous engagements with it have created a great deal of confusion regarding its essence. That is why this article seeks to dissect the security dilemma and rebuild it from its foundational core. In doing so, the present study highlights that the security dilemma requires interaction among actors that seek to protect themselves from other's capacity for harm under the condition of uncertainty to operate. In this constellation, actors are confronted with the dilemma of motives, power, and action, which they seek to resolve by acquiring information regarding their opponents. The relationship between the parties is shaped by the harm-uncertainty index (HUI) consisting of geographical distance, MAD, and joint democracy that determines the intensity of the security dilemma. These elements define the unified theory of the security dilemma (UTSD) developed here. UTSD challenges the prevailing view that the security dilemma is a unidimensional paradoxical concept, regulated by the offense-defense balance and differentiation that only occurs in anarchic settings with tragic outcomes and is equivalent to the spiral model. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=security%20dilemma" title="security dilemma">security dilemma</a>, <a href="https://publications.waset.org/abstracts/search?q=revisionism" title=" revisionism"> revisionism</a>, <a href="https://publications.waset.org/abstracts/search?q=status%20quo" title=" status quo"> status quo</a>, <a href="https://publications.waset.org/abstracts/search?q=anarchy" title=" anarchy"> anarchy</a>, <a href="https://publications.waset.org/abstracts/search?q=uncertainty" title=" uncertainty"> uncertainty</a>, <a href="https://publications.waset.org/abstracts/search?q=tragedy" title=" tragedy"> tragedy</a>, <a href="https://publications.waset.org/abstracts/search?q=spiral" title=" spiral"> spiral</a>, <a href="https://publications.waset.org/abstracts/search?q=deterrence" title=" deterrence"> deterrence</a> </p> <a href="https://publications.waset.org/abstracts/141491/unified-theory-of-the-security-dilemma-geography-mad-and-democracy" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/141491.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">238</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9</span> Nigerian Central Bank Governor’s Autonomy: Disregard of Procedure for Removal Vis-A-Vis the Rule of Law</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Adeola%20Ayodele%20Oluwabiyi">Adeola Ayodele Oluwabiyi </a> </p> <p class="card-text"><strong>Abstract:</strong></p> The study undertook an in depth examination of the relevant sections of the Nigerian Constitution and the Central Bank of Nigeria (CBN) Act as it relates to the appointment and removal of the CBN Governor; It analysed the Constitutional issues that arose from the removal of the immediate past Governor of the CBN; and made recommendations as appropriate. The study relied on primary and secondary sources of information. The primary sources included the Constitution of the Federal Republic of Nigeria, Statutes, Conventions and Judicial decisions, while the secondary sources included Books, Journals Articles, Newspapers and Internet Materials. The study revealed that the removal of the CBN Governor was not in accordance with the Nigerian Constitution and the CBN Act that Guarantee such. It also revealed some of the arguments in support of the removal. The study concluded that the removal of the immediate past Governor of CBN was an outright disregard for the rule of law. The study concluded that if Government treat the laws in question with levity and contempt the confidence of the citizens in such government will be seriously eroded and the effect of that will be the beginning of anarchy in replacement of the rule of law. It could also have serious economic implications on the economy of any nation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=central%20bank" title="central bank">central bank</a>, <a href="https://publications.waset.org/abstracts/search?q=governor" title=" governor"> governor</a>, <a href="https://publications.waset.org/abstracts/search?q=laws" title=" laws"> laws</a>, <a href="https://publications.waset.org/abstracts/search?q=Nigeria" title=" Nigeria"> Nigeria</a> </p> <a href="https://publications.waset.org/abstracts/26475/nigerian-central-bank-governors-autonomy-disregard-of-procedure-for-removal-vis-a-vis-the-rule-of-law" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/26475.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">396</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8</span> Novel Marketing Strategy To Increase Sales Revenue For SMEs Through Social Media</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kruti%20Dave">Kruti Dave</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Social media marketing is an essential component of 21st-century business. Social media platforms enable small and medium-sized businesses to enhance brand recognition, generate leads and sales. However, the research on social media marketing is still fragmented and focuses on specific topics, such as effective communication techniques. Since the various ways in which social media impacts individuals and companies alike, the authors of this article focus on the origin, impacts, and current state of Social Media, emphasizing their significance as customer empowerment agents. It illustrates their potential and current responsibilities as part of the corporate business strategy and also suggests several methods to engage them as marketing tools. The focus of social media marketing ranges from defenders to explorers, the culture of Social media marketing encompasses the poles of conservatism and modernity, social media marketing frameworks lie between hierarchies and networks, and its management goes from autocracy to anarchy. This research proposes an integrative framework for small and medium-sized businesses through social media, and the influence of the same will be measured. This strategy will help industry experts to understand this new era. We propose an axiom: Social Media is always a function of marketing as a revenue generator. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=social%20media" title="social media">social media</a>, <a href="https://publications.waset.org/abstracts/search?q=marketing%20strategy" title=" marketing strategy"> marketing strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=media%20marketing" title=" media marketing"> media marketing</a>, <a href="https://publications.waset.org/abstracts/search?q=brand%20awareness" title=" brand awareness"> brand awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=customer%20engagement" title=" customer engagement"> customer engagement</a>, <a href="https://publications.waset.org/abstracts/search?q=revenue%20generator" title=" revenue generator"> revenue generator</a>, <a href="https://publications.waset.org/abstracts/search?q=brand%20recognition" title=" brand recognition"> brand recognition</a> </p> <a href="https://publications.waset.org/abstracts/141795/novel-marketing-strategy-to-increase-sales-revenue-for-smes-through-social-media" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/141795.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">197</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7</span> Interpreting the Conflicted Self: A Reading of Agha Shahid Ali&#039;s Verses</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Javeria%20Khurshid">Javeria Khurshid</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The aim of this study is to bring forth the interpretation that Agha Shahid Ali in his verses exhibits. The study will focus on the conflict and chaos in his verses, reflecting the sense of identity attached to Kashmir. His verse advertently depicts the political turmoil and social dissent in the 'un-silent' valley, and ultimately, it expresses the chaos, anguish, and suffering, a sense of longing and belonging to this conflicted state of 'being' as well as 'mind.' Agha Shahid Ali, Kashmiri- American poet who writes of Kashmiri tragedies that continue to remain unarticulated and unheard to the major parts of world, articulates the narrative that showcases the conflicted self of Kashmiris in general and Ali’s in particular. The focus of the paper will be his poetry that debunks the claims of civility and how Kashmiri identity is kept either maligned or obscured in the major narratives that arise from the mainstream writers. However, Ali’s verses are substantially broad and clear, and very brilliantly, he rewrites Kashmir in his avid and novel voice, his verses embracing the Kashmiri self, effectively anew in English language. The paper will clearly indicate how Ali remains true to his name, 'shaheed' and 'shahid,' both a martyr and witness. Ali’s fate has been intricately entangled with Kashmir, even after his untimely death. He has fully and beautifully immersed himself in the surreal world of the conflict prevalent in the Valley, and this paper will examine the grotesque and gory history that has been spanning over the years in Kashmir with never ending cycle of conflict. The originality and innovation of his poetry surfaces from the anarchy of Kashmir, spanning between its culture, historical context, the art of memory and imagery. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=identity" title="identity">identity</a>, <a href="https://publications.waset.org/abstracts/search?q=self" title=" self"> self</a>, <a href="https://publications.waset.org/abstracts/search?q=turmoil" title=" turmoil"> turmoil</a>, <a href="https://publications.waset.org/abstracts/search?q=Kashmir" title=" Kashmir"> Kashmir</a> </p> <a href="https://publications.waset.org/abstracts/119962/interpreting-the-conflicted-self-a-reading-of-agha-shahid-alis-verses" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/119962.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">169</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6</span> The Strategic Entering Time of a Commerce Platform</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chia-li%20Wang">Chia-li Wang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The surge of service and commerce platforms, such as e-commerce and internet-of-things, have rapidly changed our lives. How to avoid the congestion and get the job done in the platform is now a common problem that many people encounter every day. This requires platform users to make decisions about when to enter the platform. To that end, we investigate the strategic entering time of a simple platform containing random numbers of buyers and sellers of some item. Upon a trade, the buyer and the seller gain respective profits, yet they pay the cost of waiting in the platform. To maximize their expected payoffs from trading, both buyers and sellers can choose their entering times. This creates an interesting and practical framework of a game that is played among buyers, among sellers, and between them. That is, a strategy employed by a player is not only against players of its type but also a response to those of the other type, and, thus, a strategy profile is composed of strategies of buyers and sellers. The players' best response, the Nash equilibrium (NE) strategy profile, is derived by a pair of differential equations, which, in turn, are used to establish its existence and uniqueness. More importantly, its structure sheds valuable insights of how the entering strategy of one side (buyers or sellers) is affected by the entering behavior of the other side. These results provide a base for the study of dynamic pricing for stochastic demand-supply imbalances. Finally, comparisons between the social welfares (the sum of the payoffs incurred by individual participants) obtained by the optimal strategy and by the NE strategy are conducted for showing the efficiency loss relative to the socially optimal solution. That should help to manage the platform better. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=double-sided%20queue" title="double-sided queue">double-sided queue</a>, <a href="https://publications.waset.org/abstracts/search?q=non-cooperative%20game" title=" non-cooperative game"> non-cooperative game</a>, <a href="https://publications.waset.org/abstracts/search?q=nash%20equilibrium" title=" nash equilibrium"> nash equilibrium</a>, <a href="https://publications.waset.org/abstracts/search?q=price%20of%20anarchy" title=" price of anarchy"> price of anarchy</a> </p> <a href="https://publications.waset.org/abstracts/167407/the-strategic-entering-time-of-a-commerce-platform" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/167407.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">86</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5</span> An Entrepreneurial Culture Led by Creativity and Innovation: Challenges and Competencies for Sri Lanka as a Middle Income Country</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tissa%20Ravinda%20Perera">Tissa Ravinda Perera</a> </p> <p class="card-text"><strong>Abstract:</strong></p> An open economic policy was introduced by Sri Lanka in 1977, before many other countries in Asia to align her economy to world economic trends and it was affected indigenous businesses since they had to compete with foreign products, processes, technology, innovations and businesses. The year 2010 was a milestone in Sri Lankan history to achieve the developmental goals when Foxbuisness rated Sri Lanka as the best performing global economy. However, Sri Lanka missed her chances of achieving development with the political and social chaos, consequent the regime change in 2015. This paper argues that to support the development of the country, Sri Lanka must develop an entrepreneurial culture. In this endeavor, creativity and innovation will play a pivotal role to achieve the desired level of development. In this study, it was used secondary data from various local and international sources to understand and explore the existing scenario of Sri Lankan economy, state of entrepreneurial culture and innovation, and challenges and competencies for the development of an entrepreneurial culture in Sri Lanka. The data was collected from secondary sources were depicted in tables in this paper in a meaningful manner. Based on the tables many findings were aroused and conclusions were made to support the argument in this paper. This paper revealed that the development of an entrepreneurial culture has to be associated with creativity and innovation to gain a competitive advantage over the development strategies of other countries. It is exposed that an entrepreneurial culture will help minorities, women and underprivileged societies to empower themselves. This product will help to confront and manage youth unrest which has created anarchy in the country from time to time. Throughout this paper, it was highlighted the past, present and future scenario of Sri Lankan economy along with modification to be done to it through the development of an entrepreneur culture in light of innovation and creativity to achieve the desired level of development. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=economy" title="economy">economy</a>, <a href="https://publications.waset.org/abstracts/search?q=industry" title=" industry"> industry</a>, <a href="https://publications.waset.org/abstracts/search?q=creativity" title=" creativity"> creativity</a>, <a href="https://publications.waset.org/abstracts/search?q=innovation" title=" innovation"> innovation</a>, <a href="https://publications.waset.org/abstracts/search?q=entrepreneurship" title=" entrepreneurship"> entrepreneurship</a>, <a href="https://publications.waset.org/abstracts/search?q=entrepreneurial%20culture" title=" entrepreneurial culture"> entrepreneurial culture</a> </p> <a href="https://publications.waset.org/abstracts/98890/an-entrepreneurial-culture-led-by-creativity-and-innovation-challenges-and-competencies-for-sri-lanka-as-a-middle-income-country" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/98890.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">180</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4</span> Education as a Tool for Counterterrorism to Promote Peace and Social Justice: The Role of Sheikh Zayed Islamic Centre Pakistan</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ishtiaq%20Ahmad%20Gondal">Ishtiaq Ahmad Gondal</a>, <a href="https://publications.waset.org/abstracts/search?q=Mubasher%20Hussain"> Mubasher Hussain</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Although the world always has spent a lot to counter the terror, thousands of millions of dollars have been spent in this regard after 9/11 that result to thwart some dangerous plots of terrorists. It is also un-ignorable that the terrorists, keeping the counterterrorist actions in their mind, always planned new ways for their operations, yet there is one thing still common in most terrorists' attacks: to use the label of religion, regardless any specific religion, in any form. The terrorism, in past few years, has also hit state's security, its consistency and coherence for achieving their cultural, political and military objectives. So, if they are not treated harshly for making the people's minds and their society dirty they will continue spreading chaos, anarchy and destruction among the ignorant and innocent people. Australia is doing its best to eliminate terrorism by using different tools such as by educating people and reducing poverty. There is still need to improve the tool of education as it can be used as one of the most effective tools to counter the terrorism. It is, as this paper will highlight, the need of contemporary time for establishing some high level educational centers that can educate people and keep them safe from any kind of terror incident. This study also concluded that common man, to keep himself saved from such activities and incidents, can be educated through public awareness movements and campaigns on media and at social gatherings. There is, according to the study, a need to reorganize the curriculum taught in different educational institutions especially in Islamic Schools (Madāris) that are assumed by some western writers as place of extremists, for the better understanding of moral and social obligations, fundamental rights, religious beliefs as well as cultural and social values to promote social justice and equality. This paper is an attempt to show the role of the Sheikh Zayed Islamic Centre in this regard. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=social%20justice" title="social justice">social justice</a>, <a href="https://publications.waset.org/abstracts/search?q=counterterrorism" title=" counterterrorism"> counterterrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=educational%20policy" title=" educational policy"> educational policy</a>, <a href="https://publications.waset.org/abstracts/search?q=religion" title=" religion"> religion</a>, <a href="https://publications.waset.org/abstracts/search?q=peace" title=" peace"> peace</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorism" title=" terrorism"> terrorism</a> </p> <a href="https://publications.waset.org/abstracts/149366/education-as-a-tool-for-counterterrorism-to-promote-peace-and-social-justice-the-role-of-sheikh-zayed-islamic-centre-pakistan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/149366.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">110</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3</span> Restructurasation of the Concept of Empire in the Social Consciousness of Modern Americans</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Maxim%20Kravchenko">Maxim Kravchenko</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The paper looks into the structure and contents of the concept of empire in the social consciousness of modern Americans. To construct the model of this socially and politically relevant concept we have conducted an experiment with respondents born and living in the USA. Empire is seen as a historic notion describing such entities as the British empire, the Russian empire, the Ottoman empire and others. It seems that the democratic regime adopted by most countries worldwide is incompatible with imperial status of a country. Yet there are countries which tend to dominate in the contemporary world and though they are not routinely referred to as empires, in many respects they are reminiscent of historical empires. Thus, the central hypothesis of the study is that the concept of empire is cultivated in some states through the intermediary of the mass media though it undergoes a certain transformation to meet the expectations of a democratic society. The transformation implies that certain components which were historically embedded in its structure are drawn to the margins of the hierarchical structure of the concept whereas other components tend to become central to the concept. This process can be referred to as restructuration of the concept of empire. To verify this hypothesis we have conducted a study which falls into two stages. First we looked into the definition of empire featured in dictionaries, the dominant conceptual components of empire are: importance, territory/lands, recognition, independence, authority/power, supreme/absolute. However, the analysis of 100 articles from American newspapers chosen at random revealed that authors rarely use the word «empire» in its basic meaning (7%). More often «empire» is used when speaking about countries, which no longer exist or when speaking about some corporations (like Apple or Google). At the second stage of the study we conducted an associative experiment with the citizens of the USA aged 19 to 45. The purpose of the experiment was to find out the dominant components of the concept of empire and to construct the model of the transformed concept. The experiment stipulated that respondents should give the first association, which crosses their mind, on reading such stimulus phrases as “strong military”, “strong economy” and others. The list of stimuli features various words and phrases associated with empire including the words representing the dominant components of the concept of empire. Then the associations provided by the respondents were classified into thematic clusters. For instance, the associations to the stimulus “strong military” were compartmentalized into three groups: 1) a country with strong military forces (North Korea, the USA, Russia, China); 2) negative impression of strong military (war, anarchy, conflict); 3) positive impression of strong military (peace, safety, responsibility). The experiment findings suggest that the concept of empire is currently undergoing a transformation which brings about a number of changes. Among them predominance of positively assessed components of the concept; emergence of two poles in the structure of the concept, that is “hero” vs. “enemy”; marginalization of any negatively assessed components. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=associative%20experiment" title="associative experiment">associative experiment</a>, <a href="https://publications.waset.org/abstracts/search?q=conceptual%20components" title=" conceptual components"> conceptual components</a>, <a href="https://publications.waset.org/abstracts/search?q=empire" title=" empire"> empire</a>, <a href="https://publications.waset.org/abstracts/search?q=restructurasation%20of%20the%20concept" title=" restructurasation of the concept"> restructurasation of the concept</a> </p> <a href="https://publications.waset.org/abstracts/42794/restructurasation-of-the-concept-of-empire-in-the-social-consciousness-of-modern-americans" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/42794.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">314</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2</span> An Inquiry into the Usage of Complex Systems Models to Examine the Effects of the Agent Interaction in a Political Economic Environment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ujjwall%20Sai%20Sunder%20Uppuluri">Ujjwall Sai Sunder Uppuluri</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Group theory is a powerful tool that researchers can use to provide a structural foundation for their Agent Based Models. These Agent Based models are argued by this paper to be the future of the Social Science Disciplines. More specifically, researchers can use them to apply evolutionary theory to the study of complex social systems. This paper illustrates one such example of how theoretically an Agent Based Model can be formulated from the application of Group Theory, Systems Dynamics, and Evolutionary Biology to analyze the strategies pursued by states to mitigate risk and maximize usage of resources to achieve the objective of economic growth. This example can be applied to other social phenomena and this makes group theory so useful to the analysis of complex systems, because the theory provides the mathematical formulaic proof for validating the complex system models that researchers build and this will be discussed by the paper. The aim of this research, is to also provide researchers with a framework that can be used to model political entities such as states on a 3-dimensional plane. The x-axis representing resources (tangible and intangible) available to them, y the risks, and z the objective. There also exist other states with different constraints pursuing different strategies to climb the mountain. This mountain’s environment is made up of risks the state faces and resource endowments. This mountain is also layered in the sense that it has multiple peaks that must be overcome to reach the tallest peak. A state that sticks to a single strategy or pursues a strategy that is not conducive to the climbing of that specific peak it has reached is not able to continue advancement. To overcome the obstacle in the state’s path, it must innovate. Based on the definition of a group, we can categorize each state as being its own group. Each state is a closed system, one which is made up of micro level agents who have their own vectors and pursue strategies (actions) to achieve some sub objectives. The state also has an identity, the inverse being anarchy and/or inaction. Finally, the agents making up a state interact with each other through competition and collaboration to mitigate risks and achieve sub objectives that fall within the primary objective. Thus, researchers can categorize the state as an organism that reflects the sum of the output of the interactions pursued by agents at the micro level. When states compete, they employ a strategy and that state which has the better strategy (reflected by the strategies pursued by her parts) is able to out-compete her counterpart to acquire some resource, mitigate some risk or fulfil some objective. This paper will attempt to illustrate how group theory combined with evolutionary theory and systems dynamics can allow researchers to model the long run development, evolution, and growth of political entities through the use of a bottom up approach. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=complex%20systems" title="complex systems">complex systems</a>, <a href="https://publications.waset.org/abstracts/search?q=evolutionary%20theory" title=" evolutionary theory"> evolutionary theory</a>, <a href="https://publications.waset.org/abstracts/search?q=group%20theory" title=" group theory"> group theory</a>, <a href="https://publications.waset.org/abstracts/search?q=international%20political%20economy" title=" international political economy"> international political economy</a> </p> <a href="https://publications.waset.org/abstracts/91522/an-inquiry-into-the-usage-of-complex-systems-models-to-examine-the-effects-of-the-agent-interaction-in-a-political-economic-environment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/91522.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">139</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1</span> Information Pollution: Exploratory Analysis of Subs-Saharan African Media’s Capabilities to Combat Misinformation and Disinformation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Muhammed%20Jamiu%20Mustapha">Muhammed Jamiu Mustapha</a>, <a href="https://publications.waset.org/abstracts/search?q=Jamiu%20Folarin"> Jamiu Folarin</a>, <a href="https://publications.waset.org/abstracts/search?q=Stephen%20Obiri%20Agyei"> Stephen Obiri Agyei</a>, <a href="https://publications.waset.org/abstracts/search?q=Rasheed%20Ademola%20Adebiyi"> Rasheed Ademola Adebiyi</a>, <a href="https://publications.waset.org/abstracts/search?q=Mutiu%20Iyanda%20Lasisi"> Mutiu Iyanda Lasisi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The role of information in societal development and growth cannot be over-emphasized. It has remained an age-long strategy to adopt the information flow to make an egalitarian society. The same has become a tool for throwing society into chaos and anarchy. It has been adopted as a weapon of war and a veritable instrument of psychological warfare with a variety of uses. That is why some scholars posit that information could be deployed as a weapon to wreak “Mass Destruction" or promote “Mass Development". When used as a tool for destruction, the effect on society is like an atomic bomb which when it is released, pollutes the air and suffocates the people. Technological advancement has further exposed the latent power of information and many societies seem to be overwhelmed by its negative effect. While information remains one of the bedrock of democracy, the information ecosystem across the world is currently facing a more difficult battle than ever before due to information pluralism and technological advancement. The more the agents involved try to combat its menace, the difficult and complex it is proving to be curbed. In a region like Africa with dangling democracy enfolds with complexities of multi-religion, multi-cultures, inter-tribes, ongoing issues that are yet to be resolved, it is important to pay critical attention to the case of information disorder and find appropriate ways to curb or mitigate its effects. The media, being the middleman in the distribution of information, needs to build capacities and capabilities to separate the whiff of misinformation and disinformation from the grains of truthful data. From quasi-statistical senses, it has been observed that the efforts aimed at fighting information pollution have not considered the built resilience of media organisations against this disorder. Apparently, the efforts, resources and technologies adopted for the conception, production and spread of information pollution are much more sophisticated than approaches to suppress and even reduce its effects on society. Thus, this study seeks to interrogate the phenomenon of information pollution and the capabilities of select media organisations in Sub-Saharan Africa. In doing this, the following questions are probed; what are the media actions to curb the menace of information pollution? Which of these actions are working and how effective are they? And which of the actions are not working and why they are not working? Adopting quantitative and qualitative approaches and anchored on the Dynamic Capability Theory, the study aims at digging up insights to further understand the complexities of information pollution, media capabilities and strategic resources for managing misinformation and disinformation in the region. The quantitative approach involves surveys and the use of questionnaires to get data from journalists on their understanding of misinformation/disinformation and their capabilities to gate-keep. Case Analysis of select media and content analysis of their strategic resources to manage misinformation and disinformation is adopted in the study while the qualitative approach will involve an In-depth Interview to have a more robust analysis is also considered. The study is critical in the fight against information pollution for a number of reasons. One, it is a novel attempt to document the level of media capabilities to fight the phenomenon of information disorder. Two, the study will enable the region to have a clear understanding of the capabilities of existing media organizations to combat misinformation and disinformation in the countries that make up the region. Recommendations emanating from the study could be used to initiate, intensify or review existing approaches to combat the menace of information pollution in the region. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=disinformation" title="disinformation">disinformation</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20pollution" title=" information pollution"> information pollution</a>, <a href="https://publications.waset.org/abstracts/search?q=misinformation" title=" misinformation"> misinformation</a>, <a href="https://publications.waset.org/abstracts/search?q=media%20capabilities" title=" media capabilities"> media capabilities</a>, <a href="https://publications.waset.org/abstracts/search?q=sub-Saharan%20Africa" title=" sub-Saharan Africa"> sub-Saharan Africa</a> </p> <a href="https://publications.waset.org/abstracts/133224/information-pollution-exploratory-analysis-of-subs-saharan-african-medias-capabilities-to-combat-misinformation-and-disinformation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/133224.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">161</span> </span> </div> </div> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10