CINXE.COM

Search results for: asymmetrical warfare

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: asymmetrical warfare</title> <meta name="description" content="Search results for: asymmetrical warfare"> <meta name="keywords" content="asymmetrical warfare"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="asymmetrical warfare" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="asymmetrical warfare"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 155</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: asymmetrical warfare</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">155</span> Asymmetric Warfare: Exploratory Study of the Implicit Defense Strategy of the People&#039;s Republic of China in 2012-2016</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mar%C3%ADa%20Victoria%20Alvarez%20Maga%C3%B1ini">María Victoria Alvarez Magañini</a>, <a href="https://publications.waset.org/abstracts/search?q=Lautaro%20Nahuel%20Rubbi"> Lautaro Nahuel Rubbi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> According to different theories, the hegemonic war between the United States and the People's Republic of China seems to be imminent. However, nowadays, it is clear that China's conventional military capacity is inferior to that of the United States. Nevertheless, the conditions that in the past were considered to be an indicator of validity in asymmetrical warfare, at present, in a possible asymmetric war scenario, are no longer considered to be taken as such. The military capacity is not the only concept that represents the main indicator of victory. The organisation and the use of forces are also an essential part of it. The present paper aims to analyze the Chinese Defense Strategy in relation to the concept of asymmetric warfare in the face of a possible war with the United States. The starting point will be developed on the basis of application of the theory which corresponds to the concept aforementioned making focus on recent developments of the People’s Republic of China in the field of non-conventional defense. A comparative analysis of the conventional forces of both powers/countries will also be carried out. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=asymmetric%20warfare" title="asymmetric warfare">asymmetric warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=China" title=" China"> China</a>, <a href="https://publications.waset.org/abstracts/search?q=United%20States" title=" United States"> United States</a>, <a href="https://publications.waset.org/abstracts/search?q=hegemonic%20warfare" title=" hegemonic warfare"> hegemonic warfare</a> </p> <a href="https://publications.waset.org/abstracts/75287/asymmetric-warfare-exploratory-study-of-the-implicit-defense-strategy-of-the-peoples-republic-of-china-in-2012-2016" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/75287.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">264</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">154</span> Paraplegic Dimensions of Asymmetric Warfare: A Strategic Analysis for Resilience Policy Plan</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sehrish%20Qayyum">Sehrish Qayyum</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this age of constant technology, asymmetrical warfare could not be won. Attuned psychometric study confirms that screaming sometimes is more productive than active retaliation against strong adversaries. Asymmetric warfare is a game of nerves and thoughts with least vigorous participation for large anticipated losses. It creates the condition of paraplegia with partial but permanent immobility, which effects the core warfare operations, being screams rather than active retaliation. When one’s own power is doubted, it gives power to one’s own doubt to ruin all planning either done with superlative cost-benefit analysis. Strategically calculated estimation of asymmetric warfare since the early WWI to WWII, WWII-to Cold War, and then to the current era in three chronological periods exposits that courage makes nations win the battle of warriors to battle of comrades. Asymmetric warfare has been most difficult to fight and survive due to unexpectedness and being lethal despite preparations. Thoughts before action may be the best-assumed strategy to mix Regional Security Complex Theory and OODA loop to develop the Paraplegic Resilience Policy Plan (PRPP) to win asymmetric warfare. PRPP may serve to control and halt the ongoing wave of terrorism, guerilla warfare, and insurgencies, etc. PRPP, along with a strategic work plan, is based on psychometric analysis to deal with any possible war condition and tactic to save millions of innocent lives such that lost in Christchurch New Zealand in 2019, November 2015 Paris attacks, and Berlin market attacks in 2016, etc. Getting tangled into self-imposed epistemic dilemmas results in regret that becomes the only option of performance. It is a descriptive psychometric analysis of war conditions with generic application of probability tests to find the best possible options and conditions to develop PRPP for any adverse condition possible so far. Innovation in technology begets innovation in planning and action-plan to serve as a rheostat approach to deal with asymmetric warfare. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=asymmetric%20warfare" title="asymmetric warfare">asymmetric warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=psychometric%20analysis" title=" psychometric analysis"> psychometric analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=PRPP" title=" PRPP"> PRPP</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a> </p> <a href="https://publications.waset.org/abstracts/122663/paraplegic-dimensions-of-asymmetric-warfare-a-strategic-analysis-for-resilience-policy-plan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/122663.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">136</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">153</span> Impact of Terrorism as an Asymmetrical Threat on the State&#039;s Conventional Security Forces</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Igor%20Pejic">Igor Pejic</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The main focus of this research will be on analyzing correlative links between terrorism as an asymmetrical threat and the consequences it leaves on conventional security forces. The methodology behind the research will include qualitative research methods focusing on comparative analysis of books, scientific papers, documents and other sources, in order to deduce, explore and formulate the results of the research. With the coming of the 21<sup>st</sup> century and the rising multi-polar, new world threats quickly emerged. The realistic approach in international relations deems that relations among nations are in a constant state of anarchy since there are no definitive rules and the distribution of power varies widely. International relations are further characterized by egoistic and self-orientated human nature, anarchy or absence of a higher government, security and lack of morality. The asymmetry of power is also reflected on countries&#39; security capabilities and its abilities to project power. With the coming of the new millennia and the rising multi-polar world order, the asymmetry of power can be also added as an important trait of the global society which consequently brought new threats. Among various others, terrorism is probably the most well-known, well-based and well-spread asymmetric threat. In today&#39;s global political arena, terrorism is used by state and non-state actors to fulfill their political agendas. Terrorism is used as an all-inclusive tool for regime change, subversion or a revolution. Although the nature of terrorist groups is somewhat inconsistent, terrorism as a security and social phenomenon has a one constant which is reflected in its political dimension. The state&#39;s security apparatus, which was embodied in the form of conventional armed forces, is now becoming fragile, unable to tackle new threats and to a certain extent outdated. Conventional security forces were designed to defend or engage an exterior threat which is more or less symmetric and visible. On the other hand, terrorism as an asymmetrical threat is a part of hybrid, special or asymmetric warfare in which specialized units, institutions or facilities represent the primary pillars of security. In today&#39;s global society, terrorism is probably the most acute problem which can paralyze entire countries and their political systems. This problem, however, cannot be engaged on an open field of battle, but rather it requires a different approach in which conventional armed forces cannot be used traditionally and their role must be adjusted. The research will try to shed light on the phenomena of modern day terrorism and to prove its correlation with the state conventional armed forces. States are obliged to adjust their security apparatus to the new realism of global society and terrorism as an asymmetrical threat which is a side-product of the unbalanced world. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=asymmetrical%20warfare" title="asymmetrical warfare">asymmetrical warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=conventional%20forces" title=" conventional forces"> conventional forces</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorism" title=" terrorism"> terrorism</a> </p> <a href="https://publications.waset.org/abstracts/80242/impact-of-terrorism-as-an-asymmetrical-threat-on-the-states-conventional-security-forces" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/80242.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">262</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">152</span> Deployment of Attack Helicopters in Conventional Warfare: The Gulf War</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mehmet%20Karabekir">Mehmet Karabekir</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Attack helicopters (AHs) are usually deployed in conventional warfare to destroy armored and mechanized forces of enemy. In addition, AHs are able to perform various tasks in the deep, and close operations – intelligence, surveillance, reconnaissance, air assault operations, and search and rescue operations. Apache helicopters were properly employed in the Gulf Wars and contributed the success of campaign by destroying a large number of armored and mechanized vehicles of Iraq Army. The purpose of this article is to discuss the deployment of AHs in conventional warfare in the light of Gulf Wars. First, the employment of AHs in deep and close operations will be addressed regarding the doctrine. Second, the US armed forces AH-64 doctrinal and tactical usage will be argued in the 1st and 2nd Gulf Wars. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=attack%20helicopter" title="attack helicopter">attack helicopter</a>, <a href="https://publications.waset.org/abstracts/search?q=conventional%20warfare" title=" conventional warfare"> conventional warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=gulf%20wars" title=" gulf wars"> gulf wars</a> </p> <a href="https://publications.waset.org/abstracts/29944/deployment-of-attack-helicopters-in-conventional-warfare-the-gulf-war" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29944.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">473</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">151</span> Modelling Asymmetric Magnetic Recording Heads with an Underlayer Using Superposition</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ammar%20Edress%20Mohamed">Ammar Edress Mohamed</a>, <a href="https://publications.waset.org/abstracts/search?q=Mustafa%20Aziz"> Mustafa Aziz</a>, <a href="https://publications.waset.org/abstracts/search?q=David%20Wright"> David Wright</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper analyses and calculates the head fields of asymmetrical 2D magnetic recording heads when the soft-underlayer is present using the appropriate Green's function to derive the surface potential/field by utilising the surface potential for asymmetrical head without underlayer. The results follow closely the corners, while the gap region shows a linear behaviour for d/g < 0.5 compared with the calculated fields from finite-element. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=magnetic%20recording" title="magnetic recording">magnetic recording</a>, <a href="https://publications.waset.org/abstracts/search?q=finite%20elements" title=" finite elements"> finite elements</a>, <a href="https://publications.waset.org/abstracts/search?q=asymmetrical%20magnetic%20heads" title=" asymmetrical magnetic heads"> asymmetrical magnetic heads</a>, <a href="https://publications.waset.org/abstracts/search?q=superposition" title=" superposition"> superposition</a>, <a href="https://publications.waset.org/abstracts/search?q=Laplace%27s%20equation" title=" Laplace&#039;s equation"> Laplace&#039;s equation</a> </p> <a href="https://publications.waset.org/abstracts/59303/modelling-asymmetric-magnetic-recording-heads-with-an-underlayer-using-superposition" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/59303.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">391</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">150</span> Contemporary Technological Developments in Urban Warfare</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mehmet%20Ozturk">Mehmet Ozturk</a>, <a href="https://publications.waset.org/abstracts/search?q=Serdal%20Akyuz"> Serdal Akyuz</a>, <a href="https://publications.waset.org/abstracts/search?q=Halit%20Turan"> Halit Turan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> By the evolving technology, the nature of the war has been changed since the beginning of the history. In the first generation war, the bayonet came to the fore in battlefields; successively; in the second-generation firepower; in the third generation maneuver. Today, in the fourth-generation, fighters, sides, and even fighters’ borders are unclear; consequently, lines of the battles have lost their significance. Furthermore, the actors in the battles can be state or non-state, military, paramilitary or civilian. In order to change the balance according to their interests, parties have utilized the urban areas as warfare. The main reason for using urban areas as a battlefield is the imbalance between parties. To balance the power strength, exploiting technological developments has utmost importance. There are many newly developed technologies for urban warfare such as change in the size of the unmanned aerial vehicle, increased usage of unmanned ground vehicles (especially in supply and evacuation purposes), systems showing the behind of the wall, simulations used for educational purposes. This study will focus on the technological equipment being used for urban warfare. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=urban%20warfare" title="urban warfare">urban warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=unmanned%20ground%20vehicles" title=" unmanned ground vehicles"> unmanned ground vehicles</a>, <a href="https://publications.waset.org/abstracts/search?q=technological%20developments" title=" technological developments"> technological developments</a>, <a href="https://publications.waset.org/abstracts/search?q=nature%20of%20the%20war" title=" nature of the war"> nature of the war</a> </p> <a href="https://publications.waset.org/abstracts/39663/contemporary-technological-developments-in-urban-warfare" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/39663.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">419</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">149</span> Conceptualizing the Cyber Insecurity Risk in the Ethics of Automated Warfare</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Otto%20Kakhidze">Otto Kakhidze</a>, <a href="https://publications.waset.org/abstracts/search?q=Hoda%20Alkhzaimi"> Hoda Alkhzaimi</a>, <a href="https://publications.waset.org/abstracts/search?q=Adam%20Ramey"> Adam Ramey</a>, <a href="https://publications.waset.org/abstracts/search?q=Nasir%20Memon"> Nasir Memon</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper provides an alternative, cyber security based a conceptual framework for the ethics of automated warfare. The large body of work produced on fully or partially autonomous warfare systems tends to overlook malicious security factors as in the possibility of technical attacks on these systems when it comes to the moral and legal decision-making. The argument provides a risk-oriented justification to why technical malicious risks cannot be dismissed in legal, ethical and policy considerations when warfare models are being implemented and deployed. The assumptions of the paper are supported by providing a broader model that contains the perspective of technological vulnerabilities through the lenses of the Game Theory, Just War Theory as well as standard and non-standard defense ethics. The paper argues that a conventional risk-benefit analysis without considering ethical factors is insufficient for making legal and policy decisions on automated warfare. This approach will provide the substructure for security and defense experts as well as legal scholars, ethicists and decision theorists to work towards common justificatory grounds that will accommodate the technical security concerns that have been overlooked in the current legal and policy models. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=automated%20warfare" title="automated warfare">automated warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=ethics%20of%20automation" title=" ethics of automation"> ethics of automation</a>, <a href="https://publications.waset.org/abstracts/search?q=inherent%20hijacking" title=" inherent hijacking"> inherent hijacking</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20vulnerabilities" title=" security vulnerabilities"> security vulnerabilities</a>, <a href="https://publications.waset.org/abstracts/search?q=risk" title=" risk"> risk</a>, <a href="https://publications.waset.org/abstracts/search?q=uncertainty" title=" uncertainty"> uncertainty</a> </p> <a href="https://publications.waset.org/abstracts/71567/conceptualizing-the-cyber-insecurity-risk-in-the-ethics-of-automated-warfare" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/71567.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">357</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">148</span> Comparing and Contrasting Western and Eastern Ways of War: Building a Universal Strategic Theory</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Adam%20Kok%20Wey%20Leong">Adam Kok Wey Leong</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The comparison between the Western ways of war and Eastern ways of war has raised contemporary debates on the validity of these arguments. The Western way of war is popularly propounded by Victor Davis Hanson as originating from the Greek hoplite tactics, direct military maneuvers, democratic principles and social freedom and cohesion that has continued to yield military success for the Western powers for centuries. On the other hand, the Eastern way of war has been deemed as relying on indirect tactics, deception, and ruses. This often accepted notion of the divide between Western and Eastern style does not sustain in view of the available classical strategic texts from both sides from the same period that has proposed similar principles of warfare. This paper analyses the similarities between classical strategic texts on war from the Eastern perspective namely Sun Tzu’s Art of War with a similar temporal strategic text from the West which is Sextus Iuluis Frontinus’s Stratagematon, and deduces answers to this core research question - Does the hypothesis of the existence of distinctive Western and Eastern ways of warfare stands? The main thesis advanced by this research is that ways of warfare share universal principles, and it transcends cultural and spatial boundaries. Warfare is a human endeavour, and the same moral actions guide humans from different geo-cultural spheres in warfare’s objectives, which are winning over an enemy in the most economical way and serve as a mean to an end. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ways%20of%20warfare" title="ways of warfare">ways of warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=strategic%20culture" title=" strategic culture"> strategic culture</a>, <a href="https://publications.waset.org/abstracts/search?q=strategy" title=" strategy"> strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=Sun%20Tzu" title=" Sun Tzu"> Sun Tzu</a>, <a href="https://publications.waset.org/abstracts/search?q=frontinus" title=" frontinus"> frontinus</a> </p> <a href="https://publications.waset.org/abstracts/72152/comparing-and-contrasting-western-and-eastern-ways-of-war-building-a-universal-strategic-theory" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/72152.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">470</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">147</span> International Humanitarian Law and the Challenges of New Technologies of Warfare</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Uche%20A.%20Nnawulezi">Uche A. Nnawulezi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Undoubtedly, despite all efforts made to achieve overall peace through the application of the principles of international humanitarian law, crimes against mankind which are of unprecedented concern to the whole world have remained unabated. The fall back on war as a technique for settling disputes between nations, individuals, countries and ethnic groups with accompanying toll of deaths and destruction of properties have remained a conspicuous component of human history. Indeed, to control this conduct of warfare and the dehumanization of individuals, a body of law aimed at regulating the impacts of conflicts and hostilities in the theater of war has become necessary. Thus, it is to examine the conditions in which international humanitarian law will apply and also to determine the extent of the challenges of new progressions of warfare that this study is undertaken. All through this examination, we grasped doctrinal approach wherein we used text books, journals, international materials and supposition of law specialists in the field of international humanitarian law. This paper shall examine the distinctive factors responsible for the rebelliousness to the rules of International Humanitarian Law and furthermore, shall proffer possible courses of action that will address the challenges of new technologies of warfare all over the world. Essentially, the basic proposals made in this paper if totally utilized may go far in ensuring a sufficient standard in the application of the rules of international humanitarian law as it relates to an increasingly frequent phenomenon of contemporary developments in technologies of warfare which has in recent past, made it more difficult for the most ideal application of the rules of international humanitarian law. This paper deduces that for a sustainable global peace to be achieved, the rules of International Humanitarian Law as it relates to the utilization of new technologies of warfare should be completely clung to and should be made a strict liability offense. Likewise, this paper further recommends the introduction of domestic criminal law punishment of serious contraventions of the rules of international humanitarian law. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=international" title="international">international</a>, <a href="https://publications.waset.org/abstracts/search?q=humanitarian%20law" title=" humanitarian law"> humanitarian law</a>, <a href="https://publications.waset.org/abstracts/search?q=new%20technologies" title=" new technologies"> new technologies</a>, <a href="https://publications.waset.org/abstracts/search?q=warfare" title=" warfare"> warfare</a> </p> <a href="https://publications.waset.org/abstracts/82827/international-humanitarian-law-and-the-challenges-of-new-technologies-of-warfare" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/82827.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">304</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">146</span> Unmanned Systems in Urban Areas </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abdullah%20Beyazkurk">Abdullah Beyazkurk</a>, <a href="https://publications.waset.org/abstracts/search?q=Onur%20Ozdemir"> Onur Ozdemir</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The evolution of warfare has been affected from technological developments to a large extent. Another important factor that affected the evolution of warfare is the space. Technological developments became cornerstones for the organization of the forces on the field, while space of the battlefield gained importance with the introduction of urban areas as 'battlefields'. The use of urban areas as battlefields increased the casualty, while technological developments began to play a remedial role. Thus, the unmanned systems drew attention as the remedy. Today's widely used unmanned aerial vehicles have great effects on the operations. On the other hand, with the increasing urbanization, and the wide use of urban areas as battlefields make it a necessity to benefit from unmanned systems on the ground as well. This study focuses on the use of unmanned aerial systems as well as unmanned ground systems in urban warfare, with regards to their performance and cost affectivity. The study defends that the use of unmanned vehicles will be remedial for increasing casualty rates, while their precision and superhuman capacity will manifest the performance advantage. The findings of this study will help modern armies focus on unmanned systems, especially for the urban, anti-terror, or counter insurgency operations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=technology" title="technology">technology</a>, <a href="https://publications.waset.org/abstracts/search?q=warfare" title=" warfare"> warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=urban%20warfare" title=" urban warfare"> urban warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=unmanned%20systems" title=" unmanned systems"> unmanned systems</a>, <a href="https://publications.waset.org/abstracts/search?q=unmanned%20ground%20vehicles" title=" unmanned ground vehicles"> unmanned ground vehicles</a>, <a href="https://publications.waset.org/abstracts/search?q=unmanned%20aerial%20vehicles" title=" unmanned aerial vehicles"> unmanned aerial vehicles</a> </p> <a href="https://publications.waset.org/abstracts/30438/unmanned-systems-in-urban-areas" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/30438.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">354</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">145</span> Warfare Ships at Ancient Egypt: Since Pre-Historic Era (3700 B.C.) Uptill the End of the 2nd Intermediate Period (1550 B.C.) </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohsen%20Negmeddin">Mohsen Negmeddin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Throughout their history, ancient Egyptians had known several kinds and types of boats, which were made from two main kinds of materials, the local one, as the dried papyrus reeds and the local tree trunks, the imported one, as the boats which were made from Lebanon cedar tree trunks. A varied using of these boats, as the fish hunting small boats, the transportation and trade boats "Cargo Boats", as well as the ceremonial boats, and the warfare boats. The research is intending for the last one, the warfare boats and the river/maritime battles since the beginning of ancient Egyptian civilization at the pre-historic era up till the end of the second intermediate period, to reveal the kinds and types of those fighting ships before establishing the Egyptian navy at the beginning of the New Kingdome (1550-1770 B.C). Two methods will follow at this research, the mention of names and titles of these ships through the texts (ancient Egyptian language) resources, and the depiction of it at the scenes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=the%20warfare%20boats" title="the warfare boats">the warfare boats</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20maritime%20battles" title=" the maritime battles"> the maritime battles</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20pre-historic%20era" title=" the pre-historic era"> the pre-historic era</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20second%20intermediate%20period" title=" the second intermediate period"> the second intermediate period</a> </p> <a href="https://publications.waset.org/abstracts/64849/warfare-ships-at-ancient-egypt-since-pre-historic-era-3700-bc-uptill-the-end-of-the-2nd-intermediate-period-1550-bc" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/64849.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">278</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">144</span> Western and Eastern Ways of Special Warfare: The Strategic History of Special Operations from Western and Eastern Sources</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Adam%20Kok%20Wey%20Leong">Adam Kok Wey Leong</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Special operations were supposedly a new way of irregular warfare that was officially formed during World War 2. For example, the famous British Special Operations Executive (SOE) and the Americans’ Office for Strategic Services (OSS) – the forerunners of modern day CIA were born in World War 2. These special operations units were tasked with the conduct of sabotage and subversion activities behind enemy lines, placing great importance in forming Fifth Column activities and supporting resistance movements. This pointed to a paradoxical argument that modern day special operations is a product of Western modern military innovation but utilizing Eastern ways of ‘ungentlemanly’ warfare. This thesis is superfluous as special operations had been well practised by both ancient Western empires such as the Greeks and Romans, and around the same time in the East, such as in China, and Japan. This paper will describe the practice of special operations, first from the Western military history of the Greeks during the Peloponnesian war. It will then highlight the similar practice of special operations by the Near Eastern Assassins and Eastern militaries by using examples from the Chinese and the Japanese. This paper propounds that special operations, or ways of warfare as a whole, has no cultural and geographical divide, but rather very similarly practiced by men from all over the world. Ideas of fighting, killing and ultimately winning a war have similar undertones – attempts to find ways to win economically and at the least time. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=special%20operations" title="special operations">special operations</a>, <a href="https://publications.waset.org/abstracts/search?q=strategic%20culture" title=" strategic culture"> strategic culture</a>, <a href="https://publications.waset.org/abstracts/search?q=ways%20of%20warfare" title=" ways of warfare"> ways of warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=Sun%20Tzu" title=" Sun Tzu"> Sun Tzu</a>, <a href="https://publications.waset.org/abstracts/search?q=Frontinus" title=" Frontinus"> Frontinus</a> </p> <a href="https://publications.waset.org/abstracts/61434/western-and-eastern-ways-of-special-warfare-the-strategic-history-of-special-operations-from-western-and-eastern-sources" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/61434.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">472</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">143</span> Training as a Service for Electronic Warfare</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Toan%20Vo">Toan Vo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Electronic attacks, illegal drones, interference, and jamming are no longer capabilities reserved for a state-sponsored, near-peer adversary. The proliferation of jammers on auction websites has lowered the price of entry for electronics hobbyists and nefarious actors. To enable local authorities and enforcement bodies to keep up with these challenges, this paper proposes a training as a service model to quickly and economically train and equip police departments and local law enforcement agencies. Using the U.S Department of Defense’s investment in Electronic Warfare as a guideline, a large number of personnel can be trained on effective spectrum monitoring techniques using commercial equipment readily available on the market. Finally, this paper will examine the economic benefits to the test and measurement industry if the TaaS model is applied. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=training" title="training">training</a>, <a href="https://publications.waset.org/abstracts/search?q=electronic%20warfare" title=" electronic warfare"> electronic warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=economics" title=" economics"> economics</a>, <a href="https://publications.waset.org/abstracts/search?q=law%20enforcement" title=" law enforcement"> law enforcement</a> </p> <a href="https://publications.waset.org/abstracts/156087/training-as-a-service-for-electronic-warfare" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/156087.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">103</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">142</span> Smart Security Concept in the East Mediterranean: Anti Asymmetrical Area Denial (A3D)</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Serkan%20Tezgel">Serkan Tezgel</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The two qualities of the sea, as a medium of transportation and as a resource, necessitate maritime security for economic stability and good order at sea. The borderless nature of the sea makes it one of the best platforms to contribute to regional peace and international order. For this reason, the establishment of maritime security in East Mediterranean will enhance the security-peace-democracy triangle in the region. This paper proposes the application of the Smart Security Concept in the East Mediterranean. Smart Security aims to secure critical infrastructure, such as hydrocarbon platforms, against asymmetrical threats. The concept is based on Anti Asymmetrical Area Denial (A3D) which necessitates limiting freedom of action of maritime terrorists and piracy by founding safe and secure maritime areas through sea lines of communication using short range capabilities. Smart Security is a regional maritime cooperation concept for the narrow seas. Cooperation and interoperability are essential attributes of this regional security concept. Therefore, multinational excellence centers such as Multinational Maritime Security Center of Excellence-Aksaz in Turkey, which will determine necessary capabilities and plan/coordinate workshops, training and exercises, are bound to be the principal characteristic of Smart Security concept and similar regional concepts. Smart Security, a crucial enabler of energy and regional security, can provide an enduring approach for operating in the challenging environment of narrow seas and for countering asymmetrical threats. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=security" title="security">security</a>, <a href="https://publications.waset.org/abstracts/search?q=cooperation" title=" cooperation"> cooperation</a>, <a href="https://publications.waset.org/abstracts/search?q=asymmetrical" title=" asymmetrical"> asymmetrical</a>, <a href="https://publications.waset.org/abstracts/search?q=area%20denial" title=" area denial"> area denial</a> </p> <a href="https://publications.waset.org/abstracts/25168/smart-security-concept-in-the-east-mediterranean-anti-asymmetrical-area-denial-a3d" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/25168.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">803</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">141</span> Hybrid Control Strategy for Nine-Level Asymmetrical Cascaded H-Bridge Inverter</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bachir%20Belmadani">Bachir Belmadani</a>, <a href="https://publications.waset.org/abstracts/search?q=Rachid%20Taleb"> Rachid Taleb</a>, <a href="https://publications.waset.org/abstracts/search?q=M%E2%80%99hamed%20Helaimi"> M’hamed Helaimi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Multilevel inverters are well used in high power electronic applications because of their ability to generate a very good quality of waveforms, reducing switching frequency, and their low voltage stress across the power devices. This paper presents the hybrid pulse-width modulation (HPWM) strategy of a uniform step asymmetrical cascaded H-bridge nine-level Inverter (USACHB9LI). The HPWM approach is compared to the well-known sinusoidal pulse-width modulation (SPWM) strategy. Simulation results demonstrate the better performances and technical advantages of the HPWM controller in feeding a high power induction motor. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=uniform%20step%20asymmetrical%20cascaded%20h-bridge%20high-level%20inverter" title="uniform step asymmetrical cascaded h-bridge high-level inverter">uniform step asymmetrical cascaded h-bridge high-level inverter</a>, <a href="https://publications.waset.org/abstracts/search?q=hybrid%20pwm" title=" hybrid pwm"> hybrid pwm</a>, <a href="https://publications.waset.org/abstracts/search?q=sinusoidal%20pwm" title=" sinusoidal pwm"> sinusoidal pwm</a>, <a href="https://publications.waset.org/abstracts/search?q=high%20power%20induction%20motor" title=" high power induction motor"> high power induction motor</a> </p> <a href="https://publications.waset.org/abstracts/29884/hybrid-control-strategy-for-nine-level-asymmetrical-cascaded-h-bridge-inverter" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29884.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">571</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">140</span> A Study on the Comparatison of Mechanical and Thermal Properties According to Laminated Orientation of CFRP through Bending Test</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hee%20Jae%20Shin">Hee Jae Shin</a>, <a href="https://publications.waset.org/abstracts/search?q=Lee%20Ku%20Kwac"> Lee Ku Kwac</a>, <a href="https://publications.waset.org/abstracts/search?q=In%20Pyo%20Cha"> In Pyo Cha</a>, <a href="https://publications.waset.org/abstracts/search?q=Min%20Sang%20Lee"> Min Sang Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=Hyun%20Kyung%20Yoon"> Hyun Kyung Yoon</a>, <a href="https://publications.waset.org/abstracts/search?q=Hong%20Gun%20Kim"> Hong Gun Kim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In rapid industrial development has increased the demand for high-strength and lightweight materials. Thus, various CFRP (Carbon Fiber Reinforced Plastics) with composite materials are being used. The design variables of CFRP are its lamination direction, order, and thickness. Thus, the hardness and strength of CFRP depend much on their design variables. In this paper, the lamination direction of CFRP was used to produce a symmetrical ply [0°/0°, -15°/+15°, -30°/+30°, -45°/+45°, -60°/+60°, -75°/+75°, and 90°/90°] and an asymmetrical ply [0°/15°, 0°/30°, 0°/45°, 0°/60° 0°/75°, and 0°/90°]. The bending flexure stress of the CFRP specimen was evaluated through a bending test. Its thermal property was measured using an infrared camera. The symmetrical specimen and the asymmetrical specimen were analyzed. The results showed that the asymmetrical specimen increased the bending loads according to the increase in the orientation angle; and from 0°, the symmetrical specimen showed a tendency opposite the asymmetrical tendency because the tensile force of fiber differs at the vertical direction of its load. Also, the infrared camera showed that the thermal property had a trend similar to that of the mechanical properties. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Carbon%20Fiber%20Reinforced%20Plastic%20%28CFRP%29" title="Carbon Fiber Reinforced Plastic (CFRP)">Carbon Fiber Reinforced Plastic (CFRP)</a>, <a href="https://publications.waset.org/abstracts/search?q=bending%20test" title=" bending test"> bending test</a>, <a href="https://publications.waset.org/abstracts/search?q=infrared%20camera" title=" infrared camera"> infrared camera</a>, <a href="https://publications.waset.org/abstracts/search?q=composite" title=" composite"> composite</a> </p> <a href="https://publications.waset.org/abstracts/21385/a-study-on-the-comparatison-of-mechanical-and-thermal-properties-according-to-laminated-orientation-of-cfrp-through-bending-test" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21385.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">398</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">139</span> OMTHD Strategy in Asymmetrical Seven-Level Inverter for High Power Induction Motor</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rachid%20Taleb">Rachid Taleb</a>, <a href="https://publications.waset.org/abstracts/search?q=M%E2%80%99hamed%20Helaimi"> M’hamed Helaimi</a>, <a href="https://publications.waset.org/abstracts/search?q=Djilali%20Benyoucef"> Djilali Benyoucef</a>, <a href="https://publications.waset.org/abstracts/search?q=Ahmed%20Derrouazin"> Ahmed Derrouazin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Multilevel inverters are well used in high power electronic applications because of their ability to generate a very good quality of waveforms, reducing switching frequency, and their low voltage stress across the power devices. This paper presents the Optimal Minimization of the Total Harmonic Distortion (OMTHD) strategy of a uniform step asymmetrical seven-level inverter (USA7LI). The OMTHD approach is compared to the well-known sinusoidal pulse-width modulation (SPWM) strategy. Simulation results demonstrate the better performances and technical advantages of the OMTHD controller in feeding a High Power Induction Motor (HPIM). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=uniform%20step%20asymmetrical%20seven-level%20inverter%20%28USA7LI%29" title="uniform step asymmetrical seven-level inverter (USA7LI)">uniform step asymmetrical seven-level inverter (USA7LI)</a>, <a href="https://publications.waset.org/abstracts/search?q=optimal%20minimization%20of%20the%20THD%20%28OMTHD%29" title=" optimal minimization of the THD (OMTHD)"> optimal minimization of the THD (OMTHD)</a>, <a href="https://publications.waset.org/abstracts/search?q=sinusoidal%20PWM%20%28SPWM%29" title=" sinusoidal PWM (SPWM)"> sinusoidal PWM (SPWM)</a>, <a href="https://publications.waset.org/abstracts/search?q=high%20power%20induction%20motor%20%28HPIM%29" title=" high power induction motor (HPIM)"> high power induction motor (HPIM)</a> </p> <a href="https://publications.waset.org/abstracts/27589/omthd-strategy-in-asymmetrical-seven-level-inverter-for-high-power-induction-motor" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/27589.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">589</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">138</span> Embedded Electrochemistry with Miniaturized, Drone-Based, Potentiostat System for Remote Detection Chemical Warfare Agents</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amer%20Dawoud">Amer Dawoud</a>, <a href="https://publications.waset.org/abstracts/search?q=Jesy%20Motchaalangaram"> Jesy Motchaalangaram</a>, <a href="https://publications.waset.org/abstracts/search?q=Arati%20Biswakarma"> Arati Biswakarma</a>, <a href="https://publications.waset.org/abstracts/search?q=Wujan%20Mio"> Wujan Mio</a>, <a href="https://publications.waset.org/abstracts/search?q=Karl%20Wallace"> Karl Wallace</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The development of an embedded miniaturized drone-based system for remote detection of Chemical Warfare Agents (CWA) is proposed. The paper focuses on the software/hardware system design of the electrochemical Cyclic Voltammetry (CV) and Differential Pulse Voltammetry (DPV) signal processing for future deployment on drones. The paper summarizes the progress made towards hardware and electrochemical signal processing for signature detection of CWA. Also, the miniature potentiostat signal is validated by comparing it with the high-end lab potentiostat signal. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=drone-based" title="drone-based">drone-based</a>, <a href="https://publications.waset.org/abstracts/search?q=remote%20detection%20chemical%20warfare%20agents" title=" remote detection chemical warfare agents"> remote detection chemical warfare agents</a>, <a href="https://publications.waset.org/abstracts/search?q=miniaturized" title=" miniaturized"> miniaturized</a>, <a href="https://publications.waset.org/abstracts/search?q=potentiostat" title=" potentiostat"> potentiostat</a> </p> <a href="https://publications.waset.org/abstracts/145007/embedded-electrochemistry-with-miniaturized-drone-based-potentiostat-system-for-remote-detection-chemical-warfare-agents" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/145007.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">136</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">137</span> Understanding Tacit Knowledge and Its Role in Military Organizations: Methods of Managing Tacit Knowledge</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20Erhan%20Orhan">M. Erhan Orhan</a>, <a href="https://publications.waset.org/abstracts/search?q=Onur%20Ozdemir"> Onur Ozdemir </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Expansion of area of operation and increasing diversity of threats forced the military organizations to change in many ways. However, tacit knowledge still is the most fundamental component of organizational knowledge. Since it is human oriented and in warfare human stands at the core of the organization. Therefore, military organizations should find effective ways of systematically utilizing tacit knowledge. In this context, this article suggest some methods for turning tacit knowledge into explicit in military organizations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=tacit%20knowledge" title="tacit knowledge">tacit knowledge</a>, <a href="https://publications.waset.org/abstracts/search?q=military" title=" military"> military</a>, <a href="https://publications.waset.org/abstracts/search?q=knowledge%20management" title=" knowledge management"> knowledge management</a>, <a href="https://publications.waset.org/abstracts/search?q=warfare" title=" warfare"> warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=technology" title=" technology"> technology</a> </p> <a href="https://publications.waset.org/abstracts/24776/understanding-tacit-knowledge-and-its-role-in-military-organizations-methods-of-managing-tacit-knowledge" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/24776.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">488</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">136</span> Identification of Information War in Lithuania</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vitalijus%20Leibenka">Vitalijus Leibenka</a> </p> <p class="card-text"><strong>Abstract:</strong></p> After 2014 the world of Russia’s actions in annexing Crimea has seen a hybrid war that has helped Russia achieve its goals. The world and NATO nations have pointed out that hybrid action can help achieve not only military but also economic and political goals. One of the weapons of action in hybrid warfare is information warfare tools, the use of which helps to carry out actions in the context of hybrid warfare as a whole. In addition, information war tools can be used alone, over time and for long-term purposes. Although forms of information war, such as propaganda and disinformation, have been used in the past, in old conflicts and wars, new forms of information war have emerged as a result of technological development, making the dissemination of information faster and more efficient. The world understands that information is becoming a weapon, but not everyone understands that both information war and information warfare differ in their essence and full content. In addition, the damage and impact of the use of information war, which may have worse consequences than a brief military conflict, is underestimated. Lithuania is also facing various interpretations of the information war. Some believe that the information attack is an information war and the understanding of the information war is limited to a false message in the press. Others, however, deepen and explain the essence of the information war. Society has formed in such a way that not all people are able to assess the threats of information war, to separate information war from information attack. Recently, the Lithuanian government has been taking measures in the context of the information war, making decisions that allow the development of the activities of the state and state institutions in order to create defense mechanisms in the information war. However, this is happening rather slowly and incompletely. Every military conflict, related to Lithuania in one way or another, forces Lithuanian politicians to take up the theme of information warfare again. As a result, a national cyber security center is being set up, and Russian channels spreading lies are banned. However, there is no consistent development and continuous improvement of action against information threats. Although a sufficiently influential part of society (not a political part) helps to stop the spread of obscure information by creating social projects such as “Demaskuok” and “Laikykis ten su Andriumi tapinu”, it goes without saying that it will not become a key tool in the fight against information threats. Therefore, in order to achieve clean dissemination of information in Lithuania, full-fledged and substantial political decisions are necessary, the adoption of which would change the public perception of the information war, its damage, impact and actions that would allow to combat the spread. Political decisions should cover the educational, military, economic and political areas, which are one of the main and most important in the state, which would allow to fundamentally change the situation against the background of information war. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=information%20war" title="information war">information war</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20warfare" title=" information warfare"> information warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=hybrid%20war" title=" hybrid war"> hybrid war</a>, <a href="https://publications.waset.org/abstracts/search?q=hybrid%20warfare" title=" hybrid warfare"> hybrid warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=NATO" title=" NATO"> NATO</a>, <a href="https://publications.waset.org/abstracts/search?q=Lithuania" title=" Lithuania"> Lithuania</a>, <a href="https://publications.waset.org/abstracts/search?q=Russia" title=" Russia"> Russia</a> </p> <a href="https://publications.waset.org/abstracts/172681/identification-of-information-war-in-lithuania" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/172681.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">62</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">135</span> Impact of Legs Geometry on the Efficiency of Thermoelectric Devices</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Angel%20Fabian%20Mijangos">Angel Fabian Mijangos</a>, <a href="https://publications.waset.org/abstracts/search?q=Jaime%20Alvarez%20Quintana"> Jaime Alvarez Quintana</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Key concepts like waste heat recycling or waste heat recovery are the basic ideas in thermoelectricity so as to the design the newest solid state sources of energy for a stable supply of electricity and environmental protection. According to several theoretical predictions; at device level, the geometry and configuration of the thermoelectric legs are crucial in the thermoelectric performance of the thermoelectric modules. Thus, in this work, it has studied the geometry effect of legs on the thermoelectric figure of merit ZT of the device. First, asymmetrical legs are proposed in order to reduce the overall thermal conductance of the device so as to increase the temperature gradient in the legs, as well as by harnessing the Thomson effect, which is generally neglected in conventional symmetrical thermoelectric legs. It has been developed a novel design of a thermoelectric module having asymmetrical legs, and by first time it has been validated experimentally its thermoelectric performance by realizing a proof-of-concept device which shows to have almost twofold the thermoelectric figure of merit as compared to conventional one. Moreover, it has been also varied the length of thermoelectric legs in order to analyze its effect on the thermoelectric performance of the device. Along with this, it has studied the impact of contact resistance in these systems. Experimental results show that device architecture can improve up to twofold the thermoelectric performance of the device. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=asymmetrical%20legs" title="asymmetrical legs">asymmetrical legs</a>, <a href="https://publications.waset.org/abstracts/search?q=heat%20recovery" title=" heat recovery"> heat recovery</a>, <a href="https://publications.waset.org/abstracts/search?q=heat%20recycling" title=" heat recycling"> heat recycling</a>, <a href="https://publications.waset.org/abstracts/search?q=thermoelectric%20module" title=" thermoelectric module"> thermoelectric module</a>, <a href="https://publications.waset.org/abstracts/search?q=Thompson%20effect" title=" Thompson effect"> Thompson effect</a> </p> <a href="https://publications.waset.org/abstracts/71339/impact-of-legs-geometry-on-the-efficiency-of-thermoelectric-devices" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/71339.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">241</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">134</span> Control of an Asymmetrical Design of a Pneumatically Actuated Ambidextrous Robot Hand</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Emre%20Aky%C3%BCrek">Emre Akyürek</a>, <a href="https://publications.waset.org/abstracts/search?q=Anthony%20Huynh"> Anthony Huynh</a>, <a href="https://publications.waset.org/abstracts/search?q=Tatiana%20Kalganova"> Tatiana Kalganova</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Ambidextrous Robot Hand is a robotic device with the purpose to mimic either the gestures of a right or a left hand. The symmetrical behavior of its fingers allows them to bend in one way or another keeping a compliant and anthropomorphic shape. However, in addition to gestures they can reproduce on both sides, an asymmetrical mechanical design with a three tendons routing has been engineered to reduce the number of actuators. As a consequence, control algorithms must be adapted to drive efficiently the ambidextrous fingers from one position to another and to include grasping features. These movements are controlled by pneumatic muscles, which are nonlinear actuators. As their elasticity constantly varies when they are under actuation, the length of pneumatic muscles and the force they provide may differ for a same value of pressurized air. The control algorithms introduced in this paper take both the fingers asymmetrical design and the pneumatic muscles nonlinearity into account to permit an accurate control of the Ambidextrous Robot Hand. The finger motion is achieved by combining a classic PID controller with a phase plane switching control that turns the gain constants into dynamic values. The grasping ability is made possible because of a sliding mode control that makes the fingers adapt to the shape of an object before strengthening their positions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ambidextrous%20hand" title="ambidextrous hand">ambidextrous hand</a>, <a href="https://publications.waset.org/abstracts/search?q=intelligent%20algorithms" title=" intelligent algorithms"> intelligent algorithms</a>, <a href="https://publications.waset.org/abstracts/search?q=nonlinear%20actuators" title=" nonlinear actuators"> nonlinear actuators</a>, <a href="https://publications.waset.org/abstracts/search?q=pneumatic%20muscles" title=" pneumatic muscles"> pneumatic muscles</a>, <a href="https://publications.waset.org/abstracts/search?q=robotics" title=" robotics"> robotics</a>, <a href="https://publications.waset.org/abstracts/search?q=sliding%20control" title=" sliding control"> sliding control</a> </p> <a href="https://publications.waset.org/abstracts/9076/control-of-an-asymmetrical-design-of-a-pneumatically-actuated-ambidextrous-robot-hand" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/9076.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">296</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">133</span> Society-Centric Warfare: Lessons from Afghanistan</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amin%20Tarzi">Amin Tarzi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The government of the Islamic Republic of Afghanistan was expected to keep the Taliban insurgents at bay after the departure of North Atlantic Treaty Organization (NATO)-led forces in 2021, especially given the two decades of effort to establish security forces to safeguard Western-backed governing institutions. This articles reviews the reasons for the failure of the much larger and better-equipped Afghan National Security Forces (ANSF) to stop the Taliban from taking over the Afghan capital of Kabul in a few days and analyzes the often-forgotten dimension of strategic calculations in this dialogue—namely the societal dimension. In this article, the author argues that this is one of the primary reasons that the ANSF and the Afghan government collapsed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=societal%20warfare" title="societal warfare">societal warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=Afghanistan" title=" Afghanistan"> Afghanistan</a>, <a href="https://publications.waset.org/abstracts/search?q=NATO" title=" NATO"> NATO</a>, <a href="https://publications.waset.org/abstracts/search?q=Taliban" title=" Taliban"> Taliban</a>, <a href="https://publications.waset.org/abstracts/search?q=military%20strategy" title=" military strategy"> military strategy</a> </p> <a href="https://publications.waset.org/abstracts/163793/society-centric-warfare-lessons-from-afghanistan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/163793.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">100</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">132</span> Africa as Endemically a War Continent: Explaining the Changing Pattern of Armed Conflicts in Africa</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kenneth%20Azaigba">Kenneth Azaigba</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The history of post-colonial African States has been dubbed a history of endemic warfare in existing literature. Indeed, Africa political environment is characterized by a multiplicity of threats to peace and security. Africa's leading drivers of conflict include abundant (especially mineral) resources, personal rule and attendant political authoritarianism, manipulation of identity politics across ethnicity, marginalization of communities, as well as electoral mal-practices resulting in contested legitimacy and resultant violence. However, the character of armed conflicts in Africa is changing. This paper attempts to reconstruct the trajectory of armed conflicts in Africa and explain the changing pattern of armed conflict. The paper contends that large scale political violence in Africa is on the decline rendering the endemic thesis an inappropriate paradigm in explaining political conflicts in Africa. The paper also posits that though small scale conflicts are springing up and exhibiting trans-border dimensions, these patterns of armed conflicts are not peculiar to Africa but emerging waves of global conflicts. The paper explains that the shift in the scale of warfare in Africa is a function of a multiplicity of post-cold war global contradictions. Inclusive governance, social justice and economic security are articulated as workable panaceas for mitigating warfare in Africa. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Africa" title="Africa">Africa</a>, <a href="https://publications.waset.org/abstracts/search?q=conflicts" title=" conflicts"> conflicts</a>, <a href="https://publications.waset.org/abstracts/search?q=pattern" title=" pattern"> pattern</a>, <a href="https://publications.waset.org/abstracts/search?q=war" title=" war"> war</a> </p> <a href="https://publications.waset.org/abstracts/50825/africa-as-endemically-a-war-continent-explaining-the-changing-pattern-of-armed-conflicts-in-africa" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50825.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">387</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">131</span> Time Synchronization between the eNBs in E-UTRAN under the Asymmetric IP Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20Kollar">M. Kollar</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Zieba"> A. Zieba</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we present a method for a time synchronization between the two eNodeBs (eNBs) in E-UTRAN (Evolved Universal Terrestrial Radio Access) network. The two eNBs are cooperating in so-called inter eNB CA (Carrier Aggregation) case and connected via asymmetrical IP network. We solve the problem by using broadcasting signals generated in E-UTRAN as synchronization signals. The results show that the time synchronization with the proposed method is possible with the error significantly less than 1 ms which is sufficient considering the time transmission interval is 1 ms in E-UTRAN. This makes this method (with low complexity) more suitable than Network Time Protocol (NTP) in the mobile applications with generated broadcasting signals where time synchronization in asymmetrical network is required. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=IP%20scheduled%20throughput" title="IP scheduled throughput">IP scheduled throughput</a>, <a href="https://publications.waset.org/abstracts/search?q=E-UTRAN" title=" E-UTRAN"> E-UTRAN</a>, <a href="https://publications.waset.org/abstracts/search?q=Evolved%20Universal%20Terrestrial%20Radio%20Access%20Network" title=" Evolved Universal Terrestrial Radio Access Network"> Evolved Universal Terrestrial Radio Access Network</a>, <a href="https://publications.waset.org/abstracts/search?q=NTP" title=" NTP"> NTP</a>, <a href="https://publications.waset.org/abstracts/search?q=Network%20Time%20Protocol" title=" Network Time Protocol"> Network Time Protocol</a>, <a href="https://publications.waset.org/abstracts/search?q=assymetric%20network" title=" assymetric network"> assymetric network</a>, <a href="https://publications.waset.org/abstracts/search?q=delay" title=" delay"> delay</a> </p> <a href="https://publications.waset.org/abstracts/93953/time-synchronization-between-the-enbs-in-e-utran-under-the-asymmetric-ip-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/93953.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">361</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">130</span> New Requirements of the Fifth Dimension of War: Planning of Cyber Operation Capabilities</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mehmet%20Kargaci">Mehmet Kargaci</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Transformation of technology and strategy has been the main factor for the evolution of war. In addition to land, maritime, air and space domains, cyberspace has become the fifth domain with emerge of internet. The current security environment has become more complex and uncertain than ever before. Moreover, warfare has evaluated from conventional to irregular, asymmetric and hybrid war. Weak actors such as terrorist organizations and non-state actors has increasingly conducted cyber-attacks against strong adversaries. Besides, states has developed cyber capabilities in order to defense critical infrastructure regarding the cyber threats. Cyber warfare will be key in future security environment. Although what to do has been placed in operational plans, how to do has lacked and ignored as to cyber defense and attack. The purpose of the article is to put forward a model for how to conduct cyber capabilities in a conventional war. First, cyber operations capabilities will be discussed. Second put forward the necessities of cyberspace environment and develop a model for how to plan an operation using cyber operation capabilities, finally the assessment of the applicability of cyber operation capabilities and offers will be presented. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber%20war" title="cyber war">cyber war</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20threats" title=" cyber threats"> cyber threats</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20operation%20capabilities" title=" cyber operation capabilities"> cyber operation capabilities</a>, <a href="https://publications.waset.org/abstracts/search?q=operation%20planning" title=" operation planning"> operation planning</a> </p> <a href="https://publications.waset.org/abstracts/31541/new-requirements-of-the-fifth-dimension-of-war-planning-of-cyber-operation-capabilities" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31541.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">335</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">129</span> Longitudinal Vortices Mixing in Three-Stream Micromixers with Two Inlets</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yi-Tun%20Huang">Yi-Tun Huang</a>, <a href="https://publications.waset.org/abstracts/search?q=Chih-Yang%20Wu"> Chih-Yang Wu</a>, <a href="https://publications.waset.org/abstracts/search?q=Shu-Wei%20Huang"> Shu-Wei Huang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this work, we examine fluid mixing in a full three-stream mixing channel with longitudinal vortex generators (LVGs) built on the channel bottom by numerical simulation and experiment. The effects of the asymmetrical arrangement and the attack angle of the LVGs on fluid mixing are investigated. The results show that the micromixer with LVGs at a small asymmetry index (defined by the ratio of the distance from the center plane of the gap between the winglets to the center plane of the main channel to the width of the main channel) is superior to the micromixer with symmetric LVGs and that with LVGs at a large asymmetry index. The micromixer using five mixing modules of the LVGs with an attack angle between 16.5 degrees and 22.5 degrees can achieve excellent mixing over a wide range of Reynolds numbers. Here, we call a section of channel with two pairs of staggered asymmetrical LVGs a mixing module. Besides, the micromixer with LVGs at a small attack angle is more efficient than that with a larger attack angle when pressure losses are taken into account. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=microfluidics" title="microfluidics">microfluidics</a>, <a href="https://publications.waset.org/abstracts/search?q=mixing" title=" mixing"> mixing</a>, <a href="https://publications.waset.org/abstracts/search?q=longitudinal%20vortex%20generators" title=" longitudinal vortex generators"> longitudinal vortex generators</a>, <a href="https://publications.waset.org/abstracts/search?q=two%20stream%20interfaces" title=" two stream interfaces"> two stream interfaces</a> </p> <a href="https://publications.waset.org/abstracts/7216/longitudinal-vortices-mixing-in-three-stream-micromixers-with-two-inlets" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/7216.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">521</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">128</span> Modeling the Road Pavement Dynamic Response Due to Heavy Vehicles Loadings and Kinematic Excitations General Asymmetries</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Josua%20K.%20Junias">Josua K. Junias</a>, <a href="https://publications.waset.org/abstracts/search?q=Fillemon%20N.%20Nangolo"> Fillemon N. Nangolo</a>, <a href="https://publications.waset.org/abstracts/search?q=Petrina%20T.%20Johaness"> Petrina T. Johaness</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The deterioration of pavement can lead to the formation of potholes, which cause the wheels of a vehicle to experience unusual and uneven movement. In addition, improper loading practices of heavy vehicles can result in dynamic loading of the pavement due to the vehicle's response to the irregular movement caused by the potholes. Previous studies have only focused on the effects of either the road's uneven surface or the asymmetrical loading of the vehicle, but not both. This study aimed to model the pavement's dynamic response to heavy vehicles under different loading configurations and wheel movements. A sample of 225 cases with symmetrical and asymmetrical loading and kinematic movements was used, and 27 validated 3D pavement-vehicle interactive models were developed using SIMWISE 4D. The study found that the type of kinematic movement experienced by the heavy vehicle affects the pavement's dynamic loading, with eccentrically loaded, asymmetrically kinematic heavy vehicles having a statistically significant impact. The study also suggests that the mass of the vehicle's suspension system plays a role in the pavement's dynamic loading. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=eccentricities" title="eccentricities">eccentricities</a>, <a href="https://publications.waset.org/abstracts/search?q=pavement%20dynamic%20loading" title=" pavement dynamic loading"> pavement dynamic loading</a>, <a href="https://publications.waset.org/abstracts/search?q=vertical%20displacement%20dynamic%20response" title=" vertical displacement dynamic response"> vertical displacement dynamic response</a>, <a href="https://publications.waset.org/abstracts/search?q=heavy%20vehicles" title=" heavy vehicles"> heavy vehicles</a> </p> <a href="https://publications.waset.org/abstracts/166750/modeling-the-road-pavement-dynamic-response-due-to-heavy-vehicles-loadings-and-kinematic-excitations-general-asymmetries" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/166750.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">73</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">127</span> The Social Psychology of Illegal Game Room Addiction in the Historic Chinatown District of Honolulu, Hawaii: Illegal Compulsive Gambling, Chinese-Polynesian Organized Crime Syndicates, Police Corruption, and Loan Sharking Rings</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gordon%20James%20Knowles">Gordon James Knowles</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Historically the Chinatown district in Sandwich Islands has been plagued with the traditional vice crimes of illegal drugs, gambling, and prostitution since the early 1800s. However, a new form of psychologically addictive arcade style table gambling machines has become the dominant form of illegal revenue made in Honolulu, Hawaii. This study attempts to document the drive, desire, or will to play and wager with arcade style video gaming and understand the role of illegal game rooms in facilitating pathological gambling addiction. Indicators of police corruption by Chinese organized crime syndicates related to protection rackets, bribery, and pay-offs were revealed. Information fusion from a police science and sociological intelligence perspective indicates insurgent warfare is being waged on the streets of Honolulu by the People’s Republic of China. This state-sponsored communist terrorism in the Hawaiian Islands used “contactless” irregular warfare entailing: (1) the deployment of psychologically addictive gambling machines, (2) the distribution of the physically addictive fentanyl drug as a lethal chemical weapon, and (3) psychological warfare by circulating pro-China anti-American propaganda newspapers targeted at the small island populace. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chinese%20and%20Polynesian%20organized%20crime" title="Chinese and Polynesian organized crime">Chinese and Polynesian organized crime</a>, <a href="https://publications.waset.org/abstracts/search?q=china%20daily%20newspaper" title=" china daily newspaper"> china daily newspaper</a>, <a href="https://publications.waset.org/abstracts/search?q=electronic%20arcade%20style%20table%20games" title=" electronic arcade style table games"> electronic arcade style table games</a>, <a href="https://publications.waset.org/abstracts/search?q=gaming%20technology%20addiction" title=" gaming technology addiction"> gaming technology addiction</a>, <a href="https://publications.waset.org/abstracts/search?q=illegal%20compulsive%20gambling" title=" illegal compulsive gambling"> illegal compulsive gambling</a>, <a href="https://publications.waset.org/abstracts/search?q=and%20police%20intelligence" title=" and police intelligence"> and police intelligence</a> </p> <a href="https://publications.waset.org/abstracts/168791/the-social-psychology-of-illegal-game-room-addiction-in-the-historic-chinatown-district-of-honolulu-hawaii-illegal-compulsive-gambling-chinese-polynesian-organized-crime-syndicates-police-corruption-and-loan-sharking-rings" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168791.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">74</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">126</span> Voltage Sag Characteristics during Symmetrical and Asymmetrical Faults</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ioannis%20Binas">Ioannis Binas</a>, <a href="https://publications.waset.org/abstracts/search?q=Marios%20Moschakis"> Marios Moschakis</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Electrical faults in transmission and distribution networks can have great impact on the electrical equipment used. Fault effects depend on the characteristics of the fault as well as the network itself. It is important to anticipate the network&rsquo;s behavior during faults when planning a new equipment installation, as well as troubleshooting. Moreover, working backwards, we could be able to estimate the characteristics of the fault when checking the perceived effects. Different transformer winding connections dominantly used in the Greek power transfer and distribution networks and the effects of 1-phase to neutral, phase-to-phase, 2-phases to neutral and 3-phase faults on different locations of the network were simulated in order to present voltage sag characteristics. The study was performed on a generic network with three steps down transformers on two voltage level buses (one 150 kV/20 kV transformer and two 20 kV/0.4 kV). We found that during faults, there are significant changes both on voltage magnitudes and on phase angles. The simulations and short-circuit analysis were performed using the PSCAD simulation package. This paper presents voltage characteristics calculated for the simulated network, with different approaches on the transformer winding connections during symmetrical and asymmetrical faults on various locations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Phase%20angle%20shift" title="Phase angle shift">Phase angle shift</a>, <a href="https://publications.waset.org/abstracts/search?q=power%20quality" title=" power quality"> power quality</a>, <a href="https://publications.waset.org/abstracts/search?q=transformer%20winding%20connections" title=" transformer winding connections"> transformer winding connections</a>, <a href="https://publications.waset.org/abstracts/search?q=voltage%20sag%20propagation" title=" voltage sag propagation"> voltage sag propagation</a> </p> <a href="https://publications.waset.org/abstracts/123004/voltage-sag-characteristics-during-symmetrical-and-asymmetrical-faults" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/123004.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">139</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=asymmetrical%20warfare&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=asymmetrical%20warfare&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=asymmetrical%20warfare&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=asymmetrical%20warfare&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=asymmetrical%20warfare&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=asymmetrical%20warfare&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10