26 resultados para Counter-insurgency
Resumo:
This article examines the EU’s promotion of the religious identity of Muslims within the context of European counter-terrorism measures. Counter-terrorism laws of the EU and its Member States impact on the religious identity of Muslims. They have an arguably disproportionate effect on the civil rights of individuals in the quest to combat terrorism and can be seen to increase Islamophobia in two ways: a rise in general discrimination against Muslims and a requirement on Muslims to distance their connection to Islamic practice and traditions. EU law dealing with terrorist offences speak little of this backlash that Muslims face in European countries. Although the EU has somewhat of a framework in place which concerns the protection of Islamic identity, the reluctance of the EU to take a determined stance on the issue of the protection of religious identity is illustrated through the ambiguous nature of its legislation.
Resumo:
'The Princeton Companion to Applied Mathematics' is an introduction to applied mathematics for students, teachers, and professionals. This article is for the "Application Areas" part of the book, which comprises articles on connections between applied mathematics and other disciplines.
Resumo:
In 'Avalanche', an object is lowered, players staying in contact throughout. Normally the task is easily accomplished. However, with larger groups counter-intuitive behaviours appear. The paper proposes a formal theory for the underlying causal mechanisms. The aim is to not only provide an explicit, testable hypothesis for the source of the observed modes of behaviour-but also to exemplify the contribution that formal theory building can make to understanding complex social phenomena. Mapping reveals the importance of geometry to the Avalanche game; each player has a pair of balancing loops, one involved in lowering the object, the other ensuring contact. For more players, sets of balancing loops interact and these can allow dominance by reinforcing loops, causing the system to chase upwards towards an ever-increasing goal. However, a series of other effects concerning human physiology and behaviour (HPB) is posited as playing a role. The hypothesis is therefore rigorously tested using simulation. For simplicity a 'One Degree of Freedom' case is examined, allowing all of the effects to be included whilst rendering the analysis more transparent. Formulation and experimentation with the model gives insight into the behaviours. Multi-dimensional rate/level analysis indicates that there is only a narrow region in which the system is able to move downwards. Model runs reproduce the single 'desired' mode of behaviour and all three of the observed 'problematic' ones. Sensitivity analysis gives further insight into the system's modes and their causes. Behaviour is seen to arise only when the geometric effects apply (number of players greater than degrees of freedom of object) in combination with a range of HPB effects. An analogy exists between the co-operative behaviour required here and various examples: conflicting strategic objectives in organizations; Prisoners' Dilemma and integrated bargaining situations. Additionally, the game may be relatable in more direct algebraic terms to situations involving companies in which the resulting behaviours are mediated by market regulations. Finally, comment is offered on the inadequacy of some forms of theory building and the case is made for formal theory building involving the use of models, analysis and plausible explanations to create deep understanding of social phenomena.
Resumo:
This paper provides a comparative study of the performance of cross-flow and counter-flow M-cycle heat exchangers for dew point cooling. It is recognised that evaporative cooling systems offer a low energy alternative to conventional air conditioning units. Recently emerged dew point cooling, as the renovated evaporative cooling configuration, is claimed to have much higher cooling output over the conventional evaporative modes owing to use of the M-cycle heat exchangers. Cross-flow and counter-flow heat exchangers, as the available structures for M-cycle dew point cooling processing, were theoretically and experimentally investigated to identify the difference in cooling effectiveness of both under the parallel structural/operational conditions, optimise the geometrical sizes of the exchangers and suggest their favourite operational conditions. Through development of a dedicated computer model and case-by-case experimental testing and validation, a parametric study of the cooling performance of the counter-flow and cross-flow heat exchangers was carried out. The results showed the counter-flow exchanger offered greater (around 20% higher) cooling capacity, as well as greater (15%–23% higher) dew-point and wet-bulb effectiveness when equal in physical size and under the same operating conditions. The cross-flow system, however, had a greater (10% higher) Energy Efficiency (COP). As the increased cooling effectiveness will lead to reduced air volume flow rate, smaller system size and lower cost, whilst the size and cost are the inherent barriers for use of dew point cooling as the alternation of the conventional cooling systems, the counter-flow system is considered to offer practical advantages over the cross-flow system that would aid the uptake of this low energy cooling alternative. In line with increased global demand for energy in cooling of building, largely by economic booming of emerging developing nations and recognised global warming, the research results will be of significant importance in terms of promoting deployment of the low energy dew point cooling system, helping reduction of energy use in cooling of buildings and cut of the associated carbon emission.
Resumo:
That adult and child language acquisitions differ in route and outcome is observable. Notwithstanding, there is controversy as to what this observation means for the Critical Period Hypothesis’ (CPH) application to adult second language acquisition (SLA). As most versions of the CPH applied to SLA claim that differences result from maturational effects on in-born linguistic mechanisms, the CPH has many implications that are amendable to empirical investigation. To date, there is no shortage of literature claiming that the CPH applies or does not apply to normal adult SLA. Herein, I provide an epistemological discussion on the conceptual usefulness of the CPH in SLA (cf. Singleton 2005) coupled with a review of Long's (2005) evaluation of much available relevant research. Crucially, I review studies that Long did not consider and conclude differently that there is no critical/sensitive period for L2 syntactic and semantic acquisition.
Resumo:
Atmospheric profiles of cosmic rays and radioactivity can be obtained using adapted meteorologi- cal radiosondes, for which Geiger tubes remain widely used detectors. Simultaneous triggering of two tubes provides an indication of energetic events. As, however, only small volume detectors can be carried, the event rate is small, which, due to the rapid balloon ascent, cannot be circumvented using long averaging periods. To derive count rates at low altitudes, a microcontroller is used to de- termine the inter-event time. This yields estimates of the coincidence rate below 5 km, where the coincidence rate is too small to determine solely by event counting
Resumo:
Automated border control (ABC) is concerned with fast and secure processing for intelligence-led identification. The FastPass project aims to build a harmonised, modular reference system for future European ABC. When biometrics is taken on board as identity, spoofing attacks become a concern. This paper presents current research in algorithm development for counter-spoofing attacks in biometrics. Focussing on three biometric traits, face, fingerprint, and iris, it examines possible types of spoofing attacks, and reviews existing algorithms reported in relevant academic papers in the area of countering measures to biometric spoofing attacks. It indicates that the new developing trend is fusion of multiple biometrics against spoofing attacks.
Resumo:
This response examines what is overlooked in Sylvester’s analysis of similarities between the US police security response to the Boston marathon bombings (2013) and Kevin Powers’ fictionalized account of the US war operations in Al Tafar, Iraq (2004) and evaluates the consequences for our understanding of contemporary war. This is done by highlighting differences between the experience of residents in Boston and the (real) town of Tal Afar, key among them the insecurity, fear and calamity that result from the distinct political realities in these locations. The experience of war from the perspective of the victims adds an important dimension to the debate over the changing nature of war. At a time that is marked by an unprecedented level of technologization and visual mediation, it brings into focus the fragmentary and often one-sided evidence on which our knowledge of contemporary war is based. It reminds us to ask not only what we know about war, but how we know it.