10 resultados para Insanity Defense.

em Digital Commons at Florida International University


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recent advances in electronic and computer technologies lead to wide-spread deployment of wireless sensor networks (WSNs). WSNs have wide range applications, including military sensing and tracking, environment monitoring, smart environments, etc. Many WSNs have mission-critical tasks, such as military applications. Thus, the security issues in WSNs are kept in the foreground among research areas. Compared with other wireless networks, such as ad hoc, and cellular networks, security in WSNs is more complicated due to the constrained capabilities of sensor nodes and the properties of the deployment, such as large scale, hostile environment, etc. Security issues mainly come from attacks. In general, the attacks in WSNs can be classified as external attacks and internal attacks. In an external attack, the attacking node is not an authorized participant of the sensor network. Cryptography and other security methods can prevent some of external attacks. However, node compromise, the major and unique problem that leads to internal attacks, will eliminate all the efforts to prevent attacks. Knowing the probability of node compromise will help systems to detect and defend against it. Although there are some approaches that can be used to detect and defend against node compromise, few of them have the ability to estimate the probability of node compromise. Hence, we develop basic uniform, basic gradient, intelligent uniform and intelligent gradient models for node compromise distribution in order to adapt to different application environments by using probability theory. These models allow systems to estimate the probability of node compromise. Applying these models in system security designs can improve system security and decrease the overheads nearly in every security area. Moreover, based on these models, we design a novel secure routing algorithm to defend against the routing security issue that comes from the nodes that have already been compromised but have not been detected by the node compromise detecting mechanism. The routing paths in our algorithm detour those nodes which have already been detected as compromised nodes or have larger probabilities of being compromised. Simulation results show that our algorithm is effective to protect routing paths from node compromise whether detected or not.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

It is often speculated that the high allocation of funds to retirement pension systems has influenced the capacity of Central American and Dominican Republic military to modernize. Yet, the comparative study of the allocation of pension and social funds in these particular countries suggest that there is not direct linkage between the poor funding of military modernization plans and the allocation of funds to military pension systems. The research conducted on this subject shows the following results: 1. The Dominican Republic is the only country that has embarked on a considerable procurement of modern equipment and still reports the largest proportion of social expenditures. 2. El Salvador’s defense budget allocates minimal funding to Social Welfare Institute, which as alternative sources of funding. In 2009, El Salvador increased 15 percent funding to the military to respond to increased role in domestic security issues. 3. The Guatemalan defense expenditure on social programs is fairly low, but it has grown during the past six years due to processes of demobilization. However, the Military Social Welfare Institute is administered by a decentralized institution funded directly by the Ministry of Finance. If it were to be considered as a part of the defense budget, its social expenses would account for almost 16% of it. 4. The Honduran Defense Budget has faced a considerable enlargement during the past four years, with social spending expenses taken precedence over modernization efforts. 2 5. The Nicaraguan system of military pensions is administered by a decentralized entity (IPSM) through a system of salary deductions. Information on the funding of this entity is inconclusive. The Nicaraguan Defense spending on social services has reported a drastic 90% drop since the year 2007.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Andean and the amazon, comprised of Venezuela, Colombia, Bolivia, Peru and Ecuador, have recently undertaken significant modernization efforts ranging from equipment, logistics, doctrine, training, deployment and the re-definition of the roles and missions of their forces. In most cases, motivations to modernize have been internal, such as continuing operations against armed groups as in the case of Colombia and Peru, enhance border control and sovereignty enforcement, as in the case of Ecuador and Brazil or regime control in Venezuela. However, they are complemented by perceptions of external threats, including traditional intra-state conventional wars. The increased tensions between Colombia and Venezuela and Ecuador as well as the historic Peru-Chile tensions are the most salient examples. Although diplomacy –especially defence diplomacy- has worked to a good degree in creating and strengthening confidence building measures, the potential for inter-state conflict is higher in this region of the Americas. This region has seen the recent emergence of long-term modernization plans, initially in Colombia followed by Venezuela and Ecuador and probably best embodied in scope and scale by the Brazilian National Defence Plan (for its long term vision). Although it has been speculated that high allocation of funds to retirement pension systems has had an impact on delaying modernization plans, this comparative study on the allocation of pension and social funds in these particular countries concludes that there is no direct linkage between the poor funding of military modernization plans and the diversion of funds to military pension systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Since the end of the Cold War, Japan's defense policy and politics has gone through significant changes. Throughout the post cold war period, US-Japan alliance managers, politicians with differing visions and preferences, scholars, think tanks, and the actions of foreign governments have all played significant roles in influencing these changes. Along with these actors, the Japanese prime minister has played an important, if sometimes subtle, role in the realm of defense policy and politics. Japanese prime ministers, though significantly weaker than many heads of state, nevertheless play an important role in policy by empowering different actors (bureaucratic actors, independent commissions, or civil actors), through personal diplomacy, through agenda-setting, and through symbolic acts of state. The power of the prime minister to influence policy processes, however, has frequently varied by prime minister. My dissertation investigates how different political strategies and entrepreneurial insights by the prime minister have influenced defense policy and politics since the end of the Cold War. In addition, it seeks to explain how the quality of political strategy and entrepreneurial insight employed by different prime ministers was important in the success of different approaches to defense. My dissertation employs a comparative case study approach to examine how different prime ministerial strategies have mattered in the realm of Japanese defense policy and politics. Three prime ministers have been chosen: Prime Minister Hashimoto Ryutaro (1996-1998); Prime Minister Koizumi Junichiro (2001-2006); and Prime Minister Hatoyama Yukio (2009-2010). These prime ministers have been chosen to provide maximum contrast on issues of policy preference, cabinet management, choice of partners, and overall strategy. As my dissertation finds, the quality of political strategy has been an important aspect of Japan's defense transformation. Successful strategies have frequently used the knowledge and accumulated personal networks of bureaucrats, supplemented bureaucratic initiatives with top-down personal diplomacy, and used a revitalized US-Japan strategic relationship as a political resource for a stronger prime ministership. Though alternative approaches, such as those that have looked to displace the influence of bureaucrats and the US in defense policy, have been less successful, this dissertation also finds theoretical evidence that alternatives may exist.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The South American Defense Council (CSD), created in March 2009 as a military coordinating body of the Union of South American Nations (UNASUR) demonstrates a growing trend among Latin American countries to approach matters of regional security independent of the United States. The CSD also indicates a maturation of democratic civil military relations in a region once dominated by authoritarian military regimes. The CSD aims to facilitate the exchange of information about regional defense policies, promote collaboration for disaster relief, and promote civil-military engagement. In less than a year it is hardly a tested entity, but the presence of 12 South American states coming together around security policy marks an important moment in the evolution of civil-military relations in the region. Brazil has taken on an important leadership role in the CSD, acting as a leader in recent regional peacekeeping efforts. As a geopolitical move, Brazil also sees a benefit in promoting good relationships with all countries of South america, given its common border with nine of them. Although the United States is not a member of the CSD, the organization's agenda of infromation exchange of defense policies, military cooperation, and capacity building, including disaster assistance and preparedness provide opportunities for greater collaboration. The CSD is not part of the Inter-American System created after the Second World War. It is unclear how its work will coincide with the OAS Committee on Hemispheric Security or its Secretariat for Multidimensional Security. The U.S. should view the CSD as a mechanism to promote joint initiatives that encourage democratic governance in the region.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recent advances in electronic and computer technologies lead to wide-spread deployment of wireless sensor networks (WSNs). WSNs have wide range applications, including military sensing and tracking, environment monitoring, smart environments, etc. Many WSNs have mission-critical tasks, such as military applications. Thus, the security issues in WSNs are kept in the foreground among research areas. Compared with other wireless networks, such as ad hoc, and cellular networks, security in WSNs is more complicated due to the constrained capabilities of sensor nodes and the properties of the deployment, such as large scale, hostile environment, etc. Security issues mainly come from attacks. In general, the attacks in WSNs can be classified as external attacks and internal attacks. In an external attack, the attacking node is not an authorized participant of the sensor network. Cryptography and other security methods can prevent some of external attacks. However, node compromise, the major and unique problem that leads to internal attacks, will eliminate all the efforts to prevent attacks. Knowing the probability of node compromise will help systems to detect and defend against it. Although there are some approaches that can be used to detect and defend against node compromise, few of them have the ability to estimate the probability of node compromise. Hence, we develop basic uniform, basic gradient, intelligent uniform and intelligent gradient models for node compromise distribution in order to adapt to different application environments by using probability theory. These models allow systems to estimate the probability of node compromise. Applying these models in system security designs can improve system security and decrease the overheads nearly in every security area. Moreover, based on these models, we design a novel secure routing algorithm to defend against the routing security issue that comes from the nodes that have already been compromised but have not been detected by the node compromise detecting mechanism. The routing paths in our algorithm detour those nodes which have already been detected as compromised nodes or have larger probabilities of being compromised. Simulation results show that our algorithm is effective to protect routing paths from node compromise whether detected or not.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This dissertation analyzes both the economics of the defense contracting process and the impact of total dollar obligations on the economies of U.S. states. Using various econometric techniques, I will estimate relationships across individual contracts, state level output, and income inequality. I will achieve this primarily through the use of a dataset on individual contract obligations. ^ The first essay will catalog the distribution of contracts and isolate aspects of the process that contribute to contract dollar obligations. Accordingly, this study describes several characteristics about individual defense contracts, from 1966-2006: (i) the distribution of contract dollar obligations is extremely rightward skewed, (ii) contracts are unevenly distributed in a geographic sense across the United States, (iii) increased duration of a contract by 10 percent is associated with an increase in costs by 4 percent, (iv) competition does not seem to affect dollar obligations in a substantial way, (v) contract pre-payment financing increases the obligation of contracts from anywhere from 62 to 380 percent over non-financed contracts. ^ The second essay will turn to an aggregate focus, and look the impact of defense spending on state economic output. The analysis in chapter two attempts to estimate the state level fiscal multiplier, deploying Difference-in-Differences estimation as an attempt to filter out potential endogeneity bias. Interstate variation in procurement spending facilitates utilization of a natural experiment scenario, focusing on the spike in relative spending in 1982. The state level relative multiplier estimate here is 1.19, and captures the short run, impact effect of the 1982 spending spike. ^ Finally I will look at the relationship between defense contracting and income inequality. Military spending has typically been observed to have a negative relationship with income inequality. The third chapter examines the existence of this relationship, combining data on defense procurement with data on income inequality at the state level, in a longitudinal analysis across the United States. While the estimates do not suggest a significant relationship exists for the income share of the top ten percent of households, there is a significant positive relationship for the income share of top one percent households for an increase in defense procurement.^

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This dissertation analyzes both the economics of the defense contracting process and the impact of total dollar obligations on the economies of U.S. states. Using various econometric techniques, I will estimate relationships across individual contracts, state level output, and income inequality. I will achieve this primarily through the use of a dataset on individual contract obligations. The first essay will catalog the distribution of contracts and isolate aspects of the process that contribute to contract dollar obligations. Accordingly, this study describes several characteristics about individual defense contracts, from 1966-2006: (i) the distribution of contract dollar obligations is extremely rightward skewed, (ii) contracts are unevenly distributed in a geographic sense across the United States, (iii) increased duration of a contract by 10 percent is associated with an increase in costs by 4 percent, (iv) competition does not seem to affect dollar obligations in a substantial way, (v) contract pre-payment financing increases the obligation of contracts from anywhere from 62 to 380 percent over non-financed contracts. The second essay will turn to an aggregate focus, and look the impact of defense spending on state economic output. The analysis in chapter two attempts to estimate the state level fiscal multiplier, deploying Difference-in-Differences estimation as an attempt to filter out potential endogeneity bias. Interstate variation in procurement spending facilitates utilization of a natural experiment scenario, focusing on the spike in relative spending in 1982. The state level relative multiplier estimate here is 1.19, and captures the short run, impact effect of the 1982 spending spike. Finally I will look at the relationship between defense contracting and income inequality. Military spending has typically been observed to have a negative relationship with income inequality. The third chapter examines the existence of this relationship, combining data on defense procurement with data on income inequality at the state level, in a longitudinal analysis across the United States. While the estimates do not suggest a significant relationship exists for the income share of the top ten percent of households, there is a significant positive relationship for the income share of top one percent households for an increase in defense procurement.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Since the end of the Cold War, Japan’s defense policy and politics has gone through significant changes. Throughout the post cold war period, US-Japan alliance managers, politicians with differing visions and preferences, scholars, think tanks, and the actions of foreign governments have all played significant roles in influencing these changes. Along with these actors, the Japanese prime minister has played an important, if sometimes subtle, role in the realm of defense policy and politics. Japanese prime ministers, though significantly weaker than many heads of state, nevertheless play an important role in policy by empowering different actors (bureaucratic actors, independent commissions, or civil actors), through personal diplomacy, through agenda-setting, and through symbolic acts of state. The power of the prime minister to influence policy processes, however, has frequently varied by prime minister. My dissertation investigates how different political strategies and entrepreneurial insights by the prime minister have influenced defense policy and politics since the end of the Cold War. In addition, it seeks to explain how the quality of political strategy and entrepreneurial insight employed by different prime ministers was important in the success of different approaches to defense. My dissertation employs a comparative case study approach to examine how different prime ministerial strategies have mattered in the realm of Japanese defense policy and politics. Three prime ministers have been chosen: Prime Minister Hashimoto Ryutaro (1996-1998); Prime Minister Koizumi Junichiro (2001-2006); and Prime Minister Hatoyama Yukio (2009-2010). These prime ministers have been chosen to provide maximum contrast on issues of policy preference, cabinet management, choice of partners, and overall strategy. As my dissertation finds, the quality of political strategy has been an important aspect of Japan’s defense transformation. Successful strategies have frequently used the knowledge and accumulated personal networks of bureaucrats, supplemented bureaucratic initiatives with top-down personal diplomacy, and used a revitalized US-Japan strategic relationship as a political resource for a stronger prime ministership. Though alternative approaches, such as those that have looked to displace the influence of bureaucrats and the US in defense policy, have been less successful, this dissertation also finds theoretical evidence that alternatives may exist.