999 resultados para reactive security
Resumo:
This article tells about the relationship between resource politics and security in international relations. Using the Mekong River Basin as its case study, the article examines the place of resource and development issues in attempts to develop regional institutions. The question of whether a resource development regime with apparently low productivity in terms of technical output, but high levels of resilience and longevity, should be considered a failure or not, is considered. This question is examined within the broader context of Southeast Asian politics during the First, Second, and Third Indochina conflicts as well as the post-cold war era. The article argues that survival and a capacity to change to meet the challenges of extreme broader events are clear evidence of regime success. From this standpoint, the article explores ways in which the Mekong resource regime is linked to more general concerns for political security and stability and may in fact reflect political concerns for subregional neighborhood maintenance.
Resumo:
In this paper. we present the results of quantum dynamical simulations of the S (D-1) + H-2 insertion reaction on a newly developed potential energy surface (J. Chem. Phys. 2001, 114, 320). State-to-state reaction probabilities. product state distributions, and initial-state resolved cumulative reaction probabilities from a given incoming reactant channel are obtained from a time-independent wave packet analysis, performed within a single Lanczos subspace. Integral reaction cross sections are then estimated by J-shifting method and compared with the results from molecular beam experiment and QCT calculations.
Resumo:
In this paper we explore the relative performance of two recently developed wave packet methodologies for reactive scattering, namely the real wave packet Chebyshev domain propagation of Gray and Balint-Kurti [J. Chem. Phys. 108, 950 (1998)] and the Lanczos subspace wave packet approach of Smith [J. Chem. Phys. 116, 2354 (2002); Chem. Phys. Lett. 336, 149 (2001)]. In the former method, a modified Schrodinger equation is employed to propagate the real part of the wave packet via the well-known Chebyshev iteration. While the time-dependent wave packet from the modified Schrodinger equation is different from that obtained using the standard Schrodinger equation, time-to-energy Fourier transformation yields wave functions which differ only trivially by normalization. In the Lanczos subspace approach the linear system of equations defining the action of the Green operator may be solved via either time-dependent or time-independent methods, both of which are extremely efficient due to the simple tridiagonal structure of the Hamiltonian in the Lanczos representation. The two different wave packet methods are applied to three dimensional reactive scattering of H+O-2 (total J=0). State-to-state reaction probabilities, product state distributions, as well as initial-state-resolved cumulative reaction probabilities are examined. (C) 2002 American Institute of Physics.
Resumo:
Thomas & Tow's evaluation of the utility of human security is an important contribution to an ongoing debate about what security is and for whom security should be provided. In particular, the authors' engagement with the human security agenda is important given the centrality of this approach to recent attempts to rethink security. This article argues, however, that Thomas & Tow's approach to the human security agenda is problematic for two central reasons. First, their attempt to narrow security to make this approach amenable to state policymakers risks reifying the sources of insecurity for individuals everywhere. Second, the conception of human security they put forward appears largely inconsistent with the normative concerns inherent in the human security agenda.
Resumo:
The relations among measures of attachment, spouse behavior, and marital satisfaction were assessed in a broad sample of 193 married couples, using both questionnaire and diary methods. Insecure attachment was associated with less favorable reports of spouse behavior, as assessed by diary checklists. Marital satisfaction was predicted by attachment treasures and reports of spouse behavior. The relation between attachment security and marital satisfaction was moderated, but not mediated, by reported spouse behavior. Specifically, insecure individuals' evaluations of their relationships were more reactive to recent spouse behavior, an effect that was especially marked for fearful participants and for those in longer-term marriages. Some gender differences in patterns of prediction were obtained. The results are discussed in terms of the working models associated with attachment styles, and the processes by which relationship satisfaction may be eroded over time.
Resumo:
This article argues that nuclear weapons serve no useful purpose in military calculations; moreover, their continued retention invites the dangers of further proliferation and of accidental use. They are thus defined here as obstacles to, rather than as facilitators of, international security. Seven reasons are presented to support this contention, including an assessment of the moral implications and the strategic limitations of nuclear weapons. Despite these limitations, and the recent commitments made by the nuclear weapon states to eliminate their arsenals, nuclear weapons remain central to the strategic doctrines of these states. Several reasons are put forward to explain why this retention continues, including the unchanging nature of strategic mindsets, the presence of vested interests, and now, in the case of the USA at least, a renewed reliance on nuclear weapons, regardless of how appropriate and effective such a strategy might be against emerging terrorist or `rogue state' threats.
Resumo:
A new modeling approach-multiple mapping conditioning (MMC)-is introduced to treat mixing and reaction in turbulent flows. The model combines the advantages of the probability density function and the conditional moment closure methods and is based on a certain generalization of the mapping closure concept. An equivalent stochastic formulation of the MMC model is given. The validity of the closuring hypothesis of the model is demonstrated by a comparison with direct numerical simulation results for the three-stream mixing problem. (C) 2003 American Institute of Physics.
Resumo:
This investigation aimed to elucidate the relative roles of putative brevetoxins, reactive oxygen species and free fatty acids as the toxic principle of the raphidophyte Chattonella marina, using damselfish as the bioassay. Our investigations on Australian C. marina demonstrated an absence or only very low concentrations of brevetoxin-like compounds by radio-receptor binding assay and liquid chromatography-mass spectroscopy techniques. Chattonella is unique in its ability to produce levels of reactive oxygen species 100 times higher than most other algal species. However, high levels of superoxide on their own were found not to cause fish mortalities. Lipid analysis revealed this raphidophyte to contain high concentrations of the polyunsaturated fatty acid eicosapentaenoic acid (EPA; 18-23% of fatty acids), which has demonstrated toxic properties to marine organisms. Using damselfish as a model organism, we demonstrated that the free fatty acid (FFA) form of EPA produced a mortality and fish behavioural response similar to fish exposed to C. marina cells. This effect was not apparent when fish were exposed to other lipid fractions including a triglyceride containing fish oil, docosahexaenoate-enriched ethyl ester, or pure brevetoxin standards. The presence of superoxide together with low concentrations of EPA accelerated fish mortality rate threefold. We conclude that the enhancement of ichthyotoxicity of EPA in the presence of superoxide can account for the high C. marina fish killing potential. (C) 2003 Elsevier B.V All rights reserved.
Resumo:
The idea of “human security” is gaining attention among policy-makers and security analysts. Little scholarly attention has been given to the questions of why states accept (or reject) a human security agenda or how such an agenda is incorporated into policy practices. The article suggests that a human security approach is most likely to be applied when both humanitarian and national interests combine. Yet when states or organisations adopt a human security approach, they often misjudge the complex and long-term commitment required of such an approach. There is also the potential for such an agenda to be manipulated to justify questionable courses of action. These issues frame an analysis of six recent case studies.
Resumo:
This work discusses the use of optical flow to generate the sensorial information a mobile robot needs to react to the presence of obstacles when navigating in a non-structured environment. A sensing system based on optical flow and time-to-collision calculation is here proposed and experimented, which accomplishes two important paradigms. The first one is that all computations are performed onboard the robot, in spite of the limited computational capability available. The second one is that the algorithms for optical flow and time-to-collision calculations are fast enough to give the mobile robot the capability of reacting to any environmental change in real-time. Results of real experiments in which the sensing system here proposed is used as the only source of sensorial data to guide a mobile robot to avoid obstacles while wandering around are presented, and the analysis of such results allows validating the proposed sensing system.
Resumo:
This study explores the impact of Turkey's likely entry in the European Union (EU) in terms of the EU's foreign, security and defense policies. It reviews Turkish capabilities, namely its military capabilities, which could provide the EU with valuable defense assets. There are differences related to Turkey's relations with the EU, which have increasingly spilled over into the NATO, hindering the development of cooperation over crisis management operations. The article then delves in the implications of Turkey's strategic geographical location to EU policies. It reviews how far the EU and Turkey may have convergent interests in some of the neighboring regions, especially in the Middle East.