Spelling suggestions: "subject:"covert"" "subject:"povert""
121 |
Hardware-Aided Approaches for Unconditional Confidentiality and AuthenticationBendary, Ahmed January 2021 (has links)
No description available.
|
122 |
Killing Terrorists - Armed Drones and the Ethics of WarLundquist, Joel January 2014 (has links)
The aim of this thesis is to answer the question whether the U.S. policy on targeted killings with combat drones is compatible with the legal doctrine of just war theory, applicable international law, and human rights law. Moreover, this paper intends to examine the legal issues arising from the U.S. practice of international law in relation to the justification of targeted killings. The purpose of this thesis is to determine whether the practice of targeted killings can be considered lawful and, if not, to provide knowledge about how the method violates applicable international law and the ethics of war. The focus is placed on relevant treaties and customary international law, and just war theory is used as a theoretical complement to explain the meaning and purpose of selected laws in order to determine their applicability to the research problem. Furthermore, this procedure has been conducted by using a legal method to identify the legal problem and interpret relevant sources of law in order to determine their applicability to the research problem. The thesis has determined that the U.S. policy on targeted killings with combat drones is not consistent with applicable international law and fundamental human rights law. In particular, the practice of targeted killings violates the principle of distinction.
|
123 |
Resource Allocation on Networks: Nested Event Tree Optimization, Network Interdiction, and Game Theoretic MethodsLunday, Brian Joseph 08 April 2010 (has links)
This dissertation addresses five fundamental resource allocation problems on networks, all of which have applications to support Homeland Security or industry challenges. In the first application, we model and solve the strategic problem of minimizing the expected loss inflicted by a hostile terrorist organization. An appropriate allocation of certain capability-related, intent-related, vulnerability-related, and consequence-related resources is used to reduce the probabilities of success in the respective attack-related actions, and to ameliorate losses in case of a successful attack. Given the disparate nature of prioritizing capital and material investments by federal, state, local, and private agencies to combat terrorism, our model and accompanying solution procedure represent an innovative, comprehensive, and quantitative approach to coordinate resource allocations from various agencies across the breadth of domains that deal with preventing attacks and mitigating their consequences. Adopting a nested event tree optimization framework, we present a novel formulation for the problem as a specially structured nonconvex factorable program, and develop two branch-and-bound schemes based respectively on utilizing a convex nonlinear relaxation and a linear outer-approximation, both of which are proven to converge to a global optimal solution. We also investigate a fundamental special-case variant for each of these schemes, and design an alternative direct mixed-integer programming model representation for this scenario. Several range reduction, partitioning, and branching strategies are proposed, and extensive computational results are presented to study the efficacy of different compositions of these algorithmic ingredients, including comparisons with the commercial software BARON. The developed set of algorithmic implementation strategies and enhancements are shown to outperform BARON over a set of simulated test instances, where the best proposed methodology produces an average optimality gap of 0.35% (compared to 4.29% for BARON) and reduces the required computational effort by a factor of 33. A sensitivity analysis is also conducted to explore the effect of certain key model parameters, whereupon we demonstrate that the prescribed algorithm can attain significantly tighter optimality gaps with only a near-linear corresponding increase in computational effort. In addition to enabling effective comprehensive resource allocations, this research permits coordinating agencies to conduct quantitative what-if studies on the impact of alternative resourcing priorities.
The second application is motivated by the author's experience with the U.S. Army during a tour in Iraq, during which combined operations involving U.S. Army, Iraqi Army, and Iraqi Police forces sought to interdict the transport of selected materials used for the manufacture of specialized types of Improvised Explosive Devices, as well as to interdict the distribution of assembled devices to operatives in the field. In this application, we model and solve the problem of minimizing the maximum flow through a network from a given source node to a terminus node, integrating different forms of superadditive synergy with respect to the effect of resources applied to the arcs in the network. Herein, the superadditive synergy reflects the additional effectiveness of forces conducting combined operations, vis-Ã -vis unilateral efforts. We examine linear, concave, and general nonconcave superadditive synergistic relationships between resources, and accordingly develop and test effective solution procedures for the underlying nonlinear programs. For the linear case, we formulate an alternative model representation via Fourier-Motzkin elimination that reduces average computational effort by over 40% on a set of randomly generated test instances. This test is followed by extensive analyses of instance parameters to determine their effect on the levels of synergy attained using different specified metrics. For the case of concave synergy relationships, which yields a convex program, we design an inner-linearization procedure that attains solutions on average within 3% of optimality with a reduction in computational effort by a factor of 18 in comparison with the commercial codes SBB and BARON for small- and medium-sized problems; and outperforms these softwares on large-sized problems, where both solvers failed to attain an optimal solution (and often failed to detect a feasible solution) within 1800 CPU seconds. Examining a general nonlinear synergy relationship, we develop solution methods based on outer-linearizations, inner-linearizations, and mixed-integer approximations, and compare these against the commercial software BARON. Considering increased granularities for the outer-linearization and mixed-integer approximations, as well as different implementation variants for both these approaches, we conduct extensive computational experiments to reveal that, whereas both these techniques perform comparably with respect to BARON on small-sized problems, they significantly improve upon the performance for medium- and large-sized problems. Our superlative procedure reduces the computational effort by a factor of 461 for the subset of test problems for which the commercial global optimization software BARON could identify a feasible solution, while also achieving solutions of objective value 0.20% better than BARON.
The third application is likewise motivated by the author's military experience in Iraq, both from several instances involving coalition forces attempting to interdict the transport of a kidnapping victim by a sectarian militia as well as, from the opposite perspective, instances involving coalition forces transporting detainees between interment facilities. For this application, we examine the network interdiction problem of minimizing the maximum probability of evasion by an entity traversing a network from a given source to a designated terminus, while incorporating novel forms of superadditive synergy between resources applied to arcs in the network. Our formulations examine either linear or concave (nonlinear) synergy relationships. Conformant with military strategies that frequently involve a combination of overt and covert operations to achieve an operational objective, we also propose an alternative model for sequential overt and covert deployment of subsets of interdiction resources, and conduct theoretical as well as empirical comparative analyses between models for purely overt (with or without synergy) and composite overt-covert strategies to provide insights into absolute and relative threshold criteria for recommended resource utilization.
In contrast to existing static models, in a fourth application, we present a novel dynamic network interdiction model that improves realism by accounting for interactions between an interdictor deploying resources on arcs in a digraph and an evader traversing the network from a designated source to a known terminus, wherein the agents may modify strategies in selected subsequent periods according to respective decision and implementation cycles. We further enhance the realism of our model by considering a multi-component objective function, wherein the interdictor seeks to minimize the maximum value of a regret function that consists of the evader's net flow from the source to the terminus; the interdictor's procurement, deployment, and redeployment costs; and penalties incurred by the evader for misperceptions as to the interdicted state of the network. For the resulting minimax model, we use duality to develop a reformulation that facilitates a direct solution procedure using the commercial software BARON, and examine certain related stability and convergence issues. We demonstrate cases for convergence to a stable equilibrium of strategies for problem structures having a unique solution to minimize the maximum evader flow, as well as convergence to a region of bounded oscillation for structures yielding alternative interdictor strategies that minimize the maximum evader flow. We also provide insights into the computational performance of BARON for these two problem structures, yielding useful guidelines for other research involving similar non-convex optimization problems.
For the fifth application, we examine the problem of apportioning railcars to car manufacturers and railroads participating in a pooling agreement for shipping automobiles, given a dynamically determined total fleet size. This study is motivated by the existence of such a consortium of automobile manufacturers and railroads, for which the collaborative fleet sizing and efforts to equitably allocate railcars amongst the participants are currently orchestrated by the \textit{TTX Company} in Chicago, Illinois. In our study, we first demonstrate potential inequities in the industry standard resulting either from failing to address disconnected transportation network components separately, or from utilizing the current manufacturer allocation technique that is based on average nodal empty transit time estimates. We next propose and illustrate four alternative schemes to apportion railcars to manufacturers, respectively based on total transit time that accounts for queuing; two marginal cost-induced methods; and a Shapley value approach. We also provide a game-theoretic insight into the existing procedure for apportioning railcars to railroads, and develop an alternative railroad allocation scheme based on capital plus operating costs. Extensive computational results are presented for the ten combinations of current and proposed allocation techniques for automobile manufacturers and railroads, using realistic instances derived from representative data of the current business environment. We conclude with recommendations for adopting an appropriate apportionment methodology for implementation by the industry. / Ph. D.
|
124 |
The Representation of Ethiopian politics in selected Amharic novels, 1930 - 2010Anteneh Aweke Ewnetu 07 1900 (has links)
Amharic literature has always occupied an important place in the history of the literary traditions of Ethiopia. Although this literature is believed to be strongly related to the politics of the country, there has
been no study that proves this claim across the different political periods in the country. It would be ambitious to deal with all the literary genres in this respect. Therefore, delimiting the investigation of the problem is considered to be useful to filling the knowledge gap. Accordingly, this comparative research which investigates a representation of Ethiopian politics in selected Amharic novels across three political periods: 1930 – 2010 was designed.
The objective of the research is to investigate the representation of Ethiopian politics in selected Amharic novels. The basic research question focuses on how these representations can be explained. An eclectic theoretical approach (the New Historicism, Bourdieu’s System Theory and the Critical Discourse Analysis) is employed to understand the representations. The main method of data collection focuses on a close reading of non-literary and literary texts. A purposive sampling technique is used to select the sample novels as the technique allows to select those that yield the most relevant data using some criteria.
Based on the criteria set, sixteen novels are selected. The manners in which the political events represented in the novels are examined using different parameters. The parameters also look into the
methods used in representing the political events and the time in which the events were represented, i.e. whether they are represented contemporarily, post-contemporarily or before the actual happening of the event. Having read the novels critically, the political events that took place in the three respective states are identified, analyzed and interpreted. The analysis mainly shows that different novels represented the political events in different manners: lightly or deeply, overtly or covertly, positively or negatively, contemporaneously or post-contemporaneously. Regarding the ‘how’ of the representations, it is observed that the critical novels, for instance, Alïwälädïm and Adäfrïs are covert and use symbols, direct and indirect allusions and other figures of speeches, and other techniques including turn taking, and size of dialogues to achieve their goals. Some political events are found to be either under-represented or totally un-represented in the novels. In some cases, same political events are represented differently in different novels at different times. Some novels that criticized the political events of the governments contemporaneously have been removed from market, republished in the political period that followed and exploited by the emerging government for its political end.
There are some patterns observed in the analyses and interpretations of the politics in the novels. One of the patterns is that sharp criticisms on the events of an earlier political period are usually reflected in novels published in a new period. The critique novels of the Haileselassie government, for instance, Maïbäl Yabïyot Wazema, were published during the Darg period, and those that were critical of the Darg government, for instance, Anguz, were published in the EPRDF period. Another pattern observed is that there is no novel that praises a past regime, even despite being critical of a contemporary government. No novel written during the Darg period admired the Haileselassie period; and no novel written during the EPRDF period appreciated the Darg period.
There are cases in which novelists who were critical of the contemporary Haileselassie and Darg periods, for instance, Abe and Bealu, respectively, ended up in detention or just disappeared and their novels, Alïwälädïm and Oromay, respecitely were banned from being circulated. Unlike the two previous political periods, the critique novels of the EPRDF period, for instance Dertogada, Ramatohara, and Yäburqa Zïmïta, have been published, or even republished, several times. Novels written during the Haileselassie period, such as Alïwälädïm, which were critical of the respective contemporary period, made their criticism covertly, using probes and imaginary settings and characters, while the critique novels of the EPRDF period, criticize overtly, and boldly. Generally, it could be concluded that the novels had the power to reflect history, and show human and class relationships implicitly, through the interactions of characters, story developments, and plot constructions, and the impact that politics has on the literature, and the influence of literature on politics. / Classics and World Languages / D. Phil. (Theory of Literature)
|
125 |
The effects of anxiety on visual attention for emotive stimuli in primary school childrenKelly, Lauren January 2014 (has links)
Anxiety can be advantageous in terms of survival and well-being, yet atypically high levels may be maladaptive and result in the clinical diagnosis of an anxiety disorder. Several risk factors have been implicated in the manifestation of clinical anxiety, including cognitive biases. In recent years, a plethora of research has emerged demonstrating that anxious adults exhibit biases of attention for threatening stimuli, especially that which is biologically relevant (e.g., facial expressions). Specific components of attentional bias have also been identified, namely facilitated engagement, impaired disengagement, and avoidance. However, the majority of studies have focused on the spatial domain of attention. Furthermore, the area is under-researched in children, despite research demonstrating that symptoms relating to clinical and non-clinical anxiety follow a stable course from childhood through to adolescence and adulthood. Consequently, the aim of this thesis was to investigate how anxiety affects children’s visual attention for emotive, particularly angry, faces. In order to provide a more comprehensive understanding, the current research involved examining the role of temporal and spatial attention utilising rapid serial visual presentation with the attentional blink, and the visual probe paradigm, respectively. The main hypothesis was that high state and/or trait anxiety would be associated with an attentional bias for angry, relative to positive or neutral faces in both the temporal and spatial domains. In relation to the temporal domain, key findings demonstrated that high levels of trait anxiety were associated with facilitated engagement towards both angry and neutral faces. It was further found that all children rapidly disengaged attention away from angry faces. Findings related to the processing of angry faces accorded with the main hypothesis stated in this thesis, as well as research and theory in the area. The finding that anxious children preferentially processed neutral faces in an attentional blink investigation was unexpected. This was argued to potentially reflect this stimulus type being interpreted as threatening. Key findings regarding the spatial domain were that high trait anxious children displayed an early covert bias of attention away from happy faces and a later, overt bias of attention away from angry faces. The finding that high trait anxiety was linked to an attentional bias away from happy faces in a visual probe task was also unexpected. This was argued to potentially reflect smiling faces being interpreted as signifying social dominance, thus resulting in the viewer experiencing feelings of subordination and becoming avoidant and/or submissive. To conclude, this thesis has enhanced current knowledge of attentional bias in both the temporal and spatial domains for emotive stimuli in anxious children. It has demonstrated that higher levels of trait anxiety moderate children’s allocation of attentional resources to different stimulus types, whether these are threatening, positive, or neutral. This has important implications for evaluating past research in adults and children, and for further developing theoretical models of attentional bias and anxiety. It also offers important clinical implications, since attending towards or away from specific stimuli may affect the development and maintenance of anxiety disorders. Recently, a treatment that aims to modify attentional bias in anxious individuals has begun to be developed. In light of the present findings, it may be necessary to review this treatment so that anxious children are re-trained in the specific biases of attention demonstrated here.
|
126 |
The Representation of Ethiopian politics in selected Amharic novels, 1930 - 2010Anteneh Aweke Ewnetu 07 1900 (has links)
Amharic literature has always occupied an important place in the history of the literary traditions of Ethiopia. Although this literature is believed to be strongly related to the politics of the country, there has
been no study that proves this claim across the different political periods in the country. It would be ambitious to deal with all the literary genres in this respect. Therefore, delimiting the investigation of the problem is considered to be useful to filling the knowledge gap. Accordingly, this comparative research which investigates a representation of Ethiopian politics in selected Amharic novels across three political periods: 1930 – 2010 was designed.
The objective of the research is to investigate the representation of Ethiopian politics in selected Amharic novels. The basic research question focuses on how these representations can be explained. An eclectic theoretical approach (the New Historicism, Bourdieu’s System Theory and the Critical Discourse Analysis) is employed to understand the representations. The main method of data collection focuses on a close reading of non-literary and literary texts. A purposive sampling technique is used to select the sample novels as the technique allows to select those that yield the most relevant data using some criteria.
Based on the criteria set, sixteen novels are selected. The manners in which the political events represented in the novels are examined using different parameters. The parameters also look into the
methods used in representing the political events and the time in which the events were represented, i.e. whether they are represented contemporarily, post-contemporarily or before the actual happening of the event. Having read the novels critically, the political events that took place in the three respective states are identified, analyzed and interpreted. The analysis mainly shows that different novels represented the political events in different manners: lightly or deeply, overtly or covertly, positively or negatively, contemporaneously or post-contemporaneously. Regarding the ‘how’ of the representations, it is observed that the critical novels, for instance, Alïwälädïm and Adäfrïs are covert and use symbols, direct and indirect allusions and other figures of speeches, and other techniques including turn taking, and size of dialogues to achieve their goals. Some political events are found to be either under-represented or totally un-represented in the novels. In some cases, same political events are represented differently in different novels at different times. Some novels that criticized the political events of the governments contemporaneously have been removed from market, republished in the political period that followed and exploited by the emerging government for its political end.
There are some patterns observed in the analyses and interpretations of the politics in the novels. One of the patterns is that sharp criticisms on the events of an earlier political period are usually reflected in novels published in a new period. The critique novels of the Haileselassie government, for instance, Maïbäl Yabïyot Wazema, were published during the Darg period, and those that were critical of the Darg government, for instance, Anguz, were published in the EPRDF period. Another pattern observed is that there is no novel that praises a past regime, even despite being critical of a contemporary government. No novel written during the Darg period admired the Haileselassie period; and no novel written during the EPRDF period appreciated the Darg period.
There are cases in which novelists who were critical of the contemporary Haileselassie and Darg periods, for instance, Abe and Bealu, respectively, ended up in detention or just disappeared and their novels, Alïwälädïm and Oromay, respecitely were banned from being circulated. Unlike the two previous political periods, the critique novels of the EPRDF period, for instance Dertogada, Ramatohara, and Yäburqa Zïmïta, have been published, or even republished, several times. Novels written during the Haileselassie period, such as Alïwälädïm, which were critical of the respective contemporary period, made their criticism covertly, using probes and imaginary settings and characters, while the critique novels of the EPRDF period, criticize overtly, and boldly. Generally, it could be concluded that the novels had the power to reflect history, and show human and class relationships implicitly, through the interactions of characters, story developments, and plot constructions, and the impact that politics has on the literature, and the influence of literature on politics. / Classics and World Languages / D. Phil. (Theory of Literature)
|
127 |
Baby boxy - etická dilemata plošného zavádění schránek na odkládání dětí v ČR / Ethical dilemmas of babyboxes for abandoned children in the Czech republicChvílová Weberová, Magdalena January 2014 (has links)
UNIVERZITA KARLOVA V PRAZE KATOLICKÁ TEOLOGICKÁ FAKULTA Katedra Teologické etiky a spirituální teologie Magdalena Chvílová Weberová Baby boxy - etická dilemata plošného zavádění schránek na odkládání dětí v ČR Diplomová práce Vedoucí práce: MUDr. ThLic. Jaromír Matějek, PhD., Th.D. Konzultant: MUDr. František Schneiberg Praha 2014 Prohlášení 1. Prohlašuji, že jsem předkládanou práci zpracovala samostatně a použila jen uvedené prameny a literaturu. 2. Prohlašuji, že práce nebyla využita k získání jiného titulu. 3. Souhlasím s tím, aby práce byla zpřístupněna pro studijní a výzkumné účely. V Havlíčkově Brodě, dne 3. 12. 2013 Magdalena Chvílová Weberová Bibliografická citace Babyboxy - etická dilemata plošného zavádění schránek na odkládání dětí v ČR [rukopis]: Diplomová práce /Magdalena Chvílová Weberová vedoucí práce: MUDr. ThLic. Jaromír Matějek, Ph.D., Th.D. Praha, 2014 --184 s. -- Abstract Baby box is a box for anonymous postponement of unwanted newborns. The existence of baby boxes is being justified by it is declared purpose - saving human lives. Newborn's life is highest good and even just delivered newborn is a bearer of human rights. The work discusses the claim of saving the life of the newborn within the context of the best interests of the child and within the context of the incidence of...
|
128 |
Rhetoric or reality : US counterinsurgency policy reconsideredTodd, Maurice L. January 2015 (has links)
This study explores the foundations of US counterinsurgency policy and doctrine in order to better understand the main historical influences on that policy and doctrine and how those influences have informed the current US approach to counterinsurgency. The results of this study indicate the US experience in counterinsurgency during the Greek Civil War and the Huk Rebellion in the Philippines had a significant influence on the development of US counterinsurgency policy and doctrine following World War II through the Kennedy presidency. In addition, despite a major diversion from the lessons of Greece and the Philippines during the Vietnam War, the lessons were re-institutionalized in US counterinsurgency policy and doctrine following the war and continue to have significant influence today, though in a highly sanitized and, therefore, misleading form. As a result, a major disconnect has developed between the “rhetoric and reality” of US counterinsurgency policy. This disconnect has resulted from the fact that many references that provide a more complete and accurate picture of the actual policies and actions taken to successfully defeat the insurgencies have remained out of the reach of non-government researchers and the general public. Accordingly, many subsequent studies of counterinsurgency overlook, or only provide a cursory treatment of, aspects that may have had a critical impact on the success of past US counterinsurgency operations. One such aspect is the role of US direct intervention in the internal affairs of a supported country. Another is the role of covert action operations in support of counterinsurgency operations. As a result, the counterinsurgency policies and doctrines that have been developed over the years are largely based on false assumptions, a flawed understanding of the facts, and a misunderstanding of the contexts concerning the cases because of misleading, or at least seriously incomplete, portrayals of the counterinsurgency operations.
|
129 |
Trade follows Hallstein?Gülstorff, Torben 04 November 2016 (has links)
Die deutsche Außenpolitik zur Zeit des Kalten Krieges stellt in historischer wie politikwissenschaftlicher Hinsicht einen Gegenstand dar, der mit gutem Gewissen als wissenschaftlich erschlossen bezeichnet werden kann. Zahlreiche Aufsätze, Artikel und Bücher sind in den vergangenen Jahrzehnten erschienen, welche die deutsche Außenpolitik in Europa, Afrika, Asien, Ozeanien, Amerika, oder auch gleich der Welt als Ganzem, in den Blick genommen haben. Dies gilt sowohl für die Außenpolitik der Bundesrepublik Deutschland als auch für diejenige der Deutschen Demokratischen Republik. Früh – wenn nicht sogar von Beginn an – kam hierbei eine zentrale These, eine Kernthese, zum Vorschein, die, ohne auf Widerstand zu stoßen, Eingang in den historischen und politikwissenschaftlichen Forschungskanon fand und ihn bereits nach kurzer Zeit zu dominieren begann. Die Rede ist von der die deutschen Auslandsaktivitäten angeblich bestimmenden Hallstein-Doktrin und dem mit ihr in engem Zusammenhang stehenden deutsch-deutschen Gegensatz. In dieser Arbeit wird dieser Kernthese, diesem ''Mythos'' der deutschen Außenpolitik, vehement widersprochen. Weder die Hallstein-Doktrin, noch der deutsch-deutsche Gegensatz, sondern nationale ökonomische und internationale geostrategische Interessen haben die deutsche Außenpolitik – und darüber hinaus auch die gesamten deutschen Auslandsaktivitäten, der BRD wie der DDR – maßgeblich bestimmt. Zur Stützung dieser Gegenthese werden in der vorliegenden Studie die staatlichen, wirtschaftlichen und gesellschaftlichen Aktivitäten West- und Ostdeutschlands in neun zentralafrikanischen Staaten zwischen 1945 und 1975 kritisch dargelegt, umfassend analysiert und im Hinblick auf mehrere zentrale Thesen zu den deutschen Auslandsaktivitäten ausgewertet. / For decades articles and books have been published on the history of German foreign policy during Cold War. Regardless of whether Europe, Africa, Asia, Oceania, America or the world as a whole, the foreign affairs of the Western Federal Republic of Germany and the Eastern German Democratic Republic have been researched and analysed in context of a broad variety of locations. However, even though the list of publications continues to grow, the topic''s theses–especially its main thesis–do not show much progress. Already at an early stage, a central thesis–a core thesis–came to light, met no resistance and entered history''s and political science''s research canons on German foreign policy. This thesis reads: Inner German issues and the non-solved German question were so powerful, they dominated West and East German foreign affairs nearly right from the start. German foreign policy, that was the so-called Hallstein doctrine, that was the so-called German-German contradiction. And all studies–whether of history or political science, whether designed as a case study or as a global approach–confirm this thesis, use it as an integral part of their work–until today. But be that as it may. This study contradicts this thesis, this ''myth'' of German foreign policy. Instead it argues that neither the Hallstein doctrine nor the German-German contradiction, but national economic and international geostrategic interests dominated German foreign policy and German foreign activities–regarding the FRG, the GDR, and Germany as a whole. To proof this thesis, West and East German activities–of the two states, their economies and their societies–in nine Central African states between 1945 and 1975 are observed and analysed. More than a million file pages out of more than a dozen German archives were read to tackle this task–and shed some refreshing new light on the foreign policies of the two German states during Cold War.
|
Page generated in 0.0496 seconds