1,192 research outputs found

    Public Good Theory and the 'Added Value' of the EU's Counterterrorism Policy

    Get PDF
    This paper develops a deductive theoretical framework for assessing the EU's added value in the fight against terrorism. The first part argues that public good theory helps to conceptualize objectives of international counterterrorism cooperation and the respective role of international organizations. It critically evaluates existing discussions of security cooperation from this theoretical perspective and sets out a typology of policies according to three aggregation technologies (weaker links, summation, better shot), each of which is linked to a specific set of governance challenges. The second part surveys the EU's counterterrorism efforts on this basis. Weaker link issues - such as the protection of the movement of people, goods and capital - and the related problem of mutual assurance have been quite successfully addressed, even if there is increasing uncertainty over the boundaries of cooperation. In contrast, the EU fell short with regard to joint efforts in the fight against terrorism due to the non-excludable nature of benefits, as in the case of foreign policy, or (partial) rivalry of consumption, as in the case of intelligence sharing or disaster response capacities. Finally, the EU increasingly supports better shot initiatives to develop new instruments and technologies to combat terrorism, but is often overtaken by mini-lateral forms of cooperation.counterterrorism, public good theory, international organisations, European Union

    Autonomous Vehicle Coordination with Wireless Sensor and Actuator Networks

    Get PDF
    A coordinated team of mobile wireless sensor and actuator nodes can bring numerous benefits for various applications in the field of cooperative surveillance, mapping unknown areas, disaster management, automated highway and space exploration. This article explores the idea of mobile nodes using vehicles on wheels, augmented with wireless, sensing, and control capabilities. One of the vehicles acts as a leader, being remotely driven by the user, the others represent the followers. Each vehicle has a low-power wireless sensor node attached, featuring a 3D accelerometer and a magnetic compass. Speed and orientation are computed in real time using inertial navigation techniques. The leader periodically transmits these measures to the followers, which implement a lightweight fuzzy logic controller for imitating the leader's movement pattern. We report in detail on all development phases, covering design, simulation, controller tuning, inertial sensor evaluation, calibration, scheduling, fixed-point computation, debugging, benchmarking, field experiments, and lessons learned

    A Survey and Analysis of Cooperative Multi-Agent Robot Systems: Challenges and Directions

    Get PDF
    Research in the area of cooperative multi-agent robot systems has received wide attention among researchers in recent years. The main concern is to find the effective coordination among autonomous agents to perform the task in order to achieve a high quality of overall performance. Therefore, this paper reviewed various selected literatures primarily from recent conference proceedings and journals related to cooperation and coordination of multi-agent robot systems (MARS). The problems, issues, and directions of MARS research have been investigated in the literature reviews. Three main elements of MARS which are the type of agents, control architectures, and communications were discussed thoroughly in the beginning of this paper. A series of problems together with the issues were analyzed and reviewed, which included centralized and decentralized control, consensus, containment, formation, task allocation, intelligences, optimization and communications of multi-agent robots. Since the research in the field of multi-agent robot research is expanding, some issues and future challenges in MARS are recalled, discussed and clarified with future directions. Finally, the paper is concluded with some recommendations with respect to multi-agent systems

    Leadership, Leaderlessness and Leaderless Groups: The case of the Occupy London Movement

    Get PDF
    This thesis investigates how ‘leaderless’ social movements are coordinated and sustained by their members. Drawing on an empirical study of the London Occupy protests, it emphasises the socially-constructed nature of ‘leaderlessness’, arguing that the London Occupy movement can be understood as an ensemble of symbolic meanings, practical accomplishments and communicative political actions that allowed activists to mobilise and develop a broad-ranging repertoire of protest. The thesis examines how divergent but interrelated modalities, including occupation of physical and virtual space, appropriation of both ‘new’ and ‘old’ media and dramaturgical use of physical artefacts (most notably the Guy Fawkes mask), were deployed in ways that instantiated a series of highly-charged political ‘spectacles’, challenging the dominance of the capitalist economic order. This thesis also considers whether the Occupy movement represents a new template for twenty-first-century political activism. Whilst the movement can be seen as distinctively new, in the sense that it operates ‘virtually’ and without a fixed political programme or formal structure, similar political actions can be traced back to the protest movements of the 1960s and to eighteenth- and nineteenth-century struggles

    A Hybrid SDN-based Architecture for Wireless Networks

    Get PDF
    With new possibilities brought by the Internet of Things (IoT) and edge computing, the traffic demand of wireless networks increases dramatically. A more sophisticated network management framework is required to handle the flow routing and resource allocation for different users and services. By separating the network control and data planes, Software-defined Networking (SDN) brings flexible and programmable network control, which is considered as an appropriate solution in this scenario.Although SDN has been applied in traditional networks such as data centers with great successes, several unique challenges exist in the wireless environment. Compared with wired networks, wireless links have limited capacity. The high mobility of IoT and edge devices also leads to network topology changes and unstable link qualities. Such factors restrain the scalability and robustness of an SDN control plane. In addition, the coexistence of heterogeneous wireless and IoT protocols with distinct representations of network resources making it difficult to process traffic with state-of-the-art SDN standards such as OpenFlow. In this dissertation, we design a novel architecture for the wireless network management. We propose multiple techniques to better adopt SDN to relevant scenarios. First, while maintaining the centralized control plane logically, we deploy multiple SDN controller instances to ensure their scalability and robustness. We propose algorithms to determine the controllers\u27 locations and synchronization rates that minimize the communication costs. Then, we consider handling heterogeneous protocols in Radio Access Networks (RANs). We design a network slicing orchestrator enabling allocating resources across different RANs controlled by SDN, including LTE and Wi-Fi. Finally, we combine the centralized controller with local intelligence, including deploying another SDN control plane in edge devices locally, and offloading network functions to a programmable data plane. In all these approaches, we evaluate our solutions with both large-scale emulations and prototypes implemented in real devices, demonstrating the improvements in multiple performance metrics compared with state-of-the-art methods

    Public Good Theory and the 'Added Value' of the EU's Counterterrorism Policy

    Full text link
    This paper develops a deductive theoretical framework for assessing the EU's added value in the fight against terrorism. The first part argues that public good theory helps to conceptualize objectives of international counterterrorism cooperation and the respective role of international organizations. It critically evaluates existing discussions of security cooperation from this theoretical perspective and sets out a typology of policies according to three aggregation technologies (weaker links, summation, better shot), each of which is linked to a specific set of governance challenges. The second part surveys the EU's counterterrorism efforts on this basis. Weaker link issues - such as the protection of the movement of people, goods and capital - and the related problem of mutual assurance have been quite successfully addressed, even if there is increasing uncertainty over the boundaries of cooperation. In contrast, the EU fell short with regard to joint efforts in the fight against terrorism due to the non-excludable nature of benefits, as in the case of foreign policy, or (partial) rivalry of consumption, as in the case of intelligence sharing or disaster response capacities. Finally, the EU increasingly supports better shot initiatives to develop new instruments and technologies to combat terrorism, but is often overtaken by mini-lateral forms of cooperation

    The Dynamics of the Creation, Evolution, and Disappearance of Terrorist Internet Forums

    Get PDF
    An examination of the organizational nature of the threat posed by jihadi terrorism, supplying quantitative and qualitative data on the dynamics behind the creation, evolution, and disappearance of the main jihadi Internet forums during the period 2008–2012. An analysis of the origins and functions of the forums, their links with terrorist organizations, their internal structures, and the processes accounting for their stability in cyberspace shows that far from representing a horizontal structure where the main actors are a network of followers, the terrorist presence on the Internet is in fact a hierarchical organization in which intervention by formal terrorist organizations plays a crucial role

    Conceptualizing al-Qaeda and US Grand Strategy

    No full text
    The US debate about the nature of al-Qaeda and the associated threat does not occur in a political or ideological vacuum. In fact, given its on-going political salience, questions such as what al-Qaeda is, how it can be conceptualized and defeated provide a large number of access points for those trying to shape broader US policies and underlying discourses. In the context of Middle East politics, for example, the perception of an on-going terrorist threat allowed some to argue for US policies that take into account Palestinian demands, whilst others stressed the need to uphold a close relationship with the Israeli government and to vigorously pursue the ‘national interest’.1 More recently, the answer to the question of whether al-Qaeda can still be thought of as having a coherent core or whether it simply serves as a brand for essentially local, bottom-up radicalization processes has direct implications for the question of whether the US-led military presence in Afghanistan and the aggressive pursuit of the Taliban should be at the heart of US counterterrorism efforts. Ultimately, the US debate about al-Qaeda is inextricably linked to specific ontologies of international politics and long-held convictions about the global role which the United States should and can play. That is why the present analysis follows in the footsteps of those who have called for closer attention to be paid to individual perceptions and convictions as the intervening variable between international incentives and policy outcomes

    The evolution of management from a trust to arm’s length model in family run businesses: the case of the diamond industry

    Get PDF
    Purpose: The primary purpose of this paper is to fill the research gap regarding the evolution of managerial processes within (largely family) diamond industry firms, especially over the past seven decades. Design/methodology/approach: Qualitative data were gathered from interviews with 100 managers in the diamond industry in Israel, together with data from Israeli Government, industry and academic sources. Findings: Over the recent life cycle of the diamond industry, with its changing structures and dynamics, participant firms have evolved through seven stages of engagement, from one based on trust and personal connections to more impersonal, standardized connections that exist today. Research limitations/implications: In seeking to tell the story of industry participants as a group, the differences in behaviours between the family firms and the non-family firms have not explored. This should be the work of future research, which, if aimed at teasing out the results of this study, may help shed additional light on the strategic processes that occur within family firms. Practical implications: Although the firms examined in this study were from one industry (and an arguably narrow cultural base), their development over time was not dissimilar to the experience reported in other industries and cultures. This suggests that the components of the evolution of the strategic process that ensues within family firms may be generalizable throughout cultures. In the absence of kin relationships, the importance of trust in their dealings cannot be overstated. Originality/value: The findings demonstrate how one group of participants in the global diamond industry has responded to the changing economic, social and political contexts of their operations, where trust and personal connections have been replaced by more impersonal, standardized dealings
    corecore