1,215 research outputs found

    Testing the securitization paradigm of the so-called Copenhagen school in the case study of europe migrant crisis in 2015

    Get PDF
    Migration is an international phenomenon and contentious concept. Although people have been moving by political, economic and cultural motivations since the beginning of the human history; particularly recently, migration fuels traditional fears over national and societal security. Because, migration, a normal or typical political issue can be altered to a security threat by repetitive and successful speech acts. This fact has often been referred to as ‘the securitization of migration’, which means the presentation of migration as a security threat. In this regard, the arrival of more than one million refugees to the EU in 2015 -Migrant (Refugee) Crisis- constitutes an important milestone. The starting point of this study is to depict “How the securitization process of the ‘Migrant Crisis’ was operated”. It will be in charge of defining not only the key-concepts, such as “securitization move” and “securitization”, but also of what are the success criteria are. According to this study, securitizing actors and their speech acts have opened the way for the success of securitization by providing the perfect ground for altering the question of Migrants into a survival issue. To analyze the characteristics and the implications of securitizing the migration issue within the EU, this article primarily engages with the theoretical approach developed by the so-called Copenhagen School, which outlines how issues become threats those need to be handled by extra-ordinary measures.La migración es un fenómeno internacional y un concepto polémico. Aunque las personas se han trasladado por motivos políticos, económicos o culturales a lo largo de los siglos; la migración alimenta en la actualidad antiguos temores sobre seguridad nacional y social. Dado que la migración, un problema político normal, puede transformarse en amenaza de seguridad por cómo se habla de él -actos de habla-.Este hecho se ha denominado a menudo como "la seguritización de la migración"; es decir, el considerar la migración como una amenaza existencial. En este sentido, la llegada de más de un millón de refugiados a la UE en 2015, la crisis de los inmigrantes (refugiados), constituye un hito importante. El punto de partida de este estudio es describir "Cómo se llevó a cabo el proceso de seguritización de la 'Crisis Migratoria'". Se tratará de definir no solo conceptos claves, como "seguritización" y "acto de habla", sino también cuáles son los criterios que contribuyen a construir con éxito dicha seguritización. Según el presente estudio, actores securitizadores y sus actos de habla han abierto el camino para su triunfo, al proporcionar el terreno perfecto para transformar la cuestión de los migrantes en una cuestión de supervivencia. Para analizar las características y las implicaciones de la seguritización de la cuestión migratoria dentro de la UE, este trabajo aborda principalmente el enfoque teórico desarrollado por la llamada Escuela de Copenhague, que describe cómo los problemas se convierten en amenazas que deben manejarse con medidas extraordinarias

    The Veterans Emergency Housing Program

    Get PDF
    Dynamic spectrum access (DSA) schemes allow the users to share spectrum resources by taking advantage of the variations in spectrum demand over time and space. Carrying out dynamic spectrum allocation centrally, however, can be a complex task. For this reason, distributed schemes in which users can access the available channels independently may be preferable to centralized DSA schemes. Cognitive radio systems, which enable user terminals to sense their environment and form their action accordingly, are particularly well-suited for distributed systems. On the other hand, the freedom in distributed schemes gives the users the option to act selfishly, which has decisive effects on system performance. In this paper we consider a distributed multichannel wireless random access system where users selfishly access the channels in the system. We analyze the behavior of the selfish users by modeling the system as a non-cooperative game and we identify all stable operating points (Nash equilibria) of this game. We then compare the performance of this system with a number of cooperative distributed DSA schemes in terms of user utilities. Our results show that the performance of the selfish multichannel random access system can be comparable to cooperative schemes.QC 20111208. © 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. QC 20111207</p

    Ermeni sanatkarlar

    Get PDF
    Taha Toros Arşivi, Dosya No: 192-Tiyatro ve Sinema Dokümanlarıİstanbul Kalkınma Ajansı (TR10/14/YEN/0033) İstanbul Development Agency (TR10/14/YEN/0033

    Çalıkuşu yetmiş beş yaşında

    Get PDF
    Taha Toros Arşivi, Dosya No: 95-Reşat Nuri Güntekin. Not: Gazetenin "Kitap Tırtılı" köşesinde yayımlanmıştır

    Açık saçık klasikler

    Get PDF
    Taha Toros Arşivi, Dosya No: 94-MevlanaUnutma İstanbul projesi İstanbul Kalkınma Ajansı'nın 2016 yılı "Yenilikçi ve Yaratıcı İstanbul Mali Destek Programı" kapsamında desteklenmiştir. Proje No: TR10/16/YNY/010

    Sinekli bakkal

    Get PDF
    Taha Toros Arşivi, Dosya No: 41-Halide Edip-A. Adnan Adıvar. Not: Gazetenin "Yazı Odası" köşesinde yayımlanmıştır

    Pierre Loti

    Get PDF
    Taha Toros Arşivi, Dosya Adı: Pierre Lotiİstanbul Kalkınma Ajansı (TR10/14/YEN/0033) İstanbul Development Agency (TR10/14/YEN/0033

    Reşat Nuri'yi hatırlamak

    Get PDF
    Taha Toros Arşivi, Dosya No: 95-Reşat Nuri Güntekin. Not: Gazetenin "Yazı Odası" köşesinde yayımlanmıştır

    Shortest Unique Substring Query Revisited

    Get PDF
    We revisit the problem of finding shortest unique substring (SUS) proposed recently by [6]. We propose an optimal O(n)O(n) time and space algorithm that can find an SUS for every location of a string of size nn. Our algorithm significantly improves the O(n2)O(n^2) time complexity needed by [6]. We also support finding all the SUSes covering every location, whereas the solution in [6] can find only one SUS for every location. Further, our solution is simpler and easier to implement and can also be more space efficient in practice, since we only use the inverse suffix array and longest common prefix array of the string, while the algorithm in [6] uses the suffix tree of the string and other auxiliary data structures. Our theoretical results are validated by an empirical study that shows our algorithm is much faster and more space-saving than the one in [6]
    corecore