South Korea has undergone many drastic transformations from the time the state formally emerged in 1948 until now, becoming a thriving democracy and the world's 12th-largest economy. Women in South Korea have enjoyed many aspects of this recovery and rise. According to the 2013 World Economic Forum's Annual Gender Gap Index, South Korea's women today have the highest literacy and healthy life expectancy rates in the world. Yet according to the same index, South Korea placed 111th out of 136 countries in gender equality. While this index highlights the need for further improvement, the ranking...
South Korea has undergone many drastic transformations from the time the state formally emerged in 1948 until now, becoming a thriving democracy and t...
We analyze the role of service-specific and mental health risk factors in active duty and reserve component Navy enlisted and officer suicide attempts and deaths from 2002 to 2011. We estimate the effect of non-demographic, service-specific, pre-screening, and mental health factors through logit regression to determine their association with the occurrence of suicide attempts and death by suicide. We further evaluate how these risk factors differ between the active duty and reserve components. Results consistently found that diagnosed mental health conditions, specifically, depression and...
We analyze the role of service-specific and mental health risk factors in active duty and reserve component Navy enlisted and officer suicide attempts...
In the lead up to the 2001 invasion of Afghanistan, the U.S. Government emphasized how the military intervention would liberate Afghani women from the Taliban, echoing an old colonial discourse that Muslim women need saving. This book reviews the effects of Islamism, especially when it influences political decisions, on women. In particular, the study focuses on whether there is a correlation between rising Islamism and women in civil society in Turkey and Egypt through the variables of political, educational, and employment opportunities.
In the lead up to the 2001 invasion of Afghanistan, the U.S. Government emphasized how the military intervention would liberate Afghani women from the...
To decrease ethnic instability in Xinjiang, the Chinese government's plan is to economically develop the region. Xinjiang is rich in natural resources, is geographically significant and has a special economic zone. China is also investing in Central Asia to further meet its energy demand. A network of pipelines and major rail systems connect sources from China to Central Asia and beyond. Xinjiang's economy will benefit from the network because it is the gateway and corridor to Central Asia and a hub for the Silk Road traffic. This book suggests that Xinjiang's economic development led to a...
To decrease ethnic instability in Xinjiang, the Chinese government's plan is to economically develop the region. Xinjiang is rich in natural resources...
The purpose of this book was to perform a conceptual study of using Unmanned Aerial Vehicles (UAVs) in amphibious operations. It focused on the command relations, tasking and critical problems in UAV amphibious operations. This work investigated the question of whether using UAVs at sea is a feasible complement to current amphibious operational doctrine and, if so, then what expense is incurred to assets on which it is embarked and assigned to the Amphibious Ready Group. This work concluded that UAVs were a feasible complement to current amphibious doctrine, but several critical issues to...
The purpose of this book was to perform a conceptual study of using Unmanned Aerial Vehicles (UAVs) in amphibious operations. It focused on the comman...
Unmanned Aerial Vehicles (UAVs) represent a serious threat to forward deployed forces of the United States Army. The defense against such threats is currently provided primarily by the Bradley Stinger Fighting Vehicle (BSFV). The problem addressed is how to evaluate the effectiveness of the BSFV against a UAV. This book develops a computer simulation methodology for modeling the capability of a gun system to engage a UAV. Specifically, a review is made of the BSFV, BSFV 25mm Ammunition, and UAVs. These reviews formed the basis for a computer simulation, coded in Common Lisp Object System...
Unmanned Aerial Vehicles (UAVs) represent a serious threat to forward deployed forces of the United States Army. The defense against such threats is c...
The current Army Unmanned Aerial Vehicle (UAV) system has two problems, 1) it does not provide for the direct distribution of live UAV video throughout command posts across their local area networks, and 2) it lacks an automated trainer. To solve the video distribution problem, I studied the UAV system, video compression techniques, and local area network protocols to develop the video distribution model. The approach taken for developing the simulator included researching the operational characteristics of the UAV system and studying the creation of synthetic environments. This work develops...
The current Army Unmanned Aerial Vehicle (UAV) system has two problems, 1) it does not provide for the direct distribution of live UAV video throughou...
In the 1970s, Malaysia's government promoted economic growth through an economic structural change from agriculture to industry. During the economic changeover, Malaysia's lack of human capital contributed to the persistent labor shortages. To meet the demand for labor, especially in manufacturing and construction, the government adopted a liberal immigration policy that permitted large numbers of workers to enter the country. Although many entered legally, many more did not. Most workers entered from Indonesia, which was close in proximity and shared a common culture. By the 1990s, many...
In the 1970s, Malaysia's government promoted economic growth through an economic structural change from agriculture to industry. During the economic c...
This study of Transportation Security Administration's Screening Passengers by Observation Techniques (SPOT) program analyzes the Government Accountability Office (GAO) and Office of Inspector General (OIG) recommendations for improvement, as well as strengths and weaknesses of the program not specifically addressed in previous assessments. Any analysis of SPOT must be robust, as it represents one of the few threat agnostic countermeasures not limited by technology and finite detection capabilities. The GAO has recommended Congress withhold funding from SPOT until further evidence of...
This study of Transportation Security Administration's Screening Passengers by Observation Techniques (SPOT) program analyzes the Government Accountab...
Society's pervasive use of mobile technologies has provided an incentive for the amount and kinds of mobile malware to steadily increase since 2004. Challenges in static analysis of mobile malware have stimulated the need for emulated, dynamic analysis techniques. Unfortunately, emulating mobile devices is nontrivial because of the different types of hardware features onboard (e.g., sensors) and the manner in which users interact with their devices as compared to traditional computing platforms. To test this, our research focuses on the enumeration and comparison of static attributes and...
Society's pervasive use of mobile technologies has provided an incentive for the amount and kinds of mobile malware to steadily increase since 2004. C...