Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (2862)
- Engineering (2064)
- Environmental Sciences (2014)
- Physics (1734)
- Chemistry (1713)
-
- Life Sciences (1678)
- Mathematics (1452)
- Earth Sciences (1420)
- Social and Behavioral Sciences (1161)
- Oceanography and Atmospheric Sciences and Meteorology (769)
- Electrical and Computer Engineering (751)
- Statistics and Probability (722)
- Computer Engineering (699)
- Medicine and Health Sciences (630)
- Education (624)
- Geology (583)
- Arts and Humanities (467)
- Applied Mathematics (451)
- Water Resource Management (438)
- Natural Resources and Conservation (431)
- Astrophysics and Astronomy (428)
- Databases and Information Systems (389)
- Business (371)
- Natural Resources Management and Policy (346)
- Information Security (339)
- Sustainability (325)
- Environmental Monitoring (306)
- Hydrology (306)
- Public Affairs, Public Policy and Public Administration (292)
- Institution
-
- Selected Works (763)
- University of Nebraska - Lincoln (726)
- TÜBİTAK (636)
- Singapore Management University (445)
- University of Kentucky (294)
-
- Purdue University (244)
- University of South Florida (239)
- Old Dominion University (235)
- Utah State University (221)
- City University of New York (CUNY) (207)
- Missouri University of Science and Technology (194)
- University of Texas at El Paso (192)
- University of Wollongong (178)
- Western University (175)
- Portland State University (173)
- Louisiana State University (167)
- Wayne State University (159)
- University of Arkansas, Fayetteville (155)
- Embry-Riddle Aeronautical University (151)
- William & Mary (146)
- University of Tennessee, Knoxville (141)
- Nova Southeastern University (140)
- University of Dayton (128)
- University of South Carolina (123)
- University of Texas Rio Grande Valley (119)
- Florida Institute of Technology (118)
- Western Kentucky University (117)
- Brigham Young University (115)
- Claremont Colleges (109)
- Western Washington University (109)
- Keyword
-
- Applied sciences (143)
- Pure sciences (130)
- Mathematics (115)
- Climate change (100)
- Water quality (100)
-
- Earth sciences (67)
- Great lakes (66)
- Chemistry (64)
- Physics (61)
- Machine learning (60)
- Geology (58)
- Stander Symposium project (55)
- Education (52)
- Security (51)
- Sustainability (51)
- GIS (49)
- Optimization (47)
- Biological sciences (43)
- Calculus (43)
- Geochemistry (43)
- Energy (40)
- IMSA (40)
- Illinois Mathematics and Science Academy (40)
- Activity sheets (39)
- Classroom resources (39)
- Groundwater (39)
- Teacher resources (39)
- Remote sensing (38)
- Simulation (38)
- Graphene (35)
- Publication
-
- Theses and Dissertations (486)
- Research Collection School Of Computing and Information Systems (424)
- Turkish Journal of Electrical Engineering and Computer Sciences (372)
- Electronic Theses and Dissertations (228)
- Australian Institute for Innovative Materials - Papers (164)
-
- Faculty Publications (156)
- Nebraska Tractor Tests (136)
- Electronic Thesis and Dissertation Repository (131)
- USF Tampa Graduate Theses and Dissertations (131)
- Open Access Dissertations (130)
- Publications and Research (123)
- Turkish Journal of Mathematics (120)
- Honors Theses (116)
- Departmental Technical Reports (CS) (105)
- Doctoral Dissertations (104)
- Graduate Theses and Dissertations (96)
- Publications (94)
- Masters Theses (88)
- Open Access Theses & Dissertations (87)
- Aerospace, Physics, and Space Science Faculty Publications (86)
- Physics and Astronomy Faculty Publications (86)
- Turkish Journal of Chemistry (85)
- All Capstone Projects (77)
- Journal of Modern Applied Statistical Methods (77)
- Physics Faculty Publications (77)
- LSU Doctoral Dissertations (76)
- Walden Dissertations and Doctoral Studies (76)
- Journal of Electrochemistry (74)
- Chemistry Faculty Publications (71)
- Dissertations and Theses (69)
- Publication Type
Articles 1 - 30 of 12675
Full-Text Articles in Physical Sciences and Mathematics
Oceans Of Space, Stephanie Steinbrecher '16
Oceans Of Space, Stephanie Steinbrecher '16
EnviroLab Asia
"Oceans of Space" relates my observations of the 2016 EnviroLab Asia Clinic Trip to Singapore and Sarawak, Malaysia. In this meditation, the concept of space serves as a lens to examine assumptions of geopolitical, historical, and philosophical positioning—regionally and globally. At the center of my inquiry is EnviroLab's connection to the Dayak communities in Baram, Sarawak. This region is experiencing dramatic social and ecological change as a result of industrial development. By triangulating my subjective impressions of this space, various knowledge systems, and the qualitative data EnviroLab gathered in Southeast Asia, I aim to untangle some paradoxes that complicate the …
An Ensemble Study Of The Sea Level Rise Impact On Storm Surge And Inundation In The Coastal Bangladesh, Mansur Ali Jisan
An Ensemble Study Of The Sea Level Rise Impact On Storm Surge And Inundation In The Coastal Bangladesh, Mansur Ali Jisan
Electronic Theses and Dissertations
The hydrodynamic model Delft3D is used to study the impact of Sea Level Rise (SLR) on storm surge and inundation in the coastal region of Bangladesh. To study the present-day inundation scenario, track of two known tropical cyclones (TC) were used: Aila (Category 1; 2009) and Sidr (Category 5; 2007). Model results were validated with the available observations. Future inundation scenarios were generated by using the strength of TC Sidr, TC Aila and an ensemble of historical TC tracks but incorporating the effect of SLR. Since future change in storm surge inundation under SLR impact is a probabilistic incident, that’s …
Characterization Of Hiv Diversity, Phylodynamics And Drug Resistance In Washington, Dc., Marcos Pérez-Losada, Amanda D Castel, Brittany Lewis, Michael Kharfen, Charles P Cartwright, Bruce Huang, Taylor Maxwell, Alan E Greenberg, Keith A Crandall
Characterization Of Hiv Diversity, Phylodynamics And Drug Resistance In Washington, Dc., Marcos Pérez-Losada, Amanda D Castel, Brittany Lewis, Michael Kharfen, Charles P Cartwright, Bruce Huang, Taylor Maxwell, Alan E Greenberg, Keith A Crandall
Epidemiology Faculty Publications
No abstract provided.
Investigating The Spatial Complexity Of Various Pke-Peks Schematics, Jacob Patterson
Investigating The Spatial Complexity Of Various Pke-Peks Schematics, Jacob Patterson
Rose-Hulman Undergraduate Research Publications
With the advent of cloud storage, people upload all sorts of information to third party servers. However, uploading plaintext does not seem like a good idea for users who wish to keep their data private. Current solutions to this problem in literature involves integrating Public Key Encryption and Public key encryption with keyword search techniques. The intent of this paper is to analyze the spatial complexities of various PKE-PEKS schemes at various levels of security and discuss potential avenues for improvement.
Sdss-Iv Manga: Spatially Resolved Star Formation Histories In Galaxies As A Function Of Galaxy Mass And Type, D. Goddard, D. Thomas, C. Maraston, K. Westfall, J. Etherington, R. Riffel, M. D. Mallmann, Z. Zheng, M. Argudo-Fernández, J. Lian, M. Bershady, K. Bundy, N. Drory, D. Law, Renbin Yan, D. Wake, A. Weijmans, D. Bizyaev, J. Brownstein, R. R. Lane, R. Maiolino, K. Masters, M. Merrifield, C. Nitschelm, K. Pan, A. Roman-Lopes, T. Storchi-Bergmann, D. P. Schneider
Sdss-Iv Manga: Spatially Resolved Star Formation Histories In Galaxies As A Function Of Galaxy Mass And Type, D. Goddard, D. Thomas, C. Maraston, K. Westfall, J. Etherington, R. Riffel, M. D. Mallmann, Z. Zheng, M. Argudo-Fernández, J. Lian, M. Bershady, K. Bundy, N. Drory, D. Law, Renbin Yan, D. Wake, A. Weijmans, D. Bizyaev, J. Brownstein, R. R. Lane, R. Maiolino, K. Masters, M. Merrifield, C. Nitschelm, K. Pan, A. Roman-Lopes, T. Storchi-Bergmann, D. P. Schneider
Physics and Astronomy Faculty Publications
We study the internal gradients of stellar population properties within 1.5 Re for a representative sample of 721 galaxies, with stellar masses ranging between 109 M⊙ and 1011.5 M⊙ from the SDSS-IV MaNGA Integral-Field-Unit survey. Through the use of our full spectral fitting code firefly, we derive light- and mass-weighted stellar population properties and their radial gradients, as well as full star formation and metal enrichment histories. We also quantify the impact that different stellar population models and full spectral fitting routines have on the derived stellar population properties and the radial gradient measurements. In …
Analysis Porter's Five Forces Model On Airbnb, Osiany Nurlansa, Handaru Jati
Analysis Porter's Five Forces Model On Airbnb, Osiany Nurlansa, Handaru Jati
Elinvo (Electronics, Informatics, and Vocational Education)
This paper discusses about Airbnb. Airbnb is a company website that allows ordinary people to rent their residence as tourist accommodation. Anyone can rent rooms to suit their budget. The company established in 2008, and eight years later by a very rapid growth, the company reaches a turnover of millions of rooms per year. Airbnb analyzed using Porter's Five Forces Model. According to Porter, the competitive nature of the industry could be seen as a combination of top five strengths, namely Rivalry Among Existing Competitors, Threat of New Entrants, Threat of substitude Products or Services, Bargaining Power of Suppliers, Bargaining …
Fibonacci Or Quasi-Symmetric Phyllotaxis. Part Ii: Botanical Observations, Stéphane Douady, Christophe Golé
Fibonacci Or Quasi-Symmetric Phyllotaxis. Part Ii: Botanical Observations, Stéphane Douady, Christophe Golé
Mathematics Sciences: Faculty Publications
Historically, the study of phyllotaxis was greatly helped by the simple description of botanical patterns by only two integer numbers, namely the number of helices (parastichies) in each direction tiling the plant stem. The use of parastichy num- bers reduced the complexity of the study and created a proliferation of generaliza- tions, among others the simple geometric model of lattices. Unfortunately, these simple descriptive method runs into difficulties when dealing with patterns pre- senting transitions or irregularities. Here, we propose several ways of addressing the imperfections of botanical reality. Using ontogenetic analysis, which follows the step-by-step genesis of the pattern, …
Fibonacci Or Quasi-Symmetric Phyllotaxis. Part I: Why?, Christophe Golé, Jacques Dumais, Stéphane Douady
Fibonacci Or Quasi-Symmetric Phyllotaxis. Part I: Why?, Christophe Golé, Jacques Dumais, Stéphane Douady
Mathematics Sciences: Faculty Publications
The study of phyllotaxis has focused on seeking explanations for the occurrence of consecutive Fibonacci numbers in the number of helices paving the stems of plants in the two opposite directions. Using the disk-accretion model, first introduced by Schwendener and justified by modern biological studies, we observe two dis- tinct types of solutions: the classical Fibonacci-like ones, and also more irregular configurations exhibiting nearly equal number of helices in a quasi-square pack- ing, the quasi-symmetric ones, which are a generalization of the whorled patterns. Defining new geometric tools allowing to work with irregular patterns and local transitions, we provide simple …
Analisis Sistem Informasi Pada Padiciti Menggunakan Konsep Competitive Forces And Strategy, Vivi Kusuma Hertantri
Analisis Sistem Informasi Pada Padiciti Menggunakan Konsep Competitive Forces And Strategy, Vivi Kusuma Hertantri
Elinvo (Electronics, Informatics, and Vocational Education)
Perkembangan sistem informasi mendukung dalam menyediakan tiket secara online dan realtime. E-commerce merupakan proses bisnis yang menggunakan internet dalam menjalankannya. Padiciti merupakan salah satu e-commerse yang menyediakan aplikasi pemesanan tiket kereta api, tiket pesawat, dan hotel. Padiciti dapat diakses melalui aplikasi smartphone dan website yang terintegrasi. Tujuan paper ini adalah untuk menganalisis sistem informasi Padiciti menggunakan metode dengan konsep Competitive Forces and Strategy. Hasil analisis menunjukkan bahwa Padiciti telah dapat menjadi sistem informasi yang sesuai dengan Competitive Forces and Strategy dengan hasil yang baik dan dapat bertahan dengan kelebihan dan kekuatan yang kompetitif. Kekuatan Padiciti terdapat pada aspek Cost Leadership, …
A New Class Of Integrable Two-Mass Mixtures In One-Dimension, Zaijong Hwang
A New Class Of Integrable Two-Mass Mixtures In One-Dimension, Zaijong Hwang
Graduate Masters Theses
Among systems with many hard-core point particles that only interact by elastic collisions in one-dimension, it has long been thought that only those with equal mass particles were completely integrable, where the final state of the system through time evolution could be easily predicted from its initial state due to the existence of a maximal number of conserved quantities. In this thesis, we introduce a new class of integrable three-particle systems that contain two unequal masses. These integrable triplets can affect the rate of thermalization in a much larger system composed of particles with two unequal masses, the effect of …
The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi
The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi
Journal of Digital Forensics, Security and Law
This research describes our survey of data remaining on computer hard disks sold on the second hand market in the United Arab Emirates (UAE). This is a repetition of the first survey conducted in 2012 (Jones, Martin, & Alzaabi, 2012). Similar studies have been carried over the last ten years in the United Kingdom, Australia, USA, Germany and France: (Jones, Mee, Meyler, & Gooch, 2005), (Jones, Valli, Sutherland, & Thomas, 2006), (Jones, Valli, Dardick, & Sutherland, 2008), (Jones, Valli, Dardick, & Sutherland, 2009). This research was undertaken to gain insight into the volumes of data found on second-hand disks purchased …
Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh
Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh
Journal of Digital Forensics, Security and Law
The Amcache.hve is a registry hive file that is created by Microsoft® Windows® to store the information related to execution of programs. This paper highlights the evidential potential of Amcache.hve file and its application in the area of user activity analysis. The study uncovers numerous artifacts retained in Amcache.hve file when a user performs certain actions such as running host-based applications, installation of new applications, or running portable applications from external devices. The results of experiments demonstrate that Amcache.hve file stores intriguing artifacts related to applications such as timestamps of creation and last modification of any application; name, description, publisher …
The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler
The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler
Journal of Digital Forensics, Security and Law
A previous paper described an experiment showing that Message Digest 5 (MD5) hash collisions of files have no impact on integrity verification in the forensic imaging process. This paper describes a similar experiment applied when two files have a Secure Hash Algorithm (SHA-1) collision.
Analisis Competitive Force Dan Competitive Strategy Sistem Informasi Kuliner Di Indonesia (Studi Kasus : Kulina.Id), Damar Purba Pamungkas
Analisis Competitive Force Dan Competitive Strategy Sistem Informasi Kuliner Di Indonesia (Studi Kasus : Kulina.Id), Damar Purba Pamungkas
Elinvo (Electronics, Informatics, and Vocational Education)
Abstrak - Tujuan dari penulisan paper ini untuk menganalisis Competitive Force yang di hadapi oleh Kulina dan Competitive Strategy apakah yang dilakukan Kulina dalam mengatasi adanya competitive forces dalam menjalankan bisnisnya. Penulisan paper ini dilakukan untuk menganalisis Sistem Informasi Kulina dengan menggunakan Model Porter. Michael A. Porter menjelaskan lima kekuatan (five forces module) sebagai alat untuk menganalisis lingkungan persaingan industri. Keadaan persaingan perusahaan dalam suatu industri tergantung pada lima kekuatan persaingan dasar yaitu : Rivalry of Competitors, Threat of New Entrants, Threat of substitutes, Bargaining Power of Customers, dan Bargaining Power of Suppliers. Michael A. Porter …
Pengolahan Citra Untuk Identifikasi Telur Berdasarkan Ukuran, Syahrul Awalludin Sidiq
Pengolahan Citra Untuk Identifikasi Telur Berdasarkan Ukuran, Syahrul Awalludin Sidiq
Elinvo (Electronics, Informatics, and Vocational Education)
Salah satu Home Industri penyortir telur di Yogyakarta, adalah Tempel Ambarukmo. Penyortiran awalnya dilakukan secara manual tetapi membutuhkan waktu yang lama. Pengunaan mesin grading untuk mengatasi masalah tersebut, namun harga relatif mahal. Oleh karena itu, perlu adanya sistem otomatis untuk penyortiran telur sehingga menghemat waktu, tenaga, dan biaya. Penelitian ini bertujuan untuk mengembangkan suatu sistem yang mampu mendeteksi dan memisah telur berdasarkan ukuran menggunakan citra digital dengan media interface GUI (Graphical User Interface) yang memanfaatkan software matlab. Telur dikategorikan menjadi 5 kategori (Sangat Kecil, Kecil, Sedang, Besar, Sangat Besar). Dalam proyek akhir ini dirancang dengan menggunakan metode waterfall. Pengolahan citra …
Analisis Competitive Forces And Competitive Strategy Pada Sistem Informasi "Zalora.Co.Id", Fitria Ekarini
Analisis Competitive Forces And Competitive Strategy Pada Sistem Informasi "Zalora.Co.Id", Fitria Ekarini
Elinvo (Electronics, Informatics, and Vocational Education)
Analisis Sistem Informasi Zalora.co.id ini bertujuan untuk mengetahui seberapa kuatnya strategi persaingan yang disiapkan oleh Zalora.co.id untuk menghadapi kuatnya persaingan bisnis dengan perusahaan yang bergerak di bidang yang sama. Sehingga dapat dilihat kelebihan dan kekurangan dari Sistem Informasi ini. Analisis Sistem Informasi ini menggunakan model analisis competitive forces and Competitive Strategy. Dan untuk mengatasi lima kekuatan kompetitif tersebut, perusahaan dapat menerapkan competitive strategies. Pada Zalora yang merupakan situs web belanja kebutuhan fashion yang menawarkan produk-produk dari berbagai brand termuka, baik lokal maupun internasional ini dapat dikatakan sebagai online shop yang siap untuk bersaing dengan para kompetitor di bidang yang sama. …
Analisis Sistem E-Commerce Pada Perusahan Jual-Beli Online Lazada Indonesia, Galih Setiyo Budhi
Analisis Sistem E-Commerce Pada Perusahan Jual-Beli Online Lazada Indonesia, Galih Setiyo Budhi
Elinvo (Electronics, Informatics, and Vocational Education)
Tujuan dari penulisan paper ini adalah untuk menganalisis mengenai system e-commerce pada situs belanjan online terbesar di Indonesia yaitu Lazada.co.id. Analisis meliputi, kelebihan dan kekurangan dari lazada Indonesia serta analisis SWOT pada situs tersebut. Hasil analisis menunjukan bahwa lazada Indonesia mampu menjadi perusahaan belanja online terbesar di Indonesia dengan berbagai kelebihan pelayanan maupun jaminan keamanan transaksi. Namun, lazada juga masih memliki beberapa kelemahan, diantara mengenai security system, dengan masih banyaknya konsumen yang mengalami penipuan. Perusahaan lazada Indonesia menggunakan strategi iovation, bargaining power of consumer dan bargaining power of suppliers untuk menjadikan perusahaan belanja online terbesar di Indonesia.
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah
Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah
Journal of Digital Forensics, Security and Law
With increasing number and severity of attacks, monitoring ingress and egress network traffic is becoming essential everyday task. Intrusion detection systems are the main tools for capturing and searching network traffic for potential harm. Signature-based intrusion detection systems are the most widely used, and they simply use a pattern matching algorithms to locate attack signatures in intercepted network traffic. Pattern matching algorithms are very expensive in terms of running time and memory usage, leaving intrusion detection systems unable to detect attacks in real-time. We propose a Bloom filters optimized Wu-Manber pattern matching algorithm to speed up intrusion detection. The Bloom …
A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun
A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun
Journal of Digital Forensics, Security and Law
Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices such as smartphones and tablets. The data generated through the use of these technologies need to be analyzed for forensic purposes when criminal and terrorist activities are involved. In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood. This will help digital forensics investigators to predict, detect and even prevent …
The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler
The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler
Journal of Digital Forensics, Security and Law
The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to force MD5 hash collisions has been a reality for more than a decade, although there is a general consensus that hash collisions are of minimal impact to the practice of computer forensics. This paper describes an experiment to determine the results of imaging two disks that are identical except for one file, the two versions of which have different content but otherwise occupy the same byte positions on the disk, are the same size, and have the same hash …
A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi
A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi
Journal of Digital Forensics, Security and Law
The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a distributed …
Letter From The Editor
International Journal of Nuclear Security
No abstract provided.
Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene
Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene
International Journal of Nuclear Security
Ready access to abundant electricity is a key enabler of modern life. During the past decade the vulnerability of Critical Infrastructure sectors in the U.S. to a variety of natural hazards and man-made threats has become increasingly apparent. The electrical infrastructure (the “Grid”) is the foundation for all other critical civil infrastructures upon which our society depends. Therefore, protection of the Grid is an energy security, homeland security, and national security issue of highest importance. Geomagnetic disturbances (GMD) induced by solar coronal mass ejections (CMEs), electromagnetic pulse (EMP) attacks, and cyber attacks are three events having the potential to plunge …
Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall
Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall
International Journal of Nuclear Security
This study highlights the core non-proliferation dilemmas we face and suggests an effective mechanism for reviving the spirit and the hope of the Non-Proliferation Treaty. An indispensable key to the treaty calls for a rethinking of what we believe should be referred to as its four pillars: disarmament, non-proliferation, peaceful uses of nuclear energy, and implementation of the 1995 Middle East Resolution. We seek to contribute to the renaissance of the non-proliferation regime by addressing seven dilemmas that arise from the way various Non-Proliferation Treaty participants pursue the goals of the four pillars undergirding the treaty. This study highlights …
A New Pathway To Enhance The Nuclear Security Regime, Francesca Giovannini
A New Pathway To Enhance The Nuclear Security Regime, Francesca Giovannini
International Journal of Nuclear Security
The paper investigates the approach used by a new set of regional institutions, the Disaster Preparedness and Risk Management Organizations (DPRMOs), in strengthening regional governance and cooperation. It also inquires in what ways these new institutions might indirectly contribute to the establishment of a more cohesive global nuclear security framework. More specifically, through the examination of the case of Southeast Asia, the paper argues that these institutions, albeit without a specific and direct mandate to operate in the nuclear security domain, are fundamentally strengthening states’ capacity to assess risks and threats and to map vulnerabilities in timely fashion. They are …