SlideShare a Scribd company logo
http://www.iaeme.com/IJCIET/index.asp 958 editor@iaeme.com
International Journal of Civil Engineering and Technology (IJCIET)
Volume 10, Issue 01, January 2019, pp. 958-969, Article ID: IJCIET_10_01_089
Available online at http://www.iaeme.com/ijciet/issues.asp?JType=IJCIET&VType=10&IType=01
ISSN Print: 0976-6308 and ISSN Online: 0976-6316
© IAEME Publication Scopus Indexed
IMPACT OF PIRACY ON MARITIME
TRANSPORT AND TECHNICAL SOLUTIONS
FOR PREVENTION
Cuong Manh Nguyen and Tien Quoc Le
Vietnam Maritime University, Haiphong city, Vietnam
ABSTRACT
Pirates are acts of loot taking place on the sea or the coast and are acted upon by
illegal maritime forces. Piracy is an international crime, piracy that directly threatens
the lives and lives of seafarers, strongly impacts maritime activity as well as economic
development [1]. The global damage caused by piracy is estimated at $ 6.6 to $ 6.9
billion through commercial fraud, loss of cargo or delay. Even pirates can cause
political instability due to state officials' corruption.
Key words: illegal maritime, Piracy
Cite this Article: Cuong Manh Nguyen and Tien Quoc Le, Impact Of Piracy on
Maritime Transport and Technical Solutions for Prevention. International Journal of
Civil Engineering and Technology, 10(01), 2019, pp. 958–969
http://www.iaeme.com/IJCIET/issues.asp?JType=IJCIET&VType=10&IType=01
1. INTRODUCTION
Pirates are acts of loot taking place on the sea or the coast and are acted upon by illegal maritime
forces. Piracy is an international crime, piracy that directly threatens the lives and lives of
seafarers, strongly impacts maritime activity as well as economic development [1]. The global
damage caused by piracy is estimated at $ 6.6 to $ 6.9 billion through commercial fraud, loss
of cargo or delay. Even pirates can cause political instability due to state officials' corruption.
According to statistics, 90% of world trade is carried out by sea transport [2]. Meanwhile, the
data show that from 2007 to September 2012 there are 2,083 cases (equivalent to 30
cases/month, 370 cases/year). The "hotspot" areas of piracy are located in Somalia, the Gulf of
Aden, and South-East Asia.
Cuong Manh Nguyen and Tien Quoc Le
http://www.iaeme.com/IJCIET/index.asp 959 editor@iaeme.com
Figure 1. Strait of Malacca - High-risk areas are attacked by pirates in Southeast Asia
Pirates were born in the 300 BC when people began to sail offshore; the late seventeenth-
early eighteenth century is considered the era of piracy when the period has a series of seizures.
The piracy was openly held, and the number of robberies increased rapidly [3]. After that
golden age, pirates were active in the waters of the Indian Ocean, the Pacific, the offshore
waters of Somalia, the Straits of Malacca and the South China Sea. But since 1994, the
establishment of the WTO has led to rapid economic development and free trade in which
ocean freight is the most significant volume of goods in the world [4]. Especially for countries
with coastal lines, ocean freight is considered to be a huge advantage. But with this
development is the pirates' worrying growth. Between 1994 and 2002, more than 2,000 piracy
cases worldwide caused about $ 15 billion in damages each year, and the two most hotspots
for piracy were Somali and regional waters East Sea [5].
Figure 2. Somali pirate operating area
Impact Of Piracy on Maritime Transport and Technical Solutions for Prevention
http://www.iaeme.com/IJCIET/index.asp 960 editor@iaeme.com
However, thanks to the efforts of the countries joining the WTO, especially the countries
with large navies such as Russia, America, have helped to trade goods and travel at sea become
more favorable also Such as reducing economic losses for participating countries [6]. Besides
the development strategies of the maritime industry, the use of bio-fuel and protection of
marine environmental pollution are attracting much attention to aim at the "Green shipping"
[7-23]. Currently, the world classifies two types of pirates based on their activities: armed
robbers and ghosts. These two types of robberies are considered pirates, but they have very
different ways of operating [24-29]. While the armed robbery is armed and terroristic, the ghost
ship acts extremely sophisticatedly and, in recognition of these two types of robberies, we come
to the same traits. Their prominence, as well as the active area of each type of robbery, is
classified as followed:
1.1. Armed robbery
• Grounds: Usually located in places far from central areas, uninhabited islands, areas
not regularly inspected by the government. Some regions may be named, such as
the islands of Indonesia, the Gulf of Mexico, the Caribbean, or Somalia
• Manpower: Mainly local people are knowledgeable in the area, armed with
weapons such as guns, grenades, etc.
• Vehicles: Use high-speed canoes and boats to avoid scans of radar boats as well as
quickly and easily reach cargo ships to control crew on board.
• Use high-speed trains close to merchant ships, cruise ships, and boat captains and
ship them to their area. Select the types of goods that can be handled and unloaded
in the country and neighboring countries. Accompanying the looting of terrorism is
the trafficking of illicit drugs and illicit drugs in countries around the world.
• The most famous for this type of terrorist piracy is the Somali region - from the
Atlantic Ocean to the Indian Ocean and vice versa, South America, some of the
archipelago of Indonesia in the Southeast ASIAN.
1.2. Ghost ships
This is a very sophisticated form of piracy, which is a ship registered and flagged properly, but
these ships carry pirates. When the pirates capture the ship, cargo on the whole ship is taken to
the ghost ship, which will be shipped to the sea after shipment without any difficulty from the
ship. Security forces. Through analysis and evaluation, maritime security forces find that ghost
ships typically have the following characteristics:
• Over 15 - 20 years of use
• Initial registration information is abnormal
• Ships arrive at slow ports for loading and unloading
• The owner or operator is always the only one
Famous for the use of this ghost is the Chinese or Chinese pirate group in Guangzhou,
Shanghai, Fujian. They operate by information obtained through brokerage or moderator in
Southeast Asia [32]. Therefore, their main area of activity is in the Pacific Ocean, in which the
East Sea is fertile soil for the pirates.
The activities of these two types of pirates, despite the same purpose, are the looting of
ocean-going ships, but the way they operate is extremely different. While the primary activity
of armed pirates is to loot goods and take hostages for ransom, robberies are mostly flushed
into the water or transported to neighboring countries for consumption [33]. The pirate ships
Cuong Manh Nguyen and Tien Quoc Le
http://www.iaeme.com/IJCIET/index.asp 961 editor@iaeme.com
are incredibly sophisticated and cunning. This type of piracy is extremely dangerous both
regarding how it works and how it is plundered, but it does not work alone, but it operates in
an organized, commanded manner and receives shore support. It acts as a sophisticated criminal
organization, with intelligence, coordinated attacks, and individual attacks [34]. Some also
have their vessels and have a network of contacts to resell stolen goods to large buyers already
agreed upon. In general, pirates are armed with more aggressive and reckless weapons, Not
only do they steal, but they also take the ransom for ransom, which can be considered a terrorist
crime meanwhile, although not as aggressive as armed pirates pirate ships ghost activities are
very sophisticated and very difficult to grasp. This is piracy that is more prone to fraud, the
goods they target are also extremely rare, mainly mineral and petroleum, especially oil and gas.
2. THE IMPACT OF PIRACY ON INTERNATIONAL MARITIME
TRANSPORT
a) Piracy directly threatens the lives and property of the crew
Recent piracy is mostly using piracy weapons such as submachine guns, grenade launchers or
ammunition. This has led to a growing trend in violence at sea. They are piracy-ready when
they are ready to use their weapons to suppress the crew and to kill people without fear when
the crew members intend to protest [35]. In addition to the risk of casualties, crew members
who experience robbery can experience a mental disorder, many of whom are unrecoverable,
many fear being removed. The shortage of manpower for the maritime industry is not only in
Vietnam but around the world.
Also, the cost of shipping costs, the cost of insurance for ships will increase. Parallel to
rising transportation costs, maritime competition is likely to decline. In addition, high-capacity
shipowners will not invest in upgrading their ships as piracy is on the rise. Instead, they will
seek to sell their vessels in return for capital. This invisibility makes small shipping companies
disappear, and instead, only the world's major shipping companies are involved in shipping
that monopolizes shipping. And this monopoly makes the maritime industry not only in
Vietnam but also in the world cannot develop.
b) Piracy reduces the ability of shipping countries to trade by sea for shipping
According to IMB calculations, annual piracy costs $ 13-15 billion globally. This is a big risk
for international traffic and trade. If a well-known country is pirated shipping, it will adversely
affect its trade so that the country can be ostracized by shipping [36]. According to statistics
from 2008-2009, the number of piracy around the world increased by 11%, half of which were
caused by Somali pirates. And according to many experts' predictions, in the flat world of
today, the piracy will continue to occur especially in hot areas like Somalia or the South China
Sea.
Impact Of Piracy on Maritime Transport and Technical Solutions for Prevention
http://www.iaeme.com/IJCIET/index.asp 962 editor@iaeme.com
Figure 3. Yearly statistics of piracy incidents worldwide since 1948
(Source: IMO)
c) Causing political instability
Pirates are the main cause of political instability in every country. A major corrupt state is
responsible for the formation of ghost ships. That is why in South-East Asia, South America
or Somalia are areas, where there are many pirates while developed countries like Russia and
US are not pirates, are raging [37]. And reported, the country of political instability will
undermine the national flag-bearers.
Figure 4. Flag State whose vessels attacked six or more time January – June 2018
Cuong Manh Nguyen and Tien Quoc Le
http://www.iaeme.com/IJCIET/index.asp 963 editor@iaeme.com
d) Environmental hazards
In the case of piracy attacking ships carrying raw materials or oil, the consequences will be
extremely unpredictable. The worst case is that the oil spill is not only polluting the marine
environment, but also affecting the resources, marine resources, and coastal lowlands.
3. THE IMPACT OF PIRACY ON VIETNAM
According to the Vietnam Maritime Administration, the situation of maritime security in
general and piracy in Southeast Asia, in particular, are complicated. In particular, piracy tends
to increase sharply in the Sulu Sea area - Celebes in the southern Philippines and the east coast
of Sabah in Malaysia, with aggressive and aggressive ways of attacking ships, acting on life-
threatening, beatings, kidnapping, and murdering crew members. These are very dangerous
areas that local and international authorities regularly warn ship management companies and
officers and crew on board. Particularly for the Vietnamese fleet, from November 2016 to
3/2017, two piracy cases occurred in the area mentioned above, causing serious consequences
(killing one crewmember, one missing crew member, 11 crew members were abducted, some
crew members were beaten to injury, many were robbed or destroyed). Most recently, on March
5, 1977, the Phu An 268, while traveling through the Turtle Islands of the Philippines, was
pursued by pirate ships; But due to the well-executed measures taken by the vessel, the pirates
were unable to reach the ship and had to withdraw. In addition, a number of Vietnamese vessels
have also fallen victim to piracy.
On October 3, 2014, the Sunrise 689 was robbed in the Singapore area, leaving 18 crew
members detained for six days, Lost 2.000m3 of oil. On 13/12/2014, VP Asphalt 2 was also
robbed in the Singapore area, leading to the death of a Vietnamese crewman. On 11/11/2016,
Royal 16 ship of Royal Maritime Corporation was robbed in the Philippines. On February 19,
2017, Giang Hai ship and 17 crew members on the journey to transport cement from Indonesia
to the Philippines, when approaching Sulu Island, were attacked by armed pirates. The pirate
group arrested 7 of the 17 people on board, including the captain, two vice-captains, two
mechanics, two sailors. The remaining crew members were not injured, but the ship was
smashed many devices and floated on the sea. In November 2017, the Philippine Navy rescued
the crew successfully, but only three survived.
Piracy has affected Vietnam very heavily. The first is economic if the piracy situation
happens regularly, the shipping lines are forced to increase shipping costs. This will greatly
affect the economy of Vietnam as well as the world because we know that 90% of goods in the
world shipped by sea. Pirates also focus on oil tankers, so the threat of piracy is also a threat to
energy security. Pirates also lead to other criminal crimes such as smuggling and multinational
crime. All these issues will be the danger of destabilizing the political security of each nation
as well as the entire region. Especially with a country with the long sea like Vietnam, maritime
transportation is a very developed and invested industry, but with the increase as well as the
aggressiveness and aggressiveness of the pirates, the economy Of Vietnam is facing many
difficulties. Especially, Vietnam's oil tankers have been targeted by many pirates in the East
Sea. So what can be done to prevent this piracy?
4. THE SOLUTION FOR PREVENTION OF PIRACY
a) Secure-ship
Electric barriers around the ship are not lethal but serve only to combat piracy. The 9,000 volts
fence is used to infiltrate the fence. It will be shocked by electric shock (not dead), and the
result is that the robbers cannot break into the ship. And when it enters the fence, the light goes
Impact Of Piracy on Maritime Transport and Technical Solutions for Prevention
http://www.iaeme.com/IJCIET/index.asp 964 editor@iaeme.com
on, and the whistle goes off [38]. Fences can be folded easily and lowered quickly when
needed. In particular, there are doors open very easily in the case of picking up navigators,
lowering the escalator or dropping lifeboats and lifeboats.
Figure 5. Example of a warning sign in Somalia, which states
When necessary, the crew member can remove and reassemble the fence. As the vessel
approaches the active piracy area, the crew can install the fence in only a few hours. When the
ship leaves the area of danger, the captain can decide to leave or take off if the ship encounters
bad weather [39]. The remote control system can control all functions of the system without
wires. This system has been tested in the marine environment in many different seas including
the 7th wave when seawater covers the deck. Use of this protection system has several
purposes: to prevent those who want to break into the ship; Prevent and avoid attacks by
bandits; Avoid those who flee the train; Protection of crew and passengers; Control the
boarding and secretly send reports to the Piracy Center.
Figure 6. Secure-Ship is a 9000-volt electrifying fence
The Secure-Ship system meets the requirements for IMO ship protection measures and can
be installed on waterborne vehicles: Ships (except flammable cargo ships); Military ships;
Offshore supply vessels; Self-propelled barges and cruise ships. This system is being installed
Cuong Manh Nguyen and Tien Quoc Le
http://www.iaeme.com/IJCIET/index.asp 965 editor@iaeme.com
widely in European countries, especially in the Netherland, the system is a system that is
extremely developed.
b) Cruise tracking and recording system - ShipLoc
The piracy prevention center has coordinated with the satellite tracking operator to set up a
ship tracking system known as the ShipLoc system. This system outlines the ship's voyage as
well as port movement by recording the position of the vessel. There are many ships installed
with this system. ShipLoc provides ship owners and ship managers with global alert and ship
cruise control and fully meets IMO requirements for Ship Security Alert Systems (SSAS). The
device will transfer the alarm messages from the ship to the shore in the event of piracy or
terrorist attack on the vessel) (Article XI-2/6 SOLAS was adopted by IMO in December 2002
and takes effect from 2 stages. Paragraphs (July 1, 2004, and July 1, 2006) stipulate that all
vessels over 500 GT must be equipped with SSAS [40]. A small transmitter and low cost can
be hiding on the ship. For safety reasons, the crew is not known to have installed this transmitter
and its location. With ShipLoc and a networked computer, the ship owner knows exactly where
his ships are. The ShipLoc system will be very useful in the event of a ship being hijacked or
kidnapped. It can also be a management device for tracking the cruise of ships around the
world.
ShipLoc works with two functions:
• Notice of parameters from the ship: Report of the ship from 6 to 24 times/day on
the screen; Track ship location whenever and wherever; Track ship speed, position,
and direction of a cruise ship; Tracking information about the weather where the
train is traveling (wind, waves, pressure ...).
• Sending alarm messages: When the emergency button is pressed, the alarm message
will be sent immediately to the ship owner and the competent authorities (Piracy
Control Center and flag authorities).
• ShipLoc is exploited independently and automatically, including GPS receivers for
the position, direction, and speed of ships; Argo's generator and battery for use in
case of power failure. If the ship is equipped with both ShipLoc and Secure-Ship
systems, it will be effective in preventing and preventing piracy.
Figure 7. Operating principle of Ship Loc
Impact Of Piracy on Maritime Transport and Technical Solutions for Prevention
http://www.iaeme.com/IJCIET/index.asp 966 editor@iaeme.com
c) Anti-pirate water hoses system against pirates
Anti-pirate water hoses are controlled by high-pressure cold sea water and remain active until
the vessel is safe and the pump is turned off [41]. The water jets are completely efficient, with
a rotation speed of 3 to 6 round per minute
Figure 8. Water hoses system
To reduce the maximum of water pressure drop, a block has been installed to limit the water
spray on the upside. The sprinklers can be installed as either permanent or portable solutions
and without additional chemicals or steam.
c) Non-Lethal Slippery Foam
A foaming machine may be used, but it must be provided in addition to the FFE-Fire Fighting
Equipment list. Foamers are effective as it is disoriented and very slippery making it difficult
for the pirates to climb the ship.
5. SOLUTIONS PROPOSED BY THE VIETNAM MARITIME
ADMINISTRATION TO PREVENT PIRACY
Review and propose competent agencies to amend and supplement the legal documents related
to maritime security, including the prevention and fight against piracy and theft of ships;
To promulgate documents guiding ship owners and ship management companies to take
measures to prevent and combat piracy and armed robbery against seagoing ships. Coordinate
with concerned agencies and units such as the Consular Department of the Ministry of Foreign
Affairs, the Marine Police, the Border Guard Command, the Ministry of Defense, the Anti-
terrorist Department of the Ministry of Public Security and the Post Check Vietnam to take
measures to assist ship owners and crew when attacked by pirates. In some piracy cases, in
addition to liaising and coordinating with foreign agencies and organizations to request
assistance, search and rescue of Vietnamese ships, the Vietnam Maritime Bureau has also sent
officials Directly to other countries to assist ship owners and crew members in handling and
handling cases. Participating in the ReCAAP - Member Conference of the Executive Council
of the Anti-Piracy Information Center and Armed Robbery Against Boats in Asia. The
Government, the relevant ministries and branches of Vietnam have also made some concrete
Cuong Manh Nguyen and Tien Quoc Le
http://www.iaeme.com/IJCIET/index.asp 967 editor@iaeme.com
measures to help Vietnamese crewmen and ship-owners in piracy prevention and combat.
However, up to now, these solutions are not strong enough to prevent or completely stop piracy
for our fleet. Stakeholders have agreed on the issue of piracy, armed robbery of the seafarers is
committed to working together to improve the effectiveness of anti-piracy. Sea and armed
robbery against the seagoing ship, contributing to the assistance of seafarers and ship-owners
to reassure them when cruising through high-risk areas of piracy; minimizing the damage of
people and property when the ship encounters pirates.
6. CONCLUSION
Facing increasingly complex piracy and a significant impact on the maritime security of the
region, threatening the development of shipping, countries in the region have taken appropriate
steps in the fight against piracy, armed robbery such as cooperation in sharing information
against piracy, joint patrols and achieved certain results. However, to have comprehensive and
specialized solutions in the fight against piracy and armed robbery in the region, in the coming
time, countries should step up international cooperation to Jointly build the legal corridor and
law enforcement capacity, organize patrols and workshops to share experiences and comment
on issues that exist different perspectives. At the same time, the parties also need to improve
their cooperation in protecting ships.
REFERENCES
[1] G. W. Burruss, T. J. Holt, and A. Bossler, “Revisiting the Suppression Relationship
Between Social Learning and Self-Control on Software Piracy,” Soc. Sci. Comput. Rev.,
p. 0894439317753820, 2018.
[2] V. Re, “Anti-piracy policies and online film circulation: The Italian context, between
formality and informality,” in Digital Piracy, Routledge, 2018, pp. 66–94.
[3] A. Imran, E. A. Bramer, K. Seshan, and G. Brem, “An overview of catalysts in biomass
pyrolysis for production of biofuels,” Biofuel Res. J., vol. 5, no. 4, pp. 872–885, Dec. 2018.
[4] Y. Ning, S. X. Xu, M. Yan, and G. Q. Huang, “Digital pricing with piracy and variety
seeking,” Int. J. Prod. Econ., vol. 206, pp. 184–195, 2018.
[5] J. Corwin, “Preventing Pirated Software Use within an Organization,” 2018.
[6] L. Yang, W. Wang, Z. Wang, and Q. Zhang, “Rainbow: Preventing Mobile-Camera-based
Piracy in the Physical World,” in IEEE INFOCOM 2018-IEEE Conference on Computer
Communications, 2018, pp. 1061–1069.
[7] A. T. Hoang, “Prediction of the density and viscosity of biodiesel and the influence of
biodiesel properties on a diesel engine fuel supply system,” J. Mar. Eng. Technol, 2018.
https://doi.org/10.1080/20464177.2018.1532734.
[8] A. T. Hoang, “A report of the oil spill recovery and treatment technologies to reduce the
marine environment pollution,” Int. J. e-Navigation Marit. Econ., vol. 9, pp. 35–49, 2018.
[9] A. T. Hoang and X. D. Pham, “An investigation of remediation and recovery of oil spill
and toxic heavy metal from maritime pollution by a new absorbent material,” J. Mar. Eng.
Technol., 2018. https://doi.org/10.1080/20464177.2018.1544401.
[10] M. A. Rosen, “Environmental sustainability tools in the biofuel industry,” Biofuel Res. J.,
vol. 5, no. 1, pp. 751–752, Mar. 2018.
[11] A. T. Hoang et al., “An absorption capacity investigation of new absorbent based on
polyurethane foams and rice straw for oil spill cleanup,” Pet. Sci. Technol., vol. 36, no. 5,
pp. 361–370, 2018.
[12] L. Leng and W. Zhou, “Chemical compositions and wastewater properties of aqueous phase
(wastewater) produced from the hydrothermal treatment of wet biomass: A review,”
Impact Of Piracy on Maritime Transport and Technical Solutions for Prevention
http://www.iaeme.com/IJCIET/index.asp 968 editor@iaeme.com
Energy Sources, Part A Recover. Util. Environ. Eff., vol. 40, no. 22, pp. 2648–2659, Nov.
2018.
[13] A. T. Hoang and A. T. Le, “Trilateral correlation of spray characteristics, combustion
parameters, and deposit formation in the injector hole of a diesel engine running on
preheated Jatropha oil and fossil diesel fuel,” Biofuel Res. J., 2019.
https://doi.org/10.18331/BRJ2019.6.1.2.
[14] H. A. Tuan and C. M. Quang, “A mini review of using oleophilic skimmers for oil spill
recovery,” J. Mech. Eng. Res. Dev, vol. 41, no. 2, pp. 92–96, 2018.
[15] A. T. Hoang and A. T. Le, “Trilateral correlation of spray characteristics, combustion
parameters, and deposit formation in the injector hole of a diesel engine running on
preheated Jatropha oil and fossil diesel fuel,” Biofuel Res. J., 2019.
https://doi.org/10.18331/BRJ2019.6.1.2.
[16] A. T. Hoang, X. L. Bui, and X. D. Pham, “A novel investigation of oil and heavy metal
adsorption capacity from as-fabricated adsorbent based on agricultural by-product and
porous polymer,” Energy Sources, Part A Recover. Util. Environ. Eff., vol. 40, no. 8, pp.
929–939, 2018.
[17] P. H. Hoang, A. T. Hoang, N. H. Chung, L. Q. Dien, X. P. Nguyen, and X. D. Pham, “The
efficient lignocellulose-based sorbent for oil spill treatment from polyurethane and
agricultural residue of Vietnam,” Energy Sources, Part A Recover. Util. Environ. Eff., vol.
40, no. 3, pp. 312–319, 2018.
[18] A. Demirbaş, “Global Renewable Energy Resources,” Energy Sources, Part A Recover.
Util. Environ. Eff., vol. 28, no. 8, pp. 779–792, Jul. 2006.
[19] M. Vijay Kumar, A. Veeresh Babu, P. Ravi Kumar, and S. Sudhakara Reddy,
“Experimental investigation of the combustion characteristics of Mahua oil biodiesel-diesel
blend using a DI diesel engine modified with EGR and nozzle hole orifice diameter,”
Biofuel Res. J., vol. 5, no. 3, pp. 863–871, 2018.
[20] A. T. Hoang and V. V. Pham, “A study of emission characteristic, deposits, and lubrication
oil degradation of a diesel engine running on preheated vegetable oil and diesel oil,” Energy
Sources, Part A Recover. Util. Environ. Eff., vol. 41, no. 5, pp. 611–625, 2019.
[21] A. T. Hoang, “Waste heat recovery from diesel engines based on Organic Rankine Cycle,”
Appl. Energy, vol. 231, pp. 138–166, 2018.
[22] A. T. Hoang and A. T. Le, “A review on deposit formation in the injector of diesel engines
running on biodiesel,” Energy Sources, Part A Recover. Util. Environ. Eff., vol. 41, no. 5,
pp. 584–599, 2019.
[23] K. Christiansen, D. R. Raman, G. Hu, and R. Anex, “First-order estimates of the costs,
input-output energy analysis, and energy returns on investment of conventional and
emerging biofuels feedstocks,” Biofuel Res. J., vol. 5, no. 4, pp. 894–899, Dec. 2018.
[24] O. Duru, “Irrationality in politics and governance of maritime affairs: The collapse of
sovereign maritime governance,” Int. J. e-Navigation Marit. Econ., vol. 1, pp. 48–59, 2014.
[25] A. G. James, “Bruce A. Elleman. Seaborne Perils: Piracy, Maritime Crime, and Naval
Terrorism in Africa, South Asia, and Southeast Asia.” Taylor & Francis, 2018.
[26] G. H. Dinh and N.-K. Im, “The combination of analytical and statistical method to define
polygonal ship domain and reflect human experiences in estimating dangerous area,” Int.
J. e-Navigation Marit. Econ., vol. 4, pp. 97–108, 2016.
[27] F. R. Hamza and J.-P. Priotti, “Maritime trade and piracy in the Gulf of Aden and the Indian
Ocean (1994–2017),” J. Transp. Secur., pp. 1–18, 2018.
[28] C. E. Nwadigwe, “Creativity and New Technologies: Piracy, Politics and the Business of
Cultural Production in Nigeria,” in Africa and Globalization, Springer, 2018, pp. 183–204.
Cuong Manh Nguyen and Tien Quoc Le
http://www.iaeme.com/IJCIET/index.asp 969 editor@iaeme.com
[29] M. Posada, H. Greidanus, M. Alvarez, M. Vespe, T. Cokacar, and S. Falchetti, “Maritime
awareness for counter-piracy in the Gulf of Aden,” in Geoscience and Remote Sensing
Symposium (IGARSS), 2011 IEEE International, 2011, pp. 249–252.
[30] Y. K. M. Leung, “Legal challenges with the use of Vessel Protection Detachments and
Private Maritime Security Company guards for on board ship protection against piracy.”
UiT Norges arktiske universitet, 2018.
[31] S. C. Brown and T. J. Holt, “12 Identifying paths forward in the study of piracy,” Digit.
Piracy A Glob. Multidiscip. Acc., p. 250, 2018.
[32] G. Burruss and C. Dodge, “10 The criminality of digital piracy,” Digit. Piracy A Glob.
Multidiscip. Acc., p. 208, 2018.
[33] J. Lindley, “Using regulatory pluralism to achieve effective control of Somali piracy,”
Crim. Justice Regul. Revisit. Essays Honour Peter Grabosky, p. 109, 2018.
[34] J. V Hastings and S. G. Phillips, “Order beyond the state: explaining Somaliland’s
avoidance of maritime piracy,” J. Mod. Afr. Stud., vol. 56, no. 1, pp. 5–30, 2018.
[35] P. Tyson, “Evaluating Australia’s New Anti-Piracy Website Blocking Laws,” UniSA
Student Law Rev., vol. 3, 2018.
[36] I. M. A. G. Azmi, H. G. Lim, P. S. Tay, and C. P. Sik, “Trans-Pacific Partnership
Agreement Minus One and Enhanced Criminal Penalty for Online Copyright Piracy:
Malaysia’s Options,” J. World Trade, vol. 52, no. 3, pp. 461–477, 2018.
[37] N. S. F. A. Rahman, A. H. Saharuddin, and R. Rasdi, “Effect of the northern sea route
opening to the shipping activities at Malacca straits,” Int. J. e-Navigation Marit. Econ., vol.
1, pp. 85–98, 2014.
[38] W. A. Knight and A. A. Elmi, “Combatting Piracy in the Horn of Africa Waters,” in The
Palgrave Handbook of Contemporary International Political Economy, Springer, 2019, pp.
485–500.
[39] V. Sakhuja, “Maritime terrorism and piracy: security challenges in South East Asia,”
eSocialSciences, 2018.
[40] A. D. Ba, “Governing the Safety and Security of the Malacca Strait: The Nippon
Foundation between States and Industry,” J. Contemp. Asia, vol. 48, no. 2, pp. 252–277,
2018.
[41] M. J. Struett, “Maritime Piracy and Global Security,” Transnatl. Crime Glob. Secur. [2
Vol., p. 23, 2018.

More Related Content

What's hot

Security and Safety in the Gulf of Guinea: The Role of Intelligence-Led Law E...
Security and Safety in the Gulf of Guinea: The Role of Intelligence-Led Law E...Security and Safety in the Gulf of Guinea: The Role of Intelligence-Led Law E...
Security and Safety in the Gulf of Guinea: The Role of Intelligence-Led Law E...
inventionjournals
 
IONS Seminar 2014 - Comments in the Margin
IONS Seminar 2014 - Comments in the MarginIONS Seminar 2014 - Comments in the Margin
IONS Seminar 2014 - Comments in the MarginNavy Webmaster
 
IHS Analysis - Politics & Piracy
IHS Analysis - Politics & PiracyIHS Analysis - Politics & Piracy
IHS Analysis - Politics & Piracy
IHS
 
Ippai energy security presentation chietgj bajpaee
Ippai energy security presentation chietgj bajpaeeIppai energy security presentation chietgj bajpaee
Ippai energy security presentation chietgj bajpaeeIPPAI
 
IONS Seminar 2014 - Session 1 - Risk Managing Maritime Security in the Indian...
IONS Seminar 2014 - Session 1 - Risk Managing Maritime Security in the Indian...IONS Seminar 2014 - Session 1 - Risk Managing Maritime Security in the Indian...
IONS Seminar 2014 - Session 1 - Risk Managing Maritime Security in the Indian...
Navy Webmaster
 
ONI Quarterly April_2008_Piracy
ONI Quarterly April_2008_PiracyONI Quarterly April_2008_Piracy
ONI Quarterly April_2008_PiracyDavid Pearl
 
Maritime Piracy and Unlawful Acts against Safety of Lives at Sea: Inimical an...
Maritime Piracy and Unlawful Acts against Safety of Lives at Sea: Inimical an...Maritime Piracy and Unlawful Acts against Safety of Lives at Sea: Inimical an...
Maritime Piracy and Unlawful Acts against Safety of Lives at Sea: Inimical an...
AJSSMTJournal
 
Security economic consequences of piracy on shipping and its impacts og globa...
Security economic consequences of piracy on shipping and its impacts og globa...Security economic consequences of piracy on shipping and its impacts og globa...
Security economic consequences of piracy on shipping and its impacts og globa...Siddharth Chandrasekar
 
Maritime piracy mindmap
Maritime piracy mindmapMaritime piracy mindmap
Maritime piracy mindmap
SanuraDeAlwis
 
Maritime piracy a sustainable global solution
Maritime piracy  a sustainable global solutionMaritime piracy  a sustainable global solution
Maritime piracy a sustainable global solution
SanuraDeAlwis
 
Piracy and armed robbery at sea in the Niger Delta: current situation and sol...
Piracy and armed robbery at sea in the Niger Delta: current situation and sol...Piracy and armed robbery at sea in the Niger Delta: current situation and sol...
Piracy and armed robbery at sea in the Niger Delta: current situation and sol...
SWAIMSProject
 
Sea Piracy through Somalia
Sea Piracy through SomaliaSea Piracy through Somalia
Sea Piracy through SomaliaAbdul Rehman
 
How IUU fishing impacts small-scale fishers' lives
How IUU fishing impacts small-scale fishers' livesHow IUU fishing impacts small-scale fishers' lives
How IUU fishing impacts small-scale fishers' lives
SWAIMSProject
 
Irina Bronshteyn Piracy Off The Coast Of Somalia
Irina Bronshteyn   Piracy Off The Coast Of SomaliaIrina Bronshteyn   Piracy Off The Coast Of Somalia
Irina Bronshteyn Piracy Off The Coast Of SomaliaHAXAJlKA
 
IONS Seminar 2014 - Session 5 - Maritime Cooperation in the Indian Ocean
IONS Seminar 2014 - Session 5 - Maritime Cooperation in the Indian OceanIONS Seminar 2014 - Session 5 - Maritime Cooperation in the Indian Ocean
IONS Seminar 2014 - Session 5 - Maritime Cooperation in the Indian Ocean
Navy Webmaster
 
NiDAR MAST 2016_pdf
NiDAR MAST 2016_pdfNiDAR MAST 2016_pdf
NiDAR MAST 2016_pdf
Rob Balloch
 
Blue water navy and india
Blue water navy and indiaBlue water navy and india
Blue water navy and india
Col Mukteshwar Prasad
 
Takshashila Blue Paper on Coastal Security Architecture
Takshashila Blue Paper on Coastal Security ArchitectureTakshashila Blue Paper on Coastal Security Architecture
Takshashila Blue Paper on Coastal Security Architecture
The Takshashila Institution
 

What's hot (20)

Security and Safety in the Gulf of Guinea: The Role of Intelligence-Led Law E...
Security and Safety in the Gulf of Guinea: The Role of Intelligence-Led Law E...Security and Safety in the Gulf of Guinea: The Role of Intelligence-Led Law E...
Security and Safety in the Gulf of Guinea: The Role of Intelligence-Led Law E...
 
IONS Seminar 2014 - Comments in the Margin
IONS Seminar 2014 - Comments in the MarginIONS Seminar 2014 - Comments in the Margin
IONS Seminar 2014 - Comments in the Margin
 
IHS Analysis - Politics & Piracy
IHS Analysis - Politics & PiracyIHS Analysis - Politics & Piracy
IHS Analysis - Politics & Piracy
 
Ippai energy security presentation chietgj bajpaee
Ippai energy security presentation chietgj bajpaeeIppai energy security presentation chietgj bajpaee
Ippai energy security presentation chietgj bajpaee
 
IONS Seminar 2014 - Session 1 - Risk Managing Maritime Security in the Indian...
IONS Seminar 2014 - Session 1 - Risk Managing Maritime Security in the Indian...IONS Seminar 2014 - Session 1 - Risk Managing Maritime Security in the Indian...
IONS Seminar 2014 - Session 1 - Risk Managing Maritime Security in the Indian...
 
ONI Quarterly April_2008_Piracy
ONI Quarterly April_2008_PiracyONI Quarterly April_2008_Piracy
ONI Quarterly April_2008_Piracy
 
Maritime Piracy and Unlawful Acts against Safety of Lives at Sea: Inimical an...
Maritime Piracy and Unlawful Acts against Safety of Lives at Sea: Inimical an...Maritime Piracy and Unlawful Acts against Safety of Lives at Sea: Inimical an...
Maritime Piracy and Unlawful Acts against Safety of Lives at Sea: Inimical an...
 
Security economic consequences of piracy on shipping and its impacts og globa...
Security economic consequences of piracy on shipping and its impacts og globa...Security economic consequences of piracy on shipping and its impacts og globa...
Security economic consequences of piracy on shipping and its impacts og globa...
 
Maritime piracy mindmap
Maritime piracy mindmapMaritime piracy mindmap
Maritime piracy mindmap
 
Maritime piracy a sustainable global solution
Maritime piracy  a sustainable global solutionMaritime piracy  a sustainable global solution
Maritime piracy a sustainable global solution
 
Piracy and armed robbery at sea in the Niger Delta: current situation and sol...
Piracy and armed robbery at sea in the Niger Delta: current situation and sol...Piracy and armed robbery at sea in the Niger Delta: current situation and sol...
Piracy and armed robbery at sea in the Niger Delta: current situation and sol...
 
Sea Piracy through Somalia
Sea Piracy through SomaliaSea Piracy through Somalia
Sea Piracy through Somalia
 
How IUU fishing impacts small-scale fishers' lives
How IUU fishing impacts small-scale fishers' livesHow IUU fishing impacts small-scale fishers' lives
How IUU fishing impacts small-scale fishers' lives
 
Irina Bronshteyn Piracy Off The Coast Of Somalia
Irina Bronshteyn   Piracy Off The Coast Of SomaliaIrina Bronshteyn   Piracy Off The Coast Of Somalia
Irina Bronshteyn Piracy Off The Coast Of Somalia
 
IONS Seminar 2014 - Session 5 - Maritime Cooperation in the Indian Ocean
IONS Seminar 2014 - Session 5 - Maritime Cooperation in the Indian OceanIONS Seminar 2014 - Session 5 - Maritime Cooperation in the Indian Ocean
IONS Seminar 2014 - Session 5 - Maritime Cooperation in the Indian Ocean
 
NiDAR MAST 2016_pdf
NiDAR MAST 2016_pdfNiDAR MAST 2016_pdf
NiDAR MAST 2016_pdf
 
unclos_definition_and_classification_of_pirate_acts
unclos_definition_and_classification_of_pirate_actsunclos_definition_and_classification_of_pirate_acts
unclos_definition_and_classification_of_pirate_acts
 
Blue water navy and india
Blue water navy and indiaBlue water navy and india
Blue water navy and india
 
The society for peace studies and practice.2
The society for peace studies and practice.2The society for peace studies and practice.2
The society for peace studies and practice.2
 
Takshashila Blue Paper on Coastal Security Architecture
Takshashila Blue Paper on Coastal Security ArchitectureTakshashila Blue Paper on Coastal Security Architecture
Takshashila Blue Paper on Coastal Security Architecture
 

Similar to Ijciet 10 01_089

Piracy at sea and its effect on commercial shipping around africa
Piracy at sea and its effect on commercial shipping around africaPiracy at sea and its effect on commercial shipping around africa
Piracy at sea and its effect on commercial shipping around africa
Railways and Harbours
 
Piracy and Maritime Security in the Indian Ocean
Piracy and Maritime Security in the Indian Ocean Piracy and Maritime Security in the Indian Ocean
Piracy and Maritime Security in the Indian Ocean
Fanuel Lakew
 
Piracy as a threat to maritime security by Caleb Danladi Bako
Piracy as a threat to maritime security by Caleb Danladi BakoPiracy as a threat to maritime security by Caleb Danladi Bako
Piracy as a threat to maritime security by Caleb Danladi Bako
Danladi Caleb
 
Piracy as a threat to maritime security by Caleb Danladi Bako
Piracy as a threat to maritime security by Caleb Danladi BakoPiracy as a threat to maritime security by Caleb Danladi Bako
Piracy as a threat to maritime security by Caleb Danladi Bako
Danladi Caleb
 
POWERPOINT_PRESENTATION_SSO.pdf
POWERPOINT_PRESENTATION_SSO.pdfPOWERPOINT_PRESENTATION_SSO.pdf
POWERPOINT_PRESENTATION_SSO.pdf
InibudiLed
 
The maritime security disclaimer management against piracy threats in eastern...
The maritime security disclaimer management against piracy threats in eastern...The maritime security disclaimer management against piracy threats in eastern...
The maritime security disclaimer management against piracy threats in eastern...
pra_yoga2305
 
Imo world maritime day 2017
Imo world maritime day 2017Imo world maritime day 2017
Imo world maritime day 2017
Capt Ashok Menon
 
POWERPOINT_PRESENTATION_SSO.ppt
POWERPOINT_PRESENTATION_SSO.pptPOWERPOINT_PRESENTATION_SSO.ppt
POWERPOINT_PRESENTATION_SSO.ppt
InibudiLed
 
POWERPOINT_PRESENTATION_SSO.ppt
POWERPOINT_PRESENTATION_SSO.pptPOWERPOINT_PRESENTATION_SSO.ppt
POWERPOINT_PRESENTATION_SSO.ppt
parvinder41
 
Artículo operation ocean shield
Artículo operation ocean shieldArtículo operation ocean shield
Artículo operation ocean shield
INGRIDGAMBOA11
 
Maritime Security
Maritime SecurityMaritime Security
Maritime Security
ijtsrd
 
Piracy and human traffiking
Piracy and human traffikingPiracy and human traffiking
Piracy and human traffiking
JayasankarJayasoman2
 
strategic importance of indian ocean.pptx
strategic importance of indian ocean.pptxstrategic importance of indian ocean.pptx
strategic importance of indian ocean.pptx
MahamAaqil2
 
Dryad Maritime - Superyacht Special Advisory
Dryad Maritime - Superyacht Special AdvisoryDryad Maritime - Superyacht Special Advisory
Dryad Maritime - Superyacht Special Advisory
Fabien Roché, MNI
 
Maritime economy vs security paper 2016
Maritime economy vs security paper 2016Maritime economy vs security paper 2016
Maritime economy vs security paper 2016Philip Holihead
 
2023-Impact-of-Tourism-in-Coastal-Areas.pptx
2023-Impact-of-Tourism-in-Coastal-Areas.pptx2023-Impact-of-Tourism-in-Coastal-Areas.pptx
2023-Impact-of-Tourism-in-Coastal-Areas.pptx
ChrisBendoy
 
India and the Indian Ocean: Certain Issues relating to Non-Traditional Security
India and the Indian Ocean: Certain Issues relating to Non-Traditional SecurityIndia and the Indian Ocean: Certain Issues relating to Non-Traditional Security
India and the Indian Ocean: Certain Issues relating to Non-Traditional Security
Nilendra Kumar
 

Similar to Ijciet 10 01_089 (20)

Piracy at sea and its effect on commercial shipping around africa
Piracy at sea and its effect on commercial shipping around africaPiracy at sea and its effect on commercial shipping around africa
Piracy at sea and its effect on commercial shipping around africa
 
Piracy and Maritime Security in the Indian Ocean
Piracy and Maritime Security in the Indian Ocean Piracy and Maritime Security in the Indian Ocean
Piracy and Maritime Security in the Indian Ocean
 
Piracy as a threat to maritime security by Caleb Danladi Bako
Piracy as a threat to maritime security by Caleb Danladi BakoPiracy as a threat to maritime security by Caleb Danladi Bako
Piracy as a threat to maritime security by Caleb Danladi Bako
 
Piracy as a threat to maritime security by Caleb Danladi Bako
Piracy as a threat to maritime security by Caleb Danladi BakoPiracy as a threat to maritime security by Caleb Danladi Bako
Piracy as a threat to maritime security by Caleb Danladi Bako
 
piracy
piracypiracy
piracy
 
POWERPOINT_PRESENTATION_SSO.pdf
POWERPOINT_PRESENTATION_SSO.pdfPOWERPOINT_PRESENTATION_SSO.pdf
POWERPOINT_PRESENTATION_SSO.pdf
 
02-Kalu-2
02-Kalu-202-Kalu-2
02-Kalu-2
 
The maritime security disclaimer management against piracy threats in eastern...
The maritime security disclaimer management against piracy threats in eastern...The maritime security disclaimer management against piracy threats in eastern...
The maritime security disclaimer management against piracy threats in eastern...
 
Imo world maritime day 2017
Imo world maritime day 2017Imo world maritime day 2017
Imo world maritime day 2017
 
POWERPOINT_PRESENTATION_SSO.ppt
POWERPOINT_PRESENTATION_SSO.pptPOWERPOINT_PRESENTATION_SSO.ppt
POWERPOINT_PRESENTATION_SSO.ppt
 
POWERPOINT_PRESENTATION_SSO.ppt
POWERPOINT_PRESENTATION_SSO.pptPOWERPOINT_PRESENTATION_SSO.ppt
POWERPOINT_PRESENTATION_SSO.ppt
 
Artículo operation ocean shield
Artículo operation ocean shieldArtículo operation ocean shield
Artículo operation ocean shield
 
Maritime Security
Maritime SecurityMaritime Security
Maritime Security
 
Piracy and human traffiking
Piracy and human traffikingPiracy and human traffiking
Piracy and human traffiking
 
strategic importance of indian ocean.pptx
strategic importance of indian ocean.pptxstrategic importance of indian ocean.pptx
strategic importance of indian ocean.pptx
 
Dryad Maritime - Superyacht Special Advisory
Dryad Maritime - Superyacht Special AdvisoryDryad Maritime - Superyacht Special Advisory
Dryad Maritime - Superyacht Special Advisory
 
Maritime economy vs security paper 2016
Maritime economy vs security paper 2016Maritime economy vs security paper 2016
Maritime economy vs security paper 2016
 
IOR
IOR IOR
IOR
 
2023-Impact-of-Tourism-in-Coastal-Areas.pptx
2023-Impact-of-Tourism-in-Coastal-Areas.pptx2023-Impact-of-Tourism-in-Coastal-Areas.pptx
2023-Impact-of-Tourism-in-Coastal-Areas.pptx
 
India and the Indian Ocean: Certain Issues relating to Non-Traditional Security
India and the Indian Ocean: Certain Issues relating to Non-Traditional SecurityIndia and the Indian Ocean: Certain Issues relating to Non-Traditional Security
India and the Indian Ocean: Certain Issues relating to Non-Traditional Security
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
IAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
IAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
IAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 

Recently uploaded (20)

Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 

Ijciet 10 01_089

  • 1. http://www.iaeme.com/IJCIET/index.asp 958 editor@iaeme.com International Journal of Civil Engineering and Technology (IJCIET) Volume 10, Issue 01, January 2019, pp. 958-969, Article ID: IJCIET_10_01_089 Available online at http://www.iaeme.com/ijciet/issues.asp?JType=IJCIET&VType=10&IType=01 ISSN Print: 0976-6308 and ISSN Online: 0976-6316 © IAEME Publication Scopus Indexed IMPACT OF PIRACY ON MARITIME TRANSPORT AND TECHNICAL SOLUTIONS FOR PREVENTION Cuong Manh Nguyen and Tien Quoc Le Vietnam Maritime University, Haiphong city, Vietnam ABSTRACT Pirates are acts of loot taking place on the sea or the coast and are acted upon by illegal maritime forces. Piracy is an international crime, piracy that directly threatens the lives and lives of seafarers, strongly impacts maritime activity as well as economic development [1]. The global damage caused by piracy is estimated at $ 6.6 to $ 6.9 billion through commercial fraud, loss of cargo or delay. Even pirates can cause political instability due to state officials' corruption. Key words: illegal maritime, Piracy Cite this Article: Cuong Manh Nguyen and Tien Quoc Le, Impact Of Piracy on Maritime Transport and Technical Solutions for Prevention. International Journal of Civil Engineering and Technology, 10(01), 2019, pp. 958–969 http://www.iaeme.com/IJCIET/issues.asp?JType=IJCIET&VType=10&IType=01 1. INTRODUCTION Pirates are acts of loot taking place on the sea or the coast and are acted upon by illegal maritime forces. Piracy is an international crime, piracy that directly threatens the lives and lives of seafarers, strongly impacts maritime activity as well as economic development [1]. The global damage caused by piracy is estimated at $ 6.6 to $ 6.9 billion through commercial fraud, loss of cargo or delay. Even pirates can cause political instability due to state officials' corruption. According to statistics, 90% of world trade is carried out by sea transport [2]. Meanwhile, the data show that from 2007 to September 2012 there are 2,083 cases (equivalent to 30 cases/month, 370 cases/year). The "hotspot" areas of piracy are located in Somalia, the Gulf of Aden, and South-East Asia.
  • 2. Cuong Manh Nguyen and Tien Quoc Le http://www.iaeme.com/IJCIET/index.asp 959 editor@iaeme.com Figure 1. Strait of Malacca - High-risk areas are attacked by pirates in Southeast Asia Pirates were born in the 300 BC when people began to sail offshore; the late seventeenth- early eighteenth century is considered the era of piracy when the period has a series of seizures. The piracy was openly held, and the number of robberies increased rapidly [3]. After that golden age, pirates were active in the waters of the Indian Ocean, the Pacific, the offshore waters of Somalia, the Straits of Malacca and the South China Sea. But since 1994, the establishment of the WTO has led to rapid economic development and free trade in which ocean freight is the most significant volume of goods in the world [4]. Especially for countries with coastal lines, ocean freight is considered to be a huge advantage. But with this development is the pirates' worrying growth. Between 1994 and 2002, more than 2,000 piracy cases worldwide caused about $ 15 billion in damages each year, and the two most hotspots for piracy were Somali and regional waters East Sea [5]. Figure 2. Somali pirate operating area
  • 3. Impact Of Piracy on Maritime Transport and Technical Solutions for Prevention http://www.iaeme.com/IJCIET/index.asp 960 editor@iaeme.com However, thanks to the efforts of the countries joining the WTO, especially the countries with large navies such as Russia, America, have helped to trade goods and travel at sea become more favorable also Such as reducing economic losses for participating countries [6]. Besides the development strategies of the maritime industry, the use of bio-fuel and protection of marine environmental pollution are attracting much attention to aim at the "Green shipping" [7-23]. Currently, the world classifies two types of pirates based on their activities: armed robbers and ghosts. These two types of robberies are considered pirates, but they have very different ways of operating [24-29]. While the armed robbery is armed and terroristic, the ghost ship acts extremely sophisticatedly and, in recognition of these two types of robberies, we come to the same traits. Their prominence, as well as the active area of each type of robbery, is classified as followed: 1.1. Armed robbery • Grounds: Usually located in places far from central areas, uninhabited islands, areas not regularly inspected by the government. Some regions may be named, such as the islands of Indonesia, the Gulf of Mexico, the Caribbean, or Somalia • Manpower: Mainly local people are knowledgeable in the area, armed with weapons such as guns, grenades, etc. • Vehicles: Use high-speed canoes and boats to avoid scans of radar boats as well as quickly and easily reach cargo ships to control crew on board. • Use high-speed trains close to merchant ships, cruise ships, and boat captains and ship them to their area. Select the types of goods that can be handled and unloaded in the country and neighboring countries. Accompanying the looting of terrorism is the trafficking of illicit drugs and illicit drugs in countries around the world. • The most famous for this type of terrorist piracy is the Somali region - from the Atlantic Ocean to the Indian Ocean and vice versa, South America, some of the archipelago of Indonesia in the Southeast ASIAN. 1.2. Ghost ships This is a very sophisticated form of piracy, which is a ship registered and flagged properly, but these ships carry pirates. When the pirates capture the ship, cargo on the whole ship is taken to the ghost ship, which will be shipped to the sea after shipment without any difficulty from the ship. Security forces. Through analysis and evaluation, maritime security forces find that ghost ships typically have the following characteristics: • Over 15 - 20 years of use • Initial registration information is abnormal • Ships arrive at slow ports for loading and unloading • The owner or operator is always the only one Famous for the use of this ghost is the Chinese or Chinese pirate group in Guangzhou, Shanghai, Fujian. They operate by information obtained through brokerage or moderator in Southeast Asia [32]. Therefore, their main area of activity is in the Pacific Ocean, in which the East Sea is fertile soil for the pirates. The activities of these two types of pirates, despite the same purpose, are the looting of ocean-going ships, but the way they operate is extremely different. While the primary activity of armed pirates is to loot goods and take hostages for ransom, robberies are mostly flushed into the water or transported to neighboring countries for consumption [33]. The pirate ships
  • 4. Cuong Manh Nguyen and Tien Quoc Le http://www.iaeme.com/IJCIET/index.asp 961 editor@iaeme.com are incredibly sophisticated and cunning. This type of piracy is extremely dangerous both regarding how it works and how it is plundered, but it does not work alone, but it operates in an organized, commanded manner and receives shore support. It acts as a sophisticated criminal organization, with intelligence, coordinated attacks, and individual attacks [34]. Some also have their vessels and have a network of contacts to resell stolen goods to large buyers already agreed upon. In general, pirates are armed with more aggressive and reckless weapons, Not only do they steal, but they also take the ransom for ransom, which can be considered a terrorist crime meanwhile, although not as aggressive as armed pirates pirate ships ghost activities are very sophisticated and very difficult to grasp. This is piracy that is more prone to fraud, the goods they target are also extremely rare, mainly mineral and petroleum, especially oil and gas. 2. THE IMPACT OF PIRACY ON INTERNATIONAL MARITIME TRANSPORT a) Piracy directly threatens the lives and property of the crew Recent piracy is mostly using piracy weapons such as submachine guns, grenade launchers or ammunition. This has led to a growing trend in violence at sea. They are piracy-ready when they are ready to use their weapons to suppress the crew and to kill people without fear when the crew members intend to protest [35]. In addition to the risk of casualties, crew members who experience robbery can experience a mental disorder, many of whom are unrecoverable, many fear being removed. The shortage of manpower for the maritime industry is not only in Vietnam but around the world. Also, the cost of shipping costs, the cost of insurance for ships will increase. Parallel to rising transportation costs, maritime competition is likely to decline. In addition, high-capacity shipowners will not invest in upgrading their ships as piracy is on the rise. Instead, they will seek to sell their vessels in return for capital. This invisibility makes small shipping companies disappear, and instead, only the world's major shipping companies are involved in shipping that monopolizes shipping. And this monopoly makes the maritime industry not only in Vietnam but also in the world cannot develop. b) Piracy reduces the ability of shipping countries to trade by sea for shipping According to IMB calculations, annual piracy costs $ 13-15 billion globally. This is a big risk for international traffic and trade. If a well-known country is pirated shipping, it will adversely affect its trade so that the country can be ostracized by shipping [36]. According to statistics from 2008-2009, the number of piracy around the world increased by 11%, half of which were caused by Somali pirates. And according to many experts' predictions, in the flat world of today, the piracy will continue to occur especially in hot areas like Somalia or the South China Sea.
  • 5. Impact Of Piracy on Maritime Transport and Technical Solutions for Prevention http://www.iaeme.com/IJCIET/index.asp 962 editor@iaeme.com Figure 3. Yearly statistics of piracy incidents worldwide since 1948 (Source: IMO) c) Causing political instability Pirates are the main cause of political instability in every country. A major corrupt state is responsible for the formation of ghost ships. That is why in South-East Asia, South America or Somalia are areas, where there are many pirates while developed countries like Russia and US are not pirates, are raging [37]. And reported, the country of political instability will undermine the national flag-bearers. Figure 4. Flag State whose vessels attacked six or more time January – June 2018
  • 6. Cuong Manh Nguyen and Tien Quoc Le http://www.iaeme.com/IJCIET/index.asp 963 editor@iaeme.com d) Environmental hazards In the case of piracy attacking ships carrying raw materials or oil, the consequences will be extremely unpredictable. The worst case is that the oil spill is not only polluting the marine environment, but also affecting the resources, marine resources, and coastal lowlands. 3. THE IMPACT OF PIRACY ON VIETNAM According to the Vietnam Maritime Administration, the situation of maritime security in general and piracy in Southeast Asia, in particular, are complicated. In particular, piracy tends to increase sharply in the Sulu Sea area - Celebes in the southern Philippines and the east coast of Sabah in Malaysia, with aggressive and aggressive ways of attacking ships, acting on life- threatening, beatings, kidnapping, and murdering crew members. These are very dangerous areas that local and international authorities regularly warn ship management companies and officers and crew on board. Particularly for the Vietnamese fleet, from November 2016 to 3/2017, two piracy cases occurred in the area mentioned above, causing serious consequences (killing one crewmember, one missing crew member, 11 crew members were abducted, some crew members were beaten to injury, many were robbed or destroyed). Most recently, on March 5, 1977, the Phu An 268, while traveling through the Turtle Islands of the Philippines, was pursued by pirate ships; But due to the well-executed measures taken by the vessel, the pirates were unable to reach the ship and had to withdraw. In addition, a number of Vietnamese vessels have also fallen victim to piracy. On October 3, 2014, the Sunrise 689 was robbed in the Singapore area, leaving 18 crew members detained for six days, Lost 2.000m3 of oil. On 13/12/2014, VP Asphalt 2 was also robbed in the Singapore area, leading to the death of a Vietnamese crewman. On 11/11/2016, Royal 16 ship of Royal Maritime Corporation was robbed in the Philippines. On February 19, 2017, Giang Hai ship and 17 crew members on the journey to transport cement from Indonesia to the Philippines, when approaching Sulu Island, were attacked by armed pirates. The pirate group arrested 7 of the 17 people on board, including the captain, two vice-captains, two mechanics, two sailors. The remaining crew members were not injured, but the ship was smashed many devices and floated on the sea. In November 2017, the Philippine Navy rescued the crew successfully, but only three survived. Piracy has affected Vietnam very heavily. The first is economic if the piracy situation happens regularly, the shipping lines are forced to increase shipping costs. This will greatly affect the economy of Vietnam as well as the world because we know that 90% of goods in the world shipped by sea. Pirates also focus on oil tankers, so the threat of piracy is also a threat to energy security. Pirates also lead to other criminal crimes such as smuggling and multinational crime. All these issues will be the danger of destabilizing the political security of each nation as well as the entire region. Especially with a country with the long sea like Vietnam, maritime transportation is a very developed and invested industry, but with the increase as well as the aggressiveness and aggressiveness of the pirates, the economy Of Vietnam is facing many difficulties. Especially, Vietnam's oil tankers have been targeted by many pirates in the East Sea. So what can be done to prevent this piracy? 4. THE SOLUTION FOR PREVENTION OF PIRACY a) Secure-ship Electric barriers around the ship are not lethal but serve only to combat piracy. The 9,000 volts fence is used to infiltrate the fence. It will be shocked by electric shock (not dead), and the result is that the robbers cannot break into the ship. And when it enters the fence, the light goes
  • 7. Impact Of Piracy on Maritime Transport and Technical Solutions for Prevention http://www.iaeme.com/IJCIET/index.asp 964 editor@iaeme.com on, and the whistle goes off [38]. Fences can be folded easily and lowered quickly when needed. In particular, there are doors open very easily in the case of picking up navigators, lowering the escalator or dropping lifeboats and lifeboats. Figure 5. Example of a warning sign in Somalia, which states When necessary, the crew member can remove and reassemble the fence. As the vessel approaches the active piracy area, the crew can install the fence in only a few hours. When the ship leaves the area of danger, the captain can decide to leave or take off if the ship encounters bad weather [39]. The remote control system can control all functions of the system without wires. This system has been tested in the marine environment in many different seas including the 7th wave when seawater covers the deck. Use of this protection system has several purposes: to prevent those who want to break into the ship; Prevent and avoid attacks by bandits; Avoid those who flee the train; Protection of crew and passengers; Control the boarding and secretly send reports to the Piracy Center. Figure 6. Secure-Ship is a 9000-volt electrifying fence The Secure-Ship system meets the requirements for IMO ship protection measures and can be installed on waterborne vehicles: Ships (except flammable cargo ships); Military ships; Offshore supply vessels; Self-propelled barges and cruise ships. This system is being installed
  • 8. Cuong Manh Nguyen and Tien Quoc Le http://www.iaeme.com/IJCIET/index.asp 965 editor@iaeme.com widely in European countries, especially in the Netherland, the system is a system that is extremely developed. b) Cruise tracking and recording system - ShipLoc The piracy prevention center has coordinated with the satellite tracking operator to set up a ship tracking system known as the ShipLoc system. This system outlines the ship's voyage as well as port movement by recording the position of the vessel. There are many ships installed with this system. ShipLoc provides ship owners and ship managers with global alert and ship cruise control and fully meets IMO requirements for Ship Security Alert Systems (SSAS). The device will transfer the alarm messages from the ship to the shore in the event of piracy or terrorist attack on the vessel) (Article XI-2/6 SOLAS was adopted by IMO in December 2002 and takes effect from 2 stages. Paragraphs (July 1, 2004, and July 1, 2006) stipulate that all vessels over 500 GT must be equipped with SSAS [40]. A small transmitter and low cost can be hiding on the ship. For safety reasons, the crew is not known to have installed this transmitter and its location. With ShipLoc and a networked computer, the ship owner knows exactly where his ships are. The ShipLoc system will be very useful in the event of a ship being hijacked or kidnapped. It can also be a management device for tracking the cruise of ships around the world. ShipLoc works with two functions: • Notice of parameters from the ship: Report of the ship from 6 to 24 times/day on the screen; Track ship location whenever and wherever; Track ship speed, position, and direction of a cruise ship; Tracking information about the weather where the train is traveling (wind, waves, pressure ...). • Sending alarm messages: When the emergency button is pressed, the alarm message will be sent immediately to the ship owner and the competent authorities (Piracy Control Center and flag authorities). • ShipLoc is exploited independently and automatically, including GPS receivers for the position, direction, and speed of ships; Argo's generator and battery for use in case of power failure. If the ship is equipped with both ShipLoc and Secure-Ship systems, it will be effective in preventing and preventing piracy. Figure 7. Operating principle of Ship Loc
  • 9. Impact Of Piracy on Maritime Transport and Technical Solutions for Prevention http://www.iaeme.com/IJCIET/index.asp 966 editor@iaeme.com c) Anti-pirate water hoses system against pirates Anti-pirate water hoses are controlled by high-pressure cold sea water and remain active until the vessel is safe and the pump is turned off [41]. The water jets are completely efficient, with a rotation speed of 3 to 6 round per minute Figure 8. Water hoses system To reduce the maximum of water pressure drop, a block has been installed to limit the water spray on the upside. The sprinklers can be installed as either permanent or portable solutions and without additional chemicals or steam. c) Non-Lethal Slippery Foam A foaming machine may be used, but it must be provided in addition to the FFE-Fire Fighting Equipment list. Foamers are effective as it is disoriented and very slippery making it difficult for the pirates to climb the ship. 5. SOLUTIONS PROPOSED BY THE VIETNAM MARITIME ADMINISTRATION TO PREVENT PIRACY Review and propose competent agencies to amend and supplement the legal documents related to maritime security, including the prevention and fight against piracy and theft of ships; To promulgate documents guiding ship owners and ship management companies to take measures to prevent and combat piracy and armed robbery against seagoing ships. Coordinate with concerned agencies and units such as the Consular Department of the Ministry of Foreign Affairs, the Marine Police, the Border Guard Command, the Ministry of Defense, the Anti- terrorist Department of the Ministry of Public Security and the Post Check Vietnam to take measures to assist ship owners and crew when attacked by pirates. In some piracy cases, in addition to liaising and coordinating with foreign agencies and organizations to request assistance, search and rescue of Vietnamese ships, the Vietnam Maritime Bureau has also sent officials Directly to other countries to assist ship owners and crew members in handling and handling cases. Participating in the ReCAAP - Member Conference of the Executive Council of the Anti-Piracy Information Center and Armed Robbery Against Boats in Asia. The Government, the relevant ministries and branches of Vietnam have also made some concrete
  • 10. Cuong Manh Nguyen and Tien Quoc Le http://www.iaeme.com/IJCIET/index.asp 967 editor@iaeme.com measures to help Vietnamese crewmen and ship-owners in piracy prevention and combat. However, up to now, these solutions are not strong enough to prevent or completely stop piracy for our fleet. Stakeholders have agreed on the issue of piracy, armed robbery of the seafarers is committed to working together to improve the effectiveness of anti-piracy. Sea and armed robbery against the seagoing ship, contributing to the assistance of seafarers and ship-owners to reassure them when cruising through high-risk areas of piracy; minimizing the damage of people and property when the ship encounters pirates. 6. CONCLUSION Facing increasingly complex piracy and a significant impact on the maritime security of the region, threatening the development of shipping, countries in the region have taken appropriate steps in the fight against piracy, armed robbery such as cooperation in sharing information against piracy, joint patrols and achieved certain results. However, to have comprehensive and specialized solutions in the fight against piracy and armed robbery in the region, in the coming time, countries should step up international cooperation to Jointly build the legal corridor and law enforcement capacity, organize patrols and workshops to share experiences and comment on issues that exist different perspectives. At the same time, the parties also need to improve their cooperation in protecting ships. REFERENCES [1] G. W. Burruss, T. J. Holt, and A. Bossler, “Revisiting the Suppression Relationship Between Social Learning and Self-Control on Software Piracy,” Soc. Sci. Comput. Rev., p. 0894439317753820, 2018. [2] V. Re, “Anti-piracy policies and online film circulation: The Italian context, between formality and informality,” in Digital Piracy, Routledge, 2018, pp. 66–94. [3] A. Imran, E. A. Bramer, K. Seshan, and G. Brem, “An overview of catalysts in biomass pyrolysis for production of biofuels,” Biofuel Res. J., vol. 5, no. 4, pp. 872–885, Dec. 2018. [4] Y. Ning, S. X. Xu, M. Yan, and G. Q. Huang, “Digital pricing with piracy and variety seeking,” Int. J. Prod. Econ., vol. 206, pp. 184–195, 2018. [5] J. Corwin, “Preventing Pirated Software Use within an Organization,” 2018. [6] L. Yang, W. Wang, Z. Wang, and Q. Zhang, “Rainbow: Preventing Mobile-Camera-based Piracy in the Physical World,” in IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 2018, pp. 1061–1069. [7] A. T. Hoang, “Prediction of the density and viscosity of biodiesel and the influence of biodiesel properties on a diesel engine fuel supply system,” J. Mar. Eng. Technol, 2018. https://doi.org/10.1080/20464177.2018.1532734. [8] A. T. Hoang, “A report of the oil spill recovery and treatment technologies to reduce the marine environment pollution,” Int. J. e-Navigation Marit. Econ., vol. 9, pp. 35–49, 2018. [9] A. T. Hoang and X. D. Pham, “An investigation of remediation and recovery of oil spill and toxic heavy metal from maritime pollution by a new absorbent material,” J. Mar. Eng. Technol., 2018. https://doi.org/10.1080/20464177.2018.1544401. [10] M. A. Rosen, “Environmental sustainability tools in the biofuel industry,” Biofuel Res. J., vol. 5, no. 1, pp. 751–752, Mar. 2018. [11] A. T. Hoang et al., “An absorption capacity investigation of new absorbent based on polyurethane foams and rice straw for oil spill cleanup,” Pet. Sci. Technol., vol. 36, no. 5, pp. 361–370, 2018. [12] L. Leng and W. Zhou, “Chemical compositions and wastewater properties of aqueous phase (wastewater) produced from the hydrothermal treatment of wet biomass: A review,”
  • 11. Impact Of Piracy on Maritime Transport and Technical Solutions for Prevention http://www.iaeme.com/IJCIET/index.asp 968 editor@iaeme.com Energy Sources, Part A Recover. Util. Environ. Eff., vol. 40, no. 22, pp. 2648–2659, Nov. 2018. [13] A. T. Hoang and A. T. Le, “Trilateral correlation of spray characteristics, combustion parameters, and deposit formation in the injector hole of a diesel engine running on preheated Jatropha oil and fossil diesel fuel,” Biofuel Res. J., 2019. https://doi.org/10.18331/BRJ2019.6.1.2. [14] H. A. Tuan and C. M. Quang, “A mini review of using oleophilic skimmers for oil spill recovery,” J. Mech. Eng. Res. Dev, vol. 41, no. 2, pp. 92–96, 2018. [15] A. T. Hoang and A. T. Le, “Trilateral correlation of spray characteristics, combustion parameters, and deposit formation in the injector hole of a diesel engine running on preheated Jatropha oil and fossil diesel fuel,” Biofuel Res. J., 2019. https://doi.org/10.18331/BRJ2019.6.1.2. [16] A. T. Hoang, X. L. Bui, and X. D. Pham, “A novel investigation of oil and heavy metal adsorption capacity from as-fabricated adsorbent based on agricultural by-product and porous polymer,” Energy Sources, Part A Recover. Util. Environ. Eff., vol. 40, no. 8, pp. 929–939, 2018. [17] P. H. Hoang, A. T. Hoang, N. H. Chung, L. Q. Dien, X. P. Nguyen, and X. D. Pham, “The efficient lignocellulose-based sorbent for oil spill treatment from polyurethane and agricultural residue of Vietnam,” Energy Sources, Part A Recover. Util. Environ. Eff., vol. 40, no. 3, pp. 312–319, 2018. [18] A. Demirbaş, “Global Renewable Energy Resources,” Energy Sources, Part A Recover. Util. Environ. Eff., vol. 28, no. 8, pp. 779–792, Jul. 2006. [19] M. Vijay Kumar, A. Veeresh Babu, P. Ravi Kumar, and S. Sudhakara Reddy, “Experimental investigation of the combustion characteristics of Mahua oil biodiesel-diesel blend using a DI diesel engine modified with EGR and nozzle hole orifice diameter,” Biofuel Res. J., vol. 5, no. 3, pp. 863–871, 2018. [20] A. T. Hoang and V. V. Pham, “A study of emission characteristic, deposits, and lubrication oil degradation of a diesel engine running on preheated vegetable oil and diesel oil,” Energy Sources, Part A Recover. Util. Environ. Eff., vol. 41, no. 5, pp. 611–625, 2019. [21] A. T. Hoang, “Waste heat recovery from diesel engines based on Organic Rankine Cycle,” Appl. Energy, vol. 231, pp. 138–166, 2018. [22] A. T. Hoang and A. T. Le, “A review on deposit formation in the injector of diesel engines running on biodiesel,” Energy Sources, Part A Recover. Util. Environ. Eff., vol. 41, no. 5, pp. 584–599, 2019. [23] K. Christiansen, D. R. Raman, G. Hu, and R. Anex, “First-order estimates of the costs, input-output energy analysis, and energy returns on investment of conventional and emerging biofuels feedstocks,” Biofuel Res. J., vol. 5, no. 4, pp. 894–899, Dec. 2018. [24] O. Duru, “Irrationality in politics and governance of maritime affairs: The collapse of sovereign maritime governance,” Int. J. e-Navigation Marit. Econ., vol. 1, pp. 48–59, 2014. [25] A. G. James, “Bruce A. Elleman. Seaborne Perils: Piracy, Maritime Crime, and Naval Terrorism in Africa, South Asia, and Southeast Asia.” Taylor & Francis, 2018. [26] G. H. Dinh and N.-K. Im, “The combination of analytical and statistical method to define polygonal ship domain and reflect human experiences in estimating dangerous area,” Int. J. e-Navigation Marit. Econ., vol. 4, pp. 97–108, 2016. [27] F. R. Hamza and J.-P. Priotti, “Maritime trade and piracy in the Gulf of Aden and the Indian Ocean (1994–2017),” J. Transp. Secur., pp. 1–18, 2018. [28] C. E. Nwadigwe, “Creativity and New Technologies: Piracy, Politics and the Business of Cultural Production in Nigeria,” in Africa and Globalization, Springer, 2018, pp. 183–204.
  • 12. Cuong Manh Nguyen and Tien Quoc Le http://www.iaeme.com/IJCIET/index.asp 969 editor@iaeme.com [29] M. Posada, H. Greidanus, M. Alvarez, M. Vespe, T. Cokacar, and S. Falchetti, “Maritime awareness for counter-piracy in the Gulf of Aden,” in Geoscience and Remote Sensing Symposium (IGARSS), 2011 IEEE International, 2011, pp. 249–252. [30] Y. K. M. Leung, “Legal challenges with the use of Vessel Protection Detachments and Private Maritime Security Company guards for on board ship protection against piracy.” UiT Norges arktiske universitet, 2018. [31] S. C. Brown and T. J. Holt, “12 Identifying paths forward in the study of piracy,” Digit. Piracy A Glob. Multidiscip. Acc., p. 250, 2018. [32] G. Burruss and C. Dodge, “10 The criminality of digital piracy,” Digit. Piracy A Glob. Multidiscip. Acc., p. 208, 2018. [33] J. Lindley, “Using regulatory pluralism to achieve effective control of Somali piracy,” Crim. Justice Regul. Revisit. Essays Honour Peter Grabosky, p. 109, 2018. [34] J. V Hastings and S. G. Phillips, “Order beyond the state: explaining Somaliland’s avoidance of maritime piracy,” J. Mod. Afr. Stud., vol. 56, no. 1, pp. 5–30, 2018. [35] P. Tyson, “Evaluating Australia’s New Anti-Piracy Website Blocking Laws,” UniSA Student Law Rev., vol. 3, 2018. [36] I. M. A. G. Azmi, H. G. Lim, P. S. Tay, and C. P. Sik, “Trans-Pacific Partnership Agreement Minus One and Enhanced Criminal Penalty for Online Copyright Piracy: Malaysia’s Options,” J. World Trade, vol. 52, no. 3, pp. 461–477, 2018. [37] N. S. F. A. Rahman, A. H. Saharuddin, and R. Rasdi, “Effect of the northern sea route opening to the shipping activities at Malacca straits,” Int. J. e-Navigation Marit. Econ., vol. 1, pp. 85–98, 2014. [38] W. A. Knight and A. A. Elmi, “Combatting Piracy in the Horn of Africa Waters,” in The Palgrave Handbook of Contemporary International Political Economy, Springer, 2019, pp. 485–500. [39] V. Sakhuja, “Maritime terrorism and piracy: security challenges in South East Asia,” eSocialSciences, 2018. [40] A. D. Ba, “Governing the Safety and Security of the Malacca Strait: The Nippon Foundation between States and Industry,” J. Contemp. Asia, vol. 48, no. 2, pp. 252–277, 2018. [41] M. J. Struett, “Maritime Piracy and Global Security,” Transnatl. Crime Glob. Secur. [2 Vol., p. 23, 2018.