Pirates are acts of loot taking place on the sea or the coast and are acted upon by
illegal maritime forces. Piracy is an international crime, piracy that directly threatens
the lives and lives of seafarers, strongly impacts maritime activity as well as economic
development [1]. The global damage caused by piracy is estimated at $ 6.6 to $ 6.9
billion through commercial fraud, loss of cargo or delay. Even pirates can cause
political instability due to state officials' corruption
Nowadays, piracy is not a concern of people working in maritime trade field only
or a concern of particular country. In the trend of strong globalization in the current
period, when commodity exchanges between countries around the world grow faster
than ever, threats to maritime security are truly an international problem. The
situation of piracy is always concerned because it directly affects the economy, the
safety of people. This article assesses the status of piracy at “hot area” such as the
Somali and Malacca Straits, thus analyzing the trend of activities and proposing
timely action solutions to minimize piracy, ensuring maritime security in the region
and global.
Sharing his thoughts on port and maritime security in the Asian Pacific, Commodore RS Vasan (Retd), Head, Strategy and Security Studies, Center for Asia Studies, recently joined us for a Q&A session. With a spotlight on anti-piracy measures from the role of multinational military forces and armed guards to the current situation off Somalia and the shipping industry\'s responses to countering piracy, Commodore RS Vasan offered a detailed and refreshing look at piracy today.
Just how significant is piracy? As on date nearly 39 vessels of all description and over 573 merchantmen are held in custody.
There are a daunting number of maritime security threats and challenges in the
north-western Indian Ocean region, both extant and potential. Indeed, the mere
fact that the Indian Ocean constitutes the world’s largest swath of maritime
space that is prone to the major menace of piracy (in the Gulf of Oman, the
Arabian Sea, the Gulf of Aden and in the waters off the north-east African
coastline), as well as the sporadic threat of terrorism (by Islamic militias of
Al-Shabaab in Somalia and Al-Qaeda in the Arabian Peninsula in Yemen), signifies
that the region will arguably remain the maritime area with the greatest array of
security challenges. However, while anti-piracy measures ought to have shaped
regional policymaking, and the resources that a large and diverse group of states
has devoted to addressing these maritime challenges have never been adequate to
the task, largely successful coalition-building exercises and joint naval task-force
operations have been encouraging. The transformation of Somali piracy from a
haphazard activity into a highly organised, professionalised criminal enterprise is
briefly elucidated by greed-grievance theory and supplemented by the theory of
crime, also known as routine-activity theory
Nowadays, piracy is not a concern of people working in maritime trade field only
or a concern of particular country. In the trend of strong globalization in the current
period, when commodity exchanges between countries around the world grow faster
than ever, threats to maritime security are truly an international problem. The
situation of piracy is always concerned because it directly affects the economy, the
safety of people. This article assesses the status of piracy at “hot area” such as the
Somali and Malacca Straits, thus analyzing the trend of activities and proposing
timely action solutions to minimize piracy, ensuring maritime security in the region
and global.
Sharing his thoughts on port and maritime security in the Asian Pacific, Commodore RS Vasan (Retd), Head, Strategy and Security Studies, Center for Asia Studies, recently joined us for a Q&A session. With a spotlight on anti-piracy measures from the role of multinational military forces and armed guards to the current situation off Somalia and the shipping industry\'s responses to countering piracy, Commodore RS Vasan offered a detailed and refreshing look at piracy today.
Just how significant is piracy? As on date nearly 39 vessels of all description and over 573 merchantmen are held in custody.
There are a daunting number of maritime security threats and challenges in the
north-western Indian Ocean region, both extant and potential. Indeed, the mere
fact that the Indian Ocean constitutes the world’s largest swath of maritime
space that is prone to the major menace of piracy (in the Gulf of Oman, the
Arabian Sea, the Gulf of Aden and in the waters off the north-east African
coastline), as well as the sporadic threat of terrorism (by Islamic militias of
Al-Shabaab in Somalia and Al-Qaeda in the Arabian Peninsula in Yemen), signifies
that the region will arguably remain the maritime area with the greatest array of
security challenges. However, while anti-piracy measures ought to have shaped
regional policymaking, and the resources that a large and diverse group of states
has devoted to addressing these maritime challenges have never been adequate to
the task, largely successful coalition-building exercises and joint naval task-force
operations have been encouraging. The transformation of Somali piracy from a
haphazard activity into a highly organised, professionalised criminal enterprise is
briefly elucidated by greed-grievance theory and supplemented by the theory of
crime, also known as routine-activity theory
Security and Safety in the Gulf of Guinea: The Role of Intelligence-Led Law E...inventionjournals
The Gulf of Guinea (GoG) straddles sixteen countries from Senegal to the North-West of Africa down South to Angola and covers a stretch of over 6,000km. Starting from early 1950s till date, this region has gained in high economic importance as a hub of abundant deposits of hydrocarbon, marine, and rainforest resources, namely, oil and gas, fish and other aquatic resources, and timber and a very popular channel for shipping and international commerce. This paper, therefore, examined the wide range of situational and structural factors that have converged to make the Gulf of Guinea (GoG) gain its current notoriety as one of the most dangerous in the world, in equal if not to a greater measure as the Straits of Malacca and the Gulf of Aden.The paper also evaluated the relevance and impacts of country-level, regional and trans-regional initiatives already undertaken to tackle maritime insecurity in the GoG, given that insecurity on the seas increasingly portend grave danger to stability and prosperity for countries in the region. A key conclusion of the study is that faced with the dire consequences of maritime insecurity, countries in the region have so far not been able to develop a cogent and coherent maritime security policy, strategy or framework to effectively tackle the menace. The paper recommended that what is required and most desirable in the medium and long terms in order to establish effective and sustainable maritime governance regime is for GoG countries to move quickly and decisively towards the harmonization of policies and effective implementation. Beyond what has mostly been ad-hoc, token and symbolic national level responses, the path to follow would require collective action, the type that is supported by substantial continental and global commitments in the short, medium and long terms. Much more crucially, the paper vehemently rejected the military option that is based on violence-for-violence and the traditional and reactive method of policing that is incident-based in nature in the fight against insecurity in the region as these two strategies have all proved to be infective. In their place, the paper recommended diligent adoption of the modern and proactive method of law enforcement known as intelligenceled policing for the fight against insecurity in the region.
Naval participation in counter-piracy operations around the Horn of Africa has been a success, but does this mean a long-term commitment from governments, or will a change in priorities mean that they leave before the situation is solved? IHS Jane's Defence Weekly Naval Editor Dr Lee Willett examines the issues.
Maritime Piracy and Unlawful Acts against Safety of Lives at Sea: Inimical an...AJSSMTJournal
The protection of human rights through the justice delivery system is an indispensable feature of any system governed by the
rule of law. The protection of human rights have been acknowledged to a very large extent in most civilized or developed
countries of the world because of its necessity and global acceptance not just for the safety and sanctity of life. The
universality of human rights has been recognized by the United Nations as inherent in the very nature of human beings just
for its reflection. Today, the wave of economic globalization has given rise to increasing spread and sophistication of various
inimical activities and acts that negate the lofty ideals of the rule of law and protection of human lives at sea. The crossborder movement of ships with people and cargo, merchandise, investment and finance that encourage urbanization and
globalization has been in most recent times threatened by piracy and armed robbery at sea, torture and various clandestine,
unholy attitudes that are antithetic to fundamental human rights and has opened door for global criminal economy to
flourish. Among the questions this paper seeks to address are, what is the link between trans-border or sea crime and
globalization? What is piracy (Hosti-Humanis)? Why is piracy targeted at the sea..? Why does it occur most in Nigeria and
some countries in the West African sub-region? What are the economic benefits from the sea that are being threatened by
piracy and other crimes? And what efforts are being made by Nigeria and the West African sub-region including international
cooperation’s to address the issue? Above all, to construct the way forward to arrest the ugly situation.
Maritime piracy a sustainable global solutionSanuraDeAlwis
A proposal for a sustainable global solution for a pressing social issue common in the world. By Paul R. Williams and Lowry Pressly from the Case Western Reserve University, School of Law
Piracy and armed robbery at sea in the Niger Delta: current situation and sol...SWAIMSProject
By Mr Nkasi Wodu, Peacebuilding Manager, Foundation for Partnership Initiatives in the Niger Delta (PIND)
SWAIMS webinar held on 31st March 2021 with civil society organisations (CSOs) in Nigeria
How IUU fishing impacts small-scale fishers' livesSWAIMSProject
By Prof Stella Williams, Vice-President, Mundus Maris; and lead Researcher for the Nigerian Association of Fish Farmers and Aqua-culturists (NAFFA)
SWAIMS Webinar on Curbing Maritime Insecurity in the Niger Delta, 31st March 31, 2021
India’s geography, economic engagement with the rest of the world, her development and security, are all intimately connected to the maritime domain.
With seas on three sides and high mountains on the fourth, it has been said that India lies in the very lap of the Indian Ocean. Few Indians realise that we possess the second largest peninsula in the world. While that translates into a coastline of 5422 Km, India’s outlying island territories add another 2094 Km, making up a total coastline length of 7516Km. This is just as well because our foreign trade is almost entirely dependent on the seas since land frontiers cannot permit viable trade due to contemporary history and geography!
The Takshashila Institution and the US Consulate, Chennai, hosted a roundtable conference on reviewing India’s coastal security architecture at The Hyatt MG Road, on 23 September 2016.
The slides provide an overview of the event, the key challenges faced by India in securing its coastline, views and recommendations by the discussants on ways to overcome them.
Security and Safety in the Gulf of Guinea: The Role of Intelligence-Led Law E...inventionjournals
The Gulf of Guinea (GoG) straddles sixteen countries from Senegal to the North-West of Africa down South to Angola and covers a stretch of over 6,000km. Starting from early 1950s till date, this region has gained in high economic importance as a hub of abundant deposits of hydrocarbon, marine, and rainforest resources, namely, oil and gas, fish and other aquatic resources, and timber and a very popular channel for shipping and international commerce. This paper, therefore, examined the wide range of situational and structural factors that have converged to make the Gulf of Guinea (GoG) gain its current notoriety as one of the most dangerous in the world, in equal if not to a greater measure as the Straits of Malacca and the Gulf of Aden.The paper also evaluated the relevance and impacts of country-level, regional and trans-regional initiatives already undertaken to tackle maritime insecurity in the GoG, given that insecurity on the seas increasingly portend grave danger to stability and prosperity for countries in the region. A key conclusion of the study is that faced with the dire consequences of maritime insecurity, countries in the region have so far not been able to develop a cogent and coherent maritime security policy, strategy or framework to effectively tackle the menace. The paper recommended that what is required and most desirable in the medium and long terms in order to establish effective and sustainable maritime governance regime is for GoG countries to move quickly and decisively towards the harmonization of policies and effective implementation. Beyond what has mostly been ad-hoc, token and symbolic national level responses, the path to follow would require collective action, the type that is supported by substantial continental and global commitments in the short, medium and long terms. Much more crucially, the paper vehemently rejected the military option that is based on violence-for-violence and the traditional and reactive method of policing that is incident-based in nature in the fight against insecurity in the region as these two strategies have all proved to be infective. In their place, the paper recommended diligent adoption of the modern and proactive method of law enforcement known as intelligenceled policing for the fight against insecurity in the region.
Naval participation in counter-piracy operations around the Horn of Africa has been a success, but does this mean a long-term commitment from governments, or will a change in priorities mean that they leave before the situation is solved? IHS Jane's Defence Weekly Naval Editor Dr Lee Willett examines the issues.
Maritime Piracy and Unlawful Acts against Safety of Lives at Sea: Inimical an...AJSSMTJournal
The protection of human rights through the justice delivery system is an indispensable feature of any system governed by the
rule of law. The protection of human rights have been acknowledged to a very large extent in most civilized or developed
countries of the world because of its necessity and global acceptance not just for the safety and sanctity of life. The
universality of human rights has been recognized by the United Nations as inherent in the very nature of human beings just
for its reflection. Today, the wave of economic globalization has given rise to increasing spread and sophistication of various
inimical activities and acts that negate the lofty ideals of the rule of law and protection of human lives at sea. The crossborder movement of ships with people and cargo, merchandise, investment and finance that encourage urbanization and
globalization has been in most recent times threatened by piracy and armed robbery at sea, torture and various clandestine,
unholy attitudes that are antithetic to fundamental human rights and has opened door for global criminal economy to
flourish. Among the questions this paper seeks to address are, what is the link between trans-border or sea crime and
globalization? What is piracy (Hosti-Humanis)? Why is piracy targeted at the sea..? Why does it occur most in Nigeria and
some countries in the West African sub-region? What are the economic benefits from the sea that are being threatened by
piracy and other crimes? And what efforts are being made by Nigeria and the West African sub-region including international
cooperation’s to address the issue? Above all, to construct the way forward to arrest the ugly situation.
Maritime piracy a sustainable global solutionSanuraDeAlwis
A proposal for a sustainable global solution for a pressing social issue common in the world. By Paul R. Williams and Lowry Pressly from the Case Western Reserve University, School of Law
Piracy and armed robbery at sea in the Niger Delta: current situation and sol...SWAIMSProject
By Mr Nkasi Wodu, Peacebuilding Manager, Foundation for Partnership Initiatives in the Niger Delta (PIND)
SWAIMS webinar held on 31st March 2021 with civil society organisations (CSOs) in Nigeria
How IUU fishing impacts small-scale fishers' livesSWAIMSProject
By Prof Stella Williams, Vice-President, Mundus Maris; and lead Researcher for the Nigerian Association of Fish Farmers and Aqua-culturists (NAFFA)
SWAIMS Webinar on Curbing Maritime Insecurity in the Niger Delta, 31st March 31, 2021
India’s geography, economic engagement with the rest of the world, her development and security, are all intimately connected to the maritime domain.
With seas on three sides and high mountains on the fourth, it has been said that India lies in the very lap of the Indian Ocean. Few Indians realise that we possess the second largest peninsula in the world. While that translates into a coastline of 5422 Km, India’s outlying island territories add another 2094 Km, making up a total coastline length of 7516Km. This is just as well because our foreign trade is almost entirely dependent on the seas since land frontiers cannot permit viable trade due to contemporary history and geography!
The Takshashila Institution and the US Consulate, Chennai, hosted a roundtable conference on reviewing India’s coastal security architecture at The Hyatt MG Road, on 23 September 2016.
The slides provide an overview of the event, the key challenges faced by India in securing its coastline, views and recommendations by the discussants on ways to overcome them.
The maritime security disclaimer management against piracy threats in eastern...pra_yoga2305
Based on data released by the Indonesian Parliament, Southeast Asia occupies the top position in piracy cases. This is considered very concerning. Indonesia, which is known as the nation of seafarers, apparently contributes to the most significant piracy rate in the world, especially Southeast Asia. Of the 141 cases of piracy in Southeast Asia, one hundred piracy incidents occurred in Indonesia. The same percentage also occurred in 2015. Of the 190 causes of piracy in the world, the majority of cases occurred in Indonesian waters. The data shows Indonesia is a paradise and a target for pirates
The maritime industry is one of the largest on the planet, and ensuring operations at sea continue safely takes determined effort. The implementation of maritime security takes both knowledge and vigilance, and is essential to enhance security enforcement without slowing down the timely flow of international commerce. Maritime security is a specialized field in the marine sector, and safety officers must employ best practices to defend their vessel against both internal and external threats. These threats come in various forms, and each requires a different strategy for a proper defense. Security risks are not always malicious, but maintaining vessel safety is a constant priority. Maritime security is a general term for the protection of vessels both internally and externally. The areas from which ships and maritime operations need protecting include terrorism, piracy, robbery, illegal trafficking of goods and people, illegal fishing and pollution.Through supervision, inspection and proactive procedures, the marine industry does its best to minimize threats to maritime security, both malicious and accidental. And as the industry evolves and the marine sector grows, vigilance, enforcement and training will have to keep up with technology and increased opportunity for threats.Since 9 11, there’s been an increased focus on protecting the marine sector from terrorism and other similar attacks, both in port and at sea. Several state and international organizations have formed to help set standards for bettering maritime security. Since the marine sector is so vast and the massive amount of goods entering the country is difficult to screen, every precaution possible to minimizing malicious exploitation is critical.Security is not only the job of vessel safety officers, but the job of the crew as a whole, which is why it’s so crucial for companies to educate and train their employees so their vessels have a better chance of stopping security threats. Dr. Manoj Kumar "Maritime Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-3 , April 2022, URL: https://www.ijtsrd.com/papers/ijtsrd49714.pdf Paper URL: https://www.ijtsrd.com/other-scientific-research-area/other/49714/maritime-security/dr-manoj-kumar
The term piracy is defined as any illegal act of violence, detention or any other act of depredation committed for private ends by the crew or the passengers of a private ship or private aircraft and directed-
strategic importance of indian ocean.pptxMahamAaqil2
What makes the Indian Ocean so strategically important?
The Indian Ocean is a vast theater, stretching from the Strait of Malacca and western coast of Australia in the East to the Mozambique Channel in
the West. It encompasses the Persian Gulf and the Arabian Sea in the North, all the way down to the southern Indian Ocean.
Indian Ocean Initiative
Along the coasts of this huge geographic expanse are countries that are home to some 2.7 billion people. The Indian Ocean’s key subregions are
South Asia, the Middle East, the eastern coast of Africa, and the islands dotting the ocean from Sri Lanka in the East to the Comoros Archipelago
in the West.
The region’s size and diversity explains its geoeconomic importance. Its regional forum, the Indian Ocean Rim Association, includes countries as
politically and socially different as Australia, Indonesia, Iran, and South Africa, leading to striking new power dynamics. From resource-rich Africa
and the energy-dense Middle East to South Asia’s labor markets and manufacturing industries, the stability of the Indian Ocean is crucial to the
global economy.
Why are countries vying for control over the Indian Ocean?
While it may be difficult today for one nation to control the entire expanse of the Indian Ocean the way the British, French, or Portuguese empires
did during the colonial period, the strategic significance of the Indian Ocean remains the same. In fact, the advent of the Indo-Pacific—the new
geopolitical framework that includes both the Indian and Pacific Oceans—has pushed the Indian Ocean back into the spotlight after a period with
no serious great power competition in the region, following the end of the Cold War.
The importance of trade and the sheer scope of its many subregions make the Indian Ocean critical in terms of military and strategic engagement.
It is a vital trading hub, connecting the Middle East to Southeast and East Asia, as well as Europe and the Americas. Any disruption along its
trading routes will impact the entire globe’s energy security, let alone that of significant economies like China, Japan, and South Korea, which
depend on energy imported primarily via the Malacca strait.
3/19/23, 12:41 PM What Is Happening in the Indian Ocean? - Carnegie Endowment for International Peace
https://carnegieendowment.org/2021/03/03/what-is-happening-in-indian-ocean-pub-83948#:~:text=The importance of trade and,as Europe and the Americas. 2/4
At the heart of the geopolitical struggle in the Indian Ocean is the ability to sustain a military presence near the key choke points connecting its
trade routes. Such a presence gives countries the power to protect and disrupt these valuable maritime channels—known as Sea Lines of
Communications (SLOC) protection and SLOC interdiction in naval terms—during times of peace and war.
Which parts of the Indian Ocean are most contested?
Of the world’s seven key choke points for oil transportation, three are in the Indian Ocean.
India and the Indian Ocean: Certain Issues relating to Non-Traditional SecurityNilendra Kumar
Indian Ocean plays a pivotal role in the global trade and economics and its strategic significance is also steadily increasing. Certain major aspects concerning non traditional security need in depth study and adoption of corrective measures by the Indian Ocean ring countries where India has to take a lead.
Submission Deadline: 30th September 2022
Acceptance Notification: Within Three Days’ time period
Online Publication: Within 24 Hrs. time Period
Expected Date of Dispatch of Printed Journal: 5th October 2022
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
White layer thickness (WLT) formed and surface roughness in wire electric discharge turning (WEDT) of tungsten carbide composite has been made to model through response surface methodology (RSM). A Taguchi’s standard Design of experiments involving five input variables with three levels has been employed to establish a mathematical model between input parameters and responses. Percentage of cobalt content, spindle speed, Pulse on-time, wire feed and pulse off-time were changed during the experimental tests based on the Taguchi’s orthogonal array L27 (3^13). Analysis of variance (ANOVA) revealed that the mathematical models obtained can adequately describe performance within the parameters of the factors considered. There was a good agreement between the experimental and predicted values in this study.
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
The study explores the reasons for a transgender to become entrepreneurs. In this study transgender entrepreneur was taken as independent variable and reasons to become as dependent variable. Data were collected through a structured questionnaire containing a five point Likert Scale. The study examined the data of 30 transgender entrepreneurs in Salem Municipal Corporation of Tamil Nadu State, India. Simple Random sampling technique was used. Garrett Ranking Technique (Percentile Position, Mean Scores) was used as the analysis for the present study to identify the top 13 stimulus factors for establishment of trans entrepreneurial venture. Economic advancement of a nation is governed upon the upshot of a resolute entrepreneurial doings. The conception of entrepreneurship has stretched and materialized to the socially deflated uncharted sections of transgender community. Presently transgenders have smashed their stereotypes and are making recent headlines of achievements in various fields of our Indian society. The trans-community is gradually being observed in a new light and has been trying to achieve prospective growth in entrepreneurship. The findings of the research revealed that the optimistic changes are taking place to change affirmative societal outlook of the transgender for entrepreneurial ventureship. It also laid emphasis on other transgenders to renovate their traditional living. The paper also highlights that legislators, supervisory body should endorse an impartial canons and reforms in Tamil Nadu Transgender Welfare Board Association.
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
Since ages gender difference is always a debatable theme whether caused by nature, evolution or environment. The birth of a transgender is dreadful not only for the child but also for their parents. The pain of living in the wrong physique and treated as second class victimized citizen is outrageous and fully harboured with vicious baseless negative scruples. For so long, social exclusion had perpetuated inequality and deprivation experiencing ingrained malign stigma and besieged victims of crime or violence across their life spans. They are pushed into the murky way of life with a source of eternal disgust, bereft sexual potency and perennial fear. Although they are highly visible but very little is known about them. The common public needs to comprehend the ravaged arrogance on these insensitive souls and assist in integrating them into the mainstream by offering equal opportunity, treat with humanity and respect their dignity. Entrepreneurship in the current age is endorsing the gender fairness movement. Unstable careers and economic inadequacy had inclined one of the gender variant people called Transgender to become entrepreneurs. These tiny budding entrepreneurs resulted in economic transition by means of employment, free from the clutches of stereotype jobs, raised standard of living and handful of financial empowerment. Besides all these inhibitions, they were able to witness a platform for skill set development that ignited them to enter into entrepreneurial domain. This paper epitomizes skill sets involved in trans-entrepreneurs of Thoothukudi Municipal Corporation of Tamil Nadu State and is a groundbreaking determination to sightsee various skills incorporated and the impact on entrepreneurship.
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
The banking and financial services industries are experiencing increased technology penetration. Among them, the banking industry has made technological advancements to better serve the general populace. The economy focused on transforming the banking sector's system into a cashless, paperless, and faceless one. The researcher wants to evaluate the user's intention for utilising a mobile banking application. The study also examines the variables affecting the user's behaviour intention when selecting specific applications for financial transactions. The researcher employed a well-structured questionnaire and a descriptive study methodology to gather the respondents' primary data utilising the snowball sampling technique. The study includes variables like performance expectations, effort expectations, social impact, enabling circumstances, and perceived risk. Each of the aforementioned variables has a major impact on how users utilise mobile banking applications. The outcome will assist the service provider in comprehending the user's history with mobile banking applications.
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
Technology upgradation in banking sector took the economy to view that payment mode towards online transactions using mobile applications. This system enabled connectivity between banks, Merchant and user in a convenient mode. there are various applications used for online transactions such as Google pay, Paytm, freecharge, mobikiwi, oxygen, phonepe and so on and it also includes mobile banking applications. The study aimed at evaluating the predilection of the user in adopting digital transaction. The study is descriptive in nature. The researcher used random sample techniques to collect the data. The findings reveal that mobile applications differ with the quality of service rendered by Gpay and Phonepe. The researcher suggest the Phonepe application should focus on implementing the application should be user friendly interface and Gpay on motivating the users to feel the importance of request for money and modes of payments in the application.
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
The prototype of a voice-based ATM for visually impaired using Arduino is to help people who are blind. This uses RFID cards which contain users fingerprint encrypted on it and interacts with the users through voice commands. ATM operates when sensor detects the presence of one person in the cabin. After scanning the RFID card, it will ask to select the mode like –normal or blind. User can select the respective mode through voice input, if blind mode is selected the balance check or cash withdraw can be done through voice input. Normal mode procedure is same as the existing ATM.
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
There is increasing acceptability of emotional intelligence as a major factor in personality assessment and effective human resource management. Emotional intelligence as the ability to build capacity, empathize, co-operate, motivate and develop others cannot be divorced from both effective performance and human resource management systems. The human person is crucial in defining organizational leadership and fortunes in terms of challenges and opportunities and walking across both multinational and bilateral relationships. The growing complexity of the business world requires a great deal of self-confidence, integrity, communication, conflict and diversity management to keep the global enterprise within the paths of productivity and sustainability. Using the exploratory research design and 255 participants the result of this original study indicates strong positive correlation between emotional intelligence and effective human resource management. The paper offers suggestions on further studies between emotional intelligence and human capital development and recommends for conflict management as an integral part of effective human resource management.
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
Our life journey, in general, is closely defined by the way we understand the meaning of why we coexist and deal with its challenges. As we develop the "inspiration economy", we could say that nearly all of the challenges we have faced are opportunities that help us to discover the rest of our journey. In this note paper, we explore how being faced with the opportunity of being a close carer for an aging parent with dementia brought intangible discoveries that changed our insight of the meaning of the rest of our life journey.
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
The main objective of this study is to analyze the impact of aspects of Organizational Culture on the Effectiveness of the Performance Management System (PMS) in the Health Care Organization at Thanjavur. Organizational Culture and PMS play a crucial role in present-day organizations in achieving their objectives. PMS needs employees’ cooperation to achieve its intended objectives. Employees' cooperation depends upon the organization’s culture. The present study uses exploratory research to examine the relationship between the Organization's culture and the Effectiveness of the Performance Management System. The study uses a Structured Questionnaire to collect the primary data. For this study, Thirty-six non-clinical employees were selected from twelve randomly selected Health Care organizations at Thanjavur. Thirty-two fully completed questionnaires were received.
Living in 21st century in itself reminds all of us the necessity of police and its administration. As more and more we are entering into the modern society and culture, the more we require the services of the so called ‘Khaki Worthy’ men i.e., the police personnel. Whether we talk of Indian police or the other nation’s police, they all have the same recognition as they have in India. But as already mentioned, their services and requirements are different after the like 26th November, 2008 incidents, where they without saving their own lives has sacrificed themselves without any hitch and without caring about their respective family members and wards. In other words, they are like our heroes and mentors who can guide us from the darkness of fear, militancy, corruption and other dark sides of life and so on. Now the question arises, if Gandhi would have been alive today, what would have been his reaction/opinion to the police and its functioning? Would he have some thing different in his mind now what he had been in his mind before the partition or would he be going to start some Satyagraha in the form of some improvement in the functioning of the police administration? Really these questions or rather night mares can come to any one’s mind, when there is too much confusion is prevailing in our minds, when there is too much corruption in the society and when the polices working is also in the questioning because of one or the other case throughout the India. It is matter of great concern that we have to thing over our administration and our practical approach because the police personals are also like us, they are part and parcel of our society and among one of us, so why we all are pin pointing towards them.
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
The goal of this study was to see how talent management affected employee retention in the selected IT organizations in Chennai. The fundamental issue was the difficulty to attract, hire, and retain talented personnel who perform well and the gap between supply and demand of talent acquisition and retaining them within the firms. The study's main goals were to determine the impact of talent management on employee retention in IT companies in Chennai, investigate talent management strategies that IT companies could use to improve talent acquisition, performance management, career planning and formulate retention strategies that the IT firms could use. The respondents were given a structured close-ended questionnaire with the 5 Point Likert Scale as part of the study's quantitative research design. The target population consisted of 289 IT professionals. The questionnaires were distributed and collected by the researcher directly. The Statistical Package for Social Sciences (SPSS) was used to collect and analyse the questionnaire responses. Hypotheses that were formulated for the various areas of the study were tested using a variety of statistical tests. The key findings of the study suggested that talent management had an impact on employee retention. The studies also found that there is a clear link between the implementation of talent management and retention measures. Management should provide enough training and development for employees, clarify job responsibilities, provide adequate remuneration packages, and recognise employees for exceptional performance.
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
Globally, Millions of dollars were spent by the organizations for employing skilled Information Technology (IT) professionals. It is costly to replace unskilled employees with IT professionals possessing technical skills and competencies that aid in interconnecting the business processes. The organization’s employment tactics were forced to alter by globalization along with technological innovations as they consistently diminish to remain lean, outsource to concentrate on core competencies along with restructuring/reallocate personnel to gather efficiency. As other jobs, organizations or professions have become reasonably more appropriate in a shifting employment landscape, the above alterations trigger both involuntary as well as voluntary turnover. The employee view on jobs is also afflicted by the COVID-19 pandemic along with the employee-driven labour market. So, having effective strategies is necessary to tackle the withdrawal rate of employees. By associating Emotional Intelligence (EI) along with Talent Management (TM) in the IT industry, the rise in attrition rate was analyzed in this study. Only 303 respondents were collected out of 350 participants to whom questionnaires were distributed. From the employees of IT organizations located in Bangalore (India), the data were congregated. A simple random sampling methodology was employed to congregate data as of the respondents. Generating the hypothesis along with testing is eventuated. The effect of EI and TM along with regression analysis between TM and EI was analyzed. The outcomes indicated that employee and Organizational Performance (OP) were elevated by effective EI along with TM.
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
By implementing talent management strategy, organizations would have the option to retain their skilled professionals while additionally working on their overall performance. It is the course of appropriately utilizing the ideal individuals, setting them up for future top positions, exploring and dealing with their performance, and holding them back from leaving the organization. It is employee performance that determines the success of every organization. The firm quickly obtains an upper hand over its rivals in the event that its employees having particular skills that cannot be duplicated by the competitors. Thus, firms are centred on creating successful talent management practices and processes to deal with the unique human resources. Firms are additionally endeavouring to keep their top/key staff since on the off chance that they leave; the whole store of information leaves the firm's hands. The study's objective was to determine the impact of talent management on organizational performance among the selected IT organizations in Chennai. The study recommends that talent management limitedly affects performance. On the off chance that this talent is appropriately management and implemented properly, organizations might benefit as much as possible from their maintained assets to support development and productivity, both monetarily and non-monetarily.
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
Banking regulations act of India, 1949 defines banking as “acceptance of deposits for the purpose of lending or investment from the public, repayment on demand or otherwise and withdrawable through cheques, drafts order or otherwise”, the major participants of the Indian financial system are commercial banks, the financial institution encompassing term lending institutions. Investments institutions, specialized financial institution and the state level development banks, non banking financial companies (NBFC) and other market intermediaries such has the stock brokers and money lenders are among the oldest of the certain variants of NBFC and the oldest market participants. The asset quality of banks is one of the most important indicators of their financial health. The Indian banking sector has been facing severe problems of increasing Non- Performing Assets (NPAs). The NPAs growth directly and indirectly affects the quality of assets and profitability of banks. It also shows the efficiency of banks credit risk management and the recovery effectiveness. NPA do not generate any income, whereas, the bank is required to make provisions for such as assets that why is a double edge weapon. This paper outlines the concept of quality of bank loans of different types like Housing, Agriculture and MSME loans in state Haryana of selected public and private sector banks. This study is highlighting problems associated with the role of commercial bank in financing Small and Medium Scale Enterprises (SME). The overall objective of the research was to assess the effect of the financing provisions existing for the setting up and operations of MSMEs in the country and to generate recommendations for more robust financing mechanisms for successful operation of the MSMEs, in turn understanding the impact of MSME loans on financial institutions due to NPA. There are many research conducted on the topic of Non- Performing Assets (NPA) Management, concerning particular bank, comparative study of public and private banks etc. In this paper the researcher is considering the aggregate data of selected public sector and private sector banks and attempts to compare the NPA of Housing, Agriculture and MSME loans in state Haryana of public and private sector banks. The tools used in the study are average and Anova test and variance. The findings reveal that NPA is common problem for both public and private sector banks and is associated with all types of loans either that is housing loans, agriculture loans and loans to SMES. NPAs of both public and private sector banks show the increasing trend. In 2010-11 GNPA of public and private sector were at same level it was 2% but after 2010-11 it increased in many fold and at present there is GNPA in some more than 15%. It shows the dark area of Indian banking sector.
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
An experiment conducted in this study found that BaSO4 changed Nylon 6's mechanical properties. By changing the weight ratios, BaSO4 was used to make Nylon 6. This Researcher looked into how hard Nylon-6/BaSO4 composites are and how well they wear. Experiments were done based on Taguchi design L9. Nylon-6/BaSO4 composites can be tested for their hardness number using a Rockwell hardness testing apparatus. On Nylon/BaSO4, the wear behavior was measured by a wear monitor, pinon-disc friction by varying reinforcement, sliding speed, and sliding distance, and the microstructure of the crack surfaces was observed by SEM. This study provides significant contributions to ultimate strength by increasing BaSO4 content up to 16% in the composites, and sliding speed contributes 72.45% to the wear rate
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
The majority of the population in India lives in villages. The village is the back bone of the country. Village or rural industries play an important role in the national economy, particularly in the rural development. Developing the rural economy is one of the key indicators towards a country’s success. Whether it be the need to look after the welfare of the farmers or invest in rural infrastructure, Governments have to ensure that rural development isn’t compromised. The economic development of our country largely depends on the progress of rural areas and the standard of living of rural masses. Village or rural industries play an important role in the national economy, particularly in the rural development. Rural entrepreneurship is based on stimulating local entrepreneurial talent and the subsequent growth of indigenous enterprises. It recognizes opportunity in the rural areas and accelerates a unique blend of resources either inside or outside of agriculture. Rural entrepreneurship brings an economic value to the rural sector by creating new methods of production, new markets, new products and generate employment opportunities thereby ensuring continuous rural development. Social Entrepreneurship has the direct and primary objective of serving the society along with the earning profits. So, social entrepreneurship is different from the economic entrepreneurship as its basic objective is not to earn profits but for providing innovative solutions to meet the society needs which are not taken care by majority of the entrepreneurs as they are in the business for profit making as a sole objective. So, the Social Entrepreneurs have the huge growth potential particularly in the developing countries like India where we have huge societal disparities in terms of the financial positions of the population. Still 22 percent of the Indian population is below the poverty line and also there is disparity among the rural & urban population in terms of families living under BPL. 25.7 percent of the rural population & 13.7 percent of the urban population is under BPL which clearly shows the disparity of the poor people in the rural and urban areas. The need to develop social entrepreneurship in agriculture is dictated by a large number of social problems. Such problems include low living standards, unemployment, and social tension. The reasons that led to the emergence of the practice of social entrepreneurship are the above factors. The research problem lays upon disclosing the importance of role of social entrepreneurship in rural development of India. The paper the tendencies of social entrepreneurship in India, to present successful examples of such business for providing recommendations how to improve situation in rural areas in terms of social entrepreneurship development. Indian government has made some steps towards development of social enterprises, social entrepreneurship, and social in- novation, but a lot remains to be improved.
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
Distribution system is a critical link between the electric power distributor and the consumers. Most of the distribution networks commonly used by the electric utility is the radial distribution network. However in this type of network, it has technical issues such as enormous power losses which affect the quality of the supply. Nowadays, the introduction of Distributed Generation (DG) units in the system help improve and support the voltage profile of the network as well as the performance of the system components through power loss mitigation. In this study network reconfiguration was done using two meta-heuristic algorithms Particle Swarm Optimization and Gravitational Search Algorithm (PSO-GSA) to enhance power quality and voltage profile in the system when simultaneously applied with the DG units. Backward/Forward Sweep Method was used in the load flow analysis and simulated using the MATLAB program. Five cases were considered in the Reconfiguration based on the contribution of DG units. The proposed method was tested using IEEE 33 bus system. Based on the results, there was a voltage profile improvement in the system from 0.9038 p.u. to 0.9594 p.u.. The integration of DG in the network also reduced power losses from 210.98 kW to 69.3963 kW. Simulated results are drawn to show the performance of each case.
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
Manufacturing industries have witnessed an outburst in productivity. For productivity improvement manufacturing industries are taking various initiatives by using lean tools and techniques. However, in different manufacturing industries, frugal approach is applied in product design and services as a tool for improvement. Frugal approach contributed to prove less is more and seems indirectly contributing to improve productivity. Hence, there is need to understand status of frugal approach application in manufacturing industries. All manufacturing industries are trying hard and putting continuous efforts for competitive existence. For productivity improvements, manufacturing industries are coming up with different effective and efficient solutions in manufacturing processes and operations. To overcome current challenges, manufacturing industries have started using frugal approach in product design and services. For this study, methodology adopted with both primary and secondary sources of data. For primary source interview and observation technique is used and for secondary source review has done based on available literatures in website, printed magazines, manual etc. An attempt has made for understanding application of frugal approach with the study of manufacturing industry project. Manufacturing industry selected for this project study is Mahindra and Mahindra Ltd. This paper will help researcher to find the connections between the two concepts productivity improvement and frugal approach. This paper will help to understand significance of frugal approach for productivity improvement in manufacturing industry. This will also help to understand current scenario of frugal approach in manufacturing industry. In manufacturing industries various process are involved to deliver the final product. In the process of converting input in to output through manufacturing process productivity plays very critical role. Hence this study will help to evolve status of frugal approach in productivity improvement programme. The notion of frugal can be viewed as an approach towards productivity improvement in manufacturing industries.
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
In this paper, we investigated a queuing model of fuzzy environment-based a multiple channel queuing model (M/M/C) ( /FCFS) and study its performance under realistic conditions. It applies a nonagonal fuzzy number to analyse the relevant performance of a multiple channel queuing model (M/M/C) ( /FCFS). Based on the sub interval average ranking method for nonagonal fuzzy number, we convert fuzzy number to crisp one. Numerical results reveal that the efficiency of this method. Intuitively, the fuzzy environment adapts well to a multiple channel queuing models (M/M/C) ( /FCFS) are very well.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
2. Cuong Manh Nguyen and Tien Quoc Le
http://www.iaeme.com/IJCIET/index.asp 959 editor@iaeme.com
Figure 1. Strait of Malacca - High-risk areas are attacked by pirates in Southeast Asia
Pirates were born in the 300 BC when people began to sail offshore; the late seventeenth-
early eighteenth century is considered the era of piracy when the period has a series of seizures.
The piracy was openly held, and the number of robberies increased rapidly [3]. After that
golden age, pirates were active in the waters of the Indian Ocean, the Pacific, the offshore
waters of Somalia, the Straits of Malacca and the South China Sea. But since 1994, the
establishment of the WTO has led to rapid economic development and free trade in which
ocean freight is the most significant volume of goods in the world [4]. Especially for countries
with coastal lines, ocean freight is considered to be a huge advantage. But with this
development is the pirates' worrying growth. Between 1994 and 2002, more than 2,000 piracy
cases worldwide caused about $ 15 billion in damages each year, and the two most hotspots
for piracy were Somali and regional waters East Sea [5].
Figure 2. Somali pirate operating area
3. Impact Of Piracy on Maritime Transport and Technical Solutions for Prevention
http://www.iaeme.com/IJCIET/index.asp 960 editor@iaeme.com
However, thanks to the efforts of the countries joining the WTO, especially the countries
with large navies such as Russia, America, have helped to trade goods and travel at sea become
more favorable also Such as reducing economic losses for participating countries [6]. Besides
the development strategies of the maritime industry, the use of bio-fuel and protection of
marine environmental pollution are attracting much attention to aim at the "Green shipping"
[7-23]. Currently, the world classifies two types of pirates based on their activities: armed
robbers and ghosts. These two types of robberies are considered pirates, but they have very
different ways of operating [24-29]. While the armed robbery is armed and terroristic, the ghost
ship acts extremely sophisticatedly and, in recognition of these two types of robberies, we come
to the same traits. Their prominence, as well as the active area of each type of robbery, is
classified as followed:
1.1. Armed robbery
• Grounds: Usually located in places far from central areas, uninhabited islands, areas
not regularly inspected by the government. Some regions may be named, such as
the islands of Indonesia, the Gulf of Mexico, the Caribbean, or Somalia
• Manpower: Mainly local people are knowledgeable in the area, armed with
weapons such as guns, grenades, etc.
• Vehicles: Use high-speed canoes and boats to avoid scans of radar boats as well as
quickly and easily reach cargo ships to control crew on board.
• Use high-speed trains close to merchant ships, cruise ships, and boat captains and
ship them to their area. Select the types of goods that can be handled and unloaded
in the country and neighboring countries. Accompanying the looting of terrorism is
the trafficking of illicit drugs and illicit drugs in countries around the world.
• The most famous for this type of terrorist piracy is the Somali region - from the
Atlantic Ocean to the Indian Ocean and vice versa, South America, some of the
archipelago of Indonesia in the Southeast ASIAN.
1.2. Ghost ships
This is a very sophisticated form of piracy, which is a ship registered and flagged properly, but
these ships carry pirates. When the pirates capture the ship, cargo on the whole ship is taken to
the ghost ship, which will be shipped to the sea after shipment without any difficulty from the
ship. Security forces. Through analysis and evaluation, maritime security forces find that ghost
ships typically have the following characteristics:
• Over 15 - 20 years of use
• Initial registration information is abnormal
• Ships arrive at slow ports for loading and unloading
• The owner or operator is always the only one
Famous for the use of this ghost is the Chinese or Chinese pirate group in Guangzhou,
Shanghai, Fujian. They operate by information obtained through brokerage or moderator in
Southeast Asia [32]. Therefore, their main area of activity is in the Pacific Ocean, in which the
East Sea is fertile soil for the pirates.
The activities of these two types of pirates, despite the same purpose, are the looting of
ocean-going ships, but the way they operate is extremely different. While the primary activity
of armed pirates is to loot goods and take hostages for ransom, robberies are mostly flushed
into the water or transported to neighboring countries for consumption [33]. The pirate ships
4. Cuong Manh Nguyen and Tien Quoc Le
http://www.iaeme.com/IJCIET/index.asp 961 editor@iaeme.com
are incredibly sophisticated and cunning. This type of piracy is extremely dangerous both
regarding how it works and how it is plundered, but it does not work alone, but it operates in
an organized, commanded manner and receives shore support. It acts as a sophisticated criminal
organization, with intelligence, coordinated attacks, and individual attacks [34]. Some also
have their vessels and have a network of contacts to resell stolen goods to large buyers already
agreed upon. In general, pirates are armed with more aggressive and reckless weapons, Not
only do they steal, but they also take the ransom for ransom, which can be considered a terrorist
crime meanwhile, although not as aggressive as armed pirates pirate ships ghost activities are
very sophisticated and very difficult to grasp. This is piracy that is more prone to fraud, the
goods they target are also extremely rare, mainly mineral and petroleum, especially oil and gas.
2. THE IMPACT OF PIRACY ON INTERNATIONAL MARITIME
TRANSPORT
a) Piracy directly threatens the lives and property of the crew
Recent piracy is mostly using piracy weapons such as submachine guns, grenade launchers or
ammunition. This has led to a growing trend in violence at sea. They are piracy-ready when
they are ready to use their weapons to suppress the crew and to kill people without fear when
the crew members intend to protest [35]. In addition to the risk of casualties, crew members
who experience robbery can experience a mental disorder, many of whom are unrecoverable,
many fear being removed. The shortage of manpower for the maritime industry is not only in
Vietnam but around the world.
Also, the cost of shipping costs, the cost of insurance for ships will increase. Parallel to
rising transportation costs, maritime competition is likely to decline. In addition, high-capacity
shipowners will not invest in upgrading their ships as piracy is on the rise. Instead, they will
seek to sell their vessels in return for capital. This invisibility makes small shipping companies
disappear, and instead, only the world's major shipping companies are involved in shipping
that monopolizes shipping. And this monopoly makes the maritime industry not only in
Vietnam but also in the world cannot develop.
b) Piracy reduces the ability of shipping countries to trade by sea for shipping
According to IMB calculations, annual piracy costs $ 13-15 billion globally. This is a big risk
for international traffic and trade. If a well-known country is pirated shipping, it will adversely
affect its trade so that the country can be ostracized by shipping [36]. According to statistics
from 2008-2009, the number of piracy around the world increased by 11%, half of which were
caused by Somali pirates. And according to many experts' predictions, in the flat world of
today, the piracy will continue to occur especially in hot areas like Somalia or the South China
Sea.
5. Impact Of Piracy on Maritime Transport and Technical Solutions for Prevention
http://www.iaeme.com/IJCIET/index.asp 962 editor@iaeme.com
Figure 3. Yearly statistics of piracy incidents worldwide since 1948
(Source: IMO)
c) Causing political instability
Pirates are the main cause of political instability in every country. A major corrupt state is
responsible for the formation of ghost ships. That is why in South-East Asia, South America
or Somalia are areas, where there are many pirates while developed countries like Russia and
US are not pirates, are raging [37]. And reported, the country of political instability will
undermine the national flag-bearers.
Figure 4. Flag State whose vessels attacked six or more time January – June 2018
6. Cuong Manh Nguyen and Tien Quoc Le
http://www.iaeme.com/IJCIET/index.asp 963 editor@iaeme.com
d) Environmental hazards
In the case of piracy attacking ships carrying raw materials or oil, the consequences will be
extremely unpredictable. The worst case is that the oil spill is not only polluting the marine
environment, but also affecting the resources, marine resources, and coastal lowlands.
3. THE IMPACT OF PIRACY ON VIETNAM
According to the Vietnam Maritime Administration, the situation of maritime security in
general and piracy in Southeast Asia, in particular, are complicated. In particular, piracy tends
to increase sharply in the Sulu Sea area - Celebes in the southern Philippines and the east coast
of Sabah in Malaysia, with aggressive and aggressive ways of attacking ships, acting on life-
threatening, beatings, kidnapping, and murdering crew members. These are very dangerous
areas that local and international authorities regularly warn ship management companies and
officers and crew on board. Particularly for the Vietnamese fleet, from November 2016 to
3/2017, two piracy cases occurred in the area mentioned above, causing serious consequences
(killing one crewmember, one missing crew member, 11 crew members were abducted, some
crew members were beaten to injury, many were robbed or destroyed). Most recently, on March
5, 1977, the Phu An 268, while traveling through the Turtle Islands of the Philippines, was
pursued by pirate ships; But due to the well-executed measures taken by the vessel, the pirates
were unable to reach the ship and had to withdraw. In addition, a number of Vietnamese vessels
have also fallen victim to piracy.
On October 3, 2014, the Sunrise 689 was robbed in the Singapore area, leaving 18 crew
members detained for six days, Lost 2.000m3 of oil. On 13/12/2014, VP Asphalt 2 was also
robbed in the Singapore area, leading to the death of a Vietnamese crewman. On 11/11/2016,
Royal 16 ship of Royal Maritime Corporation was robbed in the Philippines. On February 19,
2017, Giang Hai ship and 17 crew members on the journey to transport cement from Indonesia
to the Philippines, when approaching Sulu Island, were attacked by armed pirates. The pirate
group arrested 7 of the 17 people on board, including the captain, two vice-captains, two
mechanics, two sailors. The remaining crew members were not injured, but the ship was
smashed many devices and floated on the sea. In November 2017, the Philippine Navy rescued
the crew successfully, but only three survived.
Piracy has affected Vietnam very heavily. The first is economic if the piracy situation
happens regularly, the shipping lines are forced to increase shipping costs. This will greatly
affect the economy of Vietnam as well as the world because we know that 90% of goods in the
world shipped by sea. Pirates also focus on oil tankers, so the threat of piracy is also a threat to
energy security. Pirates also lead to other criminal crimes such as smuggling and multinational
crime. All these issues will be the danger of destabilizing the political security of each nation
as well as the entire region. Especially with a country with the long sea like Vietnam, maritime
transportation is a very developed and invested industry, but with the increase as well as the
aggressiveness and aggressiveness of the pirates, the economy Of Vietnam is facing many
difficulties. Especially, Vietnam's oil tankers have been targeted by many pirates in the East
Sea. So what can be done to prevent this piracy?
4. THE SOLUTION FOR PREVENTION OF PIRACY
a) Secure-ship
Electric barriers around the ship are not lethal but serve only to combat piracy. The 9,000 volts
fence is used to infiltrate the fence. It will be shocked by electric shock (not dead), and the
result is that the robbers cannot break into the ship. And when it enters the fence, the light goes
7. Impact Of Piracy on Maritime Transport and Technical Solutions for Prevention
http://www.iaeme.com/IJCIET/index.asp 964 editor@iaeme.com
on, and the whistle goes off [38]. Fences can be folded easily and lowered quickly when
needed. In particular, there are doors open very easily in the case of picking up navigators,
lowering the escalator or dropping lifeboats and lifeboats.
Figure 5. Example of a warning sign in Somalia, which states
When necessary, the crew member can remove and reassemble the fence. As the vessel
approaches the active piracy area, the crew can install the fence in only a few hours. When the
ship leaves the area of danger, the captain can decide to leave or take off if the ship encounters
bad weather [39]. The remote control system can control all functions of the system without
wires. This system has been tested in the marine environment in many different seas including
the 7th wave when seawater covers the deck. Use of this protection system has several
purposes: to prevent those who want to break into the ship; Prevent and avoid attacks by
bandits; Avoid those who flee the train; Protection of crew and passengers; Control the
boarding and secretly send reports to the Piracy Center.
Figure 6. Secure-Ship is a 9000-volt electrifying fence
The Secure-Ship system meets the requirements for IMO ship protection measures and can
be installed on waterborne vehicles: Ships (except flammable cargo ships); Military ships;
Offshore supply vessels; Self-propelled barges and cruise ships. This system is being installed
8. Cuong Manh Nguyen and Tien Quoc Le
http://www.iaeme.com/IJCIET/index.asp 965 editor@iaeme.com
widely in European countries, especially in the Netherland, the system is a system that is
extremely developed.
b) Cruise tracking and recording system - ShipLoc
The piracy prevention center has coordinated with the satellite tracking operator to set up a
ship tracking system known as the ShipLoc system. This system outlines the ship's voyage as
well as port movement by recording the position of the vessel. There are many ships installed
with this system. ShipLoc provides ship owners and ship managers with global alert and ship
cruise control and fully meets IMO requirements for Ship Security Alert Systems (SSAS). The
device will transfer the alarm messages from the ship to the shore in the event of piracy or
terrorist attack on the vessel) (Article XI-2/6 SOLAS was adopted by IMO in December 2002
and takes effect from 2 stages. Paragraphs (July 1, 2004, and July 1, 2006) stipulate that all
vessels over 500 GT must be equipped with SSAS [40]. A small transmitter and low cost can
be hiding on the ship. For safety reasons, the crew is not known to have installed this transmitter
and its location. With ShipLoc and a networked computer, the ship owner knows exactly where
his ships are. The ShipLoc system will be very useful in the event of a ship being hijacked or
kidnapped. It can also be a management device for tracking the cruise of ships around the
world.
ShipLoc works with two functions:
• Notice of parameters from the ship: Report of the ship from 6 to 24 times/day on
the screen; Track ship location whenever and wherever; Track ship speed, position,
and direction of a cruise ship; Tracking information about the weather where the
train is traveling (wind, waves, pressure ...).
• Sending alarm messages: When the emergency button is pressed, the alarm message
will be sent immediately to the ship owner and the competent authorities (Piracy
Control Center and flag authorities).
• ShipLoc is exploited independently and automatically, including GPS receivers for
the position, direction, and speed of ships; Argo's generator and battery for use in
case of power failure. If the ship is equipped with both ShipLoc and Secure-Ship
systems, it will be effective in preventing and preventing piracy.
Figure 7. Operating principle of Ship Loc
9. Impact Of Piracy on Maritime Transport and Technical Solutions for Prevention
http://www.iaeme.com/IJCIET/index.asp 966 editor@iaeme.com
c) Anti-pirate water hoses system against pirates
Anti-pirate water hoses are controlled by high-pressure cold sea water and remain active until
the vessel is safe and the pump is turned off [41]. The water jets are completely efficient, with
a rotation speed of 3 to 6 round per minute
Figure 8. Water hoses system
To reduce the maximum of water pressure drop, a block has been installed to limit the water
spray on the upside. The sprinklers can be installed as either permanent or portable solutions
and without additional chemicals or steam.
c) Non-Lethal Slippery Foam
A foaming machine may be used, but it must be provided in addition to the FFE-Fire Fighting
Equipment list. Foamers are effective as it is disoriented and very slippery making it difficult
for the pirates to climb the ship.
5. SOLUTIONS PROPOSED BY THE VIETNAM MARITIME
ADMINISTRATION TO PREVENT PIRACY
Review and propose competent agencies to amend and supplement the legal documents related
to maritime security, including the prevention and fight against piracy and theft of ships;
To promulgate documents guiding ship owners and ship management companies to take
measures to prevent and combat piracy and armed robbery against seagoing ships. Coordinate
with concerned agencies and units such as the Consular Department of the Ministry of Foreign
Affairs, the Marine Police, the Border Guard Command, the Ministry of Defense, the Anti-
terrorist Department of the Ministry of Public Security and the Post Check Vietnam to take
measures to assist ship owners and crew when attacked by pirates. In some piracy cases, in
addition to liaising and coordinating with foreign agencies and organizations to request
assistance, search and rescue of Vietnamese ships, the Vietnam Maritime Bureau has also sent
officials Directly to other countries to assist ship owners and crew members in handling and
handling cases. Participating in the ReCAAP - Member Conference of the Executive Council
of the Anti-Piracy Information Center and Armed Robbery Against Boats in Asia. The
Government, the relevant ministries and branches of Vietnam have also made some concrete
10. Cuong Manh Nguyen and Tien Quoc Le
http://www.iaeme.com/IJCIET/index.asp 967 editor@iaeme.com
measures to help Vietnamese crewmen and ship-owners in piracy prevention and combat.
However, up to now, these solutions are not strong enough to prevent or completely stop piracy
for our fleet. Stakeholders have agreed on the issue of piracy, armed robbery of the seafarers is
committed to working together to improve the effectiveness of anti-piracy. Sea and armed
robbery against the seagoing ship, contributing to the assistance of seafarers and ship-owners
to reassure them when cruising through high-risk areas of piracy; minimizing the damage of
people and property when the ship encounters pirates.
6. CONCLUSION
Facing increasingly complex piracy and a significant impact on the maritime security of the
region, threatening the development of shipping, countries in the region have taken appropriate
steps in the fight against piracy, armed robbery such as cooperation in sharing information
against piracy, joint patrols and achieved certain results. However, to have comprehensive and
specialized solutions in the fight against piracy and armed robbery in the region, in the coming
time, countries should step up international cooperation to Jointly build the legal corridor and
law enforcement capacity, organize patrols and workshops to share experiences and comment
on issues that exist different perspectives. At the same time, the parties also need to improve
their cooperation in protecting ships.
REFERENCES
[1] G. W. Burruss, T. J. Holt, and A. Bossler, “Revisiting the Suppression Relationship
Between Social Learning and Self-Control on Software Piracy,” Soc. Sci. Comput. Rev.,
p. 0894439317753820, 2018.
[2] V. Re, “Anti-piracy policies and online film circulation: The Italian context, between
formality and informality,” in Digital Piracy, Routledge, 2018, pp. 66–94.
[3] A. Imran, E. A. Bramer, K. Seshan, and G. Brem, “An overview of catalysts in biomass
pyrolysis for production of biofuels,” Biofuel Res. J., vol. 5, no. 4, pp. 872–885, Dec. 2018.
[4] Y. Ning, S. X. Xu, M. Yan, and G. Q. Huang, “Digital pricing with piracy and variety
seeking,” Int. J. Prod. Econ., vol. 206, pp. 184–195, 2018.
[5] J. Corwin, “Preventing Pirated Software Use within an Organization,” 2018.
[6] L. Yang, W. Wang, Z. Wang, and Q. Zhang, “Rainbow: Preventing Mobile-Camera-based
Piracy in the Physical World,” in IEEE INFOCOM 2018-IEEE Conference on Computer
Communications, 2018, pp. 1061–1069.
[7] A. T. Hoang, “Prediction of the density and viscosity of biodiesel and the influence of
biodiesel properties on a diesel engine fuel supply system,” J. Mar. Eng. Technol, 2018.
https://doi.org/10.1080/20464177.2018.1532734.
[8] A. T. Hoang, “A report of the oil spill recovery and treatment technologies to reduce the
marine environment pollution,” Int. J. e-Navigation Marit. Econ., vol. 9, pp. 35–49, 2018.
[9] A. T. Hoang and X. D. Pham, “An investigation of remediation and recovery of oil spill
and toxic heavy metal from maritime pollution by a new absorbent material,” J. Mar. Eng.
Technol., 2018. https://doi.org/10.1080/20464177.2018.1544401.
[10] M. A. Rosen, “Environmental sustainability tools in the biofuel industry,” Biofuel Res. J.,
vol. 5, no. 1, pp. 751–752, Mar. 2018.
[11] A. T. Hoang et al., “An absorption capacity investigation of new absorbent based on
polyurethane foams and rice straw for oil spill cleanup,” Pet. Sci. Technol., vol. 36, no. 5,
pp. 361–370, 2018.
[12] L. Leng and W. Zhou, “Chemical compositions and wastewater properties of aqueous phase
(wastewater) produced from the hydrothermal treatment of wet biomass: A review,”
11. Impact Of Piracy on Maritime Transport and Technical Solutions for Prevention
http://www.iaeme.com/IJCIET/index.asp 968 editor@iaeme.com
Energy Sources, Part A Recover. Util. Environ. Eff., vol. 40, no. 22, pp. 2648–2659, Nov.
2018.
[13] A. T. Hoang and A. T. Le, “Trilateral correlation of spray characteristics, combustion
parameters, and deposit formation in the injector hole of a diesel engine running on
preheated Jatropha oil and fossil diesel fuel,” Biofuel Res. J., 2019.
https://doi.org/10.18331/BRJ2019.6.1.2.
[14] H. A. Tuan and C. M. Quang, “A mini review of using oleophilic skimmers for oil spill
recovery,” J. Mech. Eng. Res. Dev, vol. 41, no. 2, pp. 92–96, 2018.
[15] A. T. Hoang and A. T. Le, “Trilateral correlation of spray characteristics, combustion
parameters, and deposit formation in the injector hole of a diesel engine running on
preheated Jatropha oil and fossil diesel fuel,” Biofuel Res. J., 2019.
https://doi.org/10.18331/BRJ2019.6.1.2.
[16] A. T. Hoang, X. L. Bui, and X. D. Pham, “A novel investigation of oil and heavy metal
adsorption capacity from as-fabricated adsorbent based on agricultural by-product and
porous polymer,” Energy Sources, Part A Recover. Util. Environ. Eff., vol. 40, no. 8, pp.
929–939, 2018.
[17] P. H. Hoang, A. T. Hoang, N. H. Chung, L. Q. Dien, X. P. Nguyen, and X. D. Pham, “The
efficient lignocellulose-based sorbent for oil spill treatment from polyurethane and
agricultural residue of Vietnam,” Energy Sources, Part A Recover. Util. Environ. Eff., vol.
40, no. 3, pp. 312–319, 2018.
[18] A. Demirbaş, “Global Renewable Energy Resources,” Energy Sources, Part A Recover.
Util. Environ. Eff., vol. 28, no. 8, pp. 779–792, Jul. 2006.
[19] M. Vijay Kumar, A. Veeresh Babu, P. Ravi Kumar, and S. Sudhakara Reddy,
“Experimental investigation of the combustion characteristics of Mahua oil biodiesel-diesel
blend using a DI diesel engine modified with EGR and nozzle hole orifice diameter,”
Biofuel Res. J., vol. 5, no. 3, pp. 863–871, 2018.
[20] A. T. Hoang and V. V. Pham, “A study of emission characteristic, deposits, and lubrication
oil degradation of a diesel engine running on preheated vegetable oil and diesel oil,” Energy
Sources, Part A Recover. Util. Environ. Eff., vol. 41, no. 5, pp. 611–625, 2019.
[21] A. T. Hoang, “Waste heat recovery from diesel engines based on Organic Rankine Cycle,”
Appl. Energy, vol. 231, pp. 138–166, 2018.
[22] A. T. Hoang and A. T. Le, “A review on deposit formation in the injector of diesel engines
running on biodiesel,” Energy Sources, Part A Recover. Util. Environ. Eff., vol. 41, no. 5,
pp. 584–599, 2019.
[23] K. Christiansen, D. R. Raman, G. Hu, and R. Anex, “First-order estimates of the costs,
input-output energy analysis, and energy returns on investment of conventional and
emerging biofuels feedstocks,” Biofuel Res. J., vol. 5, no. 4, pp. 894–899, Dec. 2018.
[24] O. Duru, “Irrationality in politics and governance of maritime affairs: The collapse of
sovereign maritime governance,” Int. J. e-Navigation Marit. Econ., vol. 1, pp. 48–59, 2014.
[25] A. G. James, “Bruce A. Elleman. Seaborne Perils: Piracy, Maritime Crime, and Naval
Terrorism in Africa, South Asia, and Southeast Asia.” Taylor & Francis, 2018.
[26] G. H. Dinh and N.-K. Im, “The combination of analytical and statistical method to define
polygonal ship domain and reflect human experiences in estimating dangerous area,” Int.
J. e-Navigation Marit. Econ., vol. 4, pp. 97–108, 2016.
[27] F. R. Hamza and J.-P. Priotti, “Maritime trade and piracy in the Gulf of Aden and the Indian
Ocean (1994–2017),” J. Transp. Secur., pp. 1–18, 2018.
[28] C. E. Nwadigwe, “Creativity and New Technologies: Piracy, Politics and the Business of
Cultural Production in Nigeria,” in Africa and Globalization, Springer, 2018, pp. 183–204.
12. Cuong Manh Nguyen and Tien Quoc Le
http://www.iaeme.com/IJCIET/index.asp 969 editor@iaeme.com
[29] M. Posada, H. Greidanus, M. Alvarez, M. Vespe, T. Cokacar, and S. Falchetti, “Maritime
awareness for counter-piracy in the Gulf of Aden,” in Geoscience and Remote Sensing
Symposium (IGARSS), 2011 IEEE International, 2011, pp. 249–252.
[30] Y. K. M. Leung, “Legal challenges with the use of Vessel Protection Detachments and
Private Maritime Security Company guards for on board ship protection against piracy.”
UiT Norges arktiske universitet, 2018.
[31] S. C. Brown and T. J. Holt, “12 Identifying paths forward in the study of piracy,” Digit.
Piracy A Glob. Multidiscip. Acc., p. 250, 2018.
[32] G. Burruss and C. Dodge, “10 The criminality of digital piracy,” Digit. Piracy A Glob.
Multidiscip. Acc., p. 208, 2018.
[33] J. Lindley, “Using regulatory pluralism to achieve effective control of Somali piracy,”
Crim. Justice Regul. Revisit. Essays Honour Peter Grabosky, p. 109, 2018.
[34] J. V Hastings and S. G. Phillips, “Order beyond the state: explaining Somaliland’s
avoidance of maritime piracy,” J. Mod. Afr. Stud., vol. 56, no. 1, pp. 5–30, 2018.
[35] P. Tyson, “Evaluating Australia’s New Anti-Piracy Website Blocking Laws,” UniSA
Student Law Rev., vol. 3, 2018.
[36] I. M. A. G. Azmi, H. G. Lim, P. S. Tay, and C. P. Sik, “Trans-Pacific Partnership
Agreement Minus One and Enhanced Criminal Penalty for Online Copyright Piracy:
Malaysia’s Options,” J. World Trade, vol. 52, no. 3, pp. 461–477, 2018.
[37] N. S. F. A. Rahman, A. H. Saharuddin, and R. Rasdi, “Effect of the northern sea route
opening to the shipping activities at Malacca straits,” Int. J. e-Navigation Marit. Econ., vol.
1, pp. 85–98, 2014.
[38] W. A. Knight and A. A. Elmi, “Combatting Piracy in the Horn of Africa Waters,” in The
Palgrave Handbook of Contemporary International Political Economy, Springer, 2019, pp.
485–500.
[39] V. Sakhuja, “Maritime terrorism and piracy: security challenges in South East Asia,”
eSocialSciences, 2018.
[40] A. D. Ba, “Governing the Safety and Security of the Malacca Strait: The Nippon
Foundation between States and Industry,” J. Contemp. Asia, vol. 48, no. 2, pp. 252–277,
2018.
[41] M. J. Struett, “Maritime Piracy and Global Security,” Transnatl. Crime Glob. Secur. [2
Vol., p. 23, 2018.