Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

SEARCH GUIDE  Download Search Tip PDF File

  • articleNo Access

    REMEDIATION OF LIQUEFIABLE SOILS FOR PORT STRUCTURES IN JAPAN — ANALYSIS, DESIGN AND PERFORMANCE

    The paper gives an overview of the remedial measures against liquefaction for port structures. Case histories of implementation and performance of these remediation measures during past earthquakes are reviewed. The paper discusses the applicability and limitations of the conventional simplified approach and how these limitations can be overcome in the performance-based approach using a full seismic response analysis of a soil-structure system.

  • articleOpen Access

    China’s Belt and Road Initiative and Infrastructure Development in Nigeria: A Paradigm Shift or Failed Ventures Repackaged?

    This paper specifically explores the impacts of the Belt and Road Initiative (BRI) infrastructure diplomacy in Nigeria, with a particular focus on two crucial sectors: ports and railways. It analyzes the challenges and conditions that have led to delays and abandonment of previous projects awarded to China in the past decades. Through the lens of complex interdependency theory, this paper discusses the push and pull factors that motivated the execution of BRI projects in Nigeria and how they mutually benefit the actors involved. Furthermore, it utilizes primary and secondary data gathered through Key Informant Interviews and documented sources. On the strength of the findings, this paper concludes that the BRI, unlike past Chinese projects in Nigeria, has significantly enhanced the development of infrastructure by modernizing the Nigerian railway facilities and constructing the first deep seaport in the country.

  • chapterNo Access

    PORTS AND PROTOCOLS FOR ENTERPRISE LEVEL SECURITY

    Network protocols have vulnerabilities, and one way to reduce these vulnerabilities is to reduce the protocols in use to a small set of well-tested standard protocols. This reduces the attack surface and provides high confidence in selected communications. Screening of acceptable ports and protocols can be done by network appliances known as firewalls. Communications on the approved list are permitted, and others blocked. Many appliances now have port and protocol filters, and the server or service itself may have a host-based security system that can apply this functionality. This paper covers enterprise considerations for use and screening of ports and protocols.

  • chapterNo Access

    CRUISE TOURISM

    Cruising for leisure purposes, whether on the ocean, along coasts or rivers, has demonstrated consistent growth as a tourism activity. Cruising can be divided into a number of sub-markets, within which most supply is oligopolistic in nature, and concentration is increasing. Cruise lines pursue various strategies, but it is shown that pricing is not the most significant, as demand, cruise products and prices are amorphous. Unlike fixed-location tourism, cruising is a footloose product, where factor inputs may be sourced globally and cruise lines may have little connection with port destinations served on itineraries. Operationally, economies of scale, capacity and revenue management are important tools for operators, as vessel sizes increase and operational management and marketing become more sophisticated. The impacts on local and national economies are in many ways analogous to those of tourism in general.