WorldWideScience

Sample records for anti-submarine warfare

  1. Anti-submarine warfare with continuously active sonar

    NARCIS (Netherlands)

    Vossen, R. van; Beerens, S.P.; Spek, E. van der

    2011-01-01

    Existing surveillance sonar systems for anti-submarine warfare (ASW) use a pulsed sonar deployed at a low duty cycle. Continuously active sonar (CAS) is of special interest since the technique could provide better detection performance than conventional pulsed sonar, and it will provide the operator

  2. Hybrid Airship Multi-Role (HAMR) Anti-Submarine Warfare (ASW) mission capability

    OpenAIRE

    Agpaoa, Roy; Cawley, Matthew; Cossey, Chad; Galvan, Jose; Giang, Alan; Hanchinamani, Joseph; Ikeda, Jeffrey; Kenney, John; Magnusson, Lance; Martinez, Christopher; Newberry, Mike; Raymond, Eldridge; Rykala, John; Watts, Jason; Wood, Micheal

    2008-01-01

    The Hybrid Airship Multi-Role (HAMR) Anti-Submarine Warfare (ASW) Mission Module project applies established systems engineering principles and processes to the design of an ASW payload module that examines the capability of the HAMR to perform persistent ASW mission support. Critical system functions and objectives are identified and are assigned appropriate quantitative metrics. Additionally, three alternative architectures are generated and evaluated using the appropriate metrics based...

  3. Effectiveness Analysis Method Research of Formation Cooperative Anti-submarine Warfare Based on Multi-agent Simulation%基于多Agent仿真的编队协同反潜作战效能分析方法研究

    Institute of Scientific and Technical Information of China (English)

    陆铭华; 吴金平; 董汉权

    2011-01-01

    编队协同反潜作战是一个复杂系统,能不能形成清晰的反潜效能分析思路,建立合适的反潜效能指标体系,并进一步确定合理的效能分析方法,成为编队协同反潜作战效能分析最为关键的环节.在给出编队协同反潜作战领域Agent定义及单个反潜兵力Agent形式化描述的基础上,提出了基于多Agent系统仿真(MASBS)的复杂系统效能分析法(MASBS-CSEA),给出了其定义,提取了三种作战任务模式下的效能分析指标,并基于HLA技术构建了MASBS仿真的联邦体系结构.%Conceiving legible anti-submarine effectiveness analysis ideas and designing appropriate anti-submarine effectiveness indexes system as well as determining reasonable effectiveness analysis method have been the most important aspects of effectiveness analysis in the field of formation cooperative anti-submarine warfare which is a complex system. On the basis of presenting the definition of agent and the formalization description of single anti-submarine force in the field of formation cooperative anti-submarine warfare, MAS-based simulation complex system effectiveness analysis (MASBS- CSEA) method was brought forward including presenting its definition and picking-up effectiveness analysis indexes in three combat task models as well as structuring the federation architecture of MASBS simulation based on HLA.

  4. Trends in underwater warfare : From an underwater acoustics perspective

    NARCIS (Netherlands)

    Ort, C.M.; Driessen, F.P.G.

    2002-01-01

    Technological developments concerning underwater systems for Anti Submarine Warfare (ASW) and Mine Counter Measures (MCM) are directed at optimally countering the underwater threat in the near future. Countering the existing underwater threat is already extremely difficult, but there are several tre

  5. Continuous acoustic sensing with an unmanned aerial vehicle system for anti-submarine warfare in a high-threat area

    OpenAIRE

    Cason, Loney R., III

    2015-01-01

    Approved for public release; distribution is unlimited An unmanned aerial vehicle system called the Aqua-Quad, an ultra-long-endurance hybrid design, developed by researchers in the NPS Department of Mechanical and Aerospace Engineering, is utilized in this thesis. The Aqua-Quad has the capability of landing on the ocean surface and deploying passive acoustic sensors at depth. We investigated the employment of the Aqua-Quad in a general environment, determined sea-state survivability, and ...

  6. Governing Warfare

    DEFF Research Database (Denmark)

    Harste, Gorm

      It would seem as though warfare has gotten out of control, not only in Iraq and Afghanistan, but also in Central Africa. The paper outlines the strategic history of politically controlled warfare since the early Enlightenment. The argument is that control is implausible. The idea of control has...... the risks of lacking unity and displays the organisational trap to the fatal political myth of controlled warfare: Does it come from the military organisation system itself, from political ideologies of goal-rational governance, or from the chameleonic logic of wars?  ...... administration. While organisation systems continue to make some kind of political control possible, this is not the case in relation to wars. The organisation system is the in-between that should mediatise politics and war but is not functionally equivalent to just and unjust wars. The paper investigates...

  7. Sonobuoy Array Shape Optimization when Checking Anti-Submarine%检查性反潜时声纳浮标阵阵型优化

    Institute of Scientific and Technical Information of China (English)

    丛红日; 沈培志; 栾玉佳

    2014-01-01

    On the base of summarizing the requests and characteristics of checking anti-submarine, the main array shapes of sonobuoy when checking anti-submarine were analysed. The simulation model of sonobuoy array searching efficiency wasset up, and on the condictions of opration scenario, the seaching probabilities of different sonobuoy array shapes were studied in simulation method. The simulation resulted was analyzed in detail, and some optimized results of sonobuoy ar-ray shape when checking anti-submarine were put forward.%在总结检查性反潜要求与特点的基础上,分析了检查性反潜时声纳浮标阵的主要阵型,建立了声纳浮标阵作战效能的仿真模型,并在想定条件下对典型声纳浮标阵的搜索效能进行了仿真研究。比较、分析仿真结果,提出了检查性反潜时声纳浮标阵阵型的优化结果。

  8. Flying Electronic Warfare Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides NP-3D aircraft host platforms for Effectiveness of Navy Electronic Warfare Systems (ENEWS) Program antiship missile (ASM) seeker simulators used...

  9. Defining cyber warfare

    Directory of Open Access Journals (Sweden)

    Dragan D. Mladenović

    2012-04-01

    Full Text Available Cyber conflicts represent a new kind of warfare that is technologically developing very rapidly. Such development results in more frequent and more intensive cyber attacks undertaken by states against adversary targets, with a wide range of diverse operations, from information operations to physical destruction of targets. Nevertheless, cyber warfare is waged through the application of the same means, techniques and methods as those used in cyber criminal, terrorism and intelligence activities. Moreover, it has a very specific nature that enables states to covertly initiate attacks against their adversaries. The starting point in defining doctrines, procedures and standards in the area of cyber warfare is determining its true nature. In this paper, a contribution to this effort was made through the analysis of the existing state doctrines and international practice in the area of cyber warfare towards the determination of its nationally acceptable definition.

  10. Biological warfare agents

    Directory of Open Access Journals (Sweden)

    Duraipandian Thavaselvam

    2010-01-01

    Full Text Available The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies.

  11. Chemical warfare agents

    Directory of Open Access Journals (Sweden)

    Vijayaraghavan R

    2010-01-01

    Full Text Available Among the Weapons of Mass Destruction, chemical warfare (CW is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided.

  12. The Physics of Warfare

    Science.gov (United States)

    Giordano, Gerardo

    2015-01-01

    Recently, I was tasked with the creation and execution of a new themed general education physics class called The Physics of Warfare. In the past, I had used the theme of a class, such as the physics of sports medicine, as a way to create homework and in-class activities, generate discussions, and provide an application to demonstrate that physics…

  13. Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    Dev Vrat Kamboj

    2006-10-01

    Full Text Available There is a long historic record of use of biological warfare (BW agents by warring countriesagainst their enemies. However, the frequency of their use has increased since the beginningof the twentieth century. World war I witnessed the use of anthrax agent against human beingsand animals by Germans, followed by large-scale field trials by Japanese against war prisonersand Chinese population during world war II. Ironically, research and development in biologicalwarfare agents increased tremendously after the Geneva Protocol, signed in 1925, because ofits drawbacks which were overcome by Biological and Toxin Weapons Convention (BTWC in1972. Biological warfare programme took back seat after the 1972 convention but biologicalagents regained their importance after the bioterrorist attacks of anthrax powder in 2001. In thelight of these attacks, many of which turned out to be hoax, general awareness is required aboutbiological warfare agents that can be used against them. This review has been written highlightingimportant biological warfare agents, diseases caused by them, possible therapies and otherprotection measures.

  14. 软件无线电在反潜技术中的研究%Research on Software Radio in Anti-submarine Technology

    Institute of Scientific and Technical Information of China (English)

    李文海; 魏辉; 许爱强

    2011-01-01

    Aiming at the widely researched and applied software radio (SR), for realizing the digitization of anti-submarine underwater acoustic signal processor, a hypothesis of the application of SR in sonar receiver is proposed combining the buoy's receiving signal and communication. The relative technologies are introduced simultaneously. The technology can realize the digitization of signal processing, reduce errors, improve efficiency and so on.%针对通信领域近些年广泛研究和应用的软件无线电技术,为了实现反潜水声信号处理机的数字化,结合浮标接收信号和通信的特点,提出软件无线电应用在声纳接收机中的假设,并给出软件无线电技术在反潜接收机中应用的相关技术.该技术特点是实现信号处理的数字化,降低误差,提高处理效率.

  15. Establishing Cyber Warfare Doctrine

    Directory of Open Access Journals (Sweden)

    Andrew M. Colarik

    2012-01-01

    Full Text Available Over the past several decades, advances in technology have transformed communications and the ability to acquire, disseminate, and utilize information in a range of environments. Modern societies and their respective militaries have taken advantage of a robust information space through network-centric systems. Because military and commercial operations have increasingly converged, communication and information infrastructures are now high-priority military objectives in times of war. This article examines the theoretical underpinning of current cyber warfare research, what we have learned so far about its application, and some of the emerging themes to be considered; it also postulates the development of a (national cyber warfare doctrine (CWD. An endeavor of this scale requires lots of considerations and preparation for its development if it is to be cooperatively embraced. This article considers why information technology systems and their supporting infrastructures should be considered legitimate military targets in conflicts, and offers several events that support this supposition. In addition, it identifies the various forms of doctrine that will become the basis for developing a CWD, discusses a CWD's possible components, and proposes a national collaborative and discussion framework for obtaining a nation's stakeholder buy-in for such an endeavor.

  16. The evolution of human warfare.

    Science.gov (United States)

    Pitman, George R

    2011-01-01

    Here we propose a new theory for the origins and evolution of human warfare as a complex social phenomenon involving several behavioral traits, including aggression, risk taking, male bonding, ingroup altruism, outgroup xenophobia, dominance and subordination, and territoriality, all of which are encoded in the human genome. Among the family of great apes only chimpanzees and humans engage in war; consequently, warfare emerged in their immediate common ancestor that lived in patrilocal groups who fought one another for females. The reasons for warfare changed when the common ancestor females began to immigrate into the groups of their choice, and again, during the agricultural revolution. PMID:22081837

  17. Nuclear radiation in warfare

    International Nuclear Information System (INIS)

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios; biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion. (orig./HP)

  18. Iran and Cyberspace Warfare

    Directory of Open Access Journals (Sweden)

    Sami Kronenfeld

    2012-12-01

    Full Text Available Throughout the world decision makers and the general public have undoubtedly realized in recent years that cyberspace must be treated as a genuine realm of warfare. Since the the Stuxnet attack - one of the most destructive cyber attacks to date - Iran has been working hard to improve its cyberspace defenses on the one hand, while building up cyberspace intelligence gathering and offensive capabilities on the other. This article examines the current situation regarding various elements of Iran’s cyberspace development process. The first section analyzes the country’s cyberspace strategy, while the second section describes the organizational and operational response to the formulated strategy. This comprises three components: infrastructures for training and developing technological manpower for work in cyberspace; technological developments that have already been introduced; and the overall processes of cyberspace force construction. Finally, the article focuses on a number of cyberspace incidents attributed to Iran, attempts to gain some insight into the way Iran conducts its cyberspace activities, and examines implications for Israel and other Western nations.

  19. Roes and Development of Aerial Depth Charges in Modern Anti-Submarine Warfares%航空深弹在现代反潜战中的作用与发展

    Institute of Scientific and Technical Information of China (English)

    金立峰; 邓歌明

    2009-01-01

    航空深弹是航空反潜武器序列中不可缺少的一员,曾在两次世界大战中立下赫赫战功,是一种有效的反潜武器.本文从航空深弹的作用和现状出发,对其未来发展方向进行了阐述.

  20. How Challenges of Warfare Influences the Laws of Warfare

    Directory of Open Access Journals (Sweden)

    Eyal Benvenisti

    2012-04-01

    Full Text Available The first challenge to laws of warfare comes from the realm of human rights, from the right to life. Today the situation is different. Laws of human rights have trickled into laws of warfare, even though they never mean to apply to them. In the process of formulating human rights laws there was never any intention that they be applied to a state of war. Their starting point was the power that a regime brings to bear on its citizens. This was not a case of horizontal warring - such as a duel or contest - but rather a hierarchy, a vertical relationship in which the one possessing public power controlled the citizen. This essay will deal with the challenges to the laws of warfare posed by fighting in urban zones, the consequent changes to these laws, and the problems these changes have aroused and responses to them.

  1. On limit condition models of called-out search area far borderline when anti-submarine helicopters search%反潜直升机应召搜索区远界边界条件模型

    Institute of Scientific and Technical Information of China (English)

    丛红日; 唐金国; 王子明

    2012-01-01

    通过对应召搜索区模型进行详尽分析,推导出反潜直升机使用吊放声呐和声呐浮标搜索时应召搜索区远界的边界条件模型,并给出具体算例.对应召搜索区远界边界条件的战术应用进行讨论,得出相应的战术结论,为指导反潜直升机应召反潜作战提供理论依据.%On the base of analysing called-out search area model in detail, the limit condition models of the far borderline of called-out search area when anti-submarine helicopters search. With dipping sonar and sonobuoy are deduced,and the calculating example is offered. Then,the tactic applying of these models . Is discussed, and some tactic conclusion are gained. This can provide operation guidance for helicopter called-out anti-submarine.

  2. Modeling and aimulation of the anti-submarine helicopter based on multi-round reentry check searching%反潜直升机多段往返检查搜潜建模与仿真技术研究

    Institute of Scientific and Technical Information of China (English)

    罗光成; 张丹

    2011-01-01

    Submarine is difficult to be found under the water for its hidden capability. This paper provided an algorithm which bases on the application of dipping sonar on anti-submarine helicopter to search the submarine in the suspicious areas, and established a model of multi-round reentry searching for which using the single helicopter check search,and combined with the submarine underwater navigation,simulated the search process,at last it analyzed the efficient of dipping sonar probe space and detect probability. It provided a reference to give anti-submarine tactics for the areas check searching.%潜艇因其隐身性,在水下很难被发现.本文根据反潜直升机利用吊放声呐搜潜的战术应用,对可疑区域进行快速有效地检查搜索.建立了应用于单机检查搜潜的多段往返搜潜模型.并结合水下潜艇的航行,对搜索过程进行仿真,分析了吊放声呐探测点间隔系数对模型搜潜概率的影响,为区域检查搜潜战术制定提供了参考.

  3. The doctor and nuclear warfare

    International Nuclear Information System (INIS)

    At the 34th World Medical Assembly in Lisbon in 1981 the World Medical Association adopted a motion proposed by the American Medical Association that national medical associations should develop programs to educate the civilian population on the medical consequences of nuclear war. This article discusses the attitude the medical professions should have, should nuclear warfare in some form confront them in the future. The conclusion is drawn that defence against nuclear warfare is only a part of civil defence against any disaster, including the natural disasters such as flood and fire and the man-made disasters of transport accidents, even of problems at nuclear plants designed to supply energy

  4. The Anatomy of Counterinsurgency Warfare

    DEFF Research Database (Denmark)

    Ringsmose, Jens; Pedersen, Kenneth

    Since the beginning of the new millennium, the West has been increasingly involved in a tiresome and rather particular type of conflict: insurgency warfare. The bloody and shocking terrorist attacks on New York and Washington in September 2001 marked the beginning of a new era, and the introducti...

  5. European Curricula, Xenophobia and Warfare.

    Science.gov (United States)

    Coulby, David

    1997-01-01

    Examines school and university curricula in Europe and the extent of their influence on xenophobia. Considers the pluralistic nature of the European population. Discusses the role of curriculum selection and language policy in state efforts to promote nationalism. Assesses the role of curricular systems in the actual encouragement of warfare,…

  6. Modeling and simulation of the anti-submarine helicopter based on serrated check searching%反潜直升机锯齿形检查搜潜建模与仿真技术研究

    Institute of Scientific and Technical Information of China (English)

    罗光成; 张丹

    2011-01-01

    Submarine is difficult to be found under the water for its hidden capability. This paper provided an algorithm which bases on the application of dipping sonar on anti-submarine helicopter to search the submarine in the suspicious areas,and established a model of serrated searching for which used the single helicopter check search. Then combined with the submarine underwater navigation.simulating the search process for Monte Carlo,at last it analyzed the efficient between dipping sonar interval quotiety and detection probability, and got the optimum interval quotiety. It provided a reference to give anti-submarine tactics for the areas check searching.%潜艇因其隐身性,在水下很难被发现.根据反潜直升机利用吊放声呐搜潜的战术应用,对可疑区域进行快速有效地检查搜索.建立了应用于单机检查搜潜的锯齿形搜潜模型.结合水下潜艇的航行,利用蒙特卡洛法对搜索过程进行仿真.分析了吊放声呐探测点间隔系数对模型搜潜概率的影响,给出了适合锯齿形检查搜潜模型的最佳间隔系数取值区间.研究成果为区域检查搜潜战术制定提供了参考.

  7. Role of Smokes in Warfare .

    Directory of Open Access Journals (Sweden)

    P.K. Mishra

    1994-04-01

    Full Text Available The role smokes in warfare is reviewed with particular reference to the world wars, and various types os smokes are discussed. The smokes that can defeat modern opto-electronics including infrared (IR/millimetre wave (MMW guidance and thermal imager are described. Environment-friendly non-toxic smokes are dealt with briefly. The future of smokes in these circumstances is mentioned.

  8. Electronic warfare target location methods

    CERN Document Server

    Poisel, Richard

    2012-01-01

    Describing the mathematical development underlying current and classical methods of geolocating electronic systems that are emitting, this newly revised and greatly expanded edition of a classic Artech House book offers practical guidance in electronic warfare target location. The Second Edition features a wealth of additional material including new chapters on time delay estimation, direction finding techniques, and the MUSIC algorithm. This practical resource provides you with critical design information on geolocation algorithms, and establishes the fundamentals of existing algorithms as a

  9. MEANS AND METHODS OF CYBER WARFARE

    Directory of Open Access Journals (Sweden)

    Dan-Iulian VOITAȘEC

    2016-06-01

    Full Text Available According to the Declaration of Saint Petersburg of 1868 “the only legitimate object which States should endeavor to accomplish during war is to weaken the military forces of the enemy”. Thus, International Humanitarian Law prohibits or limits the use of certain means and methods of warfare. The rapid development of technology has led to the emergence of a new dimension of warfare. The cyber aspect of armed conflict has led to the development of new means and methods of warfare. The purpose of this paper is to study how the norms of international humanitarian law apply to the means and methods of cyber warfare.

  10. Cyber warfare building the scientific foundation

    CERN Document Server

    Jajodia, Sushil; Subrahmanian, VS; Swarup, Vipin; Wang, Cliff

    2015-01-01

    This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially gove

  11. Analytic tools for information warfare

    Energy Technology Data Exchange (ETDEWEB)

    Vandewart, R.L.; Craft, R.L.

    1996-05-01

    Information warfare and system surety (tradeoffs between system functionality, security, safety, reliability, cost, usability) have many mechanisms in common. Sandia`s experience has shown that an information system must be assessed from a {ital system} perspective in order to adequately identify and mitigate the risks present in the system. While some tools are available to help in this work, the process is largely manual. An integrated, extensible set of assessment tools would help the surety analyst. This paper describes one approach to surety assessment used at Sandia, identifies the difficulties in this process, and proposes a set of features desirable in an automated environment to support this process.

  12. Undersea Warfare Academic Group Home Page

    OpenAIRE

    1997-01-01

    Collected from the Internet Archive "Wayback machine". The Undersea Warfare Curriculum educates officers in the engineering fundamentals, physical principles and analytical concepts that govern operational employment of undersea warfare (USW) sensors and weapons systems. Program is interdisciplinary and integrates; mathematics, physics, acoustics, electrical engineering, oceanography, operations analysis, human factors, computer science and meteorology.

  13. Information warfare technologies in political discourse

    Directory of Open Access Journals (Sweden)

    Karpova Anna Yu.

    2016-01-01

    Full Text Available We attempt to examine the technology of «information warfare» in this paper. The dominant theme of the paper is that the outcome of the information warfare is important not only for the future of a state itself but for the future of the world balance of forces. The main task of geopolitical actors in information warfare is to introduce ideas corresponding to their interests into mass consciousness. All participants of political conflicts have common features in technologies of Information warfare. The information anomie is the indicator of the great geopolitical actors’ personified interests on the stage of «information warfare» - the process resulted in destroying the communicative line: report-information understanding and disrupting the social order in society. In this paper authors describe the following Information Warfare technologies: "Political volcano" technology; "SPIN" technology; "Widening media resource" technology; "specific gravity" technology; "Cold War 2.0" technology and Information cleaningup technology. It is assumed that in the future there will be new instructions on applying technologies of information warfare. To impart perspective to the paper we consider examples, opinions and trends.

  14. Grid architecture model of network centric warfare

    Institute of Scientific and Technical Information of China (English)

    Yan Tihua; Wang Baoshu

    2006-01-01

    NCW(network centric warfare) is an information warfare concentrating on network. A global network-centric warfare architecture with OGSA grid technology is put forward, which is a four levels system including the user level, the application level, the grid middleware layer and the resource level. In grid middleware layer, based on virtual hosting environment, a BEPL4WS grid service composition method is introduced. In addition, the NCW grid service model is built with the help of Eclipse-SDK-3.0.1 and Bpws4j.

  15. Research on Passive Underwater Location Tracking Precision of Anti-Submarine Torpedo%反潜鱼雷靶试水下被动跟踪定位精度

    Institute of Scientific and Technical Information of China (English)

    王永生; 吴鹏鹏; 高峰; 王建国

    2013-01-01

    It is very important to track and reconstruct the underwater movement for evaluating the tor⁃pedo’s status and performance. The precision of tracking location on one import anti-submarine torpe⁃do using passive sonobuoy in the test environment was studied in this paper. Based on the require⁃ment on the sonobuoy array when testing, the torpedo position was worked out through the improved algebraic equation. The precision of tracking location on the underwater torpedo was studied by the mass Monte Carlo random emulations, which would give the instructive advice for the real torpedo test.%  跟踪重构鱼雷水下运动轨迹,对准确评估鱼雷状况及性能至关重要。文章研究了靶试环境下通过被动声纳浮标阵列跟踪某反潜鱼雷的定位精度。根据靶试对被动声纳浮标阵列要求,采用改进的代数方程方法定位鱼雷目标,通过蒙特卡洛仿真,研究对水下鱼雷的跟踪定位精度,为开展鱼雷靶试工作提供指导。

  16. Chemical warfare, past and future. Study project

    Energy Technology Data Exchange (ETDEWEB)

    Tzihor, A.

    1992-05-15

    World War I was arena for the first use of chemical warfare. The enormous tactical success brought about by this first time use of chemical weapons caused the continued development of more sophisticated tactics and weapons in this category of unconventional warfare. This phenomenon has carried through to today. However, at present, because of technological developments, the global economic situation, and political factors, coupled with the inability of the western world to control the proliferation of chemical weapons, a situation weapon of mass destruction. Recent use by Iraq against Kurdish civilian indicates that chemical warfare is no longer limited to the battlefield. The western nations have a need to understand the risk. This paper conducts an analysis of past lessons and the factors which will affect the use of chemical warfare in the future. From this analysis, the paper reaches conclusions concerning the significant threat chemical weapons pose for the entire world in the not too distant future.

  17. 航空兵干扰声纳浮标与反潜飞机通信的方法与效能研究%Research on Method and Efficiency of Electronic Jamming on Communication Between Sonobuoy and Anti-submarine Aircraft

    Institute of Scientific and Technical Information of China (English)

    蔡云祥; 蒿兴华; 马宏岩; 王晶

    2012-01-01

    In order to improve the submarine's capability to avoid searching of sonobuoys, the requirement which uses the measure of suppression by aviation to interfere with the communication between sonobuoys and anti-submarine aircraft is put forward. Based on the analytical conclusion of Effectively Suppress Area, it studies the force assignment, sets up effectiveness evaluation model of electronic jamming, and gets out the conclusions such as keeping appropriate distance among electronic jamming aircraft, sonobuoys and anti-submarine aircraft and so on which can enhance the interference effect. The conclusions show that electronic jamming aircraft, sonobuoys and anti-submarine aircraft should be kept in a line to interfere communication effectively. Meanwhile, electronic jamming aircraft should be synchronized with the movement of anti-submarine aircraft. In the same Signal to Noise ratio, the shorter is the distance between electronic jamming aircraft and anti-submarine aircraft, the better is the effect. At the same distance, the bigger is the Signal to Noise ratio, the better is the effect. The conclusion theoretically supports electronic jamming aircraft to aid the submarine to get rid of searching and tracking of sonobuoys from the aircraft in the interference method.%为了提高潜艇规避声纳浮标搜索的能力,提出了航空兵以压制方式干扰声纳浮标与载机之间通信的思路与需求,基于有效压制区分析结论研究了干扰兵力的配置问题,建立了干扰效能评估模型,得到了干扰机与反潜飞机、声纳浮标应当保持的位置关系等增强干扰效果的结论.结论表明,为增强干扰效果,干扰机应与反潜飞机、声纳浮标保持在一条直线上,并与反潜飞机保持同步运动状态;在同一干通比下,干扰机与声纳浮标间的距离越小越好;在同一距离下,干通比越大越好.该结论可为航空兵以压制干扰方式支援潜艇摆脱反潜航空兵声纳浮标搜索与跟踪提供理论支撑.

  18. Retention of junior Naval Special Warfare officers

    OpenAIRE

    Davids, Keith B.

    1998-01-01

    The Commander of the Naval Special Warfare Command (NSWC) has identified junior officer retention within the Naval Special Warfare community as a significant problem. In 1997, the community experienced the highest number of resignations on record, and this trend has continued in 1998. NSWC has taken several steps to identify the cause of recent retention trends, one of which was to provide support for this study. The purpose of this study was to identify the factors that lead to resignation o...

  19. Biological warfare, bioterrorism, and biocrime.

    Science.gov (United States)

    Jansen, H J; Breeveld, F J; Stijnis, C; Grobusch, M P

    2014-06-01

    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria or other agents used to cause illness or death in people, but also in animals or plants. It is aimed at creating casualties, terror, societal disruption, or economic loss, inspired by ideological, religious or political beliefs. The success of bioterroristic attempts is defined by the measure of societal disruption and panic, and not necessarily by the sheer number of casualties. Thus, making only a few individuals ill by the use of crude methods may be sufficient, as long as it creates the impact that is aimed for. The assessment of bioterrorism threats and motives have been described before. Biocrime implies the use of a biological agent to kill or make ill a single individual or small group of individuals, motivated by revenge or the desire for monetary gain by extortion, rather than by political, ideological, religious or other beliefs. The likelihood of a successful bioterrorist attack is not very large, given the technical difficulties and constraints. However, even if the number of casualties is likely to be limited, the impact of a bioterrorist attack can still be high. Measures aimed at enhancing diagnostic and therapeutic capabilities and capacities alongside training and education will improve the ability of society to combat 'regular' infectious diseases outbreaks, as well as mitigating the effects of bioterrorist attacks.

  20. Biological warfare, bioterrorism, and biocrime.

    Science.gov (United States)

    Jansen, H J; Breeveld, F J; Stijnis, C; Grobusch, M P

    2014-06-01

    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria or other agents used to cause illness or death in people, but also in animals or plants. It is aimed at creating casualties, terror, societal disruption, or economic loss, inspired by ideological, religious or political beliefs. The success of bioterroristic attempts is defined by the measure of societal disruption and panic, and not necessarily by the sheer number of casualties. Thus, making only a few individuals ill by the use of crude methods may be sufficient, as long as it creates the impact that is aimed for. The assessment of bioterrorism threats and motives have been described before. Biocrime implies the use of a biological agent to kill or make ill a single individual or small group of individuals, motivated by revenge or the desire for monetary gain by extortion, rather than by political, ideological, religious or other beliefs. The likelihood of a successful bioterrorist attack is not very large, given the technical difficulties and constraints. However, even if the number of casualties is likely to be limited, the impact of a bioterrorist attack can still be high. Measures aimed at enhancing diagnostic and therapeutic capabilities and capacities alongside training and education will improve the ability of society to combat 'regular' infectious diseases outbreaks, as well as mitigating the effects of bioterrorist attacks. PMID:24890710

  1. Hybrid Warfare Studies and Russia’s Example in Crimea

    OpenAIRE

    Erol, Mehmet Seyfettin; Şafak OĞUZ

    2015-01-01

    Although Hybrid Warfare is an old concept, theoretical studies in the western countries mainly began in the post-Col War era, focusing on asymmetrical threats against conventional superiority of western countries such as USA or Israel. September 11th attacks and 2006 Israel-Lebanon war played important roles for the evolution of hybrid warfare theories. However, there has not any consensus among scholars on a exact or unique definition of hybrid warfare. Hybrid warfare became one of the main ...

  2. Intelligence, Information Technology, and Information Warfare.

    Science.gov (United States)

    Davies, Philip H. J.

    2002-01-01

    Addresses the use of information technology for intelligence and information warfare in the context of national security and reviews the status of clandestine collection. Discusses hacking, human agent collection, signal interception, covert action, counterintelligence and security, and communications between intelligence producers and consumers…

  3. Agricultural Warfare and Bioterrorism using Invasive Species

    Science.gov (United States)

    The chapter on Agricultural Warfare and Bioterrorism using Invasive Species is part of the book titled Pest Management and Phytosanitary Trade Barriers authored by Neil Heather (Australia) and Guy Hallman. The chapter attempts to briefly put the topic into context with phytosanitation. It presents...

  4. Guiding Warfare to Reach Sustainable Peace

    DEFF Research Database (Denmark)

    Vestenskov, David; Drewes, Line

    The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition of develo...

  5. Computational models of intergroup competition and warfare.

    Energy Technology Data Exchange (ETDEWEB)

    Letendre, Kenneth (University of New Mexico); Abbott, Robert G.

    2011-11-01

    This document reports on the research of Kenneth Letendre, the recipient of a Sandia Graduate Research Fellowship at the University of New Mexico. Warfare is an extreme form of intergroup competition in which individuals make extreme sacrifices for the benefit of their nation or other group to which they belong. Among animals, limited, non-lethal competition is the norm. It is not fully understood what factors lead to warfare. We studied the global variation in the frequency of civil conflict among countries of the world, and its positive association with variation in the intensity of infectious disease. We demonstrated that the burden of human infectious disease importantly predicts the frequency of civil conflict and tested a causal model for this association based on the parasite-stress theory of sociality. We also investigated the organization of social foraging by colonies of harvester ants in the genus Pogonomyrmex, using both field studies and computer models.

  6. Handbook of toxicology of chemical warfare agents

    CERN Document Server

    2010-01-01

    This groundbreaking book covers every aspect of deadly toxic chemicals used as weapons of mass destruction and employed in conflicts, warfare and terrorism. Including findings from experimental as well as clinical studies, this one-of-a-kind handbook is prepared in a very user- friendly format that can easily be followed by students, teachers and researchers, as well as lay people. Stand-alone chapters on individual chemicals and major topics allow the reader to easily access required information without searching through the entire book. This is the first book that offers in-depth coverage of individual toxicants, target organ toxicity, major incidents, toxic effects in humans, animals and wildlife, biosensors, biomarkers, on-site and laboratory analytical methods, decontamination and detoxification procedures, prophylactic, therapeutic and countermeasures, and the role of homeland security. Presents a comprehensive look at all aspects of chemical warfare toxicology in one reference work. This saves research...

  7. Animal plant warfare and secondary metabolite evolution

    OpenAIRE

    Wöll, Steffen; Kim, Sun Hee; Greten, Henry Johannes; Efferth, Thomas

    2013-01-01

    Abstract The long-lasting discussion, why plants produce secondary metabolites, which are pharmacologically and toxicologically active towards mammals traces back to the eminent role of medicinal plants in the millennia-old history of manhood. In recent years, the concept of an animal plant warfare emerged, which focused on the co-evolution between plants and herbivores. As a reaction to herbivory, plants developed mechanical defenses such as thorns and hard shells, which paved the way for ad...

  8. Axial Vircator for Electronic Warfare Applications

    OpenAIRE

    L. Drazan; R. Vrana

    2009-01-01

    This paper deals with a high power microwave generator with virtual cathode – vircator in axial release for electronic warfare applications. The classification of directed energy weapons microwave (DEWM) is introduced together with basic block diagrams of a particular class of DEWM. In the paper, methods for designing vircator pulsed power supply, axial vircator structure, measurement methods and experimental results are presented. The vircator in electromagnetic ammunition is powered b...

  9. OFFICER AND COMMANDER IN ASYMMETRIC WARFARE OPERATIONS

    OpenAIRE

    Giuseppe CAFORIO

    2013-01-01

    Starting from the data of a field research conducted among soldiers with asymmetric warfare experiences from nine different countries, the author seeks to identify and shed light on the various problems that officers with command responsibilities had to face during their missions. A picture emerges of feelings and experiences relating to their first impression upon arriving in the theatre, relations with local armed forces, relations with the local population and local authorities, relations ...

  10. Hybrid Warfare Studies and Russia’s Example in Crimea

    OpenAIRE

    Erol, Mehmet Seyfettin; Şafak OĞUZ

    2015-01-01

    Although Hybrid Warfare is an old concept, theoretical studies in the western countries mainly began in the post-Col War era, focusing on asymmetrical threats against conventional superiority of western countries such as USA or Israel. September 11th attacks and 2006 Israel-Lebanon war played important roles for the evolution of hybrid warfare theories. However, there has not any consensus among scholars on a exact or unique definition of hybrid warfare. Hybrid warfare became one of the main ...

  11. OFFICER AND COMMANDER IN ASYMMETRIC WARFARE OPERATIONS

    Directory of Open Access Journals (Sweden)

    Giuseppe CAFORIO

    2013-01-01

    Full Text Available Starting from the data of a field research conducted among soldiers with asymmetric warfare experiences from nine different countries, the author seeks to identify and shed light on the various problems that officers with command responsibilities had to face during their missions. A picture emerges of feelings and experiences relating to their first impression upon arriving in the theatre, relations with local armed forces, relations with the local population and local authorities, relations with NGOs, relations with other armies, the impact of the rules of engagement (ROEs, training and education, and operational experiences. The paper ends with a discussion of the lessons learned.

  12. Microwave receivers with electronic warfare applications

    CERN Document Server

    Tsui, James

    2005-01-01

    This book by the author of Digital Techniques for Wideband Receivers willbe like no other one on your book shelf as the definitive word on electronicwarfare (EW) receiver design and performance. Whether you are an EWscientist involved in the test and evaluation of EW receivers or a designerof RWR's and other EW-related receivers, Microwave Receivers withElectronic Warfare Applications is a handy reference through which you canperfect your technical art. Lucidly written, this book is a treatise on EWreceivers that is relevant to you if you are just looking for a top-levelinsight into EW receive

  13. Axial Vircator for Electronic Warfare Applications

    Directory of Open Access Journals (Sweden)

    L. Drazan

    2009-12-01

    Full Text Available This paper deals with a high power microwave generator with virtual cathode – vircator in axial release for electronic warfare applications. The classification of directed energy weapons microwave (DEWM is introduced together with basic block diagrams of a particular class of DEWM. In the paper, methods for designing vircator pulsed power supply, axial vircator structure, measurement methods and experimental results are presented. The vircator in electromagnetic ammunition is powered by magneto-cumulative generator and in weapons for defense of objects (WDO, it is powered by Marx generator. The possible applications of a vircator in the DEWM area are discussed.

  14. Electronic warfare receivers and receiving systems

    CERN Document Server

    Poisel, Richard A

    2014-01-01

    Receivers systems are considered the core of electronic warfare (EW) intercept systems. Without them, the fundamental purpose of such systems is null and void. This book considers the major elements that make up receiver systems and the receivers that go in them.This resource provides system design engineers with techniques for design and development of EW receivers for modern modulations (spread spectrum) in addition to receivers for older, common modulation formats. Each major module in these receivers is considered in detail. Design information is included as well as performance tradeoffs o

  15. Chemical profiling of chemical warfare agents for forensic purposes

    NARCIS (Netherlands)

    Noort, D.; Reuver, L.P.J. de; Fidder, A.; Tromp, M.; Verschraagen, M.

    2010-01-01

    A program has been initiated towards the chemical profiling of chemical warfare agents, in order to support forensic investigations towards synthesis routes, production sites and suspect chemical suppliers. Within the first stage of the project various chemical warfare agents (VX, sulfur mustard, sa

  16. Hybrid Warfare Studies and Russia’s Example in Crimea

    Directory of Open Access Journals (Sweden)

    Mehmet Seyfettin EROL

    2015-12-01

    Full Text Available Although Hybrid Warfare is an old concept, theoretical studies in the western countries mainly began in the post-Col War era, focusing on asymmetrical threats against conventional superiority of western countries such as USA or Israel. September 11th attacks and 2006 Israel-Lebanon war played important roles for the evolution of hybrid warfare theories. However, there has not any consensus among scholars on a exact or unique definition of hybrid warfare. Hybrid warfare became one of the main security issues for the West and especially for NATO after the Russia-Ukraine crisis. Russian military strategies, called “hybrid warfare” by the western countries, resulted in the successful annexation of Crimea and, caused a serious security problem for the West resulting important structural and functional changes for the military system of NATO. Russian activities, which have been based on surprise, ambiguity and deniability, presented a unique example for hybrid warfare studies.

  17. History of chemical and biological warfare agents.

    Science.gov (United States)

    Szinicz, L

    2005-10-30

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents. PMID:16111798

  18. Decontamination of Chemical Warfare Agents (Review Article

    Directory of Open Access Journals (Sweden)

    Beer Singh

    2010-07-01

    Full Text Available Chemical warfare agents (CWA pose inevitable threat, both to soldiers and civilians. Risk on contact with these deadly agents can be avoided by neutralisation of their toxic effects. A suitable media with essential physico-chemical properties is required for this purpose. Considerable efforts have been made to develop several decontamination media suitable for neutralisation of highly toxic CWAs. This paper reviews history and details of recent technological advancements in the development of versatile, broad spectrum decontamination formulations against CWAs, as also nanosized metal oxides as CWA decontaminants.Defence Science Journal, 2010, 60(4, pp.428-441, DOI:http://dx.doi.org/10.14429/dsj.60.487

  19. What Lies behind Chinese Cyber Warfare

    Directory of Open Access Journals (Sweden)

    Gabi Siboni

    2012-09-01

    Full Text Available Over the past several years China has been developing operational capabilities in the field of cyberspace warfare. A cyber attack may be defined as the unauthorized penetration of computer and communications systems belonging to individuals or organizations for the purpose of espionage and information theft, in order thereby to damage or disrupt the functioning of these systems or to damage other systems dependent on them, even to a point of causing actual physical damage. Despite denials by the Chinese government, researchers posit that China is behind a string of cyber attacks against the United States, Japan, France, Australia, and other Western nations. This essay argues that an analysis of the publicly available information about the more recent attacks makes it possible to establish that China does in fact stand behind these attacks and also makes it possible to identify the link between China’s cyberspace warfare strategy and its choice of targets. The analysis includes an examination of the companies attacked to identify possible motives for the attacks. The motives for these attacks are presumably to steal capabilities and conduct industrial espionage against nations and commercial competitors. Attacking companies and organizations in the financial and even political sectors allows access to valuable intelligence in these fields. By contrast, the intelligence value for immediate use in attacking companies providing critical infrastructures and communications services is usually relatively low. Rather, gaining access, if only to some providers of communications and internet services in the West and the United States, is liable to give attackers the ability to damage these services.

  20. Anthropology, Culture, and COIN in a Hybrid Warfare World

    OpenAIRE

    Simons, Anna

    2011-01-01

    in Paul Brister, William Natter, and Robert Tomes (eds.), Hybrid Warfare and Transnational Threats: Perspectives for an Era of Persistent Conflict. New York: Council for Emerging National Security Studies, 2011.

  1. Active and Passive Precautions in Air and Missile Warfare

    OpenAIRE

    Sassoli, Marco; Quintin, Anne

    2014-01-01

    Based upon state practice, customary international law, Protocol Additional I to the Geneva Conventions and the Harvard Manual on Air and Missile Warfare (which they critically review), the authors discuss the different precautionary measures for the benefit of the civilian population an attacker and a defender must take, in the conduct of hostilities in general, and specifically in air and missile warfare, including in attacks against aircraft.

  2. Conceptual Lanchester-type Decapitation Warfare Modelling

    Directory of Open Access Journals (Sweden)

    Jau-yeu Menq

    2007-07-01

    Full Text Available Decapitation operation has existed for a long time in military history; however, it was notuntil March 2003 'decapitation attack' became a well known term in the mass media. This paperis based on the connotation of decapitation based on historical study and refines the term intomilitary strategic concept of decapitation strategy. Ideas derived from detailed studies onLanchester-type combat models are used to describe the effectiveness of conventional regularforces under decapitation warfare, which includes asymmetric, nonlinear, stand-off and specialoperation forces (SOF operations. A conceptual model is presented to describe the effects ofthe decapitation strategy on the regular battlefield. With extensive coverage of operational factorssuch as robustness of forces, time difference between combats, undermining effects, breakpoints,attrition rates, total force level and force allocation, the model is suitable to analyse complexscenario with different types of military operations consisting of decapitation strategy. Anillustrative example is provided to demonstrate the application of the model. The conceptualmodel is built based on hypotheses, assumptions, and criteria. In the absence of historical data,no data analysis and parameter estimation are involved.

  3. History of biological warfare and bioterrorism.

    Science.gov (United States)

    Barras, V; Greub, G

    2014-06-01

    Bioterrorism literally means using microorganisms or infected samples to cause terror and panic in populations. Bioterrorism had already started 14 centuries before Christ, when the Hittites sent infected rams to their enemies. However, apart from some rare well-documented events, it is often very difficult for historians and microbiologists to differentiate natural epidemics from alleged biological attacks, because: (i) little information is available for times before the advent of modern microbiology; (ii) truth may be manipulated for political reasons, especially for a hot topic such as a biological attack; and (iii) the passage of time may also have distorted the reality of the past. Nevertheless, we have tried to provide to clinical microbiologists an overview of some likely biological warfare that occurred before the 18th century and that included the intentional spread of epidemic diseases such as tularaemia, plague, malaria, smallpox, yellow fever, and leprosy. We also summarize the main events that occurred during the modern microbiology era, from World War I to the recent 'anthrax letters' that followed the World Trade Center attack of September 2001. Again, the political polemic surrounding the use of infectious agents as a weapon may distort the truth. This is nicely exemplified by the Sverdlovsk accident, which was initially attributed by the authorities to a natural foodborne outbreak, and was officially recognized as having a military cause only 13 years later. PMID:24894605

  4. History of biological warfare and bioterrorism.

    Science.gov (United States)

    Barras, V; Greub, G

    2014-06-01

    Bioterrorism literally means using microorganisms or infected samples to cause terror and panic in populations. Bioterrorism had already started 14 centuries before Christ, when the Hittites sent infected rams to their enemies. However, apart from some rare well-documented events, it is often very difficult for historians and microbiologists to differentiate natural epidemics from alleged biological attacks, because: (i) little information is available for times before the advent of modern microbiology; (ii) truth may be manipulated for political reasons, especially for a hot topic such as a biological attack; and (iii) the passage of time may also have distorted the reality of the past. Nevertheless, we have tried to provide to clinical microbiologists an overview of some likely biological warfare that occurred before the 18th century and that included the intentional spread of epidemic diseases such as tularaemia, plague, malaria, smallpox, yellow fever, and leprosy. We also summarize the main events that occurred during the modern microbiology era, from World War I to the recent 'anthrax letters' that followed the World Trade Center attack of September 2001. Again, the political polemic surrounding the use of infectious agents as a weapon may distort the truth. This is nicely exemplified by the Sverdlovsk accident, which was initially attributed by the authorities to a natural foodborne outbreak, and was officially recognized as having a military cause only 13 years later.

  5. Numerical simulation of RCS for carrier electronic warfare airplanes

    Directory of Open Access Journals (Sweden)

    Yue Kuizhi

    2015-04-01

    Full Text Available This paper studies the radar cross section (RCS of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carrier electronic warfare airplanes Model A and Model B with weapons were established. Based on the physical optics method and the equivalent electromagnetic flow method, by the use of the RCSAnsys software, the characteristics of carrier electronic warfare airplanes’ RCS under steady and dynamic flights were simulated under the UHF, X, and S radar bands. This paper researches the detection probability of aircraft by radars under the condition of electronic warfare, and completes the mathematical statistical analysis of the simulation results. The results show that: The Model A of carrier electronic warfare airplane is better than Model B on stealth performance and on discover probability by radar detection effectively.

  6. Nondestructive inspection of chemical warfare based on API-TOF

    International Nuclear Information System (INIS)

    Background: Real-time, fast, accurate, nondestructive inspection (NDI) and quantitative analysis for chemical warfare are very imperative for chemical defense, anti-terror and nation security. Purpose: Associated Particles Technique (APT)/Neutron Time of Flight (TOF) has been developed for non-invasive inspection of sealed containers with chemical warfare agents. Methods: A prototype equipment for chemical warfare is consisted of an APT neutron generator with a 3×3 matrix of semiconductor detectors of associated alpha-particles, the shielding protection of neutron and gamma-ray, arrayed NaI(Tl)-based detectors of gamma-rays, fully-digital data acquisition electronics, data analysis, decision-making software, support platform and remote control system. Inelastic scattering gamma-ray pulse height spectra of sarin, VX, mustard gas and adamsite induced by 14-MeV neutron are measured. The energies of these gamma rays are used to identify the inelastic scattering elements, and the intensities of the peaks at these energies are used to reveal their concentrations. Results: The characteristic peaks of inelastic scattering gamma-ray pulse height spectra show that the prototype equipment can fast and accurately inspect chemical warfare. Conclusion: The equipment can be used to detect not only chemical warfare agents but also other hazardous materials, such as chemical/toxic/drug materials, if their chemical composition is in any way different from that of the surrounding materials. (authors)

  7. Sweeping changes for mine warfare : controlling the mine threat

    OpenAIRE

    Cashman, T. Michael

    1994-01-01

    This thesis proposes that the U.S. Navy deter and, if necessary, combat potential minelayers by pursuing a pro-active' offensive mine warfare strategy. Central to this proposed strategy is the development, acquisition, and use of Remote Controlled (RECO) mines. It is argued that, given the historical problems the United States has had in the area of naval mine warfare, a strategy aimed at the aggressive deterrence of enemy mine laying be embraced so as to project forces ashore in future amphi...

  8. Integrated Assessment Systems for Chemical Warfare Material

    Energy Technology Data Exchange (ETDEWEB)

    A. M. Snyder; D. A. Verrill; G. L. Thinnes; K. D. Watts; R. J. McMorland

    1999-05-27

    The US Army must respond to a variety of situations involving suspect discovered, recovered, stored, and buried chemical warfare materiel (CWM). In some cases, the identity of the fill materiel and the status of the fusing and firing train cannot be visually determined due to aging of the container, or because the item is contained in an over-pack. In these cases, non-intrusive assessments are required to provide information to allow safe handling, storage, and disposal of the materiel. This paper will provide an overview of the integrated mobile and facility-based CWM assessment system prototypes that have been, and are being developed, at the Idaho National Engineering and Environmental Laboratory (INEEL) for the US Army Non-Stockpile Chemical Materiel Project. In addition, this paper will discuss advanced sensors being developed to enhance the capability of the existing and future assessment systems. The Phase I Mobile Munitions Assessment System (MMAS) is currently being used by the Army's Technical Escort Unit (TEU) at Dugway Proving Ground, Utah. This system includes equipment for non-intrusively identifying the munitions fill materiel and for assessing the condition and stability of the fuzes, firing trains, and other potential safety hazards. The system provides a self-contained, integrated command post including an on-board computer system, communications equipment, video and photographic equipment, weather monitoring equipment, and miscellaneous safety-related equipment. The Phase II MMAS is currently being tested and qualified for use by the INEEL and the US Army. The Phase II system contains several new assessment systems that significantly enhance the ability to assess CWM. A facility-based munitions assessment system prototype is being developed for the assessment of CWM stored in igloos at Pine Bluff Arsenal, Arkansas. This system is currently in the design and fabrication stages. Numerous CWM advanced sensors are being developed and tested, and

  9. Environmental assessments of sea dumped chemical warfare agents

    DEFF Research Database (Denmark)

    Sanderson, Hans; Fauser, Patrik

    This is a report on the information gathered during work related to sea dumped chemical warfare agents. It mainly reviews the work conducted in relation to the installation of the two Nord Stream gas pipeline from 2008-2012. The focus was on the weight-of-evidence risk assessment of disturbed CWA...

  10. Public Discussion of Nuclear Warfare: A Time for Hope.

    Science.gov (United States)

    Cooper, Martha

    Anti-nuclear discourse, which peaked in 1981-82, signaled an emergence of public discourse on the nuclear warfare issue. During the development of the original atomic bomb, public discussion of the issue was severely restricted, but immediately after the bombing of Hiroshima and Nagasaki, discourse on the subject increased. During the Cold War…

  11. Simulating cyber warfare and cyber defenses: information value considerations

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber

  12. Cutaneous reactions in nuclear, biological and chemical warfare

    Directory of Open Access Journals (Sweden)

    Arora Sandeep

    2005-03-01

    Full Text Available Nuclear, biological and chemical warfare have in recent times been responsible for an increasing number of otherwise rare dermatoses. Many nations are now maintaining overt and clandestine stockpiles of such arsenal. With increasing terrorist threats, these agents of mass destruction pose a risk to the civilian population. Nuclear and chemical attacks manifest immediately while biological attacks manifest later. Chemical and biological attacks pose a significant risk to the attending medical personnel. The large scale of anticipated casualties in the event of such an occurrence would need the expertise of all physicians, including dermatologists, both military and civilian. Dermatologists are uniquely qualified in this respect. This article aims at presenting a review of the cutaneous manifestations in nuclear, chemical and biological warfare and their management.

  13. Stuxnet and Cyber-Warfare (1/2)

    CERN Document Server

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic. Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction.   NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  14. Stuxnet and Cyber-Warfare (2/2)

    CERN Document Server

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic.   Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction. The lecturer invites comments via email to Gian.Piero.Siroli@cern.ch NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  15. Annihilation Prediction for Lanchester-Type Models of Modern Warfare

    OpenAIRE

    Brown, G G; Taylor, J.

    1983-01-01

    Operations Research, 31, p.752. This paper introduces important new functions for analytic solution of Launch-ester-type equations of modern warfare for combat between two homogeneous forces modeled by power attrtition-rate coefficients with "no offset". Tabulations of these Lanchester-Clifford-Schlatii (or LCS) functions allow one to study this particular variable-coefficient model almost as easily and thoroughly as Lanchester's classic constant-coefficient one. LCS functions allow one ...

  16. Punishment sustains large-scale cooperation in prestate warfare

    OpenAIRE

    Mathew, Sarah; Boyd, Robert

    2011-01-01

    Understanding cooperation and punishment in small-scale societies is crucial for explaining the origins of human cooperation. We studied warfare among the Turkana, a politically uncentralized, egalitarian, nomadic pastoral society in East Africa. Based on a representative sample of 88 recent raids, we show that the Turkana sustain costly cooperation in combat at a remarkably large scale, at least in part, through punishment of free-riders. Raiding parties comprised several hundred warriors an...

  17. Factors affecting the retention decisions of female surface warfare officers

    OpenAIRE

    Clifton, Elizabeth A.

    2003-01-01

    This thesis delineates factors affecting the retention decisions of female Surface Warfare Officers. The data were obtained from in-depth interviews conducted with 12 female senior officers and 15 female junior officers. The transcripts from the interviews revealed 19 general themes. Based on the research, the data regarding the decisions that female officers make to either stay in the Navy or leave leads to four broad categories: economic factors, Navy taste factors., leadership factor...

  18. Biological warfare agents as threats to potable water.

    OpenAIRE

    Burrows, W D; Renner, S E

    1999-01-01

    Nearly all known biological warfare agents are intended for aerosol application. Although less effective as potable water threats, many are potentially capable of inflicting heavy casualties when ingested. Significant loss of mission capability can be anticipated even when complete recovery is possible. Properly maintained field army water purification equipment can counter this threat, but personnel responsible for the operation and maintenance of the equipment may be most at risk of exposur...

  19. Simulation innovation in Naval Special Warfare by utilizing small working groups

    OpenAIRE

    Rainville, Thomas A.

    2001-01-01

    Naval Special Warfare has produced successful innovation by using small working groups. Naval Special Warfare deems an innovation successful if it results in a more efficient, less risky, more cost effective method to conduct special operations. The Quantum Leap program is an example of successful innovation in Naval Special Warfare produced by a small working group. How have these small groups been able to produce successful innovations? Michael McCaskey's Theory offers an explanation of how...

  20. Chemical and biological warfare: General studies. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-10-01

    The bibliography contains citations concerning federally sponsored and conducted studies into chemical and biological warfare operations and planning. These studies cover areas not addressed in other parts of this series. The topics include production and storage of agents, delivery techniques, training, military and civil defense, general planning studies, psychological reactions to chemical warfare, evaluations of materials exposed to chemical agents, and studies on banning or limiting chemical warfare. Other published searches in this series on chemical warfare cover detection and warning, defoliants, protection, and biological studies, including chemistry and toxicology. (Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  1. Chemical and biological warfare: General studies. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-11-01

    The bibliography contains citations concerning federally sponsored and conducted studies into chemical and biological warfare operations and planning. These studies cover areas not addressed in other parts of this series. The topics include production and storage of agents, delivery techniques, training, military and civil defense, general planning studies, psychological reactions to chemical warfare, evaluations of materials exposed to chemical agents, and studies on banning or limiting chemical warfare. Other published searches in this series on chemical warfare cover detection and warning, defoliants, protection, and biological studies, including chemistry and toxicology.(Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  2. Electronic Warfare Simulation-based on Service Oriented Architecture

    Directory of Open Access Journals (Sweden)

    J. Nanda Kishore

    2012-07-01

    Full Text Available The realisation of service oriented architecture (SOA is embodied in the accomplishments of various simulation applicable functions in the form of service encapsulation and the interconnection and interoperation of services. In this paper, an electronic warfare (EW simulation is structured to SOA and achieved the effect of dynamic sharing and reusability. As a proof of concept, a radar electronic support (ES simulator, which intercepts and classifies radar signals is designed and explained in this paper.Defence Science Journal, 2012, 62(4, pp.219-222, DOI:http://dx.doi.org/10.14429/dsj.62.929

  3. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  4. THE EVOLUTION OF MODERN LAND WARFARE; THEORY AND PRACTICE

    Directory of Open Access Journals (Sweden)

    C.J. Jacobs

    2012-02-01

    Full Text Available Christopher Bellamy is 'n senior navorser verbonde aan die Sentrum vir Verdedigingstudies, Universiteit van Edinburgh. Sy akademiese opleiding sluit 'n MA-graad in Oorlogstudies aan die King's College in Londen in. Afgesien hiervan was hy ook 'n beroepsoldaat wat sy militêre skoling in die Koninklike Militêre Akademie te Sandhurst deurloop het. Hy het ook in die Britse Artillerie gedien. Bellamy is die skrywer van Red God of War: Soviet Artillery and Rocket Forces en The Future of Land Warfare.

  5. SCIENTIFIC AND PRACTICAL ASPECTS OF WATER BASIN CLEANING FROM CHEMICAL WARFARE AGENTS

    OpenAIRE

    T. M. Tiavlovskaya; V. F. Tamelo

    2011-01-01

    The paper contains an analysis of reasons that explain pollution of World Ocean waters by chemical warfare agents and ecological dangers which can arise due to their emission. Possible methods for liquidation of chemical warfare agents and water basin cleaning from them have been considered in the paper.

  6. Status of dental health in chemical warfare victims: The case of Isfahan, Iran

    Directory of Open Access Journals (Sweden)

    Ahmad Mottaghi

    2012-01-01

    Conclusion: Chemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  7. Evanescent planar waveguide detection of biological warfare simulants

    Science.gov (United States)

    Sipe, David M.; Schoonmaker, Kenneth P.; Herron, James N.; Mostert, Michael J.

    2000-04-01

    An evanescent planar waveguide Mark 1.5 instrument was used to detect simulants of biological warfare agents; ovalbumin (OV), MS2 bacteriophage, BG, and Erwinia herbicola (EH). Polyclonal tracer antibodies were labeled with the fluorescent dye, Cy5. Discrete bands of polyclonal capture antibodies were immobilized to a polystyrene planar waveguide with molded integral lenses. An ST-6 CCD camera was used for detection. OV. MS2 and BG were detected in a simultaneous 3 by 3 array; with a total of nine measurements within 6 minutes. EH was analyzed in a separate array. Results were evaluate dat the US Army Joint Field Trials V, at the Dugway Proving Grounds. Over a 10 day period, 32 unknown samples were analyzed daily for each simulant. Detection limits: OV 10 ng/ml, MS2 107 pfu/ml, BG 105 cfu/ml. EH was detectable at 5 X 105 cfu/ml. Overall false positives were 3.0 percent. Therefore, the Mark 1.5 instrument, with a parallel array of detectors, evanescent flourescent excitation, and CCD imaging provides for rapid, sensitive, and specific detection of biological warfare agent simulants.

  8. China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence

    Directory of Open Access Journals (Sweden)

    Magnus Hjortdal

    2011-01-01

    Full Text Available This article presents three reasons for states to use cyber warfare and shows that cyberspace is—and will continue to be—a decisive element in China's strategy to ascend in the international system. The three reasons are: deterrence through infiltration of critical infrastructure; military technological espionage to gain military knowledge; and industrial espionage to gain economic advantage. China has a greater interest in using cyberspace offensively than other actors, such as the United States, since it has more to gain from spying on and deterring the United States than the other way around. The article also documents China's progress in cyber warfare and shows how it works as an extension of its traditional strategic thinking and the current debate within the country. Several examples of cyber attacks traceable to China are also presented. This includes cyber intrusions on a nuclear arms laboratory, attacks on defense ministries (including the Joint Strike Fighter and an airbase and the U.S. electric grid, as well as the current Google affair, which has proved to be a small part of a broader attack that also targeted the U.S. Government. There are, however, certain constraints that qualify the image of China as an aggressive actor in cyberspace. Some believe that China itself is the victim of just as many attacks from other states. Furthermore, certain actors in the United States and the West have an interest in overestimating China's capabilities in cyberspace in order to maintain their budgets.

  9. Punishment sustains large-scale cooperation in prestate warfare.

    Science.gov (United States)

    Mathew, Sarah; Boyd, Robert

    2011-07-12

    Understanding cooperation and punishment in small-scale societies is crucial for explaining the origins of human cooperation. We studied warfare among the Turkana, a politically uncentralized, egalitarian, nomadic pastoral society in East Africa. Based on a representative sample of 88 recent raids, we show that the Turkana sustain costly cooperation in combat at a remarkably large scale, at least in part, through punishment of free-riders. Raiding parties comprised several hundred warriors and participants are not kin or day-to-day interactants. Warriors incur substantial risk of death and produce collective benefits. Cowardice and desertions occur, and are punished by community-imposed sanctions, including collective corporal punishment and fines. Furthermore, Turkana norms governing warfare benefit the ethnolinguistic group, a population of a half-million people, at the expense of smaller social groupings. These results challenge current views that punishment is unimportant in small-scale societies and that human cooperation evolved in small groups of kin and familiar individuals. Instead, these results suggest that cooperation at the larger scale of ethnolinguistic units enforced by third-party sanctions could have a deep evolutionary history in the human species. PMID:21670285

  10. Respiratory Protection Against Chemical and Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    G.K. Prasad

    2008-09-01

    Full Text Available Chemical and biological warfare (CBW agents pose unavoidable threat, both to soldiers and civilians.Exposure to such deadly agents amidst the CBW agents contaminated environment can be avoided bytaking proper protective measures. Respiratory protection is indispensable when the soldiers or civiliansare surrounded by such deadly environment as contamination-free air is needed for respiration purposes.In this context, an attempt has been made to review the literature for the past five decades on developmentof various protective devices for respiratory protection against aerosols, gases, and vapours of CBWagents. This review covers structural, textural, and adsorption properties of materials used in gas filtersand mechanical filters for the removal of CBW agents.Defence Science Journal, 2008, 58(5, pp.686-697, DOI:http://dx.doi.org/10.14429/dsj.58.1692

  11. LIDAR for Detection of Chemical and Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    S Veerabuthiran

    2011-04-01

    Full Text Available Remote detection of chemical and biological warfare agents and toxic gases in the atmosphere is of current interest to both the military and civilian agencies. Out of all currently available techniques, no single technique provides efficient detection against such threats at significant standoff distances. Light detection and ranging (LIDAR technologies, based on the transmission of laser pulses and analysis of the return signals, have demonstrated impressive capabilities in remote detection of such toxic chemicals. LIDAR is a highly sensitive tool to detect the extremely low concentrations of various toxic agents present in the form of thin clouds at distances of few kilometer. The detection of these toxic clouds is based on the approach of first detecting and measuring the range of the clouds using the scattering phenomena and subsequently identifying the composition of toxic clouds using absorption and fluorescence phenomena. Laser Science and Technology Centre (LASTEC, Delhi has been working on the design and development of LIDAR systems for detection of chemical and biological warfare (CBW agents. In this paper, theoretical analysis of differential absorption LIDAR (DIAL for detection of chemical agents and fluorescence LIDAR for detection of biological agents has been discussed. For some typical parametric conditions, the received power levels from different ranges to detect specific concentrations of chemical or biological clouds have been computed and discussed. The technical details of the indigenously developed backscattering LIDAR, which detects and measures the distance of cloud layers up to 5 km is also presented.Defence Science Journal, 2011, 61(3, pp.241-250, DOI:http://dx.doi.org/10.14429/dsj.61.556

  12. Looming Threat of Chemical and Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    A.K. Goel

    2016-09-01

    Full Text Available In the recent past, a dramatic shift has been observed in the strategies of warfare from conventional to non-conventional. Now-a-days, traditional power is of less importance than it used to be earlier. Weapons of mass destruction, which comprise of nuclear weapons, and chemical and biological warfare agents, are posing a great peril to the world due to their devastating potential. Though, there are several bilateral as well as multilateral treaties to control the use and proliferation of these weapons, yet the risk of use of such agents by non-state actors cannot be overlooked. Chances of use of chemical and biological agents are more likely than the nuclear weapons. A comparison of nuclear, chemical and biological weapons in terms of technology, cost, signature, effectiveness on protected and un-protected troops shows that chemical and biological weapon programmes require much lower level of technology and cost than the nuclear weapon programme. Further, there is no or least distinctive and readily observable signature in biological weapon programme in comparison to nuclear and chemical weapon facilities. There can be two possibilities of use of these agents in terrorist attacks. First, there is a risk of transfer of material or know-how of these weapons to terrorists for using against the adversaries and second, the risk of these agents being pilfered due to poor security, thereby sabotaging the national security. The International Committee of Red Cross in February 1918 reckoned these agents as ‘barbarous inventions’ that can ‘only be called criminal’.

  13. Editorial: Discovery from Lake Turkana and History of Human Warfare

    Directory of Open Access Journals (Sweden)

    Professor S. P. Singh, Ph.D.

    2016-02-01

    Full Text Available Very interesting finds have come to light of violently killed humans from Lake Turkana in the Kenyan Rift Valley around 10000 years ago. A stunning discovery of skeletons of 27 persons who are believed to have been killed at the same time and are supposed to have suffered violent wounds has been reported recently (Nature 529, 394–398, 21 January 2016. These finds belong to a period of late Pleistocene/early Holocene of the hunter-gatherer societies from Nataruk. Among the victims were men, women and children. The individuals were killed with projectiles and blunt weapons. These skeletons were found in the lagoon and were preserved very nicely. Such type of mass killing probably could never happen as a consequence of intra-group conflict. The evidence seems to be towards warfare and aggression in ancient societies. The experts ruled out the possibility of a cemetery and ceremonial burial. This discovery of 27 skeletons points to the fact that there may have been more causalities and many individuals might have escaped death at that time. According to one of the co-authors of this research Dr. R.A. Foley, the groups were elatively more densely packed populations than the hunter gatherers and had more chances of having inter-group conflicts because of sharing the resources which would have been plentiful near the lagoons and water bodies. Violence probably has been in the instinct of early humans and that the warfare among humans has a history of 10000 years or even earlier.

  14. Using cheminformatics to find simulants for chemical warfare agents

    International Nuclear Information System (INIS)

    Highlights: → Summary of chemical warfare agent (CWA) simulants in current use. → Application of method of molecular similarity to CWA and simulants. → Quantitative metric for CWA-simulant similarity. → Rank ordering of simulants in current use. → Potential of method to identify simulants for emerging agents. - Abstract: Direct experimentation with chemical warfare agents (CWA) to study important problems such as their permeation across protective barrier materials, decontamination of equipment and facilities, or the environmental transport and fate of CWAs is not feasible because of the obvious toxicity of the CWAs and associated restrictions on their laboratory use. The common practice is to use 'simulants,' namely, analogous chemicals that closely resemble the CWAs but are less toxic, with the expectation that the results attained for simulants can be correlated to how the CWAs would perform. Simulants have been traditionally chosen by experts, by means of intuition, using similarity in one or more physical properties (such as vapor pressure or aqueous solubility) or in the molecular structural features (such as functional groups) between the stimulant and the CWA. This work is designed to automate the simulant identification process backed by quantitative metrics, by means of chemical similarity search software routinely used in pharmaceutical drug discovery. The question addressed here is: By the metrics of such software, how similar are traditional simulants to CWAs? That is, what is the numerical 'distance' between each CWA and its customary simulants in the quantitative space of molecular descriptors? The answers show promise for finding close but less toxic simulants for the ever-increasing numbers of CWAs objectively and fast.

  15. The Third World War? In The Cyberspace. Cyber Warfare in the Middle East.

    Directory of Open Access Journals (Sweden)

    Martina

    2014-06-01

    Full Text Available This article aims to provide a brief and comprehensive introduction to the issue of cyber warfare and to display the recent development in this area. Geographically, it focuses on the Middle East region, since the vast majority of the most important recent cyber attacks appeared just in there or were connected to it. The first part of the article tries to define the key notion of cyber warfare, compares it to the standard warfare and presents different types of cyber weapons that are known today. The second part points out examples of the most striking recent cyber attacks and uses them as evidences to demonstrate today's importance and dissemination of cyber warfare. Finally, the article sums up pros and cons of the cyber weapons and, in view of these, predicts a significant increase in their use in any future war conflicts.

  16. Optimizing Armed Forces Capabilities for Hybrid Warfare – New Challenge for Slovak Armed Forces

    Directory of Open Access Journals (Sweden)

    Peter PINDJÁK

    2015-09-01

    Full Text Available The paper deals with the optimization of military capabilities of the Slovak Armed Forces for conducting operations in a hybrid conflict, which represents one of the possible scenarios of irregular warfare. Whereas in the regular warfare adversaries intend to eliminate the centers of gravity of each other, most often command and control structures, in irregular conflicts, the center of gravity shifts towards the will and cognitive perception of the target population. Hybrid warfare comprises a thoroughly planned combination of conventional military approaches and kinetic operations with subversive, irregular activities, including information and cyber operations. These efforts are often accompanied by intensified activities of intelligence services, special operation forces, and even mercenary and other paramilitary groups. The development of irregular warfare capabilities within the Slovak Armed Forces will require a progressive transformation process that may turn the armed forces into a modern and adaptable element of power, capable of deployment in national and international crisis management operations.

  17. Biological toxin warfare: threat, proliferation, and the effects of neutron energy on BTW agents

    OpenAIRE

    Swartz, Jeffrey R.

    1995-01-01

    The threat of biological weapons presents a special military challenge. Biological toxin warfare (BTW) agents are more potent than chemical warfare agents. Depending on the yield of the nuclear weapon, a biological weapon also can have a higher lethality than nuclear weapons. This thesis examines existing international restricions on the proliferation of BTW technology and identifies their shortcomings. These loopholes contribute to the eay availability of the technology necessary to examine ...

  18. Why mid-grade Surface Warfare officers are resigning from the Naval service.

    OpenAIRE

    Howell, James Robert

    1980-01-01

    This thesis addresses the reasons for mid-grade (0-2 to 0-4) Surface Warfare officer resignations. It makes recommendations that would possibly increase retention for the mid-grade Surface Warfare Officer Community. Statistical analyses were performed upon data from post-resignation questionnaires. A list of the ten most reported reasons for resigning was then compiled. A series of recommendations which might have a positive effect upon retention were then derived

  19. Platform-level Distributed Warfare Model-based on Multi-Agent System Framework

    Directory of Open Access Journals (Sweden)

    Xiong Li

    2012-05-01

    Full Text Available The multi-agent paradigm has become a useful tool in solving military problems. However, one of key challenges in multi-agent model for distributed warfare could be how to describe the microcosmic  tactical warfare platforms actions. In this paper, a platform-level distributed warfare model based on multi-agent system framework is designed to tackle this challenge. The basic ideas include:  Establishing multi-agent model by mapping from tactical warfare system’s members, i.e., warfare platforms, to respective agents; performing task decomposition and task allocation by using task-tree decomposition method and improved contract net protocol model technique; and implementing simulation by presenting battlefield terrain environment analysis algorithm based on grid approach. The  simulation demonstration results show that our model provides a feasible and effective approach to supporting the abstraction and representation of microcosmic tactical actions for complex warfare system.Defence Science Journal, 2012, 62(1, pp.180-186, DOI:http://dx.doi.org/10.14429/dsj.62.964

  20. Technological, military and social causes for the application of cyber warfare

    Directory of Open Access Journals (Sweden)

    Dragan D. Mladenović

    2012-01-01

    Full Text Available Cyber warfare is a specific new form of military conflicts the use of which is growing rapidly in the international community. However, its nature is specific and differs from all previously known forms of warfare. For the purpose of clear understanding of the nature of cyber warfare, this paper covers the basic groups of preconditions for its broad application and fast development from technological, military and social aspects. Understanding the true nature of cyber warfare is a necessary condition for building national capacities for its application that are military justified and harmonized with the international law. The paper explores the characteristic instances of cyber warfare, ranging from information propaganda to physical destruction, with the goal to determine guidelines for the possible development of cyber capacities at the national level. Based on the analysis of previous cyber warfare cases, a prediction of future development directions is made and the necessity to apply suitable methods and techniques for defense against them is analyzed.

  1. A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios

    Directory of Open Access Journals (Sweden)

    Kathryn Merrick

    2016-07-01

    Full Text Available Our increasing dependence on information technologies and autonomous systems has escalated international concern for information- and cyber-security in the face of politically, socially and religiously motivated cyber-attacks. Information warfare tactics that interfere with the flow of information can challenge the survival of individuals and groups. It is increasingly important that both humans and machines can make decisions that ensure the trustworthiness of information, communication and autonomous systems. Subsequently, an important research direction is concerned with modelling decision-making processes. One approach to this involves modelling decision-making scenarios as games using game theory. This paper presents a survey of information warfare literature, with the purpose of identifying games that model different types of information warfare operations. Our contribution is a systematic identification and classification of information warfare games, as a basis for modelling decision-making by humans and machines in such scenarios. We also present a taxonomy of games that map to information warfare and cyber crime problems as a precursor to future research on decision-making in such scenarios. We identify and discuss open research questions including the role of behavioural game theory in modelling human decision making and the role of machine decision-making in information warfare scenarios.

  2. Remote sensing of evaporation ducts for Naval warfare

    Science.gov (United States)

    Geernaert, G. L.

    1989-11-01

    Areas critical to naval operations are the prediction and application of atmospheric refractivity gradients. This report describes the use of the evaporation duct over the ocean and a plan for obtaining information about the evaporation duct by space-borne sensors. There has been little research on the theory and modeling of lower atmospheric refractivity, particularly evaporation ducts over a nonhomogeneous ocean over the past five decades. Much is known about surface layer similarity theory and propagation model techniques, but little attention has been placed on the spatial variabilities in the turbulent propagation medium (such as the atmospheric surface layer) in regions of strategic Navy interest. These regions include the coastal shelf, Gulf Stream, marginal ice zone, and those places where sharp sea surface temperature fronts exist. For tomorrow's Navy, using remote sensing techniques to infer evaporative and tropospheric ducts are a requirement. Although research efforts on ducts must couple the tropospheric and surface layer components, this report summarizes the state of the art for the evaporative duct and assess the potential of new and future results on improving next generation naval warfare capabilities.

  3. Unconventional Nuclear Warfare Defense (UNWD) containment and mitigation subtask.

    Energy Technology Data Exchange (ETDEWEB)

    Wente, William Baker

    2005-06-01

    The objective of this subtask of the Unconventional Nuclear Warfare Design project was to demonstrate mitigation technologies for radiological material dispersal and to assist planners with incorporation of the technologies into a concept of operations. The High Consequence Assessment and Technology department at Sandia National Laboratories (SNL) has studied aqueous foam's ability to mitigate the effects of an explosively disseminated radiological dispersal device (RDD). These benefits include particle capture of respirable radiological particles, attenuation of blast overpressure, and reduction of plume buoyancy. To better convey the aqueous foam attributes, SNL conducted a study using the Explosive Release Atmospheric Dispersion model, comparing the effects of a mitigated and unmitigated explosive RDD release. Results from this study compared health effects and land contamination between the two scenarios in terms of distances of effect, population exposure, and remediation costs. Incorporating aqueous foam technology, SNL created a conceptual design for a stationary containment area to be located at a facility entrance with equipment that could minimize the effects from the detonation of a vehicle transported RDD. The containment design was evaluated against several criteria, including mitigation ability (both respirable and large fragment particle capture as well as blast overpressure suppression), speed of implementation, cost, simplicity, and required space. A mock-up of the conceptual idea was constructed at SNL's 9920 explosive test site to demonstrate the containment design.

  4. Studies on residue-free decontaminants for chemical warfare agents.

    Science.gov (United States)

    Wagner, George W

    2015-03-17

    Residue-free decontaminants based on hydrogen peroxide, which decomposes to water and oxygen in the environment, are examined as decontaminants for chemical warfare agents (CWA). For the apparent special case of CWA on concrete, H2O2 alone, without any additives, effectively decontaminates S-2-(diisopropylamino)ethyl O-ethyl methylphosphonothioate (VX), pinacolyl methylphosphorofluoridate (GD), and bis(2-choroethyl) sulfide (HD) in a process thought to involve H2O2 activation by surface-bound carbonates/bicarbonates (known H2O2 activators for CWA decontamination). A plethora of products are formed during the H2O2 decontamination of HD on concrete, and these are characterized by comparison to synthesized authentic compounds. As a potential residue-free decontaminant for surfaces other than concrete (or those lacking adsorbed carbonate/bicarbonate) H2O2 activation for CWA decontamination is feasible using residue-free NH3 and CO2 as demonstrated by reaction studies for VX, GD, and HD in homogeneous solution. Although H2O2/NH3/CO2 ("HPAC") decontaminants are active for CWA decontamination in solution, they require testing on actual surfaces of interest to assess their true efficacy for surface decontamination. PMID:25710477

  5. Research on performance of ethernet interface in network centric warfare

    Institute of Scientific and Technical Information of China (English)

    梁永生; 张乃通

    2004-01-01

    The concept of network centric warfare (NCW) and its character, high requirement of real-time synchronization are introduced. The distributed equal-node network architecture in NCW is presented. Based on theoretical analysis on ethernet interface performance, this paper presents that forwarding latency between ethernet interface devices is a key influence factor of real-time synchronization in NCW. Ethernet fundamental is briefly introduced. The model between a switch under test (SUT) and a smartbits card is presented and used for two interconnecting switches in NCW. On condition that ignoring the latency of connecting fiber or twisted pairs and processing latency of the smartbits test system, this paper presents that clock frequency tolerance (CFT) between a SUT and a smartbits card is a leading influence factor of forwarding latency of an ethernet switch. The formulae to calculate internal forwarding latency and forwarding latency caused by its CFT are deduced. Theoretical calculation on forwarding latency of an ethernet switch based on the given CFT and test time is implemented. Experimental study on primary forwarding latency and secondary forwarding latency is implemented and forwarding latency between the SUT and the smartbits card is measured, thus testifying the accuracy of the above theoretical analysis that the CFT is a key influence factor of forwarding latency. The measures to satisfy the needs of forwarding latency in NCW are presented.

  6. Prevalence of Asthma in Children of Chemical Warfare Victims

    Science.gov (United States)

    Mirsadraee, Majid; Mozaffari, Abolfazl; Attaran, Davood

    2011-01-01

    Objective Exposure of DNA to sulfur mustard gas may increase the inheritance of asthma in chemical warfare victims' (CWV) offspring. The objective of this study was to determine the prevalence of asthma in children of CWV and compare it to asthmatic children in the general population. Methods Four hundred and nine children from 130 CWV fathers and 440 children from 145 asthmatic parents from two cities in Iran participated in this study. The prevalence of asthma was determined by standard questionnaire released for epidemiological survey of asthma in children and compared between two groups. Findings The prevalence of asthma in the CWV group was 15%; this was not significantly different from the control group (12.5%). The children of the CWV group reported a significantly greater incidence of wheezing (1.2±3.1 attacks) per year, but the control group reported more severe attacks leading to speech difficulties (3%) and coughing (7%). Regression analysis showed that with increasing family size in the control group, the number of subjects suffering from asthmatic symptoms decreases significantly (r=0.86, P=0.001). Conclusion Chemical agents may increase the prevalence of asthma in the offspring of CWV. PMID:23056804

  7. Lessons learned from the former Soviet biological warfare program

    Science.gov (United States)

    Anderson, Debra A.

    The purpose of this doctoral project was to develop the most credible educational tool openly available to enhance the understanding and the application of biological weapons threat analysis. The theory governing the effectiveness of biological weapons was integrated from publications, lectures, and seminars primarily provided by Kenneth Alibek and William C. Patrick III, the world's foremost authorities on the topic. Both experts validated the accuracy of the theory compiled from their work and provided forewords. An exercise requiring analysis of four national intelligence estimates of the former Soviet biological warfare program was included in the form of educational case studies to enhance retention, experience, and confidence by providing a platform against which the reader can apply the newly learned theory. After studying the chapters on BW theory, the reader can compare his/her analysis of the national intelligence estimates against the analysis provided in the case studies by this researcher. This training aid will be a valuable tool for all who are concerned with the threat posed by biological weapons and are therefore seeking the most reliable source of information in order to better understand the true nature of the threat.

  8. Virtual command center for distributed collaborative undersea warfare

    Science.gov (United States)

    Barton, Robert J., III; Encarnacao, L. M.; Shane, Richard T.; Drew, Ernest; Mulhearn, Jim F.

    2000-08-01

    The Naval Undersea Warfare Center, Division Newport (NUWCDIVNPT) and its partners have developed a prototype CTI (Command Technology Initiatives) Test Bed to demonstrate the utility of a facility where warfighters, government, academia and industry can evaluate the application of collaborate decision support and advanced computer graphics technologies to submarine command and control. The CTI Test bed is currently comprised of three components: Collaborative Visualization Environment (CVE) for Submarine Command and Control, which provides a coherent 3-D display of the perceived undersea battlespace. Individual windows can display multi-dimensional data/information to support a common picture of undersea battlespace management and tactical control; Submarine Fleet Mission Programming Library (SFMPL) which provides environmental data, such as transmission loss, to CVE; Command and Control Data Server which provides contact reports, areas of uncertainty, and ownship/contact motion to CVE Facilitated by a CORBA4 (Common Object Request Broker Architecture) compliant architecture, remotely connected collaborators interact via a computer network to generate and share information. Additionally, collaborators communicate orally via network telephony. Currently, the CTI Test bed is configured to provide volumetric displays of: undersea battlespace w/ bathymetry; Detection/Counter-detection regions for a given probability of detection; Contact(s) Volume of Uncertainty The CTI Test Bed provides a CORBA compliant framework, which can be readily expanded to evaluate candidate applications of collaborative command and tactical decision support and advanced computer graphics technologies.

  9. Back to the future: aerial warfare in Libya

    Directory of Open Access Journals (Sweden)

    João Paulo Nunes Vicente

    2013-05-01

    Full Text Available A century after the first air bomb mission, a new intervention in the same geographic space has made evident the changes in Airpower. The Aerial Warfare in Libya has radically changed the civil war, complying with a UN mission to protect Libyan population, imposing a no-fly zone and an arms embargo. Therefore, Operation Unified Protector became one of the most successful campaigns in the history of NATO. We aim to assess the operational efficiency of Airpower in the conflict in Libya, focusing on the challenges of a War essentially Aerial. Despite the military results and the fact that some political objectives were met, we can identify some concerning trends that, if not shifted, may negatively influence future NATO operations. We do not aim to draw general and universal conclusions on the strategic value of Airpower based on the analysis of a specific case. Above all, we focus on identifying some lessons which have influenced OUP operational efficiency. Thus, we must analyze some factors, such as the scope of objectives, the type of opposing action and aerial strategy used by the coalition and then focus on the challenges arising from the OUP.

  10. The Handicap Principle, Strategic Information Warfare and the Paradox of Asymmetry

    Energy Technology Data Exchange (ETDEWEB)

    Ma, Zhanshan [University of Idaho; Sheldon, Frederick T [ORNL; Krings, Axel [ORNL

    2010-01-01

    The term asymmetric threat (or warfare) often refers to tactics utilized by countries, terrorist groups, or individuals to carry out attacks on a superior opponent while trying to avoid direct confrontation. Information warfare is sometimes also referred to as a type of asymmetric warfare perhaps due to its asymmetry in terms of cost and efficacy. Obviously, there are differences and commonalities between two types of asymmetric warfare. One major difference lies in the goal to avoid confrontation and one commonality is the asymmetry. Regardless, the unique properties surrounding asymmetric warfare warrant a strategic-level study. Despite enormous studies conducted in the last decade, a consensus on the strategy a nation state should take to deal with asymmetric threat seems still intriguing. In this article, we try to shed some light on the issue from the handicap principle in the context of information warfare. The Handicap principle was first proposed by Zahavi (1975) to explain the honesty or reliability of animal communication signals. He argued that in a signaling system such as one used in mate selection, a superior male is able to signal with a highly developed "handicap" to demonstrate its quality, and the handicap serves "as a kind of (quality) test imposed on the individual" (Zahavi 1975, Searcy and Nowicki 2005). The underlying thread that inspires us for the attempt to establish a connection between the two apparently unrelated areas is the observation that competition, communication and cooperation (3C), which are three fundamental processes in nature and against which natural selection optimize living things, may also make sense in human society. Furthermore, any communication networks, whether it is biological networks (such as animal communication networks) or computer networks (such as the Internet) must be reasonably reliable (honest in the case of animal signaling) to fulfill its missions for transmitting and receiving messages. The strategic

  11. Guerilla Warfare & Law Enforcement: Combating the 21st Century Terrorist Cell within the U.S.

    Directory of Open Access Journals (Sweden)

    Major Richard Hughbank

    2009-01-01

    Full Text Available Both domestic and international terrorist organizations employ guerrilla warfare tactics, techniques, and procedures. Thus, the ability to identify and defeat the members of these organizations, cripple their infrastructures, and disrupt their financial resources lies in the understanding of modern guerrilla warfare as it develops in the twenty-first century within the United States.3 The forms of asymmetric warfare4 adopted by domestic and international terrorist groups alike is no longer intended to gain simple media exposure or governmental manipulation; they want to make an overpowering impact by causing massive loss of life and severe damage to infrastructure and are often motivated by religious imperatives and political goals. As terrorism analyst Stephen Flynn has observed, "Throughout the 20th century [Americans] were able to treat national security as essentially an out-of-body experience. When confronted by threats, [America] dealt with them on the turf of our allies or our adversaries. Aside from the occasional disaster and heinous crime, civilian life [in the United States] has been virtually terror-free." With the turn of the twenty-first century, terrorist operations have become more prevalent in the United States and are taking shape in the form of modern guerrilla warfare, thus creating new challenges for federal, state, and local law enforcement agencies. After reviewing the origin and nature of these challenges, this article will offer some suggestions for countering guerilla warfare in the United States.

  12. Detection of biological warfare agents using ultra violet-laser induced fluorescence LIDAR

    Science.gov (United States)

    Joshi, Deepti; Kumar, Deepak; Maini, Anil K.; Sharma, Ramesh C.

    This review has been written to highlight the threat of biological warfare agents, their types and detection. Bacterial biological agent Bacillus anthracis (bacteria causing the disease anthrax) which is most likely to be employed in biological warfare is being discussed in detail. Standoff detection of biological warfare agents in aerosol form using Ultra violet-Laser Induced Fluorescence (UV-LIF) spectroscopy method has been studied. Range-resolved detection and identification of biological aerosols by both nano-second and non-linear femto-second LIDAR is also discussed. Calculated received fluorescence signal for a cloud of typical biological agent Bacillus globigii (Simulants of B. anthracis) at a location of ˜5.0 km at different concentrations in presence of solar background radiation has been described. Overview of current research efforts in internationally available working UV-LIF LIDAR systems are also mentioned briefly.

  13. THE CYBER DIMENSION OF MODERN HYBRID WARFARE AND ITS RELEVANCE FOR NATO

    Directory of Open Access Journals (Sweden)

    Sorin DUCARU

    2016-06-01

    Full Text Available The technological development and the instant communication possibilities advanced not only economic and social developments, but also evolving threats from those who exploit the vulnerabilities of communication and information systems. The cyber threat landscape points to a significant increase of the frequency, intensity, duration and sophistication of cyber-attacks. One of the new and concerning trends is the use of cyber capabilities in relation with military of hybrid operations – the so-called cyber dimension of hybrid warfare. NATO’s strategy on countering hybrid warfare is based on the triad: prepare-deter-defend, which also applies to cyber. Nations represent the first line of defence in countering hybrid strategies. International cooperation is also a key factor in this sense. It is in this context that NATO’s response to cyber-attacks in the context of hybrid warfare must be further refined.

  14. The United States and biological warfare: secrets from the early cold war and Korea.

    Science.gov (United States)

    Bruwer, A

    2001-01-01

    The United States and Biological Warfare is about accusations that the United States resorted to bacteriological warfare at a time of great military stress during the Korean War. In December 1951, the then US Secretary of Defense ordered early readiness for offensive use of biological weapons. Soon afterwards, the North Korean and Chinese armies accused the United States of starting a large-scale biological warfare experiment in Korea. The US State Department denied the accusation. Both parties to the dispute maintain their positions today. The authors spent 20 years researching the accusations in North America, Europe and Japan. They were the first foreigners to be given access to Chinese classified documents. The reader is also introduced to the concept of 'plausible denial', an official US policy which allowed responsible governmental representatives to deny knowledge of certain events. The authors hope that their work will contribute to the understanding of a time when modern war expanded into a new type of violence.

  15. Treatability study report for remediation of chemical warfare agent contaminated soils using peroxysulfate ex-situ treatment. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Pugh, J.R.; Grinstead, J.H.; Farley, J.A.; Enlow, P.D.; Kelly, D.A.

    1996-07-01

    This laboratory scale study examines the feasibility of using peroxysulfate based oxidants to remediate soils contaminated with GB, Hi, and VX. The project was conducted with chemical warfare agent simulants. The study concludes that peroxysulfates, and particularly peroxydisulfate, can degrade chemical warfare agent simulants in soil and recommends continuing research.

  16. Skeletal evidence for Inca warfare from the Cuzco region of Peru.

    Science.gov (United States)

    Andrushko, Valerie A; Torres, Elva C

    2011-11-01

    This article addresses the bioarchaeological evidence for Inca warfare through an analysis of 454 adult skeletons from 11 sites in the Inca capital region of Cuzco, Peru. These 11 sites span almost 1000 years (AD 600-1532), which allows for a comparison of the evidence for warfare before the Inca came to power (Middle Horizon AD 600-1000), during the time of Inca ascendency in the Late Intermediate Period (AD 1000-1400), and after the Inca came to power and expanded throughout the Cuzco region and beyond (Inca Imperial Period, AD 1400-1532). The results indicate that 100 of 454 adults (22.0%) showed evidence of cranial trauma. Of these, 23 individuals had major cranial injuries suggestive of warfare, consisting of large, complete, and/or perimortem fractures. There was scant evidence for major injuries during the Middle Horizon (2.8%, 1/36) and Late Intermediate Period (2.5%, 5/199), suggesting that warfare was not prevalent in the Cuzco region before and during the Inca rise to power. Only in the Inca Imperial Period was there a significant rise in major injuries suggestive of warfare (7.8%, 17/219). Despite the significant increase in Inca times, the evidence for major cranial injuries was only sporadically distributed at Cuzco periphery sites and was entirely absent at Cuzco core sites. These findings suggest that while the Inca used warfare as a mechanism for expansion in the Cuzco region, it was only one part of a complex expansion strategy that included economic, political, and ideological means to gain and maintain control. PMID:21959843

  17. 毒物战的现实威胁%Threats of toxic warfare

    Institute of Scientific and Technical Information of China (English)

    刘芳; 赵建; 丁日高

    2013-01-01

    2002年,一份美国空军发起的关于毒物战争的研究报告引起了美国军方和平民灾难应急救援组织的关注。该报告通过对在战争中恶意使用有毒工业化学物质的历史事件的回顾,提出了毒物战( toxic warfare )的概念,并讨论了它对美国军事和国土安全的影响。该文综述了毒物战的历史及其对美国军事和国土安全的影响,分析了我国面临的毒物战威胁,并就应对毒物战威胁提出了若干启示。%In 2002, a research report about toxic warfare launched by the United States Air Force attracted the attentionof the U.S.military and civilian disaster emergency rescue organizations .By reviewing historical events related to the malicioususe of toxic industrial chemicals in the war , this report proposed the concept of "Toxic Warfare ", and discussed itsimpact on the United States military and homeland security .In this paper, the concept and history of toxic warfare and itsinfluence on American military and homeland security are reviewed , the threats of toxic warfare facing China and counter -measures against toxic warfare are analyzed.

  18. NONDESTRUCTIVE IDENTIFICATION OF CHEMICAL WARFARE AGENTS AND EXPLOSIVES BY NEUTRON GENERATOR-DRIVEN PGNAA

    Energy Technology Data Exchange (ETDEWEB)

    T. R. Twomey; A. J. Caffrey; D. L. Chichester

    2007-02-01

    Prompt gamma-ray neutron activation analysis (PGNAA) is now a proven method for the identification of chemical warfare agents and explosives in military projectiles and storage containers. Idaho National Laboratory is developing a next-generation PGNAA instrument based on the new Ortec Detective mechanically-cooled HPGe detector and a neutron generator. In this paper we review PGNAA analysis of suspect chemical warfare munitions, and we discuss the advantages and disadvantages of replacing the californium-252 radioisotopic neutron source with a compact accelerator neutron generator.

  19. Particle Swarm Social Adaptive Model for Multi-Agent Based Insurgency Warfare Simulation

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Xiaohui [ORNL; Potok, Thomas E [ORNL

    2009-12-01

    To better understand insurgent activities and asymmetric warfare, a social adaptive model for modeling multiple insurgent groups attacking multiple military and civilian targets is proposed and investigated. This report presents a pilot study using the particle swarm modeling, a widely used non-linear optimal tool to model the emergence of insurgency campaign. The objective of this research is to apply the particle swarm metaphor as a model of insurgent social adaptation for the dynamically changing environment and to provide insight and understanding of insurgency warfare. Our results show that unified leadership, strategic planning, and effective communication between insurgent groups are not the necessary requirements for insurgents to efficiently attain their objective.

  20. NONDESTRUCTIVE IDENTIFICATION OF CHEMICAL WARFARE AGENTS AND EXPLOSIVES BY NEUTRON GENERATOR-DRIVEN PGNAA

    International Nuclear Information System (INIS)

    Prompt gamma-ray neutron activation analysis (PGNAA) is now a proven method for the identification of chemical warfare agents and explosives in military projectiles and storage containers. Idaho National Laboratory is developing a next-generation PGNAA instrument based on the new Ortec Detective mechanically-cooled HPGe detector and a neutron generator. In this paper we review PGNAA analysis of suspect chemical warfare munitions, and we discuss the advantages and disadvantages of replacing the californium-252 radioisotopic neutron source with a compact accelerator neutron generator

  1. THE PECULIARITIES OF SOCIAL PERCEPTION IN THE CONTEXT OF INFORMATION-PSYCHOLOGICAL WARFARE

    Directory of Open Access Journals (Sweden)

    Nane Zeynalyan

    2016-09-01

    Full Text Available In the recent decades, war fields have moved into the information sphere. Today’s person has reason to “be informed”; as having information provides a sense of security. In the modern world, great effort is invested in expanding information sources, because it serves to articulate both international policies and the context of wars. The exchange of information in domestic and international platforms influences the quality of public debate and ideology, which affects social attitudes and decision-making processes. This article presents the role of information-psychological warfare as a factor in forming public opinion. It discusses the peculiarities of organizing an information-psychological warfare during military conflicts. The goal of our research is to explore how social groups might perceive peculiarities in the information-psychological warfare. The research involves methods of survey, content analysis, and free associations. The effectiveness of psychological warfare significantly depends on how people perceive information. Consequently, in the contemporary world, it is necessary to not only protect or fight on the battlefield, but also to use information weapons. This imposes requirements on psychological scientists to explore peculiarities around the perception of information to help find mechanisms that safeguard people’s lives by way of contributing to the formation of necessary attitudes and stereotypes.

  2. On modeling of the evaporation of chemical warfare agents on the ground

    NARCIS (Netherlands)

    Westin, S.N.; Winter, S.; Karlsson, E.; Hin, A.; Oeseburg, F.

    1998-01-01

    A model for evaporation of chemical warfare agents on the ground has been developed. The process of evaporation is described in three steps: (1) the immediate drop enlargement due to impact momentum is modeled using an empirical correlation from technical literature; (2) further enlargement caused b

  3. A statistical analysis of the effect of warfare on the human secondary sex ratio

    NARCIS (Netherlands)

    Graffelman, J.; Hoekstra, R.F.

    2000-01-01

    Many factors have been hypothesized to affect the human secondary sex ratio (the annual percentage of males among all live births), among them race, parental ages, and birth order. Some authors have even proposed warfare as a factor influencing live birth sex ratios. The hypothesis that during and s

  4. Diagnosis of exposure to chemical warfare agents: An essential tool to counteract chemical terrorism

    NARCIS (Netherlands)

    Noort, D.; Schans, M.J. van der; Bikker, F.J.; Benschop, H.P.

    2009-01-01

    Methods to analyze chemical warfare agents (CW-agents) and their decomposition products in environmental samples were developed over the last decades. In contrast herewith, procedures for analysis in biological samples have only recently been developed. Retrospective detection of exposure to CW-agen

  5. From Douhet to drones, air warfare, and the evolution of targeting

    NARCIS (Netherlands)

    F.P.B. Osinga; M.P. Roorda

    2016-01-01

    Through the prism of the experience of air warfare, this chapter identifies key factors that have shaped targeting. These include technological developments, organizational structures, and processes and inter-service competition for scarce resources. Moreover, targeting is informed by perspectives o

  6. An Empirical Examination of the Warfare Metaphor with Respect to Pre-Service Elementary Teachers

    Science.gov (United States)

    Cobern, William W.; Loving, Cathleen C.; Davis, Edward B.; Terpstra, Jeff

    2013-01-01

    Since its origination in the late nineteenth century, the warfare metaphor has been used to characterize the relationship between science and religion, especially orthodox Christianity. Though thoroughly discredited by historians of science, the ideological descendants of Thomas Huxley, who spoke of science in quasi-religious terms, have kept the…

  7. (Review of) Reno, William. 2011. Warfare in Independent Africa. Cambridge: Cambridge University Press

    DEFF Research Database (Denmark)

    Hagmann, Tobias

    2013-01-01

    Warfare in Independent Africa is Reno’s bold attempt to analyze the modern history of African insurgencies. The book tackles this task through the prism of five generations of rebel, which left their mark on the continent; anti-colonial rebels, majority rule rebels, reform rebels, warlord rebels ...

  8. The Future of Western Warfare: Coalitions and Capability Gaps; Strategic Insights, v. 10, Special issue (October 2011), 49-60. Topic: Global Trends and Future Warfare ; Part II: Technological and Doctrinal Innovation

    OpenAIRE

    Farrell, Theo

    2011-01-01

    This article appeared in Strategic Insights, V. 10, Special issue (October 2011), 49-60. Topic: Global Trends and Future Warfare ; Part II: Technological and Doctrinal Innovation Approved for public display, distribution unlimited This paper starts by making the case for coalition warfare focusing on a core of states within the North Atlantic Treaty Organization (NATO). Then goes on to discuss some of the capability shortfalls of European coalition partners. While technology is the most...

  9. The Short-Term Effect of Chest Physiotherapy on Spirometric Indices in Chemical Warfare Victims Exposed to Mustard Gas

    OpenAIRE

    Abedi, A.; HR Koohestani; Z Roosta

    2008-01-01

    ABCTRACT Introduction & Objective: Chronic respiratory diseases are the most prevalent late sequels of sulfur mustard gas injury among Iranian chemical warfare victims. Chest physiotherapy is one of the useful methods in care, cure and infection prevention of these patients. The aim of this study was to determine the short-term effect of chest physiotherapy on spirometric indices in chemical warfare victims exposed to sulfur mustard gas. Materials & Methods: In this study, 27 of the chemical ...

  10. Modeling and Optimal Control of a Class of Warfare Hybrid Dynamic Systems Based on Lanchester Attrition Model

    OpenAIRE

    Xiangyong Chen; Ancai Zhang

    2014-01-01

    For the particularity of warfare hybrid dynamic process, a class of warfare hybrid dynamic systems is established based on Lanchester equation in a (n,1) battle, where a heterogeneous force of n different troop types faces a homogeneous force. This model can be characterized by the interaction of continuous-time models (governed by Lanchester equation), and discrete event systems (described by variable tactics). Furthermore, an expository discussion is presented on an optimal variable tact...

  11. Injuries sustained to the upper extremity due to modern warfare and the evolution of care.

    Science.gov (United States)

    Hofmeister, Eric P; Mazurek, Michael; Ingari, Jack

    2007-10-01

    The formation of the American Society for Surgery of the Hand was related to world conflicts and hostilities. Therefore, it is appropriate that upper-extremity surgeons understand injuries resulting from modern-day combat. Because of ongoing warfare, many countries have experienced a large increase in the number of wounded service members and civilians, particularly wounds of the extremities. As a result of increased rate of survival in battlefield trauma in part because of the use of modern body armor, there is increasing complexity of extremity injuries that require complex reconstructions. Decreased mortality and a consequent increase in the incidence of injured extremities underline the need for the development of new treatment options. The purpose of this presentation is to describe upper-extremity injury patterns in modern warfare, the levels of care available, and the treatment at each level of care based on the experience of the United States Military Medical Support System.

  12. The Military-Entertainment Complex: A New Facet of Information Warfare

    Directory of Open Access Journals (Sweden)

    Adam Muir

    2003-01-01

    Full Text Available The second Gulf War will become synonymous with the emergence of fully-fledged information warfare where the military-entertainment complex has so influenced strategic and logistic possibilities that it becomes apparent that the war was waged as entertainment. This is entertainment not as an amusement or diversion but utilising the techniques and tropes of the burgeoning entertainment industry as a means to achieve military objectives. This paper offers a short history of the military-entertainment complex as reality and simulation become fused in the practices of the US military machine. The paper then briefly explores three central aspects of this phenomenon evident in recent developments: the military function of computer games; the role of the Hollywood scenario and the blurring between news and reality TV. Finally the suggestion is made that subverting, co-opting and reconstructing the military-entertainment complex provides new possibilities for alternative strategies of information warfare.

  13. Bits or Shots in Combat? The Generalized Deitchman Model of Guerrilla Warfare

    OpenAIRE

    Kress, Moshe; MacKay, Niall J.

    2013-01-01

    Operations Research Letters, accepted. We generalize Deitchman's guerrilla warfare model to account for trade-off between intelligence ('bits') and firepower ('shots'). Intelligent targeting leads to aimed fire, absence of intelligence leads to unaimed fire, dependent on targets' density. We propose a new Lanchester-type model that mixes aimed with unaimed fire, the balance between these being determined by quality of information. We derive the model's conserved quantity, and use it ...

  14. A proficiency-based cost estimate of Surface Warfare Officer on-the-job training

    OpenAIRE

    Macaluso, Anthony D.

    2011-01-01

    Since 2003, the Surface Warfare Officer (SWO) community has changed initial training on two occasions. In 2003, they replaced schoolhouse training (SWOS) with an OJT intensive shipboard computer-based-training in response to criticism that SWOS was a wasteful use of six months. Yet, SWOs considered "SWOS-at-Sea" inadequate fleet preparation, prompting the reestablishment of one month of "SWO Intro." A 2010 Government Accountability Office report concluded the Navy must evaluate how changes to...

  15. Comment on “Computed Tomography Imaging Findings in Chemical Warfare Victims with Pulmonary Complications”

    OpenAIRE

    Shahrzad M.Lari

    2013-01-01

    Dr.Mirsadraei and colleagues performed an interesting study about the lung HRCT findings in chemical warfare patients who suffering from long-term pulmonary complications. They found that air trapping and mosaic attenuation were the most common lung HRCT findings. Also they divided patients in different clinical entities according to the lung HRCT findings (Bronchiolitis Oblitrans, pulmonary fibrosis, bronchiectasis, asthma, and COPD). At present, GOLD and GINA recommend the diagnosis of COPD...

  16. Comparison of Selected Methods for Individual Decontamination of Chemical Warfare Agents

    OpenAIRE

    Tomas Capoun; Jana Krykorkova

    2014-01-01

    This study addresses the individual decontamination of chemical warfare agents (CWA) and other hazardous substances. The individual decontamination applies to contaminated body surfaces, protective clothing and objects immediately after contamination, performed individually or by mutual assistance using prescribed or improvised devices. The article evaluates the importance of individual decontamination, security level for Fire and Rescue Service Units of the Czech Republic (FRS CR) and demons...

  17. INFORMATION WEAPON CLASSIFICATION ACCORDING TO THE METHODS OF CONDUCTING INFORMATION WARFARE

    OpenAIRE

    Levchenko, Oleksandr V.

    2014-01-01

    Dynamic development of information technology has led to the development of informational weapon which is becoming the most dangerous tool of warfare between states. With the help of informational weapons can be conduct influence on informational resources of the hostile states and public opinion of the population. In accordance with it, informational weapon classified as information and technical weapon that affect the information resources, networks and systems of government and military ma...

  18. Toward a theory of hybrid warfare: the Russian conduct of war during peace

    OpenAIRE

    Dayspring, Stephen M.

    2015-01-01

    With the Russian annexation of Crimea and the undeclared conflict in eastern Ukraine, Western policy analysts have asked if Russia’s actions represent a new, more covert approach to warfare. Understanding Russia’s perspective on international relations is imperative to supporting potential targets of future Russian action, and specifically, to updating NATO’s defensive protocols that are predicated on response to clear military violations of sovereignty. This study uses an existing model for ...

  19. Theater level operations: modeling ground unit logistical requirements in the Joint Warfare Analysis Experimental Prototype

    OpenAIRE

    Wilk, Thomas J.

    1995-01-01

    This study proposes a methodology for modeling the logistics processes for ground units in the Joint Warfare Analysis Experimental Prototype (JWAEP) simulation. The model structure presented in this research allows for the representation of the consumption. movement, and distribution of supplies within the combat units modeled in JWAEP. Also presented is an architecture to model logistical units in JWAEP Methodologies are presented to model both the "push" and "pull" systems of supply. The su...

  20. Russia and hybrid warfare: identifying critical elements in successful applications of hybrid tactics

    OpenAIRE

    Neville, Seth B.

    2015-01-01

    Approved for public release; distribution is unlimited With the Russian annexation of Crimea in 2014, hybrid war became a buzzword within political and academic circles. This thesis examines hybrid warfare applications using contemporary and historical examples. The analysis seeks to determine why a country was or was not successful in its execution of hybrid war, and it assesses the geo-political context of cost, benefit, and risk for an aggressor state contributing to its decision to eng...

  1. [Glanders--a potential disease for biological warfare in humans and animals].

    Science.gov (United States)

    Lehavi, Ofer; Aizenstien, Orna; Katz, Lior H; Hourvitz, Ariel

    2002-05-01

    Infection with Burkholderia mallei (formerly Pseudomonas mallei) can cause a subcutaneous infection known as "farcy" or can disseminate to condition known as Glanders. It is primarily a disease affecting horses, donkeys and mules. In humans, Glanders can produce four types of disease: localized form, pulmonary form, septicemia, and chronic form. Necrosis of the tracheobronchial tree and pustular skin lesions characterize acute infection with B. mallei. Other symptoms include febrile pneumonia, if the organism was inhaled, or signs of sepsis and multiple abscesses, if the skin was the port of entry. Glanders is endemic in Africa, Asia, the Middle East, and Central and South America. Glanders has low contiguous potential, but because of the efficacy of aerosolized dissemination and the lethal nature of the disease, B. mallei was considered a candidate for biological warfare. During World War I, Glanders was believed to have been spread to infect large numbers of Russian horses and mules on the Eastern front. The Japanese infected horses, civilians and prisoners of war during World War II. The USA and the Soviet Union have shown interest in B. mallei in their biological warfare program. The treatment is empiric and includes mono or poly-therapy with Ceftazidime, Sulfadiazine, Trimethoprim + Sulfamethoxazol, Gentamicin, Imipenem etc. Aggressive control measures essentially eliminated Glanders from the west. However, with the resurgent concern about biological warfare, B. mallei is now being studied in a few laboratories worldwide. This review provides an overview of the disease and presents the only case reported in the western world since 1949.

  2. Operational advantages of using Cyber Electronic Warfare (CEW) in the battlefield

    Science.gov (United States)

    Yasar, Nurgul; Yasar, Fatih M.; Topcu, Yucel

    2012-06-01

    While cyberspace is emerging as a new battlefield, conventional Electronic Warfare (EW) methods and applications are likely to change. Cyber Electronic Warfare (CEW) concept which merges cyberspace capabilities with traditional EW methods, is a new and enhanced form of the electronic attack. In this study, cyberspace domain of the battlefield is emphazised and the feasibility of integrating Cyber Warfare (CW) concept into EW measures is researched. The SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis method is used to state the operational advantages of using CEW concept in the battlefield. The operational advantages of CEW are assessed by means of its effects on adversary air defense systems, communication networks and information systems. Outstanding technological and operational difficulties are pointed out as well. As a result, a comparison of CEW concept and conventional EW applications is presented. It is concluded that, utilization of CEW concept is feasible at the battlefield and it may yield important operational advantages. Even though the computers of developed military systems are less complex than normal computers, they are not subjected to cyber threats since they are closed systems. This concept intends to show that these closed systems are also open to the cyber threats. As a result of the SWOT analysis, CEW concept provides Air Forces to be used in cyber operations effectively. On the other hand, since its Collateral Damage Criteria (CDC) is low, the usage of cyber electronic attack systems seems to grow up.

  3. THE CONTRIBUTION MADE BY T.E. LAWRENCE TO THE THEORY OF REVOLUTIONARY WARFARE

    Directory of Open Access Journals (Sweden)

    G.K.B. Barron

    2012-02-01

    Full Text Available Lawrence was basically an academic thrown into the hurly-burly of leading an Arab revolt against Turkish domination. It could be said that the war in the Middle East was a sideshow of the First World War and Lawrence's part was a ' ... sideshow to the sideshow'l Why then has Lawrence been remembered when greater military men have been forgotten? The romanticism of his exploits are surely the reason, and yet the fact that he is the first modern theorist and possibly the "father" of modern revolutionary warfare, tends to be forgotten.

  4. Fear as a medium of communication in asymmetric forms of warfare

    DEFF Research Database (Denmark)

    Harste, Gorm

    2011-01-01

    of fear evolves in asymmetric warfare. Asymmetric war induces fear in both parties, but in a communicative form that leads to very different experiences of fear. Fear is observed and analysed with Niklas Luhmann’s theory of self-referential systems of communication and well as his theory of risk....... Following Luhmann and in continuation of Clausewitz’ conceptual tools, yet with other means, the article proposes to observe war as a system that can de-ontologize itself and thereby concern moving centres of gravity such as communication lines, motivation, public fear as well as perceptions of risk...

  5. New concepts and their applications in underwater acoustic warfare simulation system

    Institute of Scientific and Technical Information of China (English)

    DONG Yangze; YAO Lan

    2004-01-01

    An underwater acoustic warfare simulation system (UAWSS) with a structure of high level architecture (HLA) is studied based upon a previous research project. With the experience and lessons learned, some new concepts are adopted in the implementation of UAWSS according to the essence of simulation and the objective of the system, among which are simulation synthetic environment, signal processing at other simulation nodes, decomposition of underwater sound channel, channel varying law and rules on system and parts evaluation, etc. Applications of these new ideas show that they are effective.

  6. Women, rape and warfare: a gendered critique of Just War theory and the Immunity principle

    OpenAIRE

    Banwell, Stacy

    2011-01-01

    The just war tradition is based on two principles: jus ad bellum - just war-making, and jus in bello - just war-fighting. Jus in bello contains the non-combatant immunity principle. This “protects” civilians during war giving them “immunity” from the violence of war-fighting. Women are, for the most part, non-combatants. Still, their experiences during war are far from “protected”. Rape has been a feature of both traditional and civil warfare. The just war tradition is fundamentally ill-equ...

  7. Love-Wave Sensors Combined with Microfluidics for Fast Detection of Biological Warfare Agents

    OpenAIRE

    Daniel Matatagui; José Luis Fontecha; María Jesús Fernández; Isabel Gràcia; Carles Cané; José Pedro Santos; María Carmen Horrillo

    2014-01-01

    The following paper examines a time-efficient method for detecting biological warfare agents (BWAs). The method is based on a system of a Love-wave immunosensor combined with a microfluidic chip which detects BWA samples in a dynamic mode. In this way a continuous flow-through of the sample is created, promoting the reaction between antigen and antibody and allowing a fast detection of the BWAs. In order to prove this method, static and dynamic modes have been simulated and different concentr...

  8. International humanitarian law applied to cyber-warfare: Precautions, proportionality and the notion of ‘attack’ under the humanitarian law of armed conflict

    NARCIS (Netherlands)

    T.D. Gill

    2015-01-01

    This chapter examines the application of international humanitarian law to cyber warfare in the sense of rising to the level of an armed conflict. Building upon the work of the Tallinn Manual on the Application of International Law to Cyber Warfare, it places particular emphasis on the application o

  9. Academic Training Lectures | Stuxnet and Cyber-Warfare | 13-14 January 2016

    CERN Multimedia

    2015-01-01

    Please note that the next series of Academic Training Lectures will take place on 13 and 14 January 2016. The lectures will be given by Gian Piero Siroli (Università e INFN, Bologna (IT))   Stuxnet and Cyber-Warfare (1/2)​ on Wednesday, 13 January from 11 a.m. to 12 p.m. http://indico.cern.ch/event/438525/ Stuxnet and Cyber-Warfare (2/2) on Thursday, 14 January from 11 a.m. to 12 p.m. http://indico.cern.ch/event/438526/ at CERN, Council Chamber (503-1-001)  Description: The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran&...

  10. Investigating the Relationship Between Drone Warfare and Civilian Casualties in Gaza

    Directory of Open Access Journals (Sweden)

    Dr. Ann Rogers

    2014-12-01

    Full Text Available Unmanned aerial vehicles (UAVs, better known as drones, are increasingly touted as ‘humanitarian’ weapons that contribute positively to fighting just wars and saving innocent lives. At the same time, civilian casualties have become the most visible and criticized aspect of drone warfare. It is argued here that drones contribute to civilian casualties not in spite of, but because of, their unique attributes. They greatly extend war across time and space, pulling more potential threats and targets into play over long periods, and because they are low-risk and highly accurate, they are more likely to be used. The assumption that drones save lives obscures a new turn in strategic thinking that sees states such as Israel and the US rely on large numbers of small, highly discriminating attacks applied over time to achieve their objectives. This examination of Israel’s 2014 war in Gaza argues that civilian casualties are not an unexpected or unintended consequence of drone warfare, but an entirely predictable outcome.

  11. Ge{sup 4+} doped TiO{sub 2} for stoichiometric degradation of warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Stengl, Vaclav, E-mail: stengl@iic.cas.cz [Department of Solid State Chemistry, Institute of Inorganic Chemistry AS CR v.v.i., 250 68 Rez (Czech Republic); Grygar, Tomas Matys [Department of Solid State Chemistry, Institute of Inorganic Chemistry AS CR v.v.i., 250 68 Rez (Czech Republic); Oplustil, Frantisek; Nemec, Tomas [Military Technical Institute of Protection Brno, Veslarska 230, 628 00 Brno (Czech Republic)

    2012-08-15

    Highlights: Black-Right-Pointing-Pointer We prepared nanodisperse Ge{sup 4+} doped titania by a novel synthesis method. Black-Right-Pointing-Pointer Synthesis does not involve organic solvents, organometallics nor thermal processes. Black-Right-Pointing-Pointer The prepared materials are efficient in removal of chemical warfare agents. Black-Right-Pointing-Pointer Ge{sup 4+} doping improves rate of removal of soman and agent VX by TiO{sub 2}. - Abstract: Germanium doped TiO{sub 2} was prepared by homogeneous hydrolysis of aqueous solutions of GeCl{sub 4} and TiOSO{sub 4} with urea. The synthesized samples were characterized by X-ray diffraction, scanning electron microscopy, EDS analysis, specific surface area (BET) and porosity determination (BJH). Ge{sup 4+} doping increases surface area and content of amorphous phase in prepared samples. These oxides were used in an experimental evaluation of their reactivity with chemical warfare agent, sulphur mustard, soman and agent VX. Ge{sup 4+} doping worsens sulphur mustard degradation and improves soman and agent VX degradation. The best degree of removal (degradation), 100% of soman, 99% of agent VX and 95% of sulphur mustard, is achieved with sample with 2 wt.% of germanium.

  12. An Empirical Examination of the Warfare Metaphor with Respect to Pre-Service Elementary Teachers

    Science.gov (United States)

    Cobern, William W.; Loving, Cathleen C.; Davis, Edward B.; Terpstra, Jeff

    2013-08-01

    Since its origination in the late nineteenth century, the warfare metaphor has been used to characterize the relationship between science and religion, especially orthodox Christianity. Though thoroughly discredited by historians of science, the ideological descendants of Thomas Huxley, who spoke of science in quasi-religious terms, have kept the warfare metaphor alive. On the other hand, there are substantial numbers of Christians who at least appear to oppose science given their high-profile opposition to the general theory of evolution. The research reported in this paper asked, "Does anti-science sentiment increase with increasing orthodox Christian belief?" Two validated, published instruments were used: The Thinking about Science Survey Instrument and the Christian Fundamentalist Belief Scale. The subjects for the study were 545 preservice elementary teachers. The analysis did not show that anti-science sentiment increases with increasing Christian belief. Subjects with strong Christian beliefs were found to be just as supportive of science, if not more so, than subjects with no Christian beliefs. The study concludes with a caution against projecting attitudes toward science "on the whole" based on attitudes specifically toward evolution when working with preservice elementary teachers. Such a projection could well be counterproductive. The study has implications for other modern countries having highly religious populations such as Turkey.

  13. Next Generation Non-particulate Dry Nonwoven Pad for Chemical Warfare Agent Decontamination

    Energy Technology Data Exchange (ETDEWEB)

    Ramkumar, S S; Love, A; Sata, U R; Koester, C J; Smith, W J; Keating, G A; Hobbs, L; Cox, S B; Lagna, W M; Kendall, R J

    2008-05-01

    New, non-particulate decontamination materials promise to reduce both military and civilian casualties by enabling individuals to decontaminate themselves and their equipment within minutes of exposure to chemical warfare agents or other toxic materials. One of the most promising new materials has been developed using a needlepunching nonwoven process to construct a novel and non-particulate composite fabric of multiple layers, including an inner layer of activated carbon fabric, which is well-suited for the decontamination of both personnel and equipment. This paper describes the development of a composite nonwoven pad and compares efficacy test results for this pad with results from testing other decontamination systems. The efficacy of the dry nonwoven fabric pad was demonstrated specifically for decontamination of the chemical warfare blister agent bis(2-chloroethyl)sulfide (H or sulfur mustard). GC/MS results indicate that the composite fabric was capable of significantly reducing the vapor hazard from mustard liquid absorbed into the nonwoven dry fabric pad. The mustard adsorption efficiency of the nonwoven pad was significantly higher than particulate activated carbon (p=0.041) and was similar to the currently fielded US military M291 kit (p=0.952). The nonwoven pad has several advantages over other materials, especially its non-particulate, yet flexible, construction. This composite fabric was also shown to be chemically compatible with potential toxic and hazardous liquids, which span a range of hydrophilic and hydrophobic chemicals, including a concentrated acid, an organic solvent and a mild oxidant, bleach.

  14. Bioarchaeological investigation of ancient Maya violence and warfare in inland Northwest Yucatan, Mexico.

    Science.gov (United States)

    Serafin, Stanley; Lope, Carlos Peraza; Uc González, Eunice

    2014-05-01

    This study investigates evidence of changes and continuities in ancient Maya violence and warfare in inland northwest Yucatan, Mexico from the Middle Preclassic (600-300 BC) to the Postclassic (AD 1050-1542) through bioarchaeological analysis of cranial and projectile trauma. It is hypothesized that the frequency of violence increases before the Classic Maya collapse and remains high during the Postclassic period. It is also hypothesized that the flat, open terrain was conducive to warfare and resulted in higher trauma frequencies than in other parts of the Maya area. Results show that the frequency of cranial trauma decreases before the Classic collapse and increases in the Postclassic, partially matching the expected chronological trends. The frequency of cranial trauma does not differ significantly from other Maya regions but the pattern does: for all periods, males have more healed injuries than females and they are concentrated on the left side of the anterior of the skull. Some injuries appear to be from small points hafted in wooden clubs. In addition, projectile trauma is evident in a scapula with an embedded arrowhead tip, the first such case reported in a Maya skeleton. Overall, these results suggest greater reliance on open combat and less on raids in this region compared with other parts of the Maya area, possibly due to the flat, open terrain, though the identification of perimortem trauma in both women and men indicates surprise raids on settlements were also practiced.

  15. Zirconium doped nano-dispersed oxides of Fe, Al and Zn for destruction of warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Stengl, Vaclav, E-mail: stengl@uach.cz [Institute of Inorganic Chemistry AS CR v.v.i., 250 68 Rez (Czech Republic); Houskova, Vendula; Bakardjieva, Snejana; Murafa, Nataliya; Marikova, Monika [Institute of Inorganic Chemistry AS CR v.v.i., 250 68 Rez (Czech Republic); Oplustil, Frantisek; Nemec, Tomas [Military Technical Institute of Protection Brno, Veslarska 230, 628 00 Brno (Czech Republic)

    2010-11-15

    Zirconium doped nano dispersive oxides of Fe, Al and Zn were prepared by a homogeneous hydrolysis of the respective sulfate salts with urea in aqueous solutions. Synthesized metal oxide hydroxides were characterized using Brunauer-Emmett-Teller (BET) surface area and Barrett-Joiner-Halenda porosity (BJH), X-ray diffraction (XRD), infrared spectroscopy (IR), scanning electron microscopy (SEM) and energy-dispersive X-ray microanalysis (EDX). These oxides were taken for an experimental evaluation of their reactivity with sulfur mustard (HD or bis(2-chloroethyl)sulfide), soman (GD or (3,3'-Dimethylbutan-2-yl)-methylphosphonofluoridate) and VX agent (S-[2-(diisopropylamino)ethyl]-O-ethyl-methylphosphonothionate). The presence of Zr{sup 4+} dopant can increase both the surface area and the surface hydroxylation of the resulting doped oxides, decreases their crystallites' sizes thereby it may contribute in enabling the substrate adsorption at the oxide surface thus it can accelerate the rate of degradation of warfare agents. Addition of Zr{sup 4+} converts the product of the reaction of ferric sulphate with urea from ferrihydrite to goethite. We found out that doped oxo-hydroxides Zr-FeO(OH) - being prepared by a homogeneous hydrolysis of ferric and zirconium oxo-sulfates mixture in aqueous solutions - exhibit a comparatively higher degradation activity towards chemical warfare agents (CWAs). Degradation of soman or VX agent on Zr-doped FeO(OH) containing ca. 8.3 wt.% of zirconium proceeded to completion within 30 min.

  16. Implications for studying team cognition and team performance in network-centric warfare paradigms.

    Science.gov (United States)

    Krueger, Gerald P; Banderet, Louis E

    2007-05-01

    Network-centric warfare's (NCW) information-rich systems involving sophisticated sensors, tracking systems, smart weapons, and enhanced digital communications threaten to overload combatants with voluminous amounts of data. It is unclear whether warfighters will perceive such extensive data as actionable information to which they will respond accurately in a timely enough manner. Members of small teams in command and control centers, operating in crew-served vehicles, or simply "grunting it out" as ground-pounding infantrymen, may be disparately separated by space, but will communicate and be connected by electronic linkages, e.g., radio, text messages, situation displays, or global positioning data. However, team members will also have to remember shared mental models of tasks at hand, pay attention to and share common situation awareness in complex operational environments, perform team cognition and team coordination, and integrate both lower and higher cognitive processes with those of team behaviors. Such exceptional capabilities are required more now than ever before; such capabilities today are far from assured. After two workshops to establish performance metrics for assessing cognitive performance of military personnel in NCW, this preface introduces five manuscripts addressing team cognition and team performance from both a theoretical and a practical perspective. The authors of this preface question if NCW, and perhaps the politico-social ramifications of modern warfare, have already outstripped behavioral scientists' approach to researching team cognition and team performance-expertise that is so crucially needed for combatants on the rapidly changing 21st-century battlegrounds.

  17. Reevaluation of 1999 Health-Based Environmental Screening Levels (HBESLs) for Chemical Warfare Agents

    Energy Technology Data Exchange (ETDEWEB)

    Watson, Annetta Paule [ORNL; Dolislager, Fredrick G [ORNL

    2007-05-01

    This report evaluates whether new information and updated scientific models require that changes be made to previously published health-based environmental soil screening levels (HBESLs) and associated environmental fate/breakdown information for chemical warfare agents (USACHPPM 1999). Specifically, the present evaluation describes and compares changes that have been made since 1999 to U.S. Environmental Protection Agency (EPA) risk assessment models, EPA exposure assumptions, as well as to specific chemical warfare agent parameters (e.g., toxicity values). Comparison was made between screening value estimates recalculated with current assumptions and earlier health-based environmental screening levels presented in 1999. The chemical warfare agents evaluated include the G-series and VX nerve agents and the vesicants sulfur mustard (agent HD) and Lewisite (agent L). In addition, key degradation products of these agents were also evaluated. Study findings indicate that the combined effect of updates and/or changes to EPA risk models, EPA default exposure parameters, and certain chemical warfare agent toxicity criteria does not result in significant alteration to the USACHPPM (1999) health-based environmental screening level estimates for the G-series and VX nerve agents or the vesicant agents HD and L. Given that EPA's final position on separate Tier 1 screening levels for indoor and outdoor worker screening assessments has not yet been released as of May 2007, the study authors find that the 1999 screening level estimates (see Table ES.1) are still appropriate and protective for screening residential as well as nonresidential sites. As such, risk management decisions made on the basis of USACHPPM (1999) recommendations do not require reconsideration. While the 1999 HBESL values are appropriate for continued use as general screening criteria, the updated '2007' estimates (presented below) that follow the new EPA protocols currently under development

  18. Nuclear warfare

    CERN Multimedia

    Broda

    1981-01-01

    Le Prof.Broda a étudié à Vienne et Berlin et a travaillé pendant la dernière guerre mondiale en Grande Bretagne pour le conseil de la recherche médicale, notamment sur la chimie de la vision. Il est maintenant Prof. de la chimie, physique et radiochimie à l'Université de Vienne, où il concentre ses travaux sur les méchanisme de transport d'énergie à travers les cellules de membranes.

  19. Mobile Warfare

    Institute of Scientific and Technical Information of China (English)

    SEBASTIAN COHEN

    2008-01-01

    @@ In 1984, US computer manufacturer Apple spent almost USD 1.5 million on a lavish, Ridley Scott-directed commercial for its new Macintosh 128k personal computer. A year later, Microsoft released Microsoft Windows for IBM PC, signaling the start of the battle for domi-nation of the personal computer market which has waged ever since.

  20. Mechanical Warfare

    OpenAIRE

    Parman, Julian; Juuti, Jussi

    2015-01-01

    Tässä opinnäytetyössä luotiin tornipuolustuspeli Unityllä käyttäen 3D-malleja. Opinnäytetyön peli on demoversio. Peli on suunniteltu käyttäen suppeaa pelisuunnitelmaa. Pelin 3D-mallit on luotu käyttäen Blender 3D-mallinnusohjelmaa. Pelin grafiikat on tuotettu GIMP2-kuvankäsittelyohjelmalla. Pelin viholliset ja tornit on toteutettu 3D-malleina. Pelissä on tarkoituksena puolustaa omaa tukikohtaa vihollisaalloilta, jotka tulevat tietä pitkin. Lopputuloksena saatiin aikaan toimiva demoversio Mech...

  1. 76 FR 10522 - Naval Surface Warfare Center, Upper Machodoc Creek and the Potomac River, Dahlgren, VA; Danger Zone

    Science.gov (United States)

    2011-02-25

    ... Federal Register (75 FR 69033) with the docket number COE-2010-0038 and no comments were received... and the Potomac River, Dahlgren, VA; Danger Zone AGENCY: U.S. Army Corps of Engineers, DoD. ACTION... danger zone in the vicinity of Naval Surface Warfare Center, Dahlgren, in King George County,...

  2. Chemical and biological warfare: Detection and warning systems. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-10-01

    The bibliography contains citations concerning the detection, identification, verification, and warning systems of chemical and biological warfare agents. Citations discuss agents sampling, monitoring, and assessment. Techniques include chromotography, biosensing, chemical analysis, and DNA probes. Land pollution, soil tests, and skin protection are examined. (Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  3. Chemical and biological warfare: Biology, chemistry, and toxicology. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-10-01

    The bibliography contains citations concerning the physiological effects, physicochemical effects, and toxicology of chemical and biological warfare agents. Citations discuss toxic chemicals, chemical agent simulants, detoxification and decontamination, environmental toxicity, and land pollution. Detection techniques and warning systems are examined in a separate bibliography. (Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  4. Chemical and biological warfare: Biology, chemistry, and toxicology. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-11-01

    The bibliography contains citations concerning the physiological effects, physicochemical effects, and toxicology of chemical and biological warfare agents. Citations discuss toxic chemicals, chemical agent simulants, detoxification and decontamination, environmental toxicity, and land pollution. Detection techniques and warning systems are examined in a separate bibliography. (Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  5. Groundwater geochemical and selected volatile organic compound data, Operable Unit 1, Naval Undersea Warfare Center, Division Keyport, Washington, July 2015

    Science.gov (United States)

    Huffman, Raegan L.

    2016-05-18

    Previous investigations indicate that concentrations of chlorinated volatile organic compounds (CVOCs) are substantial in groundwater beneath the 9-acre former landfill at Operable Unit 1, Naval Undersea Warfare Center, Division Keyport, Washington. The U.S. Geological Survey has continued to monitor groundwater geochemistry to ensure that conditions remain favorable for contaminant biodegradation as specified in the Record of Decision for the site.

  6. Warfare has changed - so should have methods: Ammunition and weapon performance induced operational risk and safety issues

    NARCIS (Netherlands)

    Verhagen, T.L.A.; Voorde, M.J. van de

    2010-01-01

    Warfare has changed. Out-of-area operations have increased the awareness that we are unfamiliar with the performance of the current conventional medium and large calibre ammunitions in day-to-day practice. Current ammunition is primarily developed and procured to defeat the traditional ‘steel’ targe

  7. Warfare tourism experiences and national identity: The case of Airborne Museum ‘Hartenstein’ in Oosterbeek, the Netherlands

    NARCIS (Netherlands)

    Gieling, Johannes

    2016-01-01

    This paper examines through an analysis of Dutch warfare tourism whether there is a relationship between the subjective perceived salience of Dutch identity and heritage tourists' motives, emotions and overall satisfaction. Using a social identity theory framework, this study provides a view of moti

  8. A Study of Enlisted Training and Education in Applied Oceanography.

    Science.gov (United States)

    Schriner, Karl Leonard

    The study concludes that the primary reason for present programs of enlisted training and education in oceanography is to support Anti-Submarine Warfare (ASW). There is a significant lack of courses, schools, and self-study material available to enlisted personnel on the subject of oceanography. Through more extensive training the aviation ASW…

  9. Officer Education and Training in Oceanography for ASW and Other Naval Applications.

    Science.gov (United States)

    Waterman, Larry Wayne

    The study into the knowledge and experience required for optimum performance by officers assigned to operational, R & D, and managerial duties in Anti-submarine Warfare concludes that oceanography should receive the major emphasis on an interdisciplinary graduate level program of the contributing disciplines in ASW. In planning education and…

  10. Adaptive motion compensation in sonar array processing

    NARCIS (Netherlands)

    Groen, J.

    2006-01-01

    In recent years, sonar performance has mainly improved via a significant increase in array ap-erture, signal bandwidth and computational power. This thesis aims at improving sonar array processing techniques based on these three steps forward. In applications such as anti-submarine warfare and mine

  11. Shape and Doppler correction for a towed sonar array

    NARCIS (Netherlands)

    Groen, J.; Beerens, S.P.; Doisy, Y.

    2004-01-01

    Anti Submarine Warfare (ASW) is more and more focused toward shallow water environments. Many complications have come up for ASW sonar performance as a result of this. The problem that is tackled in this article is the performance loss due to the shape and motion of the sonar during a maneuver. Stan

  12. Underwater detection, classification and localisation : Improving the capabilities of towed sonar arrays

    NARCIS (Netherlands)

    Colin, M.E.G.D.

    2011-01-01

    The end of the Cold War and the collapse of the Warsaw pact have resulted in a change of operational theatre for the naval forces of the North Atlantic Treaty Organisation (NATO). In particular, the focus of Anti Submarine Warfare forces has shifted from tracking Soviet nuclear ballistic missile sub

  13. Underwater detection, classification and localisation: Improving the capabilities of towed sonar arrays

    NARCIS (Netherlands)

    Colin, M.E.G.D.

    2011-01-01

    The end of the Cold War and the collapse of the Warsaw pact have resulted in a change of operational theatre for the naval forces of the North Atlantic Treaty Organisation (NATO). In particular, the focus of Anti Submarine Warfare forces has shifted from tracking Soviet nuclear ballistic missile sub

  14. Love-Wave Sensors Combined with Microfluidics for Fast Detection of Biological Warfare Agents

    Science.gov (United States)

    Matatagui, Daniel; Fontecha, José Luis; Fernández, María Jesús; Gràcia, Isabel; Cané, Carles; Santos, José Pedro; Horrillo, María Carmen

    2014-01-01

    The following paper examines a time-efficient method for detecting biological warfare agents (BWAs). The method is based on a system of a Love-wave immunosensor combined with a microfluidic chip which detects BWA samples in a dynamic mode. In this way a continuous flow-through of the sample is created, promoting the reaction between antigen and antibody and allowing a fast detection of the BWAs. In order to prove this method, static and dynamic modes have been simulated and different concentrations of BWA simulants have been tested with two immunoreactions: phage M13 has been detected using the mouse monoclonal antibody anti-M13 (AM13), and the rabbit immunoglobulin (Rabbit IgG) has been detected using the polyclonal antibody goat anti-rabbit (GAR). Finally, different concentrations of each BWA simulants have been detected with a fast response time and a desirable level of discrimination among them has been achieved. PMID:25029282

  15. Love-Wave Sensors Combined with Microfluidics for Fast Detection of Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    Daniel Matatagui

    2014-07-01

    Full Text Available The following paper examines a time-efficient method for detecting biological warfare agents (BWAs. The method is based on a system of a Love-wave immunosensor combined with a microfluidic chip which detects BWA samples in a dynamic mode. In this way a continuous flow-through of the sample is created, promoting the reaction between antigen and antibody and allowing a fast detection of the BWAs. In order to prove this method, static and dynamic modes have been simulated and different concentrations of BWA simulants have been tested with two immunoreactions: phage M13 has been detected using the mouse monoclonal antibody anti-M13 (AM13, and the rabbit immunoglobulin (Rabbit IgG has been detected using the polyclonal antibody goat anti-rabbit (GAR. Finally, different concentrations of each BWA simulants have been detected with a fast response time and a desirable level of discrimination among them has been achieved.

  16. Applications of swept-frequency acoustic interferometer for nonintrusive detection and identification of chemical warfare compounds

    Energy Technology Data Exchange (ETDEWEB)

    Sinha, D.N.; Springer, K.; Han, W.; Lizon, D.; Kogan, S. [Los Alamos National Lab., NM (United States). Electronic Materials and Devices Group

    1997-12-01

    Swept-Frequency Acoustic Interferometry (SFAI) is a nonintrusive liquid characterization technique developed specifically for detecting and identifying chemical warfare (CW) compounds inside sealed munitions. The SFAI technique can rapidly (less than 20 seconds) and accurately determine sound speed and sound attenuation of a liquid inside a container over a wide frequency range (1 kHz-15 MHz). From the frequency-dependent sound attenuation measurement, liquid density is determined. These three physical properties are used to uniquely identify the CW compounds. In addition, various chemical relaxation processes in liquids and particle size distribution in emulsions can also be determined from the frequency-dependent attenuation measurement. The SFAI instrument is battery-operated and highly portable (< 6 lb.). The instrument has many potential application in industry ranging from sensitive detection (ppm level) of contamination to process control. The theory of the technique will be described and examples of several chemical industry applications will be presented.

  17. View the information-based battlefield environment system from network-centric warfare (NCW)

    Science.gov (United States)

    Zhang, Chengbin; You, Xiong

    2007-06-01

    Battlefield environment is a general designation for all kinds of objective things and conditions which surround battlefield and affect military actions. With the development of modern high technology, and information technology, traditional battlefield environment is developing in the both factors of space and constitutive, and takes on an integrated tendency. The U.S. military consider that the war of information age is NCW, and to successfully implement the theory of the NCW capabilities, the four domains of warfare-physical, information, cognitive, social, and their relationship must be understood. According to the theory of system, this paper puts forward the conception of Battlefield Environment System and its tetrahedron structure. The correlation of constitutive factors in Generalized Battlefield Environment System and the relationship between Generalized Battlefield Environment System and NCW are analyzed. Moreover, the spatial scope and constitutive factors of Specific Battlefield Environment System are also discussed.

  18. Approximation and Filtering Techniques for Navigation Data in Time-critical Electronic Warfare Systems

    Directory of Open Access Journals (Sweden)

    Vanitha D.

    2013-03-01

    Full Text Available This paper presents a holistic solution to the navigation requirements in a time critical electronic warfare systems like missile warning systems (MWS. In a passive MWS using IR sensors the efficiency of the system is determined by attributes such as low false alarm rate, minimal response time and ability to track different IR radiating objects by association and correlation of consecutive detections through time. Such a system is required to be supported by a navigation system capable of accurate estimation of the aircraft position, attitude angles and altitude. In this paper, estimation techniques used to accurately calculate aircraft navigation data at the time of capture of IR frames are discussed. The paper discusses about synchronization of INGPS, IR sensors & Processor on to same timeline. The paper also intends to evaluate the performance of wavelet transform filter in effective elimination of noise in navigation parameters like acceleration and attitude angle rates for a better estimation of position and attitude.

  19. Fate of chemical warfare agents and toxic indutrial chemicals in landfills

    DEFF Research Database (Denmark)

    Bartelt-Hunt, D.L.; Barlaz, M.A.; Knappe, D.R.U.;

    2006-01-01

    One component of preparedness for a chemical attack is planning for the disposal of contaminated debris. To assess the feasibility of contaminated debris disposal in municipal solid waste (MSW) landfills, the fate of selected chemical warfare agents (CWAs) and toxic industrial chemicals (TICs......], and two TICs [furan and carbon disulfide] were studied. The effects of both infiltration (climate) and contaminant biodegradability on fate predictions were assessed. Model results showed that hydrolysis and gas-phase advection were the principal fate pathways for CWAs and TICs, respectively. Apart from...... CX and the TICs, none of the investigated compounds was predicted to persist in a landfill for more than 5 years. Climate had little impact on CWA/TIC fate, and biodegradability was only important for compounds with long hydrolysis halflives. Monte Carlo simulations were performed to assess...

  20. Comparison of Selected Methods for Individual Decontamination of Chemical Warfare Agents

    Directory of Open Access Journals (Sweden)

    Tomas Capoun

    2014-06-01

    Full Text Available This study addresses the individual decontamination of chemical warfare agents (CWA and other hazardous substances. The individual decontamination applies to contaminated body surfaces, protective clothing and objects immediately after contamination, performed individually or by mutual assistance using prescribed or improvised devices. The article evaluates the importance of individual decontamination, security level for Fire and Rescue Service Units of the Czech Republic (FRS CR and demonstrates some of the devices. The decontamination efficiency of selected methods (sorbent, glove and sponge, two-chamber foam device and wiping with alcohol was evaluated for protective clothing and painted steel plate contaminated with O-ethyl-S-(diisopropylaminoethyl-methylthiophosphonate (VX, sulfur mustard, o-cresol and acrylonitrile. The methods were assessed from an economic point of view and with regard to specific user parameters, such as the decontamination of surfaces or materials with poor accessibility and vertical surfaces, the need for a water rinse as well as toxic waste and its disposal.

  1. Comment on “Computed Tomography Imaging Findings in Chemical Warfare Victims with Pulmonary Complications”

    Directory of Open Access Journals (Sweden)

    2013-08-01

    Full Text Available Dr.Mirsadraei and colleagues performed an interesting study about the lung HRCT findings in chemical warfare patients who suffering from long-term pulmonary complications. They found that air trapping and mosaic attenuation were the most common lung HRCT findings. Also they divided patients in different clinical entities according to the lung HRCT findings (Bronchiolitis Oblitrans, pulmonary fibrosis, bronchiectasis, asthma, and COPD. At present, GOLD and GINA recommend the diagnosis of COPD and asthma mainly on spirometry (1, 2. Although the HRCT may have valuable diagnostic points, but the diagnosis of COPD and asthma is according to the spirometry and relevant clinical symptoms. In this article, the authors relied only on clinical symptoms and corresponding lung HRCT findings that may have overlapping points in the diagnosis of asthma and COPD since normal lung HRCT with or without air trapping can be seen in COPD too (3. It has been proposed that saber-sheath trachea (tracheal index

  2. A review of current and future components for electronic warfare receivers

    Science.gov (United States)

    Collins, J. H.; Grant, P. M.

    1981-05-01

    This paper addresses the role of conventional and new components in passive electronic warfare (EW) receivers. The various areas of EW are defined before restricting the discussion predominantly to the radar intercept problem at microwave frequencies. The operational parameters of conventional components are then reviewed including the multiplexer; crystal video, instantaneous frequency measurement (IFM), and scanning superheterodyne receivers. The significance of modularity, digital control, and hybrid combinations of components is highlighted. A brief description follows of the operational Cutlass EW equipment. New components based on surface-acoustic waves (SAW) and acoustooptic (AO) Bragg cells are then presented and their particular importance in channelized receivers, IFM's, and microscan receivers noted. Finally, a number of conclusions are drawn covering likely trends in EW receivers and the need for continuing development of large-scale integrated (LSI) circuits for signal sorting and overall digital management.

  3. Rapid Ultrasensitive Chemical-Fingerprint Detection of Chemical and Biochemical Warfare Agents

    Energy Technology Data Exchange (ETDEWEB)

    ASHBY, CAROL I.; SHEPODD, TIMOTHY J.; YELTON, WILLIAM G.; MURON, DAVID J.

    2002-12-01

    Vibrational spectra can serve as chemical fingerprints for positive identification of chemical and biological warfare molecules. The required speed and sensitivity might be achieved with surface-enhanced Raman spectroscopy (SERS) using nanotextured metal surfaces. Systematic and reproducible methods for preparing metallic surfaces that maximize sensitivity have not been previously developed. This work sought to develop methods for forming high-efficiency metallic nanostructures that can be integrated with either gas or liquid-phase chem-lab-on-a-chip separation columns to provide a highly sensitive, highly selective microanalytical system for detecting current and future chem/bio agents. In addition, improved protein microchromatographic systems have been made by the creation of acrylate-based porous polymer monoliths that can serve as protein preconcentrators to reduce the optical system sensitivity required to detect and identify a particular protein, such as a bacterial toxin.

  4. NETWORK-CENTRIC WARFARE AND SOME PARTICULAR ASPECTS OF LOGISTICS BASED ON NETWORKING

    Directory of Open Access Journals (Sweden)

    Petrişor JALBĂ

    2015-04-01

    Full Text Available Within the framework of the current revolution in military affairs, at the End of the Cold War a new concept was born: the concept of War Based on Computer Networking or NCW Network Centric-Warfare which was established as a central element of modern military operations. Determined by theprogress recorded in the field of communication systems of all types, technology of information (HI-Tech, IT, war based on computer networking brings a change in the war paradigm and its inherent components In this respect, logistics based on computer networking represents one of the ways in which the reality of the battlefield is preserved which enhances the joint perspective upon the military forces.

  5. Love-wave sensors combined with microfluidics for fast detection of biological warfare agents.

    Science.gov (United States)

    Matatagui, Daniel; Fontecha, José Luis; Fernández, María Jesús; Gràcia, Isabel; Cané, Carles; Santos, José Pedro; Horrillo, María Carmen

    2014-01-01

    The following paper examines a time-efficient method for detecting biological warfare agents (BWAs). The method is based on a system of a Love-wave immunosensor combined with a microfluidic chip which detects BWA samples in a dynamic mode. In this way a continuous flow-through of the sample is created, promoting the reaction between antigen and antibody and allowing a fast detection of the BWAs. In order to prove this method, static and dynamic modes have been simulated and different concentrations of BWA simulants have been tested with two immunoreactions: phage M13 has been detected using the mouse monoclonal antibody anti-M13 (AM13), and the rabbit immunoglobulin (Rabbit IgG) has been detected using the polyclonal antibody goat anti-rabbit (GAR). Finally, different concentrations of each BWA simulants have been detected with a fast response time and a desirable level of discrimination among them has been achieved. PMID:25029282

  6. Naval electronic warfare simulation for effectiveness assessment and softkill programmability facility

    Science.gov (United States)

    Lançon, F.

    2011-06-01

    The Anti-ship Missile (ASM) threat to be faced by ships will become more diverse and difficult. Intelligence, rules of engagement constraints, fast reaction-time for effective softkill solution require specific tools to design Electronic Warfare (EW) systems and to integrate it onboard ship. SAGEM Company provides decoy launcher system [1] and its associated Naval Electronic Warfare Simulation tool (NEWS) to permit softkill effectiveness analysis for anti-ship missile defence. NEWS tool generates virtual environment for missile-ship engagement and counter-measure simulator over a wide spectrum: RF, IR, EO. It integrates EW Command & Control (EWC2) process which is implemented in decoy launcher system and performs Monte-Carlo batch processing to evaluate softkill effectiveness in different engagement situations. NEWS is designed to allow immediate EWC2 process integration from simulation to real decoy launcher system. By design, it allows the final operator to be able to program, test and integrate its own EWC2 module and EW library onboard, so intelligence of each user is protected and evolution of threat can be taken into account through EW library update. The objectives of NEWS tool are also to define a methodology for trial definition and trial data reduction. Growth potential would permit to design new concept for EWC2 programmability and real time effectiveness estimation in EW system. This tool can also be used for operator training purpose. This paper presents the architecture design, the softkill programmability facility concept and the flexibility for onboard integration on ship. The concept of this operationally focused simulation, which is to use only one tool for design, development, trial validation and operational use, will be demonstrated.

  7. Bioterrorism and Biological Warfare, from Past to the Present: A classic review

    Directory of Open Access Journals (Sweden)

    Majid Zare Bidaki

    2015-10-01

    Full Text Available Bioterrorism is defined as any terrorist action of intentional release or dissemination of highly pathogenic biological agents, including a variety of microorganisms or biological toxins. With the growing threat of terrorism, is necessary that the potential danger of various microorganisms – as a powerful tool of aggression and threat- to be taken seriously. This review tries to explain the concept of biological weapons and their historical development process with an emphasis on efforts to control the proliferation of these types of weapons over the last century. Potential impact of infectious diseases on people and armed forces was known from since 600 BC. Using the victims of the plague as a weapon in medieval warfare and spread of smallpox as a weapon during the war against the Indians when initially America was discovered, the development of biological weapons during the World War I, World War II and the Cold War, and even since the beginning of the third millennium, all show the strategic importance of pathogenic microorganisms as a deterrent power for the superiority of some governments and cults. Historical attempts to use infectious diseases as biological weapons reveal that the distinction between a natural outbreak of an infectious disease and that of a deliberate biological attack is very difficult. Abusing this characteristic of infectious diseases has made it possible for the purposes of superiority. International agreements to control the development of biological weapons, such as “the 1925 Geneva Protocol” and “the Convention on the Prohibition of the Development, Production and Stockpiling of Biological and Toxic Weapons” have not been able to control the development and using of biological warfare.  The current paper is a classic review (Overview article aiming at increasing the knowledge and awareness of people especially of health authorities and government officials.

  8. Research on the Interaction of Hydrogen-Bond Acidic Polymer Sensitive Sensor Materials with Chemical Warfare Agents Simulants by Inverse Gas Chromatography

    OpenAIRE

    Liu Yang; Qiang Han; Shuya Cao; Feng Huang; Molin Qin; Chenghai Guo; Mingyu Ding

    2015-01-01

    Hydrogen-bond acidic polymers are important high affinity materials sensitive to organophosphates in the chemical warfare agent sensor detection process. Interactions between the sensor sensitive materials and chemical warfare agent simulants were studied by inverse gas chromatography. Hydrogen bonded acidic polymers, i.e., BSP3, were prepared for micro-packed columns to examine the interaction. DMMP (a nerve gas simulant) and 2-CEES (a blister agent simulant) were used as probes. Chemical an...

  9. Research on Electronic Warfare Operational Simulation Experiment Design%电子对抗作战仿真实验设计研究

    Institute of Scientific and Technical Information of China (English)

    陶玉; 耿松涛; 王枭犇

    2013-01-01

      针对目前电子对抗作战仿真实验设计中存在的突出问题,对电子对抗作战仿真实验设计进行研究。介绍我军电子对抗作战仿真实验设计的发展现状,分析电子对抗作战仿真实验设计中存在的问题,提出结合实验目的规范电子对抗作战仿真实验设计的思路。该研究为实现电子对抗作战仿真实验设计的规范化、标准化做出了有益探索。%Aiming at the problems existed in designing electronic warfare operational simulation experiment, electronic warfare operational simulation experiment design is researched. It introduces the development situation of PLA’s electronic warfare operational simulation experiment firstly, analyses the problems in designing electronic warfare operational simulation experiment, and brings a design idea that combines it with experiment goals for electronic warfare operational simulation experiment. The research can offer reference for realize the normalization and standardization of electronic warfare campaign simulation experimental design.

  10. Chemical and biological warfare: Protection, decontamination, and disposal. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-11-01

    The bibliography contains citations concerning the means to defend against chemical and biological agents used in military operations, and to eliminate the effects of such agents on personnel, equipment, and grounds. Protection is accomplished through protective clothing and masks, and in buildings and shelters through filtration. Elimination of effects includes decontamination and removal of the agents from clothing, equipment, buildings, grounds, and water, using chemical deactivation, incineration, and controlled disposal of material in injection wells and ocean dumping. Other Published Searches in this series cover chemical warfare detection; defoliants; general studies; biochemistry and therapy; and biology, chemistry, and toxicology associated with chemical warfare agents.(Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  11. Chemical and biological warfare: Protection, decontamination, and disposal. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-10-01

    The bibliography contains citations concerning the means to defend against chemical and biological agents used in military operations, and to eliminate the effects of such agents on personnel, equipment, and grounds. Protection is accomplished through protective clothing and masks, and in buildings and shelters through filtration. Elimination of effects includes decontamination and removal of the agents from clothing, equipment, buildings, grounds, and water, using chemical deactivation, incineration, and controlled disposal of material in injection wells and ocean dumping. Other Published Searches in this series cover chemical warfare detection; defoliants; general studies; biochemistry and therapy; and biology, chemistry, and toxicology associated with chemical warfare agents. (Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  12. Modeling and Optimal Control of a Class of Warfare Hybrid Dynamic Systems Based on Lanchester (n,1 Attrition Model

    Directory of Open Access Journals (Sweden)

    Xiangyong Chen

    2014-01-01

    hybrid dynamic systems is established based on Lanchester equation in a (n,1 battle, where a heterogeneous force of n different troop types faces a homogeneous force. This model can be characterized by the interaction of continuous-time models (governed by Lanchester equation, and discrete event systems (described by variable tactics. Furthermore, an expository discussion is presented on an optimal variable tactics control problem for warfare hybrid dynamic system. The optimal control strategies are designed based on dynamic programming and differential game theory. As an example of the consequences of this optimal control problem, we take the (2, 1 case and solve the optimal strategies in a (2, 1 case. Simulation results show the feasibility of warfare hybrid system model and the effectiveness of the optimal control strategies designed.

  13. From energy-rich phosphate compounds to warfare agents: A review on the chemistry of organic phosphate compounds

    OpenAIRE

    Luciano Albino Giusti; Vanderlei Gageiro Machado

    2008-01-01

    The chemistry of the phosphorus-oxygen bond is widely used in biological systems in many processes, such as energy transduction and the storage, transmission and expression of genetic information, which are essential to living beings in relation to a wide variety of functions. Compounds containing this bond have been designed for many purposes, ranging from agricultural defense systems, in order to increase food production, to nerve agents, for complaining use in warfare. In this review, feat...

  14. An analysis of the Civilian Employee Reward System in use at Naval Air Warfare Center, Patuxent River, Maryland

    OpenAIRE

    Montgomery, John F.

    1999-01-01

    Approved for public release; distribution is unlimited An incentive system should motivate employees to increase productivity and find innovative ways to control costs. In 1998, Naval Air Warfare Center, Aircraft Division, (NAWCAD) instituted a new reward system. At the request of the NAWCAD, this thesis sought to evaluate the effectiveness of the new reward system from the perspective of the employees affected by the system. The thesis examined current literature on motivation theory with...

  15. Multifunctional ultra-high vacuum apparatus for studies of the interactions of chemical warfare agents on complex surfaces

    Energy Technology Data Exchange (ETDEWEB)

    Wilmsmeyer, Amanda R.; Morris, John R. [Department of Chemistry, Virginia Tech, Blacksburg, Virginia 24061 (United States); Gordon, Wesley O.; Mantooth, Brent A.; Lalain, Teri A. [Research and Technology Directorate, U.S. Army Edgewood Chemical Biological Center, Aberdeen Proving Ground, Maryland 21010 (United States); Davis, Erin Durke [OptiMetrics, Inc., Abingdon, Maryland 21009 (United States)

    2014-01-15

    A fundamental understanding of the surface chemistry of chemical warfare agents is needed to fully predict the interaction of these toxic molecules with militarily relevant materials, catalysts, and environmental surfaces. For example, rules for predicting the surface chemistry of agents can be applied to the creation of next generation decontaminants, reactive coatings, and protective materials for the warfighter. Here, we describe a multifunctional ultra-high vacuum instrument for conducting comprehensive studies of the adsorption, desorption, and surface chemistry of chemical warfare agents on model and militarily relevant surfaces. The system applies reflection-absorption infrared spectroscopy, x-ray photoelectron spectroscopy, and mass spectrometry to study adsorption and surface reactions of chemical warfare agents. Several novel components have been developed to address the unique safety and sample exposure challenges that accompany the research of these toxic, often very low vapor pressure, compounds. While results of vacuum-based surface science techniques may not necessarily translate directly to environmental processes, learning about the fundamental chemistry will begin to inform scientists about the critical aspects that impact real-world applications.

  16. Applicability of federal and state hazardous waste regulatory programs to waste chemical weapons and chemical warfare agents.; TOPICAL

    International Nuclear Information System (INIS)

    This report reviews federal and state hazardous waste regulatory programs that govern the management of chemical weapons or chemical warfare agents. It addresses state programs in the eight states with chemical weapon storage facilities managed by the U.S. Army: Alabama, Arkansas, Colorado, Indiana, Kentucky, Maryland, Oregon, and Utah. It also includes discussions on 32 additional states or jurisdictions with known or suspected chemical weapons or chemical warfare agent presence (e.g., disposal sites containing chemical agent identification sets): Alaska, Arizona, California, Florida, Georgia, Hawaii, Idaho, Illinois, Iowa, Kansas, Louisiana, Massachusetts, Michigan, Mississippi, Missouri, Nebraska, Nevada, New Jersey, New Mexico, New York, North Carolina, Ohio, Pennsylvania, South Carolina, South Dakota, Tennessee, Texas, the U.S. Virgin Islands, Virginia, Washington, Washington, D.C., and Wyoming. Resource Conservation and Recovery Act (RCRA) hazardous waste programs are reviewed to determine whether chemical weapons or chemical warfare agents are listed hazardous wastes or otherwise defined or identified as hazardous wastes. Because the U.S. Environmental Protection Agency (EPA) military munitions rule specifically addresses the management of chemical munitions, this report also indicates whether a state has adopted the rule and whether the resulting state regulations have been authorized by EPA. Many states have adopted parts or all of the EPA munitions rule but have not yet received authorization from EPA to implement the rule. In these cases, the states may enforce the adopted munitions rule provisions under state law, but these provisions are not federally enforceable

  17. Plastic antibody for the recognition of chemical warfare agent sulphur mustard.

    Science.gov (United States)

    Boopathi, M; Suryanarayana, M V S; Nigam, Anil Kumar; Pandey, Pratibha; Ganesan, K; Singh, Beer; Sekhar, K

    2006-06-15

    Molecularly imprinted polymers (MIPs) known as plastic antibodies (PAs) represent a new class of materials possessing high selectivity and affinity for the target molecule. Since their discovery, PAs have attracted considerable interest from bio- and chemical laboratories to pharmaceutical institutes. PAs are becoming an important class of synthetic materials mimicking molecular recognition by natural receptors. In addition, they have been utilized as catalysts, sorbents for solid-phase extraction, stationary phase for liquid chromatography and mimics of enzymes. In this paper, first time we report the preparation and characterization of a PA for the recognition of blistering chemical warfare agent sulphur mustard (SM). The SM imprinted PA exhibited more surface area when compared to the control non-imprinted polymer (NIP). In addition, SEM image showed an ordered nano-pattern for the PA of SM that is entirely different from the image of NIP. The imprinting also enhanced SM rebinding ability to the PA when compared to the NIP with an imprinting efficiency (alpha) of 1.3.

  18. China’s Three Warfares Strategy Mitigates Fallout From Cyber Espionage Activities

    Directory of Open Access Journals (Sweden)

    Emilio Iasiello

    2016-06-01

    Full Text Available China is engaged in longstanding cyber espionage against the U.S., as well as other nations, to collect sensitive public and private information in support of national objectives laid out in its 12th Five Year Plan. Foreign governments citing China’s malfeasance have rebuked these activities, a claim vehemently denied by Beijing. In response, China is leveraging the “Three Warfares” an integrated three-prong information warfare strategy to combat these accusations by leveraging Media, Legal, and Psychological components designed to influence the international community. While the United States has threatened the imposition of economic sanctions, Beijing has successfully parried consequential actions by arresting U.S.-identified hackers, thereby demonstrating its commitment toward preserving a stable and peaceful cyberspace. These interrelated “Three Warfares” disciplines have targeted the cognitive processes of the U.S. leadership, as well as the international public’s perception of China as a global threat, thereby having successfully forestalled the implementation of any effective punitive or economic deterrence strategy to include the imposition of cyber sanctions.

  19. Extraordinary Measures: Drone Warfare, Securitization, and the “War on Terror”

    Directory of Open Access Journals (Sweden)

    Romaniuk Scott Nicholas

    2015-07-01

    Full Text Available The use of unmanned aerial vehicles or “drones,” as part of the United States’ (US targeted killing (TK program dramatically increased after the War on Terror (WoT was declared. With the ambiguous nature and parameters of the WoT, and stemming from the postulation of numerous low-level, niche-, and other securitizations producing a monolithic threat, US drone operations now constitute a vital stitch in the extensive fabric of US counterterrorism policy. This article employs the theories of securitization and macrosecuritization as discussed by Buzan (1991, 2006, and Buzan and Wæver (2009 to understand targeted killing, by means of weaponized drones, as an extraordinary measure according to the Copenhagen School’s interpretation. An overarching securitization and the use of the “security” label warrants the emergency action of targeted killing through the use of drones as an extraordinary measure. We argue that the WoT serves as a means of securitizing global terrorism as a threat significant enough to warrant the use of drone warfare as an extraordinary use of force. By accepting the WoT as a securitization process we can reasonably accept that the US’ response(s against that threat are also securitized and therefore become extraordinary measures.

  20. Approximation and Filtering Techniques for Navigation Data in Time-critical Electronic Warfare Systems

    Directory of Open Access Journals (Sweden)

    Vanitha D.

    2013-03-01

    Full Text Available This paper presents a holistic solution to the navigation requirements in a time critical electronic warfare systems like missile warning systems (MWS. In a passive MWS using IR sensors the efficiency of the system is determined by attributes such as low false alarm rate, minimal response time and ability to track different IR radiating objects by association and correlation of consecutive detections through time. Such a system is required to be supported by a navigation system capable of accurate estimation of the aircraft position, attitude angles and altitude. In this paper, estimation techniques used to accurately calculate aircraft navigation data at the time of capture of IR frames are discussed. The paper discusses about synchronization of INGPS, IR sensors & Processor on to same timeline. The paper also intends to evaluate the performance of wavelet transform filter in effective elimination of noise in navigation parameters like acceleration and attitude angle rates for a better estimation of position and attitude.Defence Science Journal, 2013, 63(2, pp.204-209, DOI:http://dx.doi.org/10.14429/dsj.63.4265

  1. Medical effects of internal contamination with actinides: further controversy on depleted uranium and radioactive warfare.

    Science.gov (United States)

    Durakovic, Asaf

    2016-05-01

    The Nuclear Age began in 1945 with testing in New Mexico, USA, and the subsequent bombings of Hiroshima and Nagasaki. Regardless of attempts to limit the development of nuclear weapons, the current world arsenal has reached the staggering dimensions and presents a significant concern for the biosphere and mankind. In an explosion of a nuclear weapon, over 400 radioactive isotopes are released into the biosphere, 40 of which pose potential dangers including iodine, cesium, alkaline earths, and actinides. The immediate health effects of nuclear explosions include thermal, mechanical, and acute radiation syndrome. Long-term effects include radioactive fallout, internal contamination, and long-term genotoxicity. The current controversial concern over depleted uranium's somatic and genetic toxicity is still a subject of worldwide sustained research. The host of data generated in the past decades has demonstrated conflicting findings, with the most recent evidence showing that its genotoxicity is greater than previously considered. Of particular concern are the osteotropic properties of uranium isotopes due to their final retention in the crystals of exchangeable and nonexchangeable bone as well as their proximity to pluripotent stem cells. Depleted uranium remains an unresolved issue in both warfare and the search for alternative energy sources.

  2. Efficacy of liquid and foam decontamination technologies for chemical warfare agents on indoor surfaces.

    Science.gov (United States)

    Love, Adam H; Bailey, Christopher G; Hanna, M Leslie; Hok, Saphon; Vu, Alex K; Reutter, Dennis J; Raber, Ellen

    2011-11-30

    Bench-scale testing was used to evaluate the efficacy of four decontamination formulations on typical indoor surfaces following exposure to the liquid chemical warfare agents sarin (GB), soman (GD), sulfur mustard (HD), and VX. Residual surface contamination on coupons was periodically measured for up to 24h after applying one of four selected decontamination technologies [0.5% bleach solution with trisodium phosphate, Allen Vanguard Surface Decontamination Foam (SDF™), U.S. military Decon Green™, and Modec Inc. and EnviroFoam Technologies Sandia Decontamination Foam (DF-200)]. All decontamination technologies tested, except for the bleach solution, performed well on nonporous and nonpermeable glass and stainless-steel surfaces. However, chemical agent residual contamination typically remained on porous and permeable surfaces, especially for the more persistent agents, HD and VX. Solvent-based Decon Green™ performed better than aqueous-based bleach or foams on polymeric surfaces, possibly because the solvent is able to penetrate the polymer matrix. Bleach and foams out-performed Decon Green for penetrating the highly polar concrete surface. Results suggest that the different characteristics needed for an ideal and universal decontamination technology may be incompatible in a single formulation and a strategy for decontaminating a complex facility will require a range of technologies.

  3. Modified clay minerals efficiency against chemical and biological warfare agents for civil human protection.

    Science.gov (United States)

    Plachá, Daniela; Rosenbergová, Kateřina; Slabotínský, Jiří; Kutláková, Kateřina Mamulová; Studentová, Soňa; Martynková, Gražyna Simha

    2014-04-30

    Sorption efficiencies of modified montmorillonite and vermiculite of their mono ionic Na and organic HDTMA and HDP forms were studied against chemical and biological warfare agents such as yperite and selected bacterial strains. Yperite interactions with modified clay minerals were observed through its capture in low-density polyethylene foil-modified clay composites by measuring yperite gas permeation with using chemical indication and gas chromatography methods. The antibacterial activities of synthetized organoclays were tested against selected Gram-positive and Gram-negative bacterial species in minimum inhibitory concentration tests. The obtained results showed a positive influence of modified clay minerals on the significant yperite breakthrough-time increase. The most effective material was the polyethylene-Na form montmorillonite, while the polyethylene-Na form vermiculite showed the lowest efficiency. With increasing organic cations loading in the interlayer space the montmorillonite efficiency decreased, and in the case of vermiculite an opposite effect was observed. Generally the modified montmorillonites were more effective than modified vermiculites. The HDP cations seem to be more effective compare to the HDTMA. The antibacterial activity tests confirmed efficiency of all organically modified clay minerals against Gram-positive bacteria. The confirmation of antibacterial activity against Y. pestis, plague bacteria, is the most interesting result of this part of the study.

  4. Metabolic Syndrome in Chemical Warfare Patients with Chronic Obstructive Pulmonary Disease

    Directory of Open Access Journals (Sweden)

    Shahrzad M. Lari

    2014-11-01

    Full Text Available   Introduction: Sulfur mustard (SM, a toxic alkylating gas, can cause serious long-term pulmonary complications such as chronic obstructive pulmonary disease (COPD. Metabolic syndrome (MetS is one of the important comorbidities of COPD. This study was designed to evaluate the frequency of metabolic syndrome in Iranian chemical warfare patients (CWPs with COPD. Materials and Methods: Thirty CWPs with a mean age of 46.93± 6.8 were enrolled in this study. The following parameters were studied in: complete pulmonary function tests, health-related quality of life, serum triglycerides (TG, high density lipoprotein (HDL and fasting blood sugar (FBS levels. Additionally, 32 COPD patients and 56 healthy persons were considered as control groups who were matched to CWPs. Results: We found a statistically significant difference in the frequency of MetS between the COPD patients and the healthy control group (p=0.04. Additionally, we observed a statistically significant difference in the mean HDL levels among these groups (p=

  5. Chemical and Biological Warfare: Should Rapid Detection Techniques Be Researched To Dissuade Usage? A Review

    Directory of Open Access Journals (Sweden)

    Mark R. Hurst

    2005-01-01

    Full Text Available Chemistry, microbiology and genetic engineering have opened new doorways for the human race to propel itself to a better future. However, there is a darker side to Bioengineering. One element of this is the manufacture and proliferation of biological and chemical weapons. It is clearly in the interest of humankind to prevent the future use of such weapons of mass destruction. Though many agents have been proposed as potential biological and chemical weapons, the feasibility of these weapons is a matter of conjecture. The unpredictable and indiscriminate devastation caused by natural epidemics and hazardous chemicals during wartime without medical treatment should warn humans of the dangers of employing them as weapons. This study argues rapid detection techniques may dissuade future use. Many agents are far less toxic to treatment. A quick response time to most attacks will decrease the chances of serious health issues. The agent will be less effective and discourage the attacker from using the weapon. Fortunately, the Chemical and Biological Weapons Convention (CWCIBWC allows defensive work in the area of biological and chemical weapons. Consequently, the review will discuss history, delivery/dispersal systems and specific agents of the warfare. The study presents current developments in biosensors for toxic materials of defense interest. It concludes with future directions for biosensor development.

  6. Medical effects of internal contamination with actinides: further controversy on depleted uranium and radioactive warfare.

    Science.gov (United States)

    Durakovic, Asaf

    2016-05-01

    The Nuclear Age began in 1945 with testing in New Mexico, USA, and the subsequent bombings of Hiroshima and Nagasaki. Regardless of attempts to limit the development of nuclear weapons, the current world arsenal has reached the staggering dimensions and presents a significant concern for the biosphere and mankind. In an explosion of a nuclear weapon, over 400 radioactive isotopes are released into the biosphere, 40 of which pose potential dangers including iodine, cesium, alkaline earths, and actinides. The immediate health effects of nuclear explosions include thermal, mechanical, and acute radiation syndrome. Long-term effects include radioactive fallout, internal contamination, and long-term genotoxicity. The current controversial concern over depleted uranium's somatic and genetic toxicity is still a subject of worldwide sustained research. The host of data generated in the past decades has demonstrated conflicting findings, with the most recent evidence showing that its genotoxicity is greater than previously considered. Of particular concern are the osteotropic properties of uranium isotopes due to their final retention in the crystals of exchangeable and nonexchangeable bone as well as their proximity to pluripotent stem cells. Depleted uranium remains an unresolved issue in both warfare and the search for alternative energy sources. PMID:27002520

  7. Stem-loop oligonucleotide beacons as switches for amplifying-fluorescent-polymer-based biological warfare sensors

    Science.gov (United States)

    Clinkenbeard, Kenneth D.; Ramachandran, Akhilesh; Malayer, Jerry R.; Moon, Joong Ho; Hancock, Lawrence F.

    2003-09-01

    Sensors that are exceptionally sensitive with real-time outputs and minimal consumption of reagents are needed to continuously monitor air and water against bioterrorist incidents. Amplifying fluorescent polymers (AFP) provide exceptionally sensitive real-time reagentless sensor platforms as applied to detection of nitroaromatic explosives. This platform technology has the potential to be adapted to detect biological warfare (BW) agents by covalently attaching the 5" end of stem-loop molecular beacons to AFP as DNA hybridization signal transduction switches. Molecular beacons with loop sequences specific for sequence signatures of a target BW agent are configured with a quencher on the end of the 3" arm of the stem-loop. The AFP is quenched in the absence of target DNA, but upon hybridization with target the stem is melted, the duplex loop extended, and the AFP dequenched. This signal transduction is reversible upon removal of the target sequence with the molecular beacon reforming the stem-loop conformation. Proof-of-concept research has demonstrated that molecular beacons for signature sequences of Francisella tularensis result in correct identification of the presence of this agent in samples, but no false positives were seen with Escherichia coli.

  8. Detection of biological warfare agents with fiber-optic microsphere-based DNA arrays

    Science.gov (United States)

    Song, Linan; Walt, David R.

    2005-11-01

    Biological warfare agents (BWAs) pose significant threats to both military forces and civilian populations. The increased concern about bioterrorism has promoted the development of rapid, sensitive, and reliable detection systems to provide an early warning for detecting the release of BWAs. We have developed a high-density DNA array to detect BWAs in real environmental samples with fast response times and high sensitivity. An optical fiber bundle containing approximately 50,000 individual 3.1 μm diameter fibers was chemically etched to yield an array of microwells and used as the substrate for the array. 50-mer single-stranded DNA probes designed to be specific for target BWAs were covalently attached to 3.1-μm microspheres, and the microspheres were distributed into the microwells to form a randomized high-density DNA array. We demonstrated the applicability of this DNA array for the identification of Bacillus thuringiensis kurstaki, a BWA simulant, in real samples. PCR was used to amplify the sequences, introduce fluorescent labels into the target molecules, and provide a second level of specificity. After hybridization of test solutions to the array, analysis was performed by evaluating the specific responses of individual probes on the array.

  9. Mass spectrometric study of selected precursors and degradation products of chemical warfare agents.

    Science.gov (United States)

    Papousková, Barbora; Bednár, Petr; Frysová, Iveta; Stýskala, Jakub; Hlavác, Jan; Barták, Petr; Ulrichová, Jitka; Jirkovský, Jaromír; Lemr, Karel

    2007-12-01

    Selected precursors and degradation products of chemical warfare agents namely N,N-dialkylaminoethane-2-ols, N,N-dialkylaminoethyl-2-chlorides and some of related N-quaternary salts were studied by means of electrospray ionization-multiple tandem mass spectrometry (ESI-MS(n)). Proposed structures were confirmed with accurate mass measurement. General fragmentation patterns of these compounds are discussed in detail and suggested processes are confirmed using deuterated standards. The typical processes are elimination of alkene, hydrogen chloride, or water, respectively. Besides, elimination of ethene from propyl chain under specific conditions was observed and unambiguously confirmed using exact mass measurement and labelled standard. The potential of mass spectrometry to distinguish the positional isomers occurring among the studied compounds is reviewed in detail using two different MS instruments (i.e. ion trap and hybrid quadrupole-time of flight (Q-TOF) analyzer). A new microcolumn liquid chromatography (microLC)/MS(n) method was designed for the cases where the resolution based solely on differences in fragmentation is not sufficient. Low retention of the derivatives on reversed phase (RP) was overcome by using addition of less typical ion pairing agent (1 mM/l, 3,5-dinitrobenzoic acid) to the mobile phase (mixture water : acetonitrile). PMID:18085550

  10. Magnetic hydrophilic-lipophilic balance sorbent for efficient extraction of chemical warfare agents from water samples.

    Science.gov (United States)

    Singh, Varoon; Purohit, Ajay Kumar; Chinthakindi, Sridhar; Goud D, Raghavender; Tak, Vijay; Pardasani, Deepak; Shrivastava, Anchal Roy; Dubey, Devendra Kumar

    2016-02-19

    Magnetic hydrophilic-lipophilic balance (MHLB) hybrid resin was prepared by precipitation polymerization using N-vinylpyrrolidone (PVP) and divinylbenzene (DVB) as monomers and Fe2O3 nanoparticles as magnetic material. These resins were successfully applied for the extraction of chemical warfare agents (CWAs) and their markers from water samples through magnetic dispersive solid-phase extraction (MDSPE). By varying the ratios of monomers, resin with desired hydrophilic-lipophilic balance was prepared for the extraction of CWAs and related esters of varying polarities. Amongst different composites Fe2O3 nanoparticles coated with 10% PVP+90% DVB exhibited the best recoveries varying between 70.32 and 97.67%. Parameters affecting the extraction efficiencies, such as extraction time, desorption time, nature and volume of desorption solvent, amount of extraction sorbent and the effect of salts on extraction were investigated. Under the optimized conditions, linearity was obtained in the range of 0.5-500 ng mL(-1) with correlation ranging from 0.9911-0.9980. Limits of detection and limits of quantification were 0.5-1.0 and 3.0-5.0 ng mL(-1) respectively with RSDs varying from 4.88-11.32% for markers of CWAs. Finally, the developed MDSPE method was employed for extraction of analytes from water samples of various sources and the OPCW proficiency test samples. PMID:26814366

  11. Healthcare and warfare. Medical space, mission and apartheid in twentieth century northern Namibia.

    Science.gov (United States)

    Nord, Catharina

    2014-07-01

    In the year 1966, the first government hospital, Oshakati hospital, was inaugurated in northern South-West Africa. It was constructed by the apartheid regime of South Africa which was occupying the territory. Prior to this inauguration, Finnish missionaries had, for 65 years, provided healthcare to the indigenous people in a number of healthcare facilities of which Onandjokwe hospital was the most important. This article discusses these two agents' ideological standpoints. The same year, the war between the South-West African guerrillas and the South African state started, and continued up to 1988. The two hospitals became involved in the war; Oshakati hospital as a part of the South African war machinery, and Onandjokwe hospital as a 'terrorist hospital' in the eyes of the South Africans. The missionary Onandjokwe hospital was linked to the Lutheran church in South-West Africa, which became one of the main critics of the apartheid system early in the liberation war. Warfare and healthcare became intertwined with apartheid policies and aggression, materialised by healthcare provision based on strategic rationales rather than the people's healthcare needs. When the Namibian state took over a ruined healthcare system in 1990, the two hospitals were hubs in a healthcare landscape shaped by missionary ambitions, war and apartheid logic.

  12. Global physics: from percolation to terrorism, guerilla warfare and clandestine activities

    Science.gov (United States)

    Galam, Serge

    2003-12-01

    The September 11 attack on the US has revealed an unprecedented terrorism with worldwide range of destruction. It is argued to result from the first worldwide percolation of passive supporters. They are people sympathetic to the terrorism cause but without being involved with it. They just do not oppose it in case they could. This scheme puts suppression of the percolation as the major strategic issue in the fight against terrorism. Acting on the population is shown to be useless. Instead a new strategic scheme is suggested to increase the terrorism percolation threshold and in turn suppress the percolation. The relevant associated space is identified as a multi-dimensional social space including both the ground earth surface and all various independent flags displayed by the terrorist group. Some hints are given on how to shrink the geographical spreading of terrorism threat. The model apply to a large spectrum of clandestine activities including guerilla warfare as well as tax evasion, corruption, illegal gambling, illegal prostitution and black markets.

  13. Modern warfare as a significant form of zoogeomorphic disturbance upon the landscape

    Science.gov (United States)

    Hupy, Joseph P.; Koehler, Thomas

    2012-07-01

    The damage exerted by warfare on the physical landscape is one, of many, anthropogenic impacts upon the environment. Bombturbation is a term that describes the impacts of explosive munitions upon the landscape. Bombturbation, like many other forms of zoogeomorphology, is a disruptive force, capable of moving large amounts of sediments, and denuding landscapes to the point where changes in micro and mesotopography have long-term implications. The long term implication of bombturbative actions depends on the type and duration of explosive device that rendered the disturbance, and the geographic context of the landscape disturbed; i.e. cultural and physical factors. Recovery from bombturbative activity, in the context of this research, is measured by vegetative regrowth and soil development in cratered disturbances. A comparison and contrast between the two battlefields of Verdun, France and Khe Sanh, Vietnam show that bombturbative actions have significantly altered the topography at each location, thus influencing surface runoff and processes of soil development. Principals of the Runge pedogenic model, or the energy of water moving through the soil profile, best explain how the varying climate and parent material at each location influence post disturbance soil development rates. Whereas the data collected at Verdun suggest that explosive munitions have put that landscape on diverging path of development, thus rendering it much different post-disturbance landscape, Khe Sanh displays much different recovery patterns. Preliminary research at Khe Sanh indicates that reforestation and soil development following disturbance are not so much influenced by bombturbative patterns as land use activities in the area of study.

  14. Limitations and challenges in treatment of acute chemical warfare agent poisoning.

    Science.gov (United States)

    Thiermann, Horst; Worek, Franz; Kehe, Kai

    2013-12-01

    Recent news from Syria on a possible use of chemical warfare agents made the headlines. Furthermore, the motivation of terrorists to cause maximal harm shifts these agents into the public focus. For incidents with mass casualties appropriate medical countermeasures must be available. At present, the most important threats arise from nerve agents and sulfur mustard. At first, self-protection and protection of medical units from contamination is of utmost importance. Volatile nerve agent exposure, e.g. sarin, results in fast development of cholinergic crisis. Immediate clinical diagnosis can be confirmed on-site by assessment of acetylcholinesterase activity. Treatment with autoinjectors that are filled with 2mg atropine and an oxime (at present obidoxime, pralidoxime, TMB-4 or HI-6) are not effective against all nerve agents. A more aggressive atropinisation has to be considered and more effective oximes (if possible with a broad spectrum or a combination of different oximes) as well as alternative strategies to cope with high acetylcholine levels at synaptic sites should be developed. A further gap exists for the treatment of patients with sustained cholinergic crisis that has to be expected after exposure to persistent nerve agents, e.g. VX. The requirement for long-lasting artificial ventilation can be reduced with an oxime therapy that is optimized by using the cholinesterase status for guidance or by measures (e.g. scavengers) that are able to reduce the poison load substantially in the patients. For sulfur mustard poisoning no specific antidote is available until now. Symptomatic measures as used for treatment of burns are recommended together with surgical or laser debridement. Thus, huge amounts of resources are expected to be consumed as wound healing is impaired. Possible depots of sulfur mustard in tissues may aggravate the situation. More basic knowledge is necessary to improve substantially therapeutic options. The use of stem cells may provide a new

  15. Surface plasmon resonance detection of biological warfare agent Staphylococcal enterotoxin B using high affinity monoclonal antibody

    International Nuclear Information System (INIS)

    A novel sensitive method was developed for the detection as well as quantification of Staphylococcal enterotoxin B (SEB) using surface plasmon resonance (SPR). It is well known that the amount of SEB needed to cause the intoxication to human beings is very less and this concentration (0.02 μg/kg) is highly dangerous, hence, it is used as biological warfare agent. Thus, the need to develop a reliable and potential detection system against SEB is warranted. In the present work, SEB antibody was immobilized on carboxymethyldextran modified gold chip. The immobilization of SEB antibody and interaction of antigen with immobilized antibody were in-situ characterized by SPR and electrochemical impedance spectroscopy. A sample solution containing SEB antigen was injected in a working channel and the results revealed linearity in the concentration from 2.0 to 32.0 pM with a detection limit of 1.0 pM. By using kinetic evaluation software, KD (equilibrium constant) and Bmax (maximum binding capacity of analyte) values were calculated and found to be 13 pM and 424.23, respectively. Moreover, the thermodynamic parameter, change in Gibb's free energy was deduced and found to be -62.08 kJ/mol and this value shows the spontaneous interaction between SEB antigen and SEB antibody. In order to optimize the detection method, temperature and pH variation studies were also performed. Interference study was conducted to know the selectivity for the antigen-antibody interaction of SEB. The selectivity efficiency of SEB, SEC, SEA and SED were 100, 27.15, 20.01 and 12.05%, respectively towards SEB antibody.

  16. Multiple functional UV devices based on III-Nitride quantum wells for biological warfare agent detection

    Science.gov (United States)

    Wang, Qin; Savage, Susan; Persson, Sirpa; Noharet, Bertrand; Junique, Stéphane; Andersson, Jan Y.; Liuolia, Vytautas; Marcinkevicius, Saulius

    2009-02-01

    We have demonstrated surface normal detecting/filtering/emitting multiple functional ultraviolet (UV) optoelectronic devices based on InGaN/GaN, InGaN/AlGaN and AlxGa1-xN/AlyGa1-yN multiple quantum well (MQW) structures with operation wavelengths ranging from 270 nm to 450 nm. Utilizing MQW structure as device active layer offers a flexibility to tune its long cut-off wavelength in a wide UV range from solar-blind to visible by adjusting the well width, well composition and barrier height. Similarly, its short cut-off wavelength can be adjusted by using a GaN or AlGaN block layer on a sapphire substrate when the device is illuminated from its backside, which further provides an optical filtering effect. When a current injects into the device under forward bias the device acts as an UV light emitter, whereas the device performs as a typical photodetector under reverse biases. With applying an alternating external bias the device might be used as electroabsorption modulator due to quantum confined Stark effect. In present work fabricated devices have been characterized by transmission/absorption spectra, photoresponsivity, electroluminescence, and photoluminescence measurements under various forward and reverse biases. The piezoelectric effect, alloy broadening and Stokes shift between the emission and absorption spectra in different InGaN- and AlGaN-based QW structures have been investigated and compared. Possibilities of monolithic or hybrid integration using such multiple functional devices for biological warfare agents sensing application have also be discussed.

  17. Treatment of chemical warfare agents by zero-valent iron nanoparticles and ferrate(VI)/(III) composite

    International Nuclear Information System (INIS)

    Highlights: ► Ferrate(VI) has been found to be highly efficient to decontaminate chemical warfare agents. ► Fast degradation of sulfur mustard, soman and compound VX by ferrate(VI). ► Nanoscale zero-valent iron particles are considerably less efficient in degradation of studied warfare agents compared to ferrate(VI). - Abstract: Nanoscale zero-valent iron (nZVI) particles and a composite containing a mixture of ferrate(VI) and ferrate(III) were prepared by thermal procedures. The phase compositions, valence states of iron, and particle sizes of iron-bearing compounds were determined by combination of X-ray powder diffraction, Mössbauer spectroscopy and scanning electron microscopy. The applicability of these environmentally friendly iron based materials in treatment of chemical warfare agents (CWAs) has been tested with three representative compounds, sulfur mustard (bis(2-chlorethyl) sulfide, HD), soman ((3,3′-imethylbutan-2-yl)-methylphosphonofluoridate, GD), and O-ethyl S-[2-(diisopropylamino)ethyl] methylphosphonothiolate (VX). Zero-valent iron, even in the nanodimensional state, had a sluggish reactivity with CWAs, which was also observed in low degrees of CWAs degradation. On the contrary, ferrate(VI)/(III) composite exhibited a high reactivity and complete degradations of CWAs were accomplished. Under the studied conditions, the estimated first-order rate constants (∼10−2 s−1) with the ferrate(VI)/(III) composite were several orders of magnitude higher than those of spontaneous hydrolysis of CWAs (10−8–10−6 s−1). The results demonstrated that the oxidative technology based on application of ferrate(VI) is very promising to decontaminate CWAs.

  18. Information Warfare and New Organizational Landscapes: An Inquiry into the ExxonMobil–Greenpeace Dispute over Climate Change

    OpenAIRE

    Mackay, Brad; Munro, I.

    2012-01-01

    A defining characteristic of the emergence of new organizational landscapes is that information is not just being used as a tool by organizations, as it is more usually understood, but also as a weapon in a ‘war of position’. As organizations seek to influence public perception over such emotive issues as climate change, conflict at the ideation level can give rise to information warfare campaigns. In this article, we analyse the ways in which ExxonMobil and Greenpeace employ distinctive info...

  19. Investigations of emergency destruction methods for recovered, explosively configured, chemical warfare munitions: Interim emergency destruction methods - evaluation report

    Energy Technology Data Exchange (ETDEWEB)

    Baer, M.R.; Cooper, P.W.; Kipp, M.E. [and others

    1995-07-01

    At the request of the U.S. Army Non-Stockpile Chemical Material Office, the Sandia Explosives Containment System Design Team investigated mature destruction systems for destroying recovered chemical warfare munitions (CWM). The goal of the investigations was to identify and examine available techniques for the destruction of recovered CWM. The result of this study is a recommendation for an interim solution, a solution for use on any munitions found while an optimal, long-term solution is developed. Sandia is also performing the long-term solution study to develop a system that destroys CWM, contains the blast and fragments, and destroys the chemical agent without insult to the environment.

  20. Chemical and biological warfare: Biochemistry, therapy, and treatment. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-12-01

    The bibliography contains citations concerning biochemistry, therapy, and treatment of the effects of military chemical and biological warfare agents. References include surveys and studies of immunizing agents and drugs, the efficacy of these drugs, and the effect of the drugs on the patient. Also included are biochemical studies, assay techniques, and antidote development, some of which is supported by animal studies. Citations concerning detection and warning, defoliants, protection, biology and toxicology, and general studies are covered in separate bibliographies.(Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  1. Chemical and biological warfare: Biochemistry, therapy, and treatment. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-11-01

    The bibliography contains citations concerning biochemistry, therapy, and treatment of the effects of military chemical and biological warfare agents. References include surveys and studies of immunizing agents and drugs, the efficacy of these drugs, and the effect of the drugs on the patient. Also included are biochemical studies, assay techniques, and antidote development, some of which is supported by animal studies. Citations concerning detection and warning, defoliants, protection, biology and toxicology, and general studies are covered in separate bibliographies.(Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  2. 竞技排球运动心理战理论模型的构建%Theoretical Models of Psychological Warfare Built in Competitive Volleyball

    Institute of Scientific and Technical Information of China (English)

    洪庆

    2011-01-01

    通过对军事心理学中心理战思想的精心研读,结合竞技排球运动与战场心理战的共通之处,从理论建设、专业人才建设、规章制度建设、谋略创新建设以及球队心理素质建设五个方面构建了竞技排球运动心理战的理论模型。%This article through the study of thoughts of psychological warfare in military psychology carefully, combined with the commons of volleyball and psychological warfare, from five aspects that construction of theory, construction of professional, and construction of rules and regulations, construction of counsel innovation and construction of team psychological quality to construct the theoretical model of psychological warfare of volleyball.

  3. Research on the Interaction of Hydrogen-Bond Acidic Polymer Sensitive Sensor Materials with Chemical Warfare Agents Simulants by Inverse Gas Chromatography

    Directory of Open Access Journals (Sweden)

    Liu Yang

    2015-06-01

    Full Text Available Hydrogen-bond acidic polymers are important high affinity materials sensitive to organophosphates in the chemical warfare agent sensor detection process. Interactions between the sensor sensitive materials and chemical warfare agent simulants were studied by inverse gas chromatography. Hydrogen bonded acidic polymers, i.e., BSP3, were prepared for micro-packed columns to examine the interaction. DMMP (a nerve gas simulant and 2-CEES (a blister agent simulant were used as probes. Chemical and physical parameters such as heats of absorption and Henry constants of the polymers to DMMP and 2-CEES were determined by inverse gas chromatography. Details concerning absorption performance are also discussed in this paper.

  4. Coalition Warfare Program (CWP): secure policy controlled information query and dissemination over a Bices network

    Science.gov (United States)

    Toth, Andrew; Pham, Tien; Karr, Todd; Bent, Graham; Harries, Dominic; Knox, Alan

    2013-05-01

    In 2006, the US Army Research Laboratory (ARL) and the UK Ministry of Defence (MoD) established a collaborative research alliance with academia and industry, called the International Technology Alliance (ITA) to address fundamental issues concerning Network and Information Sciences. Under the ITA research program, a US-UK transition project on "ITA Policy Controlled Information Query and Dissemination" was funded in 2011 by OSD's Coalition Warfare Program (CWP). The goal of this CWP project is to develop an extensible capability of performing distributed federated query and information dissemination across a coalition network of distributed disparate data/information sources with access­ controlled policies. The CWP project is lead by US Army Research Laboratory (ARL) and UK Defence Science Technology Laboratory (Dstl) with software development by IBM UK and IBM US. The CWP project exploits two key technology components developed within the ITA, namely the Gaian Database and integrated Access Policy Decision and Enforcement mechanisms. The Gaian Database (GaianDB) is a Dynamic Distributed Federated Database (DDFD) that addresses a need to share information among coalition members by providing a means for policy-controlled access to data across a network of heterogeneous data sources. GaianDB implements a SQL-compliant Store-Locally-Query-Anywhere (SLQA) approach providing software applications with global access to data from any node in the database network via standard SQL queries. Security policy is stored locally and enforced at the database node level, reducing potential for unauthorized data access and waste of network bandwidth. A key metric of success for a CWP project is the transition of coalition-related technology from TRL-3 or 4 to TRL-6 or higher. Thus, the end goal of this CWP project was to demonstrate the GaianDB and policy technology within an operational environment at the NATO Intelligence Fusion Centre (NIFC) at Molesworth RAF. An initial

  5. Interleukin-6 and airflow limitation in chemical warfare patients with chronic obstructive pulmonary disease

    Directory of Open Access Journals (Sweden)

    Davood Attaran

    2010-09-01

    disease, interleukin-6, inflammation, chemical warfare

  6. Secondary ionization of chemical warfare agent simulants: atmospheric pressure ion mobility time-of-flight mass spectrometry.

    Science.gov (United States)

    Steiner, Wes E; Clowers, Brian H; Haigh, Paul E; Hill, Herbert H

    2003-11-15

    For the first time, the use of a traditional ionization source for ion mobility spectrometry (radioactive nickel ((63)Ni) beta emission ionization) and three alternative ionization sources (electrospray ionization (ESI), secondary electrospray ionization (SESI), and electrical discharge (corona) ionization (CI)) were employed with an atmospheric pressure ion mobility orthogonal reflector time-of-flight mass spectrometer (IM(tof)MS) to detect chemical warfare agent (CWA) simulants from both aqueous- and gas-phase samples. For liquid-phase samples, ESI was used as the sample introduction and ionization method. For the secondary ionization (SESI, CI, and traditional (63)Ni ionization) of vapor-phase samples, two modes of sample volatilization (heated capillary and thermal desorption chamber) were investigated. Simulant reference materials, which closely mimic the characteristic chemical structures of CWA as defined and described by Schedule 1, 2, or 3 of the Chemical Warfare Convention treaty verification, were used in this study. A mixture of four G/V-type nerve simulants (dimethyl methylphosphonate, pinacolyl methylphosphonate, diethyl phosphoramidate, and 2-(butylamino)ethanethiol) and one S-type vesicant simulant (2-chloroethyl ethyl sulfide) were found in each case (sample ionization and introduction methods) to be clearly resolved using the IM(tof)MS method. In many cases, reduced mobility constants (K(o)) were determined for the first time. Ion mobility drift times, flight times, relative signal intensities, and fragmentation product signatures for each of the CWA simulants are reported for each of the methods investigated. PMID:14615983

  7. Capillary zone electrophoresis analysis and detection of mid-spectrum biological warfare agents. Suffield memorandum No. 1463

    Energy Technology Data Exchange (ETDEWEB)

    Boulet, C.A.

    1995-12-31

    Mid-spectrum biological warfare agents such as proteins, peptides, and toxins are often difficult to analyze and often require individually developed assay methods for detection and identification. In this regard, capillary electrophoresis is an important, emerging technique for separation and quantitation of peptides and proteins, providing separation efficiencies up to two orders of magnitude greater than high performance liquid chromatography. The technique can also analyze a broad range of compounds, has a simple instrument design which can be automated, and has low sample volume requirements. In this study, a highly efficient and reproducible capillary zone electrophoresis method was developed to separate and identify a series of nine peptides of defense interest including bradykinin, leucine enkephalin, and oxytocin. The paper demonstrates three strategies which could be used in a fully automated field detection and identification system for unknown peptides.

  8. Biological warfare warriors, secrecy and pure science in the Cold War: how to understand dialogue and the classifications of science.

    Science.gov (United States)

    Bud, Robert

    2014-01-01

    This paper uses a case study from the Cold War to reflect on the meaning at the time of the term 'Pure Science'. In 1961, four senior scientists from Britain's biological warfare centre at Porton Down visited Moscow both attending an International Congress and visiting Russian microbiological and biochemical laboratories. The reports of the British scientists in talking about a limited range of topics encountered in the Soviet Union expressed qualities of openness, sociologists of the time associated with pure science. The paper reflects on the discourses of "Pure Science", secrecy and security in the Cold War. Using Bakhtin's approach, I suggest the cordial communication between scientists from opposing sides can be seen in terms of the performance, or speaking, of one language among several at their disposal. Pure science was the language they were allowed to share outside their institutions, and indeed political blocs.

  9. Evaluation of Molecular Markers and Analytical Methods Documenting the Occurrence of Mustard Gas and Arsenical Warfare Agents in Soil.

    Science.gov (United States)

    Sassolini, Alessandro; Brinchi, Giampaolo; Di Gennaro, Antonio; Dionisi, Simone; Dominici, Carola; Fantozzi, Luca; Onofri, Giorgio; Piazza, Rosario; Guidotti, Maurizio

    2016-09-01

    The chemicals warfare agents (CWAs) are an extremely toxic class of molecules widely produced in many industrialized countries for decades, these compounds frequently contained arsenic. The plants where the CWAs have been produced or the plants where they have been demilitarized after the Second World War with unacceptable techniques can represent a serious environmental problem. CWAs standards are difficult to find on market so in present work an environmental assessment method based on markers has been proposed. Triphenylarsine, phenylarsine oxide and thiodiglycol have been selected as markers. Three reliable analytical methods based on gaschromatography and mass detection have been proposed and tested for quantitative analysis of markers. Methods performance have been evaluated testing uncertainty, linearity, recovery and detection limits and also comparing detection limits with exposure limits of reference CWAs. Proposed assessment methods have been applied to a case study of a former industrial plant sited in an area characterized by a high background of mineral arsenic. PMID:27385368

  10. 网络电磁空间作战威胁分析%Analysis of Cyber Electromagnetic Space Warfare Threat

    Institute of Scientific and Technical Information of China (English)

    栾胜利

    2014-01-01

    提出了网电空间作战几个需要关注的问题以及解决方案,使得部队可以根据战场具体环境,进行适应性的应用。首先陈述了网电空间作战的特点,接着阐述了在网电空间中军队所要面临、应对的现实威胁。然后针对这些威胁进行了进一步分析,并且确定了战场环境下所需要的基础安全条件。最后从四个层面阐述了网电空间的脆弱性,同时给出了防御措施。该工作可以对确立可实施的网电空间战术以及有效地组织网电空间行动形成支撑。%A cyber warfare scenario is shown ,which is applicable on the basis of modern battlefield situations .The sce-nario removes misconceptions about present cyber warfare properties and defines actual dangers that should be prepared for in the background of the cyberspace .The dangers are analyzed further and the basic security prerequisites are determined . Technologies are proposed that offer the basic necessary for achieving these prerequisites .An organization of cyberspace weaknesses and the correlative defenses in four levels is shown .Conclusions are drawn that demonstrate the manner in which cyber threats should be determined ,their likelihood assessed and averted .This knowledge leads to the determination of im-plementable cyber tactics and effective organization of cyber operations .

  11. BISTATIC SONOBUOY DEPLOYMENT CONFIGURATION FOR STATIONARY TARGETS

    OpenAIRE

    KARATAŞ, Mümtaz; Gülşen AKMAN

    2015-01-01

    Countering submerged targets using bistatic and multistatic sonobuoy systems is a fundamental problem in Anti-Submarine Warfare. A key question is: what is the best deployment geometry of sensors to successfully detect a submarine threat in a field of interest? The unique properties of these systems distinguish this problem from the conventional ones. This paper examines the optimum deployment strategies of bistatic sonobuoys against stationary or low speed targets. 

  12. Proposal for a spintronic femto-Tesla magnetic field sensor

    OpenAIRE

    Bandyopadhyay, S.; Cahay, M.

    2004-01-01

    We propose a spintronic magnetic field sensor, fashioned out of quantum wires, which may be capable of detecting very weak magnetic fields with a sensitivity of ~ 1 femto-Tesla per root Hertz at a temperature of 4.2 K and ~ 80 femto-Tesla per root Hertz at room temperature. Such sensors have applications in magnetometry, quantum computing, solid state nuclear magnetic resonance, magneto-encephalography, mine detection, ground incursion detection and anti-submarine warfare.

  13. 未来海上信息战的舰载雷达技术发展研究%Development of Shipborne Radar Technology in Future Information Warfare

    Institute of Scientific and Technical Information of China (English)

    李爱文

    2015-01-01

    This paper first analyzes the demand of shipborne radar in the future information warfare at sea .And then the development ideas about shipborne radar technique adapted for future information warfare at sea are elaborated including shipborne radar networking ,multi‐sensor information fusion ,shipborne electronic equipment integration .%从未来海上信息战对舰载雷达提出的要求出发,阐述了适应未来海上信息战的舰载雷达技术发展思路:舰载雷达组网、多传感器信息融合、与舰载电子设备的一体化和集成化等。

  14. Factors influencing the sustained-performance capabilities of 155-mm howitzer sections in simulated conventional and chemical warfare environments. Technical report

    Energy Technology Data Exchange (ETDEWEB)

    Rauch, T.M.; Banderet, L.E.; Tharion, W.J.; Munro, I.; Lussier, A.R.

    1986-04-01

    Factors that limit the performance capabilities of sustained artillery operations in simulated conventional and chemical warfare environments were studied. The results show that perceptions of psychological (mental) fatigue, rather than perceptions of muscular fatigue, were primary factors affecting sustained artillery performance. Furthermore, variations in these psychological states were correlated with artillery task performance during the period. In the simulated chemical warfare environment, extreme symptom and mood changes resulted in medical casualties, combat ineffectiveness, and early termination of all testing. Significant perosnality differences existed between casualties and survivors. The majority of casualties voluntarily terminated operational duties because of intense symptoms associated with wearing the chemical protective mask and clothing system. These symptoms were manifestations of respiratory and thermal stress.

  15. Toxin warfare agents:recognition molecules and drugs for control%生物毒素战剂:检测识别分子与防治药物

    Institute of Scientific and Technical Information of China (English)

    王景林

    2011-01-01

    There are various types of toxins in nature. However, these toxins. which are characterized by the ready availability, easy production and high toxicity, are likely biological warfare agents. Toxin warfare agents are different from traditional bacterial and viral agents or from chemical warfare agents in that they pose a great threat because of their diverse potency and the lack of efficacious drugs. Therefore, it is quite important to develop specific. sensitive recognition molecules for detection of toxins and drugs against intoxication caused by toxin agents. This review focuses on advances in recognition molecules of toxins and some drugs used as prevention and treatment hased on the characteristics of toxin warfare agents .%自然界中存在着种类繁多的毒素物质,但最有可能用作战剂的是那些获取方便、制备容易、毒性强、施放后可致人死亡或失能的毒素.毒素战剂既不同于传统的细菌、病毒战剂,也不同于化学毒剂,其最大的威胁来自它的高毒性及缺乏有效的治疗手段.因此,发展毒素战剂的检测识别分子与防治药物就显得尤为重要.本文讨论了生物毒素战剂相关概念、特征,重点综述了毒素战剂的检测识别分子与防治药物研究进展.

  16. Assessing victory: how to identify the correct measures of success in counterinsurgency warfare-the case of the FARC in Colombia

    OpenAIRE

    Korn, Alexander B.

    2013-01-01

    Approved for public release; distribution is unlimited This thesis applies net assessment to the Colombian Governments protracted campaign against the Revolutionary Armed Forces of Colombia (FARC) in order to determine proper metrics to track progress in counterinsurgency warfare. Net assessment is used to analyze potential centers of gravity to determine the correct center of gravity. Armed with the correct center of gravity, potential critical vulnerabilities are examined. Finally, once ...

  17. How Do I Know? A Guide to the Selection of Personal Protective Equipment for Use in Responding to A Release of Chemical Warfare Agents

    Energy Technology Data Exchange (ETDEWEB)

    Foust, C.B.

    1999-05-01

    An incident involving chemical warfare agents requires a unique hazardous materials (HAZMAT) response. As with an HAZMAT event, federal regulations prescribe that responders must be protected from exposure to the chemical agents. But unlike other HAZMAT events, special considerations govern selection of personal protective equipment (PPE). PPE includes all clothing, respirators and monitoring devices used to respond to a chemical release. PPE can differ depending on whether responders are military or civilian personnel.

  18. Development of Quantitative Real-Time PCR Assays for Detection and Quantification of Surrogate Biological Warfare Agents in Building Debris and Leachate▿

    OpenAIRE

    Pascal E. Saikaly; Barlaz, Morton A.; de los Reyes, Francis L.

    2007-01-01

    Evaluation of the fate and transport of biological warfare (BW) agents in landfills requires the development of specific and sensitive detection assays. The objective of the current study was to develop and validate SYBR green quantitative real-time PCR (Q-PCR) assays for the specific detection and quantification of surrogate BW agents in synthetic building debris (SBD) and leachate. Bacillus atrophaeus (vegetative cells and spores) and Serratia marcescens were used as surrogates for Bacillus...

  19. 数据挖掘在现代作战中的应用研究%Research on the Application of Data Mining to Modern Warfare

    Institute of Scientific and Technical Information of China (English)

    张剑

    2012-01-01

    随着装备技术的发展,现代作战具有作战单元种类数量多、攻防战术复杂、干扰性欺骗性数据充斥等特点,尤其是协同作战能力和数据交换能力逐步增强,以上都使得现代作战中涉及的信息呈现“海量”特征.为了取得理想的作战效果,指挥员必须对以上海量信息进行处理,从中提取出有用的信息和知识.近年来迅速发展的数据挖掘技术,在处理海量信息方面具有非常明显的优势.文章在介绍现代作战特点和数据挖掘技术的基础上,对数据挖掘技术在现代作战中的应用做了初步的研究.%The development of equipment technology makes the modern warfare has large numbers and many types of combat units, more complex offensive and defensive tactics, so full of interference and fraudulent data, and especially the cooperative engagement capability and data exchange capability are gradually increasing. Above features lead to massive information involved in modern warfare. In order to a-chieve the desired combat effect, commanders must handle massive information involved to extract useful information and knowledge. Data mining technology which is developing rapidly in recent years has a big advantage in handling massive information. This paper describes the characteristics of modern warfare and data mining technology, and makes a preliminary study on the application of data mining technology to modem warfare.

  20. 大数据在现代战争中的价值探析%Research on the Big Data’s Value in Modern Warfare

    Institute of Scientific and Technical Information of China (English)

    李新乐

    2014-01-01

    Modern warfare is information-dominated. Information penetrates the all aspects of the warfare and becomes one of the key factors which influence the success of the warfare. Effective acquisition, storage, processing and distribution of military in-formation via big data technology can promote the ability of intelligence acquisition and command decision-making, handle the choke point of information flow, advance the integration of operational system, and strengthen the information security and pro-tection.%现代战争是“信息主导”的战争,信息渗透到战争的方方面面,成为影响战争胜负的重要因素之一,利用大数据技术对军事信息进行高效获取、存储、处理和分发,能够有效提升情报获取、指挥决策能力,疏通信息流瓶颈,推进作战体系融合,增强信息安全防护能力。

  1. Warfare and Socio-political hierarchies: reflections on non-State societies of the predynastic Nile Valley

    Directory of Open Access Journals (Sweden)

    Gayubas, Augusto

    2015-12-01

    Full Text Available In a recent article, anthropologist Robert L. Carneiro reassessed his most debated hypothesis about the emergence of chiefdoms and the State as a result of environmental or social circumscription, theorized for a series of historical contexts including that of the Predynastic Nile Valley. The problem of the origin of the State is beyond our scope, but regarding the emergence of institutionalized leadership and chiefdoms in the Nile Valley, Carneiro’s ideas about warfare as a main factor in the process of social change remain interesting, even when his insistence in circumscription is still debatable. The aim of the present paper is to briefly review the available archaeological evidence of warfare among non-State societies of the Predynastic Nile Valley, and to evaluate its possible relation to the emergence of socio-political hierarchies, in turn refering to and criticizing some of Carneiro’s recent ideas about the issue.En un artículo reciente, Robert L. Carneiro presentó una reconsideración de su muy debatida hipótesis acerca de la emergencia de sociedades de jefatura y del Estado como resultado de un contexto de circunscripción ambiental, teorizada para una serie de situaciones históricas, entre ellas el valle del Nilo predinástico. El problema del origen del Estado excede las posibilidades de este trabajo, pero en lo que respecta al surgimiento de jefaturas, consideramos que las ideas de Carneiro acerca de la guerra como factor de importancia en el proceso revisten cierto interés, aun cuando su insistencia en la circunscripción continúa siendo discutible. El objetivo del presente artículo es considerar la evidencia arqueológica de guerra disponible para las sociedades no estatales del valle del Nilo predinástico y evaluar la posible relación entre dichos testimonios y la emergencia de jerarquías sociopolíticas, refiriendo y criticando algunas de las ideas recientes de Carneiro sobre el problema.

  2. The Findings of HRCT of the Lung in Chemical Warfare Veterans with Previous Sulfur Mustard (SM Gas Exposure

    Directory of Open Access Journals (Sweden)

    Saeed Naghibi

    2009-01-01

    Full Text Available "nIntroduction: To identify the findings of High-Resolution Computed Tomography (HRCT of the lung in chemical warfare veterans with previous sulfur mustard (SM gas exposure. "nMaterials and Methods: 93 patients were studied prospectively 22 years after exposure. Demographic and clinical data were recorded. HRCT of the lung was performed during expiration and was reported double blinded by two radiologists. HRCT findings include air trapping, mosaic attenuation, ground glass attenuation, nodules, signet ring, fibrosis, bronchial wall thickening, bronchodilation, tree in bud, interlobular wall thickening, bulla, cavity, air consolidation, honey comb and mediastinal and pleural abnormalities that were analyzed. Final diagnosis was identified according to HRCT findings. The relation between HRCT findings, final diagnosis and the distribution of the abnormalities with duration after exposure were evaluated. Distribution of each finding was also evaluated. "nb The most frequent HRCT finding was air trapping (56.7%. Other common findings were mosaic attenuation (35.1%, ground glass attenuation (20.6%, nodules (17.5%, signet ring (15.5% and fibrosis(12.4%. Distribution of the abnormalities were mostly local (79.4% and bilateral (73%. Abnormalities were mostly in the lower lobe (61.3%. No significant correlation was found between the HRCT findings and the duration after exposure or distribution of the abnormalities. The respiratory complications diagnosed according to HRCT included bronchiolitis obliterans (43%, chronic obstructive pulmonary disease (COPD (27.9%, asthma (23.6%, bronchiectasis (13.9%, interstitial lung disease (ILD (9.6%. All abnormalities were seen more frequently in patients with lesser duration of exposure.( P-value < 0.05. "nConclusion: Focal bilateral air trapping was the most common finding seen in expiratory HRCT in this study, and it is highly suggestive of bronchiolitis obliterance (BO. BO can be a late complication of SM

  3. Interpretation of a New Found Japanese Biological Warfare File%对一份新发现日本细菌战档案的解读

    Institute of Scientific and Technical Information of China (English)

    宫文婧

    2016-01-01

    Unit 731 focused on the research of Biological Warfare theory in the plan of biological warfare , But be-cause? of lack of evidence chain , this research is relatively backward .Entry Hojo who was the core member of Unit 731 , his speech draft On Biological Warfareis the recently found materials and evidences , has great academic research value.Through the interpretation of the Biological Warfare , analyzing the biological warfare is the vital criterion to e-valuate the research level and research competence , which is also an effective supplement to the evidences for the Jap-anese biological warfare war of aggression against China .%七三一部队在细菌战谋划中注重对细菌战理论的研究,但囿于相关证据链的缺失,致使此项研究相对滞后。七三一部队核心成员北条圆了的演讲稿《关于细菌战》作为新资料、新证据,具有重大的学术研究价值,是对国内所藏相关资料的重要补充,有助于丰富学术界对于日本细菌战理论问题的认知。《关于细菌战》是北条圆了在长期实践基础上积累形成的细菌战理论,可以在一定程度上还原战时日本细菌战的研究情况。通过对北条圆了其人及《关于细菌战》的梳理和解读,进而剖析日本细菌战理论是评估二战时期日本细菌战研究水平和研究能力的重要尺度,也是对日本侵华细菌战证据链的有效补充。

  4. Child Soldiery as a Tool of Modern Warfare(?: the Role of Child Soldiers in “New Wars”

    Directory of Open Access Journals (Sweden)

    Dóra SZIJJ

    2010-12-01

    Full Text Available The hardly-known but regrettably prevalent phenomenon of child soldiery, which can be considered as a new development of modern warfare, might affect approximately 250,000 – 300,000 children worldwide. According to the estimates, 40% of our planet’s armed forces or armed groups deploy “child combatants” for different tasks, while the international community is still struggling against this form of the abuse of children. The global nature of child soldiery raises many questions in many fields, because it has deep political, social, economic, military, environmental, ethnic and religious etc. roots and far reaching consequences in the so-called Third World. Moreover, if we focus on the African peacekeeping missions of the European Union, child soldiery might also have indirect impacts on the European community. The aim of this study is to offer a comprehensive approach in connection with child soldiery, and pointing out the links between the post-colonial conflicts and this form of human rights breaches.

  5. Maximum Likelihood Estimator for Bearings-only Passive Target Tracking in Electronic Surveillance Measure and Electronic Warfare Systems

    Directory of Open Access Journals (Sweden)

    S. Koteswara Rao

    2010-03-01

    Full Text Available Maximum likelihood estimator is a suitable algorithm for passive target tracking applications. Nardone, Lindgren and Gong introduced this approach using batch processing. In this paper, the batch processing is converted into sequential processing for real-time applications like passive target tracking using bearings-only measurements. Adaptively, the variance of each measurement is computed and is used along with the measurement in such a way that the effect of false bearings can be reduced. The transmissions made by radar on a target ship are assumed to be intercepted by an electronic warfare (EW system of own ship. The generated bearings in intercept mode are processed through maximum likelihood estimator (MLE to find out target motion parameters. Instead of assuming some arbitrary values, pseudo linear estimator outputs are used for the initialisation of MLE. The algorithm is tested in Monte-Carlo simulation and its results are presented for two typical scenarios.Defence Science Journal, 2010, 60(2, pp.197-203, DOI:http://dx.doi.org/10.14429/dsj.60.340

  6. Distribution of chemical warfare agent, energetics, and metals in sediments at a deep-water discarded military munitions site

    Science.gov (United States)

    Briggs, Christian; Shjegstad, Sonia M.; Silva, Jeff A. K.; Edwards, Margo H.

    2016-06-01

    There is a strong need to understand the behavior of chemical warfare agent (CWA) at underwater discarded military munitions (DMM) sites to determine the potential threat to human health or the environment, yet few studies have been conducted at sites in excess of 250 m, the depth at which most U.S. chemical munitions were disposed. As part of the Hawai'i Undersea Military Munitions Assessment (HUMMA), sediments adjacent to chemical and conventional DMM at depths of 400-650 m were sampled using human occupied vehicles (HOVs) in order to quantify the distribution of CWA, energetics, and select metals. Sites in the same general area, with no munitions within 50 m in any direction were sampled as a control. Sulfur mustard (HD) and its degradation product 1,4-dithiane were detected at each CWA DMM site, as well as a single sample with the HD degradation product 1,4-thioxane. An energetic compound was detected in sediment to a limited extent at one CWA DMM site. Metals common in munitions casings (i.e., Fe, Cu, and Pb) showed similar trends at the regional and site-wide scales, likely reflecting changes in marine sediment deposition and composition. This study shows HD and its degradation products can persist in the deep-marine environment for decades following munitions disposal.

  7. The application of single particle aerosol mass spectrometry for the detection and identification of high explosives and chemical warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Martin, Audrey Noreen [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2006-01-01

    Single Particle Aerosol Mass Spectrometry (SPAMS) was evaluated as a real-time detection technique for single particles of high explosives. Dual-polarity time-of-flight mass spectra were obtained for samples of 2,4,6-trinitrotoluene (TNT), 1,3,5-trinitro-1,3,5-triazinane (RDX), and pentaerythritol tetranitrate (PETN); peaks indicative of each compound were identified. Composite explosives, Comp B, Semtex 1A, and Semtex 1H were also analyzed, and peaks due to the explosive components of each sample were present in each spectrum. Mass spectral variability with laser fluence is discussed. The ability of the SPAMS system to identify explosive components in a single complex explosive particle (~1 pg) without the need for consumables is demonstrated. SPAMS was also applied to the detection of Chemical Warfare Agent (CWA) simulants in the liquid and vapor phases. Liquid simulants for sarin, cyclosarin, tabun, and VX were analyzed; peaks indicative of each simulant were identified. Vapor phase CWA simulants were adsorbed onto alumina, silica, Zeolite, activated carbon, and metal powders which were directly analyzed using SPAMS. The use of metal powders as adsorbent materials was especially useful in the analysis of triethyl phosphate (TEP), a VX stimulant, which was undetectable using SPAMS in the liquid phase. The capability of SPAMS to detect high explosives and CWA simulants using one set of operational conditions is established.

  8. From energy-rich phosphate compounds to warfare agents: A review on the chemistry of organic phosphate compounds

    Directory of Open Access Journals (Sweden)

    Luciano Albino Giusti

    2008-12-01

    Full Text Available The chemistry of the phosphorus-oxygen bond is widely used in biological systems in many processes, such as energy transduction and the storage, transmission and expression of genetic information, which are essential to living beings in relation to a wide variety of functions. Compounds containing this bond have been designed for many purposes, ranging from agricultural defense systems, in order to increase food production, to nerve agents, for complaining use in warfare. In this review, features related to the chemistry of organic phosphate compounds are discussed, with particular emphasis on the role of phosphate compounds in biochemical events and in nerve agents. To this aim, the energy-rich phosphate compounds are focused, particularly the mode of their use as energy currency in cells. Historical and recent studies carried out by research groups have tried to elucidate the mechanism of action of enzymes responsible for energy transduction through the use of biochemical studies, enzyme models, and artificial enzymes. Finally, recent studies on the detoxification of nerve agents based on phosphorous esters are presented, and on the utilization of chromogenic and fluorogenic chemosensors for the detection of these phosphate species.

  9. Extraordinary Adaptive Plasticity of Colorado Potato Beetle: “Ten-Striped Spearman” in the Era of Biotechnological Warfare

    Directory of Open Access Journals (Sweden)

    Aleksandar Cingel

    2016-09-01

    Full Text Available Expanding from remote areas of Mexico to a worldwide scale, the ten-striped insect, the Colorado potato beetle (CPB, Leptinotarsa decemlineata Say, has risen from being an innocuous beetle to a prominent global pest. A diverse life cycle, phenotypic plasticity, adaptation to adverse conditions, and capability to detoxify or tolerate toxins make this insect appear to be virtually “indestructible”. With increasing advances in molecular biology, tools of biotechnological warfare were deployed to combat CPB. In the last three decades, genetically modified potato has created a new challenge for the beetle. After reviewing hundreds of scientific papers dealing with CPB control, it became clear that even biotechnological means of control, if used alone, would not defeat the Colorado potato beetle. This control measure once again appears to be provoking the potato beetle to exhibit its remarkable adaptability. Nonetheless, the potential for adaptation to these techniques has increased our knowledge of this pest and thus opened possibilities for devising more sustainable CPB management programs.

  10. A comparison of {sup 252}Cf and 14-MeV neutron excitation to identify chemical warfare agents by PGNAA

    Energy Technology Data Exchange (ETDEWEB)

    Caffrey, A.J.; Harlow, B.D.; Edwards, A.J.; Krebs, K.M.; Jones, J.L.; Yoon, W.; Zabriskie, J.M.; Dougan, A.D.

    2000-07-01

    Since 1992, Idaho National Engineering and Environmental Laboratory's portable isotopic neutron spectrometry (PINS) system has been widely used for the nondestructive assessment of munitions suspected to contain chemical warfare agents, such as the nerve agent sarin. PINS is a {sup 252}Cf-based prompt gamma-ray neutron activation analysis (PGNAA) system. The standard PINS system employs a partially moderated 5-{micro}g {sup 252}Cf source emitting 10{sup 7} n/s to excite the atomic nuclei inside the item under test. The chemical elements inside the item are revealed by their characteristic gamma-ray spectrum, measured by a high-resolution high-purity germanium gamma-ray spectrometer. The system computer then infers the fill compound or mixture from the elemental data extracted from the gamma-ray spectrum. Reliable PINS assessments can be completed in as little as 100 s for favorable cases such as white phosphorus smoke munitions, but normally, a 1000 to 3000 live-second counting interval is required. To improve PINS throughput when hundreds or more munitions must be assessed, they are evaluating the possible advantages of 14-MeV neutron excitation over their current radioisotopic source.

  11. Decomposition of 2-chloroethylethylsulfide on copper oxides to detoxify polymer-based spherical activated carbons from chemical warfare agents.

    Science.gov (United States)

    Fichtner, S; Hofmann, J; Möller, A; Schrage, C; Giebelhausen, J M; Böhringer, B; Gläser, R

    2013-11-15

    For the decomposition of chemical warfare agents, a hybrid material concept was applied. This consists of a copper oxide-containing phase as a component with reactive functionality supported on polymer-based spherical activated carbon (PBSAC) as a component with adsorptive functionality. A corresponding hybrid material was prepared by impregnation of PBSAC with copper(II)nitrate and subsequent calcination at 673K. The copper phase exists predominantly as copper(I)oxide which is homogeneously distributed over the PBSAC particles. The hybrid material containing 16 wt.% copper on PBSAC is capable of self-detoxifying the mustard gas surrogate 2-chloroethylethylsulfide (CEES) at room temperature. The decomposition is related to the breakthrough behavior of the reactant CEES, which displaces the reaction product ethylvinylsulfide (EVS). This leads to a combined breakthrough of CEES and EVS. The decomposition of CEES is shown to occur catalytically over the copper-containing PBSAC material. Thus, the hybrid material can even be considered to be self-cleaning. PMID:24140529

  12. Transport behavior of surrogate biological warfare agents in a simulated landfill: Effect of leachate recirculation and water infiltration

    KAUST Repository

    Saikaly, Pascal

    2010-11-15

    An understanding of the transport behavior of biological warfare (BW) agents in landfills is required to evaluate the suitability of landfills for the disposal of building decontamination residue (BDR) following a bioterrorist attack on a building. Surrogate BW agents, Bacillus atrophaeus spores and Serratia marcescens, were spiked into simulated landfill reactors that were filled with synthetic building debris (SBD) and operated for 4 months with leachate recirculation or water infiltration. Quantitative polymerase chain reaction (Q-PCR) was used to monitor surrogate transport. In the leachate recirculation reactors, <10% of spiked surrogates were eluted in leachate over 4 months. In contrast, 45% and 31% of spiked S. marcescens and B. atrophaeus spores were eluted in leachate in the water infiltration reactors. At the termination of the experiment, the number of retained cells and spores in SBD was measured over the depth of the reactor. Less than 3% of the total spiked S. marcescens cells and no B. atrophaeus spores were detected in SBD. These results suggest that significant fractions of the spiked surrogates were strongly attached to SBD. © 2010 American Chemical Society.

  13. Evaluation of Chemical Warfare Agent Percutaneous Vapor Toxicity: Derivation of Toxicity Guidelines for Assessing Chemical Protective Ensembles.

    Energy Technology Data Exchange (ETDEWEB)

    Watson, A.P.

    2003-07-24

    Percutaneous vapor toxicity guidelines are provided for assessment and selection of chemical protective ensembles (CPEs) to be used by civilian and military first responders operating in a chemical warfare agent vapor environment. The agents evaluated include the G-series and VX nerve agents, the vesicant sulfur mustard (agent HD) and, to a lesser extent, the vesicant Lewisite (agent L). The focus of this evaluation is percutaneous vapor permeation of CPEs and the resulting skin absorption, as inhalation and ocular exposures are assumed to be largely eliminated through use of SCBA and full-face protective masks. Selection of appropriately protective CPE designs and materials incorporates a variety of test parameters to ensure operability, practicality, and adequacy. One aspect of adequacy assessment should be based on systems tests, which focus on effective protection of the most vulnerable body regions (e.g., the groin area), as identified in this analysis. The toxicity range of agent-specific cumulative exposures (Cts) derived in this analysis can be used as decision guidelines for CPE acceptance, in conjunction with weighting consideration towards more susceptible body regions. This toxicity range is bounded by the percutaneous vapor estimated minimal effect (EME{sub pv}) Ct (as the lower end) and the 1% population threshold effect (ECt{sub 01}) estimate. Assumptions of exposure duration used in CPE certification should consider that each agent-specific percutaneous vapor cumulative exposure Ct for a given endpoint is a constant for exposure durations between 30 min and 2 hours.

  14. Handheld and mobile hyperspectral imaging sensors for wide-area standoff detection of explosives and chemical warfare agents

    Science.gov (United States)

    Gomer, Nathaniel R.; Gardner, Charles W.; Nelson, Matthew P.

    2016-05-01

    Hyperspectral imaging (HSI) is a valuable tool for the investigation and analysis of targets in complex background with a high degree of autonomy. HSI is beneficial for the detection of threat materials on environmental surfaces, where the concentration of the target of interest is often very low and is typically found within complex scenery. Two HSI techniques that have proven to be valuable are Raman and shortwave infrared (SWIR) HSI. Unfortunately, current generation HSI systems have numerous size, weight, and power (SWaP) limitations that make their potential integration onto a handheld or field portable platform difficult. The systems that are field-portable do so by sacrificing system performance, typically by providing an inefficient area search rate, requiring close proximity to the target for screening, and/or eliminating the potential to conduct real-time measurements. To address these shortcomings, ChemImage Sensor Systems (CISS) is developing a variety of wide-field hyperspectral imaging systems. Raman HSI sensors are being developed to overcome two obstacles present in standard Raman detection systems: slow area search rate (due to small laser spot sizes) and lack of eye-safety. SWIR HSI sensors have been integrated into mobile, robot based platforms and handheld variants for the detection of explosives and chemical warfare agents (CWAs). In addition, the fusion of these two technologies into a single system has shown the feasibility of using both techniques concurrently to provide higher probability of detection and lower false alarm rates. This paper will provide background on Raman and SWIR HSI, discuss the applications for these techniques, and provide an overview of novel CISS HSI sensors focused on sensor design and detection results.

  15. Koncepcija partizanskoj vojny v Litve v 1920— 1930-e gody [The concept of guerrilla warfare in Lithuania in the 1920—1930s

    Directory of Open Access Journals (Sweden)

    Jokubauskas Vytautas

    2012-01-01

    Full Text Available This article analyses the military and tactical training of the members of the Lithuanian Riflemen’s Union for guerrilla warfare in the interwar period. Small nations, such as Lithuania and other Baltic states, being unable to build up military strength in order to ensure national security, were forced to seek for unconventional methods of warfare, including guerrilla strategies. The study places emphasis on the development of the guerrilla war concept in the Union periodicals. The author retraces a change in the intensity of the guerrilla warfare concept propagation amongst Lithuanian population and riflemen, in particular, through publications in the Trimitas — a periodical of the Lithuanian Riflemen’s Union. The author also identifies the narratives associated with the guerrilla matters employed for propaganda purposes in order to create an image of a guerrilla as a defender of the Homeland — Lithuania. Additionally, the structure and numbers of the Union are analysed through a comparison with similar organisations of the other «small nations» of the Baltic North-East. The author addresses the issue of military missions planned by the Lithuanian Army, as well as the way riflemen implemented them. Since the Union did not only offer military training, but was also engaged in the patriotic propaganda, the article focuses on the network of cultural institutions, homes of riflemen, orchestras, libraries, choirs, and athletic clubs used by the Union. The article sets out to establish whether the loss of Lithuanian sovereignty could have been possible without giving rise to a protracted guerrilla war.

  16. Formalization Modeling on VV&A Process for Warfare Simulation by UML%基于UML的作战仿真VV&A过程形式化建模

    Institute of Scientific and Technical Information of China (English)

    唐见兵; 查亚兵

    2013-01-01

    可信性是作战仿真的生命线,对作战仿真的全生命周期进行校核、验证与确认(Verification,Validation and Accreditation,VV&A)是确保其可信性的重要途径.建立合适的VV&A过程形式化模型是开展作战仿真VV&A过程研究的前提和基础.基于统一建模语言(Unified Modeling Language,UML)分别从用例、静态结构、动态行为及交互等方面对VV&A过程进行形式化建模,建立了作战仿真VV&A过程的用例、类图、活动图及顺序图模型,并给出相应的形式化定义.实践表明:作战仿真VV&A过程形式化建模可以使VV&A的描述规范化、标准化及形式化,便于不同领域人员的相互沟通与交流,以及VV&A工程化应用,促进了VV&A工作顺利开展.%The credibility is the lifeline of warfare simulation. To execute verification, validation and accreditation (VV&A) is an important approach to insure the credibility of warfare simulation system through out the life circle. It is the precondition and foundation to make the right formal model of VV&A process for warfare simulation. In this paper,the formal models of VV&A process is carried out,in which the details of use case,static construction,dynamic activities and interactions are modeled based on UML, and their formalization definitions are put forward. The practice shows that the formalization modeling on VV&A process for warfare simulation by UML can make it standardization, regularization and formalization,which can help the researchers in different domains to communicate with each other. The research of VV&A can be used in engineering,which help the job of VV&A is developed expediently.

  17. Mechanism of injury and microbiological flora of the geographical location are essential for the prognosis in soldiers with serious warfare injuries

    DEFF Research Database (Denmark)

    Wetterslev, Mik; Rose-Larsen, Katrine; Hansen-Schwartz, Jacob;

    2013-01-01

    INTRODUCTION: Denmark has been engaged in the Afghanistan war and as a result, Rigshospitalet has received a number of multi-traumatized Danish soldiers. Lesions sustained in armed conflict differ from their civilian counterparts and knowledge of the pathophysiology related to these types...... has been and remains a substantial part of warfare, and this review has showed us that the knowledge of the mechanism of injury is indeed essential, and that intelligence on the microbiological flora of the geographical location of the conflict is essential. FUNDING: not relevant. TRIAL REGISTRATION...

  18. Computational Investigations of Potential Energy Function Development for Metal--Organic Framework Simulations, Metal Carbenes, and Chemical Warfare Agents

    Science.gov (United States)

    Cioce, Christian R.

    sigma donates, and subsequent back-bonding occurs into a pi* antibonding orbital. This is a different type of interaction not seen in the three existing classes of metal-carbene complexes, namely Fischer, Schrock, and Grubbs. Finally, the virtual engineering of enhanced chemical warfare agent (CWA) detection systems is discussed. As part of a U.S. Department of Defense supported research project, in silico chemical modifications to a previously synthesized zinc-porphyrin, ZnCS1, were made to attempt to achieve preferential binding of the nerve agent sarin versus its simulant, DIMP (diisopropyl methylphosphonate). Upon modification, a combination of steric effects and induced hydrogen bonding allowed for the selective binding of sarin. The success of this work demonstrates the role that high performance computing can play in national security research, without the associated costs and high security required for experimentation.

  19. Establishment of Exposure to Organophosphorus Warfare Agents by Means of SPME-GSMS Analysis of Bodily Fluids

    International Nuclear Information System (INIS)

    Reliable chemical analytical procedures for revealing an exposure to toxic chemicals, identifying the active substance, and assessing the degree of exposure are necessary as a component of medical and forensic activities in cases of the possible use of highly toxic chemicals in war conflicts and terrorism acts, as well as emergency situations in chemical industry, specifically at chemical weapons storage and destruction facilities. According to Chemical Weapons Convention, Part XI, Appendix 4, e-17, 'samples of importance in the investigation of alleged use include biomedical samples from human or animal sources (blood, urine, excreta, tissue etc.)'. Urinary metabolites, O-alkyl esters of methylphosphic acid, offer one of the simplest means of confirming an exposure to organophosphorus warfare agents (OPWA). Urine, unlike blood or tissues, does not require invasive collection demanding in terms of sterility. Excretion with urine is the major route of elimination of OPWA from an organism. According to published data, 90% of OPWA metabolites are excreted within 48-72 h after intoxication. We developed an SPME-GCMS procedure for the determination of O-alkyl esters methylphosphonic acid in urine, with the following detection limits,: isopropyl and isobutyl esters 5 ng/ml and pinacolyl ester 1 ng/ml. The procedure involves derivatization of the target compounds directly on the microfiber. The total analysis time is 1-1.5 h. In animal experiments in vivo we could establish the exposure to OPWA at a half-LD50 level within no less than 48 h after intoxication. In principle, OPWA metabolites could be detected in urine within two weeks after intoxication but at higher doses. Retrospective analysis of urinary metabolites in cases of the exposure to low doses of OPWA requires lower detection limits (0.1-1 ng/ml). Optimal objects for the retrospective analysis of OPWA in an organism are long-lived blood protein adducts. We developed a procedure for revealing an exposure to

  20. Isolated iliotibial band rupture after corticosteroid injection as a cause of subjective instability and knee pain in a military special warfare trainee.

    Science.gov (United States)

    Pandit, Sandeep R; Solomon, Daniel J; Gross, Daniel J; Golijanin, Petar; Provencher, Matthew T

    2014-04-01

    Iliotibial band friction syndrome (ITBFS) of the knee is a common overuse injury in athletes, especially in runners. The syndrome occurs when the ITB, a lateral thickening of the fascia lata of the thigh moves repetitively over the lateral femoral condyle. A variety of nonoperative measures are used for ITBFS treatment, including stretching, core strengthening, and therapeutic injection. Isolated distal ITB rupture is a rare entity and has never yet to be reported in the orthopedic literature. We present a case of isolated ITB rupture as a cause of varus instability and knee pain in a Naval Special Warfare candidate diagnosed with ITBFS and previously treated with several local corticosteroid injections before ITB rupture. Because of continued knee pain and a sense of instability, along with an inability to return to his military special warfare duties, the ITB was surgically repaired. This case highlights the presentation and management of isolated distal ITB rupture and discusses some of the potential risk factors for rupture, including prior local corticosteroid injection.

  1. Demonstration of spread-on peel-off consumer products for sampling surfaces contaminated with pesticides and chemical warfare agent signatures.

    Science.gov (United States)

    Behringer, Deborah L; Smith, Deborah L; Katona, Vanessa R; Lewis, Alan T; Hernon-Kenny, Laura A; Crenshaw, Michael D

    2014-08-01

    A terrorist attack using toxic chemicals is an international concern. The utility of rubber cement and latex body paint as spray-on/spread-on peel-off collection media for signatures attributable to pesticides and chemical warfare agents from interior building and public transportation surfaces two weeks post-deposition is demonstrated. The efficacy of these media to sample escalator handrail, stainless steel, vinyl upholstery fabric, and wood flooring is demonstrated for two pesticides and eight chemicals related to chemical warfare agents. The chemicals tested are nicotine, parathion, atropine, diisopropyl methylphosphonate, dimethyl methylphosphonate, dipinacolyl methylphosphonate, ethyl methylphosphonic acid, isopropyl methylphosphonic acid, methylphosphonic acid, and thiodiglycol. Amounts of each chemical found are generally greatest when latex body paint is used. Analytes with low volatility and containing an alkaline nitrogen or a sulfur atom (e.g., nicotine and parathion) usually are recovered to a greater extent than the neutral phosphonate diesters and acidic phosphonic acids (e.g., dimethyl methylphosphonate and ethyl methylphosphonic acid). PMID:24835029

  2. The future development of naval ship in asymmetric warfare%非对称战争形态下舰船装备未来发展

    Institute of Scientific and Technical Information of China (English)

    吴亚雷

    2011-01-01

    结合当前国际政治经济形势,分析了我国海军未来面临的军事挑战特点,通过对舰船装备在非对称战争中发挥的核心作用进行研究,总结了未来取胜非对称战争的关键技术,分析了舰船装备未来发展趋势,对我国海军舰船装备未来发展提出了建议.%Based on the current international political and economic situation, the characteristics of future military challenges to the navy of our country are analyzed. By research of the main role of naval ship in asymmetric warfare, the key technologies to win the future asymmetric warfare are concluded, and the future development trends of naval ship are analyzed, and some suggestions to the naval ship development of our country are proposed.

  3. Application of Antibiotic on Sea Warfare Wound in Marine Environment%抗生素在海上环境下海战伤中的应用

    Institute of Scientific and Technical Information of China (English)

    张贞良; 贺顺龙; 谢培增; 汪先兵

    2011-01-01

    Objective To study an appropriate anti-inflammation treatment strategy on sea warfare wound in ma-rine environment Methods Animal model of combined sea warfare wound in marine environment was established in 40 mongrel dogs. The dogs were randomly divided into control group and treatment group. The control group accepted rou-tine cefodizime treatment, and the treatment group accepted cefodizime plus levofloxacin treatment The treatment on sea warfare wound was the same in both groups. The gross condition was observed and bacteriological strains in the wound were cultured and antibiotic sensitivity was tested at 2 and 4 days after the wound. Wound infection rate and mortality were observed at the sixth day. Results The infection rate within six days was 50% in the control group, and 10% in treatment group, and the mortality was 60% and 20% respectively. These rates were significantly lower in the treatment group than those in the control group (P<0. 01). The constituent ratio of vibrion in the treatment group was lower than that in the control group (P<0. 01). Conclusion There are many species of bacteria with wide distribution in South China Sea which mainly includes vibrionaceaes, staphylococcus and escherichia. These bacteria are the main causes leading to sea warfare wound infection. To deal with the sea warfare wound in marine environment, the early and complete debride-ment, and the early application of broadspectrum and anti-vibrion antibiotics should be emphasized.%目的 探讨抗生素在海上环境下海战伤中的有效应用.方法 选取40只成年杂种犬,制作海上环境下海水浸泡复合火器伤动物模型.随机将动物分成对照组和治疗组,每组20只犬.对照组采用头孢地嗪治疗,治疗组头孢地嗪加左氧氟沙星治疗.海战伤的其他处理方法相同.在伤后第2和第4天进行细菌培养与药敏试验,观察6天伤口感染率、死亡率.结果 伤后6天,对照组的伤口感染率为500,治疗组为10

  4. Preventing Space Warfare

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    The international community should join forces to avoid possible conflicts in space Military competition and conflict in outer space can be divided into three stages:militarization,wea- ponization and the space battle- field. Space militarization has become a thing of the past.Now,many countries are re- searching more advanced space weaponry technology,which means space weapon- ization is becoming a growing reality.The process of space competition is astonishingly

  5. Chemical warfare in freshwater

    NARCIS (Netherlands)

    Mulderij, Gabi

    2006-01-01

    Aquatic macrophytes can excrete chemical substances into their enviroment and these compounds may inhibit the growth of phytoplankton. This process is defined as allelopathy: one organism has effects on another via the excretion of a (mixture of) chemical substance(s). With laboratory and field expe

  6. Toward improved software security training using a cyber warfare opposing force (CW OPFOR): the knowledge base design

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2005-03-01

    "Train the way you will fight" has been a guiding principle for military training and has served the warfighter well as evidenced by numerous successful operations over the last decade. This need for realistic training for all combatants has been recognized and proven by the warfighter and continues to guide military training. However, to date, this key training principle has not been applied fully in the arena of cyberwarfare due to the lack of realistic, cost effective, reasonable, and formidable cyberwarfare opponents. Recent technological advances, improvements in the capability of computer-generated forces (CGFs) to emulate human behavior, and current results in research in information assurance and software protection, coupled with increasing dependence upon information superiority, indicate that the cyberbattlespace will be a key aspect of future conflict and that it is time to address the cyberwarfare training shortfall. To address the need for a cyberwarfare training and defensive testing capability, we propose research and development to yield a prototype computerized, semi-autonomous (SAF) red team capability. We term this capability the Cyber Warfare Opposing Force (CW OPFOR). There are several technologies that are now mature enough to enable, for the first time, the development of this powerful, effective, high fidelity CW OPFOR. These include improved knowledge about cyberwarfare attack and defense, improved techniques for assembling CGFs, improved techniques for capturing and expressing knowledge, software technologies that permit effective rapid prototyping to be effectively used on large projects, and the capability for effective hybrid reasoning systems. Our development approach for the CW OPFOR lays out several phases in order to address these requirements in an orderly manner and to enable us to test the capabilities of the CW OPFOR and exploit them as they are developed. We have completed the first phase of the research project, which

  7. Groundwater geochemical and selected volatile organic compound data, Operable Unit 1, Naval Undersea Warfare Center, Division Keyport, Washington, June 2011

    Science.gov (United States)

    Huffman, Raegan L.; Frans, L.M.

    2012-01-01

    Previous investigations indicate that concentrations of chlorinated volatile organic compounds are substantial in groundwater beneath the 9-acre former landfill at Operable Unit 1, Naval Undersea Warfare Center, Division Keyport, Washington. Phytoremediation combined with ongoing natural attenuation processes was the preferred remedy selected by the U.S. Navy, as specified in the Record of Decision for the site. The U.S. Navy planted two hybrid poplar plantations on the landfill in spring 1999 to remove and to control the migration of chlorinated volatile organic compounds in shallow groundwater. The U.S. Geological Survey has continued to monitor groundwater geochemistry to ensure that conditions remain favorable for contaminant biodegradation as specified in the Record of Decision. This report presents groundwater geochemical and selected volatile organic compound data collected at Operable Unit 1 by the U.S. Geological Survey during June 20-22, 2011, in support of long-term monitoring for natural attenuation. In 2011, groundwater samples were collected from 13 wells and 9 piezometers. Samples from all wells and piezometers were analyzed for redox sensitive constituents and dissolved gases, and samples from 5 of 13 wells and all piezometers also were analyzed for chlorinated volatile organic compounds. Concentrations of redox sensitive constituents measured in 2011 were consistent with previous years, with dissolved oxygen concentrations all at 0.4 milligram per liter or less; little to no detectable nitrate; abundant dissolved manganese, iron, and methane; and commonly detected sulfide. The reductive declorination byproducts - methane, ethane, and ethene - were either not detected in samples collected from the upgradient wells in the landfill and the upper aquifer beneath the northern phytoremediation plantation or were detected at concentrations less than those measured in 2010. Chlorinated volatile organic compound concentrations in 2011 at most piezometers

  8. 基于Lanchester方程的作战混合动态系统最优变招控制%Optimal variable tactic control of warfare hybrid dynamic system based on Lanchester equation

    Institute of Scientific and Technical Information of China (English)

    陈向勇; 井元伟; 李春吉

    2012-01-01

    根据作战混合动态过程特性,提出了一种基于Lanchcstcr方程的作战混合动态系统模型.该模型可较好的描述离散事件驱动的对阵招法和连续作战实力变化之间的相互作用.在合理战术假设的基础上,讨论了作战混合动态系统最优变招控制问题.首先,利用微分对策理论得到了作战招法存在的必要条件.进而对作战变招过程进行分析,并提出了一种最优变招控制策略的求解方法.最后,应用算例验证了所构建作战混合系统模型和所设计最优变招策略的可行性.%According to the characteristics of warfare hybrid dynamic process, we develop a warfare hybrid dynamic system model by using Lanchester equation, which better describes the interaction between discrete event-driven tactics and the strength changes in continuous fighting. We also investigate the optimal variable tactic control for the warfare hybrid dynamic system under certain reasonable assumptions. In the existing condition of the warfare tactics based on the differential game theory, we analyze the process of variable tactics and propose the solving method for determining the optimal strategy for variable tactic control. A numerical example shows the feasibility of the warfare hybrid system and the effectiveness of the developed optimal variable tactics.

  9. Distribution-mode Logistical Support in Modern Warfare%现代战争条件下的配送式后勤保障

    Institute of Scientific and Technical Information of China (English)

    吴兆东; 朱江浩

    2016-01-01

    The distribution-mode logistical support is the product of the warfare in the information era and has become a basic form of the modern logistical practices. In this paper, in connection with the characteristics of military distribution and transportation, we analyzed the logistical support mode of the U.S. army in the war in Iraq and then proposed some thoughts on building the distribution-mode logistical support system by the Chinese army.%配送式后勤保障是信息化条件下的战争产物,已成为现代后勤保障的基本形式.结合军事物流配送的特点,分析了伊拉克战争中美军这种后勤保障模式的特点,提出关于我军配送式后勤保障建设的思考.

  10. Solid-phase microextraction low temperature plasma mass spectrometry for the direct and rapid analysis of chemical warfare simulants in complex mixtures.

    Science.gov (United States)

    Dumlao, Morphy C; Jeffress, Laura E; Gooding, J Justin; Donald, William A

    2016-06-21

    Solid-phase microextraction (SPME) is directly integrated with low temperature plasma ionisation mass spectrometry to rapidly detect organophosphate chemical warfare agent simulants and their hydrolysis products in chemical mixtures, including urine. In this sampling and ionization method, the fibre serves: (i) to extract molecules from their native environment, and (ii) as the ionization electrode that is used to desorb and ionize molecules directly from the SPME surface. By use of a custom fabricated SPME fibre consisting of a stainless steel needle coated with a Linde Type A (LTA) zeolitic microporous material and low temperature plasma mass spectrometry, protonated dimethyl methylphosphonate (DMMP), diethyl ethylphosphonate (DEEP) and pinacolyl methylphosphonic acid (PinMPA) can be detected at less than 100 ppb directly in water and urine. Organophosphates were not readily detected by this approach using an uncoated needle in negative control experiments. The use of the LTA coating significantly outperformed the use of a high alumina Zeolite Socony Mobil-5 (ZSM-5) coating of comparable thickness that is significantly less polar than LTA. By conditioning the LTA probe by immersion in an aqueous CuSO4 solution, the ion abundance for protonated DMMP increased by more than 300% compared to that obtained without any conditioning. Sample recovery values were between 96 and 100% for each analyte. The detection of chemical warfare agent analogues and hydrolysis products required less than 2 min per sample. A key advantage of this sampling and ionization method is that analyte ions can be directly and rapidly sampled from chemical mixtures, such as urine and seawater, without sample preparation or chromatography for sensitive detection by mass spectrometry. This ion source should prove beneficial for portable mass spectrometry applications because relatively low detection limits can be obtained without the use of compressed gases, fluid pumps, and lasers. Moreover, the

  11. Bioaccumulation of chemical warfare agents, energetic materials, and metals in deep-sea shrimp from discarded military munitions sites off Pearl Harbor

    Science.gov (United States)

    Koide, Shelby; Silva, Jeff A. K.; Dupra, Vilma; Edwards, Margo

    2016-06-01

    The bioaccumulation of munitions-related chemicals at former military deep-water disposal sites is poorly understood. This paper presents the results of human-food-item biota sampling to assess the potential for bioaccumulation of chemical warfare agents, energetic materials, arsenic, and additional munitions-related metals in deep-sea shrimp tissue samples collected during the Hawai'i Undersea Military Munitions Assessment (HUMMA) project to date. The HUMMA investigation area is located within a former munitions sea-disposal site located south of Pearl Harbor on the island of O'ahu, Hawai'i, designated site Hawaii-05 (HI-05) by the United States Department of Defense. Indigenous deep-sea shrimp (Heterocarpus ensifer) were caught adjacent to discarded military munitions (DMM) and at control sites where munitions were absent. Tissue analysis results showed that chemical warfare agents and their degradation products were not present within the edible portions of these samples at detectable concentrations, and energetic materials and their degradation products were detected in only a few samples at concentrations below the laboratory reporting limits. Likewise, arsenic, copper, and lead concentrations were below the United States Food and Drug Administration's permitted concentrations of metals in marine biota tissue (if defined), and their presence within these samples could not be attributed to the presence of DMM within the study area based on a comparative analysis of munitions-adjacent and control samples collected. Based on this current dataset, it can be concluded that DMM existing within the HUMMA study area is not contributing to the bioaccumulation of munitions-related chemicals for the biota species investigated to date.

  12. Ion mobility spectrometric analysis of vaporous chemical warfare agents by the instrument with corona discharge ionization ammonia dopant ambient temperature operation.

    Science.gov (United States)

    Satoh, Takafumi; Kishi, Shintaro; Nagashima, Hisayuki; Tachikawa, Masumi; Kanamori-Kataoka, Mieko; Nakagawa, Takao; Kitagawa, Nobuyoshi; Tokita, Kenichi; Yamamoto, Soichiro; Seto, Yasuo

    2015-03-20

    The ion mobility behavior of nineteen chemical warfare agents (7 nerve gases, 5 blister agents, 2 lachrymators, 2 blood agents, 3 choking agents) and related compounds including simulants (8 agents) and organic solvents (39) was comparably investigated by the ion mobility spectrometry instrument utilizing weak electric field linear drift tube with corona discharge ionization, ammonia doping, purified inner air drift flow circulation operated at ambient temperature and pressure. Three alkyl methylphosphonofluoridates, tabun, and four organophosphorus simulants gave the intense characteristic positive monomer-derived ion peaks and small dimer-derived ion peaks, and the later ion peaks were increased with the vapor concentrations. VX, RVX and tabun gave both characteristic positive monomer-derived ions and degradation product ions. Nitrogen mustards gave the intense characteristic positive ion peaks, and in addition distinctive negative ion peak appeared from HN3. Mustard gas, lewisite 1, o-chlorobenzylidenemalononitrile and 2-mercaptoethanol gave the characteristic negative ion peaks. Methylphosphonyl difluoride, 2-chloroacetophenone and 1,4-thioxane gave the characteristic ion peaks both in the positive and negative ion mode. 2-Chloroethylethylsulfide and allylisothiocyanate gave weak ion peaks. The marker ion peaks derived from two blood agents and three choking agents were very close to the reactant ion peak in negative ion mode and the respective reduced ion mobility was fluctuated. The reduced ion mobility of the CWA monomer-derived peaks were positively correlated with molecular masses among structurally similar agents such as G-type nerve gases and organophosphorus simulants; V-type nerve gases and nitrogen mustards. The slope values of the calibration plots of the peak heights of the characteristic marker ions versus the vapor concentrations are related to the detection sensitivity, and within chemical warfare agents examined the slope values for sarin, soman

  13. [The re-introduction of malaria in the Pontine Marshes and the Cassino district during the end of World War II. Biological warfare or global war tactics?].

    Science.gov (United States)

    Sabbatani, Sergio; Fiorino, Sirio; Manfredi, Roberto

    2013-12-01

    After the fall of the Fascist regime on September 8, 1943, Italy was split into two parts: (i) the Southern regions where the King Victor Emanuel III and the military general staff escaped was under the control of English-American allied armies, and (ii) the northern regions comprising Lazio, Tuscany, Umbria, and Marche still under the control of the Germans. The German Wehrmacht, after suffering several defeats on Southern lines, established a new strengthened line of defence called the Gustav line, located south of Rome and crossing in the western portion the recently-drained Pontine Marshes. In his book published in 2006, Frank Snowden hypothesised that occupying German armies in 1943 had initiated a programme of re-flooding the Pontine plain as a biological warfare strategy to re-introduce malaria infection in the territories south of Rome, Such a plan was intended (i) to slow down the advance of English-American forces, and (ii) to punish Italians who abandoned their former allies. Other authors, including Annibale Folchi, Erhard Geissler, and Jeanne Guillemin, have disputed this hypothesis based on an analysis of recently-uncovered archive documents. What is not disputed is that the flooding of the Pontine and Roman plains in 1943 contributed to a severe malaria epidemic in 1944, which was associated with exceptionally high morbidity and mortality rates in the afflicted populations. Herein, we critically evaluate the evidence and arguments of whether the Wehrmacht specifically aimed to spread malaria as a novel biological warfare strategy in Italy during the Second World War. In our opinion, evidence for specific orders to deliberately spread malaria by the German army is lacking, although the strategy itself may have been considered by Nazis during the waning years of the war.

  14. Truth about the Consequence of Bacteriological Warfare of Disseminating Plague Bacteria%散布鼠疫菌(PX)细菌战“战果”之真相

    Institute of Scientific and Technical Information of China (English)

    莇昭三[日](著); 韩慧光(译)

    2015-01-01

    日本军在中国实施细菌战的事实,随着中日学者的研究逐渐被揭示,在研究中所用材料大部分都是加害者(当事人)和受害者的口述史,缺乏日本军当时实施细菌战后对被害地的全面详细的疫学调查。731部队细菌战研究人员金子顺一论文《鼠疫效果略算法》,揭示了1940年农安、新京鼠疫流行事件是731部队实施的细菌战的事实。《陆军军医学校防疫研究报告第2部》中的高桥正彦论文中关于农安、新京鼠疫流行事件的论文,是731部队细菌战后对被害地进行的疫学调查。达格威文件Q报告中的部分数据来自“农安细菌战”受害者的病理解剖,其中不仅有中国人,也有日本人。%Facts about bacteriological warfare conducted by Japanese Army in China have been gradually re-vealed by related Chinese and Japanese researchers. However, the majority of materials used in the research are oral history orally accounted by offenders and victims, hence the lack of epidemic prevention surveys on the inflicted areas of bacteriological warfare by Japanese army. The thesis paper by Jun-Ichi Kaneko (bacterial warfare researcher of U-nit 731) namedBubonicPlagueAlgorithmunveiled the fact that plague epidemics which struck Nong’an and Changchun were caused by the Unit 731’s bacteriological warfare. Takahashi’s thesis paper inArmyMedicalCol-legeEpidemicPreventionResearchReport(VolumeⅡ)on plague epidemics that hit Nong’an and Changchun is in connection with the epidemic prevention surveys on the inflicted areas of bacteriological warfare carried out by the U-nit 731. Some data of the Report of“Q”from Dugway Proving Ground Documents came from pathological anatomy of victims of Nong’an bacteriological warfare, some of whom were Chinese and Japanese.

  15. Intelligent Evaluation for Aerial Warfare Efficiency of Fighter-plane Based on Rough Set and Support Vector Machine%粗集支持向量机的战斗机空战效能智能评估

    Institute of Scientific and Technical Information of China (English)

    龚胜科; 徐浩军; 林敏

    2012-01-01

    根据现代空战特点,选取了战斗机的空战效能评估指标集,并采用粗糙集理论对指标体系进行约简,提取对空战效能影响起关键作用的特征参数,消除冗余信息,减少了支持向量的维效.支持向量机( SVM)具有结构简单、全局最优、泛化能力强的优点.根据所提取的特征参数,文中提出采用回归型支持向量机(SVR)建立空战效能智能评估模型,并通过实例与指数法和BP神经网络法计算结果进行了比较,验证了该模型的可行性和有效性.%According to the characteristic of modern aerial warfare. the index set of aerial warfare efficiency evaluation is selected in this paper. Reduction is performed on index systems based on rough set theory to extract characteristic parameters which affect aerial warfare efficiency crucially, which is to remove redundant information and reduce the dimension of support vector. Support vector machine (SVM) has the advantages of simple structure, global optimum and high generalization ability. With the characteristic parameters, intelligent evaluation model for aerial warfare efficiency of fighter-plane is establish by using Support Vector Regression (SVR), and we compare the SVR with index method and BP network method by a case study, which verified the feasibility and validity of the model.

  16. The Challenges of Cyber Warfare to International Law:From Perspective of The Tallinn Manual on The International Law Applicable to Cyber Warfare%从《塔林手册》看网络战争对国际法的挑战

    Institute of Scientific and Technical Information of China (English)

    张天舒

    2014-01-01

    Tallinn Manual on The International Law Applicable to Cyber Warfare results from an expert -driven process designed to produce a non -binding document applying existing law to cyber warfare .It encompasses both jus ad bellum and jus in bello , as well as related bodies of general international law , such as the law of State re-sponsibility etc .It is believed that how the Manual elaborates on current international law applicable to cyber war -fare reflects the current development of international law about cyber warfare .However , it is also arguable about the methodology used to ascertain rules and the composition of the International Group of Experts .Additionally , the Manual contains several flaws in the formulation of the rules and the relevant comments .Given to all these reasons , how much the Manual could affect states and international law still remains uncertain and need to be proven in the future.%《适用于网络战争的国际法塔林手册》(以下简称“《塔林手册》”)分别讨论了一般国际法和国际人道法如何适用于网络空间和网络战争中的重要问题。《塔林手册》对适用于网络战争的国际法进行的系统归纳和总结,将会影响国际社会对网络战争的认识。但是《塔林手册》在编纂方式和国际专家组的人员构成方面存在先天不足,而且其中的若干具体规则也与现今国际法有些许出入。《塔林手册》究竟能在什么程度上影响国家实践和国际法的发展,还有待检验。

  17. 基于FLAMES的电子战仿真模型的组合建模%Combined Modeling of Electronic Warfare Simulation Model Based on FLAMES

    Institute of Scientific and Technical Information of China (English)

    吴志建; 方胜良; 朱林

    2012-01-01

    随着军用仿真技术的不断发展,使得多领域的模型集成变得更加困难,模型组合和可重用性不足问题显得十分突出。阐述了组合建模和柔性行为分析与建模评估系统(FLAMES)建模原理,针对FLAMES柔性仿真框架下建模灵活性的特点,并结合关联假设的组合建模理论,提出了基于FLAMES的电子战仿真模型的组合仿真概念框架和建模方法,以某型电子战飞机为例,通过仿真实验分析仿真数据。结果表明,该方法能够有效对模型进行组合建模,能为基于FLAMES柔性仿真框架的模型组件开发及其组合建模提供一定的依据。%Along with the continuous development of military simulation technologies,the integration among multi-domain models becomes more and more difficultly,the problems such as the insufficient model combination and reusability look very outstandingly.This paper expatiates the theories of combined modeling and flexible analysis and modeling effectiveness system(FLAMES) modeling,aiming at the characteristic of modeling flexibility in FLAMES flexible simulation framework,and combining with the combined modeling theory of related hypothesis,brings forward the combined simulation concept framework and modeling method of electronic warfare simulation model based on FLAMES,takes a certain electronic warfare airplane as an example,analyzes the simulation data through simulation experiment.Results show that this method can effectively perform the combined modeling to the models,which can provide definite basis for the model component development and combined modeling based on FLAMES flexible simulation framework.

  18. Development of the HS-SPME-GC-MS/MS method for analysis of chemical warfare agent and their degradation products in environmental samples.

    Science.gov (United States)

    Nawała, Jakub; Czupryński, Krzysztof; Popiel, Stanisław; Dziedzic, Daniel; Bełdowski, Jacek

    2016-08-24

    After World War II approximately 50,000 tons of chemical weapons were dumped in the Baltic Sea by the Soviet Union under the provisions of the Potsdam Conference on Disarmament. These dumped chemical warfare agents still possess a major threat to the marine environment and to human life. Therefore, continue monitoring of these munitions is essential. In this work, we present the application of new solid phase microextraction fibers in analysis of chemical warfare agents and their degradation products. It can be concluded that the best fiber for analysis of sulfur mustard and its degradation products is butyl acrylate (BA), whereas for analysis of organoarsenic compounds and chloroacetophenone, the best fiber is a co-polymer of methyl acrylate and methyl methacrylate (MA/MMA). In order to achieve the lowest LOD and LOQ the samples should be divided into two subsamples. One of them should be analyzed using a BA fiber, and the second one using a MA/MMA fiber. When the fast analysis is required, the microextraction should be performed by use of a butyl acrylate fiber because the extraction efficiency of organoarsenic compounds for this fiber is acceptable. Next, we have elaborated of the HS-SPME-GC-MS/MS method for analysis of CWA degradation products in environmental samples using laboratory obtained fibers The analytical method for analysis of organosulfur and organoarsenic compounds was optimized and validated. The LOD's for all target chemicals were between 0.03 and 0.65 ppb. Then, the analytical method developed by us, was used for the analysis of sediment and pore water samples from the Baltic Sea. During these studies, 80 samples were analyzed. It was found that 25 sediments and 5 pore water samples contained CWA degradation products such as 1,4-dithiane, 1,4-oxathiane or triphenylarsine, the latter being a component of arsine oil. The obtained data is evidence that the CWAs present in the Baltic Sea have leaked into the general marine environment. PMID

  19. Development of the HS-SPME-GC-MS/MS method for analysis of chemical warfare agent and their degradation products in environmental samples.

    Science.gov (United States)

    Nawała, Jakub; Czupryński, Krzysztof; Popiel, Stanisław; Dziedzic, Daniel; Bełdowski, Jacek

    2016-08-24

    After World War II approximately 50,000 tons of chemical weapons were dumped in the Baltic Sea by the Soviet Union under the provisions of the Potsdam Conference on Disarmament. These dumped chemical warfare agents still possess a major threat to the marine environment and to human life. Therefore, continue monitoring of these munitions is essential. In this work, we present the application of new solid phase microextraction fibers in analysis of chemical warfare agents and their degradation products. It can be concluded that the best fiber for analysis of sulfur mustard and its degradation products is butyl acrylate (BA), whereas for analysis of organoarsenic compounds and chloroacetophenone, the best fiber is a co-polymer of methyl acrylate and methyl methacrylate (MA/MMA). In order to achieve the lowest LOD and LOQ the samples should be divided into two subsamples. One of them should be analyzed using a BA fiber, and the second one using a MA/MMA fiber. When the fast analysis is required, the microextraction should be performed by use of a butyl acrylate fiber because the extraction efficiency of organoarsenic compounds for this fiber is acceptable. Next, we have elaborated of the HS-SPME-GC-MS/MS method for analysis of CWA degradation products in environmental samples using laboratory obtained fibers The analytical method for analysis of organosulfur and organoarsenic compounds was optimized and validated. The LOD's for all target chemicals were between 0.03 and 0.65 ppb. Then, the analytical method developed by us, was used for the analysis of sediment and pore water samples from the Baltic Sea. During these studies, 80 samples were analyzed. It was found that 25 sediments and 5 pore water samples contained CWA degradation products such as 1,4-dithiane, 1,4-oxathiane or triphenylarsine, the latter being a component of arsine oil. The obtained data is evidence that the CWAs present in the Baltic Sea have leaked into the general marine environment.

  20. Evaluating the Special Needs of The Military for Radiation Biodosimetry for Tactical Warfare Against Deployed Troops: Comparing Military to Civilian Needs for Biodosimetry Methods.

    Science.gov (United States)

    Flood, Ann Barry; Ali, Arif N; Boyle, Holly K; Du, Gaixin; Satinsky, Victoria A; Swarts, Steven G; Williams, Benjamin B; Demidenko, Eugene; Schreiber, Wilson; Swartz, Harold M

    2016-08-01

    The aim of this paper is to delineate characteristics of biodosimetry most suitable for assessing individuals who have potentially been exposed to significant radiation from a nuclear device explosion when the primary population targeted by the explosion and needing rapid assessment for triage is civilians vs. deployed military personnel. The authors first carry out a systematic analysis of the requirements for biodosimetry to meet the military's needs to assess deployed troops in a warfare situation, which include accomplishing the military mission. Then the military's special capabilities to respond and carry out biodosimetry for deployed troops in warfare are compared and contrasted systematically, in contrast to those available to respond and conduct biodosimetry for civilians who have been targeted by terrorists, for example. Then the effectiveness of different biodosimetry methods to address military vs. civilian needs and capabilities in these scenarios was compared and, using five representative types of biodosimetry with sufficient published data to be useful for the simulations, the number of individuals are estimated who could be assessed by military vs. civilian responders within the timeframe needed for triage decisions. Analyses based on these scenarios indicate that, in comparison to responses for a civilian population, a wartime military response for deployed troops has both more complex requirements for and greater capabilities to use different types of biodosimetry to evaluate radiation exposure in a very short timeframe after the exposure occurs. Greater complexity for the deployed military is based on factors such as a greater likelihood of partial or whole body exposure, conditions that include exposure to neutrons, and a greater likelihood of combined injury. These simulations showed, for both the military and civilian response, that a very fast rate of initiating the processing (24,000 d) is needed to have at least some methods capable of

  1. Evaluating the Special Needs of The Military for Radiation Biodosimetry for Tactical Warfare Against Deployed Troops: Comparing Military to Civilian Needs for Biodosimetry Methods.

    Science.gov (United States)

    Flood, Ann Barry; Ali, Arif N; Boyle, Holly K; Du, Gaixin; Satinsky, Victoria A; Swarts, Steven G; Williams, Benjamin B; Demidenko, Eugene; Schreiber, Wilson; Swartz, Harold M

    2016-08-01

    The aim of this paper is to delineate characteristics of biodosimetry most suitable for assessing individuals who have potentially been exposed to significant radiation from a nuclear device explosion when the primary population targeted by the explosion and needing rapid assessment for triage is civilians vs. deployed military personnel. The authors first carry out a systematic analysis of the requirements for biodosimetry to meet the military's needs to assess deployed troops in a warfare situation, which include accomplishing the military mission. Then the military's special capabilities to respond and carry out biodosimetry for deployed troops in warfare are compared and contrasted systematically, in contrast to those available to respond and conduct biodosimetry for civilians who have been targeted by terrorists, for example. Then the effectiveness of different biodosimetry methods to address military vs. civilian needs and capabilities in these scenarios was compared and, using five representative types of biodosimetry with sufficient published data to be useful for the simulations, the number of individuals are estimated who could be assessed by military vs. civilian responders within the timeframe needed for triage decisions. Analyses based on these scenarios indicate that, in comparison to responses for a civilian population, a wartime military response for deployed troops has both more complex requirements for and greater capabilities to use different types of biodosimetry to evaluate radiation exposure in a very short timeframe after the exposure occurs. Greater complexity for the deployed military is based on factors such as a greater likelihood of partial or whole body exposure, conditions that include exposure to neutrons, and a greater likelihood of combined injury. These simulations showed, for both the military and civilian response, that a very fast rate of initiating the processing (24,000 d) is needed to have at least some methods capable of

  2. Research on Command Information System Invulnerability in Network-Centric Warfare%网络中心战指挥信息系统抗毁性研究

    Institute of Scientific and Technical Information of China (English)

    王欣; 姚佩阳; 周翔翔; 张杰勇; 万路军

    2011-01-01

    An evaluation method of command information system invulnerability based on service capability in Network-Centric Warfare(NCW)is proposed. The service mechanism of command information system in NCW is analyzed, and the concept of service functional chain is given for system service capability evaluation. The evaluations of system invulnerability and node significance are derived from thc influences of both network topology and service relations between nodes. An instance is designed, and the method's feasibility is verified by the simulation results.%分析网络中心战下指挥信息系统为作战服务的机理,给出服务功能链的概念,用服务能力作为衡量系统服务能力的基准.兼顾网络拓扑结构和节点服务关系两方面因素对系统抗毁性的影响,设计基于服务能力的网络中心战指挥信息系统抗毁性评价方法,并给出节点重要度的综合计算方法.以指挥信息系统网络为实例进行仿真,结果表明该方法的可行性.

  3. Strategic Political Work and Strategic Psychological Warfare%战时政治工作与战略心理作战

    Institute of Scientific and Technical Information of China (English)

    军事科学院《战略学》课题组

    2005-01-01

    Wartime political work refers to the ideological and organizational work undertaken by the armed forces while performing combat tasks. Strategic psychological warfare means the strategic confrontational activities in which psychological offensives are launched according to the principles of psychology in order to undermine the morale of both the enemy troops and its civilians or to eliminate the consequences of the enemy's deceptive propaganda, and it is a component part of wartime political work. Conducting thoroughgoing wartime political work is a unique political advantage of the PLA and an important guarantee for preserving the true political qualities of the people's army, arousing the fighting will, increasing the cohesion of our soldiers' morale, keeping internal unity against the enemy,and winning the war.%战时政治工作是军队履行作战任务期间进行的思想工作和组织工作,是发挥我军独特的政治优势的重要途径.战略心理作战是运用心理学原理,开展心理攻势,从精神上瓦解敌方军民斗志或消除敌欺骗宣传后果而进行的战略对抗活动,在战时它是战时政治工作的组成部分.

  4. Graphene oxide as sensitive layer in Love-wave surface acoustic wave sensors for the detection of chemical warfare agent simulants.

    Science.gov (United States)

    Sayago, Isabel; Matatagui, Daniel; Fernández, María Jesús; Fontecha, José Luis; Jurewicz, Izabela; Garriga, Rosa; Muñoz, Edgar

    2016-02-01

    A Love-wave device with graphene oxide (GO) as sensitive layer has been developed for the detection of chemical warfare agent (CWA) simulants. Sensitive films were fabricated by airbrushing GO dispersions onto Love-wave devices. The resulting Love-wave sensors detected very low CWA simulant concentrations in synthetic air at room temperature (as low as 0.2 ppm for dimethyl-methylphosphonate, DMMP, a simulant of sarin nerve gas, and 0.75 ppm for dipropylene glycol monomethyl ether, DPGME, a simulant of nitrogen mustard). High responses to DMMP and DPGME were obtained with sensitivities of 3087 and 760 Hz/ppm respectively. Very low limit of detection (LOD) values (9 and 40 ppb for DMMP and DPGME, respectively) were calculated from the achieved experimental data. The sensor exhibited outstanding sensitivity, good linearity and repeatability to all simulants tested. The detection mechanism is here explained in terms of hydrogen bonding formation between the tested CWA simulants and GO. PMID:26653465

  5. Sensitive and comprehensive detection of chemical warfare agents in air by atmospheric pressure chemical ionization ion trap tandem mass spectrometry with counterflow introduction.

    Science.gov (United States)

    Seto, Yasuo; Sekiguchi, Hiroshi; Maruko, Hisashi; Yamashiro, Shigeharu; Sano, Yasuhiro; Takayama, Yasuo; Sekioka, Ryoji; Yamaguchi, Shintaro; Kishi, Shintaro; Satoh, Takafumi; Sekiguchi, Hiroyuki; Iura, Kazumitsu; Nagashima, Hisayuki; Nagoya, Tomoki; Tsuge, Kouichiro; Ohsawa, Isaac; Okumura, Akihiko; Takada, Yasuaki; Ezawa, Naoya; Watanabe, Susumu; Hashimoto, Hiroaki

    2014-05-01

    A highly sensitive and specific real-time field-deployable detection technology, based on counterflow air introduction atmospheric pressure chemical ionization, has been developed for a wide range of chemical warfare agents (CWAs) comprising gaseous (two blood agents, three choking agents), volatile (six nerve gases and one precursor agent, five blister agents), and nonvolatile (three lachrymators, three vomiting agents) agents in air. The approach can afford effective chemical ionization, in both positive and negative ion modes, for ion trap multiple-stage mass spectrometry (MS(n)). The volatile and nonvolatile CWAs tested provided characteristic ions, which were fragmented into MS(3) product ions in positive and negative ion modes. Portions of the fragment ions were assigned by laboratory hybrid mass spectrometry (MS) composed of linear ion trap and high-resolution mass spectrometers. Gaseous agents were detected by MS or MS(2) in negative ion mode. The limits of detection for a 1 s measurement were typically at or below the microgram per cubic meter level except for chloropicrin (submilligram per cubic meter). Matrix effects by gasoline vapor resulted in minimal false-positive signals for all the CWAs and some signal suppression in the case of mustard gas. The moisture level did influence the measurement of the CWAs. PMID:24678766

  6. 浅谈高技术条件下心理战的防御对策%Psychological Warfare Defense Countermeasures under High Technology Conditions

    Institute of Scientific and Technical Information of China (English)

    李军

    2012-01-01

    未来高技术条件下的战争中,战场环境复杂多变,战争进程迅速激烈,作战样式与战场环境对军人心理影响极大.为了争取战争胜利,减少战争损失,战时军人的心理状态是至关重要的因素.因此,本文针对高技术条件下心理战争的特点,如何筑牢心理防线、强化心理训练、搞好信息控制等方面,提出了一些心理战防御对策.%In future high technology war, the battlefield environment is complicated, war process is quick and fierce, battle style and battlefield environment have a great impact on soldier's psychology. In order to get the victory of war, reduce loss of war, soldier's psychology at war is crucial. The paper analyzes the features of psychological warfare under high technology conditions, and puts forward some defense countermeasures in building psychological lines, strengthening psychological training, and doing well information control.

  7. 反潜鱼雷、声纳浮标投射模型研究%Model Researching of Anti-submarine Torpedo、Sonobuoy Launch

    Institute of Scientific and Technical Information of China (English)

    孙明太; 王涛

    2003-01-01

    以反潜巡逻机使用声纳浮标和鱼雷反潜武器为研究对象,在简单描述鱼雷和声纳浮标投放、入水过程的基础上,重点分析了它们的飞行性能,即飞行过程中鱼雷和声纳浮标的位置、速度、加速度和方位的计算模型,并进行了分析.这对于研究鱼雷和浮标的空中弹道,提高布放声纳浮标的位置精度和鱼雷攻击潜艇效果都有十分重要的意义.

  8. 磁探搜潜系统的目标信号识别%Magnetec Probe Anti-submarine System Target Signal Recognition

    Institute of Scientific and Technical Information of China (English)

    尹景涯

    2012-01-01

    This paper mainly introduces the system structure and working principle of magnetic anomaly detector.Focus on the magnetic detector of magnetic target signal recognition fuction,and the prospect of future development of magnetic anomaly detector.%文章主要介绍了磁探仪的系统结构和工作原理,重点介绍了磁探仪对磁目标信号的识别功能,以及对磁探仪未来发展的展望。

  9. Simulation for Searching for Submarine in Helicopter Anti-submarine Dipping Sonar%吊放声纳搜潜模型仿真

    Institute of Scientific and Technical Information of China (English)

    范敬泽; 鞠建波; 丁小峰

    2008-01-01

    本文从使用吊放声纳(简称吊声)的搜潜过程入手,通过仿真环境假设,建立了吊声搜潜的5种搜潜模型.根据模型编制了仿真程序,实现了不同搜索方法的仿真计算.运行表明,建立模型仿真为搜潜模拟过程提供了实用的平台技术.

  10. 网络战的冲突分类与法律适用%Analysis ofthe Classification and Legal Issues of Cyber Warfare under International Humanitarian Law

    Institute of Scientific and Technical Information of China (English)

    赵心

    2016-01-01

    在国际人道法下,敌对行动造成的冲突类型的确定,对于确定其法律性质、适用的法律范围都有着不可或缺的地位。随着信息时代的到来,网络攻击行为的法律性质成为争议。如果要判断网络攻击能否适用国际人道法,首先是明确网络攻击引起的冲突的类型,进而确定网络攻击是否属于“武装冲突”范畴。国际人道法如何适用于网络战争,网络攻击构成的冲突能否符合武装冲突的分类,这里将针对这些问题进行探讨和研究。%Under international humanitarian law,the types of conflicts caused by hostile actions are indispensable to the deter-mination of the legal nature and the applicable law.With the advent of the information age,the legal nature of cyber attack has become a dispute.If you want to decide whether international humanitarian law can be applied to cyber attack,the category of conflicts caused by it must be clarified first,and then whether cyber attack belongs to armed conflicts.This paper explores such issues as how international humanitarian law can be applied to cyber warfare,and whether the conflict constitutedby cyber attacks can be classified as armed conflicts.

  11. Diphenylarsinic acid, a chemical warfare-related neurotoxicant, promotes liver carcinogenesis via activation of aryl hydrocarbon receptor signaling and consequent induction of oxidative DAN damage in rats

    Energy Technology Data Exchange (ETDEWEB)

    Wei, Min; Yamada, Takanori; Yamano, Shotaro; Kato, Minoru; Kakehashi, Anna; Fujioka, Masaki; Tago, Yoshiyuki; Kitano, Mistuaki; Wanibuchi, Hideki, E-mail: wani@med.osaka-cu.ac.jp

    2013-11-15

    Diphenylarsinic acid (DPAA), a chemical warfare-related neurotoxic organic arsenical, is present in the groundwater and soil in some regions of Japan due to illegal dumping after World War II. Inorganic arsenic is carcinogenic in humans and its organic arsenic metabolites are carcinogenic in animal studies, raising serious concerns about the carcinogenicity of DPAA. However, the carcinogenic potential of DPAA has not yet been evaluated. In the present study we found that DPAA significantly enhanced the development of diethylnitrosamine-induced preneoplastic lesions in the liver in a medium-term rat liver carcinogenesis assay. Evaluation of the expression of cytochrome P450 (CYP) enzymes in the liver revealed that DPAA induced the expression of CYP1B1, but not any other CYP1, CYP2, or CYP3 enzymes, suggesting that CYP1B1 might be the enzyme responsible for the metabolic activation of DPAA. We also found increased oxidative DNA damage, possibly due to elevated CYP1B1 expression. Induction of CYP1B1 has generally been linked with the activation of AhR, and we found that DPAA activates the aryl hydrocarbon receptor (AhR). Importantly, the promotion effect of DPAA was observed only at a dose that activated the AhR, suggesting that activation of AhR and consequent induction of AhR target genes and oxidative DNA damage plays a vital role in the promotion effects of DPAA. The present study provides, for the first time, evidence regarding the carcinogenicity of DPAA and indicates the necessity of comprehensive evaluation of its carcinogenic potential using long-term carcinogenicity studies. - Highlights: • DPAA, an environmental neurotoxicant, promotes liver carcinogenesis in rats. • DPAA is an activator of AhR signaling pathway. • DPAA promoted oxidative DNA damage in rat livers. • AhR target gene CYP 1B1 might be involved in the metabolism of DPAA.

  12. Comparison of latex body paint with wetted gauze wipes for sampling the chemical warfare agents VX and sulfur mustard from common indoor surfaces.

    Science.gov (United States)

    Hernon-Kenny, Laura A; Behringer, Deborah L; Crenshaw, Michael D

    2016-05-01

    Comparison of solvent-wetted gauze with body paint, a peelable surface sampling media, for the sampling of the chemical warfare agents VX and sulfur mustard from nine surfaces was performed. The nine surfaces sampled are those typical of interior public venues and include smooth, rough, porous, and non-porous surfaces. Overall, solvent-wetted gauze (wipes) performed better for the recovery of VX from non-porous surfaces while body paint (BP) performed better for the porous surfaces. The average percent VX recoveries using wipes and BP, respectively, are: finished wood flooring, 86.2%, 71.4%; escalator handrail, 47.3%, 26.7%; stainless steel, 80.5%, 56.1%; glazed ceramic tile, 81.8%, 44.9%; ceiling tile, 1.77%, 13.1%; painted drywall 7.83%, 21.1%; smooth cement, 0.64%, 10.3%; upholstery fabric, 24.6%, 23.1%; unfinished wood flooring, 9.37%, 13.1%. Solvent-wetted gauze performed better for the recovery of sulfur mustard from three of the relatively non-porous surfaces while body paint performed better for the more porous surfaces. The average percent sulfur mustard recoveries using wipes and BP, respectively, are: finished wood flooring, 30.2%, 2.97%; escalator handrail, 4.40%, 4.09%; stainless steel, 21.2%, 3.30%; glazed ceramic tile, 49.7%, 16.7%; ceiling tile, 0.33%, 11.1%; painted drywall 2.05%, 10.6%; smooth cement, 1.20%, 35.2%; upholstery fabric, 7.63%, 6.03%; unfinished wood flooring, 0.90%, 1.74%. PMID:26990562

  13. 电子对抗作战仿真分层半自治Agent系统框架设计%Design of Electronic Warfare Simulation System Framework Based on Semi-autonomous Agent

    Institute of Scientific and Technical Information of China (English)

    成晓鹏; 齐锋; 王枭

    2016-01-01

    In order to redisplay the process of real combat in the electronic warfare simulation system, it designs a layered semi⁃autonomous Agent system framework. Beginning with the point of devising the electronic warfare simulation entity, a new manner of creating entity Agent based on the BDI framework was built and the advantage of semi⁃autonomous Agent was probed. Not only the way how to design Agent became clear, but also the layered semi⁃autonomous Agent structure based on the sort of entities was established. It displays how to use the semi⁃Agent technique in electronic warfare simulation and is re⁃ally significant.%为了在电子对抗作战仿真系统中真实地复现现实作战过程,设计了基于分层半自治Agent的系统框架。从设计电子对抗作战仿真实体Agent的现实意义出发,提出了基于BDI框架的仿真实体Agent设计方法,着重探讨了半自治Agent技术应用于作战仿真领域的巨大优势,明确了个体Agent的设计方法。根据电子对抗作战仿真系统的实体分类结果提出了一种基于分层半自治Agent的系统结构,并分析了不同层次的Agent的功能,为半自治Agent技术应用于电子对抗作战仿真领域提供了思路,具有一定的借鉴意义。

  14. Mass of chlorinated volatile organic compounds removed by Pump-and-Treat, Naval Air Warfare Center, West Trenton, New Jersey, 1996-2010

    Science.gov (United States)

    Lacombe, Pierre J.

    2011-01-01

    Pump and Treat (P&T) remediation is the primary technique used to contain and remove trichloroethylene (TCE) and its degradation products cis 1-2,dichloroethylene (cDCE) and vinyl chloride (VC) from groundwater at the Naval Air Warfare Center (NAWC), West Trenton, NJ. Three methods were used to determine the masses of TCE, cDCE, and VC removed from groundwater by the P&T system since it became fully operational in 1996. Method 1, is based on the flow volume and concentrations of TCE, cDCE, and VC in groundwater that entered the P&T building as influent. Method 2 is based on withdrawal volume from each active recovery well and the concentrations of TCE, cDCE, and VC in the water samples from each well. Method 3 compares the maximum monthly amount of TCE, cDCE, and VC from Method 1 and Method 2. The greater of the two values is selected to represent the masses of TCE, cDCE and VC removed from groundwater each month. Previously published P&T monthly reports used Method 1 to determine the mass of TCE, cDCE, and VC removed. The reports state that 8,666 pounds (lbs) of TCE, 13,689 lbs of cDCE, and 2,455 lbs of VC were removed by the P&T system during 1996-2010. By using Method 2, the mass removed was determined to be 8,985 lbs of TCE, 17,801 lbs of cDCE, and 3,056 lbs of VC removed, and Method 3, resulted in 10,602 lbs of TCE, 21,029 lbs of cDCE, and 3,496 lbs of VC removed. To determine the mass of original TCE removed from groundwater, the individual masses of TCE, cDCE, and VC (determined using Methods 1, 2, and 3) were converted to numbers of moles, summed, and converted to pounds of original TCE. By using the molar conversion the mass of original TCE removed from groundwater by Methods 1, 2, and 3 was 32,381 lbs, 39,535 lbs, and 46,452 lbs, respectively, during 1996-2010. P&T monthly reports state that 24,805 lbs of summed TCE, cDCE, and VC were removed from groundwater. The simple summing method underestimates the mass of original TCE removed by the P&T system.

  15. Analysis of chemical warfare agents in organic liquid samples with magnetic dispersive solid phase extraction and gas chromatography mass spectrometry for verification of the chemical weapons convention.

    Science.gov (United States)

    Singh, Varoon; Purohit, Ajay Kumar; Chinthakindi, Sridhar; Goud, Raghavender D; Tak, Vijay; Pardasani, Deepak; Shrivastava, Anchal Roy; Dubey, Devendra Kumar

    2016-05-27

    A simple, sensitive and low temperature sample preparation method is developed for detection and identification of Chemical Warfare Agents (CWAs) and scheduled esters in organic liquid using magnetic dispersive solid phase extraction (MDSPE) followed by gas chromatography-mass spectrometry analysis. The method utilizes Iron oxide@Poly(methacrylic acid-co-ethylene glycol dimethacrylate) resin (Fe2O3@Poly(MAA-co-EGDMA)) as sorbent. Variants of these sorbents were prepared by precipitation polymerization of methacrylic acid-co-ethylene glycol dimethacrylate (MAA-co-EGDMA) onto Fe2O3 nanoparticles. Fe2O3@poly(MAA-co-EGDMA) with 20% MAA showed highest recovery of analytes. Extractions were performed with magnetic microspheres by MDSPE. Parameters affecting the extraction efficiency were studied and optimized. Under the optimized conditions, method showed linearity in the range of 0.1-3.0μgmL(-1) (r(2)=0.9966-0.9987). The repeatability and reproducibility (relative standard deviations (RSDs) %) were in the range of 4.5-7.6% and 3.4-6.2% respectively for organophosphorous esters in dodecane. Limits of detection (S/N=3/1) and limit of quantification (S/N=10/1) were found to be in the range of 0.05-0.1μgmL(-1) and 0.1-0.12μgmL(-1) respectively in SIM mode for selected analytes. The method was successfully validated and applied to the extraction and identification of targeted analytes from three different organic liquids i.e. n-hexane, dodecane and silicon oil. Recoveries ranged from 58.7 to 97.3% and 53.8 to 95.5% at 3μgmL(-1) and 1μgmL(-1) spiking concentrations. Detection of diethyl methylphosphonate (DEMP) and O-Ethyl S-2-diisopropylaminoethyl methylphosphonothiolate (VX) in samples provided by the Organization for Prohibition of Chemical Weapons Proficiency Test (OPCW-PT) proved the utility of the developed method for the off-site analysis of CWC relevant chemicals. PMID:27113675

  16. Effective methylation of phosphonic acids related to chemical warfare agents mediated by trimethyloxonium tetrafluoroborate for their qualitative detection and identification by gas chromatography-mass spectrometry.

    Science.gov (United States)

    Valdez, Carlos A; Leif, Roald N; Alcaraz, Armando

    2016-08-24

    The effective methylation of phosphonic acids related to chemical warfare agents (CWAs) employing trimethyloxonium tetrafluoroborate (TMO·BF4) for their qualitative detection and identification by gas chromatography-mass spectrometry (GC-MS) is presented. The methylation occurs in rapid fashion (1 h) and can be conveniently carried out at ambient temperature, thus providing a safer alternative to the universally employed diazomethane-based methylation protocols. Optimization of the methylation parameters led us to conclude that methylene chloride was the ideal solvent to carry out the derivatization, and that even though methylated products can be observed surfacing after only 1 h, additional time was not found to be detrimental but beneficial to the process particularly when dealing with analytes at low concentrations (∼10 μg mL(-1)). Due to its insolubility in methylene chloride, TMO·BF4 conveniently settles to the bottom during the reaction and does not produce additional interfering by-products that may further complicate the GC-MS analysis. The method was demonstrated to successfully methylate a variety of Schedule 2 phosphonic acids, including their half esters, resulting in derivatives that were readily detected and identified using the instrument's spectral library. Most importantly, the method was shown to simultaneously methylate a mixture of the organophosphorus-based nerve agent hydrolysis products: pinacolyl methylphosphonate (PMPA), cyclohexyl methylphosphonate (CyMPA) and ethyl methylphosphonate (EMPA) (at a 10 μg mL(-1) concentration each) in a fatty acid ester-rich organic matrix (OPCW-PT-O3) featured in the 38th Organisation for the Prohibition of Chemical Weapons (OPCW) Proficiency Test. In addition, the protocol was found to effectively methylate N,N-diethylamino ethanesulfonic acid and N,N-diisopropylamino ethanesulfonic acid that are products arising from the oxidative degradation of the V-series agents VR and VX respectively. The

  17. 施拉姆在美国心理战中的角色扮演以及传播思想%Role and Communication Ideas of Schramm during Psychology Warfare in American History

    Institute of Scientific and Technical Information of China (English)

    柯泽

    2014-01-01

    Several important communication books have created marvelous academic sight since 1990.Theses books are trying to prove such a point:The establishment of American Communication Science is the result of American Psychology Warfare which constituted real war and Cold War in American history.Schramm played important role in Psychology Warfare.His many researches are relevant to that.%20世纪90年代美国出版的一些传播学著作创造了令人惊讶的学术景观,这些著作试图证明:美国传播学学科的发展和建立是美国心理战的产物,心理战争是现实战争以及冷战的重要组成部分,而施拉姆在美国对内对外心理战中扮演了十分特殊的角色,他的许多研究与此密切相关。

  18. 信息化作战轮式车辆装备保障力量的思考%Thinking about Wheeled Vehicle Equipment Support Power for Information Warfare

    Institute of Scientific and Technical Information of China (English)

    陈煜; 贺宇; 王海

    2012-01-01

    Along with the development of IT and the weaponry of high technology, the requirement of information warfare for wheeled vehicle equipment is more and more higher the importance of wheeled vehicle equipment guarantee is also stressed gradually,are the wheeled vehicle equipment necessariness of ensuring strength research also strengthens constantly. This paper makes a thorongh analysis of support power concept and its essential chenaileristics about information warfare wheeled wehicle equipment, and takes a deep thinking about the generation pattern and the way of it anizing.%随着信息技术及高技术武器装备的发展,信息化作战对轮式车辆装备的要求越来越高,轮式车辆装备保障的重要性也日渐突出,轮式车辆装备保障力量研究的必要性也不断加强.在深入分析信息化作战轮式车辆装备保障力量概念和主要特征的基础上,对信息化作战轮式车辆装备保障力量的生成模式和编组方式进行了思考.

  19. Chemical Warfare: Drugs in Sports

    OpenAIRE

    Percy, E. C.

    1980-01-01

    A number of substances have been used by athletes in an attempt to improve performance in sports. The use of these substances, which are referred to as ergogenic aids, has become widespread; some pose serious health hazards. Ergogenic aids are divided into five broad classifications: physiological, physical, psychological, nutritional and chemical. It is possible, although conclusive proof is lacking, that some substances may give an athlete who takes them an advantage over one who does not. ...

  20. The Strategy of Drone Warfare

    Directory of Open Access Journals (Sweden)

    Mike Fowler

    2014-12-01

    Full Text Available There is a budding controversy with the combat use of Remotely Piloted Aircraft (RPA. Also known as Unmanned Aerial Vehicles (UAV, there is a growing literature critiquing the use of RPAs, often using the pejorative term “drone.” RPAs seem to get the blame for a variety of complaints about policy and employment that have little to do with the airframe or its processes. While all of the military functions of an RPA can and are done by manned aircraft, the RPAs must endure additional scrutiny. The decision to employ RPAs requires additional considerations at both the strategic and operational levels of war. This article explores the strategic issues that govern the decisions to employ RPAs in combat. The decision to employ RPAs involves a variety of strategic and operational concerns involving legal issues, technological constraints, operational efficiency, and an interdependency upon information operations.

  1. Basic Concepts in Cyber Warfare

    Directory of Open Access Journals (Sweden)

    Lior Tabansky

    2011-05-01

    Full Text Available Developments in computers have made possible far reaching changes in all areas of life, and the rapid progress in computing, communications, and software has led to a dramatic reduction in the cost of producing, processing, and disseminating information. Information technologies continue to develop at an accelerated pace, and a new era has arisen in the information revolution. The rapid growth in the fields of computing and communications and the ongoing improvement in the performance of computerized systems have created a new space in the world. Cyberspace, a space created not in nature but by human beings. The interface between a new topic that enables unprecedented capabilities, a technical field that demands professional understanding, and mass media that compete for the consumer creates – perhaps predictably – the potential for obfuscation. National security has also been affected by the information revolution and the cyberspace phenomenon. Smart use of new technologies allows previously unknown capabilities, which together with new methods have generated a qualitative change in the military field. However, a public discussion on the issue of cyber security, as of other new hi-tech fields, is lacking in Israel. This essay focuses on the question of national security in light of the cyberspace phenomenon. It aims to survey the field and create a common language for a fruitful public discussion of the developing issue of cyber security, proposing operative definitions for the issues that can be applied in a discussion of Israel’s national security. The essay first addresses the properties of cyberspace, its inherent vulnerabilities, and possible threats within its realm, and then proceeds to related issues of defense, attack, and deterrence in cyberspace.

  2. Warfare, Fiscal Capacity, and Performance

    DEFF Research Database (Denmark)

    Prado, Mauricio; Dincecco, Mark

    We exploit differences in casualties sustained in pre-modern wars to estimate the impact of fiscal capacity on economic performance. In the past, states fought different amounts of external conflicts, of various lengths and magnitudes. To raise the revenues to wage wars, states made fiscal innova...... estimate substantial impacts of fiscal capacity on GDP per worker. The results are robust to a broad range of specifications, controls, and sub-samples.......We exploit differences in casualties sustained in pre-modern wars to estimate the impact of fiscal capacity on economic performance. In the past, states fought different amounts of external conflicts, of various lengths and magnitudes. To raise the revenues to wage wars, states made fiscal...... innovations, which persisted and helped to shape current fiscal institutions. Economic historians claim that greater fiscal capacity was the key long-run institutional change brought about by historical conflicts. Using casualties sustained in pre-modern wars to instrument for current fiscal institutions, we...

  3. Warfare, Fiscal Capacity, and Performance

    DEFF Research Database (Denmark)

    Dincecco, Mark; Prado, Mauricio

    2012-01-01

    We exploit differences in casualties sustained in pre-modern wars to estimate the impact of fiscal capacity on economic performance. In the past, states fought different amounts of external conflicts, of various lengths and magnitudes. To raise the revenues to wage wars, states made fiscal innova...... estimate substantial impacts of fiscal capacity on GDP per worker. The results are robust to a broad range of specifications, controls, and sub-samples.......We exploit differences in casualties sustained in pre-modern wars to estimate the impact of fiscal capacity on economic performance. In the past, states fought different amounts of external conflicts, of various lengths and magnitudes. To raise the revenues to wage wars, states made fiscal...... innovations, which persisted and helped to shape current fiscal institutions. Economic historians claim that greater fiscal capacity was the key long-run institutional change brought about by historical conflicts. Using casualties sustained in pre-modern wars to instrument for current fiscal institutions, we...

  4. Intelligent methods for cyber warfare

    CERN Document Server

    Reformat, Marek; Alajlan, Naif

    2015-01-01

    Cyberwarfare has become an important concern for governmental agencies as well businesses of various types.  This timely volume, with contributions from some of the internationally recognized, leaders in the field, gives readers a glimpse of the new and emerging ways that Computational Intelligence and Machine Learning methods can be applied to address problems related to cyberwarfare. The book includes a number of chapters that can be conceptually divided into three topics: chapters describing different data analysis methodologies with their applications to cyberwarfare, chapters presenting a number of intrusion detection approaches, and chapters dedicated to analysis of possible cyber attacks and their impact. The book provides the readers with a variety of methods and techniques, based on computational intelligence, which can be applied to the broad domain of cyberwarfare.

  5. THE FRAMEWORK OF OPERATIONAL WARFARE

    OpenAIRE

    Jacobs, C.J.

    2012-01-01

    In 1973 het Bernard Brodie se belangwekkende boek, War and Politics verskyn. Hierin is die verhouding tussen oorlog en Politiek, volgens die Amerikaanse ervaring in die twee Wereldoorloë, Korea en Vietnam, ontleed aan die hand van Clausewitz se uitspraak dat oorlog die voortsetting van politiek metander middele is. Sy bevinding was dat Amerikaanse militêre en politieke leiers nie in genoemde oorloë begrip vir mekaar se verantwoordelikheid gehad het nie. Gevolglik het hulIe besluite geneem wat...

  6. THE FRAMEWORK OF OPERATIONAL WARFARE

    Directory of Open Access Journals (Sweden)

    C.J. Jacobs

    2012-02-01

    Full Text Available In 1973 het Bernard Brodie se belangwekkende boek, War and Politics verskyn. Hierin is die verhouding tussen oorlog en Politiek, volgens die Amerikaanse ervaring in die twee Wereldoorloë, Korea en Vietnam, ontleed aan die hand van Clausewitz se uitspraak dat oorlog die voortsetting van politiek metander middele is. Sy bevinding was dat Amerikaanse militêre en politieke leiers nie in genoemde oorloë begrip vir mekaar se verantwoordelikheid gehad het nie. Gevolglik het hulIe besluite geneem wat verreikende negatiewe gevolge vir Amerikaanse belange gehad het.

  7. Communications, radar and electronic warfare

    CERN Document Server

    Graham, Adrian

    2010-01-01

    A practical guide to the principles of radio communications for both civilian and military applications In this book, the author covers both the civilian and military uses of technology, focusing particularly on the applications of radio propagation and prediction. Divided into two parts, the author introduces the basic theory of radio prediction before providing a step-by-step explanation of how this theory can be translated into real-life applications. In addition, the book presents up-to-date systems and methods to illustrate how these applications work in practice. This includes s

  8. ON ITS WAY TO CLASSICS:WARFARE NARRATION OF HARSH SAND (JING SHA)%走向经典的《惊沙》战争叙事

    Institute of Scientific and Technical Information of China (English)

    唐辉

    2014-01-01

    characters and slow story. In 2011, An Zhanjun's Harsh Sand based on Tough Battle at Linze (Ku Zhan Lin Ze) and developed the narration of the West Route Army in a "most common allegory". The vivid characters, clean actions and proper rhythm in this work resemble what makes a warfare classic.

  9. 战储装备器材长效综合防护包装方法研究%Research on Long-term Effective and Comprehensive Protection and Packaging Method of Warfare Miscellaneous Equipment

    Institute of Scientific and Technical Information of China (English)

    张春和; 赵复涛; 吴志斌; 李敏堂

    2011-01-01

    分析了我军战储装备器材防护包装现状,提出了长效综合防护包装的思想,从器材分类、方案设计、工艺规范等方面研究了战储装备器材长效综合防护包装方法,并进行了实例验证和分析。%Current situation of protection and packaging of warfare miscellaneous equipment was analyzed. The theory of long-term effective and comprehensive protection and packaging was put forward. The method of protection and packaging was studied from equipment classification, conceptual design and process specification, which was validated and analyzed with living examples.

  10. Numericaj simujation on the RCS of carrier-based ejectronic warfare aircraft%舰载电子战飞机 RCS 特性数值模拟

    Institute of Scientific and Technical Information of China (English)

    岳奎志; 贾忠湖; 姬金祖; 苏珉

    2014-01-01

    The radar cross section (RCS)character of carrier-based electronic warfare aircraft (CEWA)is studied.The pitch angle of radar waves to the body under combat section is analyzed.By using CATIA,3D models for the CEWA of type A and type B are built.Based on the physical optics and the equivalent electro-magnetic flow method,the RCSPlus software is used to numerically simulate the RCS character of CEWA under UHF-band,X-band and S-band.The detection probability of aircraft by radars is studied in the condition of electronic warfare.And the simulation results are analyzed with the mathematical statistics method.The results show that in low-altitude stealth aircraft design,reducing the RCS of the aircraft with the pitch angle between-7.30°and 14.78°means reducing the detection distance of all the radars 26 km away and 8 km below;under the X-band,the RCS of type A reduces by 40.95% compared with type B of CEWA;and in electronic warfare, the detection distance by the X-band radar of type A reduces by 63.24% compared with that in non-electronic warfare.%对舰载电子战飞机的雷达散射截面(radar cross section,RCS)特性进行研究。分析作战剖面下雷达波对于机体的俯仰角,建立舰载电子战飞机 A 型号和 B 型号的三维 CATIA 模型,基于物理光学法和等效电磁流法,使用 RCSPlus 软件,数值模拟在 UHF、X 和 S 雷达波段下舰载电子战飞机的 RCS 特性,研究电子战条件下飞机被雷达发现概率,并对仿真结果进行数理统计分析。研究结果表明:对低空隐身飞机设计时,要降低俯仰角在-7.30°至14.78°之间飞机的 RCS 值,就可以降低距离26 km 以外、高度8 km 以下的所有雷达的探测距离;舰载电子战飞机 RCS 特性 A 型号与 B 型号相比,在 X 波段下,头向 RCS 减小了40.95%;舰载电子战飞机 A 型号在与无电子战时相比,被 X 波段雷达探测到距离缩短了63.24%。

  11. Fleet research the power of the media in the information warfare and the relative counter-measures%浅论媒体力量在信息战争中的作用及防范措施

    Institute of Scientific and Technical Information of China (English)

    晏国勋

    2012-01-01

    This article describes the change of the modern media.By analyzing the power and the method of the modern media,the article found that the modern media is widely used by information warfare.Besides of it,the modern media produced amazing results in past sorts of military conflicts and political conflicts.In the end,the article sums up some information security measures for our country to prevent and reduce the bad effect maybe brought by modern media which is used by hostile entities.%本文通过描述现代媒体的转变,着重分析了媒体在近期网络战中的力量、发挥的作用以及取得的惊人效果。最后提出了我国在网络战中需要加强的安全防范措施和手段。

  12. Research on effectiveness simulation of TCT based on network-centric warfare%基于网络中心战的时敏目标效能仿真研究

    Institute of Scientific and Technical Information of China (English)

    闫晶晶; 许腾

    2016-01-01

    文章基于网络中心战"共享-合作-同步"原理,提出了实时目标航迹数据、图像信息共享、兵力行动在时间和空间上合作以及时间敏感目标同步攻击.根据打击时敏目标的效能指标,建立了目标延时、目标发现概率和目标毁伤概率模型,计算"共享-合作-同步"条件下的时敏目标效能,研究结果表明网络中心战模式能够有效改善各项作战效能指标,是提高作战效能的有效手段.%Based on the principle of sharing-cooperation-synchronization in network-centric warfare ,the real-time target track data and image information sharing ,the cooperation of force action in time and space ,and the time-critical target(TCT) synchronization attack are put forward .In view of the indexes used to evaluate the effectiveness of the TCT ,the models of target time delay and probabilities of target detection and damage are established .The effectiveness of the TCT under the condition of sharing-cooperation-synchronization is computed .The result shows that the combat mode based on the network-centric warfare is able to improve in-dexes of combat effectiveness .

  13. Research on the Electronic Warfare System of Upgraded Taiwan Air Force F-16A/B(Block 20)%台军F-16A/B(Block 20)升级后的电子战系统研究

    Institute of Scientific and Technical Information of China (English)

    陈晶; 毛毅; 吴微露

    2012-01-01

    近年来,台湾强调以“非对称”、“资电优势”的思想推动建军,投入巨资进行作战飞机的升级改造,以加强空中作战力量和电子战建设。通过对2012年7月美台签订的台军F-16A/B战斗机升级案的背景、进展以及升级前后机载电子战系统的对比研究,进而分析升级后台军F-16A/B战斗机在电子战系统的性能。%In recent years, Taiwan develops military based on the dissymmetric and advantage information viewpoint, and upgrades bat- tle-planes putting into a large amount of money to enhance the air attack strength and the electronic warfare. The paper explains the perform- ance of the electronic warfare system of upgraded Taiwan' s F-16A/B by analyzing the background and proceeding of Taiwan air force F-16A/ B modernization plan signed on July 2012 and contrasting the electronic warfare system of F-16A/B and upgraded F-16A/B.

  14. 网络中心战条件下舰艇编队作战通道重组优化模型%Opiimized Model of Dynamic Reorganization for Combat Channels of Warship Formation under the Network Centric Warfare

    Institute of Scientific and Technical Information of China (English)

    陈健; 王为颂; 李登峰

    2011-01-01

    作战通道组织是舰艇编队作战指挥的重要内容之一.以网络中心战条件下舰艇编队作战为背景,以作战效益最大化为目标函数,以通道重组耗时为约束条件,建立了编队作战通道重组优化模型.通过实例验证、说明了模型的合理性、实用性,从而为编队作战通道组织决策提供重要的参考和依据.%Organization of combat channels is one of the important contents of combat command.Taking combat of fleet under the NCW(Network Centric Warfare)as the background, taking maximum of benefit of combat as the target function, taking consuming of time for reorganization of combat channels as the restraining condition, this paper establishes optimization model of reorganization for combat channels of fleet. The model proposed in this paper is illustrated with a practical example, and may be provided to decisions for organization of combat channels.

  15. 非战争军事行动中装备维修保障资源需求计算模型%A Requirement Computing Model of Equipment Maintance Resource in Non-Warfare Action

    Institute of Scientific and Technical Information of China (English)

    2013-01-01

    Non-warfare action is one of the important fields for navy forces dispatching ,and it is necessary to provide effective maintenance for equipment in action. To address this issue, a computing model of quantitated demand for maintenance resource was presented, such as maintenance instruments, backup equipment parts,sup⁃port specialist, and so on, based on a series of theories in decision-making, statistical inference and queuing. The model was proven to be effective and practical with lots of real-world instances.%  精确、高效、稳定、可靠的维修保障是海军非战争军事行动顺利实施的必要条件。文章建立了维修设施设备、备品备件、保障专业人员等维修保障资源的需求量化计算模型,并结合实例说明了模型的实际应用。

  16. 信息化条件下作战军民一体化应急物流保障研究%Study on Military-Civil Integrated Emergency Logistics Support for Information-Based Warfare

    Institute of Scientific and Technical Information of China (English)

    吴亚男; 李雄; 王树礼; 陈康柱

    2012-01-01

    Aiming at the problem of how to organize rationally emergency logistics support system, this paper proposes the essential requirements, system, mechanisms and methods of military-civil integrated emergency logistics support for infor- mation-based warfare. The research result can give direction for constructing " integration support system" with Chinese characteristics to improve force system support capability.%针对未来信息化每件下作战中如何科学合理地组织应急物流保障体系的问题,分析了信息化条件下作战军民一体化应急物流保障的基本要求,研究了军民一体化应急物流保障体系和机制,提出了军民一体化应急物流保障的主要方法,为构建具有我军特色的“大保障”体制,从而加快提升部队体系保障能力提供理论指导。

  17. Design and simulation of ex-range gliding wing of high altitude air-launched autonomous underwater vehicles based on SIMULINK

    Institute of Scientific and Technical Information of China (English)

    Pan Changjun; Guo Yingqing

    2013-01-01

    High altitude air-launched autonomous underwater vehicle (AL-AUV) is a new anti-submarine field,which is designed on the Lockheed Martin's high altitude anti-submarine warfare weapons concept (HAAWC) and conducts the basic aerodynamic feasibility in a series of wind tunnel trials.The AL-AUV is composed of a traditional torpedo-like AUV,an additional ex-range gliding wings unit and a descending parachute unit.In order to accurately and conveniently investigate the dynamic and static characteristic of high altitude AL-AUV,a simulation platform is established based on MATLAB/SIMULINK and an AUV 6DOF (Degree of Freedom) dynamic model.Executing the simulation platform for different wing's parameters and initial fixing angle,a set of AUV gliding data is generated.Analyzing the recorded simulation result,the velocity and pitch characteristics of AL-AUV deployed at varying wing areas and initial setting angle,the optimal wing area is selected for specific AUV model.Then the comparative simulations of AL-AUV with the selected wings are completed,which simulate the AUV gliding through idealized windless air environment and gliding with Dryden wind influence.The result indicates that the method of wing design and simulation with the simulation platform based on SIMULINK is accurately effective and suitable to be widely employed.

  18. Analysis of Modeling Method of Network Centric Warfare Superiority Value Chain%网络中心战优势价值链的建模方法分析

    Institute of Scientific and Technical Information of China (English)

    牛福亮; 张耀中; 吕迎迎

    2013-01-01

    The reason that distinguishes network centric warfare (NCW) from other combat patterns is the information network,which fulfills interoperability among all combat forces with the advantage of robustness, and will ultimately result in improved mission effectiveness. For sake of quantitative assessment about the influence that networked command and control information system has on operational effect,the influencing factors attached to superiority transformation are analyzed. The approach to modeling the value chain of NCW is put forward. In this vein,a simulation is carried out, as well as the corresponding analysis,which demonstrates that method aforementioned is feasible to assess complex military information system.%网络中心战强大的威力来自于其鲁棒性的信息网络,通过网络使所有作战力量互联互通,最终使作战任务高效完成。为了定量评估网络化指挥控制信息系统对作战效果的影响,以网络中心战优势转移为切入点,对影响优势转移的因素进行了分析,给出了一种网络中心战优势价值链的建模方法,并结合作战背景进行了相应的仿真计算分析,从而验证了采用该方法分析复杂军事信息系统的可行性。

  19. Multidisciplinary investigation of the fate, transport, and remediation of chlorinated solvents in fractured rocks at the former Naval Air Warfare Center (NAWC): Scientific and management challenges, and strategies for a successful research program

    Science.gov (United States)

    Tiedeman, C. R.; Goode, D. J.; Shapiro, A. M.; Lacombe, P. J.; Chapelle, F. H.; Bradley, P. M.; Imbrigiotta, T. E.; Williams, J. H.; Curtis, G. P.; Hsieh, P. A.

    2008-12-01

    At the former Naval Air Warfare Center (NAWC) in West Trenton NJ, the U.S. Geological Survey, in cooperation with the U.S. Navy and under support from the Strategic Environmental Research and Development Program (SERDP), is investigating the fate, transport, and remediation of trichloroethylene (TCE) and its daughter products in dipping, fractured mudstones underlying the site. TCE concentrations in ground water are as high as ~100 mg/L. Objectives of multidisciplinary research at the NAWC include (1) understanding the physical, chemical, and microbiological processes and properties affecting the fate, transport, and removal of chlorinated solvents in fractured rocks, (2) assessing the efficiency of different remediation methods (pump and treat, natural and enhanced biodegradation), and (3) transferring the results to help remediate other contaminated fractured rock aquifers. There are numerous scientific and technical challenges to meeting these goals, including the extreme spatial variability of flow and transport properties at the NAWC and the complex distribution of contaminants, geochemical constituents, and microorganisms in fractures and the rock matrix. In addition, there are management challenges that are equally important to address in order to achieve a successful research program. These include balancing the requirements of the many parties involved at the site, including researchers, the site owner, and regulatory agencies; and ensuring that limited research funds are directed towards work that addresses the most important scientific questions as well as stakeholder concerns. Strategies for the scientific challenges at NAWC include developing a carefully planned program to characterize spatial variability in rock properties and groundwater constituents so that the data obtained are applicable to solving research questions focused on remediation. Strategies for the management challenges include fostering open lines of communication among all parties and

  20. A New Generation of Thermal Desorption Technology Incorporating Multi Mode Sampling (NRT/DAAMS/Liquid Agent) for Both on and off Line Analysis of Trace Level Airbone Chemical Warfare Agents

    International Nuclear Information System (INIS)

    A multi functional, twin-trap, electrically-cooled thermal desorption (TD) system (TT24-7) will be discussed for the analysis of airborne trace level chemical warfare agents. This technology can operate in both military environments (CW stockpile, or destruction facilities) and civilian locations where it is used to monitor for accidental or terrorist release of acutely toxic substances. The TD system interfaces to GC, GCMS or direct MS analytical platforms and provides for on-line continuous air monitoring with no sampling time blind spots and within a near real time (NRT) context. Using this technology enables on-line sub ppt levels of agent detection from a vapour sample. In addition to continuous sampling the system has the capacity for off-line single (DAAMS) tube analysis and the ability to receive an external liquid agent injection. The multi mode sampling functionality provides considerable flexibility to the TD system, allowing continuous monitoring of an environment for toxic substances plus the ability to analyse calibration standards. A calibration solution can be introduced via a conventional sampling tube on to either cold trap or as a direct liquid injection using a conventional capillary split/splitless injection port within a gas chromatograph. Low level (linearity) data will be supplied showing the TT24-7 analyzing a variety of CW compounds including free (underivitised) VX using the three sampling modes described above. Stepwise changes in vapor generated agent concentrations will be shown, and this is cross referenced against direct liquid agent introduction, and the tube sampling modes. This technology is in use today in several geographies around the world in both static and mobile analytical laboratories. (author)

  1. 航空搜潜声纳浮标位置计算方法研究%The Research of Anti-Submarine Sonar-Buoy Position Calculation Method

    Institute of Scientific and Technical Information of China (English)

    董文洪; 杨日杰; 田宝国

    2005-01-01

    为了实现对海中航空搜潜浮标位置的定位,进行了三方面的研究工作,其一以反潜机的位置、运动路径、反潜机与航空搜潜浮标的相对位置和距离关系为依据,利用斜距测量法,分析了计算搜潜浮标位置的原理和方法;其二采用最小二乘法,建立了反潜机对浮标定位的数学模型及相应的快速定位算法;其三仿真分析了初始估计角对计算浮标位置收敛速度的影响,并对定位算法进行了验证.仿真结果表明所用算法能够达到快速收敛的目的.

  2. Simulation and Analysis of Anti-Submarine Defensive Call-on Searching of Sea-Borne Helicopter%舰载直升机对潜防御性应召搜索仿真分析

    Institute of Scientific and Technical Information of China (English)

    刘峰; 沈治河

    2013-01-01

    Dipping sonar and buoy are main methods of antisubmarine searching. But the common searching process has some shortages such as big searching area and ineffective cooperation. Aimed at the cooperation of dipping sonar and buoy and based on the situation that surface vessel encounters the submarine while on setting course, the paper proposed a method of defensive call-on antisubmarine search of sea-borne helicopter using dipping sonar. By building the threatening course model of the submarine to the surface vessel, the paper reduced the area of call-on antisubmarine search dramatically, and then acquired the action of defensive call—on antisubmarine search of seaborne helicopter using dipping sonar through the analysis and simulaiton.%研究潜防搜索优化问题,吊放声纳和声纳浮标是舰载直升机对潜搜索的主要手段,但在搜索的过程中存在着因搜索面积大导致兵力需求多和如何协同使用才能达到最优搜索效果等问题.针对舰载直升机吊放声纳和声纳浮标在搜潜中的协同,由于水面舰艇在航渡中受到潜艇威胁,提出了一种舰载直升机对潜防御性应召搜索的方法,通过建立潜艇对水面舰艇威胁航向的模型和仿真分析,能够有效缩小舰载直升机应召搜索的范围;同时,建立了舰载直升机吊放声纳搜索及声纳浮标阵列模型,并对舰载直升机使用吊放声纳和声纳浮标协同搜索进行仿真.仿真结果表明,提高了搜索效率,可为吊放声纳和声纳浮标的作战应用提供重要参考.

  3. 双(多)基地声纳浮标系统在反潜中的应用研究%Application of bistatic (multistatic) sonar buoys array on anti-submarine

    Institute of Scientific and Technical Information of China (English)

    凌青; 杨丽; 蔡志明

    2006-01-01

    在双基地声纳系统中,根据能量关系推导出双基地声纳系统最大可探测范围的数学模型;在此基础上,讨论了用双(多)基地声纳浮标系统布放直线阵、圆形阵时的阵形宽度、搜索面积及所需浮标数,并将之与传统被动浮标阵进行了比较.结果表明: 采用双(多)基地浮标阵可以在一定程度上节省浮标数,提高了浮标的使用效率.

  4. 监听时间对声纳浮标阵检查性搜索效能影响仿真%Simulating on Influence of Monitoring Time on Search Efficiency of Sonobuoy Array in Checking Anti-Submarine

    Institute of Scientific and Technical Information of China (English)

    袁杰; 丛红日; 李琰; 王光源

    2010-01-01

    以方形声纳浮标阵检查性搜索为背景,研究了监听时间对声纳浮标阵搜索效能的影响,给出了仿真结果并对仿真结果进行了分析.基本结论为:声纳浮标阵的搜索效能随监听时间的增加而提高;只要开始监听,就可以取得比较高的搜索概率;监听时间的增加和搜索效能的提高不是简单的线性关系,而是大致可区分为快速提高期、平稳提高期和滞涨期3个阶段.应根据作战条件和作战要求合理确定监听时间.

  5. Efficiency Research for On-Call Search Submarine by Anti-submarine Patrol Aircraft Dropping Sonobuoy Array%反潜巡逻机浮标布阵应召搜潜效能研究

    Institute of Scientific and Technical Information of China (English)

    杨兵兵; 鞠建波; 张鑫磊

    2015-01-01

    搜潜效能是评判浮标阵型优劣的重要依据.本文基于应召搜潜,根据已知的潜艇信息,以反潜巡逻机为平台,建立了不同阵型声纳浮标搜潜数学模型.并运用Monte Carlo方法仿真分析了相同条件下,潜艇初始位置分布、初始距离、潜艇航速对浮标阵搜潜效能的影响.结果表明:同等条件下,声纳浮标方形阵搜潜效能最好,其次是圆形阵、三角形阵;三种浮标阵的搜潜效能都随着潜艇初始位置分布、初始距离、潜艇航速的增大而降低.这为指挥员进行浮标布阵提供了有效的辅助决策依据.

  6. Joint application of dipping sonar and sonobuoy in answering the call to anti-submarine%吊放声纳与声纳浮标在应召搜潜中的联合运用

    Institute of Scientific and Technical Information of China (English)

    张晓利; 陈建勇

    2006-01-01

    在介绍吊放声纳与声纳浮标各自在应召搜潜中的运用的基础上,针对两者在单独使用上的不足提出了一种新的搜潜策略,并从理论上说明了这种新的搜潜策略具有一定的优势.

  7. Sonobuoy Checking Search Method Baesed on Networked Aviation Anti-Submarine Search System%基于网络化航空搜潜体系的声纳浮标检查性搜索方法

    Institute of Scientific and Technical Information of China (English)

    丛红日; 周海亮; 于吉红

    2016-01-01

    The basic structure of the network aviation antisubmarine search system and the search methods based on net⁃work aviation antisubmarine search system were analzsed. On this basis , the operation application of sonobuoy based on network aviation antisubmarine search system is studied in detail, and the operation methods whose core was“uniform command, holistic array, concentrative monitor”were put forward. The capability of the operation methods was calculated by modeling, and compared with the operation capability of antisubmarine based on platform, the rationality of the opera⁃tion methods put forward above was validated.%在分析总结网络化航空搜潜体系的基本构成以及基于网络化航空搜潜体系的搜索方法的基础上,对基于网络化航空搜潜体系的声纳浮标作战使用问题进行了系统研究,提出了以“统一指挥、整体布设、集中监听”为核心的作战方法,并通过建立模型,对所提出的作战使用方法的作战能力进行了分析计算,通过与平台反潜作战条件下作战能力的比较,验证了所提出的作战使用方法的合理性。

  8. Sonobuoy anti-submarine check & search method and its effectiveness analysis%声呐浮标对潜检查搜索方法及效能分析

    Institute of Scientific and Technical Information of China (English)

    朱慧

    2006-01-01

    阐述了声呐浮标对潜检查搜索的样式及方法,分析和计算了不同搜索样式的作战效能,得出的结果及相应的战术使用建议对于部队正确使用声呐浮标具有一定的借鉴作用.

  9. Research on Initiative Acoustic Homing Equipment Start-up Opportunity Based on Double-speed Anti-submarine Torpedo%双速制声自导鱼雷主动开机时机研究

    Institute of Scientific and Technical Information of China (English)

    胡宏灿; 周明; 林宗祥; 寇祝

    2015-01-01

    The acoustical signal of torpedo�s initiative acoustic homing equipment is the prominent source which can be easily detected by the submarine. The start⁃up opportunity of torpedo�s homing equipment should be caculated cautiously for torpedo�s hiding. In this paper,the radiation noise of the double⁃speed torpedo is analysed and the speed⁃using policy is pres⁃ented firstly,then the model of initiative acoutic homing equipment start⁃up opportunity is simulated based on the influence of torpedo speed on submarine�s torpedo warring distance and the speed⁃using tactics in the researching stage, the result shows that this mothod is reasonable and conveniet.%鱼雷主动声自导寻的信号是潜艇探测来袭鱼雷的主要信息源之一,主动声自导开机时机是鱼雷发射时需要设定的重要参数,它直接影响鱼雷攻击的隐蔽性。通过分析双速制鱼雷辐射噪声对潜艇鱼雷报警距离的影响,提出了一种双速制鱼雷直航搜索阶段的变速策略,在此基础上建立了鱼雷主动声自导开机时机解算模型,仿真结果表明,此方法简单高效,结论详实可信,对双速制鱼雷发射诸元解算具有一定的实用价值。

  10. Measurement of breakthrough volumes of volatile chemical warfare agents on a poly(2,6-diphenylphenylene oxide)-based adsorbent and application to thermal desorption-gas chromatography/mass spectrometric analysis.

    Science.gov (United States)

    Kanamori-Kataoka, Mieko; Seto, Yasuo

    2015-09-01

    To establish adequate on-site solvent trapping of volatile chemical warfare agents (CWAs) from air samples, we measured the breakthrough volumes of CWAs on three adsorbent resins by an elution technique using direct electron ionization mass spectrometry. The trapping characteristics of Tenax(®) TA were better than those of Tenax(®) GR and Carboxen(®) 1016. The latter two adsorbents showed non-reproducible breakthrough behavior and low VX recovery. The specific breakthrough values were more than 44 (sarin) L/g Tenax(®) TA resin at 20°C. Logarithmic values of specific breakthrough volume for four nerve agents (sarin, soman, tabun, and VX) showed a nearly linear correlation with the reciprocals of their boiling points, but the data point of sulfur mustard deviated from this linear curve. Next, we developed a method to determine volatile CWAs in ambient air by thermal desorption-gas chromatography (TD-GC/MS). CWA solutions that were spiked into the Tenax TA(®) adsorbent tubes were analyzed by a two-stage TD-GC/MS using a Tenax(®) TA-packed cold trap tube. Linear calibration curves for CWAs retained in the resin tubes were obtained in the range between 0.2pL and 100pL for sarin, soman, tabun, cyclohexylsarin, and sulfur mustard; and between 2pL and 100pL for VX and Russian VX. We also examined the stability of CWAs in Tenax(®) TA tubes purged with either dry or 50% relative humidity air under storage conditions at room temperature or 4°C. More than 80% sarin, soman, tabun, cyclohexylsarin, and sulfur mustard were recovered from the tubes within 2 weeks. In contrast, the recoveries of VX and Russian VX drastically reduced with storage time at room temperature, resulting in a drop to 10-30% after 2 weeks. Moreover, we examined the trapping efficiency of Tenax TA(®) adsorbent tubes for vaporized CWA samples (100mL) prepared in a 500mL gas sampling cylinder. In the concentration range of 0.2-2.5mg/m(3), >50% of sarin, soman, tabun, cyclohexylsarin, and HD were

  11. Identification of chemical warfare agents from vapor samples using a field-portable capillary gas chromatography/membrane-interfaced electron ionization quadrupole mass spectrometry instrument with Tri-Bed concentrator.

    Science.gov (United States)

    Nagashima, Hisayuki; Kondo, Tomohide; Nagoya, Tomoki; Ikeda, Toru; Kurimata, Naoko; Unoke, Shohei; Seto, Yasuo

    2015-08-01

    A field-portable gas chromatograph-mass spectrometer (Hapsite ER system) was evaluated for the detection of chemical warfare agents (CWAs) in the vapor phase. The system consisted of Tri-Bed concentrator gas sampler (trapping time: 3s(-1)min), a nonpolar low thermal-mass capillary gas chromatography column capable of raising temperatures up to 200°C, a hydrophobic membrane-interfaced electron ionization quadrupole mass spectrometer evacuated by a non-evaporative getter pump for data acquisition, and a personal computer for data analysis. Sample vapors containing as little as 22μg sarin (GB), 100μg soman (GD), 210μg tabun (GA), 55μg cyclohexylsarin (GF), 4.8μg sulfur mustard, 390μg nitrogen mustard 1, 140μg of nitrogen mustard 2, 130μg nitrogen mustard 3, 120μg of 2-chloroacetophenone and 990μg of chloropicrin per cubic meter could be confirmed after Tri-Bed micro-concentration (for 1min) and automated AMDIS search within 12min. Using manual deconvolution by background subtraction of neighboring regions on the extracted ion chromatograms, the above-mentioned CWAs could be confirmed at lower concentration levels. The memory effects were also examined and we found that blister agents showed significantly more carry-over than nerve agents. Gasoline vapor was found to interfere with the detection of GB and GD, raising the concentration limits for confirmation in the presence of gasoline by both AMDIS search and manual deconvolution; however, GA and GF were not subject to interference by gasoline. Lewisite 1, and o-chlorobenzylidene malononitrile could also be confirmed by gas chromatography, but it was hard to quantify them. Vapors of phosgene, chlorine, and cyanogen chloride could be confirmed by direct mass spectrometric detection at concentration levels higher than 2, 140, and 10mg/m(3) respectively, by bypassing the micro-concentration trap and gas chromatographic separation. PMID:26118803

  12. Measurement of breakthrough volumes of volatile chemical warfare agents on a poly(2,6-diphenylphenylene oxide)-based adsorbent and application to thermal desorption-gas chromatography/mass spectrometric analysis.

    Science.gov (United States)

    Kanamori-Kataoka, Mieko; Seto, Yasuo

    2015-09-01

    To establish adequate on-site solvent trapping of volatile chemical warfare agents (CWAs) from air samples, we measured the breakthrough volumes of CWAs on three adsorbent resins by an elution technique using direct electron ionization mass spectrometry. The trapping characteristics of Tenax(®) TA were better than those of Tenax(®) GR and Carboxen(®) 1016. The latter two adsorbents showed non-reproducible breakthrough behavior and low VX recovery. The specific breakthrough values were more than 44 (sarin) L/g Tenax(®) TA resin at 20°C. Logarithmic values of specific breakthrough volume for four nerve agents (sarin, soman, tabun, and VX) showed a nearly linear correlation with the reciprocals of their boiling points, but the data point of sulfur mustard deviated from this linear curve. Next, we developed a method to determine volatile CWAs in ambient air by thermal desorption-gas chromatography (TD-GC/MS). CWA solutions that were spiked into the Tenax TA(®) adsorbent tubes were analyzed by a two-stage TD-GC/MS using a Tenax(®) TA-packed cold trap tube. Linear calibration curves for CWAs retained in the resin tubes were obtained in the range between 0.2pL and 100pL for sarin, soman, tabun, cyclohexylsarin, and sulfur mustard; and between 2pL and 100pL for VX and Russian VX. We also examined the stability of CWAs in Tenax(®) TA tubes purged with either dry or 50% relative humidity air under storage conditions at room temperature or 4°C. More than 80% sarin, soman, tabun, cyclohexylsarin, and sulfur mustard were recovered from the tubes within 2 weeks. In contrast, the recoveries of VX and Russian VX drastically reduced with storage time at room temperature, resulting in a drop to 10-30% after 2 weeks. Moreover, we examined the trapping efficiency of Tenax TA(®) adsorbent tubes for vaporized CWA samples (100mL) prepared in a 500mL gas sampling cylinder. In the concentration range of 0.2-2.5mg/m(3), >50% of sarin, soman, tabun, cyclohexylsarin, and HD were

  13. Engineering Construction of Military Supply Chain on the Basis of Informatization Warfare%基于信息化战争的军事供应链工程建设

    Institute of Scientific and Technical Information of China (English)

    祝尔坚

    2012-01-01

      The modern warfare is more dependent on the war energy. It is not only focus on the use of high-tech, including information technology and other tools, to increase the efficiency in the use of war energy in the battlefield, but also work on the conversion efficiency and quality from the economy energy to the war energy. In this regard, we shall pay particular attention to military acquisition which is acting as a bridge in the process of transition from economy energy to war energy. The acquisition department will be in close contact with other functionalities, e.g.: logistics, technology support and other services departments to display the supporting function of the military supply chain in future battlefield. The modern information warfare is becoming to be more and more stereoscopic with a high speed pattern which is in depth and excluding the line operation. It is driving the war movement into a multi-dimensional area. The original line-operation model, i.e. working on the front line, did not exist any more. The joint service on war is much more preferred. The recent practice showed that the logistics support is expected to play a very special role in the future war. No matter how advanced the weaponry will come to be, as long as there is no immediate, sufficient and precise support from logistics side, the tactical arrangements/operations as well as the combat effectiveness cannot be commenced smoothly. The information technology as a philosophy, which is influencing and infiltrating the various fields of this era, is maturing itself in a dynamic development. In the field of logistics support, the application of information technology is an enhanced technology to develop the resource space, improve the efficiency of allocation and to ensure an effective materials transportation and resource usage. The main focus and further development of information technology is aiming at achieving the optimal efficiency in military economy by constructively settling

  14. Refocusing NATO's intelligence outlook towards biological warfare

    OpenAIRE

    Villareal, Claro William.

    1996-01-01

    Approved for public release; distribution is unlimited Today, we are attempting to manage chaos. With the end of the Cold War, a number of troubling developments in the world have been unleashed, especially the proliferation of WMD. Biological weapons are an increasing threat to world security. Nations and non-state actors are willing to sell or buy the necessary technologies for the production of biological weapons which can have disastrous effects on a military, an economy, and the envir...

  15. [Biological warfare and terror: prevention and countermeasures].

    Science.gov (United States)

    Hansen, John-Erik Stig

    2010-01-11

    Biological weapons are the most commonly used weapons of mass destruction. Serious international concerns exist about their use by non-state actors, and such use is facilitated by developments in biotechnology. In Denmark, counter-proliferation is served by a new biosecurity act and the establishment of a new biosecurity authority. Aspects of biopreparedness have also been strengthened. International collaboration is necessary in order to enhance both the security measures aimed at avoiding the misuse of science but also to enhance societal resilience if potentially devastating biological attacks should occur. PMID:20074489

  16. Cyber warfare: Unity in defence / John Kennedy

    Index Scriptorium Estoniae

    Kennedy, John

    2011-01-01

    Eesti president Toomas Hendrik Ilves räägib Eestit tabanud küberrünnakutest 2007. a., NATO küberkaitsekeskuse tegevusest Tallinnas, e-riigi kiirest arengust, NATO ja Euroopa Liidu koostöö olulisusest küberjulgeoleku valdkonnas, küberkaitseliidust

  17. Information management and the biological warfare threat

    OpenAIRE

    Martinez, Antonio

    2002-01-01

    Approved for public release; distribution is unlimited This thesis explores the implications of information management of government-funded projects on national security objectives. A case study of the Human Genome Project is used to illustrate the risk of information transfer between government sources and private industry and the implications posed to the proliferation of Weapons of Mass Destruction. The issue of risk in information management is approached by developing three theoretica...

  18. Globalization and Asymmetrical Warfare: Operation Athena

    Directory of Open Access Journals (Sweden)

    Paul Clep

    2011-02-01

    Full Text Available Since 2003, Operation Athena represents Canada’s contribution to the International Security Assistance Force (ISAF in Afghanistan. This article explains the Canadian role as an international security provider in general and a closer look on the background, the rationale and the structure of Operation Athena - how it supports the Canadian priorities and objectives in Afghanistan toward 2011.

  19. A short history of biological warfare.

    Science.gov (United States)

    Metcalfe, Neil

    2002-01-01

    Biological weapons have been used in war from the start of recorded history. This article reviews the history of the subject, including the outbreak of the Black Death and the use of smallpox against American Indians. The new science of microbiology was misused from soon after its start and, despite the 1925 Geneva Protocol, the Japanese experimented extensively on prisoners in China. The Allies carried out extensive research during the Second World War, notably the United Kingdom into anthrax on Gruinard Island and the United States into a variety of agents. Despite the 1972 Biological Weapons Convention (BWC), a major programme continued in the former Soviet Union (leading to an accidental outbreak of anthrax). Most recently Iraq was revealed as having an extensive programme, with weaponization of large amounts of various agents, and several terrorists groups have attempted to use biological agents as weapons. Modern developments in biotechnology could lead to even more serious developments, and effective preventive measures, including strengthening of the BWC, are imperative. PMID:12201085

  20. Cyber-warfare: jus post bellum

    OpenAIRE

    Cisneros, Maribel

    2015-01-01

    Approved for public release; distribution is unlimited There is a lack of attention to the aftermath of a deployed cyber weapon: There is no mechanism for the assignment of accountability for the restoration of affected infrastructure and remediation of violation of established laws of war after cyberattacks occur. This study analyzes International Humanitarian Law and international treaties as they apply to the cyber post-conflict period and explores current jus post bellum frameworks, wh...

  1. A Triage Model for Chemical Warfare Casualties

    Directory of Open Access Journals (Sweden)

    Khoshnevis

    2015-08-01

    Full Text Available Context The main objectives of triage are securing patient safety during the process of emergency diagnosis and treatment, and reduction of waiting time for medical services and transport. To date, there is no triage system for nerve agent victims. Evidence Acquisition This systematic review proposes a new triage system for patients exposed to nerve agents. Information regarding clinical signs and symptoms of intoxication with nerve agents, primary treatments, and classification of patients were extracted from the literature. All related articles were reviewed. Subsequently, specialists from different disciplines were invited to discuss and draft protocols. Results Finalized triage tables summarizing the classification methods and required protocols in the field were designed after several meetings. Conclusions The proposed triage protocol encompasses aspects from most of the existing triage systems to create a single overarching guide for unifying the triage process. The proposed protocol can serve as a base for the designing future guidelines.

  2. A short history of biological warfare.

    Science.gov (United States)

    Metcalfe, Neil

    2002-01-01

    Biological weapons have been used in war from the start of recorded history. This article reviews the history of the subject, including the outbreak of the Black Death and the use of smallpox against American Indians. The new science of microbiology was misused from soon after its start and, despite the 1925 Geneva Protocol, the Japanese experimented extensively on prisoners in China. The Allies carried out extensive research during the Second World War, notably the United Kingdom into anthrax on Gruinard Island and the United States into a variety of agents. Despite the 1972 Biological Weapons Convention (BWC), a major programme continued in the former Soviet Union (leading to an accidental outbreak of anthrax). Most recently Iraq was revealed as having an extensive programme, with weaponization of large amounts of various agents, and several terrorists groups have attempted to use biological agents as weapons. Modern developments in biotechnology could lead to even more serious developments, and effective preventive measures, including strengthening of the BWC, are imperative.

  3. Asymmetric Warfare: M31 and its Satellites

    CERN Document Server

    Fardal, Mark A

    2009-01-01

    Photometric surveys of M31's halo vividly illustrate the wreckage caused by hierarchical galaxy formation. Several of M31's satellites are being disrupted by M31's tidal field, among them M33 and And I, while other tidal structures are the corpses of satellites already destroyed. The extent to which M31's satellites have left battle scars upon it is unknown; to answer this we need accurate orbits and masses of the perturbers. I focus here on M31's 150-kpc-long Giant Southern Stream (GSS) as an example of how these can be determined even in the absence of a visible progenitor. Comparing N-body models to photometric and spectroscopic data, I find this stream resulted from the disruption of a large satellite galaxy by a close passage about 750 Myr ago. The GSS is connected to several other debris structures in M31's halo. Bayesian sampling of the simulations estimates the progenitor's initial mass as log(Mstar/Msun) = 9.5 +- 0.2, showing it was one of the most massive Local Group galaxies until quite recently. T...

  4. The application of microrobotics in warfare

    Energy Technology Data Exchange (ETDEWEB)

    Solem, J.

    1996-09-01

    This is the final report of a one-year, Laboratory-Directed Research and Development (LDRD) project at the Los Alamos National Laboratory (LANL). The project sought to conduct a detailed theoretical study of military microrobot requirements and performance in conflict situations. The study was directed toward construction of a proof-of-concept prototype with attention to its eventual mass manufacture using microlithographic fabrication techniques. The study included design and performance assessment of payloads for the microvehicle, which might include special sensors and data processing equipment for gathering intelligence, or electrical, mechanical, and chemical disrupters of various sorts.

  5. Detection of Chemical Warfare Agents by Differential Mobility Spectrometry and Drift-time Ion Mobility Spectrometry Hybrid Technology%差分离子迁移谱和迁移时间离子迁移谱联用技术检测化学战剂模拟物

    Institute of Scientific and Technical Information of China (English)

    程沙沙; 陈创; 王卫国; 李海洋

    2014-01-01

    Using a novel hybrid technology combined differential ion mobility spectrometry ( DMS) with drift time ion mobility spectrometry DMS-IMS2 , we detected the typical chemical warfare agent simulants dimethyl methylphosphonate ( DMMP ) and methyl salicylate ( MS) . With carrier gas 800 mL/min and DMS RF voltage 1100 V, the chemical warfare agents DMMP and MS could be detected and characterized by DMS-IMS2 under DIMS mode. In addition, DMS-IMS2 is capable to monitor positive and negative ions of DMMP and MS simultaneously, and provides the two-dimensional separation parameters DMS compensation voltage ( CV) and IMS drift time ( Td ) , which provides more information for the identification of two chemical warfare agents. DMS-IMS2 has potential application in on-site detection and instrument miniaturization due to its advantages including small size, low power consumption and rapid response time.%采用平板式差分离子迁移谱( DMS)和迁移时间离子迁移谱( DTIMS)联用技术( DMS-IMS2)对典型化学战剂模拟物甲基膦酸二甲酯(DMMP)和水杨酸甲酯(MS)进行测定。实验结果表明,在载气800 mL/min, DMS射频电压1100 V条件下,DMS-IMS2在DIMS模式能够实现DMMP和MS两种化学战剂模拟物的有效识别和检测。另外,DMS-IMS2能够实现DMMP和MS正、负离子的同时检测,同时获得DMMP和MS的DMS补偿电压( CV)和IMS迁移时间( Td )的二维分离信息,为两种化学战剂模拟物的准确鉴定提供更多的信息。DMS-IMS2具有二维分析能力、可同时分析正负离子、响应速度快、体积小、功耗低等优点,在现场检测中具有广阔的应用前景。

  6. Disposition Method of Aircraft Carrier Formation in Basic Mode of Operations%基本作战样式下航母编队兵力配置方法

    Institute of Scientific and Technical Information of China (English)

    朴成日; 沈治河

    2013-01-01

    The disposition of aircraft carrier formation is a basic problem in the operations of aircraft carrier formation. It is studied from the point of view on the operational tasks in the paper. The basic mode of operations of aircraft carrier formation is divided into four categories; anti-air warfare, anti-ship warfare, anti-submarine warfare, coast warfare. The operational tasks are conducted by means of the basic mode of operations. Based on the operational tasks executed by aircraft carrier formation in every mode of operations, the principle and function of the disposition of aircraft carrier formation are put forward. The train of thought is provided as reference for the disposition of aircraft carrier formation.%航母编队兵力配置是航母编队作战运用的基础内容,从作战任务的角度来研究航母编队兵力配置问题.航母编队基本作战样式可分为对空作战、对海作战、对潜作战和对岸作战4种,航母编队通过基本作战样式的组合来达成作战任务.基于每种作战样式下航母编队兵力执行的作战任务,确定了兵力配置的原则和方法.为研究航母编队兵力配置问题提供了一种可借鉴的思路.

  7. A Modeling Method of Attack Intention of Submarine for Vessel Formation%一种潜艇对水面舰艇编队攻击意图建模方法

    Institute of Scientific and Technical Information of China (English)

    苏琦; 于敬人; 金国栋

    2014-01-01

    为了提高水面舰艇编队的防潜效能,有效预测威胁潜艇的可能攻击行为,对不同态势下,潜艇对编队的攻击意图深入研究;研究过程中,首先以基于Markov过程的潜艇占位能力模型为基础,研究潜艇在不同态势下对水面舰艇编队的占领阵位能力;随后通过潜艇在不同位置的占领阵位能力指数,构建攻击意图模型,分析潜艇在不同阵位时对编队的攻击意图,最终为编队防潜作战提供决策建议;最后通过实例计算和分析,证明该方法可用、有效。%In order to improve anti-submarine performance of vessel formation,it is necessary to predict the behavior of threat submarine and its attack intention under different situation.During the research,the paper first studied the capability of occupying attack position for submarine based on the Markov model of occupying attack position in different battlefield situation.Then the paper proposed a model of attack inten-tion,based on the capability index of submarine occupying attack position from different position.The pa-per also analyzed the submarine attack intention,and ultimately to provide policy recommendations for the formation of anti-submarine warfare.Finally,an example calculation and analysis show that the method can be used effectively.

  8. 国民党新军阀混战与工农武装割据--以井冈山和中央革命根据地的成功开创为例%Tangled Warfare among the KMT New Warlords and the Armed IndePendent Regimes of Workers and Peasants---For An ExamPle of the Successful Creation of the Jinggangshan and Central Revolutionary Bases

    Institute of Scientific and Technical Information of China (English)

    黄少群

    2014-01-01

    Mao Zedong once pointed out that,“the long - term split and warfare among white regimes provided a condition which made it possible that a small piece or some pieces of red areas under the CPC’s leadership came into being and survived in the surrounding of white regimes. ”This paper,taking examples of the success-ful creation of the Jinggangshan and Central Revolutionary Bases,elaborates the development process of the armed independent regimes of workers and peasants,i. e. ,the Red Army and rural revolutionary bases,led by Chinese communists represented by Mao Zedong and Zhu De in the clearances of tangled warfare among the KMT new warlords around the 1930s. The realization of armed independent regimes based on the tangled warfare of the KMT new warlords embodies the CPC leaders’strategic thinking of seeking for proper development oppor-tunities.%毛泽东曾指出:“因为有了白色政权间的长期的分裂和战争,便给了一种条件,使一小块或若干小块的共产党领导的红色区域,能够在四围白色政权包围的中间发生和坚持下来。”本文以井冈山和中央革命根据地的成功开创为例,阐述在上世纪30年代前后的国民党新军阀混战的空隙中,中国共产党通过以毛泽东、朱德为代表领导的工农武装割据,实现红军和农村革命根据地发展壮大的历程。借国民党新军阀混战之机实现工农武装割据,体现了中国共产党领导人审时度势寻找发展机遇的高超战略思维。

  9. 信息化战争指导思想管窥--基于孙子和克劳塞维茨军事哲学的视角%A General Review on the Military Ideology of Information Warfare--A Perspective of Sun Tzu and Clausewitz’s Military Philosophy

    Institute of Scientific and Technical Information of China (English)

    刘玉青; 龚衍丽; 闫忠林

    2015-01-01

    This paper analyzes applicability of classical military doctrine for information wars by perspective of culture and thought. It argues that Clausewitz’s military theory guiding the conventional kinetic energy war is more applicable. However, China’s famous ancient military thinker Sun Tzu advocated the adoption of the intelligence and fraud in an effort to achieve the aim of“dispelling enemy soldiers without a fight”, which is more suitable for the future network warfare. Facing a new form of war, our army should combine the thoughts of both Sun Tzu and Clausewitz to command the future wars.%以文化和思维的视角比较分析经典军事理论对信息化战争的适用性,认为克劳塞维茨的战争理论指导信息化时代的动能战争较为适用,而我国古代著名军事思想家孙子主张通过情报、欺诈而达到“不战而屈人之兵”的目的,更适合于未来网络化的战争形态。面对信息化的战争形态,应以孙子和克劳塞维茨相结合的思想,来指挥未来信息化作战的非动能与动能战争。

  10. Cyber Defense Exercises and their Role in Cyber Warfare

    Directory of Open Access Journals (Sweden)

    Bogdan Alexandru Bratosin

    2014-06-01

    Full Text Available The threat of cyber-attacks is increasing with the access to PC’s and Internet of a larger number of people around the world. Although the Internet provides a large number of advantages, it can also be used as a cyber-weapon in order to serve the interests of counties, political and economic groups or individual. The cyber-attacks of today are capable to disable the manufacturing of nuclear bombs of a country. Thus, there is an increasing demand for IT security specialists. Cyber-defense exercises (CDX are by far the most complex and up to date methods of training the next generation of IT security specialists.

  11. Borders in Education and Living- a Case of Trench Warfare.

    Science.gov (United States)

    Hviid, Pernille

    2016-03-01

    In this paper the notion of border will be examined in a cultural life course perspective. I will investigate borders as psycho-cultural constructions created to enable and control meaning-making in the intersection between subjects engagements and concerns and collectively constructed and guiding meanings. An empirical analysis of one boy's life course in and between home, school and a Leisure Time Activity Center in the years 1st to 3rd grade demonstrates a systemic construction of borders involving him, his teachers and his parents and renders the boy to choose between becoming an engaged pupil or a dedicated son. As such, the analysis can illuminate processes of school - home interactions that work opposite of what is intended and become detrimental to children's life. In a cultural life course perspective borders show how life is maintained as meaningful and not only guide the present living but also serve as directional guides into the future. PMID:26205071

  12. The enemy below: preparing ground forces for subterranean warfare

    OpenAIRE

    Bowes, Joshua S.; Newdigate, Mark T.; Rosario, Pedro J.; Tindoll, Davis D.

    2013-01-01

    Approved for public release; distribution is unlimited. This capstone project analyses subterranean threats in the contemporary operational environment. It identifies the doctrinal gap in the U.S. military regarding operations within tunnels, urban and natural cavities, and other underground facilities, and outlines the changes necessary to prepare ground forces to operate in these complex environments. This paper reviews historical cases spanning back over half a millennium, proposes a ne...

  13. Selfishness, warfare and economics; or integration, cooperation and biology

    Directory of Open Access Journals (Sweden)

    Emiliano Jesus Salvucci

    2012-05-01

    Full Text Available The acceptance of Darwin's theory of evolution by natural selection is not complete and it has been pointed out its limitation to explain the complex processes that constitute the transformation of species. The darwinian paradigm had its origin in the free market theories and concepts of Malthus and Spencer. Nature was explained on the basis of market theories moving away from an accurate explanation of natural phenomena. It is common that new discoveries bring about contradictions that are intended to be overcome by adjusting results to the dominant reductionist paradigm using all sorts of gradations and combinations that are admitted for each case. Modern findings represent a challenge to the interpretation of the observations with the Darwinian view of competition and struggle for life as theoretical basis. New holistic interpretations are emerging related with the Net of Life, in which the interconnection of ecosystems constitutes a dynamic and self-regulating biosphere: Viruses are recognized as a macroorganism with a huge collection of genes, most unknown, that constitute the major planet's gene pool with a fundamental role in evolution. The hologenome theory considers an organism and all of its associated symbiotic microbes as a result of symbiopoiesis. Microbes, helmints, that normally are understood as parasites, are cohabitants and they have cohabited with their host and drives the evolution and existence of the partners. Each organism is a result of integration of complex systems. The eukaryotic organism is the result of combination of bacterial, virus and eukaryotic DNA and the interaction of its own genome with the genome of its microbiota resulting in an intertwined metabolism (a superorganism along evolution. These new interpretations are remarkable points to be considered in order to construct a solid theory adjusted to the facts and with less speculations and tortuous semantic traps.

  14. Selfishness, warfare and economics; or integration, cooperation and biology

    OpenAIRE

    Emiliano Jesus Salvucci

    2012-01-01

    The acceptance of Darwin's theory of evolution by natural selection is not complete and it has been pointed out its limitation to explain the complex processes that constitute the transformation of species. The darwinian paradigm had its origin in the free market theories and concepts of Malthus and Spencer. Nature was explained on the basis of market theories moving away from an accurate explanation of natural phenomena. It is common that new discoveries bring about contradictions that are i...

  15. Chemical warfare and medical response during World War I.

    Science.gov (United States)

    Fitzgerald, Gerard J

    2008-04-01

    The first large-scale use of a traditional weapon of mass destruction (chemical, biological, or nuclear) involved the successful deployment of chemical weapons during World War I (1914-1918). Historians now refer to the Great War as the chemist's war because of the scientific and engineering mobilization efforts by the major belligerents. The development, production, and deployment of war gases such as chlorine, phosgene, and mustard created a new and complex public health threat that endangered not only soldiers and civilians on the battlefield but also chemical workers on the home front involved in the large-scale manufacturing processes. The story of chemical weapons research and development during that war provides useful insights for current public health practitioners faced with a possible chemical weapons attack against civilian or military populations.

  16. Terahertz signatures of biological-warfare-agent simulants

    Science.gov (United States)

    Globus, Tatiana; Woolard, Dwight L.; Khromova, Tatyana; Partasarathy, Ramakrishnan; Majewski, Alexander; Abreu, Rene; Hesler, Jeffrey L.; Pan, Shing-Kuo; Ediss, Geoff

    2004-09-01

    This work presents spectroscopic characterization results for biological simulant materials measured in the terahertz gap. Signature data have been collected between 3 cm-1 and 10 cm-1 for toxin Ovalbumin, bacteria Erwinia herbicola, Bacillus Subtilis lyophilized cells and RNA MS2 phage, BioGene. Measurements were conducted on a modified Bruker FTIR spectrometer equipped with the noise source developed in the NRAL. The noise source provides two orders of magnitude higher power in comparison with a conventional mercury lamp. Photometric characterization of the instrument performance demonstrates that the expected error for sample characterization inside the interval from 3 to 9.5 cm-1 is less then 1%.

  17. Corner capping of silsesquioxane cages by chemical warfare agent simulants.

    Science.gov (United States)

    Ferguson-McPherson, Melinda K; Low, Emily R; Esker, Alan R; Morris, John R

    2005-11-22

    The room-temperature uptake and reactivity of gas-phase methyl dichlorophosphate (MDCP) and trichlorophosphate (TCP) within trisilanolphenyl-polyhedral oligomeric silsesquioxane (POSS) Langmuir-Blodgett films are investigated. The halogenated phosphate molecules are found to readily diffuse into and react with the hybrid inorganic-organic silicon-oxide films under ambient conditions. Reflection absorption infrared spectroscopy (RAIRS), X-ray photoelectron spectroscopy (XPS), and fast atom bombardment-mass spectrometry (FAB-MS) measurements suggest that the chlorophosphates undergo hydrolysis with the silanol groups of the POSS LB-film. Substitution and elimination reactions appear to cap the corner of the POSS molecules, leaving a surface-bound phosphoryl group and a resulting structure that is highly stable at elevated temperatures. PMID:16285795

  18. Future war and Chechnya : a case for hybrid warfare

    OpenAIRE

    Nemeth, William J.

    2002-01-01

    Approved for public release; distribution is unlimited Modern states are increasingly challenged by violence that has been created through the devolution of states. Devolving states are those states that have returned to a more traditional socio-political organization and as a result operate under a differing set of norms than modern states. Devolving states are unstable, highly violent, anarchic societies, as traditional norms are mixed with modern socio-political theories, norms, and tec...

  19. Selfishness, warfare, and economics; or integration, cooperation, and biology.

    Science.gov (United States)

    Salvucci, Emiliano

    2012-01-01

    The acceptance of Darwin's theory of evolution by natural selection is not complete and it has been pointed out its limitation to explain the complex processes that constitute the transformation of species. It is necessary to discuss the explaining power of the dominant paradigm. It is common that new discoveries bring about contradictions that are intended to be overcome by adjusting results to the dominant reductionist paradigm using all sorts of gradations and combinations that are admitted for each case. In addition to the discussion on the validity of natural selection, modern findings represent a challenge to the interpretation of the observations with the Darwinian view of competition and struggle for life as theoretical basis. New holistic interpretations are emerging related to the Net of Life, in which the interconnection of ecosystems constitutes a dynamic and self-regulating biosphere: viruses are recognized as a macroorganism with a huge collection of genes, most unknown that constitute the major planet's gene pool. They play a fundamental role in evolution since their sequences are capable of integrating into the genomes in an "infective" way and become an essential part of multicellular organisms. They have content with "biological sense" i.e., they appear as part of normal life processes and have a serious role as carrier elements of complex genetic information. Antibiotics are cell signals with main effects on general metabolism and transcription on bacterial cells and communities. The hologenome theory considers an organism and all of its associated symbiotic microbes (parasites, mutualists, synergists, amensalists) as a result of symbiopoiesis. Microbes, helmints, that are normally understood as parasites are cohabitants and they have cohabited with their host and drive the evolution and existence of the partners. Each organism is the result of integration of complex systems. The eukaryotic organism is the result of combination of bacterial, virus, and eukaryotic DNA and it is the result of the interaction of its own genome with the genome of its microbiota, and their metabolism are intertwined (as a "superorganism") along evolution. The darwinian paradigm had its origin in the free market theories and concepts of Malthus and Spencer. Then, nature was explained on the basis of market theories moving away from an accurate explanation of natural phenomena. It is necessary to acknowledge the limitations of the dominant dogma. These new interpretations about biological processes, molecules, roles of viruses in nature, and microbial interactions are remarkable points to be considered in order to construct a solid theory adjusted to the facts and with less speculations and tortuous semantic traps. PMID:22919645

  20. Selfishness, warfare, and economics; or integration, cooperation, and biology

    OpenAIRE

    Salvucci, Emiliano

    2012-01-01

    The acceptance of Darwin's theory of evolution by natural selection is not complete and it has been pointed out its limitation to explain the complex processes that constitute the transformation of species. It is necessary to discuss the explaining power of the dominant paradigm. It is common that new discoveries bring about contradictions that are intended to be overcome by adjusting results to the dominant reductionist paradigm using all sorts of gradations and combinations that are admitte...

  1. Chemiluminescence assay for the detection of biological warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Langry, K; Horn, J

    1999-11-05

    A chemiluminescent homogeneous immunoassay and a hand-size multiassay reader are described that could be used for detecting biological materials. The special feature of the assay is that it employs two different antibodies that each bind to a unique epitope on the same antigen. Each group of epitope-specific antibodies has linked to it an enzyme of a proximal-enzyme pair. One enzyme of the pair utilizes a substrate in high concentration to produce a second substrate required by the second enzyme. This new substrate enables the second enzyme to function. The reaction of the second enzyme is configured to produce light. This chemiluminescence is detected with a charge-coupled device (CCD) camera. The proximal pair enzymes must be in close proximity to one another to allow the second enzyme to react with the product of the first enzyme. This only occurs when the enzyme-linked antibodies are attached to the antigen, whether antigen is a single protein with multiple epitopes or the surface of a cell with a variety of different antigens. As a result of their juxtaposition, the enzymes produce light only in the presence of the biological material. A brief description is given as to how this assay could be utilized in a personal bio-agent detector system.

  2. EW 101 a first course in electronic warfare

    CERN Document Server

    Adamy, David L

    2000-01-01

    This popular series of tutorials, featured over a period of years in the Journal of Electronic Defense, is now available in a single volume. Organized into chapters with new introductory and supplementary material from the author, you get clear, concise and well-illustrated examinations of critical topics such as antenna parameters, receiver sensitivity, processing tasks, and search strategies, LPI signals, jamming, communication links, and simulation. The chapters define key terms and explain how and why particular technologies are relevant to electronic defense. Detailed charts, diagrams and

  3. Integrating botnet simulations with network centric warfare simulations

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2010-04-01

    "Botnets," or "bot armies," are large groups of remotely controlled malicious software designed and operated in order to conduct attacks against government and civilian targets. Bot armies are one of the most serious security threats to networks and computer systems in operation today. Botnets are remotely operated by botmasters who can launch large-scale malicious network activity. While bot army activity has, to date, been largely limited to fraud, blackmail, and other criminal activity, their potential for causing large-scale damage to the entire internet and launching large-scale, coordinated attacks on government computers, networks, and data gathering operations has been underestimated. This paper will not discuss how to build bots but instead discuss ways to use simulation to address the threats they pose. This paper suggests means for addressing the need to provide botnet defense training based upon existing simulation environments and discusses the capabilities needed for training systems for botnet activities. In this paper we discuss botnet technologies and review the capabilities that underlie this threat to network, information, and computer security. The second section of the paper contains background information about bot armies and their foundational technologies. The third section contains a discussion of the techniques we developed for estimating botnet bandwidth consumption and our approach for simulating botnet activities. The fourth section contains a summary and suggestions for additional research.

  4. Technology and Development Trend of Surface Ship Anti-Submarine and Anti-Torpedo Weapons Launch Control%舰载反潜反鱼雷武器发射控制的技术特点及发展趋势

    Institute of Scientific and Technical Information of China (English)

    姜雨男

    2015-01-01

    This paper analyzes the technology present situation and the common characteristics of anti⁃submarine and anti⁃torpedo weapons launch control for surface ship,such as rocket poised depth charge,rocket acoustic decoy,tubes of torpedo and rocket⁃assisted torpedo, etc. According to the demand of anti⁃submarine and anti⁃torpedo weapons launch control commom⁃frame launch and comprehensive launch control, it puts forward some developing direction of launch control in the future.%分析了火箭助飞式悬浮深弹、火箭助飞式声诱饵、管装鱼雷和火箭助飞鱼雷等舰载反潜反鱼雷武器发射控制的技术现状和共有的技术特点,并针对反潜反鱼雷武器共架发射、综合发控的需求,提出了反潜反鱼雷武器发射控制未来的发展方向。

  5. 反潜巡逻机布放包围浮标阵应召搜潜建模与仿真%Modeling and Simulation for On-Call Search Submarine by Anti-submarine Patrol Aircraft Dropping Encircle Sonobuoy Array

    Institute of Scientific and Technical Information of China (English)

    蒋志忠; 杨日杰; 李大龙; 张丹

    2011-01-01

    According to classical checking search means, and combining the actual process of submarine search, and against the background of some antisubmarine patrol aircraft, the mathematical models of route planning such as dropping circle sonobuoy array, dropping square sonobuoy array and dropping triangle sonobuoy array were built. The search submarine efficiency of different was analyzed. The influences of the initial distance between the submarine and the antisubmarine patrol aircraft, the initial position distribution, and the submarine economical speed and the ocean environment noise level on the search efficiency were simulated. The results showed that it could obtain the better search efficiency by dropping square sonobuoy array and the search efficien and the antisubmarine patrol cy ai of the three means decreases, while the initial distance between the submarine rcraft, the initial position distribution, and the submarine economical speed and the ocean environment noise level increasing%依据经典的浮标应召搜潜方法,结合实际搜潜过程,以某型反潜巡逻机为背景,建立了反潜巡逻机布放圆形阵、方形阵和三角形阵搜潜航路规划的数学模型。对3种阵形的搜潜效能进行分析,仿真了初始距离、潜艇初始位置散布、潜艇经济航速和海洋环境噪声级对浮标阵搜潜效能的影响。仿真结果分析表明:相同条件下,方形阵的搜潜效能要略高于圆形阵和三角形阵的搜潜效能;3种包同阵的搜潜效能均随初始距离、初始位置散布、潜艇经济航速和海洋环境噪声级的增大而降低。

  6. Sonobuoy's Optimized Search Depth Research Based on Game Theory%用博弈论求解浮标最佳工作深度

    Institute of Scientific and Technical Information of China (English)

    秦锋; 孙明太; 周利辉

    2013-01-01

    In anti-submarine warfare,it is difficult to choose the sonobuoy's search depth for obtaining the optimum detection effectiveness because of the unknown depth of submarine and complex underwater acoustic environmental .Therefore,it is necessary to gain the sonobuoy's optimized search depth using game theory and simulation of underwater acoustic environmental effect .The optimized depth can guarantee the maximum detection capability for the sonobuoy even when the submarine is at a depth difficult to be detected .%在反潜作战过程中,水声环境复杂和潜艇航深未知给声纳浮标探测带来一定困难,从而面临采用何种工作深度取得最佳探测效能的问题。因此,有必要在模拟水声环境效应的基础上,利用博弈论求取声纳浮标换能器最佳工作深度,该深度应能保证即使潜艇处于最不利于水声设备搜索的深度,声纳浮标也具备较大的探测能力。

  7. Sonar technology in entering 21 century%进入21世纪的声纳技术

    Institute of Scientific and Technical Information of China (English)

    李启虎

    2012-01-01

    海洋开发和反潜战的需求是推动声纳技术发展的巨大动力.水声物理、水声信号处理及相关学科的进步又促使声纳设计日趋完善.本文介绍声纳技术在进入21世纪时所面临的机遇和挑战;水声信号处理领域近期研究的热点问题以及声纳系统设计中的技术创新课题.%The requirement of ocean exploring and anti-submarine warfare is the main motivation of sonar technology development. The advances in the field of underwater acoustic physics, underwater acoustic signal processing and other related sciences and technology considerably improve the sonar design. The development opportunities and challenges, which sonar technology faced in enter 21 century are described in this paper. Some recent hot topics in underwater signal processing and technical innovation problem in sonar design are presented.

  8. US-Japan relationship in the 1980s: achievements, challenges, and opportunities

    Energy Technology Data Exchange (ETDEWEB)

    1983-01-01

    The critical importance for the political economic, and security interests of the two countries is stressed. A healthy and productive association between them contributes in fundamental ways to the security and economic growth of the Asian region. And it provides the basis for more rapid restructuring of the world's two most dynamic and advanced economies. The military power of the Soviet Union has grown inexorably over the past decade, as have Moscow's deployments in Asia of naval, air, and ground forces. These developments increase the need to strengthen and broaden the coordination of long-term US and Japanese strategic policy toward the Soviet Union and especially the US-Japan defense relationship within the context of the Mutual Security Treaty. The United States and Japan must remain sensitive to the increasing strains within the Soviet empire, while pursuing political, economic, and military policies toward the Soviet Union consistent with unified and firm resistance to Soviet expansionism. Of particular concern in providing for the joint defense of US and Japanese mutual interests is the need to expand Japan's role in such fields as surveillance, air defense, and anti-submarine warfare that contribute to the security of the Japanese home islands and the sea lanes in the waters surrounding Japan. Japanese and US leadership in militarily relevant fields of technology provide an important asset for needed improvements in their joint defense capabilities.

  9. Toxins as weapons of mass destruction. A comparison and contrast with biological-warfare and chemical-warfare agents.

    Science.gov (United States)

    Madsen, J M

    2001-09-01

    Toxins are toxic chemical compounds synthesized in nature by living organisms. Classifiable by molecular weight, source, preferred targets in the body, and mechanism of action, they include the most potent poisons on the planet, although considerations of production, weaponization, delivery, environmental stability, and host factors place practical limits on their use as WMD. The two most important toxin threats on the battlefield or in bioterrorism are probably botulinum toxin (a series of seven serotypes, of which botulinum toxin A is the most toxic for humans) and SEB, an incapacitating toxin. Ricin and the trichothecene mycotoxins, including T-2 mycotoxin, are of lesser concern but are still potential threats. Botulinum toxin is a neurotoxin, ricin and trichothecene mycotoxins are membrane-damaging proteins, and SEB is a superantigen capable of massive nonspecific activation of the immune system. The clinical intoxications resulting from exposure to and absorption (usually by inhalation) of these agents reflect their underlying pathophysiology. Because of the hybrid nature of toxins, they have sometimes been considered CW agents and sometimes BW agents. The current trend seems to be to emphasize their similarities to living organisms and their differences from CW agents, but examination of all three groups relative to a number of factors reveals both similarities and differences between toxins and each of the other two categories of non-nuclear unconventional WMD. The perspective that groups toxins with BW agents is logical and very useful for research and development and for administrative and treaty applications, but for medical education and casualty assessment, there are real advantages in clinician use of assessment techniques that emphasize the physicochemical behavior of these nonliving, nonreplicating, intransmissible chemical poisons. PMID:11577702

  10. 机载声纳浮标作用距离建模与仿真%Modeling and Simulation for Operating Range of Airborne Sonobuoys

    Institute of Scientific and Technical Information of China (English)

    郭新奇; 付霖宇; 蒋志忠; 杨日杰

    2011-01-01

    To satisfy the needs of airborne anti-submarine warfare command and control system for evaluating the effectiveness of sonobuoys in submarine searching, a model for predicting the operating range of the sono-buoys was established. Firstly, the prediction model was induced according to the equation of sonar. Then .calculation models for each parameter in the operating range prediction model were established and analyzed. At last .simulation was made to analyze the operating ranges of active/passive sonobuoys by using the prediction model under the condition of specific ocean environment with certain detection probability and false alarm probability. The results can provide a valuable reference for operating range prediction of airborne sonobuoys.%为了满足航空反潜指挥控制系统对声纳浮标搜潜效能进行评估的需要,建立了声纳浮标的作用距离预报模型.首先根据声纳方程,推导出了声纳浮标作用距离的预报模型.然后建立了模型中各个参数的计算模型,并进行分析.最后,针对特定的海洋环境,在一定检测概率和虚警概率条件下,根据作用距离的预报模型仿真分析了主被动声纳浮标的作用距离,为机载声纳浮标的作用距离预报提供了有价值的参考.

  11. Research on Submarine Localization and Evasion on Sonobuoys Array%潜艇对声纳浮标阵定位及规避策略

    Institute of Scientific and Technical Information of China (English)

    张林琳; 杨日杰; 高学强

    2012-01-01

    航空反潜战中,潜艇处于不利地位,如何提高潜艇对抗反潜机的作战能力、是亟待解决的问题.分析了潜艇通过拖曳综合浮标和电子支援措施Electronic Support Measure(ESM)设备对声纳浮标阵进行估计定位的单站双址交叉测向和基于方位角变化率的方法,以及潜艇方位角、角速率和航速对定位误差的影响.建立了潜艇对声纳浮标位置估计模型、提出了潜艇突破声纳浮标阵封锁应采用的规避策略.结果表明,潜艇可以对声纳浮标进行定位,为潜艇规避声纳浮标阵提供参考.%In aero anti-submarine warfare, submarine is always in an unfavorable condition. It is very important to improve the engagement capability of submarine against antisubmarine plane. This paper analyses two methods of submarine localization on sonobuoys array using towed integration buoy or ESM: the method of mono-static two point direction finding location and the method using bearing rate of change. The effect on localization error of submarine's bearing, bearing rate of change and velocity is also analysised. A model of submarine estimating sonobuoys array's localization is established, and then an evasion strategy of submarine to break through sonobuoys array is proposed. The result shows that submarine can localize sonobuoys array, which can offer reference to submarine in ASW.

  12. 混合战争与复合战争的比较%A Comparative Analysis of Hybrid Warfare and Compound Warfare

    Institute of Scientific and Technical Information of China (English)

    弗兰克·霍夫曼; 李力; 慕春子

    2010-01-01

    本文是弗兰克·霍夫曼于2009年第10期上发表的一篇文章,本文首先定义了混合威胁,以及混合威胁包含的五个要素,继而通过作者所研究的14个案例比较了混合战争与复合战争之间存在的差异和相似之处,并期望将混合战争的概念纳入到政府和军方的决策层中.

  13. The Enemy Below - The Global Diffusion of Submarines and Related Technology

    Energy Technology Data Exchange (ETDEWEB)

    Weiss, K G

    2002-09-05

    The end of the Cold War seemed to create a more peaceful international environment. September 11 reminded us of the dangers of complacency. Indeed, even before September 11 US forces had intervened in a number of wars and crises, including Panama, the Persian Gulf War, Somalia, Rwanda, Bosnia, Kosovo, several Taiwan Straits crises, the North Korea nuclear weapons crisis, and most recently Afghanistan. US ability to intervene in remote areas of the world is often dependent on the Navy's ability to project power ashore. As a result, US ability to influence events in crisis situations, especially between or among nuclear powers, may become more difficult along with our ability to conduct littoral warfare. Although the numbers of potentially hostile submarines have declined with the end of the Cold War, US anti-submarine warfare capabilities have also declined. Moreover, foreign submarines and related technologies are likely to diffuse globally. New technologies like Air Independent Propulsion (AIP), improved weapons and sensors will make conventional submarines more dangerous, and the spread of nuclear submarines even to a few more countries raise political, military, environmental, and safety concerns. Submarines are one of the key weapon systems used alone or in combination with other weapon systems such as coastal defense missiles, aircraft, and other sea-based missile platforms to deny US ability to project power ashore, Thus, other countries who wish to deny the US the ability to interfere with their regional or even global ambitions may emphasize the acquisition and/or development of submarines. As the world become more multipolar over the longer term, as the Chinese believe it will, countries such as Russia, China. etc., may be able to acquire the submarine capabilities to challenge us not just regionally, but in blue waters. To the extent that our alliance relationships require US naval access or superiority to sustain them, then our erstwhile friendly

  14. Extraordinary Measures: Drone Warfare, Securitization, and the “War on Terror”

    OpenAIRE

    Romaniuk Scott Nicholas; Webb Stewart Tristan

    2015-01-01

    The use of unmanned aerial vehicles or “drones,” as part of the United States’ (US) targeted killing (TK) program dramatically increased after the War on Terror (WoT) was declared. With the ambiguous nature and parameters of the WoT, and stemming from the postulation of numerous low-level, niche-, and other securitizations producing a monolithic threat, US drone operations now constitute a vital stitch in the extensive fabric of US counterterrorism policy. This article employs the theories of...

  15. Capillary zone electrophoresis analysis and detection of mid-spectrum biological warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Boulet, C.A.; Townsley, C.

    1995-04-01

    DRE Suffield has initiated a research program to develop methods and equipment for field detection and laboratory identification of mid-spectrum agents, molecules of biological origin such as proteins, peptides and toxins. In this study, a highly efficient and reproducible capillary zone electrophoresis method was developed to separate and identify a series of nine peptides of defence interest: bradykinin, bradykinin fragment 1-5, substance P,ARG8-vasopressin, luteinizing hormone releasing hormone, bombesin, leucine enkephalin, methionine enkephalin, and oxytocin. Using a 50 micrometer x 47 cm capillary column, 22.5 kV separation voltage and a 100 mM pH 2.5 phosphate buffer, all nine peptide could separated in under 10 minutes. Three strategies, which could be used in a fully automated field detection and identification system, were demonstrated for the identification of unknown peptides: comparison of migration times, comparison of electrophoretic mobilities, and co-injection of multiple reference standards. These experiments demonstrate that a separation based analytical method such as capillary electrophoresis could form the basis of a generic detection system for mid-spectrum protein and peptide toxins.

  16. THE CONTRIBUTION MADE BY T.E. LAWRENCE TO THE THEORY OF REVOLUTIONARY WARFARE

    OpenAIRE

    G.K.B. Barron

    2012-01-01

    Lawrence was basically an academic thrown into the hurly-burly of leading an Arab revolt against Turkish domination. It could be said that the war in the Middle East was a sideshow of the First World War and Lawrence's part was a ' ... sideshow to the sideshow'l) Why then has Lawrence been remembered when greater military men have been forgotten? The romanticism of his exploits are surely the reason, and yet the fact that he is the first modern theorist and possibly the "father" of modern rev...

  17. 75 FR 69032 - Naval Surface Warfare Center, Potomac River, Dahlgren, VA; Danger Zone

    Science.gov (United States)

    2010-11-10

    ..., Dahlgren, VA; Danger Zone AGENCY: United States Army Corps of Engineers, Department of Defense. ACTION... amend an existing permanent danger zone in the waters of the Upper Machodoc Creek and the Potomac River... River Test Range. Many of the tests are hazardous operations presenting a danger to persons or...

  18. Environmental toxicity of Chemical Warfare Agents (CWAs) - MicrotoxTM and Spontaneous Locomotor Changes

    DEFF Research Database (Denmark)

    Storgaard, Morten Swayne; Sanderson, Hans; Baatrup, Erik

    After the 2nd World War the CWAs were prohibited by law and 11,000 tonnes of toxic agents were dumped in the Bornholm Basin east of Bornholm. The dumped chemical munitions have not reached attention from politicians and scientists until recently. During earlier projects, such as MERCW (2005...... to be illuminated in which this study hopefully will contribute to. Especially, chronic toxicity needs to be described as this mimics a more environmentally realistic situation. One or two compounds will be accessed based upon various factors such as detection frequencies, found concentrations in both sediment...... to the commercially important cod (Gadus morrhua). The cod migrates down to the seafloor – even crossing the oxycline - where the CWA munitions were dumped. To sum up, this study will obtain novel ecotoxicity data on recently discovered degradation products and assess the potential threat to the commercially...

  19. Emerging threat to America: non-state entities fighting fourth generation warfare in Mexico

    OpenAIRE

    Treglia, Philip.

    2010-01-01

    CHDS State/Local Approved for public release; distribution is unlimited The 2007 Merida Initiative provides the framework for the cooperation between America and Mexico, supporting the fight against the Pack Virus in Mexico. The new American-Mexican policy of combating the drug cartels, transnational gangs, and paramilitaries is a first step in creating a real U.S. Northern Command (USNORTHCOM) theater defense. The USNORTHCOM Mexico strategy is a supporting effort to the U.S. defens...

  20. Proving communal warfare among hunter-gatherers: The Quasi-Rousseauan error.

    Science.gov (United States)

    Gat, Azar

    2015-01-01

    Was human fighting always there, as old as our species? Or is it a late cultural invention, emerging after the transition to agriculture and the rise of the state, which began, respectively, only around ten thousand and five thousand years ago? Viewed against the life span of our species, Homo sapiens, stretching back 150,000-200,000 years, let alone the roughly two million years of our genus Homo, this is the tip of the iceberg. We now have a temporal frame and plenty of empirical evidence for the "state of nature" that Thomas Hobbes and Jean-Jacque Rousseau discussed in the abstract and described in diametrically opposed terms. All human populations during the Pleistocene, until about 12,000 years ago, were hunter-gatherers, or foragers, of the simple, mobile sort that lacked accumulated resources. Studying such human populations that survived until recently or still survive in remote corners of the world, anthropology should have been uniquely positioned to answer the question of aboriginal human fighting or lack thereof. Yet access to, and the interpretation of, that information has been intrinsically problematic. The main problem has been the "contact paradox." Prestate societies have no written records of their own. Therefore, documenting them requires contact with literate state societies that necessarily affects the former and potentially changes their behavior, including fighting. PMID:26081116

  1. A review of skin conditions in modern warfare and peacekeeping operations.

    Science.gov (United States)

    Gelman, Ari B; Norton, Scott A; Valdes-Rodriguez, Rodrigo; Yosipovitch, Gil

    2015-01-01

    Skin is the most exposed organ of the body, and military personnel face many external skin threats. As a result, skin disease is an important source of morbidity among military personnel deployed on combat or peacekeeping operations. This article reviews the most common conditions seen by deployed military dermatologists. A PubMed search was used to identify articles in English, written between 1965 and 2014, using medical subject headings "military medicine" AND "skin disease" or "military personnel" AND "skin disease." The five most common reasons for physician consultation for skin conditions in wartime since the Vietnam War were warts (10.7%), fungal infections (10.4%), acne (9.0%), nonspecific eczematous conditions (7.1%), and sexually transmitted diseases (6.1%). There was a significant difference in the skin conditions seen in the hot and humid climates of Vietnam and East Timor, where bacterial and fungal infections were more common reasons for consultation, and the dry climates of Bosnia and Iraq, where eczematous conditions made up a larger part of the dermatologic caseload. PMID:25562855

  2. The impact of the Little Ice Age on Danish warfare in the 17th century

    OpenAIRE

    Nielsen, Caspar le Fevre

    2016-01-01

    The goal of this thesis is to analyze in what way the Little Ice Age, a colder climatic period between around 1300-1850, affected the development of the modern Danish state. This is though too large a scope for a single thesis and the wars between 1550-1750 have been chosen as an area of focus. These wars changed the geopolitical position of Denmark in the Nordic area, from a strong nation to a minor player. The worst outcome came, as Denmark lost all processions east of the Sound Strait to i...

  3. Ram-air sample collection device for a chemical warfare agent sensor

    Science.gov (United States)

    Megerle, Clifford A.; Adkins, Douglas R.; Frye-Mason, Gregory C.

    2002-01-01

    In a surface acoustic wave sensor mounted within a body, the sensor having a surface acoustic wave array detector and a micro-fabricated sample preconcentrator exposed on a surface of the body, an apparatus for collecting air for the sensor, comprising a housing operatively arranged to mount atop the body, the housing including a multi-stage channel having an inlet and an outlet, the channel having a first stage having a first height and width proximate the inlet, a second stage having a second lower height and width proximate the micro-fabricated sample preconcentrator, a third stage having a still lower third height and width proximate the surface acoustic wave array detector, and a fourth stage having a fourth height and width proximate the outlet, where the fourth height and width are substantially the same as the first height and width.

  4. Military Leader Development and Autonomous Learning: Responding to the Growing Complexity of Warfare

    Science.gov (United States)

    Mensch, Kirk G.; Rahschulte, Tim

    2008-01-01

    The complexity in today's operational military environment and the responsibility of leadership in this environment has exponentially increased over the past century. This trend will continue as global economies, political structures, and technologies continue to evolve. Learner autonomy is recognized as a paramount concern in leadership programs,…

  5. [The organizational aspects of treating light casualties in modern warfare (2)].

    Science.gov (United States)

    Nechaev, E A; Maksimov, G K; Agapov, V K; Golov, Iu S

    1993-07-01

    The experience gathered by Medical Service during the war in Afghanistan and during liquidation of the consequences of various disasters and accidents has shown that the most rational method of treatment of minor wounded near the combat area or zone of disaster was a two-staged (and sometimes a three-staged) management system. At the combat tactical zone it is expedient to render the secondary surgical care and reanimation procedures of vital cases, and also provide treatment of minor wounded who could be returned to their ranks in 10 days. For this purpose it is necessary to integrate the sections of medical triage and minor wounded treatment into organic structure of the Brigade medical company and Divisional hospital. As for Army Medical Brigade it must have in its structure a hospital for minor wounded who could be returned to their ranks in 20 days. All the wounded who have to be treated more than 20 days must be evacuated to the Front hospital for minor wounded.

  6. The Florentine Archives in Transition: Government, Warfare and Communication (1289–1530 ca.)

    Science.gov (United States)

    2016-01-01

    A turning point in European administrative and documentary practices was traditionally associated, most famously by Robert-Henri Bautier, with the monarchies of the late sixteenth and early seventeenth centuries. By summarizing previous research in this field, as well as by using both published and unpublished sources, this article intends to underline an earlier process of transition connected to the development of significant new techniques for the production and preservation of documents in Renaissance Italian city-states. Focusing on the important case of Florence, the administrative uses of records connected to government, diplomacy and military needs will be discussed, and evidence will be provided that such documentary practices accelerated significantly during the so-called Italian Wars (from 1494 onwards). A particular reason of interest for Florence at this time is that a major role in the production and storage of a large quantity of state papers was played by Niccolò Machiavelli, one of the outstanding political thinkers of the age. This was especially true in connection to the new militia which he himself created in 1506. By stressing the role of information management and the importance of correspondence networks at a time of war and crisis, this article also contributes to recent scholarship which has focused on the growth of public records relating to diplomacy in Italy during the second half of the fifteenth century, as well as to a recent field of historiography which has lately gained importance: namely the ‘documentary history of institutions’. PMID:27478290

  7. Computational Enzymology and Organophosphorus Degrading Enzymes: Promising Approaches Toward Remediation Technologies of Warfare Agents and Pesticides.

    Science.gov (United States)

    Ramalho, Teodorico C; de Castro, Alexandre A; Silva, Daniela R; Cristina Silva, Maria; Franca, Tanos C C; Bennion, Brian J; Kuca, Kamil

    2016-01-01

    The re-emergence of chemical weapons as a global threat in hands of terrorist groups, together with an increasing number of pesticides intoxications and environmental contaminations worldwide, has called the attention of the scientific community for the need of improvement in the technologies for detoxification of organophosphorus (OP) compounds. A compelling strategy is the use of bioremediation by enzymes that are able to hydrolyze these molecules to harmless chemical species. Several enzymes have been studied and engineered for this purpose. However, their mechanisms of action are not well understood. Theoretical investigations may help elucidate important aspects of these mechanisms and help in the development of more efficient bio-remediators. In this review, we point out the major contributions of computational methodologies applied to enzyme based detoxification of OPs. Furthermore, we highlight the use of PTE, PON, DFP, and BuChE as enzymes used in OP detoxification process and how computational tools such as molecular docking, molecular dynamics simulations and combined quantum mechanical/molecular mechanics have and will continue to contribute to this very important area of research. PMID:26898655

  8. Distinct human antibody response to the biological warfare agent Burkholderia mallei.

    Science.gov (United States)

    Varga, John J; Vigil, Adam; DeShazer, David; Waag, David M; Felgner, Philip; Goldberg, Joanna B

    2012-10-01

    The genetic similarity between Burkholderia mallei (glanders) and Burkholderia pseudomallei (melioidosis) had led to the general assumption that pathogenesis of each bacterium would be similar. In 2000, the first human case of glanders in North America since 1945 was reported in a microbiology laboratory worker. Leveraging the availability of pre-exposure sera for this individual and employing the same well-characterized protein array platform that has been previously used to study a large cohort of melioidosis patients in southeast Asia, we describe the antibody response in a human with glanders. Analysis of 156 peptides present on the array revealed antibodies against 17 peptides with a > 2-fold increase in this infection. Unexpectedly, when the glanders data were compared with a previous data set from B. pseudomallei infections, there were only two highly increased antibodies shared between these two infections. These findings have implications in the diagnosis and treatment of B. mallei and B. pseudomallei infections.

  9. Computational Enzymology and Organophosphorus Degrading Enzymes: Promising Approaches Toward Remediation Technologies of Warfare Agents and Pesticides.

    Science.gov (United States)

    Ramalho, Teodorico C; de Castro, Alexandre A; Silva, Daniela R; Silva, Maria Cristina; Franca, Tanos C C; Bennion, Brian J; Kuca, Kamil

    2016-01-01

    The re-emergence of chemical weapons as a global threat in hands of terrorist groups, together with an increasing number of pesticides intoxications and environmental contaminations worldwide, has called the attention of the scientific community for the need of improvement in the technologies for detoxification of organophosphorus (OP) compounds. A compelling strategy is the use of bioremediation by enzymes that are able to hydrolyze these molecules to harmless chemical species. Several enzymes have been studied and engineered for this purpose. However, their mechanisms of action are not well understood. Theoretical investigations may help elucidate important aspects of these mechanisms and help in the development of more efficient bio-remediators. In this review, we point out the major contributions of computational methodologies applied to enzyme based detoxification of OPs. Furthermore, we highlight the use of PTE, PON, DFP, and BuChE as enzymes used in OP detoxification process and how computational tools such as molecular docking, molecular dynamics simulations and combined quantum mechanical/molecular mechanics have and will continue to contribute to this very important area of research.

  10. Wars Without Beginning or End: Violent Political Organizations and Irregular Warfare in the Sahel-Sahara

    DEFF Research Database (Denmark)

    Walther, Olivier; Leuprecht, Christian; Skillicorn, David

    This article examines the structure and spatial patterns of violent political organizations in the Sahel-Sahara, a region characterized by growing political instability over the last 20 years. Drawing on a public collection of disaggregated data, the article uses network science to represent alli......, the article shows that national management strategies and foreign military interventions have profoundly affected the movement of Islamist groups....... related to nine Trans-Saharan Islamist groups between 2004 and 2014. Spatial analysis suggests that cross-border movement has intensified following the establishment of military bases by AQIM in Mali but reveals no evidence of a border ‘sanctuary’. Owing to the transnational nature of conflict...

  11. Marital Relationship and Its Associated Factors in Veterans Exposed to High Dose Chemical Warfare Agents

    Directory of Open Access Journals (Sweden)

    Shervin Assari

    2008-06-01

    Full Text Available Objective: The aim of this study was to determine the associates of marital relationship in mustard exposed veterans.Materials and Methods: Two hundred ninety two married Iranian mustard exposed veterans, who had been exposed to single high dose mustard gas in Iraq-Iran war, were assessed for marital adjustment with Revised Dyadic Adjustment Scale (RDAS. Census sampling was done. The patients' quality of life (SF-36, spirometric measures and war related data were also extracted.Results: A total of 189 subjects (65% completed our study. The mean (±SD of the RDAS Total score, RDAS Dyadic Consensus , RDAS Affectional Expression, RDAS Dyadic Satisfaction , and RDAS Dyadic Cohesion were 50.61 (8.16, 16.67 (2.77, 7.62 (1.84, 14.76 (3.39, and 11.54 (3.79, respectively. RDAS Dyadic satisfaction was correlated with SF-36 and all its sub-scores (p<0.05. RDAS total score showed significant correlation with SF-36 total score and most of its sub-scores (p<0.05. RDAS affective expression was significantly correlated with role limitation, social function, general mental health, vitality, General health perceptions, physical composite score (PCS and mental composite score (MCS (p<0.05. RDAS dyadic consensus was not correlated with any SF-36 sub-scores.Conclusion: Veterans health team including physicians, psychologists and/or psychiatrists should know that poorer marital satisfaction is linked with lower quality of life scores, late after mustard exposure, although marital relationship is independent of spirometric findings, age, duration from exposure and comorbidity score.

  12. Wars Without Beginning or End: Violent Political Organizations and Irregular Warfare in the Sahel-Sahara

    CERN Document Server

    Walther, Olivier; Skillicorn, David

    2016-01-01

    This article examines the structure and spatial patterns of violent political organizations in the Sahel-Sahara, a region characterized by growing political instability over the last 20 years. Drawing on a public collection of disaggregated data, the article uses network science to represent alliances and conflicts of 179 organizations that were involved in violent events between 1997 and 2014. To this end, we combine two spectral embedding techniques that have previously been considered separately: one for directed graphs (relationships are asymmetric), and one for signed graphs (relationships are positive or negative). Our result show that groups that are net attackers are indistinguishable at the level of their individual behavior, but clearly separate into pro- and anti-political violence based on the groups to which they are close. The second part of the article maps a series of 389 events related to nine Trans-Saharan Islamist groups between 2004 and 2014. Spatial analysis suggests that cross-border mov...

  13. The Florentine Archives in Transition: Government, Warfare and Communication (1289–1530 ca.)

    Science.gov (United States)

    2016-01-01

    A turning point in European administrative and documentary practices was traditionally associated, most famously by Robert-Henri Bautier, with the monarchies of the late sixteenth and early seventeenth centuries. By summarizing previous research in this field, as well as by using both published and unpublished sources, this article intends to underline an earlier process of transition connected to the development of significant new techniques for the production and preservation of documents in Renaissance Italian city-states. Focusing on the important case of Florence, the administrative uses of records connected to government, diplomacy and military needs will be discussed, and evidence will be provided that such documentary practices accelerated significantly during the so-called Italian Wars (from 1494 onwards). A particular reason of interest for Florence at this time is that a major role in the production and storage of a large quantity of state papers was played by Niccolò Machiavelli, one of the outstanding political thinkers of the age. This was especially true in connection to the new militia which he himself created in 1506. By stressing the role of information management and the importance of correspondence networks at a time of war and crisis, this article also contributes to recent scholarship which has focused on the growth of public records relating to diplomacy in Italy during the second half of the fifteenth century, as well as to a recent field of historiography which has lately gained importance: namely the ‘documentary history of institutions’.

  14. Endless Hide-and-Seek: Dynamic Co-evolution in Plant-Bacterium Warfare

    Institute of Scientific and Technical Information of China (English)

    Libo Shan; Ping He; Jen Sheen

    2007-01-01

    Plants possess innate immune systems to prevent most potential infections. The ancient and conserved innate immune responses are triggered by microbe-associated molecular patterns (MAMPs) and play important roles in broad-spectrum defenses. However, successful bacterial pathogens evolved type Ⅲvirulence effectors to suppress MAMP-mediated immunity. To survive, plants further developed highly specific resistance (R) genes to trigger gene-for-gene-mediated immunity and turn the virulent pathogens into avirulent ones. We summarize here the very recent advances in this dynamic coevolution of plantbacterium interaction.

  15. Semi-continuous high speed gas analysis of generated vapors of chemical warfare agents

    NARCIS (Netherlands)

    Trap, H.C.; Langenberg, J.P.

    1999-01-01

    A method is presented for the continuous analysis of generated vapors of the nerve agents soman and satin and the blistering agent sulfur mustard. By using a gas sampling valve and a very short (15 cm) column connected to an on-column injector with a 'standard length' column, the system can either b

  16. Chemical Warfare Agents Analyzer Based on Low Cost, Room Temperature, and Infrared Microbolometer Smart Sensors

    Directory of Open Access Journals (Sweden)

    Carlo Corsi

    2012-01-01

    Full Text Available Advanced IR emitters and sensors are under development for high detection probability, low false alarm rate, and identification capability of toxic gases. One of the most reliable techniques to identify the gas species is absorption spectroscopy, especially in the medium infrared spectral range, where most of existing toxic compounds exhibit their strongest rotovibrational absorption bands. Following the results obtained from simulations and analysis of expected absorption spectra, a compact nondispersive infrared multispectral system has been designed and developed for security applications. It utilizes a few square millimeters thermal source, a novel design multipass cell, and a smart architecture microbolometric sensor array coupled to a linear variable spectral filter to perform toxic gases detection and identification. This is done by means of differential absorption spectroscopic measurements in the spectral range of the midinfrared. Experimental tests for sensitivity and selectivity have been done with various chemical agents (CAs gases and a multiplicity of vapour organic compounds (VOCs. Detection capability down to ppm has been demonstrated.

  17. 海阳地雷战往事%The Past Events of Landmine Warfare in Haiyang

    Institute of Scientific and Technical Information of China (English)

    李晓辉; 吕连兴

    2011-01-01

    地雷战是海阳人民在抗日战争中伟大的创举之一。 1940年2月,日本侵略军踏入海阳,海阳人民在中国共产党的领导下,同仇敌忾,奋起抗战。1943年5月,瑞宇村首颗地雷炸响,拉开了海阳地雷战的序幕。从此,海阳大地处处布满陷敌于灭顶之灾的雷阵,地雷战大显神威。

  18. Creating Structures for Network-Centric Warfare: Perspectives from Organization Theory

    OpenAIRE

    Sengupta, Kishore; Carl R. Jones

    1999-01-01

    1999 Command and Control Research and Technology Symposium (CCRTS), June 29 - July 1, 1999, U.S. Naval War College, Rhode Island Combat organizations are increasingly faced with the challenge to adapt to new and diverse engagements. The pace of change is being accelerated by advances in information technology. This article offers perspectives from organization theory that can serve as design principles for enabling combat organizations to adopt flexible structures to cope with cha...

  19. Aerial vehicle with paint for detection of radiological and chemical warfare agents

    Science.gov (United States)

    Farmer, Joseph C.; Brunk, James L.; Day, S. Daniel

    2013-04-02

    A paint that warns of radiological or chemical substances comprising a paint operatively connected to the surface, an indicator material carried by the paint that provides an indication of the radiological or chemical substances, and a thermo-activation material carried by the paint. In one embodiment, a method of warning of radiological or chemical substances comprising the steps of painting a surface with an indicator material, and monitoring the surface for indications of the radiological or chemical substances. In another embodiment, a paint is operatively connected to a vehicle and an indicator material is carried by the paint that provides an indication of the radiological or chemical substances.

  20. Perception Challenges Faced by Al-Qaeda on the Battlefield of Influence Warfare

    Directory of Open Access Journals (Sweden)

    James J.F. Forest

    2012-03-01

    Full Text Available Many kinds of entities—including terrorists and insurgents—seek to influence perceptions and behavior among various target audiences, and have become increasingly reliant on the Internet in their efforts, incorporating social media, blogging, public video sharing and other online tools. This article is focused on the ideological messages that terrorist groups use to convey with these tools. Drawing from a study of Al-Qaeda, this discussion illustrates how ideologies of violence have certain vulnerabilities that can be exploited in order to degrade a terrorist group’s ability to achieve its objectives. While crafting and disseminating counter-narratives can be a critical part of a counterterrorism strategy, it is also important to identify ways in which terrorists undermine their own central narratives and exacerbate pre-existing “influence warfare” challenges

  1. Network Centric Warfare Concepts in the Royal Netherlands Army C2 Architecture

    NARCIS (Netherlands)

    Meijden, M.G. van der

    2004-01-01

    The Royal Netherlands Army (RNLA) has been working on its second generation C2 Information System since 2000. Its first generation Integrated Staff Information System (ISIS) that is currently deployed is based on ATCCIS specifications and uses the ATCCIS Replication Mechanism for database to databas

  2. The transnational politics of warfare accountability : Human rights watch versus the Israel defense forces

    NARCIS (Netherlands)

    Rajkovic, Nikolas; Vennesson, Pascal

    2012-01-01

    This journal is one of the Britain’s leading IR journals, edited by the UK’s most senior and—according to Professor Richard Falk of Princeton—esteemed IR scholar: Prof. Ken Booth. This article (9, 929 words) questions a dominant paradigm that NGOs speak to “truth to power”, and specifically that hum

  3. Warfare 1914-2014: The most violent century in human history

    NARCIS (Netherlands)

    W. Klinkert

    2016-01-01

    In the Spring of 1915 the French literary critic, journalist and theatre director Alphonse Séché (1876-1964) published a book on the Great War which was about six months old at the time. He called his extensive analysis Les guerres d’ enfer (Wars of Hell) and this unlikely expert displayed a remarka

  4. A Brief Analysis of Hybrid Warfare Theory%"混合战争"理论简析

    Institute of Scientific and Technical Information of China (English)

    李水生

    2010-01-01

    近年来,面对伊拉克和阿富汗战争的困境,美国军事理论界提出"混合战争"理论以求摆脱此困境.本文介绍了该理论的主要内容及其受重视的程度、原因,但同时也认为,由于该理论完全站在美国的立场上,主要是针对美国反恐战争的困境提出的,难免也有其偏颇之处.

  5. 混合战争及其挑战%Hybrid Warfare and Its Challenges

    Institute of Scientific and Technical Information of China (English)

    弗兰克·霍夫曼; 李响

    2010-01-01

    本文是弗兰克·霍夫曼于2009年第1期上发表的文章,比较详细的论述了"混合战争"理论,认为混合战争是战争主体、战争样式、战争手段、军事行动和作战目标的混合,并指出混合战争与复合战争最大的不同点在于战争模式模糊的程度.面对混合战争的挑战,美军应该有所准备.

  6. [The organizational aspects of treating light casualties in modern warfare (2)].

    Science.gov (United States)

    Nechaev, E A; Maksimov, G K; Agapov, V K; Golov, Iu S

    1993-07-01

    The experience gathered by Medical Service during the war in Afghanistan and during liquidation of the consequences of various disasters and accidents has shown that the most rational method of treatment of minor wounded near the combat area or zone of disaster was a two-staged (and sometimes a three-staged) management system. At the combat tactical zone it is expedient to render the secondary surgical care and reanimation procedures of vital cases, and also provide treatment of minor wounded who could be returned to their ranks in 10 days. For this purpose it is necessary to integrate the sections of medical triage and minor wounded treatment into organic structure of the Brigade medical company and Divisional hospital. As for Army Medical Brigade it must have in its structure a hospital for minor wounded who could be returned to their ranks in 20 days. All the wounded who have to be treated more than 20 days must be evacuated to the Front hospital for minor wounded. PMID:8249347

  7. Is all fair in biological warfare? The controversy over genetically engineered biological weapons.

    Science.gov (United States)

    Appel, J M

    2009-07-01

    Advances in genetics may soon make possible the development of ethnic bioweapons that target specific ethnic or racial groups based upon genetic markers. While occasional published reports of such research generate public outrage, little has been written about the ethical distinction (if any) between the development of such weapons and ethnically neutral bioweapons. The purpose of this paper is to launch a debate on the subject of ethnic bioweapons before they become a scientific reality. PMID:19567692

  8. Graduate Education for Unmanned Vehicles and Undersea Warfare: NPS Teaching, Research and Partnership Strategies

    OpenAIRE

    Brutzman, Don

    2005-01-01

    Panel Discussion, NDIA conference, Unmanned Maritime Vehicle (UMV)Test & Evaluation Conference

Held in Conjunction with 
Autonomous Underwater Vehicle (AUV) Fest 2005

“Accelerating Deployment of Unmanned Maritime Vehicles Through Advancements in Test & Evaluation”

Keyport, WA 14-16 June 2005

  9. New Wars, New Challenges: Rethinking Strategic Advantages of Air Supremacy in Modern Warfare

    Directory of Open Access Journals (Sweden)

    Janiel David Melamed Visbal

    2015-01-01

    Full Text Available El objetivo de este artículo es analizar el papel del poder aéreo en las guerras modernas. El poder aéreo ha sido utilizado en el último siglo como una herramienta de gran importancia en términos militares, ya que dadas sus ventajas estratégicas, reflejaba supremacía militar y lograba incidir en el resultado favorable de las tradicionales guerras interestatales, evidenciadas en el sistema internacional. El nuevo siglo ha resaltado la existencia de una nueva forma de lucha con características diferentes de las guerras interestatales, pues las nuevas con-frontaciones encaran nuevas formas de amenazas propias de la guerra irre-gular, emplean medios asimétricos de lucha y, por ende, la ventaja militar del poder aéreo se ve cuestionada.

  10. Differential games a mathematical theory with applications to warfare and pursuit, control and optimization

    CERN Document Server

    Isaacs, Rufus

    1999-01-01

    Definitive work draws on game theory, calculus of variations, and control theory to solve an array of problems: military, pursuit and evasion, athletic contests, many more. Detailed examples, formal calculations. 1965 edition.

  11. Psychological Warfare in Huaihai Campaign%淮海战役中的攻心战

    Institute of Scientific and Technical Information of China (English)

    魏克

    2004-01-01

    全国解放战争第二年,即1947年7月至1948年6月,人民解放军共消灭国民党正规军和非正规军152万人。这时,蒋介石也不得不哀叹:“国军处处受制,着着失败。”在这种有利的战争形势下,我参与带领冀鲁豫5000多名参军的翻身农民,从山东聊城出发,经太行山,行程1600里,到达豫西,把新兵分配到中原军区各纵队。

  12. Temperate bacterial viruses as double-edged swords in bacterial warfare.

    Science.gov (United States)

    Gama, João Alves; Reis, Ana Maria; Domingues, Iolanda; Mendes-Soares, Helena; Matos, Ana Margarida; Dionisio, Francisco

    2013-01-01

    It has been argued that bacterial cells may use their temperate viruses as biological weapons. For instance, a few bacterial cells among a population of lysogenic cells could release the virus and kill susceptible non-lysogenic competitors, while their clone mates would be immune. Because viruses replicate inside their victims upon infection, this process would amplify their number in the arena. Sometimes, however, temperate viruses spare recipient cells from death by establishing themselves in a dormant state inside cells. This phenomenon is called lysogenization and, for some viruses such as the λ virus, the probability of lysogenization increases with the multiplicity of infection. Therefore, the amplification of viruses leads to conflicting predictions about the efficacy of temperate viruses as biological weapons: amplification can increase the relative advantage of clone mates of lysogens but also the likelihood of saving susceptible cells from death, because the probability of lysogenization is higher. To test the usefulness of viruses as biological weapons, we performed competition experiments between lysogenic Escherichia coli cells carrying the λ virus and susceptible λ-free E. coli cells, either in a structured or unstructured habitat. In structured and sometimes in unstructured habitats, the λ virus qualitatively behaved as a "replicating toxin". However, such toxic effect of λ viruses ceased after a few days of competition. This was due to the fact that many of initially susceptible cells became lysogenic. Massive lysogenization of susceptible cells occurred precisely under the conditions where the amplification of the virus was substantial. From then on, these cells and their descendants became immune to the λ virus. In conclusion, if at short term bacterial cells may use temperate viruses as biological weapons, after a few days only the classical view of temperate bacterial viruses as parasitic agents prevails. PMID:23536852

  13. Temperate bacterial viruses as double-edged swords in bacterial warfare.

    Directory of Open Access Journals (Sweden)

    João Alves Gama

    Full Text Available It has been argued that bacterial cells may use their temperate viruses as biological weapons. For instance, a few bacterial cells among a population of lysogenic cells could release the virus and kill susceptible non-lysogenic competitors, while their clone mates would be immune. Because viruses replicate inside their victims upon infection, this process would amplify their number in the arena. Sometimes, however, temperate viruses spare recipient cells from death by establishing themselves in a dormant state inside cells. This phenomenon is called lysogenization and, for some viruses such as the λ virus, the probability of lysogenization increases with the multiplicity of infection. Therefore, the amplification of viruses leads to conflicting predictions about the efficacy of temperate viruses as biological weapons: amplification can increase the relative advantage of clone mates of lysogens but also the likelihood of saving susceptible cells from death, because the probability of lysogenization is higher. To test the usefulness of viruses as biological weapons, we performed competition experiments between lysogenic Escherichia coli cells carrying the λ virus and susceptible λ-free E. coli cells, either in a structured or unstructured habitat. In structured and sometimes in unstructured habitats, the λ virus qualitatively behaved as a "replicating toxin". However, such toxic effect of λ viruses ceased after a few days of competition. This was due to the fact that many of initially susceptible cells became lysogenic. Massive lysogenization of susceptible cells occurred precisely under the conditions where the amplification of the virus was substantial. From then on, these cells and their descendants became immune to the λ virus. In conclusion, if at short term bacterial cells may use temperate viruses as biological weapons, after a few days only the classical view of temperate bacterial viruses as parasitic agents prevails.

  14. Targeted killing as a means of asymmetric warfare: a provocative view and invitation to debate

    OpenAIRE

    Bachmann, Sascha; Haeussler, U.

    2011-01-01

    The killing of Mahmoud al-Mabhou reportedly by agents of Israel‟s Mossad service in Dubai a year ago1 serves as a quick reminder that extrajudicial executions, assassinations and other targeted killing operations are taking place and are part of a modern democracy‟s arsenal of antiterrorism and counter-terrorism means. Targeted Killing Operations reportedly form part of NATO‟s operational practice: depending on the circumstances they represent just another option of the lawful use of force in...

  15. Research on detection model of passive directional buoys%被动定向浮标探潜模型研究

    Institute of Scientific and Technical Information of China (English)

    战和; 杨日杰; 金中原

    2016-01-01

    In Anti-Submarine Warfare, passive directional sonar buoy is a main method to detect submarine. When two directional buoys have detected the same underwater target at the same time, its position could be fixed. A model about how to lay the supplementary passive directional buoys is researched to fix the position of underwater target in the condition that one and only one directional buoy in the original array has affirmed the existence of underwater target, but could not fix its position. According to the motion features of both underwater target and antisubmarine aircraft, sup-plementary dropping model of passive directional buoy is established in consideration that all possible situations may occur in practice. By simulation, the detection efficiency of the model is analyzed and the applicability is proved. All of these provide a theoretical foundation for tactical uses of passive directional buoys.%反潜战中,被动定向声呐浮标是一种主要的探潜手段,两枚被动定向浮标同时发现目标即可对其进行定位。研究了初始浮标阵中仅有一枚浮标能够发现目标但不能实现定位的情况下,如何通过补投被动定向浮标对目标进行定位的模型问题。根据水下目标和反潜机的运动特点,将实际中所有可能出现的情况进行了分类讨论,建立了被动定向浮标的补投模型。通过仿真分析了模型的探测效能,验证了模型的正确性和可用性,为被动定向浮标的战术使用提供了一定的理论基础。

  16. Science and Security before the Atomic Bomb: The Loyalty Case of Harald U. Sverdrup

    Science.gov (United States)

    Oreskes, Naomi; Rainger, Ronald

    In the summer of 1941, Harald Sverdrup, the Norwegian-born Director of the Scripps Institution of Oceanography (SIO) in La Jolla, California, was denied security clearance to work on Navy-sponsored research in underwater acoustics applied to anti-submarine warfare. The clearance denial embarrassed the world renown oceanographer and Arctic explorer, who repeatedly offered his services to the U.S. government only to see scientists of far lesser reputation called upon to aid the war effort. The official story of Sverdrup's denial was the risk of blackmail over relatives in occupied Norway. Declassified documents tell a different story. Although Sverdrup's integrity was defended on the highest levels of U.S. science, doubt was cast upon him by members of his own institution, who accused him of being a Nazi sympathiser. Personal distrust, rooted in scientific and intellectual disagreement, spilled over into questions about Sverdrup's loyalty and judgement. These doubts were considered sufficient grounds for withholding clearance, until Roger Revelle, a former student of Sverdrup now working within the Navy, was able to obtain a limited clearance for Sverdrup to develop techniques to forecast surf conditions during amphibious assaults. After the war, this work was credited with saving many lives, but at the time it placed Sverdrup out of the mainstream of Navy-sponsored oceanographic research. In being denied access to major areas of scientific work, Sverdrup's position as a leader of American oceanography was undermined. The loyalty case of Harald Sverdrup illustrates the emergence of an institutional apparatus through which the U.S. military began to control and shape the organisation of American science in the twentieth century. Military sponsorship of scientific research, begun during the open conflicts of World War II and continuing into the simmering tensions of the Cold War, involved explicit control by the U.S. military of who had access to critical information

  17. Founding of Japanese Biological Warfare Unit and Its Germ Warfare in China%日军细菌战部队的建立及对华细菌战

    Institute of Scientific and Technical Information of China (English)

    奈须重雄; 谢彩虹

    2015-01-01

    昭和7年(1932)8月8日至9月30日,石井四郎率陆军军医学校防疫研究室人员“出差”到中国东北对当年“袭击全满洲”的流行霍乱病进行“调查”,这次所谓的“调查”对于日军细菌战部队的前身“东乡部队”在中国东北背荫河地区的建立有重要的“意义”.1940年日军实施的“金华细菌战”,中国档案缺乏受害记录,但在日本发现了金华鼠疫受害的一些资料.“农安和农安大赉细菌战”是1940年日军实施的一次诡秘的细菌战,其目的是实验在历史上鼠疫常发地带的细菌战效果.1942年日军在衢县和丽水投放的“PA跳蚤”与在广信、广丰、玉山投放的“PX跳蚤”的区别在哪里?“A”代表普通跳蚤,“X”代表印度客蚤.日军实施细菌战的方法有四类:飞机执行法、火炮执行法、与化学兵器并用法、谋略法;但目前知道的只有飞机执行法和谋略法的细菌战实例,而火炮执行法、与化学兵器并用法的细菌战实例尚未发现.

  18. Antidotal effects of varthemia persica DC extract in organophosphate poisoning or warfare agents by measuring whole blood acetylcholinesterase

    International Nuclear Information System (INIS)

    The organophosphates (ORPs) or war fare agents toxicity results from inhibition of acetylcholinesterase (AchE). phosphylation of the active serin of AchE leads to accumulation of acetylcholine in synaptic clefts leading to generalized cholinergic over-stimulation. Standard treatment of ORP poisoning includes a muscarinic antagonist such as Atropine, and acetylcholinesterase reactivator (oxime). Presently, oximes like abidoxime and pralidoxime are approved as antidotes against ORP poisoning but are considered to be rather ineffective against certain ORP. Like Soman. In this study, the protective effect of Varthemia persica DC extract on acetylcholinesterase was examined in rats. Animals in weight range of 200-225 g were divided in 8 groups. The negative control group received only 0.4 ml normal saline, reference group, received ethylparaoxone in dose of 50 percent of LD50, positive control group, received ethylparaoxone (50% LD50) and one minute later 50 mol of pralidoxime. Test group 1: received ethylparaoxone and one minute later single dose of methanolic extract of Varthemia persica (250 mg/kg), Test Group 2: daily received methanolic extract of V.persica (250 mg/kg) in six days and one minute after last dose of extract, ethylparaoxone (50% LD50) were injected, Test Group 3: received ethylparaoxone (50% LD50) and then six doses of methanolic extract of V.persica (250 mg/kg) in six continuous days. Test Group 4: received ethylparaoxone and then single dose of dichloromethane extract of V.persica (250 mg/kg). Test Group 5: received ethylparaoxone and one minute later single high dose of methanolic extract of V.persica (1000 mg/kg). Then blood withdrawn and acetylcholinesterase activity was measured according to modified Ellman's method. Only in groups which received extract of V. persica before and after injection of ethylparaoxone, the mean of acetylcholinesterase activity was significantly different with reference group (p 0.05) but no significant difference with reference group were observed in other test groups.(author)

  19. Imperial Warfare and the Production of the Sign%帝国战争与符号生产

    Institute of Scientific and Technical Information of China (English)

    刘禾

    2005-01-01

    英国学者霍布斯包姆(Eric Hobsbawm)曾将19世纪称为“漫长的十九世纪”(the long 19th century)。这个说法虽不新鲜,但还是很有意义。可以说“漫长的十九世纪”不仅跨越20世纪,甚至还一直延伸到本世纪,至今并未充分结束。在许多方面19世纪都是人类社会发展的重要转折,所以,对19世纪有没有充分的了解,关系到我们对当前剧烈变动中的世界能不能有一个历史的判断。

  20. 75 FR 3395 - Taking and Importing Marine Mammals; U.S. Naval Surface Warfare Center Panama City Division...

    Science.gov (United States)

    2010-01-21

    ... K. sima Dwarf sperm whale Ziphius cavirostris Cuvier's beaked whale Mesoplodon europaeus Gervais... Federal Register on Thursday, April 30, 2009 (74 FR 20156). This information will not be reprinted here in... rule has not changed (74 FR 20156; April 30, 2009; pages 20156-20157). Description of the...

  1. Cyber Warfare as a Form of Conflict: Evaluation of Models of Cyber Conflict as a Prototype to Conceptual Analysis

    Science.gov (United States)

    Liles, Samuel P.

    2012-01-01

    In April 2007, what has been incorrectly called the first cyber war and since then referred more correctly as a cyber riot, an attack on the domain name systems and the various servers of Estonia occurred. It was perpetrated by ethnic Russians living in Estonia who were incensed by the movement of a bronze war memorial for Russian soldiers to a…

  2. Development of a Polymerase Chain Reaction Assay for Detection of Burkholderia mallei, a Potent Biological Warfare Agent

    Directory of Open Access Journals (Sweden)

    Vijai Pal

    2016-09-01

    Full Text Available Burkholderia mallei is the etiological agent of glanders, primarily a disease of equines. B. mallei is closely related to B. pseudomallei, the causative agent of melioidosis. Therefore, detection of B. mallei and its differentiation from B. pseudomallei, has always been troublesome. In present investigation, a B. mallei specific DNA sequence was identified by performing BLASTn search using ~3000 ORFs of B. mallei NCTC 10229. A polymerase chain reaction (PCR assay with internal amplification control (IAC was developed for detection of B. mallei and its differentiation from B. pseudomallei. The PCR assay could amplify a specific 224-bp fragment from all the six B. mallei strains used in the study, whereas other closely related organisms were tested negative. The detection limit of the assay was found to be 10 pg of purified DNA of B. mallei. Incorporation of IAC in the assay makes the results reliable as false negative results which may arise due to presence of PCR inhibitors, can be avoided. For validation, the assay was tested on tap water, Bengal gram and grass artificially spiked with B. mallei. The developed assay can be used as a simple and rapid tool for detection of B. mallei.

  3. Medical countermeasure against respiratory toxicity and acute lung injury following inhalation exposure to chemical warfare nerve agent VX

    International Nuclear Information System (INIS)

    To develop therapeutics against lung injury and respiratory toxicity following nerve agent VX exposure, we evaluated the protective efficacy of a number of potential pulmonary therapeutics. Guinea pigs were exposed to 27.03 mg/m3 of VX or saline using a microinstillation inhalation exposure technique for 4 min and then the toxicity was assessed. Exposure to this dose of VX resulted in a 24-h survival rate of 52%. There was a significant increase in bronchoalveolar lavage (BAL) protein, total cell number, and cell death. Surprisingly, direct pulmonary treatment with surfactant, liquivent, N-acetylcysteine, dexamethasone, or anti-sense syk oligonucleotides 2 min post-exposure did not significantly increase the survival rate of VX-exposed guinea pigs. Further blocking the nostrils, airway, and bronchioles, VX-induced viscous mucous secretions were exacerbated by these aerosolized treatments. To overcome these events, we developed a strategy to protect the animals by treatment with atropine. Atropine inhibits muscarinic stimulation and markedly reduces the copious airway secretion following nerve agent exposure. Indeed, post-exposure treatment with atropine methyl bromide, which does not cross the blood-brain barrier, resulted in 100% survival of VX-exposed animals. Bronchoalveolar lavage from VX-exposed and atropine-treated animals exhibited lower protein levels, cell number, and cell death compared to VX-exposed controls, indicating less lung injury. When pulmonary therapeutics were combined with atropine, significant protection to VX-exposure was observed. These results indicate that combinations of pulmonary therapeutics with atropine or drugs that inhibit mucous secretion are important for the treatment of respiratory toxicity and lung injury following VX exposure

  4. AN ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) TESTING OF ENZYMATIC TEST KITS FOR WARFARE AGENTS AND PESTICIDES IN DRINKING WATER

    Science.gov (United States)

    Enzymatic test kits, generally designed to be handheld and portable, detect the presence of chemical agents, carbamate pesticides, and/or organophosphate pesticides by relying on the reaction of the cholinesterase enzyme. Under normal conditions, the enzyme reacts as expected wi...

  5. 互联网交战下的集体认同问题%Collective Identity in Cyber Warfare

    Institute of Scientific and Technical Information of China (English)

    孙恺临

    2016-01-01

    While Information era promote the change of social activity, individuals can have freedom speeches online. These cause many conflicts which even affect social society. This paper try to consider some problems about collective identity which hide in cyber conflicts, find the ways of solving problems, rule the Internet with tolerant and promote the improvement of harmony society.%信息化时代促使人际交往方式发生转变,个体可以自由发表言论的同时也引发了很多网络冲突事件,甚至影响到现实社会。本文试图通过思考网络事件所反映的集体认同冲突,寻找解决冲突的合理途径,以宽容的原则实现网络世界的和谐发展,促进和谐社会的进步。

  6. Hitler and His Technique of Psychological Warfare%希特勒与他的心理战手法

    Institute of Scientific and Technical Information of China (English)

    杜正艾

    1994-01-01

    @@ 希特勒,这个浪迹德国的奥地利人,无亲无故,无产无业,既无一技之长,亦无正常职业,在政治上更无任何经验,就连他自己也承认:"像我这样一个无名之辈,要采取任何有益的行动,连最起码的基础也不具备"①.这样一个人物,为什么在20世纪二、三十年代的德国,仅用短短14年的时间就登上了德国总理的宝座?究其根本,它是希特勒竭力利用当时德国特殊的社会历史条件,全面运用各种心理战手法,大肆煽动各阶级、阶层人士的直接结果.

  7. A Theoretical Review of "Hybrid Warfare" by US Military%美军"混合战争"理论评介

    Institute of Scientific and Technical Information of China (English)

    薛兴国; 姜坚

    2010-01-01

    "混合战争"理论既是美军对现实战争经验教训的总结,也是对以往战争理论的继承和创新.该理论旨在通过强调未来战争的混合性特点,确保美军能够应对各种可能的威胁,进而解决未来战争的准备问题.

  8. 美军"混合战争"理论评析%A Theoretical Analysis of US "Hybrid Warfare"

    Institute of Scientific and Technical Information of China (English)

    陈航辉; 赵戈; 刘俊彪

    2011-01-01

    "混合战争"理论是美军重新判断所处安全环境、反思自身战争实践和借鉴他国作战经验的结果.该理论强调了作战样式的混合、作战力量的融合以及军事思维创新的重要地位,将对美军建设产生深远影响.

  9. "A Change of Paradigm" in Developing Land Forces Officers' Professional Skills in Accordance with Hybrid Warfare Task-Requirements

    Directory of Open Access Journals (Sweden)

    Alexandru Rizescu

    2016-06-01

    Full Text Available In future conflicts, not only traditional or asymmetric actions will be used, but also a combination of the two in order to solve the disputes involving national and international actors, materialized today in different manifestation forms called hybrid war. The hybrid threats tell about the evolution of the contemporary and future threats, about the necessity of a national effort concerted towards providing an immediate effective response to these threats. From a different perspective, the diversity and the complexity of the issues raised by the hybrid threats prove that it is necessary to go beyond the technical or sequential nowadays answers. It results first that it is required to develop an appropriate security strategy which will make possible the efficient action against hybrid risks and threats, in an effective, operational and unitary manner. Therefore, the present article aims at sequentially highlighting the aspects supporting the need to correlate the coordinates of the national security strategy to the planning, conduct and quality assessment of the process of training officers from the “change of paradigm” perspective, in order to acquire the professional skills conforming to the task-requirements specific to the hybrid war. Nothing more natural, more necessary and at the same time more current in this perspective than modernizing the military continuous education system in accordance with the strategic norm of competence.

  10. A Theoretical Interpretation of "Hybrid Warfare" by US Military%美军"混合战争"理论解读

    Institute of Scientific and Technical Information of China (English)

    邸验刚

    2010-01-01

    美国海军陆战队退役中校弗兰克·霍夫曼于2007年12月出版了一书,提出了"混合战争"理论,认为未来战争将是一种混合形态的战争.本文就霍夫曼混合战争理论进行简要分析和解读,重点就混合战争理论对美军建设可能产生的影响进行剖析.

  11. 美军心理战与伊拉克战争%The US Psychological Warfare and Iraq War

    Institute of Scientific and Technical Information of China (English)

    王松

    2003-01-01

    @@ 在信息时代,心理战已由一种辅助作战手段和样式,发展成为全时空、全方位、多层次发挥作用的战略行动.在伊拉克战争中,美国采取攻势性心理战,全时空、全方位、多层次对伊拉克发动心理战攻势,取得一定的成效.

  12. Germ warfare in a microbial mat community: CRISPRs provide insights into the co-evolution of host and viral genomes.

    Directory of Open Access Journals (Sweden)

    John F Heidelberg

    Full Text Available CRISPR arrays and associated cas genes are widespread in bacteria and archaea and confer acquired resistance to viruses. To examine viral immunity in the context of naturally evolving microbial populations we analyzed genomic data from two thermophilic Synechococcus isolates (Syn OS-A and Syn OS-B' as well as a prokaryotic metagenome and viral metagenome derived from microbial mats in hotsprings at Yellowstone National Park. Two distinct CRISPR types, distinguished by the repeat sequence, are found in both the Syn OS-A and Syn OS-B' genomes. The genome of Syn OS-A contains a third CRISPR type with a distinct repeat sequence, which is not found in Syn OS-B', but appears to be shared with other microorganisms that inhabit the mat. The CRISPR repeats identified in the microbial metagenome are highly conserved, while the spacer sequences (hereafter referred to as "viritopes" to emphasize their critical role in viral immunity were mostly unique and had no high identity matches when searched against GenBank. Searching the viritopes against the viral metagenome, however, yielded several matches with high similarity some of which were within a gene identified as a likely viral lysozyme/lysin protein. Analysis of viral metagenome sequences corresponding to this lysozyme/lysin protein revealed several mutations all of which translate into silent or conservative mutations which are unlikely to affect protein function, but may help the virus evade the host CRISPR resistance mechanism. These results demonstrate the varied challenges presented by a natural virus population, and support the notion that the CRISPR/viritope system must be able to adapt quickly to provide host immunity. The ability of metagenomics to track population-level variation in viritope sequences allows for a culture-independent method for evaluating the fast co-evolution of host and viral genomes and its consequence on the structuring of complex microbial communities.

  13. Smart Warriors: A Rationale for Educating Air Force Academy Cadets in the History of Science, Technology, and Warfare.

    Science.gov (United States)

    Astore, William J.

    2003-01-01

    Identifies enhancing the judgments of cadets through education at a military institution like the United States Air Force Academy (USAFA) as a crucial pedagogical issue facing instructors of History of Science and Technology (HST). Discusses the experience of helping cadets to meet such challenges in learning HST in the context of professional…

  14. Bacteriocin as Weapons in the Marine Animal-Associated Bacteria Warfare: Inventory and Potential Applications as an Aquaculture Probiotic

    Directory of Open Access Journals (Sweden)

    Florie Desriac

    2010-04-01

    Full Text Available As the association of marine animals with bacteria has become more commonly recognized, researchers have increasingly questioned whether these animals actually produce many of the bioactive compounds originally isolated from them. Bacteriocins, ribosomally synthesized antibiotic peptides, constitute one of the most potent weapons to fight against pathogen infections. Indeed, bacteriocinogenic bacteria may prevent pathogen dissemination by occupying the same ecological niche. Bacteriocinogenic strains associated with marine animals are a relevant source for isolation of probiotics. This review draws up an inventory of the marine bacteriocinogenic strains isolated from animal-associated microbial communities, known to date. Bacteriocin-like inhibitory substances (BLIS and fully-characterized bacteriocins are described. Finally, their applications as probiotics in aquaculture are discussed.

  15. 作战仿真中的人类行为表示%Human Behavior Representation in Warfare Simulation

    Institute of Scientific and Technical Information of China (English)

    王达; 张琦; 郭刚; 黄柯棣

    2004-01-01

    作战仿真中的人类行为表示(Human Behavior Representation,简称HBR)是计算机生成兵力(CGF)的核心,灵活、有效、真实的HBR对于作战仿真结果的可信性十分重要.该文分析了作战仿真中HBR的目标与内容,提出了战场行为层次化建模的思想,在此基础上给出了CGF实体Agent行为模型体系结构,最后应用Agent通信语言KQML建立了基于HLA/RTI的作战仿真HBR集成框架.

  16. Communication Systems Analysis Laboratory (CSAL)

    Data.gov (United States)

    Federal Laboratory Consortium — CSAL conducts electronic warfare investigations of radio frequency communication systems with respect to current and emerging electronic warfare threats. CSAL uses...

  17. 浅谈无人潜航器在反潜作战中的应用

    Institute of Scientific and Technical Information of China (English)

    吴吉伟; 徐先勇; 陆文俊

    2014-01-01

    本文通过对其他国家无人潜航器的发展现状分析,论证了无人潜航器在反潜作战中作用,同时对反潜作战中无人潜航器面临的问题进行了分析讨论,提出了一些解决问题的措施和技术手段。%After analyzing the development situation of other countries’UUV (Unmanned Underwater Vehicle,UUV),the paper demonstrates the use of UUV in anti-submarine war and discusses the problems of using UUV in anti-submarine war,and then proposes some measures and technical manners to resolve this problems.

  18. 论战国时期秦国的间谍战%On the Espionage Warfare of Qin during Warring States Period

    Institute of Scientific and Technical Information of China (English)

    付金才

    2011-01-01

    战国时期,秦国认识到六国统治者的短见和相互之问的不信任,充分利用当时的间谍战思想和人才,积极开展间谍战,瓦解六国之间的合作,破坏各国的君臣关系,使其自毁长城,终于实现称王的目标.秦国的间谍战加快了秦统一六国的进程.

  19. The Littoral Combat Ship (LCS) Surface Warfare (SUW) module determining the best mix of surface-to-surface and air-to-surface missiles

    OpenAIRE

    Jacobson, Kevin Robert.

    2010-01-01

    Approved for public release, distribution unlimited Asymmetric threats pose increasing challenges to the United States Navy in littoral environments. To address the Navy's need for a new platform to serve in this area, the Littoral Combat Ship (LCS) was designed and put into service. What still has yet to be determined is what surface-to-surface capability the LCS will have as well as what air-tosurface capability the LCS helicopter/unmanned aerial vehicle (UAV) will have. This study uses ...

  20. A computational study of detoxification of lewisite warfare agents by British anti-lewisite: catalytic effects of water and ammonia on reaction mechanism and kinetics.

    Science.gov (United States)

    Sahu, Chandan; Pakhira, Srimanta; Sen, Kaushik; Das, Abhijit K

    2013-04-25

    trans-2-Chlorovinyldichloroarsine (lewisite, L agent, Lew-I) acts as a blistering agents. British anti-lewisite (BAL, 2,3-dimercaptopropanol) has long been used as an L-agent antidote. The main reaction channels for the detoxification proceed via breaking of As-Cl bonds and formation of As-S bonds, producing stable, nontoxic ring product [(2-methyl-1,3,2-dithiarsolan-4-yl)methanol]. M06-2X/GENECP calculations have been carried out to establish the enhanced rate of detoxification mechanism in the presence of NH3 and H2O catalysts in both gas and solvent phases, which has been modeled by use of the polarized continuum model (PCM). In addition, natural bond orbital (NBO) and atoms in molecules (AIM) analysis have been performed to characterize the intermolecular hydrogen bonding in the transition states. Transition-state theory (TST) calculation establishes that the rates of NH3-catalyzed (2.88 × 10(-11) s(-1)) and H2O-catalyzed (2.42 × 10(-11) s(-1)) reactions are reasonably faster than the uncatalyzed detoxification (5.44 × 10(-13) s(-1)). The results obtained by these techniques give new insight into the mechanism of the detoxification process, identification and thermodynamic characterization of the relevant stationary species, the proposal of alternative paths on modeled potential energy surfaces for uncatalyzed reaction, and the rationalization of the mechanistic role played by catalysts and solvents. PMID:23540856

  1. Background chemistry for chemical warfare agents and decontamination processes in support of delisting waste streams at the U.S. Army Dugway Proving Ground, Utah

    Energy Technology Data Exchange (ETDEWEB)

    Rosenblatt, D.H.; Small, M.J.; Kimmell, T.A.; Anderson, A.W.

    1996-04-01

    The State of Utah, Department of Environmental Quality (DEQ), Division of Solid and Hazardous Waste (DSHW), has declared residues resulting from the demilitarization, treatment, cleanup, and testing of military chemical agents to be hazardous wastes. These residues have been designated as corrosive, reactive, toxic, and acute hazardous (Hazardous Waste No. F999). The RCRA regulations (40 Code of Federal Regulations [CFR] 260-280), the Utah Administrative Code (R-315), and other state hazardous waste programs list specific wastes as hazardous but allow generators to petition the regulator to {open_quotes}delist,{close_quotes} if it can be demonstrated that such wastes are not hazardous. The U.S. Army Test and Evaluation Command (TECOM) believes that certain categories of F999 residues are not hazardous and has obtained assistance from Argonne National Laboratory (Argonne) to make the delisting demonstration. The objective of this project is to delist chemical agent decontaminated residues resulting from materials testing activities and to delist a remediation residue (e.g., contaminated soil). To delist these residues, it must be demonstrated that the residues (1) do not contain hazardous quantities of the listed agents; (2) do not contain hazardous quantities of constituents listed in 40 CFR Part 261, Appendix VIII; (3) do not exhibit other characteristics that could define the residues as hazardous; and (4) do not fail a series of acute toxicity tests. The first phase will focus on a subset of the F999 wastes generated at the U.S. Army Dugway Proving Ground (DPG), where the Army tests the effects of military chemical agents and agent-decontamination procedures on numerous military items. This effort is identified as Phase I of the Delisting Program. Subsequent phases will address other DPG chemical agent decontaminated residues and remediation wastes and similar residues at other installations.

  2. 面向网络中心战的规则本体构建研究%Study on Rule Ontology Construction for Network Centric Warfare

    Institute of Scientific and Technical Information of China (English)

    李军勇; 宋峻峰; 阳东升

    2008-01-01

    在文献[20]中,系统阐述如何构建面向网络中心战的战场空间本体.构建战场空间本体采用的是以描述逻辑SHON(D)为形式化基础的本体语言OWL LDL,主要用于表达对象和类的层次结构,但难以表达规则.以W3C提出的语义Web规则语言SWRL作为构建规则本体的本体语言,提出一种规则本体构建方法ROCA,并应用ROCA方法构建一个军事规则片断以说明方法的使用

  3. Guerra, canibalismo y venganza colonial: los casos mocoví y guaraní Warfare, cannibalism and colonial vengance: the mocoví and guaraní cases

    Directory of Open Access Journals (Sweden)

    Macarena Perusset

    2009-06-01

    Full Text Available Los grupos mocovíes al igual que los guaraníes del período colonial fueron considerados como grupos sumamente belicosos de la región sur del continente americano. La guerra ocupaba un lugar importante en su dinámica social y se encontraba ligada a otras prácticas como el consumo de la carne del adversario y la obtención de cabezas-trofeo de los enemigos. Entre estas prácticas, que representaban modalidades de canibalismo, la venganza ocupaba un papel central. El presente trabajo busca indagar las relaciones entre canibalismo, guerra y venganza comparando ambas sociedades en el período colonial. Dichas cuestiones se abordarán desde una perspectiva etnohistórica y serán reconstruidas a partir de las menciones de diferentes fuentes según los casos.Mocoví as Guaraní indians of the colonial period were considered to be extremely violent groups of the south region of the American continent. War occupied an important place in these social dynamics´ groups and was linked to other practices such as the consumption of the adversary´s meat and the gain of the enemies' trophy's head. Among these practices, that represented cannibalism modalities, revenge occupied a central role. The present paper aims to analyze the relations between cannibalism, war and revenge, comparing both societies in the colonial period. These topics will be approached from an etnohistoric perspective and will be reconstructed using different historical sources, according to the cases.

  4. Study on Knowledge Infrastructure Construction for Network Centric Warfare%网络中心战的知识基础设施构建研究

    Institute of Scientific and Technical Information of China (English)

    宋峻峰; 张维明; 肖卫东; 唐九阳

    2005-01-01

    从建立网络中心战的知识基础设施、获取知识优势出发,以战场空间本体作为网络中心战的知识基础设施,提出了一种战场空间本体构建方法BOCA;应用BOCA方法构建了一个想定的空中态势本体示例以说明该方法的具体工作过程.对于相关工作进行了分析比较,最后给出了结论和下一步工作.

  5. 对信息战中赛博空间与赛博战的解析%Comprehension for cyberspace and cyber-war in information warfare

    Institute of Scientific and Technical Information of China (English)

    石荣; 李剑; 黄鹏滔; 李昊; 贺岷珏

    2010-01-01

    针对信息对抗领域中高频度出现的"赛博空间"这一新名词,进行了词源考证.同时结合美军公布的赛博司令部战略构想,详尽解析了信息对抗中的赛博空间与赛博战的含义,分析了赛博战与传统电子战、计算机网络战之间的区别与联系,以及在网络中心战中所发挥的重要作用.这对于信息对抗新概念的理解,以及对信息战新技术的探讨具有一定的参考意义.

  6. U.S. Unmanned Aerial Vehicles (UAVS) and Network Centric Warfare (NCW) impacts on combat aviation tactics from Gulf War I through 2007 Iraq

    OpenAIRE

    Oveyik, Kaan.; Kurkcu, Coskun

    2008-01-01

    Approved for public release; distribution is unlimited Unmanned, aerial vehicles (UAVs) are an increasingly important element of many modern militaries. Their success on battlefields in Afghanistan, Iraq, and around the globe has driven demand for a variety of types of unmanned vehicles. Their proven value consists in low risk and low cost, and their capabilities include persistent surveillance, tactical and combat reconnaissance, resilience, and dynamic re-tasking. This research evaluat...

  7. Identification syetem for chemical warfare agents with PGNAA method%基于PGNAA技术的化学武器检测系统

    Institute of Scientific and Technical Information of China (English)

    王百荣; 尹光华; 杨忠平

    2007-01-01

    介绍了采用中子活化瞬发γ技术(PGNAA)检测化学毒剂的原理,对基于PGNAA技术的化学武器检测系统的中子源、慢化剂和探头的选择及数据处理进行了理论分析和研究.提出了以BGO探头,1μg252 Cf-中子源搭建的一套简便实用的化学武器检测系统,其通过检测化学武器中广泛存在的C1元素来识别化学武器.

  8. The Different Sensitive Behaviors of a Hydrogen-Bond Acidic Polymer-Coated SAW Sensor for Chemical Warfare Agents and Their Simulants

    Directory of Open Access Journals (Sweden)

    Yin Long

    2015-07-01

    Full Text Available A linear hydrogen-bond acidic (HBA linear functionalized polymer (PLF, was deposited onto a bare surface acoustic wave (SAW device to fabricate a chemical sensor. Real-time responses of the sensor to a series of compounds including sarin (GB, dimethyl methylphosphonate (DMMP, mustard gas (HD, chloroethyl ethyl sulphide (2-CEES, 1,5-dichloropentane (DCP and some organic solvents were studied. The results show that the sensor is highly sensitive to GB and DMMP, and has low sensitivity to HD and DCP, as expected. However, the sensor possesses an unexpected high sensitivity toward 2-CEES. This good sensing performance can’t be solely or mainly attributed to the dipole-dipole interaction since the sensor is not sensitive to some high polarity solvents. We believe the lone pair electrons around the sulphur atom of 2-CEES provide an electron-rich site, which facilitates the formation of hydrogen bonding between PLF and 2-CEES. On the contrary, the electron cloud on the sulphur atom of the HD molecule is offset or depleted by its two neighbouring strong electron-withdrawing groups, hence, hydrogen bonding can hardly be formed.

  9. 美国在朝鲜战争中实施细菌战的证据%On Evidence of American Biological Warfare in the Korean War

    Institute of Scientific and Technical Information of China (English)

    张华

    2013-01-01

    The Investigation Report of American Biological War in North Korean and China by famous scien-tists from Sweden, France, England, Italia, Brazil, and Soviet Union is the core evidence of American biological war in the Korean War. Furthermore, there are at least six additional evidences:U.S.A. had the ability and desire to wage bi-ological war before and during the Korean War;it was reported by foreign newspapers that U.S.A. used Japanese bio-logical war troops to wage biological war;U.S.A. had biological war troops and bases in Japan;U.S.A. used the biolog-ical war technology and method of Japanese biological war troops;captive American pilots regretted their behaviors of waging biological war;the Chinese document of anti-biological war shows that the Chinese People’s Volunteers and the Chinese people in East Northern China were attacked by American biological war troops.%  60年前,由瑞典、法国、英国、意大利、巴西、苏联等6国知名科学家组团实地调查朝鲜战争中的细菌战后,向国际社会发表的《调查在朝鲜和中国的细菌战实事报告书及附件》,是美军在朝鲜战争中实施细菌战的核心证据。围绕这一核心证据,至少还有6个方面的旁系证据:美国在朝鲜战争前夕和期间具备实施细菌战的能力,并有着实施细菌战的强烈欲望;许多外媒报道,美国利用日本原细菌战人员,协助美军实施细菌战;朝鲜战争前夕和期间,美国在日本拥有细菌战部队和基地;朝鲜战争中实施的细菌战,明显袭用了“二战”期间日本细菌战技术和方法;被俘的美国飞行员对他们的细菌战行径表示忏悔,并写出供词;现存中国反细菌战档案表明,中国人民志愿军和东北人民确实受到美国细菌战攻击,中国由此展开了大规模的反细菌战运动。

  10. 美军联合电子战消除频率冲突研究%Research on Electromagnetic Frequencies Conflicts for US Armed Force Electronic Warfare

    Institute of Scientific and Technical Information of China (English)

    陈邓安; 李冬; 吴杰

    2011-01-01

    Under the complicated electromagnetic environment, in view of the topic about dealing with the electromagnetic frequencies conflicts, this article expatiate the procedure of the US armed force dealing with electromagnetic frequencies conflicts and the responsibility of the relevant departments, and the methods of dealing with electromagnetic frequencies conflicts, and provides active reference for the coordination in the joint operations.%针对电子战中的频率冲突问题,研究了美军联合电子战消除频率冲突的程序和内容,系统阐述了美军联合部队各相关部门的职责,分析了美军在联合电子战中消除电子战频率冲突的方式,为我军在未来联合作战中解决电磁频率冲突的相关问题提供参考。

  11. 美军联合电子战消除频率冲突方式%Method to Eliminate Electronic Warfare Electromagnetic Frequencies Conflicts by US Armed Force

    Institute of Scientific and Technical Information of China (English)

    陈邓安; 丛中旖; 吴杰

    2012-01-01

    为在作战、通信和情报活动中协调地使用电磁频谱,对美军联合电子战消除频率冲突的方式进行研究.研究美军联合电子战消除频率冲突的程序和内容,介绍美军在联合电子战中分析频率冲突的2种方式,并分析美军联合部队各相关部门的职责.该研究可为提升我军电子战水平提供参考.%Under battle, communication and intelligence activity, in order to make good use of the electromagnetic spectrum, research the method to eliminate the electromagnetic frequencies conflicts by US armed force. Study the procedure of the US armed force dealing with electromagnetic frequencies conflicts, introduce the methods to analysis electromagnetic frequencies conflicts, and analysis the responsibility of the relevant departments, which can provides active reference for the coordination in the joint operations.

  12. Theory of "Hybrid Warfare": A New Canon for US War Preparations%"混合战争"理论:美军备战的新"宝典"

    Institute of Scientific and Technical Information of China (English)

    韦取名; 李德志

    2011-01-01

    美军著名军事专家弗兰克·霍夫曼对美军所面临复杂而不定威胁的研判,对世界典型战例的研究,特别是对美军当前"两场战争"深刻反思的基础上,提出了"混合战争"理论."混合战争"理论所提倡的"多战争、多行动、多战线、多任务"的指导思想,将引发美军战争、战略理念的深刻变革,全面推进美军建设转型.

  13. An isomer-specific high-energy collision-induced dissociation MS/MS database for forensic applications: a proof-of-concept on chemical warfare agent markers.

    Science.gov (United States)

    Subramaniam, Raja; Östin, Anders; Nygren, Yvonne; Juhlin, Lars; Nilsson, Calle; Åstot, Crister

    2011-09-01

    Spectra database search has become the most popular technique for the identification of unknown chemicals, minimizing the need for authentic reference chemicals. In the present study, an isomer-specific high-energy collision-induced dissociation (CID) MS/MS spectra database of 12 isomeric O-hexyl methylphosphonic acids (degradation markers of nerve agents) was created. Phosphonate anions were produced by the electrospray ionization of phosphonic acids or negative-ion chemical ionization of their fluorinated derivatives and were analysed in a hybrid magnetic-sector-time-of-flight tandem mass spectrometer. A centre-of-mass energy (E(com)) of 65 eV led to an optimal sequential carbon-carbon bond breakage, which was interpreted in terms of charge remote fragmentation. The proposed mechanism is discussed in comparison with the routinely used low-energy CID MS/MS. Even-mass (odd-electron) charge remote fragmentation ion series were diagnostic of the O-alkyl chain structure and can be used to interpret unknown spectra. Together with the odd-mass ion series, they formed highly reproducible, isomer-specific spectra that gave significantly higher database matches and probability factors (by 1.5 times) than did the EI MS spectra of the trimethylsilyl derivatives of the same isomers. In addition, ionization by negative-ion chemical ionization and electrospray ionization resulted in similar spectra, which further highlights the general potential of the high-energy CID MS/MS technique. PMID:21915956

  14. The Impact of Hybrid Warfare on US Military Building and Operations%"混合战争"理论对美国建军作战的影响

    Institute of Scientific and Technical Information of China (English)

    林治远

    2010-01-01

    "混合战争"是一种应对多种威胁的包括常规和非常规作战的全新战争形态,表现为作战对手复杂多样,作战力量一体化,作战样式高度融合等.该理论与美国国防部长盖茨提出的"均衡"战略有诸多相通之处,要求美军兼顾现实和未来的多种安全威胁,均衡发展常规和非常规作战能力;注重将维稳、网络空间作战等多种手段融入一般任务部队,实现美军从履行一般任务向"多任务"部队的转变,力求打造一支灵活多能的"总体部队".

  15. 美国加紧应对网络-信息-电子"混合战"%U.S. Has Stepped up to Deal with "Hybrid Warfare"

    Institute of Scientific and Technical Information of China (English)

    徐德康

    2009-01-01

    @@ 美国联合部队司令部认为,进入21世纪,随着计算机网络战技术、信息情报监视技术和电子攻击技术的快速发展,未来战场将更具变化和不确定性,人们也越来越难以区分网络战、直接能量攻击和电子攻击、情报收集和信息战之间的差别,未来战场将进入一个"混合战"的新阶段.

  16. The Crime of Bacteriological Warfare of Huabei 1855 Troops%华北(甲)一八五五部队的细菌战犯罪

    Institute of Scientific and Technical Information of China (English)

    谢忠厚; 谢丽丽

    2003-01-01

    笔者在一文(载2002年第1期)中,比较系统地揭露了华北(甲)一八五五细菌部队的组织系统及其进行活人实验、实施细菌战的罪行.本文作为前文的补充,主要依据档案文献,以时间为序,对华北(甲)一八五五部队的细菌战罪行进行更深入、更具体的考察和揭露.

  17. Toxicology and pharmacology of the chemical warfare agent sulfur mustard - a review. Final technical report, 29 September 1994-31 January 1995

    Energy Technology Data Exchange (ETDEWEB)

    Dacre, J.C.; Beers, R.; Goldman, M.

    1995-04-05

    Sulfur mustard is a poisonous chemical agent which exerts a local action on the eyes, skin and respiratory tissue with subsequent systemic action on the nervous, cardiac, and digestive and endocrine systems in man and laboratory animals causing lacrimation, malaise, anorexia, salivation, respiratory distress, vomiting, hyperexcitability, cardiac distress, and death. Sulfur mustard is a cell poison which causes disumption and impairment of a variety of cellular activities which are dependent upon a very specific integral relationship. These cytotoxic effects are manifested in widespread metabolic disturbances whose variable characteristics are observed in enzymatic deficiencies, vesicant action, abnormal mitotic activity and cell division, bone marrow disruption, disturbances in hematopoietic activity and systemic poisoning. Indeed, mustard gas readily combines with various components of the cell such as amino acids, amines and proteins. Sulfur mustard has been shown to be mainly a lung carcinogen in various test animal species; this effect is highly dependent of size of the dose and the route of exposure. In the human, there is evidence of cancers of the respiratory tract in men exposed to mustard gas. Mutagenicity of sulfur mustard, due to the strong alkylating activity, has been reported to occur in many different species of animals, plants, bacteria, and fungi. There is no strong evidence that sulfur mustard is a teratogen but much further research, with particular emphasis on maternal and fetal toxicity, is needed and recommended.

  18. Extraction of Target Distance Information in Undersea Warfare for Submarine%潜艇水下作战中目标距离信息提取研究

    Institute of Scientific and Technical Information of China (English)

    何青海; 丁文强

    2015-01-01

    浅海波导中目标辐射噪声 LOFAR 谱图存在明暗相间的干涉条纹,从中可以提取出目标距离特征量信息,它反映了目标运动过程中的距离变化率。低信噪比情况下,条纹特征不够清晰,提取的距离特征量值精度会降低。提出了对LOFAR 谱图进行图像处理,使条纹特征更加明显。海试数据处理结果表明,去噪处理后提取出的距离特征量精度明显提高。%Striations have appeared in plots of Low Frequency Analysis Recording(LOFAR) spectrum in acoustic envi‐ronment of the shallow water .The distance change ratio of target can be described by distance characteristic feature .It can be extracted from LOFAR spectrum striations .Low precision of distance characteristic feature has been obtained because of the low signal to noise ratio and striation pollution .In order to make the striations more clearly ,an image denoising method has been put forward .The ocean experimental results show that the precision of distance characteristic feature is one times higher after LOFAR spectrum image processing .

  19. A comprehensive evaluation of the efficacy of leading oxime therapies in guinea pigs exposed to organophosphorus chemical warfare agents or pesticides

    Energy Technology Data Exchange (ETDEWEB)

    Wilhelm, Christina M., E-mail: wilhelmc@battelle.org [Battelle, 505 King Avenue, JM-7, Columbus, OH 43201-2693 (United States); Snider, Thomas H., E-mail: snidert@battelle.org [Battelle, 505 King Avenue, JM-7, Columbus, OH 43201-2693 (United States); Babin, Michael C., E-mail: babinm@battelle.org [Battelle, 505 King Avenue, JM-7, Columbus, OH 43201-2693 (United States); Jett, David A., E-mail: jettd@ninds.nih.gov [National Institutes of Health/National Institute of Neurological Disorders and Stroke, Bethesda, MD 20892 (United States); Platoff, Gennady E., E-mail: platoffg@niaid.nih.gov [National Institutes of Health/National Institute of Allergy and Infectious Diseases, Bethesda, MD 20892 (United States); Yeung, David T., E-mail: dy70v@nih.gov [National Institutes of Health/National Institute of Neurological Disorders and Stroke, Bethesda, MD 20892 (United States)

    2014-12-15

    The currently fielded pre-hospital therapeutic regimen for the treatment of organophosphorus (OP) poisoning in the United States (U.S.) is the administration of atropine in combination with an oxime antidote (2-PAM Cl) to reactivate inhibited acetylcholinesterase (AChE). Depending on clinical symptoms, an anticonvulsant, e.g., diazepam, may also be administered. Unfortunately, 2-PAM Cl does not offer sufficient protection across the range of OP threat agents, and there is some question as to whether it is the most effective oxime compound available. The objective of the present study is to identify an oxime antidote, under standardized and comparable conditions, that offers protection at the FDA approved human equivalent dose (HED) of 2-PAM Cl against tabun (GA), sarin (GB), soman (GD), cyclosarin (GF), and VX, and the pesticides paraoxon, chlorpyrifos oxon, and phorate oxon. Male Hartley guinea pigs were subcutaneously challenged with a lethal level of OP and treated at approximately 1 min post challenge with atropine followed by equimolar oxime therapy (2-PAM Cl, HI-6 DMS, obidoxime Cl{sub 2}, TMB-4, MMB4-DMS, HLö-7 DMS, MINA, and RS194B) or therapeutic-index (TI) level therapy (HI-6 DMS, MMB4-DMS, MINA, and RS194B). Clinical signs of toxicity were observed for 24 h post challenge and blood cholinesterase [AChE and butyrylcholinesterase (BChE)] activity was analyzed utilizing a modified Ellman's method. When the oxime is standardized against the HED of 2-PAM Cl for guinea pigs, the evidence from clinical observations, lethality, quality of life (QOL) scores, and cholinesterase reactivation rates across all OPs indicated that MMB4 DMS and HLö-7 DMS were the two most consistently efficacious oximes. - Highlights: • First comprehensive evaluation of leading AChE oxime reactivators • All oximes are compared against current U.S. therapy 2-PAM Cl. • Relative therapeutic oxime efficacies against OP CWNA and pesticides • Contribution to more effective antidotes for civilian and military populations.

  20. From Warfare to Welfare. Postwar Homelessness, Dislocation, and the Birth of the Welfare State in Europe: The Case of Berlin 1945–1949

    Directory of Open Access Journals (Sweden)

    Clara M. Oberle

    2010-11-01

    Full Text Available This article examines the origins of what for years has been characterized as a European welfare consensus. It asks whether, indeed, there was a convergence of ideas, and if so, what led to it. Based on public health records from governmental, municipal, and international agencies in immediate postwar Europe, but also on sources reflecting public opinion, Allied military government discourses and policies, urban planners, medical professionals, and others, it argues that indeed there was a period in European history which generated something of a postwar convergence of ideas regarding public health and welfare. The postwar period witnessed a remarkable consensus about the importance of public planning, spending, and state involvement in the health and welfare sector. By examining the case of Berlin as one immediate postwar city and situating it in the larger European context of the time, one can point to common motivations and even actors involved. The root of this consensus was not any optimistic humanitarian ideology, nor even only a concern about public health or the spread of epidemics, though the latter was prominent. Equally important, it grew out of a shared setting marked by physical destruction and political instability. As a result, concerns about governability, social order, and political legitimacy came to the forefront, even of health and housing debates. In the case of Berlin, the public health debate was driven furthermore by a fear of the return of National Socialism.

  1. Terrorism Research Centres: 100 Institutes, Programs and Organisations in the Field of Terrorism, Counter-Terrorism, Radicalisation and Asymmetric Warfare Studies

    OpenAIRE

    Benjamin Freedman

    2010-01-01

    Who is doing research – academic and otherwise – on terrorism? The field of terrorism research is broad and ever-expanding. Governments sponsor intelligence-driven analytical research agencies. Commercial intelligence firms like Jane’s, sell their research to corporate and governmental clients. There are think tanks likeRAND, which work closely with government agencies. An increasing number of universities house terrorism research centres, the oldest one being the Centre for...

  2. 浮标布阵航路规划算法仿真研究%Research on Path Planning for Sonobuoys Deployment Algorithm and Simulation

    Institute of Scientific and Technical Information of China (English)

    陈芳; 夏炜

    2011-01-01

    研究固定翼反潜飞机优化航路规划问题,反潜飞机浮标布阵系统作为航空反潜的重要组成部分.由于固定翼反潜飞机因飞行速度以及同时具备搜潜和反潜的能力,针对固定翼飞机在浮标布放飞行速度下转弯半径过大,使规划航路不能在规定的时间内完成布放任务,对声纳浮标也不能及时对某一海域进行搜索而失去最佳的探潜时机,因此采用线性规划算法已无法满足布放实时性的要求.为解决上述问题,将传统蚁群算法运用到直升机布阵航路规划中,并对其进行了改进,运用到固定翼飞机布阵航路规划中,解决了因固定翼飞机最小转弯半径过大而导致布阵不及时、影响搜索效率等问题,最后对算法寻优和收敛情况进行仿真,结果取得了较好的效果为设计提供了参考.%Airborne anti - submarine plays a very important role in the whole anti - submarine defense system. As the essential part of airborne anti - submarine, sonobuoy deployment system and its path planning's performance will affect directly the subsequent task of anti - submarine, and even make the whole anti - submarine task failed with bad planning. With its flight velocity and also the ability of submarine and anti - submarine, fixed - wing anti - submarine aircraft has become widely accepted. Because of the turning radius is too large under the deployed speed, the ordinary linear programming algorithm is unable to make the sonobuoy deployment task completed in time, so that the sonobuoy can not search the certain sea area in the best time. In this paper, the traditional ant colony algorithm was applied to the buoy deployment path planning of helicopter. Then we improved the fixed - wing aircraft and solved the problem that the minimum turning radius of fixed - wing planes is too large and the planes cannot deploy sonobuoys in time. The improved algorithm was proved to have good optimization and convergence performances

  3. Oriental Military Strategy of the Information-Based Warfare--On the strategic values of Sun Tzu The Art of War in the information-based warfare%信息化战争中的东方军事谋略--论的谋略思想在信息化战争中的价值

    Institute of Scientific and Technical Information of China (English)

    张琳琳

    2005-01-01

    是中国古代军事谋略思想的集大成者.随着信息化战争成为主要的战争形态,军事谋略运用不断呈现出新的特点.这些新特点表明,信息化战争不仅没有否定孙子谋略思想的普遍价值,而且进一步凸现了其新的生机与活力.

  4. 77 FR 31588 - 36(b)(1) Arms Sales Notification

    Science.gov (United States)

    2012-05-29

    ... basic military balance in the region. The prime contractors will be Sikorsky Aircraft Corporation in...-submarine warfare (ASW), anti-surface warfare (ASuW), search and rescue (SAR), naval gunfire...

  5. The Technology of Terror: Accounting for the Strategic Use of Terrorism

    OpenAIRE

    Christopher K. Butler; Gates, Scott

    2010-01-01

    To comprehend why a group would intentionally target civilians, we need to understand why other groups do not. In this chapter, we argue that disgruntled groups face three main choices when addressing their dissatisfaction: suffering a disadvantageous peace, engaging in unconventional warfare, or engaging in conventional warfare. We further disaggregate the choice of unconventional warfare into terrorism and guerrilla warfare. By focusing on asymmetrical aspects of the problem and the strateg...

  6. Hybridkrig

    OpenAIRE

    Haande, Trond; Bjerga, Kjell Inge

    2011-01-01

    The study addresses hybrid warfare and its relevance to land operations conducted by the Norwegian Armed Forces. While the first part explores the recent phenomenon of hybrid warfare, the second asks whether hybrid warfare has any bearing on land operations. A land operation is a ground operation on Norwegian territory in which Norwegian Armed Forces engage conventional adversaries. Military theory traditionally recognises a dichotomy between guerrilla warfare and conventional ...

  7. Field Investigations into the History of Warfare that Shizhu Minority Power in the Late Ming Dynasty assisted Liao Dynasty%明末石石主土司援辽战争史实考

    Institute of Scientific and Technical Information of China (English)

    张万东

    2012-01-01

    In Ming dynasty, Shizhu Xuanfuci was an important minority power in Southeast of Sichuan. The Ming government called up the soldiers in Shizhu to assist Liao dynasty in December 11, 1619, Qin Liangyu, the local military officer in Shizhu, her eider brother Qin Bangping and her son Ma Xianglin led the first troops to arrive in Tongzhou to assist Liao in April, 1720 and fought with soldiers of Jiangsu and Zhejiang origin savagely there. And later on, Bangping and Ma Xianglin led their men to arrive in the northeast of Liao to have a hand in Hun Riv er War (1826), whereas Qin Liangyu led her men to be on garrison duty in Shanhai Pass after the second rein forcements arrived in Tongzhou.%石砫宣抚司为明代川东南地区的一个重要土司。明朝征调石砫土兵援辽的时间万历四十七年十一月,时任石砫土司宣抚使的秦良玉与其兄秦邦屏、其子马祥麟于翌年四月率第一批援辽军队抵达通州,并在通州与赴辽的江浙兵发生了恶性斗殴事件。其后秦邦屏与马祥麟率兵赶赴辽东并参与了浑河之战,而秦良玉则在通州等第二批援辽军队到达之后,曾率兵到山海关驻防。

  8. On the Strategic Position of Yanzhou in the Song-Xia Peacetime and Warfare%论延州在宋夏和战中的战略地位

    Institute of Scientific and Technical Information of China (English)

    陈朔

    2016-01-01

    自北宋中叶宋夏正式交战,北宋西北边境诸州军的战略地位陡然上升,其中尤以位于鄜延路北端的延州为重。作为宋夏交通线上的枢纽,延州以其特殊的地理位置,承担着重要职责:在战争时期,北宋政府于此积极修筑堡寨、发展屯田,使之成为军事要塞和后勤补给地;在和平时期,该地不仅是宋夏交聘往来的指定地点,亦是宋夏争夺周边少数民族支持的重要地区。%Since the Northern Song and Xia dynasties were at war, the northwestern border prefectures turned strategically significant,especially Yanzhou at the northern point of Fuyanlu. As a Song-Xia traffic pivot,Yanzhou occupying a special geographical position shouldered key responsibilitiesduring wartime,the Northern Song government actively built garrisons and reclaimed arable lands to make this region a military stronghold as well as logistic center;during peacetime,this region turned not only a land for Song-Xia communication and transaction,but also the arena for both sides to gain support from ethnic groups.

  9. 基于Agent的水声对抗仿真系统建模与仿真分析%Agent-based modeling and simulation analysis of acoustic warfare simulation system

    Institute of Scientific and Technical Information of China (English)

    王汝夯; 黄建国; 张群飞; 李冰

    2008-01-01

    分析了水声对抗仿真系统的组成和特点,基于Agent方法进行了水声对抗仿真建模,建立了Agent实体的功能层、信息层和认知层的模型结构,给出了基于Agent的系统结构和个体Agent的建模过程,从一个新的视点上研究了水声对抗分布仿真系统,最后总结了这种仿真体系的特点和长处.

  10. 从海地救援谈医院的非战争军事行动卫勤保障%Consideration of Medical Service during Non- warfare Military Action in International Rescue Action in Haiti

    Institute of Scientific and Technical Information of China (English)

    杨国斌; 易学明

    2010-01-01

    本文以中国医疗防疫救护队海地救援行动为引导,探讨国际灾难救援行动的特点和规律,从思想教育、组织指挥、器材装备、方案预案、队伍编成、重难点问题研究等方面;分析当前应急救援队伍建设存在的问题与对策,指出国际救援在外交、军事和应急救援队伍建设中的重要作用,为军队医院提高非战争军事行动卫勤保障能力借鉴.

  11. Annual Adaptive Management Report for Compensatory Mitigation at Keyport Lagoon: Mitigation of Pier B Development at the Bremerton Naval Facilities - Compensatory Mitigation at Keyport Lagoon - Naval Underwater Warfare Center Division - Keyport, Washington

    Energy Technology Data Exchange (ETDEWEB)

    Vavrinec, John; Borde, Amy B.; Woodruff, Dana L.; Brandenberger, Jill M.; Thom, Ronald M.; Wright, Cynthia L.; Cullinan, Valerie I.

    2012-06-01

    Unites States Navy capital improvement projects are designed to modernize and improve mission capacity. Such capital improvement projects often result in unavoidable environmental impacts by increasing over-water structures, which results in a loss of subtidal habitat within industrial areas of Navy bases. In the Pacific Northwest, compensatory mitigation often targets alleviating impacts to Endangered Species Act-listed salmon species. The complexity of restoring large systems requires limited resources to target successful and more coordinated mitigation efforts to address habitat loss and improvements in water quality that will clearly contribute to an improvement at the site scale and can then be linked to a cumulative net ecosystem improvement.

  12. 基于Lanchester方程的作战混合动态系统最优控制%Optimal control of warfare hybrid dynamic system based on Lanchester equation

    Institute of Scientific and Technical Information of China (English)

    陈向勇; 井元伟; 李春吉

    2013-01-01

    针对作战过程的混合动态特性,利用Lanchester方程建立了一类作战混合动态系统模型,在合理战术假设的基础上,讨论了一类变招顺序固定的作战决策方最优控制问题.利用动态规划原理给出了解决问题的基本框架与途径.最后,通过应用算例验证了所建立模型和所设计最优控制方案的可行性.研究结果对作战指挥决策和对策的研究具有理论指导意义.

  13. 电子战在反恐怖作战中的作用及其运用%The Effect and Application of the Electronical Warfare in the Counter-Terror Operation

    Institute of Scientific and Technical Information of China (English)

    徐新照; 万里云; 徐珺; 田志华

    2010-01-01

    恐怖活动已成为威胁国家安全和社会稳定的重要因素,电子战在反恐怖作战中也越发具有十分突出的作用.文章分析了恐怖组织从事恐怖活动实施电子战的手段,以及反恐怖作战电子战的特点,提出了反恐怖作战电子战的运用对策及需要把握的几个问题.

  14. Mao Zedong's psychological warfare dominated Zhang Guotao in the Long March%长征路上毛泽东巧用心理战镇住张国焘

    Institute of Scientific and Technical Information of China (English)

    孙果达

    2009-01-01

    毛泽东的心理战是非常著名的。众所周知,在敌强我弱的战场上,毛泽东在紧要关头曾经多次运用空城计化险为夷。鲜为人知的是,毛泽东在长征路上的紧要关头对张国焘也成功地实施了心理战,也同样收到了化险为夷的效果。

  15. 水下战视景仿真系统建模及实时场景渲染方法%Modeling and real-time scene rendering of underwater warfare visual simulation system

    Institute of Scientific and Technical Information of China (English)

    曾艳阳; 康凤举; 许鹏; 李小军

    2013-01-01

    According to the problems of random error's rationality in the modeling and the real-time visua-lization of a complex environment, a novel approach based on high level architecture (HLA) and the military simulation platform "Flames" is presented for underwater counterwork visual systems, which is customizable and reus-able. The random error of feature constraint is introduced to build a simulation model based on fractional Brow-nian motion (fBm). Besides, the ocean surface and underwater space are developed based on the engine of the open scene graph (OSG), which makes full use of the graphic processing unit (GPU) for achieving texture map-ping and rendering rapidly of ocean surface, seabed terrain and so on. The system meets the demands of various underwater confrontations (e.g. submarine vs. naval ship, the helicopter vs. submarine, etc). The practical application results show that the system has good real-time properties and visual effects.%针对水下对抗建模中随机误差加入的合理性及复杂环境实时细致再现的问题,提出了一种基于高层体系结构(high level architecture,HLA)和军用仿真平台Flames构建一个可定制、可重用的水下对抗视景系统的设计方法,引入基于分形布朗运动(fractional Brownian motion,fBm)特征约束的随机误差来构建仿真模型,同时开发出基于开放场景图(open scene graph,OSG)视景引擎的海面和水下空间,充分利用图形处理单元(graphic processing unit,GPU)实现海面和海底地形等的快速纹理映射及渲染.该系统能适应潜-舰、直升机-潜等多种水下对抗样式的视景仿真需求.实际应用结果表明,该系统具有较好的实时性和视觉效果.

  16. From sticks and stones to zeros and ones the development of computer network operations as an element of warfare : a study of the Palestinian-Israeli cyberconflict and what the United States can learn from the "Interfada"

    OpenAIRE

    Wrona, Jacqueline-Marie Wilson.

    2005-01-01

    The Palestinian-Israeli Cyberconflict erupted in 2000, when Israeli hackers crippled the prime website of Hezbollah by mobilizing pro-Israeli supporters to "bomb" the site with automated floods of electronic mail. In retaliation, Hezbollah rallied pro-Arab supporters for a counter-attack, which soon downed the main Israeli government website and the Israeli Foreign Ministry site. Attacks involving website defacements, denial-of-service, viruses, and Trojan horses occurred by both parties ...

  17. Modeling and simulation the probability of searching submarine based on passive buoy array%被动浮标阵对潜搜索概率建模与仿真

    Institute of Scientific and Technical Information of China (English)

    罗光成; 杨日杰; 张丹

    2011-01-01

    浮标搜潜是1种主要的航空探潜方式,投放浮标的数量及阵形决定着搜潜效能.由于机载浮标数量有限,正确地计算当前阵型的搜索概率尤为重要.以应召搜潜为背景,结合被动浮标作战使用,对水下潜艇分布规律进行分析,建立了被动浮标阵的对潜探测概率模型,并仿真分析潜艇分布规律对模型探测概率的影响,为部队训练被动浮标的使用提供了参考.%Sonobuoy anti-submarine is a major method for the air anti-submarine,and the number of buoys in launching determine the efficiency of searching submarine. Due to the limited number of airborne buoy.it is important to calculate correctly the formation of the search probability. As a background of summoned searching submarine, this paper has combined with the passive buoy using to analysis the distribution of submarine underwater, and established a passive buoy arrays for submarine detection probability model,and analyzed the efficiency of submarine distribution and model probability of detecting. It provided a reference of passive buoy for troop training.

  18. 潜艇跟踪过程中声呐浮标的作战使用%Research on tactical operation of sonobuoy in tracking submarine

    Institute of Scientific and Technical Information of China (English)

    滕俊; 邵晓方; 吴昊

    2012-01-01

    为了提高反潜航空兵跟踪潜艇的效率,在声呐浮标基本组成的基础上,提出声呐浮标在跟踪潜艇时的战斗使用方法,即保持连续目标接触法和保持周期性目标接触法.分别对使用这2种方法时浮标障的布放形式进行了分析,并就声呐浮标跟踪潜艇时的战术质量指标进行了定量计算.研究结果对我海军当前航空兵反潜有一定的现实指导意义.%In order to enhance anti-submarine airforces' efficiency, this thesis puts forward tactical operating methods: keeping the continuity of target contact and keeping periodic target contact, analyzing deployable form of buoys-barrier' using in two methods, basing on basic constitutes, and has calculated the tactic quality index of buoys barrier. The conclusion is valuable for airforces about anti-submarine.

  19. Hybridkrig - relevant for Forsvarets gjennomføring av landoperasjoner?

    OpenAIRE

    Haande, Trond

    2010-01-01

    The focus of this thesis addresses the emerging phenomenon known as Hybrid Warfare and its relevance to the Norwegian Armed Forces execution of land operations. This thesis is divided into two components. The first component explores the recent phenomenon of Hybrid Warfare, and the second part analyzes whether elements of Hybrid Warfare have any relevance for the Norwegian Armed Forces execution of land operations. The thesis limits land operations to those conducted by Norwegi...

  20. Carrier Analysis Lab (CAL) – Aircraft/Weapons/Ship Compatibility Lab

    Data.gov (United States)

    Federal Laboratory Consortium — Purpose: The Carrier Analysis Lab (CAL) - Aircraft/Weapons/Ship Compatibility Lab located at the Naval Air Warfare Center Aircraft Division, Lakehurst, NJ provides...

  1. Visualization Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Evaluates and improves the operational effectiveness of existing and emerging electronic warfare systems. By analyzing and visualizing simulation results...

  2. Electricity in the navy

    Directory of Open Access Journals (Sweden)

    M. K. Lele

    1953-01-01

    Full Text Available Author projects some ideas of the role that electricity plays nowadays in the Navy and the variety of problems which are associated with the fulfillment of that role. A part from the high falutin equipment such as Guided Missiles, which is still in its development stage and which will not reach the Indian Navy for some considerable time, it is evident that the trend is towards improved fire control by using electronic analyzers,  use of television, improved anti-submarine sets, electric propulsion of ships, etc. The swiftness with which these development takes place in the Indian Navy and the extent to which it can keep in step with other navies is dependent, amongst other things, upon the cooperation between the Naval Electrical officers and the Naval scientists and the Electrical Industry of the country.

  3. The Influence of Sea Power Upon History 1660-1783

    Directory of Open Access Journals (Sweden)

    I.C. Little

    2012-02-01

    Full Text Available The author of this book, Alfred Thatcher Mahan, is to naval warfare what Clausewitz is to land warfare and his books are the source of many quotations and arguments over strategy, and above all, the meaning of seapower. It was thus with a feeling of renewing an old acquaintanceship that I approached this attractively bound green and gold book.

  4. Explosive and chemical threat detection by surface-enhanced Raman scattering: A review

    DEFF Research Database (Denmark)

    Hakonen, Aron; Andersson, Per Ola; Schmidt, Michael Stenbæk;

    2015-01-01

    Acts of terror and warfare threats are challenging tasks for defense agencies around the world and of growing importance to security conscious policy makers and the general public. Explosives and chemical warfare agents are two of the major concerns in this context, as illustrated by the recent B...

  5. 78 FR 17187 - Notice of Availability of Government-Owned Inventions; Available for Licensing

    Science.gov (United States)

    2013-03-20

    ... depth determination for an acoustic sour//U.S. Patent Number 8,273,698: Odorless low-VOC and HAP-free... interviews should be directed to Naval Air Warfare Center Aircraft Division, Technology Transfer Office... CONTACT: Naval Air Warfare Center Aircraft Division, Technology Transfer Office, 22473 Millstone...

  6. 76 FR 54222 - Notice of Availability of Government-Owned Inventions; Available for Licensing

    Science.gov (United States)

    2011-08-31

    .../009,281: Low-VOC Siloxane Compositions, Navy Case PAX66, filed January 19, 2011; U.S. Patent... Mr. Paul Fritz, Naval Air Warfare Center Aircraft Division, Business and Partnership Office, Office... Air Warfare Center Aircraft Division, Business and Partnership Office, Office of Research...

  7. The Influence of Sea Power Upon History 1660-1783

    OpenAIRE

    I.C. Little

    2012-01-01

    The author of this book, Alfred Thatcher Mahan, is to naval warfare what Clausewitz is to land warfare and his books are the source of many quotations and arguments over strategy, and above all, the meaning of seapower. It was thus with a feeling of renewing an old acquaintanceship that I approached this attractively bound green and gold book.

  8. Tactische sytemen : Een vergelijking van het militair optreden van land-, zee- en luchtstrijdkrachten

    NARCIS (Netherlands)

    Schokking, G.R.L.

    2006-01-01

    An old problem in military affairs is approached here in a new way. Many soldiers and students have wondered wich are the essentials of warfare. For this they have paid attention to history. The most famous of them is Clausewitz. He has however restricted his attention to land warfare and mainly to

  9. Geestelijke strijd bij de puriteinen. Een spiritualiteit-historisch onderzoek naar Engelse puriteinse geschriften in de periode 1587-1684

    NARCIS (Netherlands)

    de Koeijer, R.W.

    2010-01-01

    This historical study of Puritan spirituality focuses on the theme of spiritual warfare in English Puritan writings of the period 1587-1684. Within Puritan spirituality the metaphor of spiritual warfare stands out. On his path of life to the future kingdom of God the believer meets the enemies of Sa

  10. Terror.com

    DEFF Research Database (Denmark)

    Nissen, Thomas Elkjer

    2014-01-01

    Contribution to RDDC on-line military studies magasine "Contemporary Conflicts" on how IS strategically use social network media and narratives as a part of their information warfare.......Contribution to RDDC on-line military studies magasine "Contemporary Conflicts" on how IS strategically use social network media and narratives as a part of their information warfare....

  11. Environment Perception Process in Maritime Command and Control

    NARCIS (Netherlands)

    Paradis, S.; Treurniet, W.; Roy, J.

    1999-01-01

    Various operational trends in naval warfare, such as technological advances in threat technology and an ongoing shift to littoral warfare, put the shipboard decision making process under pressure. Data must be processed under time-critical conditions and, as a consequence, the risk of saturation in

  12. Development of Cathelicidin-derived peptides for the treatment of infectious diseases

    NARCIS (Netherlands)

    Molhoek, E.M.

    2011-01-01

    The increasing resistance of bacteria to conventional antibiotics has encouraged strong efforts to develop new antimicrobial agents. In addition, exposure to biological warfare agents may cause highly progressive, acute infections that may be lethal. Unfortunately, an attack by biological warfare ag

  13. 美国战略心理战的历史沿革、组织架构和当代发展%On the History' Organizational Structure and Contemporary Development of the Strategic Psychological Warfare System about the United States

    Institute of Scientific and Technical Information of China (English)

    廖东升; 石海明

    2013-01-01

    战略心理战是为了达到一定的战略目的而对敌国或他国军民采取的心理作战样式,是一种新型的国际政治斗争方式.系统地研究美国战略心理战体系的历史沿革、组织架构及其在当代的发展,对加强信息时代我国战略心理战建设具有一定的现实意义.

  14. Investigating the Hydrolysis Reactions of a Chemical Warfare Agent Surrogate. A Systematic Study using 1H, 13C, 17O, 19F, 31P, and 35Cl NMR Spectroscopy

    Energy Technology Data Exchange (ETDEWEB)

    Alam, Todd M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Wilson, Brendan W. [West Virginia Univ., Morgantown, WV (United States)

    2015-07-24

    During the summer of 2015, I participated in the DHS HS-STEM fellowship at Sandia National Laboratories (SNL, NM) under the supervision of Dr. Todd M. Alam in his Nuclear Magnetic Resonance (NMR) Spectroscopy research group. While with the group, my main project involved pursing various hydrolysis reactions with Diethyl Chlorophosphate (DECP), a surrogate for the agent Sarin (GB). Specifically, I performed different hydrolysis reactions, monitored and tracked the different phosphorous containing species using phosphorous (31P) NMR spectroscopy. With the data collected, I performed kinetics studies mapping the rates of DECP hydrolysis. I also used the NMR of different nuclei such as 1H, 13C, 17O, and 35Cl to help understand the complexity of the reactions that take place. Finally, my last task at SNL was to work with Insensitive Nuclei Enhanced by Polarization Transfer (INEPT) NMR Spectroscopy optimizing conditions for 19F- 31P filtering NMR experiments.

  15. Energy Security、Geographical Stratagem and Global Hegemony--reviewing American petrolic stratagem in the Irarq warfare%能源安全、地缘战略和全球霸权--美国在伊拉克战争中的石油战略利益考察

    Institute of Scientific and Technical Information of China (English)

    韩志斌

    2003-01-01

    美国为什么再度打击伊拉克,可以说原因是多方面的.控制伊拉克的石油才是美国利益的根本所在.控制伊拉克的石油,美国目的在于同时实现三大战略利益,即石油为主导的能源安全战略、石油为特征的地缘战略、石油为后盾的全球霸权战略.

  16. Use of Force in the Cyber Warfare as Defined in Tallinn Manual--Analysis from the Angle of the International Law%《塔林手册》中有关网络战争的武力使用问题--从国际法角度展开

    Institute of Scientific and Technical Information of China (English)

    季华

    2016-01-01

    禁止使用武力是《联合国宪章》第2条第4项明确规定的,也是一项强行国际法规则(jus cogens)。尽管《联合国宪章》没有确定“武力使用”的范畴,但根据条约解释规则,“武力”一词应被限定为军事力量。作为一部意图规制国际网络安全的文件——《塔林手册》,坚持将网络攻击等活动纳入到“武力使用”的范畴之内。手册既无法律约束力,也不是一项法律创制;手册本身对武力使用的定性存在法理缺陷和实践误读。《塔林手册》对武力使用的界定值得传统国际法规则回应和反思。%Refraining from the use of force is specified in Item 4 ,Article 2 of The Charter of the United Nations and is also a rule of jus cogens. Although The Charter of the United Nations does not define“the use of force”,the word“force”should be restricted to the military category according to the rules that are used to interpret treaties. As a docu⁃ment intended to regulate international cyber security ,however ,the Tallinn Manual qualifies cyber-attacks as“use of force”. The Manual is neither legally binding nor is a legal creation;the qualification of the use of force in the Manual is both defective in theory and misleading in practice. The Tallinn Manual ’s definition needs to be responded to and recon⁃sidered by traditional rules of the international law.

  17. 基于SOA的作战仿真平台信息交互服务总线研究%Research on information exchanging service bus(IESB)of SOA-based integrative simulation platform of joint warfare(ISPoJW)

    Institute of Scientific and Technical Information of China (English)

    温睿; 陈小青; 马亚平

    2009-01-01

    为解决作战仿真平台在大规模复杂网络中的应用出现诸多难题,尤其是一体化信息交互IIE成为制约平台大规模应用的瓶颈,必须按照先进的网络服务架构思想对原有平台进行改造.从作战仿真平台的SOA架构入手,提出信息交互服务总线IESB概念模型和实际网络拓扑,并针对作战仿真要求提出IESB的系统功能需求,给出了IESB的功能模块设计与系统结构.平台构建实践结果表明,IESB能够大幅提升服务性能.最后,结合对原有平台的改造,讨论了平台建设中的若干问题.

  18. A Critical Inquiry into the First Instance Decision of the Lawsuit against Unit 731 of Japanese Army Launching Germ Warfare in China%关于731部队细菌战诉讼一审判决的批判探讨

    Institute of Scientific and Technical Information of China (English)

    土屋公献

    2002-01-01

    731部队细菌战诉讼一审判决原告虽为败诉,但该判决在事实认定和法律关系方面具有积极意义.法庭在几个法律争议的问题上几乎全面采纳被告方所持论点,而对原告方所持法律论点予以驳回,对此我们感到强烈不满.一审判决有值得批判之处.

  19. 关于731部队鼠疫报告书的初步解读——基于美国解密日本细菌战档案的调查%Preliminary Interpretation on the Report of Plague by Unit 731 : Based on the Investigation of U.S. Declassified Files of Japanese Biological Warfare

    Institute of Scientific and Technical Information of China (English)

    杨彦君

    2013-01-01

    “The Report of Q” is saved in the U.S.Library of Congress,which is the report on autopsy of people plague infected in the Changchun and Nongan areas by Unit 731 in 1943.The main contents,research types and research methods of “the Report of Q” are analyzed on the basis of the anatomical data recorded in “the Report of Q”,and the information about the infection path and degree of the organs such as heart,lung and tonsil,which further reveals the historical facts of Unit 731 actually doing the research on bacterial infection in the name of the “Epidemic Prevention”.%“Q报告”保存在美国国会图书馆,是731部队于1943年对长春和农安地区鼠疫感染者进行解剖的报告书.依据“Q报告”所记录的解剖数据,心脏、肺、扁桃体等器官感染路径和感染程度等信息,梳理分析了“Q报告”的主要内容、研究类型和研究方法,进一步揭露了731部队以“防疫”为名实际进行细菌感染研究的历史事实.

  20. Guerra e desenvolvimento biológico: o caso da biotecnologia e da genômica na segunda metade do século XX Warfare and biological development: the case of biotechnology and genomics during the second half of the 20th Century

    Directory of Open Access Journals (Sweden)

    Maria Eneida de Almeida

    2006-09-01

    Full Text Available Desde a década de 1980, a Biotecnologia vem assumindo um papel cada vez mais importante dentro do planejamento estratégico das Grandes Potências, como elemento central para um novo tipo de arma ofensiva de destruição em massa e como paradigma para o planejamento de defesa e proteção de suas populações nacionais. Para defender esta tese, nosso estudo se orientou exatamente na história do deslocamento da Biologia para o centro do planejamento de defesa americano. Nosso objetivo foi investigar a existência de uma estreita relação entre o Desenvolvimento Biotecnológico, da ciência Genômica em particular, e a questão da guerra. Nossa hipótese é que a Biotecnologia se afirmou no campo da guerra, quando foram atingidos um ponto de condensação de fatos políticos e uma confluência de possibilidades biotécnicas que estimularam acentuadamente o interesse político-militar. A metodologia para a investigação desta conexão deu-se por dois caminhos: uma análise teórica, onde encontramos as origens e o mecanismo da Big Science desde a II Guerra Mundial, quando a Física assumiu o eixo central da ciência de ponta na era atômica, e desde a década de 1980, quando a Biologia passou a ocupar um lugar central; e uma análise historiográfica, acompanhando duas trajetórias convergentes que, para a nossa tese, formam o nervo central do Desenvolvimento Biotecnológico, da Guerra Biológica e do Projeto Genoma Humano.Since the 1980's, biotechnology has played an increasingly predominant role in the strategic planning of the super-powers, as the central element of a new type of mass destruction weapon as well as a model for defense planning and protection of their national populations. This study aims to demonstrate the path taken by Biology towards the core of American defense planning and also to investigate the close relationship between biotechnological development, in particular that of Genome Science and war. The specific hypothesis of this study is that biotechnology took a firm stand in military affairs when a condensation point was reached encompassing political facts and a flow of biotechnological possibilities, which have increased political-military interest in biotechnological development. A historiographical analysis was the method used for investigating this connection, following the two converging roads, which, in our view, make up the central nerve of biotechnological development: biological war and the Human Genome Project.