WorldWideScience

Sample records for automatic weapons

  1. Variable-mass Thermodynamics Calculation Model for Gas-operated Automatic Weapon%Variable-mass Thermodynamics Calculation Model for Gas-operated Automatic Weapon

    Institute of Scientific and Technical Information of China (English)

    陈建彬; 吕小强

    2011-01-01

    Aiming at the fact that the energy and mass exchange phenomena exist between barrel and gas-operated device of the automatic weapon, for describing its interior ballistics and dynamic characteristics of the gas-operated device accurately, a new variable-mass thermodynamics model is built. It is used to calculate the automatic mechanism velocity of a certain automatic weapon, the calculation results coincide with the experimental results better, and thus the model is validated. The influences of structure parameters on gas-operated device' s dynamic characteristics are discussed. It shows that the model is valuable for design and accurate performance prediction of gas-operated automatic weapon.

  2. Person categorization and automatic racial stereotyping effects on weapon identification.

    Science.gov (United States)

    Jones, Christopher R; Fazio, Russell H

    2010-08-01

    Prior stereotyping research provides conflicting evidence regarding the importance of person categorization along a particular dimension for the automatic activation of a stereotype corresponding to that dimension. Experiment 1 replicated a racial stereotyping effect on object identification and examined whether it could be attenuated by encouraging categorization by age. Experiment 2 employed socially complex person stimuli and manipulated whether participants categorized spontaneously or by race. In Experiment 3, the distinctiveness of the racial dimension was manipulated by having Black females appear in the context of either Black males or White females. The results indicated that conditions fostering categorization by race consistently produced automatic racial stereotyping and that conditions fostering nonracial categorization can eliminate automatic racial stereotyping. Implications for the relation between automatic stereotype activation and dimension of categorization are discussed.

  3. Experimental Investigations of a Precision Sensor for an Automatic Weapons Stabilizer System.

    Science.gov (United States)

    Korobiichuk, Igor

    2016-12-24

    This paper presents the results of experimental investigations of a precision sensor for an automatic weapons stabilizer system. It also describes the experimental equipment used and the structure of the developed sensor. A weapons stabilizer is designed for automatic guidance of an armament unit in the horizontal and vertical planes when firing at ground and air targets that are quickly maneuvering, and at lower speeds when firing anti-tank missiles, as well as the bypass of construction elements by the armament unit, and the automatic tracking of moving targets when interacting with a fire control system. The results of experimental investigations have shown that the error of the precision sensor developed on the basis of a piezoelectric element is 6 × 10(-10) m/s² under quasi-static conditions, and ~10(-5) m/s² for mobile use. This paper defines metrological and calibration properties of the developed sensor.

  4. Automatic Checkout System for Ground Electronics of a Weapon System (Short Communication

    Directory of Open Access Journals (Sweden)

    V. Ashok Kumar

    1997-04-01

    Full Text Available An automatic checkout system (ACOS designed and developed for a surface-to-air missile system is described. The system has a built-in self-check and has been extensively used for checking faults in the subsystems of ground electronics. It has resulted in saving a lot of effort in quickly diagnosing and rectifying faults. The salient features of the ACOS have been described and the scope for further work in this area has been outline.

  5. Special Weapons

    Data.gov (United States)

    Federal Laboratory Consortium — Supporting Navy special weapons, the division provides an array of engineering services, technical publication support services, logistics support services, safety...

  6. [Biological weapons].

    Science.gov (United States)

    Kerwat, K; Becker, S; Wulf, H; Densow, D

    2010-08-01

    Biological weapons are weapons of mass destruction that use pathogens (bacteria, viruses) or the toxins produced by them to target living organisms or to contaminate non-living substances. In the past, biological warfare has been repeatedly used. Anthrax, plague and smallpox are regarded as the most dangerous biological weapons by various institutions. Nowadays it seems quite unlikely that biological warfare will be employed in any military campaigns. However, the possibility remains that biological weapons may be used in acts of bioterrorism. In addition all diseases caused by biological weapons may also occur naturally or as a result of a laboratory accident. Risk assessment with regard to biological danger often proves to be difficult. In this context, an early identification of a potentially dangerous situation through experts is essential to limit the degree of damage.

  7. 某高炮武器系统自动校射系统设计%Design of Automatic Firing Calibration System of a Certain Antiaircraft Artillery Weapon System

    Institute of Scientific and Technical Information of China (English)

    马志强; 程远增; 孙世宇; 王春平

    2011-01-01

    我国现役高炮火控系统的校射大多采用开环控制,没有自动校射功能,作战效能较低.针对某型高炮设计了一种自动校射系统,该系统采用火控解算参数与数字图像处理技术相结合的方法,火控计算机计算出虚拟弹目偏差,图像处理技术获取置信度较高的弹目偏差,对高炮射击诸元进行实时校正,克服传统校射的不足,从而实现对高炮武器系统的全过程高精度自动校射,实现高炮武器系统的快速射击,提高射击命中率,充分发挥高炮武器系统的作战效能.%China's active antiaircraft artillery fire control system mostly uses open-loop control for fireng calibration, no automatic fire calibration function, only has low operation efficiency. This paper presents a design method of automatic fire calibration system to a certain antiaircraft artillery. Combining fire control system computing parameters with digital image processing technology, automatic fire calibration system uses fire control computer computing the virtual miss distance, uses image processing technology obtaining miss distance with higher reliability in order to correct real-timely all kinds of firing data of antiaircraft artillery and overcome the deficiencies of traditional fire calibration method. For the antiaircraft artillery weapon system, this system could achieve automatic fire calibration with the whole process and high precision, ensure rapid firing and improve hit rate, give full play to the combat effectiveness.

  8. Nuclear weapons modernizations

    Energy Technology Data Exchange (ETDEWEB)

    Kristensen, Hans M. [Federation of American Scientists, Washington, DC (United States)

    2014-05-09

    This article reviews the nuclear weapons modernization programs underway in the world's nine nuclear weapons states. It concludes that despite significant reductions in overall weapons inventories since the end of the Cold War, the pace of reductions is slowing - four of the nuclear weapons states are even increasing their arsenals, and all the nuclear weapons states are busy modernizing their remaining arsenals in what appears to be a dynamic and counterproductive nuclear competition. The author questions whether perpetual modernization combined with no specific plan for the elimination of nuclear weapons is consistent with the nuclear Non-Proliferation Treaty and concludes that new limits on nuclear modernizations are needed.

  9. Nonstrategic Nuclear Weapons

    Science.gov (United States)

    2014-01-03

    William Potter , and Nikolai Sokov, Reducing and Regulating Tactical (Nonstrategic) Nuclear Weapons in Europe, The James Martin Center For...See William C. Potter and Nikolai Sokov, “Nuclear Weapons that People Forget,” International Herald Tribune, May 31, 2000. 87 Sam Nunn, Igor...their security.97 94 Kent Harris , “NATO Allies Want U.S. Nuclear Weapons out of Europe

  10. Reconversion of nuclear weapons

    CERN Document Server

    Kapitza, Sergei P

    1993-01-01

    The nuclear predicament or nuclear option. Synopsis of three lectures : 1- The physical basis of nuclear technology. Physics of fission. Chain reaction in reactors and weapons. Fission fragments. Separration of isotopes. Radiochemistry.2- Nuclear reactors with slow and fast neutrons. Power, size, fuel and waste. Plutonium production. Dose rate, shielding and health hazard. The lessons of Chernobyl3- Nuclear weapons. Types, energy, blast and fallout. Fusion and hydrogen bombs. What to do with nuclear weapons when you cannot use them? Testing. Nonmilittary use. Can we get rid of the nuclear weapon? Nuclear proliferation. Is there a nuclear future?

  11. Virtual nuclear weapons

    Energy Technology Data Exchange (ETDEWEB)

    Pilat, J.F.

    1997-08-01

    The term virtual nuclear weapons proliferation and arsenals, as opposed to actual weapons and arsenals, has entered in recent years the American lexicon of nuclear strategy, arms control, and nonproliferation. While the term seems to have an intuitive appeal, largely due to its cyberspace imagery, its current use is still vague and loose. The author believes, however, that if the term is clearly delineated, it might offer a promising approach to conceptualizing certain current problems of proliferation. The first use is in a reference to an old problem that has resurfaced recently: the problem of growing availability of weapon-usable nuclear materials in civilian nuclear programs along with materials made `excess` to defense needs by current arms reduction and dismantlement. It is argued that the availability of these vast materials, either by declared nuclear-weapon states or by technologically advanced nonweapon states, makes it possible for those states to rapidly assemble and deploy nuclear weapons. The second use has quite a different set of connotations. It is derived conceptually from the imagery of computer-generated reality. In this use, one thinks of virtual proliferation and arsenals not in terms of the physical hardware required to make the bomb but rather in terms of the knowledge/experience required to design, assemble, and deploy the arsenal. Virtual weapons are a physics reality and cannot be ignored in a world where knowledge, experience, materials, and other requirements to make nuclear weapons are widespread, and where dramatic army reductions and, in some cases, disarmament are realities. These concepts are useful in defining a continuum of virtual capabilities, ranging from those at the low end that derive from general technology diffusion and the existence of nuclear energy programs to those at the high end that involve conscious decisions to develop or maintain militarily significant nuclear-weapon capabilities.

  12. Operational research in weapon system

    Directory of Open Access Journals (Sweden)

    R. S. Varma

    1958-04-01

    Full Text Available "The paper is divided into three parts: (a The first part deals with what operational research is. (bThe second part gives what we mean by Weapon Systems and discusses considerations that determine the choice of a particular weapon system from a class weapon systems. (cThe third part deals with some aspects of weapon replacement policy.The effectiveness of a weapon system is defined as E=D/C where E is weapon effectiveness (a comparative figure of merit; D is total damage inflicted or prevented and C is total cost, D and C being reduced to common dimensions. During the course of investigations, criteria regarding to choice of weapon or weapons from a set of weapon systems are established through production function and military effect curves. A procedure is described which maximizes the expectation of military utility in order to select a weapon system from the class of weapon systems. This is done under the following simplifying assumptions: (a Non- decreasing utility function; (b Constant average cost for each kind of weapons; and (c Independence of the performance of each unit of weapon. Some of the difficulties which arises when any of these restrictions is relaxed are briefly mentioned. Finally, the policy of weapon replacement and the factors governing the same are described."

  13. Modern weapons and military equipment for issue 1/2014

    Directory of Open Access Journals (Sweden)

    Nikola M. Ostojić

    2014-02-01

    Full Text Available Unmanned air transport mules from IsraelSensor monitoring of land areaSatellite telescope Moiraorbital weapons "cosmic dome"Automat for frogmen from TulaHeckler & Koch HK XM25, smart grenade launcher

  14. Wounds and weapons

    Energy Technology Data Exchange (ETDEWEB)

    Vogel, H. [Asklepios Klinik St. Georg, Roentgenabteilung, Lohmuehlenstrasse 5, 20099 Hamburg (Germany)], E-mail: Hermann.vogel@ak-stgeorg.lbk-hh.de; Dootz, B. [Asklepios Klinik St. Georg, Roentgenabteilung, Lohmuehlenstrasse 5, 20099 Hamburg (Germany)

    2007-08-15

    Purpose: X-ray findings are described, which are typical for injuries due to conventional weapons. It is intended to demonstrate that radiographs can show findings characteristic for weapons. Material and method: The radiograms have been collected in Vietnam, Croatia, Serbia, Bosnia, Chad, Iran, Afghanistan, USA, Great Britain, France, Israel, Palestine, and Germany. Results: Radiograms of injuries due to hand grenades show their content (globes) and cover fragments. The globes are localized regionally in the victim's body. Survivors of cluster bombs show singular or few globes; having been hit by many globes would have been lethal. Shotguns produce characteristic distributions of the pallets and depth of penetration different from those of hand grenades and cluster bombs; cover fragments are lacking. Gunshot wounds (GSW) can be differentiated in those to low velocity bullets, high velocity projectiles, and projectiles, which disintegrate on impact. The radiogram furnishes the information about a dangerous shock and helps to recognize the weapon. Radiograms of victims of explosion show fragments and injuries due to the blast, information valid for therapy planning and prognosis. The radiogram shows details which can be used in therapy, forensic medicine and in war propaganda - examples could be findings typical for cluster bombs and for dumdum bullets; it shows the cruelty of the employment of weapons against humans and the conflict between the goal of medical care and those of military actions. Conclusion: Radiographs may show, which weapon has been employed; they can be read as war reports.

  15. Bioterrorism: toxins as weapons.

    Science.gov (United States)

    Anderson, Peter D

    2012-04-01

    The potential for biological weapons to be used in terrorism is a real possibility. Biological weapons include infectious agents and toxins. Toxins are poisons produced by living organisms. Toxins relevant to bioterrorism include ricin, botulinum, Clostridium perfrigens epsilson toxin, conotoxins, shigatoxins, saxitoxins, tetrodotoxins, mycotoxins, and nicotine. Toxins have properties of biological and chemical weapons. Unlike pathogens, toxins do not produce an infection. Ricin causes multiorgan toxicity by blocking protein synthesis. Botulinum blocks acetylcholine in the peripheral nervous system leading to muscle paralysis. Epsilon toxin damages cell membranes. Conotoxins block potassium and sodium channels in neurons. Shigatoxins inhibit protein synthesis and induce apoptosis. Saxitoxin and tetrodotoxin inhibit sodium channels in neurons. Mycotoxins include aflatoxins and trichothecenes. Aflatoxins are carcinogens. Trichothecenes inhibit protein and nucleic acid synthesis. Nicotine produces numerous nicotinic effects in the nervous system.

  16. The Optimum Replacement of Weapon

    Institute of Scientific and Technical Information of China (English)

    ZHANG Xiao; ZHANG Jin-chun

    2002-01-01

    The theory of LCC (Life Cycle Cost) is applied in this paper. The relation between the economic life of weapon and the optimum replacement is analyzed. The method to define the optimum replacement time of weapon is discussed.

  17. Multiple smart weapons employment mechanism

    Energy Technology Data Exchange (ETDEWEB)

    McGlynn, M.P.; Meiklejohn, W.D.

    1993-07-20

    A digital communications armament network adaptor is described for carrying multiple smart weapons on a single wing pylon station of an aircraft, comprising: an aircraft having a weapons controller configured in compliance with MIL-STD 1553; multiple wing-mounted pylons on said aircraft, each providing a weapons station with communications and ejection and release mechanisms electrically connected to said controller for the airborne launch of smart weapons; a multiple ejector rack affixed to at least one pylon, said rack holding a plurality of smart weapons; and an electronic digital network connected between the controller and said rack-mounted smart weapons, said network located in said rack and including circuitry which receives coded digital communications from said controller and selectively rebroadcasts said communications to one of said smart weapons on said rack designated by said coded communications, thereby controlling all required functions of said designated smart weapon.

  18. Nuclear weapon detection categorization analysis

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-12-01

    This statement of work is for the Proof of Concept for nuclear weapon categories utility in Arms control. The focus of the project will be to collect, analyze and correlate Intrinsic Radiation (INRAD) calculation results for the purpose of defining measurable signatures that differentiate categories of nuclear weapons. The project will support START III negotiations by identifying categories of nuclear weapons. The categories could be used to clarify sub-limits on the total number of nuclear weapons.

  19. Applying Agile MethodstoWeapon/Weapon-Related Software

    Energy Technology Data Exchange (ETDEWEB)

    Adams, D; Armendariz, M; Blackledge, M; Campbell, F; Cloninger, M; Cox, L; Davis, J; Elliott, M; Granger, K; Hans, S; Kuhn, C; Lackner, M; Loo, P; Matthews, S; Morrell, K; Owens, C; Peercy, D; Pope, G; Quirk, R; Schilling, D; Stewart, A; Tran, A; Ward, R; Williamson, M

    2007-05-02

    This white paper provides information and guidance to the Department of Energy (DOE) sites on Agile software development methods and the impact of their application on weapon/weapon-related software development. The purpose of this white paper is to provide an overview of Agile methods, examine the accepted interpretations/uses/practices of these methodologies, and discuss the applicability of Agile methods with respect to Nuclear Weapons Complex (NWC) Technical Business Practices (TBPs). It also provides recommendations on the application of Agile methods to the development of weapon/weapon-related software.

  20. Nuclear weapons in Europe

    CERN Document Server

    Calogero, F

    1981-01-01

    Information speech given by Prof. Calogero from the university of Roma to describe the actual situation of nuclear weapons in Europe, the strategical reasons or justifications for this deployment, the prospects of negociations, and what scientists could do and do on this issue.

  1. Medicalized weapons & modern war.

    Science.gov (United States)

    Gross, Michael L

    2010-01-01

    "Medicalized" weapons--those that rely on advances in neuroscience, physiology, and pharmacology--offer the prospect of reducing casualties and protecting civilians. They could be especially useful in modern asymmetric wars in which conventional states are pitted against guerrilla or insurgent forces. But may physicians and other medical workers participate in their development?

  2. Neutrino Counter Nuclear Weapon

    CERN Document Server

    Tang, Alfred

    2008-01-01

    Radiations produced by neutrino-antineutrino annihilation at the Z0 pole can be used to heat up the primary stage of a thermonuclear warhead and can in principle detonate the device remotely. Neutrino-antineutrino annihilation can also be used as a tactical assault weapon to target hideouts that are unreachable by conventional means.

  3. Identification of the murder weapon by intricate patterned injury measurements.

    Science.gov (United States)

    Zugibe, F T; Costello, J T

    1986-04-01

    Critical studies of an intricate blunt force injury pattern in a brutal homicide led to the identification of the murder weapon. A 50-year-old male was bludgeoned to death in his apartment during a robbery allegedly engineered by his daughter. Careful measurements and overlay construction of the wounds relative to the magazine catch, lanyard ring, magazine chamber, and butt of a 32-caliber Eistegui Hermanos fibar (España) automatic pistol led to the conclusion that either the alleged weapon or one identical to it caused the fatal injuries.

  4. NON-LETHAL WEAPONS AND THEIR CHARACTERISTICS

    OpenAIRE

    2015-01-01

    Non-lethal weapons, also called less-lethal weapons, less-than lethal weapons, non-deadly weapons, compliance weapons, or pain-inducing weapons are weapons intended to be less likely to kill a living target than conventional weapons. It is often understood that accidental, incidental, and correlative casualties are risked wherever force is applied, but non-lethal weapons try to minimise the risk as much as possible. Non-lethal weapons are used in combat situations to limit the escalation of c...

  5. Bioterrorism: pathogens as weapons.

    Science.gov (United States)

    Anderson, Peter D; Bokor, Gyula

    2012-10-01

    Biowarfare has been used for centuries. The use of biological weapons in terrorism remains a threat. Biological weapons include infectious agents (pathogens) and toxins. The most devastating bioterrorism scenario would be the airborne dispersal of pathogens over a concentrated population area. Characteristics that make a specific pathogen a high-risk for bioterrorism include a low infective dose, ability to be aerosolized, high contagiousness, and survival in a variety of environmental conditions. The most dangerous potential bioterrorism agents include the microorganisms that produce anthrax, plague, tularemia, and smallpox. Other diseases of interest to bioterrorism include brucellosis, glanders, melioidosis, Q fever, and viral encephalitis. Food safety and water safety threats are another area of concern.

  6. Pakistans Nuclear Weapons

    Science.gov (United States)

    2016-02-12

    Command and Control Support System, which “enables robust Command and Control capability of all strategic assets with round the clock situational...Building Confidence in Pakistan’s Nuclear Security,” Arms Control Today, December 2007; Robin Walker, “Pakistan’s Evolution as a Nuclear Weapons State: Lt...that understands the importance and the high priority that the world places on nuclear security. 136 Ambassador Olson told the House Foreign

  7. Illegal Weapons Exports?

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Amnesty International, a human rights organization, released a report on June 11 accusing China of facilitating regional conflicts and human rights violations by exporting a large quantity of weapons to Sudan, Nepal, Myanmar and the Great Lakes countries of Africa. Responding to such charges, Teng Jianqun, a researcher with the China Arms Control and Disarmament Association, told the official Xinhua News Agency that China has always put its limited arms exports under strict control and surveillance, deno...

  8. Counterproliferation of Nuclear Weapons

    Science.gov (United States)

    2010-04-01

    an occurrence. In his book, Atomic Tragedy, Sean Malloy writes that Henry Stimson, the United States Secretary of War, warned in April, 1945 that...Ibid., 380. 41 Ibid. 42 Sean L. Malloy , Atomic Tragedy: Henry L. Stimson and the Decision to use the Bomb Against Japan (Ithaca, New York...Weapons of Mass Destruction in the Middle East, 96-97. 45 Robert M. Gates, National Defense Strategy (Washington, DC: US Government Printing Office

  9. 32 CFR 234.10 - Weapons.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Weapons. 234.10 Section 234.10 National Defense... PENTAGON RESERVATION § 234.10 Weapons. (a) Except as otherwise authorized under this section, the following are prohibited: (1) Possessing a weapon. (2) Carrying a weapon. (3) Using a weapon. (b) This...

  10. Handheld ultrasound concealed weapons detector

    Science.gov (United States)

    Felber, Franklin S.; Wild, Norbert C.; Nunan, Scott C.; Breuner, Dennis; Doft, Frank

    1998-12-01

    A handheld, battery-operated prototype of a remove concealed weapons detector has been built and tested. The concealed weapons detector will enable law enforcement and security officers to detect metallic and nonmetallic weapons concealed beneath clothing remotely from beyond arm's length to about 20 feet. These detectors may be used to: (1) allow hands-off, stand-off frisking of suspects for metallic and nonmetallic weapons; and (2) search for metallic and nonmetallic weapons on cooperative subjects at courthouse entrances and other monitored security portals. We have demonstrated that we image weapons concealed under heavy clothing, not just detect them, at ranges up to 15 feet using the same ultrasound frequency (40 kHz) used by commercial rangefinders. The concealed weapons detector operates much as a rangefinder, but at higher peak fluxes and pulse repetition frequencies. The detector alerts the user to concealed weapons audibly and visibly by detecting ultrasound glints above a body/clothing baseline, and by compensating for changing range and attenuation. The detector locates concealed weapons within a 6-inch illuminated spot at 10 feet. The signal processor eliminates any signal from behind the target.

  11. Weapons Neutron Research Facility (WNR)

    Data.gov (United States)

    Federal Laboratory Consortium — The Weapons Neutron Research Facility (WNR) provides neutron and proton beams for basic, applied, and defense-related research. Neutron beams with energies ranging...

  12. Proportionality and Autonomous Weapons Systems

    NARCIS (Netherlands)

    van den Boogaard, J.

    2015-01-01

    Given the swift technologic development, it may be expected that the availability of the first truly autonomous weapons systems is fast approaching. Once they are deployed, these weapons will use artificial intelligence to select and attack targets without further human intervention. Autonomous weap

  13. Naval Weapons Station Earle Reassessment

    Science.gov (United States)

    2013-12-01

    surveys for their Section 110 compliance: Architectural Resources Survey, Naval Weapons Station Earle, Monmouth County, New Jersey (Louis Berger 1999...text within brackets. Berger Report 1999 Architectural Resources Survey, Naval Weapons Station Earle, Monmouth County, New Jersey (Louis Berger... architectural treatment of buildings at NWS Earle: a traditional vernacular theme with minimal decorative detailing. This so-called minimal traditional

  14. Nuclear weapon reliability evaluation methodology

    Energy Technology Data Exchange (ETDEWEB)

    Wright, D.L. [Sandia National Labs., Albuquerque, NM (United States)

    1993-06-01

    This document provides an overview of those activities that are normally performed by Sandia National Laboratories to provide nuclear weapon reliability evaluations for the Department of Energy. These reliability evaluations are first provided as a prediction of the attainable stockpile reliability of a proposed weapon design. Stockpile reliability assessments are provided for each weapon type as the weapon is fielded and are continuously updated throughout the weapon stockpile life. The reliability predictions and assessments depend heavily on data from both laboratory simulation and actual flight tests. An important part of the methodology are the opportunities for review that occur throughout the entire process that assure a consistent approach and appropriate use of the data for reliability evaluation purposes.

  15. Automatic sequences

    CERN Document Server

    Haeseler, Friedrich

    2003-01-01

    Automatic sequences are sequences which are produced by a finite automaton. Although they are not random they may look as being random. They are complicated, in the sense of not being not ultimately periodic, they may look rather complicated, in the sense that it may not be easy to name the rule by which the sequence is generated, however there exists a rule which generates the sequence. The concept automatic sequences has special applications in algebra, number theory, finite automata and formal languages, combinatorics on words. The text deals with different aspects of automatic sequences, in particular:· a general introduction to automatic sequences· the basic (combinatorial) properties of automatic sequences· the algebraic approach to automatic sequences· geometric objects related to automatic sequences.

  16. Weapon of the Weak?

    DEFF Research Database (Denmark)

    Amber, Van der Graaf; Otjes, Simon; Rasmussen, Anne

    2016-01-01

    Social media have the potential to offset existing inequalities in representation among interest groups and act as a ‘weapon of the weak’ by providing a technological infrastructure that allows even groups with limited resources to create content and interact across the globe. We expand...... on the sparse existing literature on interest groups and social media in a quantitative, structural analysis of both the range and volume of social media use examining a data set of groups active in European Union lobbying. Despite the positive expectations, we find limited evidence that social media have been...... able to reinvigorate democratic processes by changing inequalities in the landscape of political representation among interest groups. The level of resources held by the interest groups acts as the single most consistent predictor of both the range and volume of their social media use. Interest groups...

  17. OIL AS POLITICAL WEAPON

    Directory of Open Access Journals (Sweden)

    Mariana, BUICAN

    2013-12-01

    Full Text Available Oil (called by some black gold has not always been as coveted and used, but only in the last hundred years has established itself as a highly sought after as an indispensable proper functioning of modern economic activity that an important factor in international politics. International oil regime has changed in the last decades. In 1960, oil regime was a private oligopol which had links with governments main consuming countries. By then the price of a barrel of oil was two U.S. dollars and seven major transnational oil companies decided the amount of oil that will be produced. Meanwhile the world region with the largest oil exports were more strongly expressed nationalism and decolonization. Result, it was so in the late 60s in the region occur independent states. They have created an organization aim of this resource to their advantage - OPEC (Organization of Petroleum Exporting Countries. Thus since 1973 there have been changes in the international regime governing oil field, namely producing countries were fixed production rate and price. After this time the oil weapon has become increasingly important in the management of international relations. Oil influenced the great powers to Middle East conflicts that occurred in the last century, but their attitude about the emergence of new sources of oil outside OPEC. In the late 90's, Russia has become a major supplier of oil to the West.

  18. The Effects of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    Glasstone, Samuel

    1964-02-01

    This book is a revision of "The Effects of Nuclear Weapons" which was issued in 1957. It was prepared by the Defense Atomic Support Agency of the Department of Defense in coordination with other cognizant governmental agencies and was published by the U.S. Atomc Energy Commission. Although the complex nature of nuclear weapons effects does not always allow exact evaluation, the conclusions reached herein represent the combined judgment of a number of the most competent scientists working the problem. There is a need for widespread public understanding of the best information available on the effects of nuclear weapons. The purpose of this book is to present as accurately as possible, within the limits of national security, a comprehensive summary of this information.

  19. The Effects of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    Glasstone, Samuel

    1957-06-01

    This handbook prepared by the Armed Forces Special Weapons Project of the Department of Defense in coordination with other cognizant government agencies and published by the United States Atomic Energy Commission, is a comprehensive summary of current knowledge on the effects of nuclear weapons. The effects information contained herein is calculated for yields up to 20 megatons and the scaling laws for hypothetically extending the calculations beyond this limit are given. The figure of 20 megatons however is not be taken as an indication of capabilities or developments.

  20. 32 CFR 1903.10 - Weapons.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Weapons. 1903.10 Section 1903.10 National... INSTALLATIONS § 1903.10 Weapons. (a) Except as provided in paragraph (c) of this section, knowingly possessing or causing to be present a weapon on an Agency installation, or attempting to do so is prohibited....

  1. 48 CFR 25.301-3 - Weapons.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Weapons. 25.301-3 Section... FOREIGN ACQUISITION Contracts Performed Outside the United States 25.301-3 Weapons. The contracting officer shall follow agency procedures and the weapons policy established by the combatant commander...

  2. Handheld Concealed Weapons Detector Development

    Science.gov (United States)

    2003-03-01

    Enforcement, Edward M. Carapezza, Donald Spector, Eds., Proc. SPIE 2938, 110 - 119 (1997). 3. Franklin Felber, Norbert Wild, Scott Nunan , Dennis Breuner... Nunan , D. Breuner, and F. Doft, "Handheld Ultrasound Concealed-Weapons Detector," in Enforcement and Security Technologies, A. Trent DePersia, J. J

  3. [Modern pneumatic weapons and injuries they cause].

    Science.gov (United States)

    Kozachenko, I N

    2013-01-01

    The data on the history of development and further improvement of pneumatic weapons are presented with special reference to specific features of different types and varieties of these weapons, cartridges for them, and the sphere of their application. Investigations into peculiarities of damages caused by high-capacity pneumatic weapons to the objects of forensic medical expertise affected from different distances are reviewed. Results of forensic medical expertise and clinical studies on the structure of body injuries inflicted by gunshots from pneumatic weapons to the human body are discussed. The author emphasizes the necessity of developing up-to-date terminology and classification of gunshot injuries caused by shooting from pneumatic weapons.

  4. Why Sexually Selected Weapons Are Not Ornaments.

    Science.gov (United States)

    McCullough, Erin L; Miller, Christine W; Emlen, Douglas J

    2016-10-01

    The elaboration and diversification of sexually selected weapons remain poorly understood. We argue that progress in this topic has been hindered by a strong bias in sexual selection research, and a tendency for weapons to be conflated with ornaments used in mate choice. Here, we outline how male-male competition and female choice are distinct mechanisms of sexual selection, and why weapons and ornaments are fundamentally different types of traits. We call for research on the factors contributing to weapon divergence, the potential for male-male competition to drive speciation, and the specific use of weapons in the context of direct fights versus displays. Given that weapons are first and foremost fighting structures, biomechanical approaches are an especially promising direction for understanding weapon design.

  5. History of Laser Weapon Research

    Science.gov (United States)

    2012-01-01

    surgery/medicine, hair re- moval, presentation pointers, law enforcement, ranging and sighting devices, welding applications, and much more. Using...other laser technology develop- ments. The first chemical laser, hydrogen fluoride ( HF ), was built in 1965, producing 1 kW. It was then that DoD became...energy laser (HEL) weapons. In industry, the more powerful CO2 lasers are used for weld - ing, drilling, and cutting. There are many different types

  6. Automatic Reading

    Institute of Scientific and Technical Information of China (English)

    胡迪

    2007-01-01

    <正>Reading is the key to school success and,like any skill,it takes practice.A child learns to walk by practising until he no longer has to think about how to put one foot in front of the other.The great athlete practises until he can play quickly,accurately and without thinking.Ed- ucators call it automaticity.

  7. Optimization of Aimpoints for Coordinate Seeking Weapons

    Science.gov (United States)

    2015-09-01

    process. The program works by first taking in the number of weapons used and arranging them in a fixed uniform spacing on a circle centered on the...MATLAB program is used as the coding tool for the development of this algorithm and the optimization process. The program works by first taking in the...number of weapons used and arranging them in a fixed uniform spacing on a circle centered on the assumed target location. Then, the weapon

  8. A different kind of weapon focus: simulated training with ballistic weapons reduces change blindness

    OpenAIRE

    Taylor, J. Eric T.; Witt, Jessica K.; Pratt, Jay

    2017-01-01

    Attentional allocation is flexibly altered by action-related priorities. Given that tools – and specifically weapons – can affect attentional allocation, we asked whether training with a weapon or holding a weapon during search would affect change detection. In three experiments, participants searched for changes to agents, shootable objects, or environments in the popular flicker paradigm. Participants trained with a simulated weapon or watched a video from the same training perspective and ...

  9. 76 FR 1136 - Electroshock Weapons Test and Measurement Workshop

    Science.gov (United States)

    2011-01-07

    ... National Institute of Standards and Technology Electroshock Weapons Test and Measurement Workshop AGENCY..., academia, military, test instrument manufacturers, etc.) of electroshock weapons that provide stand-off... requirements for electroshock weapons, the Law Enforcement Standards Office (OLES) at NIST has...

  10. Nuclear weapons, nuclear effects, nuclear war

    Energy Technology Data Exchange (ETDEWEB)

    Bing, G.F.

    1991-08-20

    This paper provides a brief and mostly non-technical description of the militarily important features of nuclear weapons, of the physical phenomena associated with individual explosions, and of the expected or possible results of the use of many weapons in a nuclear war. Most emphasis is on the effects of so-called ``strategic exchanges.``

  11. Weapons Acquisition. Processes of Selected Foreign Government.

    Science.gov (United States)

    1986-02-01

    period from 1977 to 1985: (1) 5.56mm calibre assault rifle. (2) Milan and Hot antitank weapon systems. (3) Roland ground-to-air weapon system. (4) AMX 30...and standardization edicts . Awards and penalties are laid on accordingly. (7/17, 13/20) The ministries stand apart from one another in the same way

  12. Color image fusion for concealed weapon detection

    NARCIS (Netherlands)

    Toet, A.

    2003-01-01

    Recent advances in passive and active imaging sensor technology offer the potential to detect weapons that are concealed underneath a person's clothing or carried along in bags. Although the concealed weapons can sometimes easily be detected, it can be difficult to perceive their context, due to the

  13. Overview of surplus weapons plutonium disposition

    Energy Technology Data Exchange (ETDEWEB)

    Rudy, G.

    1996-05-01

    The safe disposition of surplus weapons useable plutonium is a very important and urgent task. While the functions of long term storage and disposition directly relate to the Department`s weapons program and the environmental management program, the focus of this effort is particularly national security and nonproliferation.

  14. Weapon Control System for Airborne Application.

    Directory of Open Access Journals (Sweden)

    M. Sankar Kishore

    2000-07-01

    Full Text Available The integrated fire' control system (IFCS plays an important role in the present-day fighter aircraft and helicopters. Wecapons, such as missiles (active/passive, rockets and guns may be present on thelfighter aircraft or helicopter .IFCS monitors the status of the weapons present on the vehicle and passes the information to pilot/co-pilot. Depending upon the health/availability of the weapons, IFCS selects/fires the weapons. An attempt has been made to bring out the details of one such IFCS. As a I stepping stone, smaller version is developed and same philosophy can be used for integrating ftlore and I more weapons. Here, emphasis has been made on design and development of weapon control unit which is the heart f IFCS, both in hardware and software. The system has been developed using a 486 DX2 processor, and an elaborate software has been developed in PL/M.

  15. Childhood maltreatment and threats with weapons.

    Science.gov (United States)

    Casiano, Hygiea; Mota, Natalie; Afifi, Tracie O; Enns, Murray W; Sareen, Jitender

    2009-11-01

    The relationship between childhood maltreatment and future threats with weapons is unknown. We examined data from the nationally representative National Comorbidity Survey Replication (n = 5692) and conducted multiple logistic regression analyses to determine the association between childhood maltreatment and lifetime behavior of threatening others with a gun or other weapon. After adjusting for sociodemographic variables, physical abuse, sexual abuse, and witnessing domestic violence were significantly associated with threats made with a gun (adjusted odds ratios [AOR] ranging between 3.38 and 4.07) and other weapons (AOR ranging between 2.16 and 2.83). The greater the number of types of maltreatment experienced, the stronger the association with lifetime threats made to others with guns and any weapons. Over 94% of respondents who experienced maltreatment and made threats reported that the maltreatment occurred prior to threatening others with weapons. Prevention efforts that reduce exposure to maltreatment may reduce violent behavior in later life.

  16. Concealed weapons detection using electromagnetic resonances

    Science.gov (United States)

    Hunt, Allen R.; Hogg, R. Douglas; Foreman, William

    1998-12-01

    Concealed weapons pose a significant threat to both law enforcement and security agency personnel. The uncontrolled environments associated with peacekeeping and the move toward relaxation of concealed weapons laws here in the U.S. provide a strong motivation for developing weapons detection technologies which are noninvasive and can function noncooperatively. Existing weapons detection systems are primarily oriented to detecting metal and require the cooperation of the person being searched. The new generation of detectors under development that focuses primarily on imaging methods, faces problems associated with privacy issues. There remains a need for a weapons detector which is portable, detects weapons remotely, avoids the issues associated with privacy rights, can tell the difference between car keys and a knife, and is affordable enough that one can be issued to every peacekeeper and law enforcement officer. AKELA is developing a concealed weapons detector that uses wideband radar techniques to excite natural electromagnetic resonances that characterize the size, shape, and material composition of an object. Neural network processing is used to classify the difference between weapons and nuisance objects. We have constructed both time and frequency domain test systems and used them to gather experimental data on a variety of armed and unarmed individuals. These experiments have been performed in an environment similar to the operational environment. Preliminary results from these experiments show that it is possible to detect a weapon being carried by an individual from a distance of 10 to 15 feet, and to detect a weapon being concealed behind the back. The power required is about 100 milliwatts. A breadboard system is being fabricated and will be used by AKELA and our law enforcement partner to gather data in operationally realistic situations. While a laptop computer will control the breadboard system, the wideband radar electronics will fit in a box the

  17. Weapons barrel life cycle determination

    Directory of Open Access Journals (Sweden)

    Nebojša Pene Hristov

    2013-10-01

    Full Text Available This article describes the dynamic processes within the gun barrel during the firing process in exploitation. It generally defines the basic principles of constructing tube elements, and shows the distortion of the basic geometry of the tube interior due to wear as well as the impact it causes during exploitation. The article also defines basic empirical models as well as a model based on fracture mechanics for the calculation of a use-life of the barrel, and other elements essential for the safe use of the barrel as the basic weapon element. Erosion causes are analysed in order to control and reduce wear and prolong the lifetime of the gun barrel. It gives directions for the reparation of barrels with wasted resources. In conclusion, the most influential elements of tube wear are given as well as possible modifications of existing systems, primarily propellant charges, with a purpose of prolonging lifetime of gun barrels. The guidelines for a proper determination of the lifetime based on the barrel condition assessment are given as well. INTRODUCTION The barrel as the basic element of each weapon is described as well as the processes occurring during the firing that have impulsive character and are accompanied by large amounts of energy. The basic elements of barrel and itheir constructive characteristics are descibed. The relation between Internal ballistics, ie calculation of the propellant gas pressure in the firing process, and structural elements defined by the barrel material resistance is shown. In general, this part of the study explains the methodology of the gun barrel structural elements calculation, ie. barrel geometry, taking into account the degrees of safety in accordance with Military Standards.   TUBE WEAR AND DEFORMATIONS The weapon barrel gradually wears out during exploitation due to which it no longer satisfies the set requirements. It is considered that the barrel has experienced a lifetime when it fails to fulfill the

  18. Air guns: toys or weapons?

    Science.gov (United States)

    Aslan, Sahin; Uzkeser, Mustafa; Katirci, Yavuz; Cakir, Zeynep; Bilir, Ozlem; Bilge, Fatih; Cakir, Murtaza

    2006-09-01

    Air guns and blank guns may appear relatively harmless at first glance, but they are, in fact, potentially destructive, even lethal, weapons. Approximately 2 to 2.5 million nonpowder firearms are sold annually, and again approximately 12.9 per 100,000 population are treated for such injuries in hospital emergency departments each year in the United States. Unfortunately, these guns are considered to be a toy for children. Therefore, incidents of air gun injuries are gradually increasing. Although such injuries may initially be considered trivial, it may signify severe internal tissue pathologies. These apparently trivial injuries may have catastrophic consequences if unnoticed. In this study, we report 4 cases with head injury due to a shot by these guns. The cases indicate that these people had used the guns belonging to their parents for the purpose of suicide. The cases also show that these machines are not innocent.

  19. Electronic eyebox for weapon sights

    Science.gov (United States)

    Szapiel, Stan; Greenhalgh, Catherine; Wagner, Kevin; Nobes, Ryan

    2016-05-01

    We expand the effective size of the eyebox of a magnified telescopic weapon sight by following the movements of the operator's eye to create a larger, `electronic eyebox'. The original eyebox of the telescope is dynamically relocated in space so that proper overlap between the pupil of the eye and the exit pupil of the device is maintained. Therefore, the operator will perceive the entire field of view of the instrument in a much bigger spatial region than the one defined by the original eyebox. Proof-of-the-concept results are presented with a more than 3.5X enlargement of the eyebox volume along with recommendations for the next phase of development.

  20. Taser and Conducted Energy Weapons.

    Science.gov (United States)

    LeClair, Thomas G; Meriano, Tony

    2015-01-01

    It is clear that CEWs are an increasingly prevalent law enforcement tool, adopted to address a complex and challenging problem. The potential for serious injury from a single deployment of a CEW is extremely low. The debate regarding the link between these electrical weapons and sudden in-custody death is likely to continue because their use is often in complex and volatile situations. Any consideration of injuries has to be put into that context. One must also consider what injuries to a subject would result if an alternative force method was used. Furthermore, the potential benefits of CEWs, including reduction in injuries to the public and law-enforcement officers, need to be considered.

  1. Toward a nuclear weapons free world?

    Energy Technology Data Exchange (ETDEWEB)

    Maaranen, S.A. [Los Alamos National Lab., NM (United States). Center for International Security Affairs

    1996-09-01

    Doubts about the wisdom of relying on nuclear weapons are as old as nuclear weapons themselves. But despite this questioning, nuclear weapons came to be seen as the indispensable element of American (indeed Western) security during the Cold War. By the 1970s and 1980s, however, discontent was growing about the intense US-Soviet nuclear arms competition, as it failed to provide any enduring improvement in security; rather, it was seen as creating ever greater risks and dangers. Arms control negotiations and limitations, adopted as a means to regulate the technical competition, may also have relieved some of the political pressures and dangers. But the balance of terror, and the fears of it, continued. The Strategic Defense Initiative (SDI) under President Reagan was a very different approach to escaping from the precarious protection of nuclear weapons, in that it sought a way to continue to defend the US and the West, but without the catastrophic risks of mutual deterrence. As such, SDI connoted unhappiness with the precarious nuclear balance and, for many, with nuclear weapons in general. The disappearance of the Warsaw Pact, the disintegration of the Soviet Union, and the sudden end of the Cold War seemed to offer a unique opportunity to fashion a new, more peaceful world order that might allow for fading away of nuclear weapons. Scholars have foreseen two different paths to a nuclear free world. The first is a fundamental improvement in the relationships between states such that nuclear weapons are no longer needed. The second path is through technological development, e.g., missile defenses which could provide effective protection against nuclear attacks. The paper discusses nuclear weapon policy in the US, views of other nuclear states, the future of nuclear weapons, and issues in a less-nuclear world.

  2. Weapon container catalog. Volumes 1 & 2

    Energy Technology Data Exchange (ETDEWEB)

    Brown, L.A.; Higuera, M.C.

    1998-02-01

    The Weapon Container Catalog describes H-gear (shipping and storage containers, bomb hand trucks and the ancillary equipment required for loading) used for weapon programs and for special use containers. When completed, the catalog will contain five volumes. Volume 1 for enduring stockpile programs (B53, B61, B83, W62, W76, W78, W80, W84, W87, and W88) and Volume 2, Special Use Containers, are being released. The catalog is intended as a source of information for weapon program engineers and also provides historical information. The catalog also will be published on the SNL Internal Web and will undergo periodic updates.

  3. [New challenges in the biological weapons convention].

    Science.gov (United States)

    Sissonen, Susanna; Raijas, Tiina; Haikala, Olli; Hietala, Heikki; Virri, Markku; Nikkari, Simo

    2012-01-01

    Microbes and their toxins are biological weapons that can cause disease in humans, animals or plants, and which can be used with hostile intent in warfare and terrorism. Biological agents can be used as weapons of mass destruction and therefore, immense human and social and major economical damage can be caused. Rapid development of life sciences and technologies during the recent decades has posed new challenges to the Biological Weapons Convention. The Convention states that the States Parties to the BWC strive to ensure that the Convention remains relevant and effective, despite changes in science, technology or politics.

  4. 43 CFR 15.11 - Explosives and dangerous weapons.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Explosives and dangerous weapons. 15.11... § 15.11 Explosives and dangerous weapons. No person shall carry, use or possess within the Preserve... other kind of weapon potentially harmful to the reef structure. The use of such weapons from beyond...

  5. 36 CFR 2.4 - Weapons, traps and nets.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 1 2010-07-01 2010-07-01 false Weapons, traps and nets. 2.4... PROTECTION, PUBLIC USE AND RECREATION § 2.4 Weapons, traps and nets. (a)(1) Except as otherwise provided in... prohibited: (i) Possessing a weapon, trap or net (ii) Carrying a weapon, trap or net (iii) Using a...

  6. 36 CFR 1002.4 - Weapons, traps and nets.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Weapons, traps and nets. 1002... AND RECREATION § 1002.4 Weapons, traps and nets. (a)(1) Except as otherwise provided in this section, the following are prohibited: (i) Possessing a weapon, trap or net. (ii) Carrying a weapon, trap...

  7. Weapons dismantlement issues in independent Ukraine

    Energy Technology Data Exchange (ETDEWEB)

    Zack, N.R. [Los Alamos National Lab., NM (United States); Kirk, E.J. [American Association for the Advancement of Science, Washington, DC (United States)

    1994-07-01

    The American Association for the Advancement of Science sponsored a seminar during September 1993, in Kiev, Ukraine, entitled ``Toward a Nuclear Free Future -- Barriers and Problems.`` It brought together Ukrainians, Belarusians, and Americans to discuss the legal, political, safeguards and security, economic, and technical dimensions of nuclear weapons dismantlement and destruction. US representatives initiated discussions on legal and treaty requirements and constraints, safeguards and security issues surrounding dismantlement, storage and disposition of nuclear materials, warhead transportation, and economic considerations. Ukrainians gave presentations on arguments for and against the Ukraine keeping nuclear weapons, Ukrainian Parliament non-approval of START I, alternative strategies for dismantling silos and launchers, and economic and security implications of nuclear weapons removal from the Ukraine. Participants from Belarus discussed proliferation and control regime issues, This paper will highlight and detail the issues, concerns, and possible impacts of the Ukraine`s dismantlement of its nuclear weapons.

  8. Controlling Weapons-Grade Fissile Material

    Science.gov (United States)

    Rotblat, J.

    1977-01-01

    Discusses the problems of controlling weapons-grade fissionable material. Projections of the growth of fission nuclear reactors indicates sufficient materials will be available to construct 300,000 atomic bombs each containing 10 kilograms of plutonium by 1990. (SL)

  9. Computational Challenges in Nuclear Weapons Simulation

    Energy Technology Data Exchange (ETDEWEB)

    McMillain, C F; Adams, T F; McCoy, M G; Christensen, R B; Pudliner, B S; Zika, M R; Brantley, P S; Vetter, J S; May, J M

    2003-08-29

    After a decade of experience, the Stockpile Stewardship Program continues to ensure the safety, security and reliability of the nation's nuclear weapons. The Advanced Simulation and Computing (ASCI) program was established to provide leading edge, high-end simulation capabilities needed to meet the program's assessment and certification requirements. The great challenge of this program lies in developing the tools and resources necessary for the complex, highly coupled, multi-physics calculations required to simulate nuclear weapons. This paper describes the hardware and software environment we have applied to fulfill our nuclear weapons responsibilities. It also presents the characteristics of our algorithms and codes, especially as they relate to supercomputing resource capabilities and requirements. It then addresses impediments to the development and application of nuclear weapon simulation software and hardware and concludes with a summary of observations and recommendations on an approach for working with industry and government agencies to address these impediments.

  10. 76 FR 6087 - Draft Weapons Safety Assessment on the Use of Enhanced Weapons; Notice of Availability and...

    Science.gov (United States)

    2011-02-03

    ... COMMISSION 10 CFR Part 73 RIN 3150-AI49 Draft Weapons Safety Assessment on the Use of Enhanced Weapons... guidance document entitled ``Weapons Safety Assessment'' (WSA). This guidance would be used by licensees and certificate holders applying to the NRC to obtain enhanced weapons under the NRC's proposed...

  11. Overall view of chemical and biochemical weapons.

    Science.gov (United States)

    Pitschmann, Vladimír

    2014-06-04

    This article describes a brief history of chemical warfare, which culminated in the signing of the Chemical Weapons Convention. It describes the current level of chemical weapons and the risk of using them. Furthermore, some traditional technology for the development of chemical weapons, such as increasing toxicity, methods of overcoming chemical protection, research on natural toxins or the introduction of binary technology, has been described. In accordance with many parameters, chemical weapons based on traditional technologies have achieved the limit of their development. There is, however, a big potential of their further development based on the most recent knowledge of modern scientific and technical disciplines, particularly at the boundary of chemistry and biology. The risk is even higher due to the fact that already, today, there is a general acceptance of the development of non-lethal chemical weapons at a technologically higher level. In the future, the chemical arsenal will be based on the accumulation of important information from the fields of chemical, biological and toxin weapons. Data banks obtained in this way will be hardly accessible and the risk of their materialization will persist.

  12. Overall View of Chemical and Biochemical Weapons

    Directory of Open Access Journals (Sweden)

    Vladimír Pitschmann

    2014-06-01

    Full Text Available This article describes a brief history of chemical warfare, which culminated in the signing of the Chemical Weapons Convention. It describes the current level of chemical weapons and the risk of using them. Furthermore, some traditional technology for the development of chemical weapons, such as increasing toxicity, methods of overcoming chemical protection, research on natural toxins or the introduction of binary technology, has been described. In accordance with many parameters, chemical weapons based on traditional technologies have achieved the limit of their development. There is, however, a big potential of their further development based on the most recent knowledge of modern scientific and technical disciplines, particularly at the boundary of chemistry and biology. The risk is even higher due to the fact that already, today, there is a general acceptance of the development of non-lethal chemical weapons at a technologically higher level. In the future, the chemical arsenal will be based on the accumulation of important information from the fields of chemical, biological and toxin weapons. Data banks obtained in this way will be hardly accessible and the risk of their materialization will persist.

  13. ENVIRONMENTAL CONTAMINATION FROM WEAPON TESTS

    Energy Technology Data Exchange (ETDEWEB)

    none

    1958-10-01

    The program of the Atomic Energy Commission on environmental contamination from weapons tests is designed for the overall evaluation of the hazard to humans from test operations. It is limited to studies of the deposition of activity at long range rather than the problems associated with immediate, close-in fallout. The program has largely been a study of Sr{sup 90}, since considerations based on experience and measurement indicate that it is the isotope of greatest potential hazard. Data are presented pertinent to the monitoring of long-range fallout, particularly Sr{sup 90} and Cs{sup 137}. Values are tabulated for the fallout deposition, air concentrations, water concentrations, and the amounts in foods and human bone. In addition, results are given for some experimental investigations. The report of these results is not interpretative although certain papers that do attempt to interpret the present situation with respect to Sr{sup 90} in particular are reprinted. Bibliographies are presented covering the period since the 1957 hearings before the Joint Committee on Atomic Energy concerning the nature of radioactive fallout and its effects on man. A document list of submissions to the United Nations Scientific Committee on the Effects of Atomic Radiation is given to illustrate the work done in other countries. Several papers on the subject, which have not been generally available, are reprinted.

  14. MODERN WEAPONS AND MILITARY EQUIPMENT FOR ISSUE NO. 3-2015

    OpenAIRE

    2015-01-01

    Optimal features for concealed carry weapons. The specificity of jobs and tasks that require concealed carrying of weapons by officials require specific criteria when choosing personal weapons specialist.

  15. Color image fusion for concealed weapon detection

    Science.gov (United States)

    Toet, Alexander

    2003-09-01

    Recent advances in passive and active imaging sensor technology offer the potential to detect weapons that are concealed underneath a person's clothing or carried along in bags. Although the concealed weapons can sometimes easily be detected, it can be difficult to perceive their context, due to the non-literal nature of these images. Especially for dynamic crowd surveillance purposes it may be impossible to rapidly asses with certainty which individual in the crowd is the one carrying the observed weapon. Sensor fusion is an enabling technology that may be used to solve this problem. Through fusion the signal of the sensor that depicts the weapon can be displayed in the context provided by a sensor of a different modality. We propose an image fusion scheme in which non-literal imagery can be fused with standard color images such that the result clearly displays the observed weapons in the context of the original color image. The procedure is such that the relevant contrast details from the non-literal image are transferred to the color image without altering the original color distribution of this image. The result is a natural looking color image that fluently combines all details from both input sources. When an observer who performs a dynamic crowd surveillance task, detects a weapon in the scene, he will also be able to quickly determine which person in the crowd is actually carrying the observed weapon (e.g. "the man with the red T-shirt and blue jeans"). The method is illustrated by the fusion of thermal 8-12 μm imagery with standard RGB color images.

  16. Review of Radioisotopes as Radiological Weapons

    Science.gov (United States)

    2016-06-01

    radiation for the pur- pose of weapons use I-131 8.04 d 4590 β and  0.2 43573E-05 Nuclear fusion prod- uct/medical Solid/salt Cs-137 30.17 y 3.22 β...Requirements Office (JRO) for Chemical, Biological, Radiological and Nuclear (CBRN) Defense (J-8/JRO) and the US Army Office of The Surgeon General...D)], radiation dispersal devices (RDD), and improvised nuclear devices (IND), as well as conventional nuclear weapons.”1 To accomplish this task

  17. Task Analyses of Three Selected Weapons Systems.

    Science.gov (United States)

    1976-10-01

    using weapons is a joint function of the specific weapon system, the goals (missions) of the system, and the environment in which it is used. The first...Identification of fire mission profiles which state general job functions for each type of typical mission. Documentary sources such as Field Manuals...nd Arin,,, Ui, Guni i A,!i" tant uuPnrr No. I Can; n , r Grup - ( nile. .rs and Prir Diff,-ront S, tm: -inch L,,t.’r _, Fort Hood l::t Cavall, I

  18. Implementing the chemical weapons convention

    Energy Technology Data Exchange (ETDEWEB)

    Kellman, B.; Tanzman, E. A.

    1999-12-07

    In 1993, as the CWC ratification process was beginning, concerns arose that the complexity of integrating the CWC with national law could cause each nation to implement the Convention without regard to what other nations were doing, thereby causing inconsistencies among States as to how the CWC would be carried out. As a result, the author's colleagues and the author prepared the Manual for National Implementation of the Chemical Weapons Convention and presented it to each national delegation at the December 1993 meeting of the Preparatory Commission in The Hague. During its preparation, the Committee of CWC Legal Experts, a group of distinguished international jurists, law professors, legally-trained diplomats, government officials, and Parliamentarians from every region of the world, including Central Europe, reviewed the Manual. In February 1998, they finished the second edition of the Manual in order to update it in light of developments since the CWC entered into force on 29 April 1997. The Manual tries to increase understanding of the Convention by identifying its obligations and suggesting methods of meeting them. Education about CWC obligations and available alternatives to comply with these requirements can facilitate national response that are consistent among States Parties. Thus, the Manual offers options that can strengthen international realization of the Convention's goals if States Parties act compatibly in implementing them. Equally important, it is intended to build confidence that the legal issues raised by the Convention are finite and addressable. They are now nearing competition of an internet version of this document so that interested persons can access it electronically and can view the full text of all of the national implementing legislation it cites. The internet address, or URL, for the internet version of the Manual is http: //www.cwc.ard.gov. This paper draws from the Manual. It comparatively addresses approximately thirty

  19. Agent-based Modeling Methodology for Analyzing Weapons Systems

    Science.gov (United States)

    2015-03-26

    43 Figure 14: Simulation Study Methodology for the Weapon System Analysis Metrics Definition and Data Collection The analysis plan calls for...AGENT-BASED MODELING METHODOLOGY FOR ANALYZING WEAPONS SYSTEMS THESIS Casey D. Connors, Major, USA...AGENT-BASED MODELING METHODOLOGY FOR ANALYZING WEAPONS SYSTEMS THESIS Presented to the Faculty Department of Operational Sciences

  20. 7 CFR 501.12 - Weapons and explosives.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Weapons and explosives. 501.12 Section 501.12... OF AGRICULTURE CONDUCT ON U.S. MEAT ANIMAL RESEARCH CENTER, CLAY CENTER, NEBRASKA § 501.12 Weapons... arrows, darts, other dangerous or deadly weapons, or explosives, either openly or concealed, except...

  1. 32 CFR 552.125 - Disposition of confiscated weapons.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Disposition of confiscated weapons. 552.125..., Ammunition, and Explosives-Fort Lewis, Washington § 552.125 Disposition of confiscated weapons. Commanders will maintain confiscated weapons in the unit arms room pending final disposition. They will...

  2. 44 CFR 15.15 - Weapons and explosives.

    Science.gov (United States)

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Weapons and explosives. 15.15... EMERGENCY TRAINING CENTER § 15.15 Weapons and explosives. No person entering or while at Mt. Weather or the NETC will carry or possess firearms, other dangerous or deadly weapons, explosives or items intended...

  3. 15 CFR 265.39 - Weapons and explosives.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Weapons and explosives. 265.39 Section..., GAITHERSBURG, MARYLAND, AND BOULDER AND FORT COLLINS, COLORADO Buildings and Grounds § 265.39 Weapons and... dangerous or deadly weapons or materials, or explosives, either openly or concealed, without the...

  4. 36 CFR 504.14 - Weapons and explosives.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Weapons and explosives. 504... GOVERNING SMITHSONIAN INSTITUTION BUILDINGS AND GROUNDS § 504.14 Weapons and explosives. No person while on the premises shall carry firearms, other dangerous or deadly weapons, or explosives, either openly...

  5. 36 CFR 13.30 - Weapons, traps and nets.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 1 2010-07-01 2010-07-01 false Weapons, traps and nets. 13... INTERIOR NATIONAL PARK SYSTEM UNITS IN ALASKA General Provisions § 13.30 Weapons, traps and nets. (a... of this chapter, the following are prohibited— (1) Possessing a weapon, trap, or net; (2) Carrying...

  6. 31 CFR 407.13 - Weapons and explosives.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Weapons and explosives. 407.13... TREASURY ANNEX § 407.13 Weapons and explosives. No person while on the property shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except for official purposes....

  7. 46 CFR 386.23 - Weapons and explosives.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 8 2010-10-01 2010-10-01 false Weapons and explosives. 386.23 Section 386.23 Shipping... AND GROUNDS AT THE UNITED STATES MERCHANT MARINE ACADEMY § 386.23 Weapons and explosives. No person shall carry or possess firearms, other dangerous or deadly weapons or parts thereof, explosives or...

  8. 32 CFR 228.7 - Prohibition on weapons and explosives.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Prohibition on weapons and explosives. 228.7... (CONTINUED) MISCELLANEOUS SECURITY PROTECTIVE FORCE § 228.7 Prohibition on weapons and explosives. No persons... illegal or legally controlled weapon (e.g., throwing stars, switchblades), explosives, or items...

  9. 36 CFR 702.7 - Weapons and explosives.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Weapons and explosives. 702.7... Weapons and explosives. Except where duly authorized by law, and in the performance of law enforcement functions, no person shall carry firearms, other dangerous or deadly weapons, or explosives, either...

  10. 31 CFR 700.11 - Weapons and explosives.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Weapons and explosives. 700.11... FEDERAL LAW ENFORCEMENT TRAINING CENTER (FLETC) BUILDINGS AND GROUNDS § 700.11 Weapons and explosives. No person, while on the property, shall carry firearms, other dangerous or deadly weapons, or...

  11. 7 CFR 500.12 - Weapons and explosives.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Weapons and explosives. 500.12 Section 500.12... OF AGRICULTURE NATIONAL ARBORETUM Conduct on U.S. National Arboreturm Property § 500.12 Weapons and... weapons, or explosives, either openly or concealed, except for authorized official purposes. (b) No...

  12. 7 CFR 502.13 - Weapons and explosives.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Weapons and explosives. 502.13 Section 502.13....13 Weapons and explosives. No person while in or on BARC property shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except as officially authorized...

  13. 43 CFR 423.30 - Weapons, firearms, explosives, and fireworks.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Weapons, firearms, explosives, and... WATERBODIES Rules of Conduct § 423.30 Weapons, firearms, explosives, and fireworks. (a) You may possess... exceptions: (1) You must not have a weapon in your possession when at or in a Reclamation facility. (2)...

  14. 4 CFR 25.14 - Weapons and explosives.

    Science.gov (United States)

    2010-01-01

    ... 4 Accounts 1 2010-01-01 2010-01-01 false Weapons and explosives. 25.14 Section 25.14 Accounts... AND ON ITS GROUNDS § 25.14 Weapons and explosives. No person while entering or in the GAO Building or on its grounds shall carry or possess firearms, other dangerous or deadly weapons, explosives...

  15. 49 CFR 1544.219 - Carriage of accessible weapons.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Carriage of accessible weapons. 1544.219 Section...: AIR CARRIERS AND COMMERCIAL OPERATORS Operations § 1544.219 Carriage of accessible weapons. (a... weapons, do not apply to a law enforcement officer (LEO) aboard a flight for which screening is...

  16. 36 CFR 520.15 - Weapons and explosives.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Weapons and explosives. 520... Weapons and explosives. No person while on the premises shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except for official purposes, nor shall any...

  17. 31 CFR 91.13 - Weapons and explosives.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Weapons and explosives. 91.13 Section... CONDUCT IN OR ON THE BUREAU OF THE MINT BUILDINGS AND GROUNDS § 91.13 Weapons and explosives. No person while on the property shall carry firearms, other dangerous or deadly weapons, or explosives,...

  18. 50 CFR 27.43 - Weapons other than firearms.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 6 2010-10-01 2010-10-01 false Weapons other than firearms. 27.43 Section... (CONTINUED) THE NATIONAL WILDLIFE REFUGE SYSTEM PROHIBITED ACTS Disturbing Violations: With Weapons § 27.43 Weapons other than firearms. The use or possession of cross bows, bows and arrows, air guns, spears,...

  19. 7 CFR 503.13 - Weapons and explosives.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Weapons and explosives. 503.13 Section 503.13... OF AGRICULTURE CONDUCT ON PLUM ISLAND ANIMAL DISEASE CENTER § 503.13 Weapons and explosives. No person while in or on the PIADC shall carry firearms or other dangerous or deadly weapons or...

  20. Demand Analysis of Informational Shipboard Gun Weapon System Interface Design

    Directory of Open Access Journals (Sweden)

    WANG Hui-chuan

    2013-04-01

    Full Text Available According to development demand of informational shipboard gun weapon system, design concept of shipboard gun weapon system interface is proposed. System composition is put forward and function demand of interface is analyzed from combat, training and detection aspects. General principle need to be followed in design process. A new concept is provided for development of shipboard gun weapon system interface.

  1. 10 CFR Appendix H to Part 73 - Weapons Qualification Criteria

    Science.gov (United States)

    2010-01-01

    ... position, then fire 2 rounds and reholster 2 15 yards 2 5 seconds Standing, draw weapon, move to kneeling...) Standing, draw weapon, fire 2 rounds, move to kneeling position and fire 2 rounds, reload and reholster Minimum qualifying = 70%. 4 15 yards 2 5 seconds Draw weapon and fire 2 rounds standing, come to low...

  2. The Drivers of Indias Nuclear Weapons Program

    Science.gov (United States)

    2014-06-01

    Sane Individual’ Would Use Nuclear Weapons Indian Defence Mini,” Financial Times, June 3, 2002. 197 Sanjeev Miglani and John Chalmers , “BJP Puts... Chalmers . “BJP Puts ‘No First Use’ Nuclear Policy in Doubt.” Reuters. April 7, 2014. http://in.reuters.com/article/2014/04/07/india- election-bjp

  3. The Politics of Weapons Standardization in NATO.

    Science.gov (United States)

    1981-07-01

    does raise new and useful perspectives on the problem. And, as he notes, it raises the spectre that instead of attacking the causes of NATO’s malaise...construct- ing his Utopia . 1 58 Two articles, which focus on the weapons procurement process within the United States alone, note the unnecessary

  4. Europium-155 in Debris from Nuclear Weapons

    DEFF Research Database (Denmark)

    Aarkrog, Asker; Lippert, Jørgen Emil

    1967-01-01

    The lithium-drifted germanium detector enables determination of europium-155 on a routine basis in environmental samples contaminated with debris from nuclear weapons. From measurements of europium-155, cesium-144, and strontium-90 in air filters collected between 1961 and 1966, the yield...

  5. Tactical Nuclear Weapons: Their Purpose and Placement

    Science.gov (United States)

    2015-06-01

    still perceived the potential spread of these clashes as a threat to its security. Volatility was expected to come from ethnic, religious, cultural...nuclear weapons in this new global environment. NATO’s 1999 and 2010 strategic concepts describe a change in concern from the spillover threats of the

  6. Nuclear Weapon Testing Limitations and International Security

    Science.gov (United States)

    Corden, Pierce S.

    2017-01-01

    For over 50 years stopping nuclear weapon tests has been sought to support achieving international security without nuclear weapons. Testing is the critical path beyond primitive fission devices, e.g. to develop thermonuclear weapons, reduce weight and volume and increase yield. The 1958 Geneva Conference of Experts considered ways to verify a test ban. With then-limitations on seismology, and lack of in-country monitoring and on-site inspections, the 1963 Limited Test Ban Treaty prohibits testing only in the atmosphere, outer space and under water, and is verified by National Technical Means. The US and USSR agreed to a limit of 150 kilotons on underground explosions in the 1970s-80s. The 1996 Comprehensive Nuclear-Test-Ban Treaty bans all nuclear explosions. Its International Monitoring System - seismic, hydroacoustic, infrasound and radionuclide sensors - is being used, and has easily detected testing by the DPRK. On-site inspections will be available under an in-force Treaty. A 2012 National Academy report concludes that cheating attempts would not undermine U.S. security, and the program for monitoring and extending the life of US weapons has succeeded since US testing ceased in 1992.

  7. Managing nuclear weapons in the United States

    Energy Technology Data Exchange (ETDEWEB)

    Miller, G.

    1993-03-16

    This report discusses the management and security of nuclear weapons in the post-cold war United States. The definition of what constitutes security is clearly changing in the US. It is now a much more integrated view that includes defense and the economy. The author tries to bring some semblance of order to these themes in this brief adaptation of a presentation.

  8. The Spear: An Effective Weapon Since Antiquity

    Directory of Open Access Journals (Sweden)

    Robert E. Dohrenwend

    2012-07-01

    Full Text Available The spear is perhaps man’s oldest weapon, and may even be his oldest tool. Over the hundreds of thousands of years of the weapon’s existence, it evolved from a pointed stick into an efficient hunting missile, and then became the most effective hand-held bladed weapon humans ever devised. The spear and its use is the only martial art originally devised for use against species other than our own, and more than any other weapon, the spear emphasizes the relationship between hunting and warfare. Virtually without exception, the spear is present wherever there are humans. The spear may claim to be the senior martial art, and the weapon is still in use today. Early techniques are preserved by the small number of Japanese sojutsu schools, and modern Chinese martial artists have developed elegant and impressive gymnastic routines for the spear. The javelin throw is a modern Olympic track and field event, and there are people who have resurrected the Aztec atlatl for sporting competition. Today, the spear is still used in Europe for hunting wild boar, and the continued issue of the obsolete bayonet to modern soldiers testifies to a deep, almost instinctive respect still possessed by the military for the spear.

  9. Air gun wounding and current UK laws controlling air weapons.

    Science.gov (United States)

    Bruce-Chwatt, Robert Michael

    2010-04-01

    Air weapons whether rifles or pistols are, potentially, lethal weapons. The UK legislation is complex and yet little known to the public. Hunting with air weapons and the laws controlling those animals that are permitted to be shot with air weapons is even more labyrinthine due to the legal power limitations on the possession of air weapons. Still relatively freely available by mail order or on the Internet, an increasing number of deaths have been reported from the misuse of air weapons or accidental discharges. Ammunition for air weapons has become increasingly sophisticated, effective and therefore increasingly dangerous if misused, though freely available being a mere projectile without a concomitant cartridge containing a propellant and an initiator.

  10. Automatic Fiscal Stabilizers

    Directory of Open Access Journals (Sweden)

    Narcis Eduard Mitu

    2013-11-01

    Full Text Available Policies or institutions (built into an economic system that automatically tend to dampen economic cycle fluctuations in income, employment, etc., without direct government intervention. For example, in boom times, progressive income tax automatically reduces money supply as incomes and spendings rise. Similarly, in recessionary times, payment of unemployment benefits injects more money in the system and stimulates demand. Also called automatic stabilizers or built-in stabilizers.

  11. Automatic differentiation bibliography

    Energy Technology Data Exchange (ETDEWEB)

    Corliss, G.F. (comp.)

    1992-07-01

    This is a bibliography of work related to automatic differentiation. Automatic differentiation is a technique for the fast, accurate propagation of derivative values using the chain rule. It is neither symbolic nor numeric. Automatic differentiation is a fundamental tool for scientific computation, with applications in optimization, nonlinear equations, nonlinear least squares approximation, stiff ordinary differential equation, partial differential equations, continuation methods, and sensitivity analysis. This report is an updated version of the bibliography which originally appeared in Automatic Differentiation of Algorithms: Theory, Implementation, and Application.

  12. #TheWeaponizationOfSocialMedia

    DEFF Research Database (Denmark)

    Nissen, Thomas Elkjer

    In today’s conflict environment, transformed by information technology and of who can communicate and how, states, non-state actors, ad hoc activist networks and individuals create effect(s) in and through social network media in support of their objectives. #TheWeaponizationOfSocialMedia develops...... a framework for understanding how social network media shapes global politics and contemporary conflicts by examining their role as a platform for conduction intelligence collection, targeting, cyber-operations, psychological warfare and command and control activities. Through these, the weaponization...... of social media shows both the possibilities and the limitations of social network media in contemporary conflicts and makes a contribution to theorizing and studying contemporary conflicts....

  13. Making Weapons for the Terracotta Army

    Directory of Open Access Journals (Sweden)

    Marcos Martinón-Torres

    2011-10-01

    Full Text Available The Terracotta Army of the First Emperor of China is one of the most emblematic archaeological sites in the world. Many questions remain about the logistics of technology, standardisation and labour organisation behind the creation of such a colossal construction in just a few decades over 2,000 years ago. An ongoing research project co-ordinated between the UCL Institute of Archaeology and the Emperor Qin Shihang's Terracotta Army Museum is beginning to address some of these questions. This paper outlines some results of the typological, metric, microscopic, chemical and spatial analyses of the 40,000 bronze weapons recovered with the Terracotta Warriors. Thanks to a holistic approach developed specifically for this project, it is possible to reveal remarkable aspects of the organisation of the Qin workforce in production cells, of the standardisation, efficiency and quality-control procedures employed, and of the sophisticated technical knowledge of the weapon-makers.

  14. Effects of nuclear weapons. Third edition

    Energy Technology Data Exchange (ETDEWEB)

    Glasstone, S.; Dolan, P.J.

    1977-01-01

    Since the last edition of ''The Effects of Nuclear Weapons'' in 1962 much new information has become available concerning nuclear weapon effects. This has come in part from the series of atmospheric tests, including several at very high altitudes, conducted in the Pacific Ocean area in 1962. In addition, laboratory studies, theoretical calculations, and computer simulations have provided a better understanding of the various effects. A new chapter has been added on the electromagnetic pulse. The chapter titles are as follows: general principles of nuclear explosions; descriptions of nuclear explosions; air blast phenomena in air and surface bursts; air blast loading; structural damage from air blast; shock effects of surface and subsurface bursts; thermal radiation and its effects; initial nuclear radiation; residual nuclear radiation and fallout; radio and radar effects; the electromagnetic pulse and its effects; and biological effects. (LTN)

  15. Ending the scourge of chemical weapons

    Energy Technology Data Exchange (ETDEWEB)

    Brin, J.

    1993-04-01

    After more than 20 years of arduous negotiations, representatives from 131 countries gathered in Paris in January to sign a treaty banning the development, production, and transfer to other countries of chemical-warfare agents and their means of delivery. The treaty - called the Chemical Weapons Convention, or CWC - complements the more limited Geneva Protocol of 1925, which bans the use of toxic chemicals in warfare. When the CWC enters into force in about two years, it will prohibit the manufacture for military purposes of lethal chemicals such as sulfur mustard, which causes painful skin blistering and lung damage, and nerve agents, which cause rapid death by interfering with the transmission of nerve impulses. The goal is to eliminate from the earth this particularly inhumane form of warfare. The paper discusses facets of the treaty, especially the verification challenge with its inspection on demand features. Short accompanying pieces discuss classifying chemicals and the destruction of chemical weapons under the CWC.

  16. The Effects of Nuclear Weapons. Third edition

    Energy Technology Data Exchange (ETDEWEB)

    Glasstone, S; Dolan, P J

    1977-01-01

    Since the last edition of ''The Effects of Nuclear Weapons'' in 1962 much new information has become available concerning nuclear weapon effects. This has come in part from the series of atmospheric tests, including several at very high altitudes, conducted in the Pacific Ocean area in 1962. In addition, laboratory studies, theoretical calculations, and computer simulations have provided a better understanding of the various effects. A new chapter has been added on the electromagnetic pulse. The chapter titles are as follows: general principles of nuclear explosions; descriptions of nuclear explosions; air blast phenomena in air and surface bursts; air blast loading; structural damage from air blast; shock effects of surface and subsurface bursts; thermal radiation and its effects; initial nuclear radiation; residual nuclear radiation and fallout; radio and radar effects; the electromagnetic pulse and its effects; and biological effects. (LTN)

  17. Emergency management of chemical weapons injuries.

    Science.gov (United States)

    Anderson, Peter D

    2012-02-01

    The potential for chemical weapons to be used in terrorism is a real possibility. Classes of chemical weapons include nerve agents, vesicants (blister agents), choking agents, incapacitating agents, riot control agents, blood agents, and toxic industrial chemicals. The nerve agents work by blocking the actions of acetylcholinesterase leading to a cholinergic syndrome. Nerve agents include sarin, tabun, VX, cyclosarin, and soman. The vesicants include sulfur mustard and lewisite. The vesicants produce blisters and also damage the upper airways. Choking agents include phosgene and chlorine gas. Choking agents cause pulmonary edema. Incapacitating agents include fentanyl and its derivatives and adamsite. Riot control agents include Mace and pepper spray. Blood agents include cyanide. The mechanism of toxicity for cyanide is blocking oxidative phosphorylation. Toxic industrial chemicals include agents such as formaldehyde, hydrofluoric acid, and ammonia.

  18. The US nuclear weapon infrastructure and a stable global nuclear weapon regime

    Energy Technology Data Exchange (ETDEWEB)

    Immele, John D [Los Alamos National Laboratory; Wagner, Richard L [Los Alamos National Laboratory

    2009-01-01

    US nuclear weapons capabilities -- extant force structure and nuclear weapons infrastructure as well as declared policy -- influence other nations' nuclear weapons postures, at least to some extent. This influence can be desirable or undesirable, and is, of course, a mixture of both. How strong the influence is, and its nature, are complicated, controversial, and -- in our view -- not well understood but often overstated. Divergent views about this influence and how it might shape the future global nuclear weapons regime seem to us to be the most serious impediment to reaching a national consensus on US weapons policy, force structure and supporting infrastructure. We believe that a paradigm shift to capability-based deterrence and dissuasion is not only consistent with the realities of the world and how it has changed, but also a desirable way for nuclear weapon postures and infrastructures to evolve. The US and other nuclear states could not get to zero nor even reduce nuclear arms and the nuclear profile much further without learning to manage latent capability. This paper has defined three principles for designing NW infrastructure both at the 'next plateau' and 'near zero.' The US can be a leader in reducing weapons and infrastructure and in creating an international regime in which capability gradually substitutes for weapons in being and is transparent. The current 'strategy' of not having policy or a Congressionally-approved plan for transforming the weapons complex is not leadership. If we can conform the US infrastructure to the next plateau and architect it in such a way that it is aligned with further arms reductions, it will have these benefits: The extant stockpile can be reduced in size, while the smaller stockpile still deters attack on the US and Allies. The capabilities of the infrastructure will dissuade emergence of new challenges/threats; if they emerge, nevertheless, the US will be able to deal with them in

  19. Defense Acquisitions: Assessments of Selected Weapon Programs

    Science.gov (United States)

    2008-03-01

    data. Technologies immature Technologies aproaching maturity Technologies fully maturePage 16 GAO-08-467SP Assessments of Selected Weapon Programs...learned and process control methods developed in the Excalibur program. The Navy anticipates that this strategy will result in mature production...risk management initiative. The RQ-4B aircraft entered a rigorous development test phase. The methodical collection of test data paces this

  20. The Aerodynamics of High Speed Aerial Weapons

    OpenAIRE

    Prince, Simon A.

    1999-01-01

    The focus of this work is the investigation of the complex compressible flow phenomena associated with high speed aerial weapons. A three dimen- sional multiblock finite volume flow solver was developed with the aim of studying the aerodynamics of missile configurations and their component structures. The first component of the study involved the aerodynamic investigation of the isolated components used in the design of conventional missile config- urations. The computati...

  1. Defense Acquisitions: Assessments of Selected Weapon Programs

    Science.gov (United States)

    2016-03-01

    of contractors delivering the 10 costliest programs have performed well relative to broad-based market indices, indicating that investors expect...16-329SP Assessments of Major Weapon Programs Two programs—the B-2 Extremely High Frequency Satellite Communications and Computer...expected. The B-2 Extremely High Frequency Satellite Communications and Computer Increment 1 date was revised to reflect the actual delivery of

  2. Defense Acquisitions: Assessments of Selected Weapon Programs

    Science.gov (United States)

    2015-03-01

    Assessment 56 Figure 13: Examples of Knowledge Scorecards 58 Contents Page v GAO-15-342SP Assessments of Selected Weapon Programs Abbreviations...efficiencies realized through contract negotiations (13 programs), • design trades to balance affordability and capability (10 programs), • changed...at the time of our review with a scorecard and narrative summary at the bottom of the first page of each assessment. As illustrated in figure 12

  3. Imprecise Probability Methods for Weapons UQ

    Energy Technology Data Exchange (ETDEWEB)

    Picard, Richard Roy [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Vander Wiel, Scott Alan [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-05-13

    Building on recent work in uncertainty quanti cation, we examine the use of imprecise probability methods to better characterize expert knowledge and to improve on misleading aspects of Bayesian analysis with informative prior distributions. Quantitative approaches to incorporate uncertainties in weapons certi cation are subject to rigorous external peer review, and in this regard, certain imprecise probability methods are well established in the literature and attractive. These methods are illustrated using experimental data from LANL detonator impact testing.

  4. Nuclear weapons and NATO-Russia relations

    Energy Technology Data Exchange (ETDEWEB)

    Cornwell, G.C.

    1998-12-01

    Despite the development of positive institutional arrangements such as Russian participation in the NATO-led peacekeeping force in Bosnia and the NATO- Russia Permanent Joint Council, the strategic culture of Russia has not changed in any fundamental sense. Russian strategic culture has not evolved in ways that would make Russian policies compatible with those of NATO countries in the necessary economic, social, technological, and military spheres. On the domestic side, Russia has yet to establish a stable democracy and the necessary legal, judicial, and regulatory institutions for a free-market economy. Russia evidently lacks the necessary cultural traditions, including concepts of accountability and transparency, to make these adaptations in the short-term. Owing in part to its institutional shortcomings, severe socioeconomic setbacks have afflicted Russia. Russian conventional military strength has been weakened, and a concomitant reliance by the Russians on nuclear weapons as their ultimate line of defense has increased. The breakdown in the infrastructure that supports Russian early warning and surveillance systems and nuclear weapons stewardship defense, coupled with a tendency towards has exacerbated Russian anxiety and distrust toward NATO. Russia`s reliance on nuclear weapons as the ultimate line of defense, coupled with a tendency toward suspicion and distrust toward NATO, could lead to dangerous strategic miscalculation and nuclear catastrophe.

  5. The Chemical Weapons Convention -- Legal issues

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-08-01

    The Chemical Weapons Convention (CWC) offers a unique challenge to the US system of constitutional law. Its promise of eliminating what is the most purely genocidal type of weapon from the world`s arsenals as well as of destroying the facilities for producing these weapons, brings with it a set of novel legal issues. The reservations about the CWC expressed by US business people are rooted in concern about safeguarding confidential business information and protecting the constitutional right to privacy. The chief worry is that international verification inspectors will misuse their power to enter commercial property and that trade secrets or other private information will be compromised as a result. It has been charged that the Convention is probably unconstitutional. The author categorically disagrees with that view and is aware of no scholarly writing that supports it. The purpose of this presentation is to show that CWC verification activities can be implemented in the US consistently with the traditional constitutional regard for commercial and individual privacy. First, he very briefly reviews the types of verification inspections that the CWC permits, as well as some of its specific privacy protections. Second, he explains how the Fourth Amendment right to privacy works in the context of CWC verification inspections. Finally, he reviews how verification inspections can be integrated into these constitutional requirements in the SU through a federal implementing statute.

  6. Why are sexually selected weapons almost absent in females?

    Institute of Scientific and Technical Information of China (English)

    Anders BERGLUND

    2013-01-01

    In sex role reversed species,predominantly females evolve sexually selected traits,such as ornaments and/or weapons.Female ornaments are common and their function well documented in many species,whether sex role reversed or not.However,sexually selected female weapons seem totally absent except for small wing spurs in three jacana species,present in both males and females.This poor female weaponry is in sharp contrast to the situation in species with conventional sex roles:males commonly have evolved sexually selected weapons as well as ornaments.At the same time,females in many taxa have naturally selected weapons,used in competition over resources or in predator defence.Why are sexually selected weapons then so rare,almost absent,in females? Here I briefly review weaponry in females and the function of these weapons,conclude that the near absence of sexually selected weapons begs an explanation,and suggest that costs of sexually selected weapons may exceed costs of ornaments.Females are more constrained when evolving sexually selected traits compared to males,at least compared to those males that do not provide direct benefits,as trait costs reduce a female's fecundity.I suggest that this constraining trade-off between trait and fecundity restricts females to evolve ornaments but rarely weapons.The same may apply to paternally investing males.Whether sexually selected weapons actually are more costly than sexually selected ornaments remains to be investigated.

  7. RESTRICTIONS BY THE USE OF WEAPONS OF RUSSIAN CITIZENS

    Directory of Open Access Journals (Sweden)

    Lyatsa A. Kodzokova

    2016-01-01

    Full Text Available Abstract: The article considers the restrictions imposed on the circulation of civilian and service weapons. The author analyzes the restrictions on the circulation of weapons, the procedure for their implementation in practice. Federal Law "On weapons" only in paragraph 6 p. 1, art. 6 "Restrictions imposed on the circulation of civilian and service weapons" refers to the prohibition of 'turnover as a civilian and service weapons and other items affecting the action is based on the use of radiation and biological factors; weapons and other items affecting the action is based on the use of electromagnetic, light, thermal, subsonic or ultrasonic radiation and which have output parameters that exceed the value set by state standards of the Russian Federation and the relevant regulations of the federal executive authority in the field of public health, as well as these weapons and items produced outside the Russian territory " How to regard this provision of the law? As the transfer of new weapons, not specific item. 25 of the Federal Law "On weapons", or items prohibited for circulation in the territory of our state? This inconsistency decreases the effectiveness of the legal regulation of arms trafficking. Unification of definitions in this area will allow applying the law correctly and reasonably, including criminal. But for this it is necessary taking into account the experience and the modern needs of the various branches of law provide a clearer definition of "weapon" and its species. The author's conclusions may be used in law enforcement. 

  8. Mediation and Automatization.

    Science.gov (United States)

    Hutchins, Edwin

    This paper discusses the relationship between the mediation of task performance by some structure that is not inherent in the task domain itself and the phenomenon of automatization, in which skilled performance becomes effortless or phenomenologically "automatic" after extensive practice. The use of a common simple explicit mediating…

  9. Digital automatic gain control

    Science.gov (United States)

    Uzdy, Z.

    1980-01-01

    Performance analysis, used to evaluated fitness of several circuits to digital automatic gain control (AGC), indicates that digital integrator employing coherent amplitude detector (CAD) is best device suited for application. Circuit reduces gain error to half that of conventional analog AGC while making it possible to automatically modify response of receiver to match incoming signal conditions.

  10. Automatic Differentiation Package

    Energy Technology Data Exchange (ETDEWEB)

    2007-03-01

    Sacado is an automatic differentiation package for C++ codes using operator overloading and C++ templating. Sacado provide forward, reverse, and Taylor polynomial automatic differentiation classes and utilities for incorporating these classes into C++ codes. Users can compute derivatives of computations arising in engineering and scientific applications, including nonlinear equation solving, time integration, sensitivity analysis, stability analysis, optimization and uncertainity quantification.

  11. Measures to implement the Chemical Weapons Convention

    Energy Technology Data Exchange (ETDEWEB)

    Tanzman, E.; Kellman, B.

    1999-11-05

    This seminar is another excellent opportunity for those involved in preventing chemical weapons production and use to learn from each other about how the Chemical Weapons Convention (CWC) can become a foundation of arms control in Africa and around the world. The author is grateful to the staff of the Organization for the Prohibition of Chemical Weapons (OPCW) for inviting him to address this distinguished seminar. The views expressed in this paper are those of the authors alone, and do not represent the position of the government of the US nor or of any other institution. In 1993, as the process of CWC ratification was beginning, concerns arose that the complexity of integrating the treaty with national law would cause each nation to implement the Convention without regard to what other nations were doing, thereby causing inconsistencies among States Parties in how the Convention would be carried out. As a result the Manual for National Implementation of the Chemical Weapons Convention was prepared and presented it to each national delegation at the December 1993 meeting of the Preparatory Commission in The Hague. During its preparation, the Manual was reviewed by the Committee of Legal Experts on National Implementation of the Chemical Weapons Convention, a group of distinguished international jurists, law professors, legally-trained diplomats, government officials, and Parliamentarians from every region of the world, including Mica. In February 1998, the second edition of the Manual was published in order to update it in light of developments since the CWC entered into force on 29 April 1997. The second edition 1998 clarified the national implementation options to reflect post-entry-into-force thinking, added extensive references to national implementing measures that had been enacted by various States Parties, and included a prototype national implementing statute developed by the authors to provide a starting point for those whose national implementing

  12. Systems engineering analysis of kinetic energy weapon concepts

    Energy Technology Data Exchange (ETDEWEB)

    Senglaub, M.

    1996-06-01

    This study examines, from a systems engineering design perspective, the potential of kinetic energy weapons being used in the role of a conventional strategic weapon. Within the Department of Energy (DOE) complex, strategic weapon experience falls predominantly in the nuclear weapons arena. The techniques developed over the years may not be the most suitable methodologies for use in a new design/development arena. For this reason a more fundamental approach was pursued with the objective of developing an information base from which design decisions might be made concerning the conventional strategic weapon system concepts. The study examined (1) a number of generic missions, (2) the effects of a number of damage mechanisms from a physics perspective, (3) measures of effectiveness (MOE`s), and (4) a design envelope for kinetic energy weapon concepts. With the base of information a cut at developing a set of high-level system requirements was made, and a number of concepts were assessed against these requirements.

  13. 76 FR 70317 - Continuation of the National Emergency With Respect to Weapons of Mass Destruction

    Science.gov (United States)

    2011-11-10

    ... With Respect to Weapons of Mass Destruction #0; #0; #0; Presidential Documents #0; #0; #0;#0;Federal... Weapons of Mass Destruction On November 14, 1994, by Executive Order 12938, the President declared a... weapons (weapons of mass destruction) and the means of delivering such weapons. On July 28, 1998,...

  14. Small sample Bayesian analyses in assessment of weapon performance

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Abundant test data are required in assessment of weapon performance.When weapon test data are insufficient,Bayesian analyses in small sample circumstance should be considered and the test data should be provided by simulations.The several Bayesian approaches are discussed and some limitations are founded.An improvement is put forward after limitations of Bayesian approaches available are analyzed and t he improved approach is applied to assessment of some new weapon performance.

  15. Challenging Minimum Deterrence: Articulating the Contemporary Relevance of Nuclear Weapons

    Science.gov (United States)

    2016-07-13

    The Long Shadow: Nuclear Weapons and Security in 21st Century Asia , ed. Muthiah Alagappa (Stanford, CA: Stanford University Press, 2008), 135, 148...nuclear weapons to the Asia -Pacific region in response to contingencies.44 All of this is en- abled by a diverse set of weapons and delivery systems...policy today, see Keith B. Payne’s The Great American Gamble: Deterrence Theory and Practice from the Cold War to the Twenty-First Century (Fairfax

  16. DoD Nuclear Weapons Personnel Reliability Assurance

    Science.gov (United States)

    2016-04-27

    DOD INSTRUCTION 5210.42 DOD NUCLEAR WEAPONS PERSONNEL RELIABILITY ASSURANCE Originating Component: Office of the Under Secretary of...from the DoD Issuances Website at http://www.dtic.mil/whs/directives. Reissues and renames: DoD Instruction 5210.42, “ Nuclear Weapons Personnel...direction for the management of individuals assigned to perform specified duties associated with U.S. nuclear weapons, nuclear command and control (NC2

  17. Strategies for denaturing the weapons-grade plutonium stockpile

    Energy Technology Data Exchange (ETDEWEB)

    Buckner, M.R.; Parks, P.B.

    1992-10-01

    In the next few years, approximately 50 metric tons of weapons-grade plutonium and 150 metric tons of highly-enriched uranium (HEU) may be removed from nuclear weapons in the US and declared excess. These materials represent a significant energy resource that could substantially contribute to our national energy requirements. HEU can be used as fuel in naval reactors, or diluted with depleted uranium for use as fuel in commercial reactors. This paper proposes to use the weapons-grade plutonium as fuel in light water reactors. The first such reactor would demonstrate the dual objectives of producing electrical power and denaturing the plutonium to prevent use in nuclear weapons.

  18. Granular analyzing of weapon SoS demand description

    Institute of Scientific and Technical Information of China (English)

    Zhao Qingsong; Yang Kewei; Chen Yingwu; Li Mengjun

    2009-01-01

    The systematism of weapon combat is the typical characteristic of a modern battlefield. The process of combat is complex and the demand description of weapon system of systems (SOS) is difficult. Granular analyzing is an important method for solving the complex problem in the world. Granular thinking is introduced into the demand description of weapon SoS. Granular computing and granular combination based on a relation of compatibility is proposed. Based on the level of degree and degree of detail, the granular resolution of weapon SoS is defined and an example is illustrated at the end.

  19. DOE Nuclear Weapon Reliability Definition: History, Description, and Implementation

    Energy Technology Data Exchange (ETDEWEB)

    Wright, D.L.; Cashen, J.J.; Sjulin, J.M.; Bierbaum, R.L.; Kerschen, T.J.

    1999-04-01

    The overarching goal of the Department of Energy (DOE) nuclear weapon reliability assessment process is to provide a quantitative metric that reflects the ability of the weapons to perform their intended function successfully. This white paper is intended to provide insight into the current and long-standing DOE definition of nuclear weapon reliability, which can be summarized as: The probability of achieving the specified yield, at the target, across the Stockpile-To-Target Sequence of environments, throughout the weapon's lifetime, assuming proper inputs.

  20. ON THE OFFENSE: USING CYBER WEAPONS TO INFLUENCE COGNITIVE BEHAVIOR

    Directory of Open Access Journals (Sweden)

    Mary Fendley

    2012-12-01

    Full Text Available There is an increasing recognition that cyber warfare is an important area of development for targeting and weaponeering, with far-reaching effects in national defense and economic security. The ability to conduct effective operations in cyberspace relies on a robust situational awareness of events occurring in both the physical and information domains, with an understanding of how they affect the cognitive domain of friendly, neutral, and adversary population sets. The dynamic nature of the battlefield complicates efforts to understand shifting adversary motivations and intentions. There are very few approaches, to date, that systematically evaluate the effects of the repertoire of cyber weapons on the cognitive, perceptual, and behavioral characteristics of the adversary. In this paper, we describe a software environment called Cognitive Cyber Weapon Selection Tool (CCWST that simulates a scenario involving cyber weaponry.This tool provides the capabilities to test weapons which may induce behavioral state changes in the adversaries. CCWST provides the required situational awareness to the Cyber Information Operations (IO planner to conduct intelligent weapon selection during weapon activation in order to induce the desired behavioral change in the perception of the adversary. Weapons designed to induce the cognitive state changes of deception, distraction, distrust and confusion were then tested empirically to evaluate the capabilities and expected cognitive state changes induced by these weapons. The results demonstrated that CCWST is a powerful environment within which to test and evaluate the impact of cyber weapons on influencing cognitive behavioral states during information processing.

  1. Cardiac fibrillation risk of Taser weapons.

    Science.gov (United States)

    Leitgeb, Norbert

    2014-06-01

    The debate on potential health hazards associated with delivering electric discharges to incapacitated subjects, in particular on whether electric discharge weapons are lethal, less lethal or non-lethal, is still controversial. The cardiac fibrillation risks of Taser weapons X26 and X3 have been investigated by measuring the delivered high-tension pulses in dependence on load impedance. Excitation thresholds and sinus-to-Taser conversion factors have been determined by numerical modeling of endocardial, myocardial, and epicardial cells. Detailed quantitative assessment of cardiac electric exposure has been performed by numerical simulation at the normal-weighted anatomical model NORMAN. The impact of anatomical variation has been quantified at an overweight model (Visible Man), both with a spatial resolution of 2 × 2 × 2 mm voxels. Spacing and location of dart electrodes were systematically varied and the worst-case position determined. Based on volume-weighted cardiac exposure assessment, the fibrillation probability of the worst-case hit was determined to 30% (Taser X26) and 9% (Taser X3). The overall risk assessment of Taser application accounting for realistic spatial hit distributions was derived from training sessions of police officers under realistic scenarios and by accounting for the influence of body (over-)weight as well as gender. The analysis of the results showed that the overall fibrillation risk of Taser use is not negligible. It is higher at Taser X26 than at Taser X3 and amounts to about 1% for Europeans with an about 20% higher risk for Asians. Results demonstrate that enhancement as well as further reduction of fibrillation risk depends on responsible use or abuse of Taser weapons.

  2. Environmental Detection of Clandestine Nuclear Weapon Programs

    Science.gov (United States)

    Kemp, R. Scott

    2016-06-01

    Environmental sensing of nuclear activities has the potential to detect nuclear weapon programs at early stages, deter nuclear proliferation, and help verify nuclear accords. However, no robust system of detection has been deployed to date. This can be variously attributed to high costs, technical limitations in detector technology, simple countermeasures, and uncertainty about the magnitude or behavior of potential signals. In this article, current capabilities and promising opportunities are reviewed. Systematic research in a variety of areas could improve prospects for detecting covert nuclear programs, although the potential for countermeasures suggests long-term verification of nuclear agreements will need to rely on methods other than environmental sensing.

  3. Millimeter Wave Radar Applications to Weapons Systems

    Science.gov (United States)

    1976-06-01

    ocity, and azimuth and elevation arRles ; assignment of target to L weapon for engagement; and assessment of the damage by the indication of cessa- tion...paper. 29 D.E. Gray, American institute of Physics Handbook ," McGraw-Hill, New S~York, 1957. --. . - - . .A • -•• =_ . . . . •,,- - - The complex...B-13) is the target-to-clutter power ratio. I. 41I 7 Handbook of Mathematical Functions, U.S. Department of Commerce, National Bureau of Standards

  4. DOE battery program for weapon applications

    Science.gov (United States)

    Clark, R. P.; Baldwin, A. R.

    This report discusses the Department of Energy (DOE) Weapons Battery program which originates from Sandia National Laboratories (SNL) and involves activities ranging from research, design and development to testing, consulting, and production support. The primary customer is the DOE/Office of Defense Programs, although work is also done for various Department of Defense agencies and their contractors. The majority of the SNL activities involve thermal battery (TB) and lithium ambient temperature battery (LAMB)technologies. Smaller efforts are underway in the areas of silver oxide/zinc and nickel oxide/cadmium batteries as well as double layer capacitors.

  5. Recoil Considerations for Shoulder-Fired Weapons

    Science.gov (United States)

    2012-05-01

    2012) Steyr 15.2 mm 35 g 1450 m/s 39.6 lb 11.4 Burns (2012) Type 97 (Japanese) 20 mm 162 g 790 m/s 130 lb 28.7 Burns (2012) 12HB00 ( Remington ...shotgun 0.727 in 807 gr (12 × 00) 1225 ft/s 7.0 lb 4.37 Remington (2011) Remington Express 12B0 shotgun 0.727 in 580 gr (12 × 0) 1275 ft/s...7.0 lb 3.28 Remington 5 Table 3. Recoil-related characteristics of selected shoulder-fired weapons cited in table 1. Nomenclature

  6. Postulated accident scenarios in weapons disassembly

    Energy Technology Data Exchange (ETDEWEB)

    Payne, S.S. [Dept. of Energy, Albuquerque, NM (United States)

    1997-06-01

    A very brief summary of three postulated accident scenarios for weapons disassembly is provided in the paper. The first deals with a tetrahedral configuration of four generic pits; the second, an infinite planar array of generic pits with varying interstitial water density; and the third, a spherical shell with internal mass suspension in water varying the size and mass of the shell. Calculations were performed using the Monte Carlo Neutron Photon transport code MCNP4A. Preliminary calculations pointed to a need for higher resolution of small pit separation regimes and snapshots of hydrodynamic processes of water/plutonium mixtures.

  7. [Botulinum toxin as a biological weapon].

    Science.gov (United States)

    Rossow, Heidi; Kinnunen, Paula M; Nikkari, Simo

    2012-01-01

    Botulism is caused by botulinum neurotoxin produced by the bacterium Clostridium botulinum. It is a flaccid paralysis in which consciousness and nociception are preserved. Natural botulism typically results from ingestion of inadequately heated or unheated vacuum-packed foods. In addition, botulinum toxin is one of the most feared biological weapons. In the diagnosis and treatment of botulism early suspicion is essential. Several coinciding or local clusters without a typical connecting source, or an uncommon type of toxin may indicate an intentionally caused epidemic.

  8. The Regulation of the Possession of Weapons at Gatherings

    Directory of Open Access Journals (Sweden)

    Pieter du Toit

    2013-12-01

    Full Text Available The Dangerous Weapons Act 15 of 2013 provides for certain prohibitions and restrictions in respect of the possession of a dangerous weapon and it repeals the Dangerous Weapons Act 71 of 1968 as well as the different Dangerous Weapons Acts in operation in the erstwhile TBVC States. The Act also amends the Regulation of Gatherings Act 205 of 1993 to prohibit the possession of any dangerous weapon at a gathering or demonstration. The Dangerous Weapons Act provides for a uniform system of law governing the use of dangerous weapons for the whole of South Africa and it furthermore no longer places the onus on the individual charged with the offence of the possession of a dangerous weapon to show that he or she did not have any intention of using the firearm for an unlawful purpose. The Act also defines the meaning of a dangerous weapon. According to our court’s interpretation of the Dangerous Weapons Act 71 of 1968 a dangerous weapon was regarded as an object used or intended to be used as a weapon even if it had not been designed for use as a weapon. The Act, however, requires the object to be capable of causing death or inflicting serious bodily harm if it were used for an unlawful purpose. The possession of a dangerous weapon, in circumstances which may raise a reasonable suspicion that the person intends to use it for an unlawful purpose, attracts criminal liability. The Act also provides a useful set of guidelines to assist courts to determine if a person charged with the offence of the possession of a dangerous weapon had indeed intended to use the weapon for an unlawful purpose. It seems, however, that the Act prohibits the possession of a dangerous weapon at gatherings, even if the person carrying the weapon does not intend to use it for an unlawful purpose. The state will, however, have to prove that the accused had the necessary control over the object and the intention to exercise such control, as well as that the object is capable of

  9. Word Automaticity of Tree Automatic Scattered Linear Orderings Is Decidable

    CERN Document Server

    Huschenbett, Martin

    2012-01-01

    A tree automatic structure is a structure whose domain can be encoded by a regular tree language such that each relation is recognisable by a finite automaton processing tuples of trees synchronously. Words can be regarded as specific simple trees and a structure is word automatic if it is encodable using only these trees. The question naturally arises whether a given tree automatic structure is already word automatic. We prove that this problem is decidable for tree automatic scattered linear orderings. Moreover, we show that in case of a positive answer a word automatic presentation is computable from the tree automatic presentation.

  10. 25 CFR 11.444 - Carrying concealed weapons.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR LAW AND ORDER COURTS OF INDIAN OFFENSES AND LAW AND ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in...

  11. Willingness to pay for defense against weapons of mass destruction.

    Science.gov (United States)

    Mulvaney, J M; LaBarre, D; Pastel, R; Landauer, M

    2001-12-01

    A survey assessed the willingness to pay for defense against weapons of mass destruction. The results were evaluated according to the benefit to society. The results indicated preferences for increased spending on intelligence gathering, training, and equipment. We concluded that the United States is spending less for weapons of mass destruction defense than the sample population was willing to pay.

  12. 14 CFR 135.119 - Prohibition against carriage of weapons.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Prohibition against carriage of weapons... Flight Operations § 135.119 Prohibition against carriage of weapons. No person may, while on board an aircraft being operated by a certificate holder, carry on or about that person a deadly or dangerous...

  13. 32 CFR 552.116 - Privately owned weapons-security.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Privately owned weapons-security. 552.116 Section..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition...

  14. 31 CFR 0.215 - Possession of weapons and explosives.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Possession of weapons and explosives... OF THE TREASURY EMPLOYEE RULES OF CONDUCT Rules of Conduct § 0.215 Possession of weapons and explosives. (a) Employees shall not possess firearms, explosives, or other dangerous or deadly...

  15. Rethinking the Development of Weapons and Their Impact

    Science.gov (United States)

    Katsioloudis, Petros J.; Jones, Mildred V.

    2011-01-01

    As one reads about the history of humans, he/she sees very early on that humans are naturally "tool users." More specifically, humans used tools as a means of subsistence and survival. Even today humans use tools to extend their capabilities beyond imagination. These tools are even used as weapons. However primitive, these early weapons would soon…

  16. Monoclonal Antibodies to Prevent Use of Mycotoxins as Biological Weapons

    Science.gov (United States)

    2007-07-01

    Mycotoxins as Biological Weapons PRINCIPAL INVESTIGATOR: Marta Feldmesser, M.D. CONTRACTING ORGANIZATION: Albert Einstein College of...Monoclonal Antibodies to Prevent Use of Mycotoxins as Biological Weapons 5b. GRANT NUMBER W81XWH-06-1-0085 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR

  17. Increased vitamin plasma levels in Swedish military personnel treated with nutrients prior to automatic weapon training

    Directory of Open Access Journals (Sweden)

    C G Le Prell

    2011-01-01

    Full Text Available Noise-induced hearing loss (NIHL is a significant clinical, social, and economic issue. The development of novel therapeutic agents to reduce NIHL will potentially benefit multiple very large noise-exposed populations. Oxidative stress has been identified as a significant contributor to noise-induced sensory cell death and NIHL, and several antioxidant strategies have now been suggested for potential translation to human subjects. One such strategy is a combination of beta-carotene, vitamins C and E, and magnesium, which has shown promise for protection against NIHL in rodent models, and is being evaluated in a series of international human clinical trials using temporary (military gunfire, audio player use and permanent (stamping factory, military airbase threshold shift models (NCT00808470. The noise exposures used in the recently completed Swedish military gunfire study described in this report did not, on average, result in measurable changes in auditory function using conventional pure-tone thresholds and distortion product otoacoustic emission (DPOAE amplitudes as metrics. However, analysis of the plasma samples confirmed significant elevations in the bloodstream 2 hours after oral consumption of active clinical supplies, indicating the dose is realistic. The plasma outcomes are encouraging, but clinical acceptance of any novel therapeutic critically depends on demonstration that the agent reduces noise-induced threshold shift in randomized, placebo-controlled, prospective human clinical trials. Although this noise insult did not induce hearing loss, the trial design and study protocol can be applied to other populations exposed to different noise insults.

  18. Automatic Program Development

    DEFF Research Database (Denmark)

    by members of the IFIP Working Group 2.1 of which Bob was an active member. All papers are related to some of the research interests of Bob and, in particular, to the transformational development of programs and their algorithmic derivation from formal specifications. Automatic Program Development offers......Automatic Program Development is a tribute to Robert Paige (1947-1999), our accomplished and respected colleague, and moreover our good friend, whose untimely passing was a loss to our academic and research community. We have collected the revised, updated versions of the papers published in his...... honor in the Higher-Order and Symbolic Computation Journal in the years 2003 and 2005. Among them there are two papers by Bob: (i) a retrospective view of his research lines, and (ii) a proposal for future studies in the area of the automatic program derivation. The book also includes some papers...

  19. Proportionality, just war theory and weapons innovation.

    Science.gov (United States)

    Forge, John

    2009-03-01

    Just wars are supposed to be proportional responses to aggression: the costs of war must not greatly exceed the benefits. This proportionality principle raises a corresponding 'interpretation problem': what are the costs and benefits of war, how are they to be determined, and a 'measurement problem': how are costs and benefits to be balanced? And it raises a problem about scope: how far into the future do the states of affairs to be measured stretch? It is argued here that weapons innovation always introduces costs, and that these costs cannot be determined in advance of going to war. Three examples, the atomic bomb, the AK-47 and the ancient Greek catapult, are given as examples. It is therefore argued that the proportionality principle is inapplicable prospectively. Some replies to the argument are discussed and rejected. Some more general defences of the proportionality principle are considered and also rejected. Finally, the significance of the argument for Just War Theory as a whole is discussed.

  20. Nuclear weapons issues in South Asia

    Energy Technology Data Exchange (ETDEWEB)

    Joeck, N.

    1993-07-02

    This report discusses how the US can play a productive mediating role in South Asia by engaging India and Pakistan in an international forum to manage nuclear weapons, as Edward Teller advocated. India and Pakistan have developed their nuclear capabilities because they fear their neighbors, not because they want to threaten fear their neighbors, not because they want to threaten the US. The appropriate response for the US, therefore, is diplomatic engagement and negotiations. In addition to the international approach, encouragement and facilitation of regional and bilateral interactions will also be important. Formal arms control agreements have been reached, but less formal confidence-building measures, and unilateral security pledges may well be combined to form a more secure strategic environment in South Asia than a nuclear armed confrontation across the porous South Asian border.

  1. Automatic text summarization

    CERN Document Server

    Torres Moreno, Juan Manuel

    2014-01-01

    This new textbook examines the motivations and the different algorithms for automatic document summarization (ADS). We performed a recent state of the art. The book shows the main problems of ADS, difficulties and the solutions provided by the community. It presents recent advances in ADS, as well as current applications and trends. The approaches are statistical, linguistic and symbolic. Several exemples are included in order to clarify the theoretical concepts.  The books currently available in the area of Automatic Document Summarization are not recent. Powerful algorithms have been develop

  2. Automatic Camera Control

    DEFF Research Database (Denmark)

    Burelli, Paolo; Preuss, Mike

    2014-01-01

    Automatically generating computer animations is a challenging and complex problem with applications in games and film production. In this paper, we investigate howto translate a shot list for a virtual scene into a series of virtual camera configurations — i.e automatically controlling the virtual...... camera. We approach this problem by modelling it as a dynamic multi-objective optimisation problem and show how this metaphor allows a much richer expressiveness than a classical single objective approach. Finally, we showcase the application of a multi-objective evolutionary algorithm to generate a shot...

  3. Radiological Weapons: How Great Is The Danger?

    Energy Technology Data Exchange (ETDEWEB)

    Moore, G M

    2003-06-01

    One of the underlying purposes of this paper is to provoke thinking about the interplay between the regulation of radioactive materials and the risk of their use in an radiological weapon (RW). Also considered in this paper are the types of RWs that a terrorist might use, the nature of the threat and danger posed by the various types of RWs, the essential elements that must be considered in responding to the terrorist use of an RW, and what steps may need to be taken a priori to minimize the consequences of the inevitable use of an RW. Because radiological dispersal devices (RDDs) have been the focus of so much recent concern and because RDDs are arguably the most likely of RWs to be used by a terrorist group, a major focus of this paper will be on RDDs. Radiological weapons are going to be used by some individual or group, if not this year then next year, or at some time in the foreseeable future. A policy of focusing resources solely on prevention of their use would leave any government open to significant economic disruption when the inevitable use occurs. Preplanning can limit the injuries, property damage, and economic losses that might result from the use of an RW. Moreover, a combination of efforts to prevent and to minimize the impact of RWs may significantly discourage potential users. The dangers from RWs can be dealt with while society continues to enjoy the benefits of nuclear technology that were promised under Atoms for Peace. However, some restructuring of our use of radioactive materials is necessary to ensure that the current and future uses of radioactive materials outweigh the potential disruption caused by misuse of the materials in RWs.

  4. Automatic Complexity Analysis

    DEFF Research Database (Denmark)

    Rosendahl, Mads

    1989-01-01

    One way to analyse programs is to to derive expressions for their computational behaviour. A time bound function (or worst-case complexity) gives an upper bound for the computation time as a function of the size of input. We describe a system to derive such time bounds automatically using abstract...

  5. Exploring Automatization Processes.

    Science.gov (United States)

    DeKeyser, Robert M.

    1996-01-01

    Presents the rationale for and the results of a pilot study attempting to document in detail how automatization takes place as the result of different kinds of intensive practice. Results show that reaction times and error rates gradually decline with practice, and the practice effect is skill-specific. (36 references) (CK)

  6. Automaticity and Reading: Perspectives from the Instance Theory of Automatization.

    Science.gov (United States)

    Logan, Gordon D.

    1997-01-01

    Reviews recent literature on automaticity, defining the criteria that distinguish automatic processing from non-automatic processing, and describing modern theories of the underlying mechanisms. Focuses on evidence from studies of reading and draws implications from theory and data for practical issues in teaching reading. Suggests that…

  7. 3 CFR - Continuation of Emergency With Respect to Weapons of Mass Destruction

    Science.gov (United States)

    2010-01-01

    ... 3 The President 1 2010-01-01 2010-01-01 false Continuation of Emergency With Respect to Weapons of... Continuation of Emergency With Respect to Weapons of Mass Destruction On November 14, 1994, by Executive Order... of nuclear, biological, and chemical weapons (weapons of mass destruction) and the means...

  8. 32 CFR 552.124 - Transportation of privately owned weapons and ammunition.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Transportation of privately owned weapons and... owned weapons and ammunition. (a) Privately owned firearms and ammunition will be transported in the following manner: (1) Weapons, other than weapons being transported into Fort Lewis for the first time,...

  9. 75 FR 68671 - Continuation of Emergency With Respect to Weapons of Mass Destruction

    Science.gov (United States)

    2010-11-08

    ... Notice of November 4, 2010--Continuation of Emergency With Respect to Weapons of Mass Destruction #0; #0... Continuation of Emergency With Respect to Weapons of Mass Destruction On November 14, 1994, by Executive Order... of nuclear, biological, and chemical weapons (weapons of mass destruction) and the means...

  10. 77 FR 66513 - Continuation of the National Emergency With Respect to Weapons of Mass Destruction

    Science.gov (United States)

    2012-11-05

    ... Documents#0;#0; ] Notice of November 1, 2012 Continuation of the National Emergency With Respect to Weapons... economy of the United States posed by the proliferation of nuclear, biological, and chemical weapons (weapons of mass destruction) and the means of delivering such weapons. On July 28, 1998, the...

  11. 32 CFR 552.104 - Disposition of confiscated/seized weapons.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Disposition of confiscated/seized weapons. 552... RESERVATIONS AND NATIONAL CEMETERIES REGULATIONS AFFECTING MILITARY RESERVATIONS Firearms and Weapons § 552.104 Disposition of confiscated/seized weapons. All weapons, ammunition, explosives or other devices defined...

  12. 32 CFR 552.130 - Disposition of confiscated/seized weapons.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Disposition of confiscated/seized weapons. 552..., Ammunition and Other Dangerous Weapons on Fort Gordon § 552.130 Disposition of confiscated/seized weapons. All weapons, ammunition, explosives, or other devices defined in this subpart, that are...

  13. Los Alamos National Laboratory JOWOG 31 Weapons Engineering Education & Training

    Energy Technology Data Exchange (ETDEWEB)

    Domzalski, Mark W. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-10-03

    The objectives of this report are to recruit talented staff, invest in new and early/mid career staff, retain trained and talented staff and future leaders, and shorten the ~5-10 year time line to realize new Weaponeers.

  14. Arms Control: US and International efforts to ban biological weapons

    Energy Technology Data Exchange (ETDEWEB)

    1992-12-01

    The Bacteriological (Biological) and Toxin Weapons Convention, the treaty that bans the development, production, and stockpiling and acquisition of biological weapons was opened for signature in 1972 and came into force in 1975 after being ratified by 22 governments, including the depository nations of the USA, the United Kingdom, and the former Soviet Union. In support of the Convention, the USA later established export controls on items used to make biological weapons. Further, in accordance with the 1990 President`s Enhanced Proliferation Control Initiative, actions were taken to redefine and expand US export controls, as well as to encourage multilateral controls through the Australia Group. Thus far, the Convention has not been effective in stopping the development of biological weapons. The principal findings as to the reasons of the failures of the Convention are found to be: the Convention lacks universality, compliance measures are effective, advantage of verification may outweigh disadvantages. Recommendations for mitigating these failures are outlined in this report.

  15. Hamburgian weapon delivery technology: a quantitative comparative approach

    DEFF Research Database (Denmark)

    Riede, Felix

    2010-01-01

    The pioneer human re-colonisation of Southern Scandinavia after the Last Ice Age began some time around 12,700 calendar years BC and is associated with the Hamburgian techno-complex. These groups were reindeer hunters whose hunting weapons were tipped with the eponymous shouldered points (pointes á...... cran). Numerous studies have addressed the question of whether these points tipped arrows fired from bows, darts launched with the help of spear-throwers, or some other projectile delivery weapon. This paper approaches the question of Hamburgian weapon delivery technology from a quantitative...... comparative angle. Lithic metric data as well as information on presumed Hamburgian projectile shafts are used to demonstrate that the bow-and-arrow was the most likely weapon delivery method. This is reflected in the shape similarity with both later prehistoric arrow-points and shafts of the Ahrensburgian...

  16. The use of neutron scattering in nuclear weapons research

    Energy Technology Data Exchange (ETDEWEB)

    Juzaitis, R.J. [Los Alamos National Lab., NM (United States)

    1995-10-01

    We had a weapons science breakout session last week. Although it would have been better to hold it closer in time to this workshop, I think that it was very valuable. it may have been less of a {open_quotes}short-sleeve{close_quotes} workshop environment than we would have liked, but as the first time two communities-the weapons community and the neutron scattering community- got together, it was a wonderful opportunity to transfer information during the 24 presentations that were made. This report contains discussions on the fundamental analysis of documentation of the enduring stockpile; LANSCE`s contribution to weapons; spallation is critical to understanding; weapons safety assessments; applied nuclear physics requires cross section information; fission models need refinement; and establishing teams on collaborative projects.

  17. Perfection and the Bomb: Nuclear Weapons, Teleology, and Motives.

    Science.gov (United States)

    Brummett, Barry

    1989-01-01

    Uses Kenneth Burke's theory of perfection to explore the vocabularies of nuclear weapons in United States public discourse and how "the Bomb" as a God term has gained imbalanced ascendancy in centers of power. (MS)

  18. Cargo/Weapons Elevator Land Based Engineering Site

    Data.gov (United States)

    Federal Laboratory Consortium — The Cargo and Weapons Facility consists of a suite of full scale and component test facilities contiguously located in building 77H. The site was constructed in 1987...

  19. Excess Weapons Plutonium Immobilization in Russia

    Energy Technology Data Exchange (ETDEWEB)

    Jardine, L.; Borisov, G.B.

    2000-04-15

    The joint goal of the Russian work is to establish a full-scale plutonium immobilization facility at a Russian industrial site by 2005. To achieve this requires that the necessary engineering and technical basis be developed in these Russian projects and the needed Russian approvals be obtained to conduct industrial-scale immobilization of plutonium-containing materials at a Russian industrial site by the 2005 date. This meeting and future work will provide the basis for joint decisions. Supporting R&D projects are being carried out at Russian Institutes that directly support the technical needs of Russian industrial sites to immobilize plutonium-containing materials. Special R&D on plutonium materials is also being carried out to support excess weapons disposition in Russia and the US, including nonproliferation studies of plutonium recovery from immobilization forms and accelerated radiation damage studies of the US-specified plutonium ceramic for immobilizing plutonium. This intriguing and extraordinary cooperation on certain aspects of the weapons plutonium problem is now progressing well and much work with plutonium has been completed in the past two years. Because much excellent and unique scientific and engineering technical work has now been completed in Russia in many aspects of plutonium immobilization, this meeting in St. Petersburg was both timely and necessary to summarize, review, and discuss these efforts among those who performed the actual work. The results of this meeting will help the US and Russia jointly define the future direction of the Russian plutonium immobilization program, and make it an even stronger and more integrated Russian program. The two objectives for the meeting were to: (1) Bring together the Russian organizations, experts, and managers performing the work into one place for four days to review and discuss their work with each other; and (2) Publish a meeting summary and a proceedings to compile reports of all the excellent

  20. Pakistan’s Nuclear Weapons: Proliferation and Security Issues

    Science.gov (United States)

    2010-10-07

    on Fissile Materials http://www.fissilematerials.org/ipfm/ site_down/gfmr07.pdf; SIPRI Yearbook 2007. The International Panel on Fissile Materials...State for Foreign and Commonwealth Affairs David Miliband told the Charlie Rose Show December 15, 2008, that Islamabad’s nuclear weapons “are under...Weapons in Pakistan,” Pakistan Security Research Unit Brief Number 22, University of Bradford, November 18, 2007. Available at http://spaces.brad.ac.uk

  1. Application of a Dynamic Programming Algorithm for Weapon Target Assignment

    Science.gov (United States)

    2016-02-01

    targets by simply optimizing the total ‘ cost ’ of all assignments (in the WTA case the cost relates to the threat minimisation benefit). LAPs can...an inbound missile or as a weapons system about to launch a missile. Such an approach requires a high degree of situational awareness [14], whereas... costs . 3.1 Static Weapon Target Assignment using Exhaustive Enumeration As previously mentioned, since there is no exact solution to determining the

  2. Small Arms - Hand and Shoulder Weapons and Machine Guns

    Science.gov (United States)

    2016-06-24

    performance, reliability , etc. may require additional weapons and spare barrels. d. Whenever a certain minimum number of weapons is specified in...PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Small Arms Systems Division (TEDT-AT-FP-S) US Army Aberdeen Test Center 400 Colleran Road Aberdeen...Approved for public release; distribution is unlimited. 13. SUPPLEMENTARY NOTES Defense Technical Information Center (DTIC), AD No.: This TOP supersedes

  3. Syria’s Chemical Weapons: Issues for Congress

    Science.gov (United States)

    2013-09-12

    regime of President Bashar al Asad possesses stocks of nerve (sarin, VX ) and blister (mustard gas) agents , possibly weaponized into bombs, shells...largest in the world” during a June 2012 interview.16 Damascus possesses mustard blister agent , sarin nerve agent , and VX nerve agent , according to...chemical weapons stockpile. Syria also has several hundred metric tons of mustard agent in ready-to-use form and several tens of metric tons of VX . The

  4. Automaticity or active control

    DEFF Research Database (Denmark)

    Tudoran, Ana Alina; Olsen, Svein Ottar

    aspects of the construct, such as routine, inertia, automaticity, or very little conscious deliberation. The data consist of 2962 consumers participating in a large European survey. The results show that habit strength significantly moderates the association between satisfaction and action loyalty, and......This study addresses the quasi-moderating role of habit strength in explaining action loyalty. A model of loyalty behaviour is proposed that extends the traditional satisfaction–intention–action loyalty network. Habit strength is conceptualised as a cognitive construct to refer to the psychological......, respectively, between intended loyalty and action loyalty. At high levels of habit strength, consumers are more likely to free up cognitive resources and incline the balance from controlled to routine and automatic-like responses....

  5. Automatic Ultrasound Scanning

    DEFF Research Database (Denmark)

    Moshavegh, Ramin

    Medical ultrasound has been a widely used imaging modality in healthcare platforms for examination, diagnostic purposes, and for real-time guidance during surgery. However, despite the recent advances, medical ultrasound remains the most operator-dependent imaging modality, as it heavily relies...... on the user adjustments on the scanner interface to optimize the scan settings. This explains the huge interest in the subject of this PhD project entitled “AUTOMATIC ULTRASOUND SCANNING”. The key goals of the project have been to develop automated techniques to minimize the unnecessary settings...... on the scanners, and to improve the computer-aided diagnosis (CAD) in ultrasound by introducing new quantitative measures. Thus, four major issues concerning automation of the medical ultrasound are addressed in this PhD project. They touch upon gain adjustments in ultrasound, automatic synthetic aperture image...

  6. Automatic trend estimation

    CERN Document Server

    Vamos¸, C˘alin

    2013-01-01

    Our book introduces a method to evaluate the accuracy of trend estimation algorithms under conditions similar to those encountered in real time series processing. This method is based on Monte Carlo experiments with artificial time series numerically generated by an original algorithm. The second part of the book contains several automatic algorithms for trend estimation and time series partitioning. The source codes of the computer programs implementing these original automatic algorithms are given in the appendix and will be freely available on the web. The book contains clear statement of the conditions and the approximations under which the algorithms work, as well as the proper interpretation of their results. We illustrate the functioning of the analyzed algorithms by processing time series from astrophysics, finance, biophysics, and paleoclimatology. The numerical experiment method extensively used in our book is already in common use in computational and statistical physics.

  7. Automatic food decisions

    DEFF Research Database (Denmark)

    Mueller Loose, Simone

    Consumers' food decisions are to a large extent shaped by automatic processes, which are either internally directed through learned habits and routines or externally influenced by context factors and visual information triggers. Innovative research methods such as eye tracking, choice experiments...... and food diaries allow us to better understand the impact of unconscious processes on consumers' food choices. Simone Mueller Loose will provide an overview of recent research insights into the effects of habit and context on consumers' food choices....

  8. Detection of weapons of mass destruction

    Science.gov (United States)

    Bjorkholm, Paul J.

    2003-07-01

    High Energy X-ray cargo screening is a mature technology that has proven its value in the detection of contraband material hidden within cargo including fully loaded sea containers. To date high energy screening has been largely applied to manifest verification and to drug detection. However, the dramatic change in world terrorism has altered the application. Now it is essential that weapons of mass destruction (WMD"s) be interdicted with incredibly high accuracy. The implication of a missed detection has gone from loss of revenue or the lowering of the street price of drugs to potentially stopping, at least for some significant time, most world commerce. Screening containers with high energy x-rays (~250+ mm of steel penetration) is capable of detecting all nuclear threats at a fraction of the strategically important mass. The screening operation can be automated so that no human decisions are required with very low false alarms. Finally, the goal of 100% inspection of cargo inbound to the United States from the twenty largest international ports is an achievable goal with hardware costs in the area of that already spent on airport security.

  9. Automatization of lexicographic work

    Directory of Open Access Journals (Sweden)

    Iztok Kosem

    2013-12-01

    Full Text Available A new approach to lexicographic work, in which the lexicographer is seen more as a validator of the choices made by computer, was recently envisaged by Rundell and Kilgarriff (2011. In this paper, we describe an experiment using such an approach during the creation of Slovene Lexical Database (Gantar, Krek, 2011. The corpus data, i.e. grammatical relations, collocations, examples, and grammatical labels, were automatically extracted from 1,18-billion-word Gigafida corpus of Slovene. The evaluation of the extracted data consisted of making a comparison between the time spent writing a manual entry and a (semi-automatic entry, and identifying potential improvements in the extraction algorithm and in the presentation of data. An important finding was that the automatic approach was far more effective than the manual approach, without any significant loss of information. Based on our experience, we would propose a slightly revised version of the approach envisaged by Rundell and Kilgarriff in which the validation of data is left to lower-level linguists or crowd-sourcing, whereas high-level tasks such as meaning description remain the domain of lexicographers. Such an approach indeed reduces the scope of lexicographer’s work, however it also results in the ability of bringing the content to the users more quickly.

  10. The tale of the shrinking weapon: seasonal changes in nutrition affect weapon size and sexual dimorphism, but not contemporary evolution.

    Science.gov (United States)

    Miller, C W; McDonald, G C; Moore, A J

    2016-11-01

    Sexually selected traits are often highly variable in size within populations due to their close link with the physical condition of individuals. Nutrition has a large impact on physical condition, and thus, any seasonal changes in nutritional quality are predicted to alter the average size of sexually selected traits as well as the degree of sexual dimorphism in populations. However, although traits affected by mate choice are well studied, we have a surprising lack of knowledge of how natural variation in nutrition affects the expression of sexually selected weapons and sexual dimorphism. Further, few studies explicitly test for differences in the heritability and mean-scaled evolvability of sexually selected traits across conditions. We studied Narnia femorata (Hemiptera: Coreidae), an insect where males use their hind legs as weapons and the femurs are enlarged, to understand the extent to which weapon expression, sexual dimorphism and evolvability change across the actual range of nutrition available in the wild. We found that insects raised on a poor diet (cactus without fruit) are nearly monomorphic, whereas those raised on a high-quality diet (cactus with ripe fruit) are distinctly sexually dimorphic via the expression of large hind leg weapons in males. Contrary to our expectations, we found little evidence of a potential for evolutionary change for any trait measured. Thus, although we show weapons are highly condition dependent, and changes in weapon expression and dimorphism could alter evolutionary dynamics, our populations are unlikely to experience further evolutionary changes under current conditions.

  11. Why are U.S. nuclear weapon modernization efforts controversial?

    Science.gov (United States)

    Acton, James

    2016-03-01

    U.S. nuclear weapon modernization programs are focused on extending the lives of existing warheads and developing new delivery vehicles to replace ageing bombers, intercontinental ballistic missiles, and ballistic missile submarines. These efforts are contested and controversial. Some critics argue that they are largely unnecessary, financially wasteful and potentially destabilizing. Other critics posit that they do not go far enough and that nuclear weapons with new military capabilities are required. At its core, this debate centers on three strategic questions. First, what roles should nuclear weapons be assigned? Second, what military capabilities do nuclear weapons need to fulfill these roles? Third, how severe are the unintended escalation risks associated with particular systems? Proponents of scaled-down modernization efforts generally argue for reducing the role of nuclear weapons but also that, even under existing policy, new military capabilities are not required. They also tend to stress the escalation risks of new--and even some existing--capabilities. Proponents of enhanced modernization efforts tend to advocate for a more expansive role for nuclear weapons in national security strategy. They also often argue that nuclear deterrence would be enhanced by lower yield weapons and/or so called bunker busters able to destroy more deeply buried targets. The debate is further fueled by technical disagreements over many aspects of ongoing and proposed modernization efforts. Some of these disagreements--such as the need for warhead life extension programs and their necessary scope--are essentially impossible to resolve at the unclassified level. By contrast, unclassified analysis can help elucidate--though not answer--other questions, such as the potential value of bunker busters.

  12. Automatic Configuration in NTP

    Institute of Scientific and Technical Information of China (English)

    Jiang Zongli(蒋宗礼); Xu Binbin

    2003-01-01

    NTP is nowadays the most widely used distributed network time protocol, which aims at synchronizing the clocks of computers in a network and keeping the accuracy and validation of the time information which is transmitted in the network. Without automatic configuration mechanism, the stability and flexibility of the synchronization network built upon NTP protocol are not satisfying. P2P's resource discovery mechanism is used to look for time sources in a synchronization network, and according to the network environment and node's quality, the synchronization network is constructed dynamically.

  13. Challenges in the application of modular open system architecture to weapons

    Science.gov (United States)

    Shaver, Jonathan; Rose, Leo; Young, Quinn; Christensen, Jacob

    2016-05-01

    The overarching objective for Flexible Weapons is to replace current inventory weapons that will not fully utilize the increased capabilities of 6th generation platforms, with a single weapons kit made up of flexible, open architecture components. Flexible Weapon will develop a common architecture to enable modular subsystems to achieve flexible weapons capability while allowing technology refresh at the pace of technology discovery in an affordable and sustainable design. The various combinations of weapons to address multiple missions must be 100% compatible with 6th generation delivery platforms (fighters, bombers, RPAs) and backwards compatible with 4th and 5th generation platforms.

  14. Real life identification of partially occluded weapons in video frames

    Science.gov (United States)

    Hempelmann, Christian F.; Arslan, Abdullah N.; Attardo, Salvatore; Blount, Grady P.; Sirakov, Nikolay M.

    2016-05-01

    We empirically test the capacity of an improved system to identify not just images of individual guns, but partially occluded guns and their parts appearing in a videoframe. This approach combines low-level geometrical information gleaned from the visual images and high-level semantic information stored in an ontology enriched with meronymic part-whole relations. The main improvements of the system are handling occlusion, new algorithms, and an emerging meronomy. Well-known and commonly deployed in ontologies, actual meronomies need to be engineered and populated with unique solutions. Here, this includes adjacency of weapon parts and essentiality of parts to the threat of and the diagnosticity for a weapon. In this study video sequences are processed frame by frame. The extraction method separates colors and removes the background. Then image subtraction of the next frame determines moving targets, before morphological closing is applied to the current frame in order to clean up noise and fill gaps. Next, the method calculates for each object the boundary coordinates and uses them to create a finite numerical sequence as a descriptor. Parts identification is done by cyclic sequence alignment and matching against the nodes of the weapons ontology. From the identified parts, the most-likely weapon will be determined by using the weapon ontology.

  15. Chemical and biological weapons in the 'new wars'.

    Science.gov (United States)

    Ilchmann, Kai; Revill, James

    2014-09-01

    The strategic use of disease and poison in warfare has been subject to a longstanding and cross-cultural taboo that condemns the hostile exploitation of poisons and disease as the act of a pariah. In short, biological and chemical weapons are simply not fair game. The normative opprobrium is, however, not fixed, but context dependent and, as a social phenomenon, remains subject to erosion by social (or more specifically, antisocial) actors. The cross cultural understanding that fighting with poisons and disease is reprehensible, that they are taboo, is codified through a web of interconnected measures, principal amongst these are the 1925 Geneva Protocol; the Biological Weapons Convention; and the Chemical Weapons Convention. Whilst these treaties have weathered the storm of international events reasonably well, their continued health is premised on their being 'tended to' in the face of contextual changes, particularly facing changes in science and technology, as well as the changed nature and character of conflict. This article looks at the potential for normative erosion of the norm against chemical and biological weapons in the face of these contextual changes and the creeping legitimization of chemical and biological weapons.

  16. Biophysics and medical effects of enhanced radiation weapons.

    Science.gov (United States)

    Reeves, Glen I

    2012-08-01

    Enhanced radiation weapons (ERW) are fission-fusion devices where the massive numbers of neutrons generated during the fusion process are intentionally allowed to escape rather than be confined to increase yield (and fallout products). As a result, the energy partition of the weapon output shifts from blast and thermal energies toward prompt radiation. The neutron/gamma output ratio is also increased. Neutrons emitted from ERW are of higher energy than the Eave of neutrons from fission weapons. These factors affect the patterns of injury distribution; delay wound healing in combined injuries; reduce the therapeutic efficacy of medical countermeasures; and increase the dose to radiation-only casualties, thus potentiating the likelihood of encountering radiation-induced incapacitation. The risk of radiation-induced carcinogenesis is also increased. Radiation exposure to first responders from activation products is increased over that expected from a fission weapon of similar yield. However, the zone of dangerous fallout is significantly reduced in area. At least four nations have developed the potential to produce such weapons. Although the probability of detonation of an ERW in the near future is very small, it is nonzero, and clinicians and medical planners should be aware of the medical effects of ERW.

  17. FEATURES ADMINISTRATIVE VIOLATIONS IN THE WEAPONS CIRCULATION SPHERE

    Directory of Open Access Journals (Sweden)

    Lyatsa A. KODZOKOVA

    2016-01-01

    Full Text Available Any offense in the area of arms trafficking is the increased danger. On the one hand, the guilty person through weapons reinforces the illegality or even facilitates the commission of their illegal actions, on the other hand, these activities cause significant harm to individuals and society. Offences related to illicit trafficking in arms (activity without the necessary licenses and permits, for the most part involve criminal responsibility (Article 222 -..225 of the Criminal Code, etc., but some violations in this area is not covered by criminlaw. In these cases, the violators shall apply administrative sanctions (for example, when sending weapons, the illicit manufacture of pneumatic weapons, etc.. Specificity of weapons is that it is endowed with certain peculiar features of quality, depending on which branch of law regulates its turnover. Currently, the legal regime of weapons is regulated by several branches of law (civil, administrative, military, criminal, etc., Each of which considers it based on the specifics of its subject and method, and has its own legal framework, regulating the circulation of arms.

  18. Comparison of automatic control systems

    Science.gov (United States)

    Oppelt, W

    1941-01-01

    This report deals with a reciprocal comparison of an automatic pressure control, an automatic rpm control, an automatic temperature control, and an automatic directional control. It shows the difference between the "faultproof" regulator and the actual regulator which is subject to faults, and develops this difference as far as possible in a parallel manner with regard to the control systems under consideration. Such as analysis affords, particularly in its extension to the faults of the actual regulator, a deep insight into the mechanism of the regulator process.

  19. Object Recognition System in Remote Controlled Weapon Station using SIFT and SURF Methods

    Directory of Open Access Journals (Sweden)

    Midriem Mirdanies

    2013-12-01

    Full Text Available Object recognition system using computer vision that is implemented on Remote Controlled Weapon Station (RCWS is discussed. This system will make it easier to identify and shoot targeted object automatically. Algorithm was created to recognize real time multiple objects using two methods i.e. Scale Invariant Feature Transform (SIFT and Speeded Up Robust Features (SURF combined with K-Nearest Neighbors (KNN and Random Sample Consensus (RANSAC for verification. The algorithm is designed to improve object detection to be more robust and to minimize the processing time required. Objects are registered on the system consisting of the armored personnel carrier, tanks, bus, sedan, big foot, and police jeep. In addition, object selection can use mouse to shoot another object that has not been registered on the system. Kinect™ is used to capture RGB images and to find the coordinates x, y, and z of the object. The programming language used is C with visual studio IDE 2010 and opencv libraries. Object recognition program is divided into three parts: 1 reading image from kinect™ and simulation results, 2 object recognition process, and 3 transfer of the object data to the ballistic computer. Communication between programs is performed using shared memory. The detected object data is sent to the ballistic computer via Local Area Network (LAN using winsock for ballistic calculation, and then the motor control system moves the direction of the weapon model to the desired object. The experimental results show that the SIFT method is more suitable because more accurate and faster than SURF with the average processing time to detect one object is 430.2 ms, two object is 618.4 ms, three objects is 682.4 ms, and four objects is 756.2 ms. Object recognition program is able to recognize multi-objects and the data of the identified object can be processed by the ballistic computer in realtime.

  20. Public perspectives of nuclear weapons in the post-cold war environment

    Energy Technology Data Exchange (ETDEWEB)

    Jenkins-Smith, H.C.; Herron, K.G. [Univ. of New Mexico, Albuquerque, NM (United States). Institute for Public Policy; Barke, R.P. [Georgia Institute of Technology, Atlanta, GA (United States). School of Public Policy

    1994-04-01

    This report summarizes the findings of a nationwide survey of public perceptions of nuclear weapons in the post-cold war environment. Participants included 1,301 members of the general public, 1,155 randomly selected members of the Union of Concerned Scientists, and 1,226 employees randomly selected from the technical staffs of four DOE national laboratories. A majority of respondents from all three samples perceived the post-cold war security environment to pose increased likelihood of nuclear war, nuclear proliferation, and nuclear terrorism. Public perceptions of nuclear weapons threats, risks, utilities, and benefits were found to systematically affect nuclear weapons policy preferences in predictable ways. Highly significant relationships were also found between public trust and nuclear weapons policy preferences. As public trust and official government information about nuclear weapons increased, perceptions of nuclear weapons management risks decreased and perceptions of nuclear weapons utilities and benefits increased. A majority of respondents favored decreasing funding for: (1) developing and testing new nuclear weapons; (2) maintaining existing nuclear weapons, and (3) maintaining the ability to develop and improve nuclear weapons. Substantial support was found among all three groups for increasing funding for: (1) enhancing nuclear weapons safety; (2) training nuclear weapons personnel; (3) preventing nuclear proliferation; and (4) preventing nuclear terrorism. Most respondents considered nuclear weapons to be a persistent feature of the post-cold war security environment.

  1. Managing nuclear weapons in a changing world: Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    1992-12-31

    The Center for Security and Technology Studies was established at the Lawrence Livermore National Laboratory to support long-range technical studies on issues of importance to US national security. An important goal of the Center is to bring together Laboratory staff and the broader outside community through a program of technical studies, visitors, symposia, seminars, workshops, and publications. With this in mind, the Center and LLNL`s Defense Systems Program sponsored a conference on Managing Nuclear Weapons in a Changing World held on November 17--18,1992. The first day of the meeting focused on nuclear weapons issues in the major geographical areas of the world. On the second day, the conference participants discussed what could be done to manage, control, and account for nuclear weapons in this changing world. Each of the talks and the concluding panel discussion are being indexed as separate documents.

  2. Autonomous Weapon Systems and Risk Management in Hybrid Networks

    DEFF Research Database (Denmark)

    Nørgaard, Katrine

    In recent years, the development of autonomous weapon systems and so-called ‘killer robots’, has caused a number of serious legal and ethical concerns in the international community, including questions of compliance with International Humanitarian Law and the Laws of Armed Conflict. On the other...... hand, governments and military services hope to develop game-changing technologies, that are ‘better, faster and cheaper’. In this paper, I wish to show how different and competing regimes of justification shape the technopolitical controversy and risk management of autonomous weapon systems...

  3. Defense Acquisitions: Assessments of Selected Major Weapon Programs

    Science.gov (United States)

    2006-03-01

    Common Name: C-130 AMPC -130 Avionics Modernization Program (C-130 AMP)The Air Force’s C-130 AMP standardizes the cockpit configurations and avionics for...GAO-06-391 Assessments of Selected Major Weapon Programs Common Name: C-130 AMPC -130 AMP Program Technology Maturity All of the C-130 AMP’s six...Selected Major Weapon Programs Common Name: C-5 AMPC -5 Avionics Modernization Program (C-5 AMP)The Air Force’s C-5 AMP is the first of two major upgrades

  4. Historical Cost Growth of Completed Weapon System Programs

    Science.gov (United States)

    2006-01-01

    Management Program of RAND Project AIR FORCE. The project’s technical monitor is Jay Jordan, Technical Director of the Air Force Cost Analysis Agency. Other...CGFs for development costs range from a low of 1.16 for the nine ship weapon systems reviewed in Asher and Mag- gelet (1984) to a high of 2.26 for six...to procurement) for each weapon system 2.26 (n = 6) 1.43 (n = 6) Not reported Asher and Maggelet (1984) Last SAR for program or December 1983 As of

  5. Automatic Fixture Planning

    Institute of Scientific and Technical Information of China (English)

    1999-01-01

    Fixture planning is a crucial problem in the field of fixture design. In this paper, the research scope and research methods of the computer-aided fixture planning are presented. Based on positioning principles of typical workparts, an ANN algorithm, namely Hopfield algorithm, is adopted for the automatic fixture planning. Also, this paper leads a deep research into the selection of positioning and clamping surfaces (or points) on workparts using positioning-clamping-surface-selecting rules and matrix evaluation of deterministic workpart positioning. In the end of this paper, the methods to select positioning and clamping elements from database and the layout algorithm to assemble the selected fixture elements into a tangible fixture are developed.

  6. 48 CFR 225.7005 - Restriction on certain chemical weapons antidote.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Restriction on certain chemical weapons antidote. 225.7005 Section 225.7005 Federal Acquisition Regulations System DEFENSE... on certain chemical weapons antidote....

  7. 78 FR 55326 - Determinations Regarding Use of Chemical Weapons in Syria Under the Chemical and Biological...

    Science.gov (United States)

    2013-09-10

    ... Determinations Regarding Use of Chemical Weapons in Syria Under the Chemical and Biological Weapons Control and..., 22 U.S.C. 5604(a), that the Government of Syria has used chemical weapons in violation of... Under Secretary of State for Political Affairs: (1) Determined that the Government of Syria has...

  8. 27 CFR 478.133 - Records of transactions in semiautomatic assault weapons.

    Science.gov (United States)

    2010-04-01

    ... semiautomatic assault weapons. 478.133 Section 478.133 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL... AMMUNITION Records § 478.133 Records of transactions in semiautomatic assault weapons. The evidence specified in § 478.40(c), relating to transactions in semiautomatic assault weapons, shall be retained in...

  9. 27 CFR 478.153 - Semiautomatic assault weapons and large capacity ammunition feeding devices manufactured or...

    Science.gov (United States)

    2010-04-01

    ... weapons and large capacity ammunition feeding devices manufactured or imported for the purposes of testing... AMMUNITION Exemptions, Seizures, and Forfeitures § 478.153 Semiautomatic assault weapons and large capacity... weapon, and § 478.40a with respect to large capacity ammunition feeding devices, shall not apply to...

  10. 33 CFR 334.930 - Anaheim Bay Harbor, Calif.; Naval Weapons Station, Seal Beach.

    Science.gov (United States)

    2010-07-01

    ... Weapons Station, Seal Beach. 334.930 Section 334.930 Navigation and Navigable Waters CORPS OF ENGINEERS... Bay Harbor, Calif.; Naval Weapons Station, Seal Beach. (a) The restricted area. The water of Anaheim Bay Harbor between the east and west jetties at the United States Naval Weapons Station, Seal...

  11. 36 CFR 327.13 - Explosives, firearms, other weapons and fireworks.

    Science.gov (United States)

    2010-07-01

    ... weapons and fireworks. 327.13 Section 327.13 Parks, Forests, and Public Property CORPS OF ENGINEERS... ADMINISTERED BY THE CHIEF OF ENGINEERS § 327.13 Explosives, firearms, other weapons and fireworks. (a) The... other weapons is prohibited unless: (1) In the possession of a Federal, state or local law...

  12. 76 FR 23515 - Enhanced Weapons, Firearms Background Checks, and Security Event Notifications

    Science.gov (United States)

    2011-04-27

    ... COMMISSION 10 CFR Part 73 RIN 3150-AI49 Enhanced Weapons, Firearms Background Checks, and Security Event... material and would add new event notification requirements on the theft or loss of enhanced weapons... ``Weapons Safety Assessment'' (76 FR 6087) , the draft Regulatory Guide DG-5020, ``Applying for...

  13. 15 CFR 744.4 - Restrictions on certain chemical and biological weapons end-uses.

    Science.gov (United States)

    2010-01-01

    ... biological weapons end-uses. 744.4 Section 744.4 Commerce and Foreign Trade Regulations Relating to Commerce... and biological weapons end-uses. (a) General prohibition. In addition to the license requirements for... biological weapons in or by any country or destination, worldwide. (b) Additional prohibition on...

  14. 15 CFR Supplement No. 1 to Part 742 - Nonproliferation of Chemical and Biological Weapons

    Science.gov (United States)

    2010-01-01

    ... Biological Weapons No. Supplement No. 1 to Part 742 Commerce and Foreign Trade Regulations Relating to...—Nonproliferation of Chemical and Biological Weapons Note: Exports and reexports of items in performance of...: (i) Equipment (for producing chemical weapon precursors and chemical warfare agents) described...

  15. 27 CFR 478.40 - Manufacture, transfer, and possession of semiautomatic assault weapons.

    Science.gov (United States)

    2010-04-01

    ... possession of semiautomatic assault weapons. 478.40 Section 478.40 Alcohol, Tobacco Products, and Firearms..., transfer, and possession of semiautomatic assault weapons. (a) Prohibition. No person shall manufacture, transfer, or possess a semiautomatic assault weapon. (b) Exceptions. The provisions of paragraph (a)...

  16. 76 FR 6199 - Enhanced Weapons, Firearms Background Checks, and Security Event Notifications

    Science.gov (United States)

    2011-02-03

    ... February 3, 2011 Part II Nuclear Regulatory Commission 10 CFR Part 73 Enhanced Weapons, Firearms Background...-AI49 Enhanced Weapons, Firearms Background Checks, and Security Event Notifications AGENCY: Nuclear... revisions in these implementing regulations that address the voluntary application for enhanced weapons...

  17. 15 CFR 745.2 - End-Use Certificate reporting requirements under the Chemical Weapons Convention.

    Science.gov (United States)

    2010-01-01

    ... requirements under the Chemical Weapons Convention. 745.2 Section 745.2 Commerce and Foreign Trade Regulations... EXPORT ADMINISTRATION REGULATIONS CHEMICAL WEAPONS CONVENTION REQUIREMENTS § 745.2 End-Use Certificate reporting requirements under the Chemical Weapons Convention. Note: The End-Use Certificate requirement...

  18. 49 CFR 1540.111 - Carriage of weapons, explosives, and incendiaries by individuals.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Carriage of weapons, explosives, and incendiaries... § 1540.111 Carriage of weapons, explosives, and incendiaries by individuals. (a) On an individual's... individual may not have a weapon, explosive, or incendiary, on or about the individual's person or...

  19. 78 FR 2214 - Enhanced Weapons, Firearms Background Checks, and Security Event Notifications

    Science.gov (United States)

    2013-01-10

    ...; ] NUCLEAR REGULATORY COMMISSION 10 CFR Part 73 RIN 3150-AI49 Enhanced Weapons, Firearms Background Checks... proposing to further revise its regulations that address the voluntary application for enhanced weapons... for preemption or enhanced weapon authority. Section 161A also mandates that all security...

  20. 41 CFR 102-74.440 - What is the policy concerning weapons on Federal property?

    Science.gov (United States)

    2010-07-01

    ... concerning weapons on Federal property? 102-74.440 Section 102-74.440 Public Contracts and Property... PROPERTY 74-FACILITY MANAGEMENT Conduct on Federal Property Weapons § 102-74.440 What is the policy concerning weapons on Federal property? Federal law prohibits the possession of firearms or other...

  1. Radiological Weapons Control: A Soviet and US Perspective. Occasional Paper 29.

    Science.gov (United States)

    Issraelyan, Victor L.; Flowerree, Charles C.

    Two international diplomats from the Soviet Union and the United States focus on the need for a treaty to ban the use of radiological weapons. Radiological weapons are those based on the natural decay of nuclear material such as waste from military or civilian nuclear reactors. Such devices include both weapons and equipment, other than a nuclear…

  2. Metal Detector Searches: An Effective Means To Help Keep Weapons Out of Schools.

    Science.gov (United States)

    Johnson, Robert S.

    2000-01-01

    Disagrees with Ferraraccio's views and argues that: (1) students do bring illegal weapons to school; (2) metal detectors do detect weapons and help schools to disarm students; (3) disarming students reduces the threat of violence; and (4) courts have repeatedly approved the constitutionality of weapon-related suspicionless student searches…

  3. Nuclear Energy, Nuclear Weapons Proliferation, and the Arms Race.

    Science.gov (United States)

    Hollander, Jack, Ed.

    A symposium was organized to reexamine the realities of vertical proliferation between the United States and the Soviet Union and to place into perspective the horizontal proliferation of nuclear weapons throughout the world, including the possible role of commercial nuclear power in facilitating proliferation. The four invited symposium…

  4. Mitigation and propagation of sound generated by heavy weapons

    NARCIS (Netherlands)

    Berg, F. van den; Eerden, F.J.M. van der

    2011-01-01

    Much environmental research is performed on predicting the noise impact of heavy weapons or explosives, as the shock waves can propagate over large distances. In the densely populated area of the Netherlands this is of particular interest for the Ministry of Defense. In one research program the miti

  5. Shipborne Laser Beam Weapon System for Defence against Cruise Missiles

    Directory of Open Access Journals (Sweden)

    J.P. Dudeja

    2000-04-01

    Full Text Available Sea-skim~ing cruise missiles pose the greatest threat to a surface ship in the present-day war scenario. The convenitional close-in-weapon-systems (CIWSs are becoming less reliable against these new challenges requiring extremely fast reaction time. Naval Forces see a high energy laser as a feasible andjeffective directed energy weapon against sea-skimming antiship cruise missiles becauseof its .ability to deliver destructive energy at the speed of light on to a distant target. The paper comparesthe technology and capability of deuterium fluoride (DF and chemical-oxygen-iodine laser (COIL in effectively performing the role of a shipborne CIWS altainst sea-skimming missiles. Out of these twolasers, it is argued that DF laser wo.uld be more effective a,s a shipborne weapon for defence against sea-skimmin,g cruise missiles. Besides the high energy laser as the primary (killing laser, othersub-systems required in the complete weapon system would be: A beacon laser to sense phase distor'ions in the primary laser, adaptive optics to compensate the atmospheric distortions, beam-directing optics, illuminating lasers, IRST sensors, surveillance and tracking radars, interfacing system, etc.

  6. An overview of the future of non-lethal weapons.

    Science.gov (United States)

    Alexander, J B

    2001-01-01

    During the past decade, vast changes have occurred in the geopolitical landscape and the nature of the types of conflicts in which technologically developed countries have been involved. While the threat of conventional war remains, forces have been more frequently deployed in situations that require great restraint. Adversaries are often likely to be elusive and commingled with noncombatants. There has been some shift in public opinion away from tolerance of collateral casualties. Therefore there is a need to be able to apply force while limiting casualties. Non-lethal weapons provide part of the solution. Among the changes that will influence the future have been studies by the US and NATO concerning the use of non-lethal weapons, coincidental with increased funding for their development and testing. New concepts and policies have recently been formalized. Surprisingly, the most strident objections to the implementation of non-lethal weapons have come from organizations that are ostensibly designed to protect non-combatants. These arguments are specious and, while technically and academically challenging, actually serve to foster an environment that will result in the deaths of many more innocent civilians. They misconstrue technology with human intent. The reasons for use of force will not abate. Alternatives to bombs, missiles, tanks and artillery must therefore be found. Non-lethal weapons are not a panacea but do offer the best hope of minimizing casualties while allowing nations or alliances the means to use force in protection of national or regional interests.

  7. Veteran Transfer Students and Concealed Weapons on Campus

    Science.gov (United States)

    Pesetski, Christine; Ofstein, Jennifer; Outlaw, Stacy; Brooks, Racheal

    2014-01-01

    This case details the challenges faced by various members of a 4-year university regarding Kathryn, a non-traditional transfer student and military veteran who recently returned from a traumatic deployment in Afghanistan. Precisely, this study identifies ambiguities pertaining to (a) threat assessment, (b) university weapons policies, (c) transfer…

  8. A proposal for the classification of biological weapons sensu lato.

    Science.gov (United States)

    Rozsa, Lajos

    2014-12-01

    Due to historical and legislation reasons, the category of bioweapons is rather poorly defined. Authors often disagree on involving or excluding agents like hormones, psychochemicals, certain plants and animals (such as weeds or pests) or synthetic organisms. Applying a wide definition apparently threatens by eroding the regime of international legislation, while narrow definitions abandon several important issues. Therefore, I propose a category of 'biological weapons sensu lato' (BWsl) that is defined here as any tool of human aggression whose acting principle is based on disciplines of biology including particularly microbiology, epidemiology, medical biology, physiology, psychology, pharmacology and ecology, but excluding those based on inorganic agents. Synthetically produced equivalents (not necessarily exact copies) and mock weapons are also included. This definition does not involve any claim to subject all these weapons to international legislation but serves a purely scholarly purpose. BWsl may be properly categorized on the base of the magnitude of the human population potentially targeted (4 levels: individuals, towns, countries, global) and the biological nature of the weapons' intended effects (4 levels: agricultural-ecological agents, and non-pathogenic, pathogenic, or lethal agents against humans).

  9. Joseph A. Burton Forum Award: Some Nuclear Weapons Dilemmas

    Science.gov (United States)

    May, Michael

    2014-03-01

    Nuclear weapons pose a combination of political and ethical dilemmas the solution to which has not been found. On one hand, in the view of both US government leaders and US allies, nuclear deterrence continues to play an essential part in the US role as the ultimate source of military strength for the alliances among the major democratic countries. It also continues to be in demand by countries that believe themselves to be isolated and threatened. On the other hand, nuclear weapons, besides being effective deterrents, can cause unprecedented loss of life and risk the demise of civilizations. No ban or technical precaution could prevent the rebuilding of nuclear weapons in a crisis. No diplomatic arrangement to date has erased the threat of invasion and war in the world. Only the abandonment of war and the threat of war as instruments of policy can make nuclear weapons obsolete. The slow, halting, risky road to that end remains the only hope for a world in which lasting solutions to the nuclear dilemmas are possible.

  10. The Anti-Satellite (ASAT) Weapon Problem And Congress

    Science.gov (United States)

    Treglio, James R.

    1984-08-01

    An amendment to the 1984 Defense Authorization Act prevents testing against objects in space of an American F-15 launched anti-satellite weapon until the President certifies that the testing is necessary to prevent harm to the national security, and that he is willing to negotiate an ASAT treaty with the Soviet Union. This extraordinary action by the Congress was taken because many members of Congress feared that the weapon was being developed without due consideration for its impact on arms control, that temporary technical superiority was being given greater importance than the long-term security of the nation. This increased Congressional scrutiny could have an impact on future weapons development programs. "Now a crucial moment is really coming: Either the interested parties will sit down at the negotiating table without delay to begin drawing up a treaty prohibiting the placement in space of weapons of any kind, or the arms race will spill over into space." YURI ANDROPOV, April 28, 1983, in response to petition from American Scientists.

  11. Supply Chain Resilience: Assessing USAF Weapon System Life Cycle

    Science.gov (United States)

    2010-03-01

    Appendix E: Supply Chain Resilience Storyboard ........................................................... 87 Bibliography...bolt that, in March 2000, struck a Philips semiconductor plant in Albuquerque, New Mexico , created a 10-minute blaze that contaminated millions of...strategic planning of weapon systems as they mature and progress through the life cycle. 87 Appendix E: Supply Chain Resilience Storyboard 88

  12. The Russian biological weapons program: vanished or disappeared?

    Science.gov (United States)

    Shoham, Dany; Wolfson, Ze'ev

    2004-01-01

    The legacy and arsenal of biological weapons Russia inherited from USSR in 1991 became a lingering unsolved issue, in terms of a prime strategic arm that ought to be eliminated, advisably, in accordance with the Biological Weapons Convention Russia is committed to, and considering further undertakings and declarations made by the Russian regime. Indeed, that inheritance was created by USSR as a powerful, highly sophisticated component of utmost importance within the Soviet military paradigm, based on a wide spectrum of virulent, stabilized pathogens and toxins plus delivery systems. Moreover, remarkably advanced biotechnologies were thus applied to procure stockpiles of military-grade pathogens and toxins. Yet, an intriguing debate aroused with regard to the extent of the weaponized biological inventory accumulated by USSR, as well as the in effect attitude of Russia towards perpetuating or wiping out that inheritance. It turned out to form a far reaching and challenging complexity, both strategically and scientifically. The present study concentrates on the strategic as well as scientific spheres shaping that overall issue at large, attempting to thoroughly analyze it through an innovative methodology. One main conclusion thereby reached at is that the Russian military still poses a potential menance, in terms of both stockpiled, probably deployable biological weapons, and prevailing production capacities.

  13. Are Weapons Searches in the Job Descriptions of Instructional Leaders?

    Science.gov (United States)

    Zimmerman, Judith A.

    2005-01-01

    In this article, the author poses the question "Are weapons searches in the job descriptions of instructional leaders?" which brings to attention changing duties of school principals that were not faced by previous generations. The article reports observations made during time spent with a current high school principal.

  14. Is (-)-Catechin a "Novel Weapon" of Spotted Knapweed (Centaurea stoebe)?

    Science.gov (United States)

    The “novel weapons” hypothesis states that some invasive weed species owe part of their success as invaders to allelopathy mediated by allelochemicals that are new to the native species. Presumably, no resistance has evolved among the native species to this new allelochemical (i.e. the novel weapon...

  15. Power Systems and Energy Storage Modeling for Directed Energy Weapons

    Science.gov (United States)

    2014-06-01

    electron laser kW Kilo-watt LCS Littoral Combat Ship LAWS Laser Weapon System MLD Maritime Laser Demonstration MW Mega -watt NiMH Nickel metal...and various littoral combat ships. Also, an accurate, working model of the capacitor energy bank is being developed and the flywheel model is being

  16. Proceedings of the Tungsten Workshop for Hard Target Weapons Program

    Energy Technology Data Exchange (ETDEWEB)

    Mackiewicz-Ludtka, G.; Hayden, H.W.; Davis, R.M.

    1995-06-01

    The purpose of this meeting was to review and exchange information and provide technical input for improving technologies relevant to the Hard Target Weapons Program. This workshop was attended by representatives from 17 organizations, including 4 Department of Defense (DoD) agencies, 8 industrial companies, and 5 laboratories within DOE. Hard targets are defined as reinforced underground structures that house enemy forces, weapon systems, and support equipment. DOE-ORO and Martin Marietta Energy Systems, Inc. (Energy Systems) have been involved in advanced materials research and development (R&D) for several DOE and DoD programs. These programs are conducted in close collaboration with Eglin AFB, Department of the Army`s Picatinny Arsenal, and other DoD agencies. As part of this ongoing collaboration, Eglin AFB and Oak Ridge National Laboratory planned and conducted this workshop to support the Hard Target Weapons Program. The objectives of this workshop were to (1) review and identify the technology base that exists (primarily due to anti-armor applications) and assess the applicability of this technology to the Hard Target Weapons Program requirements; (2) determine future directions to establish the W materials, processing, and manufacturing technologies suitable for use in fixed, hard target penetrators; and (3) identify and prioritize the potential areas for technical collaboration among the participants.

  17. North Korea, Nuclear Weapons, and No Good Options?

    DEFF Research Database (Denmark)

    Cohen, Michael David

    2013-01-01

    How would Pyongyang’s development of the capability to target the United States with nuclear weapons influence North Korea’s foreign policy? I argue that it would cause more dangerous crises than those of the last decade, and predict that these crises would eventually cause Kim Jong Un and his se...

  18. Smart Weapons - Can We Fold the Nuclear Umbrella

    Science.gov (United States)

    1991-12-17

    However, as a weapon of mass destruction, they present unique doctrina ! problems. Doctrine must address not only their military utility, but their...p. 3. 3. Ibid., p. 4. 4. United States Army TRADOC Regulation 525-58 (Final Draft), Airland Operations, Fort Monroe , VA, 1991, p. 3. 5. Buckley

  19. The role of nuclear weapons in the year 2000

    Energy Technology Data Exchange (ETDEWEB)

    1990-01-01

    This publication presents the proceedings for the workshop, The Role of Nuclear Weapons in the Year 2000, held on October 22--24, 1990. The workshop participants considered the changing nature of deterrence and of our strategic relationship with the Soviet Union, the impact of nuclear proliferation on regional conflicts, and ways that the nuclear forces might be restructured to reflect new political circumstances.

  20. Automatic aircraft recognition

    Science.gov (United States)

    Hmam, Hatem; Kim, Jijoong

    2002-08-01

    Automatic aircraft recognition is very complex because of clutter, shadows, clouds, self-occlusion and degraded imaging conditions. This paper presents an aircraft recognition system, which assumes from the start that the image is possibly degraded, and implements a number of strategies to overcome edge fragmentation and distortion. The current vision system employs a bottom up approach, where recognition begins by locating image primitives (e.g., lines and corners), which are then combined in an incremental fashion into larger sets of line groupings using knowledge about aircraft, as viewed from a generic viewpoint. Knowledge about aircraft is represented in the form of whole/part shape description and the connectedness property, and is embedded in production rules, which primarily aim at finding instances of the aircraft parts in the image and checking the connectedness property between the parts. Once a match is found, a confidence score is assigned and as evidence in support of an aircraft interpretation is accumulated, the score is increased proportionally. Finally a selection of the resulting image interpretations with the highest scores, is subjected to competition tests, and only non-ambiguous interpretations are allowed to survive. Experimental results demonstrating the effectiveness of the current recognition system are given.

  1. Automatic Kurdish Dialects Identification

    Directory of Open Access Journals (Sweden)

    Hossein Hassani

    2016-02-01

    Full Text Available Automatic dialect identification is a necessary Lan guage Technology for processing multi- dialect languages in which the dialects are linguis tically far from each other. Particularly, this becomes crucial where the dialects are mutually uni ntelligible. Therefore, to perform computational activities on these languages, the sy stem needs to identify the dialect that is the subject of the process. Kurdish language encompasse s various dialects. It is written using several different scripts. The language lacks of a standard orthography. This situation makes the Kurdish dialectal identification more interesti ng and required, both form the research and from the application perspectives. In this research , we have applied a classification method, based on supervised machine learning, to identify t he dialects of the Kurdish texts. The research has focused on two widely spoken and most dominant Kurdish dialects, namely, Kurmanji and Sorani. The approach could be applied to the other Kurdish dialects as well. The method is also applicable to the languages which are similar to Ku rdish in their dialectal diversity and differences.

  2. Electronic amplifiers for automatic compensators

    CERN Document Server

    Polonnikov, D Ye

    1965-01-01

    Electronic Amplifiers for Automatic Compensators presents the design and operation of electronic amplifiers for use in automatic control and measuring systems. This book is composed of eight chapters that consider the problems of constructing input and output circuits of amplifiers, suppression of interference and ensuring high sensitivity.This work begins with a survey of the operating principles of electronic amplifiers in automatic compensator systems. The succeeding chapters deal with circuit selection and the calculation and determination of the principal characteristics of amplifiers, as

  3. The Automatic Telescope Network (ATN)

    CERN Document Server

    Mattox, J R

    1999-01-01

    Because of the scheduled GLAST mission by NASA, there is strong scientific justification for preparation for very extensive blazar monitoring in the optical bands to exploit the opportunity to learn about blazars through the correlation of variability of the gamma-ray flux with flux at lower frequencies. Current optical facilities do not provide the required capability.Developments in technology have enabled astronomers to readily deploy automatic telescopes. The effort to create an Automatic Telescope Network (ATN) for blazar monitoring in the GLAST era is described. Other scientific applications of the networks of automatic telescopes are discussed. The potential of the ATN for science education is also discussed.

  4. The singular weapon. What remains from the atomic age?; Die Singulaere Waffe. Was bleibt vom Atomzeitalter?

    Energy Technology Data Exchange (ETDEWEB)

    Eisenbart, Constanze (ed.) [Forschungsstaette der Evangelischen Studiengemeinschaft (FEST), Heidelberg (Germany)

    2012-07-01

    The book contains the following contributions: Why do we talk about the atomic age? The language of the atomic myth - comments to a protestant debate. Nuclear singularity between fiction and reality. Only one can get through: military singularity of nuclear weapons. Physical singularity of nuclear weapons. Nuclear weapons test and fall-out. Quantitative disarmament and qualitative rearmament. Do mini nukes neutralize the singularity? The vulnerability of the industrial society by the nuclear electromagnetic momentum. Nuclear weapons as national status symbol - the example of India. The general regulations of international laws and the singularity of nuclear weapons. The construction of normative singularity - development and change of the nuclear taboo.

  5. Weapon Possession Among College Students: A Study From a Midwestern University.

    Science.gov (United States)

    Jang, Hyunseok; Kang, Ji Hyon; Dierenfeldt, Rick; Lindsteadt, Greg

    2015-10-01

    Weapon possession on college campuses causes great concern, but there remains a lack of research examining the determinants of this phenomenon. Previous studies addressing weapon possession have primarily focused on either K-12 or the general adult population. Unlike previous studies, this study examined the weapon possession among college students using data collected from a mid-sized university in Missouri, and 451 students participated. Weapon possession and other theoretical factors were measured through the self-administered survey. Logistical regression analysis revealed that weapon socialization was the most significant factor in predicting student weapon carrying. Also, gender and age were significant factors in explaining campus-based weapon possession. This research has a limitation with generalizability because the data were collected from only a single university with convenient sampling. Future studies need to cover a wider range of college students from a variety of different universities with random sampling.

  6. Clothes Dryer Automatic Termination Evaluation

    Energy Technology Data Exchange (ETDEWEB)

    TeGrotenhuis, Ward E.

    2014-10-01

    Volume 2: Improved Sensor and Control Designs Many residential clothes dryers on the market today provide automatic cycles that are intended to stop when the clothes are dry, as determined by the final remaining moisture content (RMC). However, testing of automatic termination cycles has shown that many dryers are susceptible to over-drying of loads, leading to excess energy consumption. In particular, tests performed using the DOE Test Procedure in Appendix D2 of 10 CFR 430 subpart B have shown that as much as 62% of the energy used in a cycle may be from over-drying. Volume 1 of this report shows an average of 20% excess energy from over-drying when running automatic cycles with various load compositions and dryer settings. Consequently, improving automatic termination sensors and algorithms has the potential for substantial energy savings in the U.S.

  7. Automatic Coarse Graining of Polymers

    OpenAIRE

    Faller, Roland

    2003-01-01

    Several recently proposed semi--automatic and fully--automatic coarse--graining schemes for polymer simulations are discussed. All these techniques derive effective potentials for multi--atom units or super--atoms from atomistic simulations. These include techniques relying on single chain simulations in vacuum and self--consistent optimizations from the melt like the simplex method and the inverted Boltzmann method. The focus is on matching the polymer structure on different scales. Several ...

  8. Automatic Sarcasm Detection: A Survey

    OpenAIRE

    Joshi, Aditya; Bhattacharyya, Pushpak; Carman, Mark James

    2016-01-01

    Automatic sarcasm detection is the task of predicting sarcasm in text. This is a crucial step to sentiment analysis, considering prevalence and challenges of sarcasm in sentiment-bearing text. Beginning with an approach that used speech-based features, sarcasm detection has witnessed great interest from the sentiment analysis community. This paper is the first known compilation of past work in automatic sarcasm detection. We observe three milestones in the research so far: semi-supervised pat...

  9. Prospects for de-automatization.

    Science.gov (United States)

    Kihlstrom, John F

    2011-06-01

    Research by Raz and his associates has repeatedly found that suggestions for hypnotic agnosia, administered to highly hypnotizable subjects, reduce or even eliminate Stroop interference. The present paper sought unsuccessfully to extend these findings to negative priming in the Stroop task. Nevertheless, the reduction of Stroop interference has broad theoretical implications, both for our understanding of automaticity and for the prospect of de-automatizing cognition in meditation and other altered states of consciousness.

  10. The automatization of journalistic narrative

    Directory of Open Access Journals (Sweden)

    Naara Normande

    2013-06-01

    Full Text Available This paper proposes an initial discussion about the production of automatized journalistic narratives. Despite being a topic discussed in specialized sites and international conferences in communication area, the concepts are still deficient in academic research. For this article, we studied the concepts of narrative, databases and algorithms, indicating a theoretical trend that explains this automatized journalistic narratives. As characterization, we use the cases of Los Angeles Times, Narrative Science and Automated Insights.

  11. Process automatization in system administration

    OpenAIRE

    Petauer, Janja

    2013-01-01

    The aim of the thesis is to present automatization of user management in company Studio Moderna. The company has grown exponentially in recent years, that is why we needed to find faster, easier and cheaper way of man- aging user accounts. We automatized processes of creating, changing and removing user accounts within Active Directory. We prepared user interface inside of existing application, used Java Script for drop down menus, wrote script in scripting programming langu...

  12. 78 FR 67289 - Continuation of the National Emergency With Respect to the Proliferation of Weapons of Mass...

    Science.gov (United States)

    2013-11-12

    ... Emergency With Respect to the Proliferation of Weapons of Mass Destruction On November 14, 1994, by... proliferation of nuclear, biological, and chemical weapons (weapons of mass destruction) and the means of delivering such weapons. On July 28, 1998, the President issued Executive Order 13094 amending...

  13. 75 FR 27854 - 30-Day Notice of Proposed Information Collection: DS-4048, Projected Sales of Major Weapons in...

    Science.gov (United States)

    2010-05-18

    ... Notice of Proposed Information Collection: DS-4048, Projected Sales of Major Weapons in Support of... Major Weapons in Support of Section 25(a)(1) of the Arms Export Control Act. OMB Control Number: 1405... projected sales of major weapons and weapons-related defense equipment (if $7M or more) and...

  14. The Use of Chemical Weapons in the Syrian Conflict

    Directory of Open Access Journals (Sweden)

    René Pita

    2014-07-01

    Full Text Available This paper aims at explaining the lessons learned from the chemical attacks that took place in 2013 in the Syrian military conflict, especially the sarin attacks on the Ghouta area of Damascus on August 21. Despite the limitations the UN Mission found while investigating the use of chemical weapons (CW in Syria, some interesting conclusions for the scientific and medical community can be obtained from its reports. These include the advantages of the Chemical Weapons Convention procedure for the investigation of alleged CW use, when compared with the United Nations mechanism for similar investigations, the difficulties of differential diagnosis based only on clinical signs and symptoms and the impact of secondary contamination when responding to a CW attack.

  15. [Contact neck gunshot wound without weapon--suicide or homicide?].

    Science.gov (United States)

    Tributsch, W; Ambach, E; Henn, R

    1992-01-01

    To support police in reenacting criminal acts is one of the most important functions of forensic investigation. This case report deals with the discovery of the corpse of a 42-year old man at the bank of the river Inn. First of all the man was supposed to be drowned, but the autopsy showed a gunshot wound of the neck and a shot-through of the brain-stem. Intensive search for the weapon by the police and by divers was unsuccessful and therefore suspicion of homicide arose. The reconstruction of the act at the site of discovery of the corpse led to the discovery of the weapon and the case became clear to be a suicide.

  16. [Medical aspects of common non-lethal weapons].

    Science.gov (United States)

    Kunz, Sebastian Niko; Grove, Christina; Monticelli, Fabio

    2014-03-01

    The development and provision of non-lethal weapons (NLW) allow military and law enforcement personnel to exploit gradual engagement in countering potentially hazardous threats. Chemical, kinetic and electrical weapons systems are used to curb violence in civilian crowds. With inappropriate usage, these technologies can cause potentially fatal injuries that are not only of clinical, but also of legal relevance. In this context, the practicing physician is faced with treatment as well as assessment issues of new forms of injuries. In order to assure medical care and to be able to draw competent expert's conclusions, a detailed knowledge of the medical effects of these NLW is necessary. The review at hand presents today's most popular NLW and gives an overview of their possible injury potential and required treatments.

  17. Crystalline ceramics: Waste forms for the disposal of weapons plutonium

    Energy Technology Data Exchange (ETDEWEB)

    Ewing, R.C.; Lutze, W. [New Mexico Univ., Albuquerque, NM (United States); Weber, W.J. [Pacific Northwest Lab., Richland, WA (United States)

    1995-05-01

    At present, there are three seriously considered options for the disposition of excess weapons plutonium: (i) incorporation, partial burn-up and direct disposal of MOX-fuel; (ii) vitrification with defense waste and disposal as glass ``logs``; (iii) deep borehole disposal (National Academy of Sciences Report, 1994). The first two options provide a safeguard due to the high activity of fission products in the irradiated fuel and the defense waste. The latter option has only been examined in a preliminary manner, and the exact form of the plutonium has not been identified. In this paper, we review the potential for the immobilization of plutonium in highly durable crystalline ceramics apatite, pyrochlore, monazite and zircon. Based on available data, we propose zircon as the preferred crystalline ceramic for the permanent disposition of excess weapons plutonium.

  18. Individual Combatant’s Weapons Firing Algorithm Phase 1

    Science.gov (United States)

    2010-06-01

    supporting the USMC Virtual Technolgies Environment Program. This scenario is typical building clearing scenario that was designed by USMC SME. It may be...d. Wall Breaching. Wall breaching is a common combat task in built-up areas for which light recoilless ons can be used. Breachin mobil access to...to create loopholes for weapons positions or to allow hand grenades to be thrown into defended structures. Breaching holes for unit mobility should

  19. Nuclear energy in a nuclear weapon free world

    Energy Technology Data Exchange (ETDEWEB)

    Pilat, Joseph [Los Alamos National Laboratory

    2009-01-01

    The prospect of a nuclear renaissance has revived a decades old debate over the proliferation and terrorism risks of the use of nuclear power. This debate in the last few years has taken on an added dimension with renewed attention to disarmament. Increasingly, concerns that proliferation risks may reduce the prospects for realizing the vision of a nuclear-weapon-free world are being voiced.

  20. Stealing the Sword: Limiting Terrorist Use of Advanced Conventional Weapons

    Science.gov (United States)

    2007-01-01

    sniper rifles and their accessories and advanced ammunition. For those weapons, only awareness and the precautions taken by security forces can...Qa’idat AI-Jihad fi Bilad al-Rafidayn Revolutionary Armed Forces of Colombia (FARC) al-Fatah Moro Islamic Liberation Front (MILF) Liberation Tigers of...a small terrorist cell that had to raise operational funds on its own. 14 For additional discussion of counterstrategies, see Jackson, Chalk, et al

  1. Advanced Naval Surface fire support weapon employment against mobile targets

    OpenAIRE

    Le, Hung B.

    1999-01-01

    Approved for public release; distribution is unlimited Key threat trends have identified shortfalls in Naval Surface Fire Support (NSFS), a mission area that is undergoing rapid evolution. The Navy's ability to effectively provide sea-based fire support to ground forces is profoundly challenged by mobile and reduced dwell time targets. Furthermore, longer range enemy weapon systems, which must be destroyed at greater ranges prior to their engagement of friendly forces, will make NSFS timel...

  2. Optimizing the Sustainment of U.S. Army Weapon Systems

    Science.gov (United States)

    2016-03-17

    64 OPTIMIZING SUSTAINMENT OF ARMY SYSTEMS 6 Chapter 1 - Optimizing the Sustainment of U.S. Army Weapon Systems In a paradigm shift from...past 13 years. The result has been the erosion of perishable maintenance skills. The Army must develop the most effective plan to sustain these...communities to study and effectively manage Army sustainment . One effort is the development of Maintenance Steering Groups (MSG) to perform extensive

  3. An overview of weapons technologies used to improve US healthcare

    Energy Technology Data Exchange (ETDEWEB)

    Fahrenholtz, J.; Kovarik, T.L.

    1995-05-01

    At Sandia National Laboratories the Biomedical Engineering Program uses existing weapons-related technology in medical applications in order to reduce health care costs, improve diagnoses, and promote efficient health care delivery. This paper describes several projects which use Sandia technologies to solve biomedical problems. Specific technical capabilities that are important to this program include sensor data interpretation, robotics, lasers and optics, microelectronics, image processing and materials.

  4. Chemical Demilitarization Assembled Chemical Weapons Alternatives (Chem Demil-ACWA)

    Science.gov (United States)

    2015-12-01

    access machines , two (2) rocket cutting and shearing lines, two (2) neutralization system sampling stations, and three (3) Supercritical Water Oxidation...Selected Acquisition Report (SAR) RCS: DD-A&T(Q&A)823-243 Chemical Demilitarization-Assembled Chemical Weapons Alternatives (Chem Demil-ACWA) As...Abbreviations for MDAP Programs Acq O&M - Acquisition-Related Operations and Maintenance ACAT - Acquisition Category ADM - Acquisition Decision

  5. Non-Lethal Weapons: Opportunities for R&D

    Science.gov (United States)

    2004-12-01

    1400 Wavelength (nm) 106 Reference line Cataract Erythema Photokeratitis Corneal burns Retinal burns Thermal skin burns 315280 30000 28 Figure 4... pigmentation of the skin (dark skin absorbs more). 5 Advantages and disadvantages of laser weapons One of the greatest advantages of the laser beam...phased array antennas, one HPMW could defend a ship against a concerted attack of many missiles, at least against those approaching from a fixed

  6. The Basics of Electric Weapons and Pulsed-Power Technologies

    Science.gov (United States)

    2012-01-01

    shown in Figure 2. Electrical energy can be stored in many ways, such as a battery (actually a chemical storage ). A car battery has about a...becomes less attractive. Energy storage for electric weapons can also be done with chem- ical explosive energy , where an explosive force is converted...into electrical energy using techniques such as flux compression. Energy can be stored in the inertia of rotating machines and flywheels , but the

  7. The bioscience revolution & the biological weapons threat: levers & interventions

    Directory of Open Access Journals (Sweden)

    Martin Greg

    2009-02-01

    Full Text Available Abstract In December 2008, the US Commission on the Prevention of Weapons of Mass Destruction Proliferation and Terrorism, released a report, World At Risk. The Report points to the fact that, not only is the use of a weapon of mass destruction in a terrorist attack before the end of 2013, more likely than not, but also to the fact that terrorists are more likely to be able to obtain and use biological weapons than nuclear. This paper examines the recommendations of the report in the context of the historic and geopolitical changes, in particular globalization. The authors highlight the "dual-use" dilemma, as described in the report, as the paradoxical use of technology developed for the benefit of mankind being used for sinister purposes. The mitigation of such a threat lies in broad stakeholder involvement and cooperation, including non-state actors, governments and the bio-tech industry itself. The importance of vigilance measures within the life science community is emphasized and, the authors propose, could include a web-based didactic course in bioterrorism and weapons of mass destruction identification. The site could outline safety protocols, have detailed disaster management tutorials, and could be specifically tailored for different subsets of industry and health professionals. The paper concludes with an endorsement of a multi-pronged approach including strong international guidelines and intelligence cooperation and preparatory measures such as the wide-spread use of detection systems as well as diagnostic decision support systems for bioterrorism detection at the local level.

  8. The sacred weapon: bow and arrow combat in Iran

    Directory of Open Access Journals (Sweden)

    Manouchehr Moshtagh Khorasani

    2012-07-01

    Full Text Available The following article presents the development of the bow and arrow, and its important role in the history of Iran. The bow always played an important role not only on the battlefield, but also in hunting. It was also considered as a sacred weapon and additionally a royal symbol. Bow and arrow were considered as a superior weapon in comparison with other types of weapons because one could fight with them at a safer distance as one offered by swords, maces and axes. The first part of the article presents a short history of the bow in Iran. Based on historical Persian manuscripts, the next part explains the structure of the composite bow and the materials used for making it. The third part describes some types of bows based on the material, place of production, the usage, and bow type based on the length of the bow and the arrows. The following part talks about different types of arrows based on morphology of arrowheads, the type of plume/feather, the material of the shaft, the material of the arrowhead, the length of arrows, the target of arrows, the place of production of arrowheads and terms for describing its different features of an arrowhead. Then, the article talks about different types of thumb rings, bowstrings, quivers and bow cases and arrow guides for shooting short arrows. The next part discusses different principles of archery as explained in Persian manuscripts. Finally the article describes different archery targets.

  9. Depleted-Uranium Weapons the Whys and Wherefores

    CERN Document Server

    Gsponer, A

    2003-01-01

    The only military application in which present-day depleted-uranium (DU) alloys out-perform tungsten alloys is long-rod penetration into a main battle-tank's armor. However, this advantage is only on the order of 10% and disappearing when the comparison is made in terms of actual lethality of complete anti-tank systems instead of laboratory-type steel penetration capability. Therefore, new micro- and nano-engineered tungsten alloys may soon out-perform existing DU alloys, enabling the production of tungsten munition which will be better than uranium munition, and whose overall life-cycle cost will be less due to the absence of the problems related to the radioactivity of uranium. The reasons why DU weapons have been introduced and used are analysed from the perspective that their radioactivity must have played an important role in the decision making process. It is found that DU weapons belong to the diffuse category of low-radiological-impact nuclear weapons to which emerging types of low-yield, i.e., fourth...

  10. Concepts on the fields and weapons of the competition model

    Directory of Open Access Journals (Sweden)

    Jose Celso Contador

    2008-01-01

    Full Text Available Up to now, the Fields and Weapons of the Competition Model has been publicized as a theoretical framework for many studies and, as such, it has appeared in a fragmented manner. Due to the level of consolidation the model has achieved, now is the time to present it integrally, so as to expose it to the appreciation of the scientific community dedicated to Corporate Strategy. Belonging to the Competitiveness theory and having scientific validity, the model is both qualitative and quantitative, and therefore presents some advantages over Porter’s model, as well as over the RBV and the Balanced Scorecard models. A simple idea has originated it: according to the customer’s interest, separating the so-called competitive advantages, so as to sort out those that interest him/her from those that do not. The first group consists of the fields of the competition; the latter corresponds to the weapons of the competition. The fields of the competition relate to the business´ competitive strategy, and the weapons of the competition related to the operational competitive strategies. This is the first of a series of three articles.

  11. Analysis of the design concept of 'Nora' family artillery weapons

    Directory of Open Access Journals (Sweden)

    Anastas L. Paligorić

    2011-10-01

    Full Text Available The development of the NORA family started as far as back to 1976 at the Military Technical Institute of the Yugoslav's People's Army. The programme covered development of several types of the main artillery weapon: the 152 mm NORA-A towed gun-howitzer, the 152 mm NORA-B self-propelled gun-howitzer and the 152 mm gun-howitzer with APU. Under the same programme, the conversion of the Russian 130 mm towed gun M46 into the 155 mm M46/84 gun (for export needs and the 152 mm M46/86 gun respectively (for the needs of the YPA was completed. Only the 152 mm M84 (NORA-A towed howitzer was introduced in service, while the development of the NORA-B and NORA-C weapons was carried on until 1992. After it had been suspended for many years, the development of the NORAB weapon was continued in 2003, followed by serial production of the 155 mm NORA-B52 self-propelled system for the export needs.

  12. Manual for national implementation of the Chemical Weapons Convention

    Energy Technology Data Exchange (ETDEWEB)

    Kellman, B. [DePaul Univ., Chicago, IL (United States); Tanzman, E.A.; Gualtieri, D.S.; Grimes, S.W. [Argonne National Lab., IL (United States)

    1993-12-01

    The Convention on the Prohibition on the Development, Production, Stockpiling and Use of Chemical Weapons and on their Destruction, opened for signature, January 13, 1993, in Paris, France (CWC), is an unprecedented multilateral effort to eradicate an entire category of weapons of mass destruction and assure their continued absence through international verification. The CWC has been signed by over 150 nations, and is expected to enter into force in 1995. With its far-reaching system to verify compliance, the CWC presages a new foundation for international security based neither on fear nor on trust, but on the rule of law. A central feature of the CWC is that it requires each State Party to take implementing measures to make the Convention operative. The CWC goes beyond all prior arms control treaties in this regard. For this approach to succeed, and to inspire the eradication of other categories of mass destruction weaponry, coordination and planning are vital to harmonize CWC national implementation among States Parties. This Manual for National Implementation of the Chemical Weapons Convention is designed to assist States Parties, duly taking into account the distinctive aspects of their legal systems, in maximizing CWC enforcement consistent with their national legal obligations.

  13. Re-examining the 1996 ICJ Advisory Opinion: Concerning the Legality of Nuclear Weapons

    Directory of Open Access Journals (Sweden)

    Jasjit Singh

    2012-10-01

    Full Text Available The primary objections raised against total elimination of nuclear weapons are built around a few arguments mostly of non-technical nature.Nuclear weapons and the strategies for their use have resulted in the establishment of a vicious circle within which the international community is trapped.The argument that the world will be unsafe without nuclear weapons is only meant to further the narrow self-interest of the nuclear weapon states and their allies.The World Court’s far-reaching 1996 advisory opinion concluded that almost any use or threat of use of nuclear weapons would violate international humanitarian law and law applicable in armed conflict, undermining most claims of nuclear weapon states regarding the legitimacy of possession, use or threat of use of nuclear weapons. The next logical step would be an initiative for a nuclear convention banning the use and threat of use of nuclear weapons in Asia and the adjoining oceans. But as long as the dominant elites in society and the nation-state believe in the utility of nuclear weapons for national security or as the currency of power, abolition of nuclear weapons will remain a mirage.

  14. CURRENT ISSUES IN THE RESEARCH OF COLD STEEL ARMS AND THROWING WEAPONS AND THEIR TRACES

    Directory of Open Access Journals (Sweden)

    Meretukov G. M.

    2016-05-01

    Full Text Available The authors of the article point out that the research of cold steel arms and their traces has been considered in detail in the studies of different criminologists. Unfortunately, many scientists, examining cold steel arms as the item of expertise, mainly paid attention to the knives, swords, daggers, etc., but few researchers considered crossbows as cold steel weapon. In accordance with part. 4 Art. 223 of the Criminal Code of Russia for illegal manufacture, alteration or repair of throwing weapons, as well as the illegal sale of throwing weapons (Art. 4, Art. 222 of the Criminal Code, criminal liability is stipulated. Thus, the authors agree with the opinions expressed in the literature according to which attention should be paid to the fuzzy wording of p. 4 Art. 222 of the Criminal Code and p. 4 Art. 223 of the Criminal Code of the Russian Federation: "Cold steel weapons, including throwing weapons". Throwing weapons are not included in the number of cold steel arms; it is an independent type of weapon that is different from the cold steel by its technical characteristics. The common feature of cold steel arms and throwing weapons is striking of a target due to the muscle power of a man. The main difference is that there is no projectile with directional movement in cold steel arms and striking occurs due to the direct contact with the object. The definitions of these types of weapons are contained in the Federal Act "About Weapons"

  15. Girls and weapons: an international study of the perpetration of violence.

    Science.gov (United States)

    Erickson, Patricia G; Butters, Jennifer E; Cousineau, Marie-Marthe; Harrison, Lana; Korf, Dirk

    2006-09-01

    The purpose of this study was to describe delinquent girls' weapons preferences where and how often they carried weapons and to identify the most important factors that explained four different weapon-related violent outcomes. A large, high-risk sample of female adolescents consisting of 510 girls aged 14-17 in four cities were interviewed using the same questionnaire and methods. Tabular and logistic regression analyses were applied. Knives emerged as the most frequently reported weapon in all cities. Rates of both lifetime victimization and perpetration of violence with weapons were high in all sites. Starting to carry a weapon as a result of violence was reported by 40% of the girls in Toronto, 28% in Philadelphia, 25% in Amsterdam, and 16% in Montreal. The major predictors of weapon perpetrated violent behaviours included ethnic origin, early onset of delinquent activities, participation in delinquent acts in the past 12 months, gang fighting and carrying a weapon as a result of violence. Site, age and heavy alcohol consumption had a minor impact, and drug use, drug selling, and neighborhood features, none. Despite numerous differences in weapons' prevalence across cities, the logistic regression found that site was only significant in use of an object (Toronto) and not significant in threatening or hurting someone with either a knife or a gun or actually hurting others with a weapon. These findings suggest commonality in serious female violence that extends beyond borders and cultures.

  16. Characterization and Detection of Biological Weapons with Atomic Force Microscopy

    Energy Technology Data Exchange (ETDEWEB)

    Malkin, A J; Plomp, M; Leighton, T J; McPherson, A

    2006-09-25

    Critical gaps exist in our capabilities to rapidly characterize threat agents which could be used in attacks on facilities and military forces. DNA-based PCR and immunoassay-based techniques provide unique identification of species, strains and protein signatures of pathogens. However, differentiation between naturally occurring and weaponized bioagents and the identification of formulation signatures are beyond current technologies. One of the most effective and often the only definitive means to identify a threat agent is by its direct visualization. Atomic force microscopy (AFM) is a rapid imaging technique that covers the size range of most biothreat agents (several nanometers to tens of microns), is capable of resolving pathogen morphology and structure, and could be developed into a portable device for biological weapons (BW) field characterization. AFM can detect pathogens in aerosol, liquid, surface and soil samples while concomitantly acquiring their weaponization and threat agent digital signatures. BW morphological and structural signatures, including modifications to pathogen microstructural architecture and topology that occur during formulation and weaponization, provide the means for their differentiation from crude or purified unformulated agent, processing signatures, as well as assessment of their potential for dispersion, inhalation and environmental persistence. AFM visualization of pathogen morphology and architecture often provides valuable digital signatures and allows direct detection and identification of threat agents. We have demonstrated that pathogens, spanning the size range from several nanometers for small agricultural satellite viruses to almost half micron for pox viruses, and to several microns for bacteria and bacterial spores, can be visualized by AFM under physiological conditions to a resolution of {approx}20-30 {angstrom}. We have also demonstrated that viruses from closely related families could be differentiated by AFM on

  17. China's ASAT Weapon: Capabilities and the Potential Threat

    Science.gov (United States)

    Forden, Geoffrey

    2008-04-01

    Much has been said about China's 11 January 2007 test of an anti-satellite (ASAT) weapon but few analysts have based their comments on a scientific determination of the weapons capabilities. This paper presents such an analysis derived from the observed pattern of debris, as observed by NORAD and posted on-line by NASA. It is clear that this was a direct hit-to-kill weapon (as opposed to a fragmentation-type explosive warhead), it massed about 600 kg, and was capable of accelerations of at least 6 Gs. It can be inferred with a reasonable degree of confidence that it used an on-board optical tracker, most likely operating in visible light. Furthermore, since the closing speed between the target satellite and the interceptor was 8 km/s during the test, this weapon could be used to attack satellites at higher altitude orbits, such as NAVSTAR/GPS and geostationary satellites that include communications and early warning satellites. This test produced ten times as many pieces of debris as an earlier US hit-to-kill ASAT test which, because of their higher altitudes, will last thousands of years---hundreds of times longer than the debris in the US test. China's test increased the chances of some low earth orbit satellite being hit by a piece of debris by 50%, from about 12% to 18% each year. Given this weapon's capabilities, it is possible to ``war game'' what an all-out Chinese ASAT attack would look like and what responses the US could take. (It is important to emphasize that this is a capabilities-based exercise and not based on Chinese intentions.) If China did launch such an attack, it could eliminate a large fraction of US military satellites in low earth orbit including photo-reconnaissance and electronic intelligence satellites, but not all of them, in the first 24 hours; the requirement that the target satellites be illuminated by the sun limits the attack. Furthermore, the US could maneuver its LEO satellites in the first hours of the attack and greatly

  18. Annual review in automatic programming

    CERN Document Server

    Goodman, Richard

    2014-01-01

    Annual Review in Automatic Programming focuses on the techniques of automatic programming used with digital computers. Topics covered range from the design of machine-independent programming languages to the use of recursive procedures in ALGOL 60. A multi-pass translation scheme for ALGOL 60 is described, along with some commercial source languages. The structure and use of the syntax-directed compiler is also considered.Comprised of 12 chapters, this volume begins with a discussion on the basic ideas involved in the description of a computing process as a program for a computer, expressed in

  19. Algorithms for skiascopy measurement automatization

    Science.gov (United States)

    Fomins, Sergejs; Trukša, Renārs; KrūmiĆa, Gunta

    2014-10-01

    Automatic dynamic infrared retinoscope was developed, which allows to run procedure at a much higher rate. Our system uses a USB image sensor with up to 180 Hz refresh rate equipped with a long focus objective and 850 nm infrared light emitting diode as light source. Two servo motors driven by microprocessor control the rotation of semitransparent mirror and motion of retinoscope chassis. Image of eye pupil reflex is captured via software and analyzed along the horizontal plane. Algorithm for automatic accommodative state analysis is developed based on the intensity changes of the fundus reflex.

  20. Automatic Construction of Finite Algebras

    Institute of Scientific and Technical Information of China (English)

    张健

    1995-01-01

    This paper deals with model generation for equational theories,i.e.,automatically generating (finite)models of a given set of (logical) equations.Our method of finite model generation and a tool for automatic construction of finite algebras is described.Some examples are given to show the applications of our program.We argue that,the combination of model generators and theorem provers enables us to get a better understanding of logical theories.A brief comparison betwween our tool and other similar tools is also presented.

  1. Automatic mapping of monitoring data

    DEFF Research Database (Denmark)

    Lophaven, Søren; Nielsen, Hans Bruun; Søndergaard, Jacob

    2005-01-01

    This paper presents an approach, based on universal kriging, for automatic mapping of monitoring data. The performance of the mapping approach is tested on two data-sets containing daily mean gamma dose rates in Germany reported by means of the national automatic monitoring network (IMIS......). In the second dataset an accidental release of radioactivity in the environment was simulated in the South-Western corner of the monitored area. The approach has a tendency to smooth the actual data values, and therefore it underestimates extreme values, as seen in the second dataset. However, it is capable...

  2. Strengthening the biological weapons convention and implications on the pharmaceutical and biotechnology industry.

    Science.gov (United States)

    Zabriskie, D

    1998-06-01

    The development, production, stockpiling, and use of biological weapons are banned by the 1972 Biological Weapons Convention (BWC). Reflecting the realities of the Cold War era in which it was negotiated, the BWC lacks means for compliance verification or enforcement. International efforts to remedy this deficiency are accelerating in the face of evidence that covert biological weapon programs are proliferating at the national and subnational levels.

  3. Detecting buried metallic weapons in a controlled setting using a conductivity meter.

    Science.gov (United States)

    Dionne, Charles A; Schultz, John J; Murdock, Ronald A; Smith, Stephen A

    2011-05-20

    Forensic personnel may face a daunting task when searching for buried weapons at crime scenes or potential disposal sites. In particular, it is common to search for a small firearm that was discarded or buried by a perpetrator. When performing forensic searches, it is recommended to first use non-invasive methods such as geophysical instruments to minimize damage to evidence and to the crime scene. Geophysical tools are used to pinpoint small areas of interest across a scene for invasive testing, rather than digging large areas throughout the site. Prior to this project, there was no published research that tested the utility of the conductivity meter to search for metallic weapons such as firearms and blunt and sharp edged weapons. A sample comprised of 32 metallic weapons including firearms, blunt and sharp edged weapons, and scrap metals was buried in a controlled setting to test the applicability of a conductivity meter for forensic searches. Weapons were tested at multiple depths and after data collection was performed for one depth, the weapons were reburied 5 cm deeper until they were no longer detected. Variables such as weapon size, burial depth, transect interval spacing (25 and 50 cm), and metallic composition were tested. All of the controlled variables influenced maximum depth of detection. For example, size was a factor as larger weapons were detected at deeper depths compared to smaller weapons. Metal composition affected maximum depth of detection as the conductivity meter detected items comprised of ferrous metals at deeper depths than non-ferrous metals. Searches for large buried items may incorporate a transect interval spacing of 50 cm but small weapons may be undetected between transects and therefore a transect interval spacing of 25 cm is recommended. Overall, the conductivity meter is a geophysical tool to consider when searching for larger-sized metallic weapons or to use in conjunction with an all-metal detector, particularly when

  4. Derivation of models for nuclear weapon terrorist arming and detonation risk analysis

    Energy Technology Data Exchange (ETDEWEB)

    Parziale, A A

    1998-03-01

    This report investigates "use control" for the on-site arming and detonation, by terrorists, of stored weapon systems. We investigate both components of weapon "use control", which we define as: (1) weapon "use denial" * that we model as a probability, Pj (denial), that represents the chances that terrorists attempting to arm a type j weapon will commit a non-recoverable error, and (2) weapon "use delay" that we model as a random variable, Tj , that represents the arming delay imposed by the use control features of a type j weapon, before detonation can occur. Using information pertaining to the physical security system at a storage site, the postulated terrorist attack force size, and simulated combat engagement outcomes, we formulate the frequency, fj , and probability, P(dj ), of on-site detonation, for generic weapon types j. We derive a model that disjoins the performance of site physical security, from that for weapon use control, if the use control random variable Tj has a Uniform or histogram distribution. This is an especially significant result where most complex distributions can be adequately approximated with a histogram. Hence, we can conduct combat simulations to obtain the physical security performance of a specific storage site independent of the use control features associated with specific weapon types that are stored, or might be stored, at the site. In turn, we can obtain the use control performance for various weapon types, independent of where they are stored and the physical security systems surrounding them. Our models can then mathematically combine physical security performance and weapon use control performance for any combination of storage facility and weapon type.

  5. Security after the revolutions of 1989 and 1991: The future with nuclear weapons

    Energy Technology Data Exchange (ETDEWEB)

    Weber, S. [Univ. of California, Berkeley, CA (United States)

    1992-12-31

    Political scientists typically view weapons within the realm of effects, not within the realm of cause. That is, weapons are a consequence of the great causal factors in international relations. Insecurity is the most important of these factors; it follows from the uneven distribution of power among states, the security dilemma, and the ever-present possibility that violence will be used to settle disagreements because there is no higher authority above states capable of enforcing rules. According to this logic weapons cause neither war nor peace. They are simply tools that states use to gain a share of the scarcest commodity - security - by fighting other states or by threatening to do so if necessary. Nuclear weapons are a product of great industrial capabilities, knowledge, and other resources. The United States and the Soviet Union had the largest arsenals of nuclear weapons because they were superpowers, not the other way around. On this logic, nuclear weapons reflect and reinforce a distribution of power that would exist in their absence. As the distribution of power among states changes, the status of nuclear weapons in the world will also change in a way that reflects the more fundamental causes that continue to drive state-state relationships in an anarchic world. In this chapter the author treat nuclears weapons within the realm of great causes. Arguing that nuclear weapons were a fundamental cause in bringing the Cold War, and with it the last vestiges of bipolarity, to an end. International life in the 1990s will not be the same as it was between 1945 and 1989. Will it be more like the multipolar world of the 1800s, with nuclear weapons simply grafted on the way other new weapons innovations have been in the past? That is not expected because nuclear weapons have altered the fundamental causal forces that drove previous international systems from peace to war and back again. 21 refs.

  6. Examination of Economic Feasibility of Nuclear Weapons in the Republic of Korea

    Energy Technology Data Exchange (ETDEWEB)

    Suh, Young A; Yim, Man Sung [Korea Advanced Institute of Science and Technology, Daejeon (Korea, Republic of)

    2015-05-15

    This observation implies that the popular view on nuclear weapons amongst Korean public is in part due to lack of knowledge about overall implications of possessing nuclear weapons. In this regard, pros and cons of nuclear weapons development need to be better characterized and understood by the public to support nuclear nonproliferation culture development. Noting lack of literature on characterizing the economics of nuclear weapons development, this study aims at performing economic feasibility analysis of nuclear weapons development in the ROK. For this purpose, an approach called Index technique based on the US experiences was applied to Korean historical data along with cost-benefit analysis and Multi-Criteria Decision Making Analysis. In this study, the scenario of nuclear weapons development against North Korean nuclear threat was compared with conventional weapons-based defense strategy. The comparison was based on cost benefit analysis and qualitative multi-criteria decision analysis. Results indicate that nuclear weapons development is not a desirable option. However, as this work was a rather simplistic academic exercise, further work is needed to support the outcome of the study. Outcome of these investigations would be useful for communication with the public regarding the need for nuclear weapons for national defense and to develop nuclear nonproliferation culture in the ROK.

  7. The Association Between Weapon Carrying and Health Risk Behaviors Among Adolescent Students in Bangkok, Thailand.

    Science.gov (United States)

    Saiphoklang, On-Anong; Wongboonsin, Kua; Wongboonsin, Patcharawalai; Perngparn, Usaneya; Cottler, Linda B

    2015-07-30

    Carrying weapons is a significant social and public health problem worldwide, especially among adolescents. The present study examined the association between weapon carrying and related risk behaviors among Thai adolescents. A cross-sectional study of 2,588 high school and vocational school students aged 11 to 19 years from 26 schools in Bangkok, Thailand, was conducted in 2014. This study found that 7.8% of youth reported having carried a weapon in the past 12 months. The high prevalence of weapon carrying was reported by male students, and males were more likely to have reported carrying a weapon than females. The association between weapon carrying and the health risk behaviors like drinking, smoking, any drug use, and physical fighting were significant with higher odds of weapon carrying in all models. Among males, weapon carrying was related to drinking and smoking, any drug use, physical fighting, and school type. Among females, suicidal thoughts were significantly related along with drinking and smoking, any drug use, and physical fighting. Having a mother who used substances was significant only among females. These data could be used for further interventions about weapon carrying to reduce violence.

  8. Analysis method on shoot precision of weapon in small-sample case

    Institute of Scientific and Technical Information of China (English)

    Jiang Jun; Song Baowei; Liang Qingwei

    2007-01-01

    Because of limits of cost, in general, the test data of weapons are shortness. It is always an important topic that to gain scientific results of weapon performance analyses in small-sample case. Based on the analysis of distribution function characteristics and grey mathematics, a weighting grey method in small-sample case is presented. According to the analysis of test data of a weapon, it is proved that the method is a good method to deal with data in the small-sample case and has a high value in the analysis of weapon performance.

  9. The Treaty for the Prohibition of Nuclear Weapons in Latin America and the Caribbean

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1994-03-01

    The Treaty for the Prohibition of Nuclear Weapons in Latin America and the Caribbean, known as the Treaty of Tlatelolco, seeks to establish a nuclear-weapon-free zone (NWFZ) that will extend from the US-Mexican border to Antarctica`s territorial boundaries, including large areas of open ocean. Under the treaty, signatory states pledge not to test, use, produce, manufacture or acquire nuclear weapons; to use nuclear materials and facilities {open_quotes}exclusively for peaceful purposes;{close_quotes} and not to permit the stationing or development of nuclear weapons on their territories.

  10. Research on Computer Aided Innovation Model of Weapon Equipment Requirement Demonstration

    Science.gov (United States)

    Li, Yong; Guo, Qisheng; Wang, Rui; Li, Liang

    Firstly, in order to overcome the shortcoming of using only AD or TRIZ solely, and solve the problems currently existed in weapon equipment requirement demonstration, the paper construct the method system of weapon equipment requirement demonstration combining QFD, AD, TRIZ, FA. Then, we construct a CAI model frame of weapon equipment requirement demonstration, which include requirement decomposed model, requirement mapping model and requirement plan optimization model. Finally, we construct the computer aided innovation model of weapon equipment requirement demonstration, and developed CAI software of equipment requirement demonstration.

  11. Carrier Analysis Lab (CAL) – Aircraft/Weapons/Ship Compatibility Lab

    Data.gov (United States)

    Federal Laboratory Consortium — Purpose: The Carrier Analysis Lab (CAL) - Aircraft/Weapons/Ship Compatibility Lab located at the Naval Air Warfare Center Aircraft Division, Lakehurst, NJ provides...

  12. Use of Body Armor Protection Levels with Squad Automatic Weapon Fighting Load Impacts Soldier Performance, Mobility, and Postural Control

    Science.gov (United States)

    2015-05-01

    COURSE PROTECTIVE EQUIPMENT BALLISTICS BIOMECHANICS POSTURAL CONTROL PPE(PERSONAL PROTECTIVE EQUIPMENT) Natick Soldier Research...24  vi ACKNOWLEDGEMENTS The evaluation reported was carried out by personnel of the Biomechanics Team...performance (e.g., long distance runs , short sprints, agility runs , and obstacle courses) (Knapik, 2004). Recently, Peoples et al., (2010) compared the

  13. Automatic quantification of iris color

    DEFF Research Database (Denmark)

    Christoffersen, S.; Harder, Stine; Andersen, J. D.;

    2012-01-01

    An automatic algorithm to quantify the eye colour and structural information from standard hi-resolution photos of the human iris has been developed. Initially, the major structures in the eye region are identified including the pupil, iris, sclera, and eyelashes. Based on this segmentation, the ...

  14. Trevi Park: Automatic Parking System

    OpenAIRE

    ECT Team, Purdue

    2007-01-01

    TreviPark is an underground, multi-story stacking system that holds cars efficiently, thus reducing the cost of each parking space, as a fully automatic parking system intended to maximize space utilization in parking structures. TreviPark costs less than the price of a conventional urban garage and takes up half the volume and 80% of the depth.

  15. Automatic agar tray inoculation device

    Science.gov (United States)

    Wilkins, J. R.; Mills, S. M.

    1972-01-01

    Automatic agar tray inoculation device is simple in design and foolproof in operation. It employs either conventional inoculating loop or cotton swab for uniform inoculation of agar media, and it allows technician to carry on with other activities while tray is being inoculated.

  16. Automatic Error Analysis Using Intervals

    Science.gov (United States)

    Rothwell, E. J.; Cloud, M. J.

    2012-01-01

    A technique for automatic error analysis using interval mathematics is introduced. A comparison to standard error propagation methods shows that in cases involving complicated formulas, the interval approach gives comparable error estimates with much less effort. Several examples are considered, and numerical errors are computed using the INTLAB…

  17. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo;

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  18. Automatic Identification of Metaphoric Utterances

    Science.gov (United States)

    Dunn, Jonathan Edwin

    2013-01-01

    This dissertation analyzes the problem of metaphor identification in linguistic and computational semantics, considering both manual and automatic approaches. It describes a manual approach to metaphor identification, the Metaphoricity Measurement Procedure (MMP), and compares this approach with other manual approaches. The dissertation then…

  19. Automatic milking : a better understanding

    NARCIS (Netherlands)

    Meijering, A.; Hogeveen, H.; Koning, de C.J.A.M.

    2004-01-01

    In 2000 the book Robotic Milking, reflecting the proceedings of an International Symposium which was held in The Netherlands came out. At that time, commercial introduction of automatic milking systems was no longer obstructed by technological inadequacies. Particularly in a few west-European countr

  20. Tank Weapon System Management. A Program for Maximum Effectiveness

    Science.gov (United States)

    1977-04-19

    flow is minimal and positive. Authorizations: Current Proposed 76D10 9100 (8571) 8850 (81%) 76D20 1400 (15%) 1650 (19,) RECOMMENDATION: Etab &~h Mte...weapon system. RECOIMENtrATION: Etab &6h a Ppon4ive, ,ositve technicat c nnee to puvidc gqudaince and to kece u Jeedbacia on’ tank .6upp’PX irazteuL...System. An integrated group of procedures, methods, policies and may include the computer(s) and its software which is used to obtain, process and analyze

  1. Auditing nuclear weapons quality programs at Los Alamos

    Energy Technology Data Exchange (ETDEWEB)

    Davis, A.H.

    1988-01-01

    Some of the problems involved in introducing quality assurance on a broad scale in a national laboratory are discussed. A philosophy of how QA can be utilized beneficially in research and development activities is described briefly, and our experiences at Los Alamos in applying QA to nuclear weapons activities are outlines. The important role of audits is emphasized; audits are used not merely to determine the effectiveness of QA programs but also to explain and demonstrate the usefulness of QA to a generally sceptical body of engineers and scientists. Finally, some ways of easing the application of QA in the future are proposed. 1 ref.

  2. Detecting Chemical Weapons: Threats, Requirements, Solutions, and Future Challenges

    Science.gov (United States)

    Boso, Brian

    2011-03-01

    Although chemicals have been reportedly used as weapons for thousands of years, it was not until 1915 at Ypres, France that an industrial chemical, chlorine, was used in World War I as an offensive weapon in significant quantity, causing mass casualties. From that point until today the development, detection, production and protection from chemical weapons has be an organized endeavor of many of the world's armed forces and in more recent times, non-governmental terrorist organizations. The number of Chemical Warfare Agents (CWAs) has steadily increased as research into more toxic substances continued for most of the 20 th century. Today there are over 70 substances including harassing agents like tear gas, incapacitating agents, and lethal agents like blister, blood, chocking, and nerve agents. The requirements for detecting chemical weapons vary depending on the context in which they are encountered and the concept of operation of the organization deploying the detection equipment. The US DoD, for example, has as a requirement, that US forces be able to continue their mission, even in the event of a chemical attack. This places stringent requirements on detection equipment. It must be lightweight (<2 lbs), detect a large array of chemical warfare agents and toxic industrial chemicals, detect and warn at concentration levels and time duration to prevent acute health effects, meet military ruggedness specifications and work over a wide range of temperature and humidity, and have a very high probability of detection with a similarly low probability of false positives. The current technology of choice to meet these stringent requirements is Ion Mobility Spectrometry. Many technologies are capable of detecting chemicals at the trace levels required and have been extensively developed for this application, including, but not limited to: mass spectroscopy, IR spectroscopy, RAMAN spectroscopy, MEMs micro-cantilever sensors, surface acoustic wave sensors, differential

  3. Transfer alignment of shipborne inertial-guided weapon systems

    Institute of Scientific and Technical Information of China (English)

    Sun Changyue; Deng Zhenglong

    2009-01-01

    The transfer alignment problem of the shipborne weapon inertial navigation system (INS) is addressed. Specifically, two transfer alignment algorithms subjected to the ship motions induced by the waves are discussed. To consider the limited maneuver level performed by the ship, a new filter algorithm for transfer alignment methods using velocity and angular rate matching is first derived. And then an improved method using integrated velocity and integrated angular rate matching is introduced to reduce the effect of the ship body flexure. The simulation results show the feasibility and validity of the proposed transfer alignment algorithms.

  4. Cognitive task analysis: Techniques applied to airborne weapons training

    Energy Technology Data Exchange (ETDEWEB)

    Terranova, M.; Seamster, T.L.; Snyder, C.E.; Treitler, I.E. (Oak Ridge National Lab., TN (USA); Carlow Associates, Inc., Fairfax, VA (USA); Martin Marietta Energy Systems, Inc., Oak Ridge, TN (USA); Tennessee Univ., Knoxville, TN (USA))

    1989-01-01

    This is an introduction to cognitive task analysis as it may be used in Naval Air Systems Command (NAVAIR) training development. The focus of a cognitive task analysis is human knowledge, and its methods of analysis are those developed by cognitive psychologists. This paper explains the role that cognitive task analysis and presents the findings from a preliminary cognitive task analysis of airborne weapons operators. Cognitive task analysis is a collection of powerful techniques that are quantitative, computational, and rigorous. The techniques are currently not in wide use in the training community, so examples of this methodology are presented along with the results. 6 refs., 2 figs., 4 tabs.

  5. A Ground Network Micro-Weapon System%一种地面网域化微武器系统

    Institute of Scientific and Technical Information of China (English)

    胡美艳; 杨卫; 徐薇; 岳元

    2011-01-01

    A ground network micro-weapon system is a new concept high-performance micro-smart weapon which proposed in this paper.It bases on wireless sensor network, integrates with perception,identification, location and attack.It is a sense of the battlefield area, can automatic identify and locate the person and vehicles target; complete preparations for battlefield reconnaissance and attack; it can make use of wireless sensor network to communicate, compose a group of micro-combat units to be some clusters in multi-mode coordinated attack ; it will play an important role in the fortress defense, the resident duty,border control and counter-terrorism operation.%基于无线传感器网络,集感知、识别、定位、攻击于一体的地面网域化微武器系统,提出的一种全新概念的高性能微型智能武器.能感知网域内战场态势,自动对人员、车辆目标识别和定位,完成战场侦察和攻击准备;能利用网络进行通讯,将一群微战斗单元组成若干个簇来对目标实施多模协同攻击;将在要塞防御、驻地值勤、边防职守以及反恐作战等方面发挥重要作用.

  6. An Automatic Proof of Euler's Formula

    Directory of Open Access Journals (Sweden)

    Jun Zhang

    2005-05-01

    Full Text Available In this information age, everything is digitalized. The encoding of functions and the automatic proof of functions are important. This paper will discuss the automatic calculation for Taylor expansion coefficients, as an example, it can be applied to prove Euler's formula automatically.

  7. Self-Compassion and Automatic Thoughts

    Science.gov (United States)

    Akin, Ahmet

    2012-01-01

    The aim of this research is to examine the relationships between self-compassion and automatic thoughts. Participants were 299 university students. In this study, the Self-compassion Scale and the Automatic Thoughts Questionnaire were used. The relationships between self-compassion and automatic thoughts were examined using correlation analysis…

  8. Automatic Control System for Neutron Laboratory Safety

    Institute of Scientific and Technical Information of China (English)

    ZHAO; Xiao; ZHANG; Guo-guang; FENG; Shu-qiang; SU; Dan; YANG; Guo-zhao; ZHANG; Shuai

    2015-01-01

    In order to cooperate with the experiment of neutron generator,and realize the automatic control in the experiment,a set of automatic control system for the safety of the neutron laboratory is designed.The system block diagram is shown as Fig.1.Automatic control device is for processing switch signal,so PLC is selected as the core component

  9. Near-field millimeter-wave imaging for weapon detection

    Energy Technology Data Exchange (ETDEWEB)

    Sheen, D.M.; McMakin, D.L.; Collins, H.D.; Hall, T.E.

    1992-11-01

    Various millimeter-wave imaging systems capable of imaging through clothing for the detection of contraband metal, plastic, or ceramic weapons, have been developed at PNL. Two dimensional scanned holographic systems, developed at 35, 90, and 350 GHz, are used to obtain high resolution images of metal and plastic targets concealed by clothing. Coherent single-frequency amplitude and phase data, which is gathered over a two-dimensional scanned aperture, is reconstructed to the target plane using a holographic wavefront reconstruction technique. Practical weapon detection systems require high-speed scanning. To achieve this goal, a 35 GHz linear sequentially switched array has been built and integrated into a high speed linear scanner. This system poses special challenges on calibration / signal processing of the holographic system. Further, significant improvements in speed are required to achieve real time operation. Toward this goal, a wideband scanned system which allows for a two-dimensional image formation from a one-dimensional scanned (or array) system has been developed . Signal / image processing techniques developed and implemented for this technique are a variation on conventional synthetic aperture radar (SAR) techniques which eliminate far-field and narrow bandwidth requirements. Performance of this technique is demonstrated with imaging results obtained from a K[sub a]-band system.

  10. Near-field millimeter-wave imaging for weapon detection

    Energy Technology Data Exchange (ETDEWEB)

    Sheen, D.M.; McMakin, D.L.; Collins, H.D.; Hall, T.E.

    1992-11-01

    Various millimeter-wave imaging systems capable of imaging through clothing for the detection of contraband metal, plastic, or ceramic weapons, have been developed at PNL. Two dimensional scanned holographic systems, developed at 35, 90, and 350 GHz, are used to obtain high resolution images of metal and plastic targets concealed by clothing. Coherent single-frequency amplitude and phase data, which is gathered over a two-dimensional scanned aperture, is reconstructed to the target plane using a holographic wavefront reconstruction technique. Practical weapon detection systems require high-speed scanning. To achieve this goal, a 35 GHz linear sequentially switched array has been built and integrated into a high speed linear scanner. This system poses special challenges on calibration / signal processing of the holographic system. Further, significant improvements in speed are required to achieve real time operation. Toward this goal, a wideband scanned system which allows for a two-dimensional image formation from a one-dimensional scanned (or array) system has been developed . Signal / image processing techniques developed and implemented for this technique are a variation on conventional synthetic aperture radar (SAR) techniques which eliminate far-field and narrow bandwidth requirements. Performance of this technique is demonstrated with imaging results obtained from a K{sub a}-band system.

  11. Optomechanical design of a field-deployable thermal weapon sight

    Science.gov (United States)

    Boucher, Marc-André; Desnoyers, Nichola; Bernier, Sophie; Bergeron, Alain; Doucet, Michel; Lagacé, François; Laou, Philips

    2007-09-01

    The use of uncooled infrared (IR) imaging technology in Thermal Weapon Sight (TWS) systems produces a unique tool that perfectly fulfills the all-weather, day-and-night vision demands in modern battlefields by significantly increasing the effectiveness and survivability of a dismounted soldier. The main advantage of IR imaging is that no illumination is required; therefore, observation can be accomplished in a passive mode. It is particularly well adapted for target detection even through smoke, dust, fog, haze, and other battlefield obscurants. In collaboration with the Defense Research and Development Canada (DRDC Valcartier), INO engineering team developed, produced, and tested a rugged thermal weapon sight. An infrared channel provides for human detection at 800m and recognition at 200m. Technical system requirements included very low overall weight as well as the need to be field-deployable and user-friendly in harsh conditions. This paper describes the optomechanical design and focuses on the catadioptric-based system integration. The system requirements forced the optomechanical engineers to minimize weight while maintaining a sufficient level of rigidity in order to keep the tight optical tolerances. The optical system's main features are: a precision manual focus, a watertight vibration insulated front lens, a bolometer and two gold coated aluminum mirrors. Finite element analyses using ANSYS were performed to validate the subsystems performance. Some of the finite element computations were validated using different laboratory setups.

  12. Seaborne Delivery Interdiction of Weapons of Mass Destruction (WMD)

    Energy Technology Data Exchange (ETDEWEB)

    Glauser, H

    2011-03-03

    Over the next 10-20 years, the probability of a terrorist attack using a weapon of mass destruction (WMD) on the United States is projected to increase. At some point over the next few decades, it may be inevitable that a terrorist group will have access to a WMD. The economic and social impact of an attack using a WMD anywhere in the world would be catastrophic. For weapons developed overseas, the routes of entry are air and sea with the maritime vector as the most porous. Providing a system to track, perform a risk assessment and inspect all inbound marine traffic before it reaches US coastal cities thereby mitigating the threat has long been a goal for our government. The challenge is to do so effectively without crippling the US economy. The Portunus Project addresses only the maritime threat and builds on a robust maritime domain awareness capability. It is a process to develop the technologies, policies and practices that will enable the US to establish a waypoint for the inspection of international marine traffic, screen 100% of containerized and bulk cargo prior to entry into the US if deemed necessary, provide a palatable economic model for transshipping, grow the US economy, and improve US environmental quality. The implementation strategy is based on security risk, and the political and economic constraints of implementation. This article is meant to provide a basic understanding of how and why this may be accomplished.

  13. The simulation of laser-based guided weapon engagements

    Science.gov (United States)

    Al-Jaberi, Mubarak; Richardson, Mark; Coath, John; Jenkin, Robin

    2006-05-01

    The laser is an integrated part of many weapon systems, such as laser guided bombs, laser guided missiles and laser beam-riding missiles. These systems pose a significant threat to military assets on the modern battlefield. The lasers used in beam-riding missiles are particularly hard to detect as they typically use relatively low power lasers. Beamriders are also particularly difficult to defeat as current countermeasure systems have not been optimized against this threat. Some recent field trails conducted in the United Arab Emirates desert have demonstrated poor performance of both laser beam-riding systems and the LWRs designed to detect them. The aim of this research is to build a complete evaluation tool capable of assessing all the phases of an engagement of a main battle tank or armoured fighting vehicle with a laser based guided weapon. To this end a software model has been produced using Matlab & Simulink. This complete model has been verified using lab based experimentation and by comparison to the result of the mentioned field trials. This project will enable both the evaluation and design of any generic laser warning receiver or missile seeker and specific systems if various parameters are known. Moreover, this model will be used as a guide to the development of reliable countermeasures for laser beam-riding missiles.

  14. Nuclear weapons tests and environmental consequences: a global perspective.

    Science.gov (United States)

    Prăvălie, Remus

    2014-10-01

    The beginning of the atomic age marked the outset of nuclear weapons testing, which is responsible for the radioactive contamination of a large number of sites worldwide. The paper aims to analyze nuclear weapons tests conducted in the second half of the twentieth century, highlighting the impact of radioactive pollution on the atmospheric, aquatic, and underground environments. Special attention was given to the concentration of main radioactive isotopes which were released, such as ¹⁴C, ¹³⁷Cs, and ⁹⁰Sr, generally stored in the atmosphere and marine environment. In addition, an attempt was made to trace the spatial delimitation of the most heavily contaminated sites worldwide, and to note the human exposure which has caused a significantly increased incidence of thyroidal cancer locally and regionally. The United States is one of the important examples of assessing the correlation between the increase in the thyroid cancer incidence rate and the continental-scale radioactive contamination with ¹³¹I, a radioactive isotope which was released in large amounts during the nuclear tests carried out in the main test site, Nevada.

  15. Insects as weapons of war, terror, and torture.

    Science.gov (United States)

    Lockwood, Jeffrey A

    2012-01-01

    For thousands of years insects have been incorporated into human conflict, with the goals of inflicting pain, destroying food, and transmitting pathogens. Early methods used insects as "found" weapons, functioning as tactical arms (e.g., hurled nests) or in strategic habitats (e.g., mosquito-infested swamps). In the twentieth century the relationship between insects and disease was exploited; vectors were mass-produced to efficiently deliver pathogens to an enemy. The two most sophisticated programs were those of the Japanese in World War II with plague-infected fleas and cholera-coated flies and of the Americans during the Cold War with yellow fever-infected mosquitoes. With continued advances, defenses in the form of insecticides and vaccines meant that insects were no longer considered as battlefield weapons. However, in recent times sociopolitical changes have put insects back into the realm of human conflict through asymmetrical conflicts pitting combatants from nonindustrialized regions against forces from militarily and economically superior nations.

  16. Lubricant replacement in rolling element bearings for weapon surety devices

    Energy Technology Data Exchange (ETDEWEB)

    Steinhoff, R.; Dugger, M.T.; Varga, K.S. [Sandia National Laboratories, Albuquerque, NM (United States)

    1996-05-01

    Stronglink switches are a weapon surety device that is critical to the nuclear safety theme in modem nuclear weapons. These stronglink switches use rolling element bearings which contain a lubricant consisting of low molecular weight polytetrafluoroethylene (PTFE) fragments. Ozone-depleting solvents are used in both the manufacture and application of this lubricant. An alternate bearing lubrication for stronglink switches is needed that will provide long-term chemical stability, low migration and consistent performance. Candidates that were evaluated include bearings with sputtered MoS{sub 2} on the races and retainers, bearings with TiC-coated balls, and bearings with Si{sub 3}N{sub 4} balls and steel races. These candidates were compared to the lubricants currently used which are bearings lubricated with PTFE fragments of low molecular weight in a fluorocarbon solvent. The candidates were also compared to bearings lubricated with a diester oil which is representative of bearing lubricants used in industrial applications. Evaluation consisted of cycling preloaded bearings and subjecting them to 23 gRMS random vibration. All of the candidates are viable substitutes for low load application where bearing preload is approximately 1 pound. For high load applications where the bearing preload is approximately 10 pounds, bearings with sputtered MoS{sub 2} on the races and retainers appear to be the best substitutes. Bearings with TiC-coated balls also appear to be a viable candidate but these bearings did not perform as well as the sputtered MoS{sub 2}.

  17. Holographic Weapons Sight as Crew Optical Alignment Sight

    Science.gov (United States)

    Merancy, Nujoud; Dehmlow, Brian; Brazzel, Jack P.

    2011-01-01

    Crew Optical Alignment Sights (COAS) are used by spacecraft pilots to provide a visual reference to a target spacecraft for lateral relative position during rendezvous and docking operations. NASA s Orion vehicle, which is currently under development, has not included a COAS in favor of automated sensors, but the crew office has requested such a device be added for situational awareness and contingency support. The current Space Shuttle COAS was adopted from Apollo heritage, weighs several pounds, and is no longer available for procurement which would make re-use difficult. In response, a study was conducted to examine the possibility of converting a commercially available weapons sight to a COAS for the Orion spacecraft. The device used in this study was the XPS series Holographic Weapon Sight (HWS) procured from L-3 EOTech. This device was selected because the targeting reticule can subtend several degrees, and display a graphic pattern tailored to rendezvous and docking operations. Evaluations of the COAS were performed in both the Orion low-fidelity mockup and rendezvous simulations in the Reconfigurable Operational Cockpit (ROC) by crewmembers, rendezvous engineering experts, and flight controllers at Johnson Space Center. These evaluations determined that this unit s size and mounting options can support proper operation and that the reticule visual qualities are as good as or better than the current Space Shuttle COAS. The results positively indicate that the device could be used as a functional COAS and supports a low-cost technology conversion solution.

  18. Corrosion and conservation of weapons and military equipment

    Directory of Open Access Journals (Sweden)

    Bore V. Jegdić

    2012-01-01

    Full Text Available This paper analyzed the conditions for the occurrence of corrosion processes on historically important weapons and military equipment made of steel during the period in outdoor environment. A considerable attention has been given to the characteristics of the most important corrosion products formed on the steel surface. The formation of akaganite, β-FeOOH is a sign of active corrosion under a layer of corrosion products. The conditions that cause the formation and regeneration of hydrochloric and sulphuric acid during the exposure to the elements were analyzed. The most often applied methods of diagnostics and procedures of removing active corrosion anions (desalination were described as well. The NaOH solution of certain pH values still has the most important application for the desalination process. The procedures for cleaning the surface before the application of protective coatings and the application of chemicals that transform rust into stable compounds were discussed. As protective coatings, different types of organic coatings plated on well-prepared steel surfaces were used and sometimes special types of waxes as well. This paper presents the results of the tests of corrosion products taken from the exhibits of weapons and military equipment from the Military Museum in Belgrade.

  19. A conceptual framework for verifying the multinational Chemical Weapons Convention

    Energy Technology Data Exchange (ETDEWEB)

    Apt, K.E.

    1990-08-01

    The United States has for several years sought an effective, global ban on the production, possession, and use of chemical weapons (CW). In 1984, then-Vice President Bush submitted to the ongoing Conference on Disarmament in Geneva a draft comprehensive Chemical Weapons Convention (CWC); since then, he has supported the multinational process for CWC implementation. Given the high visibility of a CW treaty, policy makers face some major questions. Is such a treaty more valuable to national security than a chemical deterrent capability How useful will the treaty be if key nations or geographical regions are not covered How useful will the treaty be if key nations or geographical regions are not covered What constitutes an effective CWC verification regime, and can the objectives of this regime be achieved How would signatories respond to noncompliance by other signatories The answers to such questions will be important in determining the level of support, both nationally and internationally, for the multinational CWC. In addressing the issue of effective verification, it is important to consider how the CWC objectives devolve into general requirements for the verification regime. Translating these requirements into specific monitoring and inspection activities helps in understanding the extent and limitations of effective CWC verification. 4 refs.

  20. Linking legacies: Connecting the Cold War nuclear weapons production processes to their environmental consequences

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-01-01

    In the aftermath of the Cold War, the US has begun addressing the environmental consequences of five decades of nuclear weapons production. In support of this effort, the National Defense Authorization Act for Fiscal Year 1995 directed the Department of Energy (DOE) to describe the waste streams generated during each step in the production of nuclear weapons. Accordingly, this report responds to this mandate, and it is the Department`s first comprehensive analysis of the sources of waste and contamination generated by the production of nuclear weapons. The report also contains information on the missions and functions of nuclear weapons facilities, on the inventories of waste and materials remaining at these facilities, as well as on the extent and characteristics of contamination in and around these facilities. This analysis unites specific environmental impacts of nuclear weapons production with particular production processes. The Department used historical records to connect nuclear weapons production processes with emerging data on waste and contamination. In this way, two of the Department`s legacies--nuclear weapons manufacturing and environmental management--have become systematically linked. The goal of this report is to provide Congress, DOE program managers, non-governmental analysts, and the public with an explicit picture of the environmental results of each step in the nuclear weapons production and disposition cycle.

  1. Cooperative Security: A New Paradigm For A World Without Nuclear Weapons?

    Directory of Open Access Journals (Sweden)

    Marc Finaud

    2013-11-01

    Full Text Available If there is a loose consensus on aiming at a world free of nuclear weapons in the future, there are clear oppositions as to the timeframe as well as the means for achieving this goal. The approach to nuclear disarmament followed to date has only yielded limited success because it has been conceived in isolation from global and regional security environments and threat perceptions. A new paradigm should thus be sought in order to reconcile nuclear powers’ security doctrines with global aspirations for a safer world, and ensure that nuclear powers derive their security less from others’ insecurity but from mutually beneficial cooperative security. This should not become a pretext for preserving nuclear weapons for ever. It will on the contrary require parallel tracks addressing the initial motivations for acquiring nuclear weapons and other weapons of mass destruction (WMD, in particular in the context of regional conflicts, as well as dealing with the current issues necessarily related to nuclear disarmament (missile defence, weaponization of space, conventional imbalances and future weapon systems. Ultimately, in a globalised nuclear-weapon free world, state security will not require nuclear weapons because it will be inserted into a broader network encompass­ing all aspects of security addressed in cooperative and multilateral approaches.

  2. Identification of chemicals related to the chemical weapons convention during an interlaboratory proficiency test

    NARCIS (Netherlands)

    Hooijschuur, E.W.J.; Hulst, A.G.; Jong, A.L. de; Reuver, L.P. de; Krimpen, S.H. van; Baar, B.L.M. van; Wils, E.R.J.; Kientz, C.E.; Brinkman, U.A.Th

    2002-01-01

    In order to test the ability of laboratories to detect and identify chemicals related to the Chemical Weapons Convention (CWC), which prohibits the development, production, stockpiling and use of chemical weapons, and to designate laboratories for this task, the Technical Secretariat of the Organisa

  3. 36 CFR 1280.18 - May I bring guns or other weapons onto NARA property?

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false May I bring guns or other weapons onto NARA property? 1280.18 Section 1280.18 Parks, Forests, and Public Property NATIONAL ARCHIVES... Conduct on NARA Property? Prohibited Activities § 1280.18 May I bring guns or other weapons onto...

  4. 28 CFR 552.25 - Use of chemical agents or non-lethal weapons.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Use of chemical agents or non-lethal weapons. 552.25 Section 552.25 Judicial Administration BUREAU OF PRISONS, DEPARTMENT OF JUSTICE... agents or non-lethal weapons. The Warden may authorize the use of chemical agents or non-lethal...

  5. Leveling the Playing Field: China’s Development of Advanced Energy Weapons

    Science.gov (United States)

    2012-05-02

    precision is not required, an inter-continental ballistic missile (ICBM) could be used to deliver a HEMP weapon over 7,000 miles away.72 Finally, if the...STATEMENT. Use agency-mandated availability statements to indicate the public availability or distribution limitations of the report. If additional...9 HEMP Weapons ...................................................................................................................... 10 NNEMP

  6. Nuclear weapons and conflict transformation: the case of India-Pakistan. - Pbk ed.

    NARCIS (Netherlands)

    S. Khan

    2010-01-01

    Introduction Part 1: Theory 1. Studies on Conflict Transformation 2. Scholarship on Ramifications of Nuclear Weapons Acquisition 3. Elucidating Conflict Transformation with Nuclear Weapons Part 2: The India-Pakistan Protracted Conflict 4. Life of the Protracted Conflict 5. Introduction of Nuclear We

  7. Preparing for Response to a Nuclear Weapon of Mass Destruction, Are We Ready?

    Science.gov (United States)

    2006-05-25

    57 Director, Texas Engineering Extension Service ( TEEX ), Weapons of Mass Destruction: Incident Management / Unified...58 Director, Texas Engineering Extension Service ( TEEX ), Weapons of Mass Destruction: Incident Management / Unified...Command, (College Station, Texas: Texas A&M University, 2005), PM 2- 5. 59 Ibid, PM 2-9. 60 Director, Texas Engineering Extension Service ( TEEX

  8. Influence and selection processes in weapon carrying during adolescence : The roles of status, aggression, and vulnerability

    NARCIS (Netherlands)

    Dijkstra, Jan; Lindenberg, Siegwart; Veenstra, Rene; Steglich, Christian; Isaacs, Jenny; Card, Noel A.; Hodges, Ernest V. E.

    2010-01-01

    The role of peers in weapon carrying (guns, knives, and other weapons) inside and outside the school was examined in this study. Data stem from a longitudinal study of a high-risk sample of male students (7th to 10th grade; N = 167) from predominantly Hispanic low-socio-economic-status schools in th

  9. Automatic Schema Evolution in Root

    Institute of Scientific and Technical Information of China (English)

    ReneBrun; FonsRademakers

    2001-01-01

    ROOT version 3(spring 2001) supports automatic class schema evolution.In addition this version also produces files that are self-describing.This is achieved by storing in each file a record with the description of all the persistent classes in the file.Being self-describing guarantees that a file can always be read later,its structure browsed and objects inspected.also when the library with the compiled code of these classes is missing The schema evolution mechanism supports the frequent case when multiple data sets generated with many different class versions must be analyzed in the same session.ROOT supports the automatic generation of C++ code describing the data objects in a file.

  10. Automatic spikes detection in seismogram

    Institute of Scientific and Technical Information of China (English)

    王海军; 靳平; 刘贵忠

    2003-01-01

    @@ Data processing for seismic network is very complex and fussy, because a lot of data is recorded in seismic network every day, which make it impossible to process these data all by manual work. Therefore, seismic data should be processed automatically to produce a initial results about events detection and location. Afterwards, these results are reviewed and modified by analyst. In automatic processing data quality checking is important. There are three main problem data thatexist in real seismic records, which include: spike, repeated data and dropouts. Spike is defined as isolated large amplitude point; the other two problem datahave the same features that amplitude of sample points are uniform in a interval. In data quality checking, the first step is to detect and statistic problem data in a data segment, if percent of problem data exceed a threshold, then the whole data segment is masked and not be processed in the later process.

  11. Physics of Automatic Target Recognition

    CERN Document Server

    Sadjadi, Firooz

    2007-01-01

    Physics of Automatic Target Recognition addresses the fundamental physical bases of sensing, and information extraction in the state-of-the art automatic target recognition field. It explores both passive and active multispectral sensing, polarimetric diversity, complex signature exploitation, sensor and processing adaptation, transformation of electromagnetic and acoustic waves in their interactions with targets, background clutter, transmission media, and sensing elements. The general inverse scattering, and advanced signal processing techniques and scientific evaluation methodologies being used in this multi disciplinary field will be part of this exposition. The issues of modeling of target signatures in various spectral modalities, LADAR, IR, SAR, high resolution radar, acoustic, seismic, visible, hyperspectral, in diverse geometric aspects will be addressed. The methods for signal processing and classification will cover concepts such as sensor adaptive and artificial neural networks, time reversal filt...

  12. Automatic design of magazine covers

    Science.gov (United States)

    Jahanian, Ali; Liu, Jerry; Tretter, Daniel R.; Lin, Qian; Damera-Venkata, Niranjan; O'Brien-Strain, Eamonn; Lee, Seungyon; Fan, Jian; Allebach, Jan P.

    2012-03-01

    In this paper, we propose a system for automatic design of magazine covers that quantifies a number of concepts from art and aesthetics. Our solution to automatic design of this type of media has been shaped by input from professional designers, magazine art directors and editorial boards, and journalists. Consequently, a number of principles in design and rules in designing magazine covers are delineated. Several techniques are derived and employed in order to quantify and implement these principles and rules in the format of a software framework. At this stage, our framework divides the task of design into three main modules: layout of magazine cover elements, choice of color for masthead and cover lines, and typography of cover lines. Feedback from professional designers on our designs suggests that our results are congruent with their intuition.

  13. 77 FR 55195 - Notice of Public Meetings for the Draft Environmental Impact Statement for Naval Weapons Systems...

    Science.gov (United States)

    2012-09-07

    ... Weapons Systems Training Facility Boardman, OR AGENCY: Department of the Navy, DoD. ACTION: Notice... and proposed DoN and Oregon National Guard training and testing activities at Naval Weapons...

  14. The Automatic Measurement of Targets

    DEFF Research Database (Denmark)

    Höhle, Joachim

    1997-01-01

    The automatic measurement of targets is demonstrated by means of a theoretical example and by an interactive measuring program for real imagery from a réseau camera. The used strategy is a combination of two methods: the maximum correlation coefficient and the correlation in the subpixel range. F...... interactive software is also part of a computer-assisted learning program on digital photogrammetry....

  15. Automatically-Programed Machine Tools

    Science.gov (United States)

    Purves, L.; Clerman, N.

    1985-01-01

    Software produces cutter location files for numerically-controlled machine tools. APT, acronym for Automatically Programed Tools, is among most widely used software systems for computerized machine tools. APT developed for explicit purpose of providing effective software system for programing NC machine tools. APT system includes specification of APT programing language and language processor, which executes APT statements and generates NC machine-tool motions specified by APT statements.

  16. Annual review in automatic programming

    CERN Document Server

    Halpern, Mark I; Bolliet, Louis

    2014-01-01

    Computer Science and Technology and their Application is an eight-chapter book that first presents a tutorial on database organization. Subsequent chapters describe the general concepts of Simula 67 programming language; incremental compilation and conversational interpretation; dynamic syntax; the ALGOL 68. Other chapters discuss the general purpose conversational system for graphical programming and automatic theorem proving based on resolution. A survey of extensible programming language is also shown.

  17. How CBO Estimates Automatic Stabilizers

    Science.gov (United States)

    2015-11-01

    of wages and salaries and proprietors’ incomes as recorded in the NIPAs to changes in the GDP gap , CBO uses separate regressions based on equation (1...Outlays Without Automatic Stabilizers GDP Gapa Unemployment Gap (Percent)b Revenues Outlays 3 Table 1. (Continued) Deficit or Surplus With and...gross domestic product; * = between -0.05 percent and 0.05 percent. a. The GDP gap equals the difference between actual or projected GDP and CBO’s

  18. Automatic translation among spoken languages

    Science.gov (United States)

    Walter, Sharon M.; Costigan, Kelly

    1994-01-01

    The Machine Aided Voice Translation (MAVT) system was developed in response to the shortage of experienced military field interrogators with both foreign language proficiency and interrogation skills. Combining speech recognition, machine translation, and speech generation technologies, the MAVT accepts an interrogator's spoken English question and translates it into spoken Spanish. The spoken Spanish response of the potential informant can then be translated into spoken English. Potential military and civilian applications for automatic spoken language translation technology are discussed in this paper.

  19. The Automatic Galaxy Collision Software

    CERN Document Server

    Smith, Beverly J; Pfeiffer, Phillip; Perkins, Sam; Barkanic, Jason; Fritts, Steve; Southerland, Derek; Manchikalapudi, Dinikar; Baker, Matt; Luckey, John; Franklin, Coral; Moffett, Amanda; Struck, Curtis

    2009-01-01

    The key to understanding the physical processes that occur during galaxy interactions is dynamical modeling, and especially the detailed matching of numerical models to specific systems. To make modeling interacting galaxies more efficient, we have constructed the `Automatic Galaxy Collision' (AGC) code, which requires less human intervention in finding good matches to data. We present some preliminary results from this code for the well-studied system Arp 284 (NGC 7714/5), and address questions of uniqueness of solutions.

  20. Automatic computation of transfer functions

    Science.gov (United States)

    Atcitty, Stanley; Watson, Luke Dale

    2015-04-14

    Technologies pertaining to the automatic computation of transfer functions for a physical system are described herein. The physical system is one of an electrical system, a mechanical system, an electromechanical system, an electrochemical system, or an electromagnetic system. A netlist in the form of a matrix comprises data that is indicative of elements in the physical system, values for the elements in the physical system, and structure of the physical system. Transfer functions for the physical system are computed based upon the netlist.

  1. Trends in weapon-related injuries from violence in Odense Municipality, Denmark 1991-2009

    DEFF Research Database (Denmark)

    Luef, Stefan Møller; Lauritsen, Jens Martin; Faergemann, Christian

    2016-01-01

    INTRODUCTION: The aim of this study was to examine the development in incidence rates and the severity of weapon-related physical interpersonal violence in Odense Municipality, Denmark from 1991 to 2009. METHODS: All victims of physical interpersonal violence with weapon-related injuries treated...... at the Emergency Department in the 1991-2009 period at Odense University Hospital, Denmark, and/or subjected to medico-legal autopsy at the Institute of Forensic Medicine in the 1991-2009 period at the University of Southern Denmark were included. Incidence rates were estimated following stratification by gender...... rate was 4.8 per 1,000 victims in males and 29.1 per 1,000 victims in females. More than half (57%) of the homicides were caused by lesions due to sharp weapons. CONCLUSION: Weapon-related injuries are rare in the Odense Municipality. The incidence rate of weapon-related violence did not increase...

  2. Plus c`est la meme chose: The future of nuclear weapons in Europe

    Energy Technology Data Exchange (ETDEWEB)

    Maaranen, S.A.

    1996-07-01

    Since the end of the Cold War, the United States perhaps more than any other nuclear weapon state has deeply questioned the future role of nuclear weapons, both in a strategic sense and in Europe. It is probably the United States that has raised the most questions about the continuing need for and efficacy of nuclear weapons, and has expressed the greatest concerns about the negative consequences of continuing nuclear weapons deployment. In the US, this period of questioning has now come to a pause, if not a conclusion. In late 1994 the United States decided to continue to pursue reductions in numbers of nuclear weapons as well as other changes designed to reduce the dangers associated with the possession of nuclear weapons. But at the same time the US concluded that some number of nuclear forces would continue to be needed for national security for the foreseeable future. These necessary nuclear forces include a continuing but greatly reduced stockpile of nuclear bombs deployed in Europe under NATO`s New Strategic Concept. If further changes to the US position on nuclear weapons in Europe are to occur, it is likely to be after many years, and only in the context of dramatic additional improvements in the political and geo-political climate in and around Europe. The future role of nuclear weapons in Europe, as discussed in this report, depends in part on past and future decisions by the United States. but it must also be noted that other states that deploy nuclear weapons in Europe--Britain, France, and Russia, as well as the NATO alliance--have shown little inclination to discontinue their deployment of such weapons, whatever the United States might choose to do in the future.

  3. 33 CFR 334.102 - Sandy Hook Bay, Naval Weapons Station EARLE, Piers and Terminal Channel, restricted area...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 3 2010-07-01 2010-07-01 false Sandy Hook Bay, Naval Weapons... DANGER ZONE AND RESTRICTED AREA REGULATIONS § 334.102 Sandy Hook Bay, Naval Weapons Station EARLE, Piers..., shall be enforced by the Commanding Officer, Naval Weapons Station Earle, and/or other persons...

  4. 33 CFR 334.1125 - Pacific Ocean Naval Air Weapons Station, Point Mugu, Small Arms Range, Ventura County, California...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 3 2010-07-01 2010-07-01 false Pacific Ocean Naval Air Weapons... AND RESTRICTED AREA REGULATIONS § 334.1125 Pacific Ocean Naval Air Weapons Station, Point Mugu, Small... enforced by personnel attached to the Naval Air Weapons Station, Point Mugu, California, and by such...

  5. 20 CFR 30.615 - What type of tort suits filed against beryllium vendors or atomic weapons employers may...

    Science.gov (United States)

    2010-04-01

    ... beryllium vendors or atomic weapons employers may disqualify certain claimants from receiving benefits under... Special Provisions Effect of Tort Suits Against Beryllium Vendors and Atomic Weapons Employers § 30.615 What type of tort suits filed against beryllium vendors or atomic weapons employers may...

  6. How to Make Historical Surveys of Nonproliferation of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    Jonter, Thomas [Stockholm Univ. (Sweden). Dept. of Economic History

    2003-05-01

    In 1998 SKI initiated a project in order to make a historical survey of the Swedish nuclear weapons research during the period 1945-2000. The survey is now fulfilled and contains of three reports. IAEA became interested in the project and accepted it in 2000 as a support program to increase transparency and to support the implementation of the Additional Protocol in Sweden. In the eyes of IAEA, the most important aim is to create knowledge and refine tools to enhance the means to strengthen the Safeguard System within the Additional Protocol. Other countries have now showed interest to follow the Swedish example and to make their own reviews of the nuclear energy and nuclear weapons research of their pasts. A co-operation between Sweden, Estonia, Finland, Lithuania and Latvia has now been initiated in order to make such historical reviews. The Swedish Nuclear Power Inspectorate is the initiator and financial supporter of the project. The cooperation project has three comprehensive goals: a. to create transparency in the nuclear energy field of the past. The intention is that the results of the conducted studies could be attached to the State Declaration according to the Additional Protocol in order to enhance transparency b. to account for the nuclear material traffic of the past and; c. to develop the competence in nuclear energy matters in general, and in particular, to extend the knowledge regarding each participating State's nuclear experience in the past. The first purpose of this paper is to describe the project and its aims. The second purpose is to present a general model of how a historical review of a State's nuclear related activities and nuclear weapons research can be designed. The model has been created in order to serve as a guide for other countries strengthening of their safeguards systems in the framework of the Additional Protocol. The third purpose is to present the pedagogy that has been used as a teaching method in order to train

  7. Electrical Control System Design of Shipboard Box Weapon%舰载箱式无人机电控传送系统设计

    Institute of Scientific and Technical Information of China (English)

    朱玉川; 夏冉

    2014-01-01

    在现今的自动控制领域,PLC的应用已十分广泛。首先对舰载箱式无人机的设计进行简要介绍。为实现舰载箱式无人机发射系统传动的高精度、高效率,提出PLC电控传送系统并进行相应设计。通过对液压执行系统硬件结构设计,高精度电液比例控制设计,控制流程设计,PLC选型,控制软件设计等完成了整个电控系统设计过程,在对控制系统程序调试后,控制系统完成了相应的功能需求,达到了设计要求。%In automatic control domain,PLC has been widely used. One design of ship-borne box of unmanned aerial vehicle firstly been introduced briefly. To achieve high precision and high efficiency of carrier box weapon launch system transmission,system choose PLC as the core of the electrical control system. Through the design of electronic control system hardware structure and control software design,it implements the shipboard box -type weapons sent efficiency and precision positioning.

  8. Nonlethal weapons as force options for the Army

    Energy Technology Data Exchange (ETDEWEB)

    Alexander, J.B.

    1994-04-01

    This paper suggests that future challenges to US national security will be very different from those previously experienced. In a number of foreseeable circumstances, conventional military force will be inappropriate. The National Command Authority, and other appropriate levels of command, need expanded options available to meet threats for which the application of massive lethal force is counterproductive or inadvisable. It is proposed that nonlethal concepts be developed that provide additional options for military leaders and politicians. Included in this initiative should be exploration of policy, strategy, doctrine, and training issues as well as the development of selected technologies and weapons. In addition, civilian law enforcement agencies have similar requirements for less-than-lethal systems. This may be an excellent example for a joint technology development venture.

  9. South America and the proliferation of biological weapons

    Directory of Open Access Journals (Sweden)

    Tatiana Coutto

    2013-04-01

    Full Text Available This article focuses on the role of regional institutions and political practices in strengthening multilateral disarmament and non-proliferation regimes. Particular attention is devoted to coordination between Brazil and Argentina with a view to forging a "South American position" vis-à-vis the Biological and Toxins Weapons Convention (BTWC. Empirical evidence suggests that informal arrangements between the two countries were capable of involving other South American leaders and promoting the exchange of information among different groups of states, most notably during the 2006 BTWC review conference. This paper also sheds light on the identification of specific features that allow for increasing visibility and actorness of regional powers in promoting universality of multilateral security regimes (MSR, as well as the limitations faced by these players.

  10. Advances in Neuroscience and the Biological and Toxin Weapons Convention

    Directory of Open Access Journals (Sweden)

    Malcolm Dando

    2011-01-01

    Full Text Available This paper investigates the potential threat to the prohibition of the hostile misuse of the life sciences embodied in the Biological and Toxin Weapons Convention from the rapid advances in the field of neuroscience. The paper describes how the implications of advances in science and technology are considered at the Five Year Review Conferences of the Convention and how State Parties have developed their appreciations since the First Review Conference in 1980. The ongoing advances in neurosciences are then assessed and their implications for the Convention examined. It is concluded that State Parties should consider a much more regular and systematic review system for such relevant advances in science and technology when they meet at the Seventh Review Conference in late 2011, and that neuroscientists should be much more informed and engaged in these processes of protecting their work from malign misuse.

  11. Spinal cord injuries due to close combat weapons.

    Science.gov (United States)

    Fares, Youssef H; Fares, Jawad Y; Gebeily, Souheil E; Khazim, Rabi M

    2013-10-01

    A 17-year-old patient was aggressively attacked and stabbed in the dorsal region of his back by a knife. He was admitted to the emergency room of the Hammoud Hospital University Medical Center, Saida, Lebanon lying in the prone position. The neurological examination revealed that the stabbing object was fixed at the dorsal spine level at the T-7 level, where it was inserted inside the vertebral body. Luckily, the blade of the knife was parallel to the nervous tracts of the spinal cord; thus, he showed no neurological deficits. This case provides an overview of how neurosurgical principles can be applied to trauma patients with spine injuries due to close combat weapons.

  12. Weaponization and Prisonization of Toronto’s Black Male Youth

    Directory of Open Access Journals (Sweden)

    Wesley Crichlow

    2014-12-01

    Full Text Available Informed by Galtung (1969, Anderson (2012 and Wacquant (2001, this paper argues that a lifetime of spiralling and everyday state structural violence and overtly racist criminal profiling principally targeted at young Black men living in the Toronto Community Housing Corporation prepares them for prison. Moreover, it contends that interpersonal violence, transmitted from generation to generation and producing a vicious cycle, is a manifestation of institutionalized and systemic inequity. In the context of a hypermasculine culture, young Black men are both victims and participants in a dialectic of interpersonal-structural violence. Routinely precipitated by powerful state actors and agencies of criminal justice, public policy and assorted ‘moral entrepreneurs’, young Black men have their masculinity weaponized and prisonized by the state’s low-intensity declaration of war against them, and, among others, the poor, LGBTQ, immigrants, and First Nations and other people of colour.

  13. Advances in neuroscience and the biological and toxin weapons convention.

    Science.gov (United States)

    Dando, Malcolm

    2011-01-01

    This paper investigates the potential threat to the prohibition of the hostile misuse of the life sciences embodied in the Biological and Toxin Weapons Convention from the rapid advances in the field of neuroscience. The paper describes how the implications of advances in science and technology are considered at the Five Year Review Conferences of the Convention and how State Parties have developed their appreciations since the First Review Conference in 1980. The ongoing advances in neurosciences are then assessed and their implications for the Convention examined. It is concluded that State Parties should consider a much more regular and systematic review system for such relevant advances in science and technology when they meet at the Seventh Review Conference in late 2011, and that neuroscientists should be much more informed and engaged in these processes of protecting their work from malign misuse.

  14. Psychological casualties resulting from chemical and biological weapons.

    Science.gov (United States)

    Romano, J A; King, J M

    2001-12-01

    This symposium addresses the complications encountered by medical planners when confronted by the use or threat of the use of weapons of mass destruction. The types of chemical warfare agents (CWA), their principal target organs, and physiological effects are discussed. We have reviewed the use of CWA in 20th century warfare and otherwise with emphasis on five cases: (1) use of sulfur mustard during World War I; (2) use by Italy against Ethiopia; (3) use in the Sino-Japanese War; (4) relatively well-studied use in the Iran-Iraq conflict; and (5) the use of sarin in the Tokyo subway terrorist incident. We reviewed the additional physiological and psychological consequences of their use and threat of use. Results from training and simulation are discussed. Finally, we present our conclusions derived from the analysis of these historical situations.

  15. Microcontroller based ground weapon control system(Short Communication

    Directory of Open Access Journals (Sweden)

    M. Sankar Kishore

    2001-10-01

    Full Text Available Armoured vehicles and tanks generally consist of high resolution optical (both infrared and visible and display systems for recognition and identification of the targets. Different weapons/articles to engage the targets may be present. A fire control system (FCS controls all the above systems, monitors the status of the articles present and passes the information to the display system. Depending upon the health and availability of the articles, the FCS selects and fires the articles. Design and development of ground control unit which is the heart of the FCS, both in hardware and software, has been emphasised. The system has been developed using microcontroller and software developed in ASM 51 language. The system also has a facility to test all the systems and articles as initial power on condition. From the safety point of view, software and hardware interlocks have been provided in the critical operations, like firing sequence. "

  16. Implications of a North Korean Nuclear Weapons Program

    Energy Technology Data Exchange (ETDEWEB)

    Lehman, R.F. II

    1993-07-01

    The Democratic People`s Republic of Korea (DPRK) is one of the Cold War`s last remaining totalitarian regimes. Rarely has any society been as closed to outside influences and so distant from political, economic, and military developments around the globe. In 1991 and in 1992, however, this dictatorship took a number of political steps which increased Pyongyang`s interaction with the outside world. Although North Korea`s style of engagement with the broader international community involved frequent pauses and numerous steps backward, many observers believed that North Korea was finally moving to end its isolated, outlaw status. As the end of 1992 approached, however, delay and obstruction by Pyongyang became intense as accumulating evidence suggested that the DPRK, in violation of the nuclear Non-Proliferation Treaty (NPT), was seeking to develop nuclear weapons. On March 12, 1993, North Korea announced that it would not accept additional inspections proposed by the International Atomic Energy Agency (IAEA) to resolve concerns about possible violations and instead would withdraw from the Treaty. Pyongyang`s action raised the specter that, instead of a last act of the Cold War, North Korea`s diplomatic maneuvering would unravel the international norms that were to be the basis of stability and peace in the post-Cold War era. Indeed, the discovery that North Korea was approaching the capability to produce nuclear weapons suggested that the nuclear threat, which had been successfully managed throughout the Cold War era, could increase in the post-Cold War era.

  17. Unification of automatic target tracking and automatic target recognition

    Science.gov (United States)

    Schachter, Bruce J.

    2014-06-01

    The subject being addressed is how an automatic target tracker (ATT) and an automatic target recognizer (ATR) can be fused together so tightly and so well that their distinctiveness becomes lost in the merger. This has historically not been the case outside of biology and a few academic papers. The biological model of ATT∪ATR arises from dynamic patterns of activity distributed across many neural circuits and structures (including retina). The information that the brain receives from the eyes is "old news" at the time that it receives it. The eyes and brain forecast a tracked object's future position, rather than relying on received retinal position. Anticipation of the next moment - building up a consistent perception - is accomplished under difficult conditions: motion (eyes, head, body, scene background, target) and processing limitations (neural noise, delays, eye jitter, distractions). Not only does the human vision system surmount these problems, but it has innate mechanisms to exploit motion in support of target detection and classification. Biological vision doesn't normally operate on snapshots. Feature extraction, detection and recognition are spatiotemporal. When vision is viewed as a spatiotemporal process, target detection, recognition, tracking, event detection and activity recognition, do not seem as distinct as they are in current ATT and ATR designs. They appear as similar mechanism taking place at varying time scales. A framework is provided for unifying ATT and ATR.

  18. A Weapon Target Assignment Model Based on Weapon Utility%一种基于武器效用的武器目标分配模型

    Institute of Scientific and Technical Information of China (English)

    王金山; 李伟兵

    2015-01-01

    为解决武器优化分配中存在的2个问题,提出一种基于武器效用的武器目标分配模型。通过两类武器的效用分析,把目标达到期望毁伤概率作为武器效用最大的起点,设置两类武器的效用函数,以最大武器效用为准则,建立武器分配的线性整数规划模型,并对比2种模型的结果。实践结果证明:新模型求解分配的速度快耗时短,可满足战场需求,且结果更加合理。%In order to overtake two problems in weapon optimal assignment, propose a weapon target assignment model based on weapon utility. By two type weapons utility analysis, set expected kill probability as the start point of maximum weapon utility, and set utility function of two type weapons, takes maximum weapon utility as rule, establish linear integer planning model, and compare the results of two models. The practice results show that the new model has fast speed on solution distribution and use less time. It meets the battlefield requirements and has more reasonable results.

  19. Annual review in automatic programming

    CERN Document Server

    Goodman, Richard

    2014-01-01

    Annual Review in Automatic Programming, Volume 4 is a collection of papers that deals with the GIER ALGOL compiler, a parameterized compiler based on mechanical linguistics, and the JOVIAL language. A couple of papers describes a commercial use of stacks, an IBM system, and what an ideal computer program support system should be. One paper reviews the system of compilation, the development of a more advanced language, programming techniques, machine independence, and program transfer to other machines. Another paper describes the ALGOL 60 system for the GIER machine including running ALGOL pro

  20. On automatic machine translation evaluation

    Directory of Open Access Journals (Sweden)

    Darinka Verdonik

    2013-05-01

    Full Text Available An important task of developing machine translation (MT is evaluating system performance. Automatic measures are most commonly used for this task, as manual evaluation is time-consuming and costly. However, to perform an objective evaluation is not a trivial task. Automatic measures, such as BLEU, TER, NIST, METEOR etc., have their own weaknesses, while manual evaluations are also problematic since they are always to some extent subjective. In this paper we test the influence of a test set on the results of automatic MT evaluation for the subtitling domain. Translating subtitles is a rather specific task for MT, since subtitles are a sort of summarization of spoken text rather than a direct translation of (written text. Additional problem when translating language pair that does not include English, in our example Slovene-Serbian, is that commonly the translations are done from English to Serbian and from English to Slovenian, and not directly, since most of the TV production is originally filmed in English. All this poses additional challenges to MT and consequently to MT evaluation. Automatic evaluation is based on a reference translation, which is usually taken from an existing parallel corpus and marked as a test set. In our experiments, we compare the evaluation results for the same MT system output using three types of test set. In the first round, the test set are 4000 subtitles from the parallel corpus of subtitles SUMAT. These subtitles are not direct translations from Serbian to Slovene or vice versa, but are based on an English original. In the second round, the test set are 1000 subtitles randomly extracted from the first test set and translated anew, from Serbian to Slovenian, based solely on the Serbian written subtitles. In the third round, the test set are the same 1000 subtitles, however this time the Slovene translations were obtained by manually correcting the Slovene MT outputs so that they are correct translations of the

  1. Automatic Inference of DATR Theories

    CERN Document Server

    Barg, P

    1996-01-01

    This paper presents an approach for the automatic acquisition of linguistic knowledge from unstructured data. The acquired knowledge is represented in the lexical knowledge representation language DATR. A set of transformation rules that establish inheritance relationships and a default-inference algorithm make up the basis components of the system. Since the overall approach is not restricted to a special domain, the heuristic inference strategy uses criteria to evaluate the quality of a DATR theory, where different domains may require different criteria. The system is applied to the linguistic learning task of German noun inflection.

  2. Automatic analysis of multiparty meetings

    Indian Academy of Sciences (India)

    Steve Renals

    2011-10-01

    This paper is about the recognition and interpretation of multiparty meetings captured as audio, video and other signals. This is a challenging task since the meetings consist of spontaneous and conversational interactions between a number of participants: it is a multimodal, multiparty, multistream problem. We discuss the capture and annotation of the Augmented Multiparty Interaction (AMI) meeting corpus, the development of a meeting speech recognition system, and systems for the automatic segmentation, summarization and social processing of meetings, together with some example applications based on these systems.

  3. Commutated automatic gain control system

    Science.gov (United States)

    Yost, S. R.

    1982-01-01

    The commutated automatic gain control (AGC) system was designed and built for the prototype Loran-C receiver is discussed. The current version of the prototype receiver, the Mini L-80, was tested initially in 1980. The receiver uses a super jolt microcomputer to control a memory aided phase loop (MAPLL). The microcomputer also controls the input/output, latitude/longitude conversion, and the recently added AGC system. The AGC control adjusts the level of each station signal, such that the early portion of each envelope rise is about at the same amplitude in the receiver envelope detector.

  4. Coordinated hybrid automatic repeat request

    KAUST Repository

    Makki, Behrooz

    2014-11-01

    We develop a coordinated hybrid automatic repeat request (HARQ) approach. With the proposed scheme, if a user message is correctly decoded in the first HARQ rounds, its spectrum is allocated to other users, to improve the network outage probability and the users\\' fairness. The results, which are obtained for single- and multiple-antenna setups, demonstrate the efficiency of the proposed approach in different conditions. For instance, with a maximum of M retransmissions and single transmit/receive antennas, the diversity gain of a user increases from M to (J+1)(M-1)+1 where J is the number of users helping that user.

  5. Annual review in automatic programming

    CERN Document Server

    Goodman, Richard

    2014-01-01

    Annual Review in Automatic Programming, Volume 2 is a collection of papers that discusses the controversy about the suitability of COBOL as a common business oriented language, and the development of different common languages for scientific computation. A couple of papers describes the use of the Genie system in numerical calculation and analyzes Mercury autocode in terms of a phrase structure language, such as in the source language, target language, the order structure of ATLAS, and the meta-syntactical language of the assembly program. Other papers explain interference or an ""intermediate

  6. Threat is in the sex of the beholder: men find weapons faster than do women.

    Science.gov (United States)

    Sulikowski, Danielle; Burke, Darren

    2014-10-29

    In visual displays, people locate potentially threatening stimuli, such as snakes, spiders, and weapons, more quickly than similar benign stimuli, such as beetles and gadgets. Such biases are likely adaptive, facilitating fast responses to potential threats. Currently, and historically, men have engaged in more weapons-related activities (fighting and hunting) than women. If biases of visual attention for weapons result from selection pressures related to these activities, then we would predict such biases to be stronger in men than in women. The current study reports the results of two visual search experiments, in which men showed a stronger bias of attention toward guns and knives than did women, whether the weapons were depicted wielded or not. When the weapons were depicted wielded, both sexes searched for them with more caution than when they were not. Neither of these effects extended reliably to syringes, a non-weapon-yet potentially threatening-object. The findings are discussed with respect to the "weapons effect" and social coercion theory.

  7. Physical and emotional health problems experienced by youth engaged in physical fighting and weapon carrying.

    Science.gov (United States)

    Walsh, Sophie D; Molcho, Michal; Craig, Wendy; Harel-Fisch, Yossi; Huynh, Quynh; Kukaswadia, Atif; Aasvee, Katrin; Várnai, Dora; Ottova, Veronika; Ravens-Sieberer, Ulrike; Pickett, William

    2013-01-01

    Then aims of the current study were 1) to provide cross-national estimates of the prevalence of physical fighting and weapon carrying among adolescents aged 11-15 years; (2) To examine the possible effects of physical fighting and weapon carrying on the occurrence of physical (medically treated injuries) and emotional health outcomes (multiple health complaints) among adolescents within the theoretical framework of Problem Behaviour Theory. 20,125 adolescents aged 11-15 in five countries (Belgium, Israel, USA, Canada, FYR Macedonia) were surveyed via the 2006 Health Behaviour in School Aged Children survey. Prevalence was calculated for physical fighting and weapon carrying along with physical and emotional measures that potentially result from violence. Regression analyses were used to quantify associations between violence/weapon carrying and the potential health consequences within each country. Large variations in fighting and weapon carrying were observed across countries. Boys reported more frequent episodes of fighting/weapon carrying and medically attended injuries in every country, while girls reported more emotional symptoms. Although there were some notable variations in findings between different participating countries, increased weapon carrying and physical fighting were both independently and consistently associated with more frequent reports of the potential health outcomes. Adolescents engaging in fighting and weapon carrying are also at risk for physical and emotional health outcomes. Involvement in fighting and weapon carrying can be seen as part of a constellation of risk behaviours with obvious health implications. Our findings also highlight the importance of the cultural context when examining the nature of violent behaviour for adolescents.

  8. Physical and emotional health problems experienced by youth engaged in physical fighting and weapon carrying.

    Directory of Open Access Journals (Sweden)

    Sophie D Walsh

    Full Text Available Then aims of the current study were 1 to provide cross-national estimates of the prevalence of physical fighting and weapon carrying among adolescents aged 11-15 years; (2 To examine the possible effects of physical fighting and weapon carrying on the occurrence of physical (medically treated injuries and emotional health outcomes (multiple health complaints among adolescents within the theoretical framework of Problem Behaviour Theory. 20,125 adolescents aged 11-15 in five countries (Belgium, Israel, USA, Canada, FYR Macedonia were surveyed via the 2006 Health Behaviour in School Aged Children survey. Prevalence was calculated for physical fighting and weapon carrying along with physical and emotional measures that potentially result from violence. Regression analyses were used to quantify associations between violence/weapon carrying and the potential health consequences within each country. Large variations in fighting and weapon carrying were observed across countries. Boys reported more frequent episodes of fighting/weapon carrying and medically attended injuries in every country, while girls reported more emotional symptoms. Although there were some notable variations in findings between different participating countries, increased weapon carrying and physical fighting were both independently and consistently associated with more frequent reports of the potential health outcomes. Adolescents engaging in fighting and weapon carrying are also at risk for physical and emotional health outcomes. Involvement in fighting and weapon carrying can be seen as part of a constellation of risk behaviours with obvious health implications. Our findings also highlight the importance of the cultural context when examining the nature of violent behaviour for adolescents.

  9. Analysis of Fire Effectiveness Based on High-rate-firing Naval Gun Weapon System%基于高射频舰炮武器系统的射击效力分析

    Institute of Scientific and Technical Information of China (English)

    胡小利; 王炳

    2015-01-01

    In the face of the improved missile penetration ability and its speed, the author proposes to increase the gun firing rate based on the existing high⁃rate⁃firing of naval gun weapon system for an effective way, with the grim situation of sea bat⁃tlefield as a background. And this paper analyzes the Shooting effectiveness of different firing rate naval gun weapon system through the establishment of the mathematics module for damage probability. There is an important guiding significance on the development of high⁃rate⁃firing automatic gun weapon system.%以严峻的海上战场形势为背景,面对飞行速度和突防能力不断加强的反舰导弹,在现有高射频舰炮武器系统基础上,提出以增加舰炮射速为途径的改进方式,并建立对空碰炸射击毁伤模型,对不同射频的舰炮武器系统进行射击效力分析,对高射频自动炮武器系统的研制有重要指导意义。

  10. Assessing the risk from the depleted uranium weapons used in Operation Allied Force

    CERN Document Server

    Liolios, T E

    1999-01-01

    The conflict in Yugoslavia has been a source of great concern for the neighboring countries, about the radiological and toxic hazard posed by the alleged presence of depleted uranium in NATO weapons. In the present study a worst-case scenario is assumed mainly to assess the risk for Greece and other neighboring countries of Yugoslavia at similar distances . The risk of the weapons currently in use is proved to be negligible at distances greater than 100 Km. For shorter distances classified data of weapons composition are needed to obtain a reliable assessment.

  11. Study on effectiveness evaluation of weapon systems based on grey relational analysis and TOPSIS

    Institute of Scientific and Technical Information of China (English)

    Gu Hui; Song Bifeng

    2009-01-01

    To evaluate the effectiveness of weapon systems, the advantages and disadvantages of grey relational analysis and TOPSIS for multiattribute decision-making is pointed out, and an effectiveness evaluation model of weapon systems by combining grey relational analysis and TOPSIS is proposed. The model aggregates the grey relational grade and the distance to a new integrated closeness and reflects not only the trend but also the situation of the alternative. The example illuminates that the model is effective for the effectiveness evaluation of weapon systems.

  12. Relevance of Nuclear Weapons Clean-Up Experience to Dirty Bomb Response

    Energy Technology Data Exchange (ETDEWEB)

    Vantine, H C; Crites, T R

    2002-08-19

    During the past 50 years, the United States has experienced 32 major nuclear weapons accidents, nine of which released special nuclear material to the environment. Response to these accidents, coupled with recovery experience following the Russian satellite reentry and weapons test site cleanup, form the basis for determining actions that might be required following a nuclear terrorist event involving the release of radioactive material. Though valuable information has been gained following the recovery from various commercial accidents, most notably the Chernobyl nuclear power plant failure and the dismantled radiography source in the Brazilian city of Goi nia, this paper will focus on the lessons learned from the U.S. nuclear weapons program.

  13. The Combat with Short Edged Weapons in Persian SwordsmanshiP

    Directory of Open Access Journals (Sweden)

    Manouchehr Moshtagh Khorasani

    2012-07-01

    Full Text Available The combat with short-edged weapons has a long tradition in Iran. There are several traditional types of Persian knives and daggers. They can generally be classified into three main categories that were used by Persian warriors in close cambat: kārd (knife, xanjar (dagger, and pišqabz (a type of knife/dagger with an S-shaped blade. The pišqabz was also called dešne. The following article presents these different weapons, analyzing their basic features and variations, the way of carrying and unsheathing them, and the corresponding techniques of use of each weapon.

  14. Automatic generation of tourist brochures

    KAUST Repository

    Birsak, Michael

    2014-05-01

    We present a novel framework for the automatic generation of tourist brochures that include routing instructions and additional information presented in the form of so-called detail lenses. The first contribution of this paper is the automatic creation of layouts for the brochures. Our approach is based on the minimization of an energy function that combines multiple goals: positioning of the lenses as close as possible to the corresponding region shown in an overview map, keeping the number of lenses low, and an efficient numbering of the lenses. The second contribution is a route-aware simplification of the graph of streets used for traveling between the points of interest (POIs). This is done by reducing the graph consisting of all shortest paths through the minimization of an energy function. The output is a subset of street segments that enable traveling between all the POIs without considerable detours, while at the same time guaranteeing a clutter-free visualization. © 2014 The Author(s) Computer Graphics Forum © 2014 The Eurographics Association and John Wiley & Sons Ltd. Published by John Wiley & Sons Ltd.

  15. A rubber-covered ceramic weapon reduces the incidence of dental trauma in recruits during combat basic training.

    Science.gov (United States)

    Becker, Talia; Ashkenazi, Malka

    2011-10-01

    The effect of a rubber-covered ceramic weapon was assessed on the incidence of dental trauma during basic training, since soldiers are more at risk of impact from a personal weapon. Dental files of soldiers (n = 4,542), who completed 8 months of training during 2008, were analyzed for incidence and type of dental trauma from a personal weapon. A rubber-covered ceramic weapon (n = 2,972) or a conventional one (n = 1,570, control) was used. Dental trauma was 0.4% per 8 months (0.6% per year) from the ceramic weapon and 1.5% per 8 months (2.3% per year) from the conventional one (pcontrol group). The ceramic weapon significantly reduced dental trauma by diminishing the impact while in direct contact with the teeth or by absorbing and/or distributing the impact force. In conclusion, when possible a rubber-covered ceramic weapon should be preferred for basic combat training.

  16. QXT-full Automatic Saccharify Instrument

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    QXT is a full automatic saccharify instrument of eight holes . The instrument use process control technology of micro-computer. It can realize automatic of saccharify full process correctly. Due to adapt control mode of high precision expert PID and digit automatic calibration technology of fill micro computer, not only ensure precision of linear raising temperature region (1 ℃ /min) and constant temperature region (temperature error ±0.2 ℃), but also overcome the disturbance

  17. Automatic Control of Water Pumping Stations

    Institute of Scientific and Technical Information of China (English)

    Muhannad Alrheeh; JIANG Zhengfeng

    2006-01-01

    Automatic Control of pumps is an interesting proposal to operate water pumping stations among many kinds of water pumping stations according to their functions.In this paper, our pumping station is being used for water supply system. This paper is to introduce the idea of pump controller and the important factors that must be considering when we want to design automatic control system of water pumping stations. Then the automatic control circuit with the function of all components will be introduced.

  18. Lipophilic super-absorbent swelling gels as cleaners for use on weapons systems and platforms

    Science.gov (United States)

    Increasingly stringent environmental regulations on volatile organic compounds (VOCs) and hazardous air pollutants (HAPs) demand the development of disruptive technologies for cleaning weapons systems and platforms. Currently employed techniques such as vapor degreasing, solvent, aqueous, or blast c...

  19. The flap by flap dissection in terminal ballistic applied to less lethal weapons.

    Science.gov (United States)

    de Freminville, Humbert; Rongieras, Fréderic; Prat, Nicolas; Voiglio, Eric J

    2011-06-01

    Medical examiners often have to solve questions such as firing distance and bullet trajectory for lethal weapons. Knowledge in the field of terminal ballistics has increased during the last 30 years and layer by layer dissection reveals superficial wounds that can be linked with the permanent cavity. At the end of the 1990s, terminal ballistics also focused on less lethal weapons and their wounds. Here, 2 different less lethal weapons with single bullets were tested on nonembalmed and undressed cadavers (N = 26) at different ranges and speeds. We have developed a technique for dissection which we call flap by flap dissection that reveals the advantage of the bullet-skin-bone entity, the absence of wounds linking its components and range of less lethal weapons.

  20. Proceedings: 17th Asilomar conference on fire and blast effects of nuclear weapons

    Energy Technology Data Exchange (ETDEWEB)

    Hickman, R.G.; Meier, C.A. (eds.)

    1983-01-01

    The objective of the 1983 conference was to provide for the technical exchange of ideas relating to the science and technology of the immediate effects of nuclear weapon explosions. Separate abstracts were prepared for 39 of the papers.

  1. A comparison of commercial/industry and nuclear weapons safety concepts

    Energy Technology Data Exchange (ETDEWEB)

    Bennett, R.R.; Summers, D.A.

    1996-07-01

    In this paper the authors identify factors which influence the safety philosophy used in the US commercial/industrial sector and compare them against those factors which influence nuclear weapons safety. Commercial/industrial safety is guided by private and public safety standards. Generally, private safety standards tend to emphasize product reliability issues while public (i.e., government) safety standards tend to emphasize human factors issues. Safety in the nuclear weapons arena is driven by federal requirements and memoranda of understanding (MOUs) between the Departments of Defense and Energy. Safety is achieved through passive design features integrated into the nuclear weapon. Though the common strand between commercial/industrial and nuclear weapons safety is the minimization of risk posed to the general population (i.e., public safety), the authors found that each sector tends to employ a different safety approach to view and resolve high-consequence safety issues.

  2. Amendment #3 : Hunting and Fishing Plan : Mingo National Wildlife Refuge : Historic Weapons Deer Hunt

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This amendment to the Mingo NWR Hunting and Fishing Plan opens an additional 5,000 acres in the southwest portion of the Refuge to a historic weapons deer hunt.

  3. Total Quality Management and nuclear weapons: A historian`s perspective

    Energy Technology Data Exchange (ETDEWEB)

    Meade, R.A.

    1993-11-01

    Total Quality Management (TQM) has become a significant management theme at Los Alamos National Laboratory. This paper discusses the historical roots of TQM at Los Alamos and how TQM has been used in the development of nuclear weapons.

  4. Long-term retrievability and safeguards for immobilized weapons plutonium in geologic storage

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, P.F. [Univ. of California, Berkeley, CA (United States)

    1996-05-01

    If plutonium is not ultimately used as an energy source, the quantity of excess weapons plutonium (w-Pu) that would go into a US repository will be small compared to the quantity of plutonium contained in the commercial spent fuel in the repository, and the US repository(ies) will likely be only one (or two) locations out of many around the world where commercial spent fuel will be stored. Therefore excess weapons plutonium creates a small perturbation to the long-term (over 200,000 yr) global safeguard requirements for spent fuel. There are details in the differences between spent fuel and immobilized w-Pu waste forms (i.e. chemical separation methods, utility for weapons, nuclear testing requirements), but these are sufficiently small to be unlikely to play a significant role in any US political decision to rebuild weapons inventories, or to change the long-term risks of theft by subnational groups.

  5. U.S. Nuclear Weapons Modernization - the Stockpile Life Extension Program

    Science.gov (United States)

    Cook, Donald

    2016-03-01

    Underground nuclear testing of U.S. nuclear weapons was halted by President George H.W. Bush in 1992 when he announced a moratorium. In 1993, the moratorium was extended by President Bill Clinton and, in 1995, a program of Stockpile Stewardship was put in its place. In 1996, President Clinton signed the Comprehensive Nuclear Test Ban Treaty (CTBT). Twenty years have passed since then. Over the same time, the average age of a nuclear weapon in the stockpile has increased from 6 years (1992) to nearly 29 years (2015). At its inception, achievement of the objectives of the Stockpile Stewardship Program (SSP) appeared possible but very difficult. The cost to design and construct several large facilities for precision experimentation in hydrodynamics and high energy density physics was large. The practical steps needed to move from computational platforms of less than 100 Mflops/sec to 10 Teraflops/sec and beyond were unknown. Today, most of the required facilities for SSP are in place and computational speed has been increased by more than six orders of magnitude. These, and the physicists and engineers in the complex of labs and plants within the National Nuclear Security Administration (NNSA) who put them in place, have been the basis for underpinning an annual decision, made by the weapons lab directors for each of the past 20 years, that resort to underground nuclear testing is not needed for maintaining confidence in the safety and reliability of the U.S stockpile. A key part of that decision has been annual assessment of the physical changes in stockpiled weapons. These weapons, quite simply, are systems that invariably and unstoppably age in the internal weapon environment of radioactive materials and complex interfaces of highly dissimilar organic and inorganic materials. Without an ongoing program to rebuild some components and replace other components to increase safety or security, i.e., life extending these weapons, either underground testing would again be

  6. Automatic Network Reconstruction using ASP

    CERN Document Server

    Ostrowski, Max; Durzinsky, Markus; Marwan, Wolfgang; Wagler, Annegret

    2011-01-01

    Building biological models by inferring functional dependencies from experimental data is an im- portant issue in Molecular Biology. To relieve the biologist from this traditionally manual process, various approaches have been proposed to increase the degree of automation. However, available ap- proaches often yield a single model only, rely on specific assumptions, and/or use dedicated, heuris- tic algorithms that are intolerant to changing circumstances or requirements in the view of the rapid progress made in Biotechnology. Our aim is to provide a declarative solution to the problem by ap- peal to Answer Set Programming (ASP) overcoming these difficulties. We build upon an existing approach to Automatic Network Reconstruction proposed by part of the authors. This approach has firm mathematical foundations and is well suited for ASP due to its combinatorial flavor providing a characterization of all models explaining a set of experiments. The usage of ASP has several ben- efits over the existing heuristic a...

  7. Automatic validation of numerical solutions

    DEFF Research Database (Denmark)

    Stauning, Ole

    1997-01-01

    This thesis is concerned with ``Automatic Validation of Numerical Solutions''. The basic theory of interval analysis and self-validating methods is introduced. The mean value enclosure is applied to discrete mappings for obtaining narrow enclosures of the iterates when applying these mappings...... is the possiblility to combine the three methods in an extremely flexible way. We examine some applications where this flexibility is very useful. A method for Taylor expanding solutions of ordinary differential equations is presented, and a method for obtaining interval enclosures of the truncation errors incurred...... with intervals as initial values. A modification of the mean value enclosure of discrete mappings is considered, namely the extended mean value enclosure which in most cases leads to even better enclosures. These methods have previously been described in connection with discretizing solutions of ordinary...

  8. Automatic summarising factors and directions

    CERN Document Server

    Jones, K S

    1998-01-01

    This position paper suggests that progress with automatic summarising demands a better research methodology and a carefully focussed research strategy. In order to develop effective procedures it is necessary to identify and respond to the context factors, i.e. input, purpose, and output factors, that bear on summarising and its evaluation. The paper analyses and illustrates these factors and their implications for evaluation. It then argues that this analysis, together with the state of the art and the intrinsic difficulty of summarising, imply a nearer-term strategy concentrating on shallow, but not surface, text analysis and on indicative summarising. This is illustrated with current work, from which a potentially productive research programme can be developed.

  9. Autoclass: An automatic classification system

    Science.gov (United States)

    Stutz, John; Cheeseman, Peter; Hanson, Robin

    1991-01-01

    The task of inferring a set of classes and class descriptions most likely to explain a given data set can be placed on a firm theoretical foundation using Bayesian statistics. Within this framework, and using various mathematical and algorithmic approximations, the AutoClass System searches for the most probable classifications, automatically choosing the number of classes and complexity of class descriptions. A simpler version of AutoClass has been applied to many large real data sets, has discovered new independently-verified phenomena, and has been released as a robust software package. Recent extensions allow attributes to be selectively correlated within particular classes, and allow classes to inherit, or share, model parameters through a class hierarchy. The mathematical foundations of AutoClass are summarized.

  10. Effectiveness Testing and Evaluation of Non-Lethal Weapons for Crowd Management

    Science.gov (United States)

    2014-06-01

    Weapons”) • Participants were recruited from the general population to participate in an investigation on “ Crowd Movement ” • Fifty-two healthy men...U.S. Army Armament Research, Development, and Engineering Center EFFECTIVENESS TESTING AND EVALUATION OF NON-LETHAL WEAPONS FOR CROWD MANAGEMENT...SUBTITLE EFFECTIVENESS TESTING AND EVALUATION OF NON-LETHAL WEAPONS FOR CROWD MANAGEMENT Presented at the Virtual 82nd Military Operations Research

  11. Simulation of Fighter Aircraft Weapon Systems for Design and Performance Evaluation

    OpenAIRE

    P. S. Subramanyam

    1997-01-01

    Simulation forms an essential tool in the system design and performance evaluation of fighter aircraft weapon systems. The various guidance strategies used for weapons like guns, missiles, bombs in the air-to-air or air-to-ground missions, for aiding the pilot for an effective delivery have been studied through extensive off-line and pilot-in-loop simulation. The pilot workload analysis carried out in the high fidelity cockpit simulator at the Aeronautical Development Agency , Bangalor...

  12. Viable Short-Term Directed Energy Weapon Naval Solutions: A Systems Analysis of Current Prototypes

    Science.gov (United States)

    2013-06-01

    WEAPON COMPARISON Dating back to the 1950s, science fiction films captivated audiences with tales of futuristic weapons that had unlimited capability...answered, the allowable relationships are characterized in GINA and made available for exploration and evaluation with minimal to no rework required to...shipboard firefighters. These hazards can be mitigated to a manageable level of risk through the proper storage and care of the batteries in a dry

  13. Virtual enterprise model for the electronic components business in the Nuclear Weapons Complex

    Energy Technology Data Exchange (ETDEWEB)

    Ferguson, T.J.; Long, K.S.; Sayre, J.A. [Sandia National Labs., Albuquerque, NM (United States); Hull, A.L. [Sandia National Labs., Livermore, CA (United States); Carey, D.A.; Sim, J.R.; Smith, M.G. [Allied-Signal Aerospace Co., Kansas City, MO (United States). Kansas City Div.

    1994-08-01

    The electronic components business within the Nuclear Weapons Complex spans organizational and Department of Energy contractor boundaries. An assessment of the current processes indicates a need for fundamentally changing the way electronic components are developed, procured, and manufactured. A model is provided based on a virtual enterprise that recognizes distinctive competencies within the Nuclear Weapons Complex and at the vendors. The model incorporates changes that reduce component delivery cycle time and improve cost effectiveness while delivering components of the appropriate quality.

  14. Pisanello’s hat. The costume and weapons depicted in Pisanello’s medal for John VIII Palaeologus. A discussion of the saber and related weapons

    Directory of Open Access Journals (Sweden)

    Alexander, David

    2004-12-01

    Full Text Available A group of six drawings by the Veronese artist Antonio Pisano depicted the Bizantine Emperor John VIII Paleologus wearing costumes and weapons according to islamic types. This paper studies these objects in relation to other contemporary islamic weapons.

    Un grupo de seis dibujos del artista veronés Antonio Pisano representa al emperador bizantino Juan VIII Paleólogo vestido y armado según modelos islámicos. Este trabajo estudia dichos objetos en relación a otras armas islámicas contemporáneas.

  15. Solar Powered Automatic Shrimp Feeding System

    Directory of Open Access Journals (Sweden)

    Dindo T. Ani

    2015-12-01

    Full Text Available - Automatic system has brought many revolutions in the existing technologies. One among the technologies, which has greater developments, is the solar powered automatic shrimp feeding system. For instance, the solar power which is a renewable energy can be an alternative solution to energy crisis and basically reducing man power by using it in an automatic manner. The researchers believe an automatic shrimp feeding system may help solve problems on manual feeding operations. The project study aimed to design and develop a solar powered automatic shrimp feeding system. It specifically sought to prepare the design specifications of the project, to determine the methods of fabrication and assembly, and to test the response time of the automatic shrimp feeding system. The researchers designed and developed an automatic system which utilizes a 10 hour timer to be set in intervals preferred by the user and will undergo a continuous process. The magnetic contactor acts as a switch connected to the 10 hour timer which controls the activation or termination of electrical loads and powered by means of a solar panel outputting electrical power, and a rechargeable battery in electrical communication with the solar panel for storing the power. By undergoing through series of testing, the components of the modified system were proven functional and were operating within the desired output. It was recommended that the timer to be used should be tested to avoid malfunction and achieve the fully automatic system and that the system may be improved to handle changes in scope of the project.

  16. Automatic cobb angle determination from radiographic images

    NARCIS (Netherlands)

    Sardjono, Tri Arief; Wilkinson, Michael H.F.; Veldhuizen, Albert G.; Ooijen, van Peter M.A.; Purnama, Ketut E.; Verkerke, Gijsbertus J.

    2013-01-01

    Study Design. Automatic measurement of Cobb angle in patients with scoliosis. Objective. To test the accuracy of an automatic Cobb angle determination method from frontal radiographical images. Summary of Background Data. Thirty-six frontal radiographical images of patients with scoliosis. Met

  17. Automatic Cobb Angle Determination From Radiographic Images

    NARCIS (Netherlands)

    Sardjono, Tri Arief; Wilkinson, Michael H. F.; Veldhuizen, Albert G.; van Ooijen, Peter M. A.; Purnama, Ketut E.; Verkerke, Gijsbertus J.

    2013-01-01

    Study Design. Automatic measurement of Cobb angle in patients with scoliosis. Objective. To test the accuracy of an automatic Cobb angle determination method from frontal radiographical images. Summary of Background Data. Thirty-six frontal radiographical images of patients with scoliosis. Methods.

  18. Threat is in the Sex of the Beholder: Men Find Weapons Faster than do Women

    Directory of Open Access Journals (Sweden)

    Danielle Sulikowski

    2014-04-01

    Full Text Available In visual displays, people locate potentially threatening stimuli, such as snakes, spiders, and weapons, more quickly than similar benign stimuli, such as beetles and gadgets. Such biases are likely adaptive, facilitating fast responses to potential threats. Currently, and historically, men have engaged in more weapons-related activities (fighting and hunting than women. If biases of visual attention for weapons result from selection pressures related to these activities, then we would predict such biases to be stronger in men than in women. The current study reports the results of two visual search experiments, in which men showed a stronger bias of attention toward guns and knives than did women, whether the weapons were depicted wielded or not. When the weapons were depicted wielded, both sexes searched for them with more caution than when they were not. Neither of these effects extended reliably to syringes, a non-weapon—yet potentially threatening—object. The findings are discussed with respect to the “weapons effect” and social coercion theory.

  19. The Future of Killing: Ethical and Legal Implications of Fully Autonomous Weapon Systems

    Directory of Open Access Journals (Sweden)

    Martin Lark

    2017-03-01

    Full Text Available Warfare is moving towards full weapon autonomy. Already, there are weapons in service that replace a human at the point of engagement. The remote pilot must adhere to the law and consider the moral and ethical implications of using lethal force. Future fully autonomous weapons will be able to search for, identify and engage targets without human intervention, raising the question of who is responsible for the moral and ethical considerations of using such weapons. In the chaos of war, people are fallible, but they can apply judgement and discretion and identify subtle signals. For example, humans can identify when an enemy wants to surrender, are burying their dead, or are assisting non-combatants. An autonomous weapon may not be so discerning and may not be capable of being programmed to apply discretion, compassion, or mercy, nor can it adapt commanders’ intent or apply initiative. Before fully autonomous weapons use lethal force, it is argued that there needs to be assurances that the ethical implications are understood and that control mechanisms are in place to ensure that oversight of the system is able to prevent incidents that could amount to breaches of the laws of armed conflict.

  20. Weapons of mass destruction: Overview of the CBRNEs (Chemical, Biological, Radiological, Nuclear, and Explosives).

    Science.gov (United States)

    Prockop, Leon D

    2006-11-01

    The events of September 11, 2001, made citizens of the world acutely aware of disasters consequent to present-day terrorism. This is a war being waged for reasons obscure to many of its potential victims. The term "NBCs" was coined in reference to terrorist weapons of mass destruction, i.e., nuclear, biological and chemical. The currently accepted acronym is "CBRNE" which includes Chemical, Biological, Radiological, Nuclear, and Explosive weapons. Non-nuclear explosives are the most common terrorist weapon now in use. Nuclear and radiological weapons are beyond the scope of this publication, which focuses on the "CBEs", i.e. chemical, biological and explosive weapons. Although neurologists will not be the first responders to CBEs, they must know about the neurological effects in order to provide diagnosis and treatment to survivors. Neurological complications of chemical, biological and explosive weapons which have or may be used by terrorists are reviewed by international experts in this publication. Management and treatment profiles are outlined.

  1. Mode Research on Space Weapons Systems Innovation Based Quality Function Deployment

    Directory of Open Access Journals (Sweden)

    Wang Xiuhong

    2011-06-01

    Full Text Available in the aviation industry, experts are enthusiastic over the research of sophisticated weapons. Little specialist pays attention to the innovation modes and methods. Up to now little quantization method suitable for aviation weapon systems innovation is presented. Base on the deep analysis and study on features of aviation weapon systems innovation and different innovation mode from the mass production, we have designed process model and quality chain model of aviation weapon systems innovation. Compared with the process model of large-scale innovation, the process models are more complex including many feedbacks and adding five steps: task decomposition, analysis of knowledge gap, accumulation of key knowledge, outsourcing selection, system integration. Meanwhile manufacturing process and R&D process are preformed simultaneously, and are involved in the process of module development. Technology application and diffusion are preformed with delivering the final innovation product to user. Quality function deployment and quality house are adopted to deal with the quality transfer among nodes. Quality demands of one node are converted into the technique features of another node in the quality house. We designed the top-down technique features transfer model and bottom-up demands transfer model to solve the quality transfer problems among nodes. At last an example is given to illustrate that this approach can accelerate to blaze the aviation weapon systems trails more than the existing methods and effectively reach quality management of aviation weapon systems innovation.

  2. Reflexive and automatic violence: a function of aberrant perceptual inhibition

    Directory of Open Access Journals (Sweden)

    Golembiewski, Jan A.

    2014-12-01

    Full Text Available It is commonly assumed that psychiatric violence is motivated by delusions, but here the concept of a reversed impetus is explored, to understand whether delusions are formed as ad-hoc or post-hoc rationalizations of behaviour or in advance of the actus reus. The reflexive violence model proposes that perceptual stimuli has motivational power and this may trigger unwanted actions and hallucinations. The model is based on the theory of ecological perception, where opportunities enabled by an object are cues to act. As an apple triggers a desire to eat, a gun triggers a desire to shoot. These affordances (as they are called are part of the perceptual apparatus, they allow the direct recognition of objects – and in emergencies they enable the fastest possible reactions. Even under normal circumstances, the presence of a weapon will trigger inhibited violent impulses. The presence of a victim will also, but under normal circumstances, these affordances don’t become violent because negative action impulses are totally inhibited, whereas in psychotic illness, negative action impulses are treated as emergencies and bypass frontal inhibitory circuits. What would have been object recognition becomes a blind automatic action. A range of mental illnesses can cause inhibition to be bypassed. At its most innocuous, this causes both simple hallucinations (where the motivational power of an object is misattributed. But ecological perception may have the power to trigger serious violence also –a kind that’s devoid of motives or planning and is often shrouded in amnesia or post-rational delusions

  3. Environmental management of assembled chemical weapons assessment program.

    Energy Technology Data Exchange (ETDEWEB)

    Frey, G.; Mohrman, G.; Templin, B. R.

    1999-05-07

    Environmental planning and management was an integral part of the ACWA Program planning process. To ensure that environmental protection issues could be addressed expeditiously and not delay the demonstrations, the PMACWA scaled the technology demonstrations such that simplified regulatory processes and existing research and development facilities could be used. The use of enclosed facilities for the demonstrations prevents any uncontrolled discharges to the environment and made it possible to conduct environmental assessments relatively quickly. The PMACWA also arranged for public briefings to ease any community concerns over the operations with chemical weapons. These steps precluded regulatory and community resistance to the ACWA activities. The cooperation of the regulators and stakeholders has been a key element in enabling the ACWA Program to move with the speed that it has to date. Technology demonstrations are currently underway and are scheduled to be completed in late May 1999. The data collected during these demonstrations will be used to prepare and submit a summary report to Congress by August 1999. The challenge continues for the ACWA management to guide the demonstrations to completion and to plan for possible pilot testing. As the scale of the ACWA facilities increase in size, the ease of reduced regulatory processes and environmental analyses will no longer be possible. However, the PMACWA will continue to explore all paths through the environmental process to speed the ACWA program to its goals while at the same time ensuring adequate protection of public health and safety and of the environment.

  4. Modern Weapons and Military Equipment for Issue 1/2014

    Directory of Open Access Journals (Sweden)

    Mladen R. Tišma

    2014-02-01

    Full Text Available Czech Aero star development of L-169 trainer; Scorpion light attack jet performs maiden flight; New M-345 HET trainer revealed; Turkish attack helicopter again in delay; India’s LCA Tejas reaches IOC; Iran reveals UCAV Fotros; Integration of Meteor missile onto Gripen E agreed; French MoD and MBDA signed development and production contract for antitank system Moyenne Portee; UK invests 79 million Pounds into development of new generation submarines; German Iris-T SL surface-to-air missile successful trails; Alexander Nevsky submarine enters into operation with the Russian Navy; Maiden flight of Chinese Z-20 helicopter; F-35’s first live AMRAAM firing; KAI reveals model of the new version of its KFX fighter; Lockheed’s Skunk Works reveals SR-72; India’s DRDO presents tactical ballistic missile Pragati; Sikorsky Innovations wins contract for VTOL experimental aircraft; Jordanian gunship CN235 performs maiden flight; General Atomics shows its EMRG railgun; Aurora too wins contract for Phase I of VTOL X-Plane program; Airbus Military reveals more details on new Fire-fighter; US proposal of weapons and equipment for Romanian F-16A/B; Russia to develop light-weight front-line fighter; Start of Eurofighter cruise missile integration trails.

  5. Weapons plutonium for electricity: a win-win-win solution

    Energy Technology Data Exchange (ETDEWEB)

    Goldschmidt, P. [Synatom, Brussels (Belgium)

    1997-12-31

    Incorporating recovered weapons-grade plutonium into mixed-oxide (MOX) fuel to produce electricity in currently operating reactors is presented as the best option for its disposition from a European utilities perspective. It would be a win-win-win solution. Firstly, it would be a win for the US government as the only technology readily available on an industrial scale and therefore the fastest way to convert the surplus plutonium to a highly proliferation resistant spent fuel form, as well as being the most cost-effective option. It would also have the political advantages of proving to the world that the US is dedicated to the elimination of its surplus plutonium without delay, receiving support from the Western allies of the US, and encouraging the Russians to take the same route. Secondly, it would be a win for the US utilities both in economic terms and in improving their public image through their contribution to world disarmament. Finally, it would be a win for the world as the fastest route to making disarmament irreversible and as the only solution that conserves natural resources. (8 figures; 14 references) (UK).

  6. Simulation training tools for nonlethal weapons using gaming environments

    Science.gov (United States)

    Donne, Alexsana; Eagan, Justin; Tse, Gabriel; Vanderslice, Tom; Woods, Jerry

    2006-05-01

    Modern simulation techniques have a growing role for evaluating new technologies and for developing cost-effective training programs. A mission simulator facilitates the productive exchange of ideas by demonstration of concepts through compellingly realistic computer simulation. Revolutionary advances in 3D simulation technology have made it possible for desktop computers to process strikingly realistic and complex interactions with results depicted in real-time. Computer games now allow for multiple real human players and "artificially intelligent" (AI) simulated robots to play together. Advances in computer processing power have compensated for the inherent intensive calculations required for complex simulation scenarios. The main components of the leading game-engines have been released for user modifications, enabling game enthusiasts and amateur programmers to advance the state-of-the-art in AI and computer simulation technologies. It is now possible to simulate sophisticated and realistic conflict situations in order to evaluate the impact of non-lethal devices as well as conflict resolution procedures using such devices. Simulations can reduce training costs as end users: learn what a device does and doesn't do prior to use, understand responses to the device prior to deployment, determine if the device is appropriate for their situational responses, and train with new devices and techniques before purchasing hardware. This paper will present the status of SARA's mission simulation development activities, based on the Half-Life gameengine, for the purpose of evaluating the latest non-lethal weapon devices, and for developing training tools for such devices.

  7. Bioforensics: Characterization of biological weapons agents by NanoSIMS

    Energy Technology Data Exchange (ETDEWEB)

    Weber, P K; Ghosal, S; Leighton, T J; Wheeler, K E; Hutcheon, I D

    2007-02-26

    The anthrax attacks of Fall 2001 highlight the need to develop forensic methods based on multiple identifiers to determine the origin of biological weapons agents. Genetic typing methods (i.e., DNA and RNA-based) provide one attribution technology, but genetic information alone is not usually sufficient to determine the provenance of the material. Non-genetic identifiers, including elemental and isotopic signatures, provide complementary information that can be used to identify the means, geographic location and date of production. Under LDRD funding, we have successfully developed the techniques necessary to perform bioforensic characterization with the NanoSIMS at the individual spore level. We have developed methods for elemental and isotopic characterization at the single spore scale. We have developed methods for analyzing spore sections to map elemental abundance within spores. We have developed rapid focused ion beam (FIB) sectioning techniques for spores to preserve elemental and structural integrity. And we have developed a high-resolution depth profiling method to characterize the elemental distribution in individual spores without sectioning. We used these newly developed methods to study the controls on elemental abundances in spores, characterize the elemental distribution of in spores, and to study elemental uptake by spores. Our work under this LDRD project attracted FBI and DHS funding for applied purposes.

  8. Molecular weapons against agricultural vulnerability and the war on terror.

    Science.gov (United States)

    Hietela, Sharon K; Ardans, Alex A

    2003-01-01

    The multiple reports in this issue of the Journal from the Agenda for Action conference, coupled with the analysis by the National Academy of Sciences, the National Research Council, and the Auditor General (UK) on bioterror preparedness and homeland security, highlight the immediate need for rapid disease detection and advanced diagnostic capabilities to protect the public health, animal agriculture, and the numerous associated economies in the United States. In response to the potentially devastating consequences that could arise, there is an acute need for rapid detection of a variety of the lethal foreign animal diseases, such as foot-and-mouth disease virus (FMDV), highly pathogenic strains of avian influenza, classical swine fever, rinderpest, exotic Newcastle disease virus (END), and domestic, vesicular look-alike diseases that include bluetongue, epizootic hemorrhagic disease, vesicular stomatitis, bovine herpes IBR, contagious ecthyma, bovine herpes mammilitis virus, vesicular exanthema, malignant catarrhal fever, and papular stomatitis. Some striking advances are occurring in the creation of rapid technology, including microfluidics, robotics, miniaturization, and biostabilization that are quickly being applied to the development of rapid microbial detection assays. These are now providing important weapons to combat this agricultural vulnerability.

  9. 7 CFR 58.418 - Automatic cheese making equipment.

    Science.gov (United States)

    2010-01-01

    ... processing or packaging areas. (c) Automatic salter. The automatic salter shall be constructed of stainless.... The automatic salter shall be constructed so that it can be satisfactorily cleaned. The salting...

  10. A chest-shape target automatic detection method based on Deformable Part Models

    Science.gov (United States)

    Zhang, Mo; Jin, Weiqi; Li, Li

    2016-10-01

    Automatic weapon platform is one of the important research directions at domestic and overseas, it needs to accomplish fast searching for the object to be shot under complex background. Therefore, fast detection for given target is the foundation of further task. Considering that chest-shape target is common target of shoot practice, this paper treats chestshape target as the target and studies target automatic detection method based on Deformable Part Models. The algorithm computes Histograms of Oriented Gradient(HOG) features of the target and trains a model using Latent variable Support Vector Machine(SVM); In this model, target image is divided into several parts then we can obtain foot filter and part filters; Finally, the algorithm detects the target at the HOG features pyramid with method of sliding window. The running time of extracting HOG pyramid with lookup table can be shorten by 36%. The result indicates that this algorithm can detect the chest-shape target in natural environments indoors or outdoors. The true positive rate of detection reaches 76% with many hard samples, and the false positive rate approaches 0. Running on a PC (Intel(R)Core(TM) i5-4200H CPU) with C++ language, the detection time of images with the resolution of 640 × 480 is 2.093s. According to TI company run library about image pyramid and convolution for DM642 and other hardware, our detection algorithm is expected to be implemented on hardware platform, and it has application prospect in actual system.

  11. A Hierarchy of Tree-Automatic Structures

    CERN Document Server

    Finkel, Olivier

    2011-01-01

    We consider $\\omega^n$-automatic structures which are relational structures whose domain and relations are accepted by automata reading ordinal words of length $\\omega^n$ for some integer $n\\geq 1$. We show that all these structures are $\\omega$-tree-automatic structures presentable by Muller or Rabin tree automata. We prove that the isomorphism relation for $\\omega^2$-automatic (resp. $\\omega^n$-automatic for $n>2$) boolean algebras (respectively, partial orders, rings, commutative rings, non commutative rings, non commutative groups) is not determined by the axiomatic system ZFC. We infer from the proof of the above result that the isomorphism problem for $\\omega^n$-automatic boolean algebras, $n > 1$, (respectively, rings, commutative rings, non commutative rings, non commutative groups) is neither a $\\Sigma_2^1$-set nor a $\\Pi_2^1$-set. We obtain that there exist infinitely many $\\omega^n$-automatic, hence also $\\omega$-tree-automatic, atomless boolean algebras $B_n$, $n\\geq 1$, which are pairwise isomorp...

  12. Pattern-Driven Automatic Parallelization

    Directory of Open Access Journals (Sweden)

    Christoph W. Kessler

    1996-01-01

    Full Text Available This article describes a knowledge-based system for automatic parallelization of a wide class of sequential numerical codes operating on vectors and dense matrices, and for execution on distributed memory message-passing multiprocessors. Its main feature is a fast and powerful pattern recognition tool that locally identifies frequently occurring computations and programming concepts in the source code. This tool also works for dusty deck codes that have been "encrypted" by former machine-specific code transformations. Successful pattern recognition guides sophisticated code transformations including local algorithm replacement such that the parallelized code need not emerge from the sequential program structure by just parallelizing the loops. It allows access to an expert's knowledge on useful parallel algorithms, available machine-specific library routines, and powerful program transformations. The partially restored program semantics also supports local array alignment, distribution, and redistribution, and allows for faster and more exact prediction of the performance of the parallelized target code than is usually possible.

  13. Automatic image cropping for republishing

    Science.gov (United States)

    Cheatle, Phil

    2010-02-01

    Image cropping is an important aspect of creating aesthetically pleasing web pages and repurposing content for different web or printed output layouts. Cropping provides both the possibility of improving the composition of the image, and also the ability to change the aspect ratio of the image to suit the layout design needs of different document or web page formats. This paper presents a method for aesthetically cropping images on the basis of their content. Underlying the approach is a novel segmentation-based saliency method which identifies some regions as "distractions", as an alternative to the conventional "foreground" and "background" classifications. Distractions are a particular problem with typical consumer photos found on social networking websites such as FaceBook, Flickr etc. Automatic cropping is achieved by identifying the main subject area of the image and then using an optimization search to expand this to form an aesthetically pleasing crop. Evaluation of aesthetic functions like auto-crop is difficult as there is no single correct solution. A further contribution of this paper is an automated evaluation method which goes some way towards handling the complexity of aesthetic assessment. This allows crop algorithms to be easily evaluated against a large test set.

  14. Automatic segmentation of psoriasis lesions

    Science.gov (United States)

    Ning, Yang; Shi, Chenbo; Wang, Li; Shu, Chang

    2014-10-01

    The automatic segmentation of psoriatic lesions is widely researched these years. It is an important step in Computer-aid methods of calculating PASI for estimation of lesions. Currently those algorithms can only handle single erythema or only deal with scaling segmentation. In practice, scaling and erythema are often mixed together. In order to get the segmentation of lesions area - this paper proposes an algorithm based on Random forests with color and texture features. The algorithm has three steps. The first step, the polarized light is applied based on the skin's Tyndall-effect in the imaging to eliminate the reflection and Lab color space are used for fitting the human perception. The second step, sliding window and its sub windows are used to get textural feature and color feature. In this step, a feature of image roughness has been defined, so that scaling can be easily separated from normal skin. In the end, Random forests will be used to ensure the generalization ability of the algorithm. This algorithm can give reliable segmentation results even the image has different lighting conditions, skin types. In the data set offered by Union Hospital, more than 90% images can be segmented accurately.

  15. Automatic Assessment of Programming assignment

    Directory of Open Access Journals (Sweden)

    Surendra Gupta

    2012-01-01

    Full Text Available In today’s world study of computer’s language is more important. Effective and good programming skills are need full all computer science students. They can be master in programming, only through intensive exercise practices. Due to day by day increasing number of students in the class, the assessment of programming exercises leads to extensive workload for teacher/instructor, particularly if it has to be carried out manually. In this paper, we propose an automatic assessment system for programming assignments, using verification program with random inputs. One of the most important properties of a program is that, it carries out its intended function. The intended function of a program or part of a program can be verified by using inverse function’s verification program. For checking intended functionality and evaluation of a program, we have used verification program. This assessment system has been tested on basic C programming courses, and results shows that it can work well in basic programming exercises, with some initial promising results

  16. Automatic Weather Station (AWS) Lidar

    Science.gov (United States)

    Rall, Jonathan A.R.; Abshire, James B.; Spinhirne, James D.; Smith, David E. (Technical Monitor)

    2000-01-01

    An autonomous, low-power atmospheric lidar instrument is being developed at NASA Goddard Space Flight Center. This compact, portable lidar will operate continuously in a temperature controlled enclosure, charge its own batteries through a combination of a small rugged wind generator and solar panels, and transmit its data from remote locations to ground stations via satellite. A network of these instruments will be established by co-locating them at remote Automatic Weather Station (AWS) sites in Antarctica under the auspices of the National Science Foundation (NSF). The NSF Office of Polar Programs provides support to place the weather stations in remote areas of Antarctica in support of meteorological research and operations. The AWS meteorological data will directly benefit the analysis of the lidar data while a network of ground based atmospheric lidar will provide knowledge regarding the temporal evolution and spatial extent of Type la polar stratospheric clouds (PSC). These clouds play a crucial role in the annual austral springtime destruction of stratospheric ozone over Antarctica, i.e. the ozone hole. In addition, the lidar will monitor and record the general atmospheric conditions (transmission and backscatter) of the overlying atmosphere which will benefit the Geoscience Laser Altimeter System (GLAS). Prototype lidar instruments have been deployed to the Amundsen-Scott South Pole Station (1995-96, 2000) and to an Automated Geophysical Observatory site (AGO 1) in January 1999. We report on data acquired with these instruments, instrument performance, and anticipated performance of the AWS Lidar.

  17. Screening of Maritime Containers to Intercept Weapons of Mass Destruction

    Energy Technology Data Exchange (ETDEWEB)

    Manatt, D R; Sleaford, B; Schaffer, T; Accatino, M R; Slaughter, D; Mauger, J; Newmark, R; Prussin, S; Luke, J; Frank, M; Bernstein, A; Alford, O; Mattesich, G; Stengel, J; Hall, J; Descalle, M A; Wolford, J; Hall, H; Loshak, A; Sale, K; Trombino, D; Dougan, A D; Pohl, B; Dietrich, D; Weirup, D; Walling, R; Rowland, M; Johnson, D; Hagmann, C; Hankins, D

    2004-02-18

    The goal of our research was to address the problem of detection of weapons of mass destruction (WMD) materials within containers in common use on commercial cargo trafficking. LLNL has created an experimental test bed for researching potential solutions using (among other techniques) active interrogation with neutrons. Experiments and computational modeling were used to determine the effectiveness of the technique. Chemical weapons materials and high explosives can be detected using neutron activation and simple geometries with little or no intervening material. However in a loaded container there will be nuisance alarms from conflicting signatures resulting from the presence of material between the target and the detector (and the interrogation source). Identifying some elements may require long counting times because of the increased background. We performed some simple signature measurements and simulations of gamma-ray spectra from several chemical simulants. We identified areas where the nuclear data was inadequate to perform detailed computations. We concentrated on the detection of SNM in cargo containers, which will be emphasized here. The goal of the work reported here is to develop a concept for an active neutron interrogation system that can detect small targets of SNM contraband in cargo containers, roughly 5 kg HEU or 1 kg Pu, even when well shielded by a thick cargo. It is essential that the concept be reliable and have low false-positive and false-negative error rates. It also must be rapid to avoid interruption of commerce, completing the analysis in minutes. A potentially viable concept for cargo interrogation has been developed and its components have been evaluated experimentally. A new radiation signature unique to SNM has been identified that utilizes high-energy, fission-product gamma rays. That signature due to {gamma}-radiation in the range 3-6 MeV is distinct from normal background radioactivity that does not extend above 2.6 MeV. It

  18. Proliferation concerns in the Russian closed nuclear weapons complex cities : a study of regional migration behavior.

    Energy Technology Data Exchange (ETDEWEB)

    Flores, Kristen Lee

    2004-07-01

    The collapse of the Soviet Union in 1991 left the legacy of the USSR weapons complex with an estimated 50 nuclear, chemical, and biological weapons cities containing facilities responsible for research, production, maintenance, and destruction of the weapons stockpile. The Russian Federation acquired ten such previously secret, closed nuclear weapons complex cities. Unfortunately, a lack of government funding to support these facilities resulted in non-payment of salaries to employees and even plant closures, which led to an international fear of weapons material and knowledge proliferation. This dissertation analyzes migration in 33 regions of the Russian Federation, six of which contain the ten closed nuclear weapons complex cities. This study finds that the presence of a closed nuclear city does not significantly influence migration. However, the factors that do influence migration are statistically different in regions containing closed nuclear cities compared to regions without closed nuclear cities. Further, these results show that the net rate of migration has changed across the years since the break up of the Soviet Union, and that the push and pull factors for migration have changed across time. Specifically, personal and residential factors had a significant impact on migration immediately following the collapse of the Soviet Union, but economic infrastructure and societal factors became significant in later years. Two significant policy conclusions are derived from this research. First, higher levels of income are found to increase outmigration from regions, implying that programs designed to prevent migration by increasing incomes for closed city residents may be counter-productive. Second, this study finds that programs designed to increase capital and build infrastructure in the new Russian Federation will be more effective for employing scientists and engineers from the weapons complex, and consequently reduce the potential for emigration of

  19. Fourth and Fifth Amendment issues raised by Chemical Weapons Convention inspections

    Energy Technology Data Exchange (ETDEWEB)

    Tanzman, E.A. [Argonne National Lab., IL (United States). Economics and Law Section

    1994-10-21

    The Chemical Weapons Convention (CWC) offers a unique challenge to the United States system of constitutional law. This discussion is about the Fourth and Fifth Amendment issues raised by the CWC and about how federal implementing legislation can allow verification inspections to take place in the United States under the Chemical Weapons Convention while remaining in compliance with the Constitution. By implementing legislation, the author means a federal statute that would be enacted separately from Senate approval of the Convention itself. Although implementing legislation is a relatively unusual accompaniment to a treaty, it will be necessary to the CWC, and the Administration has submitted a bill that was under consideration in the last Congress and presumably will be reintroduced early next year. The Fourth and Fifth Amendment problems posed by the CWC arise from the verification inspection scheme embodied in the treaty. The CWC depends heavily on on-site inspections to verify compliance with its key requirements. These include destroying all chemicals weapons stockpiles and bringing potential chemical weapons precursors under international control. The Convention contains four distinct kinds of inspections: systematic inspections of chemical weapons storage and destruction facilities, routine inspections of various declared facilities, challenge inspections, and a variant on challenge inspections in cases of alleged use of chemical weapons. All inspections are supposed to be only as intrusive as necessary to carry out the Convention. These inspections will be carried out by inspectors employed by the Organization for the Prohibition of Chemical Weapons (OPCW), located in The Hague, which is responsible for enforcing the Convention. Generally, the inspected State Party is permitted to assign observers to accompany the inspectors.

  20. On the U.S.-Russian Tactical Nuclear Weapons Cut as a Path toward a Nuclear-free World

    Institute of Scientific and Technical Information of China (English)

    Shi; Jianbin

    2015-01-01

    Complete destruction of nuclear weapons and realization of a world free from nuclear weapons are the common aspiration of mankind in the atomic era.To achieve the goal,the international community has proposed a series of steps and measures,which include calling for a deep reduction of the U.S.and Russian nuclear arsenals,promoting ratification of the CTBT,initiating negotiation of the FMCT,reducing the role of nuclear weapons

  1. An Adaptive H infinity Control Algorithm for Jitter Control and Target Tracking in a Directed Energy Weapon

    Science.gov (United States)

    2012-05-16

    system, (2) free electron laser for weapons of mass destruction detection, (3) high power microwave weapon, (4) electric fiber weapon system, and (5...1980’s and 1990’s1. Free-space laser communication provides many advantages to traditional microwave communication: broader bandwidth, lower power...eliminate torsional and bending modes below approximately 200 Hz. The mass of the bread board is 71.3 kg. Figure 10 Newport Breadboard7 2.1.6

  2. Long Wave Infrared Detection of Chemical Weapons Simulants

    Energy Technology Data Exchange (ETDEWEB)

    Phillips, Mark C.; Taubman, Matthew S.; Scott, David C.; Myers, Tanya L.; Munley, John T.; Cannon, Bret D.

    2007-04-27

    The purpose of Task 3.b under PL02-OP211I-PD07 (CBW simulant detection) was to demonstrate the applicability of the sensor work developed under this project for chemical and biological weapons detection. To this end, the specific goal was to demonstrate the feasibility of detection of chemical agents via that of simulants (Freons) with similar spectroscopic features. This has been achieved using Freon-125 as a simulant, a tunable external cavity quantum cascade laser (ECQCL), and a Herriott cell-based sensor developed at Pacific Northwest National Laboratory (PNNL) specifically for this task. The experimentally obtained spectrum of this simulant matches that found in the Northwest Infrared (NWIR) spectral library extremely well, demonstrating the ability of this technique to detect the exact shape of this feature, which in turn indicates the ability to recognize the simulant even in the presence of significant interference. It has also been demonstrated that the detected features of a typical interferent, namely water, are so different in shape and width to the simulant, that they are easily recognized and separated from such a measurement. Judging from the signal-to-noise ratio (SNR) of the experimental data obtained, the noise equivalent absorption sensitivity is estimated to be 0.5 x 10-7 to 1 x 10-6 cm-1. For the particular feature of the simulant examined in this work, this corresponds to a relative concentration of 50 to 25 parts-per-billion by volume (ppbv). The corresponding relative concentrations of other chemical targets would differ depending on the particular transition strengths, and would thus have to be scaled accordingly.

  3. Blood drop size in passive dripping from weapons.

    Science.gov (United States)

    Kabaliuk, N; Jermy, M C; Morison, K; Stotesbury, T; Taylor, M C; Williams, E

    2013-05-10

    Passive dripping, the slow dripping of blood under gravity, is responsible for some bloodstains found at crime scenes, particularly drip trails left by a person moving through the scene. Previous work by other authors has established relationships, under ideal conditions, between the size of the stain, the number of spines and satellite stains, the roughness of the surface, the size of the blood droplet and the height from which it falls. To apply these relationships to infer the height of fall requires independent knowledge of the size of the droplet. This work aims to measure the size of droplets falling from objects representative of hand-held weapons. Pig blood was used, with density, surface tension and viscosity controlled to fall within the normal range for human blood. Distilled water was also tested as a reference. Drips were formed from stainless steel objects with different roughnesses including cylinders of diameter between 10 and 100 mm, and flat plates. Small radius objects including a knife and a wrench were also tested. High speed images of the falling drops were captured. The primary blood drop size ranged from 4.15±0.11 mm up to 6.15±0.15 mm (depending on the object), with the smaller values from sharper objects. The primary drop size correlated only weakly with surface roughness, over the roughness range studied. The number of accompanying droplets increased with the object size, but no significant correlation with surface texture was observed. Dripping of blood produced slightly smaller drops, with more accompanying droplets, than dripping water.

  4. [Medical magic of Paracelsus and Paracelsus followers: weapon salve].

    Science.gov (United States)

    Müller-Jahncke, W D

    1993-01-01

    The doctrine of 'transplantatio morborum' may be considered a branch of the 'magia naturalis'-philosophy which was widespread in the sixteenth century. According to this doctrine, ailments and remedies can be transferred from one body to another. A further example of this field of medicine is gun salve, which we find mentioned particularly in the works of the Paracelsists of the seventeenth and eighteenth centuries. Even though salve of various types had already been used for some time in the treatment of stab wounds, gun salve was imputed to have magnetic properties which gave rise to 'actio in distans', whereby the smearing of gun salve onto the weapon caused the wound to be healed. An early example of a description of its formula can be found in the first book of the 'Archidoxis magica': one of the works which have been wrongly attributed to Paracelsus. Early in the seventeenth century, this formula for gun salve--frequently with modifications--found its way into the writings of the followers of Paracelsian doctrine: of Oswald Croll, for example, or Rudolph Goclenius. When the concept of 'actio in distans' was propounded, an argument soon developed as to whether gun salve should be classified under 'magia naturalis' or 'magia daemoniaca'. Determined opposition to Goclenius was proferred in the person of Jean Roberti, a Belgian Jesuit who accused the Protestant Goclenius of consorting with demons. A number of treatises appeared in close succession, with Johann Baptist van Helmont emerging as the mediator in the argument. Yet he too came under attack at the hand of the Jesuit Roberti, with the result that, at least by the time Athanasius Kircher had also become embroiled in the debate, the dispute was pursued principally between orthodox Trentino Catholicism and heterodox Protestantism. An analysis of the writings on the subject of gun salve demonstrates how easily a discussion which was originally of a purely medical, scientific nature could lead to a religious

  5. Weapons of Mass Destruction Technology Evaluation and Training Range

    Energy Technology Data Exchange (ETDEWEB)

    Kevin Larry Young

    2009-05-01

    The Idaho National Laboratory (INL) has a long history for providing technology evaluation and training for military and other federal level Weapons of Mass Destruction (WMD) response agencies. Currently there are many federal organizations and commercial companies developing technologies related to detecting, assessing, mitigating and protecting against hazards associated with a WMD event. Unfortunately, very few locations exist within the United States where WMD response technologies are realistically field tested and evaluated using real chemical, biological, radiological, nuclear and explosive materials. This is particularly true with biological and radiological hazards. Related to this lack of adequate WMD, multi-hazard technology testing capability is the shortage of locations where WMD response teams can train using actual chemical, biological, and radiological material or highly realistic simulates. In response to these technology evaluation and training needs, the INL has assembled a consortium of subject matter experts from existing programs and identified dedicated resources for the purpose of establishing an all-hazards, WMD technology evaluation and training range. The author describes the challenges associated with creating the all-hazards WMD technology evaluation and training range and lists the technical, logistical and financial benefits of an all-hazards technology evaluation and training range. Current resources and capabilities for conducting all-hazard technology evaluation and training at the INL are identified. Existing technology evaluation and training programs at the INL related to radiological, biological and chemical hazards are highlighted, including successes and lessons learned. Finally, remaining gaps in WMD technology evaluation and training capabilities are identified along with recommendations for closing those gaps.

  6. Automatic Testing of a CANopen Node

    OpenAIRE

    Liang, Hui

    2013-01-01

    This Bachelor’s thesis was commissioned by TK Engineering Oy in Vaasa. The goals of the thesis were to test a prototype CANopen node, called UWASA Node for conformance to the CiA 301 standard, and to develop the automatic performance test software and the automatic CiA 401 test software. A test report that describes to the designer what needs to be corrected and improved is made in this thesis. For the CiA 301 test there is a CANopen conformance test tool that can be used. The automatic perfo...

  7. An Automatic Clustering Technique for Optimal Clusters

    CERN Document Server

    Pavan, K Karteeka; Rao, A V Dattatreya; 10.5121/ijcsea.2011.1412

    2011-01-01

    This paper proposes a simple, automatic and efficient clustering algorithm, namely, Automatic Merging for Optimal Clusters (AMOC) which aims to generate nearly optimal clusters for the given datasets automatically. The AMOC is an extension to standard k-means with a two phase iterative procedure combining certain validation techniques in order to find optimal clusters with automation of merging of clusters. Experiments on both synthetic and real data have proved that the proposed algorithm finds nearly optimal clustering structures in terms of number of clusters, compactness and separation.

  8. Future of clip-on weapon sights: pros and cons from an applications perspective

    Science.gov (United States)

    Knight, C. Reed; Greenslade, Ken; Francisco, Glen

    2015-05-01

    US Domestic, International, allied Foreign National Warfighters and Para-Military First Responders (Police, SWAT, Special Operations, Law Enforcement, Government, Security and more) are put in harm's way all the time. To successfully complete their missions and return home safely are the primary goals of these professionals. Tactical product improvements that affect mission effectiveness and solider survivability are pivotal to understanding the past, present and future of Clip-On in-line weapon sights. Clip-On Weapon Sight (WS) technology was deemed an interim solution by the US Government for use until integrated and fused (day/night multi-sensor) Weapon Sights (WSs) were developed/fielded. Clip-On has now become the solution of choice by Users, Warriors, Soldiers and the US Government. SWaP-C (size, weight and power -cost) has been improved through progressive advances in Clip-On Image Intensified (I2), passive thermal, LL-CMOS and fused technology. Clip-On Weapon Sights are now no longer mounting position sensitive. Now they maintain aim point boresight, so they can be used for longer ranges with increased capabilities while utilizing the existing zeroed weapon and daysight optic. Active illuminated low-light level (both analog I2 and digital LL-CMOS) imaging is rightfully a real-world technology, proven to deliver daytime and low-light level identification confidence. Passive thermal imaging is also a real-world technology, proven to deliver daytime, nighttime and all-weather (including dirty battlefield) target detection confidence. Image processing detection algorithms with intelligent analytics provide documented promise to improve confidence by reducing Users, Warriors and Soldiers' work-loads and improving overall system engagement solution outcomes. In order to understand the future of Clip-On in-line weapon sights, addressing pros and cons, this paper starts with an overview of historical weapon sight applications, technologies and stakeholder decisions

  9. Igniting the Light Elements: The Los Alamos Thermonuclear Weapon Project, 1942-1952

    Energy Technology Data Exchange (ETDEWEB)

    Fitzpatrick, Anne C. [Virginia Polytechnic Inst. and State Univ. (Virginia Tech), Blacksburg, VA (United States)

    1999-07-01

    The American system of nuclear weapons research and development was conceived and developed not as a result of technological determinism, but by a number of individual architects who promoted the growth of this large technologically-based complex. While some of the technological artifacts of this system, such as the fission weapons used in World War II, have been the subject of many historical studies, their technical successors--fusion (or hydrogen) devices--are representative of the largely unstudied highly secret realms of nuclear weapons science and engineering. In the postwar period a small number of Los Alamos Scientific Laboratory's staff and affiliates were responsible for theoretical work on fusion weapons, yet the program was subject to both the provisions and constraints of the US Atomic Energy Commission, of which Los Alamos was a part. The Commission leadership's struggle to establish a mission for its network of laboratories, least of all to keep them operating, affected Los Alamos's leaders' decisions as to the course of weapons design and development projects. Adapting Thomas P. Hughes's ''large technological systems'' thesis, I focus on the technical, social, political, and human problems that nuclear weapons scientists faced while pursuing the thermonuclear project, demonstrating why the early American thermonuclear bomb project was an immensely complicated scientific and technological undertaking. I concentrate mainly on Los Alamos Scientific Laboratory's Theoretical, or T, Division, and its members' attempts to complete an accurate mathematical treatment of the ''Super''--the most difficult problem in physics in the postwar period--and other fusion weapon theories. Although tackling a theoretical problem, theoreticians had to address technical and engineering issues as well. I demonstrate the relative value and importance of H-bomb research over time in the postwar era to

  10. Automatic tuning of myoelectric prostheses.

    Science.gov (United States)

    Bonivento, C; Davalli, A; Fantuzzi, C; Sacchetti, R; Terenzi, S

    1998-07-01

    This paper is concerned with the development of a software package for the automatic tuning of myoelectric prostheses. The package core consists of Fuzzy Logic Expert Systems (FLES) that embody skilled operator heuristics in the tuning of prosthesis control parameters. The prosthesis system is an artificial arm-hand system developed at the National Institute of Accidents at Work (INAIL) laboratories. The prosthesis is powered by an electric motor that is controlled by a microprocessor using myoelectric signals acquired from skin-surface electrodes placed on a muscle in the residual limb of the subject. The software package, Microprocessor Controlled Arm (MCA) Auto Tuning, is a tool for aiding both INAIL expert operators and unskilled persons in the controller parameter tuning procedure. Prosthesis control parameter setup and subsequent recurrent adjustments are fundamental for the correct working of the prosthesis, especially when we consider that myoelectric parameters may vary greatly with environmental modifications. The parameter adjustment requires the end-user to go to the manufacturer's laboratory for the control parameters setup because, generally, he/she does not have the necessary knowledge and instruments to do this at home. However, this procedure is not very practical and involves a waste of time for the technicians and uneasiness for the clients. The idea behind the MCA Auto Tuning package consists in translating technician expertise into an FLES knowledge database. The software interacts through a user-friendly graphic interface with an unskilled user, who is guided through a step-by-step procedure in the prosthesis parameter tuning that emulates the traditional expert-aided procedure. The adoption of this program on a large scale may yield considerable economic benefits and improve the service quality supplied to the users of prostheses. In fact, the time required to set the prosthesis parameters are remarkably reduced, as is the technician

  11. 12th Portuguese Conference on Automatic Control

    CERN Document Server

    Soares, Filomena; Moreira, António

    2017-01-01

    The biennial CONTROLO conferences are the main events promoted by The CONTROLO 2016 – 12th Portuguese Conference on Automatic Control, Guimarães, Portugal, September 14th to 16th, was organized by Algoritmi, School of Engineering, University of Minho, in partnership with INESC TEC, and promoted by the Portuguese Association for Automatic Control – APCA, national member organization of the International Federation of Automatic Control – IFAC. The seventy-five papers published in this volume cover a wide range of topics. Thirty-one of them, of a more theoretical nature, are distributed among the first five parts: Control Theory; Optimal and Predictive Control; Fuzzy, Neural and Genetic Control; Modeling and Identification; Sensing and Estimation. The papers go from cutting-edge theoretical research to innovative control applications and show expressively how Automatic Control can be used to increase the well being of people. .

  12. Automaticity in social-cognitive processes.

    Science.gov (United States)

    Bargh, John A; Schwader, Kay L; Hailey, Sarah E; Dyer, Rebecca L; Boothby, Erica J

    2012-12-01

    Over the past several years, the concept of automaticity of higher cognitive processes has permeated nearly all domains of psychological research. In this review, we highlight insights arising from studies in decision-making, moral judgments, close relationships, emotional processes, face perception and social judgment, motivation and goal pursuit, conformity and behavioral contagion, embodied cognition, and the emergence of higher-level automatic processes in early childhood. Taken together, recent work in these domains demonstrates that automaticity does not result exclusively from a process of skill acquisition (in which a process always begins as a conscious and deliberate one, becoming capable of automatic operation only with frequent use) - there are evolved substrates and early childhood learning mechanisms involved as well.

  13. Automatic lexical classification: bridging research and practice.

    Science.gov (United States)

    Korhonen, Anna

    2010-08-13

    Natural language processing (NLP)--the automatic analysis, understanding and generation of human language by computers--is vitally dependent on accurate knowledge about words. Because words change their behaviour between text types, domains and sub-languages, a fully accurate static lexical resource (e.g. a dictionary, word classification) is unattainable. Researchers are now developing techniques that could be used to automatically acquire or update lexical resources from textual data. If successful, the automatic approach could considerably enhance the accuracy and portability of language technologies, such as machine translation, text mining and summarization. This paper reviews the recent and on-going research in automatic lexical acquisition. Focusing on lexical classification, it discusses the many challenges that still need to be met before the approach can benefit NLP on a large scale.

  14. Automatic identification for standing tree limb pruning

    Institute of Scientific and Technical Information of China (English)

    Sun Renshan; Li Wenbin; Tian Yongchen; Hua Li

    2006-01-01

    To meet the demand of automatic pruning machines,this paper presents a new method for dynamic automatic identification of standing tree limbs and capture of the digital images of Platycladus orientalis.Methods of computer vision,image processing and wavelet analysis technology were used to compress,filter,segment,abate noise and capture the outline of the picture.We then present the arithmetic for dynamic automatic identification of standing tree limbs,extracting basic growth characteristics of the standing trees such as the form,size,degree of bending and their relative spatial position.We use pattern recognition technology to confirm the proportionate relationship matching the database and thus achieve the goal of dynamic automatic identification of standing tree limbs.

  15. A Demonstration of Automatically Switched Optical Network

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    We build an automatically switched optical network (ASON) testbed with four optical cross-connect nodes. Many fundamental ASON features are demonstrated, which is implemented by control protocols based on generalized multi-protocol label switching (GMPLS) framework.

  16. Automatic acquisition of pattern collocations in GO

    Institute of Scientific and Technical Information of China (English)

    LIU Zhi-qing; DOU Qing; LI Wen-hong; LU Ben-jie

    2008-01-01

    The quality, quantity, and consistency of the knowledgeused in GO-playing programs often determine their strengths,and automatic acquisition of large amounts of high-quality andconsistent GO knowledge is crucial for successful GO playing.In a previous article of this subject, we have presented analgorithm for efficient and automatic acquisition of spatialpatterns of GO as well as their frequency of occurrence fromgame records. In this article, we present two algorithms, one forefficient and automatic acquisition of pairs of spatial patternsthat appear jointly in a local context, and the other for deter-mining whether the joint pattern appearances are of certainsignificance statistically and not just a coincidence. Results ofthe two algorithms include 1 779 966 pairs of spatial patternsacquired automatically from 16 067 game records of profess-sional GO players, of which about 99.8% are qualified as patterncollocations with a statistical confidence of 99.5% or higher.

  17. 2014 United States Automatic Identification System Database

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The 2014 United States Automatic Identification System Database contains vessel traffic data for planning purposes within the U.S. coastal waters. The database is...

  18. Automatization and familiarity in repeated checking

    NARCIS (Netherlands)

    Dek, Eliane C P; van den Hout, Marcel A.; Giele, Catharina L.; Engelhard, Iris M.

    2014-01-01

    Repeated checking paradoxically increases memory uncertainty. This study investigated the underlying mechanism of this effect. We hypothesized that as a result of repeated checking, familiarity with stimuli increases, and automatization of the checking procedure occurs, which should result in decrea

  19. Automatic Speech Segmentation Based on HMM

    Directory of Open Access Journals (Sweden)

    M. Kroul

    2007-06-01

    Full Text Available This contribution deals with the problem of automatic phoneme segmentation using HMMs. Automatization of speech segmentation task is important for applications, where large amount of data is needed to process, so manual segmentation is out of the question. In this paper we focus on automatic segmentation of recordings, which will be used for triphone synthesis unit database creation. For speech synthesis, the speech unit quality is a crucial aspect, so the maximal accuracy in segmentation is needed here. In this work, different kinds of HMMs with various parameters have been trained and their usefulness for automatic segmentation is discussed. At the end of this work, some segmentation accuracy tests of all models are presented.

  20. Automatic coding of online collaboration protocols

    NARCIS (Netherlands)

    Erkens, Gijsbert; Janssen, J.J.H.M.

    2006-01-01

    An automatic coding procedure is described to determine the communicative functions of messages in chat discussions. Five main communicative functions are distinguished: argumentative (indicating a line of argumentation or reasoning), responsive (e.g., confirmations, denials, and answers), informati

  1. 2010 United States Automatic Identification System Database

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The 2010 United States Automatic Identification System Database contains vessel traffic data for planning purposes within the U.S. coastal waters. The database is...

  2. Collapsible truss structure is automatically expandable

    Science.gov (United States)

    1965-01-01

    Coil springs wound with maximum initial tension in a three-truss, closed loop structure form a collapsible truss structure. The truss automatically expands and provides excellent rigidity and close dimensional tolerance when expanded.

  3. Response surface method using grey relational analysis for decision making in weapon system selection

    Institute of Scientific and Technical Information of China (English)

    Peng Wang; Peng Meng; Baowei Song

    2014-01-01

    A proper weapon system is very important for a na-tional defense system. General y, it means selecting the optimal weapon system among many alternatives, which is a multiple-attribute decision making (MADM) problem. This paper proposes a new mathematical model based on the response surface method (RSM) and the grey relational analysis (GRA). RSM is used to obtain the experimental points and analyze the factors that have a significant impact on the selection results. GRA is used to an-alyze the trend relationship between alternatives and reference series. And then an RSM model is obtained, which can be used to calculate al alternatives and obtain ranking results. A real world application is introduced to il ustrate the utilization of the model for the weapon selection problem. The results show that this model can be used to help decision-makers to make a quick comparison of alternatives and select a proper weapon system from multiple alternatives, which is an effective and adaptable method for solving the weapon system selection problem.

  4. Radiocesium Discharges and Subsequent Environmental Transport at the Major U.S. Weapons Production Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Garten, Jr. C.T.; Hamby, D.M.; Schreckhise, R.G.

    1999-11-14

    Radiocesium is one of the more prevalent radionuclides in the environment as a result of weapons production related atomic projects in the United States and the former Soviet Union. Radiocesium discharges during the 1950's account for a large fraction of the historical releases from U.S. weapons production facilities. Releases of radiocesium to terrestrial and aquatic ecosystems during the early ,years of nuclear weapons production provided the opportunity to conduct multidisciplinary studies on the transport mechanisms of this potentially hazardous radionuclide. The major U.S. Department of Energy facilities (Oak Ridge Reservation in Tennessee, Hanford Site near Richland, Washington, and Savannah River Site near Aiken, South Carolina) are located in regions of the country that have different geographical characteristics. The facility siting provided diverse backgrounds for the development of an understanding of environmental factors contributing to the fate and transport of radiocesium. In this paper, we summarize the significant environmental releases of radiocesium in the early -years of weapons production and then discuss the historically significant transport mechanisms for r37Cs at the three facilities that were part of the U.S. nuclear weapons complex.

  5. Pole-weapons in the Sagas of Icelanders: a comparison of literary and archaeological sources

    Directory of Open Access Journals (Sweden)

    Orkisz Jan H.

    2016-04-01

    Full Text Available The Icelandic sagas are a major source of information on the Vikings and their fighting prowess. In these stories, several mysterious pole-weapons appear, which are often called “halberds”, for lack of a better word. In order to better identify what these weapons could have been, and to provide a better understanding of how the sagas relate to the Viking-age events they describe, we confront textual and archaeological evidence for several of these weapons (the höggspjót, the atgeirr, the kesja, the krókspjót, the bryntroll and the fleinn, keeping in mind the contextualisation of their appearances in sagas. The description of the use of each weapon allows to pick several candidates likely to correspond to the studied word. Without a perfect knowledge of what context the authors of the sagas wanted to describe, it appears to be impossible to give a final answer. However, we show that some specific types of spears are good candidates for some of the studied weapons.

  6. US Army Weapon Systems Human-Computer Interface (WSHCI) style guide, Version 1

    Energy Technology Data Exchange (ETDEWEB)

    Avery, L.W.; O`Mara, P.A.; Shepard, A.P.

    1996-09-30

    A stated goal of the U.S. Army has been the standardization of the human computer interfaces (HCIS) of its system. Some of the tools being used to accomplish this standardization are HCI design guidelines and style guides. Currently, the Army is employing a number of style guides. While these style guides provide good guidance for the command, control, communications, computers, and intelligence (C4I) domain, they do not necessarily represent the more unique requirements of the Army`s real time and near-real time (RT/NRT) weapon systems. The Office of the Director of Information for Command, Control, Communications, and Computers (DISC4), in conjunction with the Weapon Systems Technical Architecture Working Group (WSTAWG), recognized this need as part of their activities to revise the Army Technical Architecture (ATA). To address this need, DISC4 tasked the Pacific Northwest National Laboratory (PNNL) to develop an Army weapon systems unique HCI style guide. This document, the U.S. Army Weapon Systems Human-Computer Interface (WSHCI) Style Guide, represents the first version of that style guide. The purpose of this document is to provide HCI design guidance for RT/NRT Army systems across the weapon systems domains of ground, aviation, missile, and soldier systems. Each domain should customize and extend this guidance by developing their domain-specific style guides, which will be used to guide the development of future systems within their domains.

  7. Phoneme vs Grapheme Based Automatic Speech Recognition

    OpenAIRE

    Magimai.-Doss, Mathew; Dines, John; Bourlard, Hervé; Hermansky, Hynek

    2004-01-01

    In recent literature, different approaches have been proposed to use graphemes as subword units with implicit source of phoneme information for automatic speech recognition. The major advantage of using graphemes as subword units is that the definition of lexicon is easy. In previous studies, results comparable to phoneme-based automatic speech recognition systems have been reported using context-independent graphemes or context-dependent graphemes with decision trees. In this paper, we study...

  8. Automatic quiz generation for elderly people

    OpenAIRE

    Samuelsen, Jeanette

    2016-01-01

    Studies have indicated that games can be beneficial for the elderly, in areas such as cognitive functioning and well-being. Taking part in social activities, such as playing a game with others, could also be beneficial. One type of game is a computer-based quiz. One can create quiz questions manually; however, this can be time-consuming. Another approach is to generate quiz questions automatically. This project has examined how quizzes for Norwegian elderly can be automatically generated usin...

  9. Automatic Age Estimation System for Face Images

    OpenAIRE

    Chin-Teng Lin; Dong-Lin Li; Jian-Hao Lai; Ming-Feng Han; Jyh-Yeong Chang

    2012-01-01

    Humans are the most important tracking objects in surveillance systems. However, human tracking is not enough to provide the required information for personalized recognition. In this paper, we present a novel and reliable framework for automatic age estimation based on computer vision. It exploits global face features based on the combination of Gabor wavelets and orthogonal locality preserving projections. In addition, the proposed system can extract face aging features automatically in rea...

  10. Automatic Control of Freeboard and Turbine Operation

    DEFF Research Database (Denmark)

    Kofoed, Jens Peter; Frigaard, Peter Bak; Friis-Madsen, Erik;

    The report deals with the modules for automatic control of freeboard and turbine operation on board the Wave dragon, Nissum Bredning (WD-NB) prototype, and covers what has been going on up to ultimo 2003.......The report deals with the modules for automatic control of freeboard and turbine operation on board the Wave dragon, Nissum Bredning (WD-NB) prototype, and covers what has been going on up to ultimo 2003....

  11. Automatic terrain modeling using transfinite element analysis

    KAUST Repository

    Collier, Nathaniel O.

    2010-05-31

    An automatic procedure for modeling terrain is developed based on L2 projection-based interpolation of discrete terrain data onto transfinite function spaces. The function space is refined automatically by the use of image processing techniques to detect regions of high error and the flexibility of the transfinite interpolation to add degrees of freedom to these areas. Examples are shown of a section of the Palo Duro Canyon in northern Texas.

  12. Automatic Fringe Detection Of Dynamic Moire Patterns

    Science.gov (United States)

    Fang, Jing; Su, Xian-ji; Shi, Hong-ming

    1989-10-01

    Fringe-carrier method is used in automatic fringe-order numbering of dynamic in-plane moire patterns. In experiment both static carrier and dynamic moire patterns are recorded. The image files corresponding to instants are set up to assign fringe orders automatically. Subtracting the carrier image from the modulated ones, the moire patterns due to the dynamic deformations are restored with fringe-order variation displayed by different grey levels.

  13. Automatic safety rod for reactors. [LMFBR

    Science.gov (United States)

    Germer, J.H.

    1982-03-23

    An automatic safety rod for a nuclear reactor containing neutron absorbing material and designed to be inserted into a reactor core after a loss-of-flow. Actuation is based upon either a sudden decrease in core pressure drop or the pressure drop decreases below a predetermined minimum value. The automatic control rod includes a pressure regulating device whereby a controlled decrease in operating pressure due to reduced coolant flow does not cause the rod to drop into the core.

  14. Automatic penalty continuation in structural topology optimization

    DEFF Research Database (Denmark)

    Rojas Labanda, Susana; Stolpe, Mathias

    2015-01-01

    this issue is addressed. We propose an automatic continuation method, where the material penalization parameter is included as a new variable in the problem and a constraint guarantees that the requested penalty is eventually reached. The numerical results suggest that this approach is an appealing...... alternative to continuation methods. Automatic continuation also generally obtains better designs than the classical formulation using a reduced number of iterations....

  15. UMLS-based automatic image indexing.

    Science.gov (United States)

    Sneiderman, C; Sneiderman, Charles Alan; Demner-Fushman, D; Demner-Fushman, Dina; Fung, K W; Fung, Kin Wah; Bray, B; Bray, Bruce

    2008-01-01

    To date, most accurate image retrieval techniques rely on textual descriptions of images. Our goal is to automatically generate indexing terms for an image extracted from a biomedical article by identifying Unified Medical Language System (UMLS) concepts in image caption and its discussion in the text. In a pilot evaluation of the suggested image indexing method by five physicians, a third of the automatically identified index terms were found suitable for indexing.

  16. On weapons plutonium in the arctic environment (Thule, Greenland)

    Energy Technology Data Exchange (ETDEWEB)

    Eriksson, M

    2002-04-01

    This thesis concerns a nuclear accident that occurred in the Thule (Pituffik) area, NW Greenland in 1968, called the Thule accident.Results are based on different analytical techniques, i.e. gamma spectrometry, alpha spectrometry, ICP-MS, SEM with EDX and different sediment models, i.e. (CRS, CIC). The scope of the thesis is the study of hot particles. Studies on these have shown several interesting features, e.g. that they carry most of the activity dispersed from the accident, moreover, they have been very useful in the determination of the source term for the Thule accident debris. Paper I, is an overview of the results from the Thule-97 expedition. This paper concerns the marine environment, i.e. water, sediment and benthic animals in the Bylot Sound. The main conclusions are; that plutonium is not transported from the contaminated sediments into the surface water in this shelf sea, the debris has been efficiently buried in the sediment to great depth as a result of biological activity and transfer of plutonium to benthic biota is low. Paper II, concludes that the resuspension of accident debris on land has been limited and indications were, that americium has a faster transport mechanism from the catchment area to lakes than plutonium and radio lead. Paper III, is a method description of inventory calculation techniques in sediment with heterogeneous activity concentration, i.e. hot particles are present in the samples. It is concluded that earlier inventory estimates have been under estimated and that the new inventory is about 3.8 kg (10 TBq) of {sup 239,240}Pu. Paper IV, describes hot particle separation/identification techniques using real-time digital image systems. These techniques are much faster than conventionally used autoradiography and give the results in real time. Paper V, is a study of single isolated hot particles. The most interesting result is that the fission material in the weapons involved in the accident mostly consisted of {sup 235}U

  17. Analysis of the possibility of applying a condition-based maintenance model on an example of tank weapons

    Directory of Open Access Journals (Sweden)

    Igor J. Epler

    2013-12-01

    Full Text Available For any modern army it is very important to continuously maintain a high degree of operational (combat readiness (availability in order to maximize the effectiveness of the use of technical systems. Since determination and prediction of technical states and failures of technical systems in engineering, especially in armament, are difficult due to the impossibility of continuous condition monitoring with appropriate measuring equipment there is a need for a maintenance model that would be most helpful in taking timely action maintenance. In this paper, the subject of research is a model of maintenance of the M-84 tank  weapoons systems.   IntroductionThe M-84 tank is one of the most promising technical systems in the Serbian Army. Its use and modifications are foreseen in the next ten years. The  M-84 is characterized by good tactical and technical characteristics. It has a powerful 125 mm cannon, coupled 7.62 mm machine gun and 12.7 mm anti-aircraft machine gun. The M-84 tank has an automatic battery charger and a fire control system. The fire control system enables fast target tracking and stabilization of the cannon barrel, which is a prerequisite for timely and favorable effect on the target. There are certain ambiguities in the existing model of maintenance of tank weapons.   Technical diagnostics Technical diagnostics, as a part of the process of condition-based maintenance, should determine technical conditions of components or technical systems with certain accuracy at a point in time.   Maintenance strategy A maintenance strategy can be defined as a variant of a maintenance system determined by a concept, organization and character of maintenance procedures, as well as the relationship between the various levels at which maintenance is performed. It is defined for technical system parts, individual technical systems and for system maintenance as a whole. The basic maintenance strategies implemented today are: -      corrective

  18. Nuclear weapons, scientists, and the post-Cold War challenge selected papers on arms control

    CERN Document Server

    Drell, Sidney D

    2007-01-01

    This volume includes a representative selection of Sidney Drell's recent writings and speeches (circa 1993 to the present) on public policy issues with substantial scientific components. Most of the writings deal with national security, nuclear weapons, and arms control and reflect the author's personal involvement in such issues dating back to 1960. Fifteen years after the demise of the Soviet Union, the gravest danger presented by nuclear weapons is the spread of advanced technology that may result in the proliferation of nuclear weapons. Of most concern would be their acquisition by hostile governments and terrorists who are unconstrained by accepted norms of civilized behavior. The current challenges are to prevent this from happening and, at the same time, to pursue aggressively the opportunity to escape from an outdated nuclear deterrence trap.

  19. India`s nuclear weapons posture: The end of ambiguity. Master`s thesis

    Energy Technology Data Exchange (ETDEWEB)

    Davis, S.D.

    1996-12-01

    This thesis examines the future of India`s nuclear weapons posture. Since testing a nuclear device in 1974, India been able to produce weapons material within its civilian nuclear power program. Despite having this nuclear weapons capability, India prefers to maintain an ambiguous nuclear posture. New pressures in the post-cold war era -- the loss of the Soviet Union as a strategic ally, the indefinite extension of the nuclear nonproliferation treaty, the rise of Hindu nationalism, and India`s growing participation in the global economy -- have the potential to derail India`s current nuclear policy. This thesis identifies the domestic and international pressures on India, and assesses the prospects for India to retain its ambiguous policy, renounce the nuclear option, or assemble an overt nuclear arsenal.

  20. Simulation of Fighter Aircraft Weapon Systems for Design and Performance Evaluation

    Directory of Open Access Journals (Sweden)

    P.S. Subramanyam

    1997-07-01

    Full Text Available Simulation forms an essential tool in the system design and performance evaluation of fighter aircraft weapon systems. The various guidance strategies used for weapons like guns, missiles, bombs in the air-to-air or air-to-ground missions, for aiding the pilot for an effective delivery have been studied through extensive off-line and pilot-in-loop simulation. The pilot workload analysis carried out in the high fidelity cockpit simulator at the Aeronautical Development Agency , Bangalore, provides the system designer an effective means to tune the various subsy stems for better performance. The paper focuses on all these aspects to bring out the importance of simulation in the overall fighter aircraft weapon system design.

  1. Dangers associated with civil nuclear power programmes: weaponization and nuclear waste.

    Science.gov (United States)

    Boulton, Frank

    2015-07-24

    The number of nuclear power plants in the world rose exponentially to 420 by 1990 and peaked at 438 in 2002; but by 2014, as closed plants were not replaced, there were just 388. In spite of using more renewable energy, the world still relies on fossil fuels, but some countries plan to develop new nuclear programmes. Spent nuclear fuel, one of the most dangerous and toxic materials known, can be reprocessed into fresh fuel or into weapons-grade materials, and generates large amounts of highly active waste. This article reviews available literature on government and industry websites and from independent analysts on world energy production, the aspirations of the 'new nuclear build' programmes in China and the UK, and the difficulties in keeping the environment safe over an immense timescale while minimizing adverse health impacts and production of greenhouse gases, and preventing weaponization by non-nuclear-weapons states acquiring civil nuclear technology.

  2. 14 CFR 23.1329 - Automatic pilot system.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false Automatic pilot system. 23.1329 Section 23...: Installation § 23.1329 Automatic pilot system. If an automatic pilot system is installed, it must meet the following: (a) Each system must be designed so that the automatic pilot can— (1) Be quickly and...

  3. Exploring the Possible Use of Information Barriers for future Biological Weapons Verification Regimes

    Energy Technology Data Exchange (ETDEWEB)

    Luke, S J

    2011-12-20

    This report describes a path forward for implementing information barriers in a future generic biological arms-control verification regime. Information barriers have become a staple of discussion in the area of arms control verification approaches for nuclear weapons and components. Information barriers when used with a measurement system allow for the determination that an item has sensitive characteristics without releasing any of the sensitive information. Over the last 15 years the United States (with the Russian Federation) has led on the development of information barriers in the area of the verification of nuclear weapons and nuclear components. The work of the US and the Russian Federation has prompted other states (e.g., UK and Norway) to consider the merits of information barriers for possible verification regimes. In the context of a biological weapons control verification regime, the dual-use nature of the biotechnology will require protection of sensitive information while allowing for the verification of treaty commitments. A major question that has arisen is whether - in a biological weapons verification regime - the presence or absence of a weapon pathogen can be determined without revealing any information about possible sensitive or proprietary information contained in the genetic materials being declared under a verification regime. This study indicates that a verification regime could be constructed using a small number of pathogens that spans the range of known biological weapons agents. Since the number of possible pathogens is small it is possible and prudent to treat these pathogens as analogies to attributes in a nuclear verification regime. This study has determined that there may be some information that needs to be protected in a biological weapons control verification regime. To protect this information, the study concludes that the Lawrence Livermore Microbial Detection Array may be a suitable technology for the detection of the

  4. The Legend of Hot Tar or Pitch as a Defensive Weapon

    DEFF Research Database (Denmark)

    Atzbach, Rainer

    2015-01-01

    In popular culture and even in academic discourse surrounding castles, hot tar pitch has been depicted as a widespread defensive weapon. The identification of "machicoulis" (machicolations) as an architectural provision for pouring down liquid tar pitch goes back to the early days of castle...... production and use during the Middle Ages will be discussed with special focus on the application of tar pitch as an ingredient in medieval and post-medieval thermal weapons (especially Greek Fire, the firebomb and the fire arrow). The punishment of tarring and feathering will also be considered...

  5. The Libyan Conversion in Three Acts: Why Qadhafi Gave Up His Weapons of Mass Destruction Program

    Science.gov (United States)

    2010-03-01

    forth by the United States and Britain to end economic sanctions including payments to the victims of the Pan Am flight 103 bombing and a renunciation...68 BBC, October 15, 2004, http://news.bbc.co.uk/2/hi/africa/3336423.stm; McFall, “From Rogue to Vogue : Why Did Libya Give Up Its Weapons of Mass...From Rogue to Vogue : Why Did Libya Give Up Its Weapons of Mass Destruction?,” 17. 24 short-term political instability in Tripoli,” demonstrating

  6. Weapons and armament on the miniatures of Tabriz miniature school of the XV - XVI centuries

    OpenAIRE

    AHMADOV SABUHI AHMAD OGLU

    2015-01-01

    Tabriz miniature school is an important part of the art of the Middle East. The article discusses battle miniatures in which medieval artists reliably and historical accuracy depicted various weapons and armament. These miniatures can serve as an important historical source for the study of weapons of the XV XVI centuries. The main purpose of this article is to give the proof of these miniatures of art school which can be considered as a source for the study of arms and armament of the XV XVI...

  7. Disposition of excess weapon plutonium in deep boreholes - site selection handbook

    Energy Technology Data Exchange (ETDEWEB)

    Heiken, G.; Woldegabriel, G.; Morley, R.; Plannerer, H.; Rowley, J.

    1996-09-01

    One of the options for disposing of excess weapons plutonium is to place it near the base of deep boreholes in stable crystalline rocks. The technology needed to begin designing this means of disposition already exists, and there are many attractive sites available within the conterminous United States. There are even more potential sites for this option within Russia. The successful design of a borehole system must address two criteria: (1) how to dispose of 50 metric tons of weapons plutonium while making it inaccessible for unauthorized retrieval, and (2) how to prevent contamination of the accessible biosphere, defined here as the Earth`s surface and usable groundwaters.

  8. Feature extraction from time domain acoustic signatures of weapons systems fire

    Science.gov (United States)

    Yang, Christine; Goldman, Geoffrey H.

    2014-06-01

    The U.S. Army is interested in developing algorithms to classify weapons systems fire based on their acoustic signatures. To support this effort, an algorithm was developed to extract features from acoustic signatures of weapons systems fire and applied to over 1300 signatures. The algorithm filtered the data using standard techniques then estimated the amplitude and time of the first five peaks and troughs and the location of the zero crossing in the waveform. The results were stored in Excel spreadsheets. The results are being used to develop and test acoustic classifier algorithms.

  9. Application of proposed mutual reciprocal inspection measurement techniques to a weapon component

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, M.W.; Frankle, C.M. [Los Alamos National Lab., NM (United States); Gosnell, T.B. [Lawrence Livermore National Lab., CA (United States)

    1997-04-01

    The shape-measurement technique proposed by Russian scientists for mutual reciprocal inspections (MRI) of plutonium from dismantled nuclear weapons has been applied to a US weapon component. Measurement procedures are described. Results of the measurements are {open_quotes}self-normalized{close_quotes} to remove any classified information and further renormalized to results of previous joint US/Russian measurements of an unclassified plutonium piece. Data are presented in tabular and graphical form, conforming to the method of presentation recommended by Russian experts during the previous measurements.

  10. Biological weapons and bioterrorism in the first years of the twenty-first century.

    Science.gov (United States)

    Leitenberg, Milton

    2002-09-01

    This paper evaluates four recent developments in biological-weapons politics and bioterrorism. First is American opposition to finalization of a verification protocol for the Biological Weapons Convention; second, a successful attempt at mass-casualty terrorism; third, an ongoing investigation into the bioterrorist capabilities of the al Qaeda network; and, fourth, a series of fatal anthrax attacks in the United States. The first of these evaluations is informed by interviews conducted between 2000 and 2002 with policy principals in the United States and elsewhere.

  11. A Novel Two-Staged Decision Support based Threat Evaluation and Weapon Assignment Algorithm, Asset-based Dynamic Weapon Scheduling using Artificial Intelligence Techinques

    CERN Document Server

    Naeem, Huma; Hussain, Mukhtar; Khan, Shoab A

    2009-01-01

    Surveillance control and reporting (SCR) system for air threats play an important role in the defense of a country. SCR system corresponds to air and ground situation management/processing along with information fusion, communication, coordination, simulation and other critical defense oriented tasks. Threat Evaluation and Weapon Assignment (TEWA) sits at the core of SCR system. In such a system, maximal or near maximal utilization of constrained resources is of extreme importance. Manual TEWA systems cannot provide optimality because of different limitations e.g.surface to air missile (SAM) can fire from a distance of 5Km, but manual TEWA systems are constrained by human vision range and other constraints. Current TEWA systems usually work on target-by-target basis using some type of greedy algorithm thus affecting the optimality of the solution and failing in multi-target scenario. his paper relates to a novel two-staged flexible dynamic decision support based optimal threat evaluation and weapon assignment...

  12. Diversion of Nuclear, Biological, and Chemical Weapons Expertise from the Former Soviet Union: Understanding an Evolving Problem

    Science.gov (United States)

    2005-01-01

    Chemical cases - Syria and Gen. Kuntsevich - Aum RAND 3. DEMAND FOR PROLIFERATION-CRITICAL KNOWLEDGE This section examines the scope and nature of...prominent example of demand for chemical weapons knowledge is Syria, where General Anatoly Kuntsevich , head of Russia’s chemical weapons program, built a

  13. 33 CFR 334.1380 - Marine Corps Base Hawaii (MCBH), Kaneohe Bay, Island of Oahu, Hawaii-Ulupau Crater Weapons...

    Science.gov (United States)

    2010-07-01

    ...), Kaneohe Bay, Island of Oahu, Hawaii-Ulupau Crater Weapons Training Range; danger zone. 334.1380 Section... Bay, Island of Oahu, Hawaii—Ulupau Crater Weapons Training Range; danger zone. (a) The danger zone...″ W Point C: Latitude 21°25′01.79″ N, Longitude 157°40′33.70″ W (b) The regulations. (1)...

  14. The Association between Weapon-Carrying and the Use of Violence among Adolescents Living in or around Public Housing.

    Science.gov (United States)

    DuRant, Robert H.; And Others

    1995-01-01

    Examines social and psychological factors associated with frequency of weapon-carrying by black adolescents living in a community where there is extensive poverty and a high level of violent crime. Weapon carrying was significantly associated with exposure to violence and victimization, age, corporal punishment scale, depression, family conflict,…

  15. 76 FR 39392 - Record of Decision for the F-35 Force Development Evaluation and Weapons School Beddown, Nellis...

    Science.gov (United States)

    2011-07-06

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF DEFENSE Department of the Air Force Record of Decision for the F-35 Force Development Evaluation and Weapons School... Air Force signed the ROD for the F-35 Force Development Evaluation (FDE) and Weapons School...

  16. Chemistry and materials science progress report. Weapons-supporting research and laboratory directed research and development: FY 1995

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-04-01

    This report covers different materials and chemistry research projects carried out a Lawrence Livermore National Laboratory during 1995 in support of nuclear weapons programs and other programs. There are 16 papers supporting weapons research and 12 papers supporting laboratory directed research.

  17. A Novel Two-Staged Decision Support based Threat Evaluation and Weapon Assignment Algorithm, Asset-based Dynamic Weapon Scheduling using Artificial Intelligence Techinques

    OpenAIRE

    Naeem, Huma; Masood, Asif; Hussain, Mukhtar; Shoab A. Khan

    2009-01-01

    Surveillance control and reporting (SCR) system for air threats play an important role in the defense of a country. SCR system corresponds to air and ground situation management/processing along with information fusion, communication, coordination, simulation and other critical defense oriented tasks. Threat Evaluation and Weapon Assignment (TEWA) sits at the core of SCR system. In such a system, maximal or near maximal utilization of constrained resources is of extreme importance. Manual TEW...

  18. The role of expression and race in weapons identification.

    Science.gov (United States)

    Kubota, Jennifer T; Ito, Tiffany A

    2014-12-01

    Emotional expressions can signal intentions and so possess the power to moderate social inferences. Here, we test whether stereotypes implicitly elicited by a stigmatized racial outgroup member are moderated by facial expression. Participants classified pictures of guns and tools that were primed with pictures of Black and White male faces posing angry, happy, and neutral expressions. Across the 3 measures examined--response latencies, error rates, and automatic processing, facial expression modulated implicit stereotyping (Study 1, n = 71; Study 2, n = 166). A Black angry prime elicited implicit stereotyping, while a Black happy prime diminished implicit stereotyping. Responding after neutral primes varied as a function of the expression context. When viewed alongside more threatening expressions (Study 1), neutral Black targets no longer elicited implicit stereotyping, but when viewed alongside more threatening expressions (Study 2), neutral Black targets primed crime and danger-relevant stereotypes. These results demonstrate that an individual can activate different associations based on changes in emotional expression and that a feature present in many everyday encounters (a smile) attenuates implicit racial stereotyping.

  19. The Role of Adolescent Friendship Group Integration and Cohesion in Weapon-Related Violent Crime as a Young Adult.

    Science.gov (United States)

    Mundt, Marlon P; Antonaccio, Olena P; French, Michael T; Zakletskaia, Larissa I

    2017-01-16

    Weapon-related violent crime is a serious, complex, and multifaceted public health problem. The present study uses data from Waves I and III of Add Health (n = 10,482, 54% female) to examine how friendship group integration and cohesion in adolescence (ages 12-19) is associated with weapon-related criminal activity as a young adult (ages 18-26). Results indicate that greater cohesion in friendship groups is associated with significantly lower weapon-related criminal activity in young adulthood. In addition, for adolescent girls, a greater number of close friendship ties-an indicator of friendship group integration-is associated with less weapon-related criminal activity in young adulthood. These findings suggest that school-based initiatives to facilitate inclusive and cohesive adolescent peer communities may be an effective strategy to curb weapon-related criminal activity in young adulthood.

  20. Automatic Fastening Large Structures: a New Approach

    Science.gov (United States)

    Lumley, D. F.

    1985-01-01

    The external tank (ET) intertank structure for the space shuttle, a 27.5 ft diameter 22.5 ft long externally stiffened mechanically fastened skin-stringer-frame structure, was a labor intensitive manual structure built on a modified Saturn tooling position. A new approach was developed based on half-section subassemblies. The heart of this manufacturing approach will be 33 ft high vertical automatic riveting system with a 28 ft rotary positioner coming on-line in mid 1985. The Automatic Riveting System incorporates many of the latest automatic riveting technologies. Key features include: vertical columns with two sets of independently operating CNC drill-riveting heads; capability of drill, insert and upset any one piece fastener up to 3/8 inch diameter including slugs without displacing the workpiece offset bucking ram with programmable rotation and deep retraction; vision system for automatic parts program re-synchronization and part edge margin control; and an automatic rivet selection/handling system.

  1. Automaticity: Componential, Causal, and Mechanistic Explanations.

    Science.gov (United States)

    Moors, Agnes

    2016-01-01

    The review first discusses componential explanations of automaticity, which specify non/automaticity features (e.g., un/controlled, un/conscious, non/efficient, fast/slow) and their interrelations. Reframing these features as factors that influence processes (e.g., goals, attention, and time) broadens the range of factors that can be considered (e.g., adding stimulus intensity and representational quality). The evidence reviewed challenges the view of a perfect coherence among goals, attention, and consciousness, and supports the alternative view that (a) these and other factors influence the quality of representations in an additive way (e.g., little time can be compensated by extra attention or extra stimulus intensity) and that (b) a first threshold of this quality is required for unconscious processing and a second threshold for conscious processing. The review closes with a discussion of causal explanations of automaticity, which specify factors involved in automatization such as repetition and complexity, and a discussion of mechanistic explanations, which specify the low-level processes underlying automatization.

  2. Weapon identification across varying acoustic conditions using an exemplar embedding approach

    Science.gov (United States)

    Khan, Saad; Divakaran, Ajay; Sawhney, Harpreet S.

    2010-04-01

    Gunshot recordings have the potential for both tactical detection and forensic evaluation particularly to ascertain information about the type of firearm and ammunition used. Perhaps the most significant challenge to such an analysis is the effect of recording conditions on the audio signature of recorded data. In this paper we present a first study of using an exemplar embedding approach to automatically detect and classify firearm type across different recording conditions. We demonstrate that a small number of exemplars can span the space of gunshot audio signatures and that this optimal set can be obtained using a wrapper function. By projecting a given gunshot to the subspace spanned by the exemplar set a distance measure/feature vector is obtained that enables comparisons across recording conditions. We also investigate the use of a hierarchy of gunshot classifications that assists in improving finer level classification by pruning out gunshot labeling that is inconsistent with its higher level type. The embedding based approach can thus be used both by itself and as a pruning stage for other search techniques. Our dataset includes 20 different gun types captured in a number of different conditions. This data acts as our original exemplar set. The dataset also includes 12 gun types each with multiple shots recorded in the same conditions as the exemplar set. This second set provides our training and testing sets. We show that we can reduce our exemplar space from 20 to only 4 uniquely different gunshots without significantly limiting the ability of our embedding approach to discriminate different gunshots in the training and testing sets. The basic hypothesis in the embedding approach is that the relationship between the set of exemplars and space of gunshots including the testing/training set would be robust to a change in recording conditions or the environment. That is to say the embedding distance between a particular gunshot and the exemplars would tend

  3. A HOST PHASE FOR THE DISPOSAL OF WEAPONS PLUTONIUM

    Energy Technology Data Exchange (ETDEWEB)

    WERNER LUTZE; K. B. HELEAN; W. L. GONG - UNIVERSITY OF NEW MEXICO RODNEY C. EWING - UNIVERSITY OF MICHIGAN

    1999-01-01

    Research was conducted into the possible use of zircon (ZrSiO{sub 4}) as a host phase for storage or disposal of excess weapons plutonium. Zircon is one of the most chemically durable minerals. Its structure can accommodate a variety of elements, including plutonium and uranium. Natural zircon contains uranium and thorium together in different quantities, usually in the range of less than one weight percent up to several weight percent. Zircon occurs in nature as a crystalline or a partially to fully metamict mineral, depending on age and actinide element concentration, i.e., on radiation damage. These zircon samples have been studied extensively and the results are documented in the literature in terms of radiation damage to the crystal structure and related property changes, e.g., density, hardness, loss of uranium and lead, etc. Thus, a unique suite of natural analogues are available to describe the effect of decay of {sup 239}Pu on zircon's structure and how zircon's physical and chemical properties will be affected over very long periods of time. Actually, the oldest zircon samples known are over 3 billion years old. This period covers the time for decay of {sup 239}Pu (half-life 24,300 yr.) and most of its daughter {sup 235}U (half-life 700 million yr.). Because of its chemical durability, even under extreme geological conditions, zircon is the most widely used mineral for geochronological dating (7,000 publications). It is the oldest dated mineral on earth and in the universe. Zircon has already been doped with about 10 weight percent of plutonium. Pure PuSiO{sub 4} has also been synthesized and has the same crystal structure as zircon. However, use of zircon as a storage medium or waste form for plutonium requires further materials characterization. Experiments can either be conducted in laboratories where plutonium can be handled or plutonium can be simulated by other elements, and experiments can be done under less restricted conditions. The

  4. Oocytes Polar Body Detection for Automatic Enucleation

    Directory of Open Access Journals (Sweden)

    Di Chen

    2016-02-01

    Full Text Available Enucleation is a crucial step in cloning. In order to achieve automatic blind enucleation, we should detect the polar body of the oocyte automatically. The conventional polar body detection approaches have low success rate or low efficiency. We propose a polar body detection method based on machine learning in this paper. On one hand, the improved Histogram of Oriented Gradient (HOG algorithm is employed to extract features of polar body images, which will increase success rate. On the other hand, a position prediction method is put forward to narrow the search range of polar body, which will improve efficiency. Experiment results show that the success rate is 96% for various types of polar bodies. Furthermore, the method is applied to an enucleation experiment and improves the degree of automatic enucleation.

  5. Support vector machine for automatic pain recognition

    Science.gov (United States)

    Monwar, Md Maruf; Rezaei, Siamak

    2009-02-01

    Facial expressions are a key index of emotion and the interpretation of such expressions of emotion is critical to everyday social functioning. In this paper, we present an efficient video analysis technique for recognition of a specific expression, pain, from human faces. We employ an automatic face detector which detects face from the stored video frame using skin color modeling technique. For pain recognition, location and shape features of the detected faces are computed. These features are then used as inputs to a support vector machine (SVM) for classification. We compare the results with neural network based and eigenimage based automatic pain recognition systems. The experiment results indicate that using support vector machine as classifier can certainly improve the performance of automatic pain recognition system.

  6. Automatic Image-Based Pencil Sketch Rendering

    Institute of Scientific and Technical Information of China (English)

    王进; 鲍虎军; 周伟华; 彭群生; 徐迎庆

    2002-01-01

    This paper presents an automatic image-based approach for converting greyscale images to pencil sketches, in which strokes follow the image features. The algorithm first extracts a dense direction field automatically using Logical/Linear operators which embody the drawing mechanism. Next, a reconstruction approach based on a sampling-and-interpolation scheme is introduced to generate stroke paths from the direction field. Finally, pencil strokes are rendered along the specified paths with consideration of image tone and artificial illumination.As an important application, the technique is applied to render portraits from images with little user interaction. The experimental results demonstrate that the approach can automatically achieve compelling pencil sketches from reference images.

  7. Research on an Intelligent Automatic Turning System

    Directory of Open Access Journals (Sweden)

    Lichong Huang

    2012-12-01

    Full Text Available Equipment manufacturing industry is the strategic industries of a country. And its core part is the CNC machine tool. Therefore, enhancing the independent research of relevant technology of CNC machine, especially the open CNC system, is of great significance. This paper presented some key techniques of an Intelligent Automatic Turning System and gave a viable solution for system integration. First of all, the integrated system architecture and the flexible and efficient workflow for perfoming the intelligent automatic turning process is illustrated. Secondly, the innovated methods of the workpiece feature recognition and expression and process planning of the NC machining are put forward. Thirdly, the cutting tool auto-selection and the cutting parameter optimization solution are generated with a integrated inference of rule-based reasoning and case-based reasoning. Finally, the actual machining case based on the developed intelligent automatic turning system proved the presented solutions are valid, practical and efficient.

  8. Automatic Phonetic Transcription for Danish Speech Recognition

    DEFF Research Database (Denmark)

    Kirkedal, Andreas Søeborg

    Automatic speech recognition (ASR) uses dictionaries that map orthographic words to their phonetic representation. To minimize the occurrence of out-of-vocabulary words, ASR requires large phonetic dictionaries to model pronunciation. Hand-crafted high-quality phonetic dictionaries are difficult...... of automatic phonetic transcriptions vary greatly with respect to language and transcription strategy. For some languages where the difference between the graphemic and phonetic representations are small, graphemic transcriptions can be used to create ASR systems with acceptable performance. In other languages......, like Danish, the graphemic and phonetic representations are very dissimilar and more complex rewriting rules must be applied to create the correct phonetic representation. Automatic phonetic transcribers use different strategies, from deep analysis to shallow rewriting rules, to produce phonetic...

  9. An Automatic Hierarchical Delay Analysis Tool

    Institute of Scientific and Technical Information of China (English)

    FaridMheir-El-Saadi; BozenaKaminska

    1994-01-01

    The performance analysis of VLSI integrated circuits(ICs) with flat tools is slow and even sometimes impossible to complete.Some hierarchical tools have been developed to speed up the analysis of these large ICs.However,these hierarchical tools suffer from a poor interaction with the CAD database and poorly automatized operations.We introduce a general hierarchical framework for performance analysis to solve these problems.The circuit analysis is automatic under the proposed framework.Information that has been automatically abstracted in the hierarchy is kept in database properties along with the topological information.A limited software implementation of the framework,PREDICT,has also been developed to analyze the delay performance.Experimental results show that hierarchical analysis CPU time and memory requirements are low if heuristics are used during the abstraction process.

  10. Towards unifying inheritance and automatic program specialization

    DEFF Research Database (Denmark)

    Schultz, Ulrik Pagh

    2002-01-01

    Inheritance allows a class to be specialized and its attributes refined, but implementation specialization can only take place by overriding with manually implemented methods. Automatic program specialization can generate a specialized, effcient implementation. However, specialization of programs...... and specialization of classes (inheritance) are considered different abstractions. We present a new programming language, Lapis, that unifies inheritance and program specialization at the conceptual, syntactic, and semantic levels. This paper presents the initial development of Lapis, which uses inheritance...... with covariant specialization to control the automatic application of program specialization to class members. Lapis integrates object-oriented concepts, block structure, and techniques from automatic program specialization to provide both a language where object-oriented designs can be e#ciently implemented...

  11. Automatic Age Estimation System for Face Images

    Directory of Open Access Journals (Sweden)

    Chin-Teng Lin

    2012-11-01

    Full Text Available Humans are the most important tracking objects in surveillance systems. However, human tracking is not enough to provide the required information for personalized recognition. In this paper, we present a novel and reliable framework for automatic age estimation based on computer vision. It exploits global face features based on the combination of Gabor wavelets and orthogonal locality preserving projections. In addition, the proposed system can extract face aging features automatically in real‐time. This means that the proposed system has more potential in applications compared to other semi‐automatic systems. The results obtained from this novel approach could provide clearer insight for operators in the field of age estimation to develop real‐world applications.

  12. Automatic weld torch guidance control system

    Science.gov (United States)

    Smaith, H. E.; Wall, W. A.; Burns, M. R., Jr.

    1982-01-01

    A highly reliable, fully digital, closed circuit television optical, type automatic weld seam tracking control system was developed. This automatic tracking equipment is used to reduce weld tooling costs and increase overall automatic welding reliability. The system utilizes a charge injection device digital camera which as 60,512 inidividual pixels as the light sensing elements. Through conventional scanning means, each pixel in the focal plane is sequentially scanned, the light level signal digitized, and an 8-bit word transmitted to scratch pad memory. From memory, the microprocessor performs an analysis of the digital signal and computes the tracking error. Lastly, the corrective signal is transmitted to a cross seam actuator digital drive motor controller to complete the closed loop, feedback, tracking system. This weld seam tracking control system is capable of a tracking accuracy of + or - 0.2 mm, or better. As configured, the system is applicable to square butt, V-groove, and lap joint weldments.

  13. Automatic inference of indexing rules for MEDLINE

    Directory of Open Access Journals (Sweden)

    Shooshan Sonya E

    2008-11-01

    Full Text Available Abstract Background: Indexing is a crucial step in any information retrieval system. In MEDLINE, a widely used database of the biomedical literature, the indexing process involves the selection of Medical Subject Headings in order to describe the subject matter of articles. The need for automatic tools to assist MEDLINE indexers in this task is growing with the increasing number of publications being added to MEDLINE. Methods: In this paper, we describe the use and the customization of Inductive Logic Programming (ILP to infer indexing rules that may be used to produce automatic indexing recommendations for MEDLINE indexers. Results: Our results show that this original ILP-based approach outperforms manual rules when they exist. In addition, the use of ILP rules also improves the overall performance of the Medical Text Indexer (MTI, a system producing automatic indexing recommendations for MEDLINE. Conclusion: We expect the sets of ILP rules obtained in this experiment to be integrated into MTI.

  14. Semi-automatic knee cartilage segmentation

    Science.gov (United States)

    Dam, Erik B.; Folkesson, Jenny; Pettersen, Paola C.; Christiansen, Claus

    2006-03-01

    Osteo-Arthritis (OA) is a very common age-related cause of pain and reduced range of motion. A central effect of OA is wear-down of the articular cartilage that otherwise ensures smooth joint motion. Quantification of the cartilage breakdown is central in monitoring disease progression and therefore cartilage segmentation is required. Recent advances allow automatic cartilage segmentation with high accuracy in most cases. However, the automatic methods still fail in some problematic cases. For clinical studies, even if a few failing cases will be averaged out in the overall results, this reduces the mean accuracy and precision and thereby necessitates larger/longer studies. Since the severe OA cases are often most problematic for the automatic methods, there is even a risk that the quantification will introduce a bias in the results. Therefore, interactive inspection and correction of these problematic cases is desirable. For diagnosis on individuals, this is even more crucial since the diagnosis will otherwise simply fail. We introduce and evaluate a semi-automatic cartilage segmentation method combining an automatic pre-segmentation with an interactive step that allows inspection and correction. The automatic step consists of voxel classification based on supervised learning. The interactive step combines a watershed transformation of the original scan with the posterior probability map from the classification step at sub-voxel precision. We evaluate the method for the task of segmenting the tibial cartilage sheet from low-field magnetic resonance imaging (MRI) of knees. The evaluation shows that the combined method allows accurate and highly reproducible correction of the segmentation of even the worst cases in approximately ten minutes of interaction.

  15. Thinking through the Photographic Encounter: Engaging with the Camera as Nomadic Weapon

    Science.gov (United States)

    Coats, Cala

    2014-01-01

    This paper considers the photographic act as an affective and affirmative encounter--a reflexive, embodied, and relational community engagement that may produce a rupture in our habitual modes of thinking. The author uses the Deleuzo-Guattarian concept of the nomadic weapon to consider how the camera may become an affective trigger for…

  16. A Novel, High Energy-Density Electrical Storage Device for Electric Weapons

    Science.gov (United States)

    1992-08-25

    18 I. Task Objectives The primary object of the Phase I effort was to design a Million...field, which drives current at the voltage needed to power a variety of electric weapons such railguns, coilguns , and directed energy devices. Three... inductive , double ring circuit. Tremendous repulsion forces are exerted on the rings when the current circulation reaches Meg-Amp current levels. One

  17. Research and Analytical Evaluation of the Soviet Union and Modernization of Nuclear Weapons Forces in Europe.

    Science.gov (United States)

    1982-04-01

    Ministry "expert," Major General Anatoly Kuntsevich , and other Soviet officials held a press conference in Moscow on chemical weapons in which he stated...among other thinqs, that "the United Stated model of war is to fight on another’s territory and spill others’ blood." In reply to a question, Kuntsevich

  18. Beyond Nunn-Lugar: Curbing the Next Wave of Weapons Proliferation Threat from Russia

    Science.gov (United States)

    2002-04-01

    Kuntsevich , former head of the Russian chemical weapons program and later adviser to Yeltsin on chemical disarmament, was caught selling chemical precursors to...tons in 1994.2 Still, Kuntsevich did not serve out his jail term. Even more disturbing are reports that Aum Shinrikio, a Japanese doomsday cult

  19. JPRS Report, Arms Control, Paris Chemical Weapons Conference 7-11 January 1989

    Science.gov (United States)

    2007-11-02

    further strengthening of the Geneva protocol and for the activation of negotiations on ban on and total liquida - tion of chemical weapons in such a...ministries, Yugoslav Assistant Foreign Secretary Kazi- mir Vidas and undersecretary of the Iraqi Foreign Min- istry Riyad al-Qaysi also discussed the

  20. Just Scan It!-Weapon Reconstruction in Computed Tomography on Historical and Current Swiss Military Guns.

    Science.gov (United States)

    Franckenberg, Sabine; Binder, Thomas; Bolliger, Stephan; Thali, Michael J; Ross, Steffen G

    2016-09-01

    Cross-sectional imaging, such as computed tomography, has been increasingly implemented in both historic and recent postmortem forensic investigations. It aids in determining cause and manner of death as well as in correlating injuries to possible weapons. This study illuminates the feasibility of reconstructing guns in computed tomography and gives a distinct overview of historic and recent Swiss Army guns.