WorldWideScience

Sample records for bacteria warfare inventory

  1. Bacteriocin as Weapons in the Marine Animal-Associated Bacteria Warfare: Inventory and Potential Applications as an Aquaculture Probiotic

    Directory of Open Access Journals (Sweden)

    Florie Desriac

    2010-04-01

    Full Text Available As the association of marine animals with bacteria has become more commonly recognized, researchers have increasingly questioned whether these animals actually produce many of the bioactive compounds originally isolated from them. Bacteriocins, ribosomally synthesized antibiotic peptides, constitute one of the most potent weapons to fight against pathogen infections. Indeed, bacteriocinogenic bacteria may prevent pathogen dissemination by occupying the same ecological niche. Bacteriocinogenic strains associated with marine animals are a relevant source for isolation of probiotics. This review draws up an inventory of the marine bacteriocinogenic strains isolated from animal-associated microbial communities, known to date. Bacteriocin-like inhibitory substances (BLIS and fully-characterized bacteriocins are described. Finally, their applications as probiotics in aquaculture are discussed.

  2. Governing Warfare

    DEFF Research Database (Denmark)

    Harste, Gorm

      It would seem as though warfare has gotten out of control, not only in Iraq and Afghanistan, but also in Central Africa. The paper outlines the strategic history of politically controlled warfare since the early Enlightenment. The argument is that control is implausible. The idea of control has...... the risks of lacking unity and displays the organisational trap to the fatal political myth of controlled warfare: Does it come from the military organisation system itself, from political ideologies of goal-rational governance, or from the chameleonic logic of wars?  ...... administration. While organisation systems continue to make some kind of political control possible, this is not the case in relation to wars. The organisation system is the in-between that should mediatise politics and war but is not functionally equivalent to just and unjust wars. The paper investigates...

  3. Flying Electronic Warfare Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides NP-3D aircraft host platforms for Effectiveness of Navy Electronic Warfare Systems (ENEWS) Program antiship missile (ASM) seeker simulators used...

  4. Defining cyber warfare

    Directory of Open Access Journals (Sweden)

    Dragan D. Mladenović

    2012-04-01

    Full Text Available Cyber conflicts represent a new kind of warfare that is technologically developing very rapidly. Such development results in more frequent and more intensive cyber attacks undertaken by states against adversary targets, with a wide range of diverse operations, from information operations to physical destruction of targets. Nevertheless, cyber warfare is waged through the application of the same means, techniques and methods as those used in cyber criminal, terrorism and intelligence activities. Moreover, it has a very specific nature that enables states to covertly initiate attacks against their adversaries. The starting point in defining doctrines, procedures and standards in the area of cyber warfare is determining its true nature. In this paper, a contribution to this effort was made through the analysis of the existing state doctrines and international practice in the area of cyber warfare towards the determination of its nationally acceptable definition.

  5. Biological warfare agents

    Directory of Open Access Journals (Sweden)

    Duraipandian Thavaselvam

    2010-01-01

    Full Text Available The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies.

  6. Abasy Atlas: a comprehensive inventory of systems, global network properties and systems-level elements across bacteria

    Science.gov (United States)

    Ibarra-Arellano, Miguel A.; Campos-González, Adrián I.; Treviño-Quintanilla, Luis G.; Tauch, Andreas; Freyre-González, Julio A.

    2016-01-01

    The availability of databases electronically encoding curated regulatory networks and of high-throughput technologies and methods to discover regulatory interactions provides an invaluable source of data to understand the principles underpinning the organization and evolution of these networks responsible for cellular regulation. Nevertheless, data on these sources never goes beyond the regulon level despite the fact that regulatory networks are complex hierarchical-modular structures still challenging our understanding. This brings the necessity for an inventory of systems across a large range of organisms, a key step to rendering feasible comparative systems biology approaches. In this work, we take the first step towards a global understanding of the regulatory networks organization by making a cartography of the functional architectures of diverse bacteria. Abasy (Across-bacteria systems) Atlas provides a comprehensive inventory of annotated functional systems, global network properties and systems-level elements (global regulators, modular genes shaping functional systems, basal machinery genes and intermodular genes) predicted by the natural decomposition approach for reconstructed and meta-curated regulatory networks across a large range of bacteria, including pathogenically and biotechnologically relevant organisms. The meta-curation of regulatory datasets provides the most complete and reliable set of regulatory interactions currently available, which can even be projected into subsets by considering the force or weight of evidence supporting them or the systems that they belong to. Besides, Abasy Atlas provides data enabling large-scale comparative systems biology studies aimed at understanding the common principles and particular lifestyle adaptions of systems across bacteria. Abasy Atlas contains systems and system-level elements for 50 regulatory networks comprising 78 649 regulatory interactions covering 42 bacteria in nine taxa, containing 3708

  7. Chemical warfare agents

    Directory of Open Access Journals (Sweden)

    Vijayaraghavan R

    2010-01-01

    Full Text Available Among the Weapons of Mass Destruction, chemical warfare (CW is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided.

  8. The Physics of Warfare

    Science.gov (United States)

    Giordano, Gerardo

    2015-01-01

    Recently, I was tasked with the creation and execution of a new themed general education physics class called The Physics of Warfare. In the past, I had used the theme of a class, such as the physics of sports medicine, as a way to create homework and in-class activities, generate discussions, and provide an application to demonstrate that physics…

  9. Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    Dev Vrat Kamboj

    2006-10-01

    Full Text Available There is a long historic record of use of biological warfare (BW agents by warring countriesagainst their enemies. However, the frequency of their use has increased since the beginningof the twentieth century. World war I witnessed the use of anthrax agent against human beingsand animals by Germans, followed by large-scale field trials by Japanese against war prisonersand Chinese population during world war II. Ironically, research and development in biologicalwarfare agents increased tremendously after the Geneva Protocol, signed in 1925, because ofits drawbacks which were overcome by Biological and Toxin Weapons Convention (BTWC in1972. Biological warfare programme took back seat after the 1972 convention but biologicalagents regained their importance after the bioterrorist attacks of anthrax powder in 2001. In thelight of these attacks, many of which turned out to be hoax, general awareness is required aboutbiological warfare agents that can be used against them. This review has been written highlightingimportant biological warfare agents, diseases caused by them, possible therapies and otherprotection measures.

  10. Biological warfare, bioterrorism, and biocrime.

    Science.gov (United States)

    Jansen, H J; Breeveld, F J; Stijnis, C; Grobusch, M P

    2014-06-01

    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria or other agents used to cause illness or death in people, but also in animals or plants. It is aimed at creating casualties, terror, societal disruption, or economic loss, inspired by ideological, religious or political beliefs. The success of bioterroristic attempts is defined by the measure of societal disruption and panic, and not necessarily by the sheer number of casualties. Thus, making only a few individuals ill by the use of crude methods may be sufficient, as long as it creates the impact that is aimed for. The assessment of bioterrorism threats and motives have been described before. Biocrime implies the use of a biological agent to kill or make ill a single individual or small group of individuals, motivated by revenge or the desire for monetary gain by extortion, rather than by political, ideological, religious or other beliefs. The likelihood of a successful bioterrorist attack is not very large, given the technical difficulties and constraints. However, even if the number of casualties is likely to be limited, the impact of a bioterrorist attack can still be high. Measures aimed at enhancing diagnostic and therapeutic capabilities and capacities alongside training and education will improve the ability of society to combat 'regular' infectious diseases outbreaks, as well as mitigating the effects of bioterrorist attacks.

  11. Establishing Cyber Warfare Doctrine

    Directory of Open Access Journals (Sweden)

    Andrew M. Colarik

    2012-01-01

    Full Text Available Over the past several decades, advances in technology have transformed communications and the ability to acquire, disseminate, and utilize information in a range of environments. Modern societies and their respective militaries have taken advantage of a robust information space through network-centric systems. Because military and commercial operations have increasingly converged, communication and information infrastructures are now high-priority military objectives in times of war. This article examines the theoretical underpinning of current cyber warfare research, what we have learned so far about its application, and some of the emerging themes to be considered; it also postulates the development of a (national cyber warfare doctrine (CWD. An endeavor of this scale requires lots of considerations and preparation for its development if it is to be cooperatively embraced. This article considers why information technology systems and their supporting infrastructures should be considered legitimate military targets in conflicts, and offers several events that support this supposition. In addition, it identifies the various forms of doctrine that will become the basis for developing a CWD, discusses a CWD's possible components, and proposes a national collaborative and discussion framework for obtaining a nation's stakeholder buy-in for such an endeavor.

  12. The evolution of human warfare.

    Science.gov (United States)

    Pitman, George R

    2011-01-01

    Here we propose a new theory for the origins and evolution of human warfare as a complex social phenomenon involving several behavioral traits, including aggression, risk taking, male bonding, ingroup altruism, outgroup xenophobia, dominance and subordination, and territoriality, all of which are encoded in the human genome. Among the family of great apes only chimpanzees and humans engage in war; consequently, warfare emerged in their immediate common ancestor that lived in patrilocal groups who fought one another for females. The reasons for warfare changed when the common ancestor females began to immigrate into the groups of their choice, and again, during the agricultural revolution. PMID:22081837

  13. Nuclear radiation in warfare

    International Nuclear Information System (INIS)

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios; biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion. (orig./HP)

  14. Truth about the Consequence of Bacteriological Warfare of Disseminating Plague Bacteria%散布鼠疫菌(PX)细菌战“战果”之真相

    Institute of Scientific and Technical Information of China (English)

    莇昭三[日](著); 韩慧光(译)

    2015-01-01

    日本军在中国实施细菌战的事实,随着中日学者的研究逐渐被揭示,在研究中所用材料大部分都是加害者(当事人)和受害者的口述史,缺乏日本军当时实施细菌战后对被害地的全面详细的疫学调查。731部队细菌战研究人员金子顺一论文《鼠疫效果略算法》,揭示了1940年农安、新京鼠疫流行事件是731部队实施的细菌战的事实。《陆军军医学校防疫研究报告第2部》中的高桥正彦论文中关于农安、新京鼠疫流行事件的论文,是731部队细菌战后对被害地进行的疫学调查。达格威文件Q报告中的部分数据来自“农安细菌战”受害者的病理解剖,其中不仅有中国人,也有日本人。%Facts about bacteriological warfare conducted by Japanese Army in China have been gradually re-vealed by related Chinese and Japanese researchers. However, the majority of materials used in the research are oral history orally accounted by offenders and victims, hence the lack of epidemic prevention surveys on the inflicted areas of bacteriological warfare by Japanese army. The thesis paper by Jun-Ichi Kaneko (bacterial warfare researcher of U-nit 731) namedBubonicPlagueAlgorithmunveiled the fact that plague epidemics which struck Nong’an and Changchun were caused by the Unit 731’s bacteriological warfare. Takahashi’s thesis paper inArmyMedicalCol-legeEpidemicPreventionResearchReport(VolumeⅡ)on plague epidemics that hit Nong’an and Changchun is in connection with the epidemic prevention surveys on the inflicted areas of bacteriological warfare carried out by the U-nit 731. Some data of the Report of“Q”from Dugway Proving Ground Documents came from pathological anatomy of victims of Nong’an bacteriological warfare, some of whom were Chinese and Japanese.

  15. Biological warfare, bioterrorism, and biocrime.

    Science.gov (United States)

    Jansen, H J; Breeveld, F J; Stijnis, C; Grobusch, M P

    2014-06-01

    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria or other agents used to cause illness or death in people, but also in animals or plants. It is aimed at creating casualties, terror, societal disruption, or economic loss, inspired by ideological, religious or political beliefs. The success of bioterroristic attempts is defined by the measure of societal disruption and panic, and not necessarily by the sheer number of casualties. Thus, making only a few individuals ill by the use of crude methods may be sufficient, as long as it creates the impact that is aimed for. The assessment of bioterrorism threats and motives have been described before. Biocrime implies the use of a biological agent to kill or make ill a single individual or small group of individuals, motivated by revenge or the desire for monetary gain by extortion, rather than by political, ideological, religious or other beliefs. The likelihood of a successful bioterrorist attack is not very large, given the technical difficulties and constraints. However, even if the number of casualties is likely to be limited, the impact of a bioterrorist attack can still be high. Measures aimed at enhancing diagnostic and therapeutic capabilities and capacities alongside training and education will improve the ability of society to combat 'regular' infectious diseases outbreaks, as well as mitigating the effects of bioterrorist attacks. PMID:24890710

  16. Iran and Cyberspace Warfare

    Directory of Open Access Journals (Sweden)

    Sami Kronenfeld

    2012-12-01

    Full Text Available Throughout the world decision makers and the general public have undoubtedly realized in recent years that cyberspace must be treated as a genuine realm of warfare. Since the the Stuxnet attack - one of the most destructive cyber attacks to date - Iran has been working hard to improve its cyberspace defenses on the one hand, while building up cyberspace intelligence gathering and offensive capabilities on the other. This article examines the current situation regarding various elements of Iran’s cyberspace development process. The first section analyzes the country’s cyberspace strategy, while the second section describes the organizational and operational response to the formulated strategy. This comprises three components: infrastructures for training and developing technological manpower for work in cyberspace; technological developments that have already been introduced; and the overall processes of cyberspace force construction. Finally, the article focuses on a number of cyberspace incidents attributed to Iran, attempts to gain some insight into the way Iran conducts its cyberspace activities, and examines implications for Israel and other Western nations.

  17. How Challenges of Warfare Influences the Laws of Warfare

    Directory of Open Access Journals (Sweden)

    Eyal Benvenisti

    2012-04-01

    Full Text Available The first challenge to laws of warfare comes from the realm of human rights, from the right to life. Today the situation is different. Laws of human rights have trickled into laws of warfare, even though they never mean to apply to them. In the process of formulating human rights laws there was never any intention that they be applied to a state of war. Their starting point was the power that a regime brings to bear on its citizens. This was not a case of horizontal warring - such as a duel or contest - but rather a hierarchy, a vertical relationship in which the one possessing public power controlled the citizen. This essay will deal with the challenges to the laws of warfare posed by fighting in urban zones, the consequent changes to these laws, and the problems these changes have aroused and responses to them.

  18. The doctor and nuclear warfare

    International Nuclear Information System (INIS)

    At the 34th World Medical Assembly in Lisbon in 1981 the World Medical Association adopted a motion proposed by the American Medical Association that national medical associations should develop programs to educate the civilian population on the medical consequences of nuclear war. This article discusses the attitude the medical professions should have, should nuclear warfare in some form confront them in the future. The conclusion is drawn that defence against nuclear warfare is only a part of civil defence against any disaster, including the natural disasters such as flood and fire and the man-made disasters of transport accidents, even of problems at nuclear plants designed to supply energy

  19. The Anatomy of Counterinsurgency Warfare

    DEFF Research Database (Denmark)

    Ringsmose, Jens; Pedersen, Kenneth

    Since the beginning of the new millennium, the West has been increasingly involved in a tiresome and rather particular type of conflict: insurgency warfare. The bloody and shocking terrorist attacks on New York and Washington in September 2001 marked the beginning of a new era, and the introducti...

  20. European Curricula, Xenophobia and Warfare.

    Science.gov (United States)

    Coulby, David

    1997-01-01

    Examines school and university curricula in Europe and the extent of their influence on xenophobia. Considers the pluralistic nature of the European population. Discusses the role of curriculum selection and language policy in state efforts to promote nationalism. Assesses the role of curricular systems in the actual encouragement of warfare,…

  1. Role of Smokes in Warfare .

    Directory of Open Access Journals (Sweden)

    P.K. Mishra

    1994-04-01

    Full Text Available The role smokes in warfare is reviewed with particular reference to the world wars, and various types os smokes are discussed. The smokes that can defeat modern opto-electronics including infrared (IR/millimetre wave (MMW guidance and thermal imager are described. Environment-friendly non-toxic smokes are dealt with briefly. The future of smokes in these circumstances is mentioned.

  2. Electronic warfare target location methods

    CERN Document Server

    Poisel, Richard

    2012-01-01

    Describing the mathematical development underlying current and classical methods of geolocating electronic systems that are emitting, this newly revised and greatly expanded edition of a classic Artech House book offers practical guidance in electronic warfare target location. The Second Edition features a wealth of additional material including new chapters on time delay estimation, direction finding techniques, and the MUSIC algorithm. This practical resource provides you with critical design information on geolocation algorithms, and establishes the fundamentals of existing algorithms as a

  3. MEANS AND METHODS OF CYBER WARFARE

    Directory of Open Access Journals (Sweden)

    Dan-Iulian VOITAȘEC

    2016-06-01

    Full Text Available According to the Declaration of Saint Petersburg of 1868 “the only legitimate object which States should endeavor to accomplish during war is to weaken the military forces of the enemy”. Thus, International Humanitarian Law prohibits or limits the use of certain means and methods of warfare. The rapid development of technology has led to the emergence of a new dimension of warfare. The cyber aspect of armed conflict has led to the development of new means and methods of warfare. The purpose of this paper is to study how the norms of international humanitarian law apply to the means and methods of cyber warfare.

  4. Cyber warfare building the scientific foundation

    CERN Document Server

    Jajodia, Sushil; Subrahmanian, VS; Swarup, Vipin; Wang, Cliff

    2015-01-01

    This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially gove

  5. Analytic tools for information warfare

    Energy Technology Data Exchange (ETDEWEB)

    Vandewart, R.L.; Craft, R.L.

    1996-05-01

    Information warfare and system surety (tradeoffs between system functionality, security, safety, reliability, cost, usability) have many mechanisms in common. Sandia`s experience has shown that an information system must be assessed from a {ital system} perspective in order to adequately identify and mitigate the risks present in the system. While some tools are available to help in this work, the process is largely manual. An integrated, extensible set of assessment tools would help the surety analyst. This paper describes one approach to surety assessment used at Sandia, identifies the difficulties in this process, and proposes a set of features desirable in an automated environment to support this process.

  6. Undersea Warfare Academic Group Home Page

    OpenAIRE

    1997-01-01

    Collected from the Internet Archive "Wayback machine". The Undersea Warfare Curriculum educates officers in the engineering fundamentals, physical principles and analytical concepts that govern operational employment of undersea warfare (USW) sensors and weapons systems. Program is interdisciplinary and integrates; mathematics, physics, acoustics, electrical engineering, oceanography, operations analysis, human factors, computer science and meteorology.

  7. Information warfare technologies in political discourse

    Directory of Open Access Journals (Sweden)

    Karpova Anna Yu.

    2016-01-01

    Full Text Available We attempt to examine the technology of «information warfare» in this paper. The dominant theme of the paper is that the outcome of the information warfare is important not only for the future of a state itself but for the future of the world balance of forces. The main task of geopolitical actors in information warfare is to introduce ideas corresponding to their interests into mass consciousness. All participants of political conflicts have common features in technologies of Information warfare. The information anomie is the indicator of the great geopolitical actors’ personified interests on the stage of «information warfare» - the process resulted in destroying the communicative line: report-information understanding and disrupting the social order in society. In this paper authors describe the following Information Warfare technologies: "Political volcano" technology; "SPIN" technology; "Widening media resource" technology; "specific gravity" technology; "Cold War 2.0" technology and Information cleaningup technology. It is assumed that in the future there will be new instructions on applying technologies of information warfare. To impart perspective to the paper we consider examples, opinions and trends.

  8. Detection of biological warfare agents using ultra violet-laser induced fluorescence LIDAR

    Science.gov (United States)

    Joshi, Deepti; Kumar, Deepak; Maini, Anil K.; Sharma, Ramesh C.

    This review has been written to highlight the threat of biological warfare agents, their types and detection. Bacterial biological agent Bacillus anthracis (bacteria causing the disease anthrax) which is most likely to be employed in biological warfare is being discussed in detail. Standoff detection of biological warfare agents in aerosol form using Ultra violet-Laser Induced Fluorescence (UV-LIF) spectroscopy method has been studied. Range-resolved detection and identification of biological aerosols by both nano-second and non-linear femto-second LIDAR is also discussed. Calculated received fluorescence signal for a cloud of typical biological agent Bacillus globigii (Simulants of B. anthracis) at a location of ˜5.0 km at different concentrations in presence of solar background radiation has been described. Overview of current research efforts in internationally available working UV-LIF LIDAR systems are also mentioned briefly.

  9. Grid architecture model of network centric warfare

    Institute of Scientific and Technical Information of China (English)

    Yan Tihua; Wang Baoshu

    2006-01-01

    NCW(network centric warfare) is an information warfare concentrating on network. A global network-centric warfare architecture with OGSA grid technology is put forward, which is a four levels system including the user level, the application level, the grid middleware layer and the resource level. In grid middleware layer, based on virtual hosting environment, a BEPL4WS grid service composition method is introduced. In addition, the NCW grid service model is built with the help of Eclipse-SDK-3.0.1 and Bpws4j.

  10. Chemical warfare, past and future. Study project

    Energy Technology Data Exchange (ETDEWEB)

    Tzihor, A.

    1992-05-15

    World War I was arena for the first use of chemical warfare. The enormous tactical success brought about by this first time use of chemical weapons caused the continued development of more sophisticated tactics and weapons in this category of unconventional warfare. This phenomenon has carried through to today. However, at present, because of technological developments, the global economic situation, and political factors, coupled with the inability of the western world to control the proliferation of chemical weapons, a situation weapon of mass destruction. Recent use by Iraq against Kurdish civilian indicates that chemical warfare is no longer limited to the battlefield. The western nations have a need to understand the risk. This paper conducts an analysis of past lessons and the factors which will affect the use of chemical warfare in the future. From this analysis, the paper reaches conclusions concerning the significant threat chemical weapons pose for the entire world in the not too distant future.

  11. Retention of junior Naval Special Warfare officers

    OpenAIRE

    Davids, Keith B.

    1998-01-01

    The Commander of the Naval Special Warfare Command (NSWC) has identified junior officer retention within the Naval Special Warfare community as a significant problem. In 1997, the community experienced the highest number of resignations on record, and this trend has continued in 1998. NSWC has taken several steps to identify the cause of recent retention trends, one of which was to provide support for this study. The purpose of this study was to identify the factors that lead to resignation o...

  12. Hybrid Warfare Studies and Russia’s Example in Crimea

    OpenAIRE

    Erol, Mehmet Seyfettin; Şafak OĞUZ

    2015-01-01

    Although Hybrid Warfare is an old concept, theoretical studies in the western countries mainly began in the post-Col War era, focusing on asymmetrical threats against conventional superiority of western countries such as USA or Israel. September 11th attacks and 2006 Israel-Lebanon war played important roles for the evolution of hybrid warfare theories. However, there has not any consensus among scholars on a exact or unique definition of hybrid warfare. Hybrid warfare became one of the main ...

  13. Intelligence, Information Technology, and Information Warfare.

    Science.gov (United States)

    Davies, Philip H. J.

    2002-01-01

    Addresses the use of information technology for intelligence and information warfare in the context of national security and reviews the status of clandestine collection. Discusses hacking, human agent collection, signal interception, covert action, counterintelligence and security, and communications between intelligence producers and consumers…

  14. Agricultural Warfare and Bioterrorism using Invasive Species

    Science.gov (United States)

    The chapter on Agricultural Warfare and Bioterrorism using Invasive Species is part of the book titled Pest Management and Phytosanitary Trade Barriers authored by Neil Heather (Australia) and Guy Hallman. The chapter attempts to briefly put the topic into context with phytosanitation. It presents...

  15. Guiding Warfare to Reach Sustainable Peace

    DEFF Research Database (Denmark)

    Vestenskov, David; Drewes, Line

    The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition of develo...

  16. Inventory Management

    Science.gov (United States)

    1983-01-01

    Known as MRO for Maintenance, Repair and Operating supplies, Tropicana Products, Inc.'s automated inventory management system is an adaptation of the Shuttle Inventory Management System (SIMS) developed by NASA to assure adequate supply of every item used in support of the Space Shuttle. The Tropicana version monitors inventory control, purchasing receiving and departmental costs for eight major areas of the company's operation.

  17. Computational models of intergroup competition and warfare.

    Energy Technology Data Exchange (ETDEWEB)

    Letendre, Kenneth (University of New Mexico); Abbott, Robert G.

    2011-11-01

    This document reports on the research of Kenneth Letendre, the recipient of a Sandia Graduate Research Fellowship at the University of New Mexico. Warfare is an extreme form of intergroup competition in which individuals make extreme sacrifices for the benefit of their nation or other group to which they belong. Among animals, limited, non-lethal competition is the norm. It is not fully understood what factors lead to warfare. We studied the global variation in the frequency of civil conflict among countries of the world, and its positive association with variation in the intensity of infectious disease. We demonstrated that the burden of human infectious disease importantly predicts the frequency of civil conflict and tested a causal model for this association based on the parasite-stress theory of sociality. We also investigated the organization of social foraging by colonies of harvester ants in the genus Pogonomyrmex, using both field studies and computer models.

  18. Handbook of toxicology of chemical warfare agents

    CERN Document Server

    2010-01-01

    This groundbreaking book covers every aspect of deadly toxic chemicals used as weapons of mass destruction and employed in conflicts, warfare and terrorism. Including findings from experimental as well as clinical studies, this one-of-a-kind handbook is prepared in a very user- friendly format that can easily be followed by students, teachers and researchers, as well as lay people. Stand-alone chapters on individual chemicals and major topics allow the reader to easily access required information without searching through the entire book. This is the first book that offers in-depth coverage of individual toxicants, target organ toxicity, major incidents, toxic effects in humans, animals and wildlife, biosensors, biomarkers, on-site and laboratory analytical methods, decontamination and detoxification procedures, prophylactic, therapeutic and countermeasures, and the role of homeland security. Presents a comprehensive look at all aspects of chemical warfare toxicology in one reference work. This saves research...

  19. Animal plant warfare and secondary metabolite evolution

    OpenAIRE

    Wöll, Steffen; Kim, Sun Hee; Greten, Henry Johannes; Efferth, Thomas

    2013-01-01

    Abstract The long-lasting discussion, why plants produce secondary metabolites, which are pharmacologically and toxicologically active towards mammals traces back to the eminent role of medicinal plants in the millennia-old history of manhood. In recent years, the concept of an animal plant warfare emerged, which focused on the co-evolution between plants and herbivores. As a reaction to herbivory, plants developed mechanical defenses such as thorns and hard shells, which paved the way for ad...

  20. Axial Vircator for Electronic Warfare Applications

    OpenAIRE

    L. Drazan; R. Vrana

    2009-01-01

    This paper deals with a high power microwave generator with virtual cathode – vircator in axial release for electronic warfare applications. The classification of directed energy weapons microwave (DEWM) is introduced together with basic block diagrams of a particular class of DEWM. In the paper, methods for designing vircator pulsed power supply, axial vircator structure, measurement methods and experimental results are presented. The vircator in electromagnetic ammunition is powered b...

  1. OFFICER AND COMMANDER IN ASYMMETRIC WARFARE OPERATIONS

    OpenAIRE

    Giuseppe CAFORIO

    2013-01-01

    Starting from the data of a field research conducted among soldiers with asymmetric warfare experiences from nine different countries, the author seeks to identify and shed light on the various problems that officers with command responsibilities had to face during their missions. A picture emerges of feelings and experiences relating to their first impression upon arriving in the theatre, relations with local armed forces, relations with the local population and local authorities, relations ...

  2. Hybrid Warfare Studies and Russia’s Example in Crimea

    OpenAIRE

    Erol, Mehmet Seyfettin; Şafak OĞUZ

    2015-01-01

    Although Hybrid Warfare is an old concept, theoretical studies in the western countries mainly began in the post-Col War era, focusing on asymmetrical threats against conventional superiority of western countries such as USA or Israel. September 11th attacks and 2006 Israel-Lebanon war played important roles for the evolution of hybrid warfare theories. However, there has not any consensus among scholars on a exact or unique definition of hybrid warfare. Hybrid warfare became one of the main ...

  3. OFFICER AND COMMANDER IN ASYMMETRIC WARFARE OPERATIONS

    Directory of Open Access Journals (Sweden)

    Giuseppe CAFORIO

    2013-01-01

    Full Text Available Starting from the data of a field research conducted among soldiers with asymmetric warfare experiences from nine different countries, the author seeks to identify and shed light on the various problems that officers with command responsibilities had to face during their missions. A picture emerges of feelings and experiences relating to their first impression upon arriving in the theatre, relations with local armed forces, relations with the local population and local authorities, relations with NGOs, relations with other armies, the impact of the rules of engagement (ROEs, training and education, and operational experiences. The paper ends with a discussion of the lessons learned.

  4. Microwave receivers with electronic warfare applications

    CERN Document Server

    Tsui, James

    2005-01-01

    This book by the author of Digital Techniques for Wideband Receivers willbe like no other one on your book shelf as the definitive word on electronicwarfare (EW) receiver design and performance. Whether you are an EWscientist involved in the test and evaluation of EW receivers or a designerof RWR's and other EW-related receivers, Microwave Receivers withElectronic Warfare Applications is a handy reference through which you canperfect your technical art. Lucidly written, this book is a treatise on EWreceivers that is relevant to you if you are just looking for a top-levelinsight into EW receive

  5. Axial Vircator for Electronic Warfare Applications

    Directory of Open Access Journals (Sweden)

    L. Drazan

    2009-12-01

    Full Text Available This paper deals with a high power microwave generator with virtual cathode – vircator in axial release for electronic warfare applications. The classification of directed energy weapons microwave (DEWM is introduced together with basic block diagrams of a particular class of DEWM. In the paper, methods for designing vircator pulsed power supply, axial vircator structure, measurement methods and experimental results are presented. The vircator in electromagnetic ammunition is powered by magneto-cumulative generator and in weapons for defense of objects (WDO, it is powered by Marx generator. The possible applications of a vircator in the DEWM area are discussed.

  6. Electronic warfare receivers and receiving systems

    CERN Document Server

    Poisel, Richard A

    2014-01-01

    Receivers systems are considered the core of electronic warfare (EW) intercept systems. Without them, the fundamental purpose of such systems is null and void. This book considers the major elements that make up receiver systems and the receivers that go in them.This resource provides system design engineers with techniques for design and development of EW receivers for modern modulations (spread spectrum) in addition to receivers for older, common modulation formats. Each major module in these receivers is considered in detail. Design information is included as well as performance tradeoffs o

  7. Inventory and inventory-taking

    OpenAIRE

    Keltnerová, Petra

    2013-01-01

    Inventory is an extensive process, which is one of the few methods to control for accuracy of accounting. Accounting under obligation upon the low is necessary lead completely, demonstrably and correctly. The main theme of the bachelor thesis is to characterize the inventory and warehouse management in the specific company. The bachelor thesis is formed (consists) of theoretical basis and a case study. The theoretical part characterizes the inventory in several stages and stock records, where...

  8. Chemical profiling of chemical warfare agents for forensic purposes

    NARCIS (Netherlands)

    Noort, D.; Reuver, L.P.J. de; Fidder, A.; Tromp, M.; Verschraagen, M.

    2010-01-01

    A program has been initiated towards the chemical profiling of chemical warfare agents, in order to support forensic investigations towards synthesis routes, production sites and suspect chemical suppliers. Within the first stage of the project various chemical warfare agents (VX, sulfur mustard, sa

  9. Hybrid Warfare Studies and Russia’s Example in Crimea

    Directory of Open Access Journals (Sweden)

    Mehmet Seyfettin EROL

    2015-12-01

    Full Text Available Although Hybrid Warfare is an old concept, theoretical studies in the western countries mainly began in the post-Col War era, focusing on asymmetrical threats against conventional superiority of western countries such as USA or Israel. September 11th attacks and 2006 Israel-Lebanon war played important roles for the evolution of hybrid warfare theories. However, there has not any consensus among scholars on a exact or unique definition of hybrid warfare. Hybrid warfare became one of the main security issues for the West and especially for NATO after the Russia-Ukraine crisis. Russian military strategies, called “hybrid warfare” by the western countries, resulted in the successful annexation of Crimea and, caused a serious security problem for the West resulting important structural and functional changes for the military system of NATO. Russian activities, which have been based on surprise, ambiguity and deniability, presented a unique example for hybrid warfare studies.

  10. History of chemical and biological warfare agents.

    Science.gov (United States)

    Szinicz, L

    2005-10-30

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents. PMID:16111798

  11. Trade inventories

    OpenAIRE

    Jonathan McCarthy; Egon Zakrajsek

    1998-01-01

    We examine the behavior of trade inventories using both industry-level and high-frequency firm-level data. The cost structure underlying the firm's optimization problem--convex delivery costs vs. fixed costs of ordering--provides the two competing hypotheses. In the presence of fixed costs (S,s) inventory policies are optimal, and steady-state reduced-form predictions regarding the dynamics of inventories and sales can be used to test the model. The alternative of convex delivery costs is pro...

  12. Riparian Inventory

    Data.gov (United States)

    Kansas Data Access and Support Center — This dataset is a digital representation of the 1:24,000 Land Use Riparian Areas Inventory for the state of Kansas. The dataset includes a 100 foot buffer around...

  13. Decontamination of Chemical Warfare Agents (Review Article

    Directory of Open Access Journals (Sweden)

    Beer Singh

    2010-07-01

    Full Text Available Chemical warfare agents (CWA pose inevitable threat, both to soldiers and civilians. Risk on contact with these deadly agents can be avoided by neutralisation of their toxic effects. A suitable media with essential physico-chemical properties is required for this purpose. Considerable efforts have been made to develop several decontamination media suitable for neutralisation of highly toxic CWAs. This paper reviews history and details of recent technological advancements in the development of versatile, broad spectrum decontamination formulations against CWAs, as also nanosized metal oxides as CWA decontaminants.Defence Science Journal, 2010, 60(4, pp.428-441, DOI:http://dx.doi.org/10.14429/dsj.60.487

  14. What Lies behind Chinese Cyber Warfare

    Directory of Open Access Journals (Sweden)

    Gabi Siboni

    2012-09-01

    Full Text Available Over the past several years China has been developing operational capabilities in the field of cyberspace warfare. A cyber attack may be defined as the unauthorized penetration of computer and communications systems belonging to individuals or organizations for the purpose of espionage and information theft, in order thereby to damage or disrupt the functioning of these systems or to damage other systems dependent on them, even to a point of causing actual physical damage. Despite denials by the Chinese government, researchers posit that China is behind a string of cyber attacks against the United States, Japan, France, Australia, and other Western nations. This essay argues that an analysis of the publicly available information about the more recent attacks makes it possible to establish that China does in fact stand behind these attacks and also makes it possible to identify the link between China’s cyberspace warfare strategy and its choice of targets. The analysis includes an examination of the companies attacked to identify possible motives for the attacks. The motives for these attacks are presumably to steal capabilities and conduct industrial espionage against nations and commercial competitors. Attacking companies and organizations in the financial and even political sectors allows access to valuable intelligence in these fields. By contrast, the intelligence value for immediate use in attacking companies providing critical infrastructures and communications services is usually relatively low. Rather, gaining access, if only to some providers of communications and internet services in the West and the United States, is liable to give attackers the ability to damage these services.

  15. Anthropology, Culture, and COIN in a Hybrid Warfare World

    OpenAIRE

    Simons, Anna

    2011-01-01

    in Paul Brister, William Natter, and Robert Tomes (eds.), Hybrid Warfare and Transnational Threats: Perspectives for an Era of Persistent Conflict. New York: Council for Emerging National Security Studies, 2011.

  16. Active and Passive Precautions in Air and Missile Warfare

    OpenAIRE

    Sassoli, Marco; Quintin, Anne

    2014-01-01

    Based upon state practice, customary international law, Protocol Additional I to the Geneva Conventions and the Harvard Manual on Air and Missile Warfare (which they critically review), the authors discuss the different precautionary measures for the benefit of the civilian population an attacker and a defender must take, in the conduct of hostilities in general, and specifically in air and missile warfare, including in attacks against aircraft.

  17. Conceptual Lanchester-type Decapitation Warfare Modelling

    Directory of Open Access Journals (Sweden)

    Jau-yeu Menq

    2007-07-01

    Full Text Available Decapitation operation has existed for a long time in military history; however, it was notuntil March 2003 'decapitation attack' became a well known term in the mass media. This paperis based on the connotation of decapitation based on historical study and refines the term intomilitary strategic concept of decapitation strategy. Ideas derived from detailed studies onLanchester-type combat models are used to describe the effectiveness of conventional regularforces under decapitation warfare, which includes asymmetric, nonlinear, stand-off and specialoperation forces (SOF operations. A conceptual model is presented to describe the effects ofthe decapitation strategy on the regular battlefield. With extensive coverage of operational factorssuch as robustness of forces, time difference between combats, undermining effects, breakpoints,attrition rates, total force level and force allocation, the model is suitable to analyse complexscenario with different types of military operations consisting of decapitation strategy. Anillustrative example is provided to demonstrate the application of the model. The conceptualmodel is built based on hypotheses, assumptions, and criteria. In the absence of historical data,no data analysis and parameter estimation are involved.

  18. History of biological warfare and bioterrorism.

    Science.gov (United States)

    Barras, V; Greub, G

    2014-06-01

    Bioterrorism literally means using microorganisms or infected samples to cause terror and panic in populations. Bioterrorism had already started 14 centuries before Christ, when the Hittites sent infected rams to their enemies. However, apart from some rare well-documented events, it is often very difficult for historians and microbiologists to differentiate natural epidemics from alleged biological attacks, because: (i) little information is available for times before the advent of modern microbiology; (ii) truth may be manipulated for political reasons, especially for a hot topic such as a biological attack; and (iii) the passage of time may also have distorted the reality of the past. Nevertheless, we have tried to provide to clinical microbiologists an overview of some likely biological warfare that occurred before the 18th century and that included the intentional spread of epidemic diseases such as tularaemia, plague, malaria, smallpox, yellow fever, and leprosy. We also summarize the main events that occurred during the modern microbiology era, from World War I to the recent 'anthrax letters' that followed the World Trade Center attack of September 2001. Again, the political polemic surrounding the use of infectious agents as a weapon may distort the truth. This is nicely exemplified by the Sverdlovsk accident, which was initially attributed by the authorities to a natural foodborne outbreak, and was officially recognized as having a military cause only 13 years later. PMID:24894605

  19. History of biological warfare and bioterrorism.

    Science.gov (United States)

    Barras, V; Greub, G

    2014-06-01

    Bioterrorism literally means using microorganisms or infected samples to cause terror and panic in populations. Bioterrorism had already started 14 centuries before Christ, when the Hittites sent infected rams to their enemies. However, apart from some rare well-documented events, it is often very difficult for historians and microbiologists to differentiate natural epidemics from alleged biological attacks, because: (i) little information is available for times before the advent of modern microbiology; (ii) truth may be manipulated for political reasons, especially for a hot topic such as a biological attack; and (iii) the passage of time may also have distorted the reality of the past. Nevertheless, we have tried to provide to clinical microbiologists an overview of some likely biological warfare that occurred before the 18th century and that included the intentional spread of epidemic diseases such as tularaemia, plague, malaria, smallpox, yellow fever, and leprosy. We also summarize the main events that occurred during the modern microbiology era, from World War I to the recent 'anthrax letters' that followed the World Trade Center attack of September 2001. Again, the political polemic surrounding the use of infectious agents as a weapon may distort the truth. This is nicely exemplified by the Sverdlovsk accident, which was initially attributed by the authorities to a natural foodborne outbreak, and was officially recognized as having a military cause only 13 years later.

  20. Numerical simulation of RCS for carrier electronic warfare airplanes

    Directory of Open Access Journals (Sweden)

    Yue Kuizhi

    2015-04-01

    Full Text Available This paper studies the radar cross section (RCS of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carrier electronic warfare airplanes Model A and Model B with weapons were established. Based on the physical optics method and the equivalent electromagnetic flow method, by the use of the RCSAnsys software, the characteristics of carrier electronic warfare airplanes’ RCS under steady and dynamic flights were simulated under the UHF, X, and S radar bands. This paper researches the detection probability of aircraft by radars under the condition of electronic warfare, and completes the mathematical statistical analysis of the simulation results. The results show that: The Model A of carrier electronic warfare airplane is better than Model B on stealth performance and on discover probability by radar detection effectively.

  1. Nondestructive inspection of chemical warfare based on API-TOF

    International Nuclear Information System (INIS)

    Background: Real-time, fast, accurate, nondestructive inspection (NDI) and quantitative analysis for chemical warfare are very imperative for chemical defense, anti-terror and nation security. Purpose: Associated Particles Technique (APT)/Neutron Time of Flight (TOF) has been developed for non-invasive inspection of sealed containers with chemical warfare agents. Methods: A prototype equipment for chemical warfare is consisted of an APT neutron generator with a 3×3 matrix of semiconductor detectors of associated alpha-particles, the shielding protection of neutron and gamma-ray, arrayed NaI(Tl)-based detectors of gamma-rays, fully-digital data acquisition electronics, data analysis, decision-making software, support platform and remote control system. Inelastic scattering gamma-ray pulse height spectra of sarin, VX, mustard gas and adamsite induced by 14-MeV neutron are measured. The energies of these gamma rays are used to identify the inelastic scattering elements, and the intensities of the peaks at these energies are used to reveal their concentrations. Results: The characteristic peaks of inelastic scattering gamma-ray pulse height spectra show that the prototype equipment can fast and accurately inspect chemical warfare. Conclusion: The equipment can be used to detect not only chemical warfare agents but also other hazardous materials, such as chemical/toxic/drug materials, if their chemical composition is in any way different from that of the surrounding materials. (authors)

  2. Inventory Abstraction

    Energy Technology Data Exchange (ETDEWEB)

    C. Leigh

    2000-11-03

    The purpose of the inventory abstraction as directed by the development plan (CRWMS M&O 1999b) is to: (1) Interpret the results of a series of relative dose calculations (CRWMS M&O 1999c, 1999d). (2) Recommend, including a basis thereof, a set of radionuclides that should be modeled in the Total System Performance Assessment in Support of the Site Recommendation (TSPA-SR) and the Total System Performance Assessment in Support of the Final Environmental Impact Statement (TSPA-FEIS). (3) Provide initial radionuclide inventories for the TSPA-SR and TSPA-FEIS models. (4) Answer the U.S. Nuclear Regulatory Commission (NRC)'s Issue Resolution Status Report ''Key Technical Issue: Container Life and Source Term'' (CLST IRSR) (NRC 1999) key technical issue (KTI): ''The rate at which radionuclides in SNF [Spent Nuclear Fuel] are released from the EBS [Engineered Barrier System] through the oxidation and dissolution of spent fuel'' (Subissue 3). The scope of the radionuclide screening analysis encompasses the period from 100 years to 10,000 years after the potential repository at Yucca Mountain is sealed for scenarios involving the breach of a waste package and subsequent degradation of the waste form as required for the TSPA-SR calculations. By extending the time period considered to one million years after repository closure, recommendations are made for the TSPA-FEIS. The waste forms included in the inventory abstraction are Commercial Spent Nuclear Fuel (CSNF), DOE Spent Nuclear Fuel (DSNF), High-Level Waste (HLW), naval Spent Nuclear Fuel (SNF), and U.S. Department of Energy (DOE) plutonium waste. The intended use of this analysis is in TSPA-SR and TSPA-FEIS. Based on the recommendations made here, models for release, transport, and possibly exposure will be developed for the isotopes that would be the highest contributors to the dose given a release to the accessible environment. The inventory abstraction is important in

  3. INVENTORY ABSTRACTION

    Energy Technology Data Exchange (ETDEWEB)

    G. Ragan

    2001-12-19

    The purpose of the inventory abstraction, which has been prepared in accordance with a technical work plan (CRWMS M&O 2000e for ICN 02 of the present analysis, and BSC 2001e for ICN 03 of the present analysis), is to: (1) Interpret the results of a series of relative dose calculations (CRWMS M&O 2000c, 2000f). (2) Recommend, including a basis thereof, a set of radionuclides that should be modeled in the Total System Performance Assessment in Support of the Site Recommendation (TSPA-SR) and the Total System Performance Assessment in Support of the Final Environmental Impact Statement (TSPA-FEIS). (3) Provide initial radionuclide inventories for the TSPA-SR and TSPA-FEIS models. (4) Answer the U.S. Nuclear Regulatory Commission (NRC)'s Issue Resolution Status Report ''Key Technical Issue: Container Life and Source Term'' (CLST IRSR) key technical issue (KTI): ''The rate at which radionuclides in SNF [spent nuclear fuel] are released from the EBS [engineered barrier system] through the oxidation and dissolution of spent fuel'' (NRC 1999, Subissue 3). The scope of the radionuclide screening analysis encompasses the period from 100 years to 10,000 years after the potential repository at Yucca Mountain is sealed for scenarios involving the breach of a waste package and subsequent degradation of the waste form as required for the TSPA-SR calculations. By extending the time period considered to one million years after repository closure, recommendations are made for the TSPA-FEIS. The waste forms included in the inventory abstraction are Commercial Spent Nuclear Fuel (CSNF), DOE Spent Nuclear Fuel (DSNF), High-Level Waste (HLW), naval Spent Nuclear Fuel (SNF), and U.S. Department of Energy (DOE) plutonium waste. The intended use of this analysis is in TSPA-SR and TSPA-FEIS. Based on the recommendations made here, models for release, transport, and possibly exposure will be developed for the isotopes that would be the highest

  4. Sweeping changes for mine warfare : controlling the mine threat

    OpenAIRE

    Cashman, T. Michael

    1994-01-01

    This thesis proposes that the U.S. Navy deter and, if necessary, combat potential minelayers by pursuing a pro-active' offensive mine warfare strategy. Central to this proposed strategy is the development, acquisition, and use of Remote Controlled (RECO) mines. It is argued that, given the historical problems the United States has had in the area of naval mine warfare, a strategy aimed at the aggressive deterrence of enemy mine laying be embraced so as to project forces ashore in future amphi...

  5. Integrated Assessment Systems for Chemical Warfare Material

    Energy Technology Data Exchange (ETDEWEB)

    A. M. Snyder; D. A. Verrill; G. L. Thinnes; K. D. Watts; R. J. McMorland

    1999-05-27

    The US Army must respond to a variety of situations involving suspect discovered, recovered, stored, and buried chemical warfare materiel (CWM). In some cases, the identity of the fill materiel and the status of the fusing and firing train cannot be visually determined due to aging of the container, or because the item is contained in an over-pack. In these cases, non-intrusive assessments are required to provide information to allow safe handling, storage, and disposal of the materiel. This paper will provide an overview of the integrated mobile and facility-based CWM assessment system prototypes that have been, and are being developed, at the Idaho National Engineering and Environmental Laboratory (INEEL) for the US Army Non-Stockpile Chemical Materiel Project. In addition, this paper will discuss advanced sensors being developed to enhance the capability of the existing and future assessment systems. The Phase I Mobile Munitions Assessment System (MMAS) is currently being used by the Army's Technical Escort Unit (TEU) at Dugway Proving Ground, Utah. This system includes equipment for non-intrusively identifying the munitions fill materiel and for assessing the condition and stability of the fuzes, firing trains, and other potential safety hazards. The system provides a self-contained, integrated command post including an on-board computer system, communications equipment, video and photographic equipment, weather monitoring equipment, and miscellaneous safety-related equipment. The Phase II MMAS is currently being tested and qualified for use by the INEEL and the US Army. The Phase II system contains several new assessment systems that significantly enhance the ability to assess CWM. A facility-based munitions assessment system prototype is being developed for the assessment of CWM stored in igloos at Pine Bluff Arsenal, Arkansas. This system is currently in the design and fabrication stages. Numerous CWM advanced sensors are being developed and tested, and

  6. Environmental assessments of sea dumped chemical warfare agents

    DEFF Research Database (Denmark)

    Sanderson, Hans; Fauser, Patrik

    This is a report on the information gathered during work related to sea dumped chemical warfare agents. It mainly reviews the work conducted in relation to the installation of the two Nord Stream gas pipeline from 2008-2012. The focus was on the weight-of-evidence risk assessment of disturbed CWA...

  7. Public Discussion of Nuclear Warfare: A Time for Hope.

    Science.gov (United States)

    Cooper, Martha

    Anti-nuclear discourse, which peaked in 1981-82, signaled an emergence of public discourse on the nuclear warfare issue. During the development of the original atomic bomb, public discussion of the issue was severely restricted, but immediately after the bombing of Hiroshima and Nagasaki, discourse on the subject increased. During the Cold War…

  8. Anti-submarine warfare with continuously active sonar

    NARCIS (Netherlands)

    Vossen, R. van; Beerens, S.P.; Spek, E. van der

    2011-01-01

    Existing surveillance sonar systems for anti-submarine warfare (ASW) use a pulsed sonar deployed at a low duty cycle. Continuously active sonar (CAS) is of special interest since the technique could provide better detection performance than conventional pulsed sonar, and it will provide the operator

  9. Trends in underwater warfare : From an underwater acoustics perspective

    NARCIS (Netherlands)

    Ort, C.M.; Driessen, F.P.G.

    2002-01-01

    Technological developments concerning underwater systems for Anti Submarine Warfare (ASW) and Mine Counter Measures (MCM) are directed at optimally countering the underwater threat in the near future. Countering the existing underwater threat is already extremely difficult, but there are several tre

  10. Simulating cyber warfare and cyber defenses: information value considerations

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber

  11. WILDLIFE HABITAT INVENTORY

    OpenAIRE

    GÜNDOĞDU, Ebubekir

    2009-01-01

    This study focused on what does habitat mean in wildlife, which factors it contains, how to make inventory for these factors and how to analyses habitat according to chosen species. In spite of habitat inventory has various meanings for varying areas and species by examining literature on this issue the most preferred habitat inventory standards are presented in this article. Keywords: Habitat, Inventory, Mapping

  12. Cutaneous reactions in nuclear, biological and chemical warfare

    Directory of Open Access Journals (Sweden)

    Arora Sandeep

    2005-03-01

    Full Text Available Nuclear, biological and chemical warfare have in recent times been responsible for an increasing number of otherwise rare dermatoses. Many nations are now maintaining overt and clandestine stockpiles of such arsenal. With increasing terrorist threats, these agents of mass destruction pose a risk to the civilian population. Nuclear and chemical attacks manifest immediately while biological attacks manifest later. Chemical and biological attacks pose a significant risk to the attending medical personnel. The large scale of anticipated casualties in the event of such an occurrence would need the expertise of all physicians, including dermatologists, both military and civilian. Dermatologists are uniquely qualified in this respect. This article aims at presenting a review of the cutaneous manifestations in nuclear, chemical and biological warfare and their management.

  13. Stuxnet and Cyber-Warfare (1/2)

    CERN Document Server

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic. Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction.   NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  14. Stuxnet and Cyber-Warfare (2/2)

    CERN Document Server

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic.   Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction. The lecturer invites comments via email to Gian.Piero.Siroli@cern.ch NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  15. Annihilation Prediction for Lanchester-Type Models of Modern Warfare

    OpenAIRE

    Brown, G G; Taylor, J.

    1983-01-01

    Operations Research, 31, p.752. This paper introduces important new functions for analytic solution of Launch-ester-type equations of modern warfare for combat between two homogeneous forces modeled by power attrtition-rate coefficients with "no offset". Tabulations of these Lanchester-Clifford-Schlatii (or LCS) functions allow one to study this particular variable-coefficient model almost as easily and thoroughly as Lanchester's classic constant-coefficient one. LCS functions allow one ...

  16. Punishment sustains large-scale cooperation in prestate warfare

    OpenAIRE

    Mathew, Sarah; Boyd, Robert

    2011-01-01

    Understanding cooperation and punishment in small-scale societies is crucial for explaining the origins of human cooperation. We studied warfare among the Turkana, a politically uncentralized, egalitarian, nomadic pastoral society in East Africa. Based on a representative sample of 88 recent raids, we show that the Turkana sustain costly cooperation in combat at a remarkably large scale, at least in part, through punishment of free-riders. Raiding parties comprised several hundred warriors an...

  17. Factors affecting the retention decisions of female surface warfare officers

    OpenAIRE

    Clifton, Elizabeth A.

    2003-01-01

    This thesis delineates factors affecting the retention decisions of female Surface Warfare Officers. The data were obtained from in-depth interviews conducted with 12 female senior officers and 15 female junior officers. The transcripts from the interviews revealed 19 general themes. Based on the research, the data regarding the decisions that female officers make to either stay in the Navy or leave leads to four broad categories: economic factors, Navy taste factors., leadership factor...

  18. Biological warfare agents as threats to potable water.

    OpenAIRE

    Burrows, W D; Renner, S E

    1999-01-01

    Nearly all known biological warfare agents are intended for aerosol application. Although less effective as potable water threats, many are potentially capable of inflicting heavy casualties when ingested. Significant loss of mission capability can be anticipated even when complete recovery is possible. Properly maintained field army water purification equipment can counter this threat, but personnel responsible for the operation and maintenance of the equipment may be most at risk of exposur...

  19. Modified clay minerals efficiency against chemical and biological warfare agents for civil human protection.

    Science.gov (United States)

    Plachá, Daniela; Rosenbergová, Kateřina; Slabotínský, Jiří; Kutláková, Kateřina Mamulová; Studentová, Soňa; Martynková, Gražyna Simha

    2014-04-30

    Sorption efficiencies of modified montmorillonite and vermiculite of their mono ionic Na and organic HDTMA and HDP forms were studied against chemical and biological warfare agents such as yperite and selected bacterial strains. Yperite interactions with modified clay minerals were observed through its capture in low-density polyethylene foil-modified clay composites by measuring yperite gas permeation with using chemical indication and gas chromatography methods. The antibacterial activities of synthetized organoclays were tested against selected Gram-positive and Gram-negative bacterial species in minimum inhibitory concentration tests. The obtained results showed a positive influence of modified clay minerals on the significant yperite breakthrough-time increase. The most effective material was the polyethylene-Na form montmorillonite, while the polyethylene-Na form vermiculite showed the lowest efficiency. With increasing organic cations loading in the interlayer space the montmorillonite efficiency decreased, and in the case of vermiculite an opposite effect was observed. Generally the modified montmorillonites were more effective than modified vermiculites. The HDP cations seem to be more effective compare to the HDTMA. The antibacterial activity tests confirmed efficiency of all organically modified clay minerals against Gram-positive bacteria. The confirmation of antibacterial activity against Y. pestis, plague bacteria, is the most interesting result of this part of the study.

  20. Simulation innovation in Naval Special Warfare by utilizing small working groups

    OpenAIRE

    Rainville, Thomas A.

    2001-01-01

    Naval Special Warfare has produced successful innovation by using small working groups. Naval Special Warfare deems an innovation successful if it results in a more efficient, less risky, more cost effective method to conduct special operations. The Quantum Leap program is an example of successful innovation in Naval Special Warfare produced by a small working group. How have these small groups been able to produce successful innovations? Michael McCaskey's Theory offers an explanation of how...

  1. Chemical and biological warfare: General studies. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-10-01

    The bibliography contains citations concerning federally sponsored and conducted studies into chemical and biological warfare operations and planning. These studies cover areas not addressed in other parts of this series. The topics include production and storage of agents, delivery techniques, training, military and civil defense, general planning studies, psychological reactions to chemical warfare, evaluations of materials exposed to chemical agents, and studies on banning or limiting chemical warfare. Other published searches in this series on chemical warfare cover detection and warning, defoliants, protection, and biological studies, including chemistry and toxicology. (Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  2. Chemical and biological warfare: General studies. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-11-01

    The bibliography contains citations concerning federally sponsored and conducted studies into chemical and biological warfare operations and planning. These studies cover areas not addressed in other parts of this series. The topics include production and storage of agents, delivery techniques, training, military and civil defense, general planning studies, psychological reactions to chemical warfare, evaluations of materials exposed to chemical agents, and studies on banning or limiting chemical warfare. Other published searches in this series on chemical warfare cover detection and warning, defoliants, protection, and biological studies, including chemistry and toxicology.(Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  3. HHS Enterprise Data Inventory

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Enterprise Data Inventory (EDI) is the comprehensive inventory listing of agency data resources including public, restricted public, and non-public datasets.

  4. Housing Inventory Count

    Data.gov (United States)

    Department of Housing and Urban Development — This report displays the data communities reported to HUD about the nature of their dedicated homeless inventory, referred to as their Housing Inventory Count...

  5. World Glacier Inventory

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The World Glacier Inventory (WGI) contains information for over 130,000 glaciers. Inventory parameters include geographic location, area, length, orientation,...

  6. National Wetlands Inventory Polygons

    Data.gov (United States)

    Minnesota Department of Natural Resources — Wetland area features mapped as part of the National Wetlands Inventory (NWI). The National Wetlands Inventory is a national program sponsored by the US Fish and...

  7. From National Forest Inventory to National Forest GHG Inventories

    OpenAIRE

    de Jong, Ben; PANDEY Devendra; Achard, Frederic

    2010-01-01

    Chapter 3.3 presents two national case studies for forest inventories in tropical countries: the Indian and Mexican national forest inventories. These national forest inventories have been use to report GHG inventories to the UNFCC

  8. Commodities Inventory Effect

    OpenAIRE

    Carpantier, Jean-Francois; DUFAYS, Arnaud

    2013-01-01

    Does commodity price volatility increase when inventories are low? We are the first ones to document this relationship. To that aim, we estimate asym- metric volatility models for a large set of commodities over 1994-2011. Since inventories are hard to measure, especially for high frequency data, we use positive return shocks as a new original proxy for inventories and find that asymmetric GARCH models reveal a significant inventory effect for many commodities. The results look robust. They h...

  9. Electronic Warfare Simulation-based on Service Oriented Architecture

    Directory of Open Access Journals (Sweden)

    J. Nanda Kishore

    2012-07-01

    Full Text Available The realisation of service oriented architecture (SOA is embodied in the accomplishments of various simulation applicable functions in the form of service encapsulation and the interconnection and interoperation of services. In this paper, an electronic warfare (EW simulation is structured to SOA and achieved the effect of dynamic sharing and reusability. As a proof of concept, a radar electronic support (ES simulator, which intercepts and classifies radar signals is designed and explained in this paper.Defence Science Journal, 2012, 62(4, pp.219-222, DOI:http://dx.doi.org/10.14429/dsj.62.929

  10. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  11. THE EVOLUTION OF MODERN LAND WARFARE; THEORY AND PRACTICE

    Directory of Open Access Journals (Sweden)

    C.J. Jacobs

    2012-02-01

    Full Text Available Christopher Bellamy is 'n senior navorser verbonde aan die Sentrum vir Verdedigingstudies, Universiteit van Edinburgh. Sy akademiese opleiding sluit 'n MA-graad in Oorlogstudies aan die King's College in Londen in. Afgesien hiervan was hy ook 'n beroepsoldaat wat sy militêre skoling in die Koninklike Militêre Akademie te Sandhurst deurloop het. Hy het ook in die Britse Artillerie gedien. Bellamy is die skrywer van Red God of War: Soviet Artillery and Rocket Forces en The Future of Land Warfare.

  12. SCIENTIFIC AND PRACTICAL ASPECTS OF WATER BASIN CLEANING FROM CHEMICAL WARFARE AGENTS

    OpenAIRE

    T. M. Tiavlovskaya; V. F. Tamelo

    2011-01-01

    The paper contains an analysis of reasons that explain pollution of World Ocean waters by chemical warfare agents and ecological dangers which can arise due to their emission. Possible methods for liquidation of chemical warfare agents and water basin cleaning from them have been considered in the paper.

  13. Status of dental health in chemical warfare victims: The case of Isfahan, Iran

    Directory of Open Access Journals (Sweden)

    Ahmad Mottaghi

    2012-01-01

    Conclusion: Chemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  14. Inventory - Dollars and sense

    International Nuclear Information System (INIS)

    Nuclear utilities are becoming more aware of the importance of having an inventory investment that supports two opposing philosophies. The business philosophy wants a minimal inventory investment to support a better return on invested dollars. This increase in return comes from having the dollars available to invest versus having the money tied up in inventory sitting on the shelf. The opposing viewpoint is taken by maintenance/operations organizations, which desire the maximum inventory available on-site to repair any component at any time to keep the units on-line at all times. Financial managers also want to maintain cash flow throughout operations so that plants run without interruptions. Inventory management is therefore a mixture of financial logistics with an operation perspective in mind. A small amount of common sense and accurate perception also help. The challenge to the materials/inventory manager is to optimize effectiveness of the inventory by having high material availability at the lowest possible cost

  15. Evanescent planar waveguide detection of biological warfare simulants

    Science.gov (United States)

    Sipe, David M.; Schoonmaker, Kenneth P.; Herron, James N.; Mostert, Michael J.

    2000-04-01

    An evanescent planar waveguide Mark 1.5 instrument was used to detect simulants of biological warfare agents; ovalbumin (OV), MS2 bacteriophage, BG, and Erwinia herbicola (EH). Polyclonal tracer antibodies were labeled with the fluorescent dye, Cy5. Discrete bands of polyclonal capture antibodies were immobilized to a polystyrene planar waveguide with molded integral lenses. An ST-6 CCD camera was used for detection. OV. MS2 and BG were detected in a simultaneous 3 by 3 array; with a total of nine measurements within 6 minutes. EH was analyzed in a separate array. Results were evaluate dat the US Army Joint Field Trials V, at the Dugway Proving Grounds. Over a 10 day period, 32 unknown samples were analyzed daily for each simulant. Detection limits: OV 10 ng/ml, MS2 107 pfu/ml, BG 105 cfu/ml. EH was detectable at 5 X 105 cfu/ml. Overall false positives were 3.0 percent. Therefore, the Mark 1.5 instrument, with a parallel array of detectors, evanescent flourescent excitation, and CCD imaging provides for rapid, sensitive, and specific detection of biological warfare agent simulants.

  16. China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence

    Directory of Open Access Journals (Sweden)

    Magnus Hjortdal

    2011-01-01

    Full Text Available This article presents three reasons for states to use cyber warfare and shows that cyberspace is—and will continue to be—a decisive element in China's strategy to ascend in the international system. The three reasons are: deterrence through infiltration of critical infrastructure; military technological espionage to gain military knowledge; and industrial espionage to gain economic advantage. China has a greater interest in using cyberspace offensively than other actors, such as the United States, since it has more to gain from spying on and deterring the United States than the other way around. The article also documents China's progress in cyber warfare and shows how it works as an extension of its traditional strategic thinking and the current debate within the country. Several examples of cyber attacks traceable to China are also presented. This includes cyber intrusions on a nuclear arms laboratory, attacks on defense ministries (including the Joint Strike Fighter and an airbase and the U.S. electric grid, as well as the current Google affair, which has proved to be a small part of a broader attack that also targeted the U.S. Government. There are, however, certain constraints that qualify the image of China as an aggressive actor in cyberspace. Some believe that China itself is the victim of just as many attacks from other states. Furthermore, certain actors in the United States and the West have an interest in overestimating China's capabilities in cyberspace in order to maintain their budgets.

  17. Punishment sustains large-scale cooperation in prestate warfare.

    Science.gov (United States)

    Mathew, Sarah; Boyd, Robert

    2011-07-12

    Understanding cooperation and punishment in small-scale societies is crucial for explaining the origins of human cooperation. We studied warfare among the Turkana, a politically uncentralized, egalitarian, nomadic pastoral society in East Africa. Based on a representative sample of 88 recent raids, we show that the Turkana sustain costly cooperation in combat at a remarkably large scale, at least in part, through punishment of free-riders. Raiding parties comprised several hundred warriors and participants are not kin or day-to-day interactants. Warriors incur substantial risk of death and produce collective benefits. Cowardice and desertions occur, and are punished by community-imposed sanctions, including collective corporal punishment and fines. Furthermore, Turkana norms governing warfare benefit the ethnolinguistic group, a population of a half-million people, at the expense of smaller social groupings. These results challenge current views that punishment is unimportant in small-scale societies and that human cooperation evolved in small groups of kin and familiar individuals. Instead, these results suggest that cooperation at the larger scale of ethnolinguistic units enforced by third-party sanctions could have a deep evolutionary history in the human species. PMID:21670285

  18. Components of Manufacturing Inventories

    OpenAIRE

    Auerbach, Alan J.; Jerry R. Green

    1980-01-01

    This paper presents a structural model of production and inventory accumulation based on the hypothesis of cost minimization. It differs from previous attempts in several respects. First, it integrates the analysis of input inventories with output inventories, treating the two stocks separately. Second, it distinguishes between temporary and permanent fluctuations in sales as they are anticipated by the industry. Third, it allows for a more general structure of adjustment costs, and in partic...

  19. 21st Inventory

    OpenAIRE

    Garner, Elliot; Dean, Brandon; Mason, Brannon

    2015-01-01

    Currently, Network Infrastructure & Services (NI&S) takes inventory of equipment assigned to employees (computers, laptops, tablets, tools) and sends reports of higher value items to the Controller’s Office. All items have a VT tag number and a CNS number, which can currently only be matched up via an Oracle Forms interface. An inventory clerk must personally verify the existence and location of each piece of equipment. An improvement would be an app that scans an inventory number or bar code...

  20. Modelling manufacturing inventories

    OpenAIRE

    John D. Tsoukalas

    2005-01-01

    This paper presents and applies a stage-of-fabrication inventory model to the UK manufacturing sector. The model emphasises the interaction between input (raw materials and work-in-process) and output (finished goods) inventories. This interaction is an important empirical regularity and proves critical for the ability of the model to fit the data. Decisions about input and output inventory investment cannot be considered in isolation from each other, but must be analysed jointly. Overall, th...

  1. National Wetlands Inventory Lines

    Data.gov (United States)

    Minnesota Department of Natural Resources — Linear wetland features (including selected streams, ditches, and narrow wetland bodies) mapped as part of the National Wetlands Inventory (NWI). The National...

  2. Respiratory Protection Against Chemical and Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    G.K. Prasad

    2008-09-01

    Full Text Available Chemical and biological warfare (CBW agents pose unavoidable threat, both to soldiers and civilians.Exposure to such deadly agents amidst the CBW agents contaminated environment can be avoided bytaking proper protective measures. Respiratory protection is indispensable when the soldiers or civiliansare surrounded by such deadly environment as contamination-free air is needed for respiration purposes.In this context, an attempt has been made to review the literature for the past five decades on developmentof various protective devices for respiratory protection against aerosols, gases, and vapours of CBWagents. This review covers structural, textural, and adsorption properties of materials used in gas filtersand mechanical filters for the removal of CBW agents.Defence Science Journal, 2008, 58(5, pp.686-697, DOI:http://dx.doi.org/10.14429/dsj.58.1692

  3. LIDAR for Detection of Chemical and Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    S Veerabuthiran

    2011-04-01

    Full Text Available Remote detection of chemical and biological warfare agents and toxic gases in the atmosphere is of current interest to both the military and civilian agencies. Out of all currently available techniques, no single technique provides efficient detection against such threats at significant standoff distances. Light detection and ranging (LIDAR technologies, based on the transmission of laser pulses and analysis of the return signals, have demonstrated impressive capabilities in remote detection of such toxic chemicals. LIDAR is a highly sensitive tool to detect the extremely low concentrations of various toxic agents present in the form of thin clouds at distances of few kilometer. The detection of these toxic clouds is based on the approach of first detecting and measuring the range of the clouds using the scattering phenomena and subsequently identifying the composition of toxic clouds using absorption and fluorescence phenomena. Laser Science and Technology Centre (LASTEC, Delhi has been working on the design and development of LIDAR systems for detection of chemical and biological warfare (CBW agents. In this paper, theoretical analysis of differential absorption LIDAR (DIAL for detection of chemical agents and fluorescence LIDAR for detection of biological agents has been discussed. For some typical parametric conditions, the received power levels from different ranges to detect specific concentrations of chemical or biological clouds have been computed and discussed. The technical details of the indigenously developed backscattering LIDAR, which detects and measures the distance of cloud layers up to 5 km is also presented.Defence Science Journal, 2011, 61(3, pp.241-250, DOI:http://dx.doi.org/10.14429/dsj.61.556

  4. Looming Threat of Chemical and Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    A.K. Goel

    2016-09-01

    Full Text Available In the recent past, a dramatic shift has been observed in the strategies of warfare from conventional to non-conventional. Now-a-days, traditional power is of less importance than it used to be earlier. Weapons of mass destruction, which comprise of nuclear weapons, and chemical and biological warfare agents, are posing a great peril to the world due to their devastating potential. Though, there are several bilateral as well as multilateral treaties to control the use and proliferation of these weapons, yet the risk of use of such agents by non-state actors cannot be overlooked. Chances of use of chemical and biological agents are more likely than the nuclear weapons. A comparison of nuclear, chemical and biological weapons in terms of technology, cost, signature, effectiveness on protected and un-protected troops shows that chemical and biological weapon programmes require much lower level of technology and cost than the nuclear weapon programme. Further, there is no or least distinctive and readily observable signature in biological weapon programme in comparison to nuclear and chemical weapon facilities. There can be two possibilities of use of these agents in terrorist attacks. First, there is a risk of transfer of material or know-how of these weapons to terrorists for using against the adversaries and second, the risk of these agents being pilfered due to poor security, thereby sabotaging the national security. The International Committee of Red Cross in February 1918 reckoned these agents as ‘barbarous inventions’ that can ‘only be called criminal’.

  5. Editorial: Discovery from Lake Turkana and History of Human Warfare

    Directory of Open Access Journals (Sweden)

    Professor S. P. Singh, Ph.D.

    2016-02-01

    Full Text Available Very interesting finds have come to light of violently killed humans from Lake Turkana in the Kenyan Rift Valley around 10000 years ago. A stunning discovery of skeletons of 27 persons who are believed to have been killed at the same time and are supposed to have suffered violent wounds has been reported recently (Nature 529, 394–398, 21 January 2016. These finds belong to a period of late Pleistocene/early Holocene of the hunter-gatherer societies from Nataruk. Among the victims were men, women and children. The individuals were killed with projectiles and blunt weapons. These skeletons were found in the lagoon and were preserved very nicely. Such type of mass killing probably could never happen as a consequence of intra-group conflict. The evidence seems to be towards warfare and aggression in ancient societies. The experts ruled out the possibility of a cemetery and ceremonial burial. This discovery of 27 skeletons points to the fact that there may have been more causalities and many individuals might have escaped death at that time. According to one of the co-authors of this research Dr. R.A. Foley, the groups were elatively more densely packed populations than the hunter gatherers and had more chances of having inter-group conflicts because of sharing the resources which would have been plentiful near the lagoons and water bodies. Violence probably has been in the instinct of early humans and that the warfare among humans has a history of 10000 years or even earlier.

  6. Using cheminformatics to find simulants for chemical warfare agents

    International Nuclear Information System (INIS)

    Highlights: → Summary of chemical warfare agent (CWA) simulants in current use. → Application of method of molecular similarity to CWA and simulants. → Quantitative metric for CWA-simulant similarity. → Rank ordering of simulants in current use. → Potential of method to identify simulants for emerging agents. - Abstract: Direct experimentation with chemical warfare agents (CWA) to study important problems such as their permeation across protective barrier materials, decontamination of equipment and facilities, or the environmental transport and fate of CWAs is not feasible because of the obvious toxicity of the CWAs and associated restrictions on their laboratory use. The common practice is to use 'simulants,' namely, analogous chemicals that closely resemble the CWAs but are less toxic, with the expectation that the results attained for simulants can be correlated to how the CWAs would perform. Simulants have been traditionally chosen by experts, by means of intuition, using similarity in one or more physical properties (such as vapor pressure or aqueous solubility) or in the molecular structural features (such as functional groups) between the stimulant and the CWA. This work is designed to automate the simulant identification process backed by quantitative metrics, by means of chemical similarity search software routinely used in pharmaceutical drug discovery. The question addressed here is: By the metrics of such software, how similar are traditional simulants to CWAs? That is, what is the numerical 'distance' between each CWA and its customary simulants in the quantitative space of molecular descriptors? The answers show promise for finding close but less toxic simulants for the ever-increasing numbers of CWAs objectively and fast.

  7. Denmark's National Inventory Report

    DEFF Research Database (Denmark)

    Illerup, J. B.; Lyck, E.; Winther, M.;

    This report is Denmark's National Inventory Report reported to the Conference of the Parties under the United Nations Framework Convention on Climate Change (UNFCCC) due by 15 April 2001. The report contains information on Denmark's inventories for all years' from 1990 to 1999 for CO2, CH4, N2O, ......, NMVOC, SO2, HFCs, PFCs and SF6....

  8. Denmark's National Inventory Report

    DEFF Research Database (Denmark)

    Illerup, J. B.; Lyck, E.; Winther, M.

    This report is Denmark's National Inventory Report reported to the Conference of the Parties under the United Nations Framework Convention on Climate Change (UNFCCC) due by 15 April 2001. The report contains information on Denmark's inventories for all years' from 1990 to 1999 for CO2, CH4, N2O, CO...

  9. Force Concept Inventory.

    Science.gov (United States)

    Hestenes, David; And Others

    1992-01-01

    Reports the rationale, design, validation, and uses of the "Force Concept Inventory," an instrument to assess the students' beliefs on force. Includes results and implications of two studies that compared the inventory with the "Mechanics Baseline." Includes a copy of the instrument. (MDH)

  10. Uncertainties in emission inventories

    NARCIS (Netherlands)

    Aardenne, van J.A.

    2002-01-01

    Emission inventories provide information about the amount of a pollutant that is emitted to the atmosphere as a result of a specific anthropogenic or natural process at a given time or place. Emission inventories can be used for either policy or scientific purposes. For policy purpose

  11. The Third World War? In The Cyberspace. Cyber Warfare in the Middle East.

    Directory of Open Access Journals (Sweden)

    Martina

    2014-06-01

    Full Text Available This article aims to provide a brief and comprehensive introduction to the issue of cyber warfare and to display the recent development in this area. Geographically, it focuses on the Middle East region, since the vast majority of the most important recent cyber attacks appeared just in there or were connected to it. The first part of the article tries to define the key notion of cyber warfare, compares it to the standard warfare and presents different types of cyber weapons that are known today. The second part points out examples of the most striking recent cyber attacks and uses them as evidences to demonstrate today's importance and dissemination of cyber warfare. Finally, the article sums up pros and cons of the cyber weapons and, in view of these, predicts a significant increase in their use in any future war conflicts.

  12. Optimizing Armed Forces Capabilities for Hybrid Warfare – New Challenge for Slovak Armed Forces

    Directory of Open Access Journals (Sweden)

    Peter PINDJÁK

    2015-09-01

    Full Text Available The paper deals with the optimization of military capabilities of the Slovak Armed Forces for conducting operations in a hybrid conflict, which represents one of the possible scenarios of irregular warfare. Whereas in the regular warfare adversaries intend to eliminate the centers of gravity of each other, most often command and control structures, in irregular conflicts, the center of gravity shifts towards the will and cognitive perception of the target population. Hybrid warfare comprises a thoroughly planned combination of conventional military approaches and kinetic operations with subversive, irregular activities, including information and cyber operations. These efforts are often accompanied by intensified activities of intelligence services, special operation forces, and even mercenary and other paramilitary groups. The development of irregular warfare capabilities within the Slovak Armed Forces will require a progressive transformation process that may turn the armed forces into a modern and adaptable element of power, capable of deployment in national and international crisis management operations.

  13. Biological toxin warfare: threat, proliferation, and the effects of neutron energy on BTW agents

    OpenAIRE

    Swartz, Jeffrey R.

    1995-01-01

    The threat of biological weapons presents a special military challenge. Biological toxin warfare (BTW) agents are more potent than chemical warfare agents. Depending on the yield of the nuclear weapon, a biological weapon also can have a higher lethality than nuclear weapons. This thesis examines existing international restricions on the proliferation of BTW technology and identifies their shortcomings. These loopholes contribute to the eay availability of the technology necessary to examine ...

  14. Why mid-grade Surface Warfare officers are resigning from the Naval service.

    OpenAIRE

    Howell, James Robert

    1980-01-01

    This thesis addresses the reasons for mid-grade (0-2 to 0-4) Surface Warfare officer resignations. It makes recommendations that would possibly increase retention for the mid-grade Surface Warfare Officer Community. Statistical analyses were performed upon data from post-resignation questionnaires. A list of the ten most reported reasons for resigning was then compiled. A series of recommendations which might have a positive effect upon retention were then derived

  15. Platform-level Distributed Warfare Model-based on Multi-Agent System Framework

    Directory of Open Access Journals (Sweden)

    Xiong Li

    2012-05-01

    Full Text Available The multi-agent paradigm has become a useful tool in solving military problems. However, one of key challenges in multi-agent model for distributed warfare could be how to describe the microcosmic  tactical warfare platforms actions. In this paper, a platform-level distributed warfare model based on multi-agent system framework is designed to tackle this challenge. The basic ideas include:  Establishing multi-agent model by mapping from tactical warfare system’s members, i.e., warfare platforms, to respective agents; performing task decomposition and task allocation by using task-tree decomposition method and improved contract net protocol model technique; and implementing simulation by presenting battlefield terrain environment analysis algorithm based on grid approach. The  simulation demonstration results show that our model provides a feasible and effective approach to supporting the abstraction and representation of microcosmic tactical actions for complex warfare system.Defence Science Journal, 2012, 62(1, pp.180-186, DOI:http://dx.doi.org/10.14429/dsj.62.964

  16. Technological, military and social causes for the application of cyber warfare

    Directory of Open Access Journals (Sweden)

    Dragan D. Mladenović

    2012-01-01

    Full Text Available Cyber warfare is a specific new form of military conflicts the use of which is growing rapidly in the international community. However, its nature is specific and differs from all previously known forms of warfare. For the purpose of clear understanding of the nature of cyber warfare, this paper covers the basic groups of preconditions for its broad application and fast development from technological, military and social aspects. Understanding the true nature of cyber warfare is a necessary condition for building national capacities for its application that are military justified and harmonized with the international law. The paper explores the characteristic instances of cyber warfare, ranging from information propaganda to physical destruction, with the goal to determine guidelines for the possible development of cyber capacities at the national level. Based on the analysis of previous cyber warfare cases, a prediction of future development directions is made and the necessity to apply suitable methods and techniques for defense against them is analyzed.

  17. A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios

    Directory of Open Access Journals (Sweden)

    Kathryn Merrick

    2016-07-01

    Full Text Available Our increasing dependence on information technologies and autonomous systems has escalated international concern for information- and cyber-security in the face of politically, socially and religiously motivated cyber-attacks. Information warfare tactics that interfere with the flow of information can challenge the survival of individuals and groups. It is increasingly important that both humans and machines can make decisions that ensure the trustworthiness of information, communication and autonomous systems. Subsequently, an important research direction is concerned with modelling decision-making processes. One approach to this involves modelling decision-making scenarios as games using game theory. This paper presents a survey of information warfare literature, with the purpose of identifying games that model different types of information warfare operations. Our contribution is a systematic identification and classification of information warfare games, as a basis for modelling decision-making by humans and machines in such scenarios. We also present a taxonomy of games that map to information warfare and cyber crime problems as a precursor to future research on decision-making in such scenarios. We identify and discuss open research questions including the role of behavioural game theory in modelling human decision making and the role of machine decision-making in information warfare scenarios.

  18. Methanotrophic bacteria.

    OpenAIRE

    Hanson, R S; Hanson, T. E.

    1996-01-01

    Methane-utilizing bacteria (methanotrophs) are a diverse group of gram-negative bacteria that are related to other members of the Proteobacteria. These bacteria are classified into three groups based on the pathways used for assimilation of formaldehyde, the major source of cell carbon, and other physiological and morphological features. The type I and type X methanotrophs are found within the gamma subdivision of the Proteobacteria and employ the ribulose monophosphate pathway for formaldehy...

  19. Timber inventory using Landsat

    Science.gov (United States)

    Strahler, A. H.

    1984-01-01

    The results of recent efforts to apply Landsat MSS imagery, in concert with topological maps, to forestry timber inventories via the FOCIS program are reported. FOCIS (Forests Classification and Inventory System) was defined for inventorying the lumber volume of coniferous tree types in rugged terrain regions. Data from four bands serve as input for unsupervised clustering and iterative labeling of the elevation, slope angle, and subregions of interest. Simulated photographic maps are generated which serve as overlays for regular maps for assessing timber harvests and sales goals. Sample procedures followed in mapping the Eldorado region forests in the Sierra Nevada mountains are discussed.

  20. Shuttle Inventory Management

    Science.gov (United States)

    1983-01-01

    Inventory Management System (SIMS) consists of series of integrated support programs providing supply support for both Shuttle program and Kennedy Space Center base opeations SIMS controls all supply activities and requirements from single point. Programs written in COBOL.

  1. National Emission Inventory (NEI)

    Data.gov (United States)

    U.S. Environmental Protection Agency — This data exchange allows states to submit data to the US Environmental Protection Agency's National Emissions Inventory (NEI). NEI is a national database of air...

  2. Toxics Release Inventory (TRI)

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Toxics Release Inventory (TRI) is a dataset compiled by the U.S. Environmental Protection Agency (EPA). It contains information on the release and waste...

  3. VA Enterprise Data Inventory

    Data.gov (United States)

    Department of Veterans Affairs — The Department of Veterans Affairs Enterprise Data Inventory accounts for all of the datasets used in the agency's information systems. This entry was approved for...

  4. Logistics and Inventory System

    Data.gov (United States)

    Department of Transportation — The Logistics and Inventory System (LIS) is the agencys primary supply/support automation tool. The LIS encompasses everything from order entry by field specialists...

  5. Asset Inventory Database

    Data.gov (United States)

    US Agency for International Development — AIDM is used to track USAID assets such as furniture, computers, and equipment. Using portable bar code readers, receiving and inventory personnel can capture...

  6. The Danish CORINAIR Inventories

    DEFF Research Database (Denmark)

    Winther, M.; Illerup, J. B.; Fenhann, J.;

    CORINAIR is the most comprehensive European air emission inventory programme. It consists of a defined emission calculation methodology and software for storing and further data processing. In CORINAIR 28 different emission species are estimated in 11 main sectors which are further sub-divided, a......CORINAIR is the most comprehensive European air emission inventory programme. It consists of a defined emission calculation methodology and software for storing and further data processing. In CORINAIR 28 different emission species are estimated in 11 main sectors which are further sub...... of emissions per unit activity. This report describes the structure of the Danish CORINAIR emission inventory on a 1996 level and international conventions to which Denmark submits emission data. Furthermore the most important activities in the Danish inventory are explained. Subsequently the Danish 1996...

  7. China's Glacier Inventory Completed

    Institute of Scientific and Technical Information of China (English)

    2004-01-01

    @@ A 12-volume Chinese Glacier Inventory has recently been finished by a group of Chinese glaciologists headed by Prof. Shi Yafeng from the Cold and Arid Regions Environmental and Engineering Research Institute under CAS.

  8. Public Waters Inventory Maps

    Data.gov (United States)

    Minnesota Department of Natural Resources — This theme is a scanned and rectified version of the Minnesota DNR - Division of Waters "Public Waters Inventory" (PWI) maps. DNR Waters utilizes a small scale...

  9. National Wetlands Inventory Points

    Data.gov (United States)

    Minnesota Department of Natural Resources — Wetland point features (typically wetlands that are too small to be as area features at the data scale) mapped as part of the National Wetlands Inventory (NWI). The...

  10. Wetlands Inventory Nevada

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Nevada wetlands inventory is a unit of a nationwide survey undertaken by the Fish and Wildlife Service to locate and tabulate by habitat types the important...

  11. National Emission Inventory

    Data.gov (United States)

    U.S. Environmental Protection Agency — The National Emission Inventory contains measured, modeled, and estimated data for emissions of all known source categories in the US (stationary sources, fires,...

  12. Traffic Signs Inventory System

    Directory of Open Access Journals (Sweden)

    J. Ružbarský

    2013-06-01

    Full Text Available The paper is focused on practical application of Cambridge Correlator. The goal is to propose a traffic signs inventory system by using excellent characteristics of correlator in the rapid optical correlation. The proposal of this inventory system includes obtaining of traffic signs to create the database either collecting the GPS coordinates. It is necessary to know the traffic signs position and also to document the entire surface route for later evaluation in offline mode.

  13. Inventory Control Crucial

    Institute of Scientific and Technical Information of China (English)

    CHRIS; DEVONSHIRE-ELLIS

    2008-01-01

    Inventory control is one of the most important business processes during the operation of a trading or manufacturing company as it relates to purchases,sales and logistic activities,In order to have clear inven- tory management,a company should focus not only on logistic management but also on sales and purchase management.The general view is that the warehouse serves as the most important component of inventory manage- ment and that the accounting department is

  14. Remote sensing of evaporation ducts for Naval warfare

    Science.gov (United States)

    Geernaert, G. L.

    1989-11-01

    Areas critical to naval operations are the prediction and application of atmospheric refractivity gradients. This report describes the use of the evaporation duct over the ocean and a plan for obtaining information about the evaporation duct by space-borne sensors. There has been little research on the theory and modeling of lower atmospheric refractivity, particularly evaporation ducts over a nonhomogeneous ocean over the past five decades. Much is known about surface layer similarity theory and propagation model techniques, but little attention has been placed on the spatial variabilities in the turbulent propagation medium (such as the atmospheric surface layer) in regions of strategic Navy interest. These regions include the coastal shelf, Gulf Stream, marginal ice zone, and those places where sharp sea surface temperature fronts exist. For tomorrow's Navy, using remote sensing techniques to infer evaporative and tropospheric ducts are a requirement. Although research efforts on ducts must couple the tropospheric and surface layer components, this report summarizes the state of the art for the evaporative duct and assess the potential of new and future results on improving next generation naval warfare capabilities.

  15. Unconventional Nuclear Warfare Defense (UNWD) containment and mitigation subtask.

    Energy Technology Data Exchange (ETDEWEB)

    Wente, William Baker

    2005-06-01

    The objective of this subtask of the Unconventional Nuclear Warfare Design project was to demonstrate mitigation technologies for radiological material dispersal and to assist planners with incorporation of the technologies into a concept of operations. The High Consequence Assessment and Technology department at Sandia National Laboratories (SNL) has studied aqueous foam's ability to mitigate the effects of an explosively disseminated radiological dispersal device (RDD). These benefits include particle capture of respirable radiological particles, attenuation of blast overpressure, and reduction of plume buoyancy. To better convey the aqueous foam attributes, SNL conducted a study using the Explosive Release Atmospheric Dispersion model, comparing the effects of a mitigated and unmitigated explosive RDD release. Results from this study compared health effects and land contamination between the two scenarios in terms of distances of effect, population exposure, and remediation costs. Incorporating aqueous foam technology, SNL created a conceptual design for a stationary containment area to be located at a facility entrance with equipment that could minimize the effects from the detonation of a vehicle transported RDD. The containment design was evaluated against several criteria, including mitigation ability (both respirable and large fragment particle capture as well as blast overpressure suppression), speed of implementation, cost, simplicity, and required space. A mock-up of the conceptual idea was constructed at SNL's 9920 explosive test site to demonstrate the containment design.

  16. Studies on residue-free decontaminants for chemical warfare agents.

    Science.gov (United States)

    Wagner, George W

    2015-03-17

    Residue-free decontaminants based on hydrogen peroxide, which decomposes to water and oxygen in the environment, are examined as decontaminants for chemical warfare agents (CWA). For the apparent special case of CWA on concrete, H2O2 alone, without any additives, effectively decontaminates S-2-(diisopropylamino)ethyl O-ethyl methylphosphonothioate (VX), pinacolyl methylphosphorofluoridate (GD), and bis(2-choroethyl) sulfide (HD) in a process thought to involve H2O2 activation by surface-bound carbonates/bicarbonates (known H2O2 activators for CWA decontamination). A plethora of products are formed during the H2O2 decontamination of HD on concrete, and these are characterized by comparison to synthesized authentic compounds. As a potential residue-free decontaminant for surfaces other than concrete (or those lacking adsorbed carbonate/bicarbonate) H2O2 activation for CWA decontamination is feasible using residue-free NH3 and CO2 as demonstrated by reaction studies for VX, GD, and HD in homogeneous solution. Although H2O2/NH3/CO2 ("HPAC") decontaminants are active for CWA decontamination in solution, they require testing on actual surfaces of interest to assess their true efficacy for surface decontamination. PMID:25710477

  17. Research on performance of ethernet interface in network centric warfare

    Institute of Scientific and Technical Information of China (English)

    梁永生; 张乃通

    2004-01-01

    The concept of network centric warfare (NCW) and its character, high requirement of real-time synchronization are introduced. The distributed equal-node network architecture in NCW is presented. Based on theoretical analysis on ethernet interface performance, this paper presents that forwarding latency between ethernet interface devices is a key influence factor of real-time synchronization in NCW. Ethernet fundamental is briefly introduced. The model between a switch under test (SUT) and a smartbits card is presented and used for two interconnecting switches in NCW. On condition that ignoring the latency of connecting fiber or twisted pairs and processing latency of the smartbits test system, this paper presents that clock frequency tolerance (CFT) between a SUT and a smartbits card is a leading influence factor of forwarding latency of an ethernet switch. The formulae to calculate internal forwarding latency and forwarding latency caused by its CFT are deduced. Theoretical calculation on forwarding latency of an ethernet switch based on the given CFT and test time is implemented. Experimental study on primary forwarding latency and secondary forwarding latency is implemented and forwarding latency between the SUT and the smartbits card is measured, thus testifying the accuracy of the above theoretical analysis that the CFT is a key influence factor of forwarding latency. The measures to satisfy the needs of forwarding latency in NCW are presented.

  18. Prevalence of Asthma in Children of Chemical Warfare Victims

    Science.gov (United States)

    Mirsadraee, Majid; Mozaffari, Abolfazl; Attaran, Davood

    2011-01-01

    Objective Exposure of DNA to sulfur mustard gas may increase the inheritance of asthma in chemical warfare victims' (CWV) offspring. The objective of this study was to determine the prevalence of asthma in children of CWV and compare it to asthmatic children in the general population. Methods Four hundred and nine children from 130 CWV fathers and 440 children from 145 asthmatic parents from two cities in Iran participated in this study. The prevalence of asthma was determined by standard questionnaire released for epidemiological survey of asthma in children and compared between two groups. Findings The prevalence of asthma in the CWV group was 15%; this was not significantly different from the control group (12.5%). The children of the CWV group reported a significantly greater incidence of wheezing (1.2±3.1 attacks) per year, but the control group reported more severe attacks leading to speech difficulties (3%) and coughing (7%). Regression analysis showed that with increasing family size in the control group, the number of subjects suffering from asthmatic symptoms decreases significantly (r=0.86, P=0.001). Conclusion Chemical agents may increase the prevalence of asthma in the offspring of CWV. PMID:23056804

  19. Lessons learned from the former Soviet biological warfare program

    Science.gov (United States)

    Anderson, Debra A.

    The purpose of this doctoral project was to develop the most credible educational tool openly available to enhance the understanding and the application of biological weapons threat analysis. The theory governing the effectiveness of biological weapons was integrated from publications, lectures, and seminars primarily provided by Kenneth Alibek and William C. Patrick III, the world's foremost authorities on the topic. Both experts validated the accuracy of the theory compiled from their work and provided forewords. An exercise requiring analysis of four national intelligence estimates of the former Soviet biological warfare program was included in the form of educational case studies to enhance retention, experience, and confidence by providing a platform against which the reader can apply the newly learned theory. After studying the chapters on BW theory, the reader can compare his/her analysis of the national intelligence estimates against the analysis provided in the case studies by this researcher. This training aid will be a valuable tool for all who are concerned with the threat posed by biological weapons and are therefore seeking the most reliable source of information in order to better understand the true nature of the threat.

  20. Virtual command center for distributed collaborative undersea warfare

    Science.gov (United States)

    Barton, Robert J., III; Encarnacao, L. M.; Shane, Richard T.; Drew, Ernest; Mulhearn, Jim F.

    2000-08-01

    The Naval Undersea Warfare Center, Division Newport (NUWCDIVNPT) and its partners have developed a prototype CTI (Command Technology Initiatives) Test Bed to demonstrate the utility of a facility where warfighters, government, academia and industry can evaluate the application of collaborate decision support and advanced computer graphics technologies to submarine command and control. The CTI Test bed is currently comprised of three components: Collaborative Visualization Environment (CVE) for Submarine Command and Control, which provides a coherent 3-D display of the perceived undersea battlespace. Individual windows can display multi-dimensional data/information to support a common picture of undersea battlespace management and tactical control; Submarine Fleet Mission Programming Library (SFMPL) which provides environmental data, such as transmission loss, to CVE; Command and Control Data Server which provides contact reports, areas of uncertainty, and ownship/contact motion to CVE Facilitated by a CORBA4 (Common Object Request Broker Architecture) compliant architecture, remotely connected collaborators interact via a computer network to generate and share information. Additionally, collaborators communicate orally via network telephony. Currently, the CTI Test bed is configured to provide volumetric displays of: undersea battlespace w/ bathymetry; Detection/Counter-detection regions for a given probability of detection; Contact(s) Volume of Uncertainty The CTI Test Bed provides a CORBA compliant framework, which can be readily expanded to evaluate candidate applications of collaborative command and tactical decision support and advanced computer graphics technologies.

  1. Back to the future: aerial warfare in Libya

    Directory of Open Access Journals (Sweden)

    João Paulo Nunes Vicente

    2013-05-01

    Full Text Available A century after the first air bomb mission, a new intervention in the same geographic space has made evident the changes in Airpower. The Aerial Warfare in Libya has radically changed the civil war, complying with a UN mission to protect Libyan population, imposing a no-fly zone and an arms embargo. Therefore, Operation Unified Protector became one of the most successful campaigns in the history of NATO. We aim to assess the operational efficiency of Airpower in the conflict in Libya, focusing on the challenges of a War essentially Aerial. Despite the military results and the fact that some political objectives were met, we can identify some concerning trends that, if not shifted, may negatively influence future NATO operations. We do not aim to draw general and universal conclusions on the strategic value of Airpower based on the analysis of a specific case. Above all, we focus on identifying some lessons which have influenced OUP operational efficiency. Thus, we must analyze some factors, such as the scope of objectives, the type of opposing action and aerial strategy used by the coalition and then focus on the challenges arising from the OUP.

  2. Initial Radionuclide Inventories

    International Nuclear Information System (INIS)

    The purpose of this analysis is to provide an initial radionuclide inventory (in grams per waste package) and associated uncertainty distributions for use in the Total System Performance Assessment for the License Application (TSPA-LA) in support of the license application for the repository at Yucca Mountain, Nevada. This document is intended for use in postclosure analysis only. Bounding waste stream information and data were collected that capture probable limits. For commercially generated waste, this analysis considers alternative waste stream projections to bound the characteristics of wastes likely to be encountered using arrival scenarios that potentially impact the commercial spent nuclear fuel (CSNF) waste stream. For TSPA-LA, this radionuclide inventory analysis considers U.S. Department of Energy (DOE) high-level radioactive waste (DHLW) glass and two types of spent nuclear fuel (SNF): CSNF and DOE-owned (DSNF). These wastes are placed in two groups of waste packages: the CSNF waste package and the codisposal waste package (CDSP), which are designated to contain DHLW glass and DSNF, or DHLW glass only. The radionuclide inventory for naval SNF is provided separately in the classified ''Naval Nuclear Propulsion Program Technical Support Document'' for the License Application. As noted previously, the radionuclide inventory data presented here is intended only for TSPA-LA postclosure calculations. It is not applicable to preclosure safety calculations. Safe storage, transportation, and ultimate disposal of these wastes require safety analyses to support the design and licensing of repository equipment and facilities. These analyses will require radionuclide inventories to represent the radioactive source term that must be accommodated during handling, storage and disposition of these wastes. This analysis uses the best available information to identify the radionuclide inventory that is expected at the last year of last emplacement, currently identified as

  3. Evidence of improved inventory control

    OpenAIRE

    Dan M. Bechter; Stephen Stanley

    1992-01-01

    Inventory data applied to a standard partial stock-adjustment model demonstrate that inventory control, defined by desired marginal inventory-sales ratios and speeds of adjustment, improved in the last decade or so, particularly in the manufacturing sector. In addition, the evidence suggests that, contrary to popular wisdom, the net effect of these changes in inventory control has been to increase the volatility of inventory investment in both the manufacturing and trade sectors.

  4. The Handicap Principle, Strategic Information Warfare and the Paradox of Asymmetry

    Energy Technology Data Exchange (ETDEWEB)

    Ma, Zhanshan [University of Idaho; Sheldon, Frederick T [ORNL; Krings, Axel [ORNL

    2010-01-01

    The term asymmetric threat (or warfare) often refers to tactics utilized by countries, terrorist groups, or individuals to carry out attacks on a superior opponent while trying to avoid direct confrontation. Information warfare is sometimes also referred to as a type of asymmetric warfare perhaps due to its asymmetry in terms of cost and efficacy. Obviously, there are differences and commonalities between two types of asymmetric warfare. One major difference lies in the goal to avoid confrontation and one commonality is the asymmetry. Regardless, the unique properties surrounding asymmetric warfare warrant a strategic-level study. Despite enormous studies conducted in the last decade, a consensus on the strategy a nation state should take to deal with asymmetric threat seems still intriguing. In this article, we try to shed some light on the issue from the handicap principle in the context of information warfare. The Handicap principle was first proposed by Zahavi (1975) to explain the honesty or reliability of animal communication signals. He argued that in a signaling system such as one used in mate selection, a superior male is able to signal with a highly developed "handicap" to demonstrate its quality, and the handicap serves "as a kind of (quality) test imposed on the individual" (Zahavi 1975, Searcy and Nowicki 2005). The underlying thread that inspires us for the attempt to establish a connection between the two apparently unrelated areas is the observation that competition, communication and cooperation (3C), which are three fundamental processes in nature and against which natural selection optimize living things, may also make sense in human society. Furthermore, any communication networks, whether it is biological networks (such as animal communication networks) or computer networks (such as the Internet) must be reasonably reliable (honest in the case of animal signaling) to fulfill its missions for transmitting and receiving messages. The strategic

  5. Guerilla Warfare & Law Enforcement: Combating the 21st Century Terrorist Cell within the U.S.

    Directory of Open Access Journals (Sweden)

    Major Richard Hughbank

    2009-01-01

    Full Text Available Both domestic and international terrorist organizations employ guerrilla warfare tactics, techniques, and procedures. Thus, the ability to identify and defeat the members of these organizations, cripple their infrastructures, and disrupt their financial resources lies in the understanding of modern guerrilla warfare as it develops in the twenty-first century within the United States.3 The forms of asymmetric warfare4 adopted by domestic and international terrorist groups alike is no longer intended to gain simple media exposure or governmental manipulation; they want to make an overpowering impact by causing massive loss of life and severe damage to infrastructure and are often motivated by religious imperatives and political goals. As terrorism analyst Stephen Flynn has observed, "Throughout the 20th century [Americans] were able to treat national security as essentially an out-of-body experience. When confronted by threats, [America] dealt with them on the turf of our allies or our adversaries. Aside from the occasional disaster and heinous crime, civilian life [in the United States] has been virtually terror-free." With the turn of the twenty-first century, terrorist operations have become more prevalent in the United States and are taking shape in the form of modern guerrilla warfare, thus creating new challenges for federal, state, and local law enforcement agencies. After reviewing the origin and nature of these challenges, this article will offer some suggestions for countering guerilla warfare in the United States.

  6. Anaerobic bacteria

    Science.gov (United States)

    Brook I, Goldstein EJ. Diseases caused by non-spore forming anaerobic bacteria. In: Goldman L, Schafer AI, eds. Goldman's Cecil Medicine . 25th ed. Philadelphia, PA: Elsevier Saunders; 2015:chap 297. Stedman's Online ...

  7. Vendor-managed inventory

    DEFF Research Database (Denmark)

    Govindan, Kannan

    2013-01-01

    Vendor-managed inventory (VMI) represents the methodology through which the upstream stage of a supply chain (vendor) takes responsibility for managing the inventories at the downstream stage (customer) based on previously agreed limits. VMI is another method by which supply chains can be managed......, and, owing to centralised decision-making and constant information sharing, the benefits are much higher than in traditional supply chain case. However, there exists a lack of research that identifies the dimensions of VMI, benefits of VMI, methods, and levels used in the VMI environment. The focus...... review, we have identified six dimensions of VMI: namely, inventory, transportation, manufacturing, general benefits, coordination/collaboration, and information sharing. In addition, there are, three methodological classifications: modelling, simulation, and case studies. Finally, we will consider...

  8. Shortening the Xerostomia Inventory

    Science.gov (United States)

    Thomson, William Murray; van der Putten, Gert-Jan; de Baat, Cees; Ikebe, Kazunori; Matsuda, Ken-ichi; Enoki, Kaori; Hopcraft, Matthew; Ling, Guo Y

    2011-01-01

    Objectives To determine the validity and properties of the Summated Xerostomia Inventory-Dutch Version in samples from Australia, The Netherlands, Japan and New Zealand. Study design Six cross-sectional samples of older people from The Netherlands (N = 50), Australia (N = 637 and N = 245), Japan (N = 401) and New Zealand (N = 167 and N = 86). Data were analysed using the Summated Xerostomia Inventory-Dutch Version. Results Almost all data-sets revealed a single extracted factor which explained about half of the variance, with Cronbach’s alpha values of at least 0.70. When mean scale scores were plotted against a “gold standard” xerostomia question, statistically significant gradients were observed, with the highest score seen in those who always had dry mouth, and the lowest in those who never had it. Conclusion The Summated Xerostomia Inventory-Dutch Version is valid for measuring xerostomia symptoms in clinical and epidemiological research. PMID:21684773

  9. Inventory-driven costs.

    Science.gov (United States)

    Callioni, Gianpaolo; de Montgros, Xavier; Slagmulder, Regine; Van Wassenhove, Luk N; Wright, Linda

    2005-03-01

    In the 199os, Hewlett-Packard's PC business was struggling to turn a dollar, despite the company's success in winning market share. By 1997, margins on its PCs were as thin as a silicon wafer, and some product lines hadn't turned a profit since 1993. The problem had everything to do with the PC industry's notoriously short product cycles and brutal product and component price deflation. A common rule of thumb was that the value of a fully assembled PC decreased 1% a week. In such an environment, inventory costs become critical. But not just the inventory costs companies traditionally track, HP found, after a thorough review of the problem. The standard "holding cost of inventory"--the capital and physical costs of inventory--accounted for only about 10% of HP's inventory costs. The greater risks, it turned out, resided in four other, essentially hidden costs, which stemmed from mismatches between demand and supply: Component devaluation costs for components still held in production; Price protection costs incurred when product prices drop on the goods distributors still have on their shelves; Product return costs that have to be absorbed when distributors return and receive refunds on overstock items, and; Obsolescence costs for products still unsold when new models are introduced. By developing metrics to track those costs in a consistent way throughout the PC division, HP has found it can manage its supply chains with much more sophistication. Gone are the days of across-the-board measures such as,"Everyone must cut inventories by 20% by the end of the year," which usually resulted in a flurry of cookie-cutter lean production and just-in-time initiatives. Now, each product group is free to choose the supply chain configuration that best suits its needs. Other companies can follow HP's example. PMID:15768682

  10. THE CYBER DIMENSION OF MODERN HYBRID WARFARE AND ITS RELEVANCE FOR NATO

    Directory of Open Access Journals (Sweden)

    Sorin DUCARU

    2016-06-01

    Full Text Available The technological development and the instant communication possibilities advanced not only economic and social developments, but also evolving threats from those who exploit the vulnerabilities of communication and information systems. The cyber threat landscape points to a significant increase of the frequency, intensity, duration and sophistication of cyber-attacks. One of the new and concerning trends is the use of cyber capabilities in relation with military of hybrid operations – the so-called cyber dimension of hybrid warfare. NATO’s strategy on countering hybrid warfare is based on the triad: prepare-deter-defend, which also applies to cyber. Nations represent the first line of defence in countering hybrid strategies. International cooperation is also a key factor in this sense. It is in this context that NATO’s response to cyber-attacks in the context of hybrid warfare must be further refined.

  11. The United States and biological warfare: secrets from the early cold war and Korea.

    Science.gov (United States)

    Bruwer, A

    2001-01-01

    The United States and Biological Warfare is about accusations that the United States resorted to bacteriological warfare at a time of great military stress during the Korean War. In December 1951, the then US Secretary of Defense ordered early readiness for offensive use of biological weapons. Soon afterwards, the North Korean and Chinese armies accused the United States of starting a large-scale biological warfare experiment in Korea. The US State Department denied the accusation. Both parties to the dispute maintain their positions today. The authors spent 20 years researching the accusations in North America, Europe and Japan. They were the first foreigners to be given access to Chinese classified documents. The reader is also introduced to the concept of 'plausible denial', an official US policy which allowed responsible governmental representatives to deny knowledge of certain events. The authors hope that their work will contribute to the understanding of a time when modern war expanded into a new type of violence.

  12. Treatability study report for remediation of chemical warfare agent contaminated soils using peroxysulfate ex-situ treatment. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Pugh, J.R.; Grinstead, J.H.; Farley, J.A.; Enlow, P.D.; Kelly, D.A.

    1996-07-01

    This laboratory scale study examines the feasibility of using peroxysulfate based oxidants to remediate soils contaminated with GB, Hi, and VX. The project was conducted with chemical warfare agent simulants. The study concludes that peroxysulfates, and particularly peroxydisulfate, can degrade chemical warfare agent simulants in soil and recommends continuing research.

  13. Skeletal evidence for Inca warfare from the Cuzco region of Peru.

    Science.gov (United States)

    Andrushko, Valerie A; Torres, Elva C

    2011-11-01

    This article addresses the bioarchaeological evidence for Inca warfare through an analysis of 454 adult skeletons from 11 sites in the Inca capital region of Cuzco, Peru. These 11 sites span almost 1000 years (AD 600-1532), which allows for a comparison of the evidence for warfare before the Inca came to power (Middle Horizon AD 600-1000), during the time of Inca ascendency in the Late Intermediate Period (AD 1000-1400), and after the Inca came to power and expanded throughout the Cuzco region and beyond (Inca Imperial Period, AD 1400-1532). The results indicate that 100 of 454 adults (22.0%) showed evidence of cranial trauma. Of these, 23 individuals had major cranial injuries suggestive of warfare, consisting of large, complete, and/or perimortem fractures. There was scant evidence for major injuries during the Middle Horizon (2.8%, 1/36) and Late Intermediate Period (2.5%, 5/199), suggesting that warfare was not prevalent in the Cuzco region before and during the Inca rise to power. Only in the Inca Imperial Period was there a significant rise in major injuries suggestive of warfare (7.8%, 17/219). Despite the significant increase in Inca times, the evidence for major cranial injuries was only sporadically distributed at Cuzco periphery sites and was entirely absent at Cuzco core sites. These findings suggest that while the Inca used warfare as a mechanism for expansion in the Cuzco region, it was only one part of a complex expansion strategy that included economic, political, and ideological means to gain and maintain control. PMID:21959843

  14. 毒物战的现实威胁%Threats of toxic warfare

    Institute of Scientific and Technical Information of China (English)

    刘芳; 赵建; 丁日高

    2013-01-01

    2002年,一份美国空军发起的关于毒物战争的研究报告引起了美国军方和平民灾难应急救援组织的关注。该报告通过对在战争中恶意使用有毒工业化学物质的历史事件的回顾,提出了毒物战( toxic warfare )的概念,并讨论了它对美国军事和国土安全的影响。该文综述了毒物战的历史及其对美国军事和国土安全的影响,分析了我国面临的毒物战威胁,并就应对毒物战威胁提出了若干启示。%In 2002, a research report about toxic warfare launched by the United States Air Force attracted the attentionof the U.S.military and civilian disaster emergency rescue organizations .By reviewing historical events related to the malicioususe of toxic industrial chemicals in the war , this report proposed the concept of "Toxic Warfare ", and discussed itsimpact on the United States military and homeland security .In this paper, the concept and history of toxic warfare and itsinfluence on American military and homeland security are reviewed , the threats of toxic warfare facing China and counter -measures against toxic warfare are analyzed.

  15. Application of Antibiotic on Sea Warfare Wound in Marine Environment%抗生素在海上环境下海战伤中的应用

    Institute of Scientific and Technical Information of China (English)

    张贞良; 贺顺龙; 谢培增; 汪先兵

    2011-01-01

    Objective To study an appropriate anti-inflammation treatment strategy on sea warfare wound in ma-rine environment Methods Animal model of combined sea warfare wound in marine environment was established in 40 mongrel dogs. The dogs were randomly divided into control group and treatment group. The control group accepted rou-tine cefodizime treatment, and the treatment group accepted cefodizime plus levofloxacin treatment The treatment on sea warfare wound was the same in both groups. The gross condition was observed and bacteriological strains in the wound were cultured and antibiotic sensitivity was tested at 2 and 4 days after the wound. Wound infection rate and mortality were observed at the sixth day. Results The infection rate within six days was 50% in the control group, and 10% in treatment group, and the mortality was 60% and 20% respectively. These rates were significantly lower in the treatment group than those in the control group (P<0. 01). The constituent ratio of vibrion in the treatment group was lower than that in the control group (P<0. 01). Conclusion There are many species of bacteria with wide distribution in South China Sea which mainly includes vibrionaceaes, staphylococcus and escherichia. These bacteria are the main causes leading to sea warfare wound infection. To deal with the sea warfare wound in marine environment, the early and complete debride-ment, and the early application of broadspectrum and anti-vibrion antibiotics should be emphasized.%目的 探讨抗生素在海上环境下海战伤中的有效应用.方法 选取40只成年杂种犬,制作海上环境下海水浸泡复合火器伤动物模型.随机将动物分成对照组和治疗组,每组20只犬.对照组采用头孢地嗪治疗,治疗组头孢地嗪加左氧氟沙星治疗.海战伤的其他处理方法相同.在伤后第2和第4天进行细菌培养与药敏试验,观察6天伤口感染率、死亡率.结果 伤后6天,对照组的伤口感染率为500,治疗组为10

  16. NONDESTRUCTIVE IDENTIFICATION OF CHEMICAL WARFARE AGENTS AND EXPLOSIVES BY NEUTRON GENERATOR-DRIVEN PGNAA

    Energy Technology Data Exchange (ETDEWEB)

    T. R. Twomey; A. J. Caffrey; D. L. Chichester

    2007-02-01

    Prompt gamma-ray neutron activation analysis (PGNAA) is now a proven method for the identification of chemical warfare agents and explosives in military projectiles and storage containers. Idaho National Laboratory is developing a next-generation PGNAA instrument based on the new Ortec Detective mechanically-cooled HPGe detector and a neutron generator. In this paper we review PGNAA analysis of suspect chemical warfare munitions, and we discuss the advantages and disadvantages of replacing the californium-252 radioisotopic neutron source with a compact accelerator neutron generator.

  17. Particle Swarm Social Adaptive Model for Multi-Agent Based Insurgency Warfare Simulation

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Xiaohui [ORNL; Potok, Thomas E [ORNL

    2009-12-01

    To better understand insurgent activities and asymmetric warfare, a social adaptive model for modeling multiple insurgent groups attacking multiple military and civilian targets is proposed and investigated. This report presents a pilot study using the particle swarm modeling, a widely used non-linear optimal tool to model the emergence of insurgency campaign. The objective of this research is to apply the particle swarm metaphor as a model of insurgent social adaptation for the dynamically changing environment and to provide insight and understanding of insurgency warfare. Our results show that unified leadership, strategic planning, and effective communication between insurgent groups are not the necessary requirements for insurgents to efficiently attain their objective.

  18. NONDESTRUCTIVE IDENTIFICATION OF CHEMICAL WARFARE AGENTS AND EXPLOSIVES BY NEUTRON GENERATOR-DRIVEN PGNAA

    International Nuclear Information System (INIS)

    Prompt gamma-ray neutron activation analysis (PGNAA) is now a proven method for the identification of chemical warfare agents and explosives in military projectiles and storage containers. Idaho National Laboratory is developing a next-generation PGNAA instrument based on the new Ortec Detective mechanically-cooled HPGe detector and a neutron generator. In this paper we review PGNAA analysis of suspect chemical warfare munitions, and we discuss the advantages and disadvantages of replacing the californium-252 radioisotopic neutron source with a compact accelerator neutron generator

  19. Materials inventory management manual

    Science.gov (United States)

    1992-01-01

    This NASA Materials Inventory Management Manual (NHB 4100.1) is issued pursuant to Section 203(c)(1) of the National Aeronautics and Space Act of 1958 (42 USC 2473). It sets forth policy, performance standards, and procedures governing the acquisition, management and use of materials. This Manual is effective upon receipt.

  20. Calculating Optimal Inventory Size

    Directory of Open Access Journals (Sweden)

    Ruby Perez

    2010-01-01

    Full Text Available The purpose of the project is to find the optimal value for the Economic Order Quantity Model and then use a lean manufacturing Kanban equation to find a numeric value that will minimize the total cost and the inventory size.

  1. Marine Education Knowledge Inventory.

    Science.gov (United States)

    Hounshell, Paul B.; Hampton, Carolyn

    This 35-item, multiple-choice Marine Education Knowledge Inventory was developed for use in upper elementary/middle schools to measure a student's knowledge of marine science. Content of test items is drawn from oceanography, ecology, earth science, navigation, and the biological sciences (focusing on marine animals). Steps in the construction of…

  2. Inventory order crossovers

    NARCIS (Netherlands)

    Riezebos, J.

    2006-01-01

    The control policies that are used in inventory management systems assume that orders arrive in the same sequence as they were ordered. Due to changes in supply chains and markets, this assumption is no longer valid. This paper aims at providing an improved understanding of the phenomenon of order c

  3. Natural vegetation inventory

    Science.gov (United States)

    Schrumpf, B. J.

    1973-01-01

    Unique characteristics of ERTS imagery can be used to inventory natural vegetation. While satellite images can seldom be interpreted and identified directly in terms of vegetation types, such types can be inferred by interpretation of physical terrain features and through an understanding of the ecology of the vegetation.

  4. The Employability Inventory: An Overview.

    Science.gov (United States)

    Wilson, Michael J.; And Others

    1987-01-01

    Summarizes the background, development, content, and validation of the Employability Inventory, an instrument designed to assess knowledge of job seeking, job retention, and job success. Discusses usefulness of the inventory in both counseling and education. (ABL)

  5. Modern Approaches to Inventory Management

    OpenAIRE

    Drago Pupavac

    2011-01-01

    One of the most important tasks of logistics management is efficient inventory management. The basic mission of inventory management is to find balance between item in stocks and customer service. Traditional model in inventory management, also known as the economic order quantity (EOQ) is increasingly being replaced or supplemented by contemporary models of inventory management: Just in Time, Materials Requirement Planning and Distribution Requirement Planning. The research topic of importan...

  6. Big bacteria

    DEFF Research Database (Denmark)

    Schulz, HN; Jørgensen, BB

    2001-01-01

    , the 80 x 600 mum large Epulopiscium sp. from the gut of tropical fish, are presumably living in a very nutrient-rich medium. Many large bacteria contain numerous inclusions in the cells that reduce the volume of active cytoplasm. The most striking examples of competitive advantage from large cell size...

  7. THE PECULIARITIES OF SOCIAL PERCEPTION IN THE CONTEXT OF INFORMATION-PSYCHOLOGICAL WARFARE

    Directory of Open Access Journals (Sweden)

    Nane Zeynalyan

    2016-09-01

    Full Text Available In the recent decades, war fields have moved into the information sphere. Today’s person has reason to “be informed”; as having information provides a sense of security. In the modern world, great effort is invested in expanding information sources, because it serves to articulate both international policies and the context of wars. The exchange of information in domestic and international platforms influences the quality of public debate and ideology, which affects social attitudes and decision-making processes. This article presents the role of information-psychological warfare as a factor in forming public opinion. It discusses the peculiarities of organizing an information-psychological warfare during military conflicts. The goal of our research is to explore how social groups might perceive peculiarities in the information-psychological warfare. The research involves methods of survey, content analysis, and free associations. The effectiveness of psychological warfare significantly depends on how people perceive information. Consequently, in the contemporary world, it is necessary to not only protect or fight on the battlefield, but also to use information weapons. This imposes requirements on psychological scientists to explore peculiarities around the perception of information to help find mechanisms that safeguard people’s lives by way of contributing to the formation of necessary attitudes and stereotypes.

  8. On modeling of the evaporation of chemical warfare agents on the ground

    NARCIS (Netherlands)

    Westin, S.N.; Winter, S.; Karlsson, E.; Hin, A.; Oeseburg, F.

    1998-01-01

    A model for evaporation of chemical warfare agents on the ground has been developed. The process of evaporation is described in three steps: (1) the immediate drop enlargement due to impact momentum is modeled using an empirical correlation from technical literature; (2) further enlargement caused b

  9. A statistical analysis of the effect of warfare on the human secondary sex ratio

    NARCIS (Netherlands)

    Graffelman, J.; Hoekstra, R.F.

    2000-01-01

    Many factors have been hypothesized to affect the human secondary sex ratio (the annual percentage of males among all live births), among them race, parental ages, and birth order. Some authors have even proposed warfare as a factor influencing live birth sex ratios. The hypothesis that during and s

  10. Diagnosis of exposure to chemical warfare agents: An essential tool to counteract chemical terrorism

    NARCIS (Netherlands)

    Noort, D.; Schans, M.J. van der; Bikker, F.J.; Benschop, H.P.

    2009-01-01

    Methods to analyze chemical warfare agents (CW-agents) and their decomposition products in environmental samples were developed over the last decades. In contrast herewith, procedures for analysis in biological samples have only recently been developed. Retrospective detection of exposure to CW-agen

  11. From Douhet to drones, air warfare, and the evolution of targeting

    NARCIS (Netherlands)

    F.P.B. Osinga; M.P. Roorda

    2016-01-01

    Through the prism of the experience of air warfare, this chapter identifies key factors that have shaped targeting. These include technological developments, organizational structures, and processes and inter-service competition for scarce resources. Moreover, targeting is informed by perspectives o

  12. An Empirical Examination of the Warfare Metaphor with Respect to Pre-Service Elementary Teachers

    Science.gov (United States)

    Cobern, William W.; Loving, Cathleen C.; Davis, Edward B.; Terpstra, Jeff

    2013-01-01

    Since its origination in the late nineteenth century, the warfare metaphor has been used to characterize the relationship between science and religion, especially orthodox Christianity. Though thoroughly discredited by historians of science, the ideological descendants of Thomas Huxley, who spoke of science in quasi-religious terms, have kept the…

  13. (Review of) Reno, William. 2011. Warfare in Independent Africa. Cambridge: Cambridge University Press

    DEFF Research Database (Denmark)

    Hagmann, Tobias

    2013-01-01

    Warfare in Independent Africa is Reno’s bold attempt to analyze the modern history of African insurgencies. The book tackles this task through the prism of five generations of rebel, which left their mark on the continent; anti-colonial rebels, majority rule rebels, reform rebels, warlord rebels ...

  14. PROCESSING REVERSE LOGISTICS INVENTORIES

    OpenAIRE

    Bajor, Ivona; Novačko, Luka; Ogrizović, Dario

    2014-01-01

    Developed logistics systems have organized reverse logistics flows and are continuously analyzing product returns, tending to detect patterns in oscillations of returning products in certain time periods. Inventory management in reverse logistics systems depends on different criteria, regarding goods categories, formed contracts between subjects of supply chains, uncertainty in manufacturer’s quantities of DOA (dead on arrival) products, etc. The developing logistics systems, such as the Croa...

  15. Indian scales and inventories

    OpenAIRE

    Venkatesan, S

    2010-01-01

    This conceptual, perspective and review paper on Indian scales and inventories begins with clarification on the historical and contemporary meanings of psychometry before linking itself to the burgeoning field of clinimetrics in their applications to the practice of clinical psychology and psychiatry. Clinimetrics is explained as a changing paradigm in the design, administration, and interpretation of quantitative tests, techniques or procedures applied to measurement of clinical variables, t...

  16. Terahertz signatures of biological-warfare-agent simulants

    Science.gov (United States)

    Globus, Tatiana; Woolard, Dwight L.; Khromova, Tatyana; Partasarathy, Ramakrishnan; Majewski, Alexander; Abreu, Rene; Hesler, Jeffrey L.; Pan, Shing-Kuo; Ediss, Geoff

    2004-09-01

    This work presents spectroscopic characterization results for biological simulant materials measured in the terahertz gap. Signature data have been collected between 3 cm-1 and 10 cm-1 for toxin Ovalbumin, bacteria Erwinia herbicola, Bacillus Subtilis lyophilized cells and RNA MS2 phage, BioGene. Measurements were conducted on a modified Bruker FTIR spectrometer equipped with the noise source developed in the NRAL. The noise source provides two orders of magnitude higher power in comparison with a conventional mercury lamp. Photometric characterization of the instrument performance demonstrates that the expected error for sample characterization inside the interval from 3 to 9.5 cm-1 is less then 1%.

  17. Limit Distribution of Inventory Level of Perishable Inventory Model

    Directory of Open Access Journals (Sweden)

    Hailing Dong

    2011-01-01

    Full Text Available This paper studies a perishable inventory model, which assumes that each perishable item has finite lifetime, and only one item is consumed each time. The lifetimes of perishable items are independent random variables with the general distribution and so are the consumption internal. Under this assumption, by using backward equations and limit distribution of Markov skeleton processes, this paper obtains the existence conditions and the explicit expression of the limit distribution of the inventory level of perishable inventory model.

  18. Perishable Inventory Challenges

    DEFF Research Database (Denmark)

    Damgaard, Cecilie Maria; Nguyen, Vivi Thuy; Hvolby, Hans-Henrik;

    2012-01-01

    The paper investigates how inventory control of perishable items is managed and line up some possible options of improvement. This includes a review of relevant literature dealing with the challenges of determining ordering policies for perishable products and a study of how the current procedures...... in the retail supply chains. The goal is to find and evaluate the parameters which affect the decision making process, when finding the optimal order quantity and order time. The paper takes a starting point in the retail industry but links to other industries....

  19. The Future of Western Warfare: Coalitions and Capability Gaps; Strategic Insights, v. 10, Special issue (October 2011), 49-60. Topic: Global Trends and Future Warfare ; Part II: Technological and Doctrinal Innovation

    OpenAIRE

    Farrell, Theo

    2011-01-01

    This article appeared in Strategic Insights, V. 10, Special issue (October 2011), 49-60. Topic: Global Trends and Future Warfare ; Part II: Technological and Doctrinal Innovation Approved for public display, distribution unlimited This paper starts by making the case for coalition warfare focusing on a core of states within the North Atlantic Treaty Organization (NATO). Then goes on to discuss some of the capability shortfalls of European coalition partners. While technology is the most...

  20. Strategic Inventories in Vertical Contracts

    OpenAIRE

    Krishnan Anand; Ravi Anupindi; Yehuda Bassok

    2008-01-01

    Classical reasons for carrying inventory include fixed (nonlinear) production or procurement costs, lead times, nonstationary or uncertain supply/demand, and capacity constraints. The last decade has seen active research in supply chain coordination focusing on the role of incentive contracts to achieve first-best levels of inventory. An extensive literature in industrial organization that studies incentives for vertical controls largely ignores the effect of inventories. Does the ability to ...

  1. Inventory and the Stock Market

    OpenAIRE

    Lai, Richard

    2006-01-01

    How does the stock market affect inventory decisions? The efficient markets view is that low stock price means poor fundamentals, a higher cost of capital, and lower inventory. Normatively, firms should obtain their cost of capital from an efficient markets model of stock prices. My study is motivated by the growing body of evidence that the stock market is not efficient and can temporarily mis-value firms. I report evidence that the market's behavioral component explains firms' inventory as ...

  2. Energy Education Materials Inventory

    Energy Technology Data Exchange (ETDEWEB)

    1979-08-01

    The two volumes of the Energy Education Materials Inventory (EEMI) comprise an annotated bibliography of widely available energy education materials and reference sources. This systematic listing is designed to provide a source book which will facilitate access to these educational resources and hasten the inclusion of energy-focused learning experiences in kindergarten through grade twelve. EEMI Volume II expands Volume I and contains items that have become available since its completion in May, 1976. The inventory consists of three major parts. A core section entitled Media contains titles and descriptive information on educational materials, categorized according to medium. The other two major sections - Grade Level and Subject - are cross indexes of the items for which citations appear in the Media Section. These contain titles categorized according to grade level and subject and show the page numbers of the full citations. The general subject area covered includes the following: alternative energy sources (wood, fuel from organic wastes, geothermal energy, nuclear power, solar energy, tidal power, wind energy); energy conservation, consumption, and utilization; energy policy and legislation, environmental/social aspects of energy technology; and fossil fuels (coal, natural gas, petroleum). (RWR)

  3. Hanford inventory program user's manual

    International Nuclear Information System (INIS)

    Provides users with instructions and information about accessing and operating the Hanford Inventory Program (HIP) system. The Hanford Inventory Program is an integrated control system that provides a single source for the management and control of equipment, parts, and material warehoused by Westinghouse Hanford Company in various site-wide locations. The inventory is comprised of spare parts and equipment, shop stock, special tools, essential materials, and convenience storage items. The HIP replaced the following systems; ACA, ASP, PICS, FSP, WSR, STP, and RBO. In addition, HIP manages the catalog maintenance function for the General Supplies inventory stocked in the 1164 building and managed by WIMS

  4. Denmark's National Inventory Report 2014

    DEFF Research Database (Denmark)

    Nielsen, Ole-Kenneth; Plejdrup, Marlene Schmidt; Winther, Morten;

    This report is Denmark’s National Inventory Report 2014. The report contains information on Denmark’s emission inventories for all years’ from 1990 to 2012 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2......This report is Denmark’s National Inventory Report 2014. The report contains information on Denmark’s emission inventories for all years’ from 1990 to 2012 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2...

  5. The Short-Term Effect of Chest Physiotherapy on Spirometric Indices in Chemical Warfare Victims Exposed to Mustard Gas

    OpenAIRE

    Abedi, A.; HR Koohestani; Z Roosta

    2008-01-01

    ABCTRACT Introduction & Objective: Chronic respiratory diseases are the most prevalent late sequels of sulfur mustard gas injury among Iranian chemical warfare victims. Chest physiotherapy is one of the useful methods in care, cure and infection prevention of these patients. The aim of this study was to determine the short-term effect of chest physiotherapy on spirometric indices in chemical warfare victims exposed to sulfur mustard gas. Materials & Methods: In this study, 27 of the chemical ...

  6. Modeling and Optimal Control of a Class of Warfare Hybrid Dynamic Systems Based on Lanchester Attrition Model

    OpenAIRE

    Xiangyong Chen; Ancai Zhang

    2014-01-01

    For the particularity of warfare hybrid dynamic process, a class of warfare hybrid dynamic systems is established based on Lanchester equation in a (n,1) battle, where a heterogeneous force of n different troop types faces a homogeneous force. This model can be characterized by the interaction of continuous-time models (governed by Lanchester equation), and discrete event systems (described by variable tactics). Furthermore, an expository discussion is presented on an optimal variable tact...

  7. Rumen bacteria

    International Nuclear Information System (INIS)

    The rumen is the most extensively studied gut community and is characterized by its high population density, wide diversity and complexity of interactions. This complex, mixed microbial culture is comprised of prokaryote organisms including methane-producing archaebacteria, eukaryote organisms, such as ciliate and flagellate protozoa, anaerobic phycomycete fungi and bacteriophage. Bacteria are predominant (up to 1011 viable cells per g comprising 200 species) but a variety of ciliate protozoa occur widely (104-106/g distributed over 25 genera). The anaerobic fungi are also widely distributed (zoospore population densities of 102-104/g distributed over 5 genera). The occurrence of bacteriophage is well documented (107-109 particles/g). This section focuses primarily on the widely used methods for the cultivation and the enumeration of rumen microbes, especially bacteria, which grow under anaerobic conditions. Methods that can be used to measure hydrolytic enzymes (cellulases, xylanases, amylases and proteinases) are also described, along with cell harvesting and fractionation procedures. Brief reference is also made to fungi and protozoa, but detailed explanations for culturing and enumerating these microbes is presented in Chapters 2.4 and 2.5

  8. Injuries sustained to the upper extremity due to modern warfare and the evolution of care.

    Science.gov (United States)

    Hofmeister, Eric P; Mazurek, Michael; Ingari, Jack

    2007-10-01

    The formation of the American Society for Surgery of the Hand was related to world conflicts and hostilities. Therefore, it is appropriate that upper-extremity surgeons understand injuries resulting from modern-day combat. Because of ongoing warfare, many countries have experienced a large increase in the number of wounded service members and civilians, particularly wounds of the extremities. As a result of increased rate of survival in battlefield trauma in part because of the use of modern body armor, there is increasing complexity of extremity injuries that require complex reconstructions. Decreased mortality and a consequent increase in the incidence of injured extremities underline the need for the development of new treatment options. The purpose of this presentation is to describe upper-extremity injury patterns in modern warfare, the levels of care available, and the treatment at each level of care based on the experience of the United States Military Medical Support System.

  9. The Military-Entertainment Complex: A New Facet of Information Warfare

    Directory of Open Access Journals (Sweden)

    Adam Muir

    2003-01-01

    Full Text Available The second Gulf War will become synonymous with the emergence of fully-fledged information warfare where the military-entertainment complex has so influenced strategic and logistic possibilities that it becomes apparent that the war was waged as entertainment. This is entertainment not as an amusement or diversion but utilising the techniques and tropes of the burgeoning entertainment industry as a means to achieve military objectives. This paper offers a short history of the military-entertainment complex as reality and simulation become fused in the practices of the US military machine. The paper then briefly explores three central aspects of this phenomenon evident in recent developments: the military function of computer games; the role of the Hollywood scenario and the blurring between news and reality TV. Finally the suggestion is made that subverting, co-opting and reconstructing the military-entertainment complex provides new possibilities for alternative strategies of information warfare.

  10. Bits or Shots in Combat? The Generalized Deitchman Model of Guerrilla Warfare

    OpenAIRE

    Kress, Moshe; MacKay, Niall J.

    2013-01-01

    Operations Research Letters, accepted. We generalize Deitchman's guerrilla warfare model to account for trade-off between intelligence ('bits') and firepower ('shots'). Intelligent targeting leads to aimed fire, absence of intelligence leads to unaimed fire, dependent on targets' density. We propose a new Lanchester-type model that mixes aimed with unaimed fire, the balance between these being determined by quality of information. We derive the model's conserved quantity, and use it ...

  11. A proficiency-based cost estimate of Surface Warfare Officer on-the-job training

    OpenAIRE

    Macaluso, Anthony D.

    2011-01-01

    Since 2003, the Surface Warfare Officer (SWO) community has changed initial training on two occasions. In 2003, they replaced schoolhouse training (SWOS) with an OJT intensive shipboard computer-based-training in response to criticism that SWOS was a wasteful use of six months. Yet, SWOs considered "SWOS-at-Sea" inadequate fleet preparation, prompting the reestablishment of one month of "SWO Intro." A 2010 Government Accountability Office report concluded the Navy must evaluate how changes to...

  12. Comment on “Computed Tomography Imaging Findings in Chemical Warfare Victims with Pulmonary Complications”

    OpenAIRE

    Shahrzad M.Lari

    2013-01-01

    Dr.Mirsadraei and colleagues performed an interesting study about the lung HRCT findings in chemical warfare patients who suffering from long-term pulmonary complications. They found that air trapping and mosaic attenuation were the most common lung HRCT findings. Also they divided patients in different clinical entities according to the lung HRCT findings (Bronchiolitis Oblitrans, pulmonary fibrosis, bronchiectasis, asthma, and COPD). At present, GOLD and GINA recommend the diagnosis of COPD...

  13. Hybrid Airship Multi-Role (HAMR) Anti-Submarine Warfare (ASW) mission capability

    OpenAIRE

    Agpaoa, Roy; Cawley, Matthew; Cossey, Chad; Galvan, Jose; Giang, Alan; Hanchinamani, Joseph; Ikeda, Jeffrey; Kenney, John; Magnusson, Lance; Martinez, Christopher; Newberry, Mike; Raymond, Eldridge; Rykala, John; Watts, Jason; Wood, Micheal

    2008-01-01

    The Hybrid Airship Multi-Role (HAMR) Anti-Submarine Warfare (ASW) Mission Module project applies established systems engineering principles and processes to the design of an ASW payload module that examines the capability of the HAMR to perform persistent ASW mission support. Critical system functions and objectives are identified and are assigned appropriate quantitative metrics. Additionally, three alternative architectures are generated and evaluated using the appropriate metrics based...

  14. Comparison of Selected Methods for Individual Decontamination of Chemical Warfare Agents

    OpenAIRE

    Tomas Capoun; Jana Krykorkova

    2014-01-01

    This study addresses the individual decontamination of chemical warfare agents (CWA) and other hazardous substances. The individual decontamination applies to contaminated body surfaces, protective clothing and objects immediately after contamination, performed individually or by mutual assistance using prescribed or improvised devices. The article evaluates the importance of individual decontamination, security level for Fire and Rescue Service Units of the Czech Republic (FRS CR) and demons...

  15. INFORMATION WEAPON CLASSIFICATION ACCORDING TO THE METHODS OF CONDUCTING INFORMATION WARFARE

    OpenAIRE

    Levchenko, Oleksandr V.

    2014-01-01

    Dynamic development of information technology has led to the development of informational weapon which is becoming the most dangerous tool of warfare between states. With the help of informational weapons can be conduct influence on informational resources of the hostile states and public opinion of the population. In accordance with it, informational weapon classified as information and technical weapon that affect the information resources, networks and systems of government and military ma...

  16. Toward a theory of hybrid warfare: the Russian conduct of war during peace

    OpenAIRE

    Dayspring, Stephen M.

    2015-01-01

    With the Russian annexation of Crimea and the undeclared conflict in eastern Ukraine, Western policy analysts have asked if Russia’s actions represent a new, more covert approach to warfare. Understanding Russia’s perspective on international relations is imperative to supporting potential targets of future Russian action, and specifically, to updating NATO’s defensive protocols that are predicated on response to clear military violations of sovereignty. This study uses an existing model for ...

  17. Theater level operations: modeling ground unit logistical requirements in the Joint Warfare Analysis Experimental Prototype

    OpenAIRE

    Wilk, Thomas J.

    1995-01-01

    This study proposes a methodology for modeling the logistics processes for ground units in the Joint Warfare Analysis Experimental Prototype (JWAEP) simulation. The model structure presented in this research allows for the representation of the consumption. movement, and distribution of supplies within the combat units modeled in JWAEP. Also presented is an architecture to model logistical units in JWAEP Methodologies are presented to model both the "push" and "pull" systems of supply. The su...

  18. Russia and hybrid warfare: identifying critical elements in successful applications of hybrid tactics

    OpenAIRE

    Neville, Seth B.

    2015-01-01

    Approved for public release; distribution is unlimited With the Russian annexation of Crimea in 2014, hybrid war became a buzzword within political and academic circles. This thesis examines hybrid warfare applications using contemporary and historical examples. The analysis seeks to determine why a country was or was not successful in its execution of hybrid war, and it assesses the geo-political context of cost, benefit, and risk for an aggressor state contributing to its decision to eng...

  19. Controlling Inventory: Real-World Mathematical Modeling

    Science.gov (United States)

    Edwards, Thomas G.; Özgün-Koca, S. Asli; Chelst, Kenneth R.

    2013-01-01

    Amazon, Walmart, and other large-scale retailers owe their success partly to efficient inventory management. For such firms, holding too little inventory risks losing sales, whereas holding idle inventory wastes money. Therefore profits hinge on the inventory level chosen. In this activity, students investigate a simplified inventory-control…

  20. Lao Depression Inventory.

    Science.gov (United States)

    Davidson-Muskin, M B; Golden, C

    1989-01-01

    There are no measurement tools that accurately measure depression among Lao refugees. The overall purpose of this research was to complete the development and validation procedures for the Lao Depression Inventory (LDI). The study consisted of 216 Ethnic Lao refugees. A clinical interview and 164 true/false questions were administered to identify specific items which could identify depression among the Ethnic Lao people. All items were administered in both English and Lao. Overall, 78 of the 164 items differentiated groups of depressed and nondepressed Lao at the .01 level. Results of validation procedures showed that a 30-item scale had an accuracy rate of 89% in identifying the presence of depression in the validation group; the hit-rate for the same items and cutoff was 92% in the cross-validation group. Potential uses of the scale are discussed. PMID:2918451

  1. [Glanders--a potential disease for biological warfare in humans and animals].

    Science.gov (United States)

    Lehavi, Ofer; Aizenstien, Orna; Katz, Lior H; Hourvitz, Ariel

    2002-05-01

    Infection with Burkholderia mallei (formerly Pseudomonas mallei) can cause a subcutaneous infection known as "farcy" or can disseminate to condition known as Glanders. It is primarily a disease affecting horses, donkeys and mules. In humans, Glanders can produce four types of disease: localized form, pulmonary form, septicemia, and chronic form. Necrosis of the tracheobronchial tree and pustular skin lesions characterize acute infection with B. mallei. Other symptoms include febrile pneumonia, if the organism was inhaled, or signs of sepsis and multiple abscesses, if the skin was the port of entry. Glanders is endemic in Africa, Asia, the Middle East, and Central and South America. Glanders has low contiguous potential, but because of the efficacy of aerosolized dissemination and the lethal nature of the disease, B. mallei was considered a candidate for biological warfare. During World War I, Glanders was believed to have been spread to infect large numbers of Russian horses and mules on the Eastern front. The Japanese infected horses, civilians and prisoners of war during World War II. The USA and the Soviet Union have shown interest in B. mallei in their biological warfare program. The treatment is empiric and includes mono or poly-therapy with Ceftazidime, Sulfadiazine, Trimethoprim + Sulfamethoxazol, Gentamicin, Imipenem etc. Aggressive control measures essentially eliminated Glanders from the west. However, with the resurgent concern about biological warfare, B. mallei is now being studied in a few laboratories worldwide. This review provides an overview of the disease and presents the only case reported in the western world since 1949.

  2. Operational advantages of using Cyber Electronic Warfare (CEW) in the battlefield

    Science.gov (United States)

    Yasar, Nurgul; Yasar, Fatih M.; Topcu, Yucel

    2012-06-01

    While cyberspace is emerging as a new battlefield, conventional Electronic Warfare (EW) methods and applications are likely to change. Cyber Electronic Warfare (CEW) concept which merges cyberspace capabilities with traditional EW methods, is a new and enhanced form of the electronic attack. In this study, cyberspace domain of the battlefield is emphazised and the feasibility of integrating Cyber Warfare (CW) concept into EW measures is researched. The SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis method is used to state the operational advantages of using CEW concept in the battlefield. The operational advantages of CEW are assessed by means of its effects on adversary air defense systems, communication networks and information systems. Outstanding technological and operational difficulties are pointed out as well. As a result, a comparison of CEW concept and conventional EW applications is presented. It is concluded that, utilization of CEW concept is feasible at the battlefield and it may yield important operational advantages. Even though the computers of developed military systems are less complex than normal computers, they are not subjected to cyber threats since they are closed systems. This concept intends to show that these closed systems are also open to the cyber threats. As a result of the SWOT analysis, CEW concept provides Air Forces to be used in cyber operations effectively. On the other hand, since its Collateral Damage Criteria (CDC) is low, the usage of cyber electronic attack systems seems to grow up.

  3. Denmark's National Inventory Report 2009

    DEFF Research Database (Denmark)

    Nielsen, Ole-Kenneth; Lyck, Erik; Mikkelsen, Mette Hjorth;

    This report is Denmark's National Inventory Report 2009. The report contains information on Denmark's emission inventories for all years' from 1990 to 2007 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2. The report documents the methodology as well as presents activity data and emissi...

  4. Denmark's National Inventory Report 2014

    DEFF Research Database (Denmark)

    Nielsen, Ole-Kenneth; Plejdrup, Marlene Schmidt; Winther, Morten;

    This report is Denmark’s National Inventory Report 2014. The report contains information on Denmark’s emission inventories for all years’ from 1990 to 2012 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2...

  5. Denmark's National Inventory Report 2010

    DEFF Research Database (Denmark)

    Nielsen, Ole-Kenneth; Lyck, Erik; Mikkelsen, Mette Hjorth;

    2010-01-01

    This report is Denmark's National Inventory Report 2010. The report contains information on Denmark's emission inventories for all years' from 1990 to 2008 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2....

  6. Denmark's National Inventory Report 2013

    DEFF Research Database (Denmark)

    Nielsen, Ole-Kenneth; Plejdrup, Marlene Schmidt; Winther, Morten;

    This report is Denmark’s National Inventory Report 2013. The report contains information on Denmark’s emission inventories for all years’ from 1990 to 2011 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2....

  7. Denmark's national inventory report 2006

    DEFF Research Database (Denmark)

    Illerup, Jytte Boll; Lyck, Erik; Nielsen, Ole-Kenneth;

    This report is Denmark's National Inventory Report reported to the Conference of the Parties under the United Nations Framework Convention on Climate Change (UNFCCC) due by April 2006. The report contains information on Denmark's inventories for all years' from 1990 to 2004 for CO....

  8. Automation of Space Inventory Management

    Science.gov (United States)

    Fink, Patrick W.; Ngo, Phong; Wagner, Raymond; Barton, Richard; Gifford, Kevin

    2009-01-01

    This viewgraph presentation describes the utilization of automated space-based inventory management through handheld RFID readers and BioNet Middleware. The contents include: 1) Space-Based INventory Management; 2) Real-Time RFID Location and Tracking; 3) Surface Acoustic Wave (SAW) RFID; and 4) BioNet Middleware.

  9. ANALYSIS MODEL FOR INVENTORY MANAGEMENT

    Directory of Open Access Journals (Sweden)

    CAMELIA BURJA

    2010-01-01

    Full Text Available The inventory represents an essential component for the assets of the enterprise and the economic analysis gives them special importance because their accurate management determines the achievement of the activity object and the financial results. The efficient management of inventory requires ensuring an optimum level for them, which will guarantee the normal functioning of the activity with minimum inventory expenses and funds which are immobilised. The paper presents an analysis model for inventory management based on their rotation speed and the correlation with the sales volume illustrated in an adequate study. The highlighting of the influence factors on the efficient inventory management ensures the useful information needed to justify managerial decisions, which will lead to a balancedfinancial position and to increased company performance.

  10. Recent evidence on the muted inventory cycle

    OpenAIRE

    Andrew J. Filardo

    1995-01-01

    Inventories play an important role in business cycles. Inventory build-ups add momentum to the economy during expansions, while inventory liquidations sap economic strength during recessions. In addition, because inventory fluctuations are notoriously difficult to predict, they present considerable uncertainty in assessing the economic outlook.> The role of inventories in shaping the current outlook for the U.S. economy is particularly uncertain. In the early 1990s, inventory swings appeared ...

  11. Case Study on Inventory Management Improvement

    OpenAIRE

    Plinere Darya; Borisov Arkady

    2015-01-01

    Inventory management is a challenging problem area in supply chain management. Companies need to have inventories in warehouses in order to fulfil customer demand, meanwhile these inventories have holding costs and this is frozen fund that can be lost. Therefore, the task of inventory management is to find the quantity of inventories that will fulfil the demand, avoiding overstocks. This paper presents a case study for the assembling company on inventory management. It is proposed to use inve...

  12. Inventory of miscellaneous streams

    International Nuclear Information System (INIS)

    On December 23, 1991, the US Department of Energy, Richland Operations Office (RL) and the Washington State Department of Ecology (Ecology) agreed to adhere to the provisions of the Department of Ecology Consent Order. The Consent Order lists the regulatory milestones for liquid effluent streams at the Hanford Site to comply with the permitting requirements of Washington Administrative Code. The RL provided the US Congress a Plan and Schedule to discontinue disposal of contaminated liquid effluent into the soil column on the Hanford Site. The plan and schedule document contained a strategy for the implementation of alternative treatment and disposal systems. This strategy included prioritizing the streams into two phases. The Phase 1 streams were considered to be higher priority than the Phase 2 streams. The actions recommended for the Phase 1 and 2 streams in the two reports were incorporated in the Hanford Federal Facility Agreement and Consent Order. Miscellaneous Streams are those liquid effluents streams identified within the Consent Order that are discharged to the ground but are not categorized as Phase 1 or Phase 2 Streams. This document consists of an inventory of the liquid effluent streams being discharged into the Hanford soil column

  13. Inventory of miscellaneous streams

    Energy Technology Data Exchange (ETDEWEB)

    Lueck, K.J.

    1995-09-01

    On December 23, 1991, the US Department of Energy, Richland Operations Office (RL) and the Washington State Department of Ecology (Ecology) agreed to adhere to the provisions of the Department of Ecology Consent Order. The Consent Order lists the regulatory milestones for liquid effluent streams at the Hanford Site to comply with the permitting requirements of Washington Administrative Code. The RL provided the US Congress a Plan and Schedule to discontinue disposal of contaminated liquid effluent into the soil column on the Hanford Site. The plan and schedule document contained a strategy for the implementation of alternative treatment and disposal systems. This strategy included prioritizing the streams into two phases. The Phase 1 streams were considered to be higher priority than the Phase 2 streams. The actions recommended for the Phase 1 and 2 streams in the two reports were incorporated in the Hanford Federal Facility Agreement and Consent Order. Miscellaneous Streams are those liquid effluents streams identified within the Consent Order that are discharged to the ground but are not categorized as Phase 1 or Phase 2 Streams. This document consists of an inventory of the liquid effluent streams being discharged into the Hanford soil column.

  14. FEMA Flood Insurance Studies Inventory

    Data.gov (United States)

    Kansas Data Access and Support Center — This digital data set provides an inventory of Federal Emergency Management Agency (FEMA) Flood Insurance Studies (FIS) that have been conducted for communities and...

  15. National Greenhouse Gas Emission Inventory

    Data.gov (United States)

    U.S. Environmental Protection Agency — The National Greenhouse Gas Emission Inventory contains information on direct emissions of greenhouse gases as well as indirect or potential emissions of greenhouse...

  16. Forest Inventory and Analysis Database

    Data.gov (United States)

    US Forest Service, Department of Agriculture — The Forest Inventory and Analysis (FIA) research program has been in existence since mandated by Congress in 1928. FIA's primary objective is to determine the...

  17. Inventory differences: An evaluation methodology

    International Nuclear Information System (INIS)

    This paper discusses an evaluation methodology which is used for inventory differences at the Los Alamos National Laboratory. It is recognized that there are various methods which can be, and are being, used to evaluate process inventory differences at DOE facilities. The purpose of this paper is to share our thoughts on the subject and our techniques with those who are responsible for the evaluation of inventory differences at their facility. One of the most dangerous aspects of any evaluation technique, especially one as complex as most inventory difference evaluations tend to be, is to fail to look at the tools being used as indicators. There is a tendency to look at the results of an evaluation by one technique as an absolute. At the Los Alamos National Laboratory, several tools are used and the final evaluation is based on a combination of the observed results of a many-faceted evaluation. The tools used and some examples are presented

  18. Clinical Decision Support (CDS) Inventory

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Clinical Decision Support (CDS) Inventory contains descriptions of past and present CDS projects across the Federal Government. It includes Federal projects,...

  19. Toxics Release Inventory (TRI) Widget

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Toxics Release Inventory (TRI) widget allows users to identify facilities in a user-specified area of interest that have toxic releases as reported by the...

  20. Title V Permitting Statistics Inventory

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Title V Permitting Statistics Inventory contains measured and estimated nationwide statistical data, consisting of counts of permitted sources, types of permits...

  1. Lepidoptera (Moth) Inventory: Region 1

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — National Wildlife Refuges protect important habitats for many plant and animal species. Refuge inventories have frequently included plants, birds and mammals, but...

  2. Severe Weather Data Inventory (SWDI)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Severe Weather Data Inventory (SWDI) is an integrated database of severe weather records for the United States. SWDI enables a user to search through a variety...

  3. Value-Based Inventory Management

    OpenAIRE

    Michalski, Grzegorz

    2008-01-01

    The basic financial purpose of a firm is to maximize its value. An inventory management system should also contribute to realization of this basic aim. Many current asset management models currently found in financial management literature were constructed with the assumption of book profit maximization as basic aim. However these models could lack what relates to another aim, i.e., maximization of enterprise value. This article presents a modified value-based inventory management model.

  4. INVENTORY FLOW TILL PRODUCTION CAPACITY

    OpenAIRE

    Daniela Magdalena DINU

    2013-01-01

    An efficient management of inventories means proper planning and usage of the control methods as Just in Time(JIT), Material requirements planning(MRP), Vendor Management Inventory(VMI) or Distribution resource planning(DRP). Are presented and analyzed in their interdependence, issues such as: delivery time, payment term, payment methods, payment instruments, delivery time, risk assuming in terms of delivery terms agreed and accepted, transport administration, minimum quantity delivered, stoc...

  5. 27 CFR 40.523 - Inventories.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false Inventories. 40.523... Inventories. Every manufacturer of processed tobacco must provide a true and accurate inventory on TTB F 5210.9 in accordance with instructions for the form. The manufacturer must make such an inventory at...

  6. 27 CFR 40.201 - Inventories.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false Inventories. 40.201... PROCESSED TOBACCO Operations by Manufacturers of Tobacco Products Inventories and Reports § 40.201 Inventories. Every manufacturer of tobacco products shall make true and accurate inventories on Form...

  7. 27 CFR 19.981 - Inventories.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Inventories. 19.981... Spirits § 19.981 Inventories. Proprietors shall take actual physical inventory of all spirits (including... § 19.988. The results of the inventory shall be posted in the applicable records required by §...

  8. 27 CFR 19.353 - Storage inventories.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Storage inventories. 19..., DEPARTMENT OF THE TREASURY LIQUORS DISTILLED SPIRITS PLANTS Storage Inventories § 19.353 Storage inventories. Each warehouseman shall take a physical inventory of all spirits and wines held in the storage...

  9. 27 CFR 19.329 - Production inventories.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Production inventories. 19..., DEPARTMENT OF THE TREASURY LIQUORS DISTILLED SPIRITS PLANTS Production Inventories § 19.329 Production inventories. Each distiller shall take a physical inventory of the spirits and denatured spirits in tanks...

  10. 48 CFR 1845.508 - Physical inventories.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Physical inventories. 1845... Contractors 1845.508 Physical inventories. NASA contractors shall reconcile inventories with the official property records and submit reports to the property administrator within 30 days after inventory...

  11. THE CONTRIBUTION MADE BY T.E. LAWRENCE TO THE THEORY OF REVOLUTIONARY WARFARE

    Directory of Open Access Journals (Sweden)

    G.K.B. Barron

    2012-02-01

    Full Text Available Lawrence was basically an academic thrown into the hurly-burly of leading an Arab revolt against Turkish domination. It could be said that the war in the Middle East was a sideshow of the First World War and Lawrence's part was a ' ... sideshow to the sideshow'l Why then has Lawrence been remembered when greater military men have been forgotten? The romanticism of his exploits are surely the reason, and yet the fact that he is the first modern theorist and possibly the "father" of modern revolutionary warfare, tends to be forgotten.

  12. Fear as a medium of communication in asymmetric forms of warfare

    DEFF Research Database (Denmark)

    Harste, Gorm

    2011-01-01

    of fear evolves in asymmetric warfare. Asymmetric war induces fear in both parties, but in a communicative form that leads to very different experiences of fear. Fear is observed and analysed with Niklas Luhmann’s theory of self-referential systems of communication and well as his theory of risk....... Following Luhmann and in continuation of Clausewitz’ conceptual tools, yet with other means, the article proposes to observe war as a system that can de-ontologize itself and thereby concern moving centres of gravity such as communication lines, motivation, public fear as well as perceptions of risk...

  13. New concepts and their applications in underwater acoustic warfare simulation system

    Institute of Scientific and Technical Information of China (English)

    DONG Yangze; YAO Lan

    2004-01-01

    An underwater acoustic warfare simulation system (UAWSS) with a structure of high level architecture (HLA) is studied based upon a previous research project. With the experience and lessons learned, some new concepts are adopted in the implementation of UAWSS according to the essence of simulation and the objective of the system, among which are simulation synthetic environment, signal processing at other simulation nodes, decomposition of underwater sound channel, channel varying law and rules on system and parts evaluation, etc. Applications of these new ideas show that they are effective.

  14. Women, rape and warfare: a gendered critique of Just War theory and the Immunity principle

    OpenAIRE

    Banwell, Stacy

    2011-01-01

    The just war tradition is based on two principles: jus ad bellum - just war-making, and jus in bello - just war-fighting. Jus in bello contains the non-combatant immunity principle. This “protects” civilians during war giving them “immunity” from the violence of war-fighting. Women are, for the most part, non-combatants. Still, their experiences during war are far from “protected”. Rape has been a feature of both traditional and civil warfare. The just war tradition is fundamentally ill-equ...

  15. Love-Wave Sensors Combined with Microfluidics for Fast Detection of Biological Warfare Agents

    OpenAIRE

    Daniel Matatagui; José Luis Fontecha; María Jesús Fernández; Isabel Gràcia; Carles Cané; José Pedro Santos; María Carmen Horrillo

    2014-01-01

    The following paper examines a time-efficient method for detecting biological warfare agents (BWAs). The method is based on a system of a Love-wave immunosensor combined with a microfluidic chip which detects BWA samples in a dynamic mode. In this way a continuous flow-through of the sample is created, promoting the reaction between antigen and antibody and allowing a fast detection of the BWAs. In order to prove this method, static and dynamic modes have been simulated and different concentr...

  16. International humanitarian law applied to cyber-warfare: Precautions, proportionality and the notion of ‘attack’ under the humanitarian law of armed conflict

    NARCIS (Netherlands)

    T.D. Gill

    2015-01-01

    This chapter examines the application of international humanitarian law to cyber warfare in the sense of rising to the level of an armed conflict. Building upon the work of the Tallinn Manual on the Application of International Law to Cyber Warfare, it places particular emphasis on the application o

  17. Peru Mercury Inventory 2006

    Science.gov (United States)

    Brooks, William E.; Sandoval, Esteban; Yepez, Miguel A.; Howard, Howell

    2007-01-01

    In 2004, a specific need for data on mercury use in South America was indicated by the United Nations Environmental Programme-Chemicals (UNEP-Chemicals) at a workshop on regional mercury pollution that took place in Buenos Aires, Argentina. Mercury has long been mined and used in South America for artisanal gold mining and imported for chlor-alkali production, dental amalgam, and other uses. The U.S. Geological Survey (USGS) provides information on domestic and international mercury production, trade, prices, sources, and recycling in its annual Minerals Yearbook mercury chapter. Therefore, in response to UNEP-Chemicals, the USGS, in collaboration with the Economic Section of the U.S. Embassy, Lima, has herein compiled data on Peru's exports, imports, and byproduct production of mercury. Peru was selected for this inventory because it has a 2000-year history of mercury production and use, and continues today as an important source of mercury for the global market, as a byproduct from its gold mines. Peru is a regional distributor of imported mercury and user of mercury for artisanal gold mining and chlor-alkali production. Peruvian customs data showed that 22 metric tons (t) of byproduct mercury was exported to the United States in 2006. Transshipped mercury was exported to Brazil (1 t), Colombia (1 t), and Guyana (1 t). Mercury was imported from the United States (54 t), Spain (19 t), and Kyrgyzstan (8 t) in 2006 and was used for artisanal gold mining, chlor-alkali production, dental amalgam, or transshipment to other countries in the region. Site visits and interviews provided information on the use and disposition of mercury for artisanal gold mining and other uses. Peru also imports mercury-containing batteries, electronics and computers, fluorescent lamps, and thermometers. In 2006, Peru imported approximately 1,900 t of a wide variety of fluorescent lamps; however, the mercury contained in these lamps, a minimum of approximately 76 kilograms (kg), and in

  18. Tradeoff Analysis for Optimal Multiobjective Inventory Model

    OpenAIRE

    Longsheng Cheng; Ching-Shih Tsou; Ming-Chang Lee; Li-Hua Huang; Dingwei Song; Wei-Shan Teng

    2013-01-01

    Deterministic inventory model, the economic order quantity (EOQ), reveals that carrying inventory or ordering frequency follows a relation of tradeoff. For probabilistic demand, the tradeoff surface among annual order, expected inventory and shortage are useful because they quantify what the firm must pay in terms of ordering workload and inventory investment to meet the customer service desired. Based on a triobjective inventory model, this paper employs the successive approximation to obtai...

  19. Recognition Inventories in Governmental Sector Accounting

    OpenAIRE

    Nataliya Pryadka

    2013-01-01

    The Study covers the research of conditions for recognition of inventories in the governmental sector accounting. The comparative analysis has been performed as to the inventories recognition criteria provided by the National Accounting Provisions (Standards) 123 in the public sector - 'Inventories', Accounting Provision (Standard) 9 - 'Inventories', International Accounting Standard 16 - 'Inventories' in the public sector. It has been found that the common characteristic, in accordance with ...

  20. Annual Danish emissions inventory report to UNECE. Inventory 1990 - 2002

    Energy Technology Data Exchange (ETDEWEB)

    Illerup, J.B.; Nielsen, M.; Winther, M.; Hjort Mikkelsen, M.; Lyck, E.; Hoffmann, L.; Fauser, P.

    2004-05-01

    This report is a documentation report on the emission inventories for Denmark as reported to the UNECE Secretariat under the Convention on Long Range Transboundary Air Pollution due by 15 February 2004. The report contains information on Denmark's emission inventories regarding emissions of (1) SOx for the years 1980-2002, (2) NOx, CO, NMVOC and NH{sub 3} for the years 1985-2002; (3) Particulate matter: TSP, PM10, PM2.5 for the years 2000-2002, (4) Heavy Metals: Pb, Cd, Hg, As, Cr, Cu, Ni, Se and Zn for the years 1990-2002, and (5) Polyaromatic hydrocarbons (PAH): Benzo(a)pyrene, benzo(b)fluoranthene, benzo(k)fluoranthene and indeno(1,2,3-cd)pyrene for the years 1990-2002. Furthermore, the report contains information on background data for emissions inventory. (au)

  1. Academic Training Lectures | Stuxnet and Cyber-Warfare | 13-14 January 2016

    CERN Multimedia

    2015-01-01

    Please note that the next series of Academic Training Lectures will take place on 13 and 14 January 2016. The lectures will be given by Gian Piero Siroli (Università e INFN, Bologna (IT))   Stuxnet and Cyber-Warfare (1/2)​ on Wednesday, 13 January from 11 a.m. to 12 p.m. http://indico.cern.ch/event/438525/ Stuxnet and Cyber-Warfare (2/2) on Thursday, 14 January from 11 a.m. to 12 p.m. http://indico.cern.ch/event/438526/ at CERN, Council Chamber (503-1-001)  Description: The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran&...

  2. Investigating the Relationship Between Drone Warfare and Civilian Casualties in Gaza

    Directory of Open Access Journals (Sweden)

    Dr. Ann Rogers

    2014-12-01

    Full Text Available Unmanned aerial vehicles (UAVs, better known as drones, are increasingly touted as ‘humanitarian’ weapons that contribute positively to fighting just wars and saving innocent lives. At the same time, civilian casualties have become the most visible and criticized aspect of drone warfare. It is argued here that drones contribute to civilian casualties not in spite of, but because of, their unique attributes. They greatly extend war across time and space, pulling more potential threats and targets into play over long periods, and because they are low-risk and highly accurate, they are more likely to be used. The assumption that drones save lives obscures a new turn in strategic thinking that sees states such as Israel and the US rely on large numbers of small, highly discriminating attacks applied over time to achieve their objectives. This examination of Israel’s 2014 war in Gaza argues that civilian casualties are not an unexpected or unintended consequence of drone warfare, but an entirely predictable outcome.

  3. Ge{sup 4+} doped TiO{sub 2} for stoichiometric degradation of warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Stengl, Vaclav, E-mail: stengl@iic.cas.cz [Department of Solid State Chemistry, Institute of Inorganic Chemistry AS CR v.v.i., 250 68 Rez (Czech Republic); Grygar, Tomas Matys [Department of Solid State Chemistry, Institute of Inorganic Chemistry AS CR v.v.i., 250 68 Rez (Czech Republic); Oplustil, Frantisek; Nemec, Tomas [Military Technical Institute of Protection Brno, Veslarska 230, 628 00 Brno (Czech Republic)

    2012-08-15

    Highlights: Black-Right-Pointing-Pointer We prepared nanodisperse Ge{sup 4+} doped titania by a novel synthesis method. Black-Right-Pointing-Pointer Synthesis does not involve organic solvents, organometallics nor thermal processes. Black-Right-Pointing-Pointer The prepared materials are efficient in removal of chemical warfare agents. Black-Right-Pointing-Pointer Ge{sup 4+} doping improves rate of removal of soman and agent VX by TiO{sub 2}. - Abstract: Germanium doped TiO{sub 2} was prepared by homogeneous hydrolysis of aqueous solutions of GeCl{sub 4} and TiOSO{sub 4} with urea. The synthesized samples were characterized by X-ray diffraction, scanning electron microscopy, EDS analysis, specific surface area (BET) and porosity determination (BJH). Ge{sup 4+} doping increases surface area and content of amorphous phase in prepared samples. These oxides were used in an experimental evaluation of their reactivity with chemical warfare agent, sulphur mustard, soman and agent VX. Ge{sup 4+} doping worsens sulphur mustard degradation and improves soman and agent VX degradation. The best degree of removal (degradation), 100% of soman, 99% of agent VX and 95% of sulphur mustard, is achieved with sample with 2 wt.% of germanium.

  4. An Empirical Examination of the Warfare Metaphor with Respect to Pre-Service Elementary Teachers

    Science.gov (United States)

    Cobern, William W.; Loving, Cathleen C.; Davis, Edward B.; Terpstra, Jeff

    2013-08-01

    Since its origination in the late nineteenth century, the warfare metaphor has been used to characterize the relationship between science and religion, especially orthodox Christianity. Though thoroughly discredited by historians of science, the ideological descendants of Thomas Huxley, who spoke of science in quasi-religious terms, have kept the warfare metaphor alive. On the other hand, there are substantial numbers of Christians who at least appear to oppose science given their high-profile opposition to the general theory of evolution. The research reported in this paper asked, "Does anti-science sentiment increase with increasing orthodox Christian belief?" Two validated, published instruments were used: The Thinking about Science Survey Instrument and the Christian Fundamentalist Belief Scale. The subjects for the study were 545 preservice elementary teachers. The analysis did not show that anti-science sentiment increases with increasing Christian belief. Subjects with strong Christian beliefs were found to be just as supportive of science, if not more so, than subjects with no Christian beliefs. The study concludes with a caution against projecting attitudes toward science "on the whole" based on attitudes specifically toward evolution when working with preservice elementary teachers. Such a projection could well be counterproductive. The study has implications for other modern countries having highly religious populations such as Turkey.

  5. Next Generation Non-particulate Dry Nonwoven Pad for Chemical Warfare Agent Decontamination

    Energy Technology Data Exchange (ETDEWEB)

    Ramkumar, S S; Love, A; Sata, U R; Koester, C J; Smith, W J; Keating, G A; Hobbs, L; Cox, S B; Lagna, W M; Kendall, R J

    2008-05-01

    New, non-particulate decontamination materials promise to reduce both military and civilian casualties by enabling individuals to decontaminate themselves and their equipment within minutes of exposure to chemical warfare agents or other toxic materials. One of the most promising new materials has been developed using a needlepunching nonwoven process to construct a novel and non-particulate composite fabric of multiple layers, including an inner layer of activated carbon fabric, which is well-suited for the decontamination of both personnel and equipment. This paper describes the development of a composite nonwoven pad and compares efficacy test results for this pad with results from testing other decontamination systems. The efficacy of the dry nonwoven fabric pad was demonstrated specifically for decontamination of the chemical warfare blister agent bis(2-chloroethyl)sulfide (H or sulfur mustard). GC/MS results indicate that the composite fabric was capable of significantly reducing the vapor hazard from mustard liquid absorbed into the nonwoven dry fabric pad. The mustard adsorption efficiency of the nonwoven pad was significantly higher than particulate activated carbon (p=0.041) and was similar to the currently fielded US military M291 kit (p=0.952). The nonwoven pad has several advantages over other materials, especially its non-particulate, yet flexible, construction. This composite fabric was also shown to be chemically compatible with potential toxic and hazardous liquids, which span a range of hydrophilic and hydrophobic chemicals, including a concentrated acid, an organic solvent and a mild oxidant, bleach.

  6. Bioarchaeological investigation of ancient Maya violence and warfare in inland Northwest Yucatan, Mexico.

    Science.gov (United States)

    Serafin, Stanley; Lope, Carlos Peraza; Uc González, Eunice

    2014-05-01

    This study investigates evidence of changes and continuities in ancient Maya violence and warfare in inland northwest Yucatan, Mexico from the Middle Preclassic (600-300 BC) to the Postclassic (AD 1050-1542) through bioarchaeological analysis of cranial and projectile trauma. It is hypothesized that the frequency of violence increases before the Classic Maya collapse and remains high during the Postclassic period. It is also hypothesized that the flat, open terrain was conducive to warfare and resulted in higher trauma frequencies than in other parts of the Maya area. Results show that the frequency of cranial trauma decreases before the Classic collapse and increases in the Postclassic, partially matching the expected chronological trends. The frequency of cranial trauma does not differ significantly from other Maya regions but the pattern does: for all periods, males have more healed injuries than females and they are concentrated on the left side of the anterior of the skull. Some injuries appear to be from small points hafted in wooden clubs. In addition, projectile trauma is evident in a scapula with an embedded arrowhead tip, the first such case reported in a Maya skeleton. Overall, these results suggest greater reliance on open combat and less on raids in this region compared with other parts of the Maya area, possibly due to the flat, open terrain, though the identification of perimortem trauma in both women and men indicates surprise raids on settlements were also practiced.

  7. Zirconium doped nano-dispersed oxides of Fe, Al and Zn for destruction of warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Stengl, Vaclav, E-mail: stengl@uach.cz [Institute of Inorganic Chemistry AS CR v.v.i., 250 68 Rez (Czech Republic); Houskova, Vendula; Bakardjieva, Snejana; Murafa, Nataliya; Marikova, Monika [Institute of Inorganic Chemistry AS CR v.v.i., 250 68 Rez (Czech Republic); Oplustil, Frantisek; Nemec, Tomas [Military Technical Institute of Protection Brno, Veslarska 230, 628 00 Brno (Czech Republic)

    2010-11-15

    Zirconium doped nano dispersive oxides of Fe, Al and Zn were prepared by a homogeneous hydrolysis of the respective sulfate salts with urea in aqueous solutions. Synthesized metal oxide hydroxides were characterized using Brunauer-Emmett-Teller (BET) surface area and Barrett-Joiner-Halenda porosity (BJH), X-ray diffraction (XRD), infrared spectroscopy (IR), scanning electron microscopy (SEM) and energy-dispersive X-ray microanalysis (EDX). These oxides were taken for an experimental evaluation of their reactivity with sulfur mustard (HD or bis(2-chloroethyl)sulfide), soman (GD or (3,3'-Dimethylbutan-2-yl)-methylphosphonofluoridate) and VX agent (S-[2-(diisopropylamino)ethyl]-O-ethyl-methylphosphonothionate). The presence of Zr{sup 4+} dopant can increase both the surface area and the surface hydroxylation of the resulting doped oxides, decreases their crystallites' sizes thereby it may contribute in enabling the substrate adsorption at the oxide surface thus it can accelerate the rate of degradation of warfare agents. Addition of Zr{sup 4+} converts the product of the reaction of ferric sulphate with urea from ferrihydrite to goethite. We found out that doped oxo-hydroxides Zr-FeO(OH) - being prepared by a homogeneous hydrolysis of ferric and zirconium oxo-sulfates mixture in aqueous solutions - exhibit a comparatively higher degradation activity towards chemical warfare agents (CWAs). Degradation of soman or VX agent on Zr-doped FeO(OH) containing ca. 8.3 wt.% of zirconium proceeded to completion within 30 min.

  8. Implications for studying team cognition and team performance in network-centric warfare paradigms.

    Science.gov (United States)

    Krueger, Gerald P; Banderet, Louis E

    2007-05-01

    Network-centric warfare's (NCW) information-rich systems involving sophisticated sensors, tracking systems, smart weapons, and enhanced digital communications threaten to overload combatants with voluminous amounts of data. It is unclear whether warfighters will perceive such extensive data as actionable information to which they will respond accurately in a timely enough manner. Members of small teams in command and control centers, operating in crew-served vehicles, or simply "grunting it out" as ground-pounding infantrymen, may be disparately separated by space, but will communicate and be connected by electronic linkages, e.g., radio, text messages, situation displays, or global positioning data. However, team members will also have to remember shared mental models of tasks at hand, pay attention to and share common situation awareness in complex operational environments, perform team cognition and team coordination, and integrate both lower and higher cognitive processes with those of team behaviors. Such exceptional capabilities are required more now than ever before; such capabilities today are far from assured. After two workshops to establish performance metrics for assessing cognitive performance of military personnel in NCW, this preface introduces five manuscripts addressing team cognition and team performance from both a theoretical and a practical perspective. The authors of this preface question if NCW, and perhaps the politico-social ramifications of modern warfare, have already outstripped behavioral scientists' approach to researching team cognition and team performance-expertise that is so crucially needed for combatants on the rapidly changing 21st-century battlegrounds.

  9. Environmental Monitoring, Water Quality - BACTERIA_MONITORING_EPA_IN: Bacteria Monitoring Stations and Data Summaries in Indiana, Derived from EPA BASINS 3 (United States Environmental Protection Agency, 1:45,000, Point Shapefile)

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — BACTERIA_MONITORING_EPA_IN is a point shapefile developed by the USEPA BASINS 3.0 program and edited by Bernardin, Lochmueller and Associates. Joinable tables must...

  10. Reevaluation of 1999 Health-Based Environmental Screening Levels (HBESLs) for Chemical Warfare Agents

    Energy Technology Data Exchange (ETDEWEB)

    Watson, Annetta Paule [ORNL; Dolislager, Fredrick G [ORNL

    2007-05-01

    This report evaluates whether new information and updated scientific models require that changes be made to previously published health-based environmental soil screening levels (HBESLs) and associated environmental fate/breakdown information for chemical warfare agents (USACHPPM 1999). Specifically, the present evaluation describes and compares changes that have been made since 1999 to U.S. Environmental Protection Agency (EPA) risk assessment models, EPA exposure assumptions, as well as to specific chemical warfare agent parameters (e.g., toxicity values). Comparison was made between screening value estimates recalculated with current assumptions and earlier health-based environmental screening levels presented in 1999. The chemical warfare agents evaluated include the G-series and VX nerve agents and the vesicants sulfur mustard (agent HD) and Lewisite (agent L). In addition, key degradation products of these agents were also evaluated. Study findings indicate that the combined effect of updates and/or changes to EPA risk models, EPA default exposure parameters, and certain chemical warfare agent toxicity criteria does not result in significant alteration to the USACHPPM (1999) health-based environmental screening level estimates for the G-series and VX nerve agents or the vesicant agents HD and L. Given that EPA's final position on separate Tier 1 screening levels for indoor and outdoor worker screening assessments has not yet been released as of May 2007, the study authors find that the 1999 screening level estimates (see Table ES.1) are still appropriate and protective for screening residential as well as nonresidential sites. As such, risk management decisions made on the basis of USACHPPM (1999) recommendations do not require reconsideration. While the 1999 HBESL values are appropriate for continued use as general screening criteria, the updated '2007' estimates (presented below) that follow the new EPA protocols currently under development

  11. Pacific Northwest Resources Inventory Demonstration

    Science.gov (United States)

    Nichols, J. D.

    1976-01-01

    The Pacific Northwest Land Resource Inventory Demonstration project is designed to demonstrate to users from state and local agencies in Washington, Oregon, and Idaho the cost effective role that Landsat derived information can play in natural resource planning and management when properly supported by ground and aircraft data. The project has been organized into five main phases: (1) maps and overlays, (2) early digital image analysis, (3) demonstration of applications using interactive image analysis, (4) Landsat products and land resources information systems, and (5) documentation. The demonstration project has been applied to Washington forestry, water inventory in southern Idaho, and monitoring of tansy ragwort in western Oregon.

  12. Bacteria isolated from amoebae/bacteria consortium

    Science.gov (United States)

    Tyndall, Richard L.

    1995-01-01

    New protozoan derived microbial consortia and method for their isolation are provided. Consortia and bacteria isolated therefrom are useful for treating wastes such as trichloroethylene and trinitrotoluene. Consortia, bacteria isolated therefrom, and dispersants isolated therefrom are useful for dispersing hydrocarbons such as oil, creosote, wax, and grease.

  13. Nuclear warfare

    CERN Multimedia

    Broda

    1981-01-01

    Le Prof.Broda a étudié à Vienne et Berlin et a travaillé pendant la dernière guerre mondiale en Grande Bretagne pour le conseil de la recherche médicale, notamment sur la chimie de la vision. Il est maintenant Prof. de la chimie, physique et radiochimie à l'Université de Vienne, où il concentre ses travaux sur les méchanisme de transport d'énergie à travers les cellules de membranes.

  14. Mobile Warfare

    Institute of Scientific and Technical Information of China (English)

    SEBASTIAN COHEN

    2008-01-01

    @@ In 1984, US computer manufacturer Apple spent almost USD 1.5 million on a lavish, Ridley Scott-directed commercial for its new Macintosh 128k personal computer. A year later, Microsoft released Microsoft Windows for IBM PC, signaling the start of the battle for domi-nation of the personal computer market which has waged ever since.

  15. Mechanical Warfare

    OpenAIRE

    Parman, Julian; Juuti, Jussi

    2015-01-01

    Tässä opinnäytetyössä luotiin tornipuolustuspeli Unityllä käyttäen 3D-malleja. Opinnäytetyön peli on demoversio. Peli on suunniteltu käyttäen suppeaa pelisuunnitelmaa. Pelin 3D-mallit on luotu käyttäen Blender 3D-mallinnusohjelmaa. Pelin grafiikat on tuotettu GIMP2-kuvankäsittelyohjelmalla. Pelin viholliset ja tornit on toteutettu 3D-malleina. Pelissä on tarkoituksena puolustaa omaa tukikohtaa vihollisaalloilta, jotka tulevat tietä pitkin. Lopputuloksena saatiin aikaan toimiva demoversio Mech...

  16. 76 FR 10522 - Naval Surface Warfare Center, Upper Machodoc Creek and the Potomac River, Dahlgren, VA; Danger Zone

    Science.gov (United States)

    2011-02-25

    ... Federal Register (75 FR 69033) with the docket number COE-2010-0038 and no comments were received... and the Potomac River, Dahlgren, VA; Danger Zone AGENCY: U.S. Army Corps of Engineers, DoD. ACTION... danger zone in the vicinity of Naval Surface Warfare Center, Dahlgren, in King George County,...

  17. Chemical and biological warfare: Detection and warning systems. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-10-01

    The bibliography contains citations concerning the detection, identification, verification, and warning systems of chemical and biological warfare agents. Citations discuss agents sampling, monitoring, and assessment. Techniques include chromotography, biosensing, chemical analysis, and DNA probes. Land pollution, soil tests, and skin protection are examined. (Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  18. Chemical and biological warfare: Biology, chemistry, and toxicology. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-10-01

    The bibliography contains citations concerning the physiological effects, physicochemical effects, and toxicology of chemical and biological warfare agents. Citations discuss toxic chemicals, chemical agent simulants, detoxification and decontamination, environmental toxicity, and land pollution. Detection techniques and warning systems are examined in a separate bibliography. (Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  19. Chemical and biological warfare: Biology, chemistry, and toxicology. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-11-01

    The bibliography contains citations concerning the physiological effects, physicochemical effects, and toxicology of chemical and biological warfare agents. Citations discuss toxic chemicals, chemical agent simulants, detoxification and decontamination, environmental toxicity, and land pollution. Detection techniques and warning systems are examined in a separate bibliography. (Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  20. Groundwater geochemical and selected volatile organic compound data, Operable Unit 1, Naval Undersea Warfare Center, Division Keyport, Washington, July 2015

    Science.gov (United States)

    Huffman, Raegan L.

    2016-05-18

    Previous investigations indicate that concentrations of chlorinated volatile organic compounds (CVOCs) are substantial in groundwater beneath the 9-acre former landfill at Operable Unit 1, Naval Undersea Warfare Center, Division Keyport, Washington. The U.S. Geological Survey has continued to monitor groundwater geochemistry to ensure that conditions remain favorable for contaminant biodegradation as specified in the Record of Decision for the site.

  1. Warfare has changed - so should have methods: Ammunition and weapon performance induced operational risk and safety issues

    NARCIS (Netherlands)

    Verhagen, T.L.A.; Voorde, M.J. van de

    2010-01-01

    Warfare has changed. Out-of-area operations have increased the awareness that we are unfamiliar with the performance of the current conventional medium and large calibre ammunitions in day-to-day practice. Current ammunition is primarily developed and procured to defeat the traditional ‘steel’ targe

  2. Warfare tourism experiences and national identity: The case of Airborne Museum ‘Hartenstein’ in Oosterbeek, the Netherlands

    NARCIS (Netherlands)

    Gieling, Johannes

    2016-01-01

    This paper examines through an analysis of Dutch warfare tourism whether there is a relationship between the subjective perceived salience of Dutch identity and heritage tourists' motives, emotions and overall satisfaction. Using a social identity theory framework, this study provides a view of moti

  3. Developing an Action Concept Inventory

    Science.gov (United States)

    McGinness, Lachlan P.; Savage, C. M.

    2016-01-01

    We report on progress towards the development of an Action Concept Inventory (ACI), a test that measures student understanding of action principles in introductory mechanics and optics. The ACI also covers key concepts of many-paths quantum mechanics, from which classical action physics arises. We used a multistage iterative development cycle for…

  4. The routed inventory pooling problem

    NARCIS (Netherlands)

    Bouma, Harmen Willem

    2013-01-01

    In supply chains vloeit een groot deel van de kosten voort uit voorraden en transport. Om deze reden wordt veel onderzoek gedaan naar technieken en concepten die de voorraad- en transportkosten helpen te verlagen. Twee populaire onderzoeksgebieden zijn Inventory Routing, waarbij het doel is optimale

  5. Inventory non-conventional gas

    Energy Technology Data Exchange (ETDEWEB)

    Muntendam-Bos, A.G.; Wassing, B.B.T.; Ter Heege, J.H.; Van Bergen, F.; Schavemaker, Y.A.; Van Gessel, S.F.; De Jong, M.L.; Nelskamp, S.; Van Thienen-Visser, K.; Guasti, E.; Van den Belt; Marges, V.C. [TNO Built Environment and Geosciences, Utrecht (Netherlands)

    2009-10-15

    This report describes the results of the inventory for each non-conventional gas resource expected to be present in the Netherlands, which are: Tight Gas, Shallow gas, Coal bed Methane (CBM), Shale gas, Basin Centered Gas, Aquifer Gas and Stratigraphic traps.

  6. Bleach vs. Bacteria

    Science.gov (United States)

    ... Articles | Inside Life Science Home Page Bleach vs. Bacteria By Sharon Reynolds Posted April 2, 2014 Your ... hypochlorous acid to help kill invading microbes, including bacteria. Researchers funded by the National Institutes of Health ...

  7. Inventory on cleaner production education and training

    DEFF Research Database (Denmark)

    Jørgensen, Michael Søgaard; Pöyry, Sirkka; Huisingh, Donald;

    Analysis and presentation of the data from an international inventory on cleaner production education and training......Analysis and presentation of the data from an international inventory on cleaner production education and training...

  8. CoC Housing Inventory Count Reports

    Data.gov (United States)

    Department of Housing and Urban Development — Continuum of Care (CoC) Homeless Assistance Programs Housing Inventory Count Reports are a snapshot of a CoC’s housing inventory, available at the national and...

  9. Wildlife Inventory Plan : Malheur National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This Wildlife Inventory Plan for Malheur NWR summarizes Refuge objectives, policies on wildlife inventory procedures, biological habitat units, physical facility...

  10. Lake Mason : FWS rangeland inventory assessment

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — In September 2013, The Lake Mason Unit owned by U.S. Fish and Wildlife Service was inventoried for rangeland health and production. The purpose of the inventory was...

  11. Cooperative forestry inventory project for Nevada

    Science.gov (United States)

    Thornhill, R.

    1981-01-01

    A forest inventory project employing computerized classification of LANDSAT data to inventory vegetation types in western Nevada is described. The methodology and applicability of the resulting survey are summarized.

  12. Inventory Plan : St. Vincent National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The inventory procedures outlined in this plan represent a cost effective inventory of the wildlife populations on St. Vincent National Wildlife Refuge. Winter...

  13. The Trail Inventory of Aransas [Cycle 2

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of this report is to create a baseline inventory of all non-motorized trails on Aransas National Wildlife Refuge. Trails in this inventory are eligible...

  14. Ottawa National Wildlife Refuge : Wildlife Inventory Plan

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This Wildlife Inventory Plan for Ottawa NWR describes the inventory program’s relation to Refuge objectives and outlines the program’s policies and administration....

  15. Bacteria and lignin degradation

    Institute of Scientific and Technical Information of China (English)

    Jing LI; Hongli YUAN; Jinshui YANG

    2009-01-01

    Lignin is both the most abundant aromatic (phenolic) polymer and the second most abundant raw material.It is degraded and modified by bacteria in the natural world,and bacteria seem to play a leading role in decomposing lignin in aquatic ecosystems.Lignin-degrading bacteria approach the polymer by mechanisms such as tunneling,erosion,and cavitation.With the advantages of immense environmental adaptability and biochemical versatility,bacteria deserve to be studied for their ligninolytic potential.

  16. Corporate social responsibility and inventory policy

    OpenAIRE

    Barcos, Lucía; Tribó, Josep A.; Surroca, Jordi; Barroso, Alicia

    2010-01-01

    In this article, we study the impact of implementing corporate social responsible (CSR) practices on a firm’s inventory policy. Our proposal is that there is an inverted U-shape relationship between firms’ CSR and their inventory levels. Two elements explain such proposal. First, stakeholders have different interests regarding the outcome of the inventory system. Specifically, we hypothesize that customers pressure firms to increase inventories; employees have conflicting views regarding inve...

  17. Love-Wave Sensors Combined with Microfluidics for Fast Detection of Biological Warfare Agents

    Science.gov (United States)

    Matatagui, Daniel; Fontecha, José Luis; Fernández, María Jesús; Gràcia, Isabel; Cané, Carles; Santos, José Pedro; Horrillo, María Carmen

    2014-01-01

    The following paper examines a time-efficient method for detecting biological warfare agents (BWAs). The method is based on a system of a Love-wave immunosensor combined with a microfluidic chip which detects BWA samples in a dynamic mode. In this way a continuous flow-through of the sample is created, promoting the reaction between antigen and antibody and allowing a fast detection of the BWAs. In order to prove this method, static and dynamic modes have been simulated and different concentrations of BWA simulants have been tested with two immunoreactions: phage M13 has been detected using the mouse monoclonal antibody anti-M13 (AM13), and the rabbit immunoglobulin (Rabbit IgG) has been detected using the polyclonal antibody goat anti-rabbit (GAR). Finally, different concentrations of each BWA simulants have been detected with a fast response time and a desirable level of discrimination among them has been achieved. PMID:25029282

  18. Love-Wave Sensors Combined with Microfluidics for Fast Detection of Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    Daniel Matatagui

    2014-07-01

    Full Text Available The following paper examines a time-efficient method for detecting biological warfare agents (BWAs. The method is based on a system of a Love-wave immunosensor combined with a microfluidic chip which detects BWA samples in a dynamic mode. In this way a continuous flow-through of the sample is created, promoting the reaction between antigen and antibody and allowing a fast detection of the BWAs. In order to prove this method, static and dynamic modes have been simulated and different concentrations of BWA simulants have been tested with two immunoreactions: phage M13 has been detected using the mouse monoclonal antibody anti-M13 (AM13, and the rabbit immunoglobulin (Rabbit IgG has been detected using the polyclonal antibody goat anti-rabbit (GAR. Finally, different concentrations of each BWA simulants have been detected with a fast response time and a desirable level of discrimination among them has been achieved.

  19. Applications of swept-frequency acoustic interferometer for nonintrusive detection and identification of chemical warfare compounds

    Energy Technology Data Exchange (ETDEWEB)

    Sinha, D.N.; Springer, K.; Han, W.; Lizon, D.; Kogan, S. [Los Alamos National Lab., NM (United States). Electronic Materials and Devices Group

    1997-12-01

    Swept-Frequency Acoustic Interferometry (SFAI) is a nonintrusive liquid characterization technique developed specifically for detecting and identifying chemical warfare (CW) compounds inside sealed munitions. The SFAI technique can rapidly (less than 20 seconds) and accurately determine sound speed and sound attenuation of a liquid inside a container over a wide frequency range (1 kHz-15 MHz). From the frequency-dependent sound attenuation measurement, liquid density is determined. These three physical properties are used to uniquely identify the CW compounds. In addition, various chemical relaxation processes in liquids and particle size distribution in emulsions can also be determined from the frequency-dependent attenuation measurement. The SFAI instrument is battery-operated and highly portable (< 6 lb.). The instrument has many potential application in industry ranging from sensitive detection (ppm level) of contamination to process control. The theory of the technique will be described and examples of several chemical industry applications will be presented.

  20. View the information-based battlefield environment system from network-centric warfare (NCW)

    Science.gov (United States)

    Zhang, Chengbin; You, Xiong

    2007-06-01

    Battlefield environment is a general designation for all kinds of objective things and conditions which surround battlefield and affect military actions. With the development of modern high technology, and information technology, traditional battlefield environment is developing in the both factors of space and constitutive, and takes on an integrated tendency. The U.S. military consider that the war of information age is NCW, and to successfully implement the theory of the NCW capabilities, the four domains of warfare-physical, information, cognitive, social, and their relationship must be understood. According to the theory of system, this paper puts forward the conception of Battlefield Environment System and its tetrahedron structure. The correlation of constitutive factors in Generalized Battlefield Environment System and the relationship between Generalized Battlefield Environment System and NCW are analyzed. Moreover, the spatial scope and constitutive factors of Specific Battlefield Environment System are also discussed.

  1. Approximation and Filtering Techniques for Navigation Data in Time-critical Electronic Warfare Systems

    Directory of Open Access Journals (Sweden)

    Vanitha D.

    2013-03-01

    Full Text Available This paper presents a holistic solution to the navigation requirements in a time critical electronic warfare systems like missile warning systems (MWS. In a passive MWS using IR sensors the efficiency of the system is determined by attributes such as low false alarm rate, minimal response time and ability to track different IR radiating objects by association and correlation of consecutive detections through time. Such a system is required to be supported by a navigation system capable of accurate estimation of the aircraft position, attitude angles and altitude. In this paper, estimation techniques used to accurately calculate aircraft navigation data at the time of capture of IR frames are discussed. The paper discusses about synchronization of INGPS, IR sensors & Processor on to same timeline. The paper also intends to evaluate the performance of wavelet transform filter in effective elimination of noise in navigation parameters like acceleration and attitude angle rates for a better estimation of position and attitude.

  2. Fate of chemical warfare agents and toxic indutrial chemicals in landfills

    DEFF Research Database (Denmark)

    Bartelt-Hunt, D.L.; Barlaz, M.A.; Knappe, D.R.U.;

    2006-01-01

    One component of preparedness for a chemical attack is planning for the disposal of contaminated debris. To assess the feasibility of contaminated debris disposal in municipal solid waste (MSW) landfills, the fate of selected chemical warfare agents (CWAs) and toxic industrial chemicals (TICs......], and two TICs [furan and carbon disulfide] were studied. The effects of both infiltration (climate) and contaminant biodegradability on fate predictions were assessed. Model results showed that hydrolysis and gas-phase advection were the principal fate pathways for CWAs and TICs, respectively. Apart from...... CX and the TICs, none of the investigated compounds was predicted to persist in a landfill for more than 5 years. Climate had little impact on CWA/TIC fate, and biodegradability was only important for compounds with long hydrolysis halflives. Monte Carlo simulations were performed to assess...

  3. Comparison of Selected Methods for Individual Decontamination of Chemical Warfare Agents

    Directory of Open Access Journals (Sweden)

    Tomas Capoun

    2014-06-01

    Full Text Available This study addresses the individual decontamination of chemical warfare agents (CWA and other hazardous substances. The individual decontamination applies to contaminated body surfaces, protective clothing and objects immediately after contamination, performed individually or by mutual assistance using prescribed or improvised devices. The article evaluates the importance of individual decontamination, security level for Fire and Rescue Service Units of the Czech Republic (FRS CR and demonstrates some of the devices. The decontamination efficiency of selected methods (sorbent, glove and sponge, two-chamber foam device and wiping with alcohol was evaluated for protective clothing and painted steel plate contaminated with O-ethyl-S-(diisopropylaminoethyl-methylthiophosphonate (VX, sulfur mustard, o-cresol and acrylonitrile. The methods were assessed from an economic point of view and with regard to specific user parameters, such as the decontamination of surfaces or materials with poor accessibility and vertical surfaces, the need for a water rinse as well as toxic waste and its disposal.

  4. Comment on “Computed Tomography Imaging Findings in Chemical Warfare Victims with Pulmonary Complications”

    Directory of Open Access Journals (Sweden)

    2013-08-01

    Full Text Available Dr.Mirsadraei and colleagues performed an interesting study about the lung HRCT findings in chemical warfare patients who suffering from long-term pulmonary complications. They found that air trapping and mosaic attenuation were the most common lung HRCT findings. Also they divided patients in different clinical entities according to the lung HRCT findings (Bronchiolitis Oblitrans, pulmonary fibrosis, bronchiectasis, asthma, and COPD. At present, GOLD and GINA recommend the diagnosis of COPD and asthma mainly on spirometry (1, 2. Although the HRCT may have valuable diagnostic points, but the diagnosis of COPD and asthma is according to the spirometry and relevant clinical symptoms. In this article, the authors relied only on clinical symptoms and corresponding lung HRCT findings that may have overlapping points in the diagnosis of asthma and COPD since normal lung HRCT with or without air trapping can be seen in COPD too (3. It has been proposed that saber-sheath trachea (tracheal index

  5. A review of current and future components for electronic warfare receivers

    Science.gov (United States)

    Collins, J. H.; Grant, P. M.

    1981-05-01

    This paper addresses the role of conventional and new components in passive electronic warfare (EW) receivers. The various areas of EW are defined before restricting the discussion predominantly to the radar intercept problem at microwave frequencies. The operational parameters of conventional components are then reviewed including the multiplexer; crystal video, instantaneous frequency measurement (IFM), and scanning superheterodyne receivers. The significance of modularity, digital control, and hybrid combinations of components is highlighted. A brief description follows of the operational Cutlass EW equipment. New components based on surface-acoustic waves (SAW) and acoustooptic (AO) Bragg cells are then presented and their particular importance in channelized receivers, IFM's, and microscan receivers noted. Finally, a number of conclusions are drawn covering likely trends in EW receivers and the need for continuing development of large-scale integrated (LSI) circuits for signal sorting and overall digital management.

  6. Rapid Ultrasensitive Chemical-Fingerprint Detection of Chemical and Biochemical Warfare Agents

    Energy Technology Data Exchange (ETDEWEB)

    ASHBY, CAROL I.; SHEPODD, TIMOTHY J.; YELTON, WILLIAM G.; MURON, DAVID J.

    2002-12-01

    Vibrational spectra can serve as chemical fingerprints for positive identification of chemical and biological warfare molecules. The required speed and sensitivity might be achieved with surface-enhanced Raman spectroscopy (SERS) using nanotextured metal surfaces. Systematic and reproducible methods for preparing metallic surfaces that maximize sensitivity have not been previously developed. This work sought to develop methods for forming high-efficiency metallic nanostructures that can be integrated with either gas or liquid-phase chem-lab-on-a-chip separation columns to provide a highly sensitive, highly selective microanalytical system for detecting current and future chem/bio agents. In addition, improved protein microchromatographic systems have been made by the creation of acrylate-based porous polymer monoliths that can serve as protein preconcentrators to reduce the optical system sensitivity required to detect and identify a particular protein, such as a bacterial toxin.

  7. NETWORK-CENTRIC WARFARE AND SOME PARTICULAR ASPECTS OF LOGISTICS BASED ON NETWORKING

    Directory of Open Access Journals (Sweden)

    Petrişor JALBĂ

    2015-04-01

    Full Text Available Within the framework of the current revolution in military affairs, at the End of the Cold War a new concept was born: the concept of War Based on Computer Networking or NCW Network Centric-Warfare which was established as a central element of modern military operations. Determined by theprogress recorded in the field of communication systems of all types, technology of information (HI-Tech, IT, war based on computer networking brings a change in the war paradigm and its inherent components In this respect, logistics based on computer networking represents one of the ways in which the reality of the battlefield is preserved which enhances the joint perspective upon the military forces.

  8. Love-wave sensors combined with microfluidics for fast detection of biological warfare agents.

    Science.gov (United States)

    Matatagui, Daniel; Fontecha, José Luis; Fernández, María Jesús; Gràcia, Isabel; Cané, Carles; Santos, José Pedro; Horrillo, María Carmen

    2014-01-01

    The following paper examines a time-efficient method for detecting biological warfare agents (BWAs). The method is based on a system of a Love-wave immunosensor combined with a microfluidic chip which detects BWA samples in a dynamic mode. In this way a continuous flow-through of the sample is created, promoting the reaction between antigen and antibody and allowing a fast detection of the BWAs. In order to prove this method, static and dynamic modes have been simulated and different concentrations of BWA simulants have been tested with two immunoreactions: phage M13 has been detected using the mouse monoclonal antibody anti-M13 (AM13), and the rabbit immunoglobulin (Rabbit IgG) has been detected using the polyclonal antibody goat anti-rabbit (GAR). Finally, different concentrations of each BWA simulants have been detected with a fast response time and a desirable level of discrimination among them has been achieved. PMID:25029282

  9. 75 FR 82095 - Service Contracts Inventory

    Science.gov (United States)

    2010-12-29

    ... Inventory of Contracts for Services for Fiscal Year (FY) 2010. The inventory includes service contract... at the NRC's electronic Reading Room at http://www.nrc.gov/reading-rm/adams.html . From this page... inventory includes service contract actions over $25,000 that were awarded in FY 2010. The...

  10. 40 CFR 52.2309 - Emissions inventories.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Emissions inventories. 52.2309 Section...) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) Texas § 52.2309 Emissions inventories. (a) The Governor of the State of Texas submitted the 1990 base year emission inventories for the...

  11. 40 CFR 52.1533 - Emission inventories.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Emission inventories. 52.1533 Section...) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) New Hampshire § 52.1533 Emission inventories... inventory for the entire state on January 26, 1993 as a revision to the State Implementation Plan...

  12. 27 CFR 17.167 - Inventories.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Inventories. 17.167... PRODUCTS Records § 17.167 Inventories. (a) Distilled spirits. The “on hand” figures reported in Part II of TTB Form 5154.2 shall be verified by physical inventories taken as of the end of each quarter in...

  13. 47 CFR 32.1220 - Inventories.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Inventories. 32.1220 Section 32.1220... FOR TELECOMMUNICATIONS COMPANIES Instructions for Balance Sheet Accounts § 32.1220 Inventories. (a) This account shall include the cost of materials and supplies held in stock and inventories of...

  14. 40 CFR 52.384 - Emission inventories.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 3 2010-07-01 2010-07-01 false Emission inventories. 52.384 Section 52...) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS Connecticut § 52.384 Emission inventories. (a) The Governor's designee for the State of Connecticut submitted the 1990 base year emission inventories for...

  15. 40 CFR 52.2086 - Emission inventories.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Emission inventories. 52.2086 Section...) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) Rhode Island § 52.2086 Emission inventories... inventory for the Providence ozone nonattainment area on January 12, 1993 as a revision to the...

  16. 27 CFR 22.162 - Inventories.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Inventories. 22.162... Inventories. Each permittee shall take a physical inventory of the tax-free and recovered alcohol in its possession semi-annually for the periods ending June 30 and December 31 of each year; or other...

  17. 27 CFR 25.294 - Inventories.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Inventories. 25.294... OF THE TREASURY LIQUORS BEER Records and Reports § 25.294 Inventories. (a) The brewer shall take a physical inventory of beer and cereal beverage at least once each calender month. The brewer may take...

  18. 40 CFR 52.348 - Emission inventories.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 3 2010-07-01 2010-07-01 false Emission inventories. 52.348 Section 52...) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS Colorado § 52.348 Emission inventories. (a) The Governor of the State of Colorado submitted the 1990 carbon monoxide base year emission inventories for...

  19. 40 CFR 52.1036 - Emission inventories.

    Science.gov (United States)

    2010-07-01

    ... Implementation Plan (SIP). The 2002 base year emission inventory requirement of 40 CFR 51.915 has been satisfied... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Emission inventories. 52.1036 Section...) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) Maine § 52.1036 Emission inventories. (a)...

  20. 40 CFR 52.2350 - Emission inventories.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Emission inventories. 52.2350 Section...) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) Utah § 52.2350 Emission inventories. (a) The Governor of the State of Utah submitted the 1990 base year emission inventory of ozone precursors,...

  1. 40 CFR 52.1125 - Emission inventories.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Emission inventories. 52.1125 Section...) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) Massachusetts § 52.1125 Emission inventories... emission inventories for the Springfield nonattainment area and the Massachusetts portion of the...

  2. 40 CFR 52.993 - Emissions inventories.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 3 2010-07-01 2010-07-01 false Emissions inventories. 52.993 Section...) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS Louisiana § 52.993 Emissions inventories. (a) The Governor of the State of Louisiana submitted the 1990 base year emission inventories for the Baton...

  3. 30 CFR 220.032 - Inventories.

    Science.gov (United States)

    2010-07-01

    ... Inventories. (a) The lessee is responsible for NPSL materiel and shall make proper and timely cost and credit... reasonable intervals, but at least once every three years, inventories of controllable materiel shall be... audit as provided in § 220.033. Inventory adjustments of controllable materiel shall be made by...

  4. Naval electronic warfare simulation for effectiveness assessment and softkill programmability facility

    Science.gov (United States)

    Lançon, F.

    2011-06-01

    The Anti-ship Missile (ASM) threat to be faced by ships will become more diverse and difficult. Intelligence, rules of engagement constraints, fast reaction-time for effective softkill solution require specific tools to design Electronic Warfare (EW) systems and to integrate it onboard ship. SAGEM Company provides decoy launcher system [1] and its associated Naval Electronic Warfare Simulation tool (NEWS) to permit softkill effectiveness analysis for anti-ship missile defence. NEWS tool generates virtual environment for missile-ship engagement and counter-measure simulator over a wide spectrum: RF, IR, EO. It integrates EW Command & Control (EWC2) process which is implemented in decoy launcher system and performs Monte-Carlo batch processing to evaluate softkill effectiveness in different engagement situations. NEWS is designed to allow immediate EWC2 process integration from simulation to real decoy launcher system. By design, it allows the final operator to be able to program, test and integrate its own EWC2 module and EW library onboard, so intelligence of each user is protected and evolution of threat can be taken into account through EW library update. The objectives of NEWS tool are also to define a methodology for trial definition and trial data reduction. Growth potential would permit to design new concept for EWC2 programmability and real time effectiveness estimation in EW system. This tool can also be used for operator training purpose. This paper presents the architecture design, the softkill programmability facility concept and the flexibility for onboard integration on ship. The concept of this operationally focused simulation, which is to use only one tool for design, development, trial validation and operational use, will be demonstrated.

  5. Bioterrorism and Biological Warfare, from Past to the Present: A classic review

    Directory of Open Access Journals (Sweden)

    Majid Zare Bidaki

    2015-10-01

    Full Text Available Bioterrorism is defined as any terrorist action of intentional release or dissemination of highly pathogenic biological agents, including a variety of microorganisms or biological toxins. With the growing threat of terrorism, is necessary that the potential danger of various microorganisms – as a powerful tool of aggression and threat- to be taken seriously. This review tries to explain the concept of biological weapons and their historical development process with an emphasis on efforts to control the proliferation of these types of weapons over the last century. Potential impact of infectious diseases on people and armed forces was known from since 600 BC. Using the victims of the plague as a weapon in medieval warfare and spread of smallpox as a weapon during the war against the Indians when initially America was discovered, the development of biological weapons during the World War I, World War II and the Cold War, and even since the beginning of the third millennium, all show the strategic importance of pathogenic microorganisms as a deterrent power for the superiority of some governments and cults. Historical attempts to use infectious diseases as biological weapons reveal that the distinction between a natural outbreak of an infectious disease and that of a deliberate biological attack is very difficult. Abusing this characteristic of infectious diseases has made it possible for the purposes of superiority. International agreements to control the development of biological weapons, such as “the 1925 Geneva Protocol” and “the Convention on the Prohibition of the Development, Production and Stockpiling of Biological and Toxic Weapons” have not been able to control the development and using of biological warfare.  The current paper is a classic review (Overview article aiming at increasing the knowledge and awareness of people especially of health authorities and government officials.

  6. Intracellular Bacteria in Protozoa

    Science.gov (United States)

    Görtz, Hans-Dieter; Brigge, Theo

    Intracellular bacteria in humans are typically detrimental, and such infections are regarded by the patients as accidental and abnormal. In protozoa it seems obvious that many bacteria have coevolved with their hosts and are well adapted to the intracellular way of life. Manifold interactions between hosts and intracellular bacteria are found, and examples of antibacterial resistance of unknown mechanisms are observed. The wide diversity of intracellular bacteria in protozoa has become particularly obvious since they have begun to be classified by molecular techniques. Some of the bacteria are closely related to pathogens; others are responsible for the production of toxins.

  7. 41 CFR 109-27.5007 - Physical inventories.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Physical inventories...-INVENTORY MANAGEMENT 27.50-Inventory Management Policies, Procedures, and Guidelines § 109-27.5007 Physical inventories....

  8. The System of Inventory Management

    OpenAIRE

    Bilíková, Eva

    2012-01-01

    Tato bakalářská práce se zabývá návrhem na optimalizaci systému řízení zásob. Je zaměřena na metody, které by měly obchodní společnosti minimalizovat náklady spojené se zásobami a skladovacími prostory a zároveň zabránit vzniku problémů, jako je nedostatek nebo nadbytek zásob. This bachelor thesis deals with the optimization of inventory management system. It focuses on methods that companies should minimize the costs associated with inventory and storage space and also prevent problems su...

  9. Danish emission inventory for particular matter (PM)

    Energy Technology Data Exchange (ETDEWEB)

    Nielsen, M.; Winther, M.; Illerup, J.B.; Hjort Mikkelsen, M.

    2003-11-01

    The first Danish emission inventory that was reported in 2002 was a provisional-estimate based on data presently available. This report documents methodology, emission factors and references used for an improved Danish emission inventory for particulate matter. Further results of the improved emission inventory for the year 2000 are shown. The particulate matter emission inventory includes TSP, PM,, and PM, The report covers emission inventories for transport and stationary combustion. An appendix covering emissions from agriculture is also included. For the transport sector, both exhaust and non-exhaust emission such as tyre and break wear and road abrasion are included. (au)

  10. Waste management and chemical inventories

    Energy Technology Data Exchange (ETDEWEB)

    Gleckler, B.P.

    1995-06-01

    This section of the 1994 Hanford Site Environmental Report summarizes the classification and handling of waste at the Hanford Site. Waste produced at the Hanford Site is classified as either radioactive, nonradioactive, or mixed waste. Radioactive wastes are further categorized as transuranic, high-level, and low-level. Mixed waste may contain both radioactive and hazardous nonradioactive substances. This section describes waste management practices and chemical inventories at the site.

  11. Developing an Action Concept Inventory

    CERN Document Server

    McGinness, Lachlan P

    2016-01-01

    We report on progress towards the development of an Action Concept Inventory (ACI), a test that measures student understanding of action principles in introductory mechanics and optics. The ACI also covers key concepts of many-paths quantum mechanics, from which classical action physics arises. We used a multi-stage iterative development cycle for incorporating expert and student feedback into successive revisions of the ACI. The student feedback, including think-aloud interviews, enabled us to identify their misconceptions about action physics.

  12. National inventory of radioactive wastes

    International Nuclear Information System (INIS)

    There are in France 1064 sites corresponding to radioactive waste holders that appear in this radioactive waste inventory. We find the eighteen sites of E.D.F. nuclear power plants, The Cogema mine sites, the Cogema reprocessing plants, The Cea storages, the different factories and enterprises of nuclear industry, the sites of non nuclear industry, the Andra centers, decommissioned installations, disposals with low level radioactive wastes, sealed sources distributors, national defence. (N.C.)

  13. Methodology for inventory of wetlands

    OpenAIRE

    Podestá, Laura; Casanova, Rosario; Beyhaut, Juan Ignacio; Boix, Rafael

    2005-01-01

    An automated methodology for the inventory of wetlands in Uruguay was designed, defining a specific technical criteria for their determination. It was necessary to use a combination of procedures and technological tools (Remote Sensing, Digital Photogrammetry, GIS) to process the available information. The following data has been considered: very low sloped terrains (out of a digital terrain model), soils with characteristical moisture behavior, basins and areas with hydrophile...

  14. A Methodology for Developing Diagnostic Concept Inventories

    Science.gov (United States)

    Lindell, Rebecca

    2006-12-01

    Since the development of the Force Concept Inventory, there as been a heightened interest in developing other concept inventories that not only assess if students understand a phenomena, but also diagnose specific alternative understandings. Unfortunately, there is no clear-cut methodology on how to construct such inventories. One of the difficulties is that only some parts of test development theory are appropriate for such concept inventories. This is due to the concept inventories being distracter driven, where test-takers do not randomly choose an incorrect answer. In this poster, I will present a methodology for developing diagnostic concept inventories, which combines traditional psychometric theory with modern theories of concentration and model analysis. An example of how this methodology was utilized to develop the successful Lunar Phases Concept Inventory (LPCI) will also be given.

  15. Controlling Stock and Other Inventory Issues

    Institute of Scientific and Technical Information of China (English)

    CHRIS; DEVONSHIRE-ELLIS

    2008-01-01

    Inventory control is one of the most important business processes during the operation of a trading or manufacturing company as it relates to purchases,sales and logistic activities.In order to have clear inventory management,a company should not only focus on logistic management but also on sales and purchase management. Commonly,we think of the warehouse as the most important component of inventory management and the accounting department is responsible for the inventory management. However,inventory control is not only the responsibility of the accounting department and the warehouse,but also the responsibility of the entire organization.Actually,there are many departments involved in the inventory control process,such as sales,purchasing, production,logistics and accounting.All these departments must work together in or- der to achieve effective inventory controls.

  16. Inventory Methods in a Conversion Plant

    International Nuclear Information System (INIS)

    The main purposes of the inventories are: to safeguard the interests of the Commissariat, to evaluate losses, and to check the measures taken for waste storage. On stocktaking the investigator can either carry out a physical inventory, participate in the inventory, or check the inventory. The latter method gives the best results. The stocktaking operations, preceded by a preparatory meeting to determine the methods to be applied, are carried out in two stages: the weight inventory check and the physical auditing check. Some questions arising in connection with the inventory are disputes between consignors and consignees regarding weight and content; choice of weighing equipment, waste, and evaluation of losses. Inventory methods should not differ greatly from one country to another. It would appear desirable to stress the difficulties which arise during operation and to consider jointly ways of surmounting them. (author)

  17. Research on the Interaction of Hydrogen-Bond Acidic Polymer Sensitive Sensor Materials with Chemical Warfare Agents Simulants by Inverse Gas Chromatography

    OpenAIRE

    Liu Yang; Qiang Han; Shuya Cao; Feng Huang; Molin Qin; Chenghai Guo; Mingyu Ding

    2015-01-01

    Hydrogen-bond acidic polymers are important high affinity materials sensitive to organophosphates in the chemical warfare agent sensor detection process. Interactions between the sensor sensitive materials and chemical warfare agent simulants were studied by inverse gas chromatography. Hydrogen bonded acidic polymers, i.e., BSP3, were prepared for micro-packed columns to examine the interaction. DMMP (a nerve gas simulant) and 2-CEES (a blister agent simulant) were used as probes. Chemical an...

  18. Research on Electronic Warfare Operational Simulation Experiment Design%电子对抗作战仿真实验设计研究

    Institute of Scientific and Technical Information of China (English)

    陶玉; 耿松涛; 王枭犇

    2013-01-01

      针对目前电子对抗作战仿真实验设计中存在的突出问题,对电子对抗作战仿真实验设计进行研究。介绍我军电子对抗作战仿真实验设计的发展现状,分析电子对抗作战仿真实验设计中存在的问题,提出结合实验目的规范电子对抗作战仿真实验设计的思路。该研究为实现电子对抗作战仿真实验设计的规范化、标准化做出了有益探索。%Aiming at the problems existed in designing electronic warfare operational simulation experiment, electronic warfare operational simulation experiment design is researched. It introduces the development situation of PLA’s electronic warfare operational simulation experiment firstly, analyses the problems in designing electronic warfare operational simulation experiment, and brings a design idea that combines it with experiment goals for electronic warfare operational simulation experiment. The research can offer reference for realize the normalization and standardization of electronic warfare campaign simulation experimental design.

  19. 2009 National inventory of radioactive material and wastes. Geographical inventory

    International Nuclear Information System (INIS)

    A geographical inventory of the radioactive wastes present on the French territory (as recorded until the 31 of december, 2007) is presented, region by region. The various types of waste sites (production, processing, conditioning and storage sites, Uranium mines, ANDRA storage centers, historical storage sites and polluted sites where wastes are stored) are listed and located on maps. Details are given on the nature and origin of these wastes (nuclear industry, medical domain, scientific research, conventional industry, Defense...). A total of 1121 sites have been recorded, among which 163 are presented with details and charts

  20. Chemical and biological warfare: Protection, decontamination, and disposal. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-11-01

    The bibliography contains citations concerning the means to defend against chemical and biological agents used in military operations, and to eliminate the effects of such agents on personnel, equipment, and grounds. Protection is accomplished through protective clothing and masks, and in buildings and shelters through filtration. Elimination of effects includes decontamination and removal of the agents from clothing, equipment, buildings, grounds, and water, using chemical deactivation, incineration, and controlled disposal of material in injection wells and ocean dumping. Other Published Searches in this series cover chemical warfare detection; defoliants; general studies; biochemistry and therapy; and biology, chemistry, and toxicology associated with chemical warfare agents.(Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  1. Chemical and biological warfare: Protection, decontamination, and disposal. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-10-01

    The bibliography contains citations concerning the means to defend against chemical and biological agents used in military operations, and to eliminate the effects of such agents on personnel, equipment, and grounds. Protection is accomplished through protective clothing and masks, and in buildings and shelters through filtration. Elimination of effects includes decontamination and removal of the agents from clothing, equipment, buildings, grounds, and water, using chemical deactivation, incineration, and controlled disposal of material in injection wells and ocean dumping. Other Published Searches in this series cover chemical warfare detection; defoliants; general studies; biochemistry and therapy; and biology, chemistry, and toxicology associated with chemical warfare agents. (Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  2. Modeling and Optimal Control of a Class of Warfare Hybrid Dynamic Systems Based on Lanchester (n,1 Attrition Model

    Directory of Open Access Journals (Sweden)

    Xiangyong Chen

    2014-01-01

    hybrid dynamic systems is established based on Lanchester equation in a (n,1 battle, where a heterogeneous force of n different troop types faces a homogeneous force. This model can be characterized by the interaction of continuous-time models (governed by Lanchester equation, and discrete event systems (described by variable tactics. Furthermore, an expository discussion is presented on an optimal variable tactics control problem for warfare hybrid dynamic system. The optimal control strategies are designed based on dynamic programming and differential game theory. As an example of the consequences of this optimal control problem, we take the (2, 1 case and solve the optimal strategies in a (2, 1 case. Simulation results show the feasibility of warfare hybrid system model and the effectiveness of the optimal control strategies designed.

  3. Genomics of Probiotic Bacteria

    Science.gov (United States)

    O'Flaherty, Sarah; Goh, Yong Jun; Klaenhammer, Todd R.

    Probiotic bacteria from the Lactobacillus and Bifidobacterium species belong to the Firmicutes and the Actinobacteria phylum, respectively. Lactobacilli are members of the lactic acid bacteria (LAB) group, a broadly defined family of microorganisms that ferment various hexoses into primarily lactic acid. Lactobacilli are typically low G + C gram-positive species which are phylogenetically diverse, with over 100 species documented to date. Bifidobacteria are heterofermentative, high G + C content bacteria with about 30 species of bifidobacteria described to date.

  4. Learning Chemistry from Bacteria

    OpenAIRE

    Clardy, Jon

    2013-01-01

    Dr. Jon Clardy Department of Biological Chemistry and Molecular Pharmacology, Harvard Medical School, Harvard University All animals, including humans, originated and evolved on a planet already teeming with bacteria, and the two kingdoms of life have been competing and cooperating through their joint history. Although bacteria are most familiar as pathogens, some bacteria produce small molecules that are essential for the biology of animals and other eukaryotes. This lecture explores some of...

  5. From energy-rich phosphate compounds to warfare agents: A review on the chemistry of organic phosphate compounds

    OpenAIRE

    Luciano Albino Giusti; Vanderlei Gageiro Machado

    2008-01-01

    The chemistry of the phosphorus-oxygen bond is widely used in biological systems in many processes, such as energy transduction and the storage, transmission and expression of genetic information, which are essential to living beings in relation to a wide variety of functions. Compounds containing this bond have been designed for many purposes, ranging from agricultural defense systems, in order to increase food production, to nerve agents, for complaining use in warfare. In this review, feat...

  6. An analysis of the Civilian Employee Reward System in use at Naval Air Warfare Center, Patuxent River, Maryland

    OpenAIRE

    Montgomery, John F.

    1999-01-01

    Approved for public release; distribution is unlimited An incentive system should motivate employees to increase productivity and find innovative ways to control costs. In 1998, Naval Air Warfare Center, Aircraft Division, (NAWCAD) instituted a new reward system. At the request of the NAWCAD, this thesis sought to evaluate the effectiveness of the new reward system from the perspective of the employees affected by the system. The thesis examined current literature on motivation theory with...

  7. Optimal Control of Brownian Inventory Models with Convex Inventory Cost: Discounted Cost Case

    OpenAIRE

    Dai, Jim; Yao, Dacheng

    2011-01-01

    We consider an inventory system in which inventory level fluctuates as a Brownian motion in the absence of control. The inventory continuously accumulates cost at a rate that is a general convex function of the inventory level, which can be negative when there is a backlog. At any time, the inventory level can be adjusted by a positive or negative amount, which incurs a fixed positive cost and a proportional cost. The challenge is to find an adjustment policy that balances the inventory cost ...

  8. Multifunctional ultra-high vacuum apparatus for studies of the interactions of chemical warfare agents on complex surfaces

    Energy Technology Data Exchange (ETDEWEB)

    Wilmsmeyer, Amanda R.; Morris, John R. [Department of Chemistry, Virginia Tech, Blacksburg, Virginia 24061 (United States); Gordon, Wesley O.; Mantooth, Brent A.; Lalain, Teri A. [Research and Technology Directorate, U.S. Army Edgewood Chemical Biological Center, Aberdeen Proving Ground, Maryland 21010 (United States); Davis, Erin Durke [OptiMetrics, Inc., Abingdon, Maryland 21009 (United States)

    2014-01-15

    A fundamental understanding of the surface chemistry of chemical warfare agents is needed to fully predict the interaction of these toxic molecules with militarily relevant materials, catalysts, and environmental surfaces. For example, rules for predicting the surface chemistry of agents can be applied to the creation of next generation decontaminants, reactive coatings, and protective materials for the warfighter. Here, we describe a multifunctional ultra-high vacuum instrument for conducting comprehensive studies of the adsorption, desorption, and surface chemistry of chemical warfare agents on model and militarily relevant surfaces. The system applies reflection-absorption infrared spectroscopy, x-ray photoelectron spectroscopy, and mass spectrometry to study adsorption and surface reactions of chemical warfare agents. Several novel components have been developed to address the unique safety and sample exposure challenges that accompany the research of these toxic, often very low vapor pressure, compounds. While results of vacuum-based surface science techniques may not necessarily translate directly to environmental processes, learning about the fundamental chemistry will begin to inform scientists about the critical aspects that impact real-world applications.

  9. Applicability of federal and state hazardous waste regulatory programs to waste chemical weapons and chemical warfare agents.; TOPICAL

    International Nuclear Information System (INIS)

    This report reviews federal and state hazardous waste regulatory programs that govern the management of chemical weapons or chemical warfare agents. It addresses state programs in the eight states with chemical weapon storage facilities managed by the U.S. Army: Alabama, Arkansas, Colorado, Indiana, Kentucky, Maryland, Oregon, and Utah. It also includes discussions on 32 additional states or jurisdictions with known or suspected chemical weapons or chemical warfare agent presence (e.g., disposal sites containing chemical agent identification sets): Alaska, Arizona, California, Florida, Georgia, Hawaii, Idaho, Illinois, Iowa, Kansas, Louisiana, Massachusetts, Michigan, Mississippi, Missouri, Nebraska, Nevada, New Jersey, New Mexico, New York, North Carolina, Ohio, Pennsylvania, South Carolina, South Dakota, Tennessee, Texas, the U.S. Virgin Islands, Virginia, Washington, Washington, D.C., and Wyoming. Resource Conservation and Recovery Act (RCRA) hazardous waste programs are reviewed to determine whether chemical weapons or chemical warfare agents are listed hazardous wastes or otherwise defined or identified as hazardous wastes. Because the U.S. Environmental Protection Agency (EPA) military munitions rule specifically addresses the management of chemical munitions, this report also indicates whether a state has adopted the rule and whether the resulting state regulations have been authorized by EPA. Many states have adopted parts or all of the EPA munitions rule but have not yet received authorization from EPA to implement the rule. In these cases, the states may enforce the adopted munitions rule provisions under state law, but these provisions are not federally enforceable

  10. A Genetic Algorithm on Inventory Routing Problem

    Directory of Open Access Journals (Sweden)

    Nevin Aydın

    2014-03-01

    Full Text Available Inventory routing problem can be defined as forming the routes to serve to the retailers from the manufacturer, deciding on the quantity of the shipment to the retailers and deciding on the timing of the replenishments. The difference of inventory routing problems from vehicle routing problems is the consideration of the inventory positions of retailers and supplier, and making the decision accordingly. Inventory routing problems are complex in nature and they can be solved either theoretically or using a heuristics method. Metaheuristics is an emerging class of heuristics that can be applied to combinatorial optimization problems. In this paper, we provide the relationship between vendor-managed inventory and inventory routing problem. The proposed genetic for solving vehicle routing problem is described in detail.

  11. Optimal Inventory Policies When Sales Are Discretionary

    OpenAIRE

    Herbert E. Scarf

    2000-01-01

    Inventory models customarily assume that demand is fully satisfied if sufficient stock is available. We analyze the form of the optimal inventory policy if the inventory manager can choose to meet a fraction of the demand. Under classical conditions we show that the optimal policy is again of the (S,s) form. The analysis makes use of a novel property of K-concave functions.

  12. Inventories in the Australian business cycle

    OpenAIRE

    Chindamo, Phillip

    2010-01-01

    This Economics Research Note examines inventories in the business cycle for Australia covering the period since the mid 1980s. The Australian Bureau of Statistics (ABS) defines inventories as all materials etc., work in progress and finished goods owned by a business, whether held at locations of the business or elsewhere. These items are usually held by businesses in anticipation of a product’s sale. Inventory investment is counted as an additional contribution to gross domestic product (...

  13. Sales-Force Incentives and Inventory Management

    OpenAIRE

    Fangruo Chen

    2000-01-01

    This article studies the problem of sales-force compensation by considering the impact of sales-force behavior on a firm's production and inventory system. The sales force's compensation package affects how the salespeople are going to exert their effort, which in turn determines the sales pattern for the firm's product and ultimately drives the performance of the firm's production and inventory system. In general, a smooth demand process facilitates production/inventory planning. Therefore, ...

  14. The validation of a home food inventory

    OpenAIRE

    Heitzler Carrie; Moe Stacey; Lytle Leslie; Nelson Melissa C; Fulkerson Jayne A; Pasch Keryn E

    2008-01-01

    Abstract Background Home food inventories provide an efficient method for assessing home food availability; however, few are validated. The present study's aim was to develop and validate a home food inventory that is easily completed by research participants in their homes and includes a comprehensive range of both healthful and less healthful foods that are associated with obesity. Methods A home food inventory (HFI) was developed and tested with two samples. Sample 1 included 51 adult part...

  15. Data Driven Tuning of Inventory Controllers

    DEFF Research Database (Denmark)

    Huusom, Jakob Kjøbsted; Santacoloma, Paloma Andrade; Poulsen, Niels Kjølstad;

    2007-01-01

    A systematic method for criterion based tuning of inventory controllers based on data-driven iterative feedback tuning is presented. This tuning method circumvent problems with modeling bias. The process model used for the design of the inventory control is utilized in the tuning...... as an approximation to reduce time required on experiments. The method is illustrated in an application with a multivariable inventory control implementation on a four tank system....

  16. Rapid inventory taking by electronic data gathering

    International Nuclear Information System (INIS)

    A Plessey bar-code reading system has been installed in a nuclear material store at AEE Winfrith and is used to identify discrete packages of various nuclear materials. A mini-computer is utilized as a data store which, coupled with the Plessey bar-code system, produces physical inventory listings or inventory discrepancy reports very quickly. The time taken for a complete inventory of the store has been reduced from 60 man-days to 5 man-days. (author)

  17. INCAP ? Applying short-term flexibility to control inventories

    OpenAIRE

    Lödding, Hermann; Lohmann, Steffen

    2011-01-01

    Abstract Inventory Based Capacity Control (INCAP) is a very simple method that allows inventory levels to be effectively controlled by using short-term capacity flexibility in make-to-stock settings. Moreover, INCAP can be used for finished goods inventories as well as for semi-finished goods inventories. The basic idea is to define upper and lower inventory limits and to adjust capacities if the inventory level reaches either limit. Should the inventory fall below the lower limit,...

  18. How honey kills bacteria

    NARCIS (Netherlands)

    P.H.S. Kwakman; A.A. te Velde; L. de Boer; D. Speijer; C.M.J.E. Vandenbroucke-Grauls; S.A.J. Zaat

    2010-01-01

    With the rise in prevalence of antibiotic-resistant bacteria, honey is increasingly valued for its antibacterial activity. To characterize all bactericidal factors in a medical-grade honey, we used a novel approach of successive neutralization of individual honey bactericidal factors. All bacteria t

  19. Quantum gravity and inventory accumulation

    CERN Document Server

    Sheffield, Scott

    2011-01-01

    We begin by studying inventory accumulation at a LIFO (last-in-first-out) retailer with two products. In the simplest version, the following occur with equal probability at each time step: first product ordered, first product produced, second product ordered, second product produced. The inventory thus evolves as a simple random walk on Z^2. In more interesting versions, a p fraction of customers orders the "freshest available" product regardless of type. We show that the corresponding random walks scale to Brownian motions with diffusion matrices depending on p. We then turn our attention to the critical Fortuin-Kastelyn random planar map model, which gives, for each q>0, a probability measure on random (discretized) two-dimensional surfaces decorated by loops, related to the q-state Potts model. A longstanding open problem is to show that as the discretization gets finer, the surfaces converge in law to a limiting (loop-decorated) random surface. The limit is expected to be a Liouville quantum gravity surfa...

  20. Metallization of bacteria cells

    Institute of Scientific and Technical Information of China (English)

    LI; Xiangfeng; (黎向锋); LI; Yaqin; (李雅芹); CAI; Jun; (蔡军); ZHANG; Deyuan; (张德远)

    2003-01-01

    Bacteria cells with different standard shapes are well suited for use as templates for the fabrication of magnetic and electrically conductive microstructures. In this paper, metallization of bacteria cells is demonstrated by an electroless deposition technique of nickel-phosphorus initiated by colloid palladium-tin catalyst on the surfaces of Citeromyces matritensis and Bacillus cereus. The activated and metallized bacteria cells have been characterized by scanning electron microscopy (SEM), transmission electron microscopy (TEM) and X-ray diffraction analysis (XRD). Results showed that both Citeromyces matritensis and Bacillus cereus had no deformation in shape after metallization; the metallized films deposited on the surfaces of bacteria cells are homogeneous in thickness and noncrystalline in phase structure. The kinetics of colloid palladium-tin solution and electroless plating on bacteria cells is discussed.

  1. Advanced Data Collection for Inventory Management

    Science.gov (United States)

    Opresko, G. A.; Leet, J. H.; Mcgrath, D. F.; Eidson, J.

    1987-01-01

    Bar-coding, radio-frequency, and voice-operated systems selected. Report discusses study of state-of-the-art in automated collection of data for management of large inventories. Study included comprehensive search of literature on data collection and inventory management, visits to existing automated inventory systems, and tours of selected supply and transportation facilities at Kennedy Space Center. Information collected analyzed in view of needs of conceptual inventory-management systems for Kennedy Space Center and for manned space station and other future space projects.

  2. GIS Applications in Urban Tree Inventory

    OpenAIRE

    Otey, Jennifer K.

    2007-01-01

    This project evaluates and demonstrates some applications of a GIS-based urban tree inventory. This was done by (1) collecting and analyzing data for Tinker Air Force Base (AFB), and (2) collecting and evaluating data for the Virginia Tech campus tree inventory. The urban tree inventory at Tinker AFB was estimated using remote sensing techniques that included the use of the eCognition 3.0 software. Inventory data was collected using a handheld computer and transferred to a desktop for data ba...

  3. Plastic antibody for the recognition of chemical warfare agent sulphur mustard.

    Science.gov (United States)

    Boopathi, M; Suryanarayana, M V S; Nigam, Anil Kumar; Pandey, Pratibha; Ganesan, K; Singh, Beer; Sekhar, K

    2006-06-15

    Molecularly imprinted polymers (MIPs) known as plastic antibodies (PAs) represent a new class of materials possessing high selectivity and affinity for the target molecule. Since their discovery, PAs have attracted considerable interest from bio- and chemical laboratories to pharmaceutical institutes. PAs are becoming an important class of synthetic materials mimicking molecular recognition by natural receptors. In addition, they have been utilized as catalysts, sorbents for solid-phase extraction, stationary phase for liquid chromatography and mimics of enzymes. In this paper, first time we report the preparation and characterization of a PA for the recognition of blistering chemical warfare agent sulphur mustard (SM). The SM imprinted PA exhibited more surface area when compared to the control non-imprinted polymer (NIP). In addition, SEM image showed an ordered nano-pattern for the PA of SM that is entirely different from the image of NIP. The imprinting also enhanced SM rebinding ability to the PA when compared to the NIP with an imprinting efficiency (alpha) of 1.3.

  4. China’s Three Warfares Strategy Mitigates Fallout From Cyber Espionage Activities

    Directory of Open Access Journals (Sweden)

    Emilio Iasiello

    2016-06-01

    Full Text Available China is engaged in longstanding cyber espionage against the U.S., as well as other nations, to collect sensitive public and private information in support of national objectives laid out in its 12th Five Year Plan. Foreign governments citing China’s malfeasance have rebuked these activities, a claim vehemently denied by Beijing. In response, China is leveraging the “Three Warfares” an integrated three-prong information warfare strategy to combat these accusations by leveraging Media, Legal, and Psychological components designed to influence the international community. While the United States has threatened the imposition of economic sanctions, Beijing has successfully parried consequential actions by arresting U.S.-identified hackers, thereby demonstrating its commitment toward preserving a stable and peaceful cyberspace. These interrelated “Three Warfares” disciplines have targeted the cognitive processes of the U.S. leadership, as well as the international public’s perception of China as a global threat, thereby having successfully forestalled the implementation of any effective punitive or economic deterrence strategy to include the imposition of cyber sanctions.

  5. Extraordinary Measures: Drone Warfare, Securitization, and the “War on Terror”

    Directory of Open Access Journals (Sweden)

    Romaniuk Scott Nicholas

    2015-07-01

    Full Text Available The use of unmanned aerial vehicles or “drones,” as part of the United States’ (US targeted killing (TK program dramatically increased after the War on Terror (WoT was declared. With the ambiguous nature and parameters of the WoT, and stemming from the postulation of numerous low-level, niche-, and other securitizations producing a monolithic threat, US drone operations now constitute a vital stitch in the extensive fabric of US counterterrorism policy. This article employs the theories of securitization and macrosecuritization as discussed by Buzan (1991, 2006, and Buzan and Wæver (2009 to understand targeted killing, by means of weaponized drones, as an extraordinary measure according to the Copenhagen School’s interpretation. An overarching securitization and the use of the “security” label warrants the emergency action of targeted killing through the use of drones as an extraordinary measure. We argue that the WoT serves as a means of securitizing global terrorism as a threat significant enough to warrant the use of drone warfare as an extraordinary use of force. By accepting the WoT as a securitization process we can reasonably accept that the US’ response(s against that threat are also securitized and therefore become extraordinary measures.

  6. Approximation and Filtering Techniques for Navigation Data in Time-critical Electronic Warfare Systems

    Directory of Open Access Journals (Sweden)

    Vanitha D.

    2013-03-01

    Full Text Available This paper presents a holistic solution to the navigation requirements in a time critical electronic warfare systems like missile warning systems (MWS. In a passive MWS using IR sensors the efficiency of the system is determined by attributes such as low false alarm rate, minimal response time and ability to track different IR radiating objects by association and correlation of consecutive detections through time. Such a system is required to be supported by a navigation system capable of accurate estimation of the aircraft position, attitude angles and altitude. In this paper, estimation techniques used to accurately calculate aircraft navigation data at the time of capture of IR frames are discussed. The paper discusses about synchronization of INGPS, IR sensors & Processor on to same timeline. The paper also intends to evaluate the performance of wavelet transform filter in effective elimination of noise in navigation parameters like acceleration and attitude angle rates for a better estimation of position and attitude.Defence Science Journal, 2013, 63(2, pp.204-209, DOI:http://dx.doi.org/10.14429/dsj.63.4265

  7. Medical effects of internal contamination with actinides: further controversy on depleted uranium and radioactive warfare.

    Science.gov (United States)

    Durakovic, Asaf

    2016-05-01

    The Nuclear Age began in 1945 with testing in New Mexico, USA, and the subsequent bombings of Hiroshima and Nagasaki. Regardless of attempts to limit the development of nuclear weapons, the current world arsenal has reached the staggering dimensions and presents a significant concern for the biosphere and mankind. In an explosion of a nuclear weapon, over 400 radioactive isotopes are released into the biosphere, 40 of which pose potential dangers including iodine, cesium, alkaline earths, and actinides. The immediate health effects of nuclear explosions include thermal, mechanical, and acute radiation syndrome. Long-term effects include radioactive fallout, internal contamination, and long-term genotoxicity. The current controversial concern over depleted uranium's somatic and genetic toxicity is still a subject of worldwide sustained research. The host of data generated in the past decades has demonstrated conflicting findings, with the most recent evidence showing that its genotoxicity is greater than previously considered. Of particular concern are the osteotropic properties of uranium isotopes due to their final retention in the crystals of exchangeable and nonexchangeable bone as well as their proximity to pluripotent stem cells. Depleted uranium remains an unresolved issue in both warfare and the search for alternative energy sources.

  8. Efficacy of liquid and foam decontamination technologies for chemical warfare agents on indoor surfaces.

    Science.gov (United States)

    Love, Adam H; Bailey, Christopher G; Hanna, M Leslie; Hok, Saphon; Vu, Alex K; Reutter, Dennis J; Raber, Ellen

    2011-11-30

    Bench-scale testing was used to evaluate the efficacy of four decontamination formulations on typical indoor surfaces following exposure to the liquid chemical warfare agents sarin (GB), soman (GD), sulfur mustard (HD), and VX. Residual surface contamination on coupons was periodically measured for up to 24h after applying one of four selected decontamination technologies [0.5% bleach solution with trisodium phosphate, Allen Vanguard Surface Decontamination Foam (SDF™), U.S. military Decon Green™, and Modec Inc. and EnviroFoam Technologies Sandia Decontamination Foam (DF-200)]. All decontamination technologies tested, except for the bleach solution, performed well on nonporous and nonpermeable glass and stainless-steel surfaces. However, chemical agent residual contamination typically remained on porous and permeable surfaces, especially for the more persistent agents, HD and VX. Solvent-based Decon Green™ performed better than aqueous-based bleach or foams on polymeric surfaces, possibly because the solvent is able to penetrate the polymer matrix. Bleach and foams out-performed Decon Green for penetrating the highly polar concrete surface. Results suggest that the different characteristics needed for an ideal and universal decontamination technology may be incompatible in a single formulation and a strategy for decontaminating a complex facility will require a range of technologies.

  9. Metabolic Syndrome in Chemical Warfare Patients with Chronic Obstructive Pulmonary Disease

    Directory of Open Access Journals (Sweden)

    Shahrzad M. Lari

    2014-11-01

    Full Text Available   Introduction: Sulfur mustard (SM, a toxic alkylating gas, can cause serious long-term pulmonary complications such as chronic obstructive pulmonary disease (COPD. Metabolic syndrome (MetS is one of the important comorbidities of COPD. This study was designed to evaluate the frequency of metabolic syndrome in Iranian chemical warfare patients (CWPs with COPD. Materials and Methods: Thirty CWPs with a mean age of 46.93± 6.8 were enrolled in this study. The following parameters were studied in: complete pulmonary function tests, health-related quality of life, serum triglycerides (TG, high density lipoprotein (HDL and fasting blood sugar (FBS levels. Additionally, 32 COPD patients and 56 healthy persons were considered as control groups who were matched to CWPs. Results: We found a statistically significant difference in the frequency of MetS between the COPD patients and the healthy control group (p=0.04. Additionally, we observed a statistically significant difference in the mean HDL levels among these groups (p=

  10. Chemical and Biological Warfare: Should Rapid Detection Techniques Be Researched To Dissuade Usage? A Review

    Directory of Open Access Journals (Sweden)

    Mark R. Hurst

    2005-01-01

    Full Text Available Chemistry, microbiology and genetic engineering have opened new doorways for the human race to propel itself to a better future. However, there is a darker side to Bioengineering. One element of this is the manufacture and proliferation of biological and chemical weapons. It is clearly in the interest of humankind to prevent the future use of such weapons of mass destruction. Though many agents have been proposed as potential biological and chemical weapons, the feasibility of these weapons is a matter of conjecture. The unpredictable and indiscriminate devastation caused by natural epidemics and hazardous chemicals during wartime without medical treatment should warn humans of the dangers of employing them as weapons. This study argues rapid detection techniques may dissuade future use. Many agents are far less toxic to treatment. A quick response time to most attacks will decrease the chances of serious health issues. The agent will be less effective and discourage the attacker from using the weapon. Fortunately, the Chemical and Biological Weapons Convention (CWCIBWC allows defensive work in the area of biological and chemical weapons. Consequently, the review will discuss history, delivery/dispersal systems and specific agents of the warfare. The study presents current developments in biosensors for toxic materials of defense interest. It concludes with future directions for biosensor development.

  11. Medical effects of internal contamination with actinides: further controversy on depleted uranium and radioactive warfare.

    Science.gov (United States)

    Durakovic, Asaf

    2016-05-01

    The Nuclear Age began in 1945 with testing in New Mexico, USA, and the subsequent bombings of Hiroshima and Nagasaki. Regardless of attempts to limit the development of nuclear weapons, the current world arsenal has reached the staggering dimensions and presents a significant concern for the biosphere and mankind. In an explosion of a nuclear weapon, over 400 radioactive isotopes are released into the biosphere, 40 of which pose potential dangers including iodine, cesium, alkaline earths, and actinides. The immediate health effects of nuclear explosions include thermal, mechanical, and acute radiation syndrome. Long-term effects include radioactive fallout, internal contamination, and long-term genotoxicity. The current controversial concern over depleted uranium's somatic and genetic toxicity is still a subject of worldwide sustained research. The host of data generated in the past decades has demonstrated conflicting findings, with the most recent evidence showing that its genotoxicity is greater than previously considered. Of particular concern are the osteotropic properties of uranium isotopes due to their final retention in the crystals of exchangeable and nonexchangeable bone as well as their proximity to pluripotent stem cells. Depleted uranium remains an unresolved issue in both warfare and the search for alternative energy sources. PMID:27002520

  12. Stem-loop oligonucleotide beacons as switches for amplifying-fluorescent-polymer-based biological warfare sensors

    Science.gov (United States)

    Clinkenbeard, Kenneth D.; Ramachandran, Akhilesh; Malayer, Jerry R.; Moon, Joong Ho; Hancock, Lawrence F.

    2003-09-01

    Sensors that are exceptionally sensitive with real-time outputs and minimal consumption of reagents are needed to continuously monitor air and water against bioterrorist incidents. Amplifying fluorescent polymers (AFP) provide exceptionally sensitive real-time reagentless sensor platforms as applied to detection of nitroaromatic explosives. This platform technology has the potential to be adapted to detect biological warfare (BW) agents by covalently attaching the 5" end of stem-loop molecular beacons to AFP as DNA hybridization signal transduction switches. Molecular beacons with loop sequences specific for sequence signatures of a target BW agent are configured with a quencher on the end of the 3" arm of the stem-loop. The AFP is quenched in the absence of target DNA, but upon hybridization with target the stem is melted, the duplex loop extended, and the AFP dequenched. This signal transduction is reversible upon removal of the target sequence with the molecular beacon reforming the stem-loop conformation. Proof-of-concept research has demonstrated that molecular beacons for signature sequences of Francisella tularensis result in correct identification of the presence of this agent in samples, but no false positives were seen with Escherichia coli.

  13. Detection of biological warfare agents with fiber-optic microsphere-based DNA arrays

    Science.gov (United States)

    Song, Linan; Walt, David R.

    2005-11-01

    Biological warfare agents (BWAs) pose significant threats to both military forces and civilian populations. The increased concern about bioterrorism has promoted the development of rapid, sensitive, and reliable detection systems to provide an early warning for detecting the release of BWAs. We have developed a high-density DNA array to detect BWAs in real environmental samples with fast response times and high sensitivity. An optical fiber bundle containing approximately 50,000 individual 3.1 μm diameter fibers was chemically etched to yield an array of microwells and used as the substrate for the array. 50-mer single-stranded DNA probes designed to be specific for target BWAs were covalently attached to 3.1-μm microspheres, and the microspheres were distributed into the microwells to form a randomized high-density DNA array. We demonstrated the applicability of this DNA array for the identification of Bacillus thuringiensis kurstaki, a BWA simulant, in real samples. PCR was used to amplify the sequences, introduce fluorescent labels into the target molecules, and provide a second level of specificity. After hybridization of test solutions to the array, analysis was performed by evaluating the specific responses of individual probes on the array.

  14. Mass spectrometric study of selected precursors and degradation products of chemical warfare agents.

    Science.gov (United States)

    Papousková, Barbora; Bednár, Petr; Frysová, Iveta; Stýskala, Jakub; Hlavác, Jan; Barták, Petr; Ulrichová, Jitka; Jirkovský, Jaromír; Lemr, Karel

    2007-12-01

    Selected precursors and degradation products of chemical warfare agents namely N,N-dialkylaminoethane-2-ols, N,N-dialkylaminoethyl-2-chlorides and some of related N-quaternary salts were studied by means of electrospray ionization-multiple tandem mass spectrometry (ESI-MS(n)). Proposed structures were confirmed with accurate mass measurement. General fragmentation patterns of these compounds are discussed in detail and suggested processes are confirmed using deuterated standards. The typical processes are elimination of alkene, hydrogen chloride, or water, respectively. Besides, elimination of ethene from propyl chain under specific conditions was observed and unambiguously confirmed using exact mass measurement and labelled standard. The potential of mass spectrometry to distinguish the positional isomers occurring among the studied compounds is reviewed in detail using two different MS instruments (i.e. ion trap and hybrid quadrupole-time of flight (Q-TOF) analyzer). A new microcolumn liquid chromatography (microLC)/MS(n) method was designed for the cases where the resolution based solely on differences in fragmentation is not sufficient. Low retention of the derivatives on reversed phase (RP) was overcome by using addition of less typical ion pairing agent (1 mM/l, 3,5-dinitrobenzoic acid) to the mobile phase (mixture water : acetonitrile). PMID:18085550

  15. Magnetic hydrophilic-lipophilic balance sorbent for efficient extraction of chemical warfare agents from water samples.

    Science.gov (United States)

    Singh, Varoon; Purohit, Ajay Kumar; Chinthakindi, Sridhar; Goud D, Raghavender; Tak, Vijay; Pardasani, Deepak; Shrivastava, Anchal Roy; Dubey, Devendra Kumar

    2016-02-19

    Magnetic hydrophilic-lipophilic balance (MHLB) hybrid resin was prepared by precipitation polymerization using N-vinylpyrrolidone (PVP) and divinylbenzene (DVB) as monomers and Fe2O3 nanoparticles as magnetic material. These resins were successfully applied for the extraction of chemical warfare agents (CWAs) and their markers from water samples through magnetic dispersive solid-phase extraction (MDSPE). By varying the ratios of monomers, resin with desired hydrophilic-lipophilic balance was prepared for the extraction of CWAs and related esters of varying polarities. Amongst different composites Fe2O3 nanoparticles coated with 10% PVP+90% DVB exhibited the best recoveries varying between 70.32 and 97.67%. Parameters affecting the extraction efficiencies, such as extraction time, desorption time, nature and volume of desorption solvent, amount of extraction sorbent and the effect of salts on extraction were investigated. Under the optimized conditions, linearity was obtained in the range of 0.5-500 ng mL(-1) with correlation ranging from 0.9911-0.9980. Limits of detection and limits of quantification were 0.5-1.0 and 3.0-5.0 ng mL(-1) respectively with RSDs varying from 4.88-11.32% for markers of CWAs. Finally, the developed MDSPE method was employed for extraction of analytes from water samples of various sources and the OPCW proficiency test samples. PMID:26814366

  16. Healthcare and warfare. Medical space, mission and apartheid in twentieth century northern Namibia.

    Science.gov (United States)

    Nord, Catharina

    2014-07-01

    In the year 1966, the first government hospital, Oshakati hospital, was inaugurated in northern South-West Africa. It was constructed by the apartheid regime of South Africa which was occupying the territory. Prior to this inauguration, Finnish missionaries had, for 65 years, provided healthcare to the indigenous people in a number of healthcare facilities of which Onandjokwe hospital was the most important. This article discusses these two agents' ideological standpoints. The same year, the war between the South-West African guerrillas and the South African state started, and continued up to 1988. The two hospitals became involved in the war; Oshakati hospital as a part of the South African war machinery, and Onandjokwe hospital as a 'terrorist hospital' in the eyes of the South Africans. The missionary Onandjokwe hospital was linked to the Lutheran church in South-West Africa, which became one of the main critics of the apartheid system early in the liberation war. Warfare and healthcare became intertwined with apartheid policies and aggression, materialised by healthcare provision based on strategic rationales rather than the people's healthcare needs. When the Namibian state took over a ruined healthcare system in 1990, the two hospitals were hubs in a healthcare landscape shaped by missionary ambitions, war and apartheid logic.

  17. Global physics: from percolation to terrorism, guerilla warfare and clandestine activities

    Science.gov (United States)

    Galam, Serge

    2003-12-01

    The September 11 attack on the US has revealed an unprecedented terrorism with worldwide range of destruction. It is argued to result from the first worldwide percolation of passive supporters. They are people sympathetic to the terrorism cause but without being involved with it. They just do not oppose it in case they could. This scheme puts suppression of the percolation as the major strategic issue in the fight against terrorism. Acting on the population is shown to be useless. Instead a new strategic scheme is suggested to increase the terrorism percolation threshold and in turn suppress the percolation. The relevant associated space is identified as a multi-dimensional social space including both the ground earth surface and all various independent flags displayed by the terrorist group. Some hints are given on how to shrink the geographical spreading of terrorism threat. The model apply to a large spectrum of clandestine activities including guerilla warfare as well as tax evasion, corruption, illegal gambling, illegal prostitution and black markets.

  18. Danish emission inventories for stationary combustion plants. Inventories until 2008

    Energy Technology Data Exchange (ETDEWEB)

    Nielsen, Malene; Nielsen, Ole-Kenneth; Plejdrup, M.; Hjelgaard, K.

    2010-10-15

    Emission inventories for stationary combustion plants are presented and the methodologies and assumptions used for the inventories are described. The pollutants considered are SO{sub 2}, NO{sub x}, NMVOC, CH{sub 4}, CO, CO{sub 2}, N{sub 2}O, NH{sub 3}, particulate matter, heavy metals, dioxins, HCB and PAH. The CO{sub 2} emission in 2008 was 16 % lower than in 1990. However, fluctuations in the emission level are large as a result of electricity import/export. The emission of CH{sub 4} has increased due to increased use of lean-burn gas engines in combined heating and power (CHP) plants. However, the emission has decreased in recent years due to structural changes in the Danish electricity market. The N{sub 2}O emission was higher in 2008 than in 1990 but the fluctuations in the time-series are significant. A considerable decrease of the SO{sub 2}, NO{sub x} and heavy metal emissions is mainly a result of decreased emissions from large power plants and waste incineration plants. The combustion of wood in residential plants has increased considerably in recent years resulting in increased emission of PAH, particulate matter and CO. The emission of NMVOC has increased since 1990 as a result of both the increased combustion of wood in residential plants and the increased emission from lean-burn gas engines. The dioxin emission decreased since 1990 due to flue gas cleaning on waste incineration plants. However in recent years the emission has increased as a result of the increased combustion of wood in residential plants. (Author)

  19. THEORY OF SPARE PARTS INVENTORY MANAGEMENT FOR PRODUCTION EQUIPMENT

    OpenAIRE

    KATARZYNA GRONDYS

    2013-01-01

    This article presents theoretical basis of spare parts inventory management in manufacturing company. Basis definitions, allocation and differences in spare parts inventory management were compared with other manufacturing inventories. The issue of spare parts inventory management is emphasized in aspect of maintaining continuity of production and generated costs of maintaining inventory.

  20. Danish emission inventories for agriculture

    DEFF Research Database (Denmark)

    Mikkelsen, Mette Hjorth; Albrektsen, Rikke; Gyldenkærne, Steen

    By regulations given in international conventions Denmark is obliged to work out an annual emission inventory and document the methodology. The National Environmental Research Institute (NERI) at Aarhus University (AU) in Denmark is responsible for calculating and reporting the emissions....... This report contains a description of the emissions from the agricultural sector from 1985 to 2009. Furthermore, the report includes a detailed description of methods and data used to calculate the emissions, which is based on national methodologies as well as international guidelines. For the Danish...... emissions calculations and data management an Integrated Database model for Agricultural emissions (IDA) is used. The emission from the agricultural sector includes emission of the greenhouse gases methane (CH4), nitrous oxide (N2O), ammonia (NH3), particulate matter (PM), non-methane volatile organic...

  1. Hospital inventory: the big little risk.

    Science.gov (United States)

    Conner, Brian

    2016-06-01

    Pharmaceutical inventory management as an ancillary concern presents a risk for hospitals and health systems. Healthcare leaders should look to prevent fraud as well as legal noncompliance. Leaders should consider not only how much inventory they need but also how to store it and who to assign to handling it. PMID:27451565

  2. Forest inventories for carbon change assessments

    NARCIS (Netherlands)

    Mohren, G.M.J.; Hasenauer, H.; Köhl, M.; Nabuurs, G.J.

    2012-01-01

    We give a general overview of forest inventory developments and their potential to estimate forest carbon budgets and GHG emissions. Forest inventories mostly focus on timber resources, but can be extended to cover other forest characteristics, such as forest biomass. From forest biomass, ecosystem

  3. Clean Lead Facility Inventory System user's manual

    International Nuclear Information System (INIS)

    The purpose of this user's manual is to provide instruction and guidance needed to enter and maintain inventory information for the Clean Lead Facility (CLF), PER-612. Individuals responsible for maintaining and using the system should study and understand the information provided. The user's manual describes how to properly use and maintain the CLF Inventory System. Annual, quarterly, monthly, and current inventory reports may be printed from the Inventory System for reporting purposes. Profile reports of each shipment of lead may also be printed for verification and documentation of lead transactions. The CLF Inventory System was designed on Microsoft Access version 2.0. Similar inventory systems are in use at the Idaho National Engineering Laboratory (INEL) to facilitate site-wide compilations of mixed waste data. The CLF Inventory System was designed for inventorying the clean or non-radioactive contaminated lead stored at the CLF. This data, along with the mixed waste data, will be compiled into the Idaho Mixed Waste Information (IMWI) system for reporting to the Department of Energy Idaho Office, Department of Energy Headquarters, and/or the State of Idaho

  4. Improving the Greenlandic Greenhouse Gas Inventory

    DEFF Research Database (Denmark)

    Nielsen, Ole-Kenneth; Baunbæk, Lene; Gyldenkærne, Steen;

    The project to improve the Greenlandic greenhouse gas (GHG) inventory was undertaken due to the recommendations made by the UNFCCC review team in connection with the 2008 and 2009 submissions by the Kingdom of Denmark. The improvements made to the Greenlandic GHG emission inventory were substantial...

  5. 76 FR 62327 - Retail Inventory Method

    Science.gov (United States)

    2011-10-07

    ...-3(e) (75 FR 78944), the amount of an allowance, discount, or price rebate a taxpayer earns by... Internal Revenue Service 26 CFR Part 1 RIN 1545-BJ64 Retail Inventory Method AGENCY: Internal Revenue... regulations relating to the retail inventory method of accounting. The regulations restate and clarify...

  6. Denmark’s National Inventory Report 2012

    DEFF Research Database (Denmark)

    Nielsen, Ole-Kenneth; Mikkelsen, Mette Hjorth; Hoffmann, Leif;

    This report is Denmark’s National Inventory Report 2012. The report contains information on Denmark’s emission inventories for all years’ from 1990 to 2010 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2...

  7. Greenhouse Gas Inventory in the Forestry Sector

    OpenAIRE

    Raquel V. Francisco; Quintana, Sofio

    1999-01-01

    Among the components in the inventory of greenhouse gas sources and sinks, forestry and land use are the most complex. This paper summarizes the necessary data on land use. Analysis indicates a change in the inventory/sinks done by the Philippine Forestry and Land Use Change.

  8. Dynamic pricing and learning with finite inventories

    NARCIS (Netherlands)

    Boer, den Arnoud; Zwart, Bert

    2013-01-01

    We study a dynamic pricing problem with finite inventory and parametric uncertainty on the demand distribution. Products are sold during selling seasons of finite length, and inventory that is unsold at the end of a selling season, perishes. The goal of the seller is to determine a pricing strategy

  9. Dynamic Pricing and Learning with Finite Inventories

    NARCIS (Netherlands)

    Zwart, A.P.; Boer, A.V. den

    2015-01-01

    We study a dynamic pricing problem with finite inventory and parametric uncertainty on the demand distribution. Products are sold during selling seasons of finite length, and inventory that is unsold at the end of a selling season perishes. The goal of the seller is to determine a pricing strategy t

  10. Dynamic pricing and learning with finite inventories

    NARCIS (Netherlands)

    Boer, den Arnoud V.; Zwart, Bert

    2015-01-01

    We study a dynamic pricing problem with finite inventory and parametric uncertainty on the demand distribution. Products are sold during selling seasons of finite length, and inventory that is unsold at the end of a selling season perishes. The goal of the seller is to determine a pricing strategy t

  11. 77 FR 5280 - Service Contracts Inventory

    Science.gov (United States)

    2012-02-02

    ... Contracts for Services for Fiscal Year (FY) 2011. The inventory includes service contract actions over $25... of Division C of the FY 2010 Consolidated Appropriations Act, Public Law 111-117, the NRC is... service contract actions over $25,000 that were awarded in FY 2011. The inventory contains the...

  12. Construct Validation of the Physics Metacognition Inventory

    Science.gov (United States)

    Taasoobshirazi, Gita; Farley, John

    2013-01-01

    The 24-item Physics Metacognition Inventory was developed to measure physics students' metacognition for problem solving. Items were classified into eight subcomponents subsumed under two broader components: knowledge of cognition and regulation of cognition. The students' scores on the inventory were found to be reliable and related to…

  13. Relativity Concept Inventory: Development, Analysis, and Results

    Science.gov (United States)

    Aslanides, J. S.; Savage, C. M.

    2013-01-01

    We report on a concept inventory for special relativity: the development process, data analysis methods, and results from an introductory relativity class. The Relativity Concept Inventory tests understanding of relativistic concepts. An unusual feature is confidence testing for each question. This can provide additional information; for example,…

  14. Development of Mentor Teacher Role Inventory

    Science.gov (United States)

    Koc, Ebru Melek

    2011-01-01

    This study aimed to develop and investigate the validity and reliability of the Mentor Teacher Role Inventory (MTRI). A total of 1843 student teachers in the Distance English Teacher Training Program participated in the study. The 58 items of the Mentor Teacher Role Inventory underwent principal factor analysis, which revealed nine factors…

  15. 48 CFR 3045.508 - Physical inventories.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Physical inventories. 3045.508 Section 3045.508 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND... Property in the Possession of Contractors 3045.508 Physical inventories....

  16. 40 CFR 52.1391 - Emission inventories.

    Science.gov (United States)

    2010-07-01

    ... Governor submitted the 1990 carbon monoxide base year emission inventory for Great Falls on April 23, 1997... Great Falls. (b) As part of the Thompson Falls Air Pollution Control Plan (approved at § 52.1370(c)(60)), the Governor of Montana submitted a PM-10 emission inventory for the Thompson Falls area as a...

  17. Annual Danish Informative Inventory Report to UNECE

    DEFF Research Database (Denmark)

    Nielsen, Ole-Kenneth; Winther, Morten; Mikkelsen, Mette Hjorth;

    2012-01-01

    This report is a documentation report on the emission inventories for Denmark as reported to the UNECE Secretariat under the Convention on Long Range Transboundary Air Pollution due by 15 February 2012. The report contains information on Denmark’s emission inventories regarding emissions of (1) S...

  18. Validity of the Decisional Process Inventory.

    Science.gov (United States)

    Marco, Cynthia D.; Hartung, Paul J.; Newman, Isadore; Parr, Patricia

    2003-01-01

    The Gestalt-based Decisional Process Inventory and measures of career indecision and vocational identity were completed by 201 subjects. Results supported the inventory's ability to differentiate by career choice states. Concurrent validity was supported, but confirmatory factor analysis did not support the factor structure regarding measurement…

  19. Inventory Data Package for Hanford Assessments

    Energy Technology Data Exchange (ETDEWEB)

    Kincaid, Charles T.; Eslinger, Paul W.; Aaberg, Rosanne L.; Miley, Terri B.; Nelson, Iral C.; Strenge, Dennis L.; Evans, John C.

    2006-06-01

    This document presents the basis for a compilation of inventory for radioactive contaminants of interest by year for all potentially impactive waste sites on the Hanford Site for which inventory data exist in records or could be reasonably estimated. This document also includes discussions of the historical, current, and reasonably foreseeable (1944 to 2070) future radioactive waste and waste sites; the inventories of radionuclides that may have a potential for environmental impacts; a description of the method(s) for estimating inventories where records are inadequate; a description of the screening method(s) used to select those sites and contaminants that might make a substantial contribution to impacts; a listing of the remedial actions and their completion dates for waste sites; and tables showing the best estimate inventories available for Hanford assessments.

  20. ON INVENTORY STRATEGIES OF ONLINE RETAILERS

    Institute of Scientific and Technical Information of China (English)

    Frank Y.CHEN; S.H. HUM; Cheryl H. SIM

    2005-01-01

    This study focuses on inventory strategies of Internet retailers (etailers). The etailer faces options of holding her own inventory or outsourcing through the third party(ies). We assess etailer inventory strategies through mathematical modeling and numerical experiments. When ordering and holding her own stock, the etailer has full control of the order fulfillment process but bears the inventory-related risk. When outsourcing stock, etailer's orders may not get an equal priority as for those of the third party's own. Built upon simple operations research models, the numerical experiments suggest that the etailer is better off relying on others to fulfill orders if her demand (profit margin) is low, but should revert to the strategy of maintaining her own inventory if her sales volume (profit margin) is relatively high. Other factors are also investigated. These findings seem to confirm what are being practiced in the industry.

  1. Extracellular communication in bacteria

    DEFF Research Database (Denmark)

    Chhabra, S.R.; Philipp, B.; Eberl, L.;

    2005-01-01

    molecules, in different Gram-positive and Gram-negative bacteria they control pathogenicity, secondary metabolite production, biofilm differentiation, DNA transfer and bioluminescence. The development of biosensors for the detection of these signal molecules has greatly facilitated their subsequent chemical...

  2. Indicator For Pseudomonas Bacteria

    Science.gov (United States)

    Margalit, Ruth

    1990-01-01

    Characteristic protein extracted and detected. Natural protein marker found in Pseudomonas bacteria. Azurin, protein containing copper readily extracted, purified, and used to prepare antibodies. Possible to develop simple, fast, and accurate test for marker carried out in doctor's office.

  3. Modern warfare as a significant form of zoogeomorphic disturbance upon the landscape

    Science.gov (United States)

    Hupy, Joseph P.; Koehler, Thomas

    2012-07-01

    The damage exerted by warfare on the physical landscape is one, of many, anthropogenic impacts upon the environment. Bombturbation is a term that describes the impacts of explosive munitions upon the landscape. Bombturbation, like many other forms of zoogeomorphology, is a disruptive force, capable of moving large amounts of sediments, and denuding landscapes to the point where changes in micro and mesotopography have long-term implications. The long term implication of bombturbative actions depends on the type and duration of explosive device that rendered the disturbance, and the geographic context of the landscape disturbed; i.e. cultural and physical factors. Recovery from bombturbative activity, in the context of this research, is measured by vegetative regrowth and soil development in cratered disturbances. A comparison and contrast between the two battlefields of Verdun, France and Khe Sanh, Vietnam show that bombturbative actions have significantly altered the topography at each location, thus influencing surface runoff and processes of soil development. Principals of the Runge pedogenic model, or the energy of water moving through the soil profile, best explain how the varying climate and parent material at each location influence post disturbance soil development rates. Whereas the data collected at Verdun suggest that explosive munitions have put that landscape on diverging path of development, thus rendering it much different post-disturbance landscape, Khe Sanh displays much different recovery patterns. Preliminary research at Khe Sanh indicates that reforestation and soil development following disturbance are not so much influenced by bombturbative patterns as land use activities in the area of study.

  4. Limitations and challenges in treatment of acute chemical warfare agent poisoning.

    Science.gov (United States)

    Thiermann, Horst; Worek, Franz; Kehe, Kai

    2013-12-01

    Recent news from Syria on a possible use of chemical warfare agents made the headlines. Furthermore, the motivation of terrorists to cause maximal harm shifts these agents into the public focus. For incidents with mass casualties appropriate medical countermeasures must be available. At present, the most important threats arise from nerve agents and sulfur mustard. At first, self-protection and protection of medical units from contamination is of utmost importance. Volatile nerve agent exposure, e.g. sarin, results in fast development of cholinergic crisis. Immediate clinical diagnosis can be confirmed on-site by assessment of acetylcholinesterase activity. Treatment with autoinjectors that are filled with 2mg atropine and an oxime (at present obidoxime, pralidoxime, TMB-4 or HI-6) are not effective against all nerve agents. A more aggressive atropinisation has to be considered and more effective oximes (if possible with a broad spectrum or a combination of different oximes) as well as alternative strategies to cope with high acetylcholine levels at synaptic sites should be developed. A further gap exists for the treatment of patients with sustained cholinergic crisis that has to be expected after exposure to persistent nerve agents, e.g. VX. The requirement for long-lasting artificial ventilation can be reduced with an oxime therapy that is optimized by using the cholinesterase status for guidance or by measures (e.g. scavengers) that are able to reduce the poison load substantially in the patients. For sulfur mustard poisoning no specific antidote is available until now. Symptomatic measures as used for treatment of burns are recommended together with surgical or laser debridement. Thus, huge amounts of resources are expected to be consumed as wound healing is impaired. Possible depots of sulfur mustard in tissues may aggravate the situation. More basic knowledge is necessary to improve substantially therapeutic options. The use of stem cells may provide a new

  5. Surface plasmon resonance detection of biological warfare agent Staphylococcal enterotoxin B using high affinity monoclonal antibody

    International Nuclear Information System (INIS)

    A novel sensitive method was developed for the detection as well as quantification of Staphylococcal enterotoxin B (SEB) using surface plasmon resonance (SPR). It is well known that the amount of SEB needed to cause the intoxication to human beings is very less and this concentration (0.02 μg/kg) is highly dangerous, hence, it is used as biological warfare agent. Thus, the need to develop a reliable and potential detection system against SEB is warranted. In the present work, SEB antibody was immobilized on carboxymethyldextran modified gold chip. The immobilization of SEB antibody and interaction of antigen with immobilized antibody were in-situ characterized by SPR and electrochemical impedance spectroscopy. A sample solution containing SEB antigen was injected in a working channel and the results revealed linearity in the concentration from 2.0 to 32.0 pM with a detection limit of 1.0 pM. By using kinetic evaluation software, KD (equilibrium constant) and Bmax (maximum binding capacity of analyte) values were calculated and found to be 13 pM and 424.23, respectively. Moreover, the thermodynamic parameter, change in Gibb's free energy was deduced and found to be -62.08 kJ/mol and this value shows the spontaneous interaction between SEB antigen and SEB antibody. In order to optimize the detection method, temperature and pH variation studies were also performed. Interference study was conducted to know the selectivity for the antigen-antibody interaction of SEB. The selectivity efficiency of SEB, SEC, SEA and SED were 100, 27.15, 20.01 and 12.05%, respectively towards SEB antibody.

  6. Multiple functional UV devices based on III-Nitride quantum wells for biological warfare agent detection

    Science.gov (United States)

    Wang, Qin; Savage, Susan; Persson, Sirpa; Noharet, Bertrand; Junique, Stéphane; Andersson, Jan Y.; Liuolia, Vytautas; Marcinkevicius, Saulius

    2009-02-01

    We have demonstrated surface normal detecting/filtering/emitting multiple functional ultraviolet (UV) optoelectronic devices based on InGaN/GaN, InGaN/AlGaN and AlxGa1-xN/AlyGa1-yN multiple quantum well (MQW) structures with operation wavelengths ranging from 270 nm to 450 nm. Utilizing MQW structure as device active layer offers a flexibility to tune its long cut-off wavelength in a wide UV range from solar-blind to visible by adjusting the well width, well composition and barrier height. Similarly, its short cut-off wavelength can be adjusted by using a GaN or AlGaN block layer on a sapphire substrate when the device is illuminated from its backside, which further provides an optical filtering effect. When a current injects into the device under forward bias the device acts as an UV light emitter, whereas the device performs as a typical photodetector under reverse biases. With applying an alternating external bias the device might be used as electroabsorption modulator due to quantum confined Stark effect. In present work fabricated devices have been characterized by transmission/absorption spectra, photoresponsivity, electroluminescence, and photoluminescence measurements under various forward and reverse biases. The piezoelectric effect, alloy broadening and Stokes shift between the emission and absorption spectra in different InGaN- and AlGaN-based QW structures have been investigated and compared. Possibilities of monolithic or hybrid integration using such multiple functional devices for biological warfare agents sensing application have also be discussed.

  7. 78 FR 47273 - Information Collection; Inventory Property Management

    Science.gov (United States)

    2013-08-05

    ... Farm Service Agency Information Collection; Inventory Property Management AGENCY: Farm Service Agency... Inventory Property Management. The information is used to evaluate applicant requests to purchase inventory... Desk Officer for Agriculture, Office of Information and Regulatory Affairs, Office of Management...

  8. Geophysical Processes - MO 2016 Inventory of Landslide Occurrences (SHP)

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — The Missouri Inventory of Landslide Occurrences (MILO) is a statewide inventory of landslides and slope failure occurrences. Landslides can occur anywhere a hill...

  9. Treatment of chemical warfare agents by zero-valent iron nanoparticles and ferrate(VI)/(III) composite

    International Nuclear Information System (INIS)

    Highlights: ► Ferrate(VI) has been found to be highly efficient to decontaminate chemical warfare agents. ► Fast degradation of sulfur mustard, soman and compound VX by ferrate(VI). ► Nanoscale zero-valent iron particles are considerably less efficient in degradation of studied warfare agents compared to ferrate(VI). - Abstract: Nanoscale zero-valent iron (nZVI) particles and a composite containing a mixture of ferrate(VI) and ferrate(III) were prepared by thermal procedures. The phase compositions, valence states of iron, and particle sizes of iron-bearing compounds were determined by combination of X-ray powder diffraction, Mössbauer spectroscopy and scanning electron microscopy. The applicability of these environmentally friendly iron based materials in treatment of chemical warfare agents (CWAs) has been tested with three representative compounds, sulfur mustard (bis(2-chlorethyl) sulfide, HD), soman ((3,3′-imethylbutan-2-yl)-methylphosphonofluoridate, GD), and O-ethyl S-[2-(diisopropylamino)ethyl] methylphosphonothiolate (VX). Zero-valent iron, even in the nanodimensional state, had a sluggish reactivity with CWAs, which was also observed in low degrees of CWAs degradation. On the contrary, ferrate(VI)/(III) composite exhibited a high reactivity and complete degradations of CWAs were accomplished. Under the studied conditions, the estimated first-order rate constants (∼10−2 s−1) with the ferrate(VI)/(III) composite were several orders of magnitude higher than those of spontaneous hydrolysis of CWAs (10−8–10−6 s−1). The results demonstrated that the oxidative technology based on application of ferrate(VI) is very promising to decontaminate CWAs.

  10. Multi-Product Inventory Optimization using Uniform Crossover Genetic Algorithm

    OpenAIRE

    S. Narmadha; Dr. V. Selladurai; G. Sathish,

    2010-01-01

    Inventory management is considered to be an important field in Supply Chain Management because the cost of inventories in a supply chain accounts for about 30 percent of the value of the product. The service provided to the customer eventually gets enhanced once the efficient and effective management of inventory is carried out all through the supply chain. The precise estimation of optimal inventory is essential since shortage of inventory yields to lost sales, while excess of inventory may ...

  11. Information Warfare and New Organizational Landscapes: An Inquiry into the ExxonMobil–Greenpeace Dispute over Climate Change

    OpenAIRE

    Mackay, Brad; Munro, I.

    2012-01-01

    A defining characteristic of the emergence of new organizational landscapes is that information is not just being used as a tool by organizations, as it is more usually understood, but also as a weapon in a ‘war of position’. As organizations seek to influence public perception over such emotive issues as climate change, conflict at the ideation level can give rise to information warfare campaigns. In this article, we analyse the ways in which ExxonMobil and Greenpeace employ distinctive info...

  12. Investigations of emergency destruction methods for recovered, explosively configured, chemical warfare munitions: Interim emergency destruction methods - evaluation report

    Energy Technology Data Exchange (ETDEWEB)

    Baer, M.R.; Cooper, P.W.; Kipp, M.E. [and others

    1995-07-01

    At the request of the U.S. Army Non-Stockpile Chemical Material Office, the Sandia Explosives Containment System Design Team investigated mature destruction systems for destroying recovered chemical warfare munitions (CWM). The goal of the investigations was to identify and examine available techniques for the destruction of recovered CWM. The result of this study is a recommendation for an interim solution, a solution for use on any munitions found while an optimal, long-term solution is developed. Sandia is also performing the long-term solution study to develop a system that destroys CWM, contains the blast and fragments, and destroys the chemical agent without insult to the environment.

  13. Chemical and biological warfare: Biochemistry, therapy, and treatment. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-12-01

    The bibliography contains citations concerning biochemistry, therapy, and treatment of the effects of military chemical and biological warfare agents. References include surveys and studies of immunizing agents and drugs, the efficacy of these drugs, and the effect of the drugs on the patient. Also included are biochemical studies, assay techniques, and antidote development, some of which is supported by animal studies. Citations concerning detection and warning, defoliants, protection, biology and toxicology, and general studies are covered in separate bibliographies.(Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  14. Chemical and biological warfare: Biochemistry, therapy, and treatment. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-11-01

    The bibliography contains citations concerning biochemistry, therapy, and treatment of the effects of military chemical and biological warfare agents. References include surveys and studies of immunizing agents and drugs, the efficacy of these drugs, and the effect of the drugs on the patient. Also included are biochemical studies, assay techniques, and antidote development, some of which is supported by animal studies. Citations concerning detection and warning, defoliants, protection, biology and toxicology, and general studies are covered in separate bibliographies.(Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  15. 竞技排球运动心理战理论模型的构建%Theoretical Models of Psychological Warfare Built in Competitive Volleyball

    Institute of Scientific and Technical Information of China (English)

    洪庆

    2011-01-01

    通过对军事心理学中心理战思想的精心研读,结合竞技排球运动与战场心理战的共通之处,从理论建设、专业人才建设、规章制度建设、谋略创新建设以及球队心理素质建设五个方面构建了竞技排球运动心理战的理论模型。%This article through the study of thoughts of psychological warfare in military psychology carefully, combined with the commons of volleyball and psychological warfare, from five aspects that construction of theory, construction of professional, and construction of rules and regulations, construction of counsel innovation and construction of team psychological quality to construct the theoretical model of psychological warfare of volleyball.

  16. Tradeoff Analysis for Optimal Multiobjective Inventory Model

    Directory of Open Access Journals (Sweden)

    Longsheng Cheng

    2013-01-01

    Full Text Available Deterministic inventory model, the economic order quantity (EOQ, reveals that carrying inventory or ordering frequency follows a relation of tradeoff. For probabilistic demand, the tradeoff surface among annual order, expected inventory and shortage are useful because they quantify what the firm must pay in terms of ordering workload and inventory investment to meet the customer service desired. Based on a triobjective inventory model, this paper employs the successive approximation to obtain efficient control policies outlining tradeoffs among conflicting objectives. The nondominated solutions obtained by successive approximation are further used to plot a 3D scatterplot for exploring the relationships between objectives. Visualization of the tradeoffs displayed by the scatterplots justifies the computation effort done in the experiment, although several iterations needed to reach a nondominated solution make the solution procedure lengthy and tedious. Information elicited from the inverse relationships may help managers make deliberate inventory decisions. For the future work, developing an efficient and effective solution procedure for tradeoff analysis in multiobjective inventory management seems imperative.

  17. The fecal bacteria

    Science.gov (United States)

    Sadowsky, Michael J.; Whitman, Richard L.

    2011-01-01

    The Fecal Bacteria offers a balanced, integrated discussion of fecal bacteria and their presence and ecology in the intestinal tract of mammals, in the environment, and in the food supply. This volume covers their use in examining and assessing water quality in order to offer protection from illnesses related to swimming in or ingesting contaminated water, in addition to discussing their use in engineering considerations of water quality, modeling, monitoring, and regulations. Fecal bacteria are additionally used as indicators of contamination of ready-to-eat foods and fresh produce. The intestinal environment, the microbial community structure of the gut microbiota, and the physiology and genomics of this broad group of microorganisms are explored in the book. With contributions from an internationally recognized group of experts, the book integrates medicine, public health, environmental, and microbiological topics in order to provide a unique, holistic understanding of fecal bacteria. Moreover, it shows how the latest basic science and applied research findings are helping to solve problems and develop effective management strategies. For example, readers will discover how the latest tools and molecular approaches have led to our current understanding of fecal bacteria and enabled us to improve human health and water quality. The Fecal Bacteria is recommended for microbiologists, clinicians, animal scientists, engineers, environmental scientists, food safety experts, water quality managers, and students. It will help them better understand fecal bacteria and use their knowledge to protect human and environmental health. They can also apply many of the techniques and molecular tools discussed in this book to the study of a broad range of microorganisms in a variety of habitats.

  18. National Coal Quality Inventory (NACQI)

    Energy Technology Data Exchange (ETDEWEB)

    Robert Finkelman

    2005-09-30

    The U.S. Geological Survey (USGS) conducted the National Coal Quality Inventory (NaCQI) between 1999 and 2005 to address a need for quality information on coals that will be mined during the next 20-30 years. Collaboration between the USGS, State geological surveys, universities, coal burning utilities, and the coal mining industry plus funding support from the Electric Power Research Institute (EPRI) and the U.S. Department of Energy (DOE) permitted collection and submittal of coal samples for analysis. The chemical data (proximate and ultimate analyses; major, minor and trace element concentrations) for 729 samples of raw or prepared coal, coal associated shale, and coal combustion products (fly ash, hopper ash, bottom ash and gypsum) from nine coal producing States are included. In addition, the project identified a new coal reference analytical standard, to be designated CWE-1 (West Elk Mine, Gunnison County, Colorado) that is a high-volatile-B or high-volatile-A bituminous coal with low contents of ash yield and sulfur, and very low, but detectable contents of chlorine, mercury and other trace elements.

  19. Inventory of state energy models

    Energy Technology Data Exchange (ETDEWEB)

    Melcher, A.G.; Gist, R.L.; Underwood, R.G.; Weber, J.C.

    1980-03-31

    These models address a variety of purposes, such as supply or demand of energy or of certain types of energy, emergency management of energy, conservation in end uses of energy, and economic factors. Fifty-one models are briefly described as to: purpose; energy system; applications;status; validation; outputs by sector, energy type, economic and physical units, geographic area, and time frame; structure and modeling techniques; submodels; working assumptions; inputs; data sources; related models; costs; references; and contacts. Discussions in the report include: project purposes and methods of research, state energy modeling in general, model types and terminology, and Federal legislation to which state modeling is relevant. Also, a state-by-state listing of modeling efforts is provided and other model inventories are identified. The report includes a brief encylopedia of terms used in energy models. It is assumed that many readers of the report will not be experienced in the technical aspects of modeling. The project was accomplished by telephone conversations and document review by a team from the Colorado School of Mines Research Institute and the faculty of the Colorado School of Mines. A Technical Committee (listed in the report) provided advice during the course of the project.

  20. Managing inventory costs through joint procurement programs

    International Nuclear Information System (INIS)

    Given current economic and regulatory challenges, utilities are facing the need to manage inventories more efficiently, lower spare parts costs, and reduce the downtime associated with equipment failure. Two programs helping utilities achieve these goals are the Joint Procurement Corporation (JPC) for multicompany purchase of common equipment and services and the pooled inventory management (PIM) program for joint purchase and storage of nuclear generating unit spare parts. Both of these are cooperative programs that decrease the probability of extended plant outages and reduce duplication of effort and/or inventory among participating utilities

  1. Context sensitivity in the force concept inventory

    Directory of Open Access Journals (Sweden)

    Gay Stewart

    2007-02-01

    Full Text Available The force concept inventory and a 10-question context-modified test were given to 647 students enrolled in introductory physics classes at the University of Arkansas. Context changes had an effect ranging from −3% to 10% on the individual questions. The average student score on the ten transformed questions was 3% higher than the average student score on the corresponding 10 force concept inventory questions. Therefore, the effect of contextual changes on the total of the 10 questions is not sufficient to affect normal use of the force concept inventory as a diagnostic instrument.

  2. Inventory of inquiry learning programs - updated version

    OpenAIRE

    Gijlers, Hannie; Dimitrakopoulou, Angelique; De Jong, Ton; Van Joolingen, Wouter

    2005-01-01

    Deliverable 18.1.2 presents the updated version of the inventory of inquiry learning programs of the Computer supported inquiry learning SIG. The aim of the inventory is to develop an exhaustive overview of applications, tools, web environments, and resources in the field of inquiry learning. The complete inventory is available on the website of the SIG (http://kaleidoscope.gw.utwente.nl/SIG.IL/). The present Deliverable (18.1.2) provides a description the changes that have been made and the ...

  3. A tree species inventory over Europe

    Science.gov (United States)

    Ambelas Skjøth, C.; Geels, C.; Hvidberg, M.; Hertel, O.; Brandt, J.; Frohn, L. M.; Hansen, K. M.; Hedegaard, G. B.; Christensen, J. H.; Moseholm, L.

    2009-04-01

    Atmospheric transport models are used in studies of atmospheric chemistry as well as aerobiology. Atmospheric transport models in general needs accurate emissions inventories, which includes biogenic emissions such as Volatile Organic Compounds (VOCs) and pollen. Trees are important VOC and pollen sources and a needed requirement is specie distribution which takes into account important species such as Betula and Alnus. We present here a detailed tree species inventory covering Europe, parts of Africa and parts of Asia. Forest inventories have been obtained for each European country, parts of Asia and parts of Africa. The national inventories vary with respect to number of species as well as the number of sub-regions each nation is divided into. The inventories are therefore harmonised within a GIS system and afterwards gridded to the model grid defined by the EMEP model: 50 km x 50 km. The inventory is designed to be used with existing land-use data, which separates forest cover into broad leaved, mixed and conifer forests. This will be exemplified by using two different remote sensing products with different grid resolution such as GLC2000 and CLC2000 in selected areas. The final inventory includes 16 conifer species and 23 broadleaved species that are important for biogenic VOCs or pollen emission calculations. For example: Oak (Quercus), poplar (Populus), pines (Pinus), spruce (Picea), birch (Betula) and alder (Alnus). 774 regions with forest inventories are included, mainly on sub-national level. The coverage of each specie ranges from national to European scale, where the latter includes VOC and allergy relevant species such as Quercus, Alnus and Betula. The inventory is gridded to the model grid defined by the EMEP model, which is also the basis for many emissions inventories throughout Europe. The inventory is therefore prepared for easy implementation into atmospheric transport models by providing an extension to already applied land use data such as the

  4. Danish emission inventory for agriculture. Inventories 1985 - 2009

    Energy Technology Data Exchange (ETDEWEB)

    Hjorth Mikkelsen, M.; Albrektsen, R.; Gyldenkaerne, S.

    2011-02-15

    By regulations given in international conventions Denmark is obliged to work out an annual emission inventory and document the methodology. The National Environmental Research Institute (NERI) at Aarhus University (AU) in Denmark is responsible for calculating and reporting the emissions. This report contains a description of the emissions from the agricultural sector from 1985 to 2009. Furthermore, the report includes a detailed description of methods and data used to calculate the emissions, which is based on national methodologies as well as international guidelines. For the Danish emissions calculations and data management an Integrated Database model for Agricultural emissions (IDA) is used. The emission from the agricultural sector includes emission of the greenhouse gases methane (CH{sub 4}), nitrous oxide (N{sub 2}O), ammonia (NH{sub 3}), particulate matter (PM), non-methane volatile organic compounds (NMVOC) and other pollutants related to the field burning of agricultural residue such as NO{sub x}, CO{sub 2}, CO, SO{sub 2}, heavy metals, dioxin and PAH. The ammonia emission from 1985 to 2009 has decreased from 119 300 tonnes of NH{sub 3} to 73 800 tonnes NH{sub 3}, corresponding to a 38 % reduction. The emission of greenhouse gases has decreased by 25 % from 12.9 M tonnes CO{sub 2} equivalents to 9.6 M tonnes CO{sub 2} equivalents from 1985 to 2009. Improvements in feed efficiency and utilisation of nitrogen in livestock manure are the most important reasons for the reduction of both the ammonia and greenhouse gas emissions. (Author)

  5. Research on the Interaction of Hydrogen-Bond Acidic Polymer Sensitive Sensor Materials with Chemical Warfare Agents Simulants by Inverse Gas Chromatography

    Directory of Open Access Journals (Sweden)

    Liu Yang

    2015-06-01

    Full Text Available Hydrogen-bond acidic polymers are important high affinity materials sensitive to organophosphates in the chemical warfare agent sensor detection process. Interactions between the sensor sensitive materials and chemical warfare agent simulants were studied by inverse gas chromatography. Hydrogen bonded acidic polymers, i.e., BSP3, were prepared for micro-packed columns to examine the interaction. DMMP (a nerve gas simulant and 2-CEES (a blister agent simulant were used as probes. Chemical and physical parameters such as heats of absorption and Henry constants of the polymers to DMMP and 2-CEES were determined by inverse gas chromatography. Details concerning absorption performance are also discussed in this paper.

  6. Anaerobic bacteria in otitis media.

    Science.gov (United States)

    Fulghum, R S; Daniel, H J; Yarborough, J G

    1977-01-01

    Anaerobic bacteria, Peptostrepotococcus intermedius and Propionibacterium acnes, were found in mixed culture specimens from four to ten tested cases of chronic secretory otitis media. These anaerobic bacteria were in a mixed infection flora with aerobic bacteria most often Staphylococcus epidermidis and Cornybacterium sp. which do not fit any established species. The findings of anaerobic bacteria in otitis media is consistent with the sporadic report of the involvement of anaerobic bacteria in otitis media in the literature since 1898.

  7. Biota - 2009 Vegetation Inventory - Lake Ashtabula, ND

    Data.gov (United States)

    Army Corps of Engineers, Department of the Army, Department of Defense — 2009 Vegetation Classification for Lake Ashtabula, ND Vegetation Project Report, OMBIL Environmental Stewardship - Level 1 Inventory, U.S. Army Corps of Engineers...

  8. Historical Ambient Air Quality Data Inventory

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Historical Ambient Air Quality Data Inventory contains measured and estimated data on ambient air pollution for use in assessing air quality, assisting in...

  9. The Road Inventory of Alaska Aviation Management

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — To determine the relative needs of the U.S. Fish and Wildlife Service, the Federal Highway Administration (FHWA) was asked to inventory all public access and...

  10. Wildlife Inventory Plan : Mingo National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This Wildlife Inventory Plan for Mingo NWR outlines procedures for monitoring the distribution, abundance, and population dynamics of the species of wildlife...

  11. Wildlife Inventory Plan: Horicon National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This Wildlife Inventory Plan for Horicon NWR describes procedures for the following surveys: weekly aerial goose survey, migratory bird survey, breeding population...

  12. Wildlife Inventory Plan: Seney National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Wildlife Inventory Plan is the guideline employed to obtain useful parameters related to the distribution, abundance, and population dynamics of wildlife...

  13. Wildlife Inventory Plan : Muscatatuck National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Muscatatuck NWR Wildlife Inventory Plan summarizes procedures for monitoring wood duck production, monitoring Canada goose and mallard production, and...

  14. Allowance Holdings and Transfers Data Inventory

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Allowance Holdings and Transfers Data Inventory contains measured data on holdings and transactions of allowances under the NOx Budget Trading Program (NBP), a...

  15. Toxics Release Inventory Pollution Prevention Search Tool

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Toxics Release Inventory (TRI) is a publicly available EPA database that contains information on toxic chemical releases and waste management and pollution...

  16. US Forest Service Current Invasive Plants Inventory

    Data.gov (United States)

    US Forest Service, Department of Agriculture — A map service on the www depicting the most recent measurement of Invasive Plant Infestation polygons collected by the National Invasive Plant Inventory Protocol....

  17. Toxics Release Inventory (TRI) Explorer Widget

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Toxics Release Inventory (TRI) Explorer Widget allows the user to generate reports on releases, transfers, and waste managed that can be displayed by facility,...

  18. Mobile Source Emissions Regulatory Compliance Data Inventory

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Mobile Source Emissions Regulatory Compliance Data Inventory data asset contains measured summary compliance information on light-duty, heavy-duty, and non-road...

  19. Coal Mines, Abandoned - AML Inventory Sites 201601

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — This data set portrays the approximate location of Abandoned Mine Land Problem Areas containing public health, safety, and public welfare problems created by past...

  20. Microarthropods inventory in a range of forests

    NARCIS (Netherlands)

    Jagers Op Akkerhuis, G.A.J.M.; Dimmers, W.J.

    2014-01-01

    May-June 2005, inventory of microarthropod fauna on experimental plots in 20 forests divided over The Netherlands using a split-tube-sampler. Treatments are chalk-no chalk and fertilizer-no fertilizer

  1. Design considerations for tropical forest inventories

    Directory of Open Access Journals (Sweden)

    Ronald Edward McRoberts

    2013-06-01

    Full Text Available Forests contribute substantially to maintaining the global greenhouse gas balance, primarily because among the five economic sectors identified by the United Nations Framework Convention on Climate Change, only the forestry sector has the potential to remove greenhouse gas emissions from the atmosphere. In this context, development of national forest carbon accounting systems, particularly in countries with tropical forests, has emerged as an international priority. Because these systems are often developed as components of or in parallel with national forest inventories, a brief review of statistical issues related to the development of forest ground sampling designs is provided. This overview addresses not only the primary issues of plot configurations and sampling designs, but also to a lesser extent the emerging roles of remote sensing and uncertainty assessment. Basic inventory principles are illustrated for two case studies, the national forest inventory of Brazil with special emphasis on the state of Santa Catarina, and an inventory for Tanzania.

  2. Wildlife Inventory Plan : [Tewaukon National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This document outlines the wildlife inventory objectives for Tewaukon National Wildlife Refuge. Procedures are outlined for the following surveys: goose census,...

  3. Minnesota DNR Forest Stand Inventory Version 2

    Data.gov (United States)

    Minnesota Department of Natural Resources — This layer is a digital inventory of individual forest stands. The data is collected by DNR Foresters in each DNR Forestry Administrative Area, and is updated on a...

  4. Biota - 2011 Vegetation Inventory - Marsh Lake, MN

    Data.gov (United States)

    Army Corps of Engineers, Department of the Army, Department of Defense — 2011 Vegetation Classification for Marsh Lake, MN Vegetation Project Report, OMBIL Environmental Stewardship - Level 1 Inventory. Marsh Lake is located on the...

  5. Little River NWR Inventory and Monitoring Plan

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This Inventory and Monitoring Plan for Little River National Wildlife Refuge is a step-down from the Comprehensive Conservation Plan and Forest Habitat Management...

  6. Toxic Release Inventory Chemicals by Groupings

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Toxics Release Inventory (TRI) makes available information for more than 600 toxic chemicals that are being used, manufactured, treated, transported, or...

  7. United States Interagency Elevation Inventory (USIEI)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The U.S. Interagency Elevation Inventory displays high-accuracy topographic and bathymetric data for the United States and its territories. The project is a...

  8. Coalition Warfare Program (CWP): secure policy controlled information query and dissemination over a Bices network

    Science.gov (United States)

    Toth, Andrew; Pham, Tien; Karr, Todd; Bent, Graham; Harries, Dominic; Knox, Alan

    2013-05-01

    In 2006, the US Army Research Laboratory (ARL) and the UK Ministry of Defence (MoD) established a collaborative research alliance with academia and industry, called the International Technology Alliance (ITA) to address fundamental issues concerning Network and Information Sciences. Under the ITA research program, a US-UK transition project on "ITA Policy Controlled Information Query and Dissemination" was funded in 2011 by OSD's Coalition Warfare Program (CWP). The goal of this CWP project is to develop an extensible capability of performing distributed federated query and information dissemination across a coalition network of distributed disparate data/information sources with access­ controlled policies. The CWP project is lead by US Army Research Laboratory (ARL) and UK Defence Science Technology Laboratory (Dstl) with software development by IBM UK and IBM US. The CWP project exploits two key technology components developed within the ITA, namely the Gaian Database and integrated Access Policy Decision and Enforcement mechanisms. The Gaian Database (GaianDB) is a Dynamic Distributed Federated Database (DDFD) that addresses a need to share information among coalition members by providing a means for policy-controlled access to data across a network of heterogeneous data sources. GaianDB implements a SQL-compliant Store-Locally-Query-Anywhere (SLQA) approach providing software applications with global access to data from any node in the database network via standard SQL queries. Security policy is stored locally and enforced at the database node level, reducing potential for unauthorized data access and waste of network bandwidth. A key metric of success for a CWP project is the transition of coalition-related technology from TRL-3 or 4 to TRL-6 or higher. Thus, the end goal of this CWP project was to demonstrate the GaianDB and policy technology within an operational environment at the NATO Intelligence Fusion Centre (NIFC) at Molesworth RAF. An initial

  9. Interleukin-6 and airflow limitation in chemical warfare patients with chronic obstructive pulmonary disease

    Directory of Open Access Journals (Sweden)

    Davood Attaran

    2010-09-01

    disease, interleukin-6, inflammation, chemical warfare

  10. Secondary ionization of chemical warfare agent simulants: atmospheric pressure ion mobility time-of-flight mass spectrometry.

    Science.gov (United States)

    Steiner, Wes E; Clowers, Brian H; Haigh, Paul E; Hill, Herbert H

    2003-11-15

    For the first time, the use of a traditional ionization source for ion mobility spectrometry (radioactive nickel ((63)Ni) beta emission ionization) and three alternative ionization sources (electrospray ionization (ESI), secondary electrospray ionization (SESI), and electrical discharge (corona) ionization (CI)) were employed with an atmospheric pressure ion mobility orthogonal reflector time-of-flight mass spectrometer (IM(tof)MS) to detect chemical warfare agent (CWA) simulants from both aqueous- and gas-phase samples. For liquid-phase samples, ESI was used as the sample introduction and ionization method. For the secondary ionization (SESI, CI, and traditional (63)Ni ionization) of vapor-phase samples, two modes of sample volatilization (heated capillary and thermal desorption chamber) were investigated. Simulant reference materials, which closely mimic the characteristic chemical structures of CWA as defined and described by Schedule 1, 2, or 3 of the Chemical Warfare Convention treaty verification, were used in this study. A mixture of four G/V-type nerve simulants (dimethyl methylphosphonate, pinacolyl methylphosphonate, diethyl phosphoramidate, and 2-(butylamino)ethanethiol) and one S-type vesicant simulant (2-chloroethyl ethyl sulfide) were found in each case (sample ionization and introduction methods) to be clearly resolved using the IM(tof)MS method. In many cases, reduced mobility constants (K(o)) were determined for the first time. Ion mobility drift times, flight times, relative signal intensities, and fragmentation product signatures for each of the CWA simulants are reported for each of the methods investigated. PMID:14615983

  11. Austrian emission inventory for dust

    International Nuclear Information System (INIS)

    For the first time, Austrian emissions of anthropogenic particulate matter emissions to the atmosphere have been estimated. Results have been reported as total suspended particles (TSP) as well as for the fractions of particles smaller than 10 μm or 2.5 μm aerodynamic diameter (PM10, PM2.5), respectively. Base years for the inventory were 1990, 1995 and 1999. Excluded from this assessment is wind blown dust, which has been considered a natural source here. National statistics have been applied, specifically those also used previously in the Austrian air pollution inventory (OLI). Emission factors have been taken from literature compilations, only for exceptional cases specific Austrian assessments were performed or original literature on emission measurements was consulted. Resuspension of dust by road traffic emerged as the most important source. For the size fraction of PM10 this source contributed about half of the emissions, when applying the calculation scheme by the U.S. EPA. While this scheme is widely used and well documented, its validity is currently subject of intense scientific debate. As these results do not seem to coincide with ambient air measurements, resuspension of road dust is considered separately and not now included in the national total. The sum of all other sources increases from 75,000 t of TSP in 1990 and 1995 to 77,000 t in 1999, while both PM10 and PM2.5 exhibit decreasing tendency (at 45,000 t and 26,000 t in 1999, respectively). The increase in TSP derives from increasing traffic and friction related emissions (tire wear, break wear), decrease of the finer particulate matter is due to reductions in firewood consumption for domestic heating. Most important source sectors are fugitive emissions from material transfer in industry as well as the building industry and the tilling of agricultural land. Common to these sources is the high uncertainty of available data. Wood combustion is the most important of the non-fugitive emissions

  12. Canonical correlation analysis of the career attitudes and strategies inventory and the adult career concerns inventory

    OpenAIRE

    Charlene C. Lew; De Bruin, Gideon P.

    2006-01-01

    This study investigated the relationships between the scales of the Adult Career Concerns Inventory (ACCI) and those of the Career Attitudes and Strategies Inventory (CASI). The scores of 202 South African adults for the two inventories were subjected to a canonical correlation analysis. Two canonical variates made statistically significant contributions to the explanation of the relationships between the two sets of variables. Inspection of the correlations of the original variables with the...

  13. PCDD/PCDF release inventories

    Energy Technology Data Exchange (ETDEWEB)

    Fiedler, H. [UNEP Chemicals, Chatelaine (Switzerland)

    2004-09-15

    The Stockholm Convention on Persistent Organic Pollutants (POPs) entered into force on 17 May 2004 with 50 Parties. In May 2004, 59 countries had ratified or acceded the Convention. The objective of the Convention is ''to protect human health and the environment from persistent organic pollutants''. For intentionally produced POPs, e.g., pesticides and industrial chemicals such as hexachlorobenzene and polychlorinated biphenyls, this will be achieved by stop of production and use. For unintentionally generated POPs, such as polychlorinated dibenzo-pdioxins (PCDD) and polychlorinated dibenzofurans (PCDF), measures have to be taken to ''reduce the total releases derived from anthropogenic sources''; the final goal is ultimate elimination, where feasible. Under the Convention, Parties have to establish and maintain release inventories to prove the continuous release reduction. Since many countries do not have the technical and financial capacity to measure all releases from all potential PCDD/PCDF sources, UNEP Chemicals has developed the ''Standardized Toolkit for the Identification of Quantification of Dioxin and Furan Releases'' (''Toolkit'' for short), a methodology to estimate annual releases from a number of sources. With this methodology, annual releases can be estimated by multiplying process-specific default emission factors provided in the Toolkit with national activity data. At the seventh session of the Intergovernmental Negotiating Committee, the Toolkit was recommended to be used by countries when reporting national release data to the Conference of the Parties. The Toolkit is especially used by developing countries and countries with economies in transition where no measured data are available. Results from Uruguay, Thailand, Jordan, Philippines, and Brunei Darussalam have been published.

  14. Wildlife Inventory, Craig Mountain, Idaho.

    Energy Technology Data Exchange (ETDEWEB)

    Cassirer, E. Frances

    1995-06-01

    Wildlife distribution/abundance were studied at this location during 1993 and 1994 to establish the baseline as part of the wildlife mitigation agreement for construction of Dworshak reservoir. Inventory efforts were designed to (1) document distribution/abundance of 4 target species: pileated woodpecker, yellow warbler, black-capped chickadee, and river otter, (2) determine distribution/abundance of rare animals, and (3) determine presence and relative abundance of all other species except deer and elk. 201 wildlife species were observed during the survey period; most were residents or used the area seasonally for breeding or wintering. New distribution or breeding records were established for at least 6 species. Pileated woodpeckers were found at 35% of 134 survey points in upland forests; estimated densities were 0-0.08 birds/ha, averaging 0.02 birds/ha. Yellow warblers were found in riparian areas and shrubby draws below 3500 ft elev., and were most abundant in white alder plant communities (ave. est. densities 0.2-2. 1 birds/ha). Black-capped chickadees were found in riparian and mixed tall shrub vegetation at all elevations (ave. est. densities 0-0.7 birds/ha). River otters and suitable otter denning and foraging habitat were observed along the Snake and Salmon rivers. 15 special status animals (threatened, endangered, sensitive, state species of special concern) were observed at Craig Mt: 3 amphibians, 1 reptile, 8 birds, 3 mammals. Another 5 special status species potentially occur (not documented). Ecosystem-based wildlife management issues are identified. A monitoring plant is presented for assessing effects of mitigation activities.

  15. Arctic shipping emissions inventories and future scenarios

    OpenAIRE

    J. J. Corbett; D. A. Lack; J. J. Winebrake; Harder, S; J. A. Silberman; Gold, M.

    2010-01-01

    This paper presents 5 km×5 km Arctic emissions inventories of important greenhouse gases, black carbon and other pollutants under existing and future (2050) scenarios that account for growth of shipping in the region, potential diversion traffic through emerging routes, and possible emissions control measures. These high-resolution, geospatial emissions inventories for shipping can be used to evaluate Arctic climate sensitivity to black carbon (a short-lived climate forcing pollutant especial...

  16. Forest inventory improvement based on satellite images

    OpenAIRE

    Jonikavičius, Donatas

    2012-01-01

    The aim of the study – improvement of on-going in Lithuania forest inventories based on satellite images and GIS databases. Specific objective of the study – to explore the possibilities of methods applied for the collection of information from satellite images and GIS databases and its processing in order to determine various Lithuanian forest characteristics, focusing on a variety of forest inventory schemes. 4 The goals of the study: 1. To discuss methodological assumptions for...

  17. Inventory verification measurements using neutron multiplicity counting

    Energy Technology Data Exchange (ETDEWEB)

    Ensslin, N.; Foster, L.A.; Harker, W.C.; Krick, M.S.; Langner, D.G.

    1998-12-31

    This paper describes a series of neutron multiplicity measurements of large plutonium samples at the Los Alamos Plutonium Facility. The measurements were corrected for bias caused by neutron energy spectrum shifts and nonuniform multiplication, and are compared with calorimetry/isotopics. The results show that multiplicity counting can increase measurement throughput and yield good verification results for some inventory categories. The authors provide recommendations on the future application of the technique to inventory verification.

  18. SELECTED PROBLEMS OF INVENTORY MANAGEMENT IN ENTERPRISES

    OpenAIRE

    Iga Kott

    2009-01-01

    Identification of optimal solutions for order quantity reduces costs of transactions and ensures successful dealing with the requests. Proper planning, combined with lower cost of transactions based on current inventory level, storage surface area and lead time impacts on profitability in the enterprise, thus on its position in the market. The present paper presents considerations which provide basis for performance of inventory management goals through optimization of order quantity.

  19. Context sensitivity in the force concept inventory

    OpenAIRE

    Gay Stewart; Heather Griffin; John Stewart

    2007-01-01

    The force concept inventory and a 10-question context-modified test were given to 647 students enrolled in introductory physics classes at the University of Arkansas. Context changes had an effect ranging from −3% to 10% on the individual questions. The average student score on the ten transformed questions was 3% higher than the average student score on the corresponding 10 force concept inventory questions. Therefore, the effect of contextual changes on the total of the 10 questions is not ...

  20. Inventory management in the footwear industry

    OpenAIRE

    Carvalho, Élia Marina Pereira; Figueiredo, Manuel; Tereso, Anabela Pereira

    2013-01-01

    There are some industries that are traditionally fashion dependent. This is the case of the footwear industry where products are replaced usually every six months. In this context, the difficulty in forecasting accurately demand for new items is a serious obstacle to an efficient inventory management. The main objective of this study was to identify and analyze the difficulties faced by a Portuguese footwear company and propose solutions to improve inventory management. The mos...

  1. Inventory and the Shape of the Earth

    OpenAIRE

    Lai, Richard

    2007-01-01

    How important are local country conditions to firms' operations performance, as revealed in their inventory levels? Under a “flat world” hypothesis, differences in firms' inventory levels are explained more by differences among industries and firms themselves, rather than differences among country conditions (e.g., institutions, infrastructure). In a “round earth” hypothesis, country factors out-weigh firm and industry factors. Using all COMPUSTAT observations for manufacturing firms in 70 co...

  2. Technical Basis for PNNL Beryllium Inventory

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, Michelle Lynn

    2014-07-09

    The Department of Energy (DOE) issued Title 10 of the Code of Federal Regulations Part 850, “Chronic Beryllium Disease Prevention Program” (the Beryllium Rule) in 1999 and required full compliance by no later than January 7, 2002. The Beryllium Rule requires the development of a baseline beryllium inventory of the locations of beryllium operations and other locations of potential beryllium contamination at DOE facilities. The baseline beryllium inventory is also required to identify workers exposed or potentially exposed to beryllium at those locations. Prior to DOE issuing 10 CFR 850, Pacific Northwest Nuclear Laboratory (PNNL) had documented the beryllium characterization and worker exposure potential for multiple facilities in compliance with DOE’s 1997 Notice 440.1, “Interim Chronic Beryllium Disease.” After DOE’s issuance of 10 CFR 850, PNNL developed an implementation plan to be compliant by 2002. In 2014, an internal self-assessment (ITS #E-00748) of PNNL’s Chronic Beryllium Disease Prevention Program (CBDPP) identified several deficiencies. One deficiency is that the technical basis for establishing the baseline beryllium inventory when the Beryllium Rule was implemented was either not documented or not retrievable. In addition, the beryllium inventory itself had not been adequately documented and maintained since PNNL established its own CBDPP, separate from Hanford Site’s program. This document reconstructs PNNL’s baseline beryllium inventory as it would have existed when it achieved compliance with the Beryllium Rule in 2001 and provides the technical basis for the baseline beryllium inventory.

  3. Strategic special nuclear material Inventory Differences

    Science.gov (United States)

    1985-07-01

    This sixteenth periodic semiannual report of Inventory Differences (ID) covers the last six months of fiscal year 1984 (April 1, 1984, through September 30, 1984), for the Department of Energy (DOE) and DOE contractor facilities possessing significant quantities of strategic special nuclear material (SSNM). Inventory Differences are simply the differences between the amount of material shown in the accounting records and the amount of material reported in the physical inventory. These differences are generally due to errors in estimating material in unmeasurable form at the time of an inventory, unmeasurable holdup in equipment, measurement imprecisions, inaccuracies in initial determinations of SSNM produced or used in nuclear reactors, and inventory or bookkeeping errors. Both DOE and contractors operating DOE facilities carefully maintain, analyze, and investigate ID data. Inventory Differences are expected in nuclear material processing and are not, in and of themselves, evidence of lost or stolen material. On the other hand, ID analysis provides valuable information on the effectiveness of the safeguards system's physical protection and material control measures as well as a check on the process controls and material management procedures. If necessary, an operation may be shut down until an ID is resolved.

  4. Mycophagous soil bacteria

    NARCIS (Netherlands)

    Rudnick, M.B.

    2015-01-01

    Abstract

    Soil microorganisms evolved several strategies to compete for limited nutrients in soil. Bacteria of the genus Collimonas developed a way to exploit fungi as a source of organic nutrients. This strategy has been termed “mycophagy&r

  5. 7 CFR 930.57 - Secondary inventory reserve.

    Science.gov (United States)

    2010-01-01

    ... shall retain control over the release of any cherries from the secondary inventory reserve. No cherries... 7 Agriculture 8 2010-01-01 2010-01-01 false Secondary inventory reserve. 930.57 Section 930.57... Handling Regulations § 930.57 Secondary inventory reserve. (a) In the event the inventory...

  6. System to maximize inventory performance in a small hospital.

    Science.gov (United States)

    VanDerLinde, L P

    1983-01-01

    A computerized system to maximize inventory performance in a small hospital is described. An inventory control system, which integrates economic order quantity (EOQ) and ABC inventory models was implemented in a 146-bed hospital. The perpetual inventory control data base, supported by the hospital's mainframe computer, generates monthly inventory statistics that are segregated into A, B, and C reports. Using a hand-held computer that interfaces with the perpetual inventory system, a series of inventory management reports were developed. These reports, which are based on the EOQ model, provide the following information for each drug line item: EOQ, EOQ proposed carrying cost, actual inventory carrying costs, safety stock, order point, average inventory, and the "on hand/on order" point. Several supplemental inventory management reports were also developed. While implementing the computerized inventory system, the pharmacy also changed its purchasing strategy from predominantly direct accounts to a progressive prime-vendor wholesaler. From December 1980 to December 1981, the ABC/EOQ system with progressive prime-vendor involvement essentially doubled total aggregate inventory turnover. A 46.5% reduction in standing inventory levels occurred. The drug cost per line item dispersed remained relatively constant over the one-year period, despite price increases. The application of the computerized ABC/EOQ inventory model to an online perpetual inventory control data base effectively reduced the inventory operation costs.

  7. SISTEM INFORMASI MANAJEMEN INVENTORI PADA PERUSAHAAN LAYANAN JASABOGA PESAWAT UDARA

    OpenAIRE

    A. A. Oka Sudana

    2009-01-01

    Sistem Informasi Manajemen Inventory adalah sistem informasi yang mengelola data transaksi dan persediaan dalam gudang. Perusahaan yang bergerak dibidang produksi umumnya memerlukan Sistem Inventory.Sistem Inventory biasanya terdiri dari Sistem Penerimaan Barang, Sistem Pembelian Barang dan Sistem Gudang. Sistem ini harus dapat memberikan informasi inventory seperti informasi pengeluaran barang, pembelian barang, penerimaan barang dan informasi lain secara cepat dan akurat, selain itu sistem ...

  8. Teaching Accounting for Inventory by Calling on Students' Personal Experiences

    Science.gov (United States)

    Briginshaw, John

    2010-01-01

    This essay seeks to give practical guidance to accounting instructors seeking to convey the difficult concepts of accounting for inventory. Techniques to convey the concepts of assumed inventory flow, inventory valuation under inflation and deflation, impairment of inventories, LIFO [Last In, First Out] liquidations and the concept of the periodic…

  9. 48 CFR 1245.508-2 - Reporting results of inventories.

    Science.gov (United States)

    2010-10-01

    ... inventories. 1245.508-2 Section 1245.508-2 Federal Acquisition Regulations System DEPARTMENT OF TRANSPORTATION... 1245.508-2 Reporting results of inventories. The inventory report shall also include the following: (a) Name and title of the individual(s) that performed the physical inventory; (b) An itemized,...

  10. 27 CFR 19.464 - Denatured spirits inventories.

    Science.gov (United States)

    2010-04-01

    ... inventories. 19.464 Section 19.464 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE... of Articles Inventories § 19.464 Denatured spirits inventories. Each proprietor shall take a physical inventory of all denatured spirits in the processing account at the close of each calendar quarter and...

  11. 41 CFR 109-1.5108-3 - Stores inventories.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Stores inventories. 109....51-Personal Property Management Standards and Practices § 109-1.5108-3 Stores inventories. Perpetual inventory records are to be maintained for stores inventory items....

  12. 26 CFR 1.471-1 - Need for inventories.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 6 2010-04-01 2010-04-01 false Need for inventories. 1.471-1 Section 1.471-1...) INCOME TAXES Inventories § 1.471-1 Need for inventories. In order to reflect taxable income correctly, inventories at the beginning and end of each taxable year are necessary in every case in which the...

  13. 48 CFR 3045.508-2 - Reporting results of inventories.

    Science.gov (United States)

    2010-10-01

    ... inventories. 3045.508-2 Section 3045.508-2 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND... inventories. The inventory report shall also include the following: (a) Name and title of the individual(s) that performed the physical inventory; (b) An itemized, categorized listing of all property...

  14. 41 CFR 109-27.5104-4 - Physical inventories.

    Science.gov (United States)

    2010-07-01

    ... PROCUREMENT 27-INVENTORY MANAGEMENT 27.51-Management of Precious Metals § 109-27.5104-4 Physical inventories... Metals Control Officer or his designee. (b) Precious metals not in use shall be inspected and weighed on calibrated scales. The inventoried weight and form shall be recorded on the physical inventory sheets...

  15. Preparing US community greenhouse gas inventories for climate action plans

    Energy Technology Data Exchange (ETDEWEB)

    Blackhurst, Michael [Department of Civil, Architectural and Environmental Engineering, The University of Texas at Austin, 1 University Station C1752, Austin, TX 78712-0276 (United States); Scott Matthews, H; Hendrickson, Chris T [Department of Civil and Environmental Engineering, Carnegie Mellon University, 119 Porter Hall, Pittsburgh, PA 15213 (United States); Sharrard, Aurora L [Green Building Alliance, 333 East Carson Street, Suite 331, Pittsburgh, PA 15219 (United States); Azevedo, Ines Lima, E-mail: mblackhurst@gmail.com, E-mail: hsm@cmu.edu, E-mail: auroras@gbapgh.org, E-mail: cth@andrew.cmu.edu, E-mail: iazevedo@cmu.edu [Department of Engineering and Public Policy, Carnegie Mellon University, 119 Porter Hall, Pittsburgh, PA 15213 (United States)

    2011-07-15

    This study illustrates how alternative and supplemental community-level greenhouse gas (GHG) inventory techniques could improve climate action planning. Eighteen US community GHG inventories are reviewed for current practice. Inventory techniques could be improved by disaggregating the sectors reported, reporting inventory uncertainty and variability, and aligning inventories with local organizations that could facilitate emissions reductions. The potential advantages and challenges of supplementing inventories with comparative benchmarks are also discussed. While GHG inventorying and climate action planning are nascent fields, these techniques can improve CAP design, help communities set more meaningful emission reduction targets, and facilitate CAP implementation and progress monitoring.

  16. Preparing US community greenhouse gas inventories for climate action plans

    International Nuclear Information System (INIS)

    This study illustrates how alternative and supplemental community-level greenhouse gas (GHG) inventory techniques could improve climate action planning. Eighteen US community GHG inventories are reviewed for current practice. Inventory techniques could be improved by disaggregating the sectors reported, reporting inventory uncertainty and variability, and aligning inventories with local organizations that could facilitate emissions reductions. The potential advantages and challenges of supplementing inventories with comparative benchmarks are also discussed. While GHG inventorying and climate action planning are nascent fields, these techniques can improve CAP design, help communities set more meaningful emission reduction targets, and facilitate CAP implementation and progress monitoring.

  17. Unified Communications for Space Inventory Management

    Science.gov (United States)

    Gifford, Kevin K.; Fink, Patrick W.; Barton, Richard; Ngo, Phong H.

    2009-01-01

    To help assure mission success for long-duration exploration activities, NASA is actively pursuing wireless technologies that promote situational awareness and autonomy. Wireless technologies are typically extensible, offer freedom from wire tethers, readily support redundancy, offer potential for decreased wire weight, and can represent dissimilar implementation for increased reliability. In addition, wireless technologies can enable additional situational awareness that otherwise would be infeasible. For example, addition of wired sensors, the need for which might not have been apparent at the outset of a program, night be extremely costly due in part to the necessary routing of cables through the vehicle. RFID, or radio frequency identification, is a wireless technology with the potential for significant savings and increased reliability and safety in space operations. Perhaps the most obvious savings relate to the application of inventory management. A fully automated inventory management system is highly desirable for long-term sustaining operations in space environments. This assertion is evidenced by inventory activities on the International Space Station, which represents the most extensive inventory tracking experience base in the history of space operations. In the short tern, handheld RFID readers offer substantial savings owing to reduced crew time for inventory audits. Over the long term, a combination of improved RFID technology and operational concepts modified to fully utilize the technology should result in space based inventory management that is highly reliable and requires very little crew time. In addition to inventory management, RFID is likely to find space applications in real-time location and tracking systems. These could vary from coarse-resolution RFID portals to the high resolution afforded by ultra-wideband (UWB) RFID. Longer range RFID technologies that leverage passive surface acoustic wave (SAW) devices are being investigated to

  18. Multiple criteria inventory classification using fuzzy analytic hierarchy process

    OpenAIRE

    M. Ahsan Akhtar Hasin; Golam Kabir

    2012-01-01

    A systematic approach to the inventory control and classification may have a significant influence on company competitiveness. In practice, all inventories cannot be controlled with equal attention. In order to efficiently control the inventory items and to determine the suitable ordering policies for them, multi-criteria inventory classification is used. In this paper, fuzzy analytic hierarchy process for multiple criteria ABC inventory classification has been proposed. Fuzzy Analytic Hierar...

  19. The role of inventory management in Canadian economic fluctuations

    OpenAIRE

    Hung-Hay Lau

    1996-01-01

    Swings in inventory investment have traditionally played a major role in Canadian business cycles. However, advances in inventory-control techniques and the reduced uncertainty associated with lower inflation have enabled firms to manage their inventories much more tightly and effectively. This article examines recent developments in the management of non-farm business inventories in Canada at both the aggregate and the sectoral level and looks at implications for the role of inventories as a...

  20. Multiple sourcing in single- and multi-echelon inventory systems

    OpenAIRE

    Klosterhalfen, Steffen

    2010-01-01

    This thesis deals with stochastic inventory models that focus on the following two aspects in particular: (i) the coordination of multiple supply sources and (ii) the optimization of the inventory allocation and sizing in multi-echelon systems. Initially, single-echelon inventory models with multiple sourcing and multi-echelon inventory models with single sourcing are analyzed separately. In the former case, the goal is the identification of effective inventory control policies. In the latter...

  1. Integration of forest mapping and inventory to support forest management

    OpenAIRE

    Corona P

    2010-01-01

    Forest inventory and forest mapping can be considered as monitoring and assessment applications that respond to different demands. However, the integration of mapping and inventory provides an effective framework for the support of forest management from multiple perspectives: (i) use of thematic maps for stratifying the inventory sample for the purpose of improving the precision of inventory estimates; (ii) coupling remotely sensed and sample inventory data for the purpose of constructing ma...

  2. Records and inventory management in a construction company

    OpenAIRE

    BÁRTŮ, Alena

    2016-01-01

    The bachelor thesis focuses on problems linked to stock in a construction company. The aims of this work are records and inventory management analysis in the company and its subsequent evaluation and suggestions of inventory management improvements. The theoretical part describes inventory characteristic, accounting in compliance with The Czech accounting standards, appraising of inventory and various methods or models of inventory management. The practical part introduces the company and the...

  3. Vendor Managed Inventory:Retail Industry Perspective of Malaysia

    OpenAIRE

    Madjlesi Taklimi, Zahra

    2011-01-01

    The concept of Vendor Managed Inventory (VMI) radically changes a traditional inventory management. Under the typical business model, the buyer or retailer is in total control of the timing and volume of the order, in order placing and managing the inventory plan. Whereas VMI is a supply chain initiative where the supplier is responsible for all decisions regarding inventories at the retailers, i.e. under VMI program the supplier is authorized to manage inventories of agreed-upon stock-keepin...

  4. Evaluating Global Emission Inventories of Biogenic Bromocarbons

    Science.gov (United States)

    Hossaini, Ryan; Mantle, H.; Chipperfield, M. P.; Montzka, S. A.; Hamer, P.; Ziska, F.; Quack, B.; Kruger, K.; Tegtmeier, S.; Atlas, E.; Sala, S.; Engel, A.; Bonisch, H.; Keber, T.; Oram, D.; Mills, G.; Ordonez, C.; Saiz-Lopez, A.; Warwick, N.; Liang, Q.; Feng, W.; Moore, F.; Miller, F.; Marecal, V.; Richards, N. A. D.; Dorf, M.; Pfeilsticker, K.

    2013-01-01

    Emissions of halogenated very short-lived substances (VSLS) are poorly constrained. However, their inclusion in global models is required to simulate a realistic inorganic bromine (Bry) loading in both the troposphere, where bromine chemistry perturbs global oxidizing capacity, and in the stratosphere, where it is a major sink for ozone (O3). We have performed simulations using a 3-D chemical transport model (CTM) including three top-down and a single bottom-up derived emission inventory of the major brominated VSLS bromoform (CHBr3) and dibromomethane (CH2Br2). We perform the first concerted evaluation of these inventories, comparing both the magnitude and spatial distribution of emissions. For a quantitative evaluation of each inventory, model output is compared with independent long-term observations at National Oceanic and Atmospheric Administration (NOAA) ground-based stations and with aircraft observations made during the NSF (National Science Foundation) HIAPER Pole-to-Pole Observations (HIPPO) project. For CHBr3, the mean absolute deviation between model and surface observation ranges from 0.22 (38 %) to 0.78 (115 %) parts per trillion (ppt) in the tropics, depending on emission inventory. For CH2Br2, the range is 0.17 (24 %) to 1.25 (167 %) ppt. We also use aircraft observations made during the 2011 Stratospheric Ozone: Halogen Impacts in a Varying Atmosphere (SHIVA) campaign, in the tropical western Pacific. Here, the performance of the various inventories also varies significantly, but overall the CTM is able to reproduce observed CHBr3 well in the free troposphere using an inventory based on observed sea-to-air fluxes. Finally, we identify the range of uncertainty associated with these VSLS emission inventories on stratospheric bromine loading due to VSLS (Br(VSLS/y)). Our simulations show Br(VSLS/y) ranges from approximately 4.0 to 8.0 ppt depending on the inventory. We report an optimized estimate at the lower end of this range (approximately 4 ppt

  5. Can bacteria save the planet?

    OpenAIRE

    Hunter, Philip

    2010-01-01

    Bacteria might just hold the key to preserving the environment for our great grandchildren. Philip Hunter explores some of the novel ways in which systems biology and biotechnology are harnessing bacteria to produce renewable energy and clean up pollution.

  6. Planning Horizon for Production Inventory Models with Production Rate Dependent on Demand and Inventory Level

    Directory of Open Access Journals (Sweden)

    Jennifer Lin

    2013-01-01

    Full Text Available This paper discusses why the selection of a finite planning horizon is preferable to an infinite one for a replenishment policy of production inventory models. In a production inventory model, the production rate is dependent on both the demand rate and the inventory level. When there is an exponentially decreasing demand, the application of an infinite planning horizon model is not suitable. The emphasis of this paper is threefold. First, while pointing out questionable results from a previous study, we propose a corrected infinite planning horizon inventory model for the first replenishment cycle. Second, while investigating the optimal solution for the minimization problem, we found that the infinite planning horizon should not be applied when dealing with an exponentially decreasing demand. Third, we developed a new production inventory model under a finite planning horizon for practitioners. Numerical examples are provided to support our findings.

  7. Optoelectronic inventory system for special nuclear material

    Energy Technology Data Exchange (ETDEWEB)

    Sieradzki, F.H.

    1994-01-01

    In support of the Department of Energy`s Dismantlement Program, the Optoelectronics Characterization and Sensor Development Department 2231 at Sandia National Laboratories/New Mexico has developed an in situ nonintrusive Optoelectronic Inventory System (OIS) that has the potential for application wherever periodic inventory of selected material is desired. Using a network of fiber-optic links, the OIS retrieves and stores inventory signatures from data storage devices (which are permanently attached to material storage containers) while inherently providing electromagnetic pulse immunity and electrical noise isolation. Photovoltaic cells (located within the storage facility) convert laser diode optic power from a laser driver to electrical energy. When powered and triggered, the data storage devices sequentially output their digital inventory signatures through light-emitting diode/photo diode data links for retrieval and storage in a mobile data acquisition system. An item`s exact location is determined through fiber-optic network and software design. The OIS provides an on-demand method for obtaining acceptable inventory reports while eliminating the need for human presence inside the material storage facility. By using modularization and prefabricated construction with mature technologies and components, an OIS installation with virtually unlimited capacity can be tailored to the customer`s requirements.

  8. Tritium inventory assessment for ITER using TRIMO

    Energy Technology Data Exchange (ETDEWEB)

    Cristescu, Ioana-R. [Forschungszentrum Karlsruhe GmbH, Tritiumlabor, Postfach 3640, D-76021 Karlsruhe (Germany)]. E-mail: ioana.cristescu@hvt.fzk.de; Cristescu, I. [Forschungszentrum Karlsruhe GmbH, Tritiumlabor, Postfach 3640, D-76021 Karlsruhe (Germany); Murdoch, D. [EFDA Close Support Unit, Boltzmannstrasse 2, D-85748 Garching bei Muenchen (Germany); Doerr, L. [Forschungszentrum Karlsruhe GmbH, Tritiumlabor, Postfach 3640, D-76021 Karlsruhe (Germany); Glugla, M. [Forschungszentrum Karlsruhe GmbH, Tritiumlabor, Postfach 3640, D-76021 Karlsruhe (Germany)

    2006-02-15

    Currently, the strategy for determination of ITER in-vessel tritium inventory envisages that at predetermined intervals, tritiated gases in all systems of fuel cycle will be transferred to the storage and delivery system (SDS) and tritium quantities measured by in-bed calorimetry. The isotope separation system (ISS) is the system used to separate hydrogen isotopes at the quality required to be stored in SDS, and is one of the systems with highest tritium inventory within the fuel cycle. Therefore, during tritium inventory procedure, ISS has to be 'milked down' of tritium, mainly as DT molecular species. Based on the dynamic modelling code TRIMO of the tritium content in the main sub-systems of ITER Fuel Cycle, the procedure for tritium extraction from ISS is presented and numerical examples given to assess the necessary time of transferring the tritium from ISS to SDS, and the residual amount of tritium in ISS after different milking scenarios. Consequently a fuel handling strategy during tritium inventory assessment in the ISS and SDS is described, with the constraint of mobilizable tritium inventory minimisation.

  9. Mobile source emissions inventory development. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Fang, K.Y.; De Paul, F.T.; Heavisides, T.; Wagner, D.

    1991-03-01

    The study was undertaken to develop a methodology for preparing a 5km by 5km areal gridded mobile source emissions inventory for areas of Illinois which are in nonattainment status with regard to National Ambient Air Quality Standards. A pilot emissions inventory was developed by linking the USEPA mobile source emissions program (MOBILE4) with existing traffic data from the Illinois Department of Transportation's (IDOT) Highway Record Data Bank (HRDB), the Chicago Area Transportation Study (CATS) and Illinois Department of Energy and Natural Resources' (ENR) Geographic Information System (GIS). The methodology developed here was applied to one pollutant in one test case county in Illinois. Hydrocarbon emissions from mobile sources in Kane county are the focus of the study. Vehicle type, vehicle age, and Vehicle Miles of Travel (VMT) distributions were obtained from information provided in the 1982 Illinois State Implementation Plan (SIP). Among the products of the project is a preliminary 25-sq km gridded mobile source hydrocarbon emissions inventory for Kane county. Numerical results as well as a color correlated overview map of the county-wide gridded emissions inventory are provided in the report. Recommendations for improving the methodology and further developing gridded mobile source emission inventories for other Illinois counties are also provided.

  10. INVENTORIES MEASUREMENT – BETWEEN PRUDENCE AND NONPRUDENCE

    Directory of Open Access Journals (Sweden)

    Iulia JIANU

    2010-12-01

    Full Text Available In accounting, measurement is the process used to determine the value at which the items of financial statements are recognized in accounting and presented in the balance sheet and in the profit and loss account. Starting from the importance of measurement in accounting, the first study objective in this paper brings in the center of discussion the inventories measurement with the purpose to identify the main methods for inventories measurement at exit used by the economic entities listed on EuroNext Paris Exchange Stock. In the present context, when the financial crisis is still felt in the EU countries is important to note the extent to which economic entities demonstrate prudence in accounting by taking into consideration the inventories impairment at balance sheet date. Compliance with the prudence principle to integrate uncertainty in accounting measurement has the purpose to avoid the risk to transfer in the future periods the present uncertainties that are likely to strike the economic entity. One of the main consequences of this principle is to make impairments for inventories. Therefore the second objective of the present paper is to reflect the extent to which the entities under study record impairments for inventories at balance sheet date, as well as to highlight the manner in which is disclosed the information regarding the way the net realizable value can be calculated.

  11. Manufacture of Probiotic Bacteria

    Science.gov (United States)

    Muller, J. A.; Ross, R. P.; Fitzgerald, G. F.; Stanton, C.

    Lactic acid bacteria (LAB) have been used for many years as natural biopreservatives in fermented foods. A small group of LAB are also believed to have beneficial health effects on the host, so called probiotic bacteria. Probiotics have emerged from the niche industry from Asia into European and American markets. Functional foods are one of the fastest growing markets today, with estimated growth to 20 billion dollars worldwide by 2010 (GIA, 2008). The increasing demand for probiotics and the new food markets where probiotics are introduced, challenges the industry to produce high quantities of probiotic cultures in a viable and stable form. Dried concentrated probiotic cultures are the most convenient form for incorporation into functional foods, given the ease of storage, handling and transport, especially for shelf-stable functional products. This chapter will discuss various aspects of the challenges associated with the manufacturing of probiotic cultures.

  12. Lipoprotein sorting in bacteria.

    Science.gov (United States)

    Okuda, Suguru; Tokuda, Hajime

    2011-01-01

    Bacterial lipoproteins are synthesized as precursors in the cytoplasm and processed into mature forms on the cytoplasmic membrane. A lipid moiety attached to the N terminus anchors these proteins to the membrane surface. Many bacteria are predicted to express more than 100 lipoproteins, which play diverse functions on the cell surface. The Lol system, composed of five proteins, catalyzes the localization of Escherichia coli lipoproteins to the outer membrane. Some lipoproteins play vital roles in the sorting of other lipoproteins, lipopolysaccharides, and β-barrel proteins to the outer membrane. On the basis of results from biochemical, genetic, and structural studies, we discuss the biogenesis of lipoproteins in bacteria, their importance in cellular functions, and the molecular mechanisms underlying efficient sorting of hydrophobic lipoproteins to the outer membrane through the hydrophilic periplasm. PMID:21663440

  13. Exopolysaccharides from Marine Bacteria

    Institute of Scientific and Technical Information of China (English)

    CHI Zhenming; FANG Yan

    2005-01-01

    Microbial polysaccharides represent a class of important products of growing interest for many sectors of industry. In recent years, there has been a growing interest in isolating new exopolysaccharides (EPSs)-producing bacteria from marine environments, particularly from various extreme marine environments. Many new marine microbial EPSs with novel chemical compositions, properties and structures have been found to have potential applications in fields such as adhesives,textiles, pharmaceuticals and medicine for anti-cancer, food additives, oil recovery and metal removal in mining and industrial waste treatments, etc This paper gives a brief summary of the information about the EPSs produced by marine bacteria,including their chemical compositions, properties and structures, together with their potential applications in industry.

  14. Measurements of inventories with mixed fissile materials

    Energy Technology Data Exchange (ETDEWEB)

    Rinard, P.M.; Krick, M.S.; Kelley, T.; Schneider, C.M. [and others

    1997-11-01

    An inventory with a large number of diverse items containing mixtures of uranium and plutonium has been measured with two nondestructive assay (NDA) instruments used in four modes. A segmented gamma scanner (SGS) was used to find the number of cans and the positions of the fissile materials by scanning each item in front of a transmissions source; at each position, uranium and plutonium isotopics were measured with the passive gamma rays emitted. A shuffler was then used in both the passive and active modes to measure the masses of the two elements. The measured masses for the inventory items were generally in agreement with the declared values, but anomalies were identified for a small fraction of the inventory.

  15. Computer Modelling and Simulation for Inventory Control

    Directory of Open Access Journals (Sweden)

    G.K. Adegoke

    2012-07-01

    Full Text Available This study concerns the role of computer simulation as a device for conducting scientific experiments on inventory control. The stores function utilizes a bulk of physical assets and engages a bulk of financial resources in a manufacturing outfit therefore there is a need for an efficient inventory control. The reason being that inventory control reduces cost of production and thereby facilitates the effective and efficient accomplishment of production objectives of an organization. Some mathematical and statistical models were used to compute the Economic Order Quantity (EOQ. Test data were gotten from a manufacturing company and same were simulated. The results generated were used to predict a real life situation and have been presented and discussed. The language of implementation for the three models is Turbo Pascal due to its capability, generality and flexibility as a scientific programming language.

  16. Best Practices for Administering Concept Inventories

    CERN Document Server

    Madsen, Adrian; Sayre, Eleanor C

    2014-01-01

    There are a plethora of concept inventories in physics available for faculty to use, but it is not always clear exactly why you would use these tests, or how you should administer them and interpret the results. These multiple-choice research-based tests about physics concepts are valuable because they allow for standardized comparisons among institutions, instructors, or over time. In order for these comparisons to be meaningful, you should use best practices for administering the tests. Here we discuss best practices for administering concept inventories including background on these types of tests and specifics of how to give them online or in-class. We also discuss advantages and disadvantages of different incentives you could give your students, interpretation of scores and common concerns you may have about using concept inventories.

  17. Dealer Inventory and the Cost of Immediacy

    DEFF Research Database (Denmark)

    Dick-Nielsen, Jens

    % on average. The time series of transaction costs is estimated using the natural experiment of corporate bond index exclusions. The exclusions are monthly and information-free events where index trackers seeking to minimize tracking error request immediacy in order to sell close to the exclusion date......This study shows that the recent 80% decrease in dealer inventories of corporate bonds has increased the cost of immediacy. For safe bonds which are quickly turned over again by dealers the increase is up to 15%, while for risky bonds which are kept on inventory by dealers the increase is up to 100....... The drop in dealer inventories, and thus the rise in transaction costs, is a side-eect of anticipated tighter regulation, primarily Basel III and the Volcker Rule....

  18. Capillary zone electrophoresis analysis and detection of mid-spectrum biological warfare agents. Suffield memorandum No. 1463

    Energy Technology Data Exchange (ETDEWEB)

    Boulet, C.A.

    1995-12-31

    Mid-spectrum biological warfare agents such as proteins, peptides, and toxins are often difficult to analyze and often require individually developed assay methods for detection and identification. In this regard, capillary electrophoresis is an important, emerging technique for separation and quantitation of peptides and proteins, providing separation efficiencies up to two orders of magnitude greater than high performance liquid chromatography. The technique can also analyze a broad range of compounds, has a simple instrument design which can be automated, and has low sample volume requirements. In this study, a highly efficient and reproducible capillary zone electrophoresis method was developed to separate and identify a series of nine peptides of defense interest including bradykinin, leucine enkephalin, and oxytocin. The paper demonstrates three strategies which could be used in a fully automated field detection and identification system for unknown peptides.

  19. Biological warfare warriors, secrecy and pure science in the Cold War: how to understand dialogue and the classifications of science.

    Science.gov (United States)

    Bud, Robert

    2014-01-01

    This paper uses a case study from the Cold War to reflect on the meaning at the time of the term 'Pure Science'. In 1961, four senior scientists from Britain's biological warfare centre at Porton Down visited Moscow both attending an International Congress and visiting Russian microbiological and biochemical laboratories. The reports of the British scientists in talking about a limited range of topics encountered in the Soviet Union expressed qualities of openness, sociologists of the time associated with pure science. The paper reflects on the discourses of "Pure Science", secrecy and security in the Cold War. Using Bakhtin's approach, I suggest the cordial communication between scientists from opposing sides can be seen in terms of the performance, or speaking, of one language among several at their disposal. Pure science was the language they were allowed to share outside their institutions, and indeed political blocs.

  20. Evaluation of Molecular Markers and Analytical Methods Documenting the Occurrence of Mustard Gas and Arsenical Warfare Agents in Soil.

    Science.gov (United States)

    Sassolini, Alessandro; Brinchi, Giampaolo; Di Gennaro, Antonio; Dionisi, Simone; Dominici, Carola; Fantozzi, Luca; Onofri, Giorgio; Piazza, Rosario; Guidotti, Maurizio

    2016-09-01

    The chemicals warfare agents (CWAs) are an extremely toxic class of molecules widely produced in many industrialized countries for decades, these compounds frequently contained arsenic. The plants where the CWAs have been produced or the plants where they have been demilitarized after the Second World War with unacceptable techniques can represent a serious environmental problem. CWAs standards are difficult to find on market so in present work an environmental assessment method based on markers has been proposed. Triphenylarsine, phenylarsine oxide and thiodiglycol have been selected as markers. Three reliable analytical methods based on gaschromatography and mass detection have been proposed and tested for quantitative analysis of markers. Methods performance have been evaluated testing uncertainty, linearity, recovery and detection limits and also comparing detection limits with exposure limits of reference CWAs. Proposed assessment methods have been applied to a case study of a former industrial plant sited in an area characterized by a high background of mineral arsenic. PMID:27385368

  1. Pepsin homologues in bacteria

    Directory of Open Access Journals (Sweden)

    Bateman Alex

    2009-09-01

    Full Text Available Abstract Background Peptidase family A1, to which pepsin belongs, had been assumed to be restricted to eukaryotes. The tertiary structure of pepsin shows two lobes with similar folds and it has been suggested that the gene has arisen from an ancient duplication and fusion event. The only sequence similarity between the lobes is restricted to the motif around the active site aspartate and a hydrophobic-hydrophobic-Gly motif. Together, these contribute to an essential structural feature known as a psi-loop. There is one such psi-loop in each lobe, and so each lobe presents an active Asp. The human immunodeficiency virus peptidase, retropepsin, from peptidase family A2 also has a similar fold but consists of one lobe only and has to dimerize to be active. All known members of family A1 show the bilobed structure, but it is unclear if the ancestor of family A1 was similar to an A2 peptidase, or if the ancestral retropepsin was derived from a half-pepsin gene. The presence of a pepsin homologue in a prokaryote might give insights into the evolution of the pepsin family. Results Homologues of the aspartic peptidase pepsin have been found in the completed genomic sequences from seven species of bacteria. The bacterial homologues, unlike those from eukaryotes, do not possess signal peptides, and would therefore be intracellular acting at neutral pH. The bacterial homologues have Thr218 replaced by Asp, a change which in renin has been shown to confer activity at neutral pH. No pepsin homologues could be detected in any archaean genome. Conclusion The peptidase family A1 is found in some species of bacteria as well as eukaryotes. The bacterial homologues fall into two groups, one from oceanic bacteria and one from plant symbionts. The bacterial homologues are all predicted to be intracellular proteins, unlike the eukaryotic enzymes. The bacterial homologues are bilobed like pepsin, implying that if no horizontal gene transfer has occurred the duplication

  2. Design of inventory pools in spare part support operation systems

    Science.gov (United States)

    Mo, Daniel Y.; Tseng, Mitchell M.; Cheung, Raymond K.

    2014-06-01

    The objective of a spare part support operation is to fulfill the part request order with different service contracts in the agreed response time. With this objective to achieve different service targets for multiple service contracts and the considerations of inventory investment, it is not only important to determine the inventory policy but also to design the structure of inventory pools and the order fulfilment strategies. In this research, we focused on two types of inventory pools: multiple inventory pool (MIP) and consolidated inventory pool (CIP). The idea of MIP is to maintain separated inventory pools based on the types of service contract, while CIP solely maintains a single inventory pool regardless of service contract. Our research aims to design the inventory pool analytically and propose reserve strategies to manage the order fulfilment risks in CIP. Mathematical models and simulation experiments would be applied for analysis and evaluation.

  3. 网络电磁空间作战威胁分析%Analysis of Cyber Electromagnetic Space Warfare Threat

    Institute of Scientific and Technical Information of China (English)

    栾胜利

    2014-01-01

    提出了网电空间作战几个需要关注的问题以及解决方案,使得部队可以根据战场具体环境,进行适应性的应用。首先陈述了网电空间作战的特点,接着阐述了在网电空间中军队所要面临、应对的现实威胁。然后针对这些威胁进行了进一步分析,并且确定了战场环境下所需要的基础安全条件。最后从四个层面阐述了网电空间的脆弱性,同时给出了防御措施。该工作可以对确立可实施的网电空间战术以及有效地组织网电空间行动形成支撑。%A cyber warfare scenario is shown ,which is applicable on the basis of modern battlefield situations .The sce-nario removes misconceptions about present cyber warfare properties and defines actual dangers that should be prepared for in the background of the cyberspace .The dangers are analyzed further and the basic security prerequisites are determined . Technologies are proposed that offer the basic necessary for achieving these prerequisites .An organization of cyberspace weaknesses and the correlative defenses in four levels is shown .Conclusions are drawn that demonstrate the manner in which cyber threats should be determined ,their likelihood assessed and averted .This knowledge leads to the determination of im-plementable cyber tactics and effective organization of cyber operations .

  4. Orchids inventory in Sintang Regency, West Kalimantan

    Directory of Open Access Journals (Sweden)

    ESTI ENDAH ARIYANTI

    2008-10-01

    Full Text Available Orchid is one of ornamental plants which have commercial value. Therefore most species are becoming threatened or even endangered because of over exploitation. In addition, its natural habitat is also decreasing. Conservation must be done urgently, both by in situ and ex situ conservation, which can be started by orchid inventory. The orchid inventory was done in TWA Bukit Kelam, TWA Baning and several places in Regency of Sintang, West Kalimantan. The result showed that there were 40 species belonged to 27 genera, which 32 species of them (20 genera were epiphytic orchids and 8 species (7 genera were terrestrial orchids.

  5. Annual Danish Emissions Inventory Report to UNECE

    DEFF Research Database (Denmark)

    Illerup, J. B.; Lyck, E.; Nielsen, M.;

    This report is a documentation report on the emission inventories for Denmark as reported to the UNECE Secretariat under the Convention on Long-range Transboundary Air Pollution due by 15 February 2003. The report contains information on Denmark's emission inventories regarding emissions of (1) N......, NOx, NMVOC, and NH3 for the years 2010, 2015 and 2020 (2) energy consumption for the years 2010, 2015 and 2020 (3) transport energy consumption for the years 2010, 2015 and 2020 and (4) for agriculture livestock for the year 2010....

  6. The GAMDAM Glacier Inventory: a quality controlled inventory of Asian glaciers

    Directory of Open Access Journals (Sweden)

    T. Nuimura

    2014-06-01

    Full Text Available We present a new glacier inventory for the high mountain Asia named "Glacier Area Mapping for Discharge from the Asian Mountains" (GAMDAM. Glacier outlines were delineated manually using more than 226 Landsat ETM+ scenes from the period 1999–2003, in conjunction with a digital elevation model (DEM and high-resolution Google Earth imagery. Geolocations are consistent between the Landsat imagery and DEM due to systematic radiometric and geometric corrections made by the United States Geological Survey. We performed repeated delineation tests and rigorous peer review of all scenes used in order to maintain the consistency and quality of the inventory. Our GAMDAM Glacier Inventory (GGI includes 82776 glaciers covering a total area of 87507 ± 13126 km2 in the high mountain Asia. Thus, our inventory represents a greater number (+4% of glaciers but significantly less surface area (−31% than a recent global glacier inventory (Randolph Glacier Inventory, RGI. The employed definition of the upper boundaries of glaciers, glacier recession since the 1970s, and misinterpretation of seasonal snow cover are likely causes of discrepancies between the inventories, though it is difficult to evaluate these effects quantitatively. The GGI will help improve the temporal consistency of the RGI, which incorporated glacier outlines from the 1970s for the Tibetan Plateau, and will provide new opportunities to study Asian glaciers.

  7. INVENTORY MANAGEMENT IN THE ENTERPRISE THROUGH THE APPLICATION OF IFRS 2 INVENTORIES

    Directory of Open Access Journals (Sweden)

    Svetlozar Stefanov

    2016-07-01

    Full Text Available The focus in the article is on the issues of valuation and presentation of the inventories under the meaning on the International Accounting Standard 2 Inventories. The Standard provides guidance on the determination of costs of finished products and its recognition as and expense in the production and sale finished products, including guidance for determination of the net realizable value. The latter is defined as the estimated selling price less the estimated costs of completion and estimated costs necessary to make the sale. The cost of inventories comprises all costs of purchase, cost of conversion and other costs incurred in bringing the inventories to a condition suitable for subsequent use. The amount of the cost for materials used or products sold and the finished product is determined using one of the following methods: a specifically defined value, first-in � first out or weighted average cost of lots delivered. When inventories are sold, the carrying amount of those inventories is recognized as an expense in the period in which the related sales revenue is recognized. The amount of any write-down of inventories to net realizable value is recorded as a current expense and is recognized as an expense in the period the write-down occurs.

  8. Optimal Policy for Brownian Inventory Models with General Convex Inventory Cost

    Institute of Scientific and Technical Information of China (English)

    Da-cheng YAO

    2013-01-01

    We study an inventory system in which products are ordered from outside to meet demands,and the cumulative demand is governed by a Brownian motion.Excessive demand is backlogged.We suppose that the shortage and holding costs associated with the inventory are given by a general convex function.The product ordering from outside incurs a linear ordering cost and a setup fee.There is a constant leadtime when placing an order.The optimal policy is established so as to minimize the discounted cost including the inventory cost and ordering cost.

  9. Managing Inventory At A Transitional Facility

    Science.gov (United States)

    Hutchins, Henry A.

    1993-01-01

    Kennedy Inventory Management System, KIMS, geared to needs of facility in transition from research and development to manufacturing. Operated jointly by several contractors at Kennedy Space Center, KIMS designed to reduce cost and increase efficiency of fabrication and maintenance of spaceflight hardware.

  10. A new perspective on inventory systems

    NARCIS (Netherlands)

    E.M. Bazsa-Oldenkamp; P. den Iseger

    2000-01-01

    textabstractIn this article a single item inventory model with backlogging is analyzed, which is a generalization of the most well-known simple models. This formulation enables us to separate the analysis of the system to the analysis of the control rule (reduced to the analysis of a Markov chain) a

  11. Understory Vegetation Inventory: An Efficient Procedure

    OpenAIRE

    United States Department of Agriculture, Forest Service

    1983-01-01

    The Understory Vegetation Inventory Procedure used on Forest Survey plots provides some basic information about the plant community that, when combined with other information, can be used for wildlife habitat and forage evaluation, grazing use potential, potential climax and seral stage of vegetation, and estimation of land productivity in terms of biomass.

  12. Forest inventory with terrestrial LiDAR

    NARCIS (Netherlands)

    Bauwens, Sébastien; Bartholomeus, Harm; Calders, Kim; Lejeune, Philippe

    2016-01-01

    The application of static terrestrial laser scanning (TLS) in forest inventories is becoming more effective. Nevertheless, the occlusion effect is still limiting the processing efficiency to extract forest attributes. The use of a mobile laser scanner (MLS) would reduce this occlusion. In this st

  13. Student Leadership Practices Inventory. Student Workbook.

    Science.gov (United States)

    Kouzes, James M.; Posner, Barry Z.

    This workbook provides information, answers to questions, and the "Student Leadership Practices Inventory" (Student LPI). After careful research with student leaders, similar to previous research in business, the Student LPI was designed to measure leadership practice in college students. The Student LPI helps college students discover the extent…

  14. Controlling Inventories in a Supply Chain

    NARCIS (Netherlands)

    E. Porras Musalem (Eric); R. Dekker (Rommert)

    2003-01-01

    textabstractThis article studies specific aspects of the joint replenishment problem in a real supply chain setting. Particularly we analyze the effect on inventory performance of having minimum order quantities for the different products in the joint order, given a complex transportation cost struc

  15. Computer Science Concept Inventories: Past and Future

    Science.gov (United States)

    Taylor, C.; Zingaro, D.; Porter, L.; Webb, K. C.; Lee, C. B.; Clancy, M.

    2014-01-01

    Concept Inventories (CIs) are assessments designed to measure student learning of core concepts. CIs have become well known for their major impact on pedagogical techniques in other sciences, especially physics. Presently, there are no widely used, validated CIs for computer science. However, considerable groundwork has been performed in the form…

  16. Development of the Newtonian Gravity Concept Inventory

    Science.gov (United States)

    Williamson, Kathryn E.; Willoughby, Shannon; Prather, Edward E.

    2013-01-01

    We introduce the Newtonian Gravity Concept Inventory (NGCI), a 26-item multiple-choice instrument to assess introductory general education college astronomy ("Astro 101") student understanding of Newtonian gravity. This paper describes the development of the NGCI through four phases: Planning, Construction, Quantitative Analysis, and…

  17. Incomplete convolutions in production and inventory models

    NARCIS (Netherlands)

    Houtum, van G.J.; Zijm, W.H.M.

    1997-01-01

    In this paper, we study incomplete convolutions of continuous distribution functions, as they appear in the analysis of (multi-stage) production and inventory systems. Three example systems are discussed where these incomplete convolutions naturally arise. We derive explicit, nonrecursive formulae f

  18. An Inventory of Listening Competency Dimensions

    Science.gov (United States)

    Wolvin, Andrew D.; Cohen, Steven D.

    2012-01-01

    This article proposes the use of a one-page listening inventory sheet that helps students explore five dimensions of listening competency: cognitive, affective, behavioral, contextual, and ethical. After crafting their own responses, students will have the opportunity to engage in a class discussion about the impact of various dimensions of…

  19. Student Interest Inventory -- Opinions of Students.

    Science.gov (United States)

    Olympia Community Unit District 16, Minier, IL.

    By virtue of a Title III Elementary and Secondary Education Act grant, a student interest inventory instrument was devised to evaluate apprehensions of students attending 5 different high schools prior to consolidation of the Olympia Community Unit District 16 in Illinois. Initially administered to 183 ninth graders, 228 tenth graders, and 185…

  20. Denmark's National Inventory Report 2015 and 2016

    DEFF Research Database (Denmark)

    Nielsen, Ole-Kenneth; Plejdrup, Marlene Schmidt; Winther, Morten;

    This report is Denmark’s annual documentation report of the greenhouse gas inventory submitted to the United Nations Framework Convention on Climate Change (UNFCCC) and the Kyoto Protocol. The report is prepared in accordance with the UNFCCC reporting guidelines and CMP decisions and contains all...