WorldWideScience

Sample records for bacteria warfare inventory

  1. Chemical language and warfare of bacterial natural products in bacteria-nematode-insect interactions.

    Science.gov (United States)

    Shi, Yi-Ming; Bode, Helge B

    2018-01-23

    Covering: up to November 2017Organismic interaction is one of the fundamental principles for survival in any ecosystem. Today, numerous examples show the interaction between microorganisms like bacteria and higher eukaryotes that can be anything between mutualistic to parasitic/pathogenic symbioses. There is also increasing evidence that microorganisms are used by higher eukaryotes not only for the supply of essential factors like vitamins but also as biological weapons to protect themselves or to kill other organisms. Excellent examples for such systems are entomopathogenic nematodes of the genera Heterorhabditis and Steinernema that live in mutualistic symbiosis with bacteria of the genera Photorhabdus and Xenorhabdus, respectively. Although these systems have been used successfully in organic farming on an industrial scale, it was only shown during the last 15 years that several different natural products (NPs) produced by the bacteria play key roles in the complex life cycle of the bacterial symbionts, the nematode host and the insect prey that is killed by and provides nutrients for the nematode-bacteria pair. Since the bacteria can switch from mutualistic to pathogenic lifestyle, interacting with two different types of higher eukaryotes, and since the full system with all players can be established in the lab, they are promising model systems to elucidate the natural function of microbial NPs. This review summarizes the current knowledge as well as open questions for NPs from Photorhabdus and Xenorhabdus and tries to assign their roles in the tritrophic relationship.

  2. An inventory of wargaming models for special warfare: Candidate applications for the infusion of human performance data

    Energy Technology Data Exchange (ETDEWEB)

    Burton, H.D.; Banks, W.W.; Schultz, E.E.; Berghage, T.E.

    1988-11-01

    The material contained in this compendium has been drawn from many sources in an attempt to define the number and types of small group combat simulation models which currently exist. The emphasis placed on this particular effort was to identify combat simulation models which are oriented or could be oriented toward special warfare involving highly trained, light, mobile forces. These descriptions and characterizations of the different simulation models should be viewed with the goal of infusing human performance data and human performance models into candidate simulation models to enhance both fidelity and realism. We feel that this listing will be of direct benefit to military and civilian scientists who are interested in identifying candidate combat simulation models which can be targeted for enhancement with appropriate human performance data. Few existing models reviewed were found to incorporate laboratory or field data drawn from the behavioral sciences or human performance literature. Several models did incorporate human performance assumptions which were found to be incongruent with real world data about how people behave under various environmental conditions and both physical and cognitive stress.

  3. Governing Warfare

    DEFF Research Database (Denmark)

    Harste, Gorm

      It would seem as though warfare has gotten out of control, not only in Iraq and Afghanistan, but also in Central Africa. The paper outlines the strategic history of politically controlled warfare since the early Enlightenment. The argument is that control is implausible. The idea of control has...... the risks of lacking unity and displays the organisational trap to the fatal political myth of controlled warfare: Does it come from the military organisation system itself, from political ideologies of goal-rational governance, or from the chameleonic logic of wars?  ...

  4. Information Warfare

    OpenAIRE

    Darczewska, Jolanta; Żochowski, Piotr; Orttung, Robert W.; Laruelle, Marlene; Pörzgen, Gemma

    2017-01-01

    This edition addresses information warfare. Firstly, Jolanta Darczewska and Piotr Żochowski examine the use of “active measures” by Russian special services in support of Russian foreign policy. Secondly, Robert W. Orttung argues that Russia has sought to use various information warfare techniques to sow division and chaos in the U.S., but it remains unclear to what extent Russian actions had an impact on the thinking or behavior of American citizens. Thirdly, Marlene Laruelle considers the t...

  5. Air Warfare

    Science.gov (United States)

    2002-03-01

    genus as its predecessor of pre-war days. It would, however, be erroneous to conclude from this that the military value of each new development was...marked by periods of crescendo, air warfare will consist of a succession of actions of great violence , with periods of almost complete calm between...influence of time, if it should require fif- teen seconds for each airplane to take off, and one minute to land, the commander of a group of 100 airplanes

  6. Hybrid Warfare

    Science.gov (United States)

    2013-08-01

    Office, Title 10, U.S. Code ; Act of 5 May 1960. 3. 2010 Quadrennial Defense Review Report, February 2010, 8. 4. Hybrid Warfare, Global Accountability...Rise of Hybrid Wars.” Proceedings 132 (November 2005); William J. Nemeth , Future War and Chechnya: A Case for Hybrid War- fare (master’s thesis, U.S...William J. Nemeth which represents the earliest scholarly work on the subject, in which the emergence of devolved hybrid societies gives rise to hybrid

  7. Drone warfare

    Science.gov (United States)

    Gusterson, Hugh

    2017-11-01

    Crude drones existed as early as World War I, but the technology matured in the Yugoslav Wars of the 1990s and the current wars around the Middle East. The U.S. first used a weaponized drone in late 2001, in Afghanistan. Drones may cause more or less civilian casualties depending on the targeting protocols employed by their operators. There is an inherent ambiguity in determining who is an insurgent from several thousand feet, but civilian casualties are likely to be higher if targeters emphasize "signature strikes" over "personality strikes," if they engage in "double-tap strikes," if they rely too much on local informants, and if they rely too heavily on cellphone identification in the absence of corroboration from other intelligence sources. The legality of drone warfare is fairly clear in established battle zones such as Afghanistan, but is more problematic in terms of both international and domestic law when it comes to drone strikes in countries such as Yemen, Pakistan and Somalia with which the U.S. is not at war. Looking to the future, the U.S. would be well advised to sponsor negotiations for an international drone convention that might establish clear international rules for the use of drones, ban autonomous smart drones, and establish adjudicatory procedures to handle allegations of war crimes.

  8. Fungi and bacteria inventory on soybean (Glycine max (L.) merill) planting media applied by local microorganisms

    Science.gov (United States)

    Akhsan, Ni'matuljannah; Vionita

    2017-02-01

    An experiment aimed to determine the effect of application of several types of local microorganisms (MOL) and the number of doses to the development of fungi and bacteria on soybean planting media, have been conducted in Samarinda for 3 (three) months. Factorial experiment arranged in a completely randomized design and repeated three times, was used in this experiment. The first factor was the type of MOL consisted of cow dung (m1), snails (m2), banana peel (m3) and bamboo roots (m4), and the second factor was the dose MOL zero mL (d0), 100 mL (d1), 200 mL (d2), 300 mL (d3), 400 mL (d4) analyzed with Anova and Least Significance Difference (LSD) at 5%. Fungi and bacteria contained in the local microorganisms (cow dung, snails, banana peel and bamboo root) are: fungus Aspergillus sp, Penicillium sp., Trichoderma sp., cellulotic and lignolitic bacteria. An increase in the type and amount of fungus is happened for some genus. The dominant bacteria in the planting medium is a gram-negative bacteria. Cow dung seemed the best source at the dosages level of 400 ml.

  9. Information Warfare and International Law

    National Research Council Canada - National Science Library

    Greenberg, Lawrence T; Goodman, Seymour E; Soo Hoo, Kevin J

    1998-01-01

    The development of "information warfare" presents international legal issues that will complicate nations' efforts both to execute and to respond to certain information warfare attacks, specifically...

  10. Hybrid Warfare and Lawfare

    OpenAIRE

    Bachmann, Sascha-Dominik; Mosquera, Andres B Munoz

    2015-01-01

    Hybrid Warfare as a method of war is not new. The change today appears to be that Hybrid Warfare “has the potential to transform the strategic calculations of potential belligerents [it has become] increasingly sophisticated and deadly”. This short paper presents Hybrid Warfare and one of its methods, lawfare. For this, we provide a current, comprehensive definition of hybrid warfare and examine different areas where law has been/is being used as a method of war. This paper focuses on the fol...

  11. Flying Electronic Warfare Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides NP-3D aircraft host platforms for Effectiveness of Navy Electronic Warfare Systems (ENEWS) Program antiship missile (ASM) seeker simulators used...

  12. Information Warfare and Ethics

    Directory of Open Access Journals (Sweden)

    M.J. Warren

    2001-05-01

    Full Text Available This paper examines the ethics of the practice of information warfare at both the national and corporate levels. Initially examining the present and past actions of individual hackers, it moves to the more organised, future military and economic warfare scenarios. It examines the lack of legal or policy initiatives in this area.

  13. Defining cyber warfare

    Directory of Open Access Journals (Sweden)

    Dragan D. Mladenović

    2012-04-01

    Full Text Available Cyber conflicts represent a new kind of warfare that is technologically developing very rapidly. Such development results in more frequent and more intensive cyber attacks undertaken by states against adversary targets, with a wide range of diverse operations, from information operations to physical destruction of targets. Nevertheless, cyber warfare is waged through the application of the same means, techniques and methods as those used in cyber criminal, terrorism and intelligence activities. Moreover, it has a very specific nature that enables states to covertly initiate attacks against their adversaries. The starting point in defining doctrines, procedures and standards in the area of cyber warfare is determining its true nature. In this paper, a contribution to this effort was made through the analysis of the existing state doctrines and international practice in the area of cyber warfare towards the determination of its nationally acceptable definition.

  14. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    Section 1 of this paper provides an overview of cyber warfare as an element of information warfare, starting with the general background of the current strategic environment the United States is operating...

  15. Chemical warfare agents

    Directory of Open Access Journals (Sweden)

    Vijayaraghavan R

    2010-01-01

    Full Text Available Among the Weapons of Mass Destruction, chemical warfare (CW is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided.

  16. Gray Zone Warfare: German and Russian Political Warfare, 1935-1939, and 2001

    Science.gov (United States)

    2017-06-09

    separated periods. 15. SUBJECT TERMS Political Warfare, Psychological Warfare, Unconventional Warfare, Hybrid Warfare, Asymmetrical Warfare, Gray Zone...Russia ............................................................................................................................ 56 Psychological ...the waging of psychological and economic warfare to the furtherance of war aims and the organization of the fighting strength of the nation to the

  17. Biological and Chemical Warfare

    African Journals Online (AJOL)

    and entrails over the walls to induce a plaque and defecate into wells and water supplies. The. Romans tilted ... modern military weapons, discussions of their characteristics and potential threat have to draw heavily upon .... poisoning of water in desert warfare is his- torical, having continued through the time of. World War II.

  18. The Physics of Warfare

    Science.gov (United States)

    Giordano, Gerardo

    2015-01-01

    Recently, I was tasked with the creation and execution of a new themed general education physics class called The Physics of Warfare. In the past, I had used the theme of a class, such as the physics of sports medicine, as a way to create homework and in-class activities, generate discussions, and provide an application to demonstrate that physics…

  19. Hybrid Maritime Warfare

    DEFF Research Database (Denmark)

    Schaub Jr, Gary John; Murphy, Martin; Hoffman, Frank

    2017-01-01

    Russia’s use of hybrid warfare techniques has raised concerns about the security of the Baltic States. Gary Schaub, Jr, Martin Murphy and Frank G Hoffman recommend a series of measures to augment NATO’s Readiness Action Plan in the Baltic region, including increasing the breadth and depth of naval...... of a larger hybrid campaign...

  20. Refocusing Cyber Warfare Thought

    Science.gov (United States)

    2013-02-01

    the service placed two vastly different career fields into a single training pipeline? Does radar jamming belong to the same class of warfare as...patch newly discovered flaws, and private antivirus companies that develop signatures to inoculate systems to new mal- ware.21 Meanwhile, highly

  1. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  2. Information Warfare and International Law

    National Research Council Canada - National Science Library

    Greenberg, Lawrence T; Goodman, Seymour E; Soo Hoo, Kevin J

    1998-01-01

    .... Some legal constraints will certainly apply to information warfare, either because the constraints explicitly regulate particular actions, or because more general principles of international law...

  3. Psychological effects of nuclear warfare

    International Nuclear Information System (INIS)

    Mickley, G.A.

    1987-01-01

    This report is divided into five parts. (1) Discussion of the psychological milieu before a nuclear confrontation. (2) Acute psychological reactions to nuclear warfare (some of which may reflect, in part, direct radiogenic alteration of nervous system functions). (3) Chronic psychological effects of a nuclear confrontation. (4) Issues concerning treatment of these psychological changes. (5) Prevention of adverse psychological reactions to nuclear warfare

  4. The evolution of human warfare.

    Science.gov (United States)

    Pitman, George R

    2011-01-01

    Here we propose a new theory for the origins and evolution of human warfare as a complex social phenomenon involving several behavioral traits, including aggression, risk taking, male bonding, ingroup altruism, outgroup xenophobia, dominance and subordination, and territoriality, all of which are encoded in the human genome. Among the family of great apes only chimpanzees and humans engage in war; consequently, warfare emerged in their immediate common ancestor that lived in patrilocal groups who fought one another for females. The reasons for warfare changed when the common ancestor females began to immigrate into the groups of their choice, and again, during the agricultural revolution.

  5. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    .... Section 1 concludes with a review of offensive and defensive cyber warfare concepts. Section 2 presents a general overview of cyber terrorism, including definitions of cyber terrorism and cyber terrorism support...

  6. Attrition in Network Centric Warfare

    National Research Council Canada - National Science Library

    Erbetta, John

    2003-01-01

    .... Information warfare means that positive attacks on systems themselves compound the problem. Emerging technologies applicable to NCW as a force multiplier need to be recognized as counter to the impediments to progress...

  7. The ethics of information warfare

    CERN Document Server

    Floridi, Luciano

    2014-01-01

    This book offers an overview of the ethical problems posed by Information Warfare, and of the different approaches and methods used to solve them, in order to provide the reader with a better grasp of the ethical conundrums posed by this new form of warfare.The volume is divided into three parts, each comprising four chapters. The first part focuses on issues pertaining to the concept of Information Warfare and the clarifications that need to be made in order to address its ethical implications. The second part collects contributions focusing on Just War Theory and its application to the case of Information Warfare. The third part adopts alternative approaches to Just War Theory for analysing the ethical implications of this phenomenon. Finally, an afterword by Neelie Kroes - Vice President of the European Commission and European Digital Agenda Commissioner - concludes the volume. Her contribution describes the interests and commitments of the European Digital Agenda with respect to research for the developme...

  8. Air Power and Maneuver Warfare

    Science.gov (United States)

    1994-07-01

    way to integrate air power on the one hand with maneuver warfare on the other. While American commanders such as Robert E. Lee and George S. Patton...MANEUVER WARFARE years .’ Nevertheless, it should not be forgotten that few commanders of any time or place have fought as many great battles- batailles ...the process to a boxer who uses one arm to parry his opponent’s punches and draw his attention while striking with the other. Gen George S. Patton

  9. Nuclear radiation in warfare

    International Nuclear Information System (INIS)

    Rotblat, J.

    1986-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios; biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion. (orig./HP) [de

  10. Nuclear radiation in warfare

    International Nuclear Information System (INIS)

    Rotblat, J.

    1981-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios); biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion. (U.K.)

  11. Reflections on nuclear warfare

    International Nuclear Information System (INIS)

    Evans, J.P.

    1983-01-01

    The author looks back on his more than 70 years of familiarity with Americans involved in warfare, noting their loyal support for our country's objectives. Drawing on the Einstein equation, his own visits to Hiroshima and Nagasaki, and current literature, he, as a physician, belatedly concurs with those who look on the use of nuclear weapons as irrational and untenable. Their employment under present circumstances would create a ''final epidemic'' to be avoided only by prevention. He suggests that medical perceptions must be considered by our national leaders in assessing the many factors that he hopes will lead to rational answers to this urgent, highly complex, and vital enigma. He cites physicians' efforts to help in finding answers and asks that his colleagues consider the issues with attention to the gravity of the situation and act according to their best judgment

  12. Intelligence Strategy for Fourth Generation Warfare

    National Research Council Canada - National Science Library

    Jamison, Edward P

    2006-01-01

    ...." They have named this new era of war "fourth generation warfare." Currently the Department of Defense's intelligence strategy is designed to defeat conventional adversaries vise a fourth generation warfare opponent...

  13. ISIL's Hybrid Warfare in Syria & Iraq

    DEFF Research Database (Denmark)

    Sørensen, Heine

    2016-01-01

    The case study specifically seeks to answer the following problem statement: Does ISIL qualify as an actor using hybrid warfare and if so what characterizes their particular use of this type of warfare? Based on an analysis of ISIL’s warfare from August 2012 to August 2016 the chapter argues, tha...

  14. Special Warfare: A Selected Bibliography.

    Science.gov (United States)

    1983-10-01

    Digest, Vol. 18, January 1963, pp. 36-41. 313. Van de Velde , R. W. "the Neglected Deterrent (Guerrilla Warfare)." Military Review, Vol. 38, August...34Principles of Modern Chinese Strategy." NATO’s Fifteen Nations, Vol. 8, June-July 1963, pp. 44-49. 255. Purcell, Henry . "Night Patrolling and District...September 1970, pp. 2-8. 331. Whittier, Henry S. "Soviet Special Operations/Partisan Warfare: Implications for Today." Military Review, Vol. 59, January 1979

  15. The doctor and nuclear warfare

    International Nuclear Information System (INIS)

    Anon.

    1982-01-01

    At the 34th World Medical Assembly in Lisbon in 1981 the World Medical Association adopted a motion proposed by the American Medical Association that national medical associations should develop programs to educate the civilian population on the medical consequences of nuclear war. This article discusses the attitude the medical professions should have, should nuclear warfare in some form confront them in the future. The conclusion is drawn that defence against nuclear warfare is only a part of civil defence against any disaster, including the natural disasters such as flood and fire and the man-made disasters of transport accidents, even of problems at nuclear plants designed to supply energy

  16. The Anatomy of Counterinsurgency Warfare

    DEFF Research Database (Denmark)

    Mouritsen, Lars; Pedersen, Kenneth; Thruelsen, Peter Dahl

    Since the beginning of the new millennium, the West has been increasingly involved in a tiresome and rather particular type of conflict: insurgency warfare. The bloody and shocking terrorist attacks on New York and Washington in September 2001 marked the beginning of a new era, and the introducti...

  17. European Curricula, Xenophobia and Warfare.

    Science.gov (United States)

    Coulby, David

    1997-01-01

    Examines school and university curricula in Europe and the extent of their influence on xenophobia. Considers the pluralistic nature of the European population. Discusses the role of curriculum selection and language policy in state efforts to promote nationalism. Assesses the role of curricular systems in the actual encouragement of warfare,…

  18. Information and Knowledge Centric Warfare: The Next Steps in the Evolution of Warfare

    National Research Council Canada - National Science Library

    Phister, Jr., Paul W; Plonisch, Igor G

    2004-01-01

    ...: transitioning from network-centric/information-centric to knowledge-centric warfare. Network-centric warfare is built around human and organizational behavior a new way of thinking in terms of linkages...

  19. UML modelling of network warfare examples

    CSIR Research Space (South Africa)

    Veerasamy, N

    2011-08-01

    Full Text Available will be determined by arguing their application to Network Warfare A. Consideration of Network Warfare Attributes Network Warfare can be seen as taking place over Information and Communication Technology (ICT) networks to affect information processing... the works of Theohandou, Tipton and Sowa, the following information security techniques emerge: Risk Analysis, Physical Security, Incident Response, Disaster Recovery Planning, Security Awareness, Legal, Regulations and Compliance [15] [16] [17...

  20. MEANS AND METHODS OF CYBER WARFARE

    Directory of Open Access Journals (Sweden)

    Dan-Iulian VOITAȘEC

    2016-06-01

    Full Text Available According to the Declaration of Saint Petersburg of 1868 “the only legitimate object which States should endeavor to accomplish during war is to weaken the military forces of the enemy”. Thus, International Humanitarian Law prohibits or limits the use of certain means and methods of warfare. The rapid development of technology has led to the emergence of a new dimension of warfare. The cyber aspect of armed conflict has led to the development of new means and methods of warfare. The purpose of this paper is to study how the norms of international humanitarian law apply to the means and methods of cyber warfare.

  1. Cyber warfare building the scientific foundation

    CERN Document Server

    Jajodia, Sushil; Subrahmanian, VS; Swarup, Vipin; Wang, Cliff

    2015-01-01

    This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially gove

  2. Shadow Wars: An Analysis of Counterinsurgency Warfare

    National Research Council Canada - National Science Library

    Dogan, Osman

    2005-01-01

    ... of the current strategic approaches to counterinsurgency warfare. Toward this end, a systems model approach, which views insurgent organizations as open systems, is adapted to the insurgent environment...

  3. Radioecological aspects of nuclear warfare

    International Nuclear Information System (INIS)

    Edvardson, Kay

    1977-01-01

    Radioactive fallout, one of the major effects of nuclear warfare, will cause acute radiation sickness within the close-in or intermediate areas downwind from surface bursts. Global fallout from high yield explosions will be fairly evenly distributed in the hemisphere where the explosions occur, and will cause irradiation from ground deposit, inhaled material and contaminated food. Estimates of collective doses and the approximate number of late casualties from the global contamination are presented for a given total explosion yield. (author)

  4. Detection of biological warfare agents using ultra violet-laser induced fluorescence LIDAR.

    Science.gov (United States)

    Joshi, Deepti; Kumar, Deepak; Maini, Anil K; Sharma, Ramesh C

    2013-08-01

    This review has been written to highlight the threat of biological warfare agents, their types and detection. Bacterial biological agent Bacillus anthracis (bacteria causing the disease anthrax) which is most likely to be employed in biological warfare is being discussed in detail. Standoff detection of biological warfare agents in aerosol form using Ultra violet-Laser Induced Fluorescence (UV-LIF) spectroscopy method has been studied. Range-resolved detection and identification of biological aerosols by both nano-second and non-linear femto-second LIDAR is also discussed. Calculated received fluorescence signal for a cloud of typical biological agent Bacillus globigii (Simulants of B. anthracis) at a location of ~5.0 km at different concentrations in presence of solar background radiation has been described. Overview of current research efforts in internationally available working UV-LIF LIDAR systems are also mentioned briefly. Copyright © 2013 Elsevier B.V. All rights reserved.

  5. The Information Warfare Life Cycle Model

    Directory of Open Access Journals (Sweden)

    Brett van Niekerk

    2011-03-01

    Full Text Available Information warfare (IW is a dynamic and developing concept, which constitutes a number of disciplines. This paper aims to develop a life cycle model for information warfare that is applicable to all of the constituent disciplines. The model aims to be scalable and applicable to civilian and military incidents where information warfare tactics are employed. Existing information warfare models are discussed, and a new model is developed from the common aspects of these existing models. The proposed model is then applied to a variety of incidents to test its applicability and scalability. The proposed model is shown to be applicable to multiple disciplines of information warfare and is scalable, thus meeting the objectives of the model.

  6. WARFARE IN THE INFORMATION AGE

    Directory of Open Access Journals (Sweden)

    Laurian GHERMAN

    2010-01-01

    Full Text Available The paper is focused on changes occurred in military organizations in Information Age. During Industrial Age the military structure of forces evolved according with principles of decomposition, specialization, hierarchy, optimization, deconfliction, centralized planning, and decentralized execution. But now the solutions based upon Industrial Age assumptions and practices will break down and fail in the Information Age. This will happen no matter how well intentioned, hardworking, or dedicated the leadership and the force are. Two key force capabilities needed by Information Age militaries are interoperability and agility. Both interoperability and agility are provided by Network centric warfare theory of war.

  7. Radioecological aspects of nuclear warfare

    International Nuclear Information System (INIS)

    Edvarson, K.

    1975-01-01

    The radioactive fallout from nuclear explosions is one of the major effects of nuclear warfare. Those levels causing acute radiation sickness are to be expected only within the close-in or intermediate areas downwind from surface bursts. Global fallout from high yield explosions will be fairly evenly distributed in the hemisphere where the explosions occurred and cause irradiation from ground deposit, inhaled material and contaminated food. The collective doses and the order of magnitude of late casualties from this global contamination are estimated for a given total explosion yield. (auth)

  8. Analytic tools for information warfare

    Energy Technology Data Exchange (ETDEWEB)

    Vandewart, R.L.; Craft, R.L.

    1996-05-01

    Information warfare and system surety (tradeoffs between system functionality, security, safety, reliability, cost, usability) have many mechanisms in common. Sandia`s experience has shown that an information system must be assessed from a {ital system} perspective in order to adequately identify and mitigate the risks present in the system. While some tools are available to help in this work, the process is largely manual. An integrated, extensible set of assessment tools would help the surety analyst. This paper describes one approach to surety assessment used at Sandia, identifies the difficulties in this process, and proposes a set of features desirable in an automated environment to support this process.

  9. Information warfare technologies in political discourse

    Directory of Open Access Journals (Sweden)

    Karpova Anna Yu.

    2016-01-01

    Full Text Available We attempt to examine the technology of «information warfare» in this paper. The dominant theme of the paper is that the outcome of the information warfare is important not only for the future of a state itself but for the future of the world balance of forces. The main task of geopolitical actors in information warfare is to introduce ideas corresponding to their interests into mass consciousness. All participants of political conflicts have common features in technologies of Information warfare. The information anomie is the indicator of the great geopolitical actors’ personified interests on the stage of «information warfare» - the process resulted in destroying the communicative line: report-information understanding and disrupting the social order in society. In this paper authors describe the following Information Warfare technologies: "Political volcano" technology; "SPIN" technology; "Widening media resource" technology; "specific gravity" technology; "Cold War 2.0" technology and Information cleaningup technology. It is assumed that in the future there will be new instructions on applying technologies of information warfare. To impart perspective to the paper we consider examples, opinions and trends.

  10. The Acme of Skill: Nonkinetic Warfare

    National Research Council Canada - National Science Library

    Teo, Cheng H

    2008-01-01

    .... The insurgency attributes that have characterized many wars since World War II suggest that the objective of warfare has shifted from the kinetic destruction of military forces to the nonkinetic...

  11. Topic modelling in the information warfare domain

    CSIR Research Space (South Africa)

    De Waal, A

    2013-11-01

    Full Text Available In this paper the authors provide context to Topic Modelling as an Information Warfare technique. Topic modelling is a technique that discovers latent topics in unstructured and unlabelled collection of documents. The topic structure can be searched...

  12. Prehistoric ceremonial warfare: beginning of institutionalized violence

    Czech Academy of Sciences Publication Activity Database

    Turek, Jan

    2017-01-01

    Roč. 13, č. 3 (2017), s. 535-548 ISSN 1555-8622 Institutional support: RVO:67985912 Keywords : human aggression * ceremonial warfare * archery symbolism * Neolithic * Chalcolithic * Europe Subject RIV: AC - Archeology, Anthropology, Ethnology OBOR OECD: Archaeology

  13. Mountain Warfare: The Need for Specialist Training

    National Research Council Canada - National Science Library

    Malik, Muhammad

    2003-01-01

    This study focuses on the need for specialist training for mountain warfare. It analyzes the special characteristics of mountain and high altitude terrain which affect conduct of military operations...

  14. On Cyber Warfare Command and Control Systems

    National Research Council Canada - National Science Library

    Howes, Norman R; Mezzino, Michael; Sarkesain, John

    2004-01-01

    .... Cyber warfare then becomes a one-sided battle where the attacker makes all the strikes and the target of the attack responds so slowly that the attacker usually gets away without being identified...

  15. Annual Expeditionary Warfare Conference (22nd)

    Science.gov (United States)

    2017-10-24

    Session: Expeditionary Logistics Integration & Expeditionary Medicine Session Co-Chair: Mr. Tom Wetherald, Director Business Development and Strategic...Forces Special Operations Component Command. Mr. thomas Dee, Performing the Duties of the Under secretary of the navy On Feb. 17, 2017, Mr. Tom Dee was...1990) • Col Chip Gregson, “Keeping Up With Navy Doctrine.” MC Gazette, (December 1990) • Maj Tom Waldhauser, “Composite Warfare/Amphibious Warfare

  16. Special Warfare: Restructuring for the Future

    Science.gov (United States)

    2016-06-01

    Boston, MA: Albert Einstein Institution, 2002, 1-9. Hoffman , Frank. “Hybrid Warfare and Challenges.” Joint Forces Quarterly, Issue 52, 1st Quarter...20 Robert Helvey. On Strategic Nonviolence Conflict: Thinking About the Fundamentals. Boston, MA: Albert Einstein Institution, 2002, 2-3...important as the future of warfare becomes increasingly “characterized by uncertainty.”28 As Frank Hoffman has commented, success in hybrid wars will

  17. Guiding Warfare to Reach Sustainable Peace

    DEFF Research Database (Denmark)

    Vestenskov, David; Drewes, Line

    The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition of develo......The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition...

  18. On the Probability of Predicting and Mapping Traditional Warfare Measurements to the Cyber Warfare Domain

    CSIR Research Space (South Africa)

    Grobler, M

    2014-07-01

    Full Text Available Cyber warfare is a contentious topic, with no agreement on whether this is a real possibility or an unrealistic extension of the physical battlefield. This article will not debate the validity and legality of the concept of cyber warfare...

  19. Towards a framework for a network warfare capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available by many, there is a need for a more structured approach to understanding the various techniques required for a network warfare capability. A conceptual framework describing the most important network warfare techniques and considerations is proposed...

  20. Inventory parameters

    CERN Document Server

    Sharma, Sanjay

    2017-01-01

    This book provides a detailed overview of various parameters/factors involved in inventory analysis. It especially focuses on the assessment and modeling of basic inventory parameters, namely demand, procurement cost, cycle time, ordering cost, inventory carrying cost, inventory stock, stock out level, and stock out cost. In the context of economic lot size, it provides equations related to the optimum values. It also discusses why the optimum lot size and optimum total relevant cost are considered to be key decision variables, and uses numerous examples to explain each of these inventory parameters separately. Lastly, it provides detailed information on parameter estimation for different sectors/products. Written in a simple and lucid style, it offers a valuable resource for a broad readership, especially Master of Business Administration (MBA) students.

  1. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  2. Survey on Urban Warfare Augmented Reality

    Directory of Open Access Journals (Sweden)

    Xiong You

    2018-01-01

    Full Text Available Urban warfare has become one of the main forms of modern combat in the twenty-first century. The main reason why urban warfare results in hundreds of casualties is that the situational information of the combatant is insufficient. Accessing information via an Augmented Reality system can elevate combatants’ situational awareness to effectively improve the efficiency of decision-making and reduce the injuries. This paper begins with the concept of Urban Warfare Augmented Reality (UWAR and illuminates the objectives of developing UWAR, i.e., transparent battlefield, intuitional perception and natural interaction. Real-time outdoor registration, information presentation and natural interaction are presented as key technologies of a practical UWAR system. Then, the history and current research state of these technologies are summarized and their future developments are highlighted from three perspectives, i.e., (1 Better integration with Geographic Information System and Virtual Geographic Environment; (2 More intelligent software; (3 More powerful hardware.

  3. Mongol Warfare in the Pre-Dissolution Period »

    Directory of Open Access Journals (Sweden)

    Timothy May

    2015-01-01

    Full Text Available Although the Mongols used many of the tactics and strategies that steppe nomads had used for centuries, the Mongols refined steppe warfare so that this style of warfare reached its apogee during the Mongol Empire. Furthermore, the Mongols developed a style of warfare that made them possibly the greatest military force in history. This work examines several facets of the pre-dissolution period (1200–1260. With the dissolution of the Mongol Empire, Mongol warfare once again changed. In some areas it remained complex while in others it regressed to traditional forces of steppe warfare, still potent but not as effective as the pre-dissolution period.

  4. Physical Readiness Testing of Surface Warfare Officers

    Science.gov (United States)

    1991-06-01

    NA% I PHISICAL READIiESS TEST (PRT QUEST1OthAIRE I. hE ARE CONDUCTI NG THESIS RESEAR H 0N HO- ELL THE PRT SUPPORT5 TNE R 0 T i E 0F St RF AC E ’ARAR...AD-A245 519 NAVAL POSTGRADUATE SCHOOL Monterey, California DTIC CTE.EC a% FEB071992 CI THESIS Physical Readiness Testing of Surface Warfare Officers...READINESS TESTING OF SURFACE WARFARE OFFICERS 12. PERSONAL AUTHOR(S) Hatch, William D. II and Swinney, Lori D. 13a. TYPE OF REPORT 13b. TIME COVERED 14

  5. Riparian Inventory

    Data.gov (United States)

    Kansas Data Access and Support Center — This dataset is a digital representation of the 1:24,000 Land Use Riparian Areas Inventory for the state of Kansas. The dataset includes a 100 foot buffer around all...

  6. Cognitive systems in electronic warfare

    Science.gov (United States)

    Kulpa, Krzysztof; Szczepankiewicz, Michał; Żywek, Marcin; Malanowski, Mateusz; Misiurewicz, Jacek; Samczyński, Piotr

    2017-04-01

    Electronic warfare (EW) techniques were invented 70 years ago and are still being developed, all the time with a key role played by their operators. However, a human operator responds far too slowly for the on-going needs since to be adequate to current threats the EW system reaction should be within 1 ms or less. Too slow reaction defers an achievement of the objectives, and generally may lead to disclosure of the applied strategy and to waste of resources. Developing the adequate response to the threat is a multifaceted matter that requires considerable experience and knowledge on the one hand, and thorough observation of outcomes of the applied strategy on the other hand. Such action requires the use of not only intelligence but also more complex algorithms for automatic control than the classical ones, and it heavily builds on the experience. It is therefore a cognitive task in its nature, and a human operator acts naturally this way. Consequently, a proper training and experience gained are what really matters. As a result of tests and actions in EW the operator builds his own knowledge base, thus, gains a capability of responding to the known threats in a balanced way. New threats, however, are much more challenging since they should be handled as fast as possible but in a fresh and creative manner. To this end, adapting the algorithms of radar jamming protection for the new conditions of the battlefield is an example of such challenging tasks. At present, such adjustments are done in a long feedback loop when the operator, after recognizing the problem, notifies the equipment manufacturers, and then, their engineers work on required solutions accordingly. Thus, the reaction time is counted in years, not a single milliseconds or seconds. Speeding up the response time is therefore the key issue, and a solution to it would be feasible only when cognitive systems were used. A concept of such cognitive system is presented in this paper.

  7. Biomonitoring of exposure to chemical warfare agents

    NARCIS (Netherlands)

    Noort, D.; Schans, M.J. van der; Benschop, H.P.

    2006-01-01

    An overview is presented of the major methods that are presently available for biomonitoring of exposure to chemical warfare agents, i.e., nerve agents and sulfur mustard. These methods can be applied for a variety of purposes such as diagnosis and dosimetry of exposure of casualties, verification

  8. Warfare tourism experiences and national identity

    NARCIS (Netherlands)

    Gieling, Joost; Ong, Chin Ee

    2016-01-01

    This paper examines through an analysis of Dutch warfare tourism whether there is a relationship between the subjective perceived salience of Dutch identity and heritage tourists’ motives, emotions and overall satisfaction. Using a social identity theory framework, this study provides a view of

  9. Chemical and Biological Warfare: A Selected Bibliography

    Science.gov (United States)

    1991-04-01

    WORLD ARMA - MENTS AND DISARMAMENT. SIPRI Yearbook 1990. New York: Oxford University Press, 1990. (REF JX1974 S775 1990) Pp. 107-133: "Chemical and...Report. Norton D. Zinder, Chairman. Washington: National Academy Press, 1984. (UG447 N33 1984) LEGACY OF CHEMICAL AND BIOLOGICA !L WARFARE Some 20th

  10. Mesoporous manganese oxide for warfare agents degradation

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Králová, Daniela; Opluštil, F.; Němec, T.

    2012-01-01

    Roč. 156, JULY (2012), s. 224-232 ISSN 1387-1811 R&D Projects: GA MPO FI-IM5/231 Institutional research plan: CEZ:AV0Z40320502; CEZ:AV0Z40500505 Keywords : homogeneous hydrolysis * chloroacetamide * manganese(IV) oxide * warfare agents Subject RIV: CA - Inorganic Chemistry Impact factor: 3.365, year: 2012

  11. Chemical Warfare Agent Decontaminant Solution Using Quaternary Ammonium Complexes

    Science.gov (United States)

    1997-12-11

    warfare agents, which include a variety of organophosphorus and organosulfur compounds, are known in the art. 15 However, these known methods use...chemical warfare agents, and works particularly well for neutralization of organosulfur agents such as mustard gas (HD), and organophosphorus agents such...detoxifying/neutralizing a variety of chemical warfare agents, including organosulfur agents such as mustard gas (HD), and organophosphorus agents such as

  12. Containment 2.0: U.S. political warfare

    OpenAIRE

    Alexander, Nicole M.

    2016-01-01

    Approved for public release; distribution is unlimited Contemporary Russia has shown an increasing preference for using Cold War–era political warfare techniques, which are deeply rooted in its doctrine and foreign policies. To date, the U.S. response comprises the conventional military aspects of the Cold War–era deterrence and containment rather than political warfare strategies. Exploring previous U.S. experience in political warfare activities—under the broad categories of strategic in...

  13. Book Review: Composite warfare: the conduct of successful ground ...

    African Journals Online (AJOL)

    Abstract. Book Title: Composite warfare: the conduct of successful ground force operations in Africa. Book Author: Eeben Barlow. Pinetown: 30 Degrees South Publishers. 2015, 576 pages. ISBN 9781928211761.

  14. Handbook of toxicology of chemical warfare agents

    CERN Document Server

    2010-01-01

    This groundbreaking book covers every aspect of deadly toxic chemicals used as weapons of mass destruction and employed in conflicts, warfare and terrorism. Including findings from experimental as well as clinical studies, this one-of-a-kind handbook is prepared in a very user- friendly format that can easily be followed by students, teachers and researchers, as well as lay people. Stand-alone chapters on individual chemicals and major topics allow the reader to easily access required information without searching through the entire book. This is the first book that offers in-depth coverage of individual toxicants, target organ toxicity, major incidents, toxic effects in humans, animals and wildlife, biosensors, biomarkers, on-site and laboratory analytical methods, decontamination and detoxification procedures, prophylactic, therapeutic and countermeasures, and the role of homeland security. Presents a comprehensive look at all aspects of chemical warfare toxicology in one reference work. This saves research...

  15. Computational models of intergroup competition and warfare.

    Energy Technology Data Exchange (ETDEWEB)

    Letendre, Kenneth (University of New Mexico); Abbott, Robert G.

    2011-11-01

    This document reports on the research of Kenneth Letendre, the recipient of a Sandia Graduate Research Fellowship at the University of New Mexico. Warfare is an extreme form of intergroup competition in which individuals make extreme sacrifices for the benefit of their nation or other group to which they belong. Among animals, limited, non-lethal competition is the norm. It is not fully understood what factors lead to warfare. We studied the global variation in the frequency of civil conflict among countries of the world, and its positive association with variation in the intensity of infectious disease. We demonstrated that the burden of human infectious disease importantly predicts the frequency of civil conflict and tested a causal model for this association based on the parasite-stress theory of sociality. We also investigated the organization of social foraging by colonies of harvester ants in the genus Pogonomyrmex, using both field studies and computer models.

  16. Cyber Warfare: New Character with Strategic Results

    Science.gov (United States)

    2013-03-01

    government property.”12 Applying these standards to cyberspace is contentious in the international community since millions of cyber attacks transpire daily...forces and creating additional hostility. At its very nature cyber warfare can be both coercive and destructive. “At the strategic level, cyber attacks could...in the state is an armed attack.”42 Other interpretations require a higher threshold for invoking Article 51. “[O]nly large scale cyber attacks on

  17. Electronic Warfare in Army Models - A Survey.

    Science.gov (United States)

    1980-08-01

    CCM) PROVING GROUND TENIAS SAMJAM EIEM SPREAD SPECTRUM US ARMY ELECTRONIC FOREIGN SCIENCE & OFFICE OF MISSILE WARFARE LAB (EWL) TECHNOLOGY CENTER...IPAR MULTIRADAR SPREAD SPECTRUM ECMFUZ IRSS OTOALOC TAC ZINGERS EIEM ITF PATCOM TAM EOCM SIM FAC MGM-H4D RFSS TENIAS GTSF MG(-H4H ROLJAM ZAP I HMSM MSL...USAFAS TRASANA USAPAS TCF ASD WPAFU TENIAS ______ ___ ECAC _________ WAR EAGLE _________CATRADA WARRANT am________ 3DBDM ZAP 1 ____________ MEW EWL ZAP 2

  18. Russia’s Approach to Cyber Warfare

    Science.gov (United States)

    2016-09-01

    warfare domain in its own right. Ideally, it is to be employed as part of a whole of government effort, along with other, more traditional, weapons of...4 even days, be transformed into an arena of fierce armed conflict, become a victim of foreign intervention, and sink into a web of chaos...Russian military is a relative latecomer to the cyber arena. For many years, cyber was the exclusive domain of the state’s security services. The

  19. Recent Trends in Thinking about Warfare

    Science.gov (United States)

    2006-09-01

    as a pikeman), the flintlock, the iron ramrod, and mechanical production, coupled with the discovery of cheap sources of nitrates (which radically...to technologies that provide cheap WMD-like capabilities, and the vulnerabilities offered by physical, cultural, social, economic, and political...context in Peter P. Perla, Albert A. Nofi, and Michael C. Markowitz, Wargaming Fourth-Generation Warfare, Sep 2006 ( CRM D0014752.A2/Final). 83 Aryan

  20. Training Practices for Surface Warfare Junior Officers

    Science.gov (United States)

    2011-12-01

    What some saw as spoon feeding , others saw as a lack of standards and goals. The issue is also worth considering in light of the changing values of the...NPS-GSBPP-12-004 NAVAL POSTGRADATE SCHOOL MONTEREY, CALIFORNIA Approved for public release; distribution is...unlimited Prepared for Naval Postgraduate School , Monterey, California 93943 TRAINING PRACTICES FOR SURFACE WARFARE JUNIOR OFFICERS by William R

  1. Hybrid Warfare: Preparing for Future Conflict

    Science.gov (United States)

    2015-02-17

    www.vox.com/a/barack-obama-interview-vox- conversation/obama-foreign-policy-transcript. Zedong , Mao . On Protracted War. Honolulu: University...warfare in Ukraine represents a threat to state sovereignty in Eastern Europe, where, like Ukraine, many states have large Russian minority populations ...adjust as well. Conventional and unconventional military actions, such as targeting military supply routes and protecting the population , must occur at

  2. Soviet Partisan Warfare: Integral to the Whole,

    Science.gov (United States)

    1988-04-20

    partisan forces. They also saw partisan warfare as more than a military tool. Its influence was potent for propaganda use and for assuring continued...corefully selected for political reliability and partisan bands themselves were subjected to intense pro-Soviet propaganda . The risks involved in...John Erickson. The Soviet High Command. A_____________________ Military- Politica ~l History. 1918-1941. Boulder, Colorado: * Westview Press, 1962, p. 6.i

  3. Hybrid Warfare: Implications for CAF Force Development

    Science.gov (United States)

    2014-08-01

    objective,” p.603 in Peter Paret and Michael Howard , eds., trans., Carl von Clausewitz, On War. Princeton NJ: Princeton University Press, 1976...and Michael Howard , eds., trans., Carl von Clausewitz, On War. Princeton NJ: Princeton University Press, 1976. Royal Canadian Navy, Horizon 2050: A...The Winograd Commission) (Government of Israel), Final Report, January 2008. Thornton, Rod, Asymmetric Warfare, Malden MA: 2007. Tse- Tung , Mao, On

  4. Toward Operational Art in Special Warfare: Appendixes

    Science.gov (United States)

    2016-01-01

    groups to endure great hardship and work toward a common goal of driving out the infidel to defend their faith. Insights for special warfare Nuclear... financing , and the International Military Education and Training program (IMET). These programs are typically authorized and funded by DoS and executed...Organizations at U.S. embassies. In par- allel, the Security Assistance Organizations also submit requests through the foreign military financing /IMET

  5. Torpedoes and Their Impact on Naval Warfare

    Science.gov (United States)

    2017-01-01

    torpedo shell, and, as it pumped the water out through a hole in the rear, thrust was produced. This was surely the first jet -propelled torpedo...reduced from 46 to 2 kilograms per torpedo. The amounts of copper and tin used were substantially reduced. The cost and labor hours were cut in...unrestricted warfare against merchant shipping to cut sea lines of communications forcefully demonstrated the strategic significance of the torpedo as

  6. Optimization of Inventory

    OpenAIRE

    PROKOPOVÁ, Nikola

    2017-01-01

    The subject of this thesis is optimization of inventory in selected organization. Inventory optimization is a very important topic in each organization because it reduces storage costs. At the beginning the inventory theory is presented. It shows the meaning and types of inventory, inventory control and also different methods and models of inventory control. Inventory optimization in the enterprise can be reached by using models of inventory control. In the second part the company on which is...

  7. Relevance of information warfare models to critical infrastructure ...

    African Journals Online (AJOL)

    This article illustrates the relevance of information warfare models to critical infrastructure protection. Analogies of information warfare models to those of information security and information systems were used to deconstruct the models into their fundamental components and this will be discussed. The models were applied ...

  8. Axial Vircator for Electronic Warfare Applications

    Directory of Open Access Journals (Sweden)

    L. Drazan

    2009-12-01

    Full Text Available This paper deals with a high power microwave generator with virtual cathode – vircator in axial release for electronic warfare applications. The classification of directed energy weapons microwave (DEWM is introduced together with basic block diagrams of a particular class of DEWM. In the paper, methods for designing vircator pulsed power supply, axial vircator structure, measurement methods and experimental results are presented. The vircator in electromagnetic ammunition is powered by magneto-cumulative generator and in weapons for defense of objects (WDO, it is powered by Marx generator. The possible applications of a vircator in the DEWM area are discussed.

  9. Navy Operational Planner - Undersea Warfare Module

    Science.gov (United States)

    2016-09-01

    CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540–01-280-5500 Standard Form 298 (Rev. 2–89) Prescribed by ANSI...Convergence Zone DP Direct Path HVU High Value Unit MCM Mine Sweeper MIW Mine Warfare NMP Navy Mission Planner NOP Navy Operational Planner NOP–USW...Illustrated in Figure 1 is a piecewise linear from of the equation 1 tAchievement e   , where Achievement is the probability that a mine field

  10. Electronic warfare receivers and receiving systems

    CERN Document Server

    Poisel, Richard A

    2014-01-01

    Receivers systems are considered the core of electronic warfare (EW) intercept systems. Without them, the fundamental purpose of such systems is null and void. This book considers the major elements that make up receiver systems and the receivers that go in them.This resource provides system design engineers with techniques for design and development of EW receivers for modern modulations (spread spectrum) in addition to receivers for older, common modulation formats. Each major module in these receivers is considered in detail. Design information is included as well as performance tradeoffs o

  11. Microwave receivers with electronic warfare applications

    CERN Document Server

    Tsui, James

    2005-01-01

    This book by the author of Digital Techniques for Wideband Receivers willbe like no other one on your book shelf as the definitive word on electronicwarfare (EW) receiver design and performance. Whether you are an EWscientist involved in the test and evaluation of EW receivers or a designerof RWR's and other EW-related receivers, Microwave Receivers withElectronic Warfare Applications is a handy reference through which you canperfect your technical art. Lucidly written, this book is a treatise on EWreceivers that is relevant to you if you are just looking for a top-levelinsight into EW receive

  12. History of chemical and biological warfare agents

    International Nuclear Information System (INIS)

    Szinicz, L.

    2005-01-01

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents

  13. History of chemical and biological warfare agents.

    Science.gov (United States)

    Szinicz, L

    2005-10-30

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents.

  14. Managing the Double Edged Sword of Network-Centric Warfare

    National Research Council Canada - National Science Library

    Wells, David

    2003-01-01

    Network Centric Warfare can tend to collapse the operational level war by allowing information to flow around or past hierarchical staff structures and directly between tactical and strategic level decision makers...

  15. Mine Warfare - The Joint Force Commander's Achilles Heel

    National Research Council Canada - National Science Library

    Cochran, Bryan

    2004-01-01

    ... Countermeasures systems resident within Strike Groups to counter enemy mine laying activities. Additionally, the Navy needs to transform its culture and mainstream the full spectrum of MIW to include naval mining and countermine warfare capabilities...

  16. Echoes of Chechnya Warfare Resound in Moscow, Quantico

    National Research Council Canada - National Science Library

    Ackerman, Robert

    2000-01-01

    .... thinking about urban warfare. After suffering stunning public defeats just a few years ago, Russian forces applied painful lessons learned then to drive Chechen forces out of their capital city, Grozny, this year...

  17. Organizing for Irregular Warfare: Implications for the Brigade Combat Team

    National Research Council Canada - National Science Library

    Burgess, Kenneth J

    2007-01-01

    ... operations in 21st-century irregular environments. The author argues that Infantry Brigade Combat Teams would be better optimized for the challenges of irregular warfare through structural changes that decentralize resources...

  18. Irregular Warfare: Impact on Future Professional Military Education

    National Research Council Canada - National Science Library

    Paschal, David G

    2006-01-01

    ... to operate effectively in an irregular warfare environment. The utility of a decisive war between nation states continues to decline and will eventually reach critical mass based upon the extreme imbalance of military power and a U.S. monopoly...

  19. Design and implementation of intelligent electronic warfare decision making algorithm

    Science.gov (United States)

    Peng, Hsin-Hsien; Chen, Chang-Kuo; Hsueh, Chi-Shun

    2017-05-01

    Electromagnetic signals and the requirements of timely response have been a rapid growth in modern electronic warfare. Although jammers are limited resources, it is possible to achieve the best electronic warfare efficiency by tactical decisions. This paper proposes the intelligent electronic warfare decision support system. In this work, we develop a novel hybrid algorithm, Digital Pheromone Particle Swarm Optimization, based on Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO) and Shuffled Frog Leaping Algorithm (SFLA). We use PSO to solve the problem and combine the concept of pheromones in ACO to accumulate more useful information in spatial solving process and speed up finding the optimal solution. The proposed algorithm finds the optimal solution in reasonable computation time by using the method of matrix conversion in SFLA. The results indicated that jammer allocation was more effective. The system based on the hybrid algorithm provides electronic warfare commanders with critical information to assist commanders in effectively managing the complex electromagnetic battlefield.

  20. Fourth Generation Warfare: The Need for a Comprehensive Approach

    National Research Council Canada - National Science Library

    Benton, LeRoy D

    2008-01-01

    .... A definition of Fourth Generation Warfare is developed, based on Col. Thomas X. Hammes' writings. The definition is further developed to show relevance and applicability to current operations in the Long War on Terrorism...

  1. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  2. The Role of Airpower in Urban Warfare. An Airman's Perspective

    National Research Council Canada - National Science Library

    Saffold, Timothy

    1998-01-01

    .... This emphasis on surface force employment stifles innovative thought as to how military forces can achieve operational and strategic effects by employing airpower as the key instrument of force in urban warfare...

  3. State of the Art Report on Drone-Based Warfare

    OpenAIRE

    Lee-Morrison, Lila

    2014-01-01

    State of the art report on the latest cultural discourse and debate over contemporary forms of drone based warfare. primarily resulting from the disciplines of Law, Political Science, and Geography. 2014.

  4. Fourth Generation Warfare: The Need for a Comprehensive Approach

    National Research Council Canada - National Science Library

    Benton, LeRoy D

    2008-01-01

    ... to defeat its enemies in the Long War on Terrorism. The method used to resolve this issue was to frame the scope of the current operating environment in the context of Fourth Generation Warfare...

  5. Irregular Warfare: Special Operations Joint Professional Military Education Transformation

    National Research Council Canada - National Science Library

    Cannady, Bryan H

    2008-01-01

    ... on today's battlefront in Afghanistan and Iraq and in the Global War on Terrorism (GWOT). At the forefront of the GWOT and irregular warfare are the United States Special Operations Command (USSOCOM...

  6. A Proposed Framework for Network-Centric Maritime Warfare Analysis

    National Research Council Canada - National Science Library

    Klingbeil, Ralph

    2003-01-01

    .... In addition, this report demonstrates how the functions of many of the independent and dependent variables and associated warfare metrics can be translated into the characteristics and metrics of queues.

  7. Motivation and requirements for determining a Network Warfare Capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2010-06-01

    Full Text Available , whereas in the latter, an assessment is given of the current state of Network Warfare skills. This assessment can involve expert opinion, controls and guidelines. According to Bragg et al, an assessment is not an audit, which is used to test compliance... approach to ensure conformance to established guidelines. The difference between network security auditing and determining a Network Warfare Capability is that network security auditing evaluates compliance with controls in a very detailed manner...

  8. The theory of unconventional warfare win, lose, and draw

    OpenAIRE

    DeFeyter, Bruce E.

    2008-01-01

    Clausewitz states that "The defensive form of warfare is intrinsically stronger than the offense" and to defeat 'the stronger form of warfare' "an army's best weapon is superior numbers." Given these two facts, how do special operations forces defeat numerically superior forces fighting in the defense? William H. McRaven's book, Spec Ops, lays out a theory of special operations and six principles that are "applicable across the spectrum of special operations" (McRaven, 1995, p. 3). McRav...

  9. Cyberspace Warfare: A New DoD Core Mission Area

    Science.gov (United States)

    2013-05-01

    7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION Joint Forces Staff College REPORT NUMBER Joint Advanced Warfighting...According to Andrew F. Krepinevich cyberspace warfare is defined as: The actions by nation-states and non-state actors to penetrate computers or... actors conducting cyberspace operations in, through, and from cyberspace as a 1 Andrew F. Krepinevich, “Cyber Warfare: A Nuclear Option,” Center for

  10. Dirty Fighting: How to Counter Total Warfare Mentality

    Science.gov (United States)

    2015-06-12

    sustained British security discipline, support for the main PIRA dirty fighting weapon (unannounced bombings) began to turn against them. This was... DIRTY FIGHTING: HOW TO COUNTER TOTAL WARFARE MENTALITY A thesis presented to the Faculty of the U.S. Army Command and... Dirty Fighting: How to Counter Total Warfare Mentality 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Major

  11. Information Warfare, Threats and Information Security

    Directory of Open Access Journals (Sweden)

    Dmitriy Nikolaevich Bespalov

    2014-01-01

    Full Text Available The article presents the opposite, but dependent on each other's reality - Revolutionary War information,information security goals and objectives of their study within the scheme "challenge-response", methodological and analytical support, the role of elites and the information society in promoting information security. One of the features of contemporaneityis the global spread of ICT, combined with poor governance and other difficulties in the construction of innovation infrastructures that are based on them in some countries. This leads to the reproduction of threats, primarily related to the ability to use ICT for purposes that are inconsistent with the objectives of maintaining international peace and security, compliance with the principles of non-use of force, non-interference in the internal affairs of states, etc. In this regard, include such terms as "a threat of information warfare", "information terrorism" and so forth. Information warfare, which stay in the policy declared the struggle for existence, and relationships are defined in terms of "friend-enemy", "ours-foreign". Superiority over the opponent or "capture of its territory" is the aim of political activity. And information security, serving activities similar process of political control, including a set of components, is a technology until their humanitarian. From the context and the decision itself is the ratio of the achieved results of information and political influence to the target - a positive image of Russia. Bringing its policy in line with the demands of a healthy public opinion provides conductivity of theauthorities initiatives in the country and increases the legitimacy of the Russian Federation actions in the world.

  12. The Fate of Chemical Warfare Agents in the Environment

    Energy Technology Data Exchange (ETDEWEB)

    Talmage, Sylvia Smith [ORNL; Munro, Nancy B [ORNL; Watson, Annetta Paule [ORNL; King, J. [U.S. Army Environmental Center; Hauschild, Veronique [U.S. Environmental Protection Agency (EPA)

    2007-01-01

    Chemical Warfare Agents, Second Edition has been totally revised since the successful first edition and expanded to about three times the length, with many new chapters and much more in-depth consideration of all the topics. The chapters have been written by distinguished international experts in various aspects of chemical warfare agents and edited by an experienced team to produce a clear review of the field. The book now contains a wealth of material on the mechanisms of action of the major chemical warfare agents, including the nerve agent cyclosarin, formally considered to be of secondary importance, as well as ricin and abrin. Chemical Warfare Agents, Second Edition discusses the physico-chemical properties of chemical warfare agents, their dispersion and fate in the environment, their toxicology and management of their effects on humans, decontamination and protective equipment. New chapters cover the experience gained after the use of sarin to attack travelers on the Tokyo subway and how to deal with the outcome of the deployment of riot control agents such as CS gas. This book provides a comprehensive review of chemical warfare agents, assessing all available evidence regarding the medical, technical and legal aspects of their use. It is an invaluable reference work for physicians, public health planners, regulators and any other professionals involved in this field.

  13. Marine Corps NBC Warfare: Determining Clinical Supply Requirements for Treatment of Battlefield Casualties from Chemical and Biological Warfare

    National Research Council Canada - National Science Library

    Hill, Martin; Galameau, Mike; Pang, Gerry; Konoske, Paula

    2003-01-01

    ... to treat victims of biochemical agents on the battlefield. This study reviewed Marine Corps medical supply blocks for biological and chemical warfare casualties - Authorized Medical Allowance Lists (AMALs) 687 and 688...

  14. Understanding the elementary considerations in a network warfare environment: an introductory framework

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available by many, there is a need for a more structured approach to understanding the various techniques required for a network warfare capability. A conceptual framework describing the most important network warfare techniques and considerations is proposed...

  15. Nuclear, biological and chemical warfare. Part I: Medical aspects of nuclear warfare.

    Science.gov (United States)

    Kasthuri, A S; Pradhan, A B; Dham, S K; Bhalla, I P; Paul, J S

    1990-04-01

    Casualties in earlier wars were due much more to diseases than to weapons. Mention has been made in history of the use of biological agents in warfare, to deny the enemy food and water and to cause disease. In the first world war chemical agents were used to cause mass casualties. Nuclear weapons were introduced in the second world war. Several countries are now involved in developing nuclear, biological and chemical weapon systems, for the mass annihilation of human beings, animals and plants, and to destroy the economy of their enemies. Recently, natural calamities and accidents in nuclear, chemical and biological laboratories and industries have caused mass instantaneous deaths in civilian population. The effects of future wars will not be restricted to uniformed persons. It is time that physicians become aware of the destructive potential of these weapons. Awareness, immediate protective measures and first aid will save a large number of persons. This series of articles will outline the medical aspects of nuclear, biological and chemical weapon systems in three parts. Part I will deal with the biological effects of a nuclear explosion. The short and long term effects due to blast, heat and associated radiation are highlighted. In Part II, the role of biological agents which cause commoner or new disease patterns is mentioned. Some of the accidents from biological warfare laboratories are a testimony to its potential deleterious effects. Part III deals with medical aspects of chemical warfare agents, which in view of their mass effects can overwhelm the existing medical resources, both civilian and military.(ABSTRACT TRUNCATED AT 250 WORDS)

  16. Does the Economy or Surface Warfare Officer Career Pay Affect Surface Warfare Officer Retention?

    Science.gov (United States)

    2014-12-01

    from Bureau of Naval Personnel in an inventory format . The data consisted of yearly inventories of SWOs by cohort stratified by gender . See Appendix...Personnel. The data consists of yearly inventories of SWOs by cohort stratified by gender . Using retention rates as a dependent variable, the analysis... taste -factor” for non-monetary factors for both military and civilian life: m = annual monetary equivalent of non-monetary aspects of military life

  17. The 2006 Lebanon Campaign and the Future of Warfare: Implications for Army and Defense Policy

    Science.gov (United States)

    2008-09-01

    ground, see, e.g., Mao Tse-Tung, On Guerrilla Warfare, Samuel B. Griffith, trans., Mineola, NY: Dover, 2005, pp. 52, 97, 102; Ernesto Guevara...Guerrilla Warfare, Old Chelsea, NY: Ocean Press, 2006, pp. 20, 22, 26; Ian F.W. Beckett , Modern Insurgencies and Counter-Insurgencies, New York...Clodfelter, Warfare and Armed Conflicts, pp. 689-690, 696, 712, 757-759). 15. See, e.g., Mao, On Guerrilla Warfare, pp. 55-57, 113; Beckett , Modern

  18. Russian New Art of Hybrid Warfare in Ukraine

    Directory of Open Access Journals (Sweden)

    Rusnáková Soňa

    2017-10-01

    Full Text Available The main aim of this paper is to analyse the annexation of Crimea by the Russian Federation. For the purposes of the paper, the theory of hybrid warfare was chosen as an analytical category. Throughout the paper, the concept of hybrid warfare is examined and applied on case study of Crimean annexation. Hybrid warfare, especially in connection with Russian actions in Crimea has been an intensely debated concept. There is an ongoing debate among scholars concerning the meaning of the concept, its existence and employment by the Russian Federation. This paper showed that the article of Valeriy Gerasimov – the incumbent Chief of the General Staff of the Russian Federation-invoked a new warfare strategy for the Russian Federation which was consequently for the very first time in its full spectre and effectivity employed on case of Crimean annexation in March 2014. Observing the application of the hybrid warfare in practice serves the purposes of countering its further potential application in post-Soviet space and Russian ‘near abroad’.

  19. Numerical simulation of RCS for carrier electronic warfare airplanes

    Directory of Open Access Journals (Sweden)

    Yue Kuizhi

    2015-04-01

    Full Text Available This paper studies the radar cross section (RCS of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carrier electronic warfare airplanes Model A and Model B with weapons were established. Based on the physical optics method and the equivalent electromagnetic flow method, by the use of the RCSAnsys software, the characteristics of carrier electronic warfare airplanes’ RCS under steady and dynamic flights were simulated under the UHF, X, and S radar bands. This paper researches the detection probability of aircraft by radars under the condition of electronic warfare, and completes the mathematical statistical analysis of the simulation results. The results show that: The Model A of carrier electronic warfare airplane is better than Model B on stealth performance and on discover probability by radar detection effectively.

  20. History of biological warfare and bioterrorism.

    Science.gov (United States)

    Barras, V; Greub, G

    2014-06-01

    Bioterrorism literally means using microorganisms or infected samples to cause terror and panic in populations. Bioterrorism had already started 14 centuries before Christ, when the Hittites sent infected rams to their enemies. However, apart from some rare well-documented events, it is often very difficult for historians and microbiologists to differentiate natural epidemics from alleged biological attacks, because: (i) little information is available for times before the advent of modern microbiology; (ii) truth may be manipulated for political reasons, especially for a hot topic such as a biological attack; and (iii) the passage of time may also have distorted the reality of the past. Nevertheless, we have tried to provide to clinical microbiologists an overview of some likely biological warfare that occurred before the 18th century and that included the intentional spread of epidemic diseases such as tularaemia, plague, malaria, smallpox, yellow fever, and leprosy. We also summarize the main events that occurred during the modern microbiology era, from World War I to the recent 'anthrax letters' that followed the World Trade Center attack of September 2001. Again, the political polemic surrounding the use of infectious agents as a weapon may distort the truth. This is nicely exemplified by the Sverdlovsk accident, which was initially attributed by the authorities to a natural foodborne outbreak, and was officially recognized as having a military cause only 13 years later. © 2014 The Authors Clinical Microbiology and Infection © 2014 European Society of Clinical Microbiology and Infectious Diseases.

  1. Chemical Warfare Agent Degradation and Decontamination

    Energy Technology Data Exchange (ETDEWEB)

    Talmage, Sylvia Smith [ORNL; Watson, Annetta Paule [ORNL; Hauschild, Veronique [U.S. Environmental Protection Agency; Munro, Nancy B [ORNL; King, J. [U.S. Army Environmental Center

    2007-02-01

    The decontamination of chemical warfare agents (CWA) from structures, environmental media, and even personnel has become an area of particular interest in recent years due to increased homeland security concerns. In addition to terrorist attacks, scenarios such as accidental releases of CWA from U.S. stockpile sites or from historic, buried munitions are also subjects for response planning. To facilitate rapid identification of practical and effective decontamination approaches, this paper reviews pathways of CWA degradation by natural means as well as those resulting from deliberately applied solutions and technologies; these pathways and technologies are compared and contrasted. We then review various technologies, both traditional and recent, with some emphasis on decontamination materials used for surfaces that are difficult to clean. Discussion is limited to the major threat CWA, namely sulfur mustard (HD, bis(2-chloroethyl)sulfide), VX (O-ethyl S-(2-diisopropylaminoethyl) methylphosphonothioate), and the G-series nerve agents. The principal G-agents are GA (tabun, ethyl N,N-dimethylphosphoramidocyanidate), GB (sarin, isopropyl methylphosphonofluoridate), and GD (soman, pinacolyl methylphosphonofluoridate). The chemical decontamination pathways of each agent are outlined, with some discussion of intermediate and final degradation product toxicity. In all cases, and regardless of the CWA degradation pathway chosen for decontamination, it will be necessary to collect and analyze pertinent environmental samples during the treatment phase to confirm attainment of clearance levels.

  2. World Glacier Inventory

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The World Glacier Inventory (WGI) contains information for over 130,000 glaciers. Inventory parameters include geographic location, area, length, orientation,...

  3. Housing Inventory Count

    Data.gov (United States)

    Department of Housing and Urban Development — This report displays the data communities reported to HUD about the nature of their dedicated homeless inventory, referred to as their Housing Inventory Count (HIC)....

  4. HHS Enterprise Data Inventory

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Enterprise Data Inventory (EDI) is the comprehensive inventory listing of agency data resources including public, restricted public, and non-public datasets.

  5. Integrated inventory information system

    Digital Repository Service at National Institute of Oceanography (India)

    Sarupria, J.S.; Kunte, P.D.

    The nature of oceanographic data and the management of inventory level information are described in Integrated Inventory Information System (IIIS). It is shown how a ROSCOPO (report on observations/samples collected during oceanographic programme...

  6. National Wetlands Inventory Polygons

    Data.gov (United States)

    Minnesota Department of Natural Resources — Wetland area features mapped as part of the National Wetlands Inventory (NWI). The National Wetlands Inventory is a national program sponsored by the US Fish and...

  7. Science Inventory | US EPA

    Science.gov (United States)

    The Science Inventory is a searchable database of research products primarily from EPA's Office of Research and Development. Science Inventory records provide descriptions of the product, contact information, and links to available printed material or websites.

  8. IMS software developments for the detection of chemical warfare agent

    Science.gov (United States)

    Klepel, ST.; Graefenhain, U.; Lippe, R.; Stach, J.; Starrock, V.

    1995-01-01

    Interference compounds like gasoline, diesel, burning wood or fuel, etc. are presented in common battlefield situations. These compounds can cause detectors to respond as a false positive or interfere with the detector's ability to respond to target compounds such as chemical warfare agents. To ensure proper response of the ion mobility spectrometer to chemical warfare agents, two special software packages were developed and incorporated into the Bruker RAID-1. The programs suppress interferring signals caused by car exhaust or smoke gases resulting from burning materials and correct the influence of variable sample gas humidity which is important for detection and quantification of blister agents like mustard gas or lewisite.

  9. The Cycle of Warfare - Analysis of an Analytical Model

    DEFF Research Database (Denmark)

    Jensen, Mikkel Storm

    2016-01-01

    The abstract has the title: “The Cycle of Warfare - Analysis of an Analytical Model” The Cycle of Warfare is an analytical model designed to illustrate the coherence between the organization, doctrine and technology of a military entity and the influence of the surrounding society as expressed...... both retrospectively and predictively. As a tool for historians the model can help to identify decisive factors in developments and outcomes. As a tool for intelligence analysts, it can be used predictively to identify likely possible outcomes or unknown elements in analysed entities....

  10. Inventory - Dollars and sense

    International Nuclear Information System (INIS)

    Samson, J.R.

    1992-01-01

    Nuclear utilities are becoming more aware of the importance of having an inventory investment that supports two opposing philosophies. The business philosophy wants a minimal inventory investment to support a better return on invested dollars. This increase in return comes from having the dollars available to invest versus having the money tied up in inventory sitting on the shelf. The opposing viewpoint is taken by maintenance/operations organizations, which desire the maximum inventory available on-site to repair any component at any time to keep the units on-line at all times. Financial managers also want to maintain cash flow throughout operations so that plants run without interruptions. Inventory management is therefore a mixture of financial logistics with an operation perspective in mind. A small amount of common sense and accurate perception also help. The challenge to the materials/inventory manager is to optimize effectiveness of the inventory by having high material availability at the lowest possible cost

  11. Magnetic Bacteria.

    Science.gov (United States)

    Nelson, Jane Bray; Nelson, Jim

    1992-01-01

    Describes the history of Richard Blakemore's discovery of magnetotaxic organisms. Discusses possible reasons why the magnetic response in bacteria developed. Proposes research experiments integrating biology and physics in which students investigate problems using cultures of magnetotaxic organisms. (MDH)

  12. Big bacteria

    DEFF Research Database (Denmark)

    Schulz, HN; Jørgensen, BB

    2001-01-01

    A small number of prokaryotic species have a unique physiology or ecology related to their development of unusually large size. The biomass of bacteria varies over more than 10 orders of magnitude, from the 0.2 mum wide nanobacteria to the largest cells of the colorless sulfur bacteria......, Thiomargarita namibiensis, with a diameter of 750 mum. All bacteria, including those that swim around in the environment, obtain their food molecules by molecular diffusion. Only the fastest and largest swimmers known, Thiovulum majus, are able to significantly increase their food supply by motility...... and by actively creating an advective flow through the entire population. Diffusion limitation generally restricts the maximal size of prokaryotic cells and provides a selective advantage for mum-sized cells at the normally low substrate concentrations in the environment. The largest heterotrophic bacteria...

  13. Big bacteria

    DEFF Research Database (Denmark)

    Schulz, HN; Jørgensen, BB

    2001-01-01

    A small number of prokaryotic species have a unique physiology or ecology related to their development of unusually large size. The biomass of bacteria varies over more than 10 orders of magnitude, from the 0.2 mum wide nanobacteria to the largest cells of the colorless sulfur bacteria...... and by actively creating an advective flow through the entire population. Diffusion limitation generally restricts the maximal size of prokaryotic cells and provides a selective advantage for mum-sized cells at the normally low substrate concentrations in the environment. The largest heterotrophic bacteria......, the 80 x 600 mum large Epulopiscium sp. from the gut of tropical fish, are presumably living in a very nutrient-rich medium. Many large bacteria contain numerous inclusions in the cells that reduce the volume of active cytoplasm. The most striking examples of competitive advantage from large cell size...

  14. Media Technologies and Their Role in the Information Warfare

    Directory of Open Access Journals (Sweden)

    Владимир Александрович Федоров

    2016-12-01

    Full Text Available The article analyzes the new role of the mass media in the modern information space, the basic techniques and technologies of focused preparation, semantic distortion and emotional coloring of the transmitted information. The value of the mass media is estimated as the main weapon of the information warfare in the modern geopolitical space. Specific examples and techniques for manipulating information.

  15. Biomonitoring of exposure to chemical warfare agents: A review

    NARCIS (Netherlands)

    Noort, D.; Benschop, H.P.; Black, R.M.

    2002-01-01

    In this report an overview of the methods currently available for detection of exposure to a number of chemical warfare agents (CWA), i.e., sulfur mustard, lewisite and nerve agents, is presented. Such methods can be applied for various purposes, e.g., diagnosis and dosimetry of exposure of

  16. Influence Operations in Insurgencies: Identifying Framing Strategies for Special Warfare

    Science.gov (United States)

    2014-12-01

    Military Information Support Operations MAR Minorities at Risk MAROB Minorities at Risk Organizational Behavior POQC Psychological Operations...and others use religious violence as a form of cleansing to eradicate “ infidels .”16 While individuals who are motivated by visions of the...indigenous personnel for Special Warfare through psychological and cognitive means. The Military Information Support Operations Command (MISOC) mission

  17. Anti-submarine warfare with continuously active sonar

    NARCIS (Netherlands)

    Vossen, R. van; Beerens, S.P.; Spek, E. van der

    2011-01-01

    Existing surveillance sonar systems for anti-submarine warfare (ASW) use a pulsed sonar deployed at a low duty cycle. Continuously active sonar (CAS) is of special interest since the technique could provide better detection performance than conventional pulsed sonar, and it will provide the operator

  18. The Ottawa Treaty and Coalition Warfare: An Unholy Alliance?

    National Research Council Canada - National Science Library

    Weddle, Kevin

    1999-01-01

    ...) on our ability to execute successful coalition warfare. This paper describes the serious implications for NATO and Coalition operations in view of the bulk of our Allies signing the Ottawa Treaty banning the use of all anti-personnel landmines (APLs...

  19. The political economy of warfare in nineteeth century Benin kingdom ...

    African Journals Online (AJOL)

    This paper examines how the interactions of politics and economy influenced the changing perspective on warfare in nineteenth century Benin Kingdom. The study investigates how the combined political and economic behaviour of Benin affected the rebuilding of military power as instrument of political policy in furtherance ...

  20. blitzkrieg to desert storm: the evolution of operational warfare

    African Journals Online (AJOL)

    a_nabb

    disease of stalemates infecting militaries before the Second World War. The invasion did not change the world; instead, it brought about an increased awareness of the importance of the operational level of war, a dimension of warfare previously neglected. The German operational effectiveness represented an evolution ...

  1. Nanostructured Metal Oxides for Stoichiometric Degradation of Chemical Warfare Agents

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Henych, Jiří; Janos, P.; Skoumal, M.

    2016-01-01

    Roč. 236, č. 2016 (2016), s. 239-258 ISSN 0179-5953 R&D Projects: GA ČR(CZ) GAP106/12/1116 Institutional support: RVO:61388980 Keywords : chemical warfare agent * metal nanoparticle * unique surface-chemistry * mesoporous manganese oxide Subject RIV: CA - Inorganic Chemistry Impact factor: 3.930, year: 2016

  2. relevance of information warfare models to critical infrastructure

    African Journals Online (AJOL)

    ismith

    not be applicable to every possible scenario; however, the intention is to illustrate their relevance in many .... digital communications system, where the vehicles are analogous to bits or packets, intersections for routers or ..... wireless channel, and negatively impact on the systems that rely on that channel. Electronic warfare.

  3. Management information systems for electronic warfare command and decision support

    CSIR Research Space (South Africa)

    Van Niekerk, B

    2015-04-01

    Full Text Available information to allow them to manage their own spectrum, to identify threats, and to deny adversaries’ use of the spectrum. In this paper, the concepts of integrated electronic warfare and spectrum battle management are introduced, and the relevant information...

  4. Manoeuvre warfare analysis of South Africa's 1914-1915 German ...

    African Journals Online (AJOL)

    The study reported in this article explored the nexus between military theory and history. Military theory attempts to quantify, qualify and illuminate the often unpredictable phenomenon of war. The article consists of two parts: the theory of manoeuvre warfare and the history of the 1914-1915 South African campaign in ...

  5. Simulating cyber warfare and cyber defenses: information value considerations

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber

  6. Vendor-managed inventory

    DEFF Research Database (Denmark)

    Govindan, Kannan

    2013-01-01

    Vendor-managed inventory (VMI) represents the methodology through which the upstream stage of a supply chain (vendor) takes responsibility for managing the inventories at the downstream stage (customer) based on previously agreed limits. VMI is another method by which supply chains can be managed...... review, we have identified six dimensions of VMI: namely, inventory, transportation, manufacturing, general benefits, coordination/collaboration, and information sharing. In addition, there are, three methodological classifications: modelling, simulation, and case studies. Finally, we will consider...

  7. National Wetlands Inventory Lines

    Data.gov (United States)

    Minnesota Department of Natural Resources — Linear wetland features (including selected streams, ditches, and narrow wetland bodies) mapped as part of the National Wetlands Inventory (NWI). The National...

  8. Stomata and pathogens: Warfare at the gates

    OpenAIRE

    Gudesblat, Gustavo E; Torres, Pablo S; Vojnov, Adrian A

    2009-01-01

    Bacteria and fungi are capable of triggering stomatal closure through pathogen-associated molecular patterns (PAMPs), which prevents penetration through these pores. Therefore, the stomata can be considered part of the plant innate immune response. Some pathogens have evolved mechanisms to evade stomatal defense. The bacterial pathogen Xanthomonas campestris pv. campestris (Xcc), which infects plants of the Brassicaceae family mainly through hydathodes, has also been reported to infect plants...

  9. Denmark's National Inventory Report

    DEFF Research Database (Denmark)

    Illerup, J. B.; Lyck, E.; Winther, M.

    This report is Denmark's National Inventory Report reported to the Conference of the Parties under the United Nations Framework Convention on Climate Change (UNFCCC) due by 15 April 2001. The report contains information on Denmark's inventories for all years' from 1990 to 1999 for CO2, CH4, N2O, CO...

  10. Denmark's National Inventory Report

    DEFF Research Database (Denmark)

    Illerup, J. B.; Lyck, E.; Winther, M.

    This report is Denmark's National Inventory Report reported to the Conference of the Parties under the United Nations Framework Convention on Climate Change (UNFCCC) due by 15 April 2001. The report contains information on Denmark's inventories for all years' from 1990 to 1999 for CO2, CH4, N2O, ......, NMVOC, SO2, HFCs, PFCs and SF6....

  11. Integrated inventory and monitoring

    Science.gov (United States)

    George Lightner; Hans T. Schreuder; Barry Bollenbacher; Kerry McMenus

    2001-01-01

    Understanding and inventorying our ecological systems is key to addressing how issues, questions, and management actions will affect the composition, structure, and function of these systems. Taking an ecological systems approach to the inventory and monitoring framework, is one which we feel will allow answers to currently identified management questions and new ones...

  12. Inventory control strategies

    International Nuclear Information System (INIS)

    Primrose, D.

    1998-01-01

    Finning International Inc. is in the business of selling, financing and servicing Caterpillar and complementary equipment. Its main markets are in western Canada, Britain and Chile. This paper discusses the parts inventory strategies system for Finning (Canada). The company's territory covers British Columbia, Alberta, the Yukon and the Northwest Territories. Finning's parts inventory consists of 80,000 component units valued at more than $150 M. Distribution centres are located in Langley, British Columbia and Edmonton, Alberta. To make inventory and orders easier to control, Finning has designed a computer-based system, with software written exclusively for Caterpillar dealers. The system makes use of a real time electronic interface with all Finning locations, plus all Caterpillar facilities and other dealers in North America. Details of the system are discussed, including territorial stocking procedures, addition to stock, exhaustion of stock, automatic/suggest order controls, surplus inventory management, and procedures for jointly managed inventory. 3 tabs., 1 fig

  13. The Battle for Hue: Casualty and Disease Rates during Urban Warfare

    Science.gov (United States)

    1993-08-01

    NAVAL HEALTH RESEARCH CENTER AD-A271 748 THE BATTLE FOR HUE: CASUALTY AND DISEASE RATES DURING URBAN WARFARE C. G. Blood M. E. Anderson DTIC...prior to the first casualties being sustained. 2 The Battle for Flue: Casualty and Disease Rates During Urban Warfare Renewed nationalism with the ending...TITLE AND SUBTITLE 5. FUNDING NUMBERS The Battle for Hue: Casualty and Disease Rates Program Element: 63706N During Urban Warfare Work Unit Number: 6

  14. Managing Air Quality - Emissions Inventories

    Science.gov (United States)

    This page describes the role of emission inventories in the air quality management process, a description of how emission inventories are developed, and where U.S. emission inventory information can be found.

  15. Interactive Inventory Monitoring

    Science.gov (United States)

    Garud, Sumedha

    2013-01-01

    Method and system for monitoring present location and/or present status of a target inventory item, where the inventory items are located on one or more inventory shelves or other inventory receptacles that communicate with an inventory base station through use of responders such as RFIDs. A user operates a hand held interrogation and display (lAD) module that communicates with, or is part of the base station to provide an initial inquiry. lnformation on location(s) of the larget invenlory item is also indicated visibly and/or audibly on the receptacle(s) for the user. Status information includes an assessment of operation readiness and a time, if known, that the specified inventory item or class was last removed or examined or modified. Presentation of a user access level may be required for access to the target inventgory item. Another embodiment provides inventory informatin for a stack as a sight-impaired or hearing-impaired person adjacent to that stack.

  16. Stuxnet and Cyber-Warfare (2/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic.   Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction. The lecturer invites comments via email to Gian.Piero.Siroli@cern.ch NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  17. Stuxnet and Cyber-Warfare (1/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic. Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction.   NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  18. Cutaneous reactions in nuclear, biological and chemical warfare

    Directory of Open Access Journals (Sweden)

    Arora Sandeep

    2005-03-01

    Full Text Available Nuclear, biological and chemical warfare have in recent times been responsible for an increasing number of otherwise rare dermatoses. Many nations are now maintaining overt and clandestine stockpiles of such arsenal. With increasing terrorist threats, these agents of mass destruction pose a risk to the civilian population. Nuclear and chemical attacks manifest immediately while biological attacks manifest later. Chemical and biological attacks pose a significant risk to the attending medical personnel. The large scale of anticipated casualties in the event of such an occurrence would need the expertise of all physicians, including dermatologists, both military and civilian. Dermatologists are uniquely qualified in this respect. This article aims at presenting a review of the cutaneous manifestations in nuclear, chemical and biological warfare and their management.

  19. Containment 2.0: U.S. Political Warfare

    Science.gov (United States)

    2016-12-01

    and was intended to ensure the heritage , culture , and languages of ethnic minorities in the Soviet Union were maintained. The secondary objective was...http://ndupress.ndu.edu/Media/News/News-Article-View/Article/643108/unconventional- warfare-in-the-gray-zone/. 4 radio messaging, and cultural ...staging a communist coup in Czechoslovakia in early 1948.28 Furthermore, each of these events started with the sponsorship of pro-communist movements

  20. Handbook on Ground Forces Attrition in Modern Warfare

    Science.gov (United States)

    1986-09-01

    Dupuy d ELECTE John R. Brinkerhoff 0 APR 2 81994 C. Curtiss Johnson Peter J. Clark A Division of: DATA MEMORY SYSTEMS, INC. 10332 Democracy Lane Thi...Evaluation and Fe.earch Organization A Division of Data Memory Systems.. Inc. 10392 Democracy Lcne * Fairfax, Virginia 22030 Tel,: (703) 591-36ඒ The...data base touching a variety of aspects of warfare and analyzed it using techniques of the social and behavioral sciences. The work considers

  1. Just War and Postmodern Warfare: A German Case Study

    Science.gov (United States)

    2015-04-01

    non-lethal in equal measure. In many ways, Germany’s Bundeswehr (military) construct and participation in various conflicts mirror contemporary just...war theory and postmodern warfare, while its military concept lacks the necessary postmodern balance. The Bundeswehr stands in stark contrast to...the United States. The Bundeswehr is only employed for the purposes of defending German citizens where the United States military can be employed to

  2. Employing U.S. Information Operations Against Hybrid Warfare Threats

    Science.gov (United States)

    2013-03-01

    19b. TELEPHONE NUMBER (Include area code ) USAWC STRATEGY RESEARCH PROJECT Employing U.S. Information Operations Against...hostile computer code through internet infrastructure in multiple countries en route to the target) have enormous legal ramifications. Even within the...59 145 William J. Nemeth , Future War And Chechnya: A Case For Hybrid Warfare, (Monterey CA: Naval Postgraduate School, June 2002), 74. 146 U.S

  3. Information Warfare and Information Operations: Protecting The Global Information Environment.

    Science.gov (United States)

    1998-03-06

    findings in a November 1996 report described by the Wall Street Journal as "unusually strident.൮ It made 13 recommendations, including one for...Funds Moved Around World", The Wall Street Journal , September 12, 1995, p 1. 21 Data Provided By Member of the President’s Commission on Critical...U.S. Department of Defense, April 1997, 230. 38 Thomas E. Ricks, "Information Warfare Defense is Urged", Wall Street Journal , 6 January 1997, Section

  4. Wrestling the Bear: The Rise of Russian Hybrid Warfare

    Science.gov (United States)

    2015-04-13

    search.proguest.com.nduezproxy.idm.oclc.orgldocview/1 545535275?accountid.:: J2686. (accessed on 4 December 2014). 14 Reuters, " Malaysia : Dutch...with subversive efforts. The aggressor often resorts to clandestine actions, to avoid attribution or retribution. Without a credible smoking gun, NATO...2015. Accessed December 27, 2014. http://www .nato.int/docu/review/20 14/ Also-in-20 14/Deterring-hybrid- warfare/EN/index .htm. Reuters,. ’ Malaysia

  5. Nodes and Codes: The Reality of Cyber Warfare

    Science.gov (United States)

    2012-05-17

    that spin highly toxic, corrosive , and radioactive uranium gas (Uranium Hexafluoride) at over 100,000...Policy for Information Warfare,” Intellibriefs, http://intellibriefs.blogspot.com/2009_03_22_archive.html (accessed February 11, 2012). 81 Marina ...commentary_battlefield_on_your_desktop/2345202.html (accessed December 13, 2011). Myakisheva, Marina . “What is Russia’s Answer to Cyber Threats?” CNews.ru

  6. Enterprises as Inquiring Systems with Implications for Information Warfare

    Science.gov (United States)

    2014-06-01

    applying C. West Churchman’s characterization of Western epistemology , which was born in the tradition of the philosophy of science, in the business... epistemology they most closely resemble. 2.1 Lockian Model The Lockian model bases reasoning on experiment and consensus. Empirical information is gathered...defined as the “integrated employment of the core capabilities of electronic warfare, computer network operations, psychological operations, military

  7. Russian and Chinese Information Warfare: Theory and Practice

    Science.gov (United States)

    2004-06-01

    Integral neurolinguistic programming •Placing essential programs into the conscious or sub- conscious mind •Subconscious suggestions that modify human...Generators of special rays •Optical systems • Neurolinguistic programming •Computer psychotechnology •The mass media •Audiovisual effects •Special effects...Information Warfare: Theory and Practice 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e

  8. SBA Network Components & Software Inventory

    Data.gov (United States)

    Small Business Administration — SBA’s Network Components & Software Inventory contains a complete inventory of all devices connected to SBA’s network including workstations, servers, routers,...

  9. VA Enterprise Data Inventory

    Data.gov (United States)

    Department of Veterans Affairs — The Department of Veterans Affairs Enterprise Data Inventory accounts for all of the datasets used in the agency's information systems. This entry was approved for...

  10. National Emission Inventory (NEI)

    Data.gov (United States)

    U.S. Environmental Protection Agency — This data exchange allows states to submit data to the US Environmental Protection Agency's National Emissions Inventory (NEI). NEI is a national database of air...

  11. National Wetlands Inventory Points

    Data.gov (United States)

    Minnesota Department of Natural Resources — Wetland point features (typically wetlands that are too small to be as area features at the data scale) mapped as part of the National Wetlands Inventory (NWI). The...

  12. Business Process Inventory

    Data.gov (United States)

    Office of Personnel Management — Inventory of maps and descriptions of the business processes of the U.S. Office of Personnel Management (OPM), with an emphasis on the processes of the Office of the...

  13. Asset Inventory Database

    Data.gov (United States)

    US Agency for International Development — AIDM is used to track USAID assets such as furniture, computers, and equipment. Using portable bar code readers, receiving and inventory personnel can capture...

  14. Toxics Release Inventory (TRI)

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Toxics Release Inventory (TRI) is a dataset compiled by the U.S. Environmental Protection Agency (EPA). It contains information on the release and waste...

  15. National Emission Inventory

    Data.gov (United States)

    U.S. Environmental Protection Agency — The National Emission Inventory contains measured, modeled, and estimated data for emissions of all known source categories in the US (stationary sources, fires,...

  16. NCRN Hemlock Inventory Data

    Data.gov (United States)

    Department of the Interior — ​Data associated with the 2015 hemlock inventory project in NCR. Eastern hemlock (Tsuga canadensis) is a coniferous tree native to the NE and Appalachian regions of...

  17. Public Waters Inventory Maps

    Data.gov (United States)

    Minnesota Department of Natural Resources — This theme is a scanned and rectified version of the Minnesota DNR - Division of Waters "Public Waters Inventory" (PWI) maps. DNR Waters utilizes a small scale...

  18. Logistics and Inventory System -

    Data.gov (United States)

    Department of Transportation — The Logistics and Inventory System (LIS) is the agencys primary supply/support automation tool. The LIS encompasses everything from order entry by field specialists...

  19. NATO Advanced Research Workshop on Fluorescence and other Optical Properties of Biological Particles for Biological Warfare Agent Sensors

    CERN Document Server

    Hoekstra, Alfons; Videen, Gorden; Optics of Biological Particles

    2007-01-01

    This book covers the optics of single biological particles, both theory and experiment, with emphasis on Elastic Light Scattering and Fluorescence. It deals with the optics of bacteria (bio-aerosols), marine particles (selected phytoplankton communities) and red and white blood cells. Moreover, there are dedicated chapters on a general theory for scattering by a cell, and modelling and simulation of scattering by inhomogeneous biological cells. Finally, one chapter is dedicated to astro-biological signatures, discussing the possibilities for detecting non-terrestrial biological material. The volume has up-to-date discussions on new experimental and numerical techniques, and many examples of applications of these techniques in real-life systems, as used to detect and characterize e.g. biological warfare agents or human blood cells.

  20. Traffic Signs Inventory System

    Directory of Open Access Journals (Sweden)

    J. Ružbarský

    2013-06-01

    Full Text Available The paper is focused on practical application of Cambridge Correlator. The goal is to propose a traffic signs inventory system by using excellent characteristics of correlator in the rapid optical correlation. The proposal of this inventory system includes obtaining of traffic signs to create the database either collecting the GPS coordinates. It is necessary to know the traffic signs position and also to document the entire surface route for later evaluation in offline mode.

  1. 78 FR 72025 - Security Zones; Naval Base Point Loma; Naval Mine Anti Submarine Warfare Command; San Diego Bay...

    Science.gov (United States)

    2013-12-02

    ...-AA87 Security Zones; Naval Base Point Loma; Naval Mine Anti Submarine Warfare Command; San Diego Bay... establishing a new security zone at the Naval Mine and Anti-Submarine Warfare Command to protect the relocated... Commander of Naval Base Point Loma, the Commander of the Naval Mine Anti Submarine Warfare Command, and the...

  2. Stomata and pathogens: Warfare at the gates.

    Science.gov (United States)

    Gudesblat, Gustavo E; Torres, Pablo S; Vojnov, Adrian A

    2009-12-01

    Bacteria and fungi are capable of triggering stomatal closure through pathogen-associated molecular patterns (PAMPs), which prevents penetration through these pores. Therefore, the stomata can be considered part of the plant innate immune response. Some pathogens have evolved mechanisms to evade stomatal defense. The bacterial pathogen Xanthomonas campestris pv. campestris (Xcc), which infects plants of the Brassicaceae family mainly through hydathodes, has also been reported to infect plants through stomata. A recent report shows that penetration of Xcc in Arabidopsis leaves through stomata depends on a secreted small molecule whose synthesis is under control of the rpf/diffusible signal factor (DSF) cell-to-cell signaling system, which also controls genes involved in biofilm formation and pathogenesis. The same reports shows that Arabidopsis ROS- and PAMP-activated MAP kinase 3 (MPK3) is essential for stomatal innate response. Other recent and past findings about modulation of stomatal behaviour by pathogens are also discussed. In all, these findings support the idea that PAMP-triggered stomatal closure might be a more effective and widespread barrier against phytopathogens than previously thought, which has in turn led to the evolution in pathogens of several mechanisms to evade stomatal defense.

  3. 78 FR 29699 - Transfer of Administrative Jurisdiction: Marine Corps Mountain Warfare Training Center...

    Science.gov (United States)

    2013-05-21

    ... Forest Service Transfer of Administrative Jurisdiction: Marine Corps Mountain Warfare Training Center... order authorizing the transfer of administrative jurisdiction from the Department of Agriculture to the..., lying within the Marine Corps Mountain Warfare Training Center and the Humboldt-Toiyabe National Forest...

  4. Metal organic frameworks for the catalytic detoxification of chemical warfare nerve agents

    Science.gov (United States)

    Hupp, Joseph T.; Farha, Omar K.; Katz, Michael J.; Mondloch, Joseph E.

    2017-04-18

    A method of using a metal organic framework (MOF) comprising a metal ion and an at least bidendate organic ligand to catalytically detoxify chemical warfare nerve agents including exposing the metal-organic-framework (MOF) to the chemical warfare nerve agent and catalytically decomposing the nerve agent with the MOF.

  5. Defending Our Satellites: The Need for Electronic Warfare Education and Training

    Science.gov (United States)

    2015-12-01

    74 | Air & Space Power Journal Defending Our Satellites The Need for Electronic Warfare Education and Training Lt Col E. Lincoln Bonner, USAF...expanding education and training in the use of electronic warfare to defend US satellites and improve their survivability. The following discussion...Fighting The US military gains a disproportionate advantage over potential adversaries by exploiting space capabilities. Satellites provide an

  6. Status of dental health in chemical warfare victims: The case of Isfahan, Iran

    Directory of Open Access Journals (Sweden)

    Ahmad Mottaghi

    2012-01-01

    Conclusion: Chemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  7. Application of non-quantitative modelling in the analysis of a network warfare environment

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available Network warfare is an emerging concept that focuses on the network and computer based forms through which information is attacked and defended. Various computer and network security concepts thus play a role in network warfare. Due the intricacy...

  8. Summary of Research 1995, Interdisciplinary Academic Groups (Command, Control & Communications Academic Group, Electronic Warfare Academic Group, Space Systems Academic Group and Undersea Warfare Academic Group)

    OpenAIRE

    Faculty of the Academic Groups

    1995-01-01

    The views expressed in this report are those of the authors and do not reflect the official policy or position of the Department of Defense or the U.S. Government. This report contains information of research projects in the four interdisciplinary groups, Command, Control & Communications Academic Group, Electronic Warfare Academic Group, Space Systems Academic Group and Undersea Warfare Academic Group, which were carried out under funding of the Naval Postgraduate School Research...

  9. Fukushima Daiichi Radionuclide Inventories

    Energy Technology Data Exchange (ETDEWEB)

    Cardoni, Jeffrey N. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jankovsky, Zachary Kyle [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-09-01

    Radionuclide inventories are generated to permit detailed analyses of the Fukushima Daiichi meltdowns. This is necessary information for severe accident calculations, dose calculations, and source term and consequence analyses. Inventories are calculated using SCALE6 and compared to values predicted by international researchers supporting the OECD/NEA's Benchmark Study on the Accident at Fukushima Daiichi Nuclear Power Station (BSAF). Both sets of inventory information are acceptable for best-estimate analyses of the Fukushima reactors. Consistent nuclear information for severe accident codes, including radionuclide class masses and core decay powers, are also derived from the SCALE6 analyses. Key nuclide activity ratios are calculated as functions of burnup and nuclear data in order to explore the utility for nuclear forensics and support future decommissioning efforts.

  10. Shortening the Xerostomia Inventory

    Science.gov (United States)

    Thomson, William Murray; van der Putten, Gert-Jan; de Baat, Cees; Ikebe, Kazunori; Matsuda, Ken-ichi; Enoki, Kaori; Hopcraft, Matthew; Ling, Guo Y

    2011-01-01

    Objectives To determine the validity and properties of the Summated Xerostomia Inventory-Dutch Version in samples from Australia, The Netherlands, Japan and New Zealand. Study design Six cross-sectional samples of older people from The Netherlands (N = 50), Australia (N = 637 and N = 245), Japan (N = 401) and New Zealand (N = 167 and N = 86). Data were analysed using the Summated Xerostomia Inventory-Dutch Version. Results Almost all data-sets revealed a single extracted factor which explained about half of the variance, with Cronbach’s alpha values of at least 0.70. When mean scale scores were plotted against a “gold standard” xerostomia question, statistically significant gradients were observed, with the highest score seen in those who always had dry mouth, and the lowest in those who never had it. Conclusion The Summated Xerostomia Inventory-Dutch Version is valid for measuring xerostomia symptoms in clinical and epidemiological research. PMID:21684773

  11. National Inventory Report 2002

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-07-01

    The report presents an inventory of greenhouse gas emissions and sinks in Norway from 1990 to 2000. Trends in total greenhouse gas emissions by UNFCCC's sources and gases are described for carbon dioxide (CO{sub 2}), methane (CH{sub 4}), nitrous oxide (N{sub 2}O), tetrafluoromethane (CF{sub 4}), hexafluoroethane (C{sub 2}F{sub 6}), sulphur hexafluoride (SF{sub 6}) and HFCs. Methodology used in the calculation of emissions from key sources in the Norwegian Emission Inventory are presented. Emissions are reported according to UNFCCC/IPCC common reporting format (CRF) (author)

  12. Women and Warfare in Pre-Colonial Akokoland

    Directory of Open Access Journals (Sweden)

    Olusanya Faboyede

    2013-06-01

    Full Text Available In pre-colonial Akokoland, the most conspicuous fact about its political economy and peace was security challenges and mismanagement through internal and external manipulation. This paper analyses the role of women in warfare in pre-colonial Akokoland as a potential to integrate Akokoland, a multi-cultural community for productive and sustained effort to promote economic development in the region. Thus, the paper is conceptualised on historical objectivity. The paper argues that one of the ways of dealing with the scale of insecurity in the society is to assimilate historical thinking into the intention of the security agents (women warriors.

  13. Russian Military Thinking – A New Generation of Warfare

    Directory of Open Access Journals (Sweden)

    Mattsson Peter A.

    2015-06-01

    Full Text Available This article deals with how Russian warfighting is described and discussed in contemporary Russian military theory. The approach has been studies, analyses and interpretations of primarily Russian sources as prominent Russian journals, but also Western analyses and interpretations of contemporary Russian warfighting discussions. Theoretical considerations are limited to the period from the 1980s to the present day - 2014. Mainly Russian experts on military theory (Bogdanov, Chekinov, Gareev, Kiselyov, Kuralenko, Morozov, Slipchenko, Vinogradov, Vladimirov, Vorobyov have been studied, but also sources from some prominent Western experts on Russian warfare (FitzGerald, Gileotti, Kipp, McDermott.

  14. Lawfare in Hybrid Wars: The 21st Century Warfare

    OpenAIRE

    Mosquera, A.; Bachmann, Sascha-Dominik

    2016-01-01

    In the context of ‘Hybrid Warfare’ as 21st Century’s threat to peace and security, this paper intends to address the role of Lawfare. The use of law as a weapon, Lawfare,1can have a tangible impact on democratic States when their adversaries use it in an exploitative way. Lawfare can be used in the context of Hybrid War.2 Examples of Hybrid Warfare as witnessed in the Russian/Ukrainian conflict of 2014/2015 and the ongoing conflict with Daesh are particularly sensitive to Lawfare due to an ap...

  15. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  16. Built to Outlast: Operational Approaches to Hybrid Warfare

    Science.gov (United States)

    2012-05-17

    PAGE 19b. PHONE NUMBER (include area code ) (U) (U) (U) (U) 100 (913)758-3300 Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std. Z39.18 i...William J. Nemeth , Future War and Chechnya: A Case for Hybrid Warfare (master’s thesis, US Naval Postgraduate School, 2002); Erin M. Simpson...2005). Unpublished papers pre-dating Hoffman’s effort include a 2002 Master’s thesis by William J. Nemeth which represents the earliest scholarly work

  17. Venezuela’s Hugo Chavez, Bolivarian Socialism, and Asymmetric Warfare

    Science.gov (United States)

    2005-10-01

    lead to a better life for all. Finally, taken all together, this is “war as a whole,” or what Chávez calls “ Guerra de todo el pueblo...VENEZUELA’S HUGO CHÁVEZ, BOLIVARIAN SOCIALISM, AND ASYMMETRIC WARFARE Beginning with the election of Lieutenant Colonel Hugo Chávez Frias as President...financial, material, and political-military support of people’s movements.31 This takes us to the notion of “ Guerra de todo el pueblo” (war of all

  18. Environmental assessments of sea dumped chemical warfare agents

    DEFF Research Database (Denmark)

    Sanderson, Hans; Fauser, Patrik

    This is a report on the information gathered during work related to sea dumped chemical warfare agents. It mainly reviews the work conducted in relation to the installation of the two Nord Stream gas pipeline from 2008-2012. The focus was on the weight-of-evidence risk assessment of disturbed CWA...... residues in connection with the installation of the pipelines. Novel exposure and toxicity assessments are presented and the risk is assessed. The overall conclusion is that there is a negligible acute added CWA risk towards the fish community from the installation of the pipelines....

  19. Purchasing and inventory management techniques for optimizing inventory investment

    International Nuclear Information System (INIS)

    McFarlane, I.; Gehshan, T.

    1993-01-01

    In an effort to reduce operations and maintenance costs among nuclear plants, many utilities are taking a closer look at their inventory investment. Various approaches for inventory reduction have been used and discussed, but these approaches are often limited to an inventory management perspective. Interaction with purchasing and planning personnel to reduce inventory investment is a necessity in utility efforts to become more cost competitive. This paper addresses the activities that purchasing and inventory management personnel should conduct in an effort to optimize inventory investment while maintaining service-level goals. Other functions within a materials management organization, such as the warehousing and investment recovery functions, can contribute to optimizing inventory investment. However, these are not addressed in this paper because their contributions often come after inventory management and purchasing decisions have been made

  20. Inventory order crossovers

    NARCIS (Netherlands)

    Riezebos, J.

    2006-01-01

    The control policies that are used in inventory management systems assume that orders arrive in the same sequence as they were ordered. Due to changes in supply chains and markets, this assumption is no longer valid. This paper aims at providing an improved understanding of the phenomenon of order

  1. Single Item Inventory Models

    NARCIS (Netherlands)

    E.M. Bazsa-Oldenkamp; P. den Iseger

    2001-01-01

    textabstractThis paper extends a fundamental result about single-item inventory systems. This approach allows more general performance measures, demand processes and order policies, and leads to easier analysis and implementation, than prior research. We obtain closed form expressions for the

  2. Marine Education Knowledge Inventory.

    Science.gov (United States)

    Hounshell, Paul B.; Hampton, Carolyn

    This 35-item, multiple-choice Marine Education Knowledge Inventory was developed for use in upper elementary/middle schools to measure a student's knowledge of marine science. Content of test items is drawn from oceanography, ecology, earth science, navigation, and the biological sciences (focusing on marine animals). Steps in the construction of…

  3. THE PRESCHOOL INVENTORY.

    Science.gov (United States)

    CALDWELL, BETTYE M.; SOULE, DONALD

    THE PRESCHOOL INVENTORY BEGAN AS AN ANSWER TO THE NEED FOR SOME TYPE OF INSTRUMENT THAT WOULD PROVIDE AN INDICATION OF HOW MUCH A DISADVANTAGED CHILD, PRIOR TO HIS INTRODUCTION TO HEAD START, HAD ACHIEVED IN AREAS REGARDED AS NECESSARY FOUNDATIONS FOR SUBSEQUENT SUCCESS IN SCHOOL. MEASURING BASIC INTELLIGENCE WAS NOT THE GOAL. RATHER, THE…

  4. Rapid inventory taking system

    International Nuclear Information System (INIS)

    Marsden, P.S.S.F.

    1980-01-01

    A data processing system designed to facilitate inventory taking is described. The process depends upon the earliest possible application of computer techniques and the elimination of manual operations. Data is recorded in optical character recognition (OCR) 'A' form and read by a hand held wand reader. Limited validation checks are applied before recording on mini-tape cassettes. 5 refs

  5. Calculating Optimal Inventory Size

    Directory of Open Access Journals (Sweden)

    Ruby Perez

    2010-01-01

    Full Text Available The purpose of the project is to find the optimal value for the Economic Order Quantity Model and then use a lean manufacturing Kanban equation to find a numeric value that will minimize the total cost and the inventory size.

  6. Perishable Inventory Challenges

    DEFF Research Database (Denmark)

    Damgaard, Cecilie Maria; Nguyen, Vivi Thuy; Hvolby, Hans-Henrik

    2012-01-01

    The paper investigates how inventory control of perishable items is managed and line up some possible options of improvement. This includes a review of relevant literature dealing with the challenges of determining ordering policies for perishable products and a study of how the current procedures...

  7. Experimental inventory verification system

    International Nuclear Information System (INIS)

    Steverson, C.A.; Angerman, M.I.

    1991-01-01

    As Low As Reasonably Achievable (ALARA) goals and Department of Energy (DOE) inventory requirements are frequently in conflict at facilities across the DOE complex. The authors wish, on one hand, to verify the presence of correct amounts of nuclear materials that are in storage or in process; yet on the other hand, we wish to achieve ALARA goals by keeping individual and collective exposures as low as social, technical, economic, practical, and public policy considerations permit. The Experimental Inventory Verification System (EIVSystem) is a computer-based, camera-driven system that utilizes image processing technology to detect change in vault areas. Currently in the test and evaluation phase at Idaho National Engineering Laboratory, this system guards personnel. The EIVSystem continually monitors the vault, providing proof of changed status for objects sorted within the vault. This paper reports that these data could provide the basis for reducing inventory requirements when no change has occurred, thus helping implement ALARA policy; the data will also help describe there target area of an inventory when change has been shown to occur

  8. Initial Radionuclide Inventories

    Energy Technology Data Exchange (ETDEWEB)

    H. Miller

    2004-09-19

    The purpose of this analysis is to provide an initial radionuclide inventory (in grams per waste package) and associated uncertainty distributions for use in the Total System Performance Assessment for the License Application (TSPA-LA) in support of the license application for the repository at Yucca Mountain, Nevada. This document is intended for use in postclosure analysis only. Bounding waste stream information and data were collected that capture probable limits. For commercially generated waste, this analysis considers alternative waste stream projections to bound the characteristics of wastes likely to be encountered using arrival scenarios that potentially impact the commercial spent nuclear fuel (CSNF) waste stream. For TSPA-LA, this radionuclide inventory analysis considers U.S. Department of Energy (DOE) high-level radioactive waste (DHLW) glass and two types of spent nuclear fuel (SNF): CSNF and DOE-owned (DSNF). These wastes are placed in two groups of waste packages: the CSNF waste package and the codisposal waste package (CDSP), which are designated to contain DHLW glass and DSNF, or DHLW glass only. The radionuclide inventory for naval SNF is provided separately in the classified ''Naval Nuclear Propulsion Program Technical Support Document'' for the License Application. As noted previously, the radionuclide inventory data presented here is intended only for TSPA-LA postclosure calculations. It is not applicable to preclosure safety calculations. Safe storage, transportation, and ultimate disposal of these wastes require safety analyses to support the design and licensing of repository equipment and facilities. These analyses will require radionuclide inventories to represent the radioactive source term that must be accommodated during handling, storage and disposition of these wastes. This analysis uses the best available information to identify the radionuclide inventory that is expected at the last year of last emplacement

  9. Destruction of chemical warfare agents using metal-organic frameworks

    Science.gov (United States)

    Mondloch, Joseph E.; Katz, Michael J.; Isley, William C., III; Ghosh, Pritha; Liao, Peilin; Bury, Wojciech; Wagner, George W.; Hall, Morgan G.; Decoste, Jared B.; Peterson, Gregory W.; Snurr, Randall Q.; Cramer, Christopher J.; Hupp, Joseph T.; Farha, Omar K.

    2015-05-01

    Chemical warfare agents containing phosphonate ester bonds are among the most toxic chemicals known to mankind. Recent global military events, such as the conflict and disarmament in Syria, have brought into focus the need to find effective strategies for the rapid destruction of these banned chemicals. Solutions are needed for immediate personal protection (for example, the filtration and catalytic destruction of airborne versions of agents), bulk destruction of chemical weapon stockpiles, protection (via coating) of clothing, equipment and buildings, and containment of agent spills. Solid heterogeneous materials such as modified activated carbon or metal oxides exhibit many desirable characteristics for the destruction of chemical warfare agents. However, low sorptive capacities, low effective active site loadings, deactivation of the active site, slow degradation kinetics, and/or a lack of tailorability offer significant room for improvement in these materials. Here, we report a carefully chosen metal-organic framework (MOF) material featuring high porosity and exceptional chemical stability that is extraordinarily effective for the degradation of nerve agents and their simulants. Experimental and computational evidence points to Lewis-acidic ZrIV ions as the active sites and to their superb accessibility as a defining element of their efficacy.

  10. Punishment sustains large-scale cooperation in prestate warfare

    Science.gov (United States)

    Mathew, Sarah; Boyd, Robert

    2011-01-01

    Understanding cooperation and punishment in small-scale societies is crucial for explaining the origins of human cooperation. We studied warfare among the Turkana, a politically uncentralized, egalitarian, nomadic pastoral society in East Africa. Based on a representative sample of 88 recent raids, we show that the Turkana sustain costly cooperation in combat at a remarkably large scale, at least in part, through punishment of free-riders. Raiding parties comprised several hundred warriors and participants are not kin or day-to-day interactants. Warriors incur substantial risk of death and produce collective benefits. Cowardice and desertions occur, and are punished by community-imposed sanctions, including collective corporal punishment and fines. Furthermore, Turkana norms governing warfare benefit the ethnolinguistic group, a population of a half-million people, at the expense of smaller social groupings. These results challenge current views that punishment is unimportant in small-scale societies and that human cooperation evolved in small groups of kin and familiar individuals. Instead, these results suggest that cooperation at the larger scale of ethnolinguistic units enforced by third-party sanctions could have a deep evolutionary history in the human species. PMID:21670285

  11. Challenges of Military Health Service Support in Mountain Warfare.

    Science.gov (United States)

    Lechner, Raimund; Küpper, Thomas; Tannheimer, Markus

    2018-03-16

    History is full of examples of the influence of the mountain environment on warfare. The aim of this article is to identify the main environmental hazards and summarize countermeasures to mitigate the impact of this unique environment. A selective PubMed and Internet search was conducted. Additionally, we searched bibliographies for useful supplemental literature and included the recommendations of the leading mountain medicine and wilderness medicine societies. A definition of mountain warfare mainly derived from environmental influences on body functions is introduced to help identify the main environmental hazards. Cold, rugged terrain, hypoxic exposure, and often a combination and mutual aggravation of these factors are the most important environmental factors of mountain environment. Underestimating this environmental influence has decreased combat strength and caused thousands of casualties during past conflicts. Some marked differences between military and civilian mountaineering further complicate mission planning and operational sustainability. To overcome the restrictions of mountain environments, proper planning and preparation, including sustained mountain mobility training, in-depth mountain medicine training with a special emphasize on prolonged field care, knowledge of acclimatization strategies, adapted time calculations, mountain-specific equipment, air rescue strategies and makeshift evacuation strategies, and thorough personnel selection, are vital to guarantee the best possible medical support. The specifics of managing risks in mountain environments are also critical for civilian rescue missions and humanitarian aid. Copyright © 2018 Wilderness Medical Society. Published by Elsevier Inc. All rights reserved.

  12. China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence

    Directory of Open Access Journals (Sweden)

    Magnus Hjortdal

    2011-01-01

    Full Text Available This article presents three reasons for states to use cyber warfare and shows that cyberspace is—and will continue to be—a decisive element in China's strategy to ascend in the international system. The three reasons are: deterrence through infiltration of critical infrastructure; military technological espionage to gain military knowledge; and industrial espionage to gain economic advantage. China has a greater interest in using cyberspace offensively than other actors, such as the United States, since it has more to gain from spying on and deterring the United States than the other way around. The article also documents China's progress in cyber warfare and shows how it works as an extension of its traditional strategic thinking and the current debate within the country. Several examples of cyber attacks traceable to China are also presented. This includes cyber intrusions on a nuclear arms laboratory, attacks on defense ministries (including the Joint Strike Fighter and an airbase and the U.S. electric grid, as well as the current Google affair, which has proved to be a small part of a broader attack that also targeted the U.S. Government. There are, however, certain constraints that qualify the image of China as an aggressive actor in cyberspace. Some believe that China itself is the victim of just as many attacks from other states. Furthermore, certain actors in the United States and the West have an interest in overestimating China's capabilities in cyberspace in order to maintain their budgets.

  13. Denmark's National Inventory Report 2010

    DEFF Research Database (Denmark)

    Nielsen, Ole-Kenneth; Lyck, Erik; Mikkelsen, Mette Hjorth

    2010-01-01

    This report is Denmark's National Inventory Report 2010. The report contains information on Denmark's emission inventories for all years' from 1990 to 2008 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2.......This report is Denmark's National Inventory Report 2010. The report contains information on Denmark's emission inventories for all years' from 1990 to 2008 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2....

  14. Inventory Control System by Using Vendor Managed Inventory (VMI)

    Science.gov (United States)

    Sabila, Alzena Dona; Mustafid; Suryono

    2018-02-01

    The inventory control system has a strategic role for the business in managing inventory operations. Management of conventional inventory creates problems in the stock of goods that often runs into vacancies and excess goods at the retail level. This study aims to build inventory control system that can maintain the stability of goods availability at the retail level. The implementation of Vendor Managed Inventory (VMI) method on inventory control system provides transparency of sales data and inventory of goods at retailer level to supplier. Inventory control is performed by calculating safety stock and reorder point of goods based on sales data received by the system. Rule-based reasoning is provided on the system to facilitate the monitoring of inventory status information, thereby helping the process of inventory updates appropriately. Utilization of SMS technology is also considered as a medium of collecting sales data in real-time due to the ease of use. The results of this study indicate that inventory control using VMI ensures the availability of goods ± 70% and can reduce the accumulation of goods ± 30% at the retail level.

  15. National Biological Monitoring Inventory

    International Nuclear Information System (INIS)

    Burgess, R.L.

    1979-01-01

    The National Biological Monitoring Inventory, initiated in 1975, currently consists of four computerized data bases and voluminous manual files. MAIN BIOMON contains detailed information on 1,021 projects, while MINI BIOMON provides skeletal data for over 3,000 projects in the 50 states, Puerto Rico, the Virgin Islands, plus a few in Canada and Mexico. BIBLIO BIOMON and DIRECTORY BIOMON complete the computerized data bases. The structure of the system provides for on-line search capabilities to generate details of agency sponsorship, indications of funding levels, taxonomic and geographic coverage, length of program life, managerial focus or emphasis, and condition of the data. Examples of each of these are discussed and illustrated, and potential use of the Inventory in a variety of situations is emphasized

  16. Life Cycle Inventory Analysis

    DEFF Research Database (Denmark)

    Bjørn, Anders; Moltesen, Andreas; Laurent, Alexis

    2017-01-01

    The inventory analysis is the third and often most time-consuming part of an LCA. The analysis is guided by the goal and scope definition, and its core activity is the collection and compilation of data on elementary flows from all processes in the studied product system(s) drawing on a combination...... of different sources. The output is a compiled inventory of elementary flows that is used as basis of the subsequent life cycle impact assessment phase. This chapter teaches how to carry out this task through six steps: (1) identifying processes for the LCI model of the product system; (2) planning...... and collecting data; (3) constructing and quality checking unit processes; (4) constructing LCI model and calculating LCI results; (5) preparing the basis for uncertainty management and sensitivity analysis; and (6) reporting....

  17. Resolving inventory differences

    International Nuclear Information System (INIS)

    Weber, J.H.; Clark, J.P.

    1991-01-01

    Determining the cause of an inventory difference (ID) that exceeds warning or alarm limits should not only involve investigation into measurement methods and reexamination of the model assumptions used in the calculation of the limits, but also result in corrective actions that improve the quality of the accountability measurements. An example illustrating methods used by Savannah River Site (SRS) personnel to resolve an ID is presented that may be useful to other facilities faced with a similar problem. After first determining that no theft or diversion of material occurred and correcting any accountability calculation errors, investigation into the IDs focused on volume and analytical measurements, limit of error of inventory difference (LEID) modeling assumptions, and changes in the measurement procedures and methods prior to the alarm. There had been a gradual gain trend in IDs prior to the alarm which was reversed by the alarm inventory. The majority of the NM in the facility was stored in four large tanks which helped identify causes for the alarm. The investigation, while indicating no diversion or theft, resulted in changes in the analytical method and in improvements in the measurement and accountability that produced a 67% improvement in the LEID

  18. Procedure for taking physical inventories

    International Nuclear Information System (INIS)

    Boston, R.A.

    1984-01-01

    Physical inventories are taken periodically to meet Company, State and IAEA requirements. Those physical inventories may be verified by IAEA and/or State inspectors. This presentation describes in an introductory but detailed manner the approaches and procedures used in planning, preparing, conducting, reconciling and reporting physical inventories for the Model Plant. Physical inventories are taken for plant accounting purposes to provide an accurate basis for starting and closing the plant material balance. Physical inventories are also taken for safeguards purposes to provide positive assurance that the nuclear materials of concern are indeed present and accounted for

  19. Integrated Swarming Operations for Air Base Defense: Applications in Irregular Warfare

    National Research Council Canada - National Science Library

    Gray, Ron

    2006-01-01

    .... However, in low-intensity conflicts (LICs) or irregular warfare (IW) campaigns, U.S. forces are faced with an irregular enemy, one that does not choose to fight its forces directly, but rather through unconventional or indirect methods...

  20. Understanding "Understanding" Flow for Network-Centric Warfare: Military Knowledge-Flow Mechanics

    National Research Council Canada - National Science Library

    Nissen, Mark

    2002-01-01

    Network-centric warfare (NCW) emphasizes information superiority for battlespace efficacy, but it is clear that the mechanics of how knowledge flows are just as important as those pertaining to the networks and communication...

  1. Defense Base Closure and Realignment Budget Data for the Naval Surface Warfare Center

    National Research Council Canada - National Science Library

    1993-01-01

    ... and realignment military construction projects. This report provides the results of the audit related to the realignment of Naval Surface Warfare Centers elements in White Oak, Maryland, and Panama City, Florida, to Dahlgren, Virginia...

  2. Optimizing Armed Forces Capabilities for Hybrid Warfare – New Challenge for Slovak Armed Forces

    Directory of Open Access Journals (Sweden)

    Peter PINDJÁK

    2015-09-01

    Full Text Available The paper deals with the optimization of military capabilities of the Slovak Armed Forces for conducting operations in a hybrid conflict, which represents one of the possible scenarios of irregular warfare. Whereas in the regular warfare adversaries intend to eliminate the centers of gravity of each other, most often command and control structures, in irregular conflicts, the center of gravity shifts towards the will and cognitive perception of the target population. Hybrid warfare comprises a thoroughly planned combination of conventional military approaches and kinetic operations with subversive, irregular activities, including information and cyber operations. These efforts are often accompanied by intensified activities of intelligence services, special operation forces, and even mercenary and other paramilitary groups. The development of irregular warfare capabilities within the Slovak Armed Forces will require a progressive transformation process that may turn the armed forces into a modern and adaptable element of power, capable of deployment in national and international crisis management operations.

  3. Interoperability and Network-Centric Warfare: US Army Future Force and German Army in 2015

    National Research Council Canada - National Science Library

    Alme, Thorsten

    2005-01-01

    .... Special consideration is given to technical and behavioral interoperability. The monograph also assesses the projected capabilities of the German Bundeswehr in the year 2015 with regard to Network-Centric Warfare (NCW...

  4. Analysis of Acoustic Effects on Marine Mammals for the Proposed Undersea Warfare Training Range

    National Research Council Canada - National Science Library

    Jette, Steven D; Cembrola, Joan M; Mitchell, Glenn H; Fetherston, Thomas N

    2005-01-01

    ...) for the proposed Undersea Warfare Training Range (USWTR). The DEIS includes an assessment of the effects of Navy sonars on marine mammals during exercises to occur on the range as required by the Marine Mammal Protection Act (MMPA...

  5. Surface Warfare Officer Retention: Analysis of Individual Ready Reserve Survey Data

    National Research Council Canada - National Science Library

    Stoker, Carol; Crawford, Alice

    2008-01-01

    ... (including morale and lack of mentoring), push both men and women out of the Navy. Nonetheless, the Navy s primary effort to improve retention has been to introduce the Surface Warfare Officer Continuation Pay (SWOCP...

  6. Diagnosis of Exposure to Chemical Warfare Agents: A Comprehensive Literature Survey 1990-2005

    National Research Council Canada - National Science Library

    Noort, D

    2006-01-01

    This report is an update of TNO report PML 2003-A63. In this report an overview is presented of the methods currently available for detection of exposure to a number of chemical warfare agents (CWA), i.e...

  7. Information Warfare: Issues Associated with the Defense of DOD Computers and Computer Networks

    National Research Council Canada - National Science Library

    Franklin, Derek

    2002-01-01

    ... that may threaten the critical information pathways of the armed forces An analysis of the history of computer information warfare reveals that there was an embarrassing lack of readiness and defense...

  8. The Third World War? In The Cyberspace. Cyber Warfare in the Middle East.

    Directory of Open Access Journals (Sweden)

    Martina

    2014-06-01

    Full Text Available This article aims to provide a brief and comprehensive introduction to the issue of cyber warfare and to display the recent development in this area. Geographically, it focuses on the Middle East region, since the vast majority of the most important recent cyber attacks appeared just in there or were connected to it. The first part of the article tries to define the key notion of cyber warfare, compares it to the standard warfare and presents different types of cyber weapons that are known today. The second part points out examples of the most striking recent cyber attacks and uses them as evidences to demonstrate today's importance and dissemination of cyber warfare. Finally, the article sums up pros and cons of the cyber weapons and, in view of these, predicts a significant increase in their use in any future war conflicts.

  9. The Army Ground Forces Training for Mountain and Winter Warfare - Study No. 23

    National Research Council Canada - National Science Library

    Govan, Thomas

    1946-01-01

    This general study of the experiments in mountain and winter warfare training from 1940 to 1944 is designed as an introduction to the histories of the Mountain Training Center and The 10th Mountain...

  10. Cerium oxide for the destruction of chemical warfare agents: A comparison of synthetic routes

    Czech Academy of Sciences Publication Activity Database

    Janos, P.; Henych, Jiří; Pelant, O.; Pilařová, V.; Vrtoch, L.; Kormunda, M.; Mazanec, K.; Štengl, Václav

    2016-01-01

    Roč. 304, MAR (2016), s. 259-268 ISSN 0304-3894 Institutional support: RVO:61388980 Keywords : Cerium oxide * Chemical warfare agents * Organophosphate compounds * Decontamination Subject RIV: CA - Inorganic Chemistry Impact factor: 6.065, year: 2016

  11. Damn! The Torpedoes: Coping with Mine Warfare in the Joint Maritime Environment

    National Research Council Canada - National Science Library

    Bahr, James D

    2007-01-01

    ... and the attainment of joint operational maneuver. The potential exists for non-state actors to acquire sea mines and subsequently employ mine warfare as a means of crippling the Navy throughout its range of military operations...

  12. Improving Blood Monitoring of Enzymes as Biomarkers of Risk from Anticholinergic Pesticides and Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wilson, Barry W

    2005-01-01

    Blood biomarkers are an important way to monitor exposure to anticholinergic pesticides and chemical warfare agents and to establish whether some personnel are at greater risk than others from exposure...

  13. Improving Blood Monitoring of Enzymes as Biomarkers of Risk from Anticholinergic Pesticides and Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wilson, Barry W

    2006-01-01

    Blood biomarkers are an important way to monitor exposure to anticholinergic pesticides and chemical warfare agents and to establish whether some personnel are at greater risk than others from exposure...

  14. Evaluation Report on Management Controls at the Disbursing Office, Naval Surface Warfare Center, Dahlgren, Virginia

    National Research Council Canada - National Science Library

    Lane, F

    1997-01-01

    On September 19, 1996, the Defense Criminal Investigative Service requested assistance from the Assistant Inspector General for Auditing, DoD, in an investigation at the Naval Surface Warfare Center, Dahlgren, Virginia...

  15. Guerrilla Warfare: Cause and Conflict (A 21st Century Success Story?),

    Science.gov (United States)

    1981-01-01

    and low intensity warfare is the means, both qualitative and quantitative, employed to achieve the intended goal. Both types of war require analysis ...administration.’ 9 If despair and aggravation become the mortar and pestle of future guerrilla warfare, then weapons availability and population growth might be... Thailand , and the Philippines. 55 Every time you ask, "Where are they going to get the money to pay," everybody falls silent. Brazil alone owes $55

  16. Twenty-First-Century Air Warfare and the Invisible War: Strategic Agility

    Science.gov (United States)

    2015-10-01

    September–October 2015 | 85 Views Twenty-First-Century Air Warfare and the Invisible War Strategic Agility Maj Michael W. Benitez, USAF America’s... gap between the dynamic 21st-century environment and our 20th-century bureaucracy. Their initiative and perse- verance allow us to succeed in our...SUBTITLE Twenty-First-Century Air Warfare and the Invisible War: Strategic Agility 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  17. Detachment 101 and North Burma: Historical Conditions for Future Unconventional Warfare Operations

    Science.gov (United States)

    2016-05-26

    of 1941 (1990; repr., Washington, DC: Government Printing Office, 2011), 42. 24 Maurice Matloff and Edwin M. Snell, Strategic Planning for Coalition...Warfare: 1941­ 1942 (1953 repr., Washington, DC: Government Printing Office, 1999), 120. 25 Maurice Matloff, Strategic Planning for Coalition Warfare...opportunity for DET 101 to improve its relationships with the Kachin people. 99War Report: OSS, Volume 2, 383. 100 Richard Dunlop, Behind Japanese Lines with

  18. Irregular Warfare as a National Military Strategy Approach for Small States

    Science.gov (United States)

    2013-12-01

    of these “pods”: the question of homogeneity or heterogeneity. There 216 Oliker, Russia´s Chechen Wars...Ronfeldt regarding the degree of homogeneity of the teams should also be evaluated. In some cases, there might be a higher degree of specialization in...prerequisites. A. IRREGULAR WARFARE – A DIRTY WAR? Based on the last decades of conflicts, the tactics used in irregular warfare have left a bad taste in the

  19. Key Planning Factors for Recovery from a Chemical Warfare Agent Incident

    Science.gov (United States)

    2012-07-01

    GB], Franke, S., Manual of Military Chemistry , Volume 1. Chemistry of Chemical Warfare Agents, Deutscher Militîrverlag: Berlin (East), 1967... Chemistry , Volume 1. Chemistry of Chemical Warfare Agents, Deutscher Militîrverlag: Berlin (East), 1967. Translated from German by U.S. Department of...Response and Recovery Phases A common misconception is that recovery begins after the response phase. Recovery, however, actually begins during

  20. Estimated Chemical Warfare Agent Surface Clearance Goals for Remediation Pre-Planning

    Energy Technology Data Exchange (ETDEWEB)

    Dolislager, Frederick [University of Tennessee, Knoxville (UTK); Bansleben, Dr. Donald [U.S. Department of Homeland Security; Watson, Annetta Paule [ORNL

    2010-01-01

    Health-based surface clearance goals, in units of mg/cm2, have been developed for the persistent chemical warfare agents sulfur mustard (HD) and nerve agent VX as well as their principal degradation products. Selection of model parameters and critical receptor (toddler child) allow calculation of surface residue estimates protective for the toddler child, the general population and adult employees of a facilty that has undergone chemical warfare agent attack.

  1. Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development

    Science.gov (United States)

    2016-09-01

    Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development by Neal Tesny Sensors and Electron Devices Directorate...TITLE AND SUBTITLE Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development 5a. CONTRACT NUMBER 5b...called cllMotorBasic. This module can be used separately if one is developing other software that needs to control the motors . The front panel of this

  2. Welcome to the Naval Postgraduate School Center on Terrorism and Irregular Warfare, Webpage

    OpenAIRE

    Center on Terrorism and Irregular Warfare

    2013-01-01

    Includes an image of the main page on this date and compressed file containing additional web pages. Established in 1998, The Center on Terrorism and Irregular Warfare produces timely, innovative, interdisciplinary analysis relevant to policy and operations. In studying terrorism and irregular warfare, the Center focuses the research capabilities of its staff and the Naval Postgraduate School on an area of critical importance to the national security of the United States.

  3. Modeling Anti-Air Warfare With Discrete Event Simulation and Analyzing Naval Convoy Operations

    Science.gov (United States)

    2016-06-01

    W., & Scheaffer, R. L. (2008). Mathematical statistics with applications . Belmont, CA: Cengage Learning. 118 THIS PAGE INTENTIONALLY LEFT BLANK...WARFARE WITH DISCRETE EVENT SIMULATION AND ANALYZING NAVAL CONVOY OPERATIONS by Ali E. Opcin June 2016 Thesis Advisor: Arnold H. Buss Co...REPORT DATE June 2016 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE MODELING ANTI-AIR WARFARE WITH DISCRETE EVENT

  4. The impact of warfare on the soil environment

    Science.gov (United States)

    Certini, Giacomo; Scalenghe, Riccardo; Woods, William I.

    2013-12-01

    One of the most dramatic ways humans can affect soil properties is through the performance of military activities. Warfare-induced disturbances to soil are basically of three types - physical, chemical, and biological - and are aimed at causing direct problems to enemies or, more often, are indirect, undesired ramifications. Physical disturbances to soil include sealing due to building of defensive infrastructures, excavation of trenches or tunnels, compaction by traffic of machinery and troops, or cratering by bombs. Chemical disturbances consist of the input of pollutants such as oil, heavy metals, nitroaromatic explosives, organophosphorus nerve agents, dioxins from herbicides, or radioactive elements. Biological disturbances occur as unintentional consequences of the impact on the physical and chemical properties of soil or the deliberate introduction of microorganisms lethal to higher animals and humans such as botulin or anthrax. Soil represents a secure niche where such pathogens can perpetuate their virulence for decades.

  5. Nanostructured Metal Oxides for Stoichiometric Degradation of Chemical Warfare Agents.

    Science.gov (United States)

    Štengl, Václav; Henych, Jiří; Janoš, Pavel; Skoumal, Miroslav

    2016-01-01

    Metal oxides have very important applications in many areas of chemistry, physics and materials science; their properties are dependent on the method of preparation, the morphology and texture. Nanostructured metal oxides can exhibit unique characteristics unlike those of the bulk form depending on their morphology, with a high density of edges, corners and defect surfaces. In recent years, methods have been developed for the preparation of metal oxide powders with tunable control of the primary particle size as well as of a secondary particle size: the size of agglomerates of crystallites. One of the many ways to take advantage of unique properties of nanostructured oxide materials is stoichiometric degradation of chemical warfare agents (CWAs) and volatile organic compounds (VOC) pollutants on their surfaces.

  6. Information Warfare on Social Media: A Brand Management Perspective

    Directory of Open Access Journals (Sweden)

    Kalpokas Ignas

    2017-06-01

    Full Text Available Employing a perspective informed by brand management, this article aims at understanding information warfare operations in social media. The state, seen as brand, must project an image of itself to both internal and foreign audiences to unite the domestic audience and/or attract global support. However, in constructing a brand, states are vulnerable to ‘sofa warriors’ – ordinary individuals who have been unwittingly recruited by hostile actors to disseminate (over social media or other platforms a counter-brand, harmful to the state concerned. These new threats are investigated in light of recent tendencies in online branding, elucidating their status as a national security threat, with the potential to significantly disrupt life in political communities.

  7. Agroterrorism, Biological Crimes, and Biological Warfare Targeting Animal Agriculture

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, Terry M.; Logan-Henfrey, Linda; Weller, Richard E.; Kellman, Brian

    2000-04-12

    There is a rising level of concern that agriculture might be targeted for economic sabotage by terrorists. Knowledge gathered about the Soviet Union biological weapons program and Iraq following the Gulf War, confirmed that animals and agricultural crops were targets of bioweapon development. These revelations are particularly disturbing in light of the fact that both countries are States Parties to the Biological and Toxin Weapons Convention that entered into force in 1975. The potential for misusing biotechnology to create more virulent pathogens and the lack of international means to detect unethical uses of new technologies to create destructive bioweapons is of increasing concern. Disease outbreaks, whether naturally occurring or intentionally, involving agricultural pathogens that destroy livestock and crops would have a profound impact on a country's infrastructure, economy and export markets. This chapter deals with the history of agroterrorism, biological crimes and biological warfare directed toward animal agriculture, specifically, horses, cattle, swine, sheep, goats, and poultry.

  8. RELATIONAL APPROACHES REGARDING FOCUSED LOGISTICS IN MODERN WARFARE JOINT OPERATIONS

    Directory of Open Access Journals (Sweden)

    Gheorghe MINCULETE

    2015-10-01

    Full Text Available The military joint operations of the future are characterized by large concentrations of forces and conventional means on the directions that permit the exploitation of the technological superiority and the manifestation of the offensive spirit of the commanders of the joint operation force groups. Having in mind the fact that the relation between the combatant forces and the logistic ones will shift more and more in favour of the latter, the aforementioned operations will be usually supported by modern flexible logistic structures. The constituted force groups will have a significant joint force character, ensuring superior quality of the troops’ combat training, both at individual level and collective level of units and large units. The current article presents innovative aspects of focused logistics, adapted for the modern warfare, which should be designed and achieved in order to increase the operational potential of the joint force groups.

  9. Book Review: Conquest in Cyberspace: National Security and Information Warfare

    Directory of Open Access Journals (Sweden)

    Gary C. Kessler

    2007-06-01

    Full Text Available Libicki, M.C. (2007. Conquest in Cyberspace: National Security and Information Warfare. New York: Cambridge University Press. 323 pages, ISBN: 978-0-521-69214-4 (paper, US$80Reviewed by Gary C. Kessler (gary.kessler@champlain.eduMany books -- and even movies ("Live Free or Die Hard" -- are based upon the premise of an impending information war. In these scenarios -- made all too plausible by the increased frequency with which we read about and experience major information security incidents -- a Bad Guy exploits known computer security vulnerabilities in order to control major national infrastructures via the Internet so as to reap financial, economic, and/or personal power.(see PDF for full review

  10. Advances in toxicology and medical treatment of chemical warfare nerve agents

    Directory of Open Access Journals (Sweden)

    Moshiri Mohammd

    2012-11-01

    Full Text Available Abstract Organophosphorous (OP Nerve agents (NAs are known as the deadliest chemical warfare agents. They are divided into two classes of G and V agents. Most of them are liquid at room temperature. NAs chemical structures and mechanisms of actions are similar to OP pesticides, but their toxicities are higher than these compounds. The main mechanism of action is irreversible inhibition of Acetyl Choline Esterase (AChE resulting in accumulation of toxic levels of acetylcholine (ACh at the synaptic junctions and thus induces muscarinic and nicotinic receptors stimulation. However, other mechanisms have recently been described. Central nervous system (CNS depression particularly on respiratory and vasomotor centers may induce respiratory failure and cardiac arrest. Intermediate syndrome after NAs exposure is less common than OP pesticides poisoning. There are four approaches to detect exposure to NAs in biological samples: (I AChE activity measurement, (II Determination of hydrolysis products in plasma and urine, (III Fluoride reactivation of phosphylated binding sites and (IV Mass spectrometric determination of cholinesterase adducts. The clinical manifestations are similar to OP pesticides poisoning, but with more severity and fatalities. The management should be started as soon as possible. The victims should immediately be removed from the field and treatment is commenced with auto-injector antidotes (atropine and oximes such as MARK I kit. A 0.5% hypochlorite solution as well as novel products like M291 Resin kit, G117H and Phosphotriesterase isolated from soil bacterias, are now available for decontamination of NAs. Atropine and oximes are the well known antidotes that should be infused as clinically indicated. However, some new adjuvant and additional treatment such as magnesium sulfate, sodium bicarbonate, gacyclidine, benactyzine, tezampanel, hemoperfusion, antioxidants and bioscavengers have recently been used for OP NAs poisoning.

  11. An Open Architecture Framework for Electronic Warfare Based Approach to HLA Federate Development

    Directory of Open Access Journals (Sweden)

    HyunSeo Kang

    2018-01-01

    Full Text Available A variety of electronic warfare models are developed in the Electronic Warfare Research Center. An Open Architecture Framework for Electronic Warfare (OAFEw has been developed for reusability of various object models participating in the electronic warfare simulation and for extensibility of the electronic warfare simulator. OAFEw is a kind of component-based software (SW lifecycle management support framework. This OAFEw is defined by six components and ten rules. The purpose of this study is to construct a Distributed Simulation Interface Model, according to the rules of OAFEw, and create Use Case Model of OAFEw Reference Conceptual Model version 1.0. This is embodied in the OAFEw-FOM (Federate Object Model for High-Level Architecture (HLA based distributed simulation. Therefore, we design and implement EW real-time distributed simulation that can work with a model in C++ and MATLAB API (Application Programming Interface. In addition, OAFEw-FOM, electronic component model, and scenario of the electronic warfare domain were designed through simple scenarios for verification, and real-time distributed simulation between C++ and MATLAB was performed through OAFEw-Distributed Simulation Interface.

  12. A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios

    Directory of Open Access Journals (Sweden)

    Kathryn Merrick

    2016-07-01

    Full Text Available Our increasing dependence on information technologies and autonomous systems has escalated international concern for information- and cyber-security in the face of politically, socially and religiously motivated cyber-attacks. Information warfare tactics that interfere with the flow of information can challenge the survival of individuals and groups. It is increasingly important that both humans and machines can make decisions that ensure the trustworthiness of information, communication and autonomous systems. Subsequently, an important research direction is concerned with modelling decision-making processes. One approach to this involves modelling decision-making scenarios as games using game theory. This paper presents a survey of information warfare literature, with the purpose of identifying games that model different types of information warfare operations. Our contribution is a systematic identification and classification of information warfare games, as a basis for modelling decision-making by humans and machines in such scenarios. We also present a taxonomy of games that map to information warfare and cyber crime problems as a precursor to future research on decision-making in such scenarios. We identify and discuss open research questions including the role of behavioural game theory in modelling human decision making and the role of machine decision-making in information warfare scenarios.

  13. Energy Education Materials Inventory

    Energy Technology Data Exchange (ETDEWEB)

    1979-08-01

    The two volumes of the Energy Education Materials Inventory (EEMI) comprise an annotated bibliography of widely available energy education materials and reference sources. This systematic listing is designed to provide a source book which will facilitate access to these educational resources and hasten the inclusion of energy-focused learning experiences in kindergarten through grade twelve. EEMI Volume II expands Volume I and contains items that have become available since its completion in May, 1976. The inventory consists of three major parts. A core section entitled Media contains titles and descriptive information on educational materials, categorized according to medium. The other two major sections - Grade Level and Subject - are cross indexes of the items for which citations appear in the Media Section. These contain titles categorized according to grade level and subject and show the page numbers of the full citations. The general subject area covered includes the following: alternative energy sources (wood, fuel from organic wastes, geothermal energy, nuclear power, solar energy, tidal power, wind energy); energy conservation, consumption, and utilization; energy policy and legislation, environmental/social aspects of energy technology; and fossil fuels (coal, natural gas, petroleum). (RWR)

  14. NRC inventory of dams

    International Nuclear Information System (INIS)

    Lear, G.E.; Thompson, O.O.

    1983-01-01

    The NRC Inventory of Dams has been prepared as required by the charter of the NRC Dam Safety Officer. The inventory lists 51 dams associated with nuclear power plant sites and 14 uranium mill tailings dams (licensed by NRC) in the US as of February 1, 1982. Of the 85 listed nuclear power plants (148 units), 26 plants obtain cooling water from impoundments formed by dams. The 51 dams associated with the plants are: located on a plant site (29 dams at 15 plant sites); located off site but provide plant cooling water (18 dams at 11 additional plant sites); and located upstream from a plant (4 dams) - they have been identified as dams whose failure, and ensuing plant flooding, could result in a radiological risk to the public health and safety. The dams that might be considered NRC's responsibility in terms of the federal dam safety program are identified. This group of dams (20 on nuclear power plant sites and 14 uranium mill tailings dams) was obtained by eliminating dams that do not pose a flooding hazard (e.g., submerged dams) and dams that are regulated by another federal agency. The report includes the principal design features of all dams and related useful information

  15. Strategic Inventories in Vertical Contracts

    OpenAIRE

    Krishnan Anand; Ravi Anupindi; Yehuda Bassok

    2008-01-01

    Classical reasons for carrying inventory include fixed (nonlinear) production or procurement costs, lead times, nonstationary or uncertain supply/demand, and capacity constraints. The last decade has seen active research in supply chain coordination focusing on the role of incentive contracts to achieve first-best levels of inventory. An extensive literature in industrial organization that studies incentives for vertical controls largely ignores the effect of inventories. Does the ability to ...

  16. INVENTORY CLASSIFICATION WITH ABC ANALYSIS

    OpenAIRE

    Kıyak, Erkan; Timuş, Oğuz Han; Karayel, Mehmet

    2015-01-01

    For a substantial organization, managing the expansive inventory is a serious problem. One of the methods to solve this problem used widely is classifying the inventory according to some criteria and managing inventory according to this classisifation. In this study, ABC classification methods are researched and Ng's model, which is one of the most widely used, selected for further investigation. An illustrative example is presented to show the usability of the Ng's method.

  17. Hanford inventory program user's manual

    International Nuclear Information System (INIS)

    Hinkelman, K.C.

    1994-01-01

    Provides users with instructions and information about accessing and operating the Hanford Inventory Program (HIP) system. The Hanford Inventory Program is an integrated control system that provides a single source for the management and control of equipment, parts, and material warehoused by Westinghouse Hanford Company in various site-wide locations. The inventory is comprised of spare parts and equipment, shop stock, special tools, essential materials, and convenience storage items. The HIP replaced the following systems; ACA, ASP, PICS, FSP, WSR, STP, and RBO. In addition, HIP manages the catalog maintenance function for the General Supplies inventory stocked in the 1164 building and managed by WIMS

  18. Six ways to reduce inventory.

    Science.gov (United States)

    Lunn, T

    1996-05-01

    The purpose of this presentation is to help you reduce the inventory in your operation. We will accomplish that task by discussing six specific methods that companies have used successfully to reduce their inventory. One common attribute of these successes is that they also build teamwork among the people. Every business operation today is concerned with methods to improve customer service. The real trick is to accomplish that task without increasing inventory. We are all concerned with improving our skills at keeping inventory low.

  19. Denmark's National Inventory Report 2013

    DEFF Research Database (Denmark)

    Nielsen, Ole-Kenneth; Plejdrup, Marlene Schmidt; Winther, Morten

    This report is Denmark’s National Inventory Report 2013. The report contains information on Denmark’s emission inventories for all years’ from 1990 to 2011 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2.......This report is Denmark’s National Inventory Report 2013. The report contains information on Denmark’s emission inventories for all years’ from 1990 to 2011 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2....

  20. Denmark's National Inventory Report 2014

    DEFF Research Database (Denmark)

    Nielsen, Ole-Kenneth; Plejdrup, Marlene Schmidt; Winther, Morten

    This report is Denmark’s National Inventory Report 2014. The report contains information on Denmark’s emission inventories for all years’ from 1990 to 2012 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2......This report is Denmark’s National Inventory Report 2014. The report contains information on Denmark’s emission inventories for all years’ from 1990 to 2012 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2...

  1. Denmark's National Inventory Report 2017

    DEFF Research Database (Denmark)

    Nielsen, Ole-Kenneth; Plejdrup, Marlene Schmidt; Winther, Morten

    This report is Denmark’s National Inventory Report 2017. The report contains information on Denmark’s emission inventories for all years’ from 1990 to 2015 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2......This report is Denmark’s National Inventory Report 2017. The report contains information on Denmark’s emission inventories for all years’ from 1990 to 2015 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2...

  2. Applying inventory classification to a large inventory management system

    Directory of Open Access Journals (Sweden)

    Benjamin Isaac May

    2017-06-01

    Full Text Available Inventory classification aims to ensure that business-driving inventory items are efficiently managed in spite of constrained resources. There are numerous single- and multiple-criteria approaches to it. Our objective is to improve resource allocation to focus on items that can lead to high equipment availability. This concern is typical of many service industries such as military logistics, airlines, amusement parks and public works. Our study tests several inventory prioritization techniques and finds that a modified multi-criterion weighted non-linear optimization (WNO technique is a powerful approach for classifying inventory, outperforming traditional techniques of inventory prioritization such as ABC analysis in a variety of performance objectives.

  3. Bleach vs. Bacteria

    Science.gov (United States)

    ... Articles | Inside Life Science Home Page Bleach vs. Bacteria By Sharon Reynolds Posted April 2, 2014 Your ... hypochlorous acid to help kill invading microbes, including bacteria. Researchers funded by the National Institutes of Health ...

  4. Controlling Inventory: Real-World Mathematical Modeling

    Science.gov (United States)

    Edwards, Thomas G.; Özgün-Koca, S. Asli; Chelst, Kenneth R.

    2013-01-01

    Amazon, Walmart, and other large-scale retailers owe their success partly to efficient inventory management. For such firms, holding too little inventory risks losing sales, whereas holding idle inventory wastes money. Therefore profits hinge on the inventory level chosen. In this activity, students investigate a simplified inventory-control…

  5. 21 CFR 1304.11 - Inventory requirements.

    Science.gov (United States)

    2010-04-01

    ... the inventory of the registered location to which they are subject to control or to which the person... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Inventory requirements. 1304.11 Section 1304.11... REGISTRANTS Inventory Requirements § 1304.11 Inventory requirements. (a) General requirements. Each inventory...

  6. Denmark's National Inventory Report 2009

    DEFF Research Database (Denmark)

    Nielsen, Ole-Kenneth; Lyck, Erik; Mikkelsen, Mette Hjorth

    This report is Denmark's National Inventory Report 2009. The report contains information on Denmark's emission inventories for all years' from 1990 to 2007 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2. The report documents the methodology as well as presents activity data and emissi...

  7. Automation of Space Inventory Management

    Science.gov (United States)

    Fink, Patrick W.; Ngo, Phong; Wagner, Raymond; Barton, Richard; Gifford, Kevin

    2009-01-01

    This viewgraph presentation describes the utilization of automated space-based inventory management through handheld RFID readers and BioNet Middleware. The contents include: 1) Space-Based INventory Management; 2) Real-Time RFID Location and Tracking; 3) Surface Acoustic Wave (SAW) RFID; and 4) BioNet Middleware.

  8. Michigan's Fourth Forest Inventory: Area.

    Science.gov (United States)

    John S. Jr. Spencer

    1983-01-01

    The fourth inventory of Michigan's forest resources found 17.5 million acres of commercial forest, down 7% from the 18.9 million found in 1966. This bulletin analyzes findings from the inventory and presents detailed tables of forest area.

  9. Denmark's national inventory report 2006

    DEFF Research Database (Denmark)

    Illerup, Jytte Boll; Lyck, Erik; Nielsen, Ole-Kenneth

    This report is Denmark's National Inventory Report reported to the Conference of the Parties under the United Nations Framework Convention on Climate Change (UNFCCC) due by April 2006. The report contains information on Denmark's inventories for all years' from 1990 to 2004 for CO....

  10. Student-Life Stress Inventory.

    Science.gov (United States)

    Gadzella, Bernadette M.; And Others

    The reliability of the Student-Life Stress Inventory of B. M. Gadzella (1991) was studied. The inventory consists of 51 items listed in 9 sections indicating different types of stressors (frustrations, conflicts, pressures, changes, and self-imposed stressors) and reactions to the stressors (physiological, emotional, behavioral, and cognitive) as…

  11. Anthropogenic landforms of warfare origin and their ecological significance: the Verdun Forest, NE France

    Science.gov (United States)

    De Matos Machado, Rémi; Amat, Jean-Paul; Arnaud-Fassetta, Gilles; Bétard, François; Bilodeau, Clélia; Jacquemot, Stéphanie; Toumazet, Jean-Pierre

    2017-04-01

    By its unprecedented industrial character, the First World War marked landscapes like no other conflict in the world. As a result of artillery bombardment and building facilities, the relief suffered major disturbances giving rise to millions anthropogenic landforms of warfare origin on the Western front: shell craters, trenches, shelters and gun sites. This landscape made of bumps and holes that dominated the lands of West Flanders and North-eastern France during the four years of war took chaotic aspects on the great battle sites. In some areas, substrate crushing by repeated bombings resulted in a field lowering of several metres. Although these geomorphological legacies of war are still present on these scarred lands, their effects on local environment and on present-day biodiversity patterns are not fully understood. On the battlefield of Verdun, where a huge number and range of conflict-induced landforms may be observed, special attention is being paid to the ecological significance of these anthropogenic landforms in a current landscape matrix dominated by forest. In 2013, an airborne LiDAR mission conducted over the battlefield has brought to light the relief inherited from the fighting that was until now concealed by the Verdun forest planted in the 1930's. Through a digital terrain model (DTM) with centimetre level accuracy, it is now possible to observe the smallest traces of the fighting. A first programmatic mapping work allowed to inventory and to locate these reliefs on the whole 10,000 hectares covered by the DTM. Also, the calculation of their geometry enabled us to quantify the erosion rate due to the military activities on the battlefield. On the basis of these morphometric measurements, a typology was developed to better appreciate the morphological diversity of conflict-induced landforms. The results show that these anthropogenic landforms are generally hollow. Because of this particular morphology, the conflict-induced landforms provide

  12. ANALYSIS MODEL FOR INVENTORY MANAGEMENT

    Directory of Open Access Journals (Sweden)

    CAMELIA BURJA

    2010-01-01

    Full Text Available The inventory represents an essential component for the assets of the enterprise and the economic analysis gives them special importance because their accurate management determines the achievement of the activity object and the financial results. The efficient management of inventory requires ensuring an optimum level for them, which will guarantee the normal functioning of the activity with minimum inventory expenses and funds which are immobilised. The paper presents an analysis model for inventory management based on their rotation speed and the correlation with the sales volume illustrated in an adequate study. The highlighting of the influence factors on the efficient inventory management ensures the useful information needed to justify managerial decisions, which will lead to a balancedfinancial position and to increased company performance.

  13. Guerilla Warfare & Law Enforcement: Combating the 21st Century Terrorist Cell within the U.S.

    Directory of Open Access Journals (Sweden)

    Major Richard Hughbank

    2009-01-01

    Full Text Available Both domestic and international terrorist organizations employ guerrilla warfare tactics, techniques, and procedures. Thus, the ability to identify and defeat the members of these organizations, cripple their infrastructures, and disrupt their financial resources lies in the understanding of modern guerrilla warfare as it develops in the twenty-first century within the United States.3 The forms of asymmetric warfare4 adopted by domestic and international terrorist groups alike is no longer intended to gain simple media exposure or governmental manipulation; they want to make an overpowering impact by causing massive loss of life and severe damage to infrastructure and are often motivated by religious imperatives and political goals. As terrorism analyst Stephen Flynn has observed, "Throughout the 20th century [Americans] were able to treat national security as essentially an out-of-body experience. When confronted by threats, [America] dealt with them on the turf of our allies or our adversaries. Aside from the occasional disaster and heinous crime, civilian life [in the United States] has been virtually terror-free." With the turn of the twenty-first century, terrorist operations have become more prevalent in the United States and are taking shape in the form of modern guerrilla warfare, thus creating new challenges for federal, state, and local law enforcement agencies. After reviewing the origin and nature of these challenges, this article will offer some suggestions for countering guerilla warfare in the United States.

  14. 78 FR 53109 - Security Zones; Naval Base Point Loma; Naval Mine Anti-Submarine Warfare Command; San Diego Bay...

    Science.gov (United States)

    2013-08-28

    ...-AA87 Security Zones; Naval Base Point Loma; Naval Mine Anti-Submarine Warfare Command; San Diego Bay... Anti-Submarine Warfare Command to protect the relocated marine mammal program. These security zone... the Port, The Commander of Naval Base Point Loma, the Commander of the Naval Mine Anti Submarine...

  15. Eye injuries in twentieth century warfare: a historical perspective.

    Science.gov (United States)

    Wong, T Y; Seet, M B; Ang, C L

    1997-01-01

    With successive wars in the twentieth century, there has been a relative increase in injuries to the eye compared to injuries of other parts of the body. The main causes of eye injury have changed with advances in techniques and weaponry of warfare, with blast fragmentation injuries accounting for 50-80% of cases. Penetrating and perforating injuries are most common, and injuries associated with intraocular foreign bodies pose special diagnostic and management problems. Injuries are bilateral in 15-25% of cases. Injuries associated with chemical, nuclear, and laser weapons have distinct characteristics and epidemiology. Enucleation was commonly performed at the turn of the century, but incidence has declined with better understanding of the pathophysiology of ocular trauma, improved surgical techniques and sepsis control with antibiotics. Sympathetic ophthalmia appears to be uncommon and earlier fears of this complication seem to have been exaggerated. Timely evacuation to a surgical facility is important for a good visual prognosis and preservation of the globe. However, prevention of injuries with eye armor is ultimately the best management, and the need for a comprehensive eye protection program in the military cannot be overemphasized, especially since eye injuries pose important socioeconomic, as well as medical, problems.

  16. The enemy as animal: Symmetric dehumanization during asymmetric warfare.

    Science.gov (United States)

    Bruneau, Emile; Kteily, Nour

    2017-01-01

    Historically, dehumanization has enabled members of advantaged groups to 'morally disengage' from disadvantaged group suffering, thereby facilitating acts of intergroup aggression such as colonization, slavery and genocide. But is blatant dehumanization exclusive to those at the top 'looking down', or might disadvantaged groups similarly dehumanize those who dominate them? We examined this question in the context of intergroup warfare in which the disadvantaged group shoulders a disproportionate share of casualties and may be especially likely to question the humanity of the advantaged group. Specifically, we assessed blatant dehumanization in the context of stark asymmetric conflict between Israelis (Study 1; N = 521) and Palestinians (Study 2; N = 354) during the 2014 Gaza war. We observed that (a) community samples of Israelis and Palestinians expressed extreme (and comparable) levels of blatant dehumanization, (b) blatant dehumanization was uniquely associated with outcomes related to outgroup hostility for both groups, even after accounting for political ideologies known to strongly predict outgroup aggression, and (c) the strength of association between blatant dehumanization and outcomes was similar across both groups. This study illuminates the striking potency and symmetry of blatant dehumanization among those on both sides of an active asymmetric conflict.

  17. Studies on residue-free decontaminants for chemical warfare agents.

    Science.gov (United States)

    Wagner, George W

    2015-03-17

    Residue-free decontaminants based on hydrogen peroxide, which decomposes to water and oxygen in the environment, are examined as decontaminants for chemical warfare agents (CWA). For the apparent special case of CWA on concrete, H2O2 alone, without any additives, effectively decontaminates S-2-(diisopropylamino)ethyl O-ethyl methylphosphonothioate (VX), pinacolyl methylphosphorofluoridate (GD), and bis(2-choroethyl) sulfide (HD) in a process thought to involve H2O2 activation by surface-bound carbonates/bicarbonates (known H2O2 activators for CWA decontamination). A plethora of products are formed during the H2O2 decontamination of HD on concrete, and these are characterized by comparison to synthesized authentic compounds. As a potential residue-free decontaminant for surfaces other than concrete (or those lacking adsorbed carbonate/bicarbonate) H2O2 activation for CWA decontamination is feasible using residue-free NH3 and CO2 as demonstrated by reaction studies for VX, GD, and HD in homogeneous solution. Although H2O2/NH3/CO2 ("HPAC") decontaminants are active for CWA decontamination in solution, they require testing on actual surfaces of interest to assess their true efficacy for surface decontamination.

  18. Unconventional Nuclear Warfare Defense (UNWD) containment and mitigation subtask.

    Energy Technology Data Exchange (ETDEWEB)

    Wente, William Baker

    2005-06-01

    The objective of this subtask of the Unconventional Nuclear Warfare Design project was to demonstrate mitigation technologies for radiological material dispersal and to assist planners with incorporation of the technologies into a concept of operations. The High Consequence Assessment and Technology department at Sandia National Laboratories (SNL) has studied aqueous foam's ability to mitigate the effects of an explosively disseminated radiological dispersal device (RDD). These benefits include particle capture of respirable radiological particles, attenuation of blast overpressure, and reduction of plume buoyancy. To better convey the aqueous foam attributes, SNL conducted a study using the Explosive Release Atmospheric Dispersion model, comparing the effects of a mitigated and unmitigated explosive RDD release. Results from this study compared health effects and land contamination between the two scenarios in terms of distances of effect, population exposure, and remediation costs. Incorporating aqueous foam technology, SNL created a conceptual design for a stationary containment area to be located at a facility entrance with equipment that could minimize the effects from the detonation of a vehicle transported RDD. The containment design was evaluated against several criteria, including mitigation ability (both respirable and large fragment particle capture as well as blast overpressure suppression), speed of implementation, cost, simplicity, and required space. A mock-up of the conceptual idea was constructed at SNL's 9920 explosive test site to demonstrate the containment design.

  19. Drone Warfare: Twenty-First Century Empire and Communications

    Directory of Open Access Journals (Sweden)

    Kevin Howley

    2017-02-01

    Full Text Available This paper, part of a larger project that examines drones from a social-construction of technology perspective, considers drone warfare in light of Harold Innis’s seminal work on empire and communication. Leveraging leading-edge aeronautics with advanced optics, data processing, and networked communication, drones represent an archetypal “space-biased” technology. Indeed, by allowing remote operators and others to monitor, select, and strike targets from half a world away, and in real-time, these weapon systems epitomize the “pernicious neglect of time” Innis sought to identify and remedy in his later writing. With Innis’s time-space dialectic as a starting point, then, the paper considers drones in light of a longstanding paradox of American culture: the impulse to collapse the geographical distance between the United States and other parts of the globe, while simultaneously magnifying the cultural difference between Americans and other peoples and societies. In the midst of the worldwide proliferation of drones, this quintessentially sublime technology embodies this (disconnect in important, profound, and ominous ways.

  20. Back to the future: aerial warfare in Libya

    Directory of Open Access Journals (Sweden)

    João Paulo Nunes Vicente

    2013-05-01

    Full Text Available A century after the first air bomb mission, a new intervention in the same geographic space has made evident the changes in Airpower. The Aerial Warfare in Libya has radically changed the civil war, complying with a UN mission to protect Libyan population, imposing a no-fly zone and an arms embargo. Therefore, Operation Unified Protector became one of the most successful campaigns in the history of NATO. We aim to assess the operational efficiency of Airpower in the conflict in Libya, focusing on the challenges of a War essentially Aerial. Despite the military results and the fact that some political objectives were met, we can identify some concerning trends that, if not shifted, may negatively influence future NATO operations. We do not aim to draw general and universal conclusions on the strategic value of Airpower based on the analysis of a specific case. Above all, we focus on identifying some lessons which have influenced OUP operational efficiency. Thus, we must analyze some factors, such as the scope of objectives, the type of opposing action and aerial strategy used by the coalition and then focus on the challenges arising from the OUP.

  1. INEEL Liquid Effluent Inventory

    Energy Technology Data Exchange (ETDEWEB)

    Major, C.A.

    1997-06-01

    The INEEL contractors and their associated facilities are required to identify all liquid effluent discharges that may impact the environment at the INEEL. This liquid effluent information is then placed in the Liquid Effluent Inventory (LEI) database, which is maintained by the INEEL prime contractor. The purpose of the LEI is to identify and maintain a current listing of all liquid effluent discharge points and to identify which discharges are subject to federal, state, or local permitting or reporting requirements and DOE order requirements. Initial characterization, which represents most of the INEEL liquid effluents, has been performed, and additional characterization may be required in the future to meet regulations. LEI information is made available to persons responsible for or concerned with INEEL compliance with liquid effluent permitting or reporting requirements, such as the National Pollutant Discharge Elimination System, Wastewater Land Application, Storm Water Pollution Prevention, Spill Prevention Control and Countermeasures, and Industrial Wastewater Pretreatment. The State of Idaho Environmental Oversight and Monitoring Program also needs the information for tracking liquid effluent discharges at the INEEL. The information provides a baseline from which future liquid discharges can be identified, characterized, and regulated, if appropriate. The review covered new and removed buildings/structures, buildings/structures which most likely had new, relocated, or removed LEI discharge points, and at least 10% of the remaining discharge points.

  2. Inventory of miscellaneous streams

    International Nuclear Information System (INIS)

    Lueck, K.J.

    1995-09-01

    On December 23, 1991, the US Department of Energy, Richland Operations Office (RL) and the Washington State Department of Ecology (Ecology) agreed to adhere to the provisions of the Department of Ecology Consent Order. The Consent Order lists the regulatory milestones for liquid effluent streams at the Hanford Site to comply with the permitting requirements of Washington Administrative Code. The RL provided the US Congress a Plan and Schedule to discontinue disposal of contaminated liquid effluent into the soil column on the Hanford Site. The plan and schedule document contained a strategy for the implementation of alternative treatment and disposal systems. This strategy included prioritizing the streams into two phases. The Phase 1 streams were considered to be higher priority than the Phase 2 streams. The actions recommended for the Phase 1 and 2 streams in the two reports were incorporated in the Hanford Federal Facility Agreement and Consent Order. Miscellaneous Streams are those liquid effluents streams identified within the Consent Order that are discharged to the ground but are not categorized as Phase 1 or Phase 2 Streams. This document consists of an inventory of the liquid effluent streams being discharged into the Hanford soil column

  3. Recent evidence on the muted inventory cycle

    OpenAIRE

    Andrew J. Filardo

    1995-01-01

    Inventories play an important role in business cycles. Inventory build-ups add momentum to the economy during expansions, while inventory liquidations sap economic strength during recessions. In addition, because inventory fluctuations are notoriously difficult to predict, they present considerable uncertainty in assessing the economic outlook.> The role of inventories in shaping the current outlook for the U.S. economy is particularly uncertain. In the early 1990s, inventory swings appeared ...

  4. SiGe-based re-engineering of electronic warfare subsystems

    CERN Document Server

    Lambrechts, Wynand

    2017-01-01

    This book equips readers with a thorough understanding of the applicability of new-generation silicon-germanium (SiGe) electronic subsystems for the military purposes of electronic warfare and defensive countermeasures. The theoretical and technical background is extensively explained and all aspects of the integration of SiGe as an enabling technology for maritime, land, and airborne (including space) electronic warfare are addressed, including research, design, development, and implementation. The coverage is supported by mathematical derivations, informative illustrations, practical examples, and case studies. While SiGe technology provides speed, performance, and price advantages in many markets, sharing of information on its use in electronic warfare systems has to date been limited, especially in developing nations. This book will therefore be warmly welcomed as an engineering guideline that focuses especially on the speed and reliability of current-generation SiGe circuits and highlights emerging innov...

  5. THE CYBER DIMENSION OF MODERN HYBRID WARFARE AND ITS RELEVANCE FOR NATO

    Directory of Open Access Journals (Sweden)

    Sorin DUCARU

    2016-06-01

    Full Text Available The technological development and the instant communication possibilities advanced not only economic and social developments, but also evolving threats from those who exploit the vulnerabilities of communication and information systems. The cyber threat landscape points to a significant increase of the frequency, intensity, duration and sophistication of cyber-attacks. One of the new and concerning trends is the use of cyber capabilities in relation with military of hybrid operations – the so-called cyber dimension of hybrid warfare. NATO’s strategy on countering hybrid warfare is based on the triad: prepare-deter-defend, which also applies to cyber. Nations represent the first line of defence in countering hybrid strategies. International cooperation is also a key factor in this sense. It is in this context that NATO’s response to cyber-attacks in the context of hybrid warfare must be further refined.

  6. The United States and biological warfare: secrets from the early cold war and Korea.

    Science.gov (United States)

    Bruwer, A

    2001-01-01

    The United States and Biological Warfare is about accusations that the United States resorted to bacteriological warfare at a time of great military stress during the Korean War. In December 1951, the then US Secretary of Defense ordered early readiness for offensive use of biological weapons. Soon afterwards, the North Korean and Chinese armies accused the United States of starting a large-scale biological warfare experiment in Korea. The US State Department denied the accusation. Both parties to the dispute maintain their positions today. The authors spent 20 years researching the accusations in North America, Europe and Japan. They were the first foreigners to be given access to Chinese classified documents. The reader is also introduced to the concept of 'plausible denial', an official US policy which allowed responsible governmental representatives to deny knowledge of certain events. The authors hope that their work will contribute to the understanding of a time when modern war expanded into a new type of violence.

  7. Case Study on Inventory Management Improvement

    Directory of Open Access Journals (Sweden)

    Plinere Darya

    2015-12-01

    Full Text Available Inventory management is a challenging problem area in supply chain management. Companies need to have inventories in warehouses in order to fulfil customer demand, meanwhile these inventories have holding costs and this is frozen fund that can be lost. Therefore, the task of inventory management is to find the quantity of inventories that will fulfil the demand, avoiding overstocks. This paper presents a case study for the assembling company on inventory management. It is proposed to use inventory management in order to decrease stock levels and to apply an agent system for automation of inventory management processes.

  8. Fusion program research materials inventory

    International Nuclear Information System (INIS)

    Roche, T.K.; Wiffen, F.W.; Davis, J.W.; Lechtenberg, T.A.

    1984-01-01

    Oak Ridge National Laboratory maintains a central inventory of research materials to provide a common supply of materials for the Fusion Reactor Materials Program. This will minimize unintended material variations and provide for economy in procurement and for centralized record keeping. Initially this inventory is to focus on materials related to first-wall and structural applications and related research, but various special purpose materials may be added in the future. The use of materials from this inventory for research that is coordinated with or otherwise related technically to the Fusion Reactor Materials Program of DOE is encouraged

  9. Skeletal evidence for Inca warfare from the Cuzco region of Peru.

    Science.gov (United States)

    Andrushko, Valerie A; Torres, Elva C

    2011-11-01

    This article addresses the bioarchaeological evidence for Inca warfare through an analysis of 454 adult skeletons from 11 sites in the Inca capital region of Cuzco, Peru. These 11 sites span almost 1000 years (AD 600-1532), which allows for a comparison of the evidence for warfare before the Inca came to power (Middle Horizon AD 600-1000), during the time of Inca ascendency in the Late Intermediate Period (AD 1000-1400), and after the Inca came to power and expanded throughout the Cuzco region and beyond (Inca Imperial Period, AD 1400-1532). The results indicate that 100 of 454 adults (22.0%) showed evidence of cranial trauma. Of these, 23 individuals had major cranial injuries suggestive of warfare, consisting of large, complete, and/or perimortem fractures. There was scant evidence for major injuries during the Middle Horizon (2.8%, 1/36) and Late Intermediate Period (2.5%, 5/199), suggesting that warfare was not prevalent in the Cuzco region before and during the Inca rise to power. Only in the Inca Imperial Period was there a significant rise in major injuries suggestive of warfare (7.8%, 17/219). Despite the significant increase in Inca times, the evidence for major cranial injuries was only sporadically distributed at Cuzco periphery sites and was entirely absent at Cuzco core sites. These findings suggest that while the Inca used warfare as a mechanism for expansion in the Cuzco region, it was only one part of a complex expansion strategy that included economic, political, and ideological means to gain and maintain control. Copyright © 2011 Wiley-Liss, Inc.

  10. Particle Swarm Social Adaptive Model for Multi-Agent Based Insurgency Warfare Simulation

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Xiaohui [ORNL; Potok, Thomas E [ORNL

    2009-12-01

    To better understand insurgent activities and asymmetric warfare, a social adaptive model for modeling multiple insurgent groups attacking multiple military and civilian targets is proposed and investigated. This report presents a pilot study using the particle swarm modeling, a widely used non-linear optimal tool to model the emergence of insurgency campaign. The objective of this research is to apply the particle swarm metaphor as a model of insurgent social adaptation for the dynamically changing environment and to provide insight and understanding of insurgency warfare. Our results show that unified leadership, strategic planning, and effective communication between insurgent groups are not the necessary requirements for insurgents to efficiently attain their objective.

  11. NONDESTRUCTIVE IDENTIFICATION OF CHEMICAL WARFARE AGENTS AND EXPLOSIVES BY NEUTRON GENERATOR-DRIVEN PGNAA

    Energy Technology Data Exchange (ETDEWEB)

    T. R. Twomey; A. J. Caffrey; D. L. Chichester

    2007-02-01

    Prompt gamma-ray neutron activation analysis (PGNAA) is now a proven method for the identification of chemical warfare agents and explosives in military projectiles and storage containers. Idaho National Laboratory is developing a next-generation PGNAA instrument based on the new Ortec Detective mechanically-cooled HPGe detector and a neutron generator. In this paper we review PGNAA analysis of suspect chemical warfare munitions, and we discuss the advantages and disadvantages of replacing the californium-252 radioisotopic neutron source with a compact accelerator neutron generator.

  12. NONDESTRUCTIVE IDENTIFICATION OF CHEMICAL WARFARE AGENTS AND EXPLOSIVES BY NEUTRON GENERATOR-DRIVEN PGNAA

    International Nuclear Information System (INIS)

    T. R. Twomey; A. J. Caffrey; D. L. Chichester

    2007-01-01

    Prompt gamma-ray neutron activation analysis (PGNAA) is now a proven method for the identification of chemical warfare agents and explosives in military projectiles and storage containers. Idaho National Laboratory is developing a next-generation PGNAA instrument based on the new Ortec Detective mechanically-cooled HPGe detector and a neutron generator. In this paper we review PGNAA analysis of suspect chemical warfare munitions, and we discuss the advantages and disadvantages of replacing the californium-252 radioisotopic neutron source with a compact accelerator neutron generator

  13. Clinical Decision Support (CDS) Inventory

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Clinical Decision Support (CDS) Inventory contains descriptions of past and present CDS projects across the Federal Government. It includes Federal projects,...

  14. Inventory differences: An evaluation methodology

    International Nuclear Information System (INIS)

    Heinberg, C.L.; Roberts, N.J.

    1987-01-01

    This paper discusses an evaluation methodology which is used for inventory differences at the Los Alamos National Laboratory. It is recognized that there are various methods which can be, and are being, used to evaluate process inventory differences at DOE facilities. The purpose of this paper is to share our thoughts on the subject and our techniques with those who are responsible for the evaluation of inventory differences at their facility. One of the most dangerous aspects of any evaluation technique, especially one as complex as most inventory difference evaluations tend to be, is to fail to look at the tools being used as indicators. There is a tendency to look at the results of an evaluation by one technique as an absolute. At the Los Alamos National Laboratory, several tools are used and the final evaluation is based on a combination of the observed results of a many-faceted evaluation. The tools used and some examples are presented

  15. Title V Permitting Statistics Inventory

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Title V Permitting Statistics Inventory contains measured and estimated nationwide statistical data, consisting of counts of permitted sources, types of permits...

  16. Travel reliability inventory for Chicago.

    Science.gov (United States)

    2013-04-01

    The overarching goal of this research project is to enable state DOTs to document and monitor the reliability performance : of their highway networks. To this end, a computer tool, TRIC, was developed to produce travel reliability inventories from : ...

  17. Severe Weather Data Inventory (SWDI)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Severe Weather Data Inventory (SWDI) is an integrated database of severe weather records for the United States. SWDI enables a user to search through a variety...

  18. Colorado statewide historic bridge inventory.

    Science.gov (United States)

    2011-05-01

    The purpose of the Colorado statewide historic bridge inventory was to document and evaluate the National : Register of Historic Places eligibility all on-system highway bridges and grade separation structures built in : Colorado between 1959 and 196...

  19. NPS national transit inventory, 2013

    Science.gov (United States)

    2014-07-31

    This document summarizes key highlights from the National Park Service (NPS) 2013 National Transit Inventory, and presents data for NPS transit systems system-wide. The document discusses statistics related to ridership, business models, fleet charac...

  20. Allegheny County Toxics Release Inventory

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — The Toxics Release Inventory (TRI) data provides information about toxic substances released into the environment or managed through recycling, energy recovery, and...

  1. FEMA Flood Insurance Studies Inventory

    Data.gov (United States)

    Kansas Data Access and Support Center — This digital data set provides an inventory of Federal Emergency Management Agency (FEMA) Flood Insurance Studies (FIS) that have been conducted for communities and...

  2. National Greenhouse Gas Emission Inventory

    Data.gov (United States)

    U.S. Environmental Protection Agency — The National Greenhouse Gas Emission Inventory contains information on direct emissions of greenhouse gases as well as indirect or potential emissions of greenhouse...

  3. Biogenic Emission Inventory System (BEIS)

    Science.gov (United States)

    Biogenic Emission Inventory System (BEIS) estimates volatile organic compound (VOC) emissions from vegetation and nitric oxide (NO) emission from soils. Recent BEIS development has been restricted to the SMOKE system

  4. The Finnish national forest inventory

    Science.gov (United States)

    Erkki Tomppo

    2009-01-01

    The National Forest Inventory (NFI) of Finland has produced large-area forest resource information since the beginning of 1920s (Ilvessalo 1927). When the 10th inventory (NFI10) started in 2004, the design was changed and the rotation shortened to 5 years. Measurements are done in the entire country each year through measuring one-fifth of the plots. About one-fifth of...

  5. Value-Based Inventory Management

    OpenAIRE

    Michalski, Grzegorz

    2008-01-01

    The basic financial purpose of a firm is to maximize its value. An inventory management system should also contribute to realization of this basic aim. Many current asset management models currently found in financial management literature were constructed with the assumption of book profit maximization as basic aim. However these models could lack what relates to another aim, i.e., maximization of enterprise value. This article presents a modified value-based inventory management model.

  6. Genomics of Probiotic Bacteria

    Science.gov (United States)

    O'Flaherty, Sarah; Goh, Yong Jun; Klaenhammer, Todd R.

    Probiotic bacteria from the Lactobacillus and Bifidobacterium species belong to the Firmicutes and the Actinobacteria phylum, respectively. Lactobacilli are members of the lactic acid bacteria (LAB) group, a broadly defined family of microorganisms that ferment various hexoses into primarily lactic acid. Lactobacilli are typically low G + C gram-positive species which are phylogenetically diverse, with over 100 species documented to date. Bifidobacteria are heterofermentative, high G + C content bacteria with about 30 species of bifidobacteria described to date.

  7. Peru Mercury Inventory 2006

    Science.gov (United States)

    Brooks, William E.; Sandoval, Esteban; Yepez, Miguel A.; Howard, Howell

    2007-01-01

    In 2004, a specific need for data on mercury use in South America was indicated by the United Nations Environmental Programme-Chemicals (UNEP-Chemicals) at a workshop on regional mercury pollution that took place in Buenos Aires, Argentina. Mercury has long been mined and used in South America for artisanal gold mining and imported for chlor-alkali production, dental amalgam, and other uses. The U.S. Geological Survey (USGS) provides information on domestic and international mercury production, trade, prices, sources, and recycling in its annual Minerals Yearbook mercury chapter. Therefore, in response to UNEP-Chemicals, the USGS, in collaboration with the Economic Section of the U.S. Embassy, Lima, has herein compiled data on Peru's exports, imports, and byproduct production of mercury. Peru was selected for this inventory because it has a 2000-year history of mercury production and use, and continues today as an important source of mercury for the global market, as a byproduct from its gold mines. Peru is a regional distributor of imported mercury and user of mercury for artisanal gold mining and chlor-alkali production. Peruvian customs data showed that 22 metric tons (t) of byproduct mercury was exported to the United States in 2006. Transshipped mercury was exported to Brazil (1 t), Colombia (1 t), and Guyana (1 t). Mercury was imported from the United States (54 t), Spain (19 t), and Kyrgyzstan (8 t) in 2006 and was used for artisanal gold mining, chlor-alkali production, dental amalgam, or transshipment to other countries in the region. Site visits and interviews provided information on the use and disposition of mercury for artisanal gold mining and other uses. Peru also imports mercury-containing batteries, electronics and computers, fluorescent lamps, and thermometers. In 2006, Peru imported approximately 1,900 t of a wide variety of fluorescent lamps; however, the mercury contained in these lamps, a minimum of approximately 76 kilograms (kg), and in

  8. Projecting Timber Inventory at the Product Level

    Science.gov (United States)

    Lawrence Teeter; Xiaoping Zhou

    1999-01-01

    Current timber inventory projections generally lack information on inventory by product classes. Most models available for inventory projection and linked to supply analyses are limited to projecting aggregate softwood and hardwood. The research presented describes a methodology for distributing the volume on each FIA (USDA Forest Service Forest Inventory and Analysis...

  9. 76 FR 62327 - Retail Inventory Method

    Science.gov (United States)

    2011-10-07

    ... Internal Revenue Service 26 CFR Part 1 RIN 1545-BJ64 Retail Inventory Method AGENCY: Internal Revenue... regulations relating to the retail inventory method of accounting. The regulations restate and clarify the computation of ending inventory values under the retail inventory method and provide a special rule for...

  10. 10 CFR 39.37 - Physical inventory.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Physical inventory. 39.37 Section 39.37 Energy NUCLEAR... inventory. Each licensee shall conduct a semi-annual physical inventory to account for all licensed material received and possessed under the license. The licensee shall retain records of the inventory for 3 years...

  11. 27 CFR 20.170 - Physical inventory.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Physical inventory. 20.170... Users of Specially Denatured Spirits Inventory and Records § 20.170 Physical inventory. Once in each... physical inventory of each formula of new and recovered specially denatured spirits. (Approved by the...

  12. Base-age invariance and inventory projections

    Science.gov (United States)

    C. J. Cieszewski; R. L. Bailey; B. E. Borders; G. H. Brister; B. D. Shiver

    2000-01-01

    One of the most important functions of forest inventory is to facilitate management decisions towards forest sustainability based on inventory projections into the future. Therefore, most forest inventories are used for predicting future states of the forests, in modern forestry the most common methods used in inventory projections are based on implicit functions...

  13. Diagnosis of exposure to chemical warfare agents: An essential tool to counteract chemical terrorism

    NARCIS (Netherlands)

    Noort, D.; Schans, M.J. van der; Bikker, F.J.; Benschop, H.P.

    2009-01-01

    Methods to analyze chemical warfare agents (CW-agents) and their decomposition products in environmental samples were developed over the last decades. In contrast herewith, procedures for analysis in biological samples have only recently been developed. Retrospective detection of exposure to

  14. A statistical analysis of the effect of warfare on the human secondary sex ratio

    NARCIS (Netherlands)

    Graffelman, J.; Hoekstra, R.F.

    2000-01-01

    Many factors have been hypothesized to affect the human secondary sex ratio (the annual percentage of males among all live births), among them race, parental ages, and birth order. Some authors have even proposed warfare as a factor influencing live birth sex ratios. The hypothesis that during and

  15. A Proficiency-Based Cost Estimate of Surface Warfare Officer On-the-Job Training

    Science.gov (United States)

    2011-12-01

    for “better schooling, and a surface warfare pin equivalent to the dolphins worn by submariners or the wings by the aviators” (Robinson, 2008...Historical Perspective from World War II to 2008. Fort Leavenworth: U.S. Army Command and General Staff College. Rocci, R. (2003). A Cognitive and

  16. 75 FR 69032 - Naval Surface Warfare Center, Potomac River, Dahlgren, VA; Danger Zone

    Science.gov (United States)

    2010-11-10

    ... Warfare Center, Dahlgren's patrol boats. Oystering and fishing boats or other craft may cross the river in... energy technology, and manned or unmanned water craft operations; (2) change the latitude and longitude... shoreline for commercial fishing and waterfowl hunting blinds under existing Navy and state regulations. The...

  17. The Evolution of Naval Warfare Technology and the Impact of Space Systems

    Science.gov (United States)

    1987-09-01

    or Greek fire. Larger missile devices such as the trebuchet were commonly used in land warfare, particularly in siege operations. However, the...were being used more widely in the Mediterranean. Mangonels and trebuchets were used to heave a variety of projectiles. Their adaptation for use on

  18. Information Warfare: Legal, Regulatory, Policy and Organizational Considerations for Assurance. Second Edition.

    Science.gov (United States)

    1996-07-04

    2-19 2-2-1 State Com puter Crim e Statutes ....................................................................... 2-44...2-2-2 Com puter Crim e Jurisdiction .......................................................................... 2-45 2-4-1 Information Warfare Policy...infrastructures from physical and cyber threats. * Propose statutory and regulatory changes. The Infrastructure Protection Task Force (IPTF): * Increase

  19. Above the Influence: The Strategic Effects of Airpower in Irregular Warfare

    Science.gov (United States)

    2010-06-01

    using the methods of Mao Zedong , working at the individual village level to subvert central government authority, which effectively stopped at the...Nagl, ―Principles, Imperatives, and Paradoxes of Counterinsurgency,‖ 50; Mao Tse-Tung, Problems of Strategy in Guerrilla Warfare, 215-216; Gray...outposts, 63 General (Ret.) William W. Momyer, Airpower in Three Wars ( WWII , Korea, Vietnam

  20. Ge 4+ doped TiO 2 for stoichiometric degradation of warfare agents

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Matys Grygar, Tomáš; Opluštil, F.; Němec, T.

    2012-01-01

    Roč. 227, AUGUST (2012), s. 62-67 ISSN 0304-3894 R&D Projects: GA ČR(CZ) GAP106/12/1116 Institutional support: RVO:61388980 Keywords : germanium * homogeneous hydrolysis * titania * urea * warfare agent degradation Subject RIV: CA - Inorganic Chemistry Impact factor: 3.925, year: 2012

  1. (Review of) Reno, William. 2011. Warfare in Independent Africa. Cambridge: Cambridge University Press

    DEFF Research Database (Denmark)

    Hagmann, Tobias

    2013-01-01

    Warfare in Independent Africa is Reno’s bold attempt to analyze the modern history of African insurgencies. The book tackles this task through the prism of five generations of rebel, which left their mark on the continent; anti-colonial rebels, majority rule rebels, reform rebels, warlord rebels ...

  2. Urban Warfare at the Operational Level: Identifying Centers of Gravity and Key Nodes

    National Research Council Canada - National Science Library

    McCleskey, Edward

    1999-01-01

    .... The intent of this paper is to focus the reader on the operational level of urban warfare. A key task for the Joint Force Commander and his staff will be to identify the targets against which he will employ his component forces...

  3. The influence of the Ratel infantry fighting vehicle on mobile warfare ...

    African Journals Online (AJOL)

    This article traces the story of how the author and a number of daring young commanders and soldiers had cast aside military textbooks in developing their own military doctrine for mobile warfare, South African style. It is clear that the Ratel infantry fighting vehicle had wielded huge influence on the development and ...

  4. Improving Blood Monitoring of Enzymes as Biomarkers of Risk from Anticholinergic Pesticides and Chemical Warfare Agents

    Science.gov (United States)

    2007-10-01

    1991. Protection by butyrylcholinesterase against organophosphorus poisoning in nonhuman primates. J. Pharmacol. Exp. Ther. 259(2): 633-638. Costa...Employee Health), Stephen McCurdy (UCD Epidemiology ), Stephanie Padilla (US EPA), Matthew Keifer (U. Washington) and CA and Utah clinical laboratories...the cholinergic function of the nervous system (Wilson, 2001). Organophosphorus ester pesticides and chem- ical warfare agents disrupt cholinergic

  5. Military medicine and the ethics of war: British colonial warfare during the Seven Years War (1756-63).

    Science.gov (United States)

    Charters, Erica

    2010-01-01

    This article examines 18th-century European warfare, tracing the first formal codifications of conventions of war, frequently introduced by military physicians and initially regarding the treatment of the sick and wounded. It outlines to what extent these conventions were followed in practice, particularly in the challenging environment of American irregular warfare, with a focus on the most well-known incident of "biological warfare" in the period: the deliberate spread of smallpox by British officers among Amerindians in 1763. More broadly, it demonstrates that the history of military medicine provides a fruitful method with which to uncover assumptions about the ethics of war.

  6. Annual Danish emissions inventory report to UNECE. Inventory 1990 - 2002

    Energy Technology Data Exchange (ETDEWEB)

    Illerup, J.B.; Nielsen, M.; Winther, M.; Hjort Mikkelsen, M.; Lyck, E.; Hoffmann, L.; Fauser, P.

    2004-05-01

    This report is a documentation report on the emission inventories for Denmark as reported to the UNECE Secretariat under the Convention on Long Range Transboundary Air Pollution due by 15 February 2004. The report contains information on Denmark's emission inventories regarding emissions of (1) SOx for the years 1980-2002, (2) NOx, CO, NMVOC and NH{sub 3} for the years 1985-2002; (3) Particulate matter: TSP, PM10, PM2.5 for the years 2000-2002, (4) Heavy Metals: Pb, Cd, Hg, As, Cr, Cu, Ni, Se and Zn for the years 1990-2002, and (5) Polyaromatic hydrocarbons (PAH): Benzo(a)pyrene, benzo(b)fluoranthene, benzo(k)fluoranthene and indeno(1,2,3-cd)pyrene for the years 1990-2002. Furthermore, the report contains information on background data for emissions inventory. (au)

  7. How honey kills bacteria

    NARCIS (Netherlands)

    Kwakman, Paulus H. S.; te Velde, Anje A.; de Boer, Leonie; Speijer, Dave; Vandenbroucke-Grauls, Christina M. J. E.; Zaat, Sebastian A. J.

    2010-01-01

    With the rise in prevalence of antibiotic-resistant bacteria, honey is increasingly valued for its antibacterial activity. To characterize all bactericidal factors in a medical-grade honey, we used a novel approach of successive neutralization of individual honey bactericidal factors. All bacteria

  8. Evolution of war and cyber attacks in the concept of conventional warfare

    Directory of Open Access Journals (Sweden)

    Huseyin Kuru

    2018-01-01

    Full Text Available Humanity have witnessed many confrontations of states whose interests challenge at some points and their struggle to neutralize problems in battlefield. While war was perceived as a way of eliminating deadlocks for some parties, some considered it as one of the international policy materials. The definition and content of conventional warfare have been subject to change for centuries, while the new weapons and technologies have been developed by human beings that it has brought constant change in the law of war and at the same time more lethal and devastating consequences. The struggle for superiority in international relations played an impulsive role in the development of weapons used in the battlefield. Countries have used their labor and financial resources to improve their military skills. Beginning with stones and sticks in the battlefield, this struggle has reached the point of using the next generation satellite controlled unmanned and armed aircrafts and having nuclear weapons has become more deterrent than using them. The struggle between strong countries and the limited countries in terms of technology and armed groups that do not have enough technology and skills completely changed the definition of conventional warfare. This fight has led Asymmetric warfare born which can turn commercial airline planes full of innocent people into a weapon like September-11 attacks. In this study, the historical development and the change in the content of the warfare were briefly explained and then cyber-attacks in the concept of the fourth generation warfare was analyzed taking into account of prominent attacks.

  9. TMI-2 isotopic inventory calculations

    Energy Technology Data Exchange (ETDEWEB)

    Schnitzler, B G; Briggs, J B

    1985-08-01

    Point isotopic depletion methods are used to develop spatially dependent fission product and heavy metal inventories for the TMI-2 core. Burnup data from 1239 fuel nodes (177 elements, 7 axial nodes per element) are utilized to preserve the core axial and radial power distributions. A full-core inventory is calculated utilizing 12 fuel groups (four burnup ranges for each of three initial enrichments). Calculated isotopic ratios are also presented as a function of burnup for selected nuclides. Specific applications of the isotopic ratio data include correlation of fuel debris samples with core location and estimates of fission product release fractions. 24 figs., 25 tabs.

  10. National Inventory Report 2006 - Norway

    Energy Technology Data Exchange (ETDEWEB)

    2006-07-01

    The report presents an inventory of greenhouse gas emissions and sinks in Norway from 1990 to 2004. Trends in total greenhouse gas emissions by UNFCCC's sources and gases are described for carbon dioxide (CO{sub 2}), methane (CH{sub 4}), nitrous oxide (N{sub 2}O), tetrafluoromethane (CF{sub 4}), hexafluoroethane (C{sub 2}F{sub 6}), sulphur hexafluoride (SF{sub 6}) and HFCs. Methodology used in the calculation of emissions from key sources in the Norwegian Emission Inventory are presented. Emissions are reported according to UNFCCC/IPCC common reporting format (CRF)

  11. National Inventory Report 2006 - Norway

    International Nuclear Information System (INIS)

    2006-01-01

    The report presents an inventory of greenhouse gas emissions and sinks in Norway from 1990 to 2004. Trends in total greenhouse gas emissions by UNFCCC's sources and gases are described for carbon dioxide (CO 2 ), methane (CH 4 ), nitrous oxide (N 2 O), tetrafluoromethane (CF 4 ), hexafluoroethane (C 2 F 6 ), sulphur hexafluoride (SF 6 ) and HFCs. Methodology used in the calculation of emissions from key sources in the Norwegian Emission Inventory are presented. Emissions are reported according to UNFCCC/IPCC common reporting format (CRF)

  12. National Inventory Report 2005 Norway

    Energy Technology Data Exchange (ETDEWEB)

    2005-07-01

    The report presents an inventory of greenhouse gas emissions and sinks in Norway from 1990 to 2003. Trends in total greenhouse gas emissions by UNFCCC's sources and gases are described for carbon dioxide (CO{sub 2}), methane (CH{sub 4}), nitrous oxide (N{sub 2}O), tetrafluoromethane (CF{sub 4}), hexafluoroethane (C{sub 2}F{sub 6}), sulphur hexafluoride (SF{sub 6}) and HFCs. Methodology used in the calculation of emissions from key sources in the Norwegian Emission Inventory are presented. Emissions are reported according to UNFCCC/IPCC common reporting format (CRF)

  13. Bench-Scale Investigation of Composting for Remediation of Explosives-Contaminated Soils from Naval Surface Warfare Center, Crane, Indiana

    National Research Council Canada - National Science Library

    Preston, Kurt

    1998-01-01

    ...), and octahydro-1,3,5,7-tetranitro-1,3,5,7- tetrazocine (HMX). The Naval Surface Warfare Center (NSWC), Crane, Indiana, provides material and logistic support to the Navy's weapon systems, including expendable and nonexpendable ordnance items...

  14. Cost Effectiveness Analysis of the "Sea to SWOS" Training Initiative on the Surface Warfare Officer Qualification Process

    National Research Council Canada - National Science Library

    Gavino, Christopher

    2002-01-01

    ... (combat effectiveness) while the quantitative analysis shows additional costs to the Navy Personnel Command and savings in training costs for the Naval Education and Training Command and OPNAV N76, the Surface Warfare Resource Sponsor...

  15. An Assessment of the Effectiveness of Computer-based Training for Newly Commissioned Surface Warfare Division Officers

    National Research Council Canada - National Science Library

    Bowman, William R; Crawford, Alice M; Mehay, Stephen; Stoker, Carol; Paynter, Robert

    2008-01-01

    ...) on-board an officer's ship. The study relied on a variety of analytical techniques, including a literature review of CBT and OJT training, interviews and focus groups with junior and senior surface warfare officers...

  16. Antibiotics from predatory bacteria

    Directory of Open Access Journals (Sweden)

    Juliane Korp

    2016-03-01

    Full Text Available Bacteria, which prey on other microorganisms, are commonly found in the environment. While some of these organisms act as solitary hunters, others band together in large consortia before they attack their prey. Anecdotal reports suggest that bacteria practicing such a wolfpack strategy utilize antibiotics as predatory weapons. Consistent with this hypothesis, genome sequencing revealed that these micropredators possess impressive capacities for natural product biosynthesis. Here, we will present the results from recent chemical investigations of this bacterial group, compare the biosynthetic potential with that of non-predatory bacteria and discuss the link between predation and secondary metabolism.

  17. Hydrogen production by nonphotosynthetic bacteria

    Energy Technology Data Exchange (ETDEWEB)

    Huang, S.D.; Secor, C.K.; Zweig, R.M.; Ascione, R.

    1984-01-01

    H-producing nonphotosynthetic bacteria are identified and H from sewage treatment plants, H from rumen bacteria, and large-scale production of H through the genetic manipulation of H-producing nonphotosynthetic bacteria are discussed. (Refs. 36).

  18. The German Military Entrepreneur Ernst von Mansfeld and His Conduct of Asymmetrical Warfare in the Thirty Years War

    OpenAIRE

    Bäckström, Olli

    2011-01-01

    The dissertation examines aspects of asymmetrical warfare in the war-making of the German military entrepreneur Ernst von Mansfeld during his involvement in the Thirty Years War. Due to the nature of the inquiry, which combines history with military-political theory, the methodological approach of the dissertation is interdisciplinary. The theoretical framework used is that of asymmetrical warfare. The primary sources used in the dissertation are mostly political pamphlets and newsl...

  19. Developing an Action Concept Inventory

    Science.gov (United States)

    McGinness, Lachlan P.; Savage, C. M.

    2016-01-01

    We report on progress towards the development of an Action Concept Inventory (ACI), a test that measures student understanding of action principles in introductory mechanics and optics. The ACI also covers key concepts of many-paths quantum mechanics, from which classical action physics arises. We used a multistage iterative development cycle for…

  20. Wisconsin's fourth forest inventory, 1983.

    Science.gov (United States)

    John S. Jr. Spencer; W. Brad Smith; Jerold T. Hahn; Gerhard K. Raile

    1988-01-01

    The fourth inventory of the timber resource of Wisconsin shows that growing-stock volume increased from 11.2 to 15.5 billion cubic feet between 1968 and 1983, and area of timberland increased from 14.5 to 14.8 million acres. Presented are analysis and statistics on forest area and timber volume, growth, mortality, removals, and projections.

  1. COMPUTER ASSISTED INVENTORY CONTROL SYSTEM ...

    African Journals Online (AJOL)

    supply chain actions. This includes integration of information coming from vendors. manufacturers and distributors, so as to smooth up the flow of materials in, through and out of a manufacturing firm. in a more responsive way to customer's demand. The main drawback for effective inventory management is the lack.

  2. Sourcing Life Cycle Inventory Data

    Science.gov (United States)

    The collection and validation of quality lifecycle inventory (LCI) data can be the most difficult and time-consuming aspect of developing a life cycle assessment (LCA). Large amounts of process and production data are needed to complete the LCI. For many studies, the LCA analyst ...

  3. [Darwin and bacteria].

    Science.gov (United States)

    Ledermann D, Walter

    2009-02-01

    As in 2009 the scientific world celebrates two hundreds years from the birthday of Charles Darwin and one hundred and fifty from the publication of The Origin of Species, an analysis of his complete work is performed, looking for any mention of bacteria. But it seems that the great naturahst never took knowledge about its existence, something rather improbable in a time when the discovery of bacteria shook the medical world, or he deliberately ignored them, not finding a place for such microscopic beings into his theory of evolution. But the bacteria badly affected his familiar life, killing scarlet fever one of his children and worsening to death the evolution of tuberculosis of his favourite Annie. Darwin himself could suffer the sickness of Chagas, whose etiological agent has a similar level to bacteria in the scale of evolution.

  4. Extracellular communication in bacteria

    DEFF Research Database (Denmark)

    Chhabra, S.R.; Philipp, B.; Eberl, L.

    2005-01-01

    molecules, in different Gram-positive and Gram-negative bacteria they control pathogenicity, secondary metabolite production, biofilm differentiation, DNA transfer and bioluminescence. The development of biosensors for the detection of these signal molecules has greatly facilitated their subsequent chemical...

  5. Assessing removals for North Central forest inventories.

    Science.gov (United States)

    W. Brad Smith

    1991-01-01

    Discusses method used by the Forest Inventory and Analysis Unit for estimating timber removals. Presents the relationship of timber utilization studies, primary lumber mill studies, and forest inventory data.

  6. Inventory on cleaner production education and training

    DEFF Research Database (Denmark)

    Jørgensen, Michael Søgaard; Pöyry, Sirkka; Huisingh, Donald

    Analysis and presentation of the data from an international inventory on cleaner production education and training......Analysis and presentation of the data from an international inventory on cleaner production education and training...

  7. CoC Housing Inventory Count Reports

    Data.gov (United States)

    Department of Housing and Urban Development — Continuum of Care (CoC) Homeless Assistance Programs Housing Inventory Count Reports are a snapshot of a CoC’s housing inventory, available at the national and state...

  8. Ottawa National Wildlife Refuge : Wildlife Inventory Plan

    Data.gov (United States)

    Department of the Interior — This Wildlife Inventory Plan for Ottawa NWR describes the inventory program’s relation to Refuge objectives and outlines the program’s policies and administration....

  9. How Power-Laws Re-Write The Rules Of Cyber Warfare

    Directory of Open Access Journals (Sweden)

    David L. Bibighaus

    2015-12-01

    Full Text Available All warfare contains and element of randomness. This article will argue that, the kind uncertainty encountered in cyber warfare (Power-Law randomness is fundamentally different from the uncertainty the military has evolved to deal with in the physical world (Gaussian-Randomness. The article will explain the difference between these two kinds of randomness, and how cyber weapons appear to operate under Power-Law randomness. It then will show how in cyberspace, key aspects of strategic thought are based on a flaws assumption of randomness. Finally, this article shall argue that if the American military is going to be effective in cyberspace, it must re-examine the way the military assumes risk, recruits is forces, plans for war and maintains the peace.

  10. The fecal bacteria

    Science.gov (United States)

    Sadowsky, Michael J.; Whitman, Richard L.

    2011-01-01

    The Fecal Bacteria offers a balanced, integrated discussion of fecal bacteria and their presence and ecology in the intestinal tract of mammals, in the environment, and in the food supply. This volume covers their use in examining and assessing water quality in order to offer protection from illnesses related to swimming in or ingesting contaminated water, in addition to discussing their use in engineering considerations of water quality, modeling, monitoring, and regulations. Fecal bacteria are additionally used as indicators of contamination of ready-to-eat foods and fresh produce. The intestinal environment, the microbial community structure of the gut microbiota, and the physiology and genomics of this broad group of microorganisms are explored in the book. With contributions from an internationally recognized group of experts, the book integrates medicine, public health, environmental, and microbiological topics in order to provide a unique, holistic understanding of fecal bacteria. Moreover, it shows how the latest basic science and applied research findings are helping to solve problems and develop effective management strategies. For example, readers will discover how the latest tools and molecular approaches have led to our current understanding of fecal bacteria and enabled us to improve human health and water quality. The Fecal Bacteria is recommended for microbiologists, clinicians, animal scientists, engineers, environmental scientists, food safety experts, water quality managers, and students. It will help them better understand fecal bacteria and use their knowledge to protect human and environmental health. They can also apply many of the techniques and molecular tools discussed in this book to the study of a broad range of microorganisms in a variety of habitats.

  11. 30 CFR 220.032 - Inventories.

    Science.gov (United States)

    2010-07-01

    ... operations. The accumulation of surplus stocks shall be avoided by proper materiel control, inventory and... 30 Mineral Resources 2 2010-07-01 2010-07-01 false Inventories. 220.032 Section 220.032 Mineral... Inventories. (a) The lessee is responsible for NPSL materiel and shall make proper and timely cost and credit...

  12. 10 CFR 34.29 - Quarterly inventory.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Quarterly inventory. 34.29 Section 34.29 Energy NUCLEAR... RADIOGRAPHIC OPERATIONS Equipment § 34.29 Quarterly inventory. (a) Each licensee shall conduct a quarterly physical inventory to account for all sealed sources and for devices containing depleted uranium received...

  13. 23 CFR 650.315 - Inventory.

    Science.gov (United States)

    2010-04-01

    ... 23 Highways 1 2010-04-01 2010-04-01 false Inventory. 650.315 Section 650.315 Highways FEDERAL..., STRUCTURES, AND HYDRAULICS National Bridge Inspection Standards § 650.315 Inventory. (a) Each State or Federal agency must prepare and maintain an inventory of all bridges subject to the NBIS. Certain...

  14. 78 FR 10642 - Service Contracts Inventory

    Science.gov (United States)

    2013-02-14

    ... COMMISSION Service Contracts Inventory AGENCY: Nuclear Regulatory Commission. ACTION: Notice of availability. SUMMARY: The U.S. Nuclear Regulatory Commission (NRC) is providing for public information its Inventory of Contracts for Services for Fiscal Year (FY) 2012. The inventory includes service contract actions over $25...

  15. 7 CFR 984.21 - Handler inventory.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Handler inventory. 984.21 Section 984.21 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing Agreements... Regulating Handling Definitions § 984.21 Handler inventory. Handler inventory as of any date means all...

  16. 77 FR 5280 - Service Contracts Inventory

    Science.gov (United States)

    2012-02-02

    ... COMMISSION Service Contracts Inventory AGENCY: Nuclear Regulatory Commission. ACTION: Notice of availability. SUMMARY: The U.S. Nuclear Regulatory Commission (NRC) is providing for public information its Inventory of Contracts for Services for Fiscal Year (FY) 2011. The inventory includes service contract actions over $25...

  17. 75 FR 82095 - Service Contracts Inventory

    Science.gov (United States)

    2010-12-29

    ... Doc No: 2010-32828] NUCLEAR REGULATORY COMMISSION [NRC-2010-0394] Service Contracts Inventory AGENCY... Regulatory Commission (NRC) is providing for public information its Inventory of Contracts for Services for Fiscal Year (FY) 2010. The inventory includes service contract actions over $25,000 that were awarded in...

  18. 26 CFR 1.1374-7 - Inventory.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 11 2010-04-01 2010-04-01 true Inventory. 1.1374-7 Section 1.1374-7 Internal... TAXES Small Business Corporations and Their Shareholders § 1.1374-7 Inventory. (a) Valuation. The fair market value of the inventory of an S corporation on the first day of the recognition period equals the...

  19. 42 CFR 35.41 - Inventory.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Inventory. 35.41 Section 35.41 Public Health PUBLIC... STATION MANAGEMENT Disposal of Money and Effects of Deceased Patients § 35.41 Inventory. Promptly after the death of a patient in a station or hospital of the Service, an inventory of his money and effects...

  20. An annualized forest inventory for Nebraska

    Science.gov (United States)

    Hans T. Schreuder; Tom D. Wardle

    2000-01-01

    This paper addresses opportunities presented to states by an annualized forest inventory system, to be conducted by the Forest Inventory and Analysis program of the USDA Forest Service, and concerns about these inventories. The importance of a balanced approach in assessing timber and nontimber attributes is emphasized, and the paramount importance of maintaining and...

  1. Air University Research Paper: Asymmetric Warfare - Exposing America’s Weaknesses

    Science.gov (United States)

    2003-04-01

    AU/ACSC/ 03-1261R/2003-04 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY AIR UNIVERSITY RESEARCH PAPER ASYMMETRIC WARFARE - EXPOSING AMERICA’S...Air University Research Paper : Asymmetric Wafare - Exposing America’s Weaknesses 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER...Std Z39-18 Disclaimer The views expressed in this academic research paper are those of the author(s) and do not reflect the official policy or

  2. Satellite and Ground Communication Systems: Space and Electronic Warfare Threats to the United States Army

    Science.gov (United States)

    2017-02-01

    Figure 3). However, a 2016 Department of Defense (DoD) report explained that in 2013 “China launched an object into space on a ballistic trajectory with...well as other non-kinetic counter- space capabilities.42 The USCC report also provided detailed analysis of Chinese developments of co-orbital...Satellite and Ground Communication Systems: Space and Electronic Warfare Threats to the

  3. A Review of Multi-Threat Medical Countermeasures Against Chemical Warfare and Terrorism

    Science.gov (United States)

    2004-11-01

    Biopreparat, the military and civil defense to combat chemical warfare and civilian arm of the former Soviet Union’s biological weapons chemical terrorism . program...seamlessly transition to military force protection and civil defense against chemical terrorism . Terrorist threat agents include all classes of MTMC... chemical terrorism . Using MTMC to blunt pathological actions enteric mast cell granulation in acute soman intoxicated rats. Experimentia of chemical agents

  4. Equipping Network Warfare: Industrial-Era Bureaucracies for Information-Era Weapons

    Science.gov (United States)

    2009-04-01

    to operational shortfalls. Clearly, there are benefits in following known methods in organizing the cyberspace mission and its capabilities...sid26_gci853845,00.html (accessed 15 December 2008). 9 BX.com Terminology Reference, “Web Year,” http://www.bx.com/dictionary/ ecommerce /Web_year.cfm... benefits of the process, while amplifying the negative aspects of the bureaucracy. Network warfare capabilities are much more vulnerable to

  5. Mass spectrometric study of selected precursors and degradation products of chemical warfare agents

    Czech Academy of Sciences Publication Activity Database

    Papoušková, B.; Bednář, P.; Fryšová, I.; Stýskala, J.; Hlaváč, J.; Barták, P.; Ulrichová, J.; Jirkovský, Jaromír; Lemr, K.

    2007-01-01

    Roč. 42, č. 12 (2007), s. 1550-1561 ISSN 1076-5174 Grant - others:The Organization for the Prohibition of Chemical Weapons(NL) L/ICA/ICB/84322/04 Institutional research plan: CEZ:AV0Z40400503 Source of funding: V - iné verejné zdroje Keywords : mass spectrometry * chemical warfare agent * high performance liquid chromatography * LC/MS Subject RIV: CF - Physical ; Theoretical Chemistry Impact factor: 3.062, year: 2007

  6. A cost and operational effectiveness analysis of alternative anti-surface warfare platforms

    OpenAIRE

    Skinner, Walter Mark.

    1993-01-01

    Approved for public release; distribution is unlimited. A Cost and Operational Effectiveness Analysis (COEA) is performed for three alternative anti-surface warfare (ASUW) platforms that will conduct operations in multi-service regional scenarios. Estimated program costs, historical cost variances, and measures of operational effectiveness are determined for each COEA alternative, and service life extension effects are examined. The data is merged in a mixed-integer optimization model, MPA...

  7. The Equipment of Czech Firefighters for the Detection and Field Analyses of Chemical Warfare Agents

    Directory of Open Access Journals (Sweden)

    Jana Krykorkova

    2014-05-01

    Full Text Available This paper describes the requirements for the devices of detection, chemical reconnaissance and field analyses of chemical warfare agents (CWA and divides them into simple devices of detection, universal detectors, selective analyzers, multi-component analyzers and mobile laboratories. It also describes the devices of detection available within the Fire and Rescue Service of the Czech Republic (FRS CR and compares them with some prospective trends of further development.

  8. Deterrence in the Human Domain: A COIN Framework to Deterring Unconventional Warfare in Shaping Operations

    Science.gov (United States)

    2017-05-25

    protecting ethnic Russians, providing stability to neighbors, defending “self- determination,” and protecting human rights . Protection of Russian...Deterrence in the Human Domain: A COIN Framework to Deterring Unconventional Warfare in Shaping Operations A Monograph by MAJ Matthew P...should be aware that notwithstanding any other provision of law , no person shall be subject to any penalty for failing to comply with a collection of

  9. Cyberspace as a Complex Adaptive System and the Policy and Operational Implications for Cyber Warfare

    Science.gov (United States)

    2014-05-22

    accessed 13 February 2014). 66Teresa Degenhard “Between War and Crime: The Overlap between War and Crime: Unpacking Foucault and Agamben’s Studies...Article-2-Revision- for- Foucault -and-Agamben-Degenhardt-July-2013.pdf (accessed 5 April 2014). 26... Foucault and Agamben’s Studies within the Context of the War on Terror.”, 34. 68US Department of Defense, Electronic Warfare, Joint Publication 3-13, I-2

  10. Efficacy Evaluation of Current and Future Naval Mine Warfare Neutralization Method

    Science.gov (United States)

    2016-12-01

    MCM-1) Operates off the Coast of Hawaii during Exercise Rim of the Pacific (RIMPAC) 2004. ID: 040710-N-6551H-229. U.S. Navy, Arlington, VA...The Mine Countermeasure Ship USS Avenger (MCM-1) Operates off the Coast of Hawaii during Exercise Rim of the Pacific (RIMPAC) 2004. ID: 040710-N... fire -scout-following-two-crashes/. Accessed December 5, 2016. Space and Naval Warfare Systems Command. 2011. “Marine Mammal Program.” SSC Pacific

  11. Discrete Electronic Warfare Signal Processing using Compressed Sensing Based on Random Modulator Pre-Integrator

    OpenAIRE

    M. Sreenivasa Rao; Chandan C. Mishra; K. Krishna Naik; K. Maheshwara Reddy

    2015-01-01

    Electronic warfare receiver works in the wide electromagnetic spectrum in dense radar signal environment. Current trends in radar systems are ultra wideband and low probability of intercept radar technology. Detection of signals from various radar stations is a concern. Performance and probability of intercept are mainly dependent on high speed ADC technology. The sampling and reconstruction functions have to be optimized to capture incoming signals at the receiver to extract characteristics ...

  12. Vital Interests, Virtual Threats: Reconciling International Law with Information Warfare and United States Security

    Science.gov (United States)

    1999-05-01

    1985 workforce of 406,000 by two thirds. Volkswagen intends to reduce its present workforce by one third. Proctor and Gamble has rising sales, yet is...of the Senate Governmental Affairs Committee , named “China, Russia, Libya, Iran, Iraq, and at least seven other countries... audit uses four recent Stanford Technology Law Journal articles not related to information warfare. Granted, hypothetical environments make certainty

  13. Lawfare and hybrid warfare-how Russia is using the law as a weapon

    OpenAIRE

    Mosquera, A.; Bachmann, Sascha-Dominik

    2015-01-01

    This short paper introduces the reader to the mutating military concept of hybrid warfare and one of its implementing methods, the use of law as a weapon. We aim to provide a current, comprehensive definition of the terms “hybrid warfare” and “lawfare”. This submission focuses on the following areas: where law has been/is being used as a method of war, namely the Jus ad bellum, the jus in bello and the law of treaties in international relations.

  14. Special Operations, Irregular Warfare, and Operational Art: A Theory of Special Operations

    Science.gov (United States)

    2013-12-10

    modern militaries: Ian F. W. Beckett , Modern Insurgencies and Counter-Insurgencies (New York: Routledge, 2003), 213. 1...the dynamics that influence other coalition members. They do not have the 71Mao Zedong, On Guerrilla Warfare, trans. Samuel B. Griffith (Breiningville...2004. Beckett , Ian F. W. Modern Insurgencies and Counter-Insurgencies. New York: Routledge, 2003. Bergen, Peter. “Analysis: Bin Laden might find

  15. Russian Perspectives on Network-Centric Warfare: The Key Aim of Serdyukov’s Reform

    Science.gov (United States)

    2011-01-01

    has faced with its GLObal’naya NAvigatsionnaya Sputnikovaya Sistema —(GLONASS) system, and introducing advanced digitized communications in the armed...of targeting data will be accomplished by organizing virtual channels for data transmission or via a web -portal. The successful function- ing of the...Operations: Tactical Web Takes Shape,” Signal, November 2003; Col. Alan D. Campen, USAF (Ret.), “Look Closely At Network-Centric Warfare: Technology Can

  16. Incorporating AFEWC IMOM as an instructional asset for NPS radar and electronic warfare curricula

    OpenAIRE

    Van Splinter, Gregg A.

    1992-01-01

    Approved for public release; distribution is unlimited In this thesis, effort is made to incorporate the computer program, Improved Many(Jammers)-on-Many(Radars) (IMOM), into radar and electronic warfare curricula at the Naval Postgraduate School. The IMOM program is used operationally by the U.S. Air Force for electronic combat mission planning. IMOM allows the user to evaluate electronic combat effects through computer color graphics display of the electronic order of battle including ...

  17. Past and Potential Theory for Special Warfare Operational Art: People’s War and Contentious Politics

    Science.gov (United States)

    2015-03-04

    the scientific method could be used to examine historical case studies.114 His examination of the English , American, French, and Russian Revolutions...its full evaluation as a grammar of revolutionary war. Finally, a translation of basic concepts from contentious politics into useful outlines and...be founded upon distinct and sound theories of war and warfare. This monograph argues that from 1952-1965, the US Army Special Forces developed two

  18. Puncturing the Counterinsurgency Myth: Britain and Irregular Warfare in the Past, Present, and Future

    Science.gov (United States)

    2011-09-01

    FUTURE INTRODUCTION Britain’s irregular warfare experience in the post- World War II era presented the military with numer- ous insurgent challenges where...STRATEGICALLY PERCEPTIVE This myth points to a painful element of British COIN conduct, namely, the short -circuiting of con- text. The preference for...military to plan for long-term coalition commitments: “Increasing globalisation ties our security to that of our allies. . . . Therefore we must

  19. Evaluation of Littoral Combat Ships for Open-Ocean Anti-Submarine Warfare

    Science.gov (United States)

    2016-03-01

    submarines that were considered in detail for this report. Adapted from Michaele Lee Huygen, 2003, “Submarine Warfare in the 20th & 21st Centuries : A...development, architecture , capability, functional decomposition, modeling and simulation, ASW, LCS 15. NUMBER OF PAGES 99 16. PRICE CODE 17. SECURITY...2015/05/revealed-chinas-new-carrier- killer-sub-simulator/. General Dynamics. 2015. “Combat Power for the 21st Century .” Sales brochure, General

  20. Evaluating Effectiveness of a Frigate in an Anti-Air Warfare (AAW) Environment

    Science.gov (United States)

    2016-06-01

    anti-air warfare (AAW) mission, weapons and radar systems influence each other and interact with the combat software system (Figure 1). Figure 1...similar to our approach include UAV contributions to expeditionary operations (Raffetto, 2004), counter- piracy operations in the Gulf of Aden (Tsilis...statistical discovery software offers both powerful statistics and dynamic graphics capabilities to its users. In the thesis, JMP statistical discovery

  1. Cyber crime and cyber warfare with international cyber collaboration for RSA – preparing communities

    CSIR Research Space (South Africa)

    Grobler, M

    2012-03-01

    Full Text Available Warfare with International Cyber Collaboration for RSA ? Preparing Communities Dr Marthie Grobler, Joey Jansen van Vuuren', Dr Jannie Zaaiman? Council for Scientific and Industrial Research, Pretoria, South Africa1 University of Venda2 ABSTRACT... with the technological revolution is that cyberspace is full of complex and dynamic technological innovations that are not well suited to any legal system. A further complication is the lack of comprehensive treaties facilitating international cooperation...

  2. Global Trends and Future Warfare (Strategic Insights. Special Issue, October 2011)

    Science.gov (United States)

    2011-10-01

    Li Future Warfare and China regional and ethnic discrimination, and the spread of the internet and proliferation of sensational media. In a...communications, we have near-worldwide instant exchange of ideas and spread of ideas. Images and information of living standards, role models, and political...an unusually seductive form of military strength, in part because, like modern courtship, it appears to offer gratification without commitment.’15

  3. Transport and Reactivity of Decontaminants to Provide Hazard Mitigation of Chemical Warfare Agents from Materials

    Science.gov (United States)

    2016-06-01

    directions for future decontamination formulation approaches. 15. SUBJECT TERMS GD HD Decontamination Hazard mitigation VX Chemical warfare agent...agent from materials. The objective of this study was to provide a screening tool to identify decontamination chemistries and formulations that will...mitigation. The materials included a water-dispersible polyurethane (WDP) paint (MIL-DTL-53039) and an alkyd paint (MIL-PRF-24635). Two polymers were also

  4. Hybrid Warfare Dilemmas in the Middle Colonies during the American Revolution

    Science.gov (United States)

    2017-05-25

    prisoners and forcing the British to reinforce and area they thought they controlled.65 These militia groups grew larger and more emboldened after...British prisoners , Washington told him that he could not “answer for the militia who are resorting to Arms in most parts of the State, and exceedingly...the tension between punishing the colonists and welcoming them back into British rule prevented him from solving the hybrid warfare dilemmas posed

  5. CYBER WARFARE GOVERNANCE: EVALUATION OF CURRENT INTERNATIONAL AGREEMENTS ON THE OFFENSIVE USE OF CYBER

    Science.gov (United States)

    2015-10-01

    vulnerability in networks across the world as supervisory control and data acquisition ( SCADA ) systems, similar to the ones attacked in Iran, are...used worldwide to perform tasks such as traffic control, managing power grids and management of other utility systems. The heavy reliance on SCADA ...standpoint, this document will never become the agreed upon standard for today’s warfare, unless it is substantially updated . AU/ACSC/2015 28

  6. From the Decomposition of Chemical Warfare Agents to the Decontamination of Cytostatics

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Šťastný, Martin; Janoš, P.; Mazanec, K.; Perez-Diaz, J. L.; Štenglová Netíková, I. R.

    2018-01-01

    Roč. 57, č. 6 (2018), s. 2114-2122 ISSN 0888-5885 EU Projects: European Commission(XE) 312804 - COUNTERFOG Grant - others:NATO(US) SPS984599 Program:Science for Peace and Security Institutional support: RVO:61388980 Keywords : Chemical warfare agents * Degradation * Metal oxide sorbents Subject RIV: CA - Inorganic Chemistry OBOR OECD: Inorganic and nuclear chemistry Impact factor: 2.843, year: 2016

  7. TFTR tritium inventory accountability system

    International Nuclear Information System (INIS)

    Saville, C.; Ascione, G.; Elwood, S.; Nagy, A.; Raftopoulos, S.; Rossmassler, R.; Stencel, J.; Voorhees, D.; Tilson, C.

    1995-01-01

    This paper discusses the program, PPPL (Princeton Plasma Physics Laboratory) Material Control and Accountability Plan, that has been implemented to track US Department of Energy's tritium and all other accountable source material. Specifically, this paper details the methods used to measure tritium in various systems at the Tokamak Fusion Test Reactor; resolve inventory differences; perform inventory by difference inside the Tokamak; process and measure plasma exhaust and other effluent gas streams; process, measure and ship scrap or waste tritium on molecular sieve beds; and detail organizational structure of the Material Control and Accountability group. In addition, this paper describes a Unix-based computerized software system developed at PPPL to account for all tritium movements throughout the facility. 5 refs., 2 figs

  8. TFTR tritium inventory accountability system

    Energy Technology Data Exchange (ETDEWEB)

    Saville, C.; Ascione, G.; Elwood, S.; Nagy, A.; Raftopoulos, S.; Rossmassler, R.; Stencel, J.; Voorhees, D.; Tilson, C. [Plasma Physics Lab., Princeton, NJ (United States)

    1995-10-01

    This paper discusses the program, PPPL (Princeton Plasma Physics Laboratory) Material Control and Accountability Plan, that has been implemented to track US Department of Energy`s tritium and all other accountable source material. Specifically, this paper details the methods used to measure tritium in various systems at the Tokamak Fusion Test Reactor; resolve inventory differences; perform inventory by difference inside the Tokamak; process and measure plasma exhaust and other effluent gas streams; process, measure and ship scrap or waste tritium on molecular sieve beds; and detail organizational structure of the Material Control and Accountability group. In addition, this paper describes a Unix-based computerized software system developed at PPPL to account for all tritium movements throughout the facility. 5 refs., 2 figs.

  9. Operational advantages of using Cyber Electronic Warfare (CEW) in the battlefield

    Science.gov (United States)

    Yasar, Nurgul; Yasar, Fatih M.; Topcu, Yucel

    2012-06-01

    While cyberspace is emerging as a new battlefield, conventional Electronic Warfare (EW) methods and applications are likely to change. Cyber Electronic Warfare (CEW) concept which merges cyberspace capabilities with traditional EW methods, is a new and enhanced form of the electronic attack. In this study, cyberspace domain of the battlefield is emphazised and the feasibility of integrating Cyber Warfare (CW) concept into EW measures is researched. The SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis method is used to state the operational advantages of using CEW concept in the battlefield. The operational advantages of CEW are assessed by means of its effects on adversary air defense systems, communication networks and information systems. Outstanding technological and operational difficulties are pointed out as well. As a result, a comparison of CEW concept and conventional EW applications is presented. It is concluded that, utilization of CEW concept is feasible at the battlefield and it may yield important operational advantages. Even though the computers of developed military systems are less complex than normal computers, they are not subjected to cyber threats since they are closed systems. This concept intends to show that these closed systems are also open to the cyber threats. As a result of the SWOT analysis, CEW concept provides Air Forces to be used in cyber operations effectively. On the other hand, since its Collateral Damage Criteria (CDC) is low, the usage of cyber electronic attack systems seems to grow up.

  10. Ghana Youth Employment Program Inventory

    OpenAIRE

    Ulzen-Appiah, Ato; Avura, Francis Babongte

    2016-01-01

    This youth employment inventory has been compiled to improve the evidence base for making decisions about how to address the problem of youth unemployment or youth who are not in education and not participating in the labor market in Ghana. Policy makers who are considering measures to help young people make the transition into the labor market and obtain decent work are hampered by a lack ...

  11. Radioactive waste inventories and projections

    International Nuclear Information System (INIS)

    McLaren, L.H.

    1982-11-01

    This bibliography contains information on radioactive waste inventories and projections included in the Department of Energy's Energy Data Base from January 1981 through September 1982. The arrangement is by report number for reports, followed by nonreports in reverse chronological order. These citations are to research reports, journal articles, books, patents, theses, and conference papers from worldwide sources. Five indexes, each preceded by a brief description, are provided: Corporate Author, Personal Author, Subject, Contract Number, and Report Number. (25 abstracts)

  12. Stable isotope research pool inventory

    International Nuclear Information System (INIS)

    1984-03-01

    This report contains a listing of electromagnetically separated stable isotopes which are available at the Oak Ridge National Laboratory for distribution for nondestructive research use on a loan basis. This inventory includes all samples of stable isotopes in the Research Materials Collection and does not designate whether a sample is out on loan or is in reprocessing. For some of the high abundance naturally occurring isotopes, larger amounts can be made available; for example, Ca-40 and Fe-56

  13. National inventory of radioactive wastes

    International Nuclear Information System (INIS)

    1997-01-01

    There are in France 1064 sites corresponding to radioactive waste holders that appear in this radioactive waste inventory. We find the eighteen sites of E.D.F. nuclear power plants, The Cogema mine sites, the Cogema reprocessing plants, The Cea storages, the different factories and enterprises of nuclear industry, the sites of non nuclear industry, the Andra centers, decommissioned installations, disposals with low level radioactive wastes, sealed sources distributors, national defence. (N.C.)

  14. Inventory Dynamics under Transaction Costs

    OpenAIRE

    Jean-Paul Chavas; Paula M. Despins; T. Randy Fortenbery

    2000-01-01

    A conceptual model of storage behavior is developed. Optimal intertemporal pricing is derived to analyze the effects of transaction costs on storage andarbitrage pricing. It is shown how transaction costs can rationalize the existence of an inverse carrying charge for inventory. The model is applied to U.S. soybeans stocks for the period 1960–95. The empirical results suggest that transaction costs have a significant influence on storage behavior andintertemporal arbitrage pricing. Copyright ...

  15. Mycorrhiza helper bacteria

    Energy Technology Data Exchange (ETDEWEB)

    Deveau, Aurelie [French National Insitute for Agricultural Research (INRA); Labbe, Jessy [ORNL

    2016-10-01

    This chapter focuses on the Mycorrhiza Helper Bacteria (MHB), a generic name given to bacteria which stimulate the formation of mycorrhizal symbiosis. By extension, some bacterial strains that positively impact the functioning of mycorrhizal symbiosis are also called MHB. These bacteria have applicative interests, as they indirectly improve the health and growth of tree seedlings. MHB are not restricted to a specific type of ecosystem, but are rather generalist in the way that they associate with both herbaceous and woody mycorrhizal plants from boreal, temperate, arid and tropical ecosystems. However, understanding the molecular mechanisms and their specificities will help us to know more about the ecology of the MHB. The process of acquisition varies between fungal species; while ectomycorrhizal fungi most probably recurrently acquire them from the environment, the association between bacterial endosymbionts and Glomeromycota probably dates back to very ancient times, and has since been vertically transmitted.

  16. 78 FR 17205 - Notice of Availability of Service Contract Inventories

    Science.gov (United States)

    2013-03-20

    ... FEDERAL MARITIME COMMISSION Notice of Availability of Service Contract Inventories AGENCY: Federal Maritime Commission. ACTION: Notice of availability of service contract inventories. FOR FURTHER... Service Contract Inventory Analysis, the FY 2012 Service Contract Inventory, and the FY 2012 Service...

  17. Danish emission inventory for particular matter (PM)

    Energy Technology Data Exchange (ETDEWEB)

    Nielsen, M.; Winther, M.; Illerup, J.B.; Hjort Mikkelsen, M.

    2003-11-01

    The first Danish emission inventory that was reported in 2002 was a provisional-estimate based on data presently available. This report documents methodology, emission factors and references used for an improved Danish emission inventory for particulate matter. Further results of the improved emission inventory for the year 2000 are shown. The particulate matter emission inventory includes TSP, PM,, and PM, The report covers emission inventories for transport and stationary combustion. An appendix covering emissions from agriculture is also included. For the transport sector, both exhaust and non-exhaust emission such as tyre and break wear and road abrasion are included. (au)

  18. Physical inventory taking at Lucas Heights

    International Nuclear Information System (INIS)

    Quealy, K.J.

    1989-01-01

    Physical inventory planning and implementation at the Lucas Heights research reactor as the model facility are described. The description includes the computer-based records system used and the steps to ensure its accuracy, the labelling of separate items of nuclear material, the clean-out procedures for converting in-process material to measurable items, the administrative procedures for inventorying each inventory area, the verification procedures used to include previously measured tamper-safe items in the inventory, and lastly, procedures used to reconcile the inventory and calculate MUF (material unaccounted for). 2 figs

  19. Constructing a biodiversity terminological inventory.

    Directory of Open Access Journals (Sweden)

    Nhung T H Nguyen

    Full Text Available The increasing growth of literature in biodiversity presents challenges to users who need to discover pertinent information in an efficient and timely manner. In response, text mining techniques offer solutions by facilitating the automated discovery of knowledge from large textual data. An important step in text mining is the recognition of concepts via their linguistic realisation, i.e., terms. However, a given concept may be referred to in text using various synonyms or term variants, making search systems likely to overlook documents mentioning less known variants, which are albeit relevant to a query term. Domain-specific terminological resources, which include term variants, synonyms and related terms, are thus important in supporting semantic search over large textual archives. This article describes the use of text mining methods for the automatic construction of a large-scale biodiversity term inventory. The inventory consists of names of species, amongst which naming variations are prevalent. We apply a number of distributional semantic techniques on all of the titles in the Biodiversity Heritage Library, to compute semantic similarity between species names and support the automated construction of the resource. With the construction of our biodiversity term inventory, we demonstrate that distributional semantic models are able to identify semantically similar names that are not yet recorded in existing taxonomies. Such methods can thus be used to update existing taxonomies semi-automatically by deriving semantically related taxonomic names from a text corpus and allowing expert curators to validate them. We also evaluate our inventory as a means to improve search by facilitating automatic query expansion. Specifically, we developed a visual search interface that suggests semantically related species names, which are available in our inventory but not always in other repositories, to incorporate into the search query. An assessment of

  20. 2009 National inventory of radioactive material and wastes. Geographical inventory

    International Nuclear Information System (INIS)

    2009-01-01

    A geographical inventory of the radioactive wastes present on the French territory (as recorded until the 31 of december, 2007) is presented, region by region. The various types of waste sites (production, processing, conditioning and storage sites, Uranium mines, ANDRA storage centers, historical storage sites and polluted sites where wastes are stored) are listed and located on maps. Details are given on the nature and origin of these wastes (nuclear industry, medical domain, scientific research, conventional industry, Defense...). A total of 1121 sites have been recorded, among which 163 are presented with details and charts

  1. Antifreeze Proteins of Bacteria

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 12; Issue 12. Antifreeze Proteins of Bacteria. M K Chattopadhyay. General Article Volume 12 Issue 12 December 2007 pp 25-30. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/012/12/0025-0030 ...

  2. (PHB)-producing bacteria

    African Journals Online (AJOL)

    Jane

    2011-06-06

    Jun 6, 2011 ... Bioplastics are naturally occurring biodegradable polymers made from polyhydroxyalkanoates (PHA) of which poly 3-hydroxy butyric acid ... The plastic polymers accumulate intracellularly as light- refracting amorphous ... study focuses on the isolation and identification of novel species of bacteria capable ...

  3. Do Bacteria Age?

    Indian Academy of Sciences (India)

    Bacteria are thought to be examples of organisms that do not age. ... sues, organs, organ systems, organism, population, species, and .... Humans inevitably grow old through aging. All vertebrates show physical manifestations of aging somewhat similar to humans (other than white hair!). Aging is also seen in plants.

  4. Antifreeze Proteins of Bacteria

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 12; Issue 12. Antifreeze Proteins of Bacteria. M K Chattopadhyay. General Article Volume 12 Issue 12 December 2007 pp 25-30. Fulltext. Click here to view fulltext PDF. Permanent link: http://www.ias.ac.in/article/fulltext/reso/012/12/0025-0030. Keywords.

  5. Antibiotic-Resistant Bacteria.

    Science.gov (United States)

    Longenecker, Nevin E.; Oppenheimer, Dan

    1982-01-01

    A study conducted by high school advanced bacteriology students appears to confirm the hypothesis that the incremental administration of antibiotics on several species of bacteria (Escherichia coli, Staphylococcus epidermis, Bacillus sublitus, Bacillus megaterium) will allow for the development of antibiotic-resistant strains. (PEB)

  6. (PHB)-producing bacteria

    African Journals Online (AJOL)

    Isolation and characterization of two novel polyhydroxybutyrate (PHB)-producing bacteria. ... subsequently studied using phenotype microarray panels which allowed the testing of the effect of more than 90 different carbon, nitrogen, sulfur and phosphorus sources as well as pH on the growth characteristics of these strains.

  7. Considering inventory distributions in a stochastic periodic inventory routing system

    Science.gov (United States)

    Yadollahi, Ehsan; Aghezzaf, El-Houssaine

    2017-07-01

    Dealing with the stochasticity of parameters is one of the critical issues in business and industry nowadays. Supply chain planners have difficulties in forecasting stochastic parameters of a distribution system. Demand rates of customers during their lead time are one of these parameters. In addition, holding a huge level of inventory at the retailers is costly and inefficient. To cover the uncertainty of forecasting demand rates, researchers have proposed the usage of safety stock to avoid stock-out. However, finding the precise level of safety stock depends on forecasting the statistical distribution of demand rates and their variations in different settings among the planning horizon. In this paper the demand rate distributions and its parameters are taken into account for each time period in a stochastic periodic IRP. An analysis of the achieved statistical distribution of the inventory and safety stock level is provided to measure the effects of input parameters on the output indicators. Different values for coefficient of variation are applied to the customers' demand rate in the optimization model. The outcome of the deterministic equivalent model of SPIRP is simulated in form of an illustrative case.

  8. The Covert Use of the Global Special Operations Network and the Militarization of Covert Action in Political Warfare and the Gray Zone

    Science.gov (United States)

    2017-06-09

    84 Psychological Warfare Operations...Oxford University Press, 1971). 16 Charles Cruickshank,. The Fourth Arm: Psychological Warfare 1938-1945 (London, UK: Davis-Poynter, 1977), 69. 13...capability for clandestine intelligence collection and sabotage operations, in 1950, the Army only had about 20 personnel trained in psychological

  9. International humanitarian law applied to cyber-warfare: Precautions, proportionality and the notion of ‘attack’ under the humanitarian law of armed conflict

    NARCIS (Netherlands)

    Gill, T.D.; Tsagourias, N.; Buchan, R.

    2015-01-01

    This chapter examines the application of international humanitarian law to cyber warfare in the sense of rising to the level of an armed conflict. Building upon the work of the Tallinn Manual on the Application of International Law to Cyber Warfare, it places particular emphasis on the application

  10. Tritium inventory tracking and management

    International Nuclear Information System (INIS)

    Eichenberg, T.W.; Klein, A.C.

    1990-01-01

    This investigation has identified a number of useful applications of the analysis of the tracking and management of the tritium inventory in the various subsystems and components in a DT fusion reactor system. Due to the large amounts of tritium that will need to be circulated within such a plant, and the hazards of dealing with the tritium an electricity generating utility may not wish to also be in the tritium production and supply business on a full time basis. Possible scenarios for system operation have been presented, including options with zero net increase in tritium inventory, annual maintenance and blanket replacement, rapid increases in tritium creation for the production of additional tritium supplies for new plant startup, and failures in certain system components. It has been found that the value of the tritium breeding ratio required to stabilize the storage inventory depends strongly on the value and nature of other system characteristics. The real operation of a DT fusion reactor power plant will include maintenance and blanket replacement shutdowns which will affect the operation of the tritium handling system. It was also found that only modest increases in the tritium breeding ratio are needed in order to produce sufficient extra tritium for the startup of new reactors in less than two years. Thus, the continuous operation of a reactor system with a high tritium breeding ratio in order to have sufficient supplies for other plants is not necessary. Lastly, the overall operation and reliability of the power plant is greatly affected by failures in the fuel cleanup and plasma exhaust systems

  11. The friendly bacteria within us Commensal bacteria of the intestine ...

    Indian Academy of Sciences (India)

    The friendly bacteria within us Commensal bacteria of the intestine: Roles in health and disease B.S. Ramakrishna Professor & Head Gastroenterology & Hepatology Christian Medical College Vellore · Slide 2 · Intestinal bacteria: the hidden organ · Slide 4 · Slide 5 · The normal bacterial flora prevents GI disease · Slide 7.

  12. The friendly bacteria within us Commensal bacteria of the intestine ...

    Indian Academy of Sciences (India)

    Short chain fatty acids (SCFA) are main source of energy for colonic epithelial cells · SCFA – role in colonic disease · SCFA prevent mucosal inflammation · Immunoregulation by gut bacteria · Balance of bacterial species in the gut · Immunosensory detection of intestinal bacteria · Pathogenic bacteria release interleukin-8 ...

  13. A Genetic Algorithm on Inventory Routing Problem

    Directory of Open Access Journals (Sweden)

    Nevin Aydın

    2014-03-01

    Full Text Available Inventory routing problem can be defined as forming the routes to serve to the retailers from the manufacturer, deciding on the quantity of the shipment to the retailers and deciding on the timing of the replenishments. The difference of inventory routing problems from vehicle routing problems is the consideration of the inventory positions of retailers and supplier, and making the decision accordingly. Inventory routing problems are complex in nature and they can be solved either theoretically or using a heuristics method. Metaheuristics is an emerging class of heuristics that can be applied to combinatorial optimization problems. In this paper, we provide the relationship between vendor-managed inventory and inventory routing problem. The proposed genetic for solving vehicle routing problem is described in detail.

  14. Manufacture of Probiotic Bacteria

    Science.gov (United States)

    Muller, J. A.; Ross, R. P.; Fitzgerald, G. F.; Stanton, C.

    Lactic acid bacteria (LAB) have been used for many years as natural biopreservatives in fermented foods. A small group of LAB are also believed to have beneficial health effects on the host, so called probiotic bacteria. Probiotics have emerged from the niche industry from Asia into European and American markets. Functional foods are one of the fastest growing markets today, with estimated growth to 20 billion dollars worldwide by 2010 (GIA, 2008). The increasing demand for probiotics and the new food markets where probiotics are introduced, challenges the industry to produce high quantities of probiotic cultures in a viable and stable form. Dried concentrated probiotic cultures are the most convenient form for incorporation into functional foods, given the ease of storage, handling and transport, especially for shelf-stable functional products. This chapter will discuss various aspects of the challenges associated with the manufacturing of probiotic cultures.

  15. Bacteria in ulcera crurum.

    Science.gov (United States)

    Kontiainen, S; Rinne, E

    1988-01-01

    Bacterial cultures derived from 432 chronic leg ulcers were analysed retrospectively to determine which bacteria are most commonly found in these ulcers. The study covered a 2-year period. Two-thirds of the patients were over 70 years of age. Staphylococcus aureus was found in nearly half of the ulcers studied, Pseudomonas sp. in one-third, pyogenic streptococci and enterococci in every fifth and Proteus sp. in every tenth. The frequency by which pyogenic streptococci were isolated was about 10 to 20 times as high as previously reported. Obligate anaerobic bacteria were also frequently isolated. The sensitivity of the isolates from the second year to antimicrobial agents likely to be chosen if systemic therapy were required is also reported. The results are discussed in relation to previous findings.

  16. Deteriorating Inventory Model for Chilled Food

    OpenAIRE

    Yang, Ming-Feng; Tseng, Wei-Chung

    2015-01-01

    With many aspects that affect inventory policy, product perishability is a critical aspect of inventory policy. Most goods will deteriorate during storage and their original value will decline or be lost. Therefore, deterioration should be taken into account in inventory practice. Chilled food products are very common consumer goods that are, in fact, perishable. If the chilled food quality declines over time customers are less likely to buy it. The value the chilled food retains is, however,...

  17. How Does Collaborative Inventory Management Make Progress?

    OpenAIRE

    Simatupang, Togar Mangihut

    2003-01-01

    Collaborative inventory management (CIM) has revolutionized electronics, textile, apparel, and grocery industries. An intriguing question is how far does the movement of CIM challenge the traditional practice of inventory management? This paper illustrates how to expose and challenge flawed assumptions of traditional inventory management. It also proposes a collaborative replenishment process that consists of a cyclic process of tactical planning, execution, and control. The proposed scheme m...

  18. Data Driven Tuning of Inventory Controllers

    DEFF Research Database (Denmark)

    Huusom, Jakob Kjøbsted; Santacoloma, Paloma Andrade; Poulsen, Niels Kjølstad

    2007-01-01

    A systematic method for criterion based tuning of inventory controllers based on data-driven iterative feedback tuning is presented. This tuning method circumvent problems with modeling bias. The process model used for the design of the inventory control is utilized in the tuning...... as an approximation to reduce time required on experiments. The method is illustrated in an application with a multivariable inventory control implementation on a four tank system....

  19. Bacteria in ancient sediments

    International Nuclear Information System (INIS)

    Izzo, G.

    1986-01-01

    In order to ascertain the role of biological activity in ancient sediments, two microbiological studies were carried out. The first was on pleistocenic clay sediments on land, the second on deep oceanic sediments. In the present paper by direct counting the samples is demonstrated the presence of bacteria in a range of 10 5 to 10 7 . Further studies must be carried out to ascertain the activities by in situ incubation methods

  20. Bacteria colonizing paper machines

    OpenAIRE

    Ekman, Jaakko

    2011-01-01

    Bacteria growing in paper machines can cause several problems. Biofilms detaching from paper machine surfaces may lead to holes and spots in the end product or even break the paper web leading to expensive delays in production. Heat stable endospores will remain viable through the drying section of paper machine, increasing the microbial contamination of paper and board. Of the bacterial species regularly found in the end products, Bacillus cereus is the only one classified as a pathogen. Cer...

  1. Quality of life in chemical warfare survivors with ophthalmologic injuries: the first results form Iran Chemical Warfare Victims Health Assessment Study

    Directory of Open Access Journals (Sweden)

    Soroush Mohammad

    2009-01-01

    Full Text Available Abstract Background Iraq used chemical weapons extensively against the Iranians during the Iran-Iraq war (1980–1988. The aim of this study was to assess the health related quality of life (HRQOL in people who had ophthalmologic complications due to the sulfur mustard gas exposure during the war. Methods The Veterans and Martyrs Affair Foundation (VMAF database indicated that there were 196 patients with severe ophthalmologic complications due to chemical weapons exposure. Of these, those who gave consent (n = 147 entered into the study. Quality of life was measured using the 36-item Short Form Health Survey (SF-36 and scores were compared to those of the general public. In addition logistic regression analysis was performed to indicate variables that contribute to physical and mental health related quality of life. Results The mean age of the patients was 44.8 (SD = 8.7 ranging from 21 to 75 years. About one-third of the cases (n= 50 reported exposure to chemical weapons more than once. The mean exposure duration to sulfur mustard gas was 21.6 years (SD = 1.2. The lowest scores on the SF-36 subscales were found to be: the role physical and the general health. Quality of life in chemical warfare victims who had ophthalmologic problems was significantly lower than the general public (P Conclusion The study findings suggest that chemical warfare victims with ophthalmologic complications suffer from poor health related quality of life. It seems that the need for provision of health and support for this population is urgent. In addition, further research is necessary to measure health related quality of life in victims with different types of disabilities in order to support and enhance quality of life among this population.

  2. Denmark’s National Inventory Report 2012

    DEFF Research Database (Denmark)

    Nielsen, Ole-Kenneth; Mikkelsen, Mette Hjorth; Hoffmann, Leif

    This report is Denmark’s National Inventory Report 2012. The report contains information on Denmark’s emission inventories for all years’ from 1990 to 2010 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2......This report is Denmark’s National Inventory Report 2012. The report contains information on Denmark’s emission inventories for all years’ from 1990 to 2010 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2...

  3. Defense Business Operations Fund Inventory Record Accuracy

    National Research Council Canada - National Science Library

    1998-01-01

    .... The overall objective of the audit was to determine whether inventory amounts on the FY 1996 Defense Business Operations Fund Consolidated Financial Statements were presented fairly in accordance...

  4. Blood inventory management: hospital best practice.

    Science.gov (United States)

    Stanger, Sebastian H W; Yates, Nicola; Wilding, Richard; Cotton, Sue

    2012-04-01

    Blood is a perishable product, and hence good management of inventories is crucial. Blood inventory management is a trade-off between shortage and wastage. The challenge is to keep enough stock to ensure a 100% supply of blood while keeping time expiry losses at a minimum. This article focuses on inventory management of red blood cells in hospital transfusion laboratories to derive principles of best practice and makes recommendations that will ensure losses due to time expiry are kept to a minimum. The literature was reviewed to identify available models for perishable inventory management. Historical data from the UK blood supply chain was analyzed to identify hospitals with good inventory management practice and low wastage levels. Transfusion laboratory managers in the selected hospitals were interviewed in 7 case studies with the aim of identifying drivers for low wastage and good inventory management practice. The findings from the case studies were compared with the literature. The extant literature asserts that the drivers for good inventory performance are the use of complex inventory models and algorithms. This study has found this not to be the case. Instead, good performance is driven by the quality of transfusion laboratory staff, who must be skilled, regularly trained, and experienced. Electronic crossmatching, transparency of the inventory, and simple management procedures also facilitate good performance. Copyright © 2012 Elsevier Inc. All rights reserved.

  5. Danish emission inventories for stationary combustion plants. Inventories until 2008

    Energy Technology Data Exchange (ETDEWEB)

    Nielsen, Malene; Nielsen, Ole-Kenneth; Plejdrup, M.; Hjelgaard, K.

    2010-10-15

    Emission inventories for stationary combustion plants are presented and the methodologies and assumptions used for the inventories are described. The pollutants considered are SO{sub 2}, NO{sub x}, NMVOC, CH{sub 4}, CO, CO{sub 2}, N{sub 2}O, NH{sub 3}, particulate matter, heavy metals, dioxins, HCB and PAH. The CO{sub 2} emission in 2008 was 16 % lower than in 1990. However, fluctuations in the emission level are large as a result of electricity import/export. The emission of CH{sub 4} has increased due to increased use of lean-burn gas engines in combined heating and power (CHP) plants. However, the emission has decreased in recent years due to structural changes in the Danish electricity market. The N{sub 2}O emission was higher in 2008 than in 1990 but the fluctuations in the time-series are significant. A considerable decrease of the SO{sub 2}, NO{sub x} and heavy metal emissions is mainly a result of decreased emissions from large power plants and waste incineration plants. The combustion of wood in residential plants has increased considerably in recent years resulting in increased emission of PAH, particulate matter and CO. The emission of NMVOC has increased since 1990 as a result of both the increased combustion of wood in residential plants and the increased emission from lean-burn gas engines. The dioxin emission decreased since 1990 due to flue gas cleaning on waste incineration plants. However in recent years the emission has increased as a result of the increased combustion of wood in residential plants. (Author)

  6. INCAP - Applying short-term flexibility to control inventories

    OpenAIRE

    Lödding , Hermann; Lohmann , Steffen

    2011-01-01

    Abstract Inventory Based Capacity Control (INCAP) is a very simple method that allows inventory levels to be effectively controlled by using short-term capacity flexibility in make-to-stock settings. Moreover, INCAP can be used for finished goods inventories as well as for semi-finished goods inventories. The basic idea is to define upper and lower inventory limits and to adjust capacities if the inventory level reaches either limit. Should the inventory fall below the lower limit,...

  7. Detection of warfare agents in liquid foods using the brine shrimp lethality assay.

    Science.gov (United States)

    Lumor, Stephen E; Diez-Gonzalez, Francisco; Labuza, Theodore P

    2011-01-01

    The brine shrimp lethality assay (BSLA) was used for rapid and non-specific detection of biological and chemical warfare agents at concentrations considerably below that which will cause harm to humans. Warfare agents detected include T-2 toxin, trimethylsilyl cyanide, and commercially available pesticides such as dichlorvos, diazinon, dursban, malathion, and parathion. The assay was performed by introducing 50 μL of milk or orange juice contaminated with each analyte into vials containing 10 freshly hatched brine shrimp nauplii in seawater. This was incubated at 28 °C for 24 h, after which mortality was determined. Mortality was converted to probits and the LC(50) was determined for each analyte by plotting probits of mortality against analyte concentration (log(10)). Our findings were the following: (1) the lethal effects of toxins dissolved in milk were observed, with T-2 toxin being the most lethal and malathion being the least, (2) except for parathion, the dosage (based on LC(50)) of analyte in a cup of milk (200 mL) consumed by a 6-y-old (20 kg) was less than the respective published rat LD(50) values, and (3) the BSLA was only suitable for detecting toxins dissolved in orange juice if incubation time was reduced to 6 h. Our results support the application of the BSLA for routine, rapid, and non-specific prescreening of liquid foods for possible sabotage by an employee or an intentional bioterrorist act. Practical Application: The findings of this study strongly indicate that the brine shrimp lethality assay can be adapted for nonspecific detection of warfare agents or toxins in food at any point during food production and distribution.

  8. The concept of guerrilla warfare in Lithuania in the 1920—1930s

    Directory of Open Access Journals (Sweden)

    Jokubauskas Vytautas

    2012-03-01

    Full Text Available This article analyses the military and tactical training of the members of the Lithuanian Riflemen’s Union for guerrilla warfare in the interwar period. Small nations, such as Lithuania and other Baltic states, being unable to build up military strength in order to ensure national security, were forced to seek for unconventional methods of warfare, including guerrilla strategies. The study places emphasis on the development of the guerrilla war concept in the Union periodicals. The author retraces a change in the intensity of the guerrilla warfare concept propagation amongst Lithuanian population and riflemen, in particular, through publications in the Trimitas — a periodical of the Lithuanian Riflemen’s Union. The author also identifies the narratives associated with the guerrilla matters employed for propaganda purposes in order to create an image of a guerrilla as a defender of the Homeland — Lithuania. Additionally, the structure and numbers of the Union are analysed through a comparison with similar organisations of the other «small nations» of the Baltic North-East. The author addresses the issue of military missions planned by the Lithuanian Army, as well as the way riflemen implemented them. Since the Union did not only offer military training, but was also engaged in the patriotic propaganda, the article focuses on the network of cultural institutions, homes of riflemen, orchestras, libraries, choirs, and athletic clubs used by the Union. The article sets out to establish whether the loss of Lithuanian sovereignty could have been possible without giving rise to a protracted guerrilla war.

  9. Pepsin homologues in bacteria

    Directory of Open Access Journals (Sweden)

    Bateman Alex

    2009-09-01

    Full Text Available Abstract Background Peptidase family A1, to which pepsin belongs, had been assumed to be restricted to eukaryotes. The tertiary structure of pepsin shows two lobes with similar folds and it has been suggested that the gene has arisen from an ancient duplication and fusion event. The only sequence similarity between the lobes is restricted to the motif around the active site aspartate and a hydrophobic-hydrophobic-Gly motif. Together, these contribute to an essential structural feature known as a psi-loop. There is one such psi-loop in each lobe, and so each lobe presents an active Asp. The human immunodeficiency virus peptidase, retropepsin, from peptidase family A2 also has a similar fold but consists of one lobe only and has to dimerize to be active. All known members of family A1 show the bilobed structure, but it is unclear if the ancestor of family A1 was similar to an A2 peptidase, or if the ancestral retropepsin was derived from a half-pepsin gene. The presence of a pepsin homologue in a prokaryote might give insights into the evolution of the pepsin family. Results Homologues of the aspartic peptidase pepsin have been found in the completed genomic sequences from seven species of bacteria. The bacterial homologues, unlike those from eukaryotes, do not possess signal peptides, and would therefore be intracellular acting at neutral pH. The bacterial homologues have Thr218 replaced by Asp, a change which in renin has been shown to confer activity at neutral pH. No pepsin homologues could be detected in any archaean genome. Conclusion The peptidase family A1 is found in some species of bacteria as well as eukaryotes. The bacterial homologues fall into two groups, one from oceanic bacteria and one from plant symbionts. The bacterial homologues are all predicted to be intracellular proteins, unlike the eukaryotic enzymes. The bacterial homologues are bilobed like pepsin, implying that if no horizontal gene transfer has occurred the duplication

  10. U.S. Army Land Warfare Laboratory. Volume 1. Project Report, Appendix A. Documentation

    Science.gov (United States)

    1974-06-01

    10) "EXPLOSIVES DETECTING DOGS", Final Report. Krauss, flax , Bliological Sciences Branch. U. S. Ariqy Land Warfare Laboratory, Aberdeen Proving...Readei .•,al uat ed by Alaska Nau inl i 1 :uli d. IC SI’ID ret onilt dt’d yN, ( ;,Iaid, a l ,., by PISARAi.. ROC he inu, prteparted. I1 lt ninat ion 1...to UISARV. Ret : ansmission >;ystni Evaluation qty 0l 0 sup li,-d to I Ag\\’N and USAkV which rt-comin• l:dt-d I( \\’I I mod i f cat io. Riot Col: rol

  11. Destruction of chemical warfare agent simulants by air and moisture stable metal NHC complexes.

    Science.gov (United States)

    Weetman, Catherine; Notman, Stuart; Arnold, Polly L

    2018-02-20

    The cooperative effect of both NHC and metal centre has been found to destroy chemical warfare agent (CWA) simulants. Choice of both the metal and NHC is key to these transformations as simple, monodentate N-heterocyclic carbenes in combination with silver or vanadium can promote stoichiometric destruction, whilst bidentate, aryloxide-tethered NHC complexes of silver and alkali metals promote breakdown under mild heating. Iron-NHC complexes generated in situ are competent catalysts for the destruction of each of the three targetted CWA simulants.

  12. Total Control: How the Nazis Countered Unconventional Warfare in the Netherlands During World War Two

    Science.gov (United States)

    2017-05-25

    11:mrnn ’ cc11rit) pnlic) :.incc I >t66. l·Dlkm ing the (jcrman ’ ict ori1.:~ ~) f 1939- 19-10. I titler grantccl I limmlcr rrnthority over la" :md...better deterrent in the c;mall " Durch cnmmunity. the Scc11rit) :-1.:n ict ’’i pro’ idcd the names of death candidates 3nu c"<ccu tcd people tu thl...Total Control: I low the Nazis Countered Unconventional Warfare in the Netherlands During World War Two A Monograph by Major Jeroen F van

  13. Unconventional War and Warfare in the Gray Zone. The New Spectrum of Modern Conflicts

    Directory of Open Access Journals (Sweden)

    Miroslaw Banasik

    2016-06-01

    Full Text Available Experiences of the last couple of years indicate that political objectives are increasingly achieved without official declarations of war. Armed forces are used in untraditional ways and the so-called substitute troops begin to play an increasingly bigger part. The article aims to characterize the conflicts of alternative nature below the level of open war that are on the border between war and peace. The content of the article presents the theory of unconventional warfare and its description, and familiarizes the reader with the concept of grey zone conflicts. It further shows the challenges linked to rivalry for influence zones and security provisions.

  14. Battle-Wise: Seeking Time-Information Superiority in Networked Warfare

    Science.gov (United States)

    2006-07-01

    it best about learning from mistakes in life: “There is no wisdom in the second kick of a mule .” Although he did not have 21st-century warfare in...part of our military leadership—can we expect to avoid the “second kick of a mule .” xii BATTLE-WISE PREFACE xiii xiii Preface This book is an inquiry...recruiting meth - ods. Depending on work experience before joining the military, it may be possible actually to identify battle-wise traits in recruits. For

  15. The Cambridge Behavioural Inventory revised.

    Science.gov (United States)

    Wear, Helen J; Wedderburn, Catherine J; Mioshi, Eneida; Williams-Gray, Caroline H; Mason, Sarah L; Barker, Roger A; Hodges, John R

    2008-01-01

    Neurobehavioural and psychiatric symptoms are common in a range of neurodegenerative disorders with distinct profiles which are helpful in the diagnosis and monitoring of these disorders. The Cambridge Behavioural Inventory (CBI) has been shown to distinguish frontotemporal dementia (FTD), Alzheimer's disease (AD), Huntington's disease (HD) and Parkinson's disease (PD), but it is lengthy. To develop a shorter version of the 81 item CBI. CBI data from 450 participants with behavioural variant frontotemporal dementia (bv-FTD) (64), AD (96), PD (215) and HD (75) were analysed using Principal Components Analysis and measures of internal consistency (Cronbach alpha). A reduced 45-item questionnaire was developed. The instrument identified distinct behavioural profiles and performed as well as the original version. A shorter (45 item) version of the CBI is capable of differentiating bv-FTD and AD from PD and HD. It may be useful in delineating the type and extent of problems in these disorders as well as monitoring therapeutic interventions.

  16. Evaluation of process inventory uncertainties

    International Nuclear Information System (INIS)

    Roberts, N.J.

    1980-01-01

    This paper discusses the determination of some of the process inventory uncertainties in the Fast Flux Test Facility (FFTF) process line at the Los Alamos Scientific Laboratory (LASL) Plutonium Processing Facility (TA-55). A brief description of the FFTF process is given, along with a more detailed look at the peroxide precipitation and re-dissolution (PR) process. Emphasis is placed on the identification of the product and sidestreams from the unit processes, as they have application to the accountability measurements. The method of measurement of each of the product and sidestreams and their associated uncertainties are discussed. Some typical data for the PR process are presented, along with a discussion of the data. The data presented are based on our operating experience, and data on file in the TA-55 Nuclear Material Accountability System (PF/LASS/

  17. Bacteria counting method based on polyaniline/bacteria thin film.

    Science.gov (United States)

    Zhihua, Li; Xuetao, Hu; Jiyong, Shi; Xiaobo, Zou; Xiaowei, Huang; Xucheng, Zhou; Tahir, Haroon Elrasheid; Holmes, Mel; Povey, Malcolm

    2016-07-15

    A simple and rapid bacteria counting method based on polyaniline (PANI)/bacteria thin film was proposed. Since the negative effects of immobilized bacteria on the deposition of PANI on glass carbon electrode (GCE), PANI/bacteria thin films containing decreased amount of PANI would be obtained when increasing the bacteria concentration. The prepared PANI/bacteria film was characterized with cyclic voltammetry (CV) technique to provide quantitative index for the determination of the bacteria count, and electrochemical impedance spectroscopy (EIS) was also performed to further investigate the difference in the PANI/bacteria films. Good linear relationship of the peak currents of the CVs and the log total count of bacteria (Bacillus subtilis) could be established using the equation Y=-30.413X+272.560 (R(2)=0.982) over the range of 5.3×10(4) to 5.3×10(8)CFUmL(-1), which also showed acceptable stability, reproducibility and switchable ability. The proposed method was feasible for simple and rapid counting of bacteria. Copyright © 2016 Elsevier B.V. All rights reserved.

  18. THEORY OF SPARE PARTS INVENTORY MANAGEMENT FOR PRODUCTION EQUIPMENT

    OpenAIRE

    KATARZYNA GRONDYS

    2013-01-01

    This article presents theoretical basis of spare parts inventory management in manufacturing company. Basis definitions, allocation and differences in spare parts inventory management were compared with other manufacturing inventories. The issue of spare parts inventory management is emphasized in aspect of maintaining continuity of production and generated costs of maintaining inventory.

  19. Inventory processes for HANDI 2000 business management system

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, D.

    1998-08-24

    Inventory records are maintained in the following inventory systems: HIP, (Spare Parts), WIM, (General Supplies): Convenient Storage, Shop Stock, Essential Materials, Special Tools, ESP (Excess Inventory). Requisitions for replenishment of inventory items are initiated in the respective inventory system and then forwarded to the purchasing system.

  20. 26 CFR 1.1013-1 - Property included in inventory.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 11 2010-04-01 2010-04-01 true Property included in inventory. 1.1013-1 Section... inventory. The basis of property required to be included in inventory is the last inventory value of such property in the hands of the taxpayer. The requirements with respect to the valuation of an inventory are...

  1. 10 CFR 300.6 - Emissions inventories.

    Science.gov (United States)

    2010-01-01

    ... reporting entity (although a reporting entity often makes these types of adjustments when calculating... without also reporting an inventory of the total emissions, but such entities should inventory and report... with the entity's initial entity statement. (2) After starting to report, each reporting entity that...

  2. 43 CFR 10.9 - Inventories.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Inventories. 10.9 Section 10.9 Public... Museums and Federal Collections § 10.9 Inventories. (a) General. This section carries out section 5 of the Act. Under section 5 of the Act, each museum or Federal agency that has possession or control over...

  3. A Validation of the Emotional Intelligence Inventory.

    Science.gov (United States)

    Tapia, Martha; Marsh, George E., II

    This study examined the concurrent validity of the Emotional Intelligence Inventory (M. Tapia, 2001) and the Emotional Intelligence Scale (N. Schutte and others, 1998). The responses to the inventories of 234 college students, 84 males and 250 females, were analyzed. Correlations between the total score on the two scales were significant.…

  4. B Plant exhaust filter inventory analysis

    International Nuclear Information System (INIS)

    Lan, J.S.; Wootan, D.W.; Carter, L.L.; Bunch, W.L.; Covey, L.I.; Greenborg, J.

    1994-10-01

    This paper describes a method for determining radionuclide inventories in filters using measurements of radiation fields that determine photon dose rates and photon-plus-electron dose rates between filter banks. The mathematical approach quantifies the curie inventories of filter banks by using the measured dose rates and the calculated Green's functions involving detector responses per unit source

  5. Clean Lead Facility Inventory System user's manual

    International Nuclear Information System (INIS)

    Garcia, J.F.

    1994-12-01

    The purpose of this user's manual is to provide instruction and guidance needed to enter and maintain inventory information for the Clean Lead Facility (CLF), PER-612. Individuals responsible for maintaining and using the system should study and understand the information provided. The user's manual describes how to properly use and maintain the CLF Inventory System. Annual, quarterly, monthly, and current inventory reports may be printed from the Inventory System for reporting purposes. Profile reports of each shipment of lead may also be printed for verification and documentation of lead transactions. The CLF Inventory System was designed on Microsoft Access version 2.0. Similar inventory systems are in use at the Idaho National Engineering Laboratory (INEL) to facilitate site-wide compilations of mixed waste data. The CLF Inventory System was designed for inventorying the clean or non-radioactive contaminated lead stored at the CLF. This data, along with the mixed waste data, will be compiled into the Idaho Mixed Waste Information (IMWI) system for reporting to the Department of Energy Idaho Office, Department of Energy Headquarters, and/or the State of Idaho

  6. Texas, 2008 forest inventory and analysis factsheet

    Science.gov (United States)

    James Bentley

    2011-01-01

    This science update summarizes the findings of the first statewide annual inventory conducted by the Southern Forest Inventory and Analysis (FIA) Program in cooperation with the Texas Forest Service of the forest resource attributes in Texas. The 254 counties of Texas are consolidated into seven FIA survey units—southeast (unit 1), the northeast (unit 2), the north...

  7. Texas, 2010 forest inventory and analysis factsheet

    Science.gov (United States)

    James W. Bentley

    2012-01-01

    This science update summarizes the findings of the statewide annual inventory conducted by the Southern Forest Inventory and Analysis (FIA) Program in cooperation with the Texas Forest Service of the forest resource attributes in Texas. The 254 counties of Texas are consolidated into seven FIA survey units – southeast (unit 1), northeast (unit 2), north central (unit 3...

  8. Relativity Concept Inventory: Development, Analysis, and Results

    Science.gov (United States)

    Aslanides, J. S.; Savage, C. M.

    2013-01-01

    We report on a concept inventory for special relativity: the development process, data analysis methods, and results from an introductory relativity class. The Relativity Concept Inventory tests understanding of relativistic concepts. An unusual feature is confidence testing for each question. This can provide additional information; for example,…

  9. 27 CFR 24.266 - Inventory losses.

    Science.gov (United States)

    2010-04-01

    ... period, in which case the percentage will be calculated on the aggregate volume. Wine removed immediately... OF THE TREASURY LIQUORS WINE Losses of Wine § 24.266 Inventory losses. (a) General. The proprietor shall take a physical inventory of all untaxpaid wine on-hand on bonded wine premises as of the close of...

  10. 27 CFR 24.313 - Inventory record.

    Science.gov (United States)

    2010-04-01

    ... designate as a white, rose or red table or dessert wine; or (2) Wine intended to be marketed with a vintage... OF THE TREASURY LIQUORS WINE Records and Reports § 24.313 Inventory record. A proprietor who files monthly or quarterly reports shall prepare a record of the physical inventory of all wine and spirits in...

  11. A two-commodity perishable inventory system

    African Journals Online (AJOL)

    (1993) considered an inventory management system at a service facility using one item of inventory for each service. They assumed that both the demand and service time are deterministic and that queues may occur only during stock-outs. They determined the optimal order quantity that minimizes the total cost rate.

  12. Lost-sales inventory theory : A review

    NARCIS (Netherlands)

    Bijvank, Marco; Vis, Iris F. A.

    2011-01-01

    In classic inventory models it is common to assume that excess demand is backordered. However, studies analyzing customer behavior in practice show that most unfulfilled demand is lost or an alternative item/location is looked for in many retail environments. Inventory systems that include this

  13. Inventory management systems : Control and information issues

    NARCIS (Netherlands)

    Janssen, F.B.S.L.P.

    1998-01-01

    This dissertation addresses the management of inventory systems. The thesis starts with an exposition on mathematical models that can be used in inventory theory. Then we deal with some information issues related to the demand process. Namely, how to control products that have intermittent demand.

  14. Inventory Management Practices and Business Performance for ...

    African Journals Online (AJOL)

    Inventory constitutes much of the working capital held by SSEs and poor working capital management has been identified as one of the major causes of SSE failures. With this backdrop, this study investigated the relationship between inventory management practices and the business performance of SSEs in Kisii ...

  15. Construct Validation of the Physics Metacognition Inventory

    Science.gov (United States)

    Taasoobshirazi, Gita; Farley, John

    2013-01-01

    The 24-item Physics Metacognition Inventory was developed to measure physics students' metacognition for problem solving. Items were classified into eight subcomponents subsumed under two broader components: knowledge of cognition and regulation of cognition. The students' scores on the inventory were found to be reliable and related to students'…

  16. Assessment of Caregiver Inventory for Rett Syndrome

    Science.gov (United States)

    Lane, Jane B.; Salter, Amber R.; Jones, Nancy E.; Cutter, Gary; Horrigan, Joseph; Skinner, Steve A.; Kaufmann, Walter E.; Glaze, Daniel G.; Neul, Jeffrey L.; Percy, Alan K.

    2017-01-01

    Rett syndrome (RTT) requires total caregiver attention and leads to potential difficulties throughout life. The Caregiver Burden Inventory, designed for Alzheimer disease, was modified to a RTT Caregiver Inventory Assessment (RTT CIA). Reliability and face, construct, and concurrent validity were assessed in caregivers of individuals with RTT. Chi…

  17. Improving the Greenlandic Greenhouse Gas Inventory

    DEFF Research Database (Denmark)

    Nielsen, Ole-Kenneth; Baunbæk, Lene; Gyldenkærne, Steen

    The project to improve the Greenlandic greenhouse gas (GHG) inventory was undertaken due to the recommendations made by the UNFCCC review team in connection with the 2008 and 2009 submissions by the Kingdom of Denmark. The improvements made to the Greenlandic GHG emission inventory were substantial...

  18. Activity based costing model for inventory valuation

    Directory of Open Access Journals (Sweden)

    Vineet Chouhan

    2017-03-01

    Full Text Available Activity-Based-Model (ABC is used for the purpose of significant improvement for overhead accounting systems by providing the best information required for managerial decision. This pa-per discusses implacability of ABC technique on inventory valuation as a management account-ing innovation. In order to prove the applicability of ABC for inventory control a material driven medium-sized and privately owned company from engineering (iron and steel industry is select-ed and by analysis of its production process and its material dependency and use of indirect in-ventory, an ABC model is explored for better inventory control. The case revealed that the ne-cessity of ABC in the area of inventory control is significant. The company is not only able to increase its quality of decision but also it can significantly analyze its cost of direct material cost, valuation of direct material and use its implications for better decision making.

  19. SISTEM INVENTORI BARANG DENGAN TEKNOLOGI AJAX

    Directory of Open Access Journals (Sweden)

    Anna Fitriya

    2015-11-01

    Full Text Available ABSTRAK Sistem inventori barang pada pertokoan telah banyak dikembangkan untuk meningkatkan efektivitas dan efisiensi. Pada Toko Karya Indah, kegiatan yang berkaitan dengan inventori barang masih dilakukan secara manual sehingga pihak toko kesulitan untuk mengetahui data barang yang masih tersedia, habis, atau hampir habis. Selain itu, proses yang dilakukan membutuhkan waktu yang relatif lama. Oleh karena itu, diperlukan sistem inventori barang. Sistem dibangun dengan bahasa pemrograman PHP dan database MySQL. Sistem disertai teknologi AJAX (Asynchronous JavaScript And XML, khususnya AJAX autocomplete dan AJAX validasi. Hasil yang diperoleh adalah pengolahan data pada sistem inventori barang dengan menggunakan AJAX dapat dilakukan dengan lebih cepat dari pada tanpa AJAX. Kata kunci: sistem inventori, AJAX.

  20. Optimal Control Inventory Stochastic With Production Deteriorating

    Science.gov (United States)

    Affandi, Pardi

    2018-01-01

    In this paper, we are using optimal control approach to determine the optimal rate in production. Most of the inventory production models deal with a single item. First build the mathematical models inventory stochastic, in this model we also assume that the items are in the same store. The mathematical model of the problem inventory can be deterministic and stochastic models. In this research will be discussed how to model the stochastic as well as how to solve the inventory model using optimal control techniques. The main tool in the study problems for the necessary optimality conditions in the form of the Pontryagin maximum principle involves the Hamilton function. So we can have the optimal production rate in a production inventory system where items are subject deterioration.

  1. Inventory Data Package for Hanford Assessments

    Energy Technology Data Exchange (ETDEWEB)

    Kincaid, Charles T.; Eslinger, Paul W.; Aaberg, Rosanne L.; Miley, Terri B.; Nelson, Iral C.; Strenge, Dennis L.; Evans, John C.

    2006-06-01

    This document presents the basis for a compilation of inventory for radioactive contaminants of interest by year for all potentially impactive waste sites on the Hanford Site for which inventory data exist in records or could be reasonably estimated. This document also includes discussions of the historical, current, and reasonably foreseeable (1944 to 2070) future radioactive waste and waste sites; the inventories of radionuclides that may have a potential for environmental impacts; a description of the method(s) for estimating inventories where records are inadequate; a description of the screening method(s) used to select those sites and contaminants that might make a substantial contribution to impacts; a listing of the remedial actions and their completion dates for waste sites; and tables showing the best estimate inventories available for Hanford assessments.

  2. Inventory transparency for agricultural produce through IOT

    Science.gov (United States)

    Srinivasan, S. P.; Sorna Shanthi, D.; Anand, Aashish V.

    2017-06-01

    Re-structuring the practices of traditional inventory management is becoming more essential to optimize the supply chain transparency and accuracy of agricultural produce. A flexible and transparent inventory management system is becoming the need of any agricultural commodity. It was noticed that the major setback for the farmers who are the suppliers of the farm produce is due to poor supply chain integration. The recent advent technologies and IT explosion can bring up a greater impact in the process of storing, tracking, distributing and monitoring perishable agriculture produce of day to day life. The primary focus of this paper is to integrate IoT into inventory management and other inbound logistics management of agriculture produce. The unique features of agricultural produce like a prediction of supply, demand, the location of warehouses, distribution and tracking of inventory can be integrated through IoT. This paper proposes a conceptual framework for inventory management transparency involved in the supply chain of agriculture produce.

  3. Next Generation Non-particulate Dry Nonwoven Pad for Chemical Warfare Agent Decontamination

    Energy Technology Data Exchange (ETDEWEB)

    Ramkumar, S S; Love, A; Sata, U R; Koester, C J; Smith, W J; Keating, G A; Hobbs, L; Cox, S B; Lagna, W M; Kendall, R J

    2008-05-01

    New, non-particulate decontamination materials promise to reduce both military and civilian casualties by enabling individuals to decontaminate themselves and their equipment within minutes of exposure to chemical warfare agents or other toxic materials. One of the most promising new materials has been developed using a needlepunching nonwoven process to construct a novel and non-particulate composite fabric of multiple layers, including an inner layer of activated carbon fabric, which is well-suited for the decontamination of both personnel and equipment. This paper describes the development of a composite nonwoven pad and compares efficacy test results for this pad with results from testing other decontamination systems. The efficacy of the dry nonwoven fabric pad was demonstrated specifically for decontamination of the chemical warfare blister agent bis(2-chloroethyl)sulfide (H or sulfur mustard). GC/MS results indicate that the composite fabric was capable of significantly reducing the vapor hazard from mustard liquid absorbed into the nonwoven dry fabric pad. The mustard adsorption efficiency of the nonwoven pad was significantly higher than particulate activated carbon (p=0.041) and was similar to the currently fielded US military M291 kit (p=0.952). The nonwoven pad has several advantages over other materials, especially its non-particulate, yet flexible, construction. This composite fabric was also shown to be chemically compatible with potential toxic and hazardous liquids, which span a range of hydrophilic and hydrophobic chemicals, including a concentrated acid, an organic solvent and a mild oxidant, bleach.

  4. Information warfare as ICT influence on public consciousness and public opinion

    Directory of Open Access Journals (Sweden)

    A. H. Stadnyk

    2015-12-01

    Full Text Available The article defines the key aspects of the merits and impact of information warfare on public consciousness and public opinion. In the article, we review the information war not as an auxiliary mechanism for real war, but as a mechanism of affecting the public opinion. The public opinion can not be formed completely (while there is information content, public opinion changes constantly because the information in the hands of the media acts as a real weapon aimed at the mass consciousness. The article discusses in detail the four main factors that determine the effectiveness of the impact of information: 1 information warfare agents that affect the population, mass consciousness, public opinion; 2 information weapon of war; 3 the content itself, the content that is broadcast during the information war; 4 the specifics of mass awareness in different countries, the formation and functioning of their public opinion. And how much information war characteristic of the crisis (as an example to Ukraine since the beginning of the Maidan in 2013, the presentation of information aimed at manipulating public consciousness and, accordingly, the public opinion as the outward expression of consciousness.

  5. An Empirical Examination of the Warfare Metaphor with Respect to Pre-Service Elementary Teachers

    Science.gov (United States)

    Cobern, William W.; Loving, Cathleen C.; Davis, Edward B.; Terpstra, Jeff

    2013-08-01

    Since its origination in the late nineteenth century, the warfare metaphor has been used to characterize the relationship between science and religion, especially orthodox Christianity. Though thoroughly discredited by historians of science, the ideological descendants of Thomas Huxley, who spoke of science in quasi-religious terms, have kept the warfare metaphor alive. On the other hand, there are substantial numbers of Christians who at least appear to oppose science given their high-profile opposition to the general theory of evolution. The research reported in this paper asked, "Does anti-science sentiment increase with increasing orthodox Christian belief?" Two validated, published instruments were used: The Thinking about Science Survey Instrument and the Christian Fundamentalist Belief Scale. The subjects for the study were 545 preservice elementary teachers. The analysis did not show that anti-science sentiment increases with increasing Christian belief. Subjects with strong Christian beliefs were found to be just as supportive of science, if not more so, than subjects with no Christian beliefs. The study concludes with a caution against projecting attitudes toward science "on the whole" based on attitudes specifically toward evolution when working with preservice elementary teachers. Such a projection could well be counterproductive. The study has implications for other modern countries having highly religious populations such as Turkey.

  6. Investigating the Relationship Between Drone Warfare and Civilian Casualties in Gaza

    Directory of Open Access Journals (Sweden)

    Dr. Ann Rogers

    2014-12-01

    Full Text Available Unmanned aerial vehicles (UAVs, better known as drones, are increasingly touted as ‘humanitarian’ weapons that contribute positively to fighting just wars and saving innocent lives. At the same time, civilian casualties have become the most visible and criticized aspect of drone warfare. It is argued here that drones contribute to civilian casualties not in spite of, but because of, their unique attributes. They greatly extend war across time and space, pulling more potential threats and targets into play over long periods, and because they are low-risk and highly accurate, they are more likely to be used. The assumption that drones save lives obscures a new turn in strategic thinking that sees states such as Israel and the US rely on large numbers of small, highly discriminating attacks applied over time to achieve their objectives. This examination of Israel’s 2014 war in Gaza argues that civilian casualties are not an unexpected or unintended consequence of drone warfare, but an entirely predictable outcome.

  7. Zirconium doped nano-dispersed oxides of Fe, Al and Zn for destruction of warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Stengl, Vaclav, E-mail: stengl@uach.cz [Institute of Inorganic Chemistry AS CR v.v.i., 250 68 Rez (Czech Republic); Houskova, Vendula; Bakardjieva, Snejana; Murafa, Nataliya; Marikova, Monika [Institute of Inorganic Chemistry AS CR v.v.i., 250 68 Rez (Czech Republic); Oplustil, Frantisek; Nemec, Tomas [Military Technical Institute of Protection Brno, Veslarska 230, 628 00 Brno (Czech Republic)

    2010-11-15

    Zirconium doped nano dispersive oxides of Fe, Al and Zn were prepared by a homogeneous hydrolysis of the respective sulfate salts with urea in aqueous solutions. Synthesized metal oxide hydroxides were characterized using Brunauer-Emmett-Teller (BET) surface area and Barrett-Joiner-Halenda porosity (BJH), X-ray diffraction (XRD), infrared spectroscopy (IR), scanning electron microscopy (SEM) and energy-dispersive X-ray microanalysis (EDX). These oxides were taken for an experimental evaluation of their reactivity with sulfur mustard (HD or bis(2-chloroethyl)sulfide), soman (GD or (3,3'-Dimethylbutan-2-yl)-methylphosphonofluoridate) and VX agent (S-[2-(diisopropylamino)ethyl]-O-ethyl-methylphosphonothionate). The presence of Zr{sup 4+} dopant can increase both the surface area and the surface hydroxylation of the resulting doped oxides, decreases their crystallites' sizes thereby it may contribute in enabling the substrate adsorption at the oxide surface thus it can accelerate the rate of degradation of warfare agents. Addition of Zr{sup 4+} converts the product of the reaction of ferric sulphate with urea from ferrihydrite to goethite. We found out that doped oxo-hydroxides Zr-FeO(OH) - being prepared by a homogeneous hydrolysis of ferric and zirconium oxo-sulfates mixture in aqueous solutions - exhibit a comparatively higher degradation activity towards chemical warfare agents (CWAs). Degradation of soman or VX agent on Zr-doped FeO(OH) containing ca. 8.3 wt.% of zirconium proceeded to completion within 30 min.

  8. Zirconium doped nano-dispersed oxides of Fe, Al and Zn for destruction of warfare agents

    International Nuclear Information System (INIS)

    Stengl, Vaclav; Houskova, Vendula; Bakardjieva, Snejana; Murafa, Nataliya; Marikova, Monika; Oplustil, Frantisek; Nemec, Tomas

    2010-01-01

    Zirconium doped nano dispersive oxides of Fe, Al and Zn were prepared by a homogeneous hydrolysis of the respective sulfate salts with urea in aqueous solutions. Synthesized metal oxide hydroxides were characterized using Brunauer-Emmett-Teller (BET) surface area and Barrett-Joiner-Halenda porosity (BJH), X-ray diffraction (XRD), infrared spectroscopy (IR), scanning electron microscopy (SEM) and energy-dispersive X-ray microanalysis (EDX). These oxides were taken for an experimental evaluation of their reactivity with sulfur mustard (HD or bis(2-chloroethyl)sulfide), soman (GD or (3,3'-Dimethylbutan-2-yl)-methylphosphonofluoridate) and VX agent (S-[2-(diisopropylamino)ethyl]-O-ethyl-methylphosphonothionate). The presence of Zr 4+ dopant can increase both the surface area and the surface hydroxylation of the resulting doped oxides, decreases their crystallites' sizes thereby it may contribute in enabling the substrate adsorption at the oxide surface thus it can accelerate the rate of degradation of warfare agents. Addition of Zr 4+ converts the product of the reaction of ferric sulphate with urea from ferrihydrite to goethite. We found out that doped oxo-hydroxides Zr-FeO(OH) - being prepared by a homogeneous hydrolysis of ferric and zirconium oxo-sulfates mixture in aqueous solutions - exhibit a comparatively higher degradation activity towards chemical warfare agents (CWAs). Degradation of soman or VX agent on Zr-doped FeO(OH) containing ca. 8.3 wt.% of zirconium proceeded to completion within 30 min.

  9. The possible role of intravenous lipid emulsion in the treatment of chemical warfare agent poisoning

    Directory of Open Access Journals (Sweden)

    Arik Eisenkraft

    Full Text Available Organophosphates (OPs are cholinesterase inhibitors that lead to a characteristic toxidrome of hypersecretion, miosis, dyspnea, respiratory insufficiency, convulsions and, without proper and early antidotal treatment, death. Most of these compounds are highly lipophilic. Sulfur mustard is a toxic lipophilic alkylating agent, exerting its damage through alkylation of cellular macromolecules (e.g., DNA, proteins and intense activation of pro-inflammatory pathways. Currently approved antidotes against OPs include the peripheral anticholinergic drug atropine and an oxime that reactivates the inhibited cholinesterase. Benzodiazepines are used to stop organophosphate-induced seizures. Despite these approved drugs, efforts have been made to introduce other medical countermeasures in order to attenuate both the short-term and long-term clinical effects following exposure. Currently, there is no antidote against sulfur mustard poisoning. Intravenous lipid emulsions are used as a source of calories in parenteral nutrition. In recent years, efficacy of lipid emulsions has been shown in the treatment of poisoning by fat-soluble compounds in animal models as well as clinically in humans. In this review we discuss the usefulness of intravenous lipid emulsions as an adjunct to the in-hospital treatment of chemical warfare agent poisoning. Keywords: Intravenous lipid emulsion, Organophosphates, Sulfur mustard, Antidotes, Poisoning, Chemical Warfare agents

  10. Bioarchaeological investigation of ancient Maya violence and warfare in inland Northwest Yucatan, Mexico.

    Science.gov (United States)

    Serafin, Stanley; Lope, Carlos Peraza; Uc González, Eunice

    2014-05-01

    This study investigates evidence of changes and continuities in ancient Maya violence and warfare in inland northwest Yucatan, Mexico from the Middle Preclassic (600-300 BC) to the Postclassic (AD 1050-1542) through bioarchaeological analysis of cranial and projectile trauma. It is hypothesized that the frequency of violence increases before the Classic Maya collapse and remains high during the Postclassic period. It is also hypothesized that the flat, open terrain was conducive to warfare and resulted in higher trauma frequencies than in other parts of the Maya area. Results show that the frequency of cranial trauma decreases before the Classic collapse and increases in the Postclassic, partially matching the expected chronological trends. The frequency of cranial trauma does not differ significantly from other Maya regions but the pattern does: for all periods, males have more healed injuries than females and they are concentrated on the left side of the anterior of the skull. Some injuries appear to be from small points hafted in wooden clubs. In addition, projectile trauma is evident in a scapula with an embedded arrowhead tip, the first such case reported in a Maya skeleton. Overall, these results suggest greater reliance on open combat and less on raids in this region compared with other parts of the Maya area, possibly due to the flat, open terrain, though the identification of perimortem trauma in both women and men indicates surprise raids on settlements were also practiced. Copyright © 2014 Wiley Periodicals, Inc.

  11. Academic Training Lectures | Stuxnet and Cyber-Warfare | 13-14 January 2016

    CERN Multimedia

    2015-01-01

    Please note that the next series of Academic Training Lectures will take place on 13 and 14 January 2016. The lectures will be given by Gian Piero Siroli (Università e INFN, Bologna (IT))   Stuxnet and Cyber-Warfare (1/2)​ on Wednesday, 13 January from 11 a.m. to 12 p.m. http://indico.cern.ch/event/438525/ Stuxnet and Cyber-Warfare (2/2) on Thursday, 14 January from 11 a.m. to 12 p.m. http://indico.cern.ch/event/438526/ at CERN, Council Chamber (503-1-001)  Description: The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran&...

  12. Beneficial bacteria inhibit cachexia

    Science.gov (United States)

    Varian, Bernard J.; Goureshetti, Sravya; Poutahidis, Theofilos; Lakritz, Jessica R.; Levkovich, Tatiana; Kwok, Caitlin; Teliousis, Konstantinos; Ibrahim, Yassin M.; Mirabal, Sheyla; Erdman, Susan E.

    2016-01-01

    Muscle wasting, known as cachexia, is a debilitating condition associated with chronic inflammation such as during cancer. Beneficial microbes have been shown to optimize systemic inflammatory tone during good health; however, interactions between microbes and host immunity in the context of cachexia are incompletely understood. Here we use mouse models to test roles for bacteria in muscle wasting syndromes. We find that feeding of a human commensal microbe, Lactobacillus reuteri, to mice is sufficient to lower systemic indices of inflammation and inhibit cachexia. Further, the microbial muscle-building phenomenon extends to normal aging as wild type animals exhibited increased growth hormone levels and up-regulation of transcription factor Forkhead Box N1 [FoxN1] associated with thymus gland retention and longevity. Interestingly, mice with a defective FoxN1 gene (athymic nude) fail to inhibit sarcopenia after L. reuteri therapy, indicating a FoxN1-mediated mechanism. In conclusion, symbiotic bacteria may serve to stimulate FoxN1 and thymic functions that regulate inflammation, offering possible alternatives for cachexia prevention and novel insights into roles for microbiota in mammalian ontogeny and phylogeny. PMID:26933816

  13. Chemical communication in bacteria

    Science.gov (United States)

    Suravajhala, Srinivasa Sandeep; Saini, Deepak; Nott, Prabhu

    Luminescence in Vibrio fischeri is a model for quorum-sensing-gene-regulation in bacteria. We study luminescence response of V. fischeri to both internal and external cues at the single cell and population level. Experiments with ES114, a wild-type strain, and ainS mutant show that luminescence induction in cultures is not always proportional to cell-density and there is always a basal level of luminescence. At any given concentration of the exogenously added signals, C6-HSL and C8-HSL, luminescence per cell reaches a maximum during the exponential phase and decreases thereafter. We hypothesize that (1) C6-HSL production and LuxR activity are not proportional to cell-density, and (2) there is a shift in equilibrium from C6-HSL to C8-HSL during the later stages of growth of the culture. RT-PCR analysis of luxI and luxR shows that the expression of these genes is maximum corresponding to the highest level of luminescence. The shift in equilibrium is shown by studying competitive binding of C6-HSL and C8-HSL to LuxR. We argue that luminescence is a unicellular behaviour, and an intensive property like per cell luminescence is more important than gross luminescence of the population in understanding response of bacteria to chemical signalling. Funding from the Department of Science and Technology, India is acknowledged.

  14. Joint inventory control and pricing in a service-inventory system

    DEFF Research Database (Denmark)

    Marand, Ata Jalili; Li, Hongyan Jenny; Thorstenson, Anders

    2017-01-01

    This study addresses joint inventory control and pricing decisions for a service-inventory system. In such a system both an on-hand inventory item and a positive service time are required to fulfill customer demands. The service-inventory system also captures main features of the classical....... The aim of this study is to formulate the problem and solve it to optimality. We make three main contributions: (1) We integrate inventory control and pricing in the service-inventory system. The problem is formulated and analyzed as a fractional programming problem, and structural properties are explored...... for the model. (2) Two solution algorithms are proposed. The first one provides optimal solutions, while the second one is more efficient. (3) The impact of the integrated inventory control and pricing decisions on the overall system performance is investigated. We compare the solutions of the models both...

  15. Reevaluation of 1999 Health-Based Environmental Screening Levels (HBESLs) for Chemical Warfare Agents

    Energy Technology Data Exchange (ETDEWEB)

    Watson, Annetta Paule [ORNL; Dolislager, Fredrick G [ORNL

    2007-05-01

    This report evaluates whether new information and updated scientific models require that changes be made to previously published health-based environmental soil screening levels (HBESLs) and associated environmental fate/breakdown information for chemical warfare agents (USACHPPM 1999). Specifically, the present evaluation describes and compares changes that have been made since 1999 to U.S. Environmental Protection Agency (EPA) risk assessment models, EPA exposure assumptions, as well as to specific chemical warfare agent parameters (e.g., toxicity values). Comparison was made between screening value estimates recalculated with current assumptions and earlier health-based environmental screening levels presented in 1999. The chemical warfare agents evaluated include the G-series and VX nerve agents and the vesicants sulfur mustard (agent HD) and Lewisite (agent L). In addition, key degradation products of these agents were also evaluated. Study findings indicate that the combined effect of updates and/or changes to EPA risk models, EPA default exposure parameters, and certain chemical warfare agent toxicity criteria does not result in significant alteration to the USACHPPM (1999) health-based environmental screening level estimates for the G-series and VX nerve agents or the vesicant agents HD and L. Given that EPA's final position on separate Tier 1 screening levels for indoor and outdoor worker screening assessments has not yet been released as of May 2007, the study authors find that the 1999 screening level estimates (see Table ES.1) are still appropriate and protective for screening residential as well as nonresidential sites. As such, risk management decisions made on the basis of USACHPPM (1999) recommendations do not require reconsideration. While the 1999 HBESL values are appropriate for continued use as general screening criteria, the updated '2007' estimates (presented below) that follow the new EPA protocols currently under development

  16. 76 FR 10522 - Naval Surface Warfare Center, Upper Machodoc Creek and the Potomac River, Dahlgren, VA; Danger Zone

    Science.gov (United States)

    2011-02-25

    ... Warfare Center, Dahlgren's patrol boats. Oystering and fishing boats or other craft may cross the river in... bombing, directed energy technology, and manned or unmanned water craft operations; expand the Middle... manned or unmanned watercraft. (ii) When hazardous operations are in progress, no person, or fishing or...

  17. Modern sample preparation techniques for gas chromatography-mass spectrometry analysis of environmental markers of chemical warfare agents use

    NARCIS (Netherlands)

    Terzic, O.; de Voogt, P.; Banoub, J.

    2014-01-01

    The chapter introduces problematics of on-site chemical analysis in the investigations of past chemical warfare agents (CWA) events. An overview of primary environmental degradation pathways of CWA leading to formation of chemical markers of their use is given. Conventional and modern sample

  18. Warfare tourism experiences and national identity: The case of Airborne Museum ‘Hartenstein’ in Oosterbeek, the Netherlands

    NARCIS (Netherlands)

    Gieling, Johannes

    2016-01-01

    This paper examines through an analysis of Dutch warfare tourism whether there is a relationship between the subjective perceived salience of Dutch identity and heritage tourists' motives, emotions and overall satisfaction. Using a social identity theory framework, this study provides a view of

  19. Warfare has changed - so should have methods: Ammunition and weapon performance induced operational risk and safety issues

    NARCIS (Netherlands)

    Verhagen, T.L.A.; Voorde, M.J. van de

    2010-01-01

    Warfare has changed. Out-of-area operations have increased the awareness that we are unfamiliar with the performance of the current conventional medium and large calibre ammunitions in day-to-day practice. Current ammunition is primarily developed and procured to defeat the traditional ‘steel’

  20. Rapid Analysis of Chemical Warfare Agents and Their Hydrolysis Products by Desorption Electrospray Ionization Mass Spectrometry (DESI-MS)

    Science.gov (United States)

    2009-10-01

    72, 77-79], polymers [80], alkaloids on plant tissue [81], chemical warfare agents on solid phase microextraction (SPME) fibers [60, 82], hydrolysis...situ detection of alkaloids in plant tissue under ambient conditions using desorption electrospray ionization. Analyst, 130, 1624-1633. [82

  1. 48 CFR 645.608 - Screening of contractor inventory.

    Science.gov (United States)

    2010-10-01

    ... inventory. 645.608 Section 645.608 Federal Acquisition Regulations System DEPARTMENT OF STATE CONTRACT MANAGEMENT GOVERNMENT PROPERTY Reporting, Redistribution, and Disposal of Contractor Inventory 645.608 Screening of contractor inventory. ...

  2. Cable Bacteria in Freshwater Sediments

    DEFF Research Database (Denmark)

    Risgaard-Petersen, Nils; Kristiansen, Michael; Frederiksen, Rasmus

    2015-01-01

    In marine sediments cathodic oxygen reduction at the sediment surface can be coupled to anodic sulfide oxidation in deeper anoxic layers through electrical currents mediated by filamentous, multicellular bacteria of the Desulfobulbaceae family, the so-called cable bacteria. Until now, cable...... bacteria have only been reported from marine environments. In this study, we demonstrate that cable bacteria also occur in freshwater sediments. In a first step, homogenized sediment collected from the freshwater stream Giber Å, Denmark, was incubated in the laboratory. After 2 weeks, pH signatures...... marine cable bacteria, with the genus Desulfobulbus as the closest cultured lineage. The results of the present study indicate that electric currents mediated by cable bacteria could be important for the biogeochemistry in many more environments than anticipated thus far and suggest a common evolutionary...

  3. Immunomodulatory properties of probiotic bacteria

    DEFF Research Database (Denmark)

    Fink, Lisbeth Nielsen

    2007-01-01

    Certain lactic acid bacteria (LAB) are part of the commensal intestinal flora and considered beneficial for health, as they compete with pathogens for adhesion sites in the intestine and ferment otherwise indigestible compounds. Another important property of these so-called probiotic bacteria...... with bacteria, and the cytokine pattern induced by specific bacteria resembled the pattern induced in MoDC, except for TNF-alpha and IL-6, which were induced in response to different bacteria in blood DC/monocytes and monocyte-derived DC. Autologous NK cells produced IFN-gamma when cultured with blood DC......, monocytes and monocyte-derived DC and IL-12-inducing bacteria, whereas only DC induced IFN-gamma production in allogeneic T cells. In vitro-generated DC is a commonly used model of tissue DC, but they differ in certain aspects from intestinal DC, which are in direct contact with the intestinal microbiota...

  4. Phenotypic switching in bacteria

    Science.gov (United States)

    Merrin, Jack

    Living matter is a non-equilibrium system in which many components work in parallel to perpetuate themselves through a fluctuating environment. Physiological states or functionalities revealed by a particular environment are called phenotypes. Transitions between phenotypes may occur either spontaneously or via interaction with the environment. Even in the same environment, genetically identical bacteria can exhibit different phenotypes of a continuous or discrete nature. In this thesis, we pursued three lines of investigation into discrete phenotypic heterogeneity in bacterial populations: the quantitative characterization of the so-called bacterial persistence, a theoretical model of phenotypic switching based on those measurements, and the design of artificial genetic networks which implement this model. Persistence is the phenotype of a subpopulation of bacteria with a reduced sensitivity to antibiotics. We developed a microfluidic apparatus, which allowed us to monitor the growth rates of individual cells while applying repeated cycles of antibiotic treatments. We were able to identify distinct phenotypes (normal and persistent) and characterize the stochastic transitions between them. We also found that phenotypic heterogeneity was present prior to any environmental cue such as antibiotic exposure. Motivated by the experiments with persisters, we formulated a theoretical model describing the dynamic behavior of several discrete phenotypes in a periodically varying environment. This theoretical framework allowed us to quantitatively predict the fitness of dynamic populations and to compare survival strategies according to environmental time-symmetries. These calculations suggested that persistence is a strategy used by bacterial populations to adapt to fluctuating environments. Knowledge of the phenotypic transition rates for persistence may provide statistical information about the typical environments of bacteria. We also describe a design of artificial

  5. Concepts for inventory verification in critical facilities

    International Nuclear Information System (INIS)

    Cobb, D.D.; Sapir, J.L.; Kern, E.A.; Dietz, R.J.

    1978-12-01

    Materials measurement and inventory verification concepts for safeguarding large critical facilities are presented. Inspection strategies and methods for applying international safeguards to such facilities are proposed. The conceptual approach to routine inventory verification includes frequent visits to the facility by one inspector, and the use of seals and nondestructive assay (NDA) measurements to verify the portion of the inventory maintained in vault storage. Periodic verification of the reactor inventory is accomplished by sampling and NDA measurement of in-core fuel elements combined with measurements of integral reactivity and related reactor parameters that are sensitive to the total fissile inventory. A combination of statistical sampling and NDA verification with measurements of reactor parameters is more effective than either technique used by itself. Special procedures for assessment and verification for abnormal safeguards conditions are also considered. When the inspection strategies and inventory verification methods are combined with strict containment and surveillance methods, they provide a high degree of assurance that any clandestine attempt to divert a significant quantity of fissile material from a critical facility inventory will be detected. Field testing of specific hardware systems and procedures to determine their sensitivity, reliability, and operational acceptability is recommended. 50 figures, 21 tables

  6. Interdependence between Inventory Management and Employees’ Satisfaction

    Directory of Open Access Journals (Sweden)

    Dubravko Tomašić

    2013-06-01

    Full Text Available The study determines the correlation between the application of advanced models and methods of inventory optimisation in the supply chain in relation to the satisfaction of employees who are responsible for managing the inventory optimisation processes. The previous studies confirm that the optimisation of inventory management in the supply chain insures competitive advantages on the market. There is space for further research of impact of the achieved inventory optimisation in the supply chain on the change of the employees’ satisfaction. The paper establishes the interrelation of the interdependence of the achieved inventory optimisations on the satisfaction of the employees and the related synergy effects of acquiring added value of the companies on the market oriented to the satisfaction of the buyers and service users. The research has defined new knowledge in interdependence of inventory management optimisation on the change of indicators of employees’ satisfaction. Based on the performed research an assumption has been created for the design of an application package (so-called XaaS-based services for the management of interaction processes of inventory optimization in the supply chain, satisfaction of service users and employees.

  7. Inventory in a Brazilian Sample

    Directory of Open Access Journals (Sweden)

    Taciano L. Milfont

    2008-01-01

    Full Text Available Éste artículo evalúa la validez de constructo y la validez discriminante del Inventario de Perspectiva Temporal de Zimbardo (Zimbardo Time Perspective Inventory, ZTPI de una muestra de 247 estudiantes brasileños. La estructura de cinco-factores de ZTPI, definidos por Pasado-Negativo, Presente-Hedonístico, Futuro, Pasado- Positivo y Presente-Fatalista, provee un ajuste aceptable de los datos, y pareció ser mejor estadísticamente que el ajuste de los modelos alternativos. El Presente-Hedonístico fue positivamente correlacionado con el consumo de alcohol y negativamente con la religiosidad, el Futuro fue correlacionado positivamente con la preocupación por la salud y negativamente con el consumo de alcohol, y el Pasado-Positivo fue positivamente correlacionado con el uso del reloj. Los resultados encontrados concuerdan con los estudios anteriores, indicando que las cinco dimensiones de perspectiva del tiempo pueden ser identificadas cognitivamente. Además los patrones de correlación con otras variables son comparables a través de otras culturas.

  8. Inventory of state energy models

    Energy Technology Data Exchange (ETDEWEB)

    Melcher, A.G.; Gist, R.L.; Underwood, R.G.; Weber, J.C.

    1980-03-31

    These models address a variety of purposes, such as supply or demand of energy or of certain types of energy, emergency management of energy, conservation in end uses of energy, and economic factors. Fifty-one models are briefly described as to: purpose; energy system; applications;status; validation; outputs by sector, energy type, economic and physical units, geographic area, and time frame; structure and modeling techniques; submodels; working assumptions; inputs; data sources; related models; costs; references; and contacts. Discussions in the report include: project purposes and methods of research, state energy modeling in general, model types and terminology, and Federal legislation to which state modeling is relevant. Also, a state-by-state listing of modeling efforts is provided and other model inventories are identified. The report includes a brief encylopedia of terms used in energy models. It is assumed that many readers of the report will not be experienced in the technical aspects of modeling. The project was accomplished by telephone conversations and document review by a team from the Colorado School of Mines Research Institute and the faculty of the Colorado School of Mines. A Technical Committee (listed in the report) provided advice during the course of the project.

  9. National Coal Quality Inventory (NACQI)

    Energy Technology Data Exchange (ETDEWEB)

    Robert Finkelman

    2005-09-30

    The U.S. Geological Survey (USGS) conducted the National Coal Quality Inventory (NaCQI) between 1999 and 2005 to address a need for quality information on coals that will be mined during the next 20-30 years. Collaboration between the USGS, State geological surveys, universities, coal burning utilities, and the coal mining industry plus funding support from the Electric Power Research Institute (EPRI) and the U.S. Department of Energy (DOE) permitted collection and submittal of coal samples for analysis. The chemical data (proximate and ultimate analyses; major, minor and trace element concentrations) for 729 samples of raw or prepared coal, coal associated shale, and coal combustion products (fly ash, hopper ash, bottom ash and gypsum) from nine coal producing States are included. In addition, the project identified a new coal reference analytical standard, to be designated CWE-1 (West Elk Mine, Gunnison County, Colorado) that is a high-volatile-B or high-volatile-A bituminous coal with low contents of ash yield and sulfur, and very low, but detectable contents of chlorine, mercury and other trace elements.

  10. Danish emission inventory for agriculture. Inventories 1985 - 2009

    Energy Technology Data Exchange (ETDEWEB)

    Hjorth Mikkelsen, M.; Albrektsen, R.; Gyldenkaerne, S.

    2011-02-15

    By regulations given in international conventions Denmark is obliged to work out an annual emission inventory and document the methodology. The National Environmental Research Institute (NERI) at Aarhus University (AU) in Denmark is responsible for calculating and reporting the emissions. This report contains a description of the emissions from the agricultural sector from 1985 to 2009. Furthermore, the report includes a detailed description of methods and data used to calculate the emissions, which is based on national methodologies as well as international guidelines. For the Danish emissions calculations and data management an Integrated Database model for Agricultural emissions (IDA) is used. The emission from the agricultural sector includes emission of the greenhouse gases methane (CH{sub 4}), nitrous oxide (N{sub 2}O), ammonia (NH{sub 3}), particulate matter (PM), non-methane volatile organic compounds (NMVOC) and other pollutants related to the field burning of agricultural residue such as NO{sub x}, CO{sub 2}, CO, SO{sub 2}, heavy metals, dioxin and PAH. The ammonia emission from 1985 to 2009 has decreased from 119 300 tonnes of NH{sub 3} to 73 800 tonnes NH{sub 3}, corresponding to a 38 % reduction. The emission of greenhouse gases has decreased by 25 % from 12.9 M tonnes CO{sub 2} equivalents to 9.6 M tonnes CO{sub 2} equivalents from 1985 to 2009. Improvements in feed efficiency and utilisation of nitrogen in livestock manure are the most important reasons for the reduction of both the ammonia and greenhouse gas emissions. (Author)

  11. [Chitinolytic activity of bacteria].

    Science.gov (United States)

    Saks, Elzbieta; Jankiewicz, Urszula

    2010-01-01

    Chitinolytic bacteria play an important role in degradation of chitin, one of the most abundant biopolymers in nature. These microorganisms synthesize specific enzymes, that catalyze hydrolysis of beta-1,4-glycosidic bonds in low-digestible chitin polymers, turning it into low-molecular, easy to digest compounds. During last decades many bacterial chitinolytic enzymes have been studied and characterized, mainly for their potential applications in agriculture, industry and medicine. Several chitinase classifications have been proposed, either on the base of substrate specificity or amino acid sequence similarities. X-ray crystallography and NMR spectroscopy techniques enabled the determination of three dimensional structure of some chitinases, what was helpful in explaining their catalytic mechanism. Development of biotechnology and molecular biology enables a deep research in regulation and cloning of bacterial chitinase genes.

  12. Bacteria, phages and septicemia.

    Directory of Open Access Journals (Sweden)

    Ausra Gaidelyte

    Full Text Available The use of phages is an attractive option to battle antibiotic resistant bacteria in certain bacterial infections, but the role of phage ecology in bacterial infections is obscure. Here we surveyed the phage ecology in septicemia, the most severe type of bacterial infection. We observed that the majority of the bacterial isolates from septicemia patients spontaneously secreted phages active against other isolates of the same bacterial strain, but not to the strain causing the disease. Such phages were also detected in the initial blood cultures, indicating that phages are circulating in the blood at the onset of sepsis. The fact that most of the septicemic bacterial isolates carry functional prophages suggests an active role of phages in bacterial infections. Apparently, prophages present in sepsis-causing bacterial clones play a role in clonal selection during bacterial invasion.

  13. Acoustofluidic bacteria separation

    International Nuclear Information System (INIS)

    Li, Sixing; Huang, Tony Jun; Ma, Fen; Zeng, Xiangqun; Bachman, Hunter; Cameron, Craig E

    2017-01-01

    Bacterial separation from human blood samples can help with the identification of pathogenic bacteria for sepsis diagnosis. In this work, we report an acoustofluidic device for label-free bacterial separation from human blood samples. In particular, we exploit the acoustic radiation force generated from a tilted-angle standing surface acoustic wave (taSSAW) field to separate Escherichia coli from human blood cells based on their size difference. Flow cytometry analysis of the E. coli separated from red blood cells shows a purity of more than 96%. Moreover, the label-free electrochemical detection of the separated E. coli displays reduced non-specific signals due to the removal of blood cells. Our acoustofluidic bacterial separation platform has advantages such as label-free separation, high biocompatibility, flexibility, low cost, miniaturization, automation, and ease of in-line integration. The platform can be incorporated with an on-chip sensor to realize a point-of-care sepsis diagnostic device. (paper)

  14. Acoustofluidic bacteria separation

    Science.gov (United States)

    Li, Sixing; Ma, Fen; Bachman, Hunter; Cameron, Craig E.; Zeng, Xiangqun; Huang, Tony Jun

    2017-01-01

    Bacterial separation from human blood samples can help with the identification of pathogenic bacteria for sepsis diagnosis. In this work, we report an acoustofluidic device for label-free bacterial separation from human blood samples. In particular, we exploit the acoustic radiation force generated from a tilted-angle standing surface acoustic wave (taSSAW) field to separate Escherichia coli from human blood cells based on their size difference. Flow cytometry analysis of the E. coli separated from red blood cells shows a purity of more than 96%. Moreover, the label-free electrochemical detection of the separated E. coli displays reduced non-specific signals due to the removal of blood cells. Our acoustofluidic bacterial separation platform has advantages such as label-free separation, high biocompatibility, flexibility, low cost, miniaturization, automation, and ease of in-line integration. The platform can be incorporated with an on-chip sensor to realize a point-of-care sepsis diagnostic device.

  15. Strategic Inventory Positioning of Navy Depot Level Repairable

    National Research Council Canada - National Science Library

    Burton, Larry

    2005-01-01

    ... the benefits in modifying their current inventory positioning policy for repairable items. NAVICP wishes to incorporate a strategic inventory positioning policy that reduces transportation costs...

  16. Accounting concept of inventories in postindustrial economy

    Directory of Open Access Journals (Sweden)

    Pravdyuk N.L.

    2017-06-01

    Full Text Available The accounting of inventories has undergone significant changes over a relatively short period of time. It has changed the scientific picture of their definition and classification, measurement and write-offs reflected in the financial statements. However, these changes happen without proper interpretation and system analysis. And, at least in general terms the inventories are conducted in Ukraine according to IFRS; this causes some obstacles to the objective reflection of working capital of enterprises, and the transparency of disclosure and is not conducive to the formation of a proper investment climate. It is established that the information provision inventory control must meet the requirements of the postindustrial economy by the complicating and deepening the complexity of accounting, the introduction of new forms and their synthesis with the current one, a gradual reorganization to ensure the needs of consumers and enterprise evaluation. The results of the study have substantiated the fundamentals of accounting concepts in the postindustrial economy in the part of the circulating capital, which forms inventories. The information support of inventory management should be implemented in a hierarchical way, when it first and foremost analyzes the working capital, and further deals with inventories and stocks as its subordinate components. The author considers the material goods to be a broader concept than reserves, because they have a dual nature both estimated as the share of negotiable assets, and as the physical component of material costs. The paper gives the definition of this category of symbiosis, which is based on P(CBU 9. The general structure of the current inventories are of significant importance, which has differences in industries, the dominant of which is agriculture, industry, construction, trade, material production. The postindustrial economy caused the questions of differentiation of concepts "production" and "material

  17. The nuclide inventory in SFR-1

    International Nuclear Information System (INIS)

    Ingemansson, Tor

    2001-10-01

    This report is an account for a project carried out on behalf of the Swedish Radiation Protection Authority (SSI): 'Nuclide inventory in SFR-1' (The Swedish underground disposal facility for low and intermediate level reactor waste). The project comprises the following five sub-projects: 1) Measuring methods for nuclides, difficult to measure, 2) The nuclide inventory in SFR-1, 3) Proposal for nuclide library for SFR-1 and ground disposal, 4) Nuclide library for exemption, and 5) Characterising of the nuclide inventory and documentation for SFL waste. In all five sub-projects long-lived activity, including Cl-36, has been considered

  18. Trace Detection of Organophosphorus Chemical Warfare Agents in Wastewater and Plants by Luminescent UIO-67(Hf) and Evaluating the Bioaccumulation of Organophosphorus Chemical Warfare Agents.

    Science.gov (United States)

    Lian, Xiao; Yan, Bing

    2018-04-17

    Organophosphorus chemical warfare agents (OPCWAs) are a group of organic pollutants characterized by high toxicity and chemical stability, and they are very difficult to be degraded. The trace quality of OPCWAs in water and food will cause great harm to the human body. Therefore, the detection of OPCWAs is a difficult challenge, which has become the research hotspot over the world. In this work, a Hf-based luminescent metal-organic framework (Eu@1) is prepared, and the reactivity of Hf 12 results in a methanephosphonic acid (MPA)-induced luminescence quenching and the charge transfer from MPA to Hf(IV) and generated exciplexes which are responsible for this quenching effect. The excellent performance of Eu@1 in the detection of MPA, with its finer selectivity, high sensitivity (LOD = 0.4 ppm), and large linear range (10 -7 to 10 -3 M), is encouraging for application in wastewater detection. Importantly, MPA is a pollutant that can be absorbed by plants and causes the bioaccumulation effect, and thus, the detection of MPA in real plant samples is a purposeful topic. Eu@1 also achieved satisfactory results in actual plant sample testing, and the bioaccumulation of MPA in onions, turnips, and cabbages is determined via our sensor. This fabricated detector provides a feasible path for the detection of ppm-level OPCWAs in a complex environment, which will help humans to avoid OPCWA-contaminated foods.

  19. Austrian emission inventory for dust

    International Nuclear Information System (INIS)

    Winiwarter, W.; Trenker, C.; Hoeflinger, W.

    2001-09-01

    For the first time, Austrian emissions of anthropogenic particulate matter emissions to the atmosphere have been estimated. Results have been reported as total suspended particles (TSP) as well as for the fractions of particles smaller than 10 μm or 2.5 μm aerodynamic diameter (PM 10 , PM 2.5 ), respectively. Base years for the inventory were 1990, 1995 and 1999. Excluded from this assessment is wind blown dust, which has been considered a natural source here. National statistics have been applied, specifically those also used previously in the Austrian air pollution inventory (OLI). Emission factors have been taken from literature compilations, only for exceptional cases specific Austrian assessments were performed or original literature on emission measurements was consulted. Resuspension of dust by road traffic emerged as the most important source. For the size fraction of PM 10 this source contributed about half of the emissions, when applying the calculation scheme by the U.S. EPA. While this scheme is widely used and well documented, its validity is currently subject of intense scientific debate. As these results do not seem to coincide with ambient air measurements, resuspension of road dust is considered separately and not now included in the national total. The sum of all other sources increases from 75,000 t of TSP in 1990 and 1995 to 77,000 t in 1999, while both PM 10 and PM 2.5 exhibit decreasing tendency (at 45,000 t and 26,000 t in 1999, respectively). The increase in TSP derives from increasing traffic and friction related emissions (tire wear, break wear), decrease of the finer particulate matter is due to reductions in firewood consumption for domestic heating. Most important source sectors are fugitive emissions from material transfer in industry as well as the building industry and the tilling of agricultural land. Common to these sources is the high uncertainty of available data. Wood combustion is the most important of the non

  20. Industrial processes inventory. Sector 2

    International Nuclear Information System (INIS)

    1994-01-01

    The work objective is to conduct a greenhouse gas emission inventory of the industrial processes in Lebanon for the year 1994. The Lebanese industry has emitted 1924.063 Gg (1.924.063 tons) of Carbon dioxide CO 2 ; 0.0003 Gg (0.3 tons) of carbon monoxide CO; 0.01112 Gg of nitrogen oxide NO; 273.888 tons of non-methane volatile organic compounds and 3.382 Gg (3.382 tons) of sulphur dioxide SO 2 . The cement industry is the major source of CO 2 emissions among the industrial processes in Lebanon. The cement industry is responsible for 76.1% of the total emissions followed by the iron and steel industry which produces 21.68% of the total CO 2 emissions from industrial processes. The NMVOC emissions are mainly produced by the use of asphalt for road paving (98.5% of total emissions by industry) followed by the food and beverage industry (1.2%). The emissions of sulphur dioxide SO 2 come from three industrial sources: the first come from the production of sulphuric acid (69.9% of total industrial emissions), the second from the cement industry (26.4% of total industrial emissions) and the third from the iron and steel mills (3.7% of total industrial emissions). Figures are presented to show the percentage distribution of various industrial sources contributions to CO 2 , NMVOC and SO 2 emissions in Lebanon. Carbon monoxide CO emissions in the industrial sector are very small. The major source is iron and steel mills and the minor source is asphalt-roofing production