WorldWideScience

Sample records for bacteria warfare inventory

  1. Bacteriocin as Weapons in the Marine Animal-Associated Bacteria Warfare: Inventory and Potential Applications as an Aquaculture Probiotic

    Directory of Open Access Journals (Sweden)

    Florie Desriac

    2010-04-01

    Full Text Available As the association of marine animals with bacteria has become more commonly recognized, researchers have increasingly questioned whether these animals actually produce many of the bioactive compounds originally isolated from them. Bacteriocins, ribosomally synthesized antibiotic peptides, constitute one of the most potent weapons to fight against pathogen infections. Indeed, bacteriocinogenic bacteria may prevent pathogen dissemination by occupying the same ecological niche. Bacteriocinogenic strains associated with marine animals are a relevant source for isolation of probiotics. This review draws up an inventory of the marine bacteriocinogenic strains isolated from animal-associated microbial communities, known to date. Bacteriocin-like inhibitory substances (BLIS and fully-characterized bacteriocins are described. Finally, their applications as probiotics in aquaculture are discussed.

  2. Governing Warfare

    DEFF Research Database (Denmark)

    Harste, Gorm

      It would seem as though warfare has gotten out of control, not only in Iraq and Afghanistan, but also in Central Africa. The paper outlines the strategic history of politically controlled warfare since the early Enlightenment. The argument is that control is implausible. The idea of control has...... the risks of lacking unity and displays the organisational trap to the fatal political myth of controlled warfare: Does it come from the military organisation system itself, from political ideologies of goal-rational governance, or from the chameleonic logic of wars?  ...... administration. While organisation systems continue to make some kind of political control possible, this is not the case in relation to wars. The organisation system is the in-between that should mediatise politics and war but is not functionally equivalent to just and unjust wars. The paper investigates...

  3. Roman Warfare

    Directory of Open Access Journals (Sweden)

    D.B. Saddington

    2012-03-01

    Full Text Available

    ROTH, Jonathan P 2009. Roman Warfare. Cambridge: Cambridge University Press. Pbk. R250. ISBN 978-0-521-53726-1.

    Jonathan Roth of San Jose State University, known as an expert on military logistics, has written this attractive Cambridge Introduction to Roman Civilization volume on Roman Warfare. The series is designed for students with no prior knowledge of Roman antiquity. The book comprises an Introduction on Sources and Methods (pp. 1-6 and 15 chapters on Roman warfare from the beginnings to the fall of the Western Empire in AD 476, using a chronological approach. There are 68 illustrations and maps, a Timeline, a Glossary, a Glossary of People, a Bibliography (which includes several websites and an Index.

  4. Chemical warfare: Leaf-cutting ants defend themselves and their gardens against parasite attack by deploying antibiotic secreting bacteria.

    Science.gov (United States)

    Samuels, Richard Ian; Mattoso, Thalles Cardoso; Moreira, Denise D O

    2013-03-01

    Leaf-cutting ants are well known for their highly complex social organization, which provides them with a strong defense against parasites invading their colonies. Besides this attribute, these insects have morphological, physiological and structural characteristics further reinforcing the defense of their colonies. With the discovery of symbiotic bacteria present on the integument of leaf-cutting ants, a new line of defense was proposed and considered to be specific for the control of a specialized fungal parasite of the ants' fungus gardens (Escovopsis). However, recent studies have questioned the specificity of the integumental bacteria, as they were also found to inhibit a range of fungi, including entomopathogens. The microbiota associated with the leaf-cutting ant gardens has also been proposed as another level of chemical defense, protecting the garden from parasite invasion. Here we review the chemical defense weaponry deployed by leaf-cutting ants against parasites of their fungus gardens and of the ants themselves.

  5. Fungi and bacteria inventory on soybean (Glycine max (L.) merill) planting media applied by local microorganisms

    Science.gov (United States)

    Akhsan, Ni'matuljannah; Vionita

    2017-02-01

    An experiment aimed to determine the effect of application of several types of local microorganisms (MOL) and the number of doses to the development of fungi and bacteria on soybean planting media, have been conducted in Samarinda for 3 (three) months. Factorial experiment arranged in a completely randomized design and repeated three times, was used in this experiment. The first factor was the type of MOL consisted of cow dung (m1), snails (m2), banana peel (m3) and bamboo roots (m4), and the second factor was the dose MOL zero mL (d0), 100 mL (d1), 200 mL (d2), 300 mL (d3), 400 mL (d4) analyzed with Anova and Least Significance Difference (LSD) at 5%. Fungi and bacteria contained in the local microorganisms (cow dung, snails, banana peel and bamboo root) are: fungus Aspergillus sp, Penicillium sp., Trichoderma sp., cellulotic and lignolitic bacteria. An increase in the type and amount of fungus is happened for some genus. The dominant bacteria in the planting medium is a gram-negative bacteria. Cow dung seemed the best source at the dosages level of 400 ml.

  6. Biological warfare agents.

    Science.gov (United States)

    Pohanka, Miroslav; Kuca, Kamil

    2010-01-01

    Biological warfare agents are a group of pathogens and toxins of biological origin that can be potentially misused for military or criminal purposes. The present review attempts to summarize necessary knowledge about biological warfare agents. The historical aspects, examples of applications of these agents such as anthrax letters, biological weapons impact, a summary of biological warfare agents and epidemiology of infections are described. The last section tries to estimate future trends in research on biological warfare agents.

  7. Flying Electronic Warfare Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides NP-3D aircraft host platforms for Effectiveness of Navy Electronic Warfare Systems (ENEWS) Program antiship missile (ASM) seeker simulators used...

  8. Rethinking Defensive Information Warfare

    Science.gov (United States)

    2004-06-01

    electronic warfare, and special information operations. Defensive information operations ensure timely, accurate, and relevant information access...information and information systems. IA, physical security, OPSEC, counter-deception, counter-psyops, CI, EW, and special information operations. Ensure

  9. Defining cyber warfare

    Directory of Open Access Journals (Sweden)

    Dragan D. Mladenović

    2012-04-01

    Full Text Available Cyber conflicts represent a new kind of warfare that is technologically developing very rapidly. Such development results in more frequent and more intensive cyber attacks undertaken by states against adversary targets, with a wide range of diverse operations, from information operations to physical destruction of targets. Nevertheless, cyber warfare is waged through the application of the same means, techniques and methods as those used in cyber criminal, terrorism and intelligence activities. Moreover, it has a very specific nature that enables states to covertly initiate attacks against their adversaries. The starting point in defining doctrines, procedures and standards in the area of cyber warfare is determining its true nature. In this paper, a contribution to this effort was made through the analysis of the existing state doctrines and international practice in the area of cyber warfare towards the determination of its nationally acceptable definition.

  10. Biological warfare agents

    Directory of Open Access Journals (Sweden)

    Duraipandian Thavaselvam

    2010-01-01

    Full Text Available The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies.

  11. Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    Dev Vrat Kamboj

    2006-10-01

    Full Text Available There is a long historic record of use of biological warfare (BW agents by warring countriesagainst their enemies. However, the frequency of their use has increased since the beginningof the twentieth century. World war I witnessed the use of anthrax agent against human beingsand animals by Germans, followed by large-scale field trials by Japanese against war prisonersand Chinese population during world war II. Ironically, research and development in biologicalwarfare agents increased tremendously after the Geneva Protocol, signed in 1925, because ofits drawbacks which were overcome by Biological and Toxin Weapons Convention (BTWC in1972. Biological warfare programme took back seat after the 1972 convention but biologicalagents regained their importance after the bioterrorist attacks of anthrax powder in 2001. In thelight of these attacks, many of which turned out to be hoax, general awareness is required aboutbiological warfare agents that can be used against them. This review has been written highlightingimportant biological warfare agents, diseases caused by them, possible therapies and otherprotection measures.

  12. The Physics of Warfare

    Science.gov (United States)

    Giordano, Gerardo

    2015-01-01

    Recently, I was tasked with the creation and execution of a new themed general education physics class called The Physics of Warfare. In the past, I had used the theme of a class, such as the physics of sports medicine, as a way to create homework and in-class activities, generate discussions, and provide an application to demonstrate that physics…

  13. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  14. Truth about the Consequence of Bacteriological Warfare of Disseminating Plague Bacteria%散布鼠疫菌(PX)细菌战“战果”之真相

    Institute of Scientific and Technical Information of China (English)

    莇昭三[日](著); 韩慧光(译)

    2015-01-01

    日本军在中国实施细菌战的事实,随着中日学者的研究逐渐被揭示,在研究中所用材料大部分都是加害者(当事人)和受害者的口述史,缺乏日本军当时实施细菌战后对被害地的全面详细的疫学调查。731部队细菌战研究人员金子顺一论文《鼠疫效果略算法》,揭示了1940年农安、新京鼠疫流行事件是731部队实施的细菌战的事实。《陆军军医学校防疫研究报告第2部》中的高桥正彦论文中关于农安、新京鼠疫流行事件的论文,是731部队细菌战后对被害地进行的疫学调查。达格威文件Q报告中的部分数据来自“农安细菌战”受害者的病理解剖,其中不仅有中国人,也有日本人。%Facts about bacteriological warfare conducted by Japanese Army in China have been gradually re-vealed by related Chinese and Japanese researchers. However, the majority of materials used in the research are oral history orally accounted by offenders and victims, hence the lack of epidemic prevention surveys on the inflicted areas of bacteriological warfare by Japanese army. The thesis paper by Jun-Ichi Kaneko (bacterial warfare researcher of U-nit 731) namedBubonicPlagueAlgorithmunveiled the fact that plague epidemics which struck Nong’an and Changchun were caused by the Unit 731’s bacteriological warfare. Takahashi’s thesis paper inArmyMedicalCol-legeEpidemicPreventionResearchReport(VolumeⅡ)on plague epidemics that hit Nong’an and Changchun is in connection with the epidemic prevention surveys on the inflicted areas of bacteriological warfare carried out by the U-nit 731. Some data of the Report of“Q”from Dugway Proving Ground Documents came from pathological anatomy of victims of Nong’an bacteriological warfare, some of whom were Chinese and Japanese.

  15. Biological warfare, bioterrorism, and biocrime.

    Science.gov (United States)

    Jansen, H J; Breeveld, F J; Stijnis, C; Grobusch, M P

    2014-06-01

    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria or other agents used to cause illness or death in people, but also in animals or plants. It is aimed at creating casualties, terror, societal disruption, or economic loss, inspired by ideological, religious or political beliefs. The success of bioterroristic attempts is defined by the measure of societal disruption and panic, and not necessarily by the sheer number of casualties. Thus, making only a few individuals ill by the use of crude methods may be sufficient, as long as it creates the impact that is aimed for. The assessment of bioterrorism threats and motives have been described before. Biocrime implies the use of a biological agent to kill or make ill a single individual or small group of individuals, motivated by revenge or the desire for monetary gain by extortion, rather than by political, ideological, religious or other beliefs. The likelihood of a successful bioterrorist attack is not very large, given the technical difficulties and constraints. However, even if the number of casualties is likely to be limited, the impact of a bioterrorist attack can still be high. Measures aimed at enhancing diagnostic and therapeutic capabilities and capacities alongside training and education will improve the ability of society to combat 'regular' infectious diseases outbreaks, as well as mitigating the effects of bioterrorist attacks.

  16. Establishing Cyber Warfare Doctrine

    Directory of Open Access Journals (Sweden)

    Andrew M. Colarik

    2012-01-01

    Full Text Available Over the past several decades, advances in technology have transformed communications and the ability to acquire, disseminate, and utilize information in a range of environments. Modern societies and their respective militaries have taken advantage of a robust information space through network-centric systems. Because military and commercial operations have increasingly converged, communication and information infrastructures are now high-priority military objectives in times of war. This article examines the theoretical underpinning of current cyber warfare research, what we have learned so far about its application, and some of the emerging themes to be considered; it also postulates the development of a (national cyber warfare doctrine (CWD. An endeavor of this scale requires lots of considerations and preparation for its development if it is to be cooperatively embraced. This article considers why information technology systems and their supporting infrastructures should be considered legitimate military targets in conflicts, and offers several events that support this supposition. In addition, it identifies the various forms of doctrine that will become the basis for developing a CWD, discusses a CWD's possible components, and proposes a national collaborative and discussion framework for obtaining a nation's stakeholder buy-in for such an endeavor.

  17. Airpower Support to Unconventional Warfare

    Science.gov (United States)

    2009-12-11

    supplies to isolated mountain outposts (Trest 2000, 109). The Helio Couriers operated out of small dirt strips, referred to as lima sites, usually... rosa : The O.S.S. and American espionage. New York: Reynal and Hitchcock. AF Special Operations Command white paper. 2007. USAF irregular warfare...Symposium on the role of airpower in counterinsurgency and unconventional warfare: A brief summary of viewpoints. Santa Monica, CA: The RAND

  18. [Decontamination of chemical and biological warfare agents].

    Science.gov (United States)

    Seto, Yasuo

    2009-01-01

    Chemical and biological warfare agents (CBWA's) are diverse in nature; volatile acute low-molecular-weight toxic compounds, chemical warfare agents (CWA's, gaseous choking and blood agents, volatile nerve gases and blister agents, nonvolatile vomit agents and lacrymators), biological toxins (nonvolatile low-molecular-weight toxins, proteinous toxins) and microbes (bacteria, viruses, rickettsiae). In the consequence management against chemical and biological terrorism, speedy decontamination of victims, facilities and equipment is required for the minimization of the damage. In the present situation, washing victims and contaminated materials with large volumes of water is the basic way, and additionally hypochlorite salt solution is used for decomposition of CWA's. However, it still remains unsolved how to dispose large volumes of waste water, and the decontamination reagents have serious limitation of high toxicity, despoiling nature against the environments, long finishing time and non-durability in effective decontamination. Namely, the existing decontamination system is not effective, nonspecifically affecting the surrounding non-target materials. Therefore, it is the urgent matter to build up the usable decontamination system surpassing the present technologies. The symposiast presents the on-going joint project of research and development of the novel decontamination system against CBWA's, in the purpose of realizing nontoxic, fast, specific, effective and economical terrorism on-site decontamination. The projects consists of (1) establishment of the decontamination evaluation methods and verification of the existing technologies and adaptation of bacterial organophosphorus hydrolase, (2) development of adsorptive elimination technologies using molecular recognition tools, and (4) development of deactivation technologies using photocatalysis.

  19. ISIL's Hybrid Warfare in Syria & Iraq

    DEFF Research Database (Denmark)

    Sørensen, Heine

    2016-01-01

    The case study specifically seeks to answer the following problem statement: Does ISIL qualify as an actor using hybrid warfare and if so what characterizes their particular use of this type of warfare? Based on an analysis of ISIL’s warfare from August 2012 to August 2016 the chapter argues, tha...

  20. Evolutionary Models of Irregular Warfare

    Science.gov (United States)

    2013-03-01

    G. (2010) Decentralize, adapt and cooperate. Nature 465:292-293. Sagarin, R. (2012) Learning From the Octopus : How Secrets from Nature Can Help Us...because the concepts map on to important features of modern irregular warfare. For example, small-scale behaviors are increasingly thought to

  1. The Anatomy of Counterinsurgency Warfare

    DEFF Research Database (Denmark)

    Ringsmose, Jens; Pedersen, Kenneth

    Since the beginning of the new millennium, the West has been increasingly involved in a tiresome and rather particular type of conflict: insurgency warfare. The bloody and shocking terrorist attacks on New York and Washington in September 2001 marked the beginning of a new era, and the introducti...

  2. Inventory Management

    Science.gov (United States)

    1983-01-01

    Known as MRO for Maintenance, Repair and Operating supplies, Tropicana Products, Inc.'s automated inventory management system is an adaptation of the Shuttle Inventory Management System (SIMS) developed by NASA to assure adequate supply of every item used in support of the Space Shuttle. The Tropicana version monitors inventory control, purchasing receiving and departmental costs for eight major areas of the company's operation.

  3. MEANS AND METHODS OF CYBER WARFARE

    Directory of Open Access Journals (Sweden)

    Dan-Iulian VOITAȘEC

    2016-06-01

    Full Text Available According to the Declaration of Saint Petersburg of 1868 “the only legitimate object which States should endeavor to accomplish during war is to weaken the military forces of the enemy”. Thus, International Humanitarian Law prohibits or limits the use of certain means and methods of warfare. The rapid development of technology has led to the emergence of a new dimension of warfare. The cyber aspect of armed conflict has led to the development of new means and methods of warfare. The purpose of this paper is to study how the norms of international humanitarian law apply to the means and methods of cyber warfare.

  4. Cyber warfare building the scientific foundation

    CERN Document Server

    Jajodia, Sushil; Subrahmanian, VS; Swarup, Vipin; Wang, Cliff

    2015-01-01

    This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially gove

  5. Electronic warfare target location methods

    CERN Document Server

    Poisel, Richard

    2012-01-01

    Describing the mathematical development underlying current and classical methods of geolocating electronic systems that are emitting, this newly revised and greatly expanded edition of a classic Artech House book offers practical guidance in electronic warfare target location. The Second Edition features a wealth of additional material including new chapters on time delay estimation, direction finding techniques, and the MUSIC algorithm. This practical resource provides you with critical design information on geolocation algorithms, and establishes the fundamentals of existing algorithms as a

  6. Rethinking Cultural Influences on Warfare

    Science.gov (United States)

    2012-05-17

    education system. Within military education, culture is approached as a dimension of warfare that must be operationalized at all levels of war by...capabilities and habits acquired by man as a member of society.”37 Geert Hofstede , a social psychologist, defines culture as “the collective programming...Putnam and Sons, 1920), 1. 38 Geert Hofstede , Communication Between Cultures eds. L.A. Samovar and R.E. Porter. (Belmont: Wadsworth, 1984), 51. 13

  7. Irregular Warfare: A Selected Bibliography

    Science.gov (United States)

    2009-11-01

    Airman’s Assessment of FM 3-24 and the Case for Developing Truly Joint COIN Doctrine. Maxwell Air Force Base: U.S. Air University, 2007. 111pp. (UG635.33...handle.dtic.mil/100.2/ADA494289 Pinnell , Daniel A. The Tenets of Airpower in an Insurgent Environment. Strategy Research Project. Carlisle...Non-Kinetic Capabilities for Irregular Warfare: Four Case Studies. Alexandria: Institute for Defense Analyses, Joint Advanced Warfighting Program

  8. Undersea Warfare Academic Group Home Page

    OpenAIRE

    1997-01-01

    Collected from the Internet Archive "Wayback machine". The Undersea Warfare Curriculum educates officers in the engineering fundamentals, physical principles and analytical concepts that govern operational employment of undersea warfare (USW) sensors and weapons systems. Program is interdisciplinary and integrates; mathematics, physics, acoustics, electrical engineering, oceanography, operations analysis, human factors, computer science and meteorology.

  9. Airship Renaissance: Considerations for Operational Warfare

    Science.gov (United States)

    2010-05-03

    FINAL 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE Airship Renaissance : Considerations for Operational Warfare 5a. CONTRACT...Airship Renaissance : Considerations for Operational Warfare by Daniel W. Smith III Major, United States Air Force A paper submitted...resources needed now on the battlefield…to get more intelligence, surveillance, and reconnaissance assets into the theatre .” 5 Recognizing budget

  10. The Art of Aerial Warfare

    Science.gov (United States)

    2005-03-01

    the  Strait  of  Gibraltar   from  North  Africa  during  the Spanish Civil War. 11 FAIRCHILD PAPER A Comparison of Aerial Warfare to Land... Hitler , for example, the United States cannot assume that Nazi aggression would have  evaporated  instantly. Although  Hitler himself profoundly affected

  11. WARFARE IN THE INFORMATION AGE

    Directory of Open Access Journals (Sweden)

    Laurian GHERMAN

    2010-01-01

    Full Text Available The paper is focused on changes occurred in military organizations in Information Age. During Industrial Age the military structure of forces evolved according with principles of decomposition, specialization, hierarchy, optimization, deconfliction, centralized planning, and decentralized execution. But now the solutions based upon Industrial Age assumptions and practices will break down and fail in the Information Age. This will happen no matter how well intentioned, hardworking, or dedicated the leadership and the force are. Two key force capabilities needed by Information Age militaries are interoperability and agility. Both interoperability and agility are provided by Network centric warfare theory of war.

  12. Information warfare technologies in political discourse

    Directory of Open Access Journals (Sweden)

    Karpova Anna Yu.

    2016-01-01

    Full Text Available We attempt to examine the technology of «information warfare» in this paper. The dominant theme of the paper is that the outcome of the information warfare is important not only for the future of a state itself but for the future of the world balance of forces. The main task of geopolitical actors in information warfare is to introduce ideas corresponding to their interests into mass consciousness. All participants of political conflicts have common features in technologies of Information warfare. The information anomie is the indicator of the great geopolitical actors’ personified interests on the stage of «information warfare» - the process resulted in destroying the communicative line: report-information understanding and disrupting the social order in society. In this paper authors describe the following Information Warfare technologies: "Political volcano" technology; "SPIN" technology; "Widening media resource" technology; "specific gravity" technology; "Cold War 2.0" technology and Information cleaningup technology. It is assumed that in the future there will be new instructions on applying technologies of information warfare. To impart perspective to the paper we consider examples, opinions and trends.

  13. Riparian Inventory

    Data.gov (United States)

    Kansas Data Access and Support Center — This dataset is a digital representation of the 1:24,000 Land Use Riparian Areas Inventory for the state of Kansas. The dataset includes a 100 foot buffer around all...

  14. Grid architecture model of network centric warfare

    Institute of Scientific and Technical Information of China (English)

    Yan Tihua; Wang Baoshu

    2006-01-01

    NCW(network centric warfare) is an information warfare concentrating on network. A global network-centric warfare architecture with OGSA grid technology is put forward, which is a four levels system including the user level, the application level, the grid middleware layer and the resource level. In grid middleware layer, based on virtual hosting environment, a BEPL4WS grid service composition method is introduced. In addition, the NCW grid service model is built with the help of Eclipse-SDK-3.0.1 and Bpws4j.

  15. Cyber Warfare: New Character with Strategic Results

    Science.gov (United States)

    2013-03-01

    defense ( CND ).”7 Thus cyber warfare is distinguished from cyber criminal acts based upon its coercive nature to attain a strategic end, whereas...CNA and CND . Conceptually, CNA effects “range from disrupting the adversary’s electronic systems and what operations they enable (communications...or self-destruct.”10 The second component of cyber warfare seeks to eliminate or minimize the risk of the first. The role of CND is to defend

  16. Finding Lawrence recruiting talent for unconventional warfare

    OpenAIRE

    Mourouzis, Michael G.

    2011-01-01

    Approved for public release; distribution is unlimited. From Francis Marion's guerrilla war against the British to advising the resistance against the Nazis and Japanese, the United States has depended on unconventional warfare (UW) as a component of national defense. Today, the U.S. Army Special Forces (SF) is the premiere unconventional warfare unit in the U.S. military. With a smaller Army and increasing missions, SF must expand its recruiting efforts. This thesis analyzes the recruitme...

  17. A Dialectic for Network Centric Warfare

    Science.gov (United States)

    2005-06-01

    Giffin, 2003; Borgu , 2003; Kaufman, 2004). For example, from a standpoint of Popperian methodological falsificationism (Popper, 1934), Reid and...focused term network-centric warfare has common favor ( Borgu , 2003) despite the organisational decree to use the term ‘network centric warfare...Commonwealth Department of Defence, June. Borgu , A., (2003), “The Challenges and Limitations of Network Centric Warfare”, Presented at NCW: Improving ADF

  18. Intrafamily and intragenomic conflicts in human warfare

    Science.gov (United States)

    2017-01-01

    Recent years have seen an explosion of multidisciplinary interest in ancient human warfare. Theory has emphasized a key role for kin-selected cooperation, modulated by sex-specific demography, in explaining intergroup violence. However, conflicts of interest remain a relatively underexplored factor in the evolutionary-ecological study of warfare, with little consideration given to which parties influence the decision to go to war and how their motivations may differ. We develop a mathematical model to investigate the interplay between sex-specific demography and human warfare, showing that: the ecology of warfare drives the evolution of sex-biased dispersal; sex-biased dispersal modulates intrafamily and intragenomic conflicts in relation to warfare; intragenomic conflict drives parent-of-origin-specific patterns of gene expression—i.e. ‘genomic imprinting’—in relation to warfare phenotypes; and an ecological perspective of conflicts at the levels of the gene, individual, and social group yields novel predictions as to pathologies associated with mutations and epimutations at loci underpinning human violence. PMID:28228515

  19. Spectroscopic investigations of surface deposited biological warfare simulants

    Science.gov (United States)

    Barrington, Stephen J.; Bird, Hilary; Hurst, Daniel; McIntosh, Alastair J. S.; Spencer, Phillippa; Pelfrey, Suzanne H.; Baker, Matthew J.

    2012-06-01

    This paper reports a proof-of-principle study aimed at discriminating biological warfare (BW) simulants from common environmental bacteria in order to differentiate pathogenic endospores in situ, to aid any required response for hazard management. We used FTIR spectroscopy combined with multivariate analysis; FTIR is a versatile technique for the non-destructive analysis of a range of materials. We also report an evaluation of multiple pre-processing techniques and subsequent differences in cross-validation accuracy of two pattern recognition models (Support Vector Machines (SVM) and Principal Component - Linear Discriminant Analysis (PC-LDA)) for two classifications: a two class classification (Gram + ve spores vs. Gram -ve vegetative cells) and a six class classification (bacterial classification). Six bacterial strains Bacillus atrophaeus, Bacillus thuringiensis var. kurstaki, Bacillus thuringiensis, Escherichia coli, Pantaeoa agglomerans and Pseudomonas fluorescens were analysed.

  20. Hybrid Warfare: A Military Revolution or Revolution in Military Affairs?

    Science.gov (United States)

    2012-12-14

    warfare intersect and blend to create a new form of warfare. This thesis uses the Williamson Murray and McGregor Knox definitions of Military...irregular warfare intersect and blend to create a new form of warfare. This thesis uses the Williamson Murray and McGregor Knox definitions of...understand new concepts. Douglas C Lovelace. Director Strategic Studies Institute has this insight to offer regarding the importance of

  1. Guiding Warfare to Reach Sustainable Peace

    DEFF Research Database (Denmark)

    Vestenskov, David; Drewes, Line

    The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition of develo......The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition...... of developing best practices in the education and implementation of IHL in capacity building of security forces....

  2. INVENTORY ABSTRACTION

    Energy Technology Data Exchange (ETDEWEB)

    G. Ragan

    2001-12-19

    The purpose of the inventory abstraction, which has been prepared in accordance with a technical work plan (CRWMS M&O 2000e for ICN 02 of the present analysis, and BSC 2001e for ICN 03 of the present analysis), is to: (1) Interpret the results of a series of relative dose calculations (CRWMS M&O 2000c, 2000f). (2) Recommend, including a basis thereof, a set of radionuclides that should be modeled in the Total System Performance Assessment in Support of the Site Recommendation (TSPA-SR) and the Total System Performance Assessment in Support of the Final Environmental Impact Statement (TSPA-FEIS). (3) Provide initial radionuclide inventories for the TSPA-SR and TSPA-FEIS models. (4) Answer the U.S. Nuclear Regulatory Commission (NRC)'s Issue Resolution Status Report ''Key Technical Issue: Container Life and Source Term'' (CLST IRSR) key technical issue (KTI): ''The rate at which radionuclides in SNF [spent nuclear fuel] are released from the EBS [engineered barrier system] through the oxidation and dissolution of spent fuel'' (NRC 1999, Subissue 3). The scope of the radionuclide screening analysis encompasses the period from 100 years to 10,000 years after the potential repository at Yucca Mountain is sealed for scenarios involving the breach of a waste package and subsequent degradation of the waste form as required for the TSPA-SR calculations. By extending the time period considered to one million years after repository closure, recommendations are made for the TSPA-FEIS. The waste forms included in the inventory abstraction are Commercial Spent Nuclear Fuel (CSNF), DOE Spent Nuclear Fuel (DSNF), High-Level Waste (HLW), naval Spent Nuclear Fuel (SNF), and U.S. Department of Energy (DOE) plutonium waste. The intended use of this analysis is in TSPA-SR and TSPA-FEIS. Based on the recommendations made here, models for release, transport, and possibly exposure will be developed for the isotopes that would be the highest

  3. Inventory Abstraction

    Energy Technology Data Exchange (ETDEWEB)

    C. Leigh

    2000-11-03

    The purpose of the inventory abstraction as directed by the development plan (CRWMS M&O 1999b) is to: (1) Interpret the results of a series of relative dose calculations (CRWMS M&O 1999c, 1999d). (2) Recommend, including a basis thereof, a set of radionuclides that should be modeled in the Total System Performance Assessment in Support of the Site Recommendation (TSPA-SR) and the Total System Performance Assessment in Support of the Final Environmental Impact Statement (TSPA-FEIS). (3) Provide initial radionuclide inventories for the TSPA-SR and TSPA-FEIS models. (4) Answer the U.S. Nuclear Regulatory Commission (NRC)'s Issue Resolution Status Report ''Key Technical Issue: Container Life and Source Term'' (CLST IRSR) (NRC 1999) key technical issue (KTI): ''The rate at which radionuclides in SNF [Spent Nuclear Fuel] are released from the EBS [Engineered Barrier System] through the oxidation and dissolution of spent fuel'' (Subissue 3). The scope of the radionuclide screening analysis encompasses the period from 100 years to 10,000 years after the potential repository at Yucca Mountain is sealed for scenarios involving the breach of a waste package and subsequent degradation of the waste form as required for the TSPA-SR calculations. By extending the time period considered to one million years after repository closure, recommendations are made for the TSPA-FEIS. The waste forms included in the inventory abstraction are Commercial Spent Nuclear Fuel (CSNF), DOE Spent Nuclear Fuel (DSNF), High-Level Waste (HLW), naval Spent Nuclear Fuel (SNF), and U.S. Department of Energy (DOE) plutonium waste. The intended use of this analysis is in TSPA-SR and TSPA-FEIS. Based on the recommendations made here, models for release, transport, and possibly exposure will be developed for the isotopes that would be the highest contributors to the dose given a release to the accessible environment. The inventory abstraction is important in

  4. US Army Special Warfare. Its Origins: Psychological and Unconventional Warfare, 1941-1952

    Science.gov (United States)

    1982-01-01

    sug- F P _ _ 6 PSYCHOLOGICAL WARFARE IN WORLD WAR I! gestion of a single agency which would serve as a clearinghouse for all intelligence, as well as...organizations, communications, demoli- tions, organization and training of civilians for guerrilla warfare, para- chute jumping, and amphibious...General Bolte, Director, P&O, was reluctant to endorse this latter sug- gestion , indicating, "as he had indicated from time to time at other points

  5. Modern Warfare From the Colombian Perspective

    Science.gov (United States)

    2008-01-01

    Involved into a Fourth Generation, 1. 7 M-19 Movimiento revolucionario 19 de abril. Former insurgency group. 8 Alberto Pinzon Sanchez. En Causa Propia...a Fourth Generation. Alberto Pinzon Sanchez. En Causa Propia. http://www.anncoI.nu Mao Tse Tung. On Guerrilla Warfare, Baltimore, Md.: Nautical

  6. Agricultural Warfare and Bioterrorism using Invasive Species

    Science.gov (United States)

    The chapter on Agricultural Warfare and Bioterrorism using Invasive Species is part of the book titled Pest Management and Phytosanitary Trade Barriers authored by Neil Heather (Australia) and Guy Hallman. The chapter attempts to briefly put the topic into context with phytosanitation. It presents...

  7. Russia’s Approach to Cyber Warfare

    Science.gov (United States)

    2016-09-01

    psychological operations, and information operations. • In keeping with traditional Soviet notions of battling constant threats from abroad and within...playing a greater role in conventional Russian military operations. Although the Russian military has been slow to embrace cyber for both structural and...theorists, is a holistic concept that includes computer network operations, electronic warfare, psychological operations, and information operations.3

  8. Unconventional Warfare: A Mission Metamorphosis for the 21st Century?

    Science.gov (United States)

    2000-06-01

    brigadier general and publish several more noted works on Mao and revolutionary warfare. See Samuel B. Giffith, Mao Tse-Tung on Guerrilla Warfare (New...and propagators of the faith. The bibles (in English translation) are Mao Tse-tung on Guerrilla Warfare by Brigadier General Samuel B. Griffith...Barnett, B. Hugh Tovar , and Richard H. Schultz eds., Special Operations in US Strategy (Washington, D.C.: US Government Printing Office, 1984), 2. 58

  9. Computational models of intergroup competition and warfare.

    Energy Technology Data Exchange (ETDEWEB)

    Letendre, Kenneth (University of New Mexico); Abbott, Robert G.

    2011-11-01

    This document reports on the research of Kenneth Letendre, the recipient of a Sandia Graduate Research Fellowship at the University of New Mexico. Warfare is an extreme form of intergroup competition in which individuals make extreme sacrifices for the benefit of their nation or other group to which they belong. Among animals, limited, non-lethal competition is the norm. It is not fully understood what factors lead to warfare. We studied the global variation in the frequency of civil conflict among countries of the world, and its positive association with variation in the intensity of infectious disease. We demonstrated that the burden of human infectious disease importantly predicts the frequency of civil conflict and tested a causal model for this association based on the parasite-stress theory of sociality. We also investigated the organization of social foraging by colonies of harvester ants in the genus Pogonomyrmex, using both field studies and computer models.

  10. Handbook of toxicology of chemical warfare agents

    CERN Document Server

    2010-01-01

    This groundbreaking book covers every aspect of deadly toxic chemicals used as weapons of mass destruction and employed in conflicts, warfare and terrorism. Including findings from experimental as well as clinical studies, this one-of-a-kind handbook is prepared in a very user- friendly format that can easily be followed by students, teachers and researchers, as well as lay people. Stand-alone chapters on individual chemicals and major topics allow the reader to easily access required information without searching through the entire book. This is the first book that offers in-depth coverage of individual toxicants, target organ toxicity, major incidents, toxic effects in humans, animals and wildlife, biosensors, biomarkers, on-site and laboratory analytical methods, decontamination and detoxification procedures, prophylactic, therapeutic and countermeasures, and the role of homeland security. Presents a comprehensive look at all aspects of chemical warfare toxicology in one reference work. This saves research...

  11. Electronic Warfare in Army Models - A Survey.

    Science.gov (United States)

    1980-08-01

    CCM) PROVING GROUND TENIAS SAMJAM EIEM SPREAD SPECTRUM US ARMY ELECTRONIC FOREIGN SCIENCE & OFFICE OF MISSILE WARFARE LAB (EWL) TECHNOLOGY CENTER...IPAR MULTIRADAR SPREAD SPECTRUM ECMFUZ IRSS OTOALOC TAC ZINGERS EIEM ITF PATCOM TAM EOCM SIM FAC MGM-H4D RFSS TENIAS GTSF MG(-H4H ROLJAM ZAP I HMSM MSL...USAFAS TRASANA USAPAS TCF ASD WPAFU TENIAS ______ ___ ECAC _________ WAR EAGLE _________CATRADA WARRANT am________ 3DBDM ZAP 1 ____________ MEW EWL ZAP 2

  12. Africa: Irregular Warfare on the Dark Continent

    Science.gov (United States)

    2009-05-01

    only to the mighty Amazon for 13 Alexander, Africa: Irregular Warfare on the Dark Continent tropical forests. The demand for hardwood lumber is...were decades in the making. Prolonged drought , desertification, and overpopulation are among the primary reasons for the fighting, which breaks down...go to lengths to differentiate themselves from other indigenous people.120 General repression of the Tuaregs was exacerbated by repeated droughts

  13. Mapping the Spread of Mounted Warfare

    Directory of Open Access Journals (Sweden)

    Peter Turchin

    2016-12-01

    Full Text Available Military technology is one of the most important factors affecting the evolution of complex societies. In particular, mounted warfare, the use of horse-riders in military operations, revolutionized war as it spread to different parts of Eurasia and Africa during the Ancient and Medieval eras, and to the Americas during the Early Modern period. Here we use a variety of sources to map this spread.

  14. Chemical profiling of chemical warfare agents for forensic purposes

    NARCIS (Netherlands)

    Noort, D.; Reuver, L.P.J. de; Fidder, A.; Tromp, M.; Verschraagen, M.

    2010-01-01

    A program has been initiated towards the chemical profiling of chemical warfare agents, in order to support forensic investigations towards synthesis routes, production sites and suspect chemical suppliers. Within the first stage of the project various chemical warfare agents (VX, sulfur mustard, sa

  15. The Cycle of Warfare - Analysis of an Analytical Model

    DEFF Research Database (Denmark)

    Jensen, Mikkel Storm

    2016-01-01

    The abstract has the title: “The Cycle of Warfare - Analysis of an Analytical Model” The Cycle of Warfare is an analytical model designed to illustrate the coherence between the organization, doctrine and technology of a military entity and the influence of the surrounding society as expressed...

  16. Dirty Fighting: How to Counter Total Warfare Mentality

    Science.gov (United States)

    2015-06-12

    DIRTY FIGHTING: HOW TO COUNTER TOTAL WARFARE MENTALITY A thesis presented to the Faculty of the U.S. Army Command and...to Counter Total Warfare Mentality Approved by: , Thesis Committee Chair LTC Sandra J. Sanchez, MBA , Member Marlyn R. Pierce...

  17. Cyberspace Warfare: A New DoD Core Mission Area

    Science.gov (United States)

    2013-05-01

    Century thief breaking into files, not into metal safes. The mysterious group Anonymous has struck again, with a warning, this is just the 5 Starr and...cyberspace warfare aside as science fiction hogwash, and accept the risks of the possible. The evolution of warfare has evolved over time, but the nature of

  18. Electronic warfare receivers and receiving systems

    CERN Document Server

    Poisel, Richard A

    2014-01-01

    Receivers systems are considered the core of electronic warfare (EW) intercept systems. Without them, the fundamental purpose of such systems is null and void. This book considers the major elements that make up receiver systems and the receivers that go in them.This resource provides system design engineers with techniques for design and development of EW receivers for modern modulations (spread spectrum) in addition to receivers for older, common modulation formats. Each major module in these receivers is considered in detail. Design information is included as well as performance tradeoffs o

  19. Microwave receivers with electronic warfare applications

    CERN Document Server

    Tsui, James

    2005-01-01

    This book by the author of Digital Techniques for Wideband Receivers willbe like no other one on your book shelf as the definitive word on electronicwarfare (EW) receiver design and performance. Whether you are an EWscientist involved in the test and evaluation of EW receivers or a designerof RWR's and other EW-related receivers, Microwave Receivers withElectronic Warfare Applications is a handy reference through which you canperfect your technical art. Lucidly written, this book is a treatise on EWreceivers that is relevant to you if you are just looking for a top-levelinsight into EW receive

  20. Hybrid Warfare: Preparing for Future Conflict

    Science.gov (United States)

    2015-02-17

    Fukuyama , Francis . “At the ‘End of History’ Still Stands Democracy.” The Wall Street Journal, 6 June 2014. http://www.wsj.com/articles/at-the-end-of...warfare is cultural instead of political (in the traditional Clausewitzian sense). 15 Hoffman is referring to Francis Fukuyama’s idea of “the end of...history,” as argued in his 1989 essay and subsequent book. Fukuyama first published an essay titled “The End of History” in the National Interest in

  1. From National Forest Inventory to National Forest GHG Inventories

    OpenAIRE

    de Jong, Ben; PANDEY Devendra; Achard, Frederic

    2010-01-01

    Chapter 3.3 presents two national case studies for forest inventories in tropical countries: the Indian and Mexican national forest inventories. These national forest inventories have been use to report GHG inventories to the UNFCC

  2. HHS Enterprise Data Inventory

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Enterprise Data Inventory (EDI) is the comprehensive inventory listing of agency data resources including public, restricted public, and non-public datasets.

  3. National Wetlands Inventory Polygons

    Data.gov (United States)

    Minnesota Department of Natural Resources — Wetland area features mapped as part of the National Wetlands Inventory (NWI). The National Wetlands Inventory is a national program sponsored by the US Fish and...

  4. World Glacier Inventory

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The World Glacier Inventory (WGI) contains information for over 130,000 glaciers. Inventory parameters include geographic location, area, length, orientation,...

  5. Housing Inventory Count

    Data.gov (United States)

    Department of Housing and Urban Development — This report displays the data communities reported to HUD about the nature of their dedicated homeless inventory, referred to as their Housing Inventory Count (HIC)....

  6. LINGUISTIC INVENTORY PROBLEMS

    OpenAIRE

    CHIH HSUN HSIEH

    2011-01-01

    The work presented in this paper has been motivated primarily by Zadeh's idea of linguistic variables intended to provide rigorous mathematical modeling of natural language and CWW, Computing With Words. This paper reports some modeling of the linguistic inventory problems where CWW have been implemented: linguistic production inventory, linguistic inventory models under linguistic demand and linguistic lead time, linguistic production inventory models based on the preference of a decision ma...

  7. Environmental chemistry of chemical warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    MacNaughton, M.G.; Brewer, J.H.; Ledbetter-Ferrill, J. [Southwest Research Inst., San Antonio, TX (United States)

    1995-06-01

    This paper summarizes the approach used in the preparation of a Handbook for the Corps of Engineers, Huntsville Division, on the environmental chemistry of chemical warfare agents. The agents GB and HD will be used to illustrate the type of information in the report. Those readers interested in the full report should contact Mr. Arkie Fanning, Huntsville Corps of Engineers at (505) 955-5256. The U.S. Army Corps of Engineers (ACE) has identified approximately 7,200 formerly used defense sites (FUDS) in the United States, some of which are suspected to be contaminated with chemical warfare agents (CWA). The ACE has responsibility for environmental clean-up of FUDS, including site characterization, evaluation and remediation of the site. Thirty-four FUDS and 48 active DOD installations that may contain CWA were identified in an Interim Survey and Analysis Report by the USACMDA Program Manager for Non-Stockpile Chemical Material (NSCM). The chemical agents listed include sulfur mustard (H), lewisite (L), tabun (GA), sarin (GB), VX, hydrogen cyanide (AC), cyanogen chloride (CK), phosgene (CG), BZ, and CS.

  8. Strategy in the Robotic Age: A Case for Autonomous Warfare

    Science.gov (United States)

    2014-09-01

    question legal, ethical , and moral standings about lethal robotic systems. Foreign policy options may be altered because new military options become... ROBOTIC AGE: A CASE FOR AUTONOMOUS WARFARE by Barry S. Scott September 2014 Thesis Advisor: Donald Abenheim Co-Advisor: James Wirtz THIS...Master’s Thesis 4. TITLE AND SUBTITLE STRATEGY IN THE ROBOTIC AGE: A CASE FOR AUTONOMOUS WARFARE 5. FUNDING NUMBERS 6. AUTHOR(S) Barry S. Scott

  9. Littoral Combat Ship Open Ocean Anti-Submarine Warfare

    Science.gov (United States)

    2014-06-01

    COVERED Capstone 4. TITLE AND SUBTITLE LITTORAL COMBAT SHIP OPEN OCEAN ANTI-SUBMARINE WARFARE 5. FUNDING NUMBERS 6. AUTHOR(S) 311-124O/Team LCS...Life cycle cost LCCE Life cycle cost estimate LCS Littoral combat ship LHA Landing ship, helicopter assault LHD Landing ship, helicopter...is unlimited LITTORAL COMBAT SHIP OPEN OCEAN ANTI- SUBMARINE WARFARE by Team LCS 311-124O June 2014 Capstone Advisors: John Green Dan

  10. Helicopters in Irregular Warfare: Algeria, Vietnam, and Afghanistan

    Science.gov (United States)

    2013-06-13

    the political group associated with the Algerian nationalist independence movement GALAT Groupement d’ Aviation Légère de l’Armée de Terre ...unique from most conflicts because the expeditionary forces’ parent country rarely perceives an existential threat.19 The lack of perceived threat...dominance rarely guarantees success in irregular warfare.22 Instead, success in irregular warfare requires synergy between government and military efforts

  11. Depth vs. breadth: talent management for special warfare

    OpenAIRE

    Krebs, William K.

    2016-01-01

    Approved for public release; distribution is unlimited This thesis presents recommendations for improving officer talent management for Special Warfare units. Success in this complex human domain demands that key planners and commanders of a Special Warfare campaign operate with a long-term perspective, a depth of expertise, and a strong network of relationships. However, on any given day in a U.S. Army Special Forces Group, the preponderance of field grade officers are in their first year...

  12. Fourth Generation Warfare and Its Impact on the Army

    Science.gov (United States)

    2007-11-02

    In 1989, the authors of an article entitled, "The Changing Face of War: Into the Fourth Generation ," offered a glimpse of the future rooted in the...decline of the West in a world rife with cultural conflicts and the powerful influences of a form of cultural Marxism known as political correctness...were combining in America to create conditions for a new generation of warfare. Their vision included a form of warfare that bypassed the military

  13. National Wetlands Inventory Lines

    Data.gov (United States)

    Minnesota Department of Natural Resources — Linear wetland features (including selected streams, ditches, and narrow wetland bodies) mapped as part of the National Wetlands Inventory (NWI). The National...

  14. Denmark's National Inventory Report

    DEFF Research Database (Denmark)

    Illerup, J. B.; Lyck, E.; Winther, M.

    This report is Denmark's National Inventory Report reported to the Conference of the Parties under the United Nations Framework Convention on Climate Change (UNFCCC) due by 15 April 2001. The report contains information on Denmark's inventories for all years' from 1990 to 1999 for CO2, CH4, N2O, CO...

  15. Preschool Connected Speech Inventory.

    Science.gov (United States)

    DiJohnson, Albert; And Others

    This speech inventory developed for a study of aurally handicapped preschool children (see TM 001 129) provides information on intonation patterns in connected speech. The inventory consists of a list of phrases and simple sentences accompanied by pictorial clues. The test is individually administered by a teacher-examiner who presents the spoken…

  16. Uncertainties in emission inventories

    NARCIS (Netherlands)

    Aardenne, van J.A.

    2002-01-01

    Emission inventories provide information about the amount of a pollutant that is emitted to the atmosphere as a result of a specific anthropogenic or natural process at a given time or place. Emission inventories can be used for either policy or scientific purposes. For policy purpose

  17. The art of antibacterial warfare: Deception through interference with quorum sensing-mediated communication.

    Science.gov (United States)

    Rampioni, Giordano; Leoni, Livia; Williams, Paul

    2014-08-01

    Almost a century on from the discovery of penicillin, the war against bacterial infection still rages compounded by the emergence of strains resistant to virtually every clinically approved antibiotic and the dearth of new antibacterial agents entering the clinic. Consequently there is renewed interest in drugs which attenuate virulence rather than bacterial growth. Since the metaphors of warfare are often used to describe the battle between pathogen and host, we will describe in such a context, the molecular communication (quorum sensing) mechanisms used by bacteria to co-ordinate virulence at the population level. Recent progress in exploiting this information through the design of anti-virulence deception strategies that disrupt quorum sensing through signal molecule inactivation, inhibition of signal molecule biosynthesis or the blockade of signal transduction and their advantages and disadvantages are considered.

  18. The World War Two Allied Economic Warfare: The Case of Turkish Chrome Sales

    OpenAIRE

    ÖNSOY, Murat

    2009-01-01

    Economic character of "modern warfare" is too important to be underestimated. In the Economic Warfare belligerents attempt to reduce the war capacity of the enemy through various methods. In World War II crushing down the German war production and economy was the main target of the British Ministry of Economic Warfare. For Germany, one of the many ways of overcoming the British Economic Warfare was to trade with the neutral countries that had land connection to the Third Reich. Turkey was one...

  19. Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development

    Science.gov (United States)

    2016-09-01

    ARL-TN-0779 ● SEP 2016 US Army Research Laboratory Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and...Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development by Neal Tesny Sensors and Electron Devices Directorate...TITLE AND SUBTITLE Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development 5a. CONTRACT NUMBER 5b

  20. Numerical simulation of RCS for carrier electronic warfare airplanes

    Directory of Open Access Journals (Sweden)

    Yue Kuizhi

    2015-04-01

    Full Text Available This paper studies the radar cross section (RCS of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carrier electronic warfare airplanes Model A and Model B with weapons were established. Based on the physical optics method and the equivalent electromagnetic flow method, by the use of the RCSAnsys software, the characteristics of carrier electronic warfare airplanes’ RCS under steady and dynamic flights were simulated under the UHF, X, and S radar bands. This paper researches the detection probability of aircraft by radars under the condition of electronic warfare, and completes the mathematical statistical analysis of the simulation results. The results show that: The Model A of carrier electronic warfare airplane is better than Model B on stealth performance and on discover probability by radar detection effectively.

  1. SBA Network Components & Software Inventory

    Data.gov (United States)

    Small Business Administration — SBA’s Network Components & Software Inventory contains a complete inventory of all devices connected to SBA’s network including workstations, servers, routers,...

  2. Interactive Inventory Monitoring

    Science.gov (United States)

    Garud, Sumedha

    2013-01-01

    Method and system for monitoring present location and/or present status of a target inventory item, where the inventory items are located on one or more inventory shelves or other inventory receptacles that communicate with an inventory base station through use of responders such as RFIDs. A user operates a hand held interrogation and display (lAD) module that communicates with, or is part of the base station to provide an initial inquiry. lnformation on location(s) of the larget invenlory item is also indicated visibly and/or audibly on the receptacle(s) for the user. Status information includes an assessment of operation readiness and a time, if known, that the specified inventory item or class was last removed or examined or modified. Presentation of a user access level may be required for access to the target inventgory item. Another embodiment provides inventory informatin for a stack as a sight-impaired or hearing-impaired person adjacent to that stack.

  3. History of biological warfare and bioterrorism.

    Science.gov (United States)

    Barras, V; Greub, G

    2014-06-01

    Bioterrorism literally means using microorganisms or infected samples to cause terror and panic in populations. Bioterrorism had already started 14 centuries before Christ, when the Hittites sent infected rams to their enemies. However, apart from some rare well-documented events, it is often very difficult for historians and microbiologists to differentiate natural epidemics from alleged biological attacks, because: (i) little information is available for times before the advent of modern microbiology; (ii) truth may be manipulated for political reasons, especially for a hot topic such as a biological attack; and (iii) the passage of time may also have distorted the reality of the past. Nevertheless, we have tried to provide to clinical microbiologists an overview of some likely biological warfare that occurred before the 18th century and that included the intentional spread of epidemic diseases such as tularaemia, plague, malaria, smallpox, yellow fever, and leprosy. We also summarize the main events that occurred during the modern microbiology era, from World War I to the recent 'anthrax letters' that followed the World Trade Center attack of September 2001. Again, the political polemic surrounding the use of infectious agents as a weapon may distort the truth. This is nicely exemplified by the Sverdlovsk accident, which was initially attributed by the authorities to a natural foodborne outbreak, and was officially recognized as having a military cause only 13 years later.

  4. Chemical Warfare Agent Degradation and Decontamination

    Energy Technology Data Exchange (ETDEWEB)

    Talmage, Sylvia Smith [ORNL; Watson, Annetta Paule [ORNL; Hauschild, Veronique [U.S. Environmental Protection Agency; Munro, Nancy B [ORNL; King, J. [U.S. Army Environmental Center

    2007-02-01

    The decontamination of chemical warfare agents (CWA) from structures, environmental media, and even personnel has become an area of particular interest in recent years due to increased homeland security concerns. In addition to terrorist attacks, scenarios such as accidental releases of CWA from U.S. stockpile sites or from historic, buried munitions are also subjects for response planning. To facilitate rapid identification of practical and effective decontamination approaches, this paper reviews pathways of CWA degradation by natural means as well as those resulting from deliberately applied solutions and technologies; these pathways and technologies are compared and contrasted. We then review various technologies, both traditional and recent, with some emphasis on decontamination materials used for surfaces that are difficult to clean. Discussion is limited to the major threat CWA, namely sulfur mustard (HD, bis(2-chloroethyl)sulfide), VX (O-ethyl S-(2-diisopropylaminoethyl) methylphosphonothioate), and the G-series nerve agents. The principal G-agents are GA (tabun, ethyl N,N-dimethylphosphoramidocyanidate), GB (sarin, isopropyl methylphosphonofluoridate), and GD (soman, pinacolyl methylphosphonofluoridate). The chemical decontamination pathways of each agent are outlined, with some discussion of intermediate and final degradation product toxicity. In all cases, and regardless of the CWA degradation pathway chosen for decontamination, it will be necessary to collect and analyze pertinent environmental samples during the treatment phase to confirm attainment of clearance levels.

  5. Toxics Release Inventory (TRI)

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Toxics Release Inventory (TRI) is a dataset compiled by the U.S. Environmental Protection Agency (EPA). It contains information on the release and waste...

  6. National Wetlands Inventory Points

    Data.gov (United States)

    Minnesota Department of Natural Resources — Wetland point features (typically wetlands that are too small to be as area features at the data scale) mapped as part of the National Wetlands Inventory (NWI). The...

  7. Shuttle Inventory Management

    Science.gov (United States)

    1983-01-01

    Inventory Management System (SIMS) consists of series of integrated support programs providing supply support for both Shuttle program and Kennedy Space Center base opeations SIMS controls all supply activities and requirements from single point. Programs written in COBOL.

  8. The Danish CORINAIR Inventories

    DEFF Research Database (Denmark)

    Winther, M.; Illerup, J. B.; Fenhann, J.;

    CORINAIR is the most comprehensive European air emission inventory programme. It consists of a defined emission calculation methodology and software for storing and further data processing. In CORINAIR 28 different emission species are estimated in 11 main sectors which are further sub-divided, a......CORINAIR is the most comprehensive European air emission inventory programme. It consists of a defined emission calculation methodology and software for storing and further data processing. In CORINAIR 28 different emission species are estimated in 11 main sectors which are further sub...... of emissions per unit activity. This report describes the structure of the Danish CORINAIR emission inventory on a 1996 level and international conventions to which Denmark submits emission data. Furthermore the most important activities in the Danish inventory are explained. Subsequently the Danish 1996...

  9. China's Glacier Inventory Completed

    Institute of Scientific and Technical Information of China (English)

    2004-01-01

    @@ A 12-volume Chinese Glacier Inventory has recently been finished by a group of Chinese glaciologists headed by Prof. Shi Yafeng from the Cold and Arid Regions Environmental and Engineering Research Institute under CAS.

  10. Asset Inventory Database

    Data.gov (United States)

    US Agency for International Development — AIDM is used to track USAID assets such as furniture, computers, and equipment. Using portable bar code readers, receiving and inventory personnel can capture...

  11. Public Waters Inventory Maps

    Data.gov (United States)

    Minnesota Department of Natural Resources — This theme is a scanned and rectified version of the Minnesota DNR - Division of Waters "Public Waters Inventory" (PWI) maps. DNR Waters utilizes a small scale...

  12. Business Process Inventory

    Data.gov (United States)

    Office of Personnel Management — Inventory of maps and descriptions of the business processes of the U.S. Office of Personnel Management (OPM), with an emphasis on the processes of the Office of the...

  13. Wetlands Inventory Nevada

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Nevada wetlands inventory is a unit of a nationwide survey undertaken by the Fish and Wildlife Service to locate and tabulate by habitat types the important...

  14. Raccoon abundance inventory report

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This report summarizes the results of a raccoon abundance inventory on Clarence Cannon National Wildlife Refuge in 2012. Determining raccoon abundance allows for...

  15. Land Type Inventory

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This is an inventory of the number of acres of various land types found at Kenai National Moose Range. Forestlands are the predominant land type, followed by tundra,...

  16. Logistics and Inventory System -

    Data.gov (United States)

    Department of Transportation — The Logistics and Inventory System (LIS) is the agencys primary supply/support automation tool. The LIS encompasses everything from order entry by field specialists...

  17. Software Document Inventory Program

    Science.gov (United States)

    Merwarth, P. D.

    1984-01-01

    Program offers ways to file and locate sources of reference. DOCLIB system consists of two parts to serve needs of two type of users: general user and librarian. DOCLIB systems provides user with interactive, menudriven document inventory capability.

  18. VA Enterprise Data Inventory

    Data.gov (United States)

    Department of Veterans Affairs — The Department of Veterans Affairs Enterprise Data Inventory accounts for all of the datasets used in the agency's information systems. This entry was approved for...

  19. National Emission Inventory (NEI)

    Data.gov (United States)

    U.S. Environmental Protection Agency — This data exchange allows states to submit data to the US Environmental Protection Agency's National Emissions Inventory (NEI). NEI is a national database of air...

  20. National Emission Inventory

    Data.gov (United States)

    U.S. Environmental Protection Agency — The National Emission Inventory contains measured, modeled, and estimated data for emissions of all known source categories in the US (stationary sources, fires,...

  1. Inventory Control Crucial

    Institute of Scientific and Technical Information of China (English)

    CHRIS; DEVONSHIRE-ELLIS

    2008-01-01

    Inventory control is one of the most important business processes during the operation of a trading or manufacturing company as it relates to purchases,sales and logistic activities,In order to have clear inven- tory management,a company should focus not only on logistic management but also on sales and purchase management.The general view is that the warehouse serves as the most important component of inventory manage- ment and that the accounting department is

  2. Traffic Signs Inventory System

    Directory of Open Access Journals (Sweden)

    J. Ružbarský

    2013-06-01

    Full Text Available The paper is focused on practical application of Cambridge Correlator. The goal is to propose a traffic signs inventory system by using excellent characteristics of correlator in the rapid optical correlation. The proposal of this inventory system includes obtaining of traffic signs to create the database either collecting the GPS coordinates. It is necessary to know the traffic signs position and also to document the entire surface route for later evaluation in offline mode.

  3. Ethical Considerations of Computer Network Attack in Information Warfare

    Science.gov (United States)

    2001-01-16

    attack/destruction, and special information operations (SIO). CNA and the other methods of offensive IO represent the incorporation of information...psychological operations, electronic warfare, physical attack and/or destruction, and special information operations, and could include computer network...to computer networks to record information sent over them. 41 special information operations. Information operations that by their sensitive nature

  4. Environmental assessments of sea dumped chemical warfare agents

    DEFF Research Database (Denmark)

    Sanderson, Hans; Fauser, Patrik

    This is a report on the information gathered during work related to sea dumped chemical warfare agents. It mainly reviews the work conducted in relation to the installation of the two Nord Stream gas pipeline from 2008-2012. The focus was on the weight-of-evidence risk assessment of disturbed CWA...

  5. Anti-submarine warfare with continuously active sonar

    NARCIS (Netherlands)

    Vossen, R. van; Beerens, S.P.; Spek, E. van der

    2011-01-01

    Existing surveillance sonar systems for anti-submarine warfare (ASW) use a pulsed sonar deployed at a low duty cycle. Continuously active sonar (CAS) is of special interest since the technique could provide better detection performance than conventional pulsed sonar, and it will provide the operator

  6. Public Discussion of Nuclear Warfare: A Time for Hope.

    Science.gov (United States)

    Cooper, Martha

    Anti-nuclear discourse, which peaked in 1981-82, signaled an emergence of public discourse on the nuclear warfare issue. During the development of the original atomic bomb, public discussion of the issue was severely restricted, but immediately after the bombing of Hiroshima and Nagasaki, discourse on the subject increased. During the Cold War…

  7. Trends in underwater warfare : From an underwater acoustics perspective

    NARCIS (Netherlands)

    Ort, C.M.; Driessen, F.P.G.

    2002-01-01

    Technological developments concerning underwater systems for Anti Submarine Warfare (ASW) and Mine Counter Measures (MCM) are directed at optimally countering the underwater threat in the near future. Countering the existing underwater threat is already extremely difficult, but there are several tre

  8. Employing U.S. Information Operations Against Hybrid Warfare Threats

    Science.gov (United States)

    2013-03-01

    activities” ( CEMA ), which is a combination of Cyber and Electronic Warfare.115 However, the relationship between cyber and EW must be carefully considered...generating effects by themselves, as well as serving as a delivery means for MISO. The focus of CEMA may be as much to support combat operations

  9. Simulating cyber warfare and cyber defenses: information value considerations

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber

  10. Big bacteria

    DEFF Research Database (Denmark)

    Schulz, HN; Jørgensen, BB

    2001-01-01

    A small number of prokaryotic species have a unique physiology or ecology related to their development of unusually large size. The biomass of bacteria varies over more than 10 orders of magnitude, from the 0.2 mum wide nanobacteria to the largest cells of the colorless sulfur bacteria......, Thiomargarita namibiensis, with a diameter of 750 mum. All bacteria, including those that swim around in the environment, obtain their food molecules by molecular diffusion. Only the fastest and largest swimmers known, Thiovulum majus, are able to significantly increase their food supply by motility...... and by actively creating an advective flow through the entire population. Diffusion limitation generally restricts the maximal size of prokaryotic cells and provides a selective advantage for mum-sized cells at the normally low substrate concentrations in the environment. The largest heterotrophic bacteria...

  11. Anaerobic bacteria

    Science.gov (United States)

    Brook I, Goldstein EJ. Diseases caused by non-spore forming anaerobic bacteria. In: Goldman L, Schafer AI, eds. Goldman's Cecil Medicine . 25th ed. Philadelphia, PA: Elsevier Saunders; 2015:chap 297. Stedman's Online ...

  12. Shortening the Xerostomia Inventory

    Science.gov (United States)

    Thomson, William Murray; van der Putten, Gert-Jan; de Baat, Cees; Ikebe, Kazunori; Matsuda, Ken-ichi; Enoki, Kaori; Hopcraft, Matthew; Ling, Guo Y

    2011-01-01

    Objectives To determine the validity and properties of the Summated Xerostomia Inventory-Dutch Version in samples from Australia, The Netherlands, Japan and New Zealand. Study design Six cross-sectional samples of older people from The Netherlands (N = 50), Australia (N = 637 and N = 245), Japan (N = 401) and New Zealand (N = 167 and N = 86). Data were analysed using the Summated Xerostomia Inventory-Dutch Version. Results Almost all data-sets revealed a single extracted factor which explained about half of the variance, with Cronbach’s alpha values of at least 0.70. When mean scale scores were plotted against a “gold standard” xerostomia question, statistically significant gradients were observed, with the highest score seen in those who always had dry mouth, and the lowest in those who never had it. Conclusion The Summated Xerostomia Inventory-Dutch Version is valid for measuring xerostomia symptoms in clinical and epidemiological research. PMID:21684773

  13. Integrated Assessment Systems for Chemical Warfare Material

    Energy Technology Data Exchange (ETDEWEB)

    A. M. Snyder; D. A. Verrill; G. L. Thinnes; K. D. Watts; R. J. McMorland

    1999-05-27

    The US Army must respond to a variety of situations involving suspect discovered, recovered, stored, and buried chemical warfare materiel (CWM). In some cases, the identity of the fill materiel and the status of the fusing and firing train cannot be visually determined due to aging of the container, or because the item is contained in an over-pack. In these cases, non-intrusive assessments are required to provide information to allow safe handling, storage, and disposal of the materiel. This paper will provide an overview of the integrated mobile and facility-based CWM assessment system prototypes that have been, and are being developed, at the Idaho National Engineering and Environmental Laboratory (INEEL) for the US Army Non-Stockpile Chemical Materiel Project. In addition, this paper will discuss advanced sensors being developed to enhance the capability of the existing and future assessment systems. The Phase I Mobile Munitions Assessment System (MMAS) is currently being used by the Army's Technical Escort Unit (TEU) at Dugway Proving Ground, Utah. This system includes equipment for non-intrusively identifying the munitions fill materiel and for assessing the condition and stability of the fuzes, firing trains, and other potential safety hazards. The system provides a self-contained, integrated command post including an on-board computer system, communications equipment, video and photographic equipment, weather monitoring equipment, and miscellaneous safety-related equipment. The Phase II MMAS is currently being tested and qualified for use by the INEEL and the US Army. The Phase II system contains several new assessment systems that significantly enhance the ability to assess CWM. A facility-based munitions assessment system prototype is being developed for the assessment of CWM stored in igloos at Pine Bluff Arsenal, Arkansas. This system is currently in the design and fabrication stages. Numerous CWM advanced sensors are being developed and tested, and

  14. Inventory-driven costs.

    Science.gov (United States)

    Callioni, Gianpaolo; de Montgros, Xavier; Slagmulder, Regine; Van Wassenhove, Luk N; Wright, Linda

    2005-03-01

    In the 199os, Hewlett-Packard's PC business was struggling to turn a dollar, despite the company's success in winning market share. By 1997, margins on its PCs were as thin as a silicon wafer, and some product lines hadn't turned a profit since 1993. The problem had everything to do with the PC industry's notoriously short product cycles and brutal product and component price deflation. A common rule of thumb was that the value of a fully assembled PC decreased 1% a week. In such an environment, inventory costs become critical. But not just the inventory costs companies traditionally track, HP found, after a thorough review of the problem. The standard "holding cost of inventory"--the capital and physical costs of inventory--accounted for only about 10% of HP's inventory costs. The greater risks, it turned out, resided in four other, essentially hidden costs, which stemmed from mismatches between demand and supply: Component devaluation costs for components still held in production; Price protection costs incurred when product prices drop on the goods distributors still have on their shelves; Product return costs that have to be absorbed when distributors return and receive refunds on overstock items, and; Obsolescence costs for products still unsold when new models are introduced. By developing metrics to track those costs in a consistent way throughout the PC division, HP has found it can manage its supply chains with much more sophistication. Gone are the days of across-the-board measures such as,"Everyone must cut inventories by 20% by the end of the year," which usually resulted in a flurry of cookie-cutter lean production and just-in-time initiatives. Now, each product group is free to choose the supply chain configuration that best suits its needs. Other companies can follow HP's example.

  15. FOA Information from the Research Institute of Swedish National Defence on Electronic Warfare (FOA Orientar om Electronic Warfare),

    Science.gov (United States)

    1967-01-01

    modified. If it is appears as if the psychological It is hardly likely. however. known that the opponent has a warfare element involved there- that the most...34 . -roadeatla - ".-Rhdar Raa -* * - cldignsl Toi~loieey aft u comunication , ntavigation -ctionl Examples of applications Radar bands FroquaP" UMI 0.1

  16. Modified clay minerals efficiency against chemical and biological warfare agents for civil human protection.

    Science.gov (United States)

    Plachá, Daniela; Rosenbergová, Kateřina; Slabotínský, Jiří; Kutláková, Kateřina Mamulová; Studentová, Soňa; Martynková, Gražyna Simha

    2014-04-30

    Sorption efficiencies of modified montmorillonite and vermiculite of their mono ionic Na and organic HDTMA and HDP forms were studied against chemical and biological warfare agents such as yperite and selected bacterial strains. Yperite interactions with modified clay minerals were observed through its capture in low-density polyethylene foil-modified clay composites by measuring yperite gas permeation with using chemical indication and gas chromatography methods. The antibacterial activities of synthetized organoclays were tested against selected Gram-positive and Gram-negative bacterial species in minimum inhibitory concentration tests. The obtained results showed a positive influence of modified clay minerals on the significant yperite breakthrough-time increase. The most effective material was the polyethylene-Na form montmorillonite, while the polyethylene-Na form vermiculite showed the lowest efficiency. With increasing organic cations loading in the interlayer space the montmorillonite efficiency decreased, and in the case of vermiculite an opposite effect was observed. Generally the modified montmorillonites were more effective than modified vermiculites. The HDP cations seem to be more effective compare to the HDTMA. The antibacterial activity tests confirmed efficiency of all organically modified clay minerals against Gram-positive bacteria. The confirmation of antibacterial activity against Y. pestis, plague bacteria, is the most interesting result of this part of the study.

  17. Materials inventory management manual

    Science.gov (United States)

    1992-01-01

    This NASA Materials Inventory Management Manual (NHB 4100.1) is issued pursuant to Section 203(c)(1) of the National Aeronautics and Space Act of 1958 (42 USC 2473). It sets forth policy, performance standards, and procedures governing the acquisition, management and use of materials. This Manual is effective upon receipt.

  18. Calculating Optimal Inventory Size

    Directory of Open Access Journals (Sweden)

    Ruby Perez

    2010-01-01

    Full Text Available The purpose of the project is to find the optimal value for the Economic Order Quantity Model and then use a lean manufacturing Kanban equation to find a numeric value that will minimize the total cost and the inventory size.

  19. Chemical and biological warfare: General studies. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-10-01

    The bibliography contains citations concerning federally sponsored and conducted studies into chemical and biological warfare operations and planning. These studies cover areas not addressed in other parts of this series. The topics include production and storage of agents, delivery techniques, training, military and civil defense, general planning studies, psychological reactions to chemical warfare, evaluations of materials exposed to chemical agents, and studies on banning or limiting chemical warfare. Other published searches in this series on chemical warfare cover detection and warning, defoliants, protection, and biological studies, including chemistry and toxicology. (Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  20. Chemical and biological warfare: General studies. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-11-01

    The bibliography contains citations concerning federally sponsored and conducted studies into chemical and biological warfare operations and planning. These studies cover areas not addressed in other parts of this series. The topics include production and storage of agents, delivery techniques, training, military and civil defense, general planning studies, psychological reactions to chemical warfare, evaluations of materials exposed to chemical agents, and studies on banning or limiting chemical warfare. Other published searches in this series on chemical warfare cover detection and warning, defoliants, protection, and biological studies, including chemistry and toxicology.(Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  1. Cutaneous reactions in nuclear, biological and chemical warfare

    Directory of Open Access Journals (Sweden)

    Arora Sandeep

    2005-03-01

    Full Text Available Nuclear, biological and chemical warfare have in recent times been responsible for an increasing number of otherwise rare dermatoses. Many nations are now maintaining overt and clandestine stockpiles of such arsenal. With increasing terrorist threats, these agents of mass destruction pose a risk to the civilian population. Nuclear and chemical attacks manifest immediately while biological attacks manifest later. Chemical and biological attacks pose a significant risk to the attending medical personnel. The large scale of anticipated casualties in the event of such an occurrence would need the expertise of all physicians, including dermatologists, both military and civilian. Dermatologists are uniquely qualified in this respect. This article aims at presenting a review of the cutaneous manifestations in nuclear, chemical and biological warfare and their management.

  2. Stuxnet and Cyber-Warfare (1/2)

    CERN Document Server

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic. Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction.   NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  3. Stuxnet and Cyber-Warfare (2/2)

    CERN Document Server

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic.   Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction. The lecturer invites comments via email to Gian.Piero.Siroli@cern.ch NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  4. Russian and Chinese Information Warfare: Theory and Practice

    Science.gov (United States)

    2004-06-01

    Integral neurolinguistic programming •Placing essential programs into the conscious or sub- conscious mind •Subconscious suggestions that modify human...Generators of special rays •Optical systems • Neurolinguistic programming •Computer psychotechnology •The mass media •Audiovisual effects •Special effects...Information Warfare: Theory and Practice 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e

  5. Abraham Guillen: A Relevant Theory for Contemporary Guerrilla Warfare

    Science.gov (United States)

    2015-05-23

    guerrilla warfare. Biography Abraham Guillén was born in Guadalajara, Spain on 13 March 1913 and grew up in a peasant family that struggled to make a...Mao’s theory failed in the Philippines in 1954, Malaysia in 1960, and Thailand by 1970.47 Insurgencies influenced by Che’s theory fared even worse...legitimate and criminal business enterprises. The internet provides access to a wealth of information useful in planning attacks, virtual

  6. Just War and Postmodern Warfare: A German Case Study

    Science.gov (United States)

    2015-04-01

    unjust actions through intervention, guerrilla warfare, terrorism and other aspects of war. To analyze Michael Walzer’s theory of just and unjust ...power meld well with Walzer’s just and unjust war theory and serve a piece of postmodern equation; however, Wolff’s analysis of German foreign policy...between foreign military forces. Therefore, senior leaders must grapple with organizational considerations as well as postmodern challenges and

  7. Enterprises as Inquiring Systems with Implications for Information Warfare

    Science.gov (United States)

    2014-06-01

    defined as the “integrated employment of the core capabilities of electronic warfare, computer network operations, psychological operations, military...comprehension (also explicitly included in Figure 3). The entire spectrum of deception, psychological operations, and all means to impact human-centered...with the same input data (other than ground truth) via different channels and that data must be consistent within itself. The belief in empiricism to

  8. The Enemy Below: Preparing Ground Forces for Subterranean Warfare

    Science.gov (United States)

    2013-12-01

    can endanger the lives of U.S. forces and render mechanical breaching tools inoperable. Air blowers can be used as a hasty means to ventilate a... Penguin Books, 1996). 179 Tom Mangold, The Tunnels of Cu Chi (New York, NY: Random House, 1985). 147 6. A Historical Analysis of Tunnel Warfare and... Penguin Group, 1996. 157 Lester, W. G., & Ali, A. J. “Underground Combat: Stereophonic Blasting, tunnel Rats, and the Soviet-Afghan War.” Engineer

  9. China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence

    OpenAIRE

    2011-01-01

    This article presents three reasons for states to use cyber warfare and shows that cyberspace is—and will continue to be—a decisive element in China's strategy to ascend in the international system. The three reasons are: deterrence through infiltration of critical infrastructure; military technological espionage to gain military knowledge; and industrial espionage to gain economic advantage. China has a greater interest in using cyberspace offensively than other actors, such as the United St...

  10. USMC Electronic Warfare 2025: Trading Expertise for Advanced Technology

    Science.gov (United States)

    2011-04-15

    airborne electronic warlare during the transition period away from legacy equipment. EA-6B pilots and Electroilic Countermeasures Officers ( ECMOs ...Electronic Warfare (EW) capability. As an EA-6B Electronic Countenneasures Officer ( ECMO ), I anticipate that both the United States Marine Corps and all... ECMOs . An increased workload for Radio Battalion will have the same effect that the assumption of an additional function of Marine aviation will have on

  11. Built to Outlast: Operational Approaches to Hybrid Warfare

    Science.gov (United States)

    2012-05-17

    this approach lies between the nature of “aggressor forces” since MACV visualized an idealized form of conventional warfare to maximize the Army’s...conventional counteroffensive, with Westmoreland claiming that Johnson “ignored the maxim that when the enemy is hurting, you don’t diminish the...something I can put into the computer. Don’t give me your poetry .”194 This trend towards linearization and uniform solutions extended to MACV and

  12. Characterizing and Exploring the Implications of Maritime Irregular Warfare

    Science.gov (United States)

    2012-01-01

    recapture-ship-held-by-somali-pirates/19626852/ Gutman, Roy, Banana Diplomacy: The Making of American Policy in Nicaragua, 1981–1987, New York: Simon...Joint Special Operations Task Force–Philippines Public Affairs, “JSOTF-P Fact Sheet ,” April 1, 2009. Joint Warfighting Center, Irregular Warfare...Department of State, Bureau of Western Hemisphere Affairs, “Civilian Contractors and U.S. Military Personnel Supporting Plan Colombia,” fact sheet

  13. Constitution aims to bring an end to health economy warfare.

    Science.gov (United States)

    Harding, Mary-Louise; Martin, Daniel

    2005-02-10

    A rough new constitution is being drawn up for the NHS in a bid to prevent health economies sliding into bitter 'Bradford-style' warfare in the era of foundations trusts and payment by results. The rules of engagement are part of a package of measures designed to rescue some of the government's flagship reforms amid warnings from audit chiefs on the impact of PbR.

  14. Vendor-managed inventory

    DEFF Research Database (Denmark)

    Govindan, Kannan

    2013-01-01

    Vendor-managed inventory (VMI) represents the methodology through which the upstream stage of a supply chain (vendor) takes responsibility for managing the inventories at the downstream stage (customer) based on previously agreed limits. VMI is another method by which supply chains can be managed......, and, owing to centralised decision-making and constant information sharing, the benefits are much higher than in traditional supply chain case. However, there exists a lack of research that identifies the dimensions of VMI, benefits of VMI, methods, and levels used in the VMI environment. The focus...... the level-based classification. Based on the review, several recommendations that improve the performance of VMI are presented. © 2013 Copyright Taylor and Francis Group, LLC....

  15. Perishable Inventory Challenges

    DEFF Research Database (Denmark)

    Damgaard, Cecilie Maria; Nguyen, Vivi Thuy; Hvolby, Hans-Henrik

    2012-01-01

    The paper investigates how inventory control of perishable items is managed and line up some possible options of improvement. This includes a review of relevant literature dealing with the challenges of determining ordering policies for perishable products and a study of how the current procedure...... in the retail supply chains. The goal is to find and evaluate the parameters which affect the decision making process, when finding the optimal order quantity and order time. The paper takes a starting point in the retail industry but links to other industries.......The paper investigates how inventory control of perishable items is managed and line up some possible options of improvement. This includes a review of relevant literature dealing with the challenges of determining ordering policies for perishable products and a study of how the current procedures...

  16. Electronic Warfare:Issues and Challenges for Emitter Classification

    Directory of Open Access Journals (Sweden)

    Manish Gupta

    2011-04-01

    Full Text Available Electronic warfare (EW is an important capability that provides advantage to defence forces over their adversaries. Defence forces gather tactical intelligence through EW sensors, which provide the means to counter hostile actions of enemy forces. Functions of an EW system is threat detection and the area surveillance so as to determine the identity of surrounding emitters. Emitter classification system identifies possible threats by analysing intercepted signals. Problem of identifying emitters based on its intercepted signal characteristics is a challenging problem in electronic warfare studies. Major issues and challenges for emitter classification such as drifting of emitter parameters due to aging, operational characteristic of an emitter, i.e., same emitter can operate on multiple bands and multiple pulse repetition frequencies (PRFs are highlighted. A novel approach based on some well-known statistical methods, e.g., regression analysis, hypothesis testing, and discriminent analysis is proposed. The effectiveness of the proposed approach has been tested over ELINT (Electronic Intelligence data and illustrated using simulation data. The proposed approach can play a solution for wide variety of problems in emitter classification in electronic warfare studies.Defence Science Journal, 2011, 61(3, pp.228-234, DOI:http://dx.doi.org/10.14429/dsj.61.529

  17. Electronic Warfare: Rethinking the Importance of Its Role In Military Operations

    Science.gov (United States)

    2016-06-10

    electronic warfare support (ES). Electronic attack utilizes the radiation or re- radiation of electromagnetic energy, directed energy, electromagnetic ... electromagnetic energy, directed energy, or anti- radiation weapons to attack enemy personnel or facilities in order to degrade or destroy his... Electromagnetic Preparedness for Advanced Combat organization. USSTRATCOM also employs electronic warfare experts in its non-kinetic operations staff. The

  18. Status of dental health in chemical warfare victims: The case of Isfahan, Iran

    Directory of Open Access Journals (Sweden)

    Ahmad Mottaghi

    2012-01-01

    Conclusion: Chemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  19. Antidotes and treatments for chemical warfare/terrorism agents: an evidence-based review.

    Science.gov (United States)

    Rodgers, G C; Condurache, C T

    2010-09-01

    This article reviews the evidence supporting the efficacy of antidotes used or recommended for the potential chemical warfare agents of most concern. Chemical warfare agents considered include cyanide, vesicants, pulmonary irritants such as chlorine and phosgene, and nerve agents. The strength of evidence for most antidotes is weak, highlighting the need for additional research in this area.

  20. Cyber Warfare: China’s Strategy to Dominate in Cyber Space

    Science.gov (United States)

    2011-06-10

    Revolution.‖ 64Jason Fritz, ―How China will use cyber warfare to leapfrog in military competitiveness,‖ Culture Mandala : The Bulletin of the Centre for East...cyber warfare to leapfrog in military competitiveness.‖ Culture Mandala : The Bulletin of the Centre for East-West Culture and Economic Studies 8 no. 1

  1. Inventory of armourstone

    Directory of Open Access Journals (Sweden)

    Le Turdu Valéry

    2016-01-01

    Full Text Available Natural armourstone is widely used for hydraulic works, both in the coastal domain and in border of rivers and torrents, especially to protect against flood and the effects of waves and currents. To meet the expectations associated with this resource, an inventory of armourstone quarries was realized on a national scale in France. This inventory informs not only about the localization of quarries but also about the quality and the availability of materials. To fully optimize this inventory in a dynamic format, the association of all actors of the sector was preferred to archival research. This partnership approach led to project deliverables that can constitute durably a shared reference. The database can indeed be updated regularly thanks to the contacts established with the professionals of quarries. The access to this database is offered to a wide public: maritime and fluvial ports, local authorities in charge of planning and managing structures that protect against flood and other hydraulic hazards. This new database was organized considering its importance on the operational plan. This led to a hierarchical organization at two levels for each quarry face: first level, a synthesis sheet brings the essential information to realize choices upstream to the operational phases. Second level, a detailed specification sheet presents the technical characteristics observed in the past on the considered face. The atlas has two information broadcasting formats: a pdf file with browsing functions and a geographical information system that allows remote request of the database. These two media have their own updating rhythms, annual for the first and continue for the second.

  2. Denmark's National Inventory Report 2014

    DEFF Research Database (Denmark)

    Nielsen, Ole-Kenneth; Plejdrup, Marlene Schmidt; Winther, Morten;

    This report is Denmark’s National Inventory Report 2014. The report contains information on Denmark’s emission inventories for all years’ from 1990 to 2012 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2......This report is Denmark’s National Inventory Report 2014. The report contains information on Denmark’s emission inventories for all years’ from 1990 to 2012 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2...

  3. Energy Education Materials Inventory

    Energy Technology Data Exchange (ETDEWEB)

    1979-08-01

    The two volumes of the Energy Education Materials Inventory (EEMI) comprise an annotated bibliography of widely available energy education materials and reference sources. This systematic listing is designed to provide a source book which will facilitate access to these educational resources and hasten the inclusion of energy-focused learning experiences in kindergarten through grade twelve. EEMI Volume II expands Volume I and contains items that have become available since its completion in May, 1976. The inventory consists of three major parts. A core section entitled Media contains titles and descriptive information on educational materials, categorized according to medium. The other two major sections - Grade Level and Subject - are cross indexes of the items for which citations appear in the Media Section. These contain titles categorized according to grade level and subject and show the page numbers of the full citations. The general subject area covered includes the following: alternative energy sources (wood, fuel from organic wastes, geothermal energy, nuclear power, solar energy, tidal power, wind energy); energy conservation, consumption, and utilization; energy policy and legislation, environmental/social aspects of energy technology; and fossil fuels (coal, natural gas, petroleum). (RWR)

  4. Controlling Inventory: Real-World Mathematical Modeling

    Science.gov (United States)

    Edwards, Thomas G.; Özgün-Koca, S. Asli; Chelst, Kenneth R.

    2013-01-01

    Amazon, Walmart, and other large-scale retailers owe their success partly to efficient inventory management. For such firms, holding too little inventory risks losing sales, whereas holding idle inventory wastes money. Therefore profits hinge on the inventory level chosen. In this activity, students investigate a simplified inventory-control…

  5. Carbon Nanotubes: Detection of Chemical and Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    Om Kumar

    2008-09-01

    Full Text Available Discovery of carbon nanotubes has great impact on the development of newer methodologies and devicesuseful for the analysis of various types of chemicals. The functionalisation of CNTs with biomolecules relatedto chemical and biological warfare agents makes these useful for the detection of these agents. The detectionsensitivity can be increased manyfold. Various types of chemical and biological sensors were developed usingvarious type of carbon nanotubes as well as nano particles of different metals.Defence Science Journal, 2008, 58(5, pp.617-625, DOI:http://dx.doi.org/10.14429/dsj.58.1684

  6. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  7. Ultraviolet Raman scattering from persistent chemical warfare agents

    Science.gov (United States)

    Kullander, Fredrik; Wästerby, Pär.; Landström, Lars

    2016-05-01

    Laser induced Raman scattering at excitation wavelengths in the middle ultraviolet was examined using a pulsed tunable laser based spectrometer system. Droplets of chemical warfare agents, with a volume of 2 μl, were placed on a silicon surface and irradiated with sequences of laser pulses. The Raman scattering from V-series nerve agents, Tabun (GA) and Mustard gas (HD) was studied with the aim of finding the optimum parameters and the requirements for a detection system. A particular emphasis was put on V-agents that have been previously shown to yield relatively weak Raman scattering in this excitation band.

  8. Denmark's national inventory report 2006

    DEFF Research Database (Denmark)

    Illerup, Jytte Boll; Lyck, Erik; Nielsen, Ole-Kenneth;

    This report is Denmark's National Inventory Report reported to the Conference of the Parties under the United Nations Framework Convention on Climate Change (UNFCCC) due by April 2006. The report contains information on Denmark's inventories for all years' from 1990 to 2004 for CO....

  9. Denmark's National Inventory Report 2014

    DEFF Research Database (Denmark)

    Nielsen, Ole-Kenneth; Plejdrup, Marlene Schmidt; Winther, Morten

    This report is Denmark’s National Inventory Report 2014. The report contains information on Denmark’s emission inventories for all years’ from 1990 to 2012 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2...

  10. Denmark's National Inventory Report 2009

    DEFF Research Database (Denmark)

    Nielsen, Ole-Kenneth; Lyck, Erik; Mikkelsen, Mette Hjorth

    This report is Denmark's National Inventory Report 2009. The report contains information on Denmark's emission inventories for all years' from 1990 to 2007 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2. The report documents the methodology as well as presents activity data and emissi...

  11. Denmark's National Inventory Report 2010

    DEFF Research Database (Denmark)

    Nielsen, Ole-Kenneth; Lyck, Erik; Mikkelsen, Mette Hjorth

    2010-01-01

    This report is Denmark's National Inventory Report 2010. The report contains information on Denmark's emission inventories for all years' from 1990 to 2008 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2....

  12. Denmark's National Inventory Report 2013

    DEFF Research Database (Denmark)

    Nielsen, Ole-Kenneth; Plejdrup, Marlene Schmidt; Winther, Morten

    This report is Denmark’s National Inventory Report 2013. The report contains information on Denmark’s emission inventories for all years’ from 1990 to 2011 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2....

  13. Automation of Space Inventory Management

    Science.gov (United States)

    Fink, Patrick W.; Ngo, Phong; Wagner, Raymond; Barton, Richard; Gifford, Kevin

    2009-01-01

    This viewgraph presentation describes the utilization of automated space-based inventory management through handheld RFID readers and BioNet Middleware. The contents include: 1) Space-Based INventory Management; 2) Real-Time RFID Location and Tracking; 3) Surface Acoustic Wave (SAW) RFID; and 4) BioNet Middleware.

  14. Rhizosphere Bacteria

    Directory of Open Access Journals (Sweden)

    N.V. Feoktistova

    2016-06-01

    Full Text Available The review deals with the analysis of modern literature data on rhizosphere bacteria and their role in plant life. The structure of rhizosphere has been characterized. The role of plants as the centers of formation of microbial communities has been shown. Data on the main groups of microorganisms inhabiting the rhizosphere have been provided. The associative relationship between rhizobacteria and partner plants has been investigated. The modern concept of holobiont defined as the whole host plant organism and microorganisms associated with it has been reviewed. The role of rhizobacteria in the processes of nitrogen fixation has been discussed in detail. The mechanisms of direct stimulation of plant growth by biosynthesis of phytohormones, improvement of phosphorus and nitrogen nutrition, increase in resistance to stress, and stimulation mediated by antagonism against pathogenic microorganisms have been analyzed. The criteria for selection of rhizobacteria for practical purposes have been discussed.

  15. ANALYSIS MODEL FOR INVENTORY MANAGEMENT

    Directory of Open Access Journals (Sweden)

    CAMELIA BURJA

    2010-01-01

    Full Text Available The inventory represents an essential component for the assets of the enterprise and the economic analysis gives them special importance because their accurate management determines the achievement of the activity object and the financial results. The efficient management of inventory requires ensuring an optimum level for them, which will guarantee the normal functioning of the activity with minimum inventory expenses and funds which are immobilised. The paper presents an analysis model for inventory management based on their rotation speed and the correlation with the sales volume illustrated in an adequate study. The highlighting of the influence factors on the efficient inventory management ensures the useful information needed to justify managerial decisions, which will lead to a balancedfinancial position and to increased company performance.

  16. China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence

    Directory of Open Access Journals (Sweden)

    Magnus Hjortdal

    2011-01-01

    Full Text Available This article presents three reasons for states to use cyber warfare and shows that cyberspace is—and will continue to be—a decisive element in China's strategy to ascend in the international system. The three reasons are: deterrence through infiltration of critical infrastructure; military technological espionage to gain military knowledge; and industrial espionage to gain economic advantage. China has a greater interest in using cyberspace offensively than other actors, such as the United States, since it has more to gain from spying on and deterring the United States than the other way around. The article also documents China's progress in cyber warfare and shows how it works as an extension of its traditional strategic thinking and the current debate within the country. Several examples of cyber attacks traceable to China are also presented. This includes cyber intrusions on a nuclear arms laboratory, attacks on defense ministries (including the Joint Strike Fighter and an airbase and the U.S. electric grid, as well as the current Google affair, which has proved to be a small part of a broader attack that also targeted the U.S. Government. There are, however, certain constraints that qualify the image of China as an aggressive actor in cyberspace. Some believe that China itself is the victim of just as many attacks from other states. Furthermore, certain actors in the United States and the West have an interest in overestimating China's capabilities in cyberspace in order to maintain their budgets.

  17. Evanescent planar waveguide detection of biological warfare simulants

    Science.gov (United States)

    Sipe, David M.; Schoonmaker, Kenneth P.; Herron, James N.; Mostert, Michael J.

    2000-04-01

    An evanescent planar waveguide Mark 1.5 instrument was used to detect simulants of biological warfare agents; ovalbumin (OV), MS2 bacteriophage, BG, and Erwinia herbicola (EH). Polyclonal tracer antibodies were labeled with the fluorescent dye, Cy5. Discrete bands of polyclonal capture antibodies were immobilized to a polystyrene planar waveguide with molded integral lenses. An ST-6 CCD camera was used for detection. OV. MS2 and BG were detected in a simultaneous 3 by 3 array; with a total of nine measurements within 6 minutes. EH was analyzed in a separate array. Results were evaluate dat the US Army Joint Field Trials V, at the Dugway Proving Grounds. Over a 10 day period, 32 unknown samples were analyzed daily for each simulant. Detection limits: OV 10 ng/ml, MS2 107 pfu/ml, BG 105 cfu/ml. EH was detectable at 5 X 105 cfu/ml. Overall false positives were 3.0 percent. Therefore, the Mark 1.5 instrument, with a parallel array of detectors, evanescent flourescent excitation, and CCD imaging provides for rapid, sensitive, and specific detection of biological warfare agent simulants.

  18. The development of immunoassays for detection of chemical warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Lenz, D.E. [Army Medical Research Inst. of Chemical Defense, Aberdeen Proving Ground, MD (United States)

    1995-06-01

    With the advent of enzyme linked immunoabsorbant assays (ELISA) and monoclonal antibodies in the last two decades, there has been considerable effort devoted to the development of antibodies to detect and quantify low molecular weight toxic substances in environmental or biological fluids. Polyclonal antibodies against paraoxon (the toxic metabolite of parathion) were reported as capable of detecting paraoxon in body fluids at a level of 10{sup -9} M ({approximately}260 pg/mL) when used in a competitive inhibition enzyme immunoassay (CIEIA). Monoclonal antibodies developed against a structural analogue of the chemical warfare agent soman were capable of detecting soman in buffer solutions at a level of 10{sup -6} M ({approximately}180 ng/mL). In addition, these antibodies were highly specific for soman even in the presence of its major hydrolysis product. Subsequent studies with antisoman monoclonal antibodies reported an extension of the level of sensitivity to -80 ng/mL. Furthermore these antibodies did not cross react with other chemical warfare nerve agents such as sarin or tabun. In all cases, the time for a confirmatory test was two hours or less. Immunoassays for T-2 micotoxins have also been reported with a minimal detection range of 2 pg/assay to 50 ng/assay for the polyclonal and monoclonal T-2 antibodies respectively. These antibodies offer a sensitive, rapid and low cost approach to the diagnosis or detection of the presence of toxic chemical substances.

  19. Inventory of miscellaneous streams

    Energy Technology Data Exchange (ETDEWEB)

    Lueck, K.J.

    1995-09-01

    On December 23, 1991, the US Department of Energy, Richland Operations Office (RL) and the Washington State Department of Ecology (Ecology) agreed to adhere to the provisions of the Department of Ecology Consent Order. The Consent Order lists the regulatory milestones for liquid effluent streams at the Hanford Site to comply with the permitting requirements of Washington Administrative Code. The RL provided the US Congress a Plan and Schedule to discontinue disposal of contaminated liquid effluent into the soil column on the Hanford Site. The plan and schedule document contained a strategy for the implementation of alternative treatment and disposal systems. This strategy included prioritizing the streams into two phases. The Phase 1 streams were considered to be higher priority than the Phase 2 streams. The actions recommended for the Phase 1 and 2 streams in the two reports were incorporated in the Hanford Federal Facility Agreement and Consent Order. Miscellaneous Streams are those liquid effluents streams identified within the Consent Order that are discharged to the ground but are not categorized as Phase 1 or Phase 2 Streams. This document consists of an inventory of the liquid effluent streams being discharged into the Hanford soil column.

  20. INEEL Liquid Effluent Inventory

    Energy Technology Data Exchange (ETDEWEB)

    Major, C.A.

    1997-06-01

    The INEEL contractors and their associated facilities are required to identify all liquid effluent discharges that may impact the environment at the INEEL. This liquid effluent information is then placed in the Liquid Effluent Inventory (LEI) database, which is maintained by the INEEL prime contractor. The purpose of the LEI is to identify and maintain a current listing of all liquid effluent discharge points and to identify which discharges are subject to federal, state, or local permitting or reporting requirements and DOE order requirements. Initial characterization, which represents most of the INEEL liquid effluents, has been performed, and additional characterization may be required in the future to meet regulations. LEI information is made available to persons responsible for or concerned with INEEL compliance with liquid effluent permitting or reporting requirements, such as the National Pollutant Discharge Elimination System, Wastewater Land Application, Storm Water Pollution Prevention, Spill Prevention Control and Countermeasures, and Industrial Wastewater Pretreatment. The State of Idaho Environmental Oversight and Monitoring Program also needs the information for tracking liquid effluent discharges at the INEEL. The information provides a baseline from which future liquid discharges can be identified, characterized, and regulated, if appropriate. The review covered new and removed buildings/structures, buildings/structures which most likely had new, relocated, or removed LEI discharge points, and at least 10% of the remaining discharge points.

  1. Individual Pitch Control. Inventory

    Energy Technology Data Exchange (ETDEWEB)

    Van Engelen, T.G.; Van der Hooft, E.L. [ECN Wind Energy, Petten (Netherlands)

    2005-06-15

    The loads on the rotor blades, drive-train and tower of horizontal axis wind turbines are caused for a significant part by the rotational sampling of turbulence, the tower shadow and the windshear. These loads depend on the azimuthal blade position and are approximately periodic in (multiples of) the rotational speed. It seems attractive to just add pure azimuth dependent variations to the pitch angle of the individual blades. However, a small phase mismatch with respect to the tower shadow and windshear effect will cause higher instead of lower loads. Besides, the stochastic loads from the torationally sampled turbulence are not reduced at all. This inventory study concerns the design and potential of individual feedback pitch control for 3 bladed wind turbines. In this approach the danger of mismatch is avoided and the stochastic blade loads are also reduced. A simple design model is derived for the parametrisation of the feedback loops for individual pitch control around one time the rotational frequency (1p). Rainflow counts and power spectra obtained from time-domain simulations give an indication of the achievable reduction of loads. In addition, the concept of individual pitch control is extended to multiples of the rotational frequency (2p, 3p; multi-mode pitch control). Scoping calculations show a significant further reduction of blade loads as well as a reduction of 3p harmonics in tilt and yaw loads in the nacelle.

  2. Optimizing Armed Forces Capabilities for Hybrid Warfare – New Challenge for Slovak Armed Forces

    Directory of Open Access Journals (Sweden)

    Peter PINDJÁK

    2015-09-01

    Full Text Available The paper deals with the optimization of military capabilities of the Slovak Armed Forces for conducting operations in a hybrid conflict, which represents one of the possible scenarios of irregular warfare. Whereas in the regular warfare adversaries intend to eliminate the centers of gravity of each other, most often command and control structures, in irregular conflicts, the center of gravity shifts towards the will and cognitive perception of the target population. Hybrid warfare comprises a thoroughly planned combination of conventional military approaches and kinetic operations with subversive, irregular activities, including information and cyber operations. These efforts are often accompanied by intensified activities of intelligence services, special operation forces, and even mercenary and other paramilitary groups. The development of irregular warfare capabilities within the Slovak Armed Forces will require a progressive transformation process that may turn the armed forces into a modern and adaptable element of power, capable of deployment in national and international crisis management operations.

  3. Missed Opportunity? Was Iran s Green Movement an Unconventional Warfare Option?

    Science.gov (United States)

    2014-12-12

    UW options. UW doctrinal research remains primarily guerrilla warfare based with less emphasis on diplomacy , information, and economics activities... French intelligence sources claim Iran produced more low-enriched uranium than previously believed. April 2009 – Iranian President Ahmadinejad

  4. The Third World War? In The Cyberspace. Cyber Warfare in the Middle East.

    Directory of Open Access Journals (Sweden)

    Martina

    2014-06-01

    Full Text Available This article aims to provide a brief and comprehensive introduction to the issue of cyber warfare and to display the recent development in this area. Geographically, it focuses on the Middle East region, since the vast majority of the most important recent cyber attacks appeared just in there or were connected to it. The first part of the article tries to define the key notion of cyber warfare, compares it to the standard warfare and presents different types of cyber weapons that are known today. The second part points out examples of the most striking recent cyber attacks and uses them as evidences to demonstrate today's importance and dissemination of cyber warfare. Finally, the article sums up pros and cons of the cyber weapons and, in view of these, predicts a significant increase in their use in any future war conflicts.

  5. Microarthropods inventory in Cranendonck area

    OpenAIRE

    Jagers op Akkerhuis, G.A.J.M.; Dimmers, W.J.

    2014-01-01

    April 2006, microarthropod fauna inventory on former agricultural grasslands on sandy soil in Cranendonck area (and two reference sites) using a split-tube sampler. Subject of interest is organic matter

  6. Clinical Decision Support (CDS) Inventory

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Clinical Decision Support (CDS) Inventory contains descriptions of past and present CDS projects across the Federal Government. It includes Federal projects,...

  7. Severe Weather Data Inventory (SWDI)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Severe Weather Data Inventory (SWDI) is an integrated database of severe weather records for the United States. SWDI enables a user to search through a variety...

  8. Forest Inventory and Analysis Database

    Data.gov (United States)

    US Forest Service, Department of Agriculture — The Forest Inventory and Analysis (FIA) research program has been in existence since mandated by Congress in 1928. FIA's primary objective is to determine the...

  9. FEMA Flood Insurance Studies Inventory

    Data.gov (United States)

    Kansas Data Access and Support Center — This digital data set provides an inventory of Federal Emergency Management Agency (FEMA) Flood Insurance Studies (FIS) that have been conducted for communities and...

  10. Anadromous fish inventory: Summary volume

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — Summary volume, with discussion, on anadromous fish inventories, species lists, histories of fisheries, habitat, key spawning and rearing areas, runs/escapements,...

  11. Lepidoptera (Moth) Inventory: Region 1

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — National Wildlife Refuges protect important habitats for many plant and animal species. Refuge inventories have frequently included plants, birds and mammals, but...

  12. National Greenhouse Gas Emission Inventory

    Data.gov (United States)

    U.S. Environmental Protection Agency — The National Greenhouse Gas Emission Inventory contains information on direct emissions of greenhouse gases as well as indirect or potential emissions of greenhouse...

  13. Value-Based Inventory Management

    OpenAIRE

    Michalski, Grzegorz

    2008-01-01

    The basic financial purpose of a firm is to maximize its value. An inventory management system should also contribute to realization of this basic aim. Many current asset management models currently found in financial management literature were constructed with the assumption of book profit maximization as basic aim. However these models could lack what relates to another aim, i.e., maximization of enterprise value. This article presents a modified value-based inventory management model.

  14. ‘Lest we forget’*: a veteran and son share a ‘warfare tourism’ experience

    OpenAIRE

    Fallon, Paul; Robinson, Peter

    2016-01-01

    Warfare tourism’ represents an increasingly significant dimension of contemporary tourism. This paper provides a fresh perspective on participation in ‘warfare tourism’ by investigating the behaviour and experiences of a living veteran and his son returning to two theatres of war in which the veteran had served in the Royal Navy during the Second World War. Active interviews with the two family members were used to gather rich data regarding the two extended trips, which had been funded by ‘H...

  15. Estimated Chemical Warfare Agent Surface Clearance Goals for Remediation Pre-Planning

    Energy Technology Data Exchange (ETDEWEB)

    Dolislager, Frederick [University of Tennessee, Knoxville (UTK); Bansleben, Dr. Donald [U.S. Department of Homeland Security; Watson, Annetta Paule [ORNL

    2010-01-01

    Health-based surface clearance goals, in units of mg/cm2, have been developed for the persistent chemical warfare agents sulfur mustard (HD) and nerve agent VX as well as their principal degradation products. Selection of model parameters and critical receptor (toddler child) allow calculation of surface residue estimates protective for the toddler child, the general population and adult employees of a facilty that has undergone chemical warfare agent attack.

  16. Book Review: Conquest in Cyberspace: National Security and Information Warfare

    Directory of Open Access Journals (Sweden)

    Gary C. Kessler

    2007-06-01

    Full Text Available Libicki, M.C. (2007. Conquest in Cyberspace: National Security and Information Warfare. New York: Cambridge University Press. 323 pages, ISBN: 978-0-521-69214-4 (paper, US$80Reviewed by Gary C. Kessler (gary.kessler@champlain.eduMany books -- and even movies ("Live Free or Die Hard" -- are based upon the premise of an impending information war. In these scenarios -- made all too plausible by the increased frequency with which we read about and experience major information security incidents -- a Bad Guy exploits known computer security vulnerabilities in order to control major national infrastructures via the Internet so as to reap financial, economic, and/or personal power.(see PDF for full review

  17. RELATIONAL APPROACHES REGARDING FOCUSED LOGISTICS IN MODERN WARFARE JOINT OPERATIONS

    Directory of Open Access Journals (Sweden)

    Gheorghe MINCULETE

    2015-10-01

    Full Text Available The military joint operations of the future are characterized by large concentrations of forces and conventional means on the directions that permit the exploitation of the technological superiority and the manifestation of the offensive spirit of the commanders of the joint operation force groups. Having in mind the fact that the relation between the combatant forces and the logistic ones will shift more and more in favour of the latter, the aforementioned operations will be usually supported by modern flexible logistic structures. The constituted force groups will have a significant joint force character, ensuring superior quality of the troops’ combat training, both at individual level and collective level of units and large units. The current article presents innovative aspects of focused logistics, adapted for the modern warfare, which should be designed and achieved in order to increase the operational potential of the joint force groups.

  18. Respiratory Protection Against Chemical and Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    G.K. Prasad

    2008-09-01

    Full Text Available Chemical and biological warfare (CBW agents pose unavoidable threat, both to soldiers and civilians.Exposure to such deadly agents amidst the CBW agents contaminated environment can be avoided bytaking proper protective measures. Respiratory protection is indispensable when the soldiers or civiliansare surrounded by such deadly environment as contamination-free air is needed for respiration purposes.In this context, an attempt has been made to review the literature for the past five decades on developmentof various protective devices for respiratory protection against aerosols, gases, and vapours of CBWagents. This review covers structural, textural, and adsorption properties of materials used in gas filtersand mechanical filters for the removal of CBW agents.Defence Science Journal, 2008, 58(5, pp.686-697, DOI:http://dx.doi.org/10.14429/dsj.58.1692

  19. Methodology and biological monitoring of exposure to chemical warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Shih, M.L.; Smith, J.R.; McMonagle, J.D. [Army Medical Research Inst. of Chemical Defense, Aberdeen Proving Ground, MD (United States)

    1995-06-01

    In the past few years, our institute has developed several GC/MS methods for the detection of the breakdown products of toxic organophosphonates (soman, sarin, GF) and vesicant sulfur mustard in biological samples. Recently we developed a modified GC/MS method for VX and are continually working on the methodology for lewisite and tabun. The purpose is to have an analytical tool to verify the exposure of chemical warfare agents in humans. Analytical procedures for quantitating the hydrolyzed phosphonic acids from nerve agents in environmental samples have been reported by many analysts. For more complex matrices such as biological samples, there is not yet a method reported. To make these polar acids amenable to gas chromatographic analysis a prior derivatization is needed. We found the pentafluorobenzyl ester derivatives of the phosphonates are suitable for verification and pharmacokinetic studies in biological samples. This method may also serve as an alternative method for confirmation purposes in environmental samples.

  20. Agroterrorism, Biological Crimes, and Biological Warfare Targeting Animal Agriculture

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, Terry M.; Logan-Henfrey, Linda; Weller, Richard E.; Kellman, Brian

    2000-04-12

    There is a rising level of concern that agriculture might be targeted for economic sabotage by terrorists. Knowledge gathered about the Soviet Union biological weapons program and Iraq following the Gulf War, confirmed that animals and agricultural crops were targets of bioweapon development. These revelations are particularly disturbing in light of the fact that both countries are States Parties to the Biological and Toxin Weapons Convention that entered into force in 1975. The potential for misusing biotechnology to create more virulent pathogens and the lack of international means to detect unethical uses of new technologies to create destructive bioweapons is of increasing concern. Disease outbreaks, whether naturally occurring or intentionally, involving agricultural pathogens that destroy livestock and crops would have a profound impact on a country's infrastructure, economy and export markets. This chapter deals with the history of agroterrorism, biological crimes and biological warfare directed toward animal agriculture, specifically, horses, cattle, swine, sheep, goats, and poultry.

  1. 27 CFR 20.170 - Physical inventory.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Physical inventory. 20.170... Users of Specially Denatured Spirits Inventory and Records § 20.170 Physical inventory. Once in each... physical inventory of each formula of new and recovered specially denatured spirits. (Approved by...

  2. 10 CFR 39.37 - Physical inventory.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Physical inventory. 39.37 Section 39.37 Energy NUCLEAR... inventory. Each licensee shall conduct a semi-annual physical inventory to account for all licensed material received and possessed under the license. The licensee shall retain records of the inventory for 3...

  3. 27 CFR 40.523 - Inventories.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false Inventories. 40.523... Inventories. Every manufacturer of processed tobacco must provide a true and accurate inventory on TTB F 5210.9 in accordance with instructions for the form. The manufacturer must make such an inventory at...

  4. 27 CFR 19.353 - Storage inventories.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Storage inventories. 19..., DEPARTMENT OF THE TREASURY LIQUORS DISTILLED SPIRITS PLANTS Storage Inventories § 19.353 Storage inventories. Each warehouseman shall take a physical inventory of all spirits and wines held in the storage...

  5. 27 CFR 19.981 - Inventories.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Inventories. 19.981... Spirits § 19.981 Inventories. Proprietors shall take actual physical inventory of all spirits (including... § 19.988. The results of the inventory shall be posted in the applicable records required by §...

  6. 27 CFR 19.329 - Production inventories.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Production inventories. 19..., DEPARTMENT OF THE TREASURY LIQUORS DISTILLED SPIRITS PLANTS Production Inventories § 19.329 Production inventories. Each distiller shall take a physical inventory of the spirits and denatured spirits in tanks...

  7. 27 CFR 40.201 - Inventories.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false Inventories. 40.201... PROCESSED TOBACCO Operations by Manufacturers of Tobacco Products Inventories and Reports § 40.201 Inventories. Every manufacturer of tobacco products shall make true and accurate inventories on Form...

  8. 48 CFR 1845.508 - Physical inventories.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Physical inventories. 1845... Contractors 1845.508 Physical inventories. NASA contractors shall reconcile inventories with the official property records and submit reports to the property administrator within 30 days after inventory...

  9. Advances in toxicology and medical treatment of chemical warfare nerve agents

    Directory of Open Access Journals (Sweden)

    Moshiri Mohammd

    2012-11-01

    Full Text Available Abstract Organophosphorous (OP Nerve agents (NAs are known as the deadliest chemical warfare agents. They are divided into two classes of G and V agents. Most of them are liquid at room temperature. NAs chemical structures and mechanisms of actions are similar to OP pesticides, but their toxicities are higher than these compounds. The main mechanism of action is irreversible inhibition of Acetyl Choline Esterase (AChE resulting in accumulation of toxic levels of acetylcholine (ACh at the synaptic junctions and thus induces muscarinic and nicotinic receptors stimulation. However, other mechanisms have recently been described. Central nervous system (CNS depression particularly on respiratory and vasomotor centers may induce respiratory failure and cardiac arrest. Intermediate syndrome after NAs exposure is less common than OP pesticides poisoning. There are four approaches to detect exposure to NAs in biological samples: (I AChE activity measurement, (II Determination of hydrolysis products in plasma and urine, (III Fluoride reactivation of phosphylated binding sites and (IV Mass spectrometric determination of cholinesterase adducts. The clinical manifestations are similar to OP pesticides poisoning, but with more severity and fatalities. The management should be started as soon as possible. The victims should immediately be removed from the field and treatment is commenced with auto-injector antidotes (atropine and oximes such as MARK I kit. A 0.5% hypochlorite solution as well as novel products like M291 Resin kit, G117H and Phosphotriesterase isolated from soil bacterias, are now available for decontamination of NAs. Atropine and oximes are the well known antidotes that should be infused as clinically indicated. However, some new adjuvant and additional treatment such as magnesium sulfate, sodium bicarbonate, gacyclidine, benactyzine, tezampanel, hemoperfusion, antioxidants and bioscavengers have recently been used for OP NAs poisoning.

  10. A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios

    Directory of Open Access Journals (Sweden)

    Kathryn Merrick

    2016-07-01

    Full Text Available Our increasing dependence on information technologies and autonomous systems has escalated international concern for information- and cyber-security in the face of politically, socially and religiously motivated cyber-attacks. Information warfare tactics that interfere with the flow of information can challenge the survival of individuals and groups. It is increasingly important that both humans and machines can make decisions that ensure the trustworthiness of information, communication and autonomous systems. Subsequently, an important research direction is concerned with modelling decision-making processes. One approach to this involves modelling decision-making scenarios as games using game theory. This paper presents a survey of information warfare literature, with the purpose of identifying games that model different types of information warfare operations. Our contribution is a systematic identification and classification of information warfare games, as a basis for modelling decision-making by humans and machines in such scenarios. We also present a taxonomy of games that map to information warfare and cyber crime problems as a precursor to future research on decision-making in such scenarios. We identify and discuss open research questions including the role of behavioural game theory in modelling human decision making and the role of machine decision-making in information warfare scenarios.

  11. Technological, military and social causes for the application of cyber warfare

    Directory of Open Access Journals (Sweden)

    Dragan D. Mladenović

    2012-01-01

    Full Text Available Cyber warfare is a specific new form of military conflicts the use of which is growing rapidly in the international community. However, its nature is specific and differs from all previously known forms of warfare. For the purpose of clear understanding of the nature of cyber warfare, this paper covers the basic groups of preconditions for its broad application and fast development from technological, military and social aspects. Understanding the true nature of cyber warfare is a necessary condition for building national capacities for its application that are military justified and harmonized with the international law. The paper explores the characteristic instances of cyber warfare, ranging from information propaganda to physical destruction, with the goal to determine guidelines for the possible development of cyber capacities at the national level. Based on the analysis of previous cyber warfare cases, a prediction of future development directions is made and the necessity to apply suitable methods and techniques for defense against them is analyzed.

  12. Platform-level Distributed Warfare Model-based on Multi-Agent System Framework

    Directory of Open Access Journals (Sweden)

    Xiong Li

    2012-05-01

    Full Text Available The multi-agent paradigm has become a useful tool in solving military problems. However, one of key challenges in multi-agent model for distributed warfare could be how to describe the microcosmic  tactical warfare platforms actions. In this paper, a platform-level distributed warfare model based on multi-agent system framework is designed to tackle this challenge. The basic ideas include:  Establishing multi-agent model by mapping from tactical warfare system’s members, i.e., warfare platforms, to respective agents; performing task decomposition and task allocation by using task-tree decomposition method and improved contract net protocol model technique; and implementing simulation by presenting battlefield terrain environment analysis algorithm based on grid approach. The  simulation demonstration results show that our model provides a feasible and effective approach to supporting the abstraction and representation of microcosmic tactical actions for complex warfare system.Defence Science Journal, 2012, 62(1, pp.180-186, DOI:http://dx.doi.org/10.14429/dsj.62.964

  13. Looming Threat of Chemical and Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    A.K. Goel

    2016-09-01

    Full Text Available In the recent past, a dramatic shift has been observed in the strategies of warfare from conventional to non-conventional. Now-a-days, traditional power is of less importance than it used to be earlier. Weapons of mass destruction, which comprise of nuclear weapons, and chemical and biological warfare agents, are posing a great peril to the world due to their devastating potential. Though, there are several bilateral as well as multilateral treaties to control the use and proliferation of these weapons, yet the risk of use of such agents by non-state actors cannot be overlooked. Chances of use of chemical and biological agents are more likely than the nuclear weapons. A comparison of nuclear, chemical and biological weapons in terms of technology, cost, signature, effectiveness on protected and un-protected troops shows that chemical and biological weapon programmes require much lower level of technology and cost than the nuclear weapon programme. Further, there is no or least distinctive and readily observable signature in biological weapon programme in comparison to nuclear and chemical weapon facilities. There can be two possibilities of use of these agents in terrorist attacks. First, there is a risk of transfer of material or know-how of these weapons to terrorists for using against the adversaries and second, the risk of these agents being pilfered due to poor security, thereby sabotaging the national security. The International Committee of Red Cross in February 1918 reckoned these agents as ‘barbarous inventions’ that can ‘only be called criminal’.

  14. Editorial: Discovery from Lake Turkana and History of Human Warfare

    Directory of Open Access Journals (Sweden)

    Professor S. P. Singh, Ph.D.

    2016-02-01

    Full Text Available Very interesting finds have come to light of violently killed humans from Lake Turkana in the Kenyan Rift Valley around 10000 years ago. A stunning discovery of skeletons of 27 persons who are believed to have been killed at the same time and are supposed to have suffered violent wounds has been reported recently (Nature 529, 394–398, 21 January 2016. These finds belong to a period of late Pleistocene/early Holocene of the hunter-gatherer societies from Nataruk. Among the victims were men, women and children. The individuals were killed with projectiles and blunt weapons. These skeletons were found in the lagoon and were preserved very nicely. Such type of mass killing probably could never happen as a consequence of intra-group conflict. The evidence seems to be towards warfare and aggression in ancient societies. The experts ruled out the possibility of a cemetery and ceremonial burial. This discovery of 27 skeletons points to the fact that there may have been more causalities and many individuals might have escaped death at that time. According to one of the co-authors of this research Dr. R.A. Foley, the groups were elatively more densely packed populations than the hunter gatherers and had more chances of having inter-group conflicts because of sharing the resources which would have been plentiful near the lagoons and water bodies. Violence probably has been in the instinct of early humans and that the warfare among humans has a history of 10000 years or even earlier.

  15. LIDAR for Detection of Chemical and Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    S Veerabuthiran

    2011-04-01

    Full Text Available Remote detection of chemical and biological warfare agents and toxic gases in the atmosphere is of current interest to both the military and civilian agencies. Out of all currently available techniques, no single technique provides efficient detection against such threats at significant standoff distances. Light detection and ranging (LIDAR technologies, based on the transmission of laser pulses and analysis of the return signals, have demonstrated impressive capabilities in remote detection of such toxic chemicals. LIDAR is a highly sensitive tool to detect the extremely low concentrations of various toxic agents present in the form of thin clouds at distances of few kilometer. The detection of these toxic clouds is based on the approach of first detecting and measuring the range of the clouds using the scattering phenomena and subsequently identifying the composition of toxic clouds using absorption and fluorescence phenomena. Laser Science and Technology Centre (LASTEC, Delhi has been working on the design and development of LIDAR systems for detection of chemical and biological warfare (CBW agents. In this paper, theoretical analysis of differential absorption LIDAR (DIAL for detection of chemical agents and fluorescence LIDAR for detection of biological agents has been discussed. For some typical parametric conditions, the received power levels from different ranges to detect specific concentrations of chemical or biological clouds have been computed and discussed. The technical details of the indigenously developed backscattering LIDAR, which detects and measures the distance of cloud layers up to 5 km is also presented.Defence Science Journal, 2011, 61(3, pp.241-250, DOI:http://dx.doi.org/10.14429/dsj.61.556

  16. The development of immunoassays for detection of chemical warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Lenz, D.E.; Brimfield, A.A.; Cook, L. [Army Medical Research Institute of Chemical Defense, Aberdeen Proving Ground, MD (United States)

    1996-10-01

    With the advent of enzyme linked immunoabsorbent assays (ELISA) and monoclonal antibodies in the last two decades, there has been considerable effort devoted to the development of antibodies to detect and quantify low molecular weight toxic substances in environmental or biological fluids. Polyclonal antibodies against paraoxon (the toxic metabolite of parathion) were capable of detecting paraoxon in body fluids at a level of 10{sup -9} M ({approximately}260 pg/mL) when used in a competitive inhibition enzyme immunoassay (CIEIA). Monoclonal antibodies developed against a structural analogue of the chemical warfare agent soman were capable of detection soman in buffer solutions at a level of 10{sup -6} M ({approximately}180 ng/mL). In addition these antibodies were found to be highly specific for soman even in the presence of its major hydrolysis product. Subsequent studies with antisoman monoclonal antibodies extended the level of sensitivity to {approximately}80 ng/mL. Furthermore these antibodies did not cross react with other chemical warfare nerve agents such as sarin or tabun. In all cases, the time for a confirmatory test was two hours or less. Immunoassays for T-2 micotoxins have also been reported with a minimal detection range of 2 pg/assay to 50 ng/assay for the polyclonal and monoclonal T-2 antibodies respectively. These reagents offer a sensitive, rapid and low cost approach to the diagnosis or detection of the presence of toxic chemical substances. More recent efforts have focussed on developing antibodies specific for sulfur mustard a highly reactive vesicating agent.

  17. Recognition Inventories in Governmental Sector Accounting

    OpenAIRE

    Nataliya Pryadka

    2013-01-01

    The Study covers the research of conditions for recognition of inventories in the governmental sector accounting. The comparative analysis has been performed as to the inventories recognition criteria provided by the National Accounting Provisions (Standards) 123 in the public sector - 'Inventories', Accounting Provision (Standard) 9 - 'Inventories', International Accounting Standard 16 - 'Inventories' in the public sector. It has been found that the common characteristic, in accordance with ...

  18. Peru Mercury Inventory 2006

    Science.gov (United States)

    Brooks, William E.; Sandoval, Esteban; Yepez, Miguel A.; Howard, Howell

    2007-01-01

    In 2004, a specific need for data on mercury use in South America was indicated by the United Nations Environmental Programme-Chemicals (UNEP-Chemicals) at a workshop on regional mercury pollution that took place in Buenos Aires, Argentina. Mercury has long been mined and used in South America for artisanal gold mining and imported for chlor-alkali production, dental amalgam, and other uses. The U.S. Geological Survey (USGS) provides information on domestic and international mercury production, trade, prices, sources, and recycling in its annual Minerals Yearbook mercury chapter. Therefore, in response to UNEP-Chemicals, the USGS, in collaboration with the Economic Section of the U.S. Embassy, Lima, has herein compiled data on Peru's exports, imports, and byproduct production of mercury. Peru was selected for this inventory because it has a 2000-year history of mercury production and use, and continues today as an important source of mercury for the global market, as a byproduct from its gold mines. Peru is a regional distributor of imported mercury and user of mercury for artisanal gold mining and chlor-alkali production. Peruvian customs data showed that 22 metric tons (t) of byproduct mercury was exported to the United States in 2006. Transshipped mercury was exported to Brazil (1 t), Colombia (1 t), and Guyana (1 t). Mercury was imported from the United States (54 t), Spain (19 t), and Kyrgyzstan (8 t) in 2006 and was used for artisanal gold mining, chlor-alkali production, dental amalgam, or transshipment to other countries in the region. Site visits and interviews provided information on the use and disposition of mercury for artisanal gold mining and other uses. Peru also imports mercury-containing batteries, electronics and computers, fluorescent lamps, and thermometers. In 2006, Peru imported approximately 1,900 t of a wide variety of fluorescent lamps; however, the mercury contained in these lamps, a minimum of approximately 76 kilograms (kg), and in

  19. Annual Danish emissions inventory report to UNECE. Inventory 1990 - 2002

    Energy Technology Data Exchange (ETDEWEB)

    Illerup, J.B.; Nielsen, M.; Winther, M.; Hjort Mikkelsen, M.; Lyck, E.; Hoffmann, L.; Fauser, P.

    2004-05-01

    This report is a documentation report on the emission inventories for Denmark as reported to the UNECE Secretariat under the Convention on Long Range Transboundary Air Pollution due by 15 February 2004. The report contains information on Denmark's emission inventories regarding emissions of (1) SOx for the years 1980-2002, (2) NOx, CO, NMVOC and NH{sub 3} for the years 1985-2002; (3) Particulate matter: TSP, PM10, PM2.5 for the years 2000-2002, (4) Heavy Metals: Pb, Cd, Hg, As, Cr, Cu, Ni, Se and Zn for the years 1990-2002, and (5) Polyaromatic hydrocarbons (PAH): Benzo(a)pyrene, benzo(b)fluoranthene, benzo(k)fluoranthene and indeno(1,2,3-cd)pyrene for the years 1990-2002. Furthermore, the report contains information on background data for emissions inventory. (au)

  20. Environmental Monitoring, Water Quality - BACTERIA_MONITORING_EPA_IN: Bacteria Monitoring Stations and Data Summaries in Indiana, Derived from EPA BASINS 3 (United States Environmental Protection Agency, 1:45,000, Point Shapefile)

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — BACTERIA_MONITORING_EPA_IN is a point shapefile developed by the USEPA BASINS 3.0 program and edited by Bernardin, Lochmueller and Associates. Joinable tables must...

  1. Application of Antibiotic on Sea Warfare Wound in Marine Environment%抗生素在海上环境下海战伤中的应用

    Institute of Scientific and Technical Information of China (English)

    张贞良; 贺顺龙; 谢培增; 汪先兵

    2011-01-01

    Objective To study an appropriate anti-inflammation treatment strategy on sea warfare wound in ma-rine environment Methods Animal model of combined sea warfare wound in marine environment was established in 40 mongrel dogs. The dogs were randomly divided into control group and treatment group. The control group accepted rou-tine cefodizime treatment, and the treatment group accepted cefodizime plus levofloxacin treatment The treatment on sea warfare wound was the same in both groups. The gross condition was observed and bacteriological strains in the wound were cultured and antibiotic sensitivity was tested at 2 and 4 days after the wound. Wound infection rate and mortality were observed at the sixth day. Results The infection rate within six days was 50% in the control group, and 10% in treatment group, and the mortality was 60% and 20% respectively. These rates were significantly lower in the treatment group than those in the control group (P<0. 01). The constituent ratio of vibrion in the treatment group was lower than that in the control group (P<0. 01). Conclusion There are many species of bacteria with wide distribution in South China Sea which mainly includes vibrionaceaes, staphylococcus and escherichia. These bacteria are the main causes leading to sea warfare wound infection. To deal with the sea warfare wound in marine environment, the early and complete debride-ment, and the early application of broadspectrum and anti-vibrion antibiotics should be emphasized.%目的 探讨抗生素在海上环境下海战伤中的有效应用.方法 选取40只成年杂种犬,制作海上环境下海水浸泡复合火器伤动物模型.随机将动物分成对照组和治疗组,每组20只犬.对照组采用头孢地嗪治疗,治疗组头孢地嗪加左氧氟沙星治疗.海战伤的其他处理方法相同.在伤后第2和第4天进行细菌培养与药敏试验,观察6天伤口感染率、死亡率.结果 伤后6天,对照组的伤口感染率为500,治疗组为10

  2. Passive front-ends for wideband millimeter wave electronic warfare

    Science.gov (United States)

    Jastram, Nathan Joseph

    This thesis presents the analysis, design and measurements of novel passive front ends of interest to millimeter wave electronic warfare systems. However, emerging threats in the millimeter waves (18 GHz and above) has led to a push for new systems capable of addressing these threats. At these frequencies, traditional techniques of design and fabrication are challenging due to small size, limited bandwidth and losses. The use of surface micromachining technology for wideband direction finding with multiple element antenna arrays for electronic support is demonstrated. A wideband tapered slot antenna is first designed and measured as an array element for the subsequent arrays. Both 18--36 GHz and 75--110 GHz amplitude only and amplitude/phase two element direction finding front ends are designed and measured. The design of arrays using Butler matrix and Rotman lens beamformers for greater than two element direction finding over W band and beyond using is also presented. The design of a dual polarized high power capable front end for electronic attack over an 18--45 GHz band is presented. To combine two polarizations into the same radiating aperture, an orthomode transducer (OMT) based upon a new double ridge waveguide cross section is developed. To provide greater flexibility in needed performance characteristics, several different turnstile junction matching sections are tested. A modular horn section is proposed to address flexible and ever changing operational requirements, and is designed for performance criteria such as constant gain, beamwidth, etc. A multi-section branch guide coupler and low loss Rotman lens based upon the proposed cross section are also developed. Prototyping methods for the herein designed millimeter wave electronic warfare front ends are investigated. Specifically, both printed circuit board (PCB) prototyping of micromachined systems and 3D printing of conventionally machined horns are presented. A 4--8 GHz two element array with

  3. Guerilla Warfare & Law Enforcement: Combating the 21st Century Terrorist Cell within the U.S.

    Directory of Open Access Journals (Sweden)

    Major Richard Hughbank

    2009-01-01

    Full Text Available Both domestic and international terrorist organizations employ guerrilla warfare tactics, techniques, and procedures. Thus, the ability to identify and defeat the members of these organizations, cripple their infrastructures, and disrupt their financial resources lies in the understanding of modern guerrilla warfare as it develops in the twenty-first century within the United States.3 The forms of asymmetric warfare4 adopted by domestic and international terrorist groups alike is no longer intended to gain simple media exposure or governmental manipulation; they want to make an overpowering impact by causing massive loss of life and severe damage to infrastructure and are often motivated by religious imperatives and political goals. As terrorism analyst Stephen Flynn has observed, "Throughout the 20th century [Americans] were able to treat national security as essentially an out-of-body experience. When confronted by threats, [America] dealt with them on the turf of our allies or our adversaries. Aside from the occasional disaster and heinous crime, civilian life [in the United States] has been virtually terror-free." With the turn of the twenty-first century, terrorist operations have become more prevalent in the United States and are taking shape in the form of modern guerrilla warfare, thus creating new challenges for federal, state, and local law enforcement agencies. After reviewing the origin and nature of these challenges, this article will offer some suggestions for countering guerilla warfare in the United States.

  4. Treatability study report for remediation of chemical warfare agent contaminated soils using peroxysulfate ex-situ treatment. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Pugh, J.R.; Grinstead, J.H.; Farley, J.A.; Enlow, P.D.; Kelly, D.A.

    1996-07-01

    This laboratory scale study examines the feasibility of using peroxysulfate based oxidants to remediate soils contaminated with GB, Hi, and VX. The project was conducted with chemical warfare agent simulants. The study concludes that peroxysulfates, and particularly peroxydisulfate, can degrade chemical warfare agent simulants in soil and recommends continuing research.

  5. Inventory non-conventional gas

    Energy Technology Data Exchange (ETDEWEB)

    Muntendam-Bos, A.G.; Wassing, B.B.T.; Ter Heege, J.H.; Van Bergen, F.; Schavemaker, Y.A.; Van Gessel, S.F.; De Jong, M.L.; Nelskamp, S.; Van Thienen-Visser, K.; Guasti, E.; Van den Belt; Marges, V.C. [TNO Built Environment and Geosciences, Utrecht (Netherlands)

    2009-10-15

    This report describes the results of the inventory for each non-conventional gas resource expected to be present in the Netherlands, which are: Tight Gas, Shallow gas, Coal bed Methane (CBM), Shale gas, Basin Centered Gas, Aquifer Gas and Stratigraphic traps.

  6. Prevalence of Asthma in Children of Chemical Warfare Victims

    Science.gov (United States)

    Mirsadraee, Majid; Mozaffari, Abolfazl; Attaran, Davood

    2011-01-01

    Objective Exposure of DNA to sulfur mustard gas may increase the inheritance of asthma in chemical warfare victims' (CWV) offspring. The objective of this study was to determine the prevalence of asthma in children of CWV and compare it to asthmatic children in the general population. Methods Four hundred and nine children from 130 CWV fathers and 440 children from 145 asthmatic parents from two cities in Iran participated in this study. The prevalence of asthma was determined by standard questionnaire released for epidemiological survey of asthma in children and compared between two groups. Findings The prevalence of asthma in the CWV group was 15%; this was not significantly different from the control group (12.5%). The children of the CWV group reported a significantly greater incidence of wheezing (1.2±3.1 attacks) per year, but the control group reported more severe attacks leading to speech difficulties (3%) and coughing (7%). Regression analysis showed that with increasing family size in the control group, the number of subjects suffering from asthmatic symptoms decreases significantly (r=0.86, P=0.001). Conclusion Chemical agents may increase the prevalence of asthma in the offspring of CWV. PMID:23056804

  7. Drone Warfare: Twenty-First Century Empire and Communications

    Directory of Open Access Journals (Sweden)

    Kevin Howley

    2017-02-01

    Full Text Available This paper, part of a larger project that examines drones from a social-construction of technology perspective, considers drone warfare in light of Harold Innis’s seminal work on empire and communication. Leveraging leading-edge aeronautics with advanced optics, data processing, and networked communication, drones represent an archetypal “space-biased” technology. Indeed, by allowing remote operators and others to monitor, select, and strike targets from half a world away, and in real-time, these weapon systems epitomize the “pernicious neglect of time” Innis sought to identify and remedy in his later writing. With Innis’s time-space dialectic as a starting point, then, the paper considers drones in light of a longstanding paradox of American culture: the impulse to collapse the geographical distance between the United States and other parts of the globe, while simultaneously magnifying the cultural difference between Americans and other peoples and societies. In the midst of the worldwide proliferation of drones, this quintessentially sublime technology embodies this (disconnect in important, profound, and ominous ways.

  8. Back to the future: aerial warfare in Libya

    Directory of Open Access Journals (Sweden)

    João Paulo Nunes Vicente

    2013-05-01

    Full Text Available A century after the first air bomb mission, a new intervention in the same geographic space has made evident the changes in Airpower. The Aerial Warfare in Libya has radically changed the civil war, complying with a UN mission to protect Libyan population, imposing a no-fly zone and an arms embargo. Therefore, Operation Unified Protector became one of the most successful campaigns in the history of NATO. We aim to assess the operational efficiency of Airpower in the conflict in Libya, focusing on the challenges of a War essentially Aerial. Despite the military results and the fact that some political objectives were met, we can identify some concerning trends that, if not shifted, may negatively influence future NATO operations. We do not aim to draw general and universal conclusions on the strategic value of Airpower based on the analysis of a specific case. Above all, we focus on identifying some lessons which have influenced OUP operational efficiency. Thus, we must analyze some factors, such as the scope of objectives, the type of opposing action and aerial strategy used by the coalition and then focus on the challenges arising from the OUP.

  9. Research on performance of ethernet interface in network centric warfare

    Institute of Scientific and Technical Information of China (English)

    梁永生; 张乃通

    2004-01-01

    The concept of network centric warfare (NCW) and its character, high requirement of real-time synchronization are introduced. The distributed equal-node network architecture in NCW is presented. Based on theoretical analysis on ethernet interface performance, this paper presents that forwarding latency between ethernet interface devices is a key influence factor of real-time synchronization in NCW. Ethernet fundamental is briefly introduced. The model between a switch under test (SUT) and a smartbits card is presented and used for two interconnecting switches in NCW. On condition that ignoring the latency of connecting fiber or twisted pairs and processing latency of the smartbits test system, this paper presents that clock frequency tolerance (CFT) between a SUT and a smartbits card is a leading influence factor of forwarding latency of an ethernet switch. The formulae to calculate internal forwarding latency and forwarding latency caused by its CFT are deduced. Theoretical calculation on forwarding latency of an ethernet switch based on the given CFT and test time is implemented. Experimental study on primary forwarding latency and secondary forwarding latency is implemented and forwarding latency between the SUT and the smartbits card is measured, thus testifying the accuracy of the above theoretical analysis that the CFT is a key influence factor of forwarding latency. The measures to satisfy the needs of forwarding latency in NCW are presented.

  10. Human scalp permeability to the chemical warfare agent VX.

    Science.gov (United States)

    Rolland, P; Bolzinger, M-A; Cruz, C; Briançon, S; Josse, D

    2011-12-01

    The use of chemical warfare agents such as VX in terrorism act might lead to contamination of the civilian population. Human scalp decontamination may require appropriate products and procedures. Due to ethical reasons, skin decontamination studies usually involve in vitro skin models, but human scalp skin samples are uncommon and expensive. The purpose of this study was to characterize the in vitro permeability to VX of human scalp, and to compare it with (a) human abdominal skin, and (b) pig skin from two different anatomic sites: ear and skull roof, in order to design a relevant model. Based on the VX skin permeation kinetics and distribution, we demonstrated that (a) human scalp was significantly more permeable to VX than abdominal skin and (b) pig-ear skin was the most relevant model to predict the in vitro human scalp permeability. Our results indicated that the follicular pathway significantly contributed to the skin absorption of VX through human scalp. In addition, the hair follicles and the stratum corneum significantly contributed to the formation of a skin reservoir for VX.

  11. Ottawa National Wildlife Refuge : Wildlife Inventory Plan

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This Wildlife Inventory Plan for Ottawa NWR describes the inventory program’s relation to Refuge objectives and outlines the program’s policies and administration....

  12. Inventory on cleaner production education and training

    DEFF Research Database (Denmark)

    Jørgensen, Michael Søgaard; Pöyry, Sirkka; Huisingh, Donald;

    Analysis and presentation of the data from an international inventory on cleaner production education and training......Analysis and presentation of the data from an international inventory on cleaner production education and training...

  13. CoC Housing Inventory Count Reports

    Data.gov (United States)

    Department of Housing and Urban Development — Continuum of Care (CoC) Homeless Assistance Programs Housing Inventory Count Reports are a snapshot of a CoC’s housing inventory, available at the national and state...

  14. Inventory Plan : St. Vincent National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The inventory procedures outlined in this plan represent a cost effective inventory of the wildlife populations on St. Vincent National Wildlife Refuge. Winter...

  15. Lake Mason : FWS rangeland inventory assessment

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — In September 2013, The Lake Mason Unit owned by U.S. Fish and Wildlife Service was inventoried for rangeland health and production. The purpose of the inventory was...

  16. The Trail Inventory of Aransas [Cycle 2

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of this report is to create a baseline inventory of all non-motorized trails on Aransas National Wildlife Refuge. Trails in this inventory are eligible...

  17. Wildlife Inventory Plan : Malheur National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This Wildlife Inventory Plan for Malheur NWR summarizes Refuge objectives, policies on wildlife inventory procedures, biological habitat units, physical facility...

  18. Simulation Tool for Inventory Models: SIMIN

    OpenAIRE

    Pratiksha Saxen; Tulsi Kushwaha

    2014-01-01

    In this paper, an integrated simulation optimization model for the inventory system is developed. An effective algorithm is developed to evaluate and analyze the back-end stored simulation results. This paper proposes simulation tool SIMIN (Inventory Simulation) to simulate inventory models. SIMIN is a tool which simulates and compares the results of different inventory models. To overcome various practical restrictive assumptions, SIMIN provides values for a number of performance measurement...

  19. Bleach vs. Bacteria

    Science.gov (United States)

    ... Articles | Inside Life Science Home Page Bleach vs. Bacteria By Sharon Reynolds Posted April 2, 2014 Your ... hypochlorous acid to help kill invading microbes, including bacteria. Researchers funded by the National Institutes of Health ...

  20. Bacteria and lignin degradation

    Institute of Scientific and Technical Information of China (English)

    Jing LI; Hongli YUAN; Jinshui YANG

    2009-01-01

    Lignin is both the most abundant aromatic (phenolic) polymer and the second most abundant raw material.It is degraded and modified by bacteria in the natural world,and bacteria seem to play a leading role in decomposing lignin in aquatic ecosystems.Lignin-degrading bacteria approach the polymer by mechanisms such as tunneling,erosion,and cavitation.With the advantages of immense environmental adaptability and biochemical versatility,bacteria deserve to be studied for their ligninolytic potential.

  1. SiGe-based re-engineering of electronic warfare subsystems

    CERN Document Server

    Lambrechts, Wynand

    2017-01-01

    This book equips readers with a thorough understanding of the applicability of new-generation silicon-germanium (SiGe) electronic subsystems for the military purposes of electronic warfare and defensive countermeasures. The theoretical and technical background is extensively explained and all aspects of the integration of SiGe as an enabling technology for maritime, land, and airborne (including space) electronic warfare are addressed, including research, design, development, and implementation. The coverage is supported by mathematical derivations, informative illustrations, practical examples, and case studies. While SiGe technology provides speed, performance, and price advantages in many markets, sharing of information on its use in electronic warfare systems has to date been limited, especially in developing nations. This book will therefore be warmly welcomed as an engineering guideline that focuses especially on the speed and reliability of current-generation SiGe circuits and highlights emerging innov...

  2. The United States and biological warfare: secrets from the early cold war and Korea.

    Science.gov (United States)

    Bruwer, A

    2001-01-01

    The United States and Biological Warfare is about accusations that the United States resorted to bacteriological warfare at a time of great military stress during the Korean War. In December 1951, the then US Secretary of Defense ordered early readiness for offensive use of biological weapons. Soon afterwards, the North Korean and Chinese armies accused the United States of starting a large-scale biological warfare experiment in Korea. The US State Department denied the accusation. Both parties to the dispute maintain their positions today. The authors spent 20 years researching the accusations in North America, Europe and Japan. They were the first foreigners to be given access to Chinese classified documents. The reader is also introduced to the concept of 'plausible denial', an official US policy which allowed responsible governmental representatives to deny knowledge of certain events. The authors hope that their work will contribute to the understanding of a time when modern war expanded into a new type of violence.

  3. THE CYBER DIMENSION OF MODERN HYBRID WARFARE AND ITS RELEVANCE FOR NATO

    Directory of Open Access Journals (Sweden)

    Sorin DUCARU

    2016-06-01

    Full Text Available The technological development and the instant communication possibilities advanced not only economic and social developments, but also evolving threats from those who exploit the vulnerabilities of communication and information systems. The cyber threat landscape points to a significant increase of the frequency, intensity, duration and sophistication of cyber-attacks. One of the new and concerning trends is the use of cyber capabilities in relation with military of hybrid operations – the so-called cyber dimension of hybrid warfare. NATO’s strategy on countering hybrid warfare is based on the triad: prepare-deter-defend, which also applies to cyber. Nations represent the first line of defence in countering hybrid strategies. International cooperation is also a key factor in this sense. It is in this context that NATO’s response to cyber-attacks in the context of hybrid warfare must be further refined.

  4. 78 FR 10642 - Service Contracts Inventory

    Science.gov (United States)

    2013-02-14

    ... COMMISSION Service Contracts Inventory AGENCY: Nuclear Regulatory Commission. ACTION: Notice of availability. SUMMARY: The U.S. Nuclear Regulatory Commission (NRC) is providing for public information its Inventory of Contracts for Services for Fiscal Year (FY) 2012. The inventory includes service contract actions over...

  5. 10 CFR 34.29 - Quarterly inventory.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Quarterly inventory. 34.29 Section 34.29 Energy NUCLEAR... RADIOGRAPHIC OPERATIONS Equipment § 34.29 Quarterly inventory. (a) Each licensee shall conduct a quarterly physical inventory to account for all sealed sources and for devices containing depleted uranium...

  6. 42 CFR 35.41 - Inventory.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Inventory. 35.41 Section 35.41 Public Health PUBLIC... STATION MANAGEMENT Disposal of Money and Effects of Deceased Patients § 35.41 Inventory. Promptly after the death of a patient in a station or hospital of the Service, an inventory of his money and...

  7. 23 CFR 650.315 - Inventory.

    Science.gov (United States)

    2010-04-01

    ... 23 Highways 1 2010-04-01 2010-04-01 false Inventory. 650.315 Section 650.315 Highways FEDERAL..., STRUCTURES, AND HYDRAULICS National Bridge Inspection Standards § 650.315 Inventory. (a) Each State or Federal agency must prepare and maintain an inventory of all bridges subject to the NBIS....

  8. 75 FR 82095 - Service Contracts Inventory

    Science.gov (United States)

    2010-12-29

    ... Doc No: 2010-32828] NUCLEAR REGULATORY COMMISSION [NRC-2010-0394] Service Contracts Inventory AGENCY... Regulatory Commission (NRC) is providing for public information its Inventory of Contracts for Services for Fiscal Year (FY) 2010. The inventory includes service contract actions over $25,000 that were awarded...

  9. 26 CFR 1.1374-7 - Inventory.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 11 2010-04-01 2010-04-01 true Inventory. 1.1374-7 Section 1.1374-7 Internal... TAXES Small Business Corporations and Their Shareholders § 1.1374-7 Inventory. (a) Valuation. The fair market value of the inventory of an S corporation on the first day of the recognition period equals...

  10. 7 CFR 984.21 - Handler inventory.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Handler inventory. 984.21 Section 984.21 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing Agreements... Regulating Handling Definitions § 984.21 Handler inventory. Handler inventory as of any date means...

  11. 77 FR 5280 - Service Contracts Inventory

    Science.gov (United States)

    2012-02-02

    ... COMMISSION Service Contracts Inventory AGENCY: Nuclear Regulatory Commission. ACTION: Notice of availability. SUMMARY: The U.S. Nuclear Regulatory Commission (NRC) is providing for public information its Inventory of Contracts for Services for Fiscal Year (FY) 2011. The inventory includes service contract actions over...

  12. 47 CFR 32.1220 - Inventories.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Inventories. 32.1220 Section 32.1220... FOR TELECOMMUNICATIONS COMPANIES Instructions for Balance Sheet Accounts § 32.1220 Inventories. (a) This account shall include the cost of materials and supplies held in stock and inventories of...

  13. 40 CFR 52.348 - Emission inventories.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 3 2010-07-01 2010-07-01 false Emission inventories. 52.348 Section 52...) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS Colorado § 52.348 Emission inventories. (a) The Governor of the State of Colorado submitted the 1990 carbon monoxide base year emission inventories for...

  14. 40 CFR 52.2309 - Emissions inventories.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Emissions inventories. 52.2309 Section...) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) Texas § 52.2309 Emissions inventories. (a) The Governor of the State of Texas submitted the 1990 base year emission inventories for the...

  15. 27 CFR 17.167 - Inventories.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Inventories. 17.167... PRODUCTS Records § 17.167 Inventories. (a) Distilled spirits. The “on hand” figures reported in Part II of TTB Form 5154.2 shall be verified by physical inventories taken as of the end of each quarter in...

  16. 40 CFR 52.1533 - Emission inventories.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Emission inventories. 52.1533 Section...) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) New Hampshire § 52.1533 Emission inventories... inventory for the entire state on January 26, 1993 as a revision to the State Implementation Plan...

  17. 40 CFR 52.993 - Emissions inventories.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 3 2010-07-01 2010-07-01 false Emissions inventories. 52.993 Section...) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS Louisiana § 52.993 Emissions inventories. (a) The Governor of the State of Louisiana submitted the 1990 base year emission inventories for the Baton...

  18. 40 CFR 52.384 - Emission inventories.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 3 2010-07-01 2010-07-01 false Emission inventories. 52.384 Section 52...) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS Connecticut § 52.384 Emission inventories. (a) The Governor's designee for the State of Connecticut submitted the 1990 base year emission inventories for...

  19. 40 CFR 52.2350 - Emission inventories.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Emission inventories. 52.2350 Section...) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) Utah § 52.2350 Emission inventories. (a) The Governor of the State of Utah submitted the 1990 base year emission inventory of ozone precursors,...

  20. 40 CFR 52.1036 - Emission inventories.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Emission inventories. 52.1036 Section...) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) Maine § 52.1036 Emission inventories. (a) The Governor's designee for the State of Maine submitted 1990 base year emission inventories for the Knox...

  1. 40 CFR 52.2086 - Emission inventories.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Emission inventories. 52.2086 Section...) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) Rhode Island § 52.2086 Emission inventories... inventory for the Providence ozone nonattainment area on January 12, 1993 as a revision to the...

  2. 40 CFR 52.1125 - Emission inventories.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Emission inventories. 52.1125 Section...) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) Massachusetts § 52.1125 Emission inventories... emission inventories for the Springfield nonattainment area and the Massachusetts portion of the...

  3. 27 CFR 25.294 - Inventories.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Inventories. 25.294... OF THE TREASURY LIQUORS BEER Records and Reports § 25.294 Inventories. (a) The brewer shall take a physical inventory of beer and cereal beverage at least once each calender month. The brewer may take...

  4. 30 CFR 220.032 - Inventories.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false Inventories. 220.032 Section 220.032 Mineral... Inventories. (a) The lessee is responsible for NPSL materiel and shall make proper and timely cost and credit... operations. The accumulation of surplus stocks shall be avoided by proper materiel control, inventory...

  5. 27 CFR 22.162 - Inventories.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Inventories. 22.162... Inventories. Each permittee shall take a physical inventory of the tax-free and recovered alcohol in its possession semi-annually for the periods ending June 30 and December 31 of each year; or other...

  6. 43 CFR 10.9 - Inventories.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Inventories. 10.9 Section 10.9 Public... Museums and Federal Collections § 10.9 Inventories. (a) General. This section carries out section 5 of the... holdings or collections of human remains and associated funerary objects must compile an inventory of...

  7. Skeletal evidence for Inca warfare from the Cuzco region of Peru.

    Science.gov (United States)

    Andrushko, Valerie A; Torres, Elva C

    2011-11-01

    This article addresses the bioarchaeological evidence for Inca warfare through an analysis of 454 adult skeletons from 11 sites in the Inca capital region of Cuzco, Peru. These 11 sites span almost 1000 years (AD 600-1532), which allows for a comparison of the evidence for warfare before the Inca came to power (Middle Horizon AD 600-1000), during the time of Inca ascendency in the Late Intermediate Period (AD 1000-1400), and after the Inca came to power and expanded throughout the Cuzco region and beyond (Inca Imperial Period, AD 1400-1532). The results indicate that 100 of 454 adults (22.0%) showed evidence of cranial trauma. Of these, 23 individuals had major cranial injuries suggestive of warfare, consisting of large, complete, and/or perimortem fractures. There was scant evidence for major injuries during the Middle Horizon (2.8%, 1/36) and Late Intermediate Period (2.5%, 5/199), suggesting that warfare was not prevalent in the Cuzco region before and during the Inca rise to power. Only in the Inca Imperial Period was there a significant rise in major injuries suggestive of warfare (7.8%, 17/219). Despite the significant increase in Inca times, the evidence for major cranial injuries was only sporadically distributed at Cuzco periphery sites and was entirely absent at Cuzco core sites. These findings suggest that while the Inca used warfare as a mechanism for expansion in the Cuzco region, it was only one part of a complex expansion strategy that included economic, political, and ideological means to gain and maintain control.

  8. Blaptica dubia as sentinels for exposure to chemical warfare agents - a pilot study.

    Science.gov (United States)

    Worek, Franz; Seeger, Thomas; Neumaier, Katharina; Wille, Timo; Thiermann, Horst

    2016-11-16

    The increased interest of terrorist groups in toxic chemicals and chemical warfare agents presents a continuing threat to our societies. Early warning and detection is a key component for effective countermeasures against such deadly agents. Presently available and near term solutions have a number of major drawbacks, e.g. lack of automated, remote warning and detection of primarily low volatile chemical warfare agents. An alternative approach is the use of animals as sentinels for exposure to toxic chemicals. To overcome disadvantages of vertebrates the present pilot study was initiated to investigate the suitability of South American cockroaches (Blaptica dubia) as warning system for exposure to chemical warfare nerve and blister agents. Initial in vitro experiments with nerve agents showed an increasing inhibitory potency in the order tabun - cyclosarin - sarin - soman - VX of cockroach cholinesterase. Exposure of cockroaches to chemical warfare agents resulted in clearly visible and reproducible reactions, the onset being dependent on the agent and dose. With nerve agents the onset was related to the volatility of the agents. The blister agent lewisite induced signs largely comparable to those of nerve agents while sulfur mustard exposed animals exhibited a different sequence of events. In conclusion, this first pilot study indicates that Blaptica dubia could serve as a warning system to exposure of chemical warfare agents. A cockroach-based system will not detect or identify a particular chemical warfare agent but could trigger further actions, e.g. specific detection and increased protective status. By designing appropriate boxes with (IR) motion sensors and remote control (IR) camera automated off-site warning systems could be realized.

  9. Particle Swarm Social Adaptive Model for Multi-Agent Based Insurgency Warfare Simulation

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Xiaohui [ORNL; Potok, Thomas E [ORNL

    2009-12-01

    To better understand insurgent activities and asymmetric warfare, a social adaptive model for modeling multiple insurgent groups attacking multiple military and civilian targets is proposed and investigated. This report presents a pilot study using the particle swarm modeling, a widely used non-linear optimal tool to model the emergence of insurgency campaign. The objective of this research is to apply the particle swarm metaphor as a model of insurgent social adaptation for the dynamically changing environment and to provide insight and understanding of insurgency warfare. Our results show that unified leadership, strategic planning, and effective communication between insurgent groups are not the necessary requirements for insurgents to efficiently attain their objective.

  10. NONDESTRUCTIVE IDENTIFICATION OF CHEMICAL WARFARE AGENTS AND EXPLOSIVES BY NEUTRON GENERATOR-DRIVEN PGNAA

    Energy Technology Data Exchange (ETDEWEB)

    T. R. Twomey; A. J. Caffrey; D. L. Chichester

    2007-02-01

    Prompt gamma-ray neutron activation analysis (PGNAA) is now a proven method for the identification of chemical warfare agents and explosives in military projectiles and storage containers. Idaho National Laboratory is developing a next-generation PGNAA instrument based on the new Ortec Detective mechanically-cooled HPGe detector and a neutron generator. In this paper we review PGNAA analysis of suspect chemical warfare munitions, and we discuss the advantages and disadvantages of replacing the californium-252 radioisotopic neutron source with a compact accelerator neutron generator.

  11. Intracellular Bacteria in Protozoa

    Science.gov (United States)

    Görtz, Hans-Dieter; Brigge, Theo

    Intracellular bacteria in humans are typically detrimental, and such infections are regarded by the patients as accidental and abnormal. In protozoa it seems obvious that many bacteria have coevolved with their hosts and are well adapted to the intracellular way of life. Manifold interactions between hosts and intracellular bacteria are found, and examples of antibacterial resistance of unknown mechanisms are observed. The wide diversity of intracellular bacteria in protozoa has become particularly obvious since they have begun to be classified by molecular techniques. Some of the bacteria are closely related to pathogens; others are responsible for the production of toxins.

  12. Danish emission inventory for particular matter (PM)

    Energy Technology Data Exchange (ETDEWEB)

    Nielsen, M.; Winther, M.; Illerup, J.B.; Hjort Mikkelsen, M.

    2003-11-01

    The first Danish emission inventory that was reported in 2002 was a provisional-estimate based on data presently available. This report documents methodology, emission factors and references used for an improved Danish emission inventory for particulate matter. Further results of the improved emission inventory for the year 2000 are shown. The particulate matter emission inventory includes TSP, PM,, and PM, The report covers emission inventories for transport and stationary combustion. An appendix covering emissions from agriculture is also included. For the transport sector, both exhaust and non-exhaust emission such as tyre and break wear and road abrasion are included. (au)

  13. Waste management and chemical inventories

    Energy Technology Data Exchange (ETDEWEB)

    Gleckler, B.P.

    1995-06-01

    This section of the 1994 Hanford Site Environmental Report summarizes the classification and handling of waste at the Hanford Site. Waste produced at the Hanford Site is classified as either radioactive, nonradioactive, or mixed waste. Radioactive wastes are further categorized as transuranic, high-level, and low-level. Mixed waste may contain both radioactive and hazardous nonradioactive substances. This section describes waste management practices and chemical inventories at the site.

  14. Developing an Action Concept Inventory

    CERN Document Server

    McGinness, Lachlan P

    2016-01-01

    We report on progress towards the development of an Action Concept Inventory (ACI), a test that measures student understanding of action principles in introductory mechanics and optics. The ACI also covers key concepts of many-paths quantum mechanics, from which classical action physics arises. We used a multi-stage iterative development cycle for incorporating expert and student feedback into successive revisions of the ACI. The student feedback, including think-aloud interviews, enabled us to identify their misconceptions about action physics.

  15. Controlling Stock and Other Inventory Issues

    Institute of Scientific and Technical Information of China (English)

    CHRIS; DEVONSHIRE-ELLIS

    2008-01-01

    Inventory control is one of the most important business processes during the operation of a trading or manufacturing company as it relates to purchases,sales and logistic activities.In order to have clear inventory management,a company should not only focus on logistic management but also on sales and purchase management. Commonly,we think of the warehouse as the most important component of inventory management and the accounting department is responsible for the inventory management. However,inventory control is not only the responsibility of the accounting department and the warehouse,but also the responsibility of the entire organization.Actually,there are many departments involved in the inventory control process,such as sales,purchasing, production,logistics and accounting.All these departments must work together in or- der to achieve effective inventory controls.

  16. A Theoretical Exploration of Lawrence of Arabia’s Inner Meanings on Guerrilla Warfare

    Science.gov (United States)

    2011-07-05

    Asprey, Robert . War in the shadows: The Guerrilla in history, ( Lincoln, NE: iUniverse, 2002), 4 2 T.E. Lawrence, The Seven Pillars of Wisdom. A...the Solow growth model and the Ricardian model of economic rent, with two classic studies of guerrilla warfare by T.E Lawrence and Mao Zedong. Four

  17. Disruption of a binary organogel by the chemical warfare agent soman (GD) and common organophosphorus simulants

    OpenAIRE

    Hiscock, Jennifer R.; Sambrook, Mark R; Ede, Jayne A.; Wells, Neil J.; Philip A. Gale

    2014-01-01

    The chemical warfare agent (CWA) soman (GD) acts as a molecular stimulus for the disruption of an anthracene-based binary organogel prepared in cyclohexane. The CWA simulants dimethyl methylphosphonate (DMMP) and diethyl chlorophosphate (DCP) were also found to disrupt the binary organogel through changes in solvent polarity and reactions with the gelator.\\ud \\ud

  18. Fear as a medium of communication in asymmetric forms of warfare

    DEFF Research Database (Denmark)

    Harste, Gorm

    2011-01-01

    of fear evolves in asymmetric warfare. Asymmetric war induces fear in both parties, but in a communicative form that leads to very different experiences of fear. Fear is observed and analysed with Niklas Luhmann’s theory of self-referential systems of communication and well as his theory of risk...

  19. On modeling of the evaporation of chemical warfare agents on the ground

    NARCIS (Netherlands)

    Westin, S.N.; Winter, S.; Karlsson, E.; Hin, A.; Oeseburg, F.

    1998-01-01

    A model for evaporation of chemical warfare agents on the ground has been developed. The process of evaporation is described in three steps: (1) the immediate drop enlargement due to impact momentum is modeled using an empirical correlation from technical literature; (2) further enlargement caused b

  20. From Douhet to drones, air warfare, and the evolution of targeting

    NARCIS (Netherlands)

    Osinga, F.P.B.; Roorda, M.P.; Ducheine, P.A.L.; Schmitt, M.N.; Osinga, F.P.B.

    2016-01-01

    Through the prism of the experience of air warfare, this chapter identifies key factors that have shaped targeting. These include technological developments, organizational structures, and processes and inter-service competition for scarce resources. Moreover, targeting is informed by perspectives o

  1. A statistical analysis of the effect of warfare on the human secondary sex ratio

    NARCIS (Netherlands)

    Graffelman, J.; Hoekstra, R.F.

    2000-01-01

    Many factors have been hypothesized to affect the human secondary sex ratio (the annual percentage of males among all live births), among them race, parental ages, and birth order. Some authors have even proposed warfare as a factor influencing live birth sex ratios. The hypothesis that during and s

  2. Development of Novel Alternative Technologies for Decontamination of Warfare Agents: Electric Heating with Intrinsically Conductive Polymers

    Science.gov (United States)

    2007-11-02

    in converting electric energy to thermal energy for the decon applications. Other conductive materials, such as polythiophenes , polypyrroles, carbon...Development of Novel Alternative Technologies for Decontamination of Warfare Agents: Electric Heating with Intrinsically Conductive Polymers...Joule)-heating with conducting polymers. The basic concept is that electrically conducting polymers, such as polyaniline, can be used as coatings or

  3. Analysis of Urinary Metabolites of Nerve and Blister Chemical Warfare Agents

    Science.gov (United States)

    2014-08-01

    Warfare Agents GA Tabun , ethyl dimethylphosphoramidate GB Sarin, isopropyl methylphosphonofluoridate GD Soman, pinacolyl methylphosphonofluoridate...and their metabolites Agent Metabolite GA, Tabun O P O N CN Ethyl Dimethylphosphoroamidate, EDMAP, GA Acid HO P O N CN GB, Sarin P O

  4. Key Planning Factors for Recovery from a Chemical Warfare Agent Incident

    Science.gov (United States)

    2012-07-01

    chemical scenario involving the release of a blister agent (mustard lewisite) would result in a waste that the State of Colorado would regulate as... Waste Management ................................................................. 24 4.3 Key Planning Factors: Recovery Planning...Planning Factors, this document presents a chemical warfare agent scenario featuring Agent Yellow, a blister agent. Agent Yellow is a mixture of

  5. (Review of) Reno, William. 2011. Warfare in Independent Africa. Cambridge: Cambridge University Press

    DEFF Research Database (Denmark)

    Hagmann, Tobias

    2013-01-01

    Warfare in Independent Africa is Reno’s bold attempt to analyze the modern history of African insurgencies. The book tackles this task through the prism of five generations of rebel, which left their mark on the continent; anti-colonial rebels, majority rule rebels, reform rebels, warlord rebels ...

  6. THE PECULIARITIES OF SOCIAL PERCEPTION IN THE CONTEXT OF INFORMATION-PSYCHOLOGICAL WARFARE

    Directory of Open Access Journals (Sweden)

    Nane Zeynalyan

    2016-09-01

    Full Text Available In the recent decades, war fields have moved into the information sphere. Today’s person has reason to “be informed”; as having information provides a sense of security. In the modern world, great effort is invested in expanding information sources, because it serves to articulate both international policies and the context of wars. The exchange of information in domestic and international platforms influences the quality of public debate and ideology, which affects social attitudes and decision-making processes. This article presents the role of information-psychological warfare as a factor in forming public opinion. It discusses the peculiarities of organizing an information-psychological warfare during military conflicts. The goal of our research is to explore how social groups might perceive peculiarities in the information-psychological warfare. The research involves methods of survey, content analysis, and free associations. The effectiveness of psychological warfare significantly depends on how people perceive information. Consequently, in the contemporary world, it is necessary to not only protect or fight on the battlefield, but also to use information weapons. This imposes requirements on psychological scientists to explore peculiarities around the perception of information to help find mechanisms that safeguard people’s lives by way of contributing to the formation of necessary attitudes and stereotypes.

  7. Detachment 101 in the CBI: An Unconventional Warfare Paradigm for Contemporary Special Operations

    Science.gov (United States)

    2010-05-13

    American Espionage. NY: Reynal and Hitchcock , 1946. Barrett, Neil H. Chingpaw. NY: Vantage, 1962. Bartholomew-Feis, Dixee R. The O.S.S. and Ho Chi...United States Army. Washington, D.C.: U.S. Government Printing Office, 1990. Paddock, Alfred H. U.S. Army Special Warfare; Its Origins. Lawrence, KS

  8. Military medicine and the ethics of war: British colonial warfare during the Seven Years War (1756-63).

    Science.gov (United States)

    Charters, Erica

    2010-01-01

    This article examines 18th-century European warfare, tracing the first formal codifications of conventions of war, frequently introduced by military physicians and initially regarding the treatment of the sick and wounded. It outlines to what extent these conventions were followed in practice, particularly in the challenging environment of American irregular warfare, with a focus on the most well-known incident of "biological warfare" in the period: the deliberate spread of smallpox by British officers among Amerindians in 1763. More broadly, it demonstrates that the history of military medicine provides a fruitful method with which to uncover assumptions about the ethics of war.

  9. Genomics of Probiotic Bacteria

    Science.gov (United States)

    O'Flaherty, Sarah; Goh, Yong Jun; Klaenhammer, Todd R.

    Probiotic bacteria from the Lactobacillus and Bifidobacterium species belong to the Firmicutes and the Actinobacteria phylum, respectively. Lactobacilli are members of the lactic acid bacteria (LAB) group, a broadly defined family of microorganisms that ferment various hexoses into primarily lactic acid. Lactobacilli are typically low G + C gram-positive species which are phylogenetically diverse, with over 100 species documented to date. Bifidobacteria are heterofermentative, high G + C content bacteria with about 30 species of bifidobacteria described to date.

  10. Estimating dead wood during national forest inventories: a review of inventory methodologies and suggestions for harmonization.

    Science.gov (United States)

    Woodall, Christopher W; Rondeux, Jacques; Verkerk, Pieter J; Ståhl, Göran

    2009-10-01

    Efforts to assess forest ecosystem carbon stocks, biodiversity, and fire hazards have spurred the need for comprehensive assessments of forest ecosystem dead wood (DW) components around the world. Currently, information regarding the prevalence, status, and methods of DW inventories occurring in the world's forested landscapes is scattered. The goal of this study is to describe the status, DW components measured, sample methods employed, and DW component thresholds used by national forest inventories that currently inventory DW around the world. Study results indicate that most countries do not inventory forest DW. Globally, we estimate that about 13% of countries inventory DW using a diversity of sample methods and DW component definitions. A common feature among DW inventories was that most countries had only just begun DW inventories and employ very low sample intensities. There are major hurdles to harmonizing national forest inventories of DW: differences in population definitions, lack of clarity on sample protocols/estimation procedures, and sparse availability of inventory data/reports. Increasing database/estimation flexibility, developing common dimensional thresholds of DW components, publishing inventory procedures/protocols, releasing inventory data/reports to international peer review, and increasing communication (e.g., workshops) among countries inventorying DW are suggestions forwarded by this study to increase DW inventory harmonization.

  11. A Genetic Algorithm on Inventory Routing Problem

    Directory of Open Access Journals (Sweden)

    Nevin Aydın

    2014-03-01

    Full Text Available Inventory routing problem can be defined as forming the routes to serve to the retailers from the manufacturer, deciding on the quantity of the shipment to the retailers and deciding on the timing of the replenishments. The difference of inventory routing problems from vehicle routing problems is the consideration of the inventory positions of retailers and supplier, and making the decision accordingly. Inventory routing problems are complex in nature and they can be solved either theoretically or using a heuristics method. Metaheuristics is an emerging class of heuristics that can be applied to combinatorial optimization problems. In this paper, we provide the relationship between vendor-managed inventory and inventory routing problem. The proposed genetic for solving vehicle routing problem is described in detail.

  12. Annual Danish Informative Inventory Report to UNECE

    DEFF Research Database (Denmark)

    Nielsen, Ole-Kenneth; Winther, Morten; Mikkelsen, Mette Hjorth;

    This report is a documentation report on the emission inventories for Denmark as reported to the UNECE Secretariat under the Convention on Long Range Transboundary Air Pollution due by 15 February 2014. The report contains information on Denmark’s emission inventories regarding emissions of (1) SOX......(k)fluoranthene and indeno(1,2,3-cd)pyrene, PCDD/F and HCB for the years 1990-2012. Further, the report contains information on background data for emissions inventory....

  13. Annual Danish Informative Inventory Report to UNECE

    DEFF Research Database (Denmark)

    Nielsen, Ole-Kenneth; Winther, Morten; Mikkelsen, Mette Hjorth;

    The report is a documentation report on the emission inventories for Denmark as reported to the UNECE Secretariat under the Convention on Long Range Transboundary Air Pollution due by 15 February 2013. The report contains information on Denmark’s emission inventories regarding emissions of (1) SOX......(k)fluoranthene and indeno(1,2,3-cd)pyrene, PCDD/F and HCB for the years 1990-2011. Further, the report contains information on background data for emissions inventory....

  14. Annual Danish Informative Inventory Report to UNECE

    DEFF Research Database (Denmark)

    Nielsen, Ole-Kenneth; Plejdrup, Marlene Schmidt; Winther, Morten;

    This report is a documentation report on the emission inventories for Denmark as reported to the UNECE Secretariat under the Convention on Long Range Transboundary Air Pollution due by 15 February 2016. The report contains information on Denmark’s emission inventories regarding emissions of (1) SOX......(k)fluoranthene and indeno(1,2,3-cd)pyrene, PCDD/F and HCB for the years 1990-2014. Further, the report contains information on background data for emissions inventory....

  15. Annual Danish Emissions Inventory Report to UNECE

    DEFF Research Database (Denmark)

    Illerup, J. B.; Nielsen, M.; Winther, M.;

    This report is a documentation report on the emission inventories for Denmark as reported to the UNECE Secretariat under the Convention on Long Range Transboundary Air Pollution due by 15 February 2004. The report contains information on Denmark's emission inventories regarding emissions of (1) SOX......(k)fluoranthene and indeno(1,2,3-cd)pyrene for the years 1990-2002. Further, the report contains information on background data for emissions inventory...

  16. Review on Urban GHG Inventory in China

    OpenAIRE

    Fan, Yang; Yan, Li; Jiangang, Xu

    2016-01-01

    With the rapid urbanization progress of China, a study on an urban GHG inventory is of great significance. However, related studies in China are still in the exploratory stage. This paper firstly introduces three major urban GHG inventory accounting methods and related issues with regard to Chinese cities, and then reviews the published studies of urban GHG inventories in China in the past few years. Methodology frameworks, gas types, emission scopes, geographical boundaries are examined and ...

  17. Optimal Inventory Policies When Sales Are Discretionary

    OpenAIRE

    Herbert E. Scarf

    2000-01-01

    Inventory models customarily assume that demand is fully satisfied if sufficient stock is available. We analyze the form of the optimal inventory policy if the inventory manager can choose to meet a fraction of the demand. Under classical conditions we show that the optimal policy is again of the (S,s) form. The analysis makes use of a novel property of K-concave functions.

  18. Irregular Warfare and Future War: Strategy and Defense Planning; Strategic Insights, v. 10, Special issue (October 2011), 92-98. Topic: Global Trends and Future Warfare ; Part II: Technological and Doctrinal Innovation

    OpenAIRE

    Russell, James A.

    2011-01-01

    This article appeared in Strategic Insights, v.10, Special issue (October 2011), 92-98. Topic: Global Trends and Future Warfare ; Part II: Technological and Doctrinal Innovation Approved for public display, distribution unlimited The purpose of this paper is threefold: to speculate on the role and prominence of irregular warfare in the strategic environment over the next quarter century, to comment on the impact that phenomenon may have on shaping the postulated scenarios addressed in t...

  19. Hanford inventory program user`s manual

    Energy Technology Data Exchange (ETDEWEB)

    Hinkelman, K.C.

    1994-09-12

    Provides users with instructions and information about accessing and operating the Hanford Inventory Program (HIP) system. The Hanford Inventory Program is an integrated control system that provides a single source for the management and control of equipment, parts, and material warehoused by Westinghouse Hanford Company in various site-wide locations. The inventory is comprised of spare parts and equipment, shop stock, special tools, essential materials, and convenience storage items. The HIP replaced the following systems; ACA, ASP, PICS, FSP, WSR, STP, and RBO. In addition, HIP manages the catalog maintenance function for the General Supplies inventory stocked in the 1164 building and managed by WIMS.

  20. Advanced Data Collection for Inventory Management

    Science.gov (United States)

    Opresko, G. A.; Leet, J. H.; Mcgrath, D. F.; Eidson, J.

    1987-01-01

    Bar-coding, radio-frequency, and voice-operated systems selected. Report discusses study of state-of-the-art in automated collection of data for management of large inventories. Study included comprehensive search of literature on data collection and inventory management, visits to existing automated inventory systems, and tours of selected supply and transportation facilities at Kennedy Space Center. Information collected analyzed in view of needs of conceptual inventory-management systems for Kennedy Space Center and for manned space station and other future space projects.

  1. GIS Applications in Urban Tree Inventory

    OpenAIRE

    Otey, Jennifer K.

    2007-01-01

    This project evaluates and demonstrates some applications of a GIS-based urban tree inventory. This was done by (1) collecting and analyzing data for Tinker Air Force Base (AFB), and (2) collecting and evaluating data for the Virginia Tech campus tree inventory. The urban tree inventory at Tinker AFB was estimated using remote sensing techniques that included the use of the eCognition 3.0 software. Inventory data was collected using a handheld computer and transferred to a desktop for data ba...

  2. Quantum gravity and inventory accumulation

    CERN Document Server

    Sheffield, Scott

    2011-01-01

    We begin by studying inventory accumulation at a LIFO (last-in-first-out) retailer with two products. In the simplest version, the following occur with equal probability at each time step: first product ordered, first product produced, second product ordered, second product produced. The inventory thus evolves as a simple random walk on Z^2. In more interesting versions, a p fraction of customers orders the "freshest available" product regardless of type. We show that the corresponding random walks scale to Brownian motions with diffusion matrices depending on p. We then turn our attention to the critical Fortuin-Kastelyn random planar map model, which gives, for each q>0, a probability measure on random (discretized) two-dimensional surfaces decorated by loops, related to the q-state Potts model. A longstanding open problem is to show that as the discretization gets finer, the surfaces converge in law to a limiting (loop-decorated) random surface. The limit is expected to be a Liouville quantum gravity surfa...

  3. How honey kills bacteria

    NARCIS (Netherlands)

    P.H.S. Kwakman; A.A. te Velde; L. de Boer; D. Speijer; C.M.J.E. Vandenbroucke-Grauls; S.A.J. Zaat

    2010-01-01

    With the rise in prevalence of antibiotic-resistant bacteria, honey is increasingly valued for its antibacterial activity. To characterize all bactericidal factors in a medical-grade honey, we used a novel approach of successive neutralization of individual honey bactericidal factors. All bacteria t

  4. Inventories in motion : a new approach to inventories over the business cycle

    OpenAIRE

    McMahon, Michael F.

    2012-01-01

    I propose an inventories-in-motion concept which represents a new approach to inventories over the business cycle. This channel has previously been ignored by macroeconomists. I build a general equilibrium business cycle model in which inventories arise naturally as a result of gaps between production of goods and their consumption as goods are distributed. These inventories are actively managed and adjusted to meet consumption and investment needs in the economy. Although conceptually very s...

  5. Metallization of bacteria cells

    Institute of Scientific and Technical Information of China (English)

    黎向锋; 李雅芹; 蔡军; 张德远

    2003-01-01

    Bacteria cells with different standard shapes are well suited for use as templates for the fabrication of magnetic and electrically conductive microstructures. In this paper, metallization of bacteria cells is demonstrated by an electroless deposition technique of nickel-phosphorus initiated by colloid palladium-tin catalyst on the surfaces of Citeromyces matritensis and Bacillus cereus. The activated and metallized bacteria cells have been characterized by scanning electron microscopy (SEM), transmission electron microscopy (TEM) and X-ray diffraction analysis (XRD). Results showed that both Citeromyces matritensis and Bacillus cereus had no deformation in shape after metallization; the metallized films deposited on the surfaces of bacteria cells are homogeneous in thickness and noncrystalline in phase structure. The kinetics of colloid palladium-tin solution and electroless plating on bacteria cells is discussed.

  6. Ultrahigh Vacuum Studies of the Fundamental Interactions of Chemical Warfare Agents and Their Simulants with Amorphous Silica

    Science.gov (United States)

    2015-07-14

    G. The Dissociative Adsorptoin of N2 on a Multiply Promoted Iron Catalyst Used for Ammonia Synthesis : A Temperature Programmed Desorption Study...where their potential use as chemical warfare agents began. The synthesis of other G-series agents, G standing for German, shortly followed. Also...warfare. The most common blister agent, sulfur mustard, was first synthesized in 1822 by Despretz. Victor Meyer developed a modified synthesis to

  7. Autonomous-agent based simulation of anti-submarine warfare operations with the goal of protecting a high value unit

    OpenAIRE

    Akbori, Fahrettin

    2004-01-01

    Approved for public release, distribution unlimited The Anti-Submarine Warfare screen design simulation is a program that provides a model for operations in anti-submarine warfare (ASW). The purpose of the program is to aid ASW commanders, allowing them to configure an ASW screen, including the sonar policy, convoy speed, and the number of ships, to gain insight into how these and other factors beyond their control, such as water conditions, impact ASW effectiveness. It is also designed to...

  8. Effectiveness of Unmanned Surface Vehicles in Anti-submarine Warfare with the Goal of Protecting a High Value Unit

    Science.gov (United States)

    2015-06-01

    Surface Warfare  Special Operations Forces Support  Electronic Warfare  Maritime Interdiction Operations Support According to open online sources...Postgraduate School. These studies include maritime protection of critical infrastructure assets [30], counter- piracy escort operations in the Gulf of... Online ]. Available: http://www.navy.mil/navydata/technology/usvmppr.pdf [2] M. M. Graham, “Unmanned surface vehicles: An operational commander’s tool

  9. Danish emission inventories for stationary combustion plants. Inventories until 2008

    Energy Technology Data Exchange (ETDEWEB)

    Nielsen, Malene; Nielsen, Ole-Kenneth; Plejdrup, M.; Hjelgaard, K.

    2010-10-15

    Emission inventories for stationary combustion plants are presented and the methodologies and assumptions used for the inventories are described. The pollutants considered are SO{sub 2}, NO{sub x}, NMVOC, CH{sub 4}, CO, CO{sub 2}, N{sub 2}O, NH{sub 3}, particulate matter, heavy metals, dioxins, HCB and PAH. The CO{sub 2} emission in 2008 was 16 % lower than in 1990. However, fluctuations in the emission level are large as a result of electricity import/export. The emission of CH{sub 4} has increased due to increased use of lean-burn gas engines in combined heating and power (CHP) plants. However, the emission has decreased in recent years due to structural changes in the Danish electricity market. The N{sub 2}O emission was higher in 2008 than in 1990 but the fluctuations in the time-series are significant. A considerable decrease of the SO{sub 2}, NO{sub x} and heavy metal emissions is mainly a result of decreased emissions from large power plants and waste incineration plants. The combustion of wood in residential plants has increased considerably in recent years resulting in increased emission of PAH, particulate matter and CO. The emission of NMVOC has increased since 1990 as a result of both the increased combustion of wood in residential plants and the increased emission from lean-burn gas engines. The dioxin emission decreased since 1990 due to flue gas cleaning on waste incineration plants. However in recent years the emission has increased as a result of the increased combustion of wood in residential plants. (Author)

  10. 26 CFR 1.1013-1 - Property included in inventory.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 11 2010-04-01 2010-04-01 true Property included in inventory. 1.1013-1 Section... inventory. The basis of property required to be included in inventory is the last inventory value of such property in the hands of the taxpayer. The requirements with respect to the valuation of an inventory...

  11. THEORY OF SPARE PARTS INVENTORY MANAGEMENT FOR PRODUCTION EQUIPMENT

    OpenAIRE

    KATARZYNA GRONDYS

    2013-01-01

    This article presents theoretical basis of spare parts inventory management in manufacturing company. Basis definitions, allocation and differences in spare parts inventory management were compared with other manufacturing inventories. The issue of spare parts inventory management is emphasized in aspect of maintaining continuity of production and generated costs of maintaining inventory.

  12. Emission Inventory for Fugitive Emissions in Denmark

    DEFF Research Database (Denmark)

    Plejdrup, Marlene Schmidt; Nielsen, Ole-Kenneth; Nielsen, Malene

    This report presents the methodology and data used in the Danish inventory of fugitive emissions from fuels for the years until 2007. The inventory of fugitive emissions includes CO2, CH4, N2O, NOx, CO, NMVOC, SO2, dioxin, PAH and particulate matter. In 2007 the total Danish emission of greenhouse...

  13. 76 FR 62327 - Retail Inventory Method

    Science.gov (United States)

    2011-10-07

    ...-3(e) (75 FR 78944), the amount of an allowance, discount, or price rebate a taxpayer earns by... Internal Revenue Service 26 CFR Part 1 RIN 1545-BJ64 Retail Inventory Method AGENCY: Internal Revenue... regulations relating to the retail inventory method of accounting. The regulations restate and clarify...

  14. Development of Mentor Teacher Role Inventory

    Science.gov (United States)

    Koc, Ebru Melek

    2011-01-01

    This study aimed to develop and investigate the validity and reliability of the Mentor Teacher Role Inventory (MTRI). A total of 1843 student teachers in the Distance English Teacher Training Program participated in the study. The 58 items of the Mentor Teacher Role Inventory underwent principal factor analysis, which revealed nine factors…

  15. Construct Validation of the Physics Metacognition Inventory

    Science.gov (United States)

    Taasoobshirazi, Gita; Farley, John

    2013-01-01

    The 24-item Physics Metacognition Inventory was developed to measure physics students' metacognition for problem solving. Items were classified into eight subcomponents subsumed under two broader components: knowledge of cognition and regulation of cognition. The students' scores on the inventory were found to be reliable and related to…

  16. A Comparison of Four Personality Inventories

    Science.gov (United States)

    Lorr, Maurice; And Others

    1977-01-01

    Factor analysis was used to measure the equivalence of the personality constructs measures by four different rationally devised inventories. The tests were administered to high school and college student samples. Twelve dimensions were found to be common to two or more inventories and consistent across the two samples. (Author/MV)

  17. 48 CFR 3045.508 - Physical inventories.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Physical inventories. 3045.508 Section 3045.508 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND... Property in the Possession of Contractors 3045.508 Physical inventories....

  18. 40 CFR 52.1391 - Emission inventories.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Emission inventories. 52.1391 Section...) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) Montana § 52.1391 Emission inventories. (a) The Governor of the State of Montana submitted the 1990 carbon monoxide base year emission...

  19. A Two-Supplier Inventory Model

    NARCIS (Netherlands)

    Janssen, F.B.S.L.P.; de Kok, T.

    1996-01-01

    In this paper we consider an inventory system with two suppliers.A supply agreement is made with one of the suppliers, to deliver a xed quantity Q every review period.The replenishment decisions for the other supplier are governed by a (R; S) replenishment policy; that is, when the inventory positio

  20. Annual Danish Informative Inventory Report to UNECE

    DEFF Research Database (Denmark)

    Nielsen, Ole-Kenneth; Winther, Morten; Mikkelsen, Mette Hjorth;

    This report is a documentation report on the emission inventories for Denmark as reported to the UNECE Secretariat under the Convention on Long Range Transboundary Air Pollution due by 15 February 2010. The report contains information on Denmark's emission inventories regarding emissions of (1) SOX...

  1. Achieve inventory reduction and improve customer service?

    Science.gov (United States)

    Moody, M C

    2000-05-01

    Is it really possible to achieve significant reductions in your manufacturing inventories while improving customer service? If you really want to achieve significant inventory reductions, focus on the root causes, and develop countermeasures and a work plan, to execute your countermeasures. Include measurements for recording your progress, and deploy your countermeasures until they are no longer required, or until new ones are needed.

  2. Construct Validation of the Physics Metacognition Inventory

    Science.gov (United States)

    Taasoobshirazi, Gita; Farley, John

    2013-01-01

    The 24-item Physics Metacognition Inventory was developed to measure physics students' metacognition for problem solving. Items were classified into eight subcomponents subsumed under two broader components: knowledge of cognition and regulation of cognition. The students' scores on the inventory were found to be reliable and related to students'…

  3. Denmark’s National Inventory Report 2012

    DEFF Research Database (Denmark)

    Nielsen, Ole-Kenneth; Mikkelsen, Mette Hjorth; Hoffmann, Leif

    This report is Denmark’s National Inventory Report 2012. The report contains information on Denmark’s emission inventories for all years’ from 1990 to 2010 for CO2, CH4, N2O, HFCs, PFCs and SF6, NOx, CO, NMVOC, SO2...

  4. Dynamic Pricing and Learning with Finite Inventories

    NARCIS (Netherlands)

    Zwart, A.P.; Boer, A.V. den

    2015-01-01

    We study a dynamic pricing problem with finite inventory and parametric uncertainty on the demand distribution. Products are sold during selling seasons of finite length, and inventory that is unsold at the end of a selling season perishes. The goal of the seller is to determine a pricing strategy t

  5. Dynamic pricing and learning with finite inventories

    NARCIS (Netherlands)

    Boer, den Arnoud V.; Zwart, Bert

    2015-01-01

    We study a dynamic pricing problem with finite inventory and parametric uncertainty on the demand distribution. Products are sold during selling seasons of finite length, and inventory that is unsold at the end of a selling season perishes. The goal of the seller is to determine a pricing strategy t

  6. Dynamic pricing and learning with finite inventories

    NARCIS (Netherlands)

    Boer, den Arnoud; Zwart, Bert

    2013-01-01

    We study a dynamic pricing problem with finite inventory and parametric uncertainty on the demand distribution. Products are sold during selling seasons of finite length, and inventory that is unsold at the end of a selling season, perishes. The goal of the seller is to determine a pricing strategy

  7. Lost-sales inventory theory : A review

    NARCIS (Netherlands)

    Bijvank, Marco; Vis, Iris F. A.

    2011-01-01

    In classic inventory models it is common to assume that excess demand is backordered. However, studies analyzing customer behavior in practice show that most unfulfilled demand is lost or an alternative item/location is looked for in many retail environments. Inventory systems that include this lost

  8. Relativity Concept Inventory: Development, Analysis, and Results

    Science.gov (United States)

    Aslanides, J. S.; Savage, C. M.

    2013-01-01

    We report on a concept inventory for special relativity: the development process, data analysis methods, and results from an introductory relativity class. The Relativity Concept Inventory tests understanding of relativistic concepts. An unusual feature is confidence testing for each question. This can provide additional information; for example,…

  9. Annual Danish Informative Inventory Report to UNECE

    DEFF Research Database (Denmark)

    Nielsen, Ole-Kenneth; Winther, Morten; Mikkelsen, Mette Hjorth;

    2012-01-01

    This report is a documentation report on the emission inventories for Denmark as reported to the UNECE Secretariat under the Convention on Long Range Transboundary Air Pollution due by 15 February 2012. The report contains information on Denmark’s emission inventories regarding emissions of (1) S...

  10. Dealer Inventory and the Cost of Immediacy

    DEFF Research Database (Denmark)

    Dick-Nielsen, Jens

    This study shows that the recent 80% decrease in dealer inventories of corporate bonds has increased the cost of immediacy. For safe bonds which are quickly turned over again by dealers the increase is up to 15%, while for risky bonds which are kept on inventory by dealers the increase is up to 1...

  11. Validity of the Decisional Process Inventory.

    Science.gov (United States)

    Marco, Cynthia D.; Hartung, Paul J.; Newman, Isadore; Parr, Patricia

    2003-01-01

    The Gestalt-based Decisional Process Inventory and measures of career indecision and vocational identity were completed by 201 subjects. Results supported the inventory's ability to differentiate by career choice states. Concurrent validity was supported, but confirmatory factor analysis did not support the factor structure regarding measurement…

  12. Antibiotics from predatory bacteria

    Directory of Open Access Journals (Sweden)

    Juliane Korp

    2016-03-01

    Full Text Available Bacteria, which prey on other microorganisms, are commonly found in the environment. While some of these organisms act as solitary hunters, others band together in large consortia before they attack their prey. Anecdotal reports suggest that bacteria practicing such a wolfpack strategy utilize antibiotics as predatory weapons. Consistent with this hypothesis, genome sequencing revealed that these micropredators possess impressive capacities for natural product biosynthesis. Here, we will present the results from recent chemical investigations of this bacterial group, compare the biosynthetic potential with that of non-predatory bacteria and discuss the link between predation and secondary metabolism.

  13. ON INVENTORY STRATEGIES OF ONLINE RETAILERS

    Institute of Scientific and Technical Information of China (English)

    Frank Y.CHEN; S.H. HUM; Cheryl H. SIM

    2005-01-01

    This study focuses on inventory strategies of Internet retailers (etailers). The etailer faces options of holding her own inventory or outsourcing through the third party(ies). We assess etailer inventory strategies through mathematical modeling and numerical experiments. When ordering and holding her own stock, the etailer has full control of the order fulfillment process but bears the inventory-related risk. When outsourcing stock, etailer's orders may not get an equal priority as for those of the third party's own. Built upon simple operations research models, the numerical experiments suggest that the etailer is better off relying on others to fulfill orders if her demand (profit margin) is low, but should revert to the strategy of maintaining her own inventory if her sales volume (profit margin) is relatively high. Other factors are also investigated. These findings seem to confirm what are being practiced in the industry.

  14. Inventory Data Package for Hanford Assessments

    Energy Technology Data Exchange (ETDEWEB)

    Kincaid, Charles T.; Eslinger, Paul W.; Aaberg, Rosanne L.; Miley, Terri B.; Nelson, Iral C.; Strenge, Dennis L.; Evans, John C.

    2006-06-01

    This document presents the basis for a compilation of inventory for radioactive contaminants of interest by year for all potentially impactive waste sites on the Hanford Site for which inventory data exist in records or could be reasonably estimated. This document also includes discussions of the historical, current, and reasonably foreseeable (1944 to 2070) future radioactive waste and waste sites; the inventories of radionuclides that may have a potential for environmental impacts; a description of the method(s) for estimating inventories where records are inadequate; a description of the screening method(s) used to select those sites and contaminants that might make a substantial contribution to impacts; a listing of the remedial actions and their completion dates for waste sites; and tables showing the best estimate inventories available for Hanford assessments.

  15. Data Driven Tuning of Inventory Controllers

    DEFF Research Database (Denmark)

    Huusom, Jakob Kjøbsted; Santacoloma, Paloma Andrade; Poulsen, Niels Kjølstad

    2007-01-01

    A systematic method for criterion based tuning of inventory controllers based on data-driven iterative feedback tuning is presented. This tuning method circumvent problems with modeling bias. The process model used for the design of the inventory control is utilized in the tuning as an approximat......A systematic method for criterion based tuning of inventory controllers based on data-driven iterative feedback tuning is presented. This tuning method circumvent problems with modeling bias. The process model used for the design of the inventory control is utilized in the tuning...... as an approximation to reduce time required on experiments. The method is illustrated in an application with a multivariable inventory control implementation on a four tank system....

  16. 48 CFR 645.608 - Screening of contractor inventory.

    Science.gov (United States)

    2010-10-01

    ... inventory. 645.608 Section 645.608 Federal Acquisition Regulations System DEPARTMENT OF STATE CONTRACT MANAGEMENT GOVERNMENT PROPERTY Reporting, Redistribution, and Disposal of Contractor Inventory 645.608 Screening of contractor inventory....

  17. Geophysical Processes - MO 2016 Inventory of Landslide Occurrences (SHP)

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — The Missouri Inventory of Landslide Occurrences (MILO) is a statewide inventory of landslides and slope failure occurrences. Landslides can occur anywhere a hill...

  18. Reactive skin decontamination lotion (RSDL) for the decontamination of chemical warfare agent (CWA) dermal exposure.

    Science.gov (United States)

    Schwartz, M D; Hurst, C G; Kirk, M A; Reedy, S J D; Braue, E H

    2012-08-01

    Rapid decontamination of the skin is the single most important action to prevent dermal absorption of chemical contaminants in persons exposed to chemical warfare agents (CWA) and toxic industrial chemicals (TICs) as a result of accidental or intentional release. Chemicals on the skin may be removed by mechanical means through the use of dry sorbents or water. Recent interest in decontamination systems which both partition contaminants away from the skin and actively neutralize the chemical has led to the development of several reactive decontamination solutions. This article will review the recently FDA-approved Reactive Skin Decontamination Lotion (RSDL) and will summarize the toxicity and efficacy studies conducted to date. Evidence of RSDL's superior performance against vesicant and organophosphorus chemical warfare agents compared to water, bleach, and dry sorbents, suggests that RSDL may have a role in mass human exposure chemical decontamination in both the military and civilian arenas.

  19. The Military-Entertainment Complex: A New Facet of Information Warfare

    Directory of Open Access Journals (Sweden)

    Adam Muir

    2003-01-01

    Full Text Available The second Gulf War will become synonymous with the emergence of fully-fledged information warfare where the military-entertainment complex has so influenced strategic and logistic possibilities that it becomes apparent that the war was waged as entertainment. This is entertainment not as an amusement or diversion but utilising the techniques and tropes of the burgeoning entertainment industry as a means to achieve military objectives. This paper offers a short history of the military-entertainment complex as reality and simulation become fused in the practices of the US military machine. The paper then briefly explores three central aspects of this phenomenon evident in recent developments: the military function of computer games; the role of the Hollywood scenario and the blurring between news and reality TV. Finally the suggestion is made that subverting, co-opting and reconstructing the military-entertainment complex provides new possibilities for alternative strategies of information warfare.

  20. [Darwin and bacteria].

    Science.gov (United States)

    Ledermann D, Walter

    2009-02-01

    As in 2009 the scientific world celebrates two hundreds years from the birthday of Charles Darwin and one hundred and fifty from the publication of The Origin of Species, an analysis of his complete work is performed, looking for any mention of bacteria. But it seems that the great naturahst never took knowledge about its existence, something rather improbable in a time when the discovery of bacteria shook the medical world, or he deliberately ignored them, not finding a place for such microscopic beings into his theory of evolution. But the bacteria badly affected his familiar life, killing scarlet fever one of his children and worsening to death the evolution of tuberculosis of his favourite Annie. Darwin himself could suffer the sickness of Chagas, whose etiological agent has a similar level to bacteria in the scale of evolution.

  1. Aerospace Power in Urban Warfare: Beware the Hornet’s Nest

    Science.gov (United States)

    2001-05-01

    Board Task Force on Military Operations in Built-Up Areas ( MOBA )," (Washington, DC: Office of the Undersecretary of Defense for Acquisition and...Smithsonian Institute Press, 1999), 130. 45 Vick, et al., 120. 46 Rebecca A. Grant, "The Radar Game ," Air Force Magazine, February 1999, 52-60. Grant...University Press, 1962. Grant, Rebecca A. "The Radar Game ." Air Force Magazine, February 1999, 52-60. Hawkins, William R. Putting Urban Warfare in

  2. Transition Support of Meteorology and Oceanography (METOC) Technology to the Naval Oceanographic Office Warfare Support Center

    Science.gov (United States)

    2016-06-07

    The long-term goal of this research is to support the transition of METOC technology to the Naval Oceanographic Office Warfare Support Center...Specifically, this includes the methodology for assimilation and adaptive sampling of in-situ data, collected from gliders (oceanographic) and mobile ...and acoustic uncertainty provinces, iii) continue development of the OMAS (OASIS Mobile Acoustic Source) insitu acoustic system with application to a

  3. Let the Revolution Begin, 140 Characters at a Time: Social Media and Unconventional Warfare

    Science.gov (United States)

    2015-06-01

    2008 and Air Command and Staff College (M.A. in Military Operational Art and Science) in 2013. iv ACKNOWLEDGEMENTS I want to thank Dr. James...Sunni and Shia Muslims in the region. Arguably, social-media enabled revolutions affected Egypt the most. Overthrown twice since the January 25...Understand Unconventional Warfare,” Small Wars Journal.com, 23 October 2014, http://smallwarsjournal.com/jrnl/ art /do-we-really-understand

  4. A Need for Systems Architecture Approach for Next Generation Mine Warfare Capability

    Science.gov (United States)

    2006-09-01

    uncontrolled mining ultimately led to the first Hague convention where 10 Henry Petroski (1992). To Engineer is...Littoral and Mine Warfare, without which I would not have been able to participate in this program. Jon, Henry and Capt. “J” juggling between work, home...Palmer, M. (1992). Guardians of the Gulf. [Photograph], Free Press, New York. Petroski , H (1992). To Engineer is Human: The Role of Failure in

  5. Navy Irregular Warfare and Counterterrorism Operations: Background and Issues for Congress

    Science.gov (United States)

    2016-05-27

    phrase confronting irregular challenges (CIC) instead of the term irregular warfare. For purposes of convenience , this report continues to use the term...Tomahawk cruise missile attacks on suspected terrorist training camps and facilities , such as those reportedly conducted in Somalia on March 3 and May 1...domestic and overseas Navy bases and facilities ;  working with the Coast Guard to build maritime domain awareness (or MDA, meaning a real-time

  6. Guerrilla Operations in the Civil War: Assessing Compound Warfare During Price’s Raid

    Science.gov (United States)

    2007-11-02

    hand, Three Years with Quantrill by O. S. Barton and Noted Guerrillas, or the Warfare on the Border by John Edwards provide alternate views of...events described in other sources. For example, Barton relates John McCorkle’s account of the story about guerrillas who Price’s army before the Battle of...Jay Monaghan provided excellent accounts of the major operations in the Trans-Mississippi Department during the Civil War. Finally, the framework for

  7. China’s Development of Asymmetric Warfare and the Security of Taiwan, Republic of China

    Science.gov (United States)

    2004-12-01

    thanks to my loving and devoted wife, Anita . Her patience, understanding, and remarkable ability to maintain a pleasant, comforting home during this...should arise (Bolt, Brenner , 2004, p.130). Information warfare technology can delay a United States response and commitment in the Taiwan Strait in...destruction of C4 systems by missiles, airpower, and high-energy weapons (Bolt & Brenner , 2004, p.133). Perhaps the most astonishing view of the PRC’s IW

  8. Courses of Action for Enhancing USAF ’Irregular Warfare’ Capabilities: A Functional Solutions Analysis

    Science.gov (United States)

    2010-01-01

    Warfare Center to ensure that technological opportunities for novel IW appli- cations were explored, developed, and fielded. (See pp. 38–40...activities; transnational criminal activities, including narco -trafficking, illicit arms dealing, and illegal financial transactions, that support or...opportunities for novel IW applications are explored, devel- oped, and fielded. In fact, over time, it might be appropriate for the USAF to create a

  9. Challenges in Coalition Unconventional Warfare: The Allied Campaign in Yugoslavia, 1941-1945

    Science.gov (United States)

    2014-01-01

    JFQ 75, 4th Quarter 2014 Duke, Phil lips, and Conover 129 Challenges in Coalition Unconventional Warfare The Allied Campaign in Yugoslavia , 1941...resistance elements in Yugoslavia . The resistance movement effectively fixed in place 35 German and Italian divisions, consisting of roughly 660,000...mountain headquarters in Yugoslavia on May 14, 1944 (Imperial War Museum) Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting

  10. Cyberspace as a Complex Adaptive System and the Policy and Operational Implications for Cyber Warfare

    Science.gov (United States)

    2014-05-22

    accessed 13 February 2014). 66Teresa Degenhard “Between War and Crime: The Overlap between War and Crime: Unpacking Foucault and Agamben’s Studies...Article-2-Revision- for- Foucault -and-Agamben-Degenhardt-July-2013.pdf (accessed 5 April 2014). 26... Foucault and Agamben’s Studies within the Context of the War on Terror.”, 34. 68US Department of Defense, Electronic Warfare, Joint Publication 3-13, I-2

  11. Investigating Iraq’s Chemical Warfare Program: Updated and Expanded Research Plan

    Science.gov (United States)

    2012-07-01

    chemical warfare, chemical weapons, Conflict Records Research Center, Tabun , Sarin, UN Sepcial Commission, UN UN Monitoring, Verification and Inspection...7 for tabun and sarin; and Ahmed 2 & 3 for production of precursors for tabun and sarin. The general contractor is Al Fao General Establishment that... tabun , and sarin. “mid- 1970s” Al Hazen Institute has by this time set up contacts with “30 major foreign organizations and companies” for securing

  12. Molecular modeling toward selective inhibitors of dihydrofolate reductase from the biological warfare agent Bacillus anthracis.

    Science.gov (United States)

    Giacoppo, Juliana O S; Mancini, Daiana T; Guimarães, Ana P; Gonçalves, Arlan S; da Cunha, Elaine F F; França, Tanos C C; Ramalho, Teodorico C

    2015-02-16

    In the present work, we applied docking and molecular dynamics techniques to study 11 compounds inside the enzymes dihydrofolate reductase (DHFR) from the biological warfare agent Bacillus anthracis (BaDHFR) and Homo sapiens sapiens (HssDHFR). Six of these compounds were selected for a study with the mutant BaF96IDHFR. Our results corroborated with experimental data and allowed the proposition of a new molecule with potential activity and better selectivity for BaDHFR.

  13. Management of DoD Irregular Warfare (IW) and Security Force Assistance (SFA) Capabilities

    Science.gov (United States)

    2016-05-03

    manage DoD personnel with skills , training, education, and experience related to IW and SFA. DoDI 3000.11, May 3, 2016 TABLE OF CONTENTS 2...DOD INSTRUCTION 3000.11 MANAGEMENT OF DOD IRREGULAR WARFARE (IW) AND SECURITY FORCE ASSISTANCE (SFA) CAPABILITIES Originating Component...well as building the security capacity and capability of U.S. partners and allies. c. IW and SFA skills , training, education, and experience must be

  14. Working on warfare-related sites. Review after 15 years and perspectives

    Energy Technology Data Exchange (ETDEWEB)

    Schneider, U. [Umweltberatung und Planung, Kassel (Germany)

    2003-07-01

    Fifteen years ago, in 1988, in connection with the Second International TNO/BMFT-Congress for the first time sites contaminated due to armaments production were mentioned, caused by the results of the first systematic investigation of a former explosives production plant in Hessisch Lichtenau. The authors referred to another 72 large chemical armament production plants in the FRG and 39 in the GDR. At the Third International TNO/BMFT-Congress in 1990 the complex of problems were substantiated and at the same time more topics were added. The Federal Government of Germany named the following areas suspected of being warfare-related contaminated sites: former production plants, ammunition depots, defusing sites, demolition areas and firing ranges, disassembly plants and intermediate and final storage plants for conventional and chemical combat agents. Soil, water and air pollution could be caused by the following products: explosives, chemical warfare agents, incendiaries, smoke agents, propellants, additives, primary and waste products and residues from the destruction of combat agents. In 1995 the Federal Environmental Agency (UBA) presented the results of the national survey showing that there are 3240 suspected contaminated sites. In 1995 also began the soil clean-up at the warfare-related contaminated sites Stadtallendorf and Hessisch Lichtenau. 8 respectively 10 years after the beginning of the systematic investigations the first contaminated soil was removed and treated in a thermal plant. In the run-up several R and D projects funded by the Federal Government were carried out (Stadtallendorf: MOSAL = Model Remediation of Contaminated Sites, Hessisch Lichtenau: Joint project Biological Remediation of Warfare-Related Contamination). At these sites basics were worked out and technologies were put to the test which can be used for the remediation of other sites. (orig.)

  15. The Alpini Effect: Why the US Army Should Train Units for Mountain Warfare

    Science.gov (United States)

    2014-05-22

    a contingent of elephants from the Spanish Ebro river over the Pyrenees , across Gaul (present day France) to the Rhone River and over the Alps into...power from disease and cold during its march over the Pyrenees and Alps.13 Switzerland quickly became a conflict zone in the early Middle Ages as... government made concessions to Prussia to resolve the conflict. Engels discussion on mountain warfare was influenced by the French Army’s success during

  16. No Compromise: Establishing Balance in the US Army’s Approach to Full-Spectrum Warfare

    Science.gov (United States)

    2011-04-04

    also needlessly prolongs corporate acceptance for a leadership culture that appreciates the ’ fluid character of warfare in the modern era. Beyond the...of Iraq, reveals that a numl?er of tactical leaders exhibited superb situational awareness and thoughtful response to extremely dynamic security...Paul D. Batchelor , Fixing Intel: · . A B lneprint for Making Intelligence Relevant in Afghanistan, Center for a New American Security, Washington

  17. Lipopolysaccharides in diazotrophic bacteria.

    Science.gov (United States)

    Serrato, Rodrigo V

    2014-01-01

    Biological nitrogen fixation (BNF) is a process in which the atmospheric nitrogen (N2) is transformed into ammonia (NH3) by a select group of nitrogen-fixing organisms, or diazotrophic bacteria. In order to furnish the biologically useful nitrogen to plants, these bacteria must be in constant molecular communication with their host plants. Some of these molecular plant-microbe interactions are very specific, resulting in a symbiotic relationship between the diazotroph and the host. Others are found between associative diazotrophs and plants, resulting in plant infection and colonization of internal tissues. Independent of the type of ecological interaction, glycans, and glycoconjugates produced by these bacteria play an important role in the molecular communication prior and during colonization. Even though exopolysaccharides (EPS) and lipochitooligosaccharides (LCO) produced by diazotrophic bacteria and released onto the environment have their importance in the microbe-plant interaction, it is the lipopolysaccharides (LPS), anchored on the external membrane of these bacteria, that mediates the direct contact of the diazotroph with the host cells. These molecules are extremely variable among the several species of nitrogen fixing-bacteria, and there are evidences of the mechanisms of infection being closely related to their structure.

  18. Lipopolysaccharides in diazotrophic bacteria

    Directory of Open Access Journals (Sweden)

    Rodrigo Vassoler Serrato

    2014-09-01

    Full Text Available Biological nitrogen fixation is a process in which the atmospheric nitrogen (N2 is transformed into ammonia (NH3 by a select group of nitrogen-fixing organisms, or diazotrophic bacteria. In order to furnish the biologically useful nitrogen to plants, these bacteria must be in constant molecular communication with their host plants. Some of these molecular plant-microbe interactions are very specific, resulting in a symbiotic relationship between the diazotroph and the host. Others are found between associative diazotrophs and plants, resulting in plant infection and colonization of internal tissues. Independent of the type of ecological interaction, glycans and glycoconjugates produced by these bacteria play an important role in the molecular communication prior and during colonization. Even though exopolysaccharides (EPS and lipochitooligosaccharides (LCO produced by diazotrophic bacteria and released onto the environment have their importance in the microbe-plant interaction, it is the lipopolysaccharides (LPS, anchored on the external membrane of these bacteria, that mediates the direct contact of the diazotroph with the host cells. These molecules are extremely variable among the several species of nitrogen fixing-bacteria, and there are evidences of the mechanisms of infection being closely related to their structure.

  19. [Glanders--a potential disease for biological warfare in humans and animals].

    Science.gov (United States)

    Lehavi, Ofer; Aizenstien, Orna; Katz, Lior H; Hourvitz, Ariel

    2002-05-01

    Infection with Burkholderia mallei (formerly Pseudomonas mallei) can cause a subcutaneous infection known as "farcy" or can disseminate to condition known as Glanders. It is primarily a disease affecting horses, donkeys and mules. In humans, Glanders can produce four types of disease: localized form, pulmonary form, septicemia, and chronic form. Necrosis of the tracheobronchial tree and pustular skin lesions characterize acute infection with B. mallei. Other symptoms include febrile pneumonia, if the organism was inhaled, or signs of sepsis and multiple abscesses, if the skin was the port of entry. Glanders is endemic in Africa, Asia, the Middle East, and Central and South America. Glanders has low contiguous potential, but because of the efficacy of aerosolized dissemination and the lethal nature of the disease, B. mallei was considered a candidate for biological warfare. During World War I, Glanders was believed to have been spread to infect large numbers of Russian horses and mules on the Eastern front. The Japanese infected horses, civilians and prisoners of war during World War II. The USA and the Soviet Union have shown interest in B. mallei in their biological warfare program. The treatment is empiric and includes mono or poly-therapy with Ceftazidime, Sulfadiazine, Trimethoprim + Sulfamethoxazol, Gentamicin, Imipenem etc. Aggressive control measures essentially eliminated Glanders from the west. However, with the resurgent concern about biological warfare, B. mallei is now being studied in a few laboratories worldwide. This review provides an overview of the disease and presents the only case reported in the western world since 1949.

  20. Operational advantages of using Cyber Electronic Warfare (CEW) in the battlefield

    Science.gov (United States)

    Yasar, Nurgul; Yasar, Fatih M.; Topcu, Yucel

    2012-06-01

    While cyberspace is emerging as a new battlefield, conventional Electronic Warfare (EW) methods and applications are likely to change. Cyber Electronic Warfare (CEW) concept which merges cyberspace capabilities with traditional EW methods, is a new and enhanced form of the electronic attack. In this study, cyberspace domain of the battlefield is emphazised and the feasibility of integrating Cyber Warfare (CW) concept into EW measures is researched. The SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis method is used to state the operational advantages of using CEW concept in the battlefield. The operational advantages of CEW are assessed by means of its effects on adversary air defense systems, communication networks and information systems. Outstanding technological and operational difficulties are pointed out as well. As a result, a comparison of CEW concept and conventional EW applications is presented. It is concluded that, utilization of CEW concept is feasible at the battlefield and it may yield important operational advantages. Even though the computers of developed military systems are less complex than normal computers, they are not subjected to cyber threats since they are closed systems. This concept intends to show that these closed systems are also open to the cyber threats. As a result of the SWOT analysis, CEW concept provides Air Forces to be used in cyber operations effectively. On the other hand, since its Collateral Damage Criteria (CDC) is low, the usage of cyber electronic attack systems seems to grow up.

  1. Tradeoff Analysis for Optimal Multiobjective Inventory Model

    Directory of Open Access Journals (Sweden)

    Longsheng Cheng

    2013-01-01

    Full Text Available Deterministic inventory model, the economic order quantity (EOQ, reveals that carrying inventory or ordering frequency follows a relation of tradeoff. For probabilistic demand, the tradeoff surface among annual order, expected inventory and shortage are useful because they quantify what the firm must pay in terms of ordering workload and inventory investment to meet the customer service desired. Based on a triobjective inventory model, this paper employs the successive approximation to obtain efficient control policies outlining tradeoffs among conflicting objectives. The nondominated solutions obtained by successive approximation are further used to plot a 3D scatterplot for exploring the relationships between objectives. Visualization of the tradeoffs displayed by the scatterplots justifies the computation effort done in the experiment, although several iterations needed to reach a nondominated solution make the solution procedure lengthy and tedious. Information elicited from the inverse relationships may help managers make deliberate inventory decisions. For the future work, developing an efficient and effective solution procedure for tradeoff analysis in multiobjective inventory management seems imperative.

  2. Sistem Informasi untuk Transaksi dan Analisis Inventori

    Directory of Open Access Journals (Sweden)

    Cynthia Damayanti

    2012-01-01

    Full Text Available This research aim to developed an inventory information system which integrated convensional data records with an analysis system based on inventory theories to answer questions about supplying stock, i.e. the latest inventory counts, prediction of future sales, when to order supply and how much to order these supply. In this research, purchasing and selling data records that usually seperated, had been integrated into an inventory database so up to date inventory list can be shown at demand. Furthermore, with data of past time sales, system will predict future sales using Least Square Linear Regretion method and Moving Average method. Inventory analysis will determine the Economic Order Quantity and Reorder Cycles for single item and multi item. An early warning also will notify user when an item reach the reorder point. This information system software that can be used to answer similar inventory problems in retail or warehouse company. As addition, research shown that sales with increasing/decreasing pattern had a more accurate prediction using Linear Regretion, while Moving Averages are better for stable sales. Research also shown multi items order collectively for the same supplyer more cost beneficial rather than single item orders.

  3. Context sensitivity in the force concept inventory

    Directory of Open Access Journals (Sweden)

    Gay Stewart

    2007-02-01

    Full Text Available The force concept inventory and a 10-question context-modified test were given to 647 students enrolled in introductory physics classes at the University of Arkansas. Context changes had an effect ranging from −3% to 10% on the individual questions. The average student score on the ten transformed questions was 3% higher than the average student score on the corresponding 10 force concept inventory questions. Therefore, the effect of contextual changes on the total of the 10 questions is not sufficient to affect normal use of the force concept inventory as a diagnostic instrument.

  4. The fecal bacteria

    Science.gov (United States)

    Sadowsky, Michael J.; Whitman, Richard L.

    2011-01-01

    The Fecal Bacteria offers a balanced, integrated discussion of fecal bacteria and their presence and ecology in the intestinal tract of mammals, in the environment, and in the food supply. This volume covers their use in examining and assessing water quality in order to offer protection from illnesses related to swimming in or ingesting contaminated water, in addition to discussing their use in engineering considerations of water quality, modeling, monitoring, and regulations. Fecal bacteria are additionally used as indicators of contamination of ready-to-eat foods and fresh produce. The intestinal environment, the microbial community structure of the gut microbiota, and the physiology and genomics of this broad group of microorganisms are explored in the book. With contributions from an internationally recognized group of experts, the book integrates medicine, public health, environmental, and microbiological topics in order to provide a unique, holistic understanding of fecal bacteria. Moreover, it shows how the latest basic science and applied research findings are helping to solve problems and develop effective management strategies. For example, readers will discover how the latest tools and molecular approaches have led to our current understanding of fecal bacteria and enabled us to improve human health and water quality. The Fecal Bacteria is recommended for microbiologists, clinicians, animal scientists, engineers, environmental scientists, food safety experts, water quality managers, and students. It will help them better understand fecal bacteria and use their knowledge to protect human and environmental health. They can also apply many of the techniques and molecular tools discussed in this book to the study of a broad range of microorganisms in a variety of habitats.

  5. Inventory in a Brazilian Sample

    Directory of Open Access Journals (Sweden)

    Taciano L. Milfont

    2008-01-01

    Full Text Available Éste artículo evalúa la validez de constructo y la validez discriminante del Inventario de Perspectiva Temporal de Zimbardo (Zimbardo Time Perspective Inventory, ZTPI de una muestra de 247 estudiantes brasileños. La estructura de cinco-factores de ZTPI, definidos por Pasado-Negativo, Presente-Hedonístico, Futuro, Pasado- Positivo y Presente-Fatalista, provee un ajuste aceptable de los datos, y pareció ser mejor estadísticamente que el ajuste de los modelos alternativos. El Presente-Hedonístico fue positivamente correlacionado con el consumo de alcohol y negativamente con la religiosidad, el Futuro fue correlacionado positivamente con la preocupación por la salud y negativamente con el consumo de alcohol, y el Pasado-Positivo fue positivamente correlacionado con el uso del reloj. Los resultados encontrados concuerdan con los estudios anteriores, indicando que las cinco dimensiones de perspectiva del tiempo pueden ser identificadas cognitivamente. Además los patrones de correlación con otras variables son comparables a través de otras culturas.

  6. Inventory of state energy models

    Energy Technology Data Exchange (ETDEWEB)

    Melcher, A.G.; Gist, R.L.; Underwood, R.G.; Weber, J.C.

    1980-03-31

    These models address a variety of purposes, such as supply or demand of energy or of certain types of energy, emergency management of energy, conservation in end uses of energy, and economic factors. Fifty-one models are briefly described as to: purpose; energy system; applications;status; validation; outputs by sector, energy type, economic and physical units, geographic area, and time frame; structure and modeling techniques; submodels; working assumptions; inputs; data sources; related models; costs; references; and contacts. Discussions in the report include: project purposes and methods of research, state energy modeling in general, model types and terminology, and Federal legislation to which state modeling is relevant. Also, a state-by-state listing of modeling efforts is provided and other model inventories are identified. The report includes a brief encylopedia of terms used in energy models. It is assumed that many readers of the report will not be experienced in the technical aspects of modeling. The project was accomplished by telephone conversations and document review by a team from the Colorado School of Mines Research Institute and the faculty of the Colorado School of Mines. A Technical Committee (listed in the report) provided advice during the course of the project.

  7. National Coal Quality Inventory (NACQI)

    Energy Technology Data Exchange (ETDEWEB)

    Robert Finkelman

    2005-09-30

    The U.S. Geological Survey (USGS) conducted the National Coal Quality Inventory (NaCQI) between 1999 and 2005 to address a need for quality information on coals that will be mined during the next 20-30 years. Collaboration between the USGS, State geological surveys, universities, coal burning utilities, and the coal mining industry plus funding support from the Electric Power Research Institute (EPRI) and the U.S. Department of Energy (DOE) permitted collection and submittal of coal samples for analysis. The chemical data (proximate and ultimate analyses; major, minor and trace element concentrations) for 729 samples of raw or prepared coal, coal associated shale, and coal combustion products (fly ash, hopper ash, bottom ash and gypsum) from nine coal producing States are included. In addition, the project identified a new coal reference analytical standard, to be designated CWE-1 (West Elk Mine, Gunnison County, Colorado) that is a high-volatile-B or high-volatile-A bituminous coal with low contents of ash yield and sulfur, and very low, but detectable contents of chlorine, mercury and other trace elements.

  8. Danish emission inventory for agriculture. Inventories 1985 - 2009

    Energy Technology Data Exchange (ETDEWEB)

    Hjorth Mikkelsen, M.; Albrektsen, R.; Gyldenkaerne, S.

    2011-02-15

    By regulations given in international conventions Denmark is obliged to work out an annual emission inventory and document the methodology. The National Environmental Research Institute (NERI) at Aarhus University (AU) in Denmark is responsible for calculating and reporting the emissions. This report contains a description of the emissions from the agricultural sector from 1985 to 2009. Furthermore, the report includes a detailed description of methods and data used to calculate the emissions, which is based on national methodologies as well as international guidelines. For the Danish emissions calculations and data management an Integrated Database model for Agricultural emissions (IDA) is used. The emission from the agricultural sector includes emission of the greenhouse gases methane (CH{sub 4}), nitrous oxide (N{sub 2}O), ammonia (NH{sub 3}), particulate matter (PM), non-methane volatile organic compounds (NMVOC) and other pollutants related to the field burning of agricultural residue such as NO{sub x}, CO{sub 2}, CO, SO{sub 2}, heavy metals, dioxin and PAH. The ammonia emission from 1985 to 2009 has decreased from 119 300 tonnes of NH{sub 3} to 73 800 tonnes NH{sub 3}, corresponding to a 38 % reduction. The emission of greenhouse gases has decreased by 25 % from 12.9 M tonnes CO{sub 2} equivalents to 9.6 M tonnes CO{sub 2} equivalents from 1985 to 2009. Improvements in feed efficiency and utilisation of nitrogen in livestock manure are the most important reasons for the reduction of both the ammonia and greenhouse gas emissions. (Author)

  9. Biota - 2011 Vegetation Inventory - Marsh Lake, MN

    Data.gov (United States)

    Army Corps of Engineers, Department of the Army, Department of Defense — 2011 Vegetation Classification for Marsh Lake, MN Vegetation Project Report, OMBIL Environmental Stewardship - Level 1 Inventory. Marsh Lake is located on the...

  10. Biota - 2009 Vegetation Inventory - Lake Ashtabula, ND

    Data.gov (United States)

    Army Corps of Engineers, Department of the Army, Department of Defense — 2009 Vegetation Classification for Lake Ashtabula, ND Vegetation Project Report, OMBIL Environmental Stewardship - Level 1 Inventory, U.S. Army Corps of Engineers...

  11. Wildlife Inventory Plan : Mingo National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This Wildlife Inventory Plan for Mingo NWR outlines procedures for monitoring the distribution, abundance, and population dynamics of the species of wildlife...

  12. Historical Ambient Air Quality Data Inventory

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Historical Ambient Air Quality Data Inventory contains measured and estimated data on ambient air pollution for use in assessing air quality, assisting in...

  13. Wildlife Inventory Plan: Tetlin National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The objective of this inventory plan for Tetlin NWR is to provide a management tool for the measurement of progress in attaining wildlife population goals. This plan...

  14. The Road Inventory of Alaska Aviation Management

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — To determine the relative needs of the U.S. Fish and Wildlife Service, the Federal Highway Administration (FHWA) was asked to inventory all public access and...

  15. Little River NWR Inventory and Monitoring Plan

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This Inventory and Monitoring Plan for Little River National Wildlife Refuge is a step-down from the Comprehensive Conservation Plan and Forest Habitat Management...

  16. Design considerations for tropical forest inventories

    Directory of Open Access Journals (Sweden)

    Ronald Edward McRoberts

    2013-06-01

    Full Text Available Forests contribute substantially to maintaining the global greenhouse gas balance, primarily because among the five economic sectors identified by the United Nations Framework Convention on Climate Change, only the forestry sector has the potential to remove greenhouse gas emissions from the atmosphere. In this context, development of national forest carbon accounting systems, particularly in countries with tropical forests, has emerged as an international priority. Because these systems are often developed as components of or in parallel with national forest inventories, a brief review of statistical issues related to the development of forest ground sampling designs is provided. This overview addresses not only the primary issues of plot configurations and sampling designs, but also to a lesser extent the emerging roles of remote sensing and uncertainty assessment. Basic inventory principles are illustrated for two case studies, the national forest inventory of Brazil with special emphasis on the state of Santa Catarina, and an inventory for Tanzania.

  17. Toxic Release Inventory Chemicals by Groupings

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Toxics Release Inventory (TRI) makes available information for more than 600 toxic chemicals that are being used, manufactured, treated, transported, or released...

  18. Wildlife Inventory Plan: Seney National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Wildlife Inventory Plan is the guideline employed to obtain useful parameters related to the distribution, abundance, and population dynamics of wildlife...

  19. US Forest Service Current Invasive Plants Inventory

    Data.gov (United States)

    US Forest Service, Department of Agriculture — A map service on the www depicting the most recent measurement of Invasive Plant Infestation polygons collected by the National Invasive Plant Inventory Protocol....

  20. Experimental validation of pulsed column inventory estimators

    Energy Technology Data Exchange (ETDEWEB)

    Beyerlein, A.L.; Geldard, J.F. (Clemson Univ., SC (United States)); Weh, R. (Gesellschaft fuer Nuklear-Service mbH, Hannover (Germany)); Eiben, K.; Dander, T. (Wiederaufbereitungsanlage Karlsruhe Betriebsgesellschaft mbH (WAK), Eggenstein-Leopoldshafen (Germany)); Hakkila, E.A. (Los Alamos National Lab., NM (United States))

    1991-01-01

    Near-real-time accounting (NRTA) for reprocessing plants relies on the timely measurement of all transfers through the process area and all inventory in the process. It is difficult to measure the inventory of the solvent contractors; therefore, estimation techniques are considered. We have used experimental data obtained at the TEKO facility in Karlsruhe and have applied computer codes developed at Clemson University to analyze this data. For uranium extraction, the computer predictions agree to within 15% of the measured inventories. We believe this study is significant in demonstrating that using theoretical models with a minimum amount of process data may be an acceptable approach to column inventory estimation for NRTA. 15 refs., 7 figs.

  1. Coal Mines, Abandoned - AML Inventory Sites 201601

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — This data set portrays the approximate location of Abandoned Mine Land Problem Areas containing public health, safety, and public welfare problems created by past...

  2. Allowance Holdings and Transfers Data Inventory

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Allowance Holdings and Transfers Data Inventory contains measured data on holdings and transactions of allowances under the NOx Budget Trading Program (NBP), a...

  3. United States Interagency Elevation Inventory (USIEI)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The U.S. Interagency Elevation Inventory displays high-accuracy topographic and bathymetric data for the United States and its territories. The project is a...

  4. Mobile Source Emissions Regulatory Compliance Data Inventory

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Mobile Source Emissions Regulatory Compliance Data Inventory data asset contains measured summary compliance information on light-duty, heavy-duty, and non-road...

  5. Minnesota DNR Forest Stand Inventory Version 2

    Data.gov (United States)

    Minnesota Department of Natural Resources — This layer is a digital inventory of individual forest stands. The data is collected by DNR Foresters in each DNR Forestry Administrative Area, and is updated on a...

  6. 21 CFR 1304.11 - Inventory requirements.

    Science.gov (United States)

    2010-04-01

    ... commences business with no controlled substances on hand, he/she shall record this fact as the initial... distributor (e.g., in transit or in storage for shipment). (5) Inventories of chemical analysts. Each...

  7. Wildlife Inventory Plan : Pungo National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — Major objectives of the refuge are to provide public recreation, and to maintain populations of species. A high level of management and inventory is assigned to the...

  8. Anaerobic bacteria in otitis media.

    Science.gov (United States)

    Fulghum, R S; Daniel, H J; Yarborough, J G

    1977-01-01

    Anaerobic bacteria, Peptostrepotococcus intermedius and Propionibacterium acnes, were found in mixed culture specimens from four to ten tested cases of chronic secretory otitis media. These anaerobic bacteria were in a mixed infection flora with aerobic bacteria most often Staphylococcus epidermidis and Cornybacterium sp. which do not fit any established species. The findings of anaerobic bacteria in otitis media is consistent with the sporadic report of the involvement of anaerobic bacteria in otitis media in the literature since 1898.

  9. Strategic special nuclear material Inventory Differences

    Science.gov (United States)

    1985-07-01

    This sixteenth periodic semiannual report of Inventory Differences (ID) covers the last six months of fiscal year 1984 (April 1, 1984, through September 30, 1984), for the Department of Energy (DOE) and DOE contractor facilities possessing significant quantities of strategic special nuclear material (SSNM). Inventory Differences are simply the differences between the amount of material shown in the accounting records and the amount of material reported in the physical inventory. These differences are generally due to errors in estimating material in unmeasurable form at the time of an inventory, unmeasurable holdup in equipment, measurement imprecisions, inaccuracies in initial determinations of SSNM produced or used in nuclear reactors, and inventory or bookkeeping errors. Both DOE and contractors operating DOE facilities carefully maintain, analyze, and investigate ID data. Inventory Differences are expected in nuclear material processing and are not, in and of themselves, evidence of lost or stolen material. On the other hand, ID analysis provides valuable information on the effectiveness of the safeguards system's physical protection and material control measures as well as a check on the process controls and material management procedures. If necessary, an operation may be shut down until an ID is resolved.

  10. Technical Basis for PNNL Beryllium Inventory

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, Michelle Lynn

    2014-07-09

    The Department of Energy (DOE) issued Title 10 of the Code of Federal Regulations Part 850, “Chronic Beryllium Disease Prevention Program” (the Beryllium Rule) in 1999 and required full compliance by no later than January 7, 2002. The Beryllium Rule requires the development of a baseline beryllium inventory of the locations of beryllium operations and other locations of potential beryllium contamination at DOE facilities. The baseline beryllium inventory is also required to identify workers exposed or potentially exposed to beryllium at those locations. Prior to DOE issuing 10 CFR 850, Pacific Northwest Nuclear Laboratory (PNNL) had documented the beryllium characterization and worker exposure potential for multiple facilities in compliance with DOE’s 1997 Notice 440.1, “Interim Chronic Beryllium Disease.” After DOE’s issuance of 10 CFR 850, PNNL developed an implementation plan to be compliant by 2002. In 2014, an internal self-assessment (ITS #E-00748) of PNNL’s Chronic Beryllium Disease Prevention Program (CBDPP) identified several deficiencies. One deficiency is that the technical basis for establishing the baseline beryllium inventory when the Beryllium Rule was implemented was either not documented or not retrievable. In addition, the beryllium inventory itself had not been adequately documented and maintained since PNNL established its own CBDPP, separate from Hanford Site’s program. This document reconstructs PNNL’s baseline beryllium inventory as it would have existed when it achieved compliance with the Beryllium Rule in 2001 and provides the technical basis for the baseline beryllium inventory.

  11. PCDD/PCDF release inventories

    Energy Technology Data Exchange (ETDEWEB)

    Fiedler, H. [UNEP Chemicals, Chatelaine (Switzerland)

    2004-09-15

    The Stockholm Convention on Persistent Organic Pollutants (POPs) entered into force on 17 May 2004 with 50 Parties. In May 2004, 59 countries had ratified or acceded the Convention. The objective of the Convention is ''to protect human health and the environment from persistent organic pollutants''. For intentionally produced POPs, e.g., pesticides and industrial chemicals such as hexachlorobenzene and polychlorinated biphenyls, this will be achieved by stop of production and use. For unintentionally generated POPs, such as polychlorinated dibenzo-pdioxins (PCDD) and polychlorinated dibenzofurans (PCDF), measures have to be taken to ''reduce the total releases derived from anthropogenic sources''; the final goal is ultimate elimination, where feasible. Under the Convention, Parties have to establish and maintain release inventories to prove the continuous release reduction. Since many countries do not have the technical and financial capacity to measure all releases from all potential PCDD/PCDF sources, UNEP Chemicals has developed the ''Standardized Toolkit for the Identification of Quantification of Dioxin and Furan Releases'' (''Toolkit'' for short), a methodology to estimate annual releases from a number of sources. With this methodology, annual releases can be estimated by multiplying process-specific default emission factors provided in the Toolkit with national activity data. At the seventh session of the Intergovernmental Negotiating Committee, the Toolkit was recommended to be used by countries when reporting national release data to the Conference of the Parties. The Toolkit is especially used by developing countries and countries with economies in transition where no measured data are available. Results from Uruguay, Thailand, Jordan, Philippines, and Brunei Darussalam have been published.

  12. Wildlife Inventory, Craig Mountain, Idaho.

    Energy Technology Data Exchange (ETDEWEB)

    Cassirer, E. Frances

    1995-06-01

    Wildlife distribution/abundance were studied at this location during 1993 and 1994 to establish the baseline as part of the wildlife mitigation agreement for construction of Dworshak reservoir. Inventory efforts were designed to (1) document distribution/abundance of 4 target species: pileated woodpecker, yellow warbler, black-capped chickadee, and river otter, (2) determine distribution/abundance of rare animals, and (3) determine presence and relative abundance of all other species except deer and elk. 201 wildlife species were observed during the survey period; most were residents or used the area seasonally for breeding or wintering. New distribution or breeding records were established for at least 6 species. Pileated woodpeckers were found at 35% of 134 survey points in upland forests; estimated densities were 0-0.08 birds/ha, averaging 0.02 birds/ha. Yellow warblers were found in riparian areas and shrubby draws below 3500 ft elev., and were most abundant in white alder plant communities (ave. est. densities 0.2-2. 1 birds/ha). Black-capped chickadees were found in riparian and mixed tall shrub vegetation at all elevations (ave. est. densities 0-0.7 birds/ha). River otters and suitable otter denning and foraging habitat were observed along the Snake and Salmon rivers. 15 special status animals (threatened, endangered, sensitive, state species of special concern) were observed at Craig Mt: 3 amphibians, 1 reptile, 8 birds, 3 mammals. Another 5 special status species potentially occur (not documented). Ecosystem-based wildlife management issues are identified. A monitoring plant is presented for assessing effects of mitigation activities.

  13. 10 CFR 850.20 - Baseline beryllium inventory.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Baseline beryllium inventory. 850.20 Section 850.20 Energy... Baseline beryllium inventory. (a) The responsible employer must develop a baseline inventory of the... inventory, the responsible employer must: (1) Review current and historical records; (2) Interview...

  14. 40 CFR 710.4 - Scope of the inventory.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Scope of the inventory. 710.4 Section... ACT TSCA CHEMICAL INVENTORY REGULATIONS General Provisions § 710.4 Scope of the inventory. (a... is extracted from air by any means, will automatically be included in the inventory under...

  15. 78 FR 47273 - Information Collection; Inventory Property Management

    Science.gov (United States)

    2013-08-05

    ... Farm Service Agency Information Collection; Inventory Property Management AGENCY: Farm Service Agency... Inventory Property Management. The information is used to evaluate applicant requests to purchase inventory... part 767) Farm Loan Programs--Inventory Property Management. OMB Number: 0560-0234. Expiration Date:...

  16. 41 CFR 101-27.208 - Inventory analyses.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Inventory analyses. 101... Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT 27-INVENTORY MANAGEMENT 27.2-Management of Shelf-Life Materials § 101-27.208 Inventory analyses. (a) An inventory analysis shall...

  17. 27 CFR 19.464 - Denatured spirits inventories.

    Science.gov (United States)

    2010-04-01

    ... inventories. 19.464 Section 19.464 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE... of Articles Inventories § 19.464 Denatured spirits inventories. Each proprietor shall take a physical inventory of all denatured spirits in the processing account at the close of each calendar quarter and...

  18. 41 CFR 109-27.5104-4 - Physical inventories.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Physical inventories... PROCUREMENT 27-INVENTORY MANAGEMENT 27.51-Management of Precious Metals § 109-27.5104-4 Physical inventories. (a) Physical inventories shall be conducted annually by custodians, and witnessed by the...

  19. 48 CFR 1245.508-2 - Reporting results of inventories.

    Science.gov (United States)

    2010-10-01

    ... inventories. 1245.508-2 Section 1245.508-2 Federal Acquisition Regulations System DEPARTMENT OF TRANSPORTATION... 1245.508-2 Reporting results of inventories. The inventory report shall also include the following: (a) Name and title of the individual(s) that performed the physical inventory; (b) An itemized,...

  20. 26 CFR 1.471-1 - Need for inventories.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 6 2010-04-01 2010-04-01 false Need for inventories. 1.471-1 Section 1.471-1...) INCOME TAXES Inventories § 1.471-1 Need for inventories. In order to reflect taxable income correctly, inventories at the beginning and end of each taxable year are necessary in every case in which the...

  1. 26 CFR 1.471-3 - Inventories at cost.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 6 2010-04-01 2010-04-01 false Inventories at cost. 1.471-3 Section 1.471-3...) INCOME TAXES Inventories § 1.471-3 Inventories at cost. Cost means: (a) In the case of merchandise on hand at the beginning of the taxable year, the inventory price of such goods. (b) In the case...

  2. 48 CFR 3045.508-2 - Reporting results of inventories.

    Science.gov (United States)

    2010-10-01

    ... inventories. 3045.508-2 Section 3045.508-2 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND... inventories. The inventory report shall also include the following: (a) Name and title of the individual(s) that performed the physical inventory; (b) An itemized, categorized listing of all property...

  3. Teaching Accounting for Inventory by Calling on Students' Personal Experiences

    Science.gov (United States)

    Briginshaw, John

    2010-01-01

    This essay seeks to give practical guidance to accounting instructors seeking to convey the difficult concepts of accounting for inventory. Techniques to convey the concepts of assumed inventory flow, inventory valuation under inflation and deflation, impairment of inventories, LIFO [Last In, First Out] liquidations and the concept of the periodic…

  4. System to maximize inventory performance in a small hospital.

    Science.gov (United States)

    VanDerLinde, L P

    1983-01-01

    A computerized system to maximize inventory performance in a small hospital is described. An inventory control system, which integrates economic order quantity (EOQ) and ABC inventory models was implemented in a 146-bed hospital. The perpetual inventory control data base, supported by the hospital's mainframe computer, generates monthly inventory statistics that are segregated into A, B, and C reports. Using a hand-held computer that interfaces with the perpetual inventory system, a series of inventory management reports were developed. These reports, which are based on the EOQ model, provide the following information for each drug line item: EOQ, EOQ proposed carrying cost, actual inventory carrying costs, safety stock, order point, average inventory, and the "on hand/on order" point. Several supplemental inventory management reports were also developed. While implementing the computerized inventory system, the pharmacy also changed its purchasing strategy from predominantly direct accounts to a progressive prime-vendor wholesaler. From December 1980 to December 1981, the ABC/EOQ system with progressive prime-vendor involvement essentially doubled total aggregate inventory turnover. A 46.5% reduction in standing inventory levels occurred. The drug cost per line item dispersed remained relatively constant over the one-year period, despite price increases. The application of the computerized ABC/EOQ inventory model to an online perpetual inventory control data base effectively reduced the inventory operation costs.

  5. 41 CFR 109-27.5104-3 - Perpetual inventory records.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Perpetual inventory... PROCUREMENT 27-INVENTORY MANAGEMENT 27.51-Management of Precious Metals § 109-27.5104-3 Perpetual inventory records. Perpetual inventory records shall be maintained as specified in Chapter V of DOE Order...

  6. Adaptation of foreign experience of inventory accounting in domestic practice

    Directory of Open Access Journals (Sweden)

    Ірина Анатоліївна Карабаза

    2015-03-01

    Full Text Available This article provides a comparison of foreign and domestic experience in inventory accounting. Advantages and disadvantages of perpetual and periodic inventory systems were defined. The viability of periodic inventory system practice was investigated in the context of Ukrainian accounting system. The methodology for store accounting procedure in accordance with periodic inventory system was proposed for domestic accounts

  7. Adaptation of foreign experience of inventory accounting in domestic practice

    OpenAIRE

    Ірина Анатоліївна Карабаза; Людмила Ігорівна Лежненко

    2015-01-01

    This article provides a comparison of foreign and domestic experience in inventory accounting. Advantages and disadvantages of perpetual and periodic inventory systems were defined. The viability of periodic inventory system practice was investigated in the context of Ukrainian accounting system. The methodology for store accounting procedure in accordance with periodic inventory system was proposed for domestic accounts

  8. 26 CFR 1.471-8 - Inventories of retail merchants.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 6 2010-04-01 2010-04-01 false Inventories of retail merchants. 1.471-8 Section... (CONTINUED) INCOME TAXES Inventories § 1.471-8 Inventories of retail merchants. (a) Retail merchants who employ what is known as the “retail method” of pricing inventories may make their returns upon...

  9. Preparing US community greenhouse gas inventories for climate action plans

    Science.gov (United States)

    Blackhurst, Michael; Matthews, H. Scott; Sharrard, Aurora L.; Hendrickson, Chris T.; Lima Azevedo, Inês

    2011-07-01

    This study illustrates how alternative and supplemental community-level greenhouse gas (GHG) inventory techniques could improve climate action planning. Eighteen US community GHG inventories are reviewed for current practice. Inventory techniques could be improved by disaggregating the sectors reported, reporting inventory uncertainty and variability, and aligning inventories with local organizations that could facilitate emissions reductions. The potential advantages and challenges of supplementing inventories with comparative benchmarks are also discussed. While GHG inventorying and climate action planning are nascent fields, these techniques can improve CAP design, help communities set more meaningful emission reduction targets, and facilitate CAP implementation and progress monitoring.

  10. Preparing US community greenhouse gas inventories for climate action plans

    Energy Technology Data Exchange (ETDEWEB)

    Blackhurst, Michael [Department of Civil, Architectural and Environmental Engineering, The University of Texas at Austin, 1 University Station C1752, Austin, TX 78712-0276 (United States); Scott Matthews, H; Hendrickson, Chris T [Department of Civil and Environmental Engineering, Carnegie Mellon University, 119 Porter Hall, Pittsburgh, PA 15213 (United States); Sharrard, Aurora L [Green Building Alliance, 333 East Carson Street, Suite 331, Pittsburgh, PA 15219 (United States); Azevedo, Ines Lima, E-mail: mblackhurst@gmail.com, E-mail: hsm@cmu.edu, E-mail: auroras@gbapgh.org, E-mail: cth@andrew.cmu.edu, E-mail: iazevedo@cmu.edu [Department of Engineering and Public Policy, Carnegie Mellon University, 119 Porter Hall, Pittsburgh, PA 15213 (United States)

    2011-07-15

    This study illustrates how alternative and supplemental community-level greenhouse gas (GHG) inventory techniques could improve climate action planning. Eighteen US community GHG inventories are reviewed for current practice. Inventory techniques could be improved by disaggregating the sectors reported, reporting inventory uncertainty and variability, and aligning inventories with local organizations that could facilitate emissions reductions. The potential advantages and challenges of supplementing inventories with comparative benchmarks are also discussed. While GHG inventorying and climate action planning are nascent fields, these techniques can improve CAP design, help communities set more meaningful emission reduction targets, and facilitate CAP implementation and progress monitoring.

  11. Mycophagous soil bacteria

    NARCIS (Netherlands)

    Rudnick, M.B.

    2015-01-01

    Abstract

    Soil microorganisms evolved several strategies to compete for limited nutrients in soil. Bacteria of the genus Collimonas developed a way to exploit fungi as a source of organic nutrients. This strategy has been termed “mycophagy&r

  12. Antibiotic-Resistant Bacteria.

    Science.gov (United States)

    Longenecker, Nevin E.; Oppenheimer, Dan

    1982-01-01

    A study conducted by high school advanced bacteriology students appears to confirm the hypothesis that the incremental administration of antibiotics on several species of bacteria (Escherichia coli, Staphylococcus epidermis, Bacillus sublitus, Bacillus megaterium) will allow for the development of antibiotic-resistant strains. (PEB)

  13. Bacteria-surface interactions.

    Science.gov (United States)

    Tuson, Hannah H; Weibel, Douglas B

    2013-05-14

    The interaction of bacteria with surfaces has important implications in a range of areas, including bioenergy, biofouling, biofilm formation, and the infection of plants and animals. Many of the interactions of bacteria with surfaces produce changes in the expression of genes that influence cell morphology and behavior, including genes essential for motility and surface attachment. Despite the attention that these phenotypes have garnered, the bacterial systems used for sensing and responding to surfaces are still not well understood. An understanding of these mechanisms will guide the development of new classes of materials that inhibit and promote cell growth, and complement studies of the physiology of bacteria in contact with surfaces. Recent studies from a range of fields in science and engineering are poised to guide future investigations in this area. This review summarizes recent studies on bacteria-surface interactions, discusses mechanisms of surface sensing and consequences of cell attachment, provides an overview of surfaces that have been used in bacterial studies, and highlights unanswered questions in this field.

  14. Vendor Managed Inventory:Retail Industry Perspective of Malaysia

    OpenAIRE

    Madjlesi Taklimi, Zahra

    2011-01-01

    The concept of Vendor Managed Inventory (VMI) radically changes a traditional inventory management. Under the typical business model, the buyer or retailer is in total control of the timing and volume of the order, in order placing and managing the inventory plan. Whereas VMI is a supply chain initiative where the supplier is responsible for all decisions regarding inventories at the retailers, i.e. under VMI program the supplier is authorized to manage inventories of agreed-upon stock-keepin...

  15. Unified Communications for Space Inventory Management

    Science.gov (United States)

    Gifford, Kevin K.; Fink, Patrick W.; Barton, Richard; Ngo, Phong H.

    2009-01-01

    To help assure mission success for long-duration exploration activities, NASA is actively pursuing wireless technologies that promote situational awareness and autonomy. Wireless technologies are typically extensible, offer freedom from wire tethers, readily support redundancy, offer potential for decreased wire weight, and can represent dissimilar implementation for increased reliability. In addition, wireless technologies can enable additional situational awareness that otherwise would be infeasible. For example, addition of wired sensors, the need for which might not have been apparent at the outset of a program, night be extremely costly due in part to the necessary routing of cables through the vehicle. RFID, or radio frequency identification, is a wireless technology with the potential for significant savings and increased reliability and safety in space operations. Perhaps the most obvious savings relate to the application of inventory management. A fully automated inventory management system is highly desirable for long-term sustaining operations in space environments. This assertion is evidenced by inventory activities on the International Space Station, which represents the most extensive inventory tracking experience base in the history of space operations. In the short tern, handheld RFID readers offer substantial savings owing to reduced crew time for inventory audits. Over the long term, a combination of improved RFID technology and operational concepts modified to fully utilize the technology should result in space based inventory management that is highly reliable and requires very little crew time. In addition to inventory management, RFID is likely to find space applications in real-time location and tracking systems. These could vary from coarse-resolution RFID portals to the high resolution afforded by ultra-wideband (UWB) RFID. Longer range RFID technologies that leverage passive surface acoustic wave (SAW) devices are being investigated to

  16. Quality of life in chemical warfare survivors with ophthalmologic injuries: the first results form Iran Chemical Warfare Victims Health Assessment Study

    Directory of Open Access Journals (Sweden)

    Soroush Mohammad

    2009-01-01

    Full Text Available Abstract Background Iraq used chemical weapons extensively against the Iranians during the Iran-Iraq war (1980–1988. The aim of this study was to assess the health related quality of life (HRQOL in people who had ophthalmologic complications due to the sulfur mustard gas exposure during the war. Methods The Veterans and Martyrs Affair Foundation (VMAF database indicated that there were 196 patients with severe ophthalmologic complications due to chemical weapons exposure. Of these, those who gave consent (n = 147 entered into the study. Quality of life was measured using the 36-item Short Form Health Survey (SF-36 and scores were compared to those of the general public. In addition logistic regression analysis was performed to indicate variables that contribute to physical and mental health related quality of life. Results The mean age of the patients was 44.8 (SD = 8.7 ranging from 21 to 75 years. About one-third of the cases (n= 50 reported exposure to chemical weapons more than once. The mean exposure duration to sulfur mustard gas was 21.6 years (SD = 1.2. The lowest scores on the SF-36 subscales were found to be: the role physical and the general health. Quality of life in chemical warfare victims who had ophthalmologic problems was significantly lower than the general public (P Conclusion The study findings suggest that chemical warfare victims with ophthalmologic complications suffer from poor health related quality of life. It seems that the need for provision of health and support for this population is urgent. In addition, further research is necessary to measure health related quality of life in victims with different types of disabilities in order to support and enhance quality of life among this population.

  17. Planning Horizon for Production Inventory Models with Production Rate Dependent on Demand and Inventory Level

    Directory of Open Access Journals (Sweden)

    Jennifer Lin

    2013-01-01

    Full Text Available This paper discusses why the selection of a finite planning horizon is preferable to an infinite one for a replenishment policy of production inventory models. In a production inventory model, the production rate is dependent on both the demand rate and the inventory level. When there is an exponentially decreasing demand, the application of an infinite planning horizon model is not suitable. The emphasis of this paper is threefold. First, while pointing out questionable results from a previous study, we propose a corrected infinite planning horizon inventory model for the first replenishment cycle. Second, while investigating the optimal solution for the minimization problem, we found that the infinite planning horizon should not be applied when dealing with an exponentially decreasing demand. Third, we developed a new production inventory model under a finite planning horizon for practitioners. Numerical examples are provided to support our findings.

  18. Evaluating Global Emission Inventories of Biogenic Bromocarbons

    Science.gov (United States)

    Hossaini, Ryan; Mantle, H.; Chipperfield, M. P.; Montzka, S. A.; Hamer, P.; Ziska, F.; Quack, B.; Kruger, K.; Tegtmeier, S.; Atlas, E.; Sala, S.; Engel, A.; Bonisch, H.; Keber, T.; Oram, D.; Mills, G.; Ordonez, C.; Saiz-Lopez, A.; Warwick, N.; Liang, Q.; Feng, W.; Moore, F.; Miller, F.; Marecal, V.; Richards, N. A. D.; Dorf, M.; Pfeilsticker, K.

    2013-01-01

    Emissions of halogenated very short-lived substances (VSLS) are poorly constrained. However, their inclusion in global models is required to simulate a realistic inorganic bromine (Bry) loading in both the troposphere, where bromine chemistry perturbs global oxidizing capacity, and in the stratosphere, where it is a major sink for ozone (O3). We have performed simulations using a 3-D chemical transport model (CTM) including three top-down and a single bottom-up derived emission inventory of the major brominated VSLS bromoform (CHBr3) and dibromomethane (CH2Br2). We perform the first concerted evaluation of these inventories, comparing both the magnitude and spatial distribution of emissions. For a quantitative evaluation of each inventory, model output is compared with independent long-term observations at National Oceanic and Atmospheric Administration (NOAA) ground-based stations and with aircraft observations made during the NSF (National Science Foundation) HIAPER Pole-to-Pole Observations (HIPPO) project. For CHBr3, the mean absolute deviation between model and surface observation ranges from 0.22 (38 %) to 0.78 (115 %) parts per trillion (ppt) in the tropics, depending on emission inventory. For CH2Br2, the range is 0.17 (24 %) to 1.25 (167 %) ppt. We also use aircraft observations made during the 2011 Stratospheric Ozone: Halogen Impacts in a Varying Atmosphere (SHIVA) campaign, in the tropical western Pacific. Here, the performance of the various inventories also varies significantly, but overall the CTM is able to reproduce observed CHBr3 well in the free troposphere using an inventory based on observed sea-to-air fluxes. Finally, we identify the range of uncertainty associated with these VSLS emission inventories on stratospheric bromine loading due to VSLS (Br(VSLS/y)). Our simulations show Br(VSLS/y) ranges from approximately 4.0 to 8.0 ppt depending on the inventory. We report an optimized estimate at the lower end of this range (approximately 4 ppt

  19. Net-Centric Warfare 2.0: Cloud Computing and the New Age of War

    Science.gov (United States)

    2009-02-01

    gets credit for its part , the mashup must be provided free of charge, etc.).27 Google even provides documentation showing the user how to build a...created a Facebook group called "Un Millon de Voces Contra las FARC" ("One Million Voices against the FARC")… In less than 12 hours the group had more...key parts of the multibillion-dollar effort teetered on the brink of cancellation.”50 Network Centric Warfare as currently envisioned by the

  20. Development of Bicarbonate-Activated Peroxide as a Chemical and Biological Warfare Agent Decontaminant

    Science.gov (United States)

    2006-06-30

    Peroxide (HOO-) 7.8 29 26.7 ± 0.2 t-Butyl hydroperoxide ((CH3)3COO-) 7.8 9.7 39 Cumene hydroperoxide ((C6H6)C(CH3)2OO-) 7.8 9.3 22 All reactions run with...peroxymonocarbonate ion (HCO4-) as the oxidant in the catalytic oxidation reactions . For perhydrolytic cleavage of organophosphates the peroxycarbonate dianion...solubility and reaction rates for applications in chemical warfare agent decontamination. -O *C O O OH -O *C OH O HO *C OH O *CO2 HO2 - H2OHO *C O O OH pKa

  1. THE CONTRIBUTION MADE BY T.E. LAWRENCE TO THE THEORY OF REVOLUTIONARY WARFARE

    Directory of Open Access Journals (Sweden)

    G.K.B. Barron

    2012-02-01

    Full Text Available Lawrence was basically an academic thrown into the hurly-burly of leading an Arab revolt against Turkish domination. It could be said that the war in the Middle East was a sideshow of the First World War and Lawrence's part was a ' ... sideshow to the sideshow'l Why then has Lawrence been remembered when greater military men have been forgotten? The romanticism of his exploits are surely the reason, and yet the fact that he is the first modern theorist and possibly the "father" of modern revolutionary warfare, tends to be forgotten.

  2. Fate of chemical warfare agents and toxic indutrial chemicals in landfills

    DEFF Research Database (Denmark)

    Bartelt-Hunt, D.L.; Barlaz, M.A.; Knappe, D.R.U.

    2006-01-01

    One component of preparedness for a chemical attack is planning for the disposal of contaminated debris. To assess the feasibility of contaminated debris disposal in municipal solid waste (MSW) landfills, the fate of selected chemical warfare agents (CWAs) and toxic industrial chemicals (TICs......) in MSW landfills was predicted with a mathematical model. Five blister agents [sulfur mustard (HD), nitrogen mustard (HN-2), lewisite (L), ethyldichloroarsine (ED), and phosgene oxime (CX)], eight nerve agents [tabun (GA), sarin (GB), soman (GD), GE, GF, VX, VG, and VM], one riot-control agent [CS...

  3. New concepts and their applications in underwater acoustic warfare simulation system

    Institute of Scientific and Technical Information of China (English)

    DONG Yangze; YAO Lan

    2004-01-01

    An underwater acoustic warfare simulation system (UAWSS) with a structure of high level architecture (HLA) is studied based upon a previous research project. With the experience and lessons learned, some new concepts are adopted in the implementation of UAWSS according to the essence of simulation and the objective of the system, among which are simulation synthetic environment, signal processing at other simulation nodes, decomposition of underwater sound channel, channel varying law and rules on system and parts evaluation, etc. Applications of these new ideas show that they are effective.

  4. INVENTORIES MEASUREMENT – BETWEEN PRUDENCE AND NONPRUDENCE

    Directory of Open Access Journals (Sweden)

    Iulia JIANU

    2010-12-01

    Full Text Available In accounting, measurement is the process used to determine the value at which the items of financial statements are recognized in accounting and presented in the balance sheet and in the profit and loss account. Starting from the importance of measurement in accounting, the first study objective in this paper brings in the center of discussion the inventories measurement with the purpose to identify the main methods for inventories measurement at exit used by the economic entities listed on EuroNext Paris Exchange Stock. In the present context, when the financial crisis is still felt in the EU countries is important to note the extent to which economic entities demonstrate prudence in accounting by taking into consideration the inventories impairment at balance sheet date. Compliance with the prudence principle to integrate uncertainty in accounting measurement has the purpose to avoid the risk to transfer in the future periods the present uncertainties that are likely to strike the economic entity. One of the main consequences of this principle is to make impairments for inventories. Therefore the second objective of the present paper is to reflect the extent to which the entities under study record impairments for inventories at balance sheet date, as well as to highlight the manner in which is disclosed the information regarding the way the net realizable value can be calculated.

  5. Mobile source emissions inventory development. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Fang, K.Y.; De Paul, F.T.; Heavisides, T.; Wagner, D.

    1991-03-01

    The study was undertaken to develop a methodology for preparing a 5km by 5km areal gridded mobile source emissions inventory for areas of Illinois which are in nonattainment status with regard to National Ambient Air Quality Standards. A pilot emissions inventory was developed by linking the USEPA mobile source emissions program (MOBILE4) with existing traffic data from the Illinois Department of Transportation's (IDOT) Highway Record Data Bank (HRDB), the Chicago Area Transportation Study (CATS) and Illinois Department of Energy and Natural Resources' (ENR) Geographic Information System (GIS). The methodology developed here was applied to one pollutant in one test case county in Illinois. Hydrocarbon emissions from mobile sources in Kane county are the focus of the study. Vehicle type, vehicle age, and Vehicle Miles of Travel (VMT) distributions were obtained from information provided in the 1982 Illinois State Implementation Plan (SIP). Among the products of the project is a preliminary 25-sq km gridded mobile source hydrocarbon emissions inventory for Kane county. Numerical results as well as a color correlated overview map of the county-wide gridded emissions inventory are provided in the report. Recommendations for improving the methodology and further developing gridded mobile source emission inventories for other Illinois counties are also provided.

  6. Is Your ATM Dispensing Bacteria?

    Science.gov (United States)

    ... news/fullstory_162067.html Is Your ATM Dispensing Bacteria? Study in New York City found most of ... keypads in New York City were covered in bacteria, researchers reported, with most of the microbes coming ...

  7. Genomics of oral bacteria.

    Science.gov (United States)

    Duncan, Margaret J

    2003-01-01

    Advances in bacterial genetics came with the discovery of the genetic code, followed by the development of recombinant DNA technologies. Now the field is undergoing a new revolution because of investigators' ability to sequence and assemble complete bacterial genomes. Over 200 genome projects have been completed or are in progress, and the oral microbiology research community has benefited through projects for oral bacteria and their non-oral-pathogen relatives. This review describes features of several oral bacterial genomes, and emphasizes the themes of species relationships, comparative genomics, and lateral gene transfer. Genomics is having a broad impact on basic research in microbial pathogenesis, and will lead to new approaches in clinical research and therapeutics. The oral microbiota is a unique community especially suited for new challenges to sequence the metagenomes of microbial consortia, and the genomes of uncultivable bacteria.

  8. Manufacture of Probiotic Bacteria

    Science.gov (United States)

    Muller, J. A.; Ross, R. P.; Fitzgerald, G. F.; Stanton, C.

    Lactic acid bacteria (LAB) have been used for many years as natural biopreservatives in fermented foods. A small group of LAB are also believed to have beneficial health effects on the host, so called probiotic bacteria. Probiotics have emerged from the niche industry from Asia into European and American markets. Functional foods are one of the fastest growing markets today, with estimated growth to 20 billion dollars worldwide by 2010 (GIA, 2008). The increasing demand for probiotics and the new food markets where probiotics are introduced, challenges the industry to produce high quantities of probiotic cultures in a viable and stable form. Dried concentrated probiotic cultures are the most convenient form for incorporation into functional foods, given the ease of storage, handling and transport, especially for shelf-stable functional products. This chapter will discuss various aspects of the challenges associated with the manufacturing of probiotic cultures.

  9. Exopolysaccharides from Marine Bacteria

    Institute of Scientific and Technical Information of China (English)

    CHI Zhenming; FANG Yan

    2005-01-01

    Microbial polysaccharides represent a class of important products of growing interest for many sectors of industry. In recent years, there has been a growing interest in isolating new exopolysaccharides (EPSs)-producing bacteria from marine environments, particularly from various extreme marine environments. Many new marine microbial EPSs with novel chemical compositions, properties and structures have been found to have potential applications in fields such as adhesives,textiles, pharmaceuticals and medicine for anti-cancer, food additives, oil recovery and metal removal in mining and industrial waste treatments, etc This paper gives a brief summary of the information about the EPSs produced by marine bacteria,including their chemical compositions, properties and structures, together with their potential applications in industry.

  10. Cable Bacteria in Freshwater Sediments

    OpenAIRE

    Risgaard-Petersen, Nils; Kristiansen, Michael; Frederiksen, Rasmus B.; Dittmer, Anders Lindequist; Bjerg, Jesper Tataru; Trojan, Daniela; Schreiber, Lars; Damgaard, Lars Riis; Schramm, Andreas; Nielsen, Lars Peter

    2015-01-01

    In marine sediments cathodic oxygen reduction at the sediment surface can be coupled to anodic sulfide oxidation in deeper anoxic layers through electrical currents mediated by filamentous, multicellular bacteria of the Desulfobulbaceae family, the so-called cable bacteria. Until now, cable bacteria have only been reported from marine environments. In this study, we demonstrate that cable bacteria also occur in freshwater sediments. In a first step, homogenized sediment collected from the fre...

  11. Design of inventory pools in spare part support operation systems

    Science.gov (United States)

    Mo, Daniel Y.; Tseng, Mitchell M.; Cheung, Raymond K.

    2014-06-01

    The objective of a spare part support operation is to fulfill the part request order with different service contracts in the agreed response time. With this objective to achieve different service targets for multiple service contracts and the considerations of inventory investment, it is not only important to determine the inventory policy but also to design the structure of inventory pools and the order fulfilment strategies. In this research, we focused on two types of inventory pools: multiple inventory pool (MIP) and consolidated inventory pool (CIP). The idea of MIP is to maintain separated inventory pools based on the types of service contract, while CIP solely maintains a single inventory pool regardless of service contract. Our research aims to design the inventory pool analytically and propose reserve strategies to manage the order fulfilment risks in CIP. Mathematical models and simulation experiments would be applied for analysis and evaluation.

  12. Computer Modelling and Simulation for Inventory Control

    Directory of Open Access Journals (Sweden)

    G.K. Adegoke

    2012-07-01

    Full Text Available This study concerns the role of computer simulation as a device for conducting scientific experiments on inventory control. The stores function utilizes a bulk of physical assets and engages a bulk of financial resources in a manufacturing outfit therefore there is a need for an efficient inventory control. The reason being that inventory control reduces cost of production and thereby facilitates the effective and efficient accomplishment of production objectives of an organization. Some mathematical and statistical models were used to compute the Economic Order Quantity (EOQ. Test data were gotten from a manufacturing company and same were simulated. The results generated were used to predict a real life situation and have been presented and discussed. The language of implementation for the three models is Turbo Pascal due to its capability, generality and flexibility as a scientific programming language.

  13. Further validation of the Psychological Maltreatment Inventory.

    Science.gov (United States)

    Swift, E E; Gayton, W F

    1996-05-01

    This study attempted to provide further validation of the Psychological Maltreatment Inventory (PMI). The PMI was found to be correlated with scores on the Beck Depression Inventory (BDI) for females but not males. Four separate ANOVAs were run with parent gender and respondent gender as independent variables and the total PMI score along with three factor subscale scores as separate dependent variables to determine the effects of both parent and respondent gender on PMI scores. Fathers were found to have significantly higher PMI scores than mothers, and post hoc tests indicated that male respondents view their fathers as more hostile rejecting than their mothers.

  14. Orchids inventory in Sintang Regency, West Kalimantan

    Directory of Open Access Journals (Sweden)

    ESTI ENDAH ARIYANTI

    2008-10-01

    Full Text Available Orchid is one of ornamental plants which have commercial value. Therefore most species are becoming threatened or even endangered because of over exploitation. In addition, its natural habitat is also decreasing. Conservation must be done urgently, both by in situ and ex situ conservation, which can be started by orchid inventory. The orchid inventory was done in TWA Bukit Kelam, TWA Baning and several places in Regency of Sintang, West Kalimantan. The result showed that there were 40 species belonged to 27 genera, which 32 species of them (20 genera were epiphytic orchids and 8 species (7 genera were terrestrial orchids.

  15. Towards a complete World Glacier Inventory

    Science.gov (United States)

    Zemp, Michael

    2013-04-01

    The need for an inventory of the world's glaciers evolved during the International Hydrological Decade (1965-74). As a result, guidelines were established in the mid 1970s to compile a worldwide detailed inventory of existing perennial snow and ice masses. Following these international guidelines, several countries started compiling national glacier inventories based primarily on aerial photographs and maps. In the 1980s, the World Glacier Inventory (WGI) database was launched together with a status report about global and regional glacierised surface areas for the second half of the 20th century. These estimates were based on the detailed inventory data together with preliminary estimates of the remaining glacierised regions derived from early satellite imagery. In the late 1990s, the Global Land Ice Measurements from Space (GLIMS) database was initiated to continue the inventory task with space-borne sensors. In the WGI, glaciers are represented by geographical point coordinates. The GLIMS database includes digital outlines. Both include exact time stamps and tabular information on glacier classifications, length, area, orientation, and altitude range. Both are regularly updated with newly available data: the WGI stores point information for the second half of the 20th century whereas the GLIMS includes digital outlines for the 21st century. Since these detailed glacier inventories are not (yet) globally complete, there have been several efforts towards preliminary estimates of the overall global glacier coverage. A first, well elaborated one was included in the original status report of the WGI, published in 1989, and was refined in 2005 with information from other sources by Dyurgerov and Meier. Other studies used the detailed WGI, or an extended format by Cogley, for regional or global up-scaling of glacier extents. In 2003, Cogley published a global map of percentage glacier coverage per 1°x1° grid box (GGHydro) that is widely used for modeling at global

  16. Improving the Greenlandic Greenhouse Gas Inventory

    DEFF Research Database (Denmark)

    Nielsen, Ole-Kenneth; Baunbæk, Lene; Gyldenkærne, Steen;

    The project to improve the Greenlandic greenhouse gas (GHG) inventory was undertaken due to the recommendations made by the UNFCCC review team in connection with the 2008 and 2009 submissions by the Kingdom of Denmark. The improvements made to the Greenlandic GHG emission inventory were substantial....... Firstly the full CRF format was implemented significantly increasing the level of detail. For the cross-cutting elements of the reporting a tier 1 uncertainty estimation was made. The uncertainty estimation showed a total uncertainty of the GHG emission of 5.8 %. A tier 1 key category analysis was made...

  17. INVENTORY MANAGEMENT IN THE ENTERPRISE THROUGH THE APPLICATION OF IFRS 2 INVENTORIES

    Directory of Open Access Journals (Sweden)

    Svetlozar Stefanov

    2016-07-01

    Full Text Available The focus in the article is on the issues of valuation and presentation of the inventories under the meaning on the International Accounting Standard 2 Inventories. The Standard provides guidance on the determination of costs of finished products and its recognition as and expense in the production and sale finished products, including guidance for determination of the net realizable value. The latter is defined as the estimated selling price less the estimated costs of completion and estimated costs necessary to make the sale. The cost of inventories comprises all costs of purchase, cost of conversion and other costs incurred in bringing the inventories to a condition suitable for subsequent use. The amount of the cost for materials used or products sold and the finished product is determined using one of the following methods: a specifically defined value, first-in � first out or weighted average cost of lots delivered. When inventories are sold, the carrying amount of those inventories is recognized as an expense in the period in which the related sales revenue is recognized. The amount of any write-down of inventories to net realizable value is recorded as a current expense and is recognized as an expense in the period the write-down occurs.

  18. Three-dimensional visualization and control of electronic warfare (EW) payloads

    Science.gov (United States)

    Kirsch, Patricia; Tremper, David; Cortesi, Roger

    2008-04-01

    The proliferation of unmanned vehicles carrying tactical payloads in the battle-space has accelerated the need for user-friendly visualization with graphical interfaces to provide remote command and control. Often these platforms and payloads receive their control functions from command centers located half a world away via satellite communications. Operators require situational awareness tools capable of graphically presenting the remote battlefield asset positions and collected sensor data. Often these systems use 2D software mapping tools in conjunction with video for real time situational awareness. The Special Projects Group (SPG) in the Tactical Electronic Warfare Division of the U.S. Naval Research Laboratory has been developing an operator control interface called the Jammer Control Station (JCS) to provide 3D battle-space visualization with built-in, remote EW payload command and control (C2) capabilities. The JCS interface presents the operator with graphic depictions of both the platforms' states and the RF environment. Text based messaging between the JCS and the EW payload reduces the impact of the system on the available bandwidth. This paper will discuss the use of the SIMDIS 3-D visualization tool as a real-time command and control interface for electronic warfare (EW) payloads.

  19. APSTNG: neutron interrogation for detection of explosives, drugs, and nuclear and chemical warfare materials

    Science.gov (United States)

    Rhodes, Edgar A.; Peters, Charles W.

    1993-02-01

    A recently developed neutron diagnostic probe system has the potential to satisfy a significant number of van-mobile and fixed-portal requirements for nondestructive detection, including monitoring of contraband explosives, drugs, and weapon materials, and treaty verification of sealed munitions. The probe is based on a unique associated-particle sealed-tube neutron generator (APSTNG) that interrogates the object of interest with a low-intensity beam of 14- MeV neutrons generated from the deuterium-tritium reaction and that detects the alpha-particle associated with each neutron. Gamma-ray spectra of resulting neutron reactions identify nuclides associated with all major chemicals in explosives, drugs, and chemical warfare agents, as well as many pollutants and fissile and fertile special nuclear material. Flight times determined from detection times of the gamma-rays and alpha-particles yield a separate coarse tomographic image of each identified nuclide. The APSTNG also forms the basis for a compact fast-neutron transmission imaging system that can be used along with or instead of the emission imaging system. Proof-of-concept experiments have been performed under laboratory conditions for simulated nuclear and chemical warfare munitions and for explosives and drugs. The small and relatively inexpensive APSTNG exhibits high reliability and can be quickly replaced. Surveillance systems based on APSTNG technology can avoid the large physical size, high capital and operating expenses, and reliability problems associated with complex accelerators.

  20. Next Generation Non-particulate Dry Nonwoven Pad for Chemical Warfare Agent Decontamination

    Energy Technology Data Exchange (ETDEWEB)

    Ramkumar, S S; Love, A; Sata, U R; Koester, C J; Smith, W J; Keating, G A; Hobbs, L; Cox, S B; Lagna, W M; Kendall, R J

    2008-05-01

    New, non-particulate decontamination materials promise to reduce both military and civilian casualties by enabling individuals to decontaminate themselves and their equipment within minutes of exposure to chemical warfare agents or other toxic materials. One of the most promising new materials has been developed using a needlepunching nonwoven process to construct a novel and non-particulate composite fabric of multiple layers, including an inner layer of activated carbon fabric, which is well-suited for the decontamination of both personnel and equipment. This paper describes the development of a composite nonwoven pad and compares efficacy test results for this pad with results from testing other decontamination systems. The efficacy of the dry nonwoven fabric pad was demonstrated specifically for decontamination of the chemical warfare blister agent bis(2-chloroethyl)sulfide (H or sulfur mustard). GC/MS results indicate that the composite fabric was capable of significantly reducing the vapor hazard from mustard liquid absorbed into the nonwoven dry fabric pad. The mustard adsorption efficiency of the nonwoven pad was significantly higher than particulate activated carbon (p=0.041) and was similar to the currently fielded US military M291 kit (p=0.952). The nonwoven pad has several advantages over other materials, especially its non-particulate, yet flexible, construction. This composite fabric was also shown to be chemically compatible with potential toxic and hazardous liquids, which span a range of hydrophilic and hydrophobic chemicals, including a concentrated acid, an organic solvent and a mild oxidant, bleach.

  1. Investigating the Relationship Between Drone Warfare and Civilian Casualties in Gaza

    Directory of Open Access Journals (Sweden)

    Dr. Ann Rogers

    2014-12-01

    Full Text Available Unmanned aerial vehicles (UAVs, better known as drones, are increasingly touted as ‘humanitarian’ weapons that contribute positively to fighting just wars and saving innocent lives. At the same time, civilian casualties have become the most visible and criticized aspect of drone warfare. It is argued here that drones contribute to civilian casualties not in spite of, but because of, their unique attributes. They greatly extend war across time and space, pulling more potential threats and targets into play over long periods, and because they are low-risk and highly accurate, they are more likely to be used. The assumption that drones save lives obscures a new turn in strategic thinking that sees states such as Israel and the US rely on large numbers of small, highly discriminating attacks applied over time to achieve their objectives. This examination of Israel’s 2014 war in Gaza argues that civilian casualties are not an unexpected or unintended consequence of drone warfare, but an entirely predictable outcome.

  2. Bioarchaeological investigation of ancient Maya violence and warfare in inland Northwest Yucatan, Mexico.

    Science.gov (United States)

    Serafin, Stanley; Lope, Carlos Peraza; Uc González, Eunice

    2014-05-01

    This study investigates evidence of changes and continuities in ancient Maya violence and warfare in inland northwest Yucatan, Mexico from the Middle Preclassic (600-300 BC) to the Postclassic (AD 1050-1542) through bioarchaeological analysis of cranial and projectile trauma. It is hypothesized that the frequency of violence increases before the Classic Maya collapse and remains high during the Postclassic period. It is also hypothesized that the flat, open terrain was conducive to warfare and resulted in higher trauma frequencies than in other parts of the Maya area. Results show that the frequency of cranial trauma decreases before the Classic collapse and increases in the Postclassic, partially matching the expected chronological trends. The frequency of cranial trauma does not differ significantly from other Maya regions but the pattern does: for all periods, males have more healed injuries than females and they are concentrated on the left side of the anterior of the skull. Some injuries appear to be from small points hafted in wooden clubs. In addition, projectile trauma is evident in a scapula with an embedded arrowhead tip, the first such case reported in a Maya skeleton. Overall, these results suggest greater reliance on open combat and less on raids in this region compared with other parts of the Maya area, possibly due to the flat, open terrain, though the identification of perimortem trauma in both women and men indicates surprise raids on settlements were also practiced.

  3. Academic Training Lectures | Stuxnet and Cyber-Warfare | 13-14 January 2016

    CERN Multimedia

    2015-01-01

    Please note that the next series of Academic Training Lectures will take place on 13 and 14 January 2016. The lectures will be given by Gian Piero Siroli (Università e INFN, Bologna (IT))   Stuxnet and Cyber-Warfare (1/2)​ on Wednesday, 13 January from 11 a.m. to 12 p.m. http://indico.cern.ch/event/438525/ Stuxnet and Cyber-Warfare (2/2) on Thursday, 14 January from 11 a.m. to 12 p.m. http://indico.cern.ch/event/438526/ at CERN, Council Chamber (503-1-001)  Description: The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran&...

  4. Ge{sup 4+} doped TiO{sub 2} for stoichiometric degradation of warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Stengl, Vaclav, E-mail: stengl@iic.cas.cz [Department of Solid State Chemistry, Institute of Inorganic Chemistry AS CR v.v.i., 250 68 Rez (Czech Republic); Grygar, Tomas Matys [Department of Solid State Chemistry, Institute of Inorganic Chemistry AS CR v.v.i., 250 68 Rez (Czech Republic); Oplustil, Frantisek; Nemec, Tomas [Military Technical Institute of Protection Brno, Veslarska 230, 628 00 Brno (Czech Republic)

    2012-08-15

    Highlights: Black-Right-Pointing-Pointer We prepared nanodisperse Ge{sup 4+} doped titania by a novel synthesis method. Black-Right-Pointing-Pointer Synthesis does not involve organic solvents, organometallics nor thermal processes. Black-Right-Pointing-Pointer The prepared materials are efficient in removal of chemical warfare agents. Black-Right-Pointing-Pointer Ge{sup 4+} doping improves rate of removal of soman and agent VX by TiO{sub 2}. - Abstract: Germanium doped TiO{sub 2} was prepared by homogeneous hydrolysis of aqueous solutions of GeCl{sub 4} and TiOSO{sub 4} with urea. The synthesized samples were characterized by X-ray diffraction, scanning electron microscopy, EDS analysis, specific surface area (BET) and porosity determination (BJH). Ge{sup 4+} doping increases surface area and content of amorphous phase in prepared samples. These oxides were used in an experimental evaluation of their reactivity with chemical warfare agent, sulphur mustard, soman and agent VX. Ge{sup 4+} doping worsens sulphur mustard degradation and improves soman and agent VX degradation. The best degree of removal (degradation), 100% of soman, 99% of agent VX and 95% of sulphur mustard, is achieved with sample with 2 wt.% of germanium.

  5. An Empirical Examination of the Warfare Metaphor with Respect to Pre-Service Elementary Teachers

    Science.gov (United States)

    Cobern, William W.; Loving, Cathleen C.; Davis, Edward B.; Terpstra, Jeff

    2013-08-01

    Since its origination in the late nineteenth century, the warfare metaphor has been used to characterize the relationship between science and religion, especially orthodox Christianity. Though thoroughly discredited by historians of science, the ideological descendants of Thomas Huxley, who spoke of science in quasi-religious terms, have kept the warfare metaphor alive. On the other hand, there are substantial numbers of Christians who at least appear to oppose science given their high-profile opposition to the general theory of evolution. The research reported in this paper asked, "Does anti-science sentiment increase with increasing orthodox Christian belief?" Two validated, published instruments were used: The Thinking about Science Survey Instrument and the Christian Fundamentalist Belief Scale. The subjects for the study were 545 preservice elementary teachers. The analysis did not show that anti-science sentiment increases with increasing Christian belief. Subjects with strong Christian beliefs were found to be just as supportive of science, if not more so, than subjects with no Christian beliefs. The study concludes with a caution against projecting attitudes toward science "on the whole" based on attitudes specifically toward evolution when working with preservice elementary teachers. Such a projection could well be counterproductive. The study has implications for other modern countries having highly religious populations such as Turkey.

  6. Implications for studying team cognition and team performance in network-centric warfare paradigms.

    Science.gov (United States)

    Krueger, Gerald P; Banderet, Louis E

    2007-05-01

    Network-centric warfare's (NCW) information-rich systems involving sophisticated sensors, tracking systems, smart weapons, and enhanced digital communications threaten to overload combatants with voluminous amounts of data. It is unclear whether warfighters will perceive such extensive data as actionable information to which they will respond accurately in a timely enough manner. Members of small teams in command and control centers, operating in crew-served vehicles, or simply "grunting it out" as ground-pounding infantrymen, may be disparately separated by space, but will communicate and be connected by electronic linkages, e.g., radio, text messages, situation displays, or global positioning data. However, team members will also have to remember shared mental models of tasks at hand, pay attention to and share common situation awareness in complex operational environments, perform team cognition and team coordination, and integrate both lower and higher cognitive processes with those of team behaviors. Such exceptional capabilities are required more now than ever before; such capabilities today are far from assured. After two workshops to establish performance metrics for assessing cognitive performance of military personnel in NCW, this preface introduces five manuscripts addressing team cognition and team performance from both a theoretical and a practical perspective. The authors of this preface question if NCW, and perhaps the politico-social ramifications of modern warfare, have already outstripped behavioral scientists' approach to researching team cognition and team performance-expertise that is so crucially needed for combatants on the rapidly changing 21st-century battlegrounds.

  7. Optimal Policy for Brownian Inventory Models with General Convex Inventory Cost

    Institute of Scientific and Technical Information of China (English)

    Da-cheng YAO

    2013-01-01

    We study an inventory system in which products are ordered from outside to meet demands,and the cumulative demand is governed by a Brownian motion.Excessive demand is backlogged.We suppose that the shortage and holding costs associated with the inventory are given by a general convex function.The product ordering from outside incurs a linear ordering cost and a setup fee.There is a constant leadtime when placing an order.The optimal policy is established so as to minimize the discounted cost including the inventory cost and ordering cost.

  8. Reevaluation of 1999 Health-Based Environmental Screening Levels (HBESLs) for Chemical Warfare Agents

    Energy Technology Data Exchange (ETDEWEB)

    Watson, Annetta Paule [ORNL; Dolislager, Fredrick G [ORNL

    2007-05-01

    This report evaluates whether new information and updated scientific models require that changes be made to previously published health-based environmental soil screening levels (HBESLs) and associated environmental fate/breakdown information for chemical warfare agents (USACHPPM 1999). Specifically, the present evaluation describes and compares changes that have been made since 1999 to U.S. Environmental Protection Agency (EPA) risk assessment models, EPA exposure assumptions, as well as to specific chemical warfare agent parameters (e.g., toxicity values). Comparison was made between screening value estimates recalculated with current assumptions and earlier health-based environmental screening levels presented in 1999. The chemical warfare agents evaluated include the G-series and VX nerve agents and the vesicants sulfur mustard (agent HD) and Lewisite (agent L). In addition, key degradation products of these agents were also evaluated. Study findings indicate that the combined effect of updates and/or changes to EPA risk models, EPA default exposure parameters, and certain chemical warfare agent toxicity criteria does not result in significant alteration to the USACHPPM (1999) health-based environmental screening level estimates for the G-series and VX nerve agents or the vesicant agents HD and L. Given that EPA's final position on separate Tier 1 screening levels for indoor and outdoor worker screening assessments has not yet been released as of May 2007, the study authors find that the 1999 screening level estimates (see Table ES.1) are still appropriate and protective for screening residential as well as nonresidential sites. As such, risk management decisions made on the basis of USACHPPM (1999) recommendations do not require reconsideration. While the 1999 HBESL values are appropriate for continued use as general screening criteria, the updated '2007' estimates (presented below) that follow the new EPA protocols currently under development

  9. Speed of adaptation and genomic footprints of host-parasite coevolution under arms race and trench warfare dynamics.

    Science.gov (United States)

    Tellier, Aurélien; Moreno-Gámez, Stefany; Stephan, Wolfgang

    2014-08-01

    Coevolution between hosts and their parasites is expected to follow a range of possible dynamics, the two extreme cases being called trench warfare (or Red Queen) and arms races. Long-term stable polymorphism at the host and parasite coevolving loci is characteristic of trench warfare, and is expected to promote molecular signatures of balancing selection, while the recurrent allele fixation in arms races should generate selective sweeps. We compare these two scenarios using a finite size haploid gene-for-gene model that includes both mutation and genetic drift. We first show that trench warfare do not necessarily display larger numbers of coevolutionary cycles per unit of time than arms races. We subsequently perform coalescent simulations under these dynamics to generate sequences at both host and parasite loci. Genomic footprints of recurrent selective sweeps are often found, whereas trench warfare yield signatures of balancing selection only in parasite sequences, and only in a limited parameter space. Our results suggest that deterministic models of coevolution with infinite population sizes do not predict reliably the observed genomic signatures, and it may be best to study parasite rather than host populations to find genomic signatures of coevolution, such as selective sweeps or balancing selection.

  10. Groundwater geochemical and selected volatile organic compound data, Operable Unit 1, Naval Undersea Warfare Center, Division Keyport, Washington, July 2015

    Science.gov (United States)

    Huffman, Raegan L.

    2016-05-18

    Previous investigations indicate that concentrations of chlorinated volatile organic compounds (CVOCs) are substantial in groundwater beneath the 9-acre former landfill at Operable Unit 1, Naval Undersea Warfare Center, Division Keyport, Washington. The U.S. Geological Survey has continued to monitor groundwater geochemistry to ensure that conditions remain favorable for contaminant biodegradation as specified in the Record of Decision for the site.

  11. Chemical and biological warfare: Detection and warning systems. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-10-01

    The bibliography contains citations concerning the detection, identification, verification, and warning systems of chemical and biological warfare agents. Citations discuss agents sampling, monitoring, and assessment. Techniques include chromotography, biosensing, chemical analysis, and DNA probes. Land pollution, soil tests, and skin protection are examined. (Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  12. Chemical and biological warfare: Biology, chemistry, and toxicology. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-10-01

    The bibliography contains citations concerning the physiological effects, physicochemical effects, and toxicology of chemical and biological warfare agents. Citations discuss toxic chemicals, chemical agent simulants, detoxification and decontamination, environmental toxicity, and land pollution. Detection techniques and warning systems are examined in a separate bibliography. (Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  13. Chemical and biological warfare: Biology, chemistry, and toxicology. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-11-01

    The bibliography contains citations concerning the physiological effects, physicochemical effects, and toxicology of chemical and biological warfare agents. Citations discuss toxic chemicals, chemical agent simulants, detoxification and decontamination, environmental toxicity, and land pollution. Detection techniques and warning systems are examined in a separate bibliography. (Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  14. Warfare has changed - so should have methods: Ammunition and weapon performance induced operational risk and safety issues

    NARCIS (Netherlands)

    Verhagen, T.L.A.; Voorde, M.J. van de

    2010-01-01

    Warfare has changed. Out-of-area operations have increased the awareness that we are unfamiliar with the performance of the current conventional medium and large calibre ammunitions in day-to-day practice. Current ammunition is primarily developed and procured to defeat the traditional ‘steel’ targe

  15. An Assessment of the Effectiveness of Computer-based Training for Newly Commissioned Surface Warfare Division Officers

    Science.gov (United States)

    2009-08-24

    Chief of Naval Operations Surface Warfare Directorate. (2002, June 15). Navigation, seamanship and shiphandling training requirements document...unlimited. Prepared for: Naval Postgraduate School, Monterey, California 93943 An Assessment of the Effectiveness of Computer-based Training...Stephen Mehay, Professor With the assistance of Carol Stoker and Robert Paynter Naval Postgraduate School Naval Postgraduate School

  16. Global Survey of Research and Capabilities in Genetically Engineered Organisms That Could be Used in Biological Warfare or Bioterrorism

    Science.gov (United States)

    2008-12-01

    advances (summarized in Section 4) that could facilitate or at least inspire the pursuit of biological warfare capabilities. We share the opinion that...a)bccdc.ca Infectious Diseases Control Unit of the Direction de la sante publique , Montreal Chest Institute, Montreal Division of Infectious and

  17. 76 FR 10522 - Naval Surface Warfare Center, Upper Machodoc Creek and the Potomac River, Dahlgren, VA; Danger Zone

    Science.gov (United States)

    2011-02-25

    ... and the Potomac River, Dahlgren, VA; Danger Zone AGENCY: U.S. Army Corps of Engineers, DoD. ACTION... danger zone in the vicinity of Naval Surface Warfare Center, Dahlgren, in King George County, Virginia..., and expands the boundaries of a portion of the danger zone. The amendment is necessary to protect...

  18. The Venus "Shell-over-Star" hieroglyph and Maya warfare: An examination of the interpretation of a Mayan symbol

    Science.gov (United States)

    Voit, Claudia Ann

    For decades, Maya scholars have associated the Mayan "Shell-Star" (also referred to as "Star-War") hieroglyph with Maya warfare. Put forward by scholars such as Floyd Lounsbury and David Kelley, and later advanced by Linda Schele, David Freidel, Ian Graham, Peter Matthews, Anthony Aveni and others, there are now dozens of published articles and chapters relating the hieroglyph to Venus and warfare. Venus is one of the most notable celestial objects outside of the Sun and Moon and was highly visible to the inhabitants of the Maya world. The Dresden Codex (an astronomical almanac) contains important information about the planet Venus, and the calendar section was deciphered by the librarian and mathematician, Ernst Förstemann in the late 1800s. In his decipherment, he deduced that the numbers contained in the tables must be connected to the orbital period of the planet. There is no other planet with the same orbital period 3 as Venus. Förstemann suggested that the decoded astronomy tables were used by the Maya to determine when to wage war. This interpretation, along with others, like Floyd Lounsbury`s study of Venus and the Long Count date at Bonampak were the seeds that have led to methodological errors that first began to take root in Maya research. The idea of the Venus association with warfare took hold and continues to propagate. Many scholars continue to assert that the "shell-star" glyph is related to warfare events. Others, like Gerardo Aldana, and Stanley Guenter, have recently come forward to reexamine and question the hieroglyph and its relationship, if any, to Maya warfare. I suggest, further, that methodological errors may have occurred along the way. I propose that these errors include data lost in translation, and inaccurate translations. In addition, the statistical analysis of Venus cycles has weak points. If this identification of the errors is correct, we need to re-evaluate the weakened foundation on which we are building our assertions about

  19. Composition of ending inventory, November 1966

    Energy Technology Data Exchange (ETDEWEB)

    Budd, R.O.

    1966-12-14

    Submitted herewith are source and special nuclear material composition of ending inventory reports for the month of November 1966. The depleted uranium, enriched uranium, plutonium, enriched lithium, U-233, normal uranium, neptunium 237, plutonium 238, deuterium, tritium, and thorium compositions are all broken down.

  20. Managing Inventory At A Transitional Facility

    Science.gov (United States)

    Hutchins, Henry A.

    1993-01-01

    Kennedy Inventory Management System, KIMS, geared to needs of facility in transition from research and development to manufacturing. Operated jointly by several contractors at Kennedy Space Center, KIMS designed to reduce cost and increase efficiency of fabrication and maintenance of spaceflight hardware.

  1. Advances in Inventory Management: Dynamic Models

    NARCIS (Netherlands)

    C. Pinçe (Çerağ)

    2010-01-01

    textabstractIn this study, we develop and analyze models incorporating some of the dynamic aspects of inventory systems. In particular, we focus on two major themes to be analyzed separately: nonstationarity in demand rate and unfixed purchasing prices. In the first part of the study, we consider a

  2. The Cooperative Preschool Inventory: Test Review.

    Science.gov (United States)

    O'Brien, Francis J., Jr.

    This paper is a brief psychometric review of the Cooperative Preschool Inventory (CPI-R), Revised Edition intended to supplement the review of CPI in the "Seventh Mental Measurements Yearbook." The 1970 revision of the CPI-R is a brief screening test for teacher-administered testing of three-to-six-year-old children. It is intended to…

  3. Eysenck Personality Inventory Item Factor Structure.

    Science.gov (United States)

    Comrey, Andrew L.; And Others

    1988-01-01

    Three methods were used to test the factor structure of the Eysenck Personality Inventory administered to 583 Australians. The preferred method was to extract factors by the minimum residual method, use the Tandem Criteria Method, and then rotate that number of factors by the Tandem Criteria I method. (SLD)

  4. Maximizing Effectiveness Using a Flexible Inventory

    Science.gov (United States)

    2011-04-30

    the fleet. Following Keynes (2006), it is generally accepted that the main motives for holding money are transaction, precautionary and speculative...substitutable inventory classes. Operations Research, 52(1), 83–104. Keynes , J. (2006). The general theory of employment, interest and money

  5. Forest inventory with terrestrial LiDAR

    NARCIS (Netherlands)

    Bauwens, Sébastien; Bartholomeus, Harm; Calders, Kim; Lejeune, Philippe

    2016-01-01

    The application of static terrestrial laser scanning (TLS) in forest inventories is becoming more effective. Nevertheless, the occlusion effect is still limiting the processing efficiency to extract forest attributes. The use of a mobile laser scanner (MLS) would reduce this occlusion. In this st

  6. Incomplete convolutions in production and inventory models

    NARCIS (Netherlands)

    Houtum, van G.J.; Zijm, W.H.M.

    1997-01-01

    In this paper, we study incomplete convolutions of continuous distribution functions, as they appear in the analysis of (multi-stage) production and inventory systems. Three example systems are discussed where these incomplete convolutions naturally arise. We derive explicit, nonrecursive formulae f

  7. Development of a Meiosis Concept Inventory

    Science.gov (United States)

    Kalas, Pamela; O'Neill, Angie; Pollock, Carol; Birol, Gulnur

    2013-01-01

    We have designed, developed, and validated a 17-question Meiosis Concept Inventory (Meiosis CI) to diagnose student misconceptions on meiosis, which is a fundamental concept in genetics. We targeted large introductory biology and genetics courses and used published methodology for question development, which included the validation of questions by…

  8. Inventories and upstream gasoline price dynamics

    NARCIS (Netherlands)

    Kuper, Gerard H.

    2012-01-01

    This paper sheds new light on the asymmetric dynamics in upstream U.S. gasoline prices. The model is based on Pindyck's inventory model of commodity price dynamics. We show that asymmetry in gasoline price dynamics is caused by changes in the net marginal convenience yield: higher costs of marketing

  9. Computer Science Concept Inventories: Past and Future

    Science.gov (United States)

    Taylor, C.; Zingaro, D.; Porter, L.; Webb, K. C.; Lee, C. B.; Clancy, M.

    2014-01-01

    Concept Inventories (CIs) are assessments designed to measure student learning of core concepts. CIs have become well known for their major impact on pedagogical techniques in other sciences, especially physics. Presently, there are no widely used, validated CIs for computer science. However, considerable groundwork has been performed in the form…

  10. The Five-Factor Personality Inventory (FFPI)

    NARCIS (Netherlands)

    Hendriks, A.A.J.; Hofstee, W.K.B.; De Raad, B.

    1999-01-01

    The Five-Factor Personality Inventory (FFPI) assesses the Big Five factors of personality, both for self-ratings and for others' ratings. It consists of 100 brief and concrete statements, and can be administered in 10-15 min. in addition to the five factor scores, the FFPI may be used to assess 40 b

  11. Competitive Analysis of the Online Inventory Problem

    DEFF Research Database (Denmark)

    Larsen, Kim Skak; Wøhlk, Sanne

    2010-01-01

    We consider a real-time version of the inventory problem with deterministic demand in which decisions as to when to replenish and how much to buy must be made in an online fashion without knowledge of future prices. We suggest online algorithms for each of four models for the problem and use...

  12. Denmark's National Inventory Report 2015 and 2016

    DEFF Research Database (Denmark)

    Nielsen, Ole-Kenneth; Plejdrup, Marlene Schmidt; Winther, Morten

    This report is Denmark’s annual documentation report of the greenhouse gas inventory submitted to the United Nations Framework Convention on Climate Change (UNFCCC) and the Kyoto Protocol. The report is prepared in accordance with the UNFCCC reporting guidelines and CMP decisions and contains all...

  13. Shrink stope design using an inventory model

    Directory of Open Access Journals (Sweden)

    D. Taylor

    2003-12-01

    Full Text Available This paper addresses the fact that current practice in shrink-stoping in hard rock mining invariably ignores the inventory holding cost of the blasted ore. We believe, and show by example, that ignoring this cost could make the difference between profit and loss in an industry that, at present, needs all the help it can get.

  14. State-of-the-art inventory

    NARCIS (Netherlands)

    Van Gerven, K.A.J.; Akkerman, G.J.

    2005-01-01

    The present report provides a state-of-the-art inventory of relevant information and technical concepts for the ComCoast project, being the first phase of the research stages of Work Package 3 (WP3). This project was assigned to Royal Haskoning by CUR. The information scan was set-up in a systematic

  15. Calendar Year 2016 Stationary Source Emissions Inventory

    Energy Technology Data Exchange (ETDEWEB)

    Evelo, Stacie [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-01-01

    The City of Albuquerque (COA) Environmental Health Department Air Quality Program has issued stationary source permits and registrations the Department of Energy/Sandia Field Office for operations at the Sandia National Laboratories/New Mexico. This emission inventory report meets the annual reporting compliance requirements for calendar year (CY) 2016 as required by the COA.

  16. Development of the Korean Career Indecision Inventory.

    Science.gov (United States)

    Tak, Jinkook; Lee, Ki-Hak

    2003-01-01

    Five analyses using Korean college students (n=283, 700, 844, 306, 315) were conducted to develop the Korean Career Indecision Inventory. Five factors emerged consistently and were confirmed by factor analysis: lack of career information, lack of necessity recognition, lack of self-identity, indecisiveness, and external barriers. Reliability and…

  17. JIT: A Strategic Tool of Inventory Management

    Science.gov (United States)

    Singh, D. K.; Singh, Satyendra

    2012-03-01

    Investment in inventory absorbs a large portion of the working capital of a company and often it represents a large portion of the total assets of a business. By improving return on investment by increasing the rate of inventory turnover, management often wants to ensure economic efficiency. Effective inventory management enables a firm to provide lower costs, rapid response and flexibility for its customers. Just-in-time (JIT) philosophy is most widely adopted and practices in the recent years worldwide. It aims at reducing total production costs by producing only what is immediately needed and eliminates wastes. It is based on a radically different concept, deviating substantially from the existing manufacturing practices in many respects. It is a very effective tool to reduce the wastage of inventory and manage it effectively. It has the potential to bring substantial changes in the existing setup of a company; can give it a new face, broaden its acceptability and ensure a longer life. It can strategically change the atmosphere needed for longer survival. JIT is radically different from MRP and goes beyond materials management. The new outlook acquired by the company can meet global expectations of the cust

  18. Brotes germinados y bacterias

    OpenAIRE

    García Olmedo, Francisco

    2011-01-01

    Ante la confusión y el revuelo asociados al último incidente causado por una cepa de la bacteria Escherichia coli (E. coli) en Alemania, tal vez no esté de más esta carta para recordar y actualizar escritos míos anteriores aparecidos en Revista de Libros sobre los riesgos alimentarios en general y sobre los peligros de dicho microorganismo en particular. 1 . Aunque es cierto que la proporción de cepas peligrosas de E. coli es quizás inferior a la de delincuentes entre los humanos, exi...

  19. Developing inventory of professional attitude at occupation

    Directory of Open Access Journals (Sweden)

    Aslıhan Bakır

    2009-02-01

    Full Text Available This research was carried out in order to develop a standard measurement instrument special to culture assessing nurses’s of midwives’s professional attitudes at occupation. A methodological research was conducted to evaluate the validity and reability of the inventory developed exclusively for the culture. The population of the research consisted of nurses (74 persons and midwives (86 persons working in State Hospital and Gynecology Birth and Child Diseases Hospital in Ordu province. The data were collected between the dates 1-30 June 2005. The nurses and midwives were informed about the research and their verbal consent was taken. In addition, a written consent was taken from the hospitals. The analysis of data were made via Pearson correlation coefficient analysis, Cronbach Alpha coefficient, Kaise-Mayer-Olkin test, Barlett’s test of sphericity analysis and factor analysis with SPSS 11,5 in computer. A likert-type inventory consisting of 36 items to evaluate the Professional attitude at occupation was developed in the light of literature information. The validity of content-scope was examined to determine the validity of inventory and the number of questions was reduced to 32 items. The validity structure of the inventory was examined and the results of KMO analysis and that of Barlett’s test were found as 0,860 and 807,357 respectively. Both the test results were found significant at the level of importance p=0,000. A factory analysis and total item point correlation was applied to the inventory wasn’t altered 32 item-number. Internal consistency and re-test application were carried out to determine the validity of the inventory. Cronbach Alpha coefficient was of found to be ?=0,89 and re-test correlation coefficient was found to be r =0,97.As a result in the research that the validity and reability of Inventory of Professional Attitude at Occupation were high and that it was an efficient instrument of measurement to determine

  20. The Trail Inventory of Umatilla NWR [Cycle 2

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of this report is to create a baseline inventory of all non-motorized trails on Umatilla National Wildlife Refuge. Trails in this inventory are eligible...

  1. The Trail Inventory of Tewaukon NWR [Cycle 2

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of this report is to create a baseline inventory of all non-motorized trails on Tewaukon National Wildlife Refuge. Trails in this inventory are eligible...

  2. The Trail Inventory of Carolina Sandhills NWR [Cycle 2

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of this report is to create a baseline inventory of all non-motorized trails on Carolina Sandhills National Wildlife Refuge. Trails in this inventory are...

  3. 7 CFR 930.57 - Secondary inventory reserve.

    Science.gov (United States)

    2010-01-01

    ... Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... Handling Regulations § 930.57 Secondary inventory reserve. (a) In the event the inventory reserve... accordance with the annual marketing policy and with § 930.54....

  4. The Trail Inventory of Desert NWR [Cycle 2

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of this report is to create a baseline inventory of all non-motorized trails on Desert National Wildlife Range. Trails in this inventory are eligible for...

  5. The Trail Inventory of Desert National Wildlife Refuge [Cycle 1

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of this report is to create a baseline inventory of all non-motorized trails on Desert National Wildlife Range. Trails in this inventory are eligible for...

  6. The Trail Inventory of Valentine NWR [Cycle 2

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of this report is to create a baseline inventory of all non-motorized trails on Valentine National Wildlife Refuge. Trails in this inventory are eligible...

  7. The Trail Inventory of Aroostook National Wildlife Refuge [Cycle 1

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of this report is to create a baseline inventory of all non-motorized trails on Aroostook National Wildlife Refuge. Trails in this inventory are eligible...

  8. The Trail Inventory of Catahoula National Wildlife Refuge [Cycle 1

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of this report is to create a baseline inventory of all non-motorized trails on Catahoula National Wildlife Refuge. Trails in this inventory are eligible...

  9. Amended wildlife inventory plan : Fish Springs National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This amended wildlife inventory plan for Fish Springs National Wildlife Refuge summarizes refuge objectives, wildlife inventory procedures, and manpower and...

  10. The Trail Inventory of Laguna Atascosa NWR [Cycle 2

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of this report is to create a baseline inventory of all non-motorized trails on Laguna Atascosa National Wildlife Refuge. Trails in this inventory are...

  11. Reelfoot and Lake Isom National Wildlife Refuges : Wildlife Inventory Plan

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This wildlife inventory plan for Reelfoot and Lake Isom National Wildlife Refuges includes survey procedure forms that represent cost effective inventory of the...

  12. The Trail Inventory of Conboy Lake NWR [Cycle 2

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of this report is to create a baseline inventory of all non-motorized trails on Conboy Lake National Wildlife Refuge. Trails in this inventory are...

  13. Baseline inventory data users guide to abiotic GIS layers

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Baseline Inventory Team was chartered by the Fulfilling the Promises Implementation Team to recommend minimum abiotic and biotic inventories for the National...

  14. The Trail Inventory of Back Bay NWR [Cycle 2

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of this report is to create a baseline inventory of all non-motorized trails on Back Bay National Wildlife Refuge. Trails in this inventory are eligible...

  15. The Trail Inventory of Ruby Lake NWR [Cycle 3

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of this report is to create a baseline inventory of all non-motorized trails on Ruby Lake National Wildlife Refuge. Trails in this inventory are eligible...

  16. The Trail Inventory of Ruby Lake NWR [Cycle 2

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of this report is to create a baseline inventory of all non-motorized trails on Ruby Lake National Wildlife Refuge. Trails in this inventory are eligible...

  17. The Trail Inventory of William L. Finley NWR [Cycle 2

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of this report is to create a baseline inventory of all non-motorized trails on William L. Finley National Wildlife Refuge. Trails in this inventory are...

  18. The Trail Inventory of Cape Romain NWR [Cycle 2

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of this report is to create a baseline inventory of all non-motorized trails on Cape Romain National Wildlife Refuge. Trails in this inventory are...

  19. The Trail Inventory of Santee NWR [Cycle 3

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of this report is to create a baseline inventory of all non-motorized trails on Santee National Wildlife Refuge. Trails in this inventory are eligible...

  20. The Trail Inventory of Santee NWR [Cycle 2

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of this report is to create a baseline inventory of all non-motorized trails on Santee National Wildlife Refuge. Trails in this inventory are eligible...

  1. The Trail Inventory of Santee National Wildlife Refuge [Cycle 1

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of this report is to create a baseline inventory of all non-motorized trails on Santee National Wildlife Refuge. Trails in this inventory are eligible...

  2. Inventory and Monitoring Plan for Deep Fork National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This Inventory and Monitoring Plan (IMP) is prepared to document the inventory and monitoring surveys that will, or could be conducted at Deep Fork National Wildlife...

  3. The Trail Inventory of Neosho NFH [Cycle 2

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of this report is to create a baseline inventory of all non-motorized trails on Neosho National Fish Hatchery. Trails in this inventory are eligible for...

  4. The Trail Inventory of Cabeza Prieta NWR [Cycle 2

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of this report is to create a baseline inventory of all non-motorized trails on Cabeza Prieta National Wildlife Refuge. Trails in this inventory are...

  5. The Trail Inventory of Cabeza Prieta NWR [Cycle 3

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of this report is to create a baseline inventory of all non-motorized trails on Cabeza Prieta National Wildlife Refuge. Trails in this inventory are...

  6. The Trail Inventory of Monte Vista NWR [Cycle 3

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of this report is to create a baseline inventory of all non-motorized trails on Monte Vista National Wildlife Refuge. Trails in this inventory are...

  7. The Trail Inventory of Tualatin River NWR [Cycle 3

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of this report is to create a baseline inventory of all non-motorized trails on Tualatin River National Wildlife Refuge. Trails in this inventory are...

  8. The Trail Inventory of Bon Secour NWR [Cycle 2

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of this report is to create a baseline inventory of all non-motorized trails on Bon Secour National Wildlife Refuge. Trails in this inventory are...

  9. The Trail Inventory of Spring Creek NFH [Cycle 2

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of this report is to create a baseline inventory of all non-motorized trails on Spring Creek National Fish Hatchery. Trails in this inventory are...

  10. The Trail Inventory of Wassaw NWR [Cycle 2

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of this report is to create a baseline inventory of all non-motorized trails on Wassaw National Wildlife Refuge. Trails in this inventory are eligible...

  11. The Trail Inventory of Cape May NWR [Cycle 2

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of this report is to create a baseline inventory of all non-motorized trails on Cape May National Wildlife Refuge. Trails in this inventory are eligible...

  12. The Trail Inventory of Huron WMD [Cycle 2

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of this report is to create a baseline inventory of all non-motorized trails on Huron Wetland Management District. Trails in this inventory are eligible...

  13. The Trail Inventory of Saddle Mountain NWR [Cycle 3

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of this report is to create a baseline inventory of all non-motorized trails on Saddle Mountain National Wildlife Refuge. Trails in this inventory are...

  14. Inventory and Monitoring Plan for Cypress Creek National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This Inventory and Monitoring Plan (IMP) documents the inventory and monitoring surveys that will be conducted at Cypress Creek National Wildlife Refuge (CCNWR) from...

  15. The Trail Inventory of Wheeler NWR [Cycle 3

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of this report is to create a baseline inventory of all non-motorized trails on Wheeler National Wildlife Refuge. Trails in this inventory are eligible...

  16. The Trail Inventory of Wheeler National Wildlife Refuge [Cycle 1

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of this report is to create a baseline inventory of all non-motorized trails on Wheeler National Wildlife Refuge. Trails in this inventory are eligible...

  17. Wildlife Inventory Plan : White River National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This wildlife inventory plan for White River National Wildlife Refuge describes the wildlife inventory process, procedure and costs. Target species include: black...

  18. The Trail Inventory of J. Clark Salyer NWR [Cycle 2

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of this report is to create a baseline inventory of all non-motorized trails on J. Clark Salyer National Wildlife Refuge. Trails in this inventory are...

  19. The Trail Inventory of Bayou Teche NWR [Cycle 2

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of this report is to create a baseline inventory of all non-motorized trails on Bayou Teche National Wildlife Refuge. Trails in this inventory are...

  20. The Trail Inventory of Cameron Prairie NWR [Cycle 2

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of this report is to create a baseline inventory of all non-motorized trails on Cameron Prairie National Wildlife Refuge. Trails in this inventory are...