WorldWideScience

Sample records for biological warfare protection

  1. Respiratory Protection Against Chemical and Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    G.K. Prasad

    2008-09-01

    Full Text Available Chemical and biological warfare (CBW agents pose unavoidable threat, both to soldiers and civilians.Exposure to such deadly agents amidst the CBW agents contaminated environment can be avoided bytaking proper protective measures. Respiratory protection is indispensable when the soldiers or civiliansare surrounded by such deadly environment as contamination-free air is needed for respiration purposes.In this context, an attempt has been made to review the literature for the past five decades on developmentof various protective devices for respiratory protection against aerosols, gases, and vapours of CBWagents. This review covers structural, textural, and adsorption properties of materials used in gas filtersand mechanical filters for the removal of CBW agents.Defence Science Journal, 2008, 58(5, pp.686-697, DOI:http://dx.doi.org/10.14429/dsj.58.1692

  2. Biological warfare agents

    Directory of Open Access Journals (Sweden)

    Duraipandian Thavaselvam

    2010-01-01

    Full Text Available The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies.

  3. Biological warfare agents.

    Science.gov (United States)

    Pohanka, Miroslav; Kuca, Kamil

    2010-01-01

    Biological warfare agents are a group of pathogens and toxins of biological origin that can be potentially misused for military or criminal purposes. The present review attempts to summarize necessary knowledge about biological warfare agents. The historical aspects, examples of applications of these agents such as anthrax letters, biological weapons impact, a summary of biological warfare agents and epidemiology of infections are described. The last section tries to estimate future trends in research on biological warfare agents.

  4. Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    Dev Vrat Kamboj

    2006-10-01

    Full Text Available There is a long historic record of use of biological warfare (BW agents by warring countriesagainst their enemies. However, the frequency of their use has increased since the beginningof the twentieth century. World war I witnessed the use of anthrax agent against human beingsand animals by Germans, followed by large-scale field trials by Japanese against war prisonersand Chinese population during world war II. Ironically, research and development in biologicalwarfare agents increased tremendously after the Geneva Protocol, signed in 1925, because ofits drawbacks which were overcome by Biological and Toxin Weapons Convention (BTWC in1972. Biological warfare programme took back seat after the 1972 convention but biologicalagents regained their importance after the bioterrorist attacks of anthrax powder in 2001. In thelight of these attacks, many of which turned out to be hoax, general awareness is required aboutbiological warfare agents that can be used against them. This review has been written highlightingimportant biological warfare agents, diseases caused by them, possible therapies and otherprotection measures.

  5. Chemical and biological warfare: Protection, decontamination, and disposal. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-11-01

    The bibliography contains citations concerning the means to defend against chemical and biological agents used in military operations, and to eliminate the effects of such agents on personnel, equipment, and grounds. Protection is accomplished through protective clothing and masks, and in buildings and shelters through filtration. Elimination of effects includes decontamination and removal of the agents from clothing, equipment, buildings, grounds, and water, using chemical deactivation, incineration, and controlled disposal of material in injection wells and ocean dumping. Other Published Searches in this series cover chemical warfare detection; defoliants; general studies; biochemistry and therapy; and biology, chemistry, and toxicology associated with chemical warfare agents.(Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  6. Chemical and biological warfare: Protection, decontamination, and disposal. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-10-01

    The bibliography contains citations concerning the means to defend against chemical and biological agents used in military operations, and to eliminate the effects of such agents on personnel, equipment, and grounds. Protection is accomplished through protective clothing and masks, and in buildings and shelters through filtration. Elimination of effects includes decontamination and removal of the agents from clothing, equipment, buildings, grounds, and water, using chemical deactivation, incineration, and controlled disposal of material in injection wells and ocean dumping. Other Published Searches in this series cover chemical warfare detection; defoliants; general studies; biochemistry and therapy; and biology, chemistry, and toxicology associated with chemical warfare agents. (Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  7. Modified clay minerals efficiency against chemical and biological warfare agents for civil human protection.

    Science.gov (United States)

    Plachá, Daniela; Rosenbergová, Kateřina; Slabotínský, Jiří; Kutláková, Kateřina Mamulová; Studentová, Soňa; Martynková, Gražyna Simha

    2014-04-30

    Sorption efficiencies of modified montmorillonite and vermiculite of their mono ionic Na and organic HDTMA and HDP forms were studied against chemical and biological warfare agents such as yperite and selected bacterial strains. Yperite interactions with modified clay minerals were observed through its capture in low-density polyethylene foil-modified clay composites by measuring yperite gas permeation with using chemical indication and gas chromatography methods. The antibacterial activities of synthetized organoclays were tested against selected Gram-positive and Gram-negative bacterial species in minimum inhibitory concentration tests. The obtained results showed a positive influence of modified clay minerals on the significant yperite breakthrough-time increase. The most effective material was the polyethylene-Na form montmorillonite, while the polyethylene-Na form vermiculite showed the lowest efficiency. With increasing organic cations loading in the interlayer space the montmorillonite efficiency decreased, and in the case of vermiculite an opposite effect was observed. Generally the modified montmorillonites were more effective than modified vermiculites. The HDP cations seem to be more effective compare to the HDTMA. The antibacterial activity tests confirmed efficiency of all organically modified clay minerals against Gram-positive bacteria. The confirmation of antibacterial activity against Y. pestis, plague bacteria, is the most interesting result of this part of the study.

  8. [The history of biological warfare].

    Science.gov (United States)

    Cohen, Amir; Robenshtok, Eyal; Rotman, Eran; Sagi, Rami

    2002-05-01

    Selected events in the history of biological weapons are highlighted to increase the physician's awareness of this crucial threat. The deliberate use of biological substances originated in antiquity and has pervaded the history of human wars throughout time until the 21th century. The history of biological warfare is difficult to assess because of a number of confounding factors. These include the difficulty in verification of allegation, the use of the threat of this weapon for propaganda purposes, the lack of microbiological or epidemiological data, and the incidence of natural occurring endemic or epidemic diseases during hostilities. Although it may be problematic to verify at times, the use of such weapons has not been limited to national armies or militia. Frustrated civilians, terrorists and even physicians have used biological substances to promote their interests. Today, the biological threat has become more serious. It's potency, cost-effectiveness, and the ability to manufacture and deploy it with little sophistication, or under the semblance of legitimate commercial endeavors, will ensure that biological weapons remain a constant threat to human health.

  9. Biological warfare, bioterrorism, and biocrime.

    Science.gov (United States)

    Jansen, H J; Breeveld, F J; Stijnis, C; Grobusch, M P

    2014-06-01

    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria or other agents used to cause illness or death in people, but also in animals or plants. It is aimed at creating casualties, terror, societal disruption, or economic loss, inspired by ideological, religious or political beliefs. The success of bioterroristic attempts is defined by the measure of societal disruption and panic, and not necessarily by the sheer number of casualties. Thus, making only a few individuals ill by the use of crude methods may be sufficient, as long as it creates the impact that is aimed for. The assessment of bioterrorism threats and motives have been described before. Biocrime implies the use of a biological agent to kill or make ill a single individual or small group of individuals, motivated by revenge or the desire for monetary gain by extortion, rather than by political, ideological, religious or other beliefs. The likelihood of a successful bioterrorist attack is not very large, given the technical difficulties and constraints. However, even if the number of casualties is likely to be limited, the impact of a bioterrorist attack can still be high. Measures aimed at enhancing diagnostic and therapeutic capabilities and capacities alongside training and education will improve the ability of society to combat 'regular' infectious diseases outbreaks, as well as mitigating the effects of bioterrorist attacks.

  10. Chemical and biological warfare: General studies. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-10-01

    The bibliography contains citations concerning federally sponsored and conducted studies into chemical and biological warfare operations and planning. These studies cover areas not addressed in other parts of this series. The topics include production and storage of agents, delivery techniques, training, military and civil defense, general planning studies, psychological reactions to chemical warfare, evaluations of materials exposed to chemical agents, and studies on banning or limiting chemical warfare. Other published searches in this series on chemical warfare cover detection and warning, defoliants, protection, and biological studies, including chemistry and toxicology. (Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  11. Chemical and biological warfare: General studies. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-11-01

    The bibliography contains citations concerning federally sponsored and conducted studies into chemical and biological warfare operations and planning. These studies cover areas not addressed in other parts of this series. The topics include production and storage of agents, delivery techniques, training, military and civil defense, general planning studies, psychological reactions to chemical warfare, evaluations of materials exposed to chemical agents, and studies on banning or limiting chemical warfare. Other published searches in this series on chemical warfare cover detection and warning, defoliants, protection, and biological studies, including chemistry and toxicology.(Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  12. [Decontamination of chemical and biological warfare agents].

    Science.gov (United States)

    Seto, Yasuo

    2009-01-01

    Chemical and biological warfare agents (CBWA's) are diverse in nature; volatile acute low-molecular-weight toxic compounds, chemical warfare agents (CWA's, gaseous choking and blood agents, volatile nerve gases and blister agents, nonvolatile vomit agents and lacrymators), biological toxins (nonvolatile low-molecular-weight toxins, proteinous toxins) and microbes (bacteria, viruses, rickettsiae). In the consequence management against chemical and biological terrorism, speedy decontamination of victims, facilities and equipment is required for the minimization of the damage. In the present situation, washing victims and contaminated materials with large volumes of water is the basic way, and additionally hypochlorite salt solution is used for decomposition of CWA's. However, it still remains unsolved how to dispose large volumes of waste water, and the decontamination reagents have serious limitation of high toxicity, despoiling nature against the environments, long finishing time and non-durability in effective decontamination. Namely, the existing decontamination system is not effective, nonspecifically affecting the surrounding non-target materials. Therefore, it is the urgent matter to build up the usable decontamination system surpassing the present technologies. The symposiast presents the on-going joint project of research and development of the novel decontamination system against CBWA's, in the purpose of realizing nontoxic, fast, specific, effective and economical terrorism on-site decontamination. The projects consists of (1) establishment of the decontamination evaluation methods and verification of the existing technologies and adaptation of bacterial organophosphorus hydrolase, (2) development of adsorptive elimination technologies using molecular recognition tools, and (4) development of deactivation technologies using photocatalysis.

  13. History of biological warfare and bioterrorism.

    Science.gov (United States)

    Barras, V; Greub, G

    2014-06-01

    Bioterrorism literally means using microorganisms or infected samples to cause terror and panic in populations. Bioterrorism had already started 14 centuries before Christ, when the Hittites sent infected rams to their enemies. However, apart from some rare well-documented events, it is often very difficult for historians and microbiologists to differentiate natural epidemics from alleged biological attacks, because: (i) little information is available for times before the advent of modern microbiology; (ii) truth may be manipulated for political reasons, especially for a hot topic such as a biological attack; and (iii) the passage of time may also have distorted the reality of the past. Nevertheless, we have tried to provide to clinical microbiologists an overview of some likely biological warfare that occurred before the 18th century and that included the intentional spread of epidemic diseases such as tularaemia, plague, malaria, smallpox, yellow fever, and leprosy. We also summarize the main events that occurred during the modern microbiology era, from World War I to the recent 'anthrax letters' that followed the World Trade Center attack of September 2001. Again, the political polemic surrounding the use of infectious agents as a weapon may distort the truth. This is nicely exemplified by the Sverdlovsk accident, which was initially attributed by the authorities to a natural foodborne outbreak, and was officially recognized as having a military cause only 13 years later.

  14. Looming Threat of Chemical and Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    A.K. Goel

    2016-09-01

    Full Text Available In the recent past, a dramatic shift has been observed in the strategies of warfare from conventional to non-conventional. Now-a-days, traditional power is of less importance than it used to be earlier. Weapons of mass destruction, which comprise of nuclear weapons, and chemical and biological warfare agents, are posing a great peril to the world due to their devastating potential. Though, there are several bilateral as well as multilateral treaties to control the use and proliferation of these weapons, yet the risk of use of such agents by non-state actors cannot be overlooked. Chances of use of chemical and biological agents are more likely than the nuclear weapons. A comparison of nuclear, chemical and biological weapons in terms of technology, cost, signature, effectiveness on protected and un-protected troops shows that chemical and biological weapon programmes require much lower level of technology and cost than the nuclear weapon programme. Further, there is no or least distinctive and readily observable signature in biological weapon programme in comparison to nuclear and chemical weapon facilities. There can be two possibilities of use of these agents in terrorist attacks. First, there is a risk of transfer of material or know-how of these weapons to terrorists for using against the adversaries and second, the risk of these agents being pilfered due to poor security, thereby sabotaging the national security. The International Committee of Red Cross in February 1918 reckoned these agents as ‘barbarous inventions’ that can ‘only be called criminal’.

  15. Agroterrorism, Biological Crimes, and Biological Warfare Targeting Animal Agriculture

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, Terry M.; Logan-Henfrey, Linda; Weller, Richard E.; Kellman, Brian

    2000-04-12

    There is a rising level of concern that agriculture might be targeted for economic sabotage by terrorists. Knowledge gathered about the Soviet Union biological weapons program and Iraq following the Gulf War, confirmed that animals and agricultural crops were targets of bioweapon development. These revelations are particularly disturbing in light of the fact that both countries are States Parties to the Biological and Toxin Weapons Convention that entered into force in 1975. The potential for misusing biotechnology to create more virulent pathogens and the lack of international means to detect unethical uses of new technologies to create destructive bioweapons is of increasing concern. Disease outbreaks, whether naturally occurring or intentionally, involving agricultural pathogens that destroy livestock and crops would have a profound impact on a country's infrastructure, economy and export markets. This chapter deals with the history of agroterrorism, biological crimes and biological warfare directed toward animal agriculture, specifically, horses, cattle, swine, sheep, goats, and poultry.

  16. Biological warfare in a historical perspective.

    Science.gov (United States)

    Roffey, R; Tegnell, A; Elgh, F

    2002-08-01

    There are some early examples of biological warfare (BW), but in modern times it was used first for sabotage by Germany during WWI. Development of biological weapons on a military significant scale was initiated in several countries in the period between the world wars. During WWII, several countries had active programs such as the USA, UK, Canada, Germany, Japan and the Soviet Union. It was only Japan that on a fairly large scale used BW. The US program continued until 1969, when President Nixon took a decision to end it in connection with signing the BTWC. The Soviet Union had also continued its program after the war, and this was enhanced after signing the BTWC: in the 1980s the program consisted of around fifty facilities and involved around 60,000 people. The Soviet Union produced and maintained a large stockpile of BW-agents. After the collapse of the Soviet Union, and due to pressure from USA and UK, President Yeltsin issued a decree in 1992 banning continued offensive BW activity. However, there are still concerns of residual activity in Russia. Another program of concern is the Iraqi BW-program. After 10 years of UN inspections that were stopped in 1998, there are still many unanswered questions concerning the BW program. There was also a covert BW-program in South Africa that was terminated around 1993. There have also been a number of allegations of alleged use or possession. In addition, there are indications that 10-12 states are now trying to acquire BW, and this assessment is based on intelligence information, mainly from the USA. For example Iraq, North Korea, Iran, Syria, Sudan and Libya. Another aspect is the strong driving force of technology developments to promote this type of program, opening new risks for future potential military misuse.

  17. Cutaneous reactions in nuclear, biological and chemical warfare

    Directory of Open Access Journals (Sweden)

    Arora Sandeep

    2005-03-01

    Full Text Available Nuclear, biological and chemical warfare have in recent times been responsible for an increasing number of otherwise rare dermatoses. Many nations are now maintaining overt and clandestine stockpiles of such arsenal. With increasing terrorist threats, these agents of mass destruction pose a risk to the civilian population. Nuclear and chemical attacks manifest immediately while biological attacks manifest later. Chemical and biological attacks pose a significant risk to the attending medical personnel. The large scale of anticipated casualties in the event of such an occurrence would need the expertise of all physicians, including dermatologists, both military and civilian. Dermatologists are uniquely qualified in this respect. This article aims at presenting a review of the cutaneous manifestations in nuclear, chemical and biological warfare and their management.

  18. Identification of the factors that govern the ability of therapeutic antibodies to provide postchallenge protection against botulinum toxin: a model for assessing postchallenge efficacy of medical countermeasures against agents of bioterrorism and biological warfare.

    Science.gov (United States)

    Al-Saleem, Fetweh H; Nasser, Zidoon; Olson, Rebecca M; Cao, Linsen; Simpson, Lance L

    2011-08-01

    Therapeutic antibodies are one of the major classes of medical countermeasures that can provide protection against potential bioweapons such as botulinum toxin. Although a broad array of antibodies are being evaluated for their ability to neutralize the toxin, there is little information that defines the circumstances under which these antibodies can be used. In the present study, an effort was made to quantify the temporal factors that govern therapeutic antibody use in a postchallenge scenario. Experiments were done involving inhalation administration of toxin to mice, intravenous administration to mice, and direct application to murine phrenic nerve-hemidiaphragm preparations. As part of this study, several pharmacokinetic characteristics of botulinum toxin and neutralizing antibodies were measured. The core observation that emerged from the work was that the window of opportunity within which postchallenge administration of antibodies exerted a beneficial effect increased as the challenge dose of toxin decreased. The critical factor in establishing the window of opportunity was the amount of time needed for fractional redistribution of a neuroparalytic quantum of toxin from the extraneuronal space to the intraneuronal space. This redistribution event was a dose-dependent phenomenon. It is likely that the approach used to identify the factors that govern postchallenge efficacy of antibodies against botulinum toxin can be used to assess the factors that govern postchallenge efficacy of medical countermeasures against any agent of bioterrorism or biological warfare.

  19. Carbon Nanotubes: Detection of Chemical and Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    Om Kumar

    2008-09-01

    Full Text Available Discovery of carbon nanotubes has great impact on the development of newer methodologies and devicesuseful for the analysis of various types of chemicals. The functionalisation of CNTs with biomolecules relatedto chemical and biological warfare agents makes these useful for the detection of these agents. The detectionsensitivity can be increased manyfold. Various types of chemical and biological sensors were developed usingvarious type of carbon nanotubes as well as nano particles of different metals.Defence Science Journal, 2008, 58(5, pp.617-625, DOI:http://dx.doi.org/10.14429/dsj.58.1684

  20. Chemical and biological warfare: Detection and warning systems. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-10-01

    The bibliography contains citations concerning the detection, identification, verification, and warning systems of chemical and biological warfare agents. Citations discuss agents sampling, monitoring, and assessment. Techniques include chromotography, biosensing, chemical analysis, and DNA probes. Land pollution, soil tests, and skin protection are examined. (Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  1. A short history of biological warfare.

    Science.gov (United States)

    Metcalfe, Neil

    2002-01-01

    Biological weapons have been used in war from the start of recorded history. This article reviews the history of the subject, including the outbreak of the Black Death and the use of smallpox against American Indians. The new science of microbiology was misused from soon after its start and, despite the 1925 Geneva Protocol, the Japanese experimented extensively on prisoners in China. The Allies carried out extensive research during the Second World War, notably the United Kingdom into anthrax on Gruinard Island and the United States into a variety of agents. Despite the 1972 Biological Weapons Convention (BWC), a major programme continued in the former Soviet Union (leading to an accidental outbreak of anthrax). Most recently Iraq was revealed as having an extensive programme, with weaponization of large amounts of various agents, and several terrorists groups have attempted to use biological agents as weapons. Modern developments in biotechnology could lead to even more serious developments, and effective preventive measures, including strengthening of the BWC, are imperative.

  2. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  3. Methodology and biological monitoring of exposure to chemical warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Shih, M.L.; Smith, J.R.; McMonagle, J.D. [Army Medical Research Inst. of Chemical Defense, Aberdeen Proving Ground, MD (United States)

    1995-06-01

    In the past few years, our institute has developed several GC/MS methods for the detection of the breakdown products of toxic organophosphonates (soman, sarin, GF) and vesicant sulfur mustard in biological samples. Recently we developed a modified GC/MS method for VX and are continually working on the methodology for lewisite and tabun. The purpose is to have an analytical tool to verify the exposure of chemical warfare agents in humans. Analytical procedures for quantitating the hydrolyzed phosphonic acids from nerve agents in environmental samples have been reported by many analysts. For more complex matrices such as biological samples, there is not yet a method reported. To make these polar acids amenable to gas chromatographic analysis a prior derivatization is needed. We found the pentafluorobenzyl ester derivatives of the phosphonates are suitable for verification and pharmacokinetic studies in biological samples. This method may also serve as an alternative method for confirmation purposes in environmental samples.

  4. Evanescent planar waveguide detection of biological warfare simulants

    Science.gov (United States)

    Sipe, David M.; Schoonmaker, Kenneth P.; Herron, James N.; Mostert, Michael J.

    2000-04-01

    An evanescent planar waveguide Mark 1.5 instrument was used to detect simulants of biological warfare agents; ovalbumin (OV), MS2 bacteriophage, BG, and Erwinia herbicola (EH). Polyclonal tracer antibodies were labeled with the fluorescent dye, Cy5. Discrete bands of polyclonal capture antibodies were immobilized to a polystyrene planar waveguide with molded integral lenses. An ST-6 CCD camera was used for detection. OV. MS2 and BG were detected in a simultaneous 3 by 3 array; with a total of nine measurements within 6 minutes. EH was analyzed in a separate array. Results were evaluate dat the US Army Joint Field Trials V, at the Dugway Proving Grounds. Over a 10 day period, 32 unknown samples were analyzed daily for each simulant. Detection limits: OV 10 ng/ml, MS2 107 pfu/ml, BG 105 cfu/ml. EH was detectable at 5 X 105 cfu/ml. Overall false positives were 3.0 percent. Therefore, the Mark 1.5 instrument, with a parallel array of detectors, evanescent flourescent excitation, and CCD imaging provides for rapid, sensitive, and specific detection of biological warfare agent simulants.

  5. LIDAR for Detection of Chemical and Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    S Veerabuthiran

    2011-04-01

    Full Text Available Remote detection of chemical and biological warfare agents and toxic gases in the atmosphere is of current interest to both the military and civilian agencies. Out of all currently available techniques, no single technique provides efficient detection against such threats at significant standoff distances. Light detection and ranging (LIDAR technologies, based on the transmission of laser pulses and analysis of the return signals, have demonstrated impressive capabilities in remote detection of such toxic chemicals. LIDAR is a highly sensitive tool to detect the extremely low concentrations of various toxic agents present in the form of thin clouds at distances of few kilometer. The detection of these toxic clouds is based on the approach of first detecting and measuring the range of the clouds using the scattering phenomena and subsequently identifying the composition of toxic clouds using absorption and fluorescence phenomena. Laser Science and Technology Centre (LASTEC, Delhi has been working on the design and development of LIDAR systems for detection of chemical and biological warfare (CBW agents. In this paper, theoretical analysis of differential absorption LIDAR (DIAL for detection of chemical agents and fluorescence LIDAR for detection of biological agents has been discussed. For some typical parametric conditions, the received power levels from different ranges to detect specific concentrations of chemical or biological clouds have been computed and discussed. The technical details of the indigenously developed backscattering LIDAR, which detects and measures the distance of cloud layers up to 5 km is also presented.Defence Science Journal, 2011, 61(3, pp.241-250, DOI:http://dx.doi.org/10.14429/dsj.61.556

  6. Spectroscopic investigations of surface deposited biological warfare simulants

    Science.gov (United States)

    Barrington, Stephen J.; Bird, Hilary; Hurst, Daniel; McIntosh, Alastair J. S.; Spencer, Phillippa; Pelfrey, Suzanne H.; Baker, Matthew J.

    2012-06-01

    This paper reports a proof-of-principle study aimed at discriminating biological warfare (BW) simulants from common environmental bacteria in order to differentiate pathogenic endospores in situ, to aid any required response for hazard management. We used FTIR spectroscopy combined with multivariate analysis; FTIR is a versatile technique for the non-destructive analysis of a range of materials. We also report an evaluation of multiple pre-processing techniques and subsequent differences in cross-validation accuracy of two pattern recognition models (Support Vector Machines (SVM) and Principal Component - Linear Discriminant Analysis (PC-LDA)) for two classifications: a two class classification (Gram + ve spores vs. Gram -ve vegetative cells) and a six class classification (bacterial classification). Six bacterial strains Bacillus atrophaeus, Bacillus thuringiensis var. kurstaki, Bacillus thuringiensis, Escherichia coli, Pantaeoa agglomerans and Pseudomonas fluorescens were analysed.

  7. Chemical and biological warfare: Biochemistry, therapy, and treatment. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-12-01

    The bibliography contains citations concerning biochemistry, therapy, and treatment of the effects of military chemical and biological warfare agents. References include surveys and studies of immunizing agents and drugs, the efficacy of these drugs, and the effect of the drugs on the patient. Also included are biochemical studies, assay techniques, and antidote development, some of which is supported by animal studies. Citations concerning detection and warning, defoliants, protection, biology and toxicology, and general studies are covered in separate bibliographies.(Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  8. Chemical and biological warfare: Biochemistry, therapy, and treatment. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-11-01

    The bibliography contains citations concerning biochemistry, therapy, and treatment of the effects of military chemical and biological warfare agents. References include surveys and studies of immunizing agents and drugs, the efficacy of these drugs, and the effect of the drugs on the patient. Also included are biochemical studies, assay techniques, and antidote development, some of which is supported by animal studies. Citations concerning detection and warning, defoliants, protection, biology and toxicology, and general studies are covered in separate bibliographies.(Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  9. The United States and biological warfare: secrets from the early cold war and Korea.

    Science.gov (United States)

    Bruwer, A

    2001-01-01

    The United States and Biological Warfare is about accusations that the United States resorted to bacteriological warfare at a time of great military stress during the Korean War. In December 1951, the then US Secretary of Defense ordered early readiness for offensive use of biological weapons. Soon afterwards, the North Korean and Chinese armies accused the United States of starting a large-scale biological warfare experiment in Korea. The US State Department denied the accusation. Both parties to the dispute maintain their positions today. The authors spent 20 years researching the accusations in North America, Europe and Japan. They were the first foreigners to be given access to Chinese classified documents. The reader is also introduced to the concept of 'plausible denial', an official US policy which allowed responsible governmental representatives to deny knowledge of certain events. The authors hope that their work will contribute to the understanding of a time when modern war expanded into a new type of violence.

  10. Chemical and biological warfare: Biology, chemistry, and toxicology. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-10-01

    The bibliography contains citations concerning the physiological effects, physicochemical effects, and toxicology of chemical and biological warfare agents. Citations discuss toxic chemicals, chemical agent simulants, detoxification and decontamination, environmental toxicity, and land pollution. Detection techniques and warning systems are examined in a separate bibliography. (Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  11. Chemical and biological warfare: Biology, chemistry, and toxicology. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-11-01

    The bibliography contains citations concerning the physiological effects, physicochemical effects, and toxicology of chemical and biological warfare agents. Citations discuss toxic chemicals, chemical agent simulants, detoxification and decontamination, environmental toxicity, and land pollution. Detection techniques and warning systems are examined in a separate bibliography. (Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  12. Integrated electronic warfare framework for infrared self-protection of transport aircraft

    CSIR Research Space (South Africa)

    Annamalai, L

    2007-09-01

    Full Text Available Warfare Framework for Infrared Self-protection of Transport Aircraft L. Annamalai Council for Scientific and Industrial Research (CSIR) Abstract - In the African scenario, slow-moving airborne platforms such as transport aircraft have in recent... predetermined baseline were considered the best method of optimising aircraft operating procedures against threats. L. Annamalai, Defence Peace, Safety and Security (DPSS), Council for Scientific and Industrial Research (CSIR), PO Box 395, 0001...

  13. Molecular modeling toward selective inhibitors of dihydrofolate reductase from the biological warfare agent Bacillus anthracis.

    Science.gov (United States)

    Giacoppo, Juliana O S; Mancini, Daiana T; Guimarães, Ana P; Gonçalves, Arlan S; da Cunha, Elaine F F; França, Tanos C C; Ramalho, Teodorico C

    2015-02-16

    In the present work, we applied docking and molecular dynamics techniques to study 11 compounds inside the enzymes dihydrofolate reductase (DHFR) from the biological warfare agent Bacillus anthracis (BaDHFR) and Homo sapiens sapiens (HssDHFR). Six of these compounds were selected for a study with the mutant BaF96IDHFR. Our results corroborated with experimental data and allowed the proposition of a new molecule with potential activity and better selectivity for BaDHFR.

  14. [Glanders--a potential disease for biological warfare in humans and animals].

    Science.gov (United States)

    Lehavi, Ofer; Aizenstien, Orna; Katz, Lior H; Hourvitz, Ariel

    2002-05-01

    Infection with Burkholderia mallei (formerly Pseudomonas mallei) can cause a subcutaneous infection known as "farcy" or can disseminate to condition known as Glanders. It is primarily a disease affecting horses, donkeys and mules. In humans, Glanders can produce four types of disease: localized form, pulmonary form, septicemia, and chronic form. Necrosis of the tracheobronchial tree and pustular skin lesions characterize acute infection with B. mallei. Other symptoms include febrile pneumonia, if the organism was inhaled, or signs of sepsis and multiple abscesses, if the skin was the port of entry. Glanders is endemic in Africa, Asia, the Middle East, and Central and South America. Glanders has low contiguous potential, but because of the efficacy of aerosolized dissemination and the lethal nature of the disease, B. mallei was considered a candidate for biological warfare. During World War I, Glanders was believed to have been spread to infect large numbers of Russian horses and mules on the Eastern front. The Japanese infected horses, civilians and prisoners of war during World War II. The USA and the Soviet Union have shown interest in B. mallei in their biological warfare program. The treatment is empiric and includes mono or poly-therapy with Ceftazidime, Sulfadiazine, Trimethoprim + Sulfamethoxazol, Gentamicin, Imipenem etc. Aggressive control measures essentially eliminated Glanders from the west. However, with the resurgent concern about biological warfare, B. mallei is now being studied in a few laboratories worldwide. This review provides an overview of the disease and presents the only case reported in the western world since 1949.

  15. Bioterrorism and Biological Warfare, from Past to the Present: A classic review

    Directory of Open Access Journals (Sweden)

    Majid Zare Bidaki

    2015-10-01

    Full Text Available Bioterrorism is defined as any terrorist action of intentional release or dissemination of highly pathogenic biological agents, including a variety of microorganisms or biological toxins. With the growing threat of terrorism, is necessary that the potential danger of various microorganisms – as a powerful tool of aggression and threat- to be taken seriously. This review tries to explain the concept of biological weapons and their historical development process with an emphasis on efforts to control the proliferation of these types of weapons over the last century. Potential impact of infectious diseases on people and armed forces was known from since 600 BC. Using the victims of the plague as a weapon in medieval warfare and spread of smallpox as a weapon during the war against the Indians when initially America was discovered, the development of biological weapons during the World War I, World War II and the Cold War, and even since the beginning of the third millennium, all show the strategic importance of pathogenic microorganisms as a deterrent power for the superiority of some governments and cults. Historical attempts to use infectious diseases as biological weapons reveal that the distinction between a natural outbreak of an infectious disease and that of a deliberate biological attack is very difficult. Abusing this characteristic of infectious diseases has made it possible for the purposes of superiority. International agreements to control the development of biological weapons, such as “the 1925 Geneva Protocol” and “the Convention on the Prohibition of the Development, Production and Stockpiling of Biological and Toxic Weapons” have not been able to control the development and using of biological warfare.  The current paper is a classic review (Overview article aiming at increasing the knowledge and awareness of people especially of health authorities and government officials.

  16. Functionalized polymer nanofibre membranes for protection from chemical warfare stimulants

    Energy Technology Data Exchange (ETDEWEB)

    Ramaseshan, Ramakrishnan [Nanoscience and Nanotechnology Initiative, National University of Singapore, 2 Engineering Drive 3, Singapore 117576, Singapore (Singapore); Sundarrajan, Subramanian [Nanoscience and Nanotechnology Initiative, National University of Singapore, 2 Engineering Drive 3, Singapore 117576, Singapore (Singapore); Liu, Yingjun [Department of Mechanical Engineering, National University of Singapore, 9 Engineering Drive 1, Singapore 117576, Singapore (Singapore); Barhate, R S [Nanoscience and Nanotechnology Initiative, National University of Singapore, 2 Engineering Drive 3, Singapore 117576, Singapore (Singapore); Lala, Neeta L [Nanoscience and Nanotechnology Initiative, National University of Singapore, 2 Engineering Drive 3, Singapore 117576, Singapore (Singapore); Ramakrishna, S [Nanoscience and Nanotechnology Initiative, National University of Singapore, 2 Engineering Drive 3, Singapore 117576, Singapore (Singapore)

    2006-06-28

    A catalyst for the detoxification of nerve agents is synthesized from {beta}-cyclodextrin ({beta}-CD) and o-iodosobenzoic acid (IBA). Functionalized polymer nanofibre membranes from PVC polymer are fabricated with {beta}-CD, IBA, a blend of {beta}-CD+IBA, and the synthesized catalyst. These functionalized nanofibres are then tested for the decontamination of paraoxon, a nerve agent stimulant, and it is observed that the stimulant gets hydrolysed. The kinetics of hydrolysis is investigated using UV spectroscopy. The rates of hydrolysis for different organophosphate hydrolyzing agents are compared. The reactivity and amount of adsorption of these catalysts are of higher capacity than the conventionally used activated charcoal. A new design for protective wear is proposed based on the functionalized nanofibre membrane.

  17. Chemiluminescence assay for the detection of biological warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Langry, K; Horn, J

    1999-11-05

    A chemiluminescent homogeneous immunoassay and a hand-size multiassay reader are described that could be used for detecting biological materials. The special feature of the assay is that it employs two different antibodies that each bind to a unique epitope on the same antigen. Each group of epitope-specific antibodies has linked to it an enzyme of a proximal-enzyme pair. One enzyme of the pair utilizes a substrate in high concentration to produce a second substrate required by the second enzyme. This new substrate enables the second enzyme to function. The reaction of the second enzyme is configured to produce light. This chemiluminescence is detected with a charge-coupled device (CCD) camera. The proximal pair enzymes must be in close proximity to one another to allow the second enzyme to react with the product of the first enzyme. This only occurs when the enzyme-linked antibodies are attached to the antigen, whether antigen is a single protein with multiple epitopes or the surface of a cell with a variety of different antigens. As a result of their juxtaposition, the enzymes produce light only in the presence of the biological material. A brief description is given as to how this assay could be utilized in a personal bio-agent detector system.

  18. Strategies for the prevention of a successful biological warfare aerosol attack.

    Science.gov (United States)

    Wiener, S L

    1996-05-01

    Biological warfare (BW) aerosol attacks are different from chemical attacks in that they may provide no warning/all clear signals that allow the soldier to put on or remove his M17/M40 protective mask. Methods are now being perfected to detect a BW aerosol cloud using an airborne (helicopter) pulsed laser system to scan the lower altitudes upwind from a troop concentration of corps size, and to sample and analyze the nature of the aerosol within a brief time interval. This system has certain limitations and vulnerabilities, since it is designed specifically to detect a line-type aerosol attack. Provision of, training with, and field use of a lightweight dust mist or HEPA filter respirator for each soldier is proposed for protection against undetected aerosol attacks. This particulate filter respirator would be issued in addition to the M17/M40 mask. Such a BW respirator will be able to purify the soldier's air by removing particles in the 0.3- to 15-micro m-diameter range with an efficiency of 98 to 100%. Particle size of BW aerosols is in the same range, with an optimum size for high-efficiency casualty production of 1 to 5 micro m mass median diameter. The proposed BW respirator will be lightweight; will require low inhalation pressures; will be comfortable to wear for prolonged periods; will not interfere with vision, hearing, and communication; and will not degrade overall effectiveness and performance to the degree observed with the M17/M40 masks. Such respirators would be worn as part of a contingency defense against an enemy likely to use BW agents. This respirator could be worn for prolonged periods when under threat of an undetectable BW attack during weather conditions favorable to the success of such an attack (i.e., low wind velocity and temperature inversion in the target area). In addition, tactically important assets such as command and control centers and missile batteries can also be protected continuously by air filtration systems powered by

  19. NATO Advanced Research Workshop on Fluorescence and other Optical Properties of Biological Particles for Biological Warfare Agent Sensors

    CERN Document Server

    Hoekstra, Alfons; Videen, Gorden; Optics of Biological Particles

    2007-01-01

    This book covers the optics of single biological particles, both theory and experiment, with emphasis on Elastic Light Scattering and Fluorescence. It deals with the optics of bacteria (bio-aerosols), marine particles (selected phytoplankton communities) and red and white blood cells. Moreover, there are dedicated chapters on a general theory for scattering by a cell, and modelling and simulation of scattering by inhomogeneous biological cells. Finally, one chapter is dedicated to astro-biological signatures, discussing the possibilities for detecting non-terrestrial biological material. The volume has up-to-date discussions on new experimental and numerical techniques, and many examples of applications of these techniques in real-life systems, as used to detect and characterize e.g. biological warfare agents or human blood cells.

  20. Selfishness, warfare, and economics; or integration, cooperation, and biology.

    Science.gov (United States)

    Salvucci, Emiliano

    2012-01-01

    The acceptance of Darwin's theory of evolution by natural selection is not complete and it has been pointed out its limitation to explain the complex processes that constitute the transformation of species. It is necessary to discuss the explaining power of the dominant paradigm. It is common that new discoveries bring about contradictions that are intended to be overcome by adjusting results to the dominant reductionist paradigm using all sorts of gradations and combinations that are admitted for each case. In addition to the discussion on the validity of natural selection, modern findings represent a challenge to the interpretation of the observations with the Darwinian view of competition and struggle for life as theoretical basis. New holistic interpretations are emerging related to the Net of Life, in which the interconnection of ecosystems constitutes a dynamic and self-regulating biosphere: viruses are recognized as a macroorganism with a huge collection of genes, most unknown that constitute the major planet's gene pool. They play a fundamental role in evolution since their sequences are capable of integrating into the genomes in an "infective" way and become an essential part of multicellular organisms. They have content with "biological sense" i.e., they appear as part of normal life processes and have a serious role as carrier elements of complex genetic information. Antibiotics are cell signals with main effects on general metabolism and transcription on bacterial cells and communities. The hologenome theory considers an organism and all of its associated symbiotic microbes (parasites, mutualists, synergists, amensalists) as a result of symbiopoiesis. Microbes, helmints, that are normally understood as parasites are cohabitants and they have cohabited with their host and drive the evolution and existence of the partners. Each organism is the result of integration of complex systems. The eukaryotic organism is the result of combination of bacterial

  1. Global Survey of Research and Capabilities in Genetically Engineered Organisms That Could be Used in Biological Warfare or Bioterrorism

    Science.gov (United States)

    2008-12-01

    advances (summarized in Section 4) that could facilitate or at least inspire the pursuit of biological warfare capabilities. We share the opinion that...a)bccdc.ca Infectious Diseases Control Unit of the Direction de la sante publique , Montreal Chest Institute, Montreal Division of Infectious and

  2. Love-Wave Sensors Combined with Microfluidics for Fast Detection of Biological Warfare Agents

    Science.gov (United States)

    Matatagui, Daniel; Fontecha, José Luis; Fernández, María Jesús; Gràcia, Isabel; Cané, Carles; Santos, José Pedro; Horrillo, María Carmen

    2014-01-01

    The following paper examines a time-efficient method for detecting biological warfare agents (BWAs). The method is based on a system of a Love-wave immunosensor combined with a microfluidic chip which detects BWA samples in a dynamic mode. In this way a continuous flow-through of the sample is created, promoting the reaction between antigen and antibody and allowing a fast detection of the BWAs. In order to prove this method, static and dynamic modes have been simulated and different concentrations of BWA simulants have been tested with two immunoreactions: phage M13 has been detected using the mouse monoclonal antibody anti-M13 (AM13), and the rabbit immunoglobulin (Rabbit IgG) has been detected using the polyclonal antibody goat anti-rabbit (GAR). Finally, different concentrations of each BWA simulants have been detected with a fast response time and a desirable level of discrimination among them has been achieved. PMID:25029282

  3. Love-Wave Sensors Combined with Microfluidics for Fast Detection of Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    Daniel Matatagui

    2014-07-01

    Full Text Available The following paper examines a time-efficient method for detecting biological warfare agents (BWAs. The method is based on a system of a Love-wave immunosensor combined with a microfluidic chip which detects BWA samples in a dynamic mode. In this way a continuous flow-through of the sample is created, promoting the reaction between antigen and antibody and allowing a fast detection of the BWAs. In order to prove this method, static and dynamic modes have been simulated and different concentrations of BWA simulants have been tested with two immunoreactions: phage M13 has been detected using the mouse monoclonal antibody anti-M13 (AM13, and the rabbit immunoglobulin (Rabbit IgG has been detected using the polyclonal antibody goat anti-rabbit (GAR. Finally, different concentrations of each BWA simulants have been detected with a fast response time and a desirable level of discrimination among them has been achieved.

  4. Love-wave sensors combined with microfluidics for fast detection of biological warfare agents.

    Science.gov (United States)

    Matatagui, Daniel; Fontecha, José Luis; Fernández, María Jesús; Gràcia, Isabel; Cané, Carles; Santos, José Pedro; Horrillo, María Carmen

    2014-07-15

    The following paper examines a time-efficient method for detecting biological warfare agents (BWAs). The method is based on a system of a Love-wave immunosensor combined with a microfluidic chip which detects BWA samples in a dynamic mode. In this way a continuous flow-through of the sample is created, promoting the reaction between antigen and antibody and allowing a fast detection of the BWAs. In order to prove this method, static and dynamic modes have been simulated and different concentrations of BWA simulants have been tested with two immunoreactions: phage M13 has been detected using the mouse monoclonal antibody anti-M13 (AM13), and the rabbit immunoglobulin (Rabbit IgG) has been detected using the polyclonal antibody goat anti-rabbit (GAR). Finally, different concentrations of each BWA simulants have been detected with a fast response time and a desirable level of discrimination among them has been achieved.

  5. Chemical and Biological Warfare: Should Rapid Detection Techniques Be Researched To Dissuade Usage? A Review

    Directory of Open Access Journals (Sweden)

    Mark R. Hurst

    2005-01-01

    Full Text Available Chemistry, microbiology and genetic engineering have opened new doorways for the human race to propel itself to a better future. However, there is a darker side to Bioengineering. One element of this is the manufacture and proliferation of biological and chemical weapons. It is clearly in the interest of humankind to prevent the future use of such weapons of mass destruction. Though many agents have been proposed as potential biological and chemical weapons, the feasibility of these weapons is a matter of conjecture. The unpredictable and indiscriminate devastation caused by natural epidemics and hazardous chemicals during wartime without medical treatment should warn humans of the dangers of employing them as weapons. This study argues rapid detection techniques may dissuade future use. Many agents are far less toxic to treatment. A quick response time to most attacks will decrease the chances of serious health issues. The agent will be less effective and discourage the attacker from using the weapon. Fortunately, the Chemical and Biological Weapons Convention (CWCIBWC allows defensive work in the area of biological and chemical weapons. Consequently, the review will discuss history, delivery/dispersal systems and specific agents of the warfare. The study presents current developments in biosensors for toxic materials of defense interest. It concludes with future directions for biosensor development.

  6. Narrowing the zone of uncertainty between research and development in biological warfare defense.

    Science.gov (United States)

    Huxsoll, D L

    1992-12-31

    Although "research" is not prohibited by the Biological Weapons Convention, States Parties to the Convention have maintained the spirit of the Convention in actions relating to research. The confidence-building measures agreed to at RC2 refer to research facilities, publication of research results, and promotion of contacts between scientists engaged in research related to the Convention. However, assessment of basic research on biological agents is not a productive way to distinguish an offensive from a defensive program. Additionally, if a country were to initiate a biological weapons program, basic research on biological agents may not be necessary. For example, the extensive published research on Bacillus anthracis, both as a cause of anthrax in cattle and other species and as a biological-warfare agent, would enable any motivated group or nation to initiate a biological weapons program that could immediately advance to the development and scale-up stages. Research on biological agents for offensive purposes would be characterized by activities such as selection for growth, virulence, and toxin production; improving stability under varying environmental conditions; and selection of strains that might overcome existing means of prophylaxis and treatment. A biological program with an offensive intent would in most cases be characterized by evidence of development efforts in mass production and dissemination, which are often agent-specific. Thus, an assessment of development may distinguish offensive from defensive programs. If a country were to initiate a biological weapons research program, and were willing to risk worldwide condemnation should existence of such a program become known, it is likely that such a program would include development and production capabilities. If a country were not committed to production capability, there would be no rationale for an offensive biological research that would bring worldwide condemnation. Critics of the U

  7. Protection against radiation (biological, pharmacological, chemical, physical)

    Science.gov (United States)

    Saksonov, P. P.

    1975-01-01

    Physical, chemical, and biological protection for astronauts from penetrating radiation on long-term space flights is discussed. The status of pharmacochemical protection, development of protective substances, medical use of protective substances, protection for spacecraft ecologic systems, adaptogens and physical conditioning, bone marrow transplants and local protection are discussed. Combined use of local protection and pharmacochemical substances is also briefly considered.

  8. Protection against radiation (biological, pharmacological, chemical, physical)

    Science.gov (United States)

    Saksonov, P. P.

    1975-01-01

    Physical, chemical, and biological protection for astronauts from penetrating radiation on long-term space flights is discussed. The status of pharmacochemical protection, development of protective substances, medical use of protective substances, protection for spacecraft ecologic systems, adaptogens and physical conditioning, bone marrow transplants and local protection are discussed. Combined use of local protection and pharmacochemical substances is also briefly considered.

  9. Biological Research for Radiation Protection

    Energy Technology Data Exchange (ETDEWEB)

    Kim, In Gyu; Kim, Kug Chan; Jung, Il Lae; Choi, Yong Ho; Kim, Jin Sik; Moon, Myung Sook; Byun, Hee Sun; Phyo, Ki Heon; Kim, Sung Keun

    2005-04-15

    The work scope of 'Biological Research for the Radiation Protection' had contained the research about ornithine decarboxylase and its controlling proteins, thioredoxin, peroxiredoxin, S-adenosymethionine decarboxylase, and glutamate decarboxylase 67KD effect on the cell death triggered ionizing radiation and H{sub 2}O{sub 2}(toxic agents). In this study, to elucidate the role of these proteins in the ionizing radiation (or H{sub 2}O{sub 2})-induced apoptotic cell death, we utilized sensesed (or antisensed) cells, which overexpress (or down-regulate) RNAs associated with these proteins biosynthesis, and investigated the effects of these genes on the cytotoxicity caused by ionizing radiation and H{sub 2}O{sub 2}(or paraquat). We also investigated whether genisteine(or thiamine) may enhance the cytotoxic efficacy of tumor cells caused by ionizing radiation (may enhance the preventing effect radiation or paraquat-induced damage) because such compounds are able to potentiate the cell-killing or cell protecting effects. Based on the above result, we suggest that the express regulation of theses genes have potentially importance for sensitizing the efficiency of radiation therapy of cancer or for protecting the radiation-induced damage of normal cells.

  10. Marine Corps NBC Warfare: Determining Clinical Supply Requirements for Treatment of Battlefield Casualties from Chemical and Biological Warfare

    Science.gov (United States)

    2003-05-01

    applicable Federal Regulations governing the protection of human subjects in research. Martin Hill1 Mike Galarneau2 Gerry Pang2 Paula Konoske2...weapons includes the suspected use of trichothecene mycotoxins by the Japanese against the Chinese in the early 1940s. After the first Gulf War...6515013146694 Stethoscope Combination Littman Classic II 28"Lg Bell-Diaphragm 1 EA 6515013737292 Thermometer Clinical Human Oral Digtal Ltwt 300

  11. Surface plasmon resonance detection of biological warfare agent Staphylococcal enterotoxin B using high affinity monoclonal antibody

    Energy Technology Data Exchange (ETDEWEB)

    Gupta, Garima; Singh, Pawan K.; Boopathi, M., E-mail: mannanboopathi@yahoo.com; Kamboj, D.V.; Singh, Beer; Vijayaraghavan, R.

    2010-11-30

    A novel sensitive method was developed for the detection as well as quantification of Staphylococcal enterotoxin B (SEB) using surface plasmon resonance (SPR). It is well known that the amount of SEB needed to cause the intoxication to human beings is very less and this concentration (0.02 {mu}g/kg) is highly dangerous, hence, it is used as biological warfare agent. Thus, the need to develop a reliable and potential detection system against SEB is warranted. In the present work, SEB antibody was immobilized on carboxymethyldextran modified gold chip. The immobilization of SEB antibody and interaction of antigen with immobilized antibody were in-situ characterized by SPR and electrochemical impedance spectroscopy. A sample solution containing SEB antigen was injected in a working channel and the results revealed linearity in the concentration from 2.0 to 32.0 pM with a detection limit of 1.0 pM. By using kinetic evaluation software, K{sub D} (equilibrium constant) and Bmax (maximum binding capacity of analyte) values were calculated and found to be 13 pM and 424.23, respectively. Moreover, the thermodynamic parameter, change in Gibb's free energy was deduced and found to be -62.08 kJ/mol and this value shows the spontaneous interaction between SEB antigen and SEB antibody. In order to optimize the detection method, temperature and pH variation studies were also performed. Interference study was conducted to know the selectivity for the antigen-antibody interaction of SEB. The selectivity efficiency of SEB, SEC, SEA and SED were 100, 27.15, 20.01 and 12.05%, respectively towards SEB antibody.

  12. Multiple functional UV devices based on III-Nitride quantum wells for biological warfare agent detection

    Science.gov (United States)

    Wang, Qin; Savage, Susan; Persson, Sirpa; Noharet, Bertrand; Junique, Stéphane; Andersson, Jan Y.; Liuolia, Vytautas; Marcinkevicius, Saulius

    2009-02-01

    We have demonstrated surface normal detecting/filtering/emitting multiple functional ultraviolet (UV) optoelectronic devices based on InGaN/GaN, InGaN/AlGaN and AlxGa1-xN/AlyGa1-yN multiple quantum well (MQW) structures with operation wavelengths ranging from 270 nm to 450 nm. Utilizing MQW structure as device active layer offers a flexibility to tune its long cut-off wavelength in a wide UV range from solar-blind to visible by adjusting the well width, well composition and barrier height. Similarly, its short cut-off wavelength can be adjusted by using a GaN or AlGaN block layer on a sapphire substrate when the device is illuminated from its backside, which further provides an optical filtering effect. When a current injects into the device under forward bias the device acts as an UV light emitter, whereas the device performs as a typical photodetector under reverse biases. With applying an alternating external bias the device might be used as electroabsorption modulator due to quantum confined Stark effect. In present work fabricated devices have been characterized by transmission/absorption spectra, photoresponsivity, electroluminescence, and photoluminescence measurements under various forward and reverse biases. The piezoelectric effect, alloy broadening and Stokes shift between the emission and absorption spectra in different InGaN- and AlGaN-based QW structures have been investigated and compared. Possibilities of monolithic or hybrid integration using such multiple functional devices for biological warfare agents sensing application have also be discussed.

  13. Biological research for radiation protection

    Energy Technology Data Exchange (ETDEWEB)

    Kim, In Gyu; Kim, Kug Chan; Shim, Hae Won; Oh, Tae Jeong; Park, Seon Young; Lee, Kang Suk

    2000-04-01

    The work scope of Biological research for the radiation protection had contained the search of biological microanalytic methods for assessing the health effect by {gamma}-radiation and toxic agents, the standardization of human T-lymphocyte cell culture and polymerase chain reaction, T-cell clonal assay, and the quantification of mutation frequency in the hypoxanthine (guanine) phosphoribosyl transferase (HPRT) gene locus by single exposure or combined exposure. Especially, the polymerase chain reaction methods using reverse transcriptase has been developed to analyze the mutant gene induced by {gamma}-radiation and chemical (pentachlorophenol) agent exposure, and to investigate the point mutations in the HPRT gene locus of T-lymphocytes. The HPRT T-cell clonal assay revealed that it could not differentiate {gamma}-irradiation from pentachlorophenol, because the frequency of somatic mutations induced by both damaging agents increased in a dose-dependent manner. The analysis of DNA sequence alterations of HPRT mutant clones clearly showed that both damaging agents induced different mutational spectra in the HPRT locus of T-cells. The large deletions, which account for 75 percent of the analyzed mutants, are characteristic mutations induced by {gamma}-irradiation. By contrast, point mutations such as base substitutions and insertion, come up to 97 percent in the case of pentachlorophenol-treated cells. The point mutation frequencies at 190 base pair and 444 base pair positions are 3-6 folds as high as in those at other mutation positions. It may be that these mutation sites are hot spots induced by pentachlorophenol. These results suggest that the HPRT mutation spectrum can be used as a potential bio marker for assessing a specific environmental risk. (author)

  14. Development of Bicarbonate-Activated Peroxide as a Chemical and Biological Warfare Agent Decontaminant

    Science.gov (United States)

    2006-06-30

    Peroxide (HOO-) 7.8 29 26.7 ± 0.2 t-Butyl hydroperoxide ((CH3)3COO-) 7.8 9.7 39 Cumene hydroperoxide ((C6H6)C(CH3)2OO-) 7.8 9.3 22 All reactions run with...peroxymonocarbonate ion (HCO4-) as the oxidant in the catalytic oxidation reactions . For perhydrolytic cleavage of organophosphates the peroxycarbonate dianion...solubility and reaction rates for applications in chemical warfare agent decontamination. -O *C O O OH -O *C OH O HO *C OH O *CO2 HO2 - H2OHO *C O O OH pKa

  15. Capillary zone electrophoresis analysis and detection of mid-spectrum biological warfare agents. Suffield memorandum No. 1463

    Energy Technology Data Exchange (ETDEWEB)

    Boulet, C.A.

    1995-12-31

    Mid-spectrum biological warfare agents such as proteins, peptides, and toxins are often difficult to analyze and often require individually developed assay methods for detection and identification. In this regard, capillary electrophoresis is an important, emerging technique for separation and quantitation of peptides and proteins, providing separation efficiencies up to two orders of magnitude greater than high performance liquid chromatography. The technique can also analyze a broad range of compounds, has a simple instrument design which can be automated, and has low sample volume requirements. In this study, a highly efficient and reproducible capillary zone electrophoresis method was developed to separate and identify a series of nine peptides of defense interest including bradykinin, leucine enkephalin, and oxytocin. The paper demonstrates three strategies which could be used in a fully automated field detection and identification system for unknown peptides.

  16. Biological warfare warriors, secrecy and pure science in the Cold War: how to understand dialogue and the classifications of science.

    Science.gov (United States)

    Bud, Robert

    2014-01-01

    This paper uses a case study from the Cold War to reflect on the meaning at the time of the term 'Pure Science'. In 1961, four senior scientists from Britain's biological warfare centre at Porton Down visited Moscow both attending an International Congress and visiting Russian microbiological and biochemical laboratories. The reports of the British scientists in talking about a limited range of topics encountered in the Soviet Union expressed qualities of openness, sociologists of the time associated with pure science. The paper reflects on the discourses of "Pure Science", secrecy and security in the Cold War. Using Bakhtin's approach, I suggest the cordial communication between scientists from opposing sides can be seen in terms of the performance, or speaking, of one language among several at their disposal. Pure science was the language they were allowed to share outside their institutions, and indeed political blocs.

  17. How Do I Know? A Guide to the Selection of Personal Protective Equipment for Use in Responding to A Release of Chemical Warfare Agents

    Energy Technology Data Exchange (ETDEWEB)

    Foust, C.B.

    1999-05-01

    An incident involving chemical warfare agents requires a unique hazardous materials (HAZMAT) response. As with an HAZMAT event, federal regulations prescribe that responders must be protected from exposure to the chemical agents. But unlike other HAZMAT events, special considerations govern selection of personal protective equipment (PPE). PPE includes all clothing, respirators and monitoring devices used to respond to a chemical release. PPE can differ depending on whether responders are military or civilian personnel.

  18. Evaluation of Chemical Warfare Agent Percutaneous Vapor Toxicity: Derivation of Toxicity Guidelines for Assessing Chemical Protective Ensembles.

    Energy Technology Data Exchange (ETDEWEB)

    Watson, A.P.

    2003-07-24

    Percutaneous vapor toxicity guidelines are provided for assessment and selection of chemical protective ensembles (CPEs) to be used by civilian and military first responders operating in a chemical warfare agent vapor environment. The agents evaluated include the G-series and VX nerve agents, the vesicant sulfur mustard (agent HD) and, to a lesser extent, the vesicant Lewisite (agent L). The focus of this evaluation is percutaneous vapor permeation of CPEs and the resulting skin absorption, as inhalation and ocular exposures are assumed to be largely eliminated through use of SCBA and full-face protective masks. Selection of appropriately protective CPE designs and materials incorporates a variety of test parameters to ensure operability, practicality, and adequacy. One aspect of adequacy assessment should be based on systems tests, which focus on effective protection of the most vulnerable body regions (e.g., the groin area), as identified in this analysis. The toxicity range of agent-specific cumulative exposures (Cts) derived in this analysis can be used as decision guidelines for CPE acceptance, in conjunction with weighting consideration towards more susceptible body regions. This toxicity range is bounded by the percutaneous vapor estimated minimal effect (EME{sub pv}) Ct (as the lower end) and the 1% population threshold effect (ECt{sub 01}) estimate. Assumptions of exposure duration used in CPE certification should consider that each agent-specific percutaneous vapor cumulative exposure Ct for a given endpoint is a constant for exposure durations between 30 min and 2 hours.

  19. "Protected biological control"- Biological pest management in the greenhouse industry

    NARCIS (Netherlands)

    Pilkington, L.J.; Messelink, G.J.; Lenteren, van J.C.; Mottee, Le K.

    2010-01-01

    This paper briefly describes the foundations and characteristics of biological control in protected cropping and what drivers are behind adoption of this management system within this industry. Examining a brief history of biological control in greenhouses and what makes it a successful management s

  20. "Protected biological control"- Biological pest management in the greenhouse industry

    NARCIS (Netherlands)

    Pilkington, L.J.; Messelink, G.J.; Lenteren, van J.C.; Mottee, Le K.

    2010-01-01

    This paper briefly describes the foundations and characteristics of biological control in protected cropping and what drivers are behind adoption of this management system within this industry. Examining a brief history of biological control in greenhouses and what makes it a successful management

  1. Interpretation of a New Found Japanese Biological Warfare File%对一份新发现日本细菌战档案的解读

    Institute of Scientific and Technical Information of China (English)

    宫文婧

    2016-01-01

    Unit 731 focused on the research of Biological Warfare theory in the plan of biological warfare , But be-cause? of lack of evidence chain , this research is relatively backward .Entry Hojo who was the core member of Unit 731 , his speech draft On Biological Warfareis the recently found materials and evidences , has great academic research value.Through the interpretation of the Biological Warfare , analyzing the biological warfare is the vital criterion to e-valuate the research level and research competence , which is also an effective supplement to the evidences for the Jap-anese biological warfare war of aggression against China .%七三一部队在细菌战谋划中注重对细菌战理论的研究,但囿于相关证据链的缺失,致使此项研究相对滞后。七三一部队核心成员北条圆了的演讲稿《关于细菌战》作为新资料、新证据,具有重大的学术研究价值,是对国内所藏相关资料的重要补充,有助于丰富学术界对于日本细菌战理论问题的认知。《关于细菌战》是北条圆了在长期实践基础上积累形成的细菌战理论,可以在一定程度上还原战时日本细菌战的研究情况。通过对北条圆了其人及《关于细菌战》的梳理和解读,进而剖析日本细菌战理论是评估二战时期日本细菌战研究水平和研究能力的重要尺度,也是对日本侵华细菌战证据链的有效补充。

  2. Transport behavior of surrogate biological warfare agents in a simulated landfill: Effect of leachate recirculation and water infiltration

    KAUST Repository

    Saikaly, Pascal

    2010-11-15

    An understanding of the transport behavior of biological warfare (BW) agents in landfills is required to evaluate the suitability of landfills for the disposal of building decontamination residue (BDR) following a bioterrorist attack on a building. Surrogate BW agents, Bacillus atrophaeus spores and Serratia marcescens, were spiked into simulated landfill reactors that were filled with synthetic building debris (SBD) and operated for 4 months with leachate recirculation or water infiltration. Quantitative polymerase chain reaction (Q-PCR) was used to monitor surrogate transport. In the leachate recirculation reactors, <10% of spiked surrogates were eluted in leachate over 4 months. In contrast, 45% and 31% of spiked S. marcescens and B. atrophaeus spores were eluted in leachate in the water infiltration reactors. At the termination of the experiment, the number of retained cells and spores in SBD was measured over the depth of the reactor. Less than 3% of the total spiked S. marcescens cells and no B. atrophaeus spores were detected in SBD. These results suggest that significant fractions of the spiked surrogates were strongly attached to SBD. © 2010 American Chemical Society.

  3. Autonomous-agent based simulation of anti-submarine warfare operations with the goal of protecting a high value unit

    OpenAIRE

    Akbori, Fahrettin

    2004-01-01

    Approved for public release, distribution unlimited The Anti-Submarine Warfare screen design simulation is a program that provides a model for operations in anti-submarine warfare (ASW). The purpose of the program is to aid ASW commanders, allowing them to configure an ASW screen, including the sonar policy, convoy speed, and the number of ships, to gain insight into how these and other factors beyond their control, such as water conditions, impact ASW effectiveness. It is also designed to...

  4. Chemical and Biological Warfare: Should Rapid Detection Techniques Be Researched To Dissuade Usage? A Review

    OpenAIRE

    Mark R. Hurst; Ebtisam Wilkins

    2005-01-01

    Chemistry, microbiology and genetic engineering have opened new doorways for the human race to propel itself to a better future. However, there is a darker side to Bioengineering. One element of this is the manufacture and proliferation of biological and chemical weapons. It is clearly in the interest of humankind to prevent the future use of such weapons of mass destruction. Though many agents have been proposed as potential biological and chemical weapons, the feasibility of these weapons i...

  5. Roman Warfare

    Directory of Open Access Journals (Sweden)

    D.B. Saddington

    2012-03-01

    Full Text Available

    ROTH, Jonathan P 2009. Roman Warfare. Cambridge: Cambridge University Press. Pbk. R250. ISBN 978-0-521-53726-1.

    Jonathan Roth of San Jose State University, known as an expert on military logistics, has written this attractive Cambridge Introduction to Roman Civilization volume on Roman Warfare. The series is designed for students with no prior knowledge of Roman antiquity. The book comprises an Introduction on Sources and Methods (pp. 1-6 and 15 chapters on Roman warfare from the beginnings to the fall of the Western Empire in AD 476, using a chronological approach. There are 68 illustrations and maps, a Timeline, a Glossary, a Glossary of People, a Bibliography (which includes several websites and an Index.

  6. Governing Warfare

    DEFF Research Database (Denmark)

    Harste, Gorm

      It would seem as though warfare has gotten out of control, not only in Iraq and Afghanistan, but also in Central Africa. The paper outlines the strategic history of politically controlled warfare since the early Enlightenment. The argument is that control is implausible. The idea of control has...... the risks of lacking unity and displays the organisational trap to the fatal political myth of controlled warfare: Does it come from the military organisation system itself, from political ideologies of goal-rational governance, or from the chameleonic logic of wars?  ...... administration. While organisation systems continue to make some kind of political control possible, this is not the case in relation to wars. The organisation system is the in-between that should mediatise politics and war but is not functionally equivalent to just and unjust wars. The paper investigates...

  7. Capillary zone electrophoresis analysis and detection of mid-spectrum biological warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Boulet, C.A.; Townsley, C.

    1995-04-01

    DRE Suffield has initiated a research program to develop methods and equipment for field detection and laboratory identification of mid-spectrum agents, molecules of biological origin such as proteins, peptides and toxins. In this study, a highly efficient and reproducible capillary zone electrophoresis method was developed to separate and identify a series of nine peptides of defence interest: bradykinin, bradykinin fragment 1-5, substance P,ARG8-vasopressin, luteinizing hormone releasing hormone, bombesin, leucine enkephalin, methionine enkephalin, and oxytocin. Using a 50 micrometer x 47 cm capillary column, 22.5 kV separation voltage and a 100 mM pH 2.5 phosphate buffer, all nine peptide could separated in under 10 minutes. Three strategies, which could be used in a fully automated field detection and identification system, were demonstrated for the identification of unknown peptides: comparison of migration times, comparison of electrophoretic mobilities, and co-injection of multiple reference standards. These experiments demonstrate that a separation based analytical method such as capillary electrophoresis could form the basis of a generic detection system for mid-spectrum protein and peptide toxins.

  8. A hybrid method for protection against threats to a network infrastructure for an electronic warfare management system

    Science.gov (United States)

    Byłak, Michał; RóŻański, Grzegorz

    2017-04-01

    The article presents the concept of ensuring the security of network information infrastructure for the management of Electronic Warfare (EW) systems. The concept takes into account the reactive and proactive tools against threats. An overview of the methods used to support the safety of IT networks and information sources about threats is presented. Integration of mechanisms that allow for effective intrusion detection and rapid response to threats in a network has been proposed. The architecture of the research environment is also presented.

  9. Biological research for the radiation protection

    Energy Technology Data Exchange (ETDEWEB)

    Kim, In Gyu; Kim, Chan Kug; Shim, Hae Won; Jung, Il Lae; Byun, Hee Sun; Moon, Myung Sook; Cho, Hye Jeong; Kim, Jin Sik

    2003-04-01

    The work scope of 'Biological Research for the Radiation Protection' had contained the research about polyamine effect on cell death triggered ionizing radiation, H{sub 2}O{sub 2} and toxic agents. In this paper, to elucidate the role of polyamines as mediator in lysosomal damage and stress(H{sub 2}O{sub 2})- induced apoptosis, we utilized {alpha}-DiFluoroMethylOrnithine (DFMO), which inhibited ornithine decarboxylase and depleted intracellular putrescine, and investigated the effects of polyamine on the apoptosis caused by H{sub 2}O{sub 2}, ionizing radiation and paraquat. We also showed that MGBG, inhibitor of polyamine biosynthesis, treatment affected intracellular redox steady states, intracellular ROS levels and protein oxidation. Thereafter we also investigated whether MGBG may enhance the cytotoxic efficacy of tumor cells caused by ionizing radiation or H{sub 2}O{sub 2} because such compounds are able to potentiate the cell-killing effects. In addition, ceruloplasmin and thioredoxin, possible antioxidant proteins, were shown to have protective effect on radiation- or H{sub 2}O{sub 2}(or chemicals)-induced macromolecular damage or cell death.

  10. [The re-introduction of malaria in the Pontine Marshes and the Cassino district during the end of World War II. Biological warfare or global war tactics?].

    Science.gov (United States)

    Sabbatani, Sergio; Fiorino, Sirio; Manfredi, Roberto

    2013-12-01

    After the fall of the Fascist regime on September 8, 1943, Italy was split into two parts: (i) the Southern regions where the King Victor Emanuel III and the military general staff escaped was under the control of English-American allied armies, and (ii) the northern regions comprising Lazio, Tuscany, Umbria, and Marche still under the control of the Germans. The German Wehrmacht, after suffering several defeats on Southern lines, established a new strengthened line of defence called the Gustav line, located south of Rome and crossing in the western portion the recently-drained Pontine Marshes. In his book published in 2006, Frank Snowden hypothesised that occupying German armies in 1943 had initiated a programme of re-flooding the Pontine plain as a biological warfare strategy to re-introduce malaria infection in the territories south of Rome, Such a plan was intended (i) to slow down the advance of English-American forces, and (ii) to punish Italians who abandoned their former allies. Other authors, including Annibale Folchi, Erhard Geissler, and Jeanne Guillemin, have disputed this hypothesis based on an analysis of recently-uncovered archive documents. What is not disputed is that the flooding of the Pontine and Roman plains in 1943 contributed to a severe malaria epidemic in 1944, which was associated with exceptionally high morbidity and mortality rates in the afflicted populations. Herein, we critically evaluate the evidence and arguments of whether the Wehrmacht specifically aimed to spread malaria as a novel biological warfare strategy in Italy during the Second World War. In our opinion, evidence for specific orders to deliberately spread malaria by the German army is lacking, although the strategy itself may have been considered by Nazis during the waning years of the war.

  11. Wave basin model tests of technical-biological bank protection

    Science.gov (United States)

    Eisenmann, J.

    2012-04-01

    Sloped embankments of inland waterways are usually protected from erosion and other negative im-pacts of ship-induced hydraulic loads by technical revetments consisting of riprap. Concerning the dimensioning of such bank protection there are several design rules available, e.g. the "Principles for the Design of Bank and Bottom Protection for Inland Waterways" or the Code of Practice "Use of Standard Construction Methods for Bank and Bottom Protection on Waterways" issued by the BAW (Federal Waterways Engineering and Research Institute). Since the European Water Framework Directive has been put into action special emphasis was put on natural banks. Therefore the application of technical-biological bank protection is favoured. Currently design principles for technical-biological bank protection on inland waterways are missing. The existing experiences mainly refer to flowing waters with no or low ship-induced hydraulic loads on the banks. Since 2004 the Federal Waterways Engineering and Research Institute has been tracking the re-search and development project "Alternative Technical-Biological Bank Protection on Inland Water-ways" in company with the Federal Institute of Hydrology. The investigation to date includes the ex-amination of waterway sections where technical- biological bank protection is applied locally. For the development of design rules for technical-biological bank protection investigations shall be carried out in a next step, considering the mechanics and resilience of technical-biological bank protection with special attention to ship-induced hydraulic loads. The presentation gives a short introduction into hydraulic loads at inland waterways and their bank protection. More in detail model tests of a willow brush mattress as a technical-biological bank protec-tion in a wave basin are explained. Within the scope of these tests the brush mattresses were ex-posed to wave impacts to determine their resilience towards hydraulic loads. Since the

  12. Flying Electronic Warfare Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides NP-3D aircraft host platforms for Effectiveness of Navy Electronic Warfare Systems (ENEWS) Program antiship missile (ASM) seeker simulators used...

  13. Flying Electronic Warfare Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides NP-3D aircraft host platforms for Effectiveness of Navy Electronic Warfare Systems (ENEWS) Program antiship missile (ASM) seeker simulators used...

  14. HIGHLY SELECTIVE SENSORS FOR CHEMICAL AND BIOLOGICAL WARFARE AGENTS, INSECTICIDES AND VOCS BASED ON A MOLECULAR SURFACE IMPRINTING TECHNIQUE

    Science.gov (United States)

    Abstract was given as an oral platform presentation at the Pittsburgh Conference, Orlando FL (March 5-9, 2006). Research described is the development of sensors based on molecular surface imprinting. Applications include the monitoring of chemical and biological agents and inse...

  15. Biology of forest tree protection: its tasks and perspectives

    Directory of Open Access Journals (Sweden)

    Tucović Aleksandar

    2002-01-01

    Full Text Available The logical conclusion of the short analysis of criteria on natural resource planning and management in situ and ex situ (scale, number, intraspecific variability, ecology of communities, policy, economy, organisation of research, recreation, referring to active biological protection of trees, is as follows: biological resources of trees in situ and ex situ should be large, diverse and geographically and ecologically distributed throughout the country. Their number and scale depend on our potentials. At the beginning of the new century, we have to create an active (functional strategy of the protection of tree biology, especially endemic and relic species. Accordingly, the biologists interested in tree resource protection should already exercise their influence in solving these issues (organisation of active protection, more or less directed reproduction, of economically significant species, etc. The biological protection of trees has an intensive development in the developed countries of the world, while the developing countries are trying to follow the trend, depending on their material sources, culture and attitude of their state government Biological protection of trees is an open, new, and very wide area of further research in already set aside natural resources in situ and ex situ. This is a new field of research, without a long tradition. Along with the scientific value of this approach of the systematic and systemic solution of more or less directed tree reproduction, we also need an economic stimulation. The scope and the complexity of this field of research requires further scientific work of a greater number of teams, some of which should be supported by forestry profession and the society in general The introduction of the model of tree recombination system enables a completely new approach to quality control of the successive generations of trees. This means that all current and planned measures in the model must be clearly

  16. Defining cyber warfare

    Directory of Open Access Journals (Sweden)

    Dragan D. Mladenović

    2012-04-01

    Full Text Available Cyber conflicts represent a new kind of warfare that is technologically developing very rapidly. Such development results in more frequent and more intensive cyber attacks undertaken by states against adversary targets, with a wide range of diverse operations, from information operations to physical destruction of targets. Nevertheless, cyber warfare is waged through the application of the same means, techniques and methods as those used in cyber criminal, terrorism and intelligence activities. Moreover, it has a very specific nature that enables states to covertly initiate attacks against their adversaries. The starting point in defining doctrines, procedures and standards in the area of cyber warfare is determining its true nature. In this paper, a contribution to this effort was made through the analysis of the existing state doctrines and international practice in the area of cyber warfare towards the determination of its nationally acceptable definition.

  17. Rethinking Defensive Information Warfare

    Science.gov (United States)

    2004-06-01

    electronic warfare, and special information operations. Defensive information operations ensure timely, accurate, and relevant information access...information and information systems. IA, physical security, OPSEC, counter-deception, counter-psyops, CI, EW, and special information operations. Ensure

  18. Measuring management success for protected species: Looking beyond biological outcomes

    Directory of Open Access Journals (Sweden)

    Kathryn D Bisack

    2016-05-01

    Full Text Available The complexity of the ocean ecosystem, including the human component, is such that a single fishery may require multiple policy instruments to support recovery and conservation of protected species, in addition to those for fisheries management. As regulations multiply, the need for retrospective analysis and evaluation grows in order to inform future policy. To accurately evaluate policy instruments, clear objectives and their link to outcomes are necessary, as well as identifying criteria to evaluate outcomes. The Northeast United States sink gillnet groundfish fishery provides a case study of the complexity of regulations and policy instruments implemented under the Marine Mammal Protection Act and the Endangered Species Act to address bycatch of marine mammals. The case study illustrates a range of possible objectives for the policy instruments including biological, economic, social-normative and longevity factors. We highlight links between possible objectives, outcomes and criteria for the four factors, as well as areas for consideration when undertaking ex-post analyses. To support learning from past actions, we call for a coordinated effort involving multiple disciplines and jurisdictions to undertake retrospective analyses and evaluations of key groups of policy instruments used for protected species.

  19. Bragg Curve, Biological Bragg Curve and Biological Issues in Space Radiation Protection with Shielding

    Science.gov (United States)

    Honglu, Wu; Cucinotta, F.A.; Durante, M.; Lin, Z.; Rusek, A.

    2006-01-01

    The space environment consists of a varying field of radiation particles including high-energy ions, with spacecraft shielding material providing the major protection to astronauts from harmful exposure. Unlike low-LET gamma or X-rays, the presence of shielding does not always reduce the radiation risks for energetic charged particle exposure. Since the dose delivered by the charged particle increases sharply as the particle approaches the end of its range, a position known as the Bragg peak, the Bragg curve does not necessarily represent the biological damage along the particle traversal since biological effects are influenced by the track structure of both primary and secondary particles. Therefore, the biological Bragg curve is dependent on the energy and the type of the primary particle, and may vary for different biological endpoints. To achieve a Bragg curve distribution, we exposed cells to energetic heavy ions with the beam geometry parallel to a monolayer of fibroblasts. Qualitative analyses of gamma-H2AX fluorescence, a known marker of DSBs, indicated increased clustering of DNA damage before the Bragg peak, enhanced homogenous distribution at the peak, and provided visual evidence of high linear energy transfer (LET) particle traversal of cells beyond the Bragg peak. A quantitative biological response curve generated for micronuclei (MN) induction across the Bragg curve did not reveal an increased yield of MN at the location of the Bragg peak. However, the ratio of mono-to bi-nucleated cells, which indicates inhibition in cell progression, increased at the Bragg peak location. These results, along with other biological concerns, show that space radiation protection with shielding can be a complicated issue.

  20. On the Probability of Predicting and Mapping Traditional Warfare Measurements to the Cyber Warfare Domain

    CSIR Research Space (South Africa)

    Grobler, M

    2014-07-01

    Full Text Available to cyber warfare. This article aims to provide evidence towards the probability of predicting and mapping traditional warfare measurements to the cyber warfare domain. Currently the only way of cyber warfare measurement is located in traditional information...

  1. PROTECTION OF WOODEN MATERIALS AGAINST BIOLOGICAL ATTACK BY USING NANOTECHNOLOGY

    Directory of Open Access Journals (Sweden)

    Michal Havrlik

    2015-04-01

    Full Text Available This article is focused on protection of wooden materials by using nanofibrous textiles with biocidal addition, which continues on the work of a group at the Center for Nanotechnology at the Faculty of Civil Engineering in the CTU. Timber is a natural material which is predisposed for biodegradation and therefore it is essential to study suitable and effective protection against microorganisms. Wood is a material susceptible to biological corrosion and therefore it is necessary to protect it. The study compares biocidal efficiency of polymer solution as a coating and as a layer from nanofiber textiles. We used polyvinyl alcohol (PVA as a basic polymer which was enriched by substances from commercial Lignofix E – profi, solution of CuSO4 · 5H2O and AgNO3 and finally colloidal silver as an example of nanoparticles. The final concentration of the biocidal substance was 1 (v/wt% in fiber. The nanofiber textiles are produced on the device Nanospider NS LAB 500 (Elmarco, CR on cylinder rotating electrode. The study was divided into two parts, the first being an agar plate test and the second a test on samples from timber. The mixture of mold was used as the model organism. (Alternaria tenuissima, Pochonia bulbiosa, Trichoderma viride and Acremonium sclerotigenum. Comparison of efficiency between the polymer paint and nanofiber textiles showed no difference. The best results were shown by PVA with an addition of substances from the commercial biocidal treatment Lignofix-E Profi on the agar plate. The difference of result was shown on timbre samples, finding that the best results were with treatment by PVA doped by Silver nitrate. The anticipated results were shown by treatment with non-doped PVA, which does not have any fungicidal protective effect.

  2. Biologically-Derived Photonic Materials for Thermal Protection Systems

    Science.gov (United States)

    Johnson, Sylvia M.; Squire, Thomas H.; Lawson, John W.; Gusman, Michael; Lau, K.-H.; Sanjurjo, Angel

    2014-01-01

    Space vehicles entering a planetary atmosphere at high velocity can be subject to substantial radiative heating from the shock layer in addition to the convective heating caused by the flow of hot gas past the vehicle surface. The radiative component can be very high but of a short duration. Approaches to combat this effect include investigation of various materials to reflect the radiation. Photonic materials can be used to reflect radiation. The wavelengths reflected depend on the length scale of the ordered microstructure. Fabricating photonic structures, such as layers, can be time consuming and expensive. We have used a biologically-derived material as the template for forming a high temperature photonic material that could be incorporated into a heatshield thermal protection material.

  3. Biological Activities of Phosphocitrate: A Potential Meniscal Protective Agent

    Directory of Open Access Journals (Sweden)

    Yubo Sun

    2013-01-01

    Full Text Available Phosphocitrate (PC inhibited meniscal calcification and the development of calcium crystal-associated osteoarthritis (OA in Hartley guinea pigs. However, the mechanisms remain elusive. This study sought to examine the biological activities of PC in the absence of calcium crystals and test the hypothesis that PC is potentially a meniscal protective agent. We found that PC downregulated the expression of many genes classified in cell proliferation, ossification, prostaglandin metabolic process, and wound healing, including bloom syndrome RecQ helicase-like, cell division cycle 7 homolog, cell division cycle 25 homolog C, ankylosis progressive homolog, prostaglandin-endoperoxide synthases-1/cyclooxygenase-1, and plasminogen activator urokinase receptor. In contrast, PC stimulated the expression of many genes classified in fibroblast growth factor receptor signaling pathway, collagen fibril organization, and extracellular structure organization, including fibroblast growth factor 7, collagen type I, alpha 1, and collagen type XI, alpha 1. Consistent with its effect on the expression of genes classified in cell proliferation, collagen fibril organization, and ossification, PC inhibited the proliferation of OA meniscal cells and meniscal cell-mediated calcification while stimulating the production of collagens. These findings indicate that PC is potentially a meniscal-protective agent and a disease-modifying drug for arthritis associated with severe meniscal degeneration.

  4. Protecting innovation in bioinformatics and in-silico biology.

    Science.gov (United States)

    Harrison, Robert

    2003-01-01

    Commercial success or failure of innovation in bioinformatics and in-silico biology requires the appropriate use of legal tools for protecting and exploiting intellectual property. These tools include patents, copyrights, trademarks, design rights, and limiting information in the form of 'trade secrets'. Potentially patentable components of bioinformatics programmes include lines of code, algorithms, data content, data structure and user interfaces. In both the US and the European Union, copyright protection is granted for software as a literary work, and most other major industrial countries have adopted similar rules. Nonetheless, the grant of software patents remains controversial and is being challenged in some countries. Current debate extends to aspects such as whether patents can claim not only the apparatus and methods but also the data signals and/or products, such as a CD-ROM, on which the programme is stored. The patentability of substances discovered using in-silico methods is a separate debate that is unlikely to be resolved in the near future.

  5. The Physics of Warfare

    Science.gov (United States)

    Giordano, Gerardo

    2015-01-01

    Recently, I was tasked with the creation and execution of a new themed general education physics class called The Physics of Warfare. In the past, I had used the theme of a class, such as the physics of sports medicine, as a way to create homework and in-class activities, generate discussions, and provide an application to demonstrate that physics…

  6. Hybrid Warfare: the 21st Century Russian Way of Warfare

    Science.gov (United States)

    2017-05-25

    social, military, information, and diplomatic means. Russian information operations are a critical component of their hybrid theory of warfare and...in which NATO discontinues encroaching on Russia’s sphere of influence and in which Russia ascends to regional hegemony .2 Although unsuccessful, this...Russian model of hybrid warfare illuminates several critical innovations to warfare that transpired while the United States was committed to operations

  7. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  8. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  9. Electronic Warfare in Operations

    Science.gov (United States)

    2009-02-25

    through gamma radiation (at the short-wavelength end). It covers wavelengths from thousands of kilometers to a fraction of the size of an atom...INFORMATION FUSION EXCHANGE F-13. The Knowledge and Information Fusion Exchange (sometimes called KnIFE ) is a program sponsored by U.S. Joint Forces...Warfare Analysis Center, 7-9 K–L–M Knowledge and Information Fusion Exchange ( KnIFE ), F-13 lasers, directed energy and, A-7 leadership (element

  10. Modern Maritime Trade Warfare

    Science.gov (United States)

    2013-05-20

    historically established method for conducting maritime trade warfare is Maritime Interdiction Operations ( MIO ). In the context of this paper, the...operating far from friendly shores. Accordingly, this tool would be most useful against nations with less capable navies. An advantage of MIO in...or collateral damage. 6 Large-scale MIO can be resource intensive and time consuming, and the U.S. Navy and Coast Guard have limited ships and

  11. A Better State of War: Surmounting the Ethical Cliff in Cyber Warfare

    Science.gov (United States)

    2014-06-01

    Unlike landmines, for example, that litter historical battlefields to this day, cyber weapons offer a more hygienic approach to warfare. In...institutions have protected civilians from harm through established regulations and norms ranging from merchant shipping protection under the law of...targeted the Laconia, a merchant vessel, in 1942.80 Citizens engaged in cyber warfare, however, may be targeted with commensurate cyber weapons

  12. Establishing Cyber Warfare Doctrine

    Directory of Open Access Journals (Sweden)

    Andrew M. Colarik

    2012-01-01

    Full Text Available Over the past several decades, advances in technology have transformed communications and the ability to acquire, disseminate, and utilize information in a range of environments. Modern societies and their respective militaries have taken advantage of a robust information space through network-centric systems. Because military and commercial operations have increasingly converged, communication and information infrastructures are now high-priority military objectives in times of war. This article examines the theoretical underpinning of current cyber warfare research, what we have learned so far about its application, and some of the emerging themes to be considered; it also postulates the development of a (national cyber warfare doctrine (CWD. An endeavor of this scale requires lots of considerations and preparation for its development if it is to be cooperatively embraced. This article considers why information technology systems and their supporting infrastructures should be considered legitimate military targets in conflicts, and offers several events that support this supposition. In addition, it identifies the various forms of doctrine that will become the basis for developing a CWD, discusses a CWD's possible components, and proposes a national collaborative and discussion framework for obtaining a nation's stakeholder buy-in for such an endeavor.

  13. Biologically Hazardous Agents at Work and Efforts to Protect Workers' Health: A Review of Recent Reports

    Directory of Open Access Journals (Sweden)

    Kyung-Taek Rim

    2014-06-01

    Full Text Available Because information on biological agents in the workplace is lacking, biological hazard analyses at the workplace to securely recognize the harmful factors with biological basis are desperately needed. This review concentrates on literatures published after 2010 that attempted to detect biological hazards to humans, especially workers, and the efforts to protect them against these factors. It is important to improve the current understanding of the health hazards caused by biological factors at the workplace. In addition, this review briefly describes these factors and provides some examples of their adverse health effects. It also reviews risk assessments, protection with personal protective equipment, prevention with training of workers, regulations, as well as vaccinations.

  14. Biological Criteria for Protection of U.S. Coral Reefs.

    Science.gov (United States)

    Coral reef ecosystems are threatened by natural stressors, human activities, and natural stressors exacerbated by human activities. Under the U.S. Clean Water Act, States and Territories may guard against anthropogenic threats by adopting water quality standards based on biologic...

  15. Biological Criteria for Protection of U.S. Coral Reefs.

    Science.gov (United States)

    Coral reef ecosystems are threatened by natural stressors, human activities, and natural stressors exacerbated by human activities. Under the U.S. Clean Water Act, States and Territories may guard against anthropogenic threats by adopting water quality standards based on biologic...

  16. The importance of microdosimetry for radiation biology and radiation protection

    NARCIS (Netherlands)

    Barendsen, G.W.

    1967-01-01

    In this contribution several features will be discussed of relations between biological effects produced by ionizing radiations and the spatial distributions of energy deposition of these radiations. Effects produced by high-LET radiations are generally found to be less dependent on dose-rate, dose-

  17. The importance of microdosimetry for radiation biology and radiation protection

    NARCIS (Netherlands)

    Barendsen, G.W.

    1967-01-01

    In this contribution several features will be discussed of relations between biological effects produced by ionizing radiations and the spatial distributions of energy deposition of these radiations. Effects produced by high-LET radiations are generally found to be less dependent on dose-rate,

  18. Radiologic science for technologists: physics, biology, and protection. [Textbook

    Energy Technology Data Exchange (ETDEWEB)

    Bushong, S.C.

    1980-01-01

    The second edition of a textbook primarily for students in radiologic technology is presented. Separate chapters discuss mammography, computed tomography, diagnostic ultrasound, and design of radiologic physics. Radiation protection is specifically presented in two chapters as well as being integrated throughout the text. The fundamentals of radiobiology, molecular and cellular effects of irradiation, and early and late radiation effects comprise four chapters. (JMT)

  19. The ethics of information warfare

    CERN Document Server

    Floridi, Luciano

    2014-01-01

    This book offers an overview of the ethical problems posed by Information Warfare, and of the different approaches and methods used to solve them, in order to provide the reader with a better grasp of the ethical conundrums posed by this new form of warfare.The volume is divided into three parts, each comprising four chapters. The first part focuses on issues pertaining to the concept of Information Warfare and the clarifications that need to be made in order to address its ethical implications. The second part collects contributions focusing on Just War Theory and its application to the case of Information Warfare. The third part adopts alternative approaches to Just War Theory for analysing the ethical implications of this phenomenon. Finally, an afterword by Neelie Kroes - Vice President of the European Commission and European Digital Agenda Commissioner - concludes the volume. Her contribution describes the interests and commitments of the European Digital Agenda with respect to research for the developme...

  20. Airpower Support to Unconventional Warfare

    Science.gov (United States)

    2009-12-11

    supplies to isolated mountain outposts (Trest 2000, 109). The Helio Couriers operated out of small dirt strips, referred to as lima sites, usually... rosa : The O.S.S. and American espionage. New York: Reynal and Hitchcock. AF Special Operations Command white paper. 2007. USAF irregular warfare...Symposium on the role of airpower in counterinsurgency and unconventional warfare: A brief summary of viewpoints. Santa Monica, CA: The RAND

  1. 美国在朝鲜战争中实施细菌战的证据%On Evidence of American Biological Warfare in the Korean War

    Institute of Scientific and Technical Information of China (English)

    张华

    2013-01-01

    The Investigation Report of American Biological War in North Korean and China by famous scien-tists from Sweden, France, England, Italia, Brazil, and Soviet Union is the core evidence of American biological war in the Korean War. Furthermore, there are at least six additional evidences:U.S.A. had the ability and desire to wage bi-ological war before and during the Korean War;it was reported by foreign newspapers that U.S.A. used Japanese bio-logical war troops to wage biological war;U.S.A. had biological war troops and bases in Japan;U.S.A. used the biolog-ical war technology and method of Japanese biological war troops;captive American pilots regretted their behaviors of waging biological war;the Chinese document of anti-biological war shows that the Chinese People’s Volunteers and the Chinese people in East Northern China were attacked by American biological war troops.%  60年前,由瑞典、法国、英国、意大利、巴西、苏联等6国知名科学家组团实地调查朝鲜战争中的细菌战后,向国际社会发表的《调查在朝鲜和中国的细菌战实事报告书及附件》,是美军在朝鲜战争中实施细菌战的核心证据。围绕这一核心证据,至少还有6个方面的旁系证据:美国在朝鲜战争前夕和期间具备实施细菌战的能力,并有着实施细菌战的强烈欲望;许多外媒报道,美国利用日本原细菌战人员,协助美军实施细菌战;朝鲜战争前夕和期间,美国在日本拥有细菌战部队和基地;朝鲜战争中实施的细菌战,明显袭用了“二战”期间日本细菌战技术和方法;被俘的美国飞行员对他们的细菌战行径表示忏悔,并写出供词;现存中国反细菌战档案表明,中国人民志愿军和东北人民确实受到美国细菌战攻击,中国由此展开了大规模的反细菌战运动。

  2. Estimated Chemical Warfare Agent Surface Clearance Goals for Remediation Pre-Planning

    Energy Technology Data Exchange (ETDEWEB)

    Dolislager, Frederick [University of Tennessee, Knoxville (UTK); Bansleben, Dr. Donald [U.S. Department of Homeland Security; Watson, Annetta Paule [ORNL

    2010-01-01

    Health-based surface clearance goals, in units of mg/cm2, have been developed for the persistent chemical warfare agents sulfur mustard (HD) and nerve agent VX as well as their principal degradation products. Selection of model parameters and critical receptor (toddler child) allow calculation of surface residue estimates protective for the toddler child, the general population and adult employees of a facilty that has undergone chemical warfare agent attack.

  3. ISIL's Hybrid Warfare in Syria & Iraq

    DEFF Research Database (Denmark)

    Sørensen, Heine

    2016-01-01

    The case study specifically seeks to answer the following problem statement: Does ISIL qualify as an actor using hybrid warfare and if so what characterizes their particular use of this type of warfare? Based on an analysis of ISIL’s warfare from August 2012 to August 2016 the chapter argues, tha...

  4. Protection against trichothecene mycotoxins

    Energy Technology Data Exchange (ETDEWEB)

    1983-01-01

    Trichothecenes and their effects on humans have attracted national and international attention because of their reported use in warfare. This study arose out of a concern about such uses and the potential harm these substances could cause among civilian and military populations that might be exposed to them. Accordingly, this report is intended to assist in the protection not only of U.S. Armed Forces against the adverse effects of trichothecenes but also of civilian populations that may come into contact with these toxins during peace or war. The committee concentrated on the following two major objectives: (1) examination of the environmental and biological behavior of the trichothecene class of mycotoxins to determine what protective measures can be taken and (2) development of the means for optimizing the protection of human beings against the effects of trichothecenes through appropriate prophylaxes and treatments.

  5. Cognitive systems in electronic warfare

    Science.gov (United States)

    Kulpa, Krzysztof; Szczepankiewicz, Michał; Żywek, Marcin; Malanowski, Mateusz; Misiurewicz, Jacek; Samczyński, Piotr

    2017-04-01

    Electronic warfare (EW) techniques were invented 70 years ago and are still being developed, all the time with a key role played by their operators. However, a human operator responds far too slowly for the on-going needs since to be adequate to current threats the EW system reaction should be within 1 ms or less. Too slow reaction defers an achievement of the objectives, and generally may lead to disclosure of the applied strategy and to waste of resources. Developing the adequate response to the threat is a multifaceted matter that requires considerable experience and knowledge on the one hand, and thorough observation of outcomes of the applied strategy on the other hand. Such action requires the use of not only intelligence but also more complex algorithms for automatic control than the classical ones, and it heavily builds on the experience. It is therefore a cognitive task in its nature, and a human operator acts naturally this way. Consequently, a proper training and experience gained are what really matters. As a result of tests and actions in EW the operator builds his own knowledge base, thus, gains a capability of responding to the known threats in a balanced way. New threats, however, are much more challenging since they should be handled as fast as possible but in a fresh and creative manner. To this end, adapting the algorithms of radar jamming protection for the new conditions of the battlefield is an example of such challenging tasks. At present, such adjustments are done in a long feedback loop when the operator, after recognizing the problem, notifies the equipment manufacturers, and then, their engineers work on required solutions accordingly. Thus, the reaction time is counted in years, not a single milliseconds or seconds. Speeding up the response time is therefore the key issue, and a solution to it would be feasible only when cognitive systems were used. A concept of such cognitive system is presented in this paper.

  6. Simulating cyber warfare and cyber defenses: information value considerations

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber

  7. The ethics of drone warfare

    Directory of Open Access Journals (Sweden)

    Fatić Aleksandar

    2017-01-01

    Full Text Available The paper investigates the compatibility of the modern technologies of warfare, specifically the use of offensive drones, with traditional military ethics and suggests that the new technologies radically change the value system of the military in ways which make large parts of the traditional military ethics inapplicable. The author suggests that Agamben’s concept of ‘effectivity’ through ‘special actions’ which mark one’s belonging to a particular community or profession is a useful conceptual strategy to explore the compatibility of drone warfare with traditional military ethics; this strategy shows mixed results at best.

  8. [Biological weapons].

    Science.gov (United States)

    Kerwat, K; Becker, S; Wulf, H; Densow, D

    2010-08-01

    Biological weapons are weapons of mass destruction that use pathogens (bacteria, viruses) or the toxins produced by them to target living organisms or to contaminate non-living substances. In the past, biological warfare has been repeatedly used. Anthrax, plague and smallpox are regarded as the most dangerous biological weapons by various institutions. Nowadays it seems quite unlikely that biological warfare will be employed in any military campaigns. However, the possibility remains that biological weapons may be used in acts of bioterrorism. In addition all diseases caused by biological weapons may also occur naturally or as a result of a laboratory accident. Risk assessment with regard to biological danger often proves to be difficult. In this context, an early identification of a potentially dangerous situation through experts is essential to limit the degree of damage. Georg Thieme Verlag KG Stuttgart * New York.

  9. Using Biology to Teach Adolescents about STD Transmission and Self-Protective Behaviors

    Science.gov (United States)

    Zamora, Angela; Romo, Laura F.; Kit-fong Au, Terry

    2006-01-01

    The effects of a prevention program designed to teach 7th grade students about the different risk behaviors associated with human immunodeficiency virus (HIV), chlamydia, and gonorrhea transmission were examined. Over 3 days, the students were taught how to reason about self-protective behaviors using information about the biological causal…

  10. CORAL REEF BIOLOGICAL CRITERIA: USING THE CLEAN WATER ACT TO PROTECT A NATIONAL TREASURE

    Science.gov (United States)

    Coral reefs are declining at unprecedented rates worldwide due to multiple interactive stressors including climate change and land-based sources of pollution. The Clean Water Act (CWA) can be a powerful legal instrument for protecting water resources, including the biological inh...

  11. CORAL REEF BIOLOGICAL CRITERIA: USING THE CLEAN WATER ACT TO PROTECT A NATIONAL TREASURE

    Science.gov (United States)

    Coral reefs are declining at unprecedented rates worldwide due to multiple interactive stressors including climate change and land-based sources of pollution. The Clean Water Act (CWA) can be a powerful legal instrument for protecting water resources, including the biological inh...

  12. Integration of biological control and transgenic insect protection for mitigation of mycotoxins in corn

    Science.gov (United States)

    Biological control is known to be effective in reducing aflatoxin contamination of corn and some transgenic corn hybrids incur greatly reduced damage from corn earworm (Helicoverpa zea). We conducted seven field trials over two years to test the hypothesis that transgenic insect protection and biol...

  13. The Anatomy of Counterinsurgency Warfare

    DEFF Research Database (Denmark)

    Ringsmose, Jens; Pedersen, Kenneth

    Since the beginning of the new millennium, the West has been increasingly involved in a tiresome and rather particular type of conflict: insurgency warfare. The bloody and shocking terrorist attacks on New York and Washington in September 2001 marked the beginning of a new era, and the introducti...

  14. Evolutionary Models of Irregular Warfare

    Science.gov (United States)

    2013-03-01

    G. (2010) Decentralize, adapt and cooperate. Nature 465:292-293. Sagarin, R. (2012) Learning From the Octopus : How Secrets from Nature Can Help Us...because the concepts map on to important features of modern irregular warfare. For example, small-scale behaviors are increasingly thought to

  15. Biological preservation of foods with reference to protective cultures, bacteriocins and food-grade enzymes.

    Science.gov (United States)

    Holzapfel, W H; Geisen, R; Schillinger, U

    1995-01-01

    A review is presented on the present status of biological preservation of foods. Recent developments are discussed with respect to underlying mechanisms of inhibition by 'protective' cultures, and special reference is made to lactic acid bacteria (LAB) and their 'food-grade' safety. The role of bacteriocins, their limitations and potentiating role in biological systems, is also addressed. The use of enzymes (e.g. lysozyme) for food preservation is mainly restricted by economic factors, their inactivation by endogenous food components and their limited activity spectrum. Practical applications of protective cultures refer to particular food commodities that either constitute novel systems with respect to packaging and/or composition, or represent special hygienic risks. It is concluded that biological preservation cannot substitute GMP; it, however, offers an additional (and acceptable) processing parameter for improving the safety and assuring the quality of a given food.

  16. Information Management and the Biological Warfare Threat

    Science.gov (United States)

    2002-03-01

    information-sharing paradigm is best illustrated in the fierce competition for gene patenting in the biotechnology industry . In 1992 Agracetus (an American...to consider the ramifications of business decisions in the biotechnology industry . The bottom-line for any corporation in a capitalist environment...patenting. The business requirement for the patenting of genes is vital from the perspective of the biotechnology industry . Companies argue that

  17. Biological Warfare and American Strategic Risk

    Science.gov (United States)

    2000-06-01

    anthracis V9. Lymphocytic choriomeningitis virus B2. Brucella abortus V10. Machupo virus B3. Brucella melitensis V11. Marburg virus B4. Brucella suis...Cochliobolus miyabeanus (Helminthosporium oryzae) AV5. Goat pox virus PF3. Microcyclus ulei (syn. Dothidella ulei) AV6. Herpes virus (Aujeszky’s disease) PF4

  18. Laboratory Aspects of Biological Warfare Agents

    Science.gov (United States)

    2016-01-01

    in cell-free media. The medium, acidified citrate cysteine medium [ACCM; citric acid /sodium citrate, L-cysteine, neopeptone, casamino acids ...Capable of normal completion of life cycle . Viral coat protein - A protein present in the layer surrounding the nucleic acid core of a virus...19 Nucleic Acid

  19. Methodological issues in analyzing time trends in biologic fertility: protection bias

    DEFF Research Database (Denmark)

    Key, Jane; Best, Nicky; Joffe, Michael

    2009-01-01

    One method of assessing biologic fertility is to measure time to pregnancy (TTP). Accidental pregnancies do not generate a valid TTP value and lead to nonrandom missing data if couples experiencing accidental pregnancies are more fertile than the general population. If factors affecting the rate...... of accidental pregnancies, such as availability of effective contraception and induced abortion, vary over time, then the result may be protection bias in the estimates of fertility time trends. Six European data sets were analyzed to investigate whether evidence of protection bias exists in TTP studies...

  20. MEANS AND METHODS OF CYBER WARFARE

    Directory of Open Access Journals (Sweden)

    Dan-Iulian VOITAȘEC

    2016-06-01

    Full Text Available According to the Declaration of Saint Petersburg of 1868 “the only legitimate object which States should endeavor to accomplish during war is to weaken the military forces of the enemy”. Thus, International Humanitarian Law prohibits or limits the use of certain means and methods of warfare. The rapid development of technology has led to the emergence of a new dimension of warfare. The cyber aspect of armed conflict has led to the development of new means and methods of warfare. The purpose of this paper is to study how the norms of international humanitarian law apply to the means and methods of cyber warfare.

  1. Cyber warfare building the scientific foundation

    CERN Document Server

    Jajodia, Sushil; Subrahmanian, VS; Swarup, Vipin; Wang, Cliff

    2015-01-01

    This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially gove

  2. Military medicine and the ethics of war: British colonial warfare during the Seven Years War (1756-63).

    Science.gov (United States)

    Charters, Erica

    2010-01-01

    This article examines 18th-century European warfare, tracing the first formal codifications of conventions of war, frequently introduced by military physicians and initially regarding the treatment of the sick and wounded. It outlines to what extent these conventions were followed in practice, particularly in the challenging environment of American irregular warfare, with a focus on the most well-known incident of "biological warfare" in the period: the deliberate spread of smallpox by British officers among Amerindians in 1763. More broadly, it demonstrates that the history of military medicine provides a fruitful method with which to uncover assumptions about the ethics of war.

  3. Roots of Russian Irregular Warfare

    Science.gov (United States)

    2016-12-01

    concluded that the United States has a national policy gap in our own ability to wage “unconventional warfare in the gray zone.”3 That statement...advancing army—few have studied the irregular nature of the campaign waged against Napoleon. Napoleon’s overstretched logistics and the elusiveness of...94 Karl E. Meyer and Shareen Blair Brysac, Tournament of Shadows: The Great Game and the Race for Empire in Central Asia (Washington, DC: Basic

  4. Rethinking Cultural Influences on Warfare

    Science.gov (United States)

    2012-05-17

    militaries turn toward understanding culture as an important corrective action to naive ethnocentrism , but warns about the dangers of... Ethnocentrism (Holmes and Meier, 1979); Robert E. Harkavy and Stephanie G. Neuman, Warfare in the Third World (Palgrave, 2001); more recently, Mary...influence of ethnocentrism and the mirror imaging of our cultural values on to another culture with its own history. Scholars according to John Ferris

  5. Air Power in Irregular Warfare

    Science.gov (United States)

    2012-12-01

    Intelligence, Surveillance, and Reconnaisance IW Irregular Warfare JFC Joint Force Commander JP Joint Publication xii MCP Malayan Communist Party...being or acting in accord with laws , rules, or established custom.”5 Combined with the Clausewitzian definition of war as “an act of violence meant...Quarterly and Defence Journal , October, 1920), accessed March 21, 2012, http://usacac.army.mil/cac2/cgsc/carl/download/csipubs/lawrence.pdf, 17. 22 Bruce

  6. Electronic warfare target location methods

    CERN Document Server

    Poisel, Richard

    2012-01-01

    Describing the mathematical development underlying current and classical methods of geolocating electronic systems that are emitting, this newly revised and greatly expanded edition of a classic Artech House book offers practical guidance in electronic warfare target location. The Second Edition features a wealth of additional material including new chapters on time delay estimation, direction finding techniques, and the MUSIC algorithm. This practical resource provides you with critical design information on geolocation algorithms, and establishes the fundamentals of existing algorithms as a

  7. Russia’s Approach to Cyber Warfare

    Science.gov (United States)

    2016-09-01

    psychological operations, and information operations. • In keeping with traditional Soviet notions of battling constant threats from abroad and within...theorists, is a holistic concept that includes computer network operations, electronic warfare, psychological operations, and information operations.3...that “in the ongoing revolution in information technologies, information and psychological warfare will largely lay the groundwork for victory.”10

  8. Expanding Kenya's protected areas under the Convention on Biological Diversity to maximize coverage of plant diversity.

    Science.gov (United States)

    Scherer, Laura; Curran, Michael; Alvarez, Miguel

    2017-04-01

    Biodiversity is highly valuable and critically threatened by anthropogenic degradation of the natural environment. In response, governments have pledged enhanced protected-area coverage, which requires scarce biological data to identify conservation priorities. To assist this effort, we mapped conservation priorities in Kenya based on maximizing alpha (species richness) and beta diversity (species turnover) of plant communities while minimizing economic costs. We used plant-cover percentages from vegetation surveys of over 2000 plots to build separate models for each type of diversity. Opportunity and management costs were based on literature data and interviews with conservation organizations. Species richness was predicted to be highest in a belt from Lake Turkana through Mount Kenya and in a belt parallel to the coast, and species turnover was predicted to be highest in western Kenya and along the coast. Our results suggest the expanding reserve network should focus on the coast and northeastern provinces of Kenya, where new biological surveys would also fill biological data gaps. Meeting the Convention on Biological Diversity target of 17% terrestrial coverage by 2020 would increase representation of Kenya's plant communities by 75%. However, this would require about 50 times more funds than Kenya has received thus far from the Global Environment Facility. © 2016 Society for Conservation Biology.

  9. The Art of Aerial Warfare

    Science.gov (United States)

    2005-03-01

    the  Strait  of  Gibraltar   from  North  Africa  during  the Spanish Civil War. 11 FAIRCHILD PAPER A Comparison of Aerial Warfare to Land... Hitler , for example, the United States cannot assume that Nazi aggression would have  evaporated  instantly. Although  Hitler himself profoundly affected

  10. WARFARE IN THE INFORMATION AGE

    Directory of Open Access Journals (Sweden)

    Laurian GHERMAN

    2010-01-01

    Full Text Available The paper is focused on changes occurred in military organizations in Information Age. During Industrial Age the military structure of forces evolved according with principles of decomposition, specialization, hierarchy, optimization, deconfliction, centralized planning, and decentralized execution. But now the solutions based upon Industrial Age assumptions and practices will break down and fail in the Information Age. This will happen no matter how well intentioned, hardworking, or dedicated the leadership and the force are. Two key force capabilities needed by Information Age militaries are interoperability and agility. Both interoperability and agility are provided by Network centric warfare theory of war.

  11. Information warfare technologies in political discourse

    Directory of Open Access Journals (Sweden)

    Karpova Anna Yu.

    2016-01-01

    Full Text Available We attempt to examine the technology of «information warfare» in this paper. The dominant theme of the paper is that the outcome of the information warfare is important not only for the future of a state itself but for the future of the world balance of forces. The main task of geopolitical actors in information warfare is to introduce ideas corresponding to their interests into mass consciousness. All participants of political conflicts have common features in technologies of Information warfare. The information anomie is the indicator of the great geopolitical actors’ personified interests on the stage of «information warfare» - the process resulted in destroying the communicative line: report-information understanding and disrupting the social order in society. In this paper authors describe the following Information Warfare technologies: "Political volcano" technology; "SPIN" technology; "Widening media resource" technology; "specific gravity" technology; "Cold War 2.0" technology and Information cleaningup technology. It is assumed that in the future there will be new instructions on applying technologies of information warfare. To impart perspective to the paper we consider examples, opinions and trends.

  12. Joint Project Manager (JPM) Chemical Biological Individual and Collective Protection Industry Day

    Science.gov (United States)

    2008-07-22

    solicitation is released. Potential Topics of Interest for JPM IP: - adsorption and/or neutralization of vapor chemical hazards – Chemical Warfare...Smaller size volume/lower profile • Technical Objectives – Increase retention of high volatility substances by increasing MOFs ZIFs COFs...t ] ( m g / m 3 ) 0 500 1,000 1,500 0 20 40 60 80 100 120 140 MOF -5 Dry IRMOF-62 Dry MOF -199 Dry [ C K E 0 500 1,000 1,500 0 20 40 60 80 100

  13. Grid architecture model of network centric warfare

    Institute of Scientific and Technical Information of China (English)

    Yan Tihua; Wang Baoshu

    2006-01-01

    NCW(network centric warfare) is an information warfare concentrating on network. A global network-centric warfare architecture with OGSA grid technology is put forward, which is a four levels system including the user level, the application level, the grid middleware layer and the resource level. In grid middleware layer, based on virtual hosting environment, a BEPL4WS grid service composition method is introduced. In addition, the NCW grid service model is built with the help of Eclipse-SDK-3.0.1 and Bpws4j.

  14. ICRP Publication 131: Stem cell biology with respect to carcinogenesis aspects of radiological protection.

    Science.gov (United States)

    Hendry, J H; Niwa, O; Barcellos-Hoff, M H; Globus, R K; Harrison, J D; Martin, M T; Seed, T M; Shay, J W; Story, M D; Suzuki, K; Yamashita, S

    2016-06-01

    Current knowledge of stem cell characteristics, maintenance and renewal, evolution with age, location in 'niches', and radiosensitivity to acute and protracted exposures is reviewed regarding haematopoietic tissue, mammary gland, thyroid, digestive tract, lung, skin, and bone. The identity of the target cells for carcinogenesis continues to point to the more primitive and mostly quiescent stem cell population (able to accumulate the protracted sequence of mutations necessary to result in malignancy), and, in a few tissues, to daughter progenitor cells. Several biological processes could contribute to the protection of stem cells from mutation accumulation: (1) accurate DNA repair; (2) rapid induced death of injured stem cells; (3) retention of the intact parental strand during divisions in some tissues so that mutations are passed to the daughter differentiating cells; and (4) stem cell competition, whereby undamaged stem cells outcompete damaged stem cells for residence in the vital niche. DNA repair mainly operates within a few days of irradiation, while stem cell replications and competition require weeks or many months depending on the tissue type. This foundation is used to provide a biological insight to protection issues including the linear-non-threshold and relative risk models, differences in cancer risk between tissues, dose-rate effects, and changes in the risk of radiation carcinogenesis by age at exposure and attained age.

  15. Optimizing the protection against the physiological burden of CBRN clothing.

    Science.gov (United States)

    Brasser, Paul

    2010-01-01

    Soldiers can wear chemical, biological, radiological and nuclear (CBRN) protective clothing to be protected against warfare agents. The disadvantage of that clothing is that higher protection introduces higher physiological burden. Therefore an optimum between comfort and protection must be found. Models of all relevant processes were created to find this optimum. The airflow profile around a cylinder with clothing-representing a dressed human body part-was modelled. This flow profile was used for calculating the agent vapour breakthrough through the clothing and for calculating the deposition of agents onto the skin (as indicators for protection). The flow profile was also used for calculating the temperature profile around the body part and the relative humidity underneath and in the clothing (as representative for physiological burden). As a result a tool was created, which can be used to identify the optimum properties of CBRN protective clothing, depending on the intended mission of the soldiers.

  16. In Situ Biological Contamination Studies of the Moon: Implications for Planetary Protection and Life Detection Missions

    Science.gov (United States)

    Glavin, Daniel P.; Dworkin, Jason P.; Lupisella, Mark; Williams, David R.; Kminek, Gerhard; Rummel, John D.

    2010-01-01

    NASA and ESA have outlined visions for solar system exploration that will include a series of lunar robotic precursor missions to prepare for, and support a human return to the Moan, and future human exploration of Mars and other destinations, including possibly asteroids. One of the guiding principles for exploration is to pursue compelling scientific questions about the origin and evolution of life. The search for life on objects such as Mars will require careful operations, and that all systems be sufficiently cleaned and sterilized prior to launch to ensure that the scientific integrity of extraterrestrial samples is not jeopardized by terrestrial organic contamination. Under the Committee on Space Research's (COSPAR's) current planetary protection policy for the Moon, no sterilization procedures are required for outbound lunar spacecraft, nor is there a different planetary protection category for human missions, although preliminary C SPAR policy guidelines for human missions to Mars have been developed. Future in situ investigations of a variety of locations on the Moon by highly sensitive instruments designed to search for biologically derived organic compounds would help assess the contamination of the Moon by lunar spacecraft. These studies could also provide valuable "ground truth" data for Mars sample return missions and help define planetary protection requirements for future Mars bound spacecraft carrying life detection experiments. In addition, studies of the impact of terrestrial contamination of the lunar surface by the Apollo astronauts could provide valuable data to help refine future: Mars surface exploration plans for a human mission to Mars.

  17. A Taxonomy of Network Centric Warfare Architectures

    Science.gov (United States)

    2008-01-01

    Distributed Database Theory, an area of Computer Science that has studied information flow in networks extensively ( Ceri & Pelagatti 1984, Mullender 1993...Australian Department of Defence, 2003, Australian Defence Force Network Centric Warfare Roadmap (First Draft), September. Ceri , S. & Pelagatti

  18. Topic modelling in the information warfare domain

    CSIR Research Space (South Africa)

    De Waal, A

    2013-11-01

    Full Text Available In this paper the authors provide context to Topic Modelling as an Information Warfare technique. Topic modelling is a technique that discovers latent topics in unstructured and unlabelled collection of documents. The topic structure can be searched...

  19. ICRP Publication 131: Stem Cell Biology with Respect to Carcinogenesis Aspects of Radiological Protection.

    Science.gov (United States)

    Niwa, O; Barcellos-Hoff, M H; Globus, R K; Harrison, J D; Hendry, J H; Jacob, P; Martin, M T; Seed, T M; Shay, J W; Story, M D; Suzuki, K; Yamashita, S

    2015-12-01

    This report provides a review of stem cells/progenitor cells and their responses to ionising radiation in relation to issues relevant to stochastic effects of radiation that form a major part of the International Commission on Radiological Protection's system of radiological protection. Current information on stem cell characteristics, maintenance and renewal, evolution with age, location in stem cell 'niches', and radiosensitivity to acute and protracted exposures is presented in a series of substantial reviews as annexes concerning haematopoietic tissue, mammary gland, thyroid, digestive tract, lung, skin, and bone. This foundation of knowledge of stem cells is used in the main text of the report to provide a biological insight into issues such as the linear-no-threshold (LNT) model, cancer risk among tissues, dose-rate effects, and changes in the risk of radiation carcinogenesis by age at exposure and attained age. Knowledge of the biology and associated radiation biology of stem cells and progenitor cells is more developed in tissues that renew fairly rapidly, such as haematopoietic tissue, intestinal mucosa, and epidermis, although all the tissues considered here possess stem cell populations. Important features of stem cell maintenance, renewal, and response are the microenvironmental signals operating in the niche residence, for which a well-defined spatial location has been identified in some tissues. The identity of the target cell for carcinogenesis continues to point to the more primitive stem cell population that is mostly quiescent, and hence able to accumulate the protracted sequence of mutations necessary to result in malignancy. In addition, there is some potential for daughter progenitor cells to be target cells in particular cases, such as in haematopoietic tissue and in skin. Several biological processes could contribute to protecting stem cells from mutation accumulation: (a) accurate DNA repair; (b) rapidly induced death of injured stem cells

  20. A Dialectic for Network Centric Warfare

    Science.gov (United States)

    2005-06-01

    Giffin, 2003; Borgu , 2003; Kaufman, 2004). For example, from a standpoint of Popperian methodological falsificationism (Popper, 1934), Reid and...focused term network-centric warfare has common favor ( Borgu , 2003) despite the organisational decree to use the term ‘network centric warfare...Commonwealth Department of Defence, June. Borgu , A., (2003), “The Challenges and Limitations of Network Centric Warfare”, Presented at NCW: Improving ADF

  1. Finding Lawrence recruiting talent for unconventional warfare

    OpenAIRE

    Mourouzis, Michael G.

    2011-01-01

    Approved for public release; distribution is unlimited. From Francis Marion's guerrilla war against the British to advising the resistance against the Nazis and Japanese, the United States has depended on unconventional warfare (UW) as a component of national defense. Today, the U.S. Army Special Forces (SF) is the premiere unconventional warfare unit in the U.S. military. With a smaller Army and increasing missions, SF must expand its recruiting efforts. This thesis analyzes the recruitme...

  2. Cyber Warfare: New Character with Strategic Results

    Science.gov (United States)

    2013-03-01

    defense ( CND ).”7 Thus cyber warfare is distinguished from cyber criminal acts based upon its coercive nature to attain a strategic end, whereas...CNA and CND . Conceptually, CNA effects “range from disrupting the adversary’s electronic systems and what operations they enable (communications...or self-destruct.”10 The second component of cyber warfare seeks to eliminate or minimize the risk of the first. The role of CND is to defend

  3. UML modelling of network warfare examples

    CSIR Research Space (South Africa)

    Veerasamy, N

    2011-08-01

    Full Text Available , Analysis, Development and Maintenance [6] [12] [13]. Furthermore, Baker and Harris also discuss techniques like Intrusion Prevention, Personnel Security and Security Awareness as part of information security [14] [12]. Moreover, when considering... techniques that are core to information security and to Network Warfare were thus identified. The following summary of the techniques found in Network Warfare is given: Risk Analysis, Intrusion Prevention, Physical Security, Personnel Security, Cyber...

  4. Hybrid Warfare: Implications for CAF Force Development

    Science.gov (United States)

    2014-08-01

    also McCulloh and Johnson who demonstrate throughout their study that context is critical . Indeed, their summary statement for “hybrid warfare theory ...Muhr, eds., Hybrid and Cyber War as Consequences of the Asymmetry, Frankfurt : Peter Lang, 2011, p.95. Interestingly, the CFD Hybrid Warfare Concept...the highest political and military levels. The study of hybrid-type case studies yields the critical lesson that: “leadership is essential to victory

  5. Intrafamily and intragenomic conflicts in human warfare

    Science.gov (United States)

    2017-01-01

    Recent years have seen an explosion of multidisciplinary interest in ancient human warfare. Theory has emphasized a key role for kin-selected cooperation, modulated by sex-specific demography, in explaining intergroup violence. However, conflicts of interest remain a relatively underexplored factor in the evolutionary-ecological study of warfare, with little consideration given to which parties influence the decision to go to war and how their motivations may differ. We develop a mathematical model to investigate the interplay between sex-specific demography and human warfare, showing that: the ecology of warfare drives the evolution of sex-biased dispersal; sex-biased dispersal modulates intrafamily and intragenomic conflicts in relation to warfare; intragenomic conflict drives parent-of-origin-specific patterns of gene expression—i.e. ‘genomic imprinting’—in relation to warfare phenotypes; and an ecological perspective of conflicts at the levels of the gene, individual, and social group yields novel predictions as to pathologies associated with mutations and epimutations at loci underpinning human violence. PMID:28228515

  6. Human telomere biology: A contributory and interactive factor in aging, disease risks, and protection.

    Science.gov (United States)

    Blackburn, Elizabeth H; Epel, Elissa S; Lin, Jue

    2015-12-04

    Telomeres are the protective end-complexes at the termini of eukaryotic chromosomes. Telomere attrition can lead to potentially maladaptive cellular changes, block cell division, and interfere with tissue replenishment. Recent advances in the understanding of human disease processes have clarified the roles of telomere biology, especially in diseases of human aging and in some aging-related processes. Greater overall telomere attrition predicts mortality and aging-related diseases in inherited telomere syndrome patients, and also in general human cohorts. However, genetically caused variations in telomere maintenance either raise or lower risks and progression of cancers, in a highly cancer type-specific fashion. Telomere maintenance is determined by genetic factors and is also cumulatively shaped by nongenetic influences throughout human life; both can interact. These and other recent findings highlight both causal and potentiating roles for telomere attrition in human diseases.

  7. Late effects from whole body irradiation and protection by chemical and biological agents. A review

    Energy Technology Data Exchange (ETDEWEB)

    Maisin, J.R. [Catholic Univ. of Louvain, Brussels (Belgium); Gerber, G.B.

    2000-07-01

    This review described studies attempting to reduce damage of exposure to ionizing radiation with an application of chemical or biological agents by illustrating authors' data to point out which possibilities such protectors might hold in future. Authors described their studies on mice exposed to a single or fractionated dose of X-rays at the Belgian Atomic Center at Mol. Mice were irradiated with 250 kV of X-rays at a dose rate of 1 Gy/min or underwent the fractionated irradiation of 1-week intervals with total dose of 2-25 Gy. Before irradiation, some animals were given glutathione, mercaptoethylamine, cystein, serotonine-creatine, 2{beta}-aminoethylisothiuronium, and other agents, alone or as a mixture. Results indicated that radioprotectors reduced many specific late diseases to different degrees together with protection against tumor induction which other investigators had shown. Future prospects were considered for ideal radioprotectors and searches for new radioprotectors and for combination of biological agents (e.g., cytokines with polysaccharides or prostaglandins) were described. (K.H.)

  8. Chemical composition and biological evaluation of Physalis peruviana root as hepato-renal protective agent.

    Science.gov (United States)

    El-Gengaihi, Souad E; Hassan, Emad E; Hamed, Manal A; Zahran, Hanan G; Mohammed, Mona A

    2013-03-01

    This study was designed to investigate the potential of Physalis peruviana root as a functional food with hepato-renal protective effects against fibrosis. The chemical composition of the plant root suggested the presence of alkaloids, withanolides and flavonoids. Five compounds were isolated and their structures elucidated by different spectral analysis techniques. One compound was isolated from the roots: cuscohygrine. The biological evaluation was conducted on different animal groups; control rats, control treated with ethanolic root extract, CCl(4) group, CCl(4) treated with root extract, and CCl(4) treated with silymarin as a standard herbal drug. The evaluation used the oxidative stress markers malondialdehyde (MDA), superoxide dismutase (SOD), and nitric oxide (NO). The liver function indices; aspartate and alanine aminotransferases (AST & ALT), alkaline phosphatase (ALP), gamma glutamyl transferase (GGT), bilirubin, and total hepatic protein were also estimated. Kidney disorder biomarkers; creatinine, urea, and serum protein were also evaluated. The results suggested safe administration, and improvement of all the investigated parameters. The liver and kidney histopathological analysis confirmed the results. In conclusion, P. peruviana succeeded in protecting the liver and kidney against fibrosis. Further studies are needed to discern their pharmacological applications and clinical uses.

  9. Use of inverse spatial conservation prioritization to avoid biological diversity loss outside protected areas.

    Science.gov (United States)

    Kareksela, Santtu; Moilanen, Atte; Tuominen, Seppo; Kotiaho, Janne S

    2013-12-01

    Globally expanding human land use sets constantly increasing pressure for maintenance of biological diversity and functioning ecosystems. To fight the decline of biological diversity, conservation science has broken ground with methods such as the operational model of systematic conservation planning (SCP), which focuses on design and on-the-ground implementation of conservation areas. The most commonly used method in SCP is reserve selection that focuses on the spatial design of reserve networks and their expansion. We expanded these methods by introducing another form of spatial allocation of conservation effort relevant for land-use zoning at the landscape scale that avoids negative ecological effects of human land use outside protected areas. We call our method inverse spatial conservation prioritization. It can be used to identify areas suitable for economic development while simultaneously limiting total ecological and environmental effects of that development at the landscape level by identifying areas with highest economic but lowest ecological value. Our method is not based on a priori targets, and as such it is applicable to cases where the effects of land use on, for example, individual species or ecosystem types are relatively small and would not lead to violation of regional or national conservation targets. We applied our method to land-use allocation to peat mining. Our method identified a combination of profitable production areas that provides the needed area for peat production while retaining most of the landscape-level ecological value of the ecosystem. The results of this inverse spatial conservation prioritization are being used in land-use zoning in the province of Central Finland. © 2013 Society for Conservation Biology.

  10. Blaptica dubia as sentinels for exposure to chemical warfare agents - a pilot study.

    Science.gov (United States)

    Worek, Franz; Seeger, Thomas; Neumaier, Katharina; Wille, Timo; Thiermann, Horst

    2016-11-16

    The increased interest of terrorist groups in toxic chemicals and chemical warfare agents presents a continuing threat to our societies. Early warning and detection is a key component for effective countermeasures against such deadly agents. Presently available and near term solutions have a number of major drawbacks, e.g. lack of automated, remote warning and detection of primarily low volatile chemical warfare agents. An alternative approach is the use of animals as sentinels for exposure to toxic chemicals. To overcome disadvantages of vertebrates the present pilot study was initiated to investigate the suitability of South American cockroaches (Blaptica dubia) as warning system for exposure to chemical warfare nerve and blister agents. Initial in vitro experiments with nerve agents showed an increasing inhibitory potency in the order tabun - cyclosarin - sarin - soman - VX of cockroach cholinesterase. Exposure of cockroaches to chemical warfare agents resulted in clearly visible and reproducible reactions, the onset being dependent on the agent and dose. With nerve agents the onset was related to the volatility of the agents. The blister agent lewisite induced signs largely comparable to those of nerve agents while sulfur mustard exposed animals exhibited a different sequence of events. In conclusion, this first pilot study indicates that Blaptica dubia could serve as a warning system to exposure of chemical warfare agents. A cockroach-based system will not detect or identify a particular chemical warfare agent but could trigger further actions, e.g. specific detection and increased protective status. By designing appropriate boxes with (IR) motion sensors and remote control (IR) camera automated off-site warning systems could be realized.

  11. Towards a framework for a network warfare capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available aspects to its network enabled capabilities and functionality (network warfare). Various computer and information security practices form part of network warfare techniques. Whilst various information and security practices are well-known and applied...

  12. Hybrid Warfare: A Military Revolution or Revolution in Military Affairs?

    Science.gov (United States)

    2012-12-14

    warfare intersect and blend to create a new form of warfare. This thesis uses the Williamson Murray and McGregor Knox definitions of Military...irregular warfare intersect and blend to create a new form of warfare. This thesis uses the Williamson Murray and McGregor Knox definitions of...understand new concepts. Douglas C Lovelace. Director Strategic Studies Institute has this insight to offer regarding the importance of

  13. Motivation and requirements for determining a Network Warfare Capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2010-06-01

    Full Text Available to prevent misconceptions, as well as to ensure that the necessary input data is incorporated. They include the following: • The involved parties must grasp the difference between auditing and determining a Network Warfare Capability. It is encouraged... to incorporate the use of auditing in the technique set underlying Network Warfare. • To determine a Network Warfare Capability, assessments of the various techniques that contribute to Network Warfare are necessary. This will incorporate expert opinion...

  14. Protective Performance Research on One-piece Positive Pressure Biological Protective Suit%全身正压生物防护服防护性能研究

    Institute of Scientific and Technical Information of China (English)

    吴金辉; 衣颖; 杨荆泉; 田涛; 郝丽梅; 王政

    2011-01-01

    为研究动力送风全身式正压生物防护服对人员的防护性能,采用标准方法检测正压生物防护服气密性和液体喷溅防护性能,连续监测穿着正压生物防护服活动时的内部正压值变化.采用微环境气溶胶密闭舱室平台,研究正压生物防护服对黏质沙雷氏菌(ATCC 8039)和phi-x 174噬菌体气溶胶的整体防护性能.结果表明,正压生物防护服气密性和液体喷溅防护性能均达到气密型防护服和喷射液密防护服水平.对2种生物气溶胶的防护效率均在99.97%以上,且与送风量与环境湿度无关.正压生物防护服被人员穿着进行作业时,其内部能始终能保持大于16 Pa的正压.对该防护服防护性能的系统分析能全面评估类似防护服的整体防护性能,也为未来各类正压式防护服研发和防护性能研究提供技术参考.%To study protection performance of powered air fed one-piece positive pressure biological protective suit, the gas tight and liquid jet protective performance were challenged by related standard methods. The continuous variety of positive pressure in the suit was monitored by a precision pressure sensor, when a tester was dressing it and making some kinds of actions. The protective performance to Serratia marcescens (ATCC #8039) and phi-x174 bacteriophage bioaerosol of the suit was challenged by a micro-environment bioaerosol testing obturator. The gas tight and liquid jet protective performance of the positive pressure biological protective suit reached the levels of gas-tight and liquid jet tight protective suit. Protective efficiencies of two kinds of bioaerosol are higher than 99. 97% , independent of the air fed rate and relative humidity of the environment. It can hold an inner positive pressure higher than 16 Pa when the positive pressure biological protective suit was dressed as a working condition. In conclusion, the protective performance of powered air fed one-piece positive pressure

  15. AB Blanket for Cities (for continual pleasant weather and protection from chemical, biological and radioactive weapons)

    CERN Document Server

    Bolonkin, Alexander

    2009-01-01

    In a series of previous articles (see references) the author offered to cover a city or other important large installations or subregions by a transparent thin film supported by a small additional air overpressure under the form of an AB Dome. The building of a gigantic inflatable AB Dome over an empty flat surface is not difficult. However, if we want to cover a city, garden, forest or other obstacle course we cannot easily deploy the thin film over building or trees. In this article is suggested a new method which solves this problem. The idea is to design a double film blanket filled by light gas (for example, methane, hydrogen, or helium). Sections of this AB Blanket are lighter then air and fly in atmosphere. They can be made on a flat area (serving as an assembly area) and delivered by dirigible or helicopter to station at altitude over the city. Here they connect to the already assembled AB Blanket subassemblies, cover the city in an AB Dome and protect it from bad weather, chemical, biological and rad...

  16. Biological Control beneath the Feet: A Review of Crop Protection against Insect Root Herbivores

    Directory of Open Access Journals (Sweden)

    Alan Kergunteuil

    2016-11-01

    Full Text Available Sustainable agriculture is certainly one of the most important challenges at present, considering both human population demography and evidence showing that crop productivity based on chemical control is plateauing. While the environmental and health threats of conventional agriculture are increasing, ecological research is offering promising solutions for crop protection against herbivore pests. While most research has focused on aboveground systems, several major crop pests are uniquely feeding on roots. We here aim at documenting the current and potential use of several biological control agents, including micro-organisms (viruses, bacteria, fungi, and nematodes and invertebrates included among the macrofauna of soils (arthropods and annelids that are used against root herbivores. In addition, we discuss the synergistic action of different bio-control agents when co-inoculated in soil and how the induction and priming of plant chemical defense could be synergized with the use of the bio-control agents described above to optimize root pest control. Finally, we highlight the gaps in the research for optimizing a more sustainable management of root pests.

  17. Biological Control beneath the Feet: A Review of Crop Protection against Insect Root Herbivores

    Science.gov (United States)

    Kergunteuil, Alan; Bakhtiari, Moe; Formenti, Ludovico; Xiao, Zhenggao; Defossez, Emmanuel; Rasmann, Sergio

    2016-01-01

    Sustainable agriculture is certainly one of the most important challenges at present, considering both human population demography and evidence showing that crop productivity based on chemical control is plateauing. While the environmental and health threats of conventional agriculture are increasing, ecological research is offering promising solutions for crop protection against herbivore pests. While most research has focused on aboveground systems, several major crop pests are uniquely feeding on roots. We here aim at documenting the current and potential use of several biological control agents, including micro-organisms (viruses, bacteria, fungi, and nematodes) and invertebrates included among the macrofauna of soils (arthropods and annelids) that are used against root herbivores. In addition, we discuss the synergistic action of different bio-control agents when co-inoculated in soil and how the induction and priming of plant chemical defense could be synergized with the use of the bio-control agents described above to optimize root pest control. Finally, we highlight the gaps in the research for optimizing a more sustainable management of root pests. PMID:27916820

  18. The development of immunoassays for detection of chemical warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Lenz, D.E. [Army Medical Research Inst. of Chemical Defense, Aberdeen Proving Ground, MD (United States)

    1995-06-01

    With the advent of enzyme linked immunoabsorbant assays (ELISA) and monoclonal antibodies in the last two decades, there has been considerable effort devoted to the development of antibodies to detect and quantify low molecular weight toxic substances in environmental or biological fluids. Polyclonal antibodies against paraoxon (the toxic metabolite of parathion) were reported as capable of detecting paraoxon in body fluids at a level of 10{sup -9} M ({approximately}260 pg/mL) when used in a competitive inhibition enzyme immunoassay (CIEIA). Monoclonal antibodies developed against a structural analogue of the chemical warfare agent soman were capable of detecting soman in buffer solutions at a level of 10{sup -6} M ({approximately}180 ng/mL). In addition, these antibodies were highly specific for soman even in the presence of its major hydrolysis product. Subsequent studies with antisoman monoclonal antibodies reported an extension of the level of sensitivity to -80 ng/mL. Furthermore these antibodies did not cross react with other chemical warfare nerve agents such as sarin or tabun. In all cases, the time for a confirmatory test was two hours or less. Immunoassays for T-2 micotoxins have also been reported with a minimal detection range of 2 pg/assay to 50 ng/assay for the polyclonal and monoclonal T-2 antibodies respectively. These antibodies offer a sensitive, rapid and low cost approach to the diagnosis or detection of the presence of toxic chemical substances.

  19. Protecting biological diversity : major issues facing the realisation of hydroelectric projects; La protection de la diversite biologique : un enjeux majeur dans la realisation de projets hydroelectriques

    Energy Technology Data Exchange (ETDEWEB)

    Hebert, J.; Juneau, P. [Hydro-Quebec, Montreal, PQ (Canada)

    2008-09-15

    This article emphasized the importance of developing renewable energy sources to minimize the potential impacts of climate change. The role that the Quebec government has taken together with Hydro-Quebec to protect species diversity was discussed in this article. The United Nations Framework Convention on Climate Change (UNFCC) in Rio de Janeiro in 1992 emphasized that poverty and low economic development are the main challenges facing developing countries, while industrialized countries are faced with the challenge of protecting species diversity and promoting sustainable development. The UNFCC cautioned that the continued exploitation and reliance on fossil fuels as an energy source poses the risk that endangered species and their habitats will disappear. This article stated that the legislative and regulatory code that was adopted following the UNFCC for protecting biological diversity has been among the environmental priorities of Hydro-Quebec. The public utility has conducted environmental evaluations in all of its jurisdictions, including James Bay, and has taken the initiative to monitor the ecological progress of flora and fauna. This article emphasized that the results of the UNFCC have been impressive in terms of sustainable development as several developers have taken the challenge to address the issues of biological diversity, deforestation and protecting the ozone layer. 13 refs., 2 figs.

  20. THE PECULIARITIES OF SOCIAL PERCEPTION IN THE CONTEXT OF INFORMATION-PSYCHOLOGICAL WARFARE

    Directory of Open Access Journals (Sweden)

    Nane Zeynalyan

    2016-09-01

    Full Text Available In the recent decades, war fields have moved into the information sphere. Today’s person has reason to “be informed”; as having information provides a sense of security. In the modern world, great effort is invested in expanding information sources, because it serves to articulate both international policies and the context of wars. The exchange of information in domestic and international platforms influences the quality of public debate and ideology, which affects social attitudes and decision-making processes. This article presents the role of information-psychological warfare as a factor in forming public opinion. It discusses the peculiarities of organizing an information-psychological warfare during military conflicts. The goal of our research is to explore how social groups might perceive peculiarities in the information-psychological warfare. The research involves methods of survey, content analysis, and free associations. The effectiveness of psychological warfare significantly depends on how people perceive information. Consequently, in the contemporary world, it is necessary to not only protect or fight on the battlefield, but also to use information weapons. This imposes requirements on psychological scientists to explore peculiarities around the perception of information to help find mechanisms that safeguard people’s lives by way of contributing to the formation of necessary attitudes and stereotypes.

  1. Biospheric Life Support - integrating biological regeneration into protection of humans in space.

    Science.gov (United States)

    Rocha, Mauricio; Iha, Koshun

    2016-07-01

    A biosphere stands for a set of biomes (regional biological communities) interacting in a materially closed (though energetically open) ecological system (CES). Earth's biosphere, the thin layer of life on the planet's surface, can be seen as a natural CES- where life "consumables" are regenerated/restored via biological, geological and chemical processes. In Life Sciences, artificial CESs- local ecosystems extracts with varying scales and degrees of closure, are considered convenient/representatives objects of study. For outer space, these concepts have been applied to the issue of life support- a significant consideration as long as distance from Earth increases. In the nineties, growing on the Russian expertise on biological life support, backed by a multidisciplinary science team, the famous Biosphere 2 appeared. That private project innovated, by assembling a set of Earth biomes samples- plus an organic ag one, inside a closed Mars base-like structure, next to 1.5 ha under glass, in Arizona, US. The crew of 8 inside completed their two years contract, though facing setbacks- the system failed, e.g., to produce enough food/air supplies. But their "failures"- if this word can be fairly applied to science endeavors, were as meaningful as their achievements for the future of life support systems (LSS) research. By this period, the Russians had accumulated experience in extended orbital stays, achieving biological outcomes inside their stations- e.g. complete wheat cycles. After reaching the Moon, the US administration decided to change national priorities, putting the space program as part of a "détente" policy, to relieve international tensions. Alongside the US space shuttle program, the Russians were invited to join the new International Space Station (ISS), bringing to that pragmatic project, also their physical/chemical LSS- top air/water regenerative technology at the time. Present US policy keeps the ISS operational, extending its service past its planned

  2. US Army Special Warfare. Its Origins: Psychological and Unconventional Warfare, 1941-1952

    Science.gov (United States)

    1982-01-01

    sug- F P _ _ 6 PSYCHOLOGICAL WARFARE IN WORLD WAR I! gestion of a single agency which would serve as a clearinghouse for all intelligence, as well as...organizations, communications, demoli- tions, organization and training of civilians for guerrilla warfare, para- chute jumping, and amphibious...General Bolte, Director, P&O, was reluctant to endorse this latter sug- gestion , indicating, "as he had indicated from time to time at other points

  3. 76 FR 10522 - Naval Surface Warfare Center, Upper Machodoc Creek and the Potomac River, Dahlgren, VA; Danger Zone

    Science.gov (United States)

    2011-02-25

    ... and the Potomac River, Dahlgren, VA; Danger Zone AGENCY: U.S. Army Corps of Engineers, DoD. ACTION... danger zone in the vicinity of Naval Surface Warfare Center, Dahlgren, in King George County, Virginia..., and expands the boundaries of a portion of the danger zone. The amendment is necessary to protect...

  4. Transport and Reactivity of Decontaminants to Provide Hazard Mitigation of Chemical Warfare Agents from Materials

    Science.gov (United States)

    2016-06-01

    of Additives and Impurities from Polymeric Materials; EPA 560/5-85-015; U.S. Environmental Protection Agency, Office of Pesticides and Toxic...performance, a penetrating decontaminant may cause damage to the material, such as the swelling of polymers caused by solvents or any active...Chemical Warfare Agent Degradation Products. Environ . Health Perspect. 1999, 107 (12), 933–974. 5. Kim, K.; Tsay, O.G.; Atwood, D.A.; Churchill, D.G

  5. Developing a Biological Condition Gradient for the Protection of Coral Reefs in Guanica Bay

    Science.gov (United States)

    We introduce the application of the Biological Condition Gradient (BCG), a conceptual model that describes how biological attributes of aquatic ecosystems (i.e., biological condition) might change along a gradient of increasing anthropogenic stress (e.g., physical, chemical and b...

  6. Developing a Biological Condition Gradient for the Protection of Coral Reefs in Guanica Bay

    Science.gov (United States)

    We introduce the application of the Biological Condition Gradient (BCG), a conceptual model that describes how biological attributes of aquatic ecosystems (i.e., biological condition) might change along a gradient of increasing anthropogenic stress (e.g., physical, chemical and b...

  7. Guiding Warfare to Reach Sustainable Peace

    DEFF Research Database (Denmark)

    Vestenskov, David; Drewes, Line

    The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition of develo...

  8. Agricultural Warfare and Bioterrorism using Invasive Species

    Science.gov (United States)

    The chapter on Agricultural Warfare and Bioterrorism using Invasive Species is part of the book titled Pest Management and Phytosanitary Trade Barriers authored by Neil Heather (Australia) and Guy Hallman. The chapter attempts to briefly put the topic into context with phytosanitation. It presents...

  9. Information Warfare Arms Control: Risks and Costs

    Science.gov (United States)

    2006-03-01

    legal system and the modern concept of arms control were able to provide for national and international collective security during the Cold War...information warfare presents many challenges that question their viability. The most significant challenges are to the international legal system , which

  10. A hypothesis on biological protection from space radiation through the use of new therapeutic gases as medical counter measures

    Directory of Open Access Journals (Sweden)

    Schoenfeld Michael P

    2012-04-01

    Full Text Available Abstract Radiation exposure to astronauts could be a significant obstacle for long duration manned space exploration because of current uncertainties regarding the extent of biological effects. Furthermore, concepts for protective shielding also pose a technically challenging issue due to the nature of cosmic radiation and current mass and power constraints with modern exploration technology. The concern regarding exposure to cosmic radiation is biological damage that is associated with increased oxidative stress. It is therefore important and would be enabling to mitigate and/or prevent oxidative stress prior to the development of clinical symptoms and disease. This paper hypothesizes a "systems biology" approach in which a combination of chemical and biological mitigation techniques are used conjunctively. It proposes using new, therapeutic, medical gases as chemical radioprotectors for radical scavenging and as biological signaling molecules for management of the body's response to exposure. From reviewing radiochemistry of water, biological effects of CO, H2, NO, and H2S gas, and mechanisms of radiation biology, it can be concluded that this approach may have therapeutic potential for radiation exposure. Furthermore, it also appears to have similar potential for curtailing the pathogenesis of other diseases in which oxidative stress has been implicated including cardiovascular disease, cancer, chronic inflammatory disease, hypertension, ischemia/reperfusion (IR injury, acute respiratory distress syndrome, Parkinson's and Alzheimer's disease, cataracts, and aging. We envision applying these therapies through inhalation of gas mixtures or ingestion of water with dissolved gases.

  11. Developing a Biological Condition Gradient for the Protection of Puerto Rico's Coral Reefs

    Science.gov (United States)

    We introduce the application of the Biological Condition Gradient (BCG) to coral reefs: a conceptual model that describes how biological attributes of coral reef ecosystems might change along a gradient of increasing anthropogenic stress. Under authority of the Clean Water Act, t...

  12. Developing a Biological Condition Gradient for the Protection of Puerto Rico's Coral Reefs

    Science.gov (United States)

    We introduce the application of the Biological Condition Gradient (BCG) to coral reefs: a conceptual model that describes how biological attributes of coral reef ecosystems might change along a gradient of increasing anthropogenic stress. Under authority of the Clean Water Act, t...

  13. Unconventional Warfare: A Mission Metamorphosis for the 21st Century?

    Science.gov (United States)

    2000-06-01

    brigadier general and publish several more noted works on Mao and revolutionary warfare. See Samuel B. Giffith, Mao Tse-Tung on Guerrilla Warfare (New...and propagators of the faith. The bibles (in English translation) are Mao Tse-tung on Guerrilla Warfare by Brigadier General Samuel B. Griffith...Barnett, B. Hugh Tovar , and Richard H. Schultz eds., Special Operations in US Strategy (Washington, D.C.: US Government Printing Office, 1984), 2. 58

  14. Computational models of intergroup competition and warfare.

    Energy Technology Data Exchange (ETDEWEB)

    Letendre, Kenneth (University of New Mexico); Abbott, Robert G.

    2011-11-01

    This document reports on the research of Kenneth Letendre, the recipient of a Sandia Graduate Research Fellowship at the University of New Mexico. Warfare is an extreme form of intergroup competition in which individuals make extreme sacrifices for the benefit of their nation or other group to which they belong. Among animals, limited, non-lethal competition is the norm. It is not fully understood what factors lead to warfare. We studied the global variation in the frequency of civil conflict among countries of the world, and its positive association with variation in the intensity of infectious disease. We demonstrated that the burden of human infectious disease importantly predicts the frequency of civil conflict and tested a causal model for this association based on the parasite-stress theory of sociality. We also investigated the organization of social foraging by colonies of harvester ants in the genus Pogonomyrmex, using both field studies and computer models.

  15. Handbook of toxicology of chemical warfare agents

    CERN Document Server

    2010-01-01

    This groundbreaking book covers every aspect of deadly toxic chemicals used as weapons of mass destruction and employed in conflicts, warfare and terrorism. Including findings from experimental as well as clinical studies, this one-of-a-kind handbook is prepared in a very user- friendly format that can easily be followed by students, teachers and researchers, as well as lay people. Stand-alone chapters on individual chemicals and major topics allow the reader to easily access required information without searching through the entire book. This is the first book that offers in-depth coverage of individual toxicants, target organ toxicity, major incidents, toxic effects in humans, animals and wildlife, biosensors, biomarkers, on-site and laboratory analytical methods, decontamination and detoxification procedures, prophylactic, therapeutic and countermeasures, and the role of homeland security. Presents a comprehensive look at all aspects of chemical warfare toxicology in one reference work. This saves research...

  16. Violence and Warfare in Precontact Melanesia

    Directory of Open Access Journals (Sweden)

    Stephen M. Younger

    2014-01-01

    Full Text Available Levels of interpersonal violence and warfare for 30 Melanesian societies at the time of contact with Europeans are estimated based on ethnographic and historical records. While violence was common in indigenous Melanesia, it was not ubiquitous and some societies experienced extended periods of internal and external peace. Interpersonal violence and warfare were correlated-when one occurred there was a high probability of finding the other. Violence was not dependent on total population. It was, however, higher for population density greater than 50 persons per square kilometer. Violence in Melanesia may have been stimulated by the large number of relatively small polities, many of which competed with one another for prestige and, in some cases, land.

  17. Brushing Your Spacecrafts Teeth: A Review of Biological Reduction Processes for Planetary Protection Missions

    Science.gov (United States)

    Pugel, D. E. (Betsy); Rummel, J. D.; Conley, Catharine

    2017-01-01

    Much like keeping your teeth clean, where you brush away biofilms that your dentist calls "plaque," there are various methods to clean spaceflight hardware of biological contamination, known as biological reduction processes. Different approaches clean your hardware's "teeth" in different ways and with different levels of effectiveness. We know that brushing at home with a simple toothbrush is convenient and has a different level of impact vs. getting your teeth cleaned at the dentist. In the same way, there are some approaches to biological reduction that may require simple tools or more complex implementation approaches (think about sonicating or just soaking your dentures, vs. brushing them). There are also some that are more effective for different degrees of cleanliness and still some that have materials compatibility concerns. In this article, we review known and NASA-certified approaches for biological reduction, pointing out materials compatibility concerns and areas where additional research is needed.

  18. Brushing Your Spacecrafts Teeth: A Review of Biological Reduction Processes for Planetary Protection Missions

    Science.gov (United States)

    Pugel, D.E. (Betsy); Rummel, J. D.; Conley, C. A.

    2017-01-01

    Much like keeping your teeth clean, where you brush away biofilms that your dentist calls plaque, there are various methods to clean spaceflight hardware of biological contamination, known as biological reduction processes. Different approaches clean your hardwares teeth in different ways and with different levels of effectiveness. We know that brushing at home with a simple toothbrush is convenient and has a different level of impact vs. getting your teeth cleaned at the dentist. In the same way, there are some approaches to biological reduction that may require simple tools or more complex implementation approaches (think about sonicating or just soaking your dentures, vs. brushing them). There are also some that are more effective for different degrees of cleanliness and still some that have materials compatibility concerns. In this article, we review known and NASA-certified approaches for biological reduction, pointing out materials compatibility concerns and areas where additional research is needed.

  19. Mapping the Spread of Mounted Warfare

    Directory of Open Access Journals (Sweden)

    Peter Turchin

    2016-12-01

    Full Text Available Military technology is one of the most important factors affecting the evolution of complex societies. In particular, mounted warfare, the use of horse-riders in military operations, revolutionized war as it spread to different parts of Eurasia and Africa during the Ancient and Medieval eras, and to the Americas during the Early Modern period. Here we use a variety of sources to map this spread.

  20. TRICHODERMA VIRIDE PERS. – EXPERIMENTAL MODEL FOR BIOLOGICAL AND BIOTECHNOLOGICAL INVESTIGATIONS OF MYCROMYCETA WITH IMPORTANCE IN OBTAINING PLANT PROTECTION BIOPRODUCTS

    Directory of Open Access Journals (Sweden)

    SESAN TATIANA EUGENIA

    2010-12-01

    Full Text Available The technological process for obtaining plant protection bioproducts contains 2 main phases: (i biomass biosynthesis of microorganisms in a culture medium, available for industrialization and (ii biomass conditioning of microorganism, the antagonistic micromycetes, respectively. For this type of activities it is essential to establish biological development parameters: (i the optimum composition of the liquid culture medium for development of the fungus under aerobiotic conditions and (ii the optimal parameters of biosynthesis in the studied medium. The biomass biosynthesis technology is discontinuous, of cascade type, and develops several phases: (1 preparing of the laboratory inoculum, (2 preparing of the fungal pure culture in Erlenmeyer bottles, (3 industrial (simulated multiplication in the aired and agitated liquid medium.This paper presents some experimental aspects referring to: 1 – Characterization of the biologically active T. viride isolates, establishing and verifying of their biological thresholds; 2 – Evaluation and experimental verifying of the mass multiplication ability of antagonistic T. viride fungi on the culture media in order to select the optimum industrial culture substrate (medium; 3 – Biochimical characterization of T. viride isolates by electrophoretic analysis of their protein profile; 4 – Evaluation of the T. viride biological activity of T. viride isolates against phytopathogenic fungi with high practical importance: Fusarium graminearum Schwabe (T. Gibberella zeae (Schwein. Petch, F. culmorum (W. G. Sm. Sacc., Pythium ultimum Trow, Botrytis cinerea Pers., Sclerotinia sclerotiorum (Lib. de Bary, Alternaria spp. [A. alternata (Fr. Keissl., Alternaria radicina Meier, Drechsler and E. D. Eddy (Stemphylium radicinum (Meier, Drechsler and E. D. Eddy Neerg.] etc.; 5 – Processing of technological scheme for obtaining plant protection preparates based on biologically active isolates of T. viride.

  1. The development of immunoassays for detection of chemical warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Lenz, D.E.; Brimfield, A.A.; Cook, L. [Army Medical Research Institute of Chemical Defense, Aberdeen Proving Ground, MD (United States)

    1996-10-01

    With the advent of enzyme linked immunoabsorbent assays (ELISA) and monoclonal antibodies in the last two decades, there has been considerable effort devoted to the development of antibodies to detect and quantify low molecular weight toxic substances in environmental or biological fluids. Polyclonal antibodies against paraoxon (the toxic metabolite of parathion) were capable of detecting paraoxon in body fluids at a level of 10{sup -9} M ({approximately}260 pg/mL) when used in a competitive inhibition enzyme immunoassay (CIEIA). Monoclonal antibodies developed against a structural analogue of the chemical warfare agent soman were capable of detection soman in buffer solutions at a level of 10{sup -6} M ({approximately}180 ng/mL). In addition these antibodies were found to be highly specific for soman even in the presence of its major hydrolysis product. Subsequent studies with antisoman monoclonal antibodies extended the level of sensitivity to {approximately}80 ng/mL. Furthermore these antibodies did not cross react with other chemical warfare nerve agents such as sarin or tabun. In all cases, the time for a confirmatory test was two hours or less. Immunoassays for T-2 micotoxins have also been reported with a minimal detection range of 2 pg/assay to 50 ng/assay for the polyclonal and monoclonal T-2 antibodies respectively. These reagents offer a sensitive, rapid and low cost approach to the diagnosis or detection of the presence of toxic chemical substances. More recent efforts have focussed on developing antibodies specific for sulfur mustard a highly reactive vesicating agent.

  2. New dimensions of the modern warfare

    Directory of Open Access Journals (Sweden)

    CĂLIN HENTEA

    2008-02-01

    Full Text Available The huge scientific and technologic progress made by mankind during the last century has had an obvious impact on the military phenomenon. It is a common place to say that the present day wars do not look like the previous ones at all. The military are not the same as the one in former days either, whatever their national insignia on various uniforms. Hence, some questions require a clear and imperative answer. How has the contemporary war been changed? How has the 21 Century military prophile evolved? Which is the trigger of all these changes? What are the new concepts of the modern warfare? To all those questions we are trying to get an answer based on our personal experience gained during a couple of NATO missions and on the respective military doctrines and policies. Why both the military and the politicians are trying to avoid the term „war" by placing instead the much more innofensive syntagm of „military operations" and what are the main characteristics of the 3rd Millenium officer? These are some of the topics of this essay. Quite new military concepts experimented by the most powefull armed forces of the world, such as Effect Based Operations Approach, Network Based Warfare, Information Operations and Psychologiocal Operations will be also examined as pillars of the modern warfare.

  3. Protection Method of Biological Lightning Safety around Power Grid Based on Grounding Electrode Structure

    Science.gov (United States)

    Sixiang, Chen; Daopin, Chen; Ming, Zhang; Xiao, Huang; Jian, He; Zhijie, He

    2017-05-01

    Aimed at the actual situation of fish death in fish ponds near the power transmission line towers after the thunderstorm happened in Guangdong Province in China, this paper studied the influence of the ground current on fish in the pond. Firstly, This paper studied the current density of the fish without protection. On this basis, paper studied the horizontal pole with full-shielded, the vertical pole with half-shielded, the horizontal pole with extension three kinds of protective measures and effects. Finally an effective protection scheme was put forward according to the engineering practice. The results can provide some engineering guidance and quantitative basis for the design and modification of grounding devices when the tower is adjacent to the fish ponds in southern China.

  4. Chemical Biology of Hydropersulfides and Related Species: Possible Roles in Cellular Protection and Redox Signaling.

    Science.gov (United States)

    Álvarez, Lucía; Bianco, Christopher L; Toscano, John P; Lin, Joseph; Akaike, Takaaki; Fukuto, Jon M

    2017-10-01

    For >20 years, physiological signaling associated with the endogenous generation of hydrogen sulfide (H2S) has been of significant interest. Despite its presumed importance, the biochemical mechanisms associated with its actions have not been elucidated. Recent Advances: Recently it has been found that H2S-related or derived species are highly prevalent in mammalian systems and that these species may be responsible for some, if not the majority, of the biological actions attributed to H2S. One of the most prevalent and intriguing species are hydropersulfides (RSSH), which can be present at significant levels. Indeed, it appears that H2S and RSSH are intimately linked in biological systems and likely to be mutually inclusive. The fact that H2S and polysulfides such as RSSH are present simultaneously means that the biological actions previously assigned to H2S can be instead because of the presence of RSSH (or other polysulfides). Thus, it remains possible that hydropersulfides are the biological effectors, and H2S serves, to a certain extent, as a marker for persulfides and polysulfides. Addressing this possibility will to a large extent be based on the chemistry of these species. Currently, it is known that persulfides possess unique and novel chemical properties that may explain their biological prevalence. However, significantly more work will be required to establish the possible physiological roles of these species. Moreover, an understanding of the regulation of their biosynthesis and degradation will become important topics in piecing together their biology. Antioxid. Redox Signal. 00, 000-000.

  5. Survey results of corroding problems at biological treatment plants, Stage II Protection of concrete - State of the Art

    Energy Technology Data Exchange (ETDEWEB)

    Edwards, Ylva (CBI, Boraas (Sweden)); Henriksson, Gunilla (SP, Boraas (Sweden))

    2011-07-01

    A pilot study on the degradation and corrosion of concrete in biological treatment plants was conducted in 2009/2010 in a Waste Refinery Project WR-27 'Survey results of corroding problems at biological treatment plants'. The results showed that the concrete does not have sufficient resistance in the current aggressive plant environment. Furthermore, it is stated that some form of surface protection system is needed to ensure the good performance of concrete constructions, and that the system must withstand the aggressive environment and the traffic that occurs on site. Consequently, a new study was proposed in order to develop specifications for surface protection of concrete in aggressive food waste environments. Results from that study are presented in this report. The report includes various types of waterproofing/protection coating for concrete in biological treatment plants. A number of proposals from the industry are presented in the light of results from project WR-27, i.e., the materials must, among other things, withstand the aggressive leachate from waste food at temperatures up to 70 deg C, and some degree of wear. Some systems are compared in terms of technical material properties as reported by the manufacturer. It turns out that different testing methods were used, and the test results are thus generally not directly comparable. A proposal for a test program has been developed, focusing on chemical resistance and wear resistance. A test solution corresponding to leachate is specified. Laboratory tests for verification of the proposed methodology and future requirements are proposed, as well as test sites and follow-up in the field

  6. Definition of Alternatives for BW/CW (Biological Warfare and Chemical Warfare) Defense Database

    Science.gov (United States)

    1985-07-01

    Westbrook, and Dr. Larry Williams . all of Battelle. who provided contributions to the technical content of this report. DISCLAIMER The findings in this...Development Center Griffiss Air Force Base, NY 13441 Re: Reliability Analysis Center (RAC) CINDAS Purdue University 2595 Yeager Road West Lafayette

  7. Coral Reef Biological Criteria: Using Clean Water Act to Protect a National Treasure

    Science.gov (United States)

    A collaborative Environmental Protection Agency effort is underway to elucidate the technical aspects of coral reef biocriteria implementation. A stony coral rapid bioassessment protocol has been introduced and applied in the Florida Keys and U.S. Virgin Islands, where several in...

  8. Coral Reef Biological Criteria: Using Clean Water Act to Protect a National Treasure

    Science.gov (United States)

    A collaborative Environmental Protection Agency effort is underway to elucidate the technical aspects of coral reef biocriteria implementation. A stony coral rapid bioassessment protocol has been introduced and applied in the Florida Keys and U.S. Virgin Islands, where several in...

  9. Biological Weapons and Bioterorism Threats: The Role of Vaccines in Protecting the Military and Civilian Sectors

    Science.gov (United States)

    2013-05-16

    lowest risk, most effective protection – More effective with fewer adverse effects than antibiotics or other treatments – Enable force projection by...Plague • Anthrax Vaccine Adsorbed • Botulinum Toxoids* • Tularemia Vaccine* • Smallpox vaccine (Vaccinia Virus, Cell Culture-derived)* • Equine

  10. The Cycle of Warfare - Analysis of an Analytical Model

    DEFF Research Database (Denmark)

    Jensen, Mikkel Storm

    2016-01-01

    The abstract has the title: “The Cycle of Warfare - Analysis of an Analytical Model” The Cycle of Warfare is an analytical model designed to illustrate the coherence between the organization, doctrine and technology of a military entity and the influence of the surrounding society as expressed...

  11. Chemical profiling of chemical warfare agents for forensic purposes

    NARCIS (Netherlands)

    Noort, D.; Reuver, L.P.J. de; Fidder, A.; Tromp, M.; Verschraagen, M.

    2010-01-01

    A program has been initiated towards the chemical profiling of chemical warfare agents, in order to support forensic investigations towards synthesis routes, production sites and suspect chemical suppliers. Within the first stage of the project various chemical warfare agents (VX, sulfur mustard, sa

  12. Dirty Fighting: How to Counter Total Warfare Mentality

    Science.gov (United States)

    2015-06-12

    DIRTY FIGHTING: HOW TO COUNTER TOTAL WARFARE MENTALITY A thesis presented to the Faculty of the U.S. Army Command and...to Counter Total Warfare Mentality Approved by: , Thesis Committee Chair LTC Sandra J. Sanchez, MBA , Member Marlyn R. Pierce...

  13. Organizing for Irregular Warfare: Implications for the Brigade Combat Team

    Science.gov (United States)

    2007-12-01

    Glenn, Russell, John Gordon, Tom Herbert, John Matsumura, Randall Steeb, and Paul Steinberg. Lightning Over Water: Sharpening America’s Light...conventional and unconventional warfare.” Special Warfare Journal, March-April (2007). Hersey , John. A Bell for Adano. New York: Vintage Books

  14. Built to Outlast: Operational Approaches to Hybrid Warfare

    Science.gov (United States)

    2012-05-17

    second evolutionary generation of warfare incorporating political, economic, social, and technical changes, and maneuver warfare. Much of this concept is...aligns itself with the emerging understanding of the world through nonlinear sciences, epistemological and ontological foundations.308 In this, Unified

  15. Nodes and Codes: The Reality of Cyber Warfare

    Science.gov (United States)

    2012-05-17

    Options ‘Off the Table’ for US Response to Cyber Attacks,” Stars and Stripes, May 8, 2009. 34 Scott Shackelford , “From Nuclear War to Net War...whitepapers/warfare/redefining-role- information-warfare-chinese-strategy_896 (accessed February 18, 2012). Shackelford , Scott. “From Nuclear War to

  16. Combat Simulation Modeling in Naval Special Warfare Mission Planning.

    Science.gov (United States)

    1995-12-01

    This thesis explores the potential role of combat simulation modeling in the Naval Special Warfare mission planning cycle. It discusses methods for...at the tactical level. The thesis concludes by discussing additional applications of combat simulation modeling within the Naval Special Warfare community and makes recommendations for its effective and efficient implementation.

  17. Biologic

    CERN Document Server

    Kauffman, L H

    2002-01-01

    In this paper we explore the boundary between biology and the study of formal systems (logic). In the end, we arrive at a summary formalism, a chapter in "boundary mathematics" where there are not only containers but also extainers ><, entities open to interaction and distinguishing the space that they are not. The boundary algebra of containers and extainers is to biologic what boolean algebra is to classical logic. We show how this formalism encompasses significant parts of the logic of DNA replication, the Dirac formalism for quantum mechanics, formalisms for protein folding and the basic structure of the Temperley Lieb algebra at the foundations of topological invariants of knots and links.

  18. 2015 Russell Ross Memorial Lecture in Vascular Biology: Protective Autoimmunity in Atherosclerosis.

    Science.gov (United States)

    Ley, Klaus

    2016-03-01

    Atherosclerosis is an inflammatory disease of the arterial wall. It is accompanied by an autoimmune response against apolipoprotein B-100, the core protein of low-density lipoprotein, which manifests as CD4 T cell and antibody responses. To assess the role of the autoimmune response in atherosclerosis, the nature of the CD4 T cell response against apolipoprotein B-100 was studied with and without vaccination with major histocompatibility complex-II-restricted apolipoprotein B-100 peptides. The immunologic basis of autoimmunity in atherosclerosis is discussed in the framework of theories of adaptive immunity. Older vaccination approaches are also discussed. Vaccinating Apoe(-/-) mice with major histocompatibility complex-II-restricted apolipoprotein B-100 peptides reduces atheroma burden in the aorta by ≈40%. The protective mechanism likely includes secretion of interleukin-10. Protective autoimmunity limits atherosclerosis in mice and suggests potential for developing preventative and therapeutic vaccines for humans.

  19. The international transportation of zoo animals: conserving biological diversity and protecting animal welfare.

    Science.gov (United States)

    Linhart, Peter; Adams, David B; Voracek, Thomas

    2008-01-01

    Issues pertaining to the long distance transportation of animals are examined according to the aspirations of the world's zoo community. Guidance comes from the World Association of Zoos and Aquariums (WAZA), the civil society organisation that provides 'leadership and support for zoos, aquariums and partner organisations of the world in animal care and welfare, conservation of biodiversity, environmental education and global sustainability'. The authors describe why it is necessary to transport zoo animals over long distances and how animal welfare can be protected during the process. Transportation of animals among zoos is essential for the cooperative breeding programmes undertaken for the ex situ conservation of wildlife with the help of WAZA studbooks. The challenge is to satisfy the entwined ethical imperatives of safeguarding animal welfare and protecting biodiversity.

  20. The international transportation of zoo animals: conserving biological diversity and protecting animal welfare

    Directory of Open Access Journals (Sweden)

    Peter Linhart†

    2008-03-01

    Full Text Available Issues pertaining to the long distance transportation of animals are examined according to the aspirations of the world’s zoo community. Guidance comes from the World Association of Zoos and Aquariums (WAZA, the civil society organisation that provides ‘leadership and support for zoos, aquariums and partner organisations of the world in animal care and welfare, conservation of biodiversity, environmental education and global sustainability’. The authors describe why it is necessary to transport zoo animals over long distances and how animal welfare can be protected during the process. Transportation of animals among zoos is essential for the cooperative breeding programmes undertaken for the ex situ conservation of wildlife with the help of WAZA studbooks. The challenge is to satisfy the entwined ethical imperatives of safeguarding animal welfare and protecting biodiversity.

  1. The modern problems of protection of biological and landscape diversity of the Northern Caucasus ecological region

    Directory of Open Access Journals (Sweden)

    Z. V. Ataev

    2009-01-01

    Full Text Available Landscape spatial structure of the Russian part of the Caucasus analyzed. Evaluation of adequacy of existing federal network of protected areas (nature reserves and national parks done based on that analysis. Expansion of the network is suggested by including of new nature reserves in semi-arid, forest-steppe and sub-Mediterranean scrubland landscapes.

  2. Biological Control beneath the Feet: A Review of Crop Protection against Insect Root Herbivores

    OpenAIRE

    Alan Kergunteuil; Moe Bakhtiari; Ludovico Formenti; Zhenggao Xiao; Emmanuel Defossez; Sergio Rasmann

    2016-01-01

    Sustainable agriculture is certainly one of the most important challenges at present, considering both human population demography and evidence showing that crop productivity based on chemical control is plateauing. While the environmental and health threats of conventional agriculture are increasing, ecological research is offering promising solutions for crop protection against herbivore pests. While most research has focused on aboveground systems, several major crop pests are uniquely fee...

  3. Protective Effect of Selected Medicinal Plants against Hydrogen Peroxide Induced Oxidative Damage on Biological Substrates

    Directory of Open Access Journals (Sweden)

    Namratha Pai Kotebagilu

    2014-01-01

    Full Text Available Oxidative stress is developed due to susceptibility of biological substrates to oxidation by generation of free radicals. In degenerative diseases, oxidative stress level can be reduced by antioxidants which neutralize free radicals. Primary objective of this work was to screen four medicinal plants, namely, Andrographis paniculata, Costus speciosus, Canthium parviflorum, and Abrus precatorius, for their antioxidant property using two biological substrates—RBC and microsomes. The antioxidative ability of three solvent extracts, methanol (100% and 80% and aqueous leaf extracts, was studied at different concentrations by thiobarbituric acid reactive substances method using Fenton’s reagent to induce oxidation in the substrates. The polyphenol and flavonoid content were analyzed to relate with the observed antioxidant effect of the extracts. The phytochemical screening indicated the presence of flavonoids, polyphenols, tannins, and β-carotene in the samples. In microsomes, 80% methanol extract of Canthium and Costus and, in RBC, 80% methanol extract of Costus showed highest inhibition of oxidation and correlated well with the polyphenol and flavonoid content. From the results it can be concluded that antioxidants from medicinal plants are capable of inhibiting oxidation in biological systems, suggesting scope for their use as nutraceuticals.

  4. A Holistic Approach Including Biological and Geological Criteria for Integrative Management in Protected Areas

    Science.gov (United States)

    Peña, Lorena; Monge-Ganuzas, Manu; Onaindia, Miren; De Manuel, Beatriz Fernández; Mendia, Miren

    2017-02-01

    Biodiversity hotspots and geosites are indivisible parts of natural heritage. Therefore, an adequate spatial delimitation and understanding of both and their linkages are necessary in order to be able to establish conservation policies. Normally, biodiversity hotspots are a typical target for those policies but, generally, geosites are not taken into account. Thus, this paper aims to fill this gap by providing an easily replicable method for the identification and integration of the geosites and the biodiversity hotspots in a Network for Integrative Nature Conservation that highlights their linkages. The method here presented has been applied to Urdaibai Biosphere Reserve situated in southeastern of the Bay of Biscay. The obtained results indicate that some geosites that are not directly related with biodiversity hotspots remain unprotected. Thus, from the study carried out, it can be stated that we conserving just the biodiversity hotspots is not enough to conserve the whole natural heritage of a protected area, as some plots interesting due to their relevant geoheritage remain unprotected. Therefore, it is necessary to fully integrate geosites into the planning documents of protected areas as a part of an ecosystem approach. The ecosystem approach recognizes the integrity of abiotic and biotic elements in nature conservation policies. Moreover, the proposed framework and the innovative methodology can be used as an easy input to identify priority areas for conservation, to improve the protected areas conservation planning, and to demonstrate the linkages between biodiversity hotspots and geosites.

  5. Working on warfare-related sites. Review after 15 years and perspectives

    Energy Technology Data Exchange (ETDEWEB)

    Schneider, U. [Umweltberatung und Planung, Kassel (Germany)

    2003-07-01

    Fifteen years ago, in 1988, in connection with the Second International TNO/BMFT-Congress for the first time sites contaminated due to armaments production were mentioned, caused by the results of the first systematic investigation of a former explosives production plant in Hessisch Lichtenau. The authors referred to another 72 large chemical armament production plants in the FRG and 39 in the GDR. At the Third International TNO/BMFT-Congress in 1990 the complex of problems were substantiated and at the same time more topics were added. The Federal Government of Germany named the following areas suspected of being warfare-related contaminated sites: former production plants, ammunition depots, defusing sites, demolition areas and firing ranges, disassembly plants and intermediate and final storage plants for conventional and chemical combat agents. Soil, water and air pollution could be caused by the following products: explosives, chemical warfare agents, incendiaries, smoke agents, propellants, additives, primary and waste products and residues from the destruction of combat agents. In 1995 the Federal Environmental Agency (UBA) presented the results of the national survey showing that there are 3240 suspected contaminated sites. In 1995 also began the soil clean-up at the warfare-related contaminated sites Stadtallendorf and Hessisch Lichtenau. 8 respectively 10 years after the beginning of the systematic investigations the first contaminated soil was removed and treated in a thermal plant. In the run-up several R and D projects funded by the Federal Government were carried out (Stadtallendorf: MOSAL = Model Remediation of Contaminated Sites, Hessisch Lichtenau: Joint project Biological Remediation of Warfare-Related Contamination). At these sites basics were worked out and technologies were put to the test which can be used for the remediation of other sites. (orig.)

  6. Biological protection of plants in agricultular landscape--state of the art,problems and ways of their decision

    Institute of Scientific and Technical Information of China (English)

    Sokolov M S; Kolombet L V

    2004-01-01

    @@ 1. Biological protection of plants: definition and objectives. Technologically, biological protection of plants (hereinafter bioprotection) is a high agricultural technology involving agricultural landscape approach and basee on an ecological imperative, namely "use living beings against living beings". In a wide sense, present-day bioprotection is a fundamental and applied field of knowledge providing harmless suppression of harmful agents during cultivation and storage of agricultural crops by use natural and (or) artificially constructed organisms (including genetically modified ones having pesticidal properties ) and products of their live cycle. The overall objective of bioprotection consists in producing harmless, profitable and high-quality vegetative raw material, food, fodder. At the same time, bioprotection agrotechnologies are important environment forming and environment maintaining factors, steady and positively influencing the health of both rural ethnos, and agrosphere as a whole. Realization of integrated bioprotection approaches should provide minimum destruction of beneficial and non-target organisms, excluding the succession of harmful species and appearance of species resistant to biocontrol agents.

  7. Endodontic radiology, practice, and knowledge of radiation biology, hazard, and protection among clinical dental students and interns

    Directory of Open Access Journals (Sweden)

    Joan Emien Enabulele

    2015-01-01

    Full Text Available Objective: To evaluate the practice and knowledge of endodontic radiology as well as assess the knowledge of radiation biology, hazard, and protection among clinical dental students and interns. Materials and Methods: Cross-sectional study of clinical dental students and interns at University of Benin and University of Benin Teaching hospital respectively. Data was collected using a questionnaire which covered practice and knowledge of endodontic radiography, knowledge of radiation biology, hazard, and protection. Data was analyzed using Statistical Package for Social Sciences (SPSS version 17.0. Result: Seventy participants were included in the study, 40% were final year students and 24.3% house officers. Majority (95.7% agreed that they exposed radiographs as part of endodontic treatment. Only 18.6% knew that the apices of teeth should be 3mm from the border of the X-ray film, while 24.3% knew that 3mm of periapical bone should be visible on X-ray. Less than half (31.4% knew that paralleling technique was the technique of choice for endodontic radiography and this was statistically Significant in relationship to the status of the of the respondents. A few (4.3% of the respondents had knowledge of new horizons in endodontic imaging. Half of the respondents knew that damage by X-rays is mainly due to formation of free radicals. The most frequently reported radiation hazards was reduced salivary flow, while the least reported was rampant caries. Most knew how to protect patients, themselves, and other persons while exposing radiographs. Conclusion: There is need for inclusion of endodontic radiography in the undergraduate curriculum to ensure proper and correct radiographs during endodontic procedure.

  8. In Situ Biological Contamination Studies of the Moon: Implications for Future Planetary Protection and Life Detection Missions

    Science.gov (United States)

    Glavin, Daniel P.; Dworkin, Jason P.; Lupisella, Mark; Kminek, Gerhard; Rummel, John D.

    2010-01-01

    NASA and ESA have outlined visions for solar system exploration that will include a series of lunar robotic precursor missions to prepare for, and support a human return to the Moon, and future human exploration of Mars and other destinations. One of the guiding principles for exploration is to pursue compelling scientific questions about the origin and evolution of life. The search for life on objects such as Mars will require that all spacecraft and instrumentation be sufficiently cleaned and sterilized prior to launch to ensure that the scientific integrity of extraterrestrial samples is not jeopardized by terrestrial organic contamination. Under the Committee on Space Research's (COSPAR's) current planetary protection policy for the Moon, no sterilization procedures are required for outbound lunar spacecraft, nor is there yet a planetary protection category for human missions. Future in situ investigations of a variety of locations on the Moon by highly sensitive instruments designed to search for biologically derived organic compounds would help assess the contamination of the Moon by lunar spacecraft. These studies could also provide valuable "ground truth" data for Mars sample return missions and help define planetary protection requirements for future Mars bound spacecraft carrying life detection experiments. In addition, studies of the impact of terrestrial contamination of the lunar surface by the Apollo astronauts could provide valuable data to help refine future Mars surface exploration plans for a human mission to Mars.

  9. Do Biologics Protect Patients With Psoriasis From Myocardial Infarction? A Retrospective Cohort.

    Science.gov (United States)

    Gulliver, Wayne P; Randell, Shane; Gulliver, Susanne; Connors, Sean; Bachelez, Hervé; MacDonald, Don; Gladney, Neil; Morrissey, Andrea; Fleming, Patrick

    2016-11-01

    Psoriasis is a chronic immune-mediated inflammatory disorder that affects approximately 2% to 3% of the population, which translates to 17 million in North America and Europe and approximately 170 million people worldwide. Although psoriasis can occur at any age, most cases develop before age 40 years. Some larger studies have noted bimodal age at onset with the first peak occurring at approximately age 30 years and the second peak at around 55 to 60 years, but most patients have a younger age of onset (15-30 years). Psoriasis is associated with multiple comorbidities, decreased quality of life, and decreased longevity of life. Two recent systematic reviews and a meta-analysis concluded that psoriasis patients are at increased risk of major adverse cardiovascular events. Multiple studies confirm that many of the comorbidities found in patients with psoriasis are also important risk factors for cardiovascular disease, stroke, diabetes mellitus, hypertension, hyperlipidemia, obesity, and metabolic syndrome. We conducted a retrospective cohort study using charts from a dermatology clinic combined with an administrative database of patients with moderate to severe psoriasis in Newfoundland and Labrador, Canada. We examined the role of clinical predictors (age of onset of psoriasis, age, sex, biologic use) in predicting incident myocardial infarction (MI). Logistic regression revealed that age of onset (odds ratio [OR], 8.85; P = .005), advancing age (OR, 1.07; P psoriasis treated with biologics, there was a nonsignificant trend in reduced MI by 78% (relative risk, 0.18; 95% confidence interval, 0.24-1.34; P = .056). Our study demonstrated a trend toward decreased MI in patients with moderate to severe psoriasis on biologics. Patients with an early age of onset of psoriasis (psoriasis. © The Author(s) 2016.

  10. Oestrogen alters adipocyte biology and protects female mice from adipocyte inflammation and insulin resistance.

    Science.gov (United States)

    Stubbins, R E; Najjar, K; Holcomb, V B; Hong, J; Núñez, N P

    2012-01-01

    Obesity is associated with insulin resistance, liver steatosis and low-grade inflammation. The role of oestrogen in sex differences in the above co-morbidities is not fully understood. Our aim was to assess the role oestrogen has in modulating adipocyte size, adipose tissue oxidative stress, inflammation, insulin resistance and liver steatosis. To determine the role oestrogen has in the above co-morbidities related to obesity, we randomized C57BL/6J mice into four groups (15 mice per group): (i) male, (ii) non-ovariectomized female (novx), (iii) ovariectomized female (ovx) and (iv) ovariectomized female mice supplemented with 17β estradiol (ovx-E). Mice received either a low-fat (LF) or a high-fat (HF) diet for 10 weeks. Outcomes measured were bodyweight, body fat, adipocyte diameter, adipose tissue lipolysis markers, adipose tissue oxidative stress, inflammation, insulin resistance and liver steatosis. Male and ovx-female mice consuming the HF diet had a higher propensity of gaining weight, specifically in the form of body fat. Oestrogen protected female mice from adipocyte hypertrophy and from developing adipose tissue oxidative stress and inflammation. Moreover, novx-female and ovx-female+E mice had higher phosphorylated levels of protein kinase A and hormone sensitive lipase, markers associated with lipolysis. Additionally, male and ovx female mice had a higher propensity of developing liver steatosis and insulin resistance. In contrast, oestrogen protected female mice from developing liver steatosis and from becoming insulin resistant. We show that oestrogen protects female mice from adipocyte hypertrophy and adipose tissue oxidative stress and inflammation. Furthermore, oestrogen prevented female mice from developing liver steatosis and from becoming insulin resistant. © 2011 Blackwell Publishing Ltd.

  11. Hybrid Warfare: Preparing for Future Conflict

    Science.gov (United States)

    2015-02-17

    Fukuyama , Francis . “At the ‘End of History’ Still Stands Democracy.” The Wall Street Journal, 6 June 2014. http://www.wsj.com/articles/at-the-end-of...warfare is cultural instead of political (in the traditional Clausewitzian sense). 15 Hoffman is referring to Francis Fukuyama’s idea of “the end of...history,” as argued in his 1989 essay and subsequent book. Fukuyama first published an essay titled “The End of History” in the National Interest in

  12. Microwave receivers with electronic warfare applications

    CERN Document Server

    Tsui, James

    2005-01-01

    This book by the author of Digital Techniques for Wideband Receivers willbe like no other one on your book shelf as the definitive word on electronicwarfare (EW) receiver design and performance. Whether you are an EWscientist involved in the test and evaluation of EW receivers or a designerof RWR's and other EW-related receivers, Microwave Receivers withElectronic Warfare Applications is a handy reference through which you canperfect your technical art. Lucidly written, this book is a treatise on EWreceivers that is relevant to you if you are just looking for a top-levelinsight into EW receive

  13. Electronic warfare receivers and receiving systems

    CERN Document Server

    Poisel, Richard A

    2014-01-01

    Receivers systems are considered the core of electronic warfare (EW) intercept systems. Without them, the fundamental purpose of such systems is null and void. This book considers the major elements that make up receiver systems and the receivers that go in them.This resource provides system design engineers with techniques for design and development of EW receivers for modern modulations (spread spectrum) in addition to receivers for older, common modulation formats. Each major module in these receivers is considered in detail. Design information is included as well as performance tradeoffs o

  14. Axial Vircator for Electronic Warfare Applications

    Directory of Open Access Journals (Sweden)

    L. Drazan

    2009-12-01

    Full Text Available This paper deals with a high power microwave generator with virtual cathode – vircator in axial release for electronic warfare applications. The classification of directed energy weapons microwave (DEWM is introduced together with basic block diagrams of a particular class of DEWM. In the paper, methods for designing vircator pulsed power supply, axial vircator structure, measurement methods and experimental results are presented. The vircator in electromagnetic ammunition is powered by magneto-cumulative generator and in weapons for defense of objects (WDO, it is powered by Marx generator. The possible applications of a vircator in the DEWM area are discussed.

  15. Nuclear, biological, and chemical combined injuries and countermeasures on the battlefield.

    Science.gov (United States)

    Knudson, Gregory B; Elliott, Thomas B; Brook, Itzhak; Shoemaker, Michael O; Pastel, Ross H; Lowy, Robert J; King, Gregory L; Herzig, Thomas C; Landauer, Michael R; Wilson, Scott A; Peacock, Susan J; Bouhaouala, S Samy; Jackson, William E; Ledney, G David

    2002-02-01

    The Armed Forces Radiobiological Research Institute (AFRRI) has developed a research program to determine the major health risks from exposure to ionizing radiation in combination with biological and chemical warfare agents and to assess the extent to which exposure to ionizing radiation compromises the effectiveness of protective drugs, vaccines, and other biological and chemical warfare prophylactic and treatment strategies. AFRRI's Defense Technology Objective MD22 supports the development of treatment modalities and studies to assess the mortality rates for combined injuries from exposure to ionizing radiation and Bacillus anthracis, and research to provide data for casualty prediction models that assess the health consequences of combined exposures. In conjunction with the Defense Threat Reduction Agency, our research data are contributing to the development of casualty prediction models that estimate mortality and incapacitation in an environment of radiation exposure plus other weapons of mass destruction. Specifically, the AFFRI research program assesses the effects of ionizing radiation exposure in combination with B. anthracis, Venezuelan equine encephalomyelitis virus, Shigella sonnei, nerve agents, and mustard as well as their associated treatments and vaccines. In addition, the long-term psychological effects of radiation combined with nuclear, biological, and chemical (NBC) injuries are being evaluated. We are also assessing the effectiveness of gamma photons and high-speed neutrons and electrons for neutralizing biological and chemical warfare agents. New protocols based on our NBC bioeffects experiments will enable U.S. armed forces to accomplish military operations in NBC environments while optimizing both survival and military performance. Preserving combatants' health in an NBC environment will improve warfighting operations and mission capabilities.

  16. Biological efficacy of the chemical chrysanthemums protection with the use of fine and coarse droplets

    Directory of Open Access Journals (Sweden)

    Stanislaw PARAFINIUK

    2012-09-01

    Full Text Available Studies of three years (2007-2009 were conducted at Czesławice in south- east of Poland .The objects of research were the plants of the one cultivar of chrysanthemum: Dark Tripoli. The following agents were used for protection: Dithane NeoTec 75 WG, Sumilex 500 SC, Amistar 250 SC. The treatment was carried out with the use of two types of nozzles: standard RS-MM 110 03 and ejector type ID 120 03 C. Observation was carried out once a year: in October. The number and health status of plants were determined and diseased plants were collected for analysis. The percentage of plants with disease symptoms was estimated for each plot. The best health status and yield were noticed for Amistar 250 SC.

  17. Environmental chemistry of chemical warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    MacNaughton, M.G.; Brewer, J.H.; Ledbetter-Ferrill, J. [Southwest Research Inst., San Antonio, TX (United States)

    1995-06-01

    This paper summarizes the approach used in the preparation of a Handbook for the Corps of Engineers, Huntsville Division, on the environmental chemistry of chemical warfare agents. The agents GB and HD will be used to illustrate the type of information in the report. Those readers interested in the full report should contact Mr. Arkie Fanning, Huntsville Corps of Engineers at (505) 955-5256. The U.S. Army Corps of Engineers (ACE) has identified approximately 7,200 formerly used defense sites (FUDS) in the United States, some of which are suspected to be contaminated with chemical warfare agents (CWA). The ACE has responsibility for environmental clean-up of FUDS, including site characterization, evaluation and remediation of the site. Thirty-four FUDS and 48 active DOD installations that may contain CWA were identified in an Interim Survey and Analysis Report by the USACMDA Program Manager for Non-Stockpile Chemical Material (NSCM). The chemical agents listed include sulfur mustard (H), lewisite (L), tabun (GA), sarin (GB), VX, hydrogen cyanide (AC), cyanogen chloride (CK), phosgene (CG), BZ, and CS.

  18. Force Protection for Distribution Based-Logistics in Asymmetric Warfare

    Science.gov (United States)

    2005-05-26

    Adaptive Enterprise Capability: 18. 20 Peltz, Eric, John Halliday, and Steven Hartman. Combat Service Support Transformation: Emerging Strategies...Under Secretary of State Nicholas Katzenbach poignantly observed in June 1967, that the North Vietnamese Army was “the key...112 Juskowiak, Terry E. and John F. Wharton. “Joint and Expeditionary Logistics for a Campaign- Quality

  19. Selfishness, warfare and economics; or integration, cooperation and biology

    Directory of Open Access Journals (Sweden)

    Emiliano Jesus Salvucci

    2012-05-01

    Full Text Available The acceptance of Darwin's theory of evolution by natural selection is not complete and it has been pointed out its limitation to explain the complex processes that constitute the transformation of species. The darwinian paradigm had its origin in the free market theories and concepts of Malthus and Spencer. Nature was explained on the basis of market theories moving away from an accurate explanation of natural phenomena. It is common that new discoveries bring about contradictions that are intended to be overcome by adjusting results to the dominant reductionist paradigm using all sorts of gradations and combinations that are admitted for each case. Modern findings represent a challenge to the interpretation of the observations with the Darwinian view of competition and struggle for life as theoretical basis. New holistic interpretations are emerging related with the Net of Life, in which the interconnection of ecosystems constitutes a dynamic and self-regulating biosphere: Viruses are recognized as a macroorganism with a huge collection of genes, most unknown, that constitute the major planet's gene pool with a fundamental role in evolution. The hologenome theory considers an organism and all of its associated symbiotic microbes as a result of symbiopoiesis. Microbes, helmints, that normally are understood as parasites, are cohabitants and they have cohabited with their host and drives the evolution and existence of the partners. Each organism is a result of integration of complex systems. The eukaryotic organism is the result of combination of bacterial, virus and eukaryotic DNA and the interaction of its own genome with the genome of its microbiota resulting in an intertwined metabolism (a superorganism along evolution. These new interpretations are remarkable points to be considered in order to construct a solid theory adjusted to the facts and with less speculations and tortuous semantic traps.

  20. Optimization of Graphene Sensors to Detect Biological Warfare Agents

    Science.gov (United States)

    2014-03-27

    low-cost sensors. 1.2 Research Topic Manoor showed it is possible to detect Gram-positive and Gram-negative bacteria via antimicrobial peptides ...This unit was placed into copper etchant to dissolve the copper and leave a PMMA/graphene layer for transfer to a 500nm SiO2 layer on a circuit...electron transport properties, ssDNA binding properties, and simple production. The CVD copper growth method was used to grow the graphene for transfer

  1. Collaborative Core Research Program for Chemical-Biological Warfare Defense

    Science.gov (United States)

    2015-01-04

    collaborators at the University of Cincinnati’s Metabolic Diseases Institute (UC-MDI) and the Battelle Memorial Institute’s Biomedical Research Center...at the University of Cincinnati’s Metabolic Diseases Institute (UC-MDI) and the Battelle Memorial Institute’s Biomedical Research Center (BBRC) is...Research Center (UC-DDRC, part of UC-MDI). Using an EvoTec robot, single point (10 μM final solution test chemical concentration) 2 measurements

  2. Anthrax: A Guide for Biology Teachers.

    Science.gov (United States)

    Simon, Eric J.

    2002-01-01

    Presents facts about anthrax so that biology teachers can communicate them to others. Defines anthrax and the nature of bacterial spores. Discusses transmission and clinical presentation as well as prevention, diagnosis, and treatment. Explores the use of anthrax as a biological warfare agent. (Contains 27 references.) (DDR)

  3. Protective

    Directory of Open Access Journals (Sweden)

    Wessam M. Abdel-Wahab

    2013-10-01

    Full Text Available Many active ingredients extracted from herbal and medicinal plants are extensively studied for their beneficial effects. Antioxidant activity and free radical scavenging properties of thymoquinone (TQ have been reported. The present study evaluated the possible protective effects of TQ against the toxicity and oxidative stress of sodium fluoride (NaF in the liver of rats. Rats were divided into four groups, the first group served as the control group and was administered distilled water whereas the NaF group received NaF orally at a dose of 10 mg/kg for 4 weeks, TQ group was administered TQ orally at a dose of 10 mg/kg for 5 weeks, and the NaF-TQ group was first given TQ for 1 week and was secondly administered 10 mg/kg/day NaF in association with 10 mg/kg TQ for 4 weeks. Rats intoxicated with NaF showed a significant increase in lipid peroxidation whereas the level of reduced glutathione (GSH and the activity of superoxide dismutase (SOD, catalase (CAT, glutathione S-transferase (GST and glutathione peroxidase (GPx were reduced in hepatic tissues. The proper functioning of the liver was also disrupted as indicated by alterations in the measured liver function indices and biochemical parameters. TQ supplementation counteracted the NaF-induced hepatotoxicity probably due to its strong antioxidant activity. In conclusion, the results obtained clearly indicated the role of oxidative stress in the induction of NaF toxicity and suggested hepatoprotective effects of TQ against the toxicity of fluoride compounds.

  4. Protecting buildings from a biological or chemical attack: Actions to take before or during a release

    Energy Technology Data Exchange (ETDEWEB)

    Price, Phillip N.; Sohn, Michael D.; Gadgil, Ashok J.; Delp, William W.; Lorenzetti, David M.; Finlayson, Elizabeth U.; Thatcher, Tracy L.; Sextro, Richard G.; Derby, Elisabeth A.; Jarvis, Sondra A.

    2003-01-29

    This report presents advice on how to operate a building to reduce casualties from a biological or chemical attack, as well as potential changes to the building (e.g. the design of the ventilation system) that could make it more secure. It also documents the assumptions and reasoning behind the advice. The particular circumstances of any attack, such as the ventilation system design, building occupancy, agent type, source strength and location, and so on, may differ from the assumptions made here, in which case actions other than our recommendations may be required; we hope that by understanding the rationale behind the advice, building operators can modify it as required for their circumstances. The advice was prepared by members of the Airflow and Pollutant Transport Group, which is part of the Indoor Environment Department at the Lawrence Berkeley National Laboratory. The group's expertise in this area includes: tracer-gas measurements of airflows in buildings (Sextro, Thatcher); design and operation of commercial building ventilation systems (Delp); modeling and analysis of airflow and tracer gas transport in large indoor spaces (Finlayson, Gadgil, Price); modeling of gas releases in multi-zone buildings (Sohn, Lorenzetti, Finlayson, Sextro); and occupational health and safety experience related to building design and operation (Sextro, Delp). This report is concerned only with building design and operation; it is not a how-to manual for emergency response. Many important emergency response topics are not covered here, including crowd control, medical treatment, evidence gathering, decontamination methods, and rescue gear.

  5. The constitutional protection of trade secrets and patents under the Biologics Price Competition and Innovation Act of 2009.

    Science.gov (United States)

    Epstein, Richard A

    2011-01-01

    The Biologics Price Competition and Innovation Act of 2009 ("Biosimilars Act") is for the field of pharmaceutical products the single most important legislative development since passage of the Drug Price Competition and Patent Term Restoration Act of 1984 ("Hatch-Waxman Act"), on which portions of the Biosimilars Act are clearly patterned. Congress revised section 351 of the Public Health Service Act (PHSA) to create a pathway for FDA approval of "biosimilar" biological products. Each biosimilar applicant is required to cite in its application a "reference product" that was approved on the basis of a full application containing testing data and manufacturing information, which is owned and was submitted by another company and much of which constitutes trade secret information subject to constitutional protection. Because the Biosimilars Act authorizes biosimilar applicants to cite these previously approved applications, the implementation of the new legislative scheme raises critical issues under the Fifth Amendment of the Constitution, pursuant to which private property--trade secrets included--may not be taken for public use, without "just compensation." FDA must confront those issues as it implements the scheme set out in the Biosimilars Act. This article will discuss these issues, after providing a brief overview of the Biosimilars Act and a more detailed examination of the law of trade secrets.

  6. [An increase in efficiency of adaptations and a weakening of organism protective reactions in the process of biological evolution].

    Science.gov (United States)

    Ivanov, K P

    2014-01-01

    The main direction of evolution of living organisms is development of the central nervous system and sense organ, an increase of energy exchange development of homoiothermia, development of the more and more complex forms of behavior, an increase in energy expenditure in connection with an increase of the organism activity, and development of adaptation to the habitat. Such fundamental processes were subjected and have been subjected to numerous studies and discussions. However, in different animals there exist different species peculiarities of evolution of physiological functions, from which finally formed are fundamental evolutionary processes. We studied some of these specific processes by dividing them into two categories. The first category is "Increase of efficiency of adaptation" in development of biological evolution. By this term we mean development of amazing by perfection specific physiological mechanisms of adaptive character. The second category is "Weakening of protective organism reactions". By this we understand disturbance of protective mechanisms of the organism immune system, discoordination of movement of leukocytes along microvessels, the absence of efficient collateral circulation in brain and in heart, etc.

  7. Back to the future: aerial warfare in Libya

    Directory of Open Access Journals (Sweden)

    João Paulo Nunes Vicente

    2013-05-01

    Full Text Available A century after the first air bomb mission, a new intervention in the same geographic space has made evident the changes in Airpower. The Aerial Warfare in Libya has radically changed the civil war, complying with a UN mission to protect Libyan population, imposing a no-fly zone and an arms embargo. Therefore, Operation Unified Protector became one of the most successful campaigns in the history of NATO. We aim to assess the operational efficiency of Airpower in the conflict in Libya, focusing on the challenges of a War essentially Aerial. Despite the military results and the fact that some political objectives were met, we can identify some concerning trends that, if not shifted, may negatively influence future NATO operations. We do not aim to draw general and universal conclusions on the strategic value of Airpower based on the analysis of a specific case. Above all, we focus on identifying some lessons which have influenced OUP operational efficiency. Thus, we must analyze some factors, such as the scope of objectives, the type of opposing action and aerial strategy used by the coalition and then focus on the challenges arising from the OUP.

  8. Helicopters in Irregular Warfare: Algeria, Vietnam, and Afghanistan

    Science.gov (United States)

    2013-06-13

    the political group associated with the Algerian nationalist independence movement GALAT Groupement d’ Aviation Légère de l’Armée de Terre ...unique from most conflicts because the expeditionary forces’ parent country rarely perceives an existential threat.19 The lack of perceived threat...dominance rarely guarantees success in irregular warfare.22 Instead, success in irregular warfare requires synergy between government and military efforts

  9. Littoral Combat Ship Open Ocean Anti-Submarine Warfare

    Science.gov (United States)

    2014-06-01

    COVERED Capstone 4. TITLE AND SUBTITLE LITTORAL COMBAT SHIP OPEN OCEAN ANTI-SUBMARINE WARFARE 5. FUNDING NUMBERS 6. AUTHOR(S) 311-124O/Team LCS...Life cycle cost LCCE Life cycle cost estimate LCS Littoral combat ship LHA Landing ship, helicopter assault LHD Landing ship, helicopter...is unlimited LITTORAL COMBAT SHIP OPEN OCEAN ANTI- SUBMARINE WARFARE by Team LCS 311-124O June 2014 Capstone Advisors: John Green Dan

  10. Fourth Generation Warfare and Its Impact on the Army

    Science.gov (United States)

    2007-11-02

    In 1989, the authors of an article entitled, "The Changing Face of War: Into the Fourth Generation ," offered a glimpse of the future rooted in the...decline of the West in a world rife with cultural conflicts and the powerful influences of a form of cultural Marxism known as political correctness...were combining in America to create conditions for a new generation of warfare. Their vision included a form of warfare that bypassed the military

  11. The Chinese People’s Liberation Army and Information Warfare

    Science.gov (United States)

    2014-03-01

    information confrontation operations across the elec- tromagnetic spectrum. In doing so, as Dr. Wortzel’s monograph explains, the PLA used innovative means...and in- formation confrontation operations across the electro- magnetic spectrum. As this monograph explains, the PLA used innovative means to...information warfare concepts as a barometer of how the PLA approached the concept, by 2007 the threads of integrated network electronic warfare

  12. Depth vs. breadth: talent management for special warfare

    OpenAIRE

    Krebs, William K.

    2016-01-01

    Approved for public release; distribution is unlimited This thesis presents recommendations for improving officer talent management for Special Warfare units. Success in this complex human domain demands that key planners and commanders of a Special Warfare campaign operate with a long-term perspective, a depth of expertise, and a strong network of relationships. However, on any given day in a U.S. Army Special Forces Group, the preponderance of field grade officers are in their first year...

  13. Naval Special Warfare Injury Prevention and Human Performance Initiative

    Science.gov (United States)

    2012-06-30

    3. DATES COVERED (From - To) 01 JUL 10-30 JUN 12 4. TITLE AND SUBTITLE Naval Special Warfare Group 4 Injury Prevention and Human Performance...from suboptimal biomechanical, musculoskeletal, and physiological characteristics and is further compounded with poor or inadequate nutrition . The...Prescribed by ANSI Std. Z39.18 OFFICE OF NAVAL RESEARCH FINAL TECHNICAL REPORT Naval Special Warfare Injury Prevention and Human Performance

  14. Antiviral Biologic Produced in DNA Vaccine/Goose Platform Protects Hamsters Against Hantavirus Pulmonary Syndrome When Administered Post-exposure

    Science.gov (United States)

    Henderson, Thomas; Nilles, Matthew L.; Kwilas, Steve A.; Josleyn, Matthew D.; Hammerbeck, Christopher D.; Schiltz, James; Royals, Michael; Ballantyne, John; Hooper, Jay W.; Bradley, David S.

    2015-01-01

    Andes virus (ANDV) and ANDV-like viruses are responsible for most hantavirus pulmonary syndrome (HPS) cases in South America. Recent studies in Chile indicate that passive transfer of convalescent human plasma shows promise as a possible treatment for HPS. Unfortunately, availability of convalescent plasma from survivors of this lethal disease is very limited. We are interested in exploring the concept of using DNA vaccine technology to produce antiviral biologics, including polyclonal neutralizing antibodies for use in humans. Geese produce IgY and an alternatively spliced form, IgYΔFc, that can be purified at high concentrations from egg yolks. IgY lacks the properties of mammalian Fc that make antibodies produced in horses, sheep, and rabbits reactogenic in humans. Geese were vaccinated with an ANDV DNA vaccine encoding the virus envelope glycoproteins. All geese developed high-titer neutralizing antibodies after the second vaccination, and maintained high-levels of neutralizing antibodies as measured by a pseudovirion neutralization assay (PsVNA) for over 1 year. A booster vaccination resulted in extraordinarily high levels of neutralizing antibodies (i.e., PsVNA80 titers >100,000). Analysis of IgY and IgYΔFc by epitope mapping show these antibodies to be highly reactive to specific amino acid sequences of ANDV envelope glycoproteins. We examined the protective efficacy of the goose-derived antibody in the hamster model of lethal HPS. α-ANDV immune sera, or IgY/IgYΔFc purified from eggs, were passively transferred to hamsters subcutaneously starting 5 days after an IM challenge with ANDV (25 LD50). Both immune sera, and egg-derived purified IgY/IgYΔFc, protected 8 of 8 and 7 of 8 hamsters, respectively. In contrast, all hamsters receiving IgY/IgYΔFc purified from normal geese (n=8), or no-treatment (n=8), developed lethal HPS. These findings demonstrate that the DNA vaccine/goose platform can be used to produce a candidate antiviral biological product

  15. Antiviral Biologic Produced in DNA Vaccine/Goose Platform Protects Hamsters Against Hantavirus Pulmonary Syndrome When Administered Post-exposure.

    Directory of Open Access Journals (Sweden)

    Nicole Haese

    Full Text Available Andes virus (ANDV and ANDV-like viruses are responsible for most hantavirus pulmonary syndrome (HPS cases in South America. Recent studies in Chile indicate that passive transfer of convalescent human plasma shows promise as a possible treatment for HPS. Unfortunately, availability of convalescent plasma from survivors of this lethal disease is very limited. We are interested in exploring the concept of using DNA vaccine technology to produce antiviral biologics, including polyclonal neutralizing antibodies for use in humans. Geese produce IgY and an alternatively spliced form, IgYΔFc, that can be purified at high concentrations from egg yolks. IgY lacks the properties of mammalian Fc that make antibodies produced in horses, sheep, and rabbits reactogenic in humans. Geese were vaccinated with an ANDV DNA vaccine encoding the virus envelope glycoproteins. All geese developed high-titer neutralizing antibodies after the second vaccination, and maintained high-levels of neutralizing antibodies as measured by a pseudovirion neutralization assay (PsVNA for over 1 year. A booster vaccination resulted in extraordinarily high levels of neutralizing antibodies (i.e., PsVNA80 titers >100,000. Analysis of IgY and IgYΔFc by epitope mapping show these antibodies to be highly reactive to specific amino acid sequences of ANDV envelope glycoproteins. We examined the protective efficacy of the goose-derived antibody in the hamster model of lethal HPS. α-ANDV immune sera, or IgY/IgYΔFc purified from eggs, were passively transferred to hamsters subcutaneously starting 5 days after an IM challenge with ANDV (25 LD50. Both immune sera, and egg-derived purified IgY/IgYΔFc, protected 8 of 8 and 7 of 8 hamsters, respectively. In contrast, all hamsters receiving IgY/IgYΔFc purified from normal geese (n=8, or no-treatment (n=8, developed lethal HPS. These findings demonstrate that the DNA vaccine/goose platform can be used to produce a candidate antiviral

  16. A Dry Membrane Protection Technique to Allow Surface Acoustic Wave Biosensor Measurements of Biological Model Membrane Approaches

    Directory of Open Access Journals (Sweden)

    Marius Enachescu

    2013-09-01

    Full Text Available Model membrane approaches have attracted much attention in biomedical sciences to investigate and simulate biological processes. The application of model membrane systems for biosensor measurements is partly restricted by the fact that the integrity of membranes critically depends on the maintenance of an aqueous surrounding, while various biosensors require a preconditioning of dry sensors. This is for example true for the well-established surface acoustic wave (SAW biosensor SAM®5 blue. Here, a simple drying procedure of sensor-supported model membranes is introduced using the protective disaccharide trehalose. Highly reproducible model membranes were prepared by the Langmuir-Blodgett technique, transferred to SAW sensors and supplemented with a trehalose solution. Membrane rehydration after dry incorporation into the SAW device becomes immediately evident by phase changes. Reconstituted model membranes maintain their full functionality, as indicated by biotin/avidin binding experiments. Atomic force microscopy confirmed the morphological invariability of dried and rehydrated membranes. Approximating to more physiological recognition phenomena, the site-directed immobilization of the integrin VLA-4 into the reconstituted model membrane and subsequent VCAM-1 ligand binding with nanomolar affinity were illustrated. This simple drying procedure is a novel way to combine the model membrane generation by Langmuir-Blodgett technique with SAW biosensor measurements, which extends the applicability of SAM®5 blue in biomedical sciences.

  17. Determination of singlet oxygen quenching and protection of biological systems by various extracts from seed of Rumex crispus L.

    Science.gov (United States)

    Suh, Hwa-Jin; Lee, Kyung-Seok; Kim, Seong-Ryul; Shin, Myoung-Ho; Park, Sanggyu; Park, Shin

    2011-02-07

    The 2,2-diphenyl-1-picrylhydrazyl (DPPH) radical scavenging effect and total phenolic contents were evaluated for the screening of singlet oxygen ((1)O(2)) quenching efficacy of various seed extracts from Rumex crispus L. The butanol and ethyl-acetate extracts displayed remarkable effect of DPPH as compared to positive control ascorbic acid. The concentrations (QC(50)) of butanol and ethyl-acetate extracts required to exert 50% reducing effect on (1)O(2) were found to be 116 and 82 μg mL(-1), respectively. Both extracts were also found to protect the in vitro biological system from the detrimental effect of (1)O(2) on type II photosensitization in Escherichia coli, red blood cell, lactate dehydrogenase and histidine. Among all the tested extracts, the ethyl-acetate and butanol extracts contained higher amount of total phenolic contents. The results suggest that our study may contribute to the development of new bioactive products with potential applications to reduce photo-produced oxidative stress involving reactive oxygen species in living organisms. Copyright © 2010 Elsevier B.V. All rights reserved.

  18. The World War Two Allied Economic Warfare: The Case of Turkish Chrome Sales

    OpenAIRE

    ÖNSOY, Murat

    2009-01-01

    Economic character of "modern warfare" is too important to be underestimated. In the Economic Warfare belligerents attempt to reduce the war capacity of the enemy through various methods. In World War II crushing down the German war production and economy was the main target of the British Ministry of Economic Warfare. For Germany, one of the many ways of overcoming the British Economic Warfare was to trade with the neutral countries that had land connection to the Third Reich. Turkey was one...

  19. Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development

    Science.gov (United States)

    2016-09-01

    ARL-TN-0779 ● SEP 2016 US Army Research Laboratory Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and...Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development by Neal Tesny Sensors and Electron Devices Directorate...TITLE AND SUBTITLE Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development 5a. CONTRACT NUMBER 5b

  20. Numerical simulation of RCS for carrier electronic warfare airplanes

    Directory of Open Access Journals (Sweden)

    Yue Kuizhi

    2015-04-01

    Full Text Available This paper studies the radar cross section (RCS of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carrier electronic warfare airplanes Model A and Model B with weapons were established. Based on the physical optics method and the equivalent electromagnetic flow method, by the use of the RCSAnsys software, the characteristics of carrier electronic warfare airplanes’ RCS under steady and dynamic flights were simulated under the UHF, X, and S radar bands. This paper researches the detection probability of aircraft by radars under the condition of electronic warfare, and completes the mathematical statistical analysis of the simulation results. The results show that: The Model A of carrier electronic warfare airplane is better than Model B on stealth performance and on discover probability by radar detection effectively.

  1. Investigation of Acute Toxicity of a Chemical Warfare Agent in Kidneys

    Directory of Open Access Journals (Sweden)

    Turgut Topal

    2007-08-01

    Full Text Available One of the most important chemical warfare agents, sulfur mustard (SM causes crucial acute and chronic toxic effects. Lung, skin, eye and kidneys are the most affected organs. In this work, it was investigated if increased nitric oxide (NO and peroxynitrite are involved in nitrogen mustard (NM induced kidney damage. In this experimen, aminoguanidine (AG as inducible nitric oxide synthase (iNOS inhibitor and ebselen as peroxynitrite scavenger were used. NM administration resulted in important oxidant and antioxidant changes as well as tissue damage in kidneys. Therapeutic agents showed significant protection and reduced oxidant parameteres leading to tissue healing was observed. Results of this study suggest that drugs with similar properties can be used to protect kidney damage caused by NM. [TAF Prev Med Bull. 2007; 6(4: 227-232

  2. Investigation of Acute Toxicity of a Chemical Warfare Agent in Kidneys

    Directory of Open Access Journals (Sweden)

    Turgut Topal

    2007-08-01

    Full Text Available One of the most important chemical warfare agents, sulfur mustard (SM causes crucial acute and chronic toxic effects. Lung, skin, eye and kidneys are the most affected organs. In this work, it was investigated if increased nitric oxide (NO and peroxynitrite are involved in nitrogen mustard (NM induced kidney damage. In this experimen, aminoguanidine (AG as inducible nitric oxide synthase (iNOS inhibitor and ebselen as peroxynitrite scavenger were used. NM administration resulted in important oxidant and antioxidant changes as well as tissue damage in kidneys. Therapeutic agents showed significant protection and reduced oxidant parameteres leading to tissue healing was observed. Results of this study suggest that drugs with similar properties can be used to protect kidney damage caused by NM. [TAF Prev Med Bull 2007; 6(4.000: 227-232

  3. Recombinant paracoccin reproduces the biological properties of the native protein and induces protective Th1 immunity against Paracoccidioides brasiliensis infection.

    Directory of Open Access Journals (Sweden)

    Ana Claudia Paiva Alegre

    2014-04-01

    Full Text Available BACKGROUND: Paracoccin is a dual-function protein of the yeast Paracoccidioides brasiliensis that has lectin properties and N-acetylglucosaminidase activities. Proteomic analysis of a paracoccin preparation from P. brasiliensis revealed that the sequence matched that of the hypothetical protein encoded by PADG-3347 of isolate Pb-18, with a polypeptide sequence similar to the family 18 endochitinases. These endochitinases are multi-functional proteins, with distinct lectin and enzymatic domains. METHODOLOGY/PRINCIPAL FINDINGS: The multi-exon assembly and the largest exon of the predicted ORF (PADG-3347, was cloned and expressed in Escherichia coli cells, and the features of the recombinant proteins were compared to those of the native paracoccin. The multi-exon protein was also used for protection assays in a mouse model of paracoccidioidomycosis. CONCLUSIONS/SIGNIFICANCE: Our results showed that the recombinant protein reproduced the biological properties described for the native protein-including binding to laminin in a manner that is dependent on carbohydrate recognition-showed N-acetylglucosaminidase activity, and stimulated murine peritoneal macrophages to produce high levels of TNF-α and nitric oxide. Considering the immunomodulatory potential of glycan-binding proteins, we also investigated whether prophylactic administration of recombinant paracoccin affected the course of experimental paracoccidioidomycosis in mice. In comparison to animals injected with vehicle (controls, mice treated with recombinant paracoccin displayed lower pulmonary fungal burdens and reduced pulmonary granulomas. These protective effects were associated with augmented pulmonary levels of IL-12 and IFN-γ. We also observed that injection of paracoccin three days before challenge was the most efficient administration protocol, as the induced Th1 immunity was balanced by high levels of pulmonary IL-10, which may prevent the tissue damage caused by exacerbated

  4. Chemical Warfare Agent Degradation and Decontamination

    Energy Technology Data Exchange (ETDEWEB)

    Talmage, Sylvia Smith [ORNL; Watson, Annetta Paule [ORNL; Hauschild, Veronique [U.S. Environmental Protection Agency; Munro, Nancy B [ORNL; King, J. [U.S. Army Environmental Center

    2007-02-01

    The decontamination of chemical warfare agents (CWA) from structures, environmental media, and even personnel has become an area of particular interest in recent years due to increased homeland security concerns. In addition to terrorist attacks, scenarios such as accidental releases of CWA from U.S. stockpile sites or from historic, buried munitions are also subjects for response planning. To facilitate rapid identification of practical and effective decontamination approaches, this paper reviews pathways of CWA degradation by natural means as well as those resulting from deliberately applied solutions and technologies; these pathways and technologies are compared and contrasted. We then review various technologies, both traditional and recent, with some emphasis on decontamination materials used for surfaces that are difficult to clean. Discussion is limited to the major threat CWA, namely sulfur mustard (HD, bis(2-chloroethyl)sulfide), VX (O-ethyl S-(2-diisopropylaminoethyl) methylphosphonothioate), and the G-series nerve agents. The principal G-agents are GA (tabun, ethyl N,N-dimethylphosphoramidocyanidate), GB (sarin, isopropyl methylphosphonofluoridate), and GD (soman, pinacolyl methylphosphonofluoridate). The chemical decontamination pathways of each agent are outlined, with some discussion of intermediate and final degradation product toxicity. In all cases, and regardless of the CWA degradation pathway chosen for decontamination, it will be necessary to collect and analyze pertinent environmental samples during the treatment phase to confirm attainment of clearance levels.

  5. Methods for chemical synthesis of biologically active compounds using supramolecular protective groups and novel compounds obtainable Thereby

    NARCIS (Netherlands)

    HERRMANN, ANDREAS; BASTIAN ANDREAS, ALEXANDER; MARCOZZI, ALESSIO

    2014-01-01

    The invention relates to drug development and synthetic chemistry, in particular to the manufacture of biologically active compounds based on naturally occurring molecules. It also relates to novel biologically active compounds, for example aminoglycoside antibiotics, in a substantially pure

  6. Multifunctional ultra-high vacuum apparatus for studies of the interactions of chemical warfare agents on complex surfaces

    Energy Technology Data Exchange (ETDEWEB)

    Wilmsmeyer, Amanda R.; Morris, John R. [Department of Chemistry, Virginia Tech, Blacksburg, Virginia 24061 (United States); Gordon, Wesley O.; Mantooth, Brent A.; Lalain, Teri A. [Research and Technology Directorate, U.S. Army Edgewood Chemical Biological Center, Aberdeen Proving Ground, Maryland 21010 (United States); Davis, Erin Durke [OptiMetrics, Inc., Abingdon, Maryland 21009 (United States)

    2014-01-15

    A fundamental understanding of the surface chemistry of chemical warfare agents is needed to fully predict the interaction of these toxic molecules with militarily relevant materials, catalysts, and environmental surfaces. For example, rules for predicting the surface chemistry of agents can be applied to the creation of next generation decontaminants, reactive coatings, and protective materials for the warfighter. Here, we describe a multifunctional ultra-high vacuum instrument for conducting comprehensive studies of the adsorption, desorption, and surface chemistry of chemical warfare agents on model and militarily relevant surfaces. The system applies reflection-absorption infrared spectroscopy, x-ray photoelectron spectroscopy, and mass spectrometry to study adsorption and surface reactions of chemical warfare agents. Several novel components have been developed to address the unique safety and sample exposure challenges that accompany the research of these toxic, often very low vapor pressure, compounds. While results of vacuum-based surface science techniques may not necessarily translate directly to environmental processes, learning about the fundamental chemistry will begin to inform scientists about the critical aspects that impact real-world applications.

  7. Reevaluation of 1999 Health-Based Environmental Screening Levels (HBESLs) for Chemical Warfare Agents

    Energy Technology Data Exchange (ETDEWEB)

    Watson, Annetta Paule [ORNL; Dolislager, Fredrick G [ORNL

    2007-05-01

    This report evaluates whether new information and updated scientific models require that changes be made to previously published health-based environmental soil screening levels (HBESLs) and associated environmental fate/breakdown information for chemical warfare agents (USACHPPM 1999). Specifically, the present evaluation describes and compares changes that have been made since 1999 to U.S. Environmental Protection Agency (EPA) risk assessment models, EPA exposure assumptions, as well as to specific chemical warfare agent parameters (e.g., toxicity values). Comparison was made between screening value estimates recalculated with current assumptions and earlier health-based environmental screening levels presented in 1999. The chemical warfare agents evaluated include the G-series and VX nerve agents and the vesicants sulfur mustard (agent HD) and Lewisite (agent L). In addition, key degradation products of these agents were also evaluated. Study findings indicate that the combined effect of updates and/or changes to EPA risk models, EPA default exposure parameters, and certain chemical warfare agent toxicity criteria does not result in significant alteration to the USACHPPM (1999) health-based environmental screening level estimates for the G-series and VX nerve agents or the vesicant agents HD and L. Given that EPA's final position on separate Tier 1 screening levels for indoor and outdoor worker screening assessments has not yet been released as of May 2007, the study authors find that the 1999 screening level estimates (see Table ES.1) are still appropriate and protective for screening residential as well as nonresidential sites. As such, risk management decisions made on the basis of USACHPPM (1999) recommendations do not require reconsideration. While the 1999 HBESL values are appropriate for continued use as general screening criteria, the updated '2007' estimates (presented below) that follow the new EPA protocols currently under development

  8. Concepto y fuentes para el estudio de la Information Warfare

    OpenAIRE

    Tramullas Saz, Jesús

    1998-01-01

    En este trabajo se aborda el concepto de Información Warfare, así como las principales definiciones que se han propuesto para el mismo. Se establecen los diferentes tipos de acciones que se inscriben en este ámbito, y se delinean algunas implicaciones para el especialista en información. Como punto de partida para su estudio, se incluyen una selección de fuentes de información sobre el tema objeto de estudio. ABSTRACT: This paper broaches the concept of Information Warfare, as ...

  9. PROTECTING ECOSYSTEMS BY WAY OF BIOLOGICAL CONTROL: CURSORY REFLECTIONS ON THE MAIN REGULATORY INSTRUMENTS FOR BIOLOGICAL CONTROL AGENTS, PRESENT AND FUTURE

    Directory of Open Access Journals (Sweden)

    R Alberts

    2013-06-01

    Full Text Available Although there are numerous threats to ecosystems and the resultant ecosystem services, alien and invasive plants (AIP have been identified as being one of the major causes of ecosystem destruction. In addressing the threat of alien and invasive plants through the use of various mechanisms, the regulatory framework imposed by legislation is key in ensuring that that controlling AIPs does in fact not do more harm than good. One such control mechanism, which has the potential to do wonders or wreak havoc if not adroitly implemented, is that of using biological control agents. This contribution provides a brief overview on the three main regulatory instruments used to control biological control agents in South Africa, namely the Conservation of Agricultural Resources Act 43 of 1983, the Agricultural Pests Act 36 of 1983 and the National Environmental Management: Biodiversity Act 10 of 2004. It also considers possible future developments on the regulation of biological control agents.

  10. Evaluation of biological nematicides on the control of root-knot nematode (Meloidogyne incognita Chitwood at protected crops house in tomato (Lycopersicon esculentum Mill.

    Directory of Open Access Journals (Sweden)

    Pedro Fidel Fuentes Chaviano

    2011-06-01

    Full Text Available This research was carried out on Tomato (Lycopersicon esculentum Mill. variety HA 3105 at the protected crops houses in Empresa Azucarera Melanio Hernández of Sancti Spiritus, located at the southwest of Tuinucú, from November 2009 to May 2010 with the objective of evaluating the effectiveness of biological nematicides on the control of the root-knot nematode, Meloidogyne incognita Chitwood. Three treatments were used: Agrocelhone, biological nematicide HeberNem and HeberNem + Trichoderma. Biological nematicides showed better results than Agrocelhone regarding the length of the leaf, the height of the plant, the yield of tomato and the control of nematodes HeberNem showed the best results in the control of the nematode, decreasing the infestation from degree V to degree II.

  11. Employing U.S. Information Operations Against Hybrid Warfare Threats

    Science.gov (United States)

    2013-03-01

    activities” ( CEMA ), which is a combination of Cyber and Electronic Warfare.115 However, the relationship between cyber and EW must be carefully considered...generating effects by themselves, as well as serving as a delivery means for MISO. The focus of CEMA may be as much to support combat operations

  12. Anti-submarine warfare with continuously active sonar

    NARCIS (Netherlands)

    Vossen, R. van; Beerens, S.P.; Spek, E. van der

    2011-01-01

    Existing surveillance sonar systems for anti-submarine warfare (ASW) use a pulsed sonar deployed at a low duty cycle. Continuously active sonar (CAS) is of special interest since the technique could provide better detection performance than conventional pulsed sonar, and it will provide the operator

  13. Trends in underwater warfare : From an underwater acoustics perspective

    NARCIS (Netherlands)

    Ort, C.M.; Driessen, F.P.G.

    2002-01-01

    Technological developments concerning underwater systems for Anti Submarine Warfare (ASW) and Mine Counter Measures (MCM) are directed at optimally countering the underwater threat in the near future. Countering the existing underwater threat is already extremely difficult, but there are several tre

  14. Public Discussion of Nuclear Warfare: A Time for Hope.

    Science.gov (United States)

    Cooper, Martha

    Anti-nuclear discourse, which peaked in 1981-82, signaled an emergence of public discourse on the nuclear warfare issue. During the development of the original atomic bomb, public discussion of the issue was severely restricted, but immediately after the bombing of Hiroshima and Nagasaki, discourse on the subject increased. During the Cold War…

  15. Reactivity of Dual-Use Decontaminants with Chemical Warfare Agents

    Science.gov (United States)

    2016-07-01

    decrease the logistical burden associated with transport and storage of decontaminants. The experiments in this study were focused on evaluating...propanediammonium dichloride, isopropanol, inert ingredients/water, hydrogen peroxide, diacetin Decontaminant formulated for chemical warfare agents F...potassium bisulfate, potassium sulfate, dipotassium peroxodisulfate, magnesium carbonate Acidic oxidative chemistry, used for VX laboratory waste

  16. Environmental assessments of sea dumped chemical warfare agents

    DEFF Research Database (Denmark)

    Sanderson, Hans; Fauser, Patrik

    This is a report on the information gathered during work related to sea dumped chemical warfare agents. It mainly reviews the work conducted in relation to the installation of the two Nord Stream gas pipeline from 2008-2012. The focus was on the weight-of-evidence risk assessment of disturbed CWA...

  17. Just War and Postmodern Warfare: A German Case Study

    Science.gov (United States)

    2015-04-01

    Germany’s cognitive dissonance about the importance of military force and counter-insurgency operations in Afghanistan is an uphill battle they are still...1 Summary of Walzer’s Contemporary Just War Theory : ……............................................................2 Summary of...Postmodern Warfare Theory : .......................................................................................5 German Foreign Policy and Military

  18. Ethical Considerations of Computer Network Attack in Information Warfare

    Science.gov (United States)

    2001-01-16

    attack/destruction, and special information operations (SIO). CNA and the other methods of offensive IO represent the incorporation of information...psychological operations, electronic warfare, physical attack and/or destruction, and special information operations, and could include computer network...to computer networks to record information sent over them. 41 special information operations. Information operations that by their sensitive nature

  19. Management information systems for electronic warfare command and decision support

    CSIR Research Space (South Africa)

    Van Niekerk, B

    2015-04-01

    Full Text Available information to allow them to manage their own spectrum, to identify threats, and to deny adversaries’ use of the spectrum. In this paper, the concepts of integrated electronic warfare and spectrum battle management are introduced, and the relevant information...

  20. Improving Professional Development for USAF Electronic Warfare Officers

    Science.gov (United States)

    2012-02-15

    NOTE AIR WAR COLLEGE AIR UNIVERSITY IMPROVING PROFESSIONAL DEVELOPMENT FOR USAF ELECTRONIC WARFARE OFFICERS by Gregory M. Patschke, Col...and planning. Professional development comprises both continuing education and career development. In the US Air Force, the acquisition, space...and cyberspace communities have professional development programs already in place. For the continuing education half of professional development , the

  1. Antiradiation UV Vaccine: UV Radiation, Biological effects, lesions and medical management - immune-therapy and immune-protection.

    Science.gov (United States)

    Popov, Dmitri; Jones, Jeffrey; Maliev, Slava

    rabbits, 11-12 months old, live weight 3.5-3.7 (n=11), Balb mice, 2-3 months old, live weight 20-22 g (n=33), Wistar rats, 3-4 months old, live weight 180-220 g(n=33). The studies were approved by the Animal Care and Use Committee for ethical animal research equivalent, at each institution. Seven rabbits, ten mice, eleven Wistar rats were vaccinated with a UV antiradiation vaccine. A second group of animals was used as biological control which received vaccine but no UV Radiation and a third group of animals was used as control without any interventions. Before and after UV Radiation, Vaccination with the UV antiradiation vaccine were provided 17 days prior to UV exposure. The animals were irradiated by a DRT-1 UV generator lamp. The dose of irradiation for laboratory, experimental animals was 10-12 * Standard Erythema Dose (SED) at L=283,7 Laboratory animals were placed in to the box with ventilation. Results: Ultraviolet irradiation of the skin was performed with high doses and causes an inflammation or erythema in all experimental animals. However the grade of skin damage and inflammation was significantly different between animals protected by vaccination and non-protected, non-vaccinated animals. Animals UV-irradiated, but who did not receive the antiradiation vaccine suffered from extensive UV skin burns of second or third degree (grade 2-3). However, animals protected with the UV antiradiation vaccine demonstrated much mild forms of skin cellular injury - mainly erythema, first degree skin burns and a few small patches with second degree skin burns (grade 1-2). Discussion: The severity of skin damage depended on area of exposed skin, time and dose of UV irradiation. Skin injury could be divided into 4 major grades: 1. Faint erythema with dry desquamation. 2. Moderate to severe erythema. 3. Severe erythema with blistering, moist desquamation. 4. Toxic epidermal necrolysis. Mild doses of UV radiation and ionizing radiation can induce cell death by apoptosis and

  2. Rapid Ultrasensitive Chemical-Fingerprint Detection of Chemical and Biochemical Warfare Agents

    Energy Technology Data Exchange (ETDEWEB)

    ASHBY, CAROL I.; SHEPODD, TIMOTHY J.; YELTON, WILLIAM G.; MURON, DAVID J.

    2002-12-01

    Vibrational spectra can serve as chemical fingerprints for positive identification of chemical and biological warfare molecules. The required speed and sensitivity might be achieved with surface-enhanced Raman spectroscopy (SERS) using nanotextured metal surfaces. Systematic and reproducible methods for preparing metallic surfaces that maximize sensitivity have not been previously developed. This work sought to develop methods for forming high-efficiency metallic nanostructures that can be integrated with either gas or liquid-phase chem-lab-on-a-chip separation columns to provide a highly sensitive, highly selective microanalytical system for detecting current and future chem/bio agents. In addition, improved protein microchromatographic systems have been made by the creation of acrylate-based porous polymer monoliths that can serve as protein preconcentrators to reduce the optical system sensitivity required to detect and identify a particular protein, such as a bacterial toxin.

  3. Decontamination of adsorbed chemical warfare agents on activated carbon using hydrogen peroxide solutions.

    Science.gov (United States)

    Osovsky, Ruth; Kaplan, Doron; Nir, Ido; Rotter, Hadar; Elisha, Shmuel; Columbus, Ishay

    2014-09-16

    Mild treatment with hydrogen peroxide solutions (3-30%) efficiently decomposes adsorbed chemical warfare agents (CWAs) on microporous activated carbons used in protective garments and air filters. Better than 95% decomposition of adsorbed sulfur mustard (HD), sarin, and VX was achieved at ambient temperatures within 1-24 h, depending on the H2O2 concentration. HD was oxidized to the nontoxic HD-sulfoxide. The nerve agents were perhydrolyzed to the respective nontoxic methylphosphonic acids. The relative rapidity of the oxidation and perhydrolysis under these conditions is attributed to the microenvironment of the micropores. Apparently, the reactions are favored due to basic sites on the carbon surface. Our findings suggest a potential environmentally friendly route for decontamination of adsorbed CWAs, using H2O2 without the need of cosolvents or activators.

  4. Integrated Assessment Systems for Chemical Warfare Material

    Energy Technology Data Exchange (ETDEWEB)

    A. M. Snyder; D. A. Verrill; G. L. Thinnes; K. D. Watts; R. J. McMorland

    1999-05-27

    The US Army must respond to a variety of situations involving suspect discovered, recovered, stored, and buried chemical warfare materiel (CWM). In some cases, the identity of the fill materiel and the status of the fusing and firing train cannot be visually determined due to aging of the container, or because the item is contained in an over-pack. In these cases, non-intrusive assessments are required to provide information to allow safe handling, storage, and disposal of the materiel. This paper will provide an overview of the integrated mobile and facility-based CWM assessment system prototypes that have been, and are being developed, at the Idaho National Engineering and Environmental Laboratory (INEEL) for the US Army Non-Stockpile Chemical Materiel Project. In addition, this paper will discuss advanced sensors being developed to enhance the capability of the existing and future assessment systems. The Phase I Mobile Munitions Assessment System (MMAS) is currently being used by the Army's Technical Escort Unit (TEU) at Dugway Proving Ground, Utah. This system includes equipment for non-intrusively identifying the munitions fill materiel and for assessing the condition and stability of the fuzes, firing trains, and other potential safety hazards. The system provides a self-contained, integrated command post including an on-board computer system, communications equipment, video and photographic equipment, weather monitoring equipment, and miscellaneous safety-related equipment. The Phase II MMAS is currently being tested and qualified for use by the INEEL and the US Army. The Phase II system contains several new assessment systems that significantly enhance the ability to assess CWM. A facility-based munitions assessment system prototype is being developed for the assessment of CWM stored in igloos at Pine Bluff Arsenal, Arkansas. This system is currently in the design and fabrication stages. Numerous CWM advanced sensors are being developed and tested, and

  5. FOA Information from the Research Institute of Swedish National Defence on Electronic Warfare (FOA Orientar om Electronic Warfare),

    Science.gov (United States)

    1967-01-01

    modified. If it is appears as if the psychological It is hardly likely. however. known that the opponent has a warfare element involved there- that the most...34 . -roadeatla - ".-Rhdar Raa -* * - cldignsl Toi~loieey aft u comunication , ntavigation -ctionl Examples of applications Radar bands FroquaP" UMI 0.1

  6. Weeds of Hawaii’s lands devoted to watershed protection and biodiversity conservation: Role of biological control as the missing piece in an integrated pest management strategy

    Science.gov (United States)

    Medeiros, Arthur C.; Loope, L.L.

    2011-01-01

    Despite Hawaii’s reputation as an extinction icon, significant biological resources remain, especially in watersheds, natural areas, and specialized edaphic sites (e.g., lava dry forest, coastal). While direct habitat destruction by humans continues, human-facilitated biological invaders are currently the primary agents of continuing degradation. The ability of invasive plants to have prolific seed production, efficient dispersal systems, and to become established in dense vegetation, complicated by Hawaii’s rugged topography, appears to render mechanical and chemical control as mere holding actions. Costly, ‘environmentally unfriendly’, and often ineffective, strategies using chemical and mechanical control on a large scale, despite the most valiant of efforts, can be viewed simply as attempts to buy time. Without increased levels of safely tested biological control, the seemingly inevitable result is the landscape level transformation of native forests, with potentially catastrophic consequences to cultural, biological, water, and economic resources. Increased levels of effective biological control for certain intractable invasive species appear to comprise a conspicuous ‘missing piece’ in our efforts to protect Hawaiian watersheds and other conservation lands.

  7. Understanding Coatings that Protect Plasmonic Structures for Materials Characterization and Detection and Identification of Chemical, Biological and Explosive Agents

    Science.gov (United States)

    2013-04-11

    in the following categories: Received Paper 04/11/2013 7.00 Rebecca L. Agapov, Alexei P. Sokolov , Mark D. Foster. Protecting TERS probes from...Agapov, Andrey V. Malkovskiy, Alexei .P. Sokolov , Mark D. Foster. Prolonged Blinking from TERS Probes, J. Phys. Chem. C, (04 2011): 8900. doi: 08/28...peer-reviewed journals: Agapov, R.L., Sokolov , A.P., Foster,M.D., “Protected tip enhanced Raman spectroscopy probes for the study of polymer surfaces

  8. To Protect Marine Biological Resources by Taking Advantage of International Criminal Law%利用国际刑法保护海洋生物资源

    Institute of Scientific and Technical Information of China (English)

    王吉春

    2015-01-01

    海洋生物资源是不可再生的资源,其重要性已被越来越多的国家所认识到。各国通过立法对本国领海和专属经济区的海洋生物资源进行保护。然而,对于公海领域的海洋生物资源目前为止虽然已有了相关国际协定做出了原则性的规定,但是,对于破坏海洋生物资源的行为,缺失有效的制裁方式。因此,对海洋生物资源在国际刑法的领域中探求有效的保护方式,要利用国际刑事法院打击破坏海洋生物资源的行为。%Marine biological resources are not renewable resources, the importance of which has been recognized by more and more countries.Through the legislation, countries protect their own territorial waters and marine biological resources in the exclusive economic zone.However, for the marine biological resources in international waters, although there are the relevant international agreements, it still lacks of effective sanctions for their destruction.The author hopes that effective protection can be found for the marine biological resources in the field of international criminal law, and the International Criminal Court can be used to crack down the destruction of marine biological resources.

  9. Evolution of Unmanned Aerial Warfare: A Historical Look at Remote Airpower - A Case Study in Innovation

    Science.gov (United States)

    2016-06-10

    EVOLUTION OF UNMANNED AERIAL WARFARE: A HISTORICAL LOOK AT REMOTE AIRPOWER—A CASE STUDY IN INNOVATION A thesis presented to...JUN 2016 4. TITLE AND SUBTITLE Evolution of Unmanned Aerial Warfare: A Historical Look at Remote Airpower—A Case Study in Innovation 5a...Warfare: A Historical Look at Remote Airpower—A Case Study in Innovation Approved by: , Thesis Committee Chair John T. Kuehn, Ph.D

  10. Electronic Warfare M-on-N Digital Simulation Logging Requirements and HDF5: A Preliminary Analysis

    Science.gov (United States)

    2017-04-12

    E. Jarvis Electronic Warfare M-on- N Digital Simulation Logging Requirements and HDF5: A Preliminary Analysis Advanced Techniques Branch Tactical...12-04-2017 NRL Memorandum Report Electronic Warfare M-on- N Digital Simulation Logging Requirements and HDF5: A Preliminary Analysis Donald E...ELECTRONIC WARFARE M-ON- N DIGITAL SIMULATION LOGGING REQUIREMENTS AND HDF5: A PRELIMINARY ANALYSIS 1. INTRODUCTION HDF5 technology [Folk] has been

  11. Protecting America's economy, environment, health, and security against invasive species requires a strong federal program in systematic biology

    Science.gov (United States)

    Hilda Diaz-Soltero; Amy Y. Rossman

    2011-01-01

    Systematics is the science that identifies and groups organisms by understanding their origins, relationships, and distributions. It is fundamental to understanding life on earth, our crops, wildlife, and diseases, and it provides the scientific foundation to recognize and manage invasive species. Protecting America's economy, environment, health, and security...

  12. Stuxnet and Cyber-Warfare (1/2)

    CERN Document Server

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic. Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction.   NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  13. Stuxnet and Cyber-Warfare (2/2)

    CERN Document Server

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic.   Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction. The lecturer invites comments via email to Gian.Piero.Siroli@cern.ch NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  14. History of the Chemical Warfare Service in World War II. Biological Warfare Research in the United States, Volume 2

    Science.gov (United States)

    1947-11-01

    cases only), a strain of Eaker’s feline pneumonitis virus, and the 12 XN strain of hamster pneumonitis virus. The Borg strain was 2’ v!>.-nx..mmMJiw...Strains of the Greb ccuse pneumonitis virus and the feline pneumonitis virus were also obtained from Dr. D. L. Davis of the National Institute cf...34 J.A.V.I.A., 86 (üar 1935h 2S0-S6. K.7. Meyer and B. Eddie, "Laboratory Infections Due to Erucelia,n J. Ir.fe- Pis. £.?. Ifeyer, "Tie Ecology

  15. USMC Electronic Warfare 2025: Trading Expertise for Advanced Technology

    Science.gov (United States)

    2011-04-15

    airborne electronic warlare during the transition period away from legacy equipment. EA-6B pilots and Electroilic Countermeasures Officers ( ECMOs ...Electronic Warfare (EW) capability. As an EA-6B Electronic Countenneasures Officer ( ECMO ), I anticipate that both the United States Marine Corps and all... ECMOs . An increased workload for Radio Battalion will have the same effect that the assumption of an additional function of Marine aviation will have on

  16. China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence

    OpenAIRE

    2011-01-01

    This article presents three reasons for states to use cyber warfare and shows that cyberspace is—and will continue to be—a decisive element in China's strategy to ascend in the international system. The three reasons are: deterrence through infiltration of critical infrastructure; military technological espionage to gain military knowledge; and industrial espionage to gain economic advantage. China has a greater interest in using cyberspace offensively than other actors, such as the United St...

  17. Enterprises as Inquiring Systems with Implications for Information Warfare

    Science.gov (United States)

    2014-06-01

    defined as the “integrated employment of the core capabilities of electronic warfare, computer network operations, psychological operations, military...comprehension (also explicitly included in Figure 3). The entire spectrum of deception, psychological operations, and all means to impact human-centered...with the same input data (other than ground truth) via different channels and that data must be consistent within itself. The belief in empiricism to

  18. Wrestling the Bear: The Rise of Russian Hybrid Warfare

    Science.gov (United States)

    2015-04-13

    integrity. Essentially, Russia - and more directly- Vladimir Putin perceive that Russia is in an ideological struggle with the US and Europe. 1 Carl Von...conducted in a hybrid manner, though all the instruments of national power. 31 Though the nearly continuous strategic leadership of Vladimir Putin , Russia ...with a sharp focus on Vladimir Putin ’s strategic leadership, highlights the evolution ofthe Russian brand of hybrid warfare (HW). The analysis also

  19. Beyond Mission Command: Maneuver Warfare for Cyber Command and Control

    Science.gov (United States)

    2015-05-18

    elements with maneuver warfare, mission command’s decentralization of execution through the use of mission-type orders is a more centralized form... decentralized command and control organization will instill an innovative organizational culture. Innovation will be able to freely prosper in an...warfare’s decentralized command and control doctrine to maximize military cyberspace operations. Since the establishment of U.S. Cyber Command in 2009

  20. The Enemy Below: Preparing Ground Forces for Subterranean Warfare

    Science.gov (United States)

    2013-12-01

    can endanger the lives of U.S. forces and render mechanical breaching tools inoperable. Air blowers can be used as a hasty means to ventilate a... Penguin Books, 1996). 179 Tom Mangold, The Tunnels of Cu Chi (New York, NY: Random House, 1985). 147 6. A Historical Analysis of Tunnel Warfare and... Penguin Group, 1996. 157 Lester, W. G., & Ali, A. J. “Underground Combat: Stereophonic Blasting, tunnel Rats, and the Soviet-Afghan War.” Engineer

  1. Russian and Chinese Information Warfare: Theory and Practice

    Science.gov (United States)

    2004-06-01

    Integral neurolinguistic programming •Placing essential programs into the conscious or sub- conscious mind •Subconscious suggestions that modify human...Generators of special rays •Optical systems • Neurolinguistic programming •Computer psychotechnology •The mass media •Audiovisual effects •Special effects...Information Warfare: Theory and Practice 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e

  2. Cyberspace Warfare: A New DoD Core Mission Area

    Science.gov (United States)

    2013-05-01

    states to take note. Cyber issues such as these should be seen in light of the ancient dictum that “a victorious army first wins and then seeks...Examples from ancient Greece, Prussia, and World War II are illustrated to present cases where innovative leaders adapted and modified their methods to...conduct warfare and integrated them into their strategic approach to achieve their desired end states. Alexander the Great conquered Persia in three

  3. Constitution aims to bring an end to health economy warfare.

    Science.gov (United States)

    Harding, Mary-Louise; Martin, Daniel

    2005-02-10

    A rough new constitution is being drawn up for the NHS in a bid to prevent health economies sliding into bitter 'Bradford-style' warfare in the era of foundations trusts and payment by results. The rules of engagement are part of a package of measures designed to rescue some of the government's flagship reforms amid warnings from audit chiefs on the impact of PbR.

  4. Naval electronic warfare simulation for effectiveness assessment and softkill programmability facility

    Science.gov (United States)

    Lançon, F.

    2011-06-01

    The Anti-ship Missile (ASM) threat to be faced by ships will become more diverse and difficult. Intelligence, rules of engagement constraints, fast reaction-time for effective softkill solution require specific tools to design Electronic Warfare (EW) systems and to integrate it onboard ship. SAGEM Company provides decoy launcher system [1] and its associated Naval Electronic Warfare Simulation tool (NEWS) to permit softkill effectiveness analysis for anti-ship missile defence. NEWS tool generates virtual environment for missile-ship engagement and counter-measure simulator over a wide spectrum: RF, IR, EO. It integrates EW Command & Control (EWC2) process which is implemented in decoy launcher system and performs Monte-Carlo batch processing to evaluate softkill effectiveness in different engagement situations. NEWS is designed to allow immediate EWC2 process integration from simulation to real decoy launcher system. By design, it allows the final operator to be able to program, test and integrate its own EWC2 module and EW library onboard, so intelligence of each user is protected and evolution of threat can be taken into account through EW library update. The objectives of NEWS tool are also to define a methodology for trial definition and trial data reduction. Growth potential would permit to design new concept for EWC2 programmability and real time effectiveness estimation in EW system. This tool can also be used for operator training purpose. This paper presents the architecture design, the softkill programmability facility concept and the flexibility for onboard integration on ship. The concept of this operationally focused simulation, which is to use only one tool for design, development, trial validation and operational use, will be demonstrated.

  5. Echo chamber and trench warfare dynamics in online debates.

    Science.gov (United States)

    Karlsen, Rune; Steen-Johnsen, Kari; Wollebæk, Dag; Enjolras, Bernard

    2017-06-01

    In this article, we take issue with the claim by Sunstein and others that online discussion takes place in echo chambers, and suggest that the dynamics of online debates could be more aptly described by the logic of 'trench warfare', in which opinions are reinforced through contradiction as well as confirmation. We use a unique online survey and an experimental approach to investigate and test echo chamber and trench warfare dynamics in online debates. The results show that people do indeed claim to discuss with those who hold opposite views from themselves. Furthermore, our survey experiments suggest that both confirming and contradicting arguments have similar effects on attitude reinforcement. Together, this indicates that both echo chamber and trench warfare dynamics - a situation where attitudes are reinforced through both confirmation and disconfirmation biases - characterize online debates. However, we also find that two-sided neutral arguments have weaker effects on reinforcement than one-sided confirming and contradicting arguments, suggesting that online debates could contribute to collective learning and qualification of arguments.

  6. Electronic Warfare:Issues and Challenges for Emitter Classification

    Directory of Open Access Journals (Sweden)

    Manish Gupta

    2011-04-01

    Full Text Available Electronic warfare (EW is an important capability that provides advantage to defence forces over their adversaries. Defence forces gather tactical intelligence through EW sensors, which provide the means to counter hostile actions of enemy forces. Functions of an EW system is threat detection and the area surveillance so as to determine the identity of surrounding emitters. Emitter classification system identifies possible threats by analysing intercepted signals. Problem of identifying emitters based on its intercepted signal characteristics is a challenging problem in electronic warfare studies. Major issues and challenges for emitter classification such as drifting of emitter parameters due to aging, operational characteristic of an emitter, i.e., same emitter can operate on multiple bands and multiple pulse repetition frequencies (PRFs are highlighted. A novel approach based on some well-known statistical methods, e.g., regression analysis, hypothesis testing, and discriminent analysis is proposed. The effectiveness of the proposed approach has been tested over ELINT (Electronic Intelligence data and illustrated using simulation data. The proposed approach can play a solution for wide variety of problems in emitter classification in electronic warfare studies.Defence Science Journal, 2011, 61(3, pp.228-234, DOI:http://dx.doi.org/10.14429/dsj.61.529

  7. Multiple Asparagine Deamidation of Bacillus anthracis Protective Antigen Causes Charge Isoforms Whose Complexity Correlates with Reduced Biological Activity

    Science.gov (United States)

    2007-01-01

    Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour...subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1 . REPORT DATE 1 ...FEB 2007 2. REPORT TYPE N/A 3. DATES COVERED - 4. TITLE AND SUBTITLE Multiple asparagine deamidation of Bacillus anthracis protective

  8. Biological Warfare Agents, Toxins, Vectors and Pests as Biological Terrorism Agents

    Science.gov (United States)

    2003-07-01

    synthesis of >100 amino acid polypeptides, advanced genetic manipulation). Toxins as terrorism agents: 1. Botulinum toxin 2. Ricin 3...marginatum 5. Hyalomma Anatolicum Anatolicum 6. Dermacentor spp. 7. Rhipicephalus spp. 8. Amblyomma spp. 9. Mansonia spp. 10. Culex spp. 11

  9. Guerra e desenvolvimento biológico: o caso da biotecnologia e da genômica na segunda metade do século XX Warfare and biological development: the case of biotechnology and genomics during the second half of the 20th Century

    Directory of Open Access Journals (Sweden)

    Maria Eneida de Almeida

    2006-09-01

    Full Text Available Desde a década de 1980, a Biotecnologia vem assumindo um papel cada vez mais importante dentro do planejamento estratégico das Grandes Potências, como elemento central para um novo tipo de arma ofensiva de destruição em massa e como paradigma para o planejamento de defesa e proteção de suas populações nacionais. Para defender esta tese, nosso estudo se orientou exatamente na história do deslocamento da Biologia para o centro do planejamento de defesa americano. Nosso objetivo foi investigar a existência de uma estreita relação entre o Desenvolvimento Biotecnológico, da ciência Genômica em particular, e a questão da guerra. Nossa hipótese é que a Biotecnologia se afirmou no campo da guerra, quando foram atingidos um ponto de condensação de fatos políticos e uma confluência de possibilidades biotécnicas que estimularam acentuadamente o interesse político-militar. A metodologia para a investigação desta conexão deu-se por dois caminhos: uma análise teórica, onde encontramos as origens e o mecanismo da Big Science desde a II Guerra Mundial, quando a Física assumiu o eixo central da ciência de ponta na era atômica, e desde a década de 1980, quando a Biologia passou a ocupar um lugar central; e uma análise historiográfica, acompanhando duas trajetórias convergentes que, para a nossa tese, formam o nervo central do Desenvolvimento Biotecnológico, da Guerra Biológica e do Projeto Genoma Humano.Since the 1980's, biotechnology has played an increasingly predominant role in the strategic planning of the super-powers, as the central element of a new type of mass destruction weapon as well as a model for defense planning and protection of their national populations. This study aims to demonstrate the path taken by Biology towards the core of American defense planning and also to investigate the close relationship between biotechnological development, in particular that of Genome Science and war. The specific hypothesis

  10. Biological properties of citral and its potential protective effects against cytotoxicity caused by aspirin in the IEC-6 cells.

    Science.gov (United States)

    Bouzenna, Hafsia; Hfaiedh, Najla; Giroux-Metges, Marie-Agnès; Elfeki, Abdelfattah; Talarmin, Hélène

    2017-03-01

    Citral, 3,7-dimethyl-2,6-octadienal, is a key component of several essential oils extracted from lemon-scented herbal plants. The present study was designed to investigate the antioxidant activities of citral and assess its possible protective effects against aspirin-induced toxicity in vitro. We used IEC-6 cells (rat small intestine epithelial cells). The antioxidant activities were determined by 1,1-diphenyl-2-picrylhydrazyl (DPPH), β-carotene/linoleic acid and Ferric reducing antioxidant power (FRAP). Cytotoxicity was evaluated by cell viability, anti-oxidant enzyme activities, malondialdehyde (MDA) production and by the expression of MAPKs (Mitogen-Activated Protein Kinases) pathways. According to results, citral showed an important antioxidant activity. It inhibited the oxidation of linoleic acid, a moderate DPPH was found and it showed a Ferric reducing antioxidant potential with an EC50 value of 125±28.86μg/mL. Then, the co-treatment of aspirin with citral significantly decreased the aspirin-induced cell death, and the MDA level. It modulated the superoxide dismutase (SOD) and glutathione (GSH) activities. Also, the activation of MAPKs was attenuated by citral. These findings suggest that citral can protect IEC-6 cells against aspirin-induced oxidative stress that may help to discover new chemicals out of natural antioxidant substances.

  11. Status of dental health in chemical warfare victims: The case of Isfahan, Iran

    Directory of Open Access Journals (Sweden)

    Ahmad Mottaghi

    2012-01-01

    Conclusion: Chemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  12. Metal organic frameworks for the catalytic detoxification of chemical warfare nerve agents

    Energy Technology Data Exchange (ETDEWEB)

    Hupp, Joseph T.; Farha, Omar K.; Katz, Michael J.; Mondloch, Joseph E.

    2017-04-18

    A method of using a metal organic framework (MOF) comprising a metal ion and an at least bidendate organic ligand to catalytically detoxify chemical warfare nerve agents including exposing the metal-organic-framework (MOF) to the chemical warfare nerve agent and catalytically decomposing the nerve agent with the MOF.

  13. Antidotes and treatments for chemical warfare/terrorism agents: an evidence-based review.

    Science.gov (United States)

    Rodgers, G C; Condurache, C T

    2010-09-01

    This article reviews the evidence supporting the efficacy of antidotes used or recommended for the potential chemical warfare agents of most concern. Chemical warfare agents considered include cyanide, vesicants, pulmonary irritants such as chlorine and phosgene, and nerve agents. The strength of evidence for most antidotes is weak, highlighting the need for additional research in this area.

  14. Cyber Warfare: China’s Strategy to Dominate in Cyber Space

    Science.gov (United States)

    2011-06-10

    Revolution.‖ 64Jason Fritz, ―How China will use cyber warfare to leapfrog in military competitiveness,‖ Culture Mandala : The Bulletin of the Centre for East...cyber warfare to leapfrog in military competitiveness.‖ Culture Mandala : The Bulletin of the Centre for East-West Culture and Economic Studies 8 no. 1

  15. Toxin warfare agents:recognition molecules and drugs for control%生物毒素战剂:检测识别分子与防治药物

    Institute of Scientific and Technical Information of China (English)

    王景林

    2011-01-01

    There are various types of toxins in nature. However, these toxins. which are characterized by the ready availability, easy production and high toxicity, are likely biological warfare agents. Toxin warfare agents are different from traditional bacterial and viral agents or from chemical warfare agents in that they pose a great threat because of their diverse potency and the lack of efficacious drugs. Therefore, it is quite important to develop specific. sensitive recognition molecules for detection of toxins and drugs against intoxication caused by toxin agents. This review focuses on advances in recognition molecules of toxins and some drugs used as prevention and treatment hased on the characteristics of toxin warfare agents .%自然界中存在着种类繁多的毒素物质,但最有可能用作战剂的是那些获取方便、制备容易、毒性强、施放后可致人死亡或失能的毒素.毒素战剂既不同于传统的细菌、病毒战剂,也不同于化学毒剂,其最大的威胁来自它的高毒性及缺乏有效的治疗手段.因此,发展毒素战剂的检测识别分子与防治药物就显得尤为重要.本文讨论了生物毒素战剂相关概念、特征,重点综述了毒素战剂的检测识别分子与防治药物研究进展.

  16. 15 CFR Supplement No. 1 to Part 742 - Nonproliferation of Chemical and Biological Weapons

    Science.gov (United States)

    2010-01-01

    ... Biological Weapons No. Supplement No. 1 to Part 742 Commerce and Foreign Trade Regulations Relating to...—Nonproliferation of Chemical and Biological Weapons Note: Exports and reexports of items in performance of...: (i) Equipment (for producing chemical weapon precursors and chemical warfare agents) described in...

  17. Ultra-Fast Degradation of Chemical Warfare Agents Using MOF-Nanofiber Kebabs.

    Science.gov (United States)

    Zhao, Junjie; Lee, Dennis T; Yaga, Robert W; Hall, Morgan G; Barton, Heather F; Woodward, Ian R; Oldham, Christopher J; Walls, Howard J; Peterson, Gregory W; Parsons, Gregory N

    2016-10-10

    The threat associated with chemical warfare agents (CWAs) motivates the development of new materials to provide enhanced protection with a reduced burden. Metal-organic frame-works (MOFs) have recently been shown as highly effective catalysts for detoxifying CWAs, but challenges still remain for integrating MOFs into functional filter media and/or protective garments. Herein, we report a series of MOF-nanofiber kebab structures for fast degradation of CWAs. We found TiO2 coatings deposited via atomic layer deposition (ALD) onto polyamide-6 nanofibers enable the formation of conformal Zr-based MOF thin films including UiO-66, UiO-66-NH2 , and UiO-67. Cross-sectional TEM images show that these MOF crystals nucleate and grow directly on and around the nanofibers, with strong attachment to the substrates. These MOF-functionalized nanofibers exhibit excellent reactivity for detoxifying CWAs. The half-lives of a CWA simulant compound and nerve agent soman (GD) are as short as 7.3 min and 2.3 min, respectively. These results therefore provide the earliest report of MOF-nanofiber textile composites capable of ultra-fast degradation of CWAs.

  18. Brominated 7-hydroxycoumarin-4-ylmethyls: Photolabile protecting groups with biologically useful cross-sections for two photon photolysis

    Science.gov (United States)

    Furuta, Toshiaki; Wang, Samuel S.-H.; Dantzker, Jami L.; Dore, Timothy M.; Bybee, Wendy J.; Callaway, Edward M.; Denk, Winfried; Tsien, Roger Y.

    1999-01-01

    Photochemical release (uncaging) of bioactive messengers with three-dimensional spatial resolution in light-scattering media would be greatly facilitated if the photolysis could be powered by pairs of IR photons rather than the customary single UV photons. The quadratic dependence on light intensity would confine the photolysis to the focus point of the laser, and the longer wavelengths would be much less affected by scattering. However, previous caged messengers have had very small cross sections for two-photon excitation in the IR region. We now show that brominated 7-hydroxycoumarin-4-ylmethyl esters and carbamates efficiently release carboxylates and amines on photolysis, with one- and two-photon cross sections up to one or two orders of magnitude better than previously available. These advantages are demonstrated on neurons in brain slices from rat cortex and hippocampus excited by glutamate uncaged from N-(6-bromo-7-hydroxycoumarin-4-ylmethoxycarbonyl)-l-glutamate (Bhc-glu). Conventional UV photolysis of Bhc-glu requires less than one-fifth the intensities needed by one of the best previous caged glutamates, γ-(α-carboxy-2-nitrobenzyl)-l-glutamate (CNB-glu). Two-photon photolysis with raster-scanned femtosecond IR pulses gives the first three-dimensionally resolved maps of the glutamate sensitivity of neurons in intact slices. Bhc-glu and analogs should allow more efficient and three-dimensionally localized uncaging and photocleavage, not only in cell biology and neurobiology but also in many technological applications. PMID:9990000

  19. A piecewise regression approach for determining biologically relevant hydraulic thresholds for the protection of fish at river infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Boys, Craig A.; Robinson, Wayne; Miller, Brett; Pflugrath, Brett D.; Baumgartner, Lee J.; Navarro, Anna; Brown, Richard S.; Deng, Zhiqun

    2016-05-13

    Barotrauma injury can occur when fish are exposed to rapid decompression during downstream passage through river infrastructure. A piecewise regression approach was used to objectively quantify barotrauma injury thresholds in two physoclistous species (Murray cod Maccullochella peelii and silver perch Bidyanus bidyanus) following simulated infrastructure passage in barometric chambers. The probability of injuries such as swim bladder rupture; exophthalmia; and haemorrhage and emphysema in various organs increased as the ratio between the lowest exposure pressure and the acclimation pressure (ratio of pressure change RPCE/A) fell. The relationship was typically non-linear and piecewise regression was able to quantify thresholds in RPCE/A that once exceeded resulted in a substantial increase in barotrauma injury. Thresholds differed among injury types and between species but by applying a multi-species precautionary principle, the maintenance of exposure pressures at river infrastructure above 70% of acclimation pressure (RPCE/A of 0.7) should sufficiently protect downstream migrating juveniles of these two physoclistous species. These findings have important implications for determining the risk posed by current infrastructures and informing the design and operation of new ones.

  20. Ultraviolet Raman scattering from persistent chemical warfare agents

    Science.gov (United States)

    Kullander, Fredrik; Wästerby, Pär.; Landström, Lars

    2016-05-01

    Laser induced Raman scattering at excitation wavelengths in the middle ultraviolet was examined using a pulsed tunable laser based spectrometer system. Droplets of chemical warfare agents, with a volume of 2 μl, were placed on a silicon surface and irradiated with sequences of laser pulses. The Raman scattering from V-series nerve agents, Tabun (GA) and Mustard gas (HD) was studied with the aim of finding the optimum parameters and the requirements for a detection system. A particular emphasis was put on V-agents that have been previously shown to yield relatively weak Raman scattering in this excitation band.

  1. Women and Warfare in Pre-Colonial Akokoland

    Directory of Open Access Journals (Sweden)

    Olusanya Faboyede

    2013-06-01

    Full Text Available In pre-colonial Akokoland, the most conspicuous fact about its political economy and peace was security challenges and mismanagement through internal and external manipulation. This paper analyses the role of women in warfare in pre-colonial Akokoland as a potential to integrate Akokoland, a multi-cultural community for productive and sustained effort to promote economic development in the region. Thus, the paper is conceptualised on historical objectivity. The paper argues that one of the ways of dealing with the scale of insecurity in the society is to assimilate historical thinking into the intention of the security agents (women warriors.

  2. Are Fish and Standardized FETAX Assays Protective Enough for Amphibians? A Case Study on Xenopus laevis Larvae Assay with Biologically Active Substances Present in Livestock Wastes

    Directory of Open Access Journals (Sweden)

    Federica Martini

    2012-01-01

    Full Text Available Biologically active substances could reach the aquatic compartment when livestock wastes are considered for recycling. Recently, the standardized FETAX assay has been questioned, and some researchers have considered that the risk assessment performed on fish could not be protective enough to cover amphibians. In the present study a Xenopus laevis acute assay was developed in order to compare the sensitivity of larvae relative to fish or FETAX assays; veterinary medicines (ivermectin, oxytetracycline, tetracycline, sulfamethoxazole, and trimethoprim and essential metals (zinc, copper, manganese, and selenium that may be found in livestock wastes were used for the larvae exposure. Lethal (LC50 and sublethal effects were estimated. Available data in both, fish and FETAX studies, were in general more protective than values found out in the current study, but not in all cases. Moreover, the presence of nonlethal effects, caused by ivermectin, zinc, and copper, suggested that several physiological mechanisms could be affected. Thus, this kind of effects should be deeply investigated. The results obtained in the present study could expand the information about micropollutants from livestock wastes on amphibians.

  3. Are Fish and Standardized FETAX Assays Protective Enough for Amphibians? A Case Study on Xenopus laevis Larvae Assay with Biologically Active Substances Present in Livestock Wastes

    Science.gov (United States)

    Martini, Federica; Tarazona, José V.; Pablos, M. Victoria

    2012-01-01

    Biologically active substances could reach the aquatic compartment when livestock wastes are considered for recycling. Recently, the standardized FETAX assay has been questioned, and some researchers have considered that the risk assessment performed on fish could not be protective enough to cover amphibians. In the present study a Xenopus laevis acute assay was developed in order to compare the sensitivity of larvae relative to fish or FETAX assays; veterinary medicines (ivermectin, oxytetracycline, tetracycline, sulfamethoxazole, and trimethoprim) and essential metals (zinc, copper, manganese, and selenium) that may be found in livestock wastes were used for the larvae exposure. Lethal (LC50) and sublethal effects were estimated. Available data in both, fish and FETAX studies, were in general more protective than values found out in the current study, but not in all cases. Moreover, the presence of nonlethal effects, caused by ivermectin, zinc, and copper, suggested that several physiological mechanisms could be affected. Thus, this kind of effects should be deeply investigated. The results obtained in the present study could expand the information about micropollutants from livestock wastes on amphibians. PMID:22629159

  4. Evaluation of the Modern State of Water Ecosystems and the Issues with Protecting Biological Resources During Development of the Kruzenshternskoye Gas Condensate Field

    Directory of Open Access Journals (Sweden)

    Vladimir Dmitrievich Bogdanov

    2015-09-01

    Full Text Available In the article, the results of the studies of the present state of freshwater ecosystems and their biotic components in the western part of the Yamal Peninsula are presented. Based on the evaluation of the structure of the communities of phytoplankton, zooplankton, benthos and whitefishes, the range of the problems related to the protection of biological resources at the development of the Kruzenshternskoye gas field is defined. Data on species composition and quantitative indicators of hydrobionts of different types of waterbodies and watercourses in the lower reaches of the Mordyyakha and Naduyyakha rivers basins are the basis for environmental monitoring of water objects at development and exploitation of the Kruzenshternskoye gas field. According to the monitoring program, evaluation of the fish fauna state and their food base on the territory of the Kruzenshternskoye gas condensate field (GCF, is present. The zones of rivers deltas are the most important areas of the salmonid and whitefishes valuable fish species feeding at the territory of Kruzenshternskoye GCF. In the cases where complete demolish of waterbodies and watercourses for construction of facilities for GCF does not occur, changes of quantitative and qualitative characteristics of communities of hydrobionts after cease of works are reversible. River ecosystems are restored within a more short period of time in comparison to lacustrine ones. On the basis of conducted comprehensive studies, the proposals for the protection of fisheries resources and monitoring of aquatic ecosystems are reported. Recommendations for reducing the anthropogenic impact on aquatic ecosystems in the development period are presented. The results of the investigation were used in the designing the environmental protection part of the Kruzenshternskoye deposit project. At present, the disturbances in the territory of Kruzenshternskoye deposit of gas does not impact the aquatic ecosystems

  5. Protection against LPS-induced cartilage inflammation and degradation provided by a biological extract of Mentha spicata.

    Science.gov (United States)

    Pearson, Wendy; Fletcher, Ronald S; Kott, Laima S; Hurtig, Mark B

    2010-05-11

    A variety of mint [Mentha spicata] has been bred which over-expresses Rosmarinic acid (RA) by approximately 20-fold. RA has demonstrated significant anti-inflammatory activity in vitro and in small rodents; thus it was hypothesized that this plant would demonstrate significant anti-inflammatory activity in vitro. The objectives of this study were: a) to develop an in vitro extraction procedure which mimics digestion and hepatic metabolism, b) to compare anti-inflammatory properties of High-Rosmarinic-Acid Mentha spicata (HRAM) with wild-type control M. spicata (CM), and c) to quantify the relative contributions of RA and three of its hepatic metabolites [ferulic acid (FA), caffeic acid (CA), coumaric acid (CO)] to anti-inflammatory activity of HRAM. HRAM and CM were incubated in simulated gastric and intestinal fluid, liver microsomes (from male rat) and NADPH. Concentrations of RA, CA, CO, and FA in simulated digest of HRAM (HRAMsim) and CM (CMsim) were determined (HPLC) and compared with concentrations in aqueous extracts of HRAM and CM. Cartilage explants (porcine) were cultured with LPS (0 or 3 microg/mL) and test article [HRAMsim (0, 8, 40, 80, 240, or 400 microg/mL), or CMsim (0, 1, 5 or 10 mg/mL), or RA (0.640 microg/mL), or CA (0.384 microg/mL), or CO (0.057 microg/mL) or FA (0.038 microg/mL)] for 96 h. Media samples were analyzed for prostaglandin E2 (PGE2), interleukin 1beta (IL-1), glycosaminoglycan (GAG), nitric oxide (NO) and cell viability (differential live-dead cell staining). RA concentration of HRAMsim and CMsim was 49.3 and 0.4 microg/mL, respectively. CA, FA and CO were identified in HRAMsim but not in aqueous extract of HRAM. HRAMsim (> or = 8 microg/mL) inhibited LPS-induced PGE2 and NO; HRAMsim (> or = 80 microg/mL) inhibited LPS-induced GAG release. RA inhibited LPS-induced GAG release. No anti-inflammatory or chondroprotective effects of RA metabolites on cartilage explants were identified. Our biological extraction procedure produces a

  6. Protection against LPS-induced cartilage inflammation and degradation provided by a biological extract of Mentha spicata

    Directory of Open Access Journals (Sweden)

    Kott Laima S

    2010-05-01

    Full Text Available Abstract Background A variety of mint [Mentha spicata] has been bred which over-expresses Rosmarinic acid (RA by approximately 20-fold. RA has demonstrated significant anti-inflammatory activity in vitro and in small rodents; thus it was hypothesized that this plant would demonstrate significant anti-inflammatory activity in vitro. The objectives of this study were: a to develop an in vitro extraction procedure which mimics digestion and hepatic metabolism, b to compare anti-inflammatory properties of High-Rosmarinic-Acid Mentha spicata (HRAM with wild-type control M. spicata (CM, and c to quantify the relative contributions of RA and three of its hepatic metabolites [ferulic acid (FA, caffeic acid (CA, coumaric acid (CO] to anti-inflammatory activity of HRAM. Methods HRAM and CM were incubated in simulated gastric and intestinal fluid, liver microsomes (from male rat and NADPH. Concentrations of RA, CA, CO, and FA in simulated digest of HRAM (HRAMsim and CM (CMsim were determined (HPLC and compared with concentrations in aqueous extracts of HRAM and CM. Cartilage explants (porcine were cultured with LPS (0 or 3 μg/mL and test article [HRAMsim (0, 8, 40, 80, 240, or 400 μg/mL, or CMsim (0, 1, 5 or 10 mg/mL, or RA (0.640 μg/mL, or CA (0.384 μg/mL, or CO (0.057 μg/mL or FA (0.038 μg/mL] for 96 h. Media samples were analyzed for prostaglandin E2 (PGE2, interleukin 1β (IL-1, glycosaminoglycan (GAG, nitric oxide (NO and cell viability (differential live-dead cell staining. Results RA concentration of HRAMsim and CMsim was 49.3 and 0.4 μg/mL, respectively. CA, FA and CO were identified in HRAMsim but not in aqueous extract of HRAM. HRAMsim (≥ 8 μg/mL inhibited LPS-induced PGE2 and NO; HRAMsim (≥ 80 μg/mL inhibited LPS-induced GAG release. RA inhibited LPS-induced GAG release. No anti-inflammatory or chondroprotective effects of RA metabolites on cartilage explants were identified. Conclusions Our biological extraction procedure produces

  7. Essential oils as biological alternatives to protect date palm (Phoenix dactylifera L. against Ectomyelois ceratoniae Zeller (Lepidoptera: Pyralidae

    Directory of Open Access Journals (Sweden)

    Ismail Amri

    2014-09-01

    Full Text Available The aims of this research were to determine the chemical composition of the essential oil of three Tunisian plants and to evaluate their biological activity against eggs, larvae, and adult insects of Ectomyelois ceratoniae Zeller. The essential oils extracted from leaves of Thymus capitatus (L. Hoffmanns. & Link, Rosmarinus officinalis L. and needles of Pinus halepensis Mill. were analyzed by gas chromatography-mass spectrometry; 34, 16, and 56 constituents were identified, respectively. The major constituents were (Z-caryophyllene (23.8%, β-myrcene (20.5% and α-pinene (13.3% in P. halepensis oil, carvacrol (66.9%, p-cymene (9.1%, and δ-terpinene (6.2% in T. capitatus oil and 1,8-cineole (47.5%, camphor (14.9%, α-pinene (14.1%, and borneol (13.1% in R. officinalis oil. The insecticidal effects of essential oils on eggs, larvae, and adults of E. ceratoniae were investigated. Ovicidal activity of oils was studied by spray on eggs while larvicidal and adulticidal activities were assessed by fumigation and spray. Number of hatched eggs was verified after 10 d, larva and adult mortalities were observed after 6, 12, and 24 h. Globally, eggs and larvae were the most resistant to the three different oils, needing higher doses to obtain a higher mortality. The spray method was most effective than fumigation. Essential oil extracted from T. capitatus proved to be very toxic towards E. ceratoniae on all three phases at the dose of 20 μL mL-1 (100% inhibition, followed by the oil from R. officinalis (90-100% inhibition, nevertheless, weak activity was obtained with P. halepensis oil (68.3-85% inhibition. Results obtained may suggest that the essential oils of T. capitatus and R. officinalis possess high insecticidal activity and therefore, can be used in biotechnological application as natural preservative in stored dates and could be useful in managing populations of E. ceratoniae in field.

  8. [New challenges in the biological weapons convention].

    Science.gov (United States)

    Sissonen, Susanna; Raijas, Tiina; Haikala, Olli; Hietala, Heikki; Virri, Markku; Nikkari, Simo

    2012-01-01

    Microbes and their toxins are biological weapons that can cause disease in humans, animals or plants, and which can be used with hostile intent in warfare and terrorism. Biological agents can be used as weapons of mass destruction and therefore, immense human and social and major economical damage can be caused. Rapid development of life sciences and technologies during the recent decades has posed new challenges to the Biological Weapons Convention. The Convention states that the States Parties to the BWC strive to ensure that the Convention remains relevant and effective, despite changes in science, technology or politics.

  9. Radiation Protection

    Energy Technology Data Exchange (ETDEWEB)

    Loos, M

    2001-04-01

    Major achievements of SCK-CEN's Radiation Protection Department in 2000 are described. The main areas for R and D of the department remain neutron dosimetry and neutron activation analysis, safeguards information handling and non-destructive assay techniques. Further activities include low-level radioactivity measurements in environmental and biological samples and radiation protection research. Finally, achievements in decision strategy research and social sciences in nuclear research are reported.

  10. China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence

    Directory of Open Access Journals (Sweden)

    Magnus Hjortdal

    2011-01-01

    Full Text Available This article presents three reasons for states to use cyber warfare and shows that cyberspace is—and will continue to be—a decisive element in China's strategy to ascend in the international system. The three reasons are: deterrence through infiltration of critical infrastructure; military technological espionage to gain military knowledge; and industrial espionage to gain economic advantage. China has a greater interest in using cyberspace offensively than other actors, such as the United States, since it has more to gain from spying on and deterring the United States than the other way around. The article also documents China's progress in cyber warfare and shows how it works as an extension of its traditional strategic thinking and the current debate within the country. Several examples of cyber attacks traceable to China are also presented. This includes cyber intrusions on a nuclear arms laboratory, attacks on defense ministries (including the Joint Strike Fighter and an airbase and the U.S. electric grid, as well as the current Google affair, which has proved to be a small part of a broader attack that also targeted the U.S. Government. There are, however, certain constraints that qualify the image of China as an aggressive actor in cyberspace. Some believe that China itself is the victim of just as many attacks from other states. Furthermore, certain actors in the United States and the West have an interest in overestimating China's capabilities in cyberspace in order to maintain their budgets.

  11. Dynamics of cover, UV-protective pigments, and quantum yield in biological soil crust communities of an undisturbed Mojave Desert shrubland

    Science.gov (United States)

    Belnap, J.; Phillips, S.L.; Smith, S.D.

    2007-01-01

    Biological soil crusts are an integral part of dryland ecosystems. We monitored the cover of lichens and mosses, cyanobacterial biomass, concentrations of UV-protective pigments in both free-living and lichenized cyanobacteria, and quantum yield in the soil lichen species Collema in an undisturbed Mojave Desert shrubland. During our sampling time, the site received historically high and low levels of precipitation, whereas temperatures were close to normal. Lichen cover, dominated by Collema tenax and C. coccophorum, and moss cover, dominated by Syntrichia caninervis, responded to both increases and decreases in precipitation. This finding for Collema spp. at a hot Mojave Desert site is in contrast to a similar study conducted at a cool desert site on the Colorado Plateau in SE Utah, USA, where Collema spp. cover dropped in response to elevated temperatures, but did not respond to changes in rainfall. The concentrations of UV-protective pigments in free-living cyanobacteria at the Mojave Desert site were also strongly and positively related to rainfall received between sampling times (R2 values ranged from 0.78 to 0.99). However, pigment levels in the lichenized cyanobacteria showed little correlation with rainfall. Quantum yield in Collema spp. was closely correlated with rainfall. Climate models in this region predict a 3.5-4.0 ??C rise in temperature and a 15-20% decline in winter precipitation by 2099. Based on our data, this rise in temperature is unlikely to have a strong effect on the dominant species of the soil crusts. However, the predicted drop in precipitation will likely lead to a decrease in soil lichen and moss cover, and high stress or mortality in soil cyanobacteria as levels of UV-protective pigments decline. In addition, surface-disturbing activities (e.g., recreation, military activities, fire) are rapidly increasing in the Mojave Desert, and these disturbances quickly remove soil lichens and mosses. These stresses combined are likely to lead to

  12. The Third World War? In The Cyberspace. Cyber Warfare in the Middle East.

    Directory of Open Access Journals (Sweden)

    Martina

    2014-06-01

    Full Text Available This article aims to provide a brief and comprehensive introduction to the issue of cyber warfare and to display the recent development in this area. Geographically, it focuses on the Middle East region, since the vast majority of the most important recent cyber attacks appeared just in there or were connected to it. The first part of the article tries to define the key notion of cyber warfare, compares it to the standard warfare and presents different types of cyber weapons that are known today. The second part points out examples of the most striking recent cyber attacks and uses them as evidences to demonstrate today's importance and dissemination of cyber warfare. Finally, the article sums up pros and cons of the cyber weapons and, in view of these, predicts a significant increase in their use in any future war conflicts.

  13. Optimizing Armed Forces Capabilities for Hybrid Warfare – New Challenge for Slovak Armed Forces

    Directory of Open Access Journals (Sweden)

    Peter PINDJÁK

    2015-09-01

    Full Text Available The paper deals with the optimization of military capabilities of the Slovak Armed Forces for conducting operations in a hybrid conflict, which represents one of the possible scenarios of irregular warfare. Whereas in the regular warfare adversaries intend to eliminate the centers of gravity of each other, most often command and control structures, in irregular conflicts, the center of gravity shifts towards the will and cognitive perception of the target population. Hybrid warfare comprises a thoroughly planned combination of conventional military approaches and kinetic operations with subversive, irregular activities, including information and cyber operations. These efforts are often accompanied by intensified activities of intelligence services, special operation forces, and even mercenary and other paramilitary groups. The development of irregular warfare capabilities within the Slovak Armed Forces will require a progressive transformation process that may turn the armed forces into a modern and adaptable element of power, capable of deployment in national and international crisis management operations.

  14. Changing the face of cyber warfare with international cyber defense collaboration

    CSIR Research Space (South Africa)

    Grobler, M

    2011-03-01

    Full Text Available of the Government, as well as cyber security and cyber warfare acts and the command and control aspects thereof. The research presented is largely theoretical in nature, focusing on recent events in the public international domain....

  15. Translational environmental biology: cell biology informing conservation.

    Science.gov (United States)

    Traylor-Knowles, Nikki; Palumbi, Stephen R

    2014-05-01

    Typically, findings from cell biology have been beneficial for preventing human disease. However, translational applications from cell biology can also be applied to conservation efforts, such as protecting coral reefs. Recent efforts to understand the cell biological mechanisms maintaining coral health such as innate immunity and acclimatization have prompted new developments in conservation. Similar to biomedicine, we urge that future efforts should focus on better frameworks for biomarker development to protect coral reefs.

  16. Electronic Warfare: Rethinking the Importance of Its Role In Military Operations

    Science.gov (United States)

    2016-06-10

    EW mindset changes. 15. SUBJECT TERMS Electronic Warfare, Vulnerability, Military, Threat , Technology, Technological 16. SECURITY...Signature: Kevin nernen, C USAF Corn i e Signatu P er e, , C Directo JointA ancedWarfighting Signature: 10 June 2016 Thesis Advisor: Approved by: School...Electronic warfare support actions taken to identify, locate sources of energy emitted by enemy systems for the purpose of providing threat warning

  17. Understanding the elementary considerations in a network warfare environment: an introductory framework

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available framework. 5.1 Constrains and Implications Several factors can constrain network warfare and have associated consequences. These include the legal issues, ethical dilemmas, technical solutions, financial impact and skill/manpower investment. Logical... the personality traits of an individual. Users will need to balance ethical dilemmas before engaging in offensive network warfare. Computers and network are powerful tools and great harm can be caused with them. Motive, attitude, values, upbringing, experience...

  18. ‘Lest we forget’*: a veteran and son share a ‘warfare tourism’ experience

    OpenAIRE

    Fallon, Paul; Robinson, Peter

    2016-01-01

    Warfare tourism’ represents an increasingly significant dimension of contemporary tourism. This paper provides a fresh perspective on participation in ‘warfare tourism’ by investigating the behaviour and experiences of a living veteran and his son returning to two theatres of war in which the veteran had served in the Royal Navy during the Second World War. Active interviews with the two family members were used to gather rich data regarding the two extended trips, which had been funded by ‘H...

  19. Enhanced formulations for neutralization of chemical, biological and industrial toxants

    Science.gov (United States)

    Tucker, Mark D [Albuqueque, NM

    2008-06-24

    An enhanced formulation and method of making that neutralizes the adverse health effects of both chemical and biological compounds, especially chemical warfare (CW) and biological warfare (BW) agents, and toxic industrial chemicals. The enhanced formulation according to the present invention is non-toxic and non-corrosive and can be delivered by a variety of means and in different phases. The formulation provides solubilizing compounds that serve to effectively render the chemical and biological compounds, particularly CW and BW compounds, susceptible to attack, and at least one reactive compound that serves to attack (and detoxify or kill) the compound. The formulation includes at least one solubilizing agent, a reactive compound, a bleaching activator and water.

  20. RELATIONAL APPROACHES REGARDING FOCUSED LOGISTICS IN MODERN WARFARE JOINT OPERATIONS

    Directory of Open Access Journals (Sweden)

    Gheorghe MINCULETE

    2015-10-01

    Full Text Available The military joint operations of the future are characterized by large concentrations of forces and conventional means on the directions that permit the exploitation of the technological superiority and the manifestation of the offensive spirit of the commanders of the joint operation force groups. Having in mind the fact that the relation between the combatant forces and the logistic ones will shift more and more in favour of the latter, the aforementioned operations will be usually supported by modern flexible logistic structures. The constituted force groups will have a significant joint force character, ensuring superior quality of the troops’ combat training, both at individual level and collective level of units and large units. The current article presents innovative aspects of focused logistics, adapted for the modern warfare, which should be designed and achieved in order to increase the operational potential of the joint force groups.

  1. Book Review: Conquest in Cyberspace: National Security and Information Warfare

    Directory of Open Access Journals (Sweden)

    Gary C. Kessler

    2007-06-01

    Full Text Available Libicki, M.C. (2007. Conquest in Cyberspace: National Security and Information Warfare. New York: Cambridge University Press. 323 pages, ISBN: 978-0-521-69214-4 (paper, US$80Reviewed by Gary C. Kessler (gary.kessler@champlain.eduMany books -- and even movies ("Live Free or Die Hard" -- are based upon the premise of an impending information war. In these scenarios -- made all too plausible by the increased frequency with which we read about and experience major information security incidents -- a Bad Guy exploits known computer security vulnerabilities in order to control major national infrastructures via the Internet so as to reap financial, economic, and/or personal power.(see PDF for full review

  2. Technological, military and social causes for the application of cyber warfare

    Directory of Open Access Journals (Sweden)

    Dragan D. Mladenović

    2012-01-01

    Full Text Available Cyber warfare is a specific new form of military conflicts the use of which is growing rapidly in the international community. However, its nature is specific and differs from all previously known forms of warfare. For the purpose of clear understanding of the nature of cyber warfare, this paper covers the basic groups of preconditions for its broad application and fast development from technological, military and social aspects. Understanding the true nature of cyber warfare is a necessary condition for building national capacities for its application that are military justified and harmonized with the international law. The paper explores the characteristic instances of cyber warfare, ranging from information propaganda to physical destruction, with the goal to determine guidelines for the possible development of cyber capacities at the national level. Based on the analysis of previous cyber warfare cases, a prediction of future development directions is made and the necessity to apply suitable methods and techniques for defense against them is analyzed.

  3. A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios

    Directory of Open Access Journals (Sweden)

    Kathryn Merrick

    2016-07-01

    Full Text Available Our increasing dependence on information technologies and autonomous systems has escalated international concern for information- and cyber-security in the face of politically, socially and religiously motivated cyber-attacks. Information warfare tactics that interfere with the flow of information can challenge the survival of individuals and groups. It is increasingly important that both humans and machines can make decisions that ensure the trustworthiness of information, communication and autonomous systems. Subsequently, an important research direction is concerned with modelling decision-making processes. One approach to this involves modelling decision-making scenarios as games using game theory. This paper presents a survey of information warfare literature, with the purpose of identifying games that model different types of information warfare operations. Our contribution is a systematic identification and classification of information warfare games, as a basis for modelling decision-making by humans and machines in such scenarios. We also present a taxonomy of games that map to information warfare and cyber crime problems as a precursor to future research on decision-making in such scenarios. We identify and discuss open research questions including the role of behavioural game theory in modelling human decision making and the role of machine decision-making in information warfare scenarios.

  4. Platform-level Distributed Warfare Model-based on Multi-Agent System Framework

    Directory of Open Access Journals (Sweden)

    Xiong Li

    2012-05-01

    Full Text Available The multi-agent paradigm has become a useful tool in solving military problems. However, one of key challenges in multi-agent model for distributed warfare could be how to describe the microcosmic  tactical warfare platforms actions. In this paper, a platform-level distributed warfare model based on multi-agent system framework is designed to tackle this challenge. The basic ideas include:  Establishing multi-agent model by mapping from tactical warfare system’s members, i.e., warfare platforms, to respective agents; performing task decomposition and task allocation by using task-tree decomposition method and improved contract net protocol model technique; and implementing simulation by presenting battlefield terrain environment analysis algorithm based on grid approach. The  simulation demonstration results show that our model provides a feasible and effective approach to supporting the abstraction and representation of microcosmic tactical actions for complex warfare system.Defence Science Journal, 2012, 62(1, pp.180-186, DOI:http://dx.doi.org/10.14429/dsj.62.964

  5. Editorial: Discovery from Lake Turkana and History of Human Warfare

    Directory of Open Access Journals (Sweden)

    Professor S. P. Singh, Ph.D.

    2016-02-01

    Full Text Available Very interesting finds have come to light of violently killed humans from Lake Turkana in the Kenyan Rift Valley around 10000 years ago. A stunning discovery of skeletons of 27 persons who are believed to have been killed at the same time and are supposed to have suffered violent wounds has been reported recently (Nature 529, 394–398, 21 January 2016. These finds belong to a period of late Pleistocene/early Holocene of the hunter-gatherer societies from Nataruk. Among the victims were men, women and children. The individuals were killed with projectiles and blunt weapons. These skeletons were found in the lagoon and were preserved very nicely. Such type of mass killing probably could never happen as a consequence of intra-group conflict. The evidence seems to be towards warfare and aggression in ancient societies. The experts ruled out the possibility of a cemetery and ceremonial burial. This discovery of 27 skeletons points to the fact that there may have been more causalities and many individuals might have escaped death at that time. According to one of the co-authors of this research Dr. R.A. Foley, the groups were elatively more densely packed populations than the hunter gatherers and had more chances of having inter-group conflicts because of sharing the resources which would have been plentiful near the lagoons and water bodies. Violence probably has been in the instinct of early humans and that the warfare among humans has a history of 10000 years or even earlier.

  6. A Square Peg in a Round Hole: A Case Study of Center Gravity Application in Counter Insurgency Warfare

    Science.gov (United States)

    2011-06-01

    D.C.: Potomac Books, 2010. Griffith, Samuel B. The Illustrated Art of War. New York: Oxford University Press, 2005. Guevara , Ernesto Che, Brian... Guevara provided another approach to insurgency, encapsulated in the concept of the foco, which he described in his 1960 work Guerrilla Warfare. The... Guevara , Guerrilla Warfare, edited by Brian Loveman and Thomas Davies, (Oxford: SR Books, 1997), 7. 21 Guevara , Guerrilla Warfare, 256. 22 Guevara

  7. [Principles of management in biological infections].

    Science.gov (United States)

    Płusa, Tadeusz

    2012-11-01

    The effectiveness of the management in respiratory infection is depending on the nature of the biological pathogen and the immune status of the patient. For this reason, providing assistance to victims the organ function support, similarly as defining the pathogen and targeted antibiotic therapy should be applied. Available diagnostic tests provide rapid ability to identify the pathogen and antibiotics are able to control infection. Lack of efficacy of treatment may indicate the diversity of the pathogen than previously known and raises suspicion of biological warfare pathogen.

  8. 护创膜在兔微粒皮移植术中的作用研究%Role of biological protective dressing in microskin grafting in rabbit

    Institute of Scientific and Technical Information of China (English)

    张卫东; 谢卫国; 赵超莉; 王辉; 刘淑华; 叶子青

    2012-01-01

    Objective To study the effect of biological protective dressing made from porcine peritoneum in covering wounds with microskin grafts.Methods Twenty New Zealand rabbits were divided into ten couples according to the random number table.Rabbits in each couple underwent surgery at the same time.A piece of full-thickness skin of 5 cm in diameter was removed symmetrically from the left and right sides of the back of each rabbit,thus forming two wounds with full-thickness skin defect.One fifth of one piece of skin of one rabbit was cut into tiny pieces of 0.2-0.5 mm in size (microskin).Then the microskin pieces were spread on the two wounds of the donor rabbit with the microskin/wound area ratio 1∶ 10.The two wounds of each rabbit covered with microskin were divided into two groups according to the random number table.One wound was covered with biological protective dressing prepared with porcine peritoneum as experiment group,and the other was covered with the rest allograft in full size obtained from the other rabbit of each couple as control group.The general condition of wound was observed at post operation week (POW) 1-4.Wound healing rate was calculated at POW 3 and 4.Wound healing time was recorded.Specimens were harvested from wounds for histological observation at POW 1-4.Data were processed with paired t test.Results (1) At POW 1,the biological protective dressings were found to attach firmly to the wounds in experiment group without obvious inflammatory response; the allografts survived well on the wounds in control group.At POW 2,the coverings attached well to the wounds of both groups,but became drier and darker as compared with those at POW 1.At POW 3,some wounds of the two groups healed when the coverings desiccated and separated.At POW 4,all the wounds of both groups healed without obvious difference in appearance.(2) The wound healing rates of the experiment and contrl groups were respectively (92.8 ± 6.2) %and (91.3±7.3)% (t =0.54,P >0

  9. Limitations and challenges in treatment of acute chemical warfare agent poisoning.

    Science.gov (United States)

    Thiermann, Horst; Worek, Franz; Kehe, Kai

    2013-12-01

    Recent news from Syria on a possible use of chemical warfare agents made the headlines. Furthermore, the motivation of terrorists to cause maximal harm shifts these agents into the public focus. For incidents with mass casualties appropriate medical countermeasures must be available. At present, the most important threats arise from nerve agents and sulfur mustard. At first, self-protection and protection of medical units from contamination is of utmost importance. Volatile nerve agent exposure, e.g. sarin, results in fast development of cholinergic crisis. Immediate clinical diagnosis can be confirmed on-site by assessment of acetylcholinesterase activity. Treatment with autoinjectors that are filled with 2mg atropine and an oxime (at present obidoxime, pralidoxime, TMB-4 or HI-6) are not effective against all nerve agents. A more aggressive atropinisation has to be considered and more effective oximes (if possible with a broad spectrum or a combination of different oximes) as well as alternative strategies to cope with high acetylcholine levels at synaptic sites should be developed. A further gap exists for the treatment of patients with sustained cholinergic crisis that has to be expected after exposure to persistent nerve agents, e.g. VX. The requirement for long-lasting artificial ventilation can be reduced with an oxime therapy that is optimized by using the cholinesterase status for guidance or by measures (e.g. scavengers) that are able to reduce the poison load substantially in the patients. For sulfur mustard poisoning no specific antidote is available until now. Symptomatic measures as used for treatment of burns are recommended together with surgical or laser debridement. Thus, huge amounts of resources are expected to be consumed as wound healing is impaired. Possible depots of sulfur mustard in tissues may aggravate the situation. More basic knowledge is necessary to improve substantially therapeutic options. The use of stem cells may provide a new

  10. Recombinant Salmonella Expressing Burkholderia mallei LPS O Antigen Provides Protection in a Murine Model of Melioidosis and Glanders.

    Directory of Open Access Journals (Sweden)

    Dina A Moustafa

    Full Text Available Burkholderia pseudomallei and Burkholderia mallei are the etiologic agents of melioidosis and glanders, respectively. These bacteria are highly infectious via the respiratory route and can cause severe and often fatal diseases in humans and animals. Both species are considered potential agents of biological warfare; they are classified as category B priority pathogens. Currently there are no human or veterinary vaccines available against these pathogens. Consequently efforts are directed towards the development of an efficacious and safe vaccine. Lipopolysaccharide (LPS is an immunodominant antigen and potent stimulator of host immune responses. B. mallei express LPS that is structurally similar to that expressed by B. pseudomallei, suggesting the possibility of constructing a single protective vaccine against melioidosis and glanders. Previous studies of others have shown that antibodies against B. mallei or B. pseudomallei LPS partially protect mice against subsequent lethal virulent Burkholderia challenge. In this study, we evaluated the protective efficacy of recombinant Salmonella enterica serovar Typhimurium SL3261 expressing B. mallei O antigen against lethal intranasal infection with Burkholderia thailandensis, a surrogate for biothreat Burkholderia spp. in a murine model that mimics melioidosis and glanders. All vaccine-immunized mice developed a specific antibody response to B. mallei and B. pseudomallei O antigen and to B. thailandensis and were significantly protected against challenge with a lethal dose of B. thailandensis. These results suggest that live-attenuated SL3261 expressing B. mallei O antigen is a promising platform for developing a safe and effective vaccine.

  11. Recombinant Salmonella Expressing Burkholderia mallei LPS O Antigen Provides Protection in a Murine Model of Melioidosis and Glanders.

    Science.gov (United States)

    Moustafa, Dina A; Scarff, Jennifer M; Garcia, Preston P; Cassidy, Sara K B; DiGiandomenico, Antonio; Waag, David M; Inzana, Thomas J; Goldberg, Joanna B

    2015-01-01

    Burkholderia pseudomallei and Burkholderia mallei are the etiologic agents of melioidosis and glanders, respectively. These bacteria are highly infectious via the respiratory route and can cause severe and often fatal diseases in humans and animals. Both species are considered potential agents of biological warfare; they are classified as category B priority pathogens. Currently there are no human or veterinary vaccines available against these pathogens. Consequently efforts are directed towards the development of an efficacious and safe vaccine. Lipopolysaccharide (LPS) is an immunodominant antigen and potent stimulator of host immune responses. B. mallei express LPS that is structurally similar to that expressed by B. pseudomallei, suggesting the possibility of constructing a single protective vaccine against melioidosis and glanders. Previous studies of others have shown that antibodies against B. mallei or B. pseudomallei LPS partially protect mice against subsequent lethal virulent Burkholderia challenge. In this study, we evaluated the protective efficacy of recombinant Salmonella enterica serovar Typhimurium SL3261 expressing B. mallei O antigen against lethal intranasal infection with Burkholderia thailandensis, a surrogate for biothreat Burkholderia spp. in a murine model that mimics melioidosis and glanders. All vaccine-immunized mice developed a specific antibody response to B. mallei and B. pseudomallei O antigen and to B. thailandensis and were significantly protected against challenge with a lethal dose of B. thailandensis. These results suggest that live-attenuated SL3261 expressing B. mallei O antigen is a promising platform for developing a safe and effective vaccine.

  12. Blast biology: a study of the primary and tertiary effects of blast in open underground protective shelters. Project 33. 1 of Operation Plumbbob

    Energy Technology Data Exchange (ETDEWEB)

    Ricmond, D.R.; Taborelli, R.V.; Bowen, I.G.

    1959-02-01

    Dogs, pigs, rabbits, guinea pigs, and mice were exposed to nuclear detonations in two open underground partitioned shelters. The shelters were of similar construction, and each was exposed to separate detonations. Each inner chamber filled through its own orifice; thus four separate pressure environments were obtained. An aerodynamic mound was placed over the escape hatch of each structure to determine its effect on the pressure-curve shape inside the chamber. In one test a sieve plate bolted across the top of the mound was evaluated. Wind protective baffles of solid plate and of heavy wire screen were installed in the shelters to compare primary and tertiary blast effects on dogs. The shelters also contained static and dynamic pressure gages, radiation detectors, telemetering devices, and, in one test, air-temperature measuring instruments, dust-collecting trays, and eight pigs for the biological assessment of thermal effects. One dog was severely injured from tertiary blast effects associated with a maximal dynamic pressure (Q) of 10.5 psi, and one was undamaged with a maximal Q of 2 psi. Primary blast effects resulting from peak overpressures of 30.3, 25.5, 9.5, and 4.1 psi were minimal. The mortality was 19% of the mice exposed to a peak pressure of 30.3 psi and 5 and 3% of the guinea pigs and mice exposed to a peak pressure of 25.5 psi. Many of the rabbits, guinea pigs, and mice sustained slight lung hemorrhages at maximum pressues of 25.5 and 30.3 psi. Eardrum perforation data for all species, except mice, were recorded. Following shot 2, thermal effects were noted. Animals of the groups saved for observation have died from ionizing-radiation effects.

  13. A preliminary assessment of the effectiveness of the Mesoamerican Biological Corridor for protecting potential Baird's tapir (Tapirus bairdii) habitat in Southern Mexico.

    Science.gov (United States)

    Mendoza, Eduardo; Fuller, Trevon L; Thomassen, Henri A; Buermann, Wolfgang; Ramírez-Mejía, Diana; Smith, Thomas B

    2013-03-01

    Baird's tapir (Tapirus bairdii) is one of the most emblematic mammals of Mesoamerica, but like other large-bodied animals, it is facing an increasing risk of extinction due primarily to habitat loss. Mexico's 'ortion of the Mesoamerican Biological Corridor (MBC-M) is located in one of the main strongholds for Bairds tapir. To assess the MBC-M's effectiveness for tapir conservation, we estimated the distribution of the species' potential habitat by applying 2 modelling approaches (random forest and Maxent) to a set of uncorrelated environmental variables and a 157-point presence dataset. We calculated the extent of tapir habitat in within the MBC-M and modelled new corridors and conservation areas, which we compared to the MBC-M. Moreover, we assessed deforestation patterns in the region. Twenty-seven percent of highly suitable tapir habitat occurred in protected areas, 15% in corridors and 58.3% was outside the MBC-M and associated reserves. The spatial configuration of the MBC-M was partially concordant with the modelled set of conservation areas and corridors. The main dissimilarity was that the modelled corridors traversed forests in Belize and Guatemala to connect conservation areas. Analyses of deforestation since 1993 and human population density in the vicinity of the MBC-M indicated that future conservation efforts should give particular attention to the Montes Azules-El Triunfo Corridor due to greater habitat threat. The MBC-M has a great potential to play a prominent role in the conservation of tapir habitat but there is an urgent need to implement management plans that reinforce and complement this conservation initiative.

  14. The effect of air permeability of chemical protective clothing material on clothing vapour resistance

    NARCIS (Netherlands)

    Havenith, G.; Vuister, R.; Wammes, L.

    1996-01-01

    One of the major problems associated with Chemical Warfare Protective Clothing (CW) is the additional heat load created by the garments. For CW-overgarments, research in the direction of reducing material thickness and thus heat and vapour resistance have not resulted in major improvements. The

  15. Passive front-ends for wideband millimeter wave electronic warfare

    Science.gov (United States)

    Jastram, Nathan Joseph

    This thesis presents the analysis, design and measurements of novel passive front ends of interest to millimeter wave electronic warfare systems. However, emerging threats in the millimeter waves (18 GHz and above) has led to a push for new systems capable of addressing these threats. At these frequencies, traditional techniques of design and fabrication are challenging due to small size, limited bandwidth and losses. The use of surface micromachining technology for wideband direction finding with multiple element antenna arrays for electronic support is demonstrated. A wideband tapered slot antenna is first designed and measured as an array element for the subsequent arrays. Both 18--36 GHz and 75--110 GHz amplitude only and amplitude/phase two element direction finding front ends are designed and measured. The design of arrays using Butler matrix and Rotman lens beamformers for greater than two element direction finding over W band and beyond using is also presented. The design of a dual polarized high power capable front end for electronic attack over an 18--45 GHz band is presented. To combine two polarizations into the same radiating aperture, an orthomode transducer (OMT) based upon a new double ridge waveguide cross section is developed. To provide greater flexibility in needed performance characteristics, several different turnstile junction matching sections are tested. A modular horn section is proposed to address flexible and ever changing operational requirements, and is designed for performance criteria such as constant gain, beamwidth, etc. A multi-section branch guide coupler and low loss Rotman lens based upon the proposed cross section are also developed. Prototyping methods for the herein designed millimeter wave electronic warfare front ends are investigated. Specifically, both printed circuit board (PCB) prototyping of micromachined systems and 3D printing of conventionally machined horns are presented. A 4--8 GHz two element array with

  16. Guerilla Warfare & Law Enforcement: Combating the 21st Century Terrorist Cell within the U.S.

    Directory of Open Access Journals (Sweden)

    Major Richard Hughbank

    2009-01-01

    Full Text Available Both domestic and international terrorist organizations employ guerrilla warfare tactics, techniques, and procedures. Thus, the ability to identify and defeat the members of these organizations, cripple their infrastructures, and disrupt their financial resources lies in the understanding of modern guerrilla warfare as it develops in the twenty-first century within the United States.3 The forms of asymmetric warfare4 adopted by domestic and international terrorist groups alike is no longer intended to gain simple media exposure or governmental manipulation; they want to make an overpowering impact by causing massive loss of life and severe damage to infrastructure and are often motivated by religious imperatives and political goals. As terrorism analyst Stephen Flynn has observed, "Throughout the 20th century [Americans] were able to treat national security as essentially an out-of-body experience. When confronted by threats, [America] dealt with them on the turf of our allies or our adversaries. Aside from the occasional disaster and heinous crime, civilian life [in the United States] has been virtually terror-free." With the turn of the twenty-first century, terrorist operations have become more prevalent in the United States and are taking shape in the form of modern guerrilla warfare, thus creating new challenges for federal, state, and local law enforcement agencies. After reviewing the origin and nature of these challenges, this article will offer some suggestions for countering guerilla warfare in the United States.

  17. Treatability study report for remediation of chemical warfare agent contaminated soils using peroxysulfate ex-situ treatment. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Pugh, J.R.; Grinstead, J.H.; Farley, J.A.; Enlow, P.D.; Kelly, D.A.

    1996-07-01

    This laboratory scale study examines the feasibility of using peroxysulfate based oxidants to remediate soils contaminated with GB, Hi, and VX. The project was conducted with chemical warfare agent simulants. The study concludes that peroxysulfates, and particularly peroxydisulfate, can degrade chemical warfare agent simulants in soil and recommends continuing research.

  18. Advances in toxicology and medical treatment of chemical warfare nerve agents

    Directory of Open Access Journals (Sweden)

    Moshiri Mohammd

    2012-11-01

    Full Text Available Abstract Organophosphorous (OP Nerve agents (NAs are known as the deadliest chemical warfare agents. They are divided into two classes of G and V agents. Most of them are liquid at room temperature. NAs chemical structures and mechanisms of actions are similar to OP pesticides, but their toxicities are higher than these compounds. The main mechanism of action is irreversible inhibition of Acetyl Choline Esterase (AChE resulting in accumulation of toxic levels of acetylcholine (ACh at the synaptic junctions and thus induces muscarinic and nicotinic receptors stimulation. However, other mechanisms have recently been described. Central nervous system (CNS depression particularly on respiratory and vasomotor centers may induce respiratory failure and cardiac arrest. Intermediate syndrome after NAs exposure is less common than OP pesticides poisoning. There are four approaches to detect exposure to NAs in biological samples: (I AChE activity measurement, (II Determination of hydrolysis products in plasma and urine, (III Fluoride reactivation of phosphylated binding sites and (IV Mass spectrometric determination of cholinesterase adducts. The clinical manifestations are similar to OP pesticides poisoning, but with more severity and fatalities. The management should be started as soon as possible. The victims should immediately be removed from the field and treatment is commenced with auto-injector antidotes (atropine and oximes such as MARK I kit. A 0.5% hypochlorite solution as well as novel products like M291 Resin kit, G117H and Phosphotriesterase isolated from soil bacterias, are now available for decontamination of NAs. Atropine and oximes are the well known antidotes that should be infused as clinically indicated. However, some new adjuvant and additional treatment such as magnesium sulfate, sodium bicarbonate, gacyclidine, benactyzine, tezampanel, hemoperfusion, antioxidants and bioscavengers have recently been used for OP NAs poisoning.

  19. Research on performance of ethernet interface in network centric warfare

    Institute of Scientific and Technical Information of China (English)

    梁永生; 张乃通

    2004-01-01

    The concept of network centric warfare (NCW) and its character, high requirement of real-time synchronization are introduced. The distributed equal-node network architecture in NCW is presented. Based on theoretical analysis on ethernet interface performance, this paper presents that forwarding latency between ethernet interface devices is a key influence factor of real-time synchronization in NCW. Ethernet fundamental is briefly introduced. The model between a switch under test (SUT) and a smartbits card is presented and used for two interconnecting switches in NCW. On condition that ignoring the latency of connecting fiber or twisted pairs and processing latency of the smartbits test system, this paper presents that clock frequency tolerance (CFT) between a SUT and a smartbits card is a leading influence factor of forwarding latency of an ethernet switch. The formulae to calculate internal forwarding latency and forwarding latency caused by its CFT are deduced. Theoretical calculation on forwarding latency of an ethernet switch based on the given CFT and test time is implemented. Experimental study on primary forwarding latency and secondary forwarding latency is implemented and forwarding latency between the SUT and the smartbits card is measured, thus testifying the accuracy of the above theoretical analysis that the CFT is a key influence factor of forwarding latency. The measures to satisfy the needs of forwarding latency in NCW are presented.

  20. Drone Warfare: Twenty-First Century Empire and Communications

    Directory of Open Access Journals (Sweden)

    Kevin Howley

    2017-02-01

    Full Text Available This paper, part of a larger project that examines drones from a social-construction of technology perspective, considers drone warfare in light of Harold Innis’s seminal work on empire and communication. Leveraging leading-edge aeronautics with advanced optics, data processing, and networked communication, drones represent an archetypal “space-biased” technology. Indeed, by allowing remote operators and others to monitor, select, and strike targets from half a world away, and in real-time, these weapon systems epitomize the “pernicious neglect of time” Innis sought to identify and remedy in his later writing. With Innis’s time-space dialectic as a starting point, then, the paper considers drones in light of a longstanding paradox of American culture: the impulse to collapse the geographical distance between the United States and other parts of the globe, while simultaneously magnifying the cultural difference between Americans and other peoples and societies. In the midst of the worldwide proliferation of drones, this quintessentially sublime technology embodies this (disconnect in important, profound, and ominous ways.

  1. Prevalence of Asthma in Children of Chemical Warfare Victims

    Science.gov (United States)

    Mirsadraee, Majid; Mozaffari, Abolfazl; Attaran, Davood

    2011-01-01

    Objective Exposure of DNA to sulfur mustard gas may increase the inheritance of asthma in chemical warfare victims' (CWV) offspring. The objective of this study was to determine the prevalence of asthma in children of CWV and compare it to asthmatic children in the general population. Methods Four hundred and nine children from 130 CWV fathers and 440 children from 145 asthmatic parents from two cities in Iran participated in this study. The prevalence of asthma was determined by standard questionnaire released for epidemiological survey of asthma in children and compared between two groups. Findings The prevalence of asthma in the CWV group was 15%; this was not significantly different from the control group (12.5%). The children of the CWV group reported a significantly greater incidence of wheezing (1.2±3.1 attacks) per year, but the control group reported more severe attacks leading to speech difficulties (3%) and coughing (7%). Regression analysis showed that with increasing family size in the control group, the number of subjects suffering from asthmatic symptoms decreases significantly (r=0.86, P=0.001). Conclusion Chemical agents may increase the prevalence of asthma in the offspring of CWV. PMID:23056804

  2. Human scalp permeability to the chemical warfare agent VX.

    Science.gov (United States)

    Rolland, P; Bolzinger, M-A; Cruz, C; Briançon, S; Josse, D

    2011-12-01

    The use of chemical warfare agents such as VX in terrorism act might lead to contamination of the civilian population. Human scalp decontamination may require appropriate products and procedures. Due to ethical reasons, skin decontamination studies usually involve in vitro skin models, but human scalp skin samples are uncommon and expensive. The purpose of this study was to characterize the in vitro permeability to VX of human scalp, and to compare it with (a) human abdominal skin, and (b) pig skin from two different anatomic sites: ear and skull roof, in order to design a relevant model. Based on the VX skin permeation kinetics and distribution, we demonstrated that (a) human scalp was significantly more permeable to VX than abdominal skin and (b) pig-ear skin was the most relevant model to predict the in vitro human scalp permeability. Our results indicated that the follicular pathway significantly contributed to the skin absorption of VX through human scalp. In addition, the hair follicles and the stratum corneum significantly contributed to the formation of a skin reservoir for VX.

  3. Status of miniature integrated UV resonance fluorescence and Raman sensors for detection and identification of biochemical warfare agents

    Science.gov (United States)

    Hug, William F.; Bhartia, Rohit; Taspin, Alexandre; Lane, Arthur; Conrad, Pamela; Sijapati, Kripa; Reid, Ray D.

    2005-11-01

    Laser induced native fluorescence (LINF) is the most sensitive method of detection of biological material including microorganisms, virus', and cellular residues. LINF is also a sensitive method of detection for many non-biological materials as well. The specificity with which these materials can be classified depends on the excitation wavelength and the number and location of observation wavelengths. Higher levels of specificity can be obtained using Raman spectroscopy but a much lower levels of sensitivity. Raman spectroscopy has traditionally been employed in the IR to avoid fluorescence. Fluorescence rarely occurs at wavelength below about 270nm. Therefore, when excitation occurs at a wavelength below 250nm, no fluorescence background occurs within the Raman fingerprint region for biological materials. When excitation occurs within electronic resonance bands of the biological target materials, Raman signal enhancement over one million typically occurs. Raman sensitivity within several hundred times fluorescence are possible in the deep UV where most biological materials have strong absorption. Since the Raman and fluorescence emissions occur at different wavelength, both spectra can be observed simultaneously, thereby providing a sensor with unique sensitivity and specificity capability. We will present data on our integrated, deep ultraviolet, LINF/Raman instruments that are being developed for several applications including life detection on Mars as well as biochemical warfare agents on Earth. We will demonstrate the ability to discriminate organic materials based on LINF alone. Together with UV resonance Raman, higher levels of specificity will be demonstrated. In addition, these instruments are being developed as on-line chemical sensors for industrial and municipal waste streams and product quality applications.

  4. SiGe-based re-engineering of electronic warfare subsystems

    CERN Document Server

    Lambrechts, Wynand

    2017-01-01

    This book equips readers with a thorough understanding of the applicability of new-generation silicon-germanium (SiGe) electronic subsystems for the military purposes of electronic warfare and defensive countermeasures. The theoretical and technical background is extensively explained and all aspects of the integration of SiGe as an enabling technology for maritime, land, and airborne (including space) electronic warfare are addressed, including research, design, development, and implementation. The coverage is supported by mathematical derivations, informative illustrations, practical examples, and case studies. While SiGe technology provides speed, performance, and price advantages in many markets, sharing of information on its use in electronic warfare systems has to date been limited, especially in developing nations. This book will therefore be warmly welcomed as an engineering guideline that focuses especially on the speed and reliability of current-generation SiGe circuits and highlights emerging innov...

  5. THE CYBER DIMENSION OF MODERN HYBRID WARFARE AND ITS RELEVANCE FOR NATO

    Directory of Open Access Journals (Sweden)

    Sorin DUCARU

    2016-06-01

    Full Text Available The technological development and the instant communication possibilities advanced not only economic and social developments, but also evolving threats from those who exploit the vulnerabilities of communication and information systems. The cyber threat landscape points to a significant increase of the frequency, intensity, duration and sophistication of cyber-attacks. One of the new and concerning trends is the use of cyber capabilities in relation with military of hybrid operations – the so-called cyber dimension of hybrid warfare. NATO’s strategy on countering hybrid warfare is based on the triad: prepare-deter-defend, which also applies to cyber. Nations represent the first line of defence in countering hybrid strategies. International cooperation is also a key factor in this sense. It is in this context that NATO’s response to cyber-attacks in the context of hybrid warfare must be further refined.

  6. Fear as a medium of communication in asymmetric forms of warfare

    DEFF Research Database (Denmark)

    Harste, Gorm

    2011-01-01

    Fear is defined as the distinction between risk and danger, a distinction that operates in communicative forms. War is always also warfare about the form of war. The article describes how fear in warfare becomes a symbolically generalized medium of communication, mainly focusing on how the form...... of fear evolves in asymmetric warfare. Asymmetric war induces fear in both parties, but in a communicative form that leads to very different experiences of fear. Fear is observed and analysed with Niklas Luhmann’s theory of self-referential systems of communication and well as his theory of risk....... Following Luhmann and in continuation of Clausewitz’ conceptual tools, yet with other means, the article proposes to observe war as a system that can de-ontologize itself and thereby concern moving centres of gravity such as communication lines, motivation, public fear as well as perceptions of risk...

  7. Skeletal evidence for Inca warfare from the Cuzco region of Peru.

    Science.gov (United States)

    Andrushko, Valerie A; Torres, Elva C

    2011-11-01

    This article addresses the bioarchaeological evidence for Inca warfare through an analysis of 454 adult skeletons from 11 sites in the Inca capital region of Cuzco, Peru. These 11 sites span almost 1000 years (AD 600-1532), which allows for a comparison of the evidence for warfare before the Inca came to power (Middle Horizon AD 600-1000), during the time of Inca ascendency in the Late Intermediate Period (AD 1000-1400), and after the Inca came to power and expanded throughout the Cuzco region and beyond (Inca Imperial Period, AD 1400-1532). The results indicate that 100 of 454 adults (22.0%) showed evidence of cranial trauma. Of these, 23 individuals had major cranial injuries suggestive of warfare, consisting of large, complete, and/or perimortem fractures. There was scant evidence for major injuries during the Middle Horizon (2.8%, 1/36) and Late Intermediate Period (2.5%, 5/199), suggesting that warfare was not prevalent in the Cuzco region before and during the Inca rise to power. Only in the Inca Imperial Period was there a significant rise in major injuries suggestive of warfare (7.8%, 17/219). Despite the significant increase in Inca times, the evidence for major cranial injuries was only sporadically distributed at Cuzco periphery sites and was entirely absent at Cuzco core sites. These findings suggest that while the Inca used warfare as a mechanism for expansion in the Cuzco region, it was only one part of a complex expansion strategy that included economic, political, and ideological means to gain and maintain control. Copyright © 2011 Wiley-Liss, Inc.

  8. NONDESTRUCTIVE IDENTIFICATION OF CHEMICAL WARFARE AGENTS AND EXPLOSIVES BY NEUTRON GENERATOR-DRIVEN PGNAA

    Energy Technology Data Exchange (ETDEWEB)

    T. R. Twomey; A. J. Caffrey; D. L. Chichester

    2007-02-01

    Prompt gamma-ray neutron activation analysis (PGNAA) is now a proven method for the identification of chemical warfare agents and explosives in military projectiles and storage containers. Idaho National Laboratory is developing a next-generation PGNAA instrument based on the new Ortec Detective mechanically-cooled HPGe detector and a neutron generator. In this paper we review PGNAA analysis of suspect chemical warfare munitions, and we discuss the advantages and disadvantages of replacing the californium-252 radioisotopic neutron source with a compact accelerator neutron generator.

  9. Particle Swarm Social Adaptive Model for Multi-Agent Based Insurgency Warfare Simulation

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Xiaohui [ORNL; Potok, Thomas E [ORNL

    2009-12-01

    To better understand insurgent activities and asymmetric warfare, a social adaptive model for modeling multiple insurgent groups attacking multiple military and civilian targets is proposed and investigated. This report presents a pilot study using the particle swarm modeling, a widely used non-linear optimal tool to model the emergence of insurgency campaign. The objective of this research is to apply the particle swarm metaphor as a model of insurgent social adaptation for the dynamically changing environment and to provide insight and understanding of insurgency warfare. Our results show that unified leadership, strategic planning, and effective communication between insurgent groups are not the necessary requirements for insurgents to efficiently attain their objective.

  10. Ethical issues in modern biological technologies.

    Science.gov (United States)

    Bhargava, Pushpa M

    2003-10-01

    Today's biology-based technologies have emerged from a historical imperative and as an inevitable consequence of developments in modern biology beginning in the last half-century. They can be classified into almost 30 different areas, ranging from the use of gene therapy for human beings, enzyme engineering, stem cells and cloning, to marine biotechnology, bioinformatics, nanotechnology and biological warfare among many others. Many of them have major sociopolitico-economic, moral, ethical and legal implications. They include genetic engineering, gene therapy, tissue culture, stem cell work, the new DNA technologies, commercialization of traditional plant-based drug formulations, assisted reproduction techniques, cloning technologies, organ transplantation, bioinformatics, and biological weapons. Examples of the ethical implications of several of these items will be considered. They will be assessed with special reference to ethical implications in respect of assisted reproduction techniques, of worldwide importance today, particularly for a country such as India.

  11. A comparison of the oral application and injection routes using the Onderstepoort Biological Products Fowl Typhoid vaccine, its safety, efficacy and duration of protection in commercial laying hens : article

    Directory of Open Access Journals (Sweden)

    C. Purchase

    2008-05-01

    Full Text Available This study was undertaken to establish whether the Onderstepoort Biological Products Fowl Typhoid (OBPft vaccine registered as an injectable vaccine was effective and safe when administered orally to commercial layers. Its efficacy and duration of protection were compared with application by intramuscular injection. Commercial brown layer hens were used as they were found to be highly susceptible to Salmonella gallinarum infections. In the vaccine safety trial birds were euthanased at timed intervals spanning 4 weeks post-vaccination. Necropsies were performed and samples were taken and tested. No clinical signs or mortalities could be attributed to the OBPft vaccine nor could active shedding of the vaccine strain be detected. Slight pathological changes were noted with both routes of vaccination; however, these changes were transient, returning to normal within the observation period. The injected groups showed a better serological response with the rapid serum plate agglutination (RSPA test than the orally vaccinated groups. In the duration of protection trial, birds were challenged at 3-8-week intervals post-vaccination. All unvaccinated birds died. Protection 8 and 16 weeks after vaccination was above 60 %, by 24 weeks after challenge, the vaccine protection was below 30 %. It was found that there was no significant difference (P < 0.05 in the protection offered by either the oral or injected route of vaccination with the OBPft vaccine.

  12. Toxicity of the Organophosphate Chemical Warfare Agents GA, GB, and VX: Implications for Public Protection.

    OpenAIRE

    Munro, N

    1994-01-01

    The nerve agents, GA, GB, and VX are organophosphorus esters that form a major portion of the total agent volume contained in the U.S. stockpile of unitary chemical munitions. Congress has mandated the destruction of these agents, which is currently slated for completion in 2004. The acute, chronic, and delayed toxicity of these agents is reviewed in this analysis. The largely negative results from studies of genotoxicity, carcinogenicity, developmental, and reproductive toxicity are also pre...

  13. Study of Sleeping in a Chemical Protective Ensemble in a Warfare Environment

    Science.gov (United States)

    1982-12-01

    levels was the same for all experiments. This sched- ule is given in Table 4. A tape-recorded soundtrack normally used for vigilance testing (Wilkinson...be tested at bedtime and upon awakening, using an acceptable method other than CO2 monitoring. g. Videotape or movie films could serve as a useful

  14. Microbial control of malaria: biological warfare against the parasite and its vector.

    Science.gov (United States)

    Abdul-Ghani, Rashad; Al-Mekhlafi, Abdulsalam M; Alabsi, Mogeeb S

    2012-02-01

    Microbial applications in malaria transmission control have drawn global attention. Mosquito midgut microbiota can modulate vector immunity and block Plasmodium development. Paratransgenic manipulation of bacterial symbionts and Wolbachia can affect reproductive characteristics of mosquitoes. Bacillus-based biolarvicides can control mosquito larvae in different breeding habitats, but their effectiveness differs according to the type of formulation applied, and the physical and ecological conditions of the environment. Entomopathogenic fungi show promise as effective and evolution-proof agents against adult mosquitoes. In addition, transgenic fungi can express anti-plasmodial effector molecules that can target the parasite inside its vector. Despite showing effectiveness in domestic environments as well as against insecticide-resistant mosquitoes, claims towards their deployability in the field and their possible use in integrated vector management programmes have yet to be investigated. Viral pathogens show efficacy in the interruption of sporogonic development of the parasite, and protozoal pathogens exert direct pathogenic potential on larvae and adults with substantial effects on mosquito longevity and fecundity. However, the technology required for their isolation and maintenance impedes their field application. Many agents show promising findings; however, the question remains about the epidemiologic reality of these approaches because even those that have been tried under field conditions still have certain limitations. This review addresses aspects of the microbial control of malaria between proof-of-concept and epidemiologic reality.

  15. Detection of Biological Warfare Agents in Municipal Tap Water via Standardized Culture Methods

    Science.gov (United States)

    2010-06-01

    0.001 % v/v Tween 80 (Fisher T164). All solutions were prepared in distilled water and filter sterilized. NaPP was made fresh daily, while the sodium...thiosulfate and Tween 80 solutions were stored for no longer than one week at 4 °C. The ultrafiltration apparatus (see Figure) was assembled after...filtration period. When filtration of the 100 L was complete, 150 mL of 0.001 % Tween 80 was aspirated into the filter as a "forward rinse" through the

  16. Chicken cathelicidin-2-derived peptides with enhanced immunomodulatory and antibacterial activities against biological warfare agents

    NARCIS (Netherlands)

    Molhoek, E.M.; van Dijk, A.; Veldhuizen, E.J.A.; Dijk-Knijnenburg, H.; Mars-Groenendijk, R.H.; Boele, L.C.L.; Kaman, W.E.; Haagsman, H.P.; Bikker, F.J.

    2010-01-01

    Host defence peptides (HDPs) are considered to be excellent candidates for the development of novel therapeutic agents. Recently, it was demonstrated that the peptide C1-15, an N-terminal segment of chicken HDP cathelicidin-2, exhibits potent antibacterial activity while lacking cytotoxicity towards

  17. Decontamination of Chemical/Biological Warfare (CBW) Agents Using an Atmospheric Pressure Plasma Jet (APPJ)

    Science.gov (United States)

    Herrmann, Hans W.

    1998-11-01

    The atmospheric pressure plasma jet (APPJ) is a non-thermal, high pressure, uniform glow discharge that produces a high velocity effluent stream of highly reactive chemical species. The discharge operates on a feedstock gas (e.g. He/O_2/H_2O) which flows between an outer, grounded, cylindrical electrode and an inner, coaxial electrode powered at 13.56 MHz RF. While passing through the plasma, the feedgas becomes excited, dissociated or ionized by electron impact. Once the gas exits the discharge volume, ions and electrons are rapidly lost by recombination, but the fast-flowing effluent still contains metastables (e.g. O2*, He*) and radicals (e.g. O, OH). These reactive species have been shown to be effective neutralizers of surrogates for anthrax spores, mustard blister agent and VX nerve gas. Unlike conventional, wet decontamination methods, the plasma effluent does not cause corrosion of most surfaces and does not damage wiring, electronics, nor most plastics. This makes it highly suitable for decontamination of high value sensitive equipment such as is found in vehicle interiors (i.e. tanks, planes...) for which there is currently no good decontamination technique. Furthermore, the reactive species rapidly degrade into harmless products leaving no lingering residue or harmful byproducts. Physics of the APPJ will be discussed and results of surface decontamination experiments using simulant and actual CBW agents will be presented.

  18. Distinct human antibody response to the biological warfare agent Burkholderia mallei.

    Science.gov (United States)

    Varga, John J; Vigil, Adam; DeShazer, David; Waag, David M; Felgner, Philip; Goldberg, Joanna B

    2012-10-01

    The genetic similarity between Burkholderia mallei (glanders) and Burkholderia pseudomallei (melioidosis) had led to the general assumption that pathogenesis of each bacterium would be similar. In 2000, the first human case of glanders in North America since 1945 was reported in a microbiology laboratory worker. Leveraging the availability of pre-exposure sera for this individual and employing the same well-characterized protein array platform that has been previously used to study a large cohort of melioidosis patients in southeast Asia, we describe the antibody response in a human with glanders. Analysis of 156 peptides present on the array revealed antibodies against 17 peptides with a > 2-fold increase in this infection. Unexpectedly, when the glanders data were compared with a previous data set from B. pseudomallei infections, there were only two highly increased antibodies shared between these two infections. These findings have implications in the diagnosis and treatment of B. mallei and B. pseudomallei infections.

  19. The DTIC Review: Volume 2, Number 4, Surviving Chemical and Biological Warfare

    Science.gov (United States)

    1996-12-01

    Septem ber 1995 ............................................................................................... 9 E lectronic R eferences...will arise substantially. Correspondingly, the US, the UK, and has been exposed to dirt, sweat, cigarette smoke, engine their allies will find defense of

  20. Integrated Biological Warfare Technology Platform (IBWTP). Intelligent Software Supporting Situation Awareness, Response, and Operations

    Science.gov (United States)

    2007-01-01

    21 4.3.1. Existing Biosurveillance Systems .............................................................. 22 4.3.2. Automatic Integration...Expert Team Risk Assessment Emergency Plans Command Centers IPE – Intelligent Portal - IPE Interactive Knowledge Wall Presentation Collaboration...such as existing biosurveillance systems, information produced via technological approaches can be incorporated into IBWTP in a fairly transparent

  1. The Rollback of South Africa’s Chemical and Biological Warfare Program

    Science.gov (United States)

    2007-11-02

    ricin and botulinum. Reportedly, they had acquired anthrax, Plague, cholera, E. coli, staph, necrotizing fasciitis , ricin, botulinum, gas gangrene, anti...before been seen. Project Coast managed to obtain the Soviet-developed flesh-eating bacteria, necrotizing fasciitis , as well as the antidote. In

  2. Analysis of the Threat of Genetically Modified Organisms for Biological Warfare

    Science.gov (United States)

    2011-05-01

    and its availability. - Simplicity and availability of required low-cost materials and equipment. - Human abuse of antibiotics and other...transgenic cattle which produce biopharmaceuticals in milk”, Theriogenology, An International Journal of animal Reproduction, Volume 53, Issue 1...infectivity. * Increase virulence/mortality rate. * Diminish host immunity or confer antibiotic resistance. * Increase survivability

  3. Comparative Analysis of Two Biological Warfare Air Samplers Using Live Surrogate Agents

    Science.gov (United States)

    2012-03-01

    bacteriophage. First, a 1L sterile Nalgene® bottle was used then 20 mL of MS2 fitrate (3 x 109) was mixed with 500 mL of Luria -Bertani broth media...broth CFU colony-forming units IPA isopropyl alcohol LBA luria -bertani agar LBB luria -bertani broth PBS phosphate buffer saline PFU

  4. Advances in Biotechnology and Genetic Engineering: Implications for the Development of New Biological Warfare Agents

    Science.gov (United States)

    1996-06-01

    fever •= Cholera •= Ricin •= Clostridium perfringens •= Shigella •= Encephalomyelitis viruses •= Smallpox •= Glanders •= Tularemia •= Hemorrhagic... transgenic animals by transferring genes from other animals into mice. 1981 Mary Harper and two colleagues mapped the gene for insulin. That year...GenPharm International, Inc. created the first transgenic dairy cow. The cow was used to produce human milk proteins for infant formula. 1990 A four

  5. Chicken cathelicidin-2-derived peptides with enhanced immunomodulatory and antibacterial activities against biological warfare agents

    NARCIS (Netherlands)

    Molhoek, E.M.; Dijk, A. van; Veldhuizen, E.J.A.; Dijk-Knijnenburg, H.; Mars-Groenendijk, R.H.; Boele, L.C.L.; Kaman-van Zanten, W.E.; Haagsman, H.P.; Bikker, F.J.

    2010-01-01

    Host defence peptides (HDPs) are considered to be excellent candidates for the development of novel therapeutic agents. Recently, it was demonstrated that the peptide C1-15, an N-terminal segment of chicken HDP cathelicidin-2, exhibits potent antibacterial activity while lacking cytotoxicity towards

  6. 78 FR 74218 - Imposition of Additional Sanctions on Syria Under the Chemical and Biological Weapons Control and...

    Science.gov (United States)

    2013-12-10

    ... Imposition of Additional Sanctions on Syria Under the Chemical and Biological Weapons Control and Warfare.... ACTION: Notice. SUMMARY: On August 2, 2013, a determination was made that the Government of Syria used... Notice 8460. That determination resulted in sanctions against the Government of Syria. Section 307(b)...

  7. A statistical analysis of the effect of warfare on the human secondary sex ratio

    NARCIS (Netherlands)

    Graffelman, J.; Hoekstra, R.F.

    2000-01-01

    Many factors have been hypothesized to affect the human secondary sex ratio (the annual percentage of males among all live births), among them race, parental ages, and birth order. Some authors have even proposed warfare as a factor influencing live birth sex ratios. The hypothesis that during and s

  8. Sandals and Robes to Business Suits and Gulf Streams: Warfare in the 21st Century

    Science.gov (United States)

    2011-04-20

    cartels, or simply shooting an American for the price of a loaf of bread to feed their families, we need to better understand what we’re facing. From...our goals, but as warfare becomes more untenable in the age of social media, as the unacceptable killing of civilians on any battlefield could lose

  9. (Review of) Reno, William. 2011. Warfare in Independent Africa. Cambridge: Cambridge University Press

    DEFF Research Database (Denmark)

    Hagmann, Tobias

    2013-01-01

    Warfare in Independent Africa is Reno’s bold attempt to analyze the modern history of African insurgencies. The book tackles this task through the prism of five generations of rebel, which left their mark on the continent; anti-colonial rebels, majority rule rebels, reform rebels, warlord rebels ...

  10. Ion mobility spectrometry and its applications in detection of chemical warfare agents.

    Science.gov (United States)

    Mäkinen, Marko A; Anttalainen, Osmo A; Sillanpää, Mika E T

    2010-12-01

    When fast detection of chemical warfare agents in the field is required, the ion mobility spectrometer may be the only suitable option. This article provides an essential survey of the different ion mobility spectrometry detection technologies. (To listen to a podcast about this feature, please go to the Analytical Chemistry multimedia page at pubs.acs.org/page/ancham/audio/index.html.).

  11. Analysis of Urinary Metabolites of Nerve and Blister Chemical Warfare Agents

    Science.gov (United States)

    2014-08-01

    Warfare Agents GA Tabun , ethyl dimethylphosphoramidate GB Sarin, isopropyl methylphosphonofluoridate GD Soman, pinacolyl methylphosphonofluoridate...and their metabolites Agent Metabolite GA, Tabun O P O N CN Ethyl Dimethylphosphoroamidate, EDMAP, GA Acid HO P O N CN GB, Sarin P O

  12. Detachment 101 in the CBI: An Unconventional Warfare Paradigm for Contemporary Special Operations

    Science.gov (United States)

    2010-05-13

    American Espionage. NY: Reynal and Hitchcock , 1946. Barrett, Neil H. Chingpaw. NY: Vantage, 1962. Bartholomew-Feis, Dixee R. The O.S.S. and Ho Chi...United States Army. Washington, D.C.: U.S. Government Printing Office, 1990. Paddock, Alfred H. U.S. Army Special Warfare; Its Origins. Lawrence, KS

  13. Development of Novel Alternative Technologies for Decontamination of Warfare Agents: Electric Heating with Intrinsically Conductive Polymers

    Science.gov (United States)

    2007-11-02

    in converting electric energy to thermal energy for the decon applications. Other conductive materials, such as polythiophenes , polypyrroles, carbon...Development of Novel Alternative Technologies for Decontamination of Warfare Agents: Electric Heating with Intrinsically Conductive Polymers...Joule)-heating with conducting polymers. The basic concept is that electrically conducting polymers, such as polyaniline, can be used as coatings or

  14. Key Planning Factors for Recovery from a Chemical Warfare Agent Incident

    Science.gov (United States)

    2012-07-01

    chemical scenario involving the release of a blister agent (mustard lewisite) would result in a waste that the State of Colorado would regulate as... Waste Management ................................................................. 24 4.3 Key Planning Factors: Recovery Planning...Planning Factors, this document presents a chemical warfare agent scenario featuring Agent Yellow, a blister agent. Agent Yellow is a mixture of

  15. Application of non-quantitative modelling in the analysis of a network warfare environment

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available of the various interacting components, a model to better understand the complexity in a network warfare environment would be beneficial. Non-quantitative modelling is a useful method to better characterize the field due to the rich ideas that can be generated...

  16. Disruption of a binary organogel by the chemical warfare agent soman (GD) and common organophosphorus simulants

    OpenAIRE

    Hiscock, Jennifer R.; Sambrook, Mark R; Ede, Jayne A.; Wells, Neil J.; Philip A. Gale

    2014-01-01

    The chemical warfare agent (CWA) soman (GD) acts as a molecular stimulus for the disruption of an anthracene-based binary organogel prepared in cyclohexane. The CWA simulants dimethyl methylphosphonate (DMMP) and diethyl chlorophosphate (DCP) were also found to disrupt the binary organogel through changes in solvent polarity and reactions with the gelator.\\ud \\ud

  17. On modeling of the evaporation of chemical warfare agents on the ground

    NARCIS (Netherlands)

    Westin, S.N.; Winter, S.; Karlsson, E.; Hin, A.; Oeseburg, F.

    1998-01-01

    A model for evaporation of chemical warfare agents on the ground has been developed. The process of evaporation is described in three steps: (1) the immediate drop enlargement due to impact momentum is modeled using an empirical correlation from technical literature; (2) further enlargement caused b

  18. From Douhet to drones, air warfare, and the evolution of targeting

    NARCIS (Netherlands)

    Osinga, F.P.B.; Roorda, M.P.; Ducheine, P.A.L.; Schmitt, M.N.; Osinga, F.P.B.

    2016-01-01

    Through the prism of the experience of air warfare, this chapter identifies key factors that have shaped targeting. These include technological developments, organizational structures, and processes and inter-service competition for scarce resources. Moreover, targeting is informed by perspectives o

  19. Evaluating Effectiveness of a Frigate in an Anti-Air Warfare (AAW) Environment

    Science.gov (United States)

    2016-06-01

    air warfare (AAW), weapon selection, unmanned aerial vehicle, simulation, design of experiments, combat systems 15. NUMBER OF PAGES 81 16. PRICE ...Explanation of a Cookie-Cutter Sensor. ........................ 19 Figure 12. Stop Conditions Menu in MANA...companies sell these deadly missiles at affordable prices to allow many countries to easily employ them onboard their warships. Missiles also offer

  20. Chemistry and biology data

    Data.gov (United States)

    U.S. Environmental Protection Agency — Chemical monitoring data and biological data from field collected samples. This dataset is associated with the following publication: Biales , A., D. Denton , D....

  1. The Implications of a Biological Weapons Convention Verification Protocol on U.S. Biological Warfare Nonproliferation Strategy

    Science.gov (United States)

    2006-05-31

    legitimate concerns of the pharmaceutical and biotechnology industry and research groups. Effectiveness of Other Means to Identify BW Threats The U.S...tripled in size since 1992. Finally the U.S. biotechnology industry is heavily engaged in research and development, having spent $15.6 billion on new...projects in 2001 ( Biotechnology Industry Organization 2003). The DNA genome patent alone could be worth billions of dollars (National Review (New York

  2. Extraordinary Adaptive Plasticity of Colorado Potato Beetle: “Ten-Striped Spearman” in the Era of Biotechnological Warfare

    Directory of Open Access Journals (Sweden)

    Aleksandar Cingel

    2016-09-01

    Full Text Available Expanding from remote areas of Mexico to a worldwide scale, the ten-striped insect, the Colorado potato beetle (CPB, Leptinotarsa decemlineata Say, has risen from being an innocuous beetle to a prominent global pest. A diverse life cycle, phenotypic plasticity, adaptation to adverse conditions, and capability to detoxify or tolerate toxins make this insect appear to be virtually “indestructible”. With increasing advances in molecular biology, tools of biotechnological warfare were deployed to combat CPB. In the last three decades, genetically modified potato has created a new challenge for the beetle. After reviewing hundreds of scientific papers dealing with CPB control, it became clear that even biotechnological means of control, if used alone, would not defeat the Colorado potato beetle. This control measure once again appears to be provoking the potato beetle to exhibit its remarkable adaptability. Nonetheless, the potential for adaptation to these techniques has increased our knowledge of this pest and thus opened possibilities for devising more sustainable CPB management programs.

  3. From energy-rich phosphate compounds to warfare agents: A review on the chemistry of organic phosphate compounds

    Directory of Open Access Journals (Sweden)

    Luciano Albino Giusti

    2008-12-01

    Full Text Available The chemistry of the phosphorus-oxygen bond is widely used in biological systems in many processes, such as energy transduction and the storage, transmission and expression of genetic information, which are essential to living beings in relation to a wide variety of functions. Compounds containing this bond have been designed for many purposes, ranging from agricultural defense systems, in order to increase food production, to nerve agents, for complaining use in warfare. In this review, features related to the chemistry of organic phosphate compounds are discussed, with particular emphasis on the role of phosphate compounds in biochemical events and in nerve agents. To this aim, the energy-rich phosphate compounds are focused, particularly the mode of their use as energy currency in cells. Historical and recent studies carried out by research groups have tried to elucidate the mechanism of action of enzymes responsible for energy transduction through the use of biochemical studies, enzyme models, and artificial enzymes. Finally, recent studies on the detoxification of nerve agents based on phosphorous esters are presented, and on the utilization of chromogenic and fluorogenic chemosensors for the detection of these phosphate species.

  4. Hydrogeologic and water-quality data for the explosive experimental area, Naval Surface Warfare Center, Dahlgren Site, Dahlgren, Virginia

    Science.gov (United States)

    Hammond, E.C.; Bell, C.F.

    1995-01-01

    Hydrogeologic and water-quality data were collected at the Explosive Experimental Area, Naval Surface Warfare Center, Dahlgren Site at Dahlgren, Virginia, as part of a hydrogeologic assessment of the shallow aquifer system begun in 1993. The U.S. Geological Survey conducted this study to provide the U.S. Navy with hydrogeologic data to aid in the evaluation of the effects from remediation of contaminated sites and to protect against additional contamination. This report describes the ground-water observation- well network, hydrogeologic, and water-quality data collected between October 1993 and April 1995. The report includes a description of the locations and construction of 28 observation wells on the Explosive Experimental Area. Hydrogeologic data include lithologic logs, geophysical logs, and vertical hydraulic conductivity measurements of selected core intervals. Hydrologic data include synoptic and hourly measurements of ground-water levels, and observation-well slug tests to determine horizontal hydraulic conductivity. Water-quality data include analyses of major dissolved constituents in ground water and surface water.

  5. Irregular Warfare and Future War: Strategy and Defense Planning; Strategic Insights, v. 10, Special issue (October 2011), 92-98. Topic: Global Trends and Future Warfare ; Part II: Technological and Doctrinal Innovation

    OpenAIRE

    Russell, James A.

    2011-01-01

    This article appeared in Strategic Insights, v.10, Special issue (October 2011), 92-98. Topic: Global Trends and Future Warfare ; Part II: Technological and Doctrinal Innovation Approved for public display, distribution unlimited The purpose of this paper is threefold: to speculate on the role and prominence of irregular warfare in the strategic environment over the next quarter century, to comment on the impact that phenomenon may have on shaping the postulated scenarios addressed in t...

  6. 生物战剂/气溶胶探测和识别系统综述%Detection and Identification System of Biological Aerosols

    Institute of Scientific and Technical Information of China (English)

    杨辉; 宗军君; 薛向锋; 侯智斌

    2015-01-01

    Easy and inexpensive manufacturing of biological weapons ,complicated detection ,expensive protection ,dif‐ficult treating of affected individuals ,selective impact only for people ,animals or plants ,are all factors making an effective defense against biological warfare agents .The aim of this study is to introduce the systems for the detection and identification of biological aerosols containing dangerous bioagents .The basic techniques used for detection and identification of bioagents are described ,including physical ,molecular ,immunochemical ,and other ligand assays .Measuring systems and equipment for the individual techniques are summarized .%生物战剂/武器具有针对性强(人体、动物或植物)、易于制造、廉价、探测困难、防护代价高、感染群体诊治困难等特性,对生物战剂的防御极具挑战性。论文对生物气溶胶/生物战剂探测识别系统的技术路线(如物理、分子、免疫及配合基检验等)、特点和运用情况进行了分析梳理和总结。

  7. Chromatography and mass spectrometry of chemical warfare agents, toxins and related compounds: state of the art and future prospects

    NARCIS (Netherlands)

    Kientz, C.E.

    1998-01-01

    Methods for the identification of chemical warfare agents, toxins, bioregulators and related products are frequently reported in literature. These methods are often based on instrumental analysis using chromatography (gas and liquid) and mass spectrometry. Here, these instrumental techniques are dis

  8. 海上核化生安全威胁与水面舰艇集体防护%Nautical nuclear chemical and biological security threat and collective protection of surface ship

    Institute of Scientific and Technical Information of China (English)

    刘虹; 刘飞; 王斌

    2011-01-01

    为保障水面舰艇形成与其任务相适应的核化生防护能力,从核化生武器扩散新样式、核化生事故、恐怖袭击、次生核化灾害等角度深入阐述并研究了海上核化生环境对水面舰艇安全的威胁.基于此背景,分析了水面舰艇核化生集体防护的技术要素、能力的必要性及其较个人防护更适合于海上环境的技术特点.另外,通过对比国外海军主战水面舰艇的集体防护能力,为我国今后集体防护设计明确了发展方向.%For ensuring nuclear, chemical, and biological(NCB) defense ability of surface ships in accord with its mission, combining with the current international condition, the nautical NCB security situation is analyzed, and the NCB threat to surface ship security is lucubrated, surrounding several main aspects including new modality of nuclear spread, NCB accident, terror raid, derivative nuclear and chemical disaster, and so on. Aiming at this threat, the technology essentials and the ability necessary of surface ship NCB collective protection are analyzed, and the technology traits between collective protection and individual protection for nautical environment are compared. In addition, by comparing the collective protection ability of foreign naval main active surface ships, it shows clearly the further development direction of collective protection designment.

  9. The Short-Term Effect of Chest Physiotherapy on Spirometric Indices in Chemical Warfare Victims Exposed to Mustard Gas

    OpenAIRE

    Abedi, A.; HR Koohestani; Z Roosta

    2008-01-01

    ABCTRACT Introduction & Objective: Chronic respiratory diseases are the most prevalent late sequels of sulfur mustard gas injury among Iranian chemical warfare victims. Chest physiotherapy is one of the useful methods in care, cure and infection prevention of these patients. The aim of this study was to determine the short-term effect of chest physiotherapy on spirometric indices in chemical warfare victims exposed to sulfur mustard gas. Materials & Methods: In this study, 27 of the chemical ...

  10. EVALUATION OF THE BIOLOGICAL PROTECTIVE MATERIALS AGAINST MICROBIAL SUSPENSION AND ARTIFICIAL BLOOD PENETRATION%防护材料抗微生物悬浮液和血液透性能的评价

    Institute of Scientific and Technical Information of China (English)

    单金洋; 任衍菊; 杨荆泉; 陈剑; 王新为; 王永广; 金敏

    2011-01-01

    Objective To evaluate the biological protective materials against microbial suspension and artificial synthetic blood penetration, so as to provide scientific basis for developing protective clothing for personnels working in high - risk biological pollution environment. Methods According to the method of ISO 16640, bacteriophage Phi-X174, poliovims, black mutation bacillus subtilis, Candida albicans were used as the challengers, and artificial blood as the penetration sample to detect the anti - penetration against the microbial suspension as well as synthetic blood by 3 bio -protective materials ( TPU membrane, TPU compound material, and PU). Results Under normal pressure and different pressures ( 1.75,3.5,7,14, 20 kPa) ,the 4 microbes mentioned above were not detected after 5 min of obstruction by the three protective materials, and the penetration of artificial synthetic blood was also not found. Conclusion The biological protective materials have the capability of anti-penetration of microbial suspension and artificial blood and are suitable to be used for developing biological protective clothing.%目的 对生物防护材料抗微生物悬浮液和人工合成血液的穿透性能进行评价,为高危生物污染环境作业人员防护服的研制提供科学依据.方法 参照IS0 16604测试方法,以噬菌体Phi-X174、脊髓灰质炎病毒、枯草杆菌黑色变种芽孢及白色念珠球菌作为挑战微生物、人工合成血液作为渗透样品,检测TPU膜、TPU膜复合材料和PU涂层3种生物防护材料抗微生物悬浮液和人工合成血液的穿透性能.结果 在常压和不同正压条件(1.75、3.5、7、14、20 kPa)下,分别经3种防护材料阻留作用5 min,均未检测出噬菌体Phi-X174、脊髓灰质炎病毒、枯草杆菌黑色变种芽孢、白色念珠球菌,也未见人工合成血液穿透现象.结论 该生物防护材料具有抗微生物悬浮液和人工合成血液穿透的功能,可用于相关防护服的制作.

  11. 黑鹳的生态生物学研究与保护%Study on Protection and Eco-biology of Ciconia nigra

    Institute of Scientific and Technical Information of China (English)

    许秀; 吴逸群

    2013-01-01

    Ciconia nigra was one of the protected bird which listed in the international red list of threatened species and had high values of ornamental and exhibition.In recent years due to the survival condition changing,environmental pollution and other reasons,the natural population quantity became fewer,even on the brink of extinction.Aimed at awaking the awareness of human beings to protect the ecological environment,the problems of Ciconia nigra's distribution,habits,habitat,feeding habits,reproduction,growth and protection work were summarized based on papers and on-pot observations in recent years.%黑鹳(Ciconia nigra)是列入国际濒危物种保护公约“红皮书”中的保护鸟类之一,具有较高的观赏和展览价值.近年来由于生存条件变化以及环境污染等原因,使其自然种群数量稀少,濒于灭绝.依据近年来对黑鹳的生态学、生物学特性野外实地观察研究的成果,并结合相关文献,对其分布、习性、栖息地、食性、繁殖、发育等方面进行了概述,并对其保护工作存在的问题进行了分析,提出了相关建议,旨在唤醒人类保护生态环境的意识.

  12. Economic assessment of the contribution of biological control to the management of invasive alien plants and to the protection of ecosystem services in South Africa

    CSIR Research Space (South Africa)

    De Lange, Willem J

    2010-07-01

    Full Text Available and Environmental Affairs. References Annecke DP, Moran VC (1978) Critical reviews of biological pest control in South Africa. 2. The prickly pear, Opuntia ficus-indica (L.) Miller. Journal of the Entomological Society of southern Africa 41: 161-188 Baars...: managing risks or strangling progress? In: Sindel BM and Johnson SB (eds) Proceedings of the 14th Australian Weeds Conference of the Weed Society of New South Wales, Sydney, pp 78 - 81 McNeeley JA, Mooney HA, Neville LE, Schei P and Waage JK (2001) A...

  13. Tactic-operational problems of soldiers, civilians and environmental protection against contamination; Taktyczno-operacyjne problemy ochrony wojsk, ludnosci i srodowiska przed skazeniami

    Energy Technology Data Exchange (ETDEWEB)

    Krauze, M. [Akademia Obrony Narodowej, Warsaw (Poland)

    1994-12-31

    The military problems connected with the probable use in warfare the chemical and nuclear weapon have been discussed. The concept of soldiers, civilians and environmental protection against the chemical and radiological contamination has been presented from the view point of military tactics.

  14. Knowledge, Attitudes and Performance of Dental Practitioners in Isfahan-Iran about Biologic Effects of Ionizing Radiation and Protection Against them in 2011

    Directory of Open Access Journals (Sweden)

    Hamid Badrian

    2013-01-01

    Full Text Available Introduction: Increasing use of dental radiography makes necessitates of increasing awareness and appropriate performance about ionizing radiation protection. The present study was done with the aim of evaluation of awareness, attitude and performance levels of dental practitioners in the city of Isfahan about ionizing radiation and protection against them.Materials & Methods: In this descriptive-analytic study a questionnaire including questions for evaluating of awareness, attitude and performance levels and demographic information was distributed among 184 dentists in the city of Isfahan. The data were analyzed by means of student t test and Pearson correlation coefficient in SPSS software (α=0.05. Results: In the present study 73.2% of dentists had weak awareness level 25.6% and 1.2% of dentists had moderate and good awareness levels respectively. Twentyfour and 76 percent had good and apathetic attitudes. Ten and 4.5 percent of dentists have been using lead apron and thyroidal necklace for their patients respectively. Experience and awareness had significant inverse correlation with eachother (P=0.004, r =-0.218.Conclusion: According to the results of the presents study, the awareness of dentists was weak and academic education as well as post-graduate education is necessary.

  15. Radiation Protection

    Science.gov (United States)

    ... EPA United States Environmental Protection Agency Search Search Radiation Protection Share Facebook Twitter Google+ Pinterest Contact Us Radiation Protection Document Library View and download EPA radiation ...

  16. THE RESPONSIBILITY TO PROTECT. A JUST WAR THEORY BASED ANALYSIS

    Directory of Open Access Journals (Sweden)

    Andreea IANCU

    2014-11-01

    Full Text Available This paper analyzes the Responsibility to protect principle as the paradigm that reinforces the just war theory in the current international relations. The importance of this analysis is given by the fact that in the current change of source of international conflicts, the Responsibility to protect principle affirms the responsibility of the international community to protect all the citizens of the world. In this context we witness a translation toward a Post-Westphalian international system, which values the individual as a security referent. This article discusses the origins of the responsibility to protect principle and problematizes (discusses the legitimacy of use of violence and force in the current international system. Moreover, the paper analyzes the possible humanization of the current international relations and, simultaneously, the persistency of conflict and warfare in the international system. The conclusion of this research states that the Responsibility to protect principle revises the just war theory by centering it on the individual.

  17. The Military-Entertainment Complex: A New Facet of Information Warfare

    Directory of Open Access Journals (Sweden)

    Adam Muir

    2003-01-01

    Full Text Available The second Gulf War will become synonymous with the emergence of fully-fledged information warfare where the military-entertainment complex has so influenced strategic and logistic possibilities that it becomes apparent that the war was waged as entertainment. This is entertainment not as an amusement or diversion but utilising the techniques and tropes of the burgeoning entertainment industry as a means to achieve military objectives. This paper offers a short history of the military-entertainment complex as reality and simulation become fused in the practices of the US military machine. The paper then briefly explores three central aspects of this phenomenon evident in recent developments: the military function of computer games; the role of the Hollywood scenario and the blurring between news and reality TV. Finally the suggestion is made that subverting, co-opting and reconstructing the military-entertainment complex provides new possibilities for alternative strategies of information warfare.

  18. Reactive skin decontamination lotion (RSDL) for the decontamination of chemical warfare agent (CWA) dermal exposure.

    Science.gov (United States)

    Schwartz, M D; Hurst, C G; Kirk, M A; Reedy, S J D; Braue, E H

    2012-08-01

    Rapid decontamination of the skin is the single most important action to prevent dermal absorption of chemical contaminants in persons exposed to chemical warfare agents (CWA) and toxic industrial chemicals (TICs) as a result of accidental or intentional release. Chemicals on the skin may be removed by mechanical means through the use of dry sorbents or water. Recent interest in decontamination systems which both partition contaminants away from the skin and actively neutralize the chemical has led to the development of several reactive decontamination solutions. This article will review the recently FDA-approved Reactive Skin Decontamination Lotion (RSDL) and will summarize the toxicity and efficacy studies conducted to date. Evidence of RSDL's superior performance against vesicant and organophosphorus chemical warfare agents compared to water, bleach, and dry sorbents, suggests that RSDL may have a role in mass human exposure chemical decontamination in both the military and civilian arenas.

  19. New studies disputing allegations of bacteriological warfare during the Korean War.

    Science.gov (United States)

    Rolicka, M

    1995-03-01

    In the television series Korea the Unknown War produced jointly by Thames Television (London) and WGBH (Boston) in 1990, General Matthew Ridgway, Commander in Chief of United Nations forces during the Korean War, called the accusations that the United States waged bacteriological warfare "black propaganda." The charges discredited the United States and, despite denials and many international discussions, have not been completely refuted until new. Following studies in archives previously not available for research and after uncovering new sources, many specific examples of black propaganda were discovered that contained false information and lies discrediting the United States. The mechanism of lies, which convinced the Korean population that bacteriological warfare was going on and that the only way not to become victims of the United States' inhuman cruelty was to fight, are shown in this paper.

  20. Effects of Different Land Use Patterns on Soil Infiltration Characteristic Under Slop Protection with Biological Border%生物埂护坡下不同土地利用方式对土壤渗透性的影响

    Institute of Scientific and Technical Information of China (English)

    李建兴; 何丙辉; 徐小军

    2012-01-01

    为探讨不同土地利用方式及生物埂对土壤渗透性的影响,以无生物埂+坡耕地为对照,对四川丘陵山区生物埂护坡下6种不同土地利用类型(经济林、水保林、耕地)的土壤渗透性及其影响因素进行研究。结果表明:生物埂护坡下的6种土地利用类型均好于无生物埂的坡耕地,渗透性大小依次为生物埂+枇杷×牧草〉生物埂+黄柏林〉生物埂+柏木林〉生物埂+枇杷林〉生物埂+柑桔林〉生物埂+坡耕地〉无生物埂+坡耕地;通用模型对各土地利用类型的渗透过程拟合效果最好,Horton模型和Kostiakov模型次之,Philip模型最差;相关分析表明,土壤有机质、砂粒含量、〉0.25mm水稳性团聚体的含量及非毛管孔隙与土壤入渗性能各指标均呈显著相关关系,并在此基础上建立了主导因子方程。%The goal of this study was to determine the effects of different land use patterns and slop protection with biological border on soil infiltration capability in Sichuan billy, non-biological border+ slope land as a control was used, and determined the relationship between soil infiltration capability and its influencing factors under six land use patterns(economic forest, forest for conserving water supply, cultivated land). The results showed that no biological border+slope cultivated land whose soil infiltration capability was lower than those of the other six types. The order of soil infiltration capability from high to low was: Biological border + Eriobotrya japonica pasture forest 〉 biological border + Cortex phellodendri Chinensis forest) biological border + Cupressus funebris forest〉biological border+ Eriobotrya japonica forest〉biological border+Citrus retlculata Banco forest〉 biological border+ slope cultivated land)non-biological border + slope cultivated land; common empirical infiltration model could give the best performance on the infiltrating processes in the seven land

  1. Cyberspace as a Complex Adaptive System and the Policy and Operational Implications for Cyber Warfare

    Science.gov (United States)

    2014-05-22

    accessed 13 February 2014). 66Teresa Degenhard “Between War and Crime: The Overlap between War and Crime: Unpacking Foucault and Agamben’s Studies...Article-2-Revision- for- Foucault -and-Agamben-Degenhardt-July-2013.pdf (accessed 5 April 2014). 26... Foucault and Agamben’s Studies within the Context of the War on Terror.”, 34. 68US Department of Defense, Electronic Warfare, Joint Publication 3-13, I-2

  2. Aerospace Power in Urban Warfare: Beware the Hornet’s Nest

    Science.gov (United States)

    2001-05-01

    Board Task Force on Military Operations in Built-Up Areas ( MOBA )," (Washington, DC: Office of the Undersecretary of Defense for Acquisition and...Smithsonian Institute Press, 1999), 130. 45 Vick, et al., 120. 46 Rebecca A. Grant, "The Radar Game ," Air Force Magazine, February 1999, 52-60. Grant...University Press, 1962. Grant, Rebecca A. "The Radar Game ." Air Force Magazine, February 1999, 52-60. Hawkins, William R. Putting Urban Warfare in

  3. Diagnosing Guerilla Warfare: Was William Clarke Quantrill Missouri’s Francis Marion?

    Science.gov (United States)

    2010-04-28

    frightful epoch when priests, women, and children throughout Spain plotted the murder of isolated soldiers." -Antoine-Henri J omini Jomini2...there are setbacks at any stage there sequences can be reversed to a previous phase.29 FRANCIS MARION AND GUERILLA WARFARE One of the most famous...Militia under General 28 D.M. Frost to stage his forces near the St. Louis Arsenal, as a "training camp," at what became known as Camp Jackson. 148

  4. Management of DoD Irregular Warfare (IW) and Security Force Assistance (SFA) Capabilities

    Science.gov (United States)

    2016-05-03

    manage DoD personnel with skills , training, education, and experience related to IW and SFA. DoDI 3000.11, May 3, 2016 TABLE OF CONTENTS 2...DOD INSTRUCTION 3000.11 MANAGEMENT OF DOD IRREGULAR WARFARE (IW) AND SECURITY FORCE ASSISTANCE (SFA) CAPABILITIES Originating Component...well as building the security capacity and capability of U.S. partners and allies. c. IW and SFA skills , training, education, and experience must be

  5. A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios

    OpenAIRE

    Kathryn Merrick; Medria Hardhienata; Kamran Shafi; Jiankun Hu

    2016-01-01

    Our increasing dependence on information technologies and autonomous systems has escalated international concern for information- and cyber-security in the face of politically, socially and religiously motivated cyber-attacks. Information warfare tactics that interfere with the flow of information can challenge the survival of individuals and groups. It is increasingly important that both humans and machines can make decisions that ensure the trustworthiness of information, communication and ...

  6. Investigating Iraq’s Chemical Warfare Program: Updated and Expanded Research Plan

    Science.gov (United States)

    2012-07-01

    chemical warfare, chemical weapons, Conflict Records Research Center, Tabun , Sarin, UN Sepcial Commission, UN UN Monitoring, Verification and Inspection...7 for tabun and sarin; and Ahmed 2 & 3 for production of precursors for tabun and sarin. The general contractor is Al Fao General Establishment that... tabun , and sarin. “mid- 1970s” Al Hazen Institute has by this time set up contacts with “30 major foreign organizations and companies” for securing

  7. Coalition Warfare Program Tactile Situation Awareness System for Aviation Applications: Simulator Flight Test

    Science.gov (United States)

    2015-12-01

    USAARL Report No. 2016-07 Coalition Warfare Program Tactile Situation Awareness System for Aviation Applications: Simulator Flight Test By...pilot evaluation of The Tactile Situation Awareness System (TSAS) during simulated flight . The objective was to evaluate the ability of TSAS to improve...summarizes recent findings obtained during a simulated helicopter flight employing TSAS. The objective was to evaluate the ability of TSAS to improve a

  8. Landmine Warfare in Support of Multi-domain Battle: Balancing Discrimination and Military Effectiveness

    Science.gov (United States)

    2017-05-25

    military personnel, obstruct economic development and reconstruction following a conflict, inhibit the repatriation of refugees and internally displaced...Basing themselves on the principle of international law that the right of the parties to an armed conflict to choose methods or means of warfare is...Conflict in the Gulf (London: Atlantic Books, 2006), 120-21. 30 Human Rights Watch, “Back in Business? US Landmine Production and Exports,” briefing

  9. Special Operations, Irregular Warfare, and Operational Art: A Theory of Special Operations

    Science.gov (United States)

    2013-12-10

    D.C.: U.S. Army Center of Military History, 2002), 304–308. 66Walter Laqueur , Guerrilla Warfare: A Historical & Critical Study (New Brunswick, NJ...Strategy in Guerrilla War Against Japan, 15–16. 72Peter L. Berger and Thomas Luckmann, The Social Construction of Reality (New York: Anchor Books...each other, undermining each other’s positions, or making a separate peace. The Some authors, such as Thomas Hammes, have argued that the

  10. Guerrilla Operations in the Civil War: Assessing Compound Warfare During Price’s Raid

    Science.gov (United States)

    2007-11-02

    hand, Three Years with Quantrill by O. S. Barton and Noted Guerrillas, or the Warfare on the Border by John Edwards provide alternate views of...events described in other sources. For example, Barton relates John McCorkle’s account of the story about guerrillas who Price’s army before the Battle of...Jay Monaghan provided excellent accounts of the major operations in the Trans-Mississippi Department during the Civil War. Finally, the framework for

  11. China’s Development of Asymmetric Warfare and the Security of Taiwan, Republic of China

    Science.gov (United States)

    2004-12-01

    thanks to my loving and devoted wife, Anita . Her patience, understanding, and remarkable ability to maintain a pleasant, comforting home during this...should arise (Bolt, Brenner , 2004, p.130). Information warfare technology can delay a United States response and commitment in the Taiwan Strait in...destruction of C4 systems by missiles, airpower, and high-energy weapons (Bolt & Brenner , 2004, p.133). Perhaps the most astonishing view of the PRC’s IW

  12. Pirates of the Nuclear Age: The Role of U.S. Submarines in Modern Trade Warfare

    Science.gov (United States)

    2016-07-14

    the Department of the Navy. Signature: _____________________ 14 July 2016 ii Contents Page...World War II ,” (U.S. Navy, Office of the Chief of Naval Operations, Submarine Warfare Division, 1999). 2 Geoffrey Till, “A Changing Focus for the...escalation to nuclear war or a major conventional war such as the forcible reunification of Taiwan via a cross-strait invasion. If U.S. national strategic

  13. Challenges in Coalition Unconventional Warfare: The Allied Campaign in Yugoslavia, 1941-1945

    Science.gov (United States)

    2014-01-01

    JFQ 75, 4th Quarter 2014 Duke, Phil lips, and Conover 129 Challenges in Coalition Unconventional Warfare The Allied Campaign in Yugoslavia , 1941...resistance elements in Yugoslavia . The resistance movement effectively fixed in place 35 German and Italian divisions, consisting of roughly 660,000...mountain headquarters in Yugoslavia on May 14, 1944 (Imperial War Museum) Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting

  14. Hungary’s alternative to counter hybrid warfare small state’s weaponized citizenry.

    Science.gov (United States)

    2017-06-09

    Wales and Warsaw emphasized the importance of cyber defense as a crucial capability of the international security environment against hybrid threats ...and “raising public awareness on cyber threats and cyber security .”214 In other words, the Cyber Defence Unit promotes the connection between the...from asymmetric threats , and has to cover all domains–including cyber . Former studies on countering hybrid warfare have identified these

  15. A Need for Systems Architecture Approach for Next Generation Mine Warfare Capability

    Science.gov (United States)

    2006-09-01

    uncontrolled mining ultimately led to the first Hague convention where 10 Henry Petroski (1992). To Engineer is...Littoral and Mine Warfare, without which I would not have been able to participate in this program. Jon, Henry and Capt. “J” juggling between work, home...Palmer, M. (1992). Guardians of the Gulf. [Photograph], Free Press, New York. Petroski , H (1992). To Engineer is Human: The Role of Failure in

  16. Courses of Action for Enhancing USAF ’Irregular Warfare’ Capabilities: A Functional Solutions Analysis

    Science.gov (United States)

    2010-01-01

    Warfare Center to ensure that technological opportunities for novel IW appli- cations were explored, developed, and fielded. (See pp. 38–40...activities; transnational criminal activities, including narco -trafficking, illicit arms dealing, and illegal financial transactions, that support or...opportunities for novel IW applications are explored, devel- oped, and fielded. In fact, over time, it might be appropriate for the USAF to create a

  17. No Compromise: Establishing Balance in the US Army’s Approach to Full-Spectrum Warfare

    Science.gov (United States)

    2011-04-04

    also needlessly prolongs corporate acceptance for a leadership culture that appreciates the ’ fluid character of warfare in the modern era. Beyond the...of Iraq, reveals that a numl?er of tactical leaders exhibited superb situational awareness and thoughtful response to extremely dynamic security...Paul D. Batchelor , Fixing Intel: · . A B lneprint for Making Intelligence Relevant in Afghanistan, Center for a New American Security, Washington

  18. General George Crook’s development as a practitioner of irregular warfare during the Indian wars.

    Science.gov (United States)

    2017-06-09

    continue to prepare, train, and equip for large-scale peer or near-peer conventional warfare, the breadth of the republic’s history teaches that Irregular...considered many of the officers he encountered to be selfish, self- important, and worse yet, out of touch with the realities facing them. They limited...of Cottonwood generally, thereby virtually acknowledging himself whipped by a small party of Indians and leaving our citizens and their property

  19. Mountain Warfare and Other Lofty Problems: Foreign Perspectives on High-Altitude Combat

    Science.gov (United States)

    2011-01-01

    rope. The two primary ropes should be thoroughly tested when crossing along a rope with a climbing harness and pulley or carabiner. Gear should be...consequently, the Russian Army has a long history of mountain troops, production of specialized mountain warfare gear , and mountain training centers...The mountain units of foreign armies have spent years developing a well-worked-out technique for training Jägers. What gear should you to take to the

  20. Chemical Warfare in World War 1: The American Experience, 1917-1918 (Leavenworth Papers, Number 10)

    Science.gov (United States)

    1984-09-01

    before they reached the front. While moving forward one night toward Chauteau Thierry , the men stopped to rest in shallow shell holes near the road. A...20-23; Curt Wachtel, Chemical Warfare (Brooklyn, NY: Chemical Publishing Co., 1941), 66. 8. Hogg, Gas, 23. 9. Augustin Mitchell Prentiss...Magazine, 10 March 1980:28. Powell, E. Alexander. The Army Behind the Army. New York: Charles Scribner’s Sons, 1919. Prentiss, Augustin Mitchell

  1. Operational advantages of using Cyber Electronic Warfare (CEW) in the battlefield

    Science.gov (United States)

    Yasar, Nurgul; Yasar, Fatih M.; Topcu, Yucel

    2012-06-01

    While cyberspace is emerging as a new battlefield, conventional Electronic Warfare (EW) methods and applications are likely to change. Cyber Electronic Warfare (CEW) concept which merges cyberspace capabilities with traditional EW methods, is a new and enhanced form of the electronic attack. In this study, cyberspace domain of the battlefield is emphazised and the feasibility of integrating Cyber Warfare (CW) concept into EW measures is researched. The SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis method is used to state the operational advantages of using CEW concept in the battlefield. The operational advantages of CEW are assessed by means of its effects on adversary air defense systems, communication networks and information systems. Outstanding technological and operational difficulties are pointed out as well. As a result, a comparison of CEW concept and conventional EW applications is presented. It is concluded that, utilization of CEW concept is feasible at the battlefield and it may yield important operational advantages. Even though the computers of developed military systems are less complex than normal computers, they are not subjected to cyber threats since they are closed systems. This concept intends to show that these closed systems are also open to the cyber threats. As a result of the SWOT analysis, CEW concept provides Air Forces to be used in cyber operations effectively. On the other hand, since its Collateral Damage Criteria (CDC) is low, the usage of cyber electronic attack systems seems to grow up.

  2. Lanchester-Type Models of Warfare. Volume I

    Science.gov (United States)

    1980-10-01

    based on the principle of uniformitarianism , which holds that physical and biological processes, conditions, and operations do not change over time (i.e...uniformity over time). For example, in geology the doctrine of uniformitarianism holds that the present is the key to the past [61]. This principle

  3. Lanchester-Type Models of Warfare. Volume II

    Science.gov (United States)

    1980-10-01

    verification of combat models are as follows: 594 (1) principle of uniformitarianism does not hold, (2) systems are only partially observable, (3...the principle of uniformitarianism , which holds that physical and biological process- es, conditions, and operations do not change over time (i.e. uni

  4. [X-ray in trauma and orthopedic surgery. Physical and biological impact, reasonable use, and radiation protection in the operating room].

    Science.gov (United States)

    Dresing, K

    2011-02-01

    Orthopedic and especially trauma surgeons' use of x-rays during operations vary extensively, especially in minimally invasive osteosynthesis procedures. Radiation hazards often are neglected. In this paper, a short overview of physical and biological effects of radiation are given. In addition, practical information about how to lower radiation exposure in the daily work in the operating room (OR) is given. The operating team is exposed mainly to scattered radiation. The radiation exposure is 10 times higher on the tube side than on the amplifier side. The distance between tube and surgeon must be as great as possible. The tube should be positioned under the OR table, and the distance between tube and patient should be as short as possible. The positioning of the C-arm device without radiation is important. The use of patient landmarks is used to position the C-arm over the region of interest, but the preoperative training of surgeons and team with virtual learning tools, e.g., virtX, is very effective in reducing radiation hazards.

  5. Comparison of diet, reproductive biology, and growth of the pig frog (Rana grylio) from harvested and protected areas of the Florida Everglades

    Science.gov (United States)

    Ugarte, C.A.; Rice, K.G.; Donnelly, M.A.

    2007-01-01

    Distinct differences in body size exist among three Rana grylio populations in areas of the Florida Everglades that differ in frog harvest pressure and hydroperiod. Frogs from two populations are harvested regularly throughout the year, while those in the third are protected from harvest. We compared seasonal and sex differences in diet, reproduction, and growth across these populations to examine life-history patterns. By volume, crayfish and anurans were the most abundant prey items for all adults across sites. Frogs from drier sites consumed more crayfish than frogs from the wettest site. Anurans were abundant in the diet during the wet season, while crayfish and fish were abundant during the dry season. More frogs with empty stomachs were captured during the wet season than the dry season. Feeding, growth, and fat deposition were greatest during the dry season across all sites. Although females were found in all reproductive stages throughout the year, the highest percentage of females had mature ova during the late dry season and spent ovaries during the early wet season. Individual patterns of growth were similar across all sites and matched historical growth data from the 1950s. Differences in body size among sites were most likely attributable to differential mortality (i.e., harvest pressure, predation) rather than to differences in food access or growth. ?? 2007 by the American Society of Ichthyologists and Herpetologists.

  6. Titanium dioxide nanoparticles provide protection against polycyclic aromatic hydrocarbon BaP and chrysene-induced perturbation of DNA repair machinery: A computational biology approach.

    Science.gov (United States)

    Dhasmana, Anupam; Jamal, Qazi Mohd Sajid; Gupta, Richa; Siddiqui, Mohd Haris; Kesari, Kavindra Kumar; Wadhwa, Gulshan; Khan, Saif; Haque, Shafiul; Lohani, Mohtashim

    2016-07-01

    We examined the interaction of polycyclic hydrocarbons (PAHs) like benzo-α-pyrene (BaP), chrysene, and their metabolites 7,8-dihydro-7,8-dihydroxybenzo(a)pyrene,9,10-oxide (BPDE) and chrysene 1,2-diol-3,4-epoxide-2 (CDE), with the enzymes involved in DNA repair. We investigated interaction of 120 enzymes with PAHs and screened out 40 probable targets among DNA repair enzymes, on the basis of higher binding energy than positive control. Out of which, 20 enzymes lose their function in the presence of BaP, chrysene, and their metabolites, which may fetter DNA repair pathways resulting in damage accumulation and finally leading to cancer formation. We propose the use of nanoparticles as a guardian against the PAH's induced toxicity. PAHs enter the cell via aryl hydrocarbon receptor (AHR). TiO2 NP showed a much higher docking score with AHR (12,074) as compared with BaP and chrysene with AHR (4,600 and 4,186, respectively), indicating a preferential binding of TiO2 NP with the AHR. Further, docking of BaP and chrysene with the TiO2 NP bound AHR complex revealed their strong adsorption on TiO2 NP itself, and not on their original binding site (at AHR). TiO2 NPs thereby prevent the entry of PAHs into the cell via AHR and hence protect cells against the deleterious effects induced by PAHs.

  7. Empirical evidence of the effectiveness of concept mapping as a learning intervention for nuclear medicine technology students in a distance learning radiation protection and biology course.

    Science.gov (United States)

    Passmore, Gregory G; Owen, Mary Anne; Prabakaran, Krishnan

    2011-12-01

    Metacognitive learning strategies are based on instructional learning theory, which promotes deep, meaningful learning. Educators in a baccalaureate-level nuclear medicine technology program demonstrated that students enrolled in an online, distance learning section of an introductory radiation protection and radiobiology course performed better when traditional instruction was supplemented with nontraditional metacognitive learning strategies. The metacognitive learning strategy that was used is best known as concept mapping. The concept map, in addition to the standard homework problem assignment and opportunity for question-answer sessions, became the template for misconception identification and remediation interactions between the instructor and the student. The control group relied on traditional homework problems and question-answer sessions alone. Because students in both the "treatment" groups (i.e., students who used concept mapping) and the control group were distance learning students, all personal communications were conducted via e-mail or telephone. The final examination of the course was used to facilitate a quantitative comparison of the performance of students who used concept mapping and the performance of students who did not use concept mapping. The results demonstrated a significantly higher median final examination score for the concept mapping group than for the non-concept mapping group (z = -2.0381, P = 0.0415), with an appropriately large effect size (2.65). Concept mapping is a cognitive learning intervention that effectively enables meaningful learning and is suitable for use in the independent learner-oriented distance learning environments used by some nuclear medicine technology programs.

  8. PROTECTIVE EFFECT OF Ⅱ A2 BIOLOGICAL SAFETY CABINET AGAINST THE VIRUS AEROSOL%ⅡA2型生物安全柜对病毒气溶胶的防护效果

    Institute of Scientific and Technical Information of China (English)

    杜茜; 温占波; 刘克洋; 杨文慧; 王洁; 李娜; 李劲松

    2011-01-01

    Objective To evaluate the protective effect of the secondary biosafety cabinet against virus aerosol, so as to provide the basis for its safe using. Methods Phage phiX 174 aerosol was generated. Physcial and biological protection performance were evaluated according to the standard methods. Personal protection, product protection, and cross contamination were tested three times. Results Personal test showed the sum of plaque forming unit (pfu) from all liquid ram samplers were no more than 10 pfu,and all creviced samplers were less than 5 pfu. All product test showed less than 5 pfu. All cross contamination test showed the number of phiX 174 was less than 2 pfu. Conclusion The protection performance of the biosafety cabinet against viral aerosol were in accordance to the national standard.%目的 测试与评价二级生物安全柜对病毒气溶胶的防护效果,为该生物安全柜的安全使用提供依据.方法 发生噬菌体 phiX 174气溶胶,按照标准中规定的测试方法就安全柜的物理学评价指标及3种生物学评价指标即人员保护、交叉污染和产品保护进行测试,3种测试分别重复3次.结果 3次测试中,人员保护每次6个液体撞击式采样器的培养噬菌斑数之和不大于10 pfu,2个裂隙采样器的培养噬茵斑数之和不超过5pfu.产品保护每次所有培养皿上的phiX174噬茵斑数不超过5pfu.每次交叉污染测试中被检测侧壁36 cm外的所有培养皿上的噬菌斑数不超过2 pfu.结论 该生物安全柜对病毒气溶胶的防护效果符合标准的要求.

  9. Venezuela as an Exporter of 4th Generation Warfare Instability

    Science.gov (United States)

    2012-12-01

    e.g., Colombia and Peru, to date); and, • Diplomatic war/media war/conventional war (e.g., Algeria, 1954-62). 13 Any one of the above...financial war, trade war, psychological war, network ( virus ) war, cyber war, chemical-biological-radiological war, etc. Professional soldiers no...support to the insurgent and drug trafficking Revo- lutionary Armed Forces of Colombia (FARC), Ira- 23 nian surrogate and terrorist Hezbollah

  10. Researches on Population, Reproductive Biology and Protection Measures of Aconitum Brachypodum in Lijiang Region%濒危药用植物短柄乌头丽江居群繁殖生物学研究

    Institute of Scientific and Technical Information of China (English)

    李娅琼; 游春

    2011-01-01

    目的:短柄乌头(Aconitum brachypodum)的居群与繁殖生物学特性进行研究,探明居群的繁殖特性.方法:对短柄乌头居群生境进行初步研究,对短柄乌头生育期、花开放动态、结实率、传粉媒介进行观察.结果:短柄乌头为雌雄同株异花传粉,传粉昆虫多为熊蜂,其结实率高,种子多而小,成熟期不一致.结论:短柄乌头的濒危原因主要是人为因素导致.%Objective : Aconitum brachypodum is an endangered species with a very small distributional area.To find out the possible cause of distributional limitedness , the population and reproductive biology were observed.Method : The environment of Aconitum brachypodum was observed, the developmental process from flower bud to f ruit was observed and discussed in this paper, and the pollination efficiency, the fertility, pollination insect and the plan of action pollination process was observed and discussed.Results : It was clear that the breeding behavior of Aconitum brachypodum belongs to cross - pollinate.The pollination insects are most bumblebees, the pollination efficiency and the fertility is very high, and the developing of che seed embryo is irregular.Conclusion :Population biology and the reproduction biology preliminary study of Aconitum brachypodum is all very important to its generation extension and even the evolution, so the consummation of this thesis provides the theory basis of protection and the direction of scientific cultivation and logical using.

  11. Smart phones: platform enabling modular, chemical, biological, and explosives sensing

    Science.gov (United States)

    Finch, Amethist S.; Coppock, Matthew; Bickford, Justin R.; Conn, Marvin A.; Proctor, Thomas J.; Stratis-Cullum, Dimitra N.

    2013-05-01

    Reliable, robust, and portable technologies are needed for the rapid identification and detection of chemical, biological, and explosive (CBE) materials. A key to addressing the persistent threat to U.S. troops in the current war on terror is the rapid detection and identification of the precursor materials used in development of improvised explosive devices, homemade explosives, and bio-warfare agents. However, a universal methodology for detection and prevention of CBE materials in the use of these devices has proven difficult. Herein, we discuss our efforts towards the development of a modular, robust, inexpensive, pervasive, archival, and compact platform (android based smart phone) enabling the rapid detection of these materials.

  12. Chemical warfare and medical response during World War I.

    Science.gov (United States)

    Fitzgerald, Gerard J

    2008-04-01

    The first large-scale use of a traditional weapon of mass destruction (chemical, biological, or nuclear) involved the successful deployment of chemical weapons during World War I (1914-1918). Historians now refer to the Great War as the chemist's war because of the scientific and engineering mobilization efforts by the major belligerents. The development, production, and deployment of war gases such as chlorine, phosgene, and mustard created a new and complex public health threat that endangered not only soldiers and civilians on the battlefield but also chemical workers on the home front involved in the large-scale manufacturing processes. The story of chemical weapons research and development during that war provides useful insights for current public health practitioners faced with a possible chemical weapons attack against civilian or military populations.

  13. All biology is computational biology.

    Science.gov (United States)

    Markowetz, Florian

    2017-03-01

    Here, I argue that computational thinking and techniques are so central to the quest of understanding life that today all biology is computational biology. Computational biology brings order into our understanding of life, it makes biological concepts rigorous and testable, and it provides a reference map that holds together individual insights. The next modern synthesis in biology will be driven by mathematical, statistical, and computational methods being absorbed into mainstream biological training, turning biology into a quantitative science.

  14. All biology is computational biology

    Science.gov (United States)

    2017-01-01

    Here, I argue that computational thinking and techniques are so central to the quest of understanding life that today all biology is computational biology. Computational biology brings order into our understanding of life, it makes biological concepts rigorous and testable, and it provides a reference map that holds together individual insights. The next modern synthesis in biology will be driven by mathematical, statistical, and computational methods being absorbed into mainstream biological training, turning biology into a quantitative science. PMID:28278152

  15. Quality of life in chemical warfare survivors with ophthalmologic injuries: the first results form Iran Chemical Warfare Victims Health Assessment Study

    Directory of Open Access Journals (Sweden)

    Soroush Mohammad

    2009-01-01

    Full Text Available Abstract Background Iraq used chemical weapons extensively against the Iranians during the Iran-Iraq war (1980–1988. The aim of this study was to assess the health related quality of life (HRQOL in people who had ophthalmologic complications due to the sulfur mustard gas exposure during the war. Methods The Veterans and Martyrs Affair Foundation (VMAF database indicated that there were 196 patients with severe ophthalmologic complications due to chemical weapons exposure. Of these, those who gave consent (n = 147 entered into the study. Quality of life was measured using the 36-item Short Form Health Survey (SF-36 and scores were compared to those of the general public. In addition logistic regression analysis was performed to indicate variables that contribute to physical and mental health related quality of life. Results The mean age of the patients was 44.8 (SD = 8.7 ranging from 21 to 75 years. About one-third of the cases (n= 50 reported exposure to chemical weapons more than once. The mean exposure duration to sulfur mustard gas was 21.6 years (SD = 1.2. The lowest scores on the SF-36 subscales were found to be: the role physical and the general health. Quality of life in chemical warfare victims who had ophthalmologic problems was significantly lower than the general public (P Conclusion The study findings suggest that chemical warfare victims with ophthalmologic complications suffer from poor health related quality of life. It seems that the need for provision of health and support for this population is urgent. In addition, further research is necessary to measure health related quality of life in victims with different types of disabilities in order to support and enhance quality of life among this population.

  16. Mass Spectrometry Applications for the Identification and Quantitation of Biomarkers Resulting from Human Exposure to Chemical Warfare Agents

    Science.gov (United States)

    Smith, J. Richard; Capacio, Benedict R.

    In recent years, a number of analytical methods using biomedical samples such as blood and urine have been developed for the verification of exposure to chemical warfare agents. The majority of methods utilize gas or liquid chromatography in conjunction with mass spectrometry. In a small number of cases of suspected human exposure to chemical warfare agents, biomedical specimens have been made available for testing. This chapter provides an overview of biomarkers that have been verified in human biomedical samples, details of the exposure incidents, the methods utilized for analysis, and the biomarker concentration levels determined in the blood and/or urine.

  17. Measurement of 100 B. anthracis Ames spores within 15 minutes by SERS at the US Army Edgewood Chemical Biological Ctr.

    Science.gov (United States)

    Farquharson, Stuart; Shende, Chetan; Smith, Wayne; Huang, Hermes; Sperry, Jay; Sickler, Todd; Prugh, Amber; Guicheteau, Jason

    2014-05-01

    Since the distribution of Bacillus anthracis-Ames spores through the US Postal System, there has been a persistent fear that biological warfare agents will be used by terrorists against our military abroad and our civilians at home. While there has been substantial effort since the anthrax attack of 2001 to develop analyzers to detect this and other biological warfare agents, the analyzers remain either too slow, lack sensitivity, produce high false-positive rates, or cannot be fielded. In an effort to overcome these limitations we have been developing a surface-enhanced Raman spectroscopy system. Here we describe the use of silver nanoparticles functionalized with a short peptide to selectively capture Bacillus anthracis spores and produce SER scattering. Specifically, measurements of 100 B. anthracis-Ames spores/mL in ~25 minutes performed at the US Army's Edgewood Chemical Biological Center are presented. The measurements provide a basis for the development of systems that can detect spores collected from the air or water supplies with the potential of saving lives during a biological warfare attack.

  18. Synthetic biology and biosecurity: challenging the "myths".

    Science.gov (United States)

    Jefferson, Catherine; Lentzos, Filippa; Marris, Claire

    2014-01-01

    Synthetic biology, a field that aims to "make biology easier to engineer," is routinely described as leading to an increase in the "dual-use" threat, i.e., the potential for the same scientific research to be "used" for peaceful purposes or "misused" for warfare or terrorism. Fears have been expressed that the "de-skilling" of biology, combined with online access to the genomic DNA sequences of pathogenic organisms and the reduction in price for DNA synthesis, will make biology increasingly accessible to people operating outside well-equipped professional research laboratories, including people with malevolent intentions. The emergence of do-it-yourself (DIY) biology communities and of the student iGEM competition has come to epitomize this supposed trend toward greater ease of access and the associated potential threat from rogue actors. In this article, we identify five "myths" that permeate discussions about synthetic biology and biosecurity, and argue that they embody misleading assumptions about both synthetic biology and bioterrorism. We demonstrate how these myths are challenged by more realistic understandings of the scientific research currently being conducted in both professional and DIY laboratories, and by an analysis of historical cases of bioterrorism. We show that the importance of tacit knowledge is commonly overlooked in the dominant narrative: the focus is on access to biological materials and digital information, rather than on human practices and institutional dimensions. As a result, public discourse on synthetic biology and biosecurity tends to portray speculative scenarios about the future as realities in the present or the near future, when this is not warranted. We suggest that these "myths" play an important role in defining synthetic biology as a "promissory" field of research and as an "emerging technology" in need of governance.

  19. Requirements of climate protection with regard to the quality of ecosystems: use of synergies between the framework convention of climate change and the convention on biological diversity. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Herold, A.; Eberle, U.; Ploetz, C.; Scholz, S.

    2001-07-01

    The report identifies synergies and conflicts in the implementation of the United Nations Framework Convention on Climate Change (UNFCCC) and the Convention on Biological Diversity (CBD), the Ramsar Convention on the protection of wetlands and the international forest process. Currently discussed options for climate change mitigation under the FCCC include land-use, land-use change and forestry activities, which can have both positive or negative impacts on biodiversity and ecosystems. On the other hand, activities undertaken under the CBD can have an impact on the ability of ecosystems to provide climate-relevant services like carbon sequestration, regulation of N2O and CH4 emissions, water cycling and the energy budget. Synergies between climate change mitigation and biodiversity conservation can be reached in the areas of conservation of old-growth forests and wetlands. Clear conflicts could arise e.g. from the introduction of exotic species for carbon sequestration, the construction of hydroelectric dams or from the implementation of so-called 'hard' adaptation technologies under the Kyoto Protocol. Most mitigation and adaptation activities discussed under the Kyoto Protocol, however, have ambivalent effects on biodiversity and climate-relevant processes that depend largely on the ecosystem type and the management practices chosen. The report discusses instruments such as guidelines, indicators, impact assessments, positive lists or participation of stakeholders that could promote the consistence between climate change mitigation and biodiversity conservation. The report also presents recommendations for improved cooperation between the conventions in the areas of monitoring, reporting, protected areas, financial resources, the financial mechanisms of the conventions and further research needs. (orig.)

  20. Programming Coup D’Oeil: The Impact of Decision Making Technology in Operational Warfare

    Science.gov (United States)

    2010-05-03

    that it is time consuming and it requires a high degree of good information to yield accurate options for success. In warfare, tempo is vital and...influence decision makers and planners is ethnocentrism . Dong, Day, and Collaço defined ethnocentrism as the “belief that 6 one‟s ethnic or cultural...group is the center of everything, and all other things are related to or dependent on it.” 12 Ethnocentrism plays a role in shaping stereotypes

  1. THE CONTRIBUTION MADE BY T.E. LAWRENCE TO THE THEORY OF REVOLUTIONARY WARFARE

    Directory of Open Access Journals (Sweden)

    G.K.B. Barron

    2012-02-01

    Full Text Available Lawrence was basically an academic thrown into the hurly-burly of leading an Arab revolt against Turkish domination. It could be said that the war in the Middle East was a sideshow of the First World War and Lawrence's part was a ' ... sideshow to the sideshow'l Why then has Lawrence been remembered when greater military men have been forgotten? The romanticism of his exploits are surely the reason, and yet the fact that he is the first modern theorist and possibly the "father" of modern revolutionary warfare, tends to be forgotten.

  2. New concepts and their applications in underwater acoustic warfare simulation system

    Institute of Scientific and Technical Information of China (English)

    DONG Yangze; YAO Lan

    2004-01-01

    An underwater acoustic warfare simulation system (UAWSS) with a structure of high level architecture (HLA) is studied based upon a previous research project. With the experience and lessons learned, some new concepts are adopted in the implementation of UAWSS according to the essence of simulation and the objective of the system, among which are simulation synthetic environment, signal processing at other simulation nodes, decomposition of underwater sound channel, channel varying law and rules on system and parts evaluation, etc. Applications of these new ideas show that they are effective.

  3. A Wolfram in Sheep's Clothing: Economic Warfare in Spain and Portugal, 1940-1944

    OpenAIRE

    Rockoff, Hugh; Caruana, Leonard

    2000-01-01

    One of the most sustained uses of economic warfare by the United States, at least judged by the variety of means used and the issue at stake, occurred in Spain and Portugal during WWII. We provide an overview of this episode by weaving together findings from the secondary literature and from new research in the Spanish archives. The war evolved through several distinct phases. (1) An oil embargo against Spain, although launched when Germany appeared to be winning the war (July 27 to September...

  4. Protection against trichothecene mycotoxins. Final report

    Energy Technology Data Exchange (ETDEWEB)

    1983-01-01

    Trichothecene mycotoxins, produced by certain fungi found in cereal grains, are a significant health problem in agricultural settings and have been detected throughout the world. Concern about the reported use of trichothecenes in chemical warfare agents, or 'yellow rain,' led the U.S. Army to request that the National Research Council form a committee on protection against mycotoxins, to study the effects of trichothecenes on civilians and military personnel who might be exposed to high levels of these substances. The report discusses scientific questions about the natural occurrences of mycotoxins, methods of detection and quantitation, decontamination and detoxification, long-term environmental effects, effects on humans and animals, and strategies for prevention and treatment. It also recommends areas of research that are particularly promising. An extensive bibliography is included.

  5. Toxins as biological weapons for terror-characteristics, challenges and medical countermeasures: a mini-review.

    Science.gov (United States)

    Berger, Tamar; Eisenkraft, Arik; Bar-Haim, Erez; Kassirer, Michael; Aran, Adi Avniel; Fogel, Itay

    2016-01-01

    Toxins are hazardous biochemical compounds derived from bacteria, fungi, or plants. Some have mechanisms of action and physical properties that make them amenable for use as potential warfare agents. Currently, some toxins are classified as potential biological weapons, although they have several differences from classic living bio-terror pathogens and some similarities to manmade chemical warfare agents. This review focuses on category A and B bio-terror toxins recognized by the Centers for Disease Control and Prevention: Botulinum neurotoxin, staphylococcal enterotoxin B, Clostridium perfringens epsilon toxin, and ricin. Their derivation, pathogenesis, mechanism of action, associated clinical signs and symptoms, diagnosis, and treatment are discussed in detail. Given their expected covert use, the primary diagnostic challenge in toxin exposure is the early detection of morbidity clusters, apart from background morbidity, after a relatively short incubation period. For this reason, it is important that clinicians be familiar with the clinical manifestations of toxins and the appropriate methods of management and countermeasures.

  6. [Difficulties of the negotiation process of the Convention for the Protection of Human Rights and Dignity of the Human Being with regard to the application of biology and medicine (and a call for its adhesion)].

    Science.gov (United States)

    de Alba Ulloa, Jessica

    2012-01-01

    Making an attempt to frame the controversial topic of bioethics within international law and with the aim of watching over the society, the Council of Europe elaborated the Convention for the Protection of Human Rights and Dignity of the Human Being with regard to the application of biology and medicine. The instrument, which came into force 12 years ago, is opened to all countries but only 29 states have ratified it. This legal document represents the base of a universal legislation on the subject. The present article examines the origin of the Convention, its process and evolution. It analyses the intense debates with regard to the human dignity, the freedom of science, the beginning of life, among others; equally it explores the interests at stake within the convention, whether political, moral, scientific, and economic, at the moment of its draft and in the present. Finally, the article analyses the possibility of the adoption of the Convention by the Mexican government. It concludes on the effectiveness of the international law of bioethics, and calls for the need that the Convention be used as a base for universal legislation.

  7. Systematic approach in protection and ergonomics testing personal protective equipment

    NARCIS (Netherlands)

    Hartog. E.A. den

    2009-01-01

    In the area of personal protection against chemical and biological (CB) agents there is a strong focus on testing the materials against the relevant threats. The testing programs in this area are elaborate and are aimed to guarantee that the material protects according to specifications. This

  8. Seaport Protection Against chemical and Biological Attacks

    Science.gov (United States)

    2009-06-01

    Crichton . ―The Ships that Died of Shame.‖ Fairfax Digital (2003). http://www.smh.com.au/articles/2003/01/13/1041990234498.html (accessed June 21...accessed January 8, 2009). 82 O’Hanlon Michael E. ―Beyond Missile Defense: Countering Terrorism and Weapons of Mass Destruction.‖ Brookings

  9. Biological restoration of major transportation facilities domestic demonstration and application project (DDAP): technology development at Sandia National Laboratories.

    Energy Technology Data Exchange (ETDEWEB)

    Ramsey, James L., Jr. (.,; .); Melton, Brad; Finley, Patrick; Brockman, John; Peyton, Chad E.; Tucker, Mark David; Einfeld, Wayne; Griffith, Richard O.; Brown, Gary Stephen; Lucero, Daniel A.; Betty, Rita G.; McKenna, Sean Andrew; Knowlton, Robert G.; Ho, Pauline

    2006-06-01

    The Bio-Restoration of Major Transportation Facilities Domestic Demonstration and Application Program (DDAP) is a designed to accelerate the restoration of transportation nodes following an attack with a biological warfare agent. This report documents the technology development work done at SNL for this DDAP, which include development of the BROOM tool, an investigation of surface sample collection efficiency, and a flow cytometry study of chlorine dioxide effects on Bacillus anthracis spore viability.

  10. Disinfection of biological agents in the field using a mobile ...

    Science.gov (United States)

    Report The Army’s Net Zero Initiative is an energy-conservation program that focuses on energy as well as water and waste usage procedures. All Net Zero projects are geared toward helping the military installation or community become more sustainable and resilient, with an emphasis on taking a systems approach. Net Zero projects must advance the state of the science and are focused on three general topic areas: water, energy, and waste, and the nexuses among them. This project examined the inactivation and/or removal of biological contaminants in dirty wash water using a portable ozone-UV AOP process. The strain of E. coli used in these experiments is not a biological warfare agent, but acts as a surrogate for certain of the vegetative biological agents such as the enterohemorrhagic strain designated E. coli 0157:H7.

  11. Academic Training Lectures | Stuxnet and Cyber-Warfare | 13-14 January 2016

    CERN Multimedia

    2015-01-01

    Please note that the next series of Academic Training Lectures will take place on 13 and 14 January 2016. The lectures will be given by Gian Piero Siroli (Università e INFN, Bologna (IT))   Stuxnet and Cyber-Warfare (1/2)​ on Wednesday, 13 January from 11 a.m. to 12 p.m. http://indico.cern.ch/event/438525/ Stuxnet and Cyber-Warfare (2/2) on Thursday, 14 January from 11 a.m. to 12 p.m. http://indico.cern.ch/event/438526/ at CERN, Council Chamber (503-1-001)  Description: The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran&...

  12. Bioarchaeological investigation of ancient Maya violence and warfare in inland Northwest Yucatan, Mexico.

    Science.gov (United States)

    Serafin, Stanley; Lope, Carlos Peraza; Uc González, Eunice

    2014-05-01

    This study investigates evidence of changes and continuities in ancient Maya violence and warfare in inland northwest Yucatan, Mexico from the Middle Preclassic (600-300 BC) to the Postclassic (AD 1050-1542) through bioarchaeological analysis of cranial and projectile trauma. It is hypothesized that the frequency of violence increases before the Classic Maya collapse and remains high during the Postclassic period. It is also hypothesized that the flat, open terrain was conducive to warfare and resulted in higher trauma frequencies than in other parts of the Maya area. Results show that the frequency of cranial trauma decreases before the Classic collapse and increases in the Postclassic, partially matching the expected chronological trends. The frequency of cranial trauma does not differ significantly from other Maya regions but the pattern does: for all periods, males have more healed injuries than females and they are concentrated on the left side of the anterior of the skull. Some injuries appear to be from small points hafted in wooden clubs. In addition, projectile trauma is evident in a scapula with an embedded arrowhead tip, the first such case reported in a Maya skeleton. Overall, these results suggest greater reliance on open combat and less on raids in this region compared with other parts of the Maya area, possibly due to the flat, open terrain, though the identification of perimortem trauma in both women and men indicates surprise raids on settlements were also practiced. Copyright © 2014 Wiley Periodicals, Inc.

  13. Ge{sup 4+} doped TiO{sub 2} for stoichiometric degradation of warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Stengl, Vaclav, E-mail: stengl@iic.cas.cz [Department of Solid State Chemistry, Institute of Inorganic Chemistry AS CR v.v.i., 250 68 Rez (Czech Republic); Grygar, Tomas Matys [Department of Solid State Chemistry, Institute of Inorganic Chemistry AS CR v.v.i., 250 68 Rez (Czech Republic); Oplustil, Frantisek; Nemec, Tomas [Military Technical Institute of Protection Brno, Veslarska 230, 628 00 Brno (Czech Republic)

    2012-08-15

    Highlights: Black-Right-Pointing-Pointer We prepared nanodisperse Ge{sup 4+} doped titania by a novel synthesis method. Black-Right-Pointing-Pointer Synthesis does not involve organic solvents, organometallics nor thermal processes. Black-Right-Pointing-Pointer The prepared materials are efficient in removal of chemical warfare agents. Black-Right-Pointing-Pointer Ge{sup 4+} doping improves rate of removal of soman and agent VX by TiO{sub 2}. - Abstract: Germanium doped TiO{sub 2} was prepared by homogeneous hydrolysis of aqueous solutions of GeCl{sub 4} and TiOSO{sub 4} with urea. The synthesized samples were characterized by X-ray diffraction, scanning electron microscopy, EDS analysis, specific surface area (BET) and porosity determination (BJH). Ge{sup 4+} doping increases surface area and content of amorphous phase in prepared samples. These oxides were used in an experimental evaluation of their reactivity with chemical warfare agent, sulphur mustard, soman and agent VX. Ge{sup 4+} doping worsens sulphur mustard degradation and improves soman and agent VX degradation. The best degree of removal (degradation), 100% of soman, 99% of agent VX and 95% of sulphur mustard, is achieved with sample with 2 wt.% of germanium.

  14. An Empirical Examination of the Warfare Metaphor with Respect to Pre-Service Elementary Teachers

    Science.gov (United States)

    Cobern, William W.; Loving, Cathleen C.; Davis, Edward B.; Terpstra, Jeff

    2013-08-01

    Since its origination in the late nineteenth century, the warfare metaphor has been used to characterize the relationship between science and religion, especially orthodox Christianity. Though thoroughly discredited by historians of science, the ideological descendants of Thomas Huxley, who spoke of science in quasi-religious terms, have kept the warfare metaphor alive. On the other hand, there are substantial numbers of Christians who at least appear to oppose science given their high-profile opposition to the general theory of evolution. The research reported in this paper asked, "Does anti-science sentiment increase with increasing orthodox Christian belief?" Two validated, published instruments were used: The Thinking about Science Survey Instrument and the Christian Fundamentalist Belief Scale. The subjects for the study were 545 preservice elementary teachers. The analysis did not show that anti-science sentiment increases with increasing Christian belief. Subjects with strong Christian beliefs were found to be just as supportive of science, if not more so, than subjects with no Christian beliefs. The study concludes with a caution against projecting attitudes toward science "on the whole" based on attitudes specifically toward evolution when working with preservice elementary teachers. Such a projection could well be counterproductive. The study has implications for other modern countries having highly religious populations such as Turkey.

  15. A decade of major vascular trauma: Lessons learned from gang and civilian warfare.

    Science.gov (United States)

    Ramdass, M J; Harnarayan, P

    2017-01-01

    INTRODUCTION Trinidad and Tobago is a trans-shipment point for the illegal trade of drugs, arms and ammunition and, as such, has a high incidence of gang-related warfare and drug-related crimes. This has led to a high incidence of gunshot and stab wounds, with associated major vascular injuries. We describe our management strategies learned from a decade of vascular trauma experience. METHODS A retrospective analysis of age, gender, type of trauma, vessel injured, procedure and outcome for all cases of vascular trauma between 2006 and 2015 at two surgical units in Trinidad and Tobago. RESULTS There were 198 vascular trauma cases (232 procedures), involving 159 (80%) males at a mean age of 33 years. Gunshots accounted for 103 (52%) cases, followed by stabs/chops (n=50; 25%) and lacerations (n=15; 8%). The most commonly injured vessels were the radial/ulnar arteries (n=39; 20%) and the superficial femoral artery (n=37; 19%). There were seven pseudoaneurysms and three traumatic arteriovenous fistulae. Repair techniques included primary (n=82; 35%), reversed vein (n=63; 27%), polytetrafluoroethylene (n=58; 25%), oversew (n=24; 10%) and endovascular (n=5; 2%) techniques. There were eight (4%) secondary amputations and eight (4%) deaths. CONCLUSIONS Major vascular trauma causes significant morbidity and mortality in Trinidad and Tobago, with the majority of cases due to gunshot injuries secondary to gang-related warfare and civilian violence. We compare our experience with that in the literature on the epidemiology and management of vascular trauma.

  16. Investigating the Relationship Between Drone Warfare and Civilian Casualties in Gaza

    Directory of Open Access Journals (Sweden)

    Dr. Ann Rogers

    2014-12-01

    Full Text Available Unmanned aerial vehicles (UAVs, better known as drones, are increasingly touted as ‘humanitarian’ weapons that contribute positively to fighting just wars and saving innocent lives. At the same time, civilian casualties have become the most visible and criticized aspect of drone warfare. It is argued here that drones contribute to civilian casualties not in spite of, but because of, their unique attributes. They greatly extend war across time and space, pulling more potential threats and targets into play over long periods, and because they are low-risk and highly accurate, they are more likely to be used. The assumption that drones save lives obscures a new turn in strategic thinking that sees states such as Israel and the US rely on large numbers of small, highly discriminating attacks applied over time to achieve their objectives. This examination of Israel’s 2014 war in Gaza argues that civilian casualties are not an unexpected or unintended consequence of drone warfare, but an entirely predictable outcome.

  17. Next Generation Non-particulate Dry Nonwoven Pad for Chemical Warfare Agent Decontamination

    Energy Technology Data Exchange (ETDEWEB)

    Ramkumar, S S; Love, A; Sata, U R; Koester, C J; Smith, W J; Keating, G A; Hobbs, L; Cox, S B; Lagna, W M; Kendall, R J

    2008-05-01

    New, non-particulate decontamination materials promise to reduce both military and civilian casualties by enabling individuals to decontaminate themselves and their equipment within minutes of exposure to chemical warfare agents or other toxic materials. One of the most promising new materials has been developed using a needlepunching nonwoven process to construct a novel and non-particulate composite fabric of multiple layers, including an inner layer of activated carbon fabric, which is well-suited for the decontamination of both personnel and equipment. This paper describes the development of a composite nonwoven pad and compares efficacy test results for this pad with results from testing other decontamination systems. The efficacy of the dry nonwoven fabric pad was demonstrated specifically for decontamination of the chemical warfare blister agent bis(2-chloroethyl)sulfide (H or sulfur mustard). GC/MS results indicate that the composite fabric was capable of significantly reducing the vapor hazard from mustard liquid absorbed into the nonwoven dry fabric pad. The mustard adsorption efficiency of the nonwoven pad was significantly higher than particulate activated carbon (p=0.041) and was similar to the currently fielded US military M291 kit (p=0.952). The nonwoven pad has several advantages over other materials, especially its non-particulate, yet flexible, construction. This composite fabric was also shown to be chemically compatible with potential toxic and hazardous liquids, which span a range of hydrophilic and hydrophobic chemicals, including a concentrated acid, an organic solvent and a mild oxidant, bleach.

  18. APSTNG: neutron interrogation for detection of explosives, drugs, and nuclear and chemical warfare materials

    Science.gov (United States)

    Rhodes, Edgar A.; Peters, Charles W.

    1993-02-01

    A recently developed neutron diagnostic probe system has the potential to satisfy a significant number of van-mobile and fixed-portal requirements for nondestructive detection, including monitoring of contraband explosives, drugs, and weapon materials, and treaty verification of sealed munitions. The probe is based on a unique associated-particle sealed-tube neutron generator (APSTNG) that interrogates the object of interest with a low-intensity beam of 14- MeV neutrons generated from the deuterium-tritium reaction and that detects the alpha-particle associated with each neutron. Gamma-ray spectra of resulting neutron reactions identify nuclides associated with all major chemicals in explosives, drugs, and chemical warfare agents, as well as many pollutants and fissile and fertile special nuclear material. Flight times determined from detection times of the gamma-rays and alpha-particles yield a separate coarse tomographic image of each identified nuclide. The APSTNG also forms the basis for a compact fast-neutron transmission imaging system that can be used along with or instead of the emission imaging system. Proof-of-concept experiments have been performed under laboratory conditions for simulated nuclear and chemical warfare munitions and for explosives and drugs. The small and relatively inexpensive APSTNG exhibits high reliability and can be quickly replaced. Surveillance systems based on APSTNG technology can avoid the large physical size, high capital and operating expenses, and reliability problems associated with complex accelerators.

  19. Three-dimensional visualization and control of electronic warfare (EW) payloads

    Science.gov (United States)

    Kirsch, Patricia; Tremper, David; Cortesi, Roger

    2008-04-01

    The proliferation of unmanned vehicles carrying tactical payloads in the battle-space has accelerated the need for user-friendly visualization with graphical interfaces to provide remote command and control. Often these platforms and payloads receive their control functions from command centers located half a world away via satellite communications. Operators require situational awareness tools capable of graphically presenting the remote battlefield asset positions and collected sensor data. Often these systems use 2D software mapping tools in conjunction with video for real time situational awareness. The Special Projects Group (SPG) in the Tactical Electronic Warfare Division of the U.S. Naval Research Laboratory has been developing an operator control interface called the Jammer Control Station (JCS) to provide 3D battle-space visualization with built-in, remote EW payload command and control (C2) capabilities. The JCS interface presents the operator with graphic depictions of both the platforms' states and the RF environment. Text based messaging between the JCS and the EW payload reduces the impact of the system on the available bandwidth. This paper will discuss the use of the SIMDIS 3-D visualization tool as a real-time command and control interface for electronic warfare (EW) payloads.

  20. Implications for studying team cognition and team performance in network-centric warfare paradigms.

    Science.gov (United States)

    Krueger, Gerald P; Banderet, Louis E

    2007-05-01

    Network-centric warfare's (NCW) information-rich systems involving sophisticated sensors, tracking systems, smart weapons, and enhanced digital communications threaten to overload combatants with voluminous amounts of data. It is unclear whether warfighters will perceive such extensive data as actionable information to which they will respond accurately in a timely enough manner. Members of small teams in command and control centers, operating in crew-served vehicles, or simply "grunting it out" as ground-pounding infantrymen, may be disparately separated by space, but will communicate and be connected by electronic linkages, e.g., radio, text messages, situation displays, or global positioning data. However, team members will also have to remember shared mental models of tasks at hand, pay attention to and share common situation awareness in complex operational environments, perform team cognition and team coordination, and integrate both lower and higher cognitive processes with those of team behaviors. Such exceptional capabilities are required more now than ever before; such capabilities today are far from assured. After two workshops to establish performance metrics for assessing cognitive performance of military personnel in NCW, this preface introduces five manuscripts addressing team cognition and team performance from both a theoretical and a practical perspective. The authors of this preface question if NCW, and perhaps the politico-social ramifications of modern warfare, have already outstripped behavioral scientists' approach to researching team cognition and team performance-expertise that is so crucially needed for combatants on the rapidly changing 21st-century battlegrounds.

  1. An Assessment of the Effectiveness of Computer-based Training for Newly Commissioned Surface Warfare Division Officers

    Science.gov (United States)

    2009-08-24

    Chief of Naval Operations Surface Warfare Directorate. (2002, June 15). Navigation, seamanship and shiphandling training requirements document...unlimited. Prepared for: Naval Postgraduate School, Monterey, California 93943 An Assessment of the Effectiveness of Computer-based Training...Stephen Mehay, Professor With the assistance of Carol Stoker and Robert Paynter Naval Postgraduate School Naval Postgraduate School

  2. Warfare has changed - so should have methods: Ammunition and weapon performance induced operational risk and safety issues

    NARCIS (Netherlands)

    Verhagen, T.L.A.; Voorde, M.J. van de

    2010-01-01

    Warfare has changed. Out-of-area operations have increased the awareness that we are unfamiliar with the performance of the current conventional medium and large calibre ammunitions in day-to-day practice. Current ammunition is primarily developed and procured to defeat the traditional ‘steel’

  3. Multi Service Tactics, Techniques, and Procedures for Treatment of Chemical Warfare Agent Casualties and Conventional Military Chemical Injuries

    Science.gov (United States)

    2016-08-02

    Carbon Monoxide 1 B Phosgene 3 B Hydrogen Cyanide 3 B Chlorine 4 A Cyanogen Chloride 4 A Ethylene Oxide 2 C Formaldehyde 2 B Methyl Bromide 3 B...10-7 Chlorine ............................................................................................................ 10-8...especially vulnerable and may be targeted as part of a plan to defeat U.S. force projection. Chemical warfare agents and TICs (such as chlorine , phosgene

  4. Groundwater geochemical and selected volatile organic compound data, Operable Unit 1, Naval Undersea Warfare Center, Division Keyport, Washington, July 2015

    Science.gov (United States)

    Huffman, Raegan L.

    2016-05-18

    Previous investigations indicate that concentrations of chlorinated volatile organic compounds (CVOCs) are substantial in groundwater beneath the 9-acre former landfill at Operable Unit 1, Naval Undersea Warfare Center, Division Keyport, Washington. The U.S. Geological Survey has continued to monitor groundwater geochemistry to ensure that conditions remain favorable for contaminant biodegradation as specified in the Record of Decision for the site.

  5. Speed of adaptation and genomic footprints of host-parasite coevolution under arms race and trench warfare dynamics.

    Science.gov (United States)

    Tellier, Aurélien; Moreno-Gámez, Stefany; Stephan, Wolfgang

    2014-08-01

    Coevolution between hosts and their parasites is expected to follow a range of possible dynamics, the two extreme cases being called trench warfare (or Red Queen) and arms races. Long-term stable polymorphism at the host and parasite coevolving loci is characteristic of trench warfare, and is expected to promote molecular signatures of balancing selection, while the recurrent allele fixation in arms races should generate selective sweeps. We compare these two scenarios using a finite size haploid gene-for-gene model that includes both mutation and genetic drift. We first show that trench warfare do not necessarily display larger numbers of coevolutionary cycles per unit of time than arms races. We subsequently perform coalescent simulations under these dynamics to generate sequences at both host and parasite loci. Genomic footprints of recurrent selective sweeps are often found, whereas trench warfare yield signatures of balancing selection only in parasite sequences, and only in a limited parameter space. Our results suggest that deterministic models of coevolution with infinite population sizes do not predict reliably the observed genomic signatures, and it may be best to study parasite rather than host populations to find genomic signatures of coevolution, such as selective sweeps or balancing selection.

  6. Warfare has changed - so should have methods: Ammunition and weapon performance induced operational risk and safety issues

    NARCIS (Netherlands)

    Verhagen, T.L.A.; Voorde, M.J. van de

    2010-01-01

    Warfare has changed. Out-of-area operations have increased the awareness that we are unfamiliar with the performance of the current conventional medium and large calibre ammunitions in day-to-day practice. Current ammunition is primarily developed and procured to defeat the traditional ‘steel’ targe

  7. Recommended Architecture for a Knowledge Management System for the Undersea Launchers Division at the Naval Undersea Warfare Center

    Science.gov (United States)

    2010-09-01

    suggested using a systematic approach to the development of a KM system through understanding of the organization’s core competencies. One of the benefits...Kaistha, V. (2007). NAVSEA 05D ship design and certification network knowledge mangement project. West Bethesda, MD: Naval Surface Warfare Center

  8. Modern sample preparation techniques for gas chromatography-mass spectrometry analysis of environmental markers of chemical warfare agents use

    NARCIS (Netherlands)

    Terzic, O.; de Voogt, P.; Banoub, J.

    2014-01-01

    The chapter introduces problematics of on-site chemical analysis in the investigations of past chemical warfare agents (CWA) events. An overview of primary environmental degradation pathways of CWA leading to formation of chemical markers of their use is given. Conventional and modern sample

  9. 75 FR 3395 - Taking and Importing Marine Mammals; U.S. Naval Surface Warfare Center Panama City Division...

    Science.gov (United States)

    2010-01-21

    ..., and provide the opportunity for an experienced biologist to collect data on marine mammal behavior... National Oceanic and Atmospheric Administration 50 CFR Part 218 RIN 0648-AW80 Taking and Importing Marine Mammals; U.S. Naval Surface Warfare Center Panama City Division Mission Activities AGENCY: National Marine...

  10. 78 FR 53109 - Security Zones; Naval Base Point Loma; Naval Mine Anti-Submarine Warfare Command; San Diego Bay...

    Science.gov (United States)

    2013-08-28

    ...-Submarine Warfare Command; San Diego Bay, San Diego, CA AGENCY: Coast Guard, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The Coast Guard proposes extending a portion of an existing San Diego Bay security zone... security zone modifications are intended to restrict vessels from a portion of the San Diego Bay in order...

  11. 78 FR 72025 - Security Zones; Naval Base Point Loma; Naval Mine Anti Submarine Warfare Command; San Diego Bay...

    Science.gov (United States)

    2013-12-02

    ... Submarine Warfare Command; San Diego Bay, San Diego, CA AGENCY: Coast Guard, DHS. ACTION: Final rule. SUMMARY: The Coast Guard is increasing a portion of an existing San Diego Bay security zone at Naval Base... Diego Bay in order to ensure the safety and security of Naval assets. Both security zones will safeguard...

  12. Collective Protection Factors Methodology Development Using High Concentration Polydisperse Inert Aerosols: Results of FY09 Testing

    Science.gov (United States)

    2012-04-01

    As a consequence of the first use of chemical warfare agents in World War I, the U.S. Military has endeavored to find adequate protection against the...of chlorine and mustard agent gases in World War I, there has been progressive development in the methods and equipment used for protecting personnel...45 E o 8 c o <-» a 2 50 45 in 35 30 25 20 15 in 5 Front Dust Irak 3 V APS Rear \\y rW - fi *?*lai

  13. The Venus "Shell-over-Star" hieroglyph and Maya warfare: An examination of the interpretation of a Mayan symbol

    Science.gov (United States)

    Voit, Claudia Ann

    For decades, Maya scholars have associated the Mayan "Shell-Star" (also referred to as "Star-War") hieroglyph with Maya warfare. Put forward by scholars such as Floyd Lounsbury and David Kelley, and later advanced by Linda Schele, David Freidel, Ian Graham, Peter Matthews, Anthony Aveni and others, there are now dozens of published articles and chapters relating the hieroglyph to Venus and warfare. Venus is one of the most notable celestial objects outside of the Sun and Moon and was highly visible to the inhabitants of the Maya world. The Dresden Codex (an astronomical almanac) contains important information about the planet Venus, and the calendar section was deciphered by the librarian and mathematician, Ernst Förstemann in the late 1800s. In his decipherment, he deduced that the numbers contained in the tables must be connected to the orbital period of the planet. There is no other planet with the same orbital period 3 as Venus. Förstemann suggested that the decoded astronomy tables were used by the Maya to determine when to wage war. This interpretation, along with others, like Floyd Lounsbury`s study of Venus and the Long Count date at Bonampak were the seeds that have led to methodological errors that first began to take root in Maya research. The idea of the Venus association with warfare took hold and continues to propagate. Many scholars continue to assert that the "shell-star" glyph is related to warfare events. Others, like Gerardo Aldana, and Stanley Guenter, have recently come forward to reexamine and question the hieroglyph and its relationship, if any, to Maya warfare. I suggest, further, that methodological errors may have occurred along the way. I propose that these errors include data lost in translation, and inaccurate translations. In addition, the statistical analysis of Venus cycles has weak points. If this identification of the errors is correct, we need to re-evaluate the weakened foundation on which we are building our assertions about

  14. Sun protection

    Science.gov (United States)

    ... surfaces that reflect light, such as water, sand, concrete, snow, and areas that are painted white. DO ... protect the ears or sides of the face. Special clothing that protects the skin by absorbing UV ...

  15. Negotiating Protection

    DEFF Research Database (Denmark)

    Bille, Mikkel

    strategies are entangled in cultural, religious, and national identities. Using ethnographic methods, I investigate protection against selected risks: harm from evil eyes, violation of domestic sanctity, and cultural heritage dilapidation. Protection against these risks is examined through studies...

  16. Sun Protection

    Science.gov (United States)

    ... 100% UV ray protection (look for models that advertise both UVB and UVA protection). Use a broad- ... feeds Follow FDA on Twitter Follow FDA on Facebook View FDA videos on YouTube View FDA photos ...

  17. Biological computation

    CERN Document Server

    Lamm, Ehud

    2011-01-01

    Introduction and Biological BackgroundBiological ComputationThe Influence of Biology on Mathematics-Historical ExamplesBiological IntroductionModels and Simulations Cellular Automata Biological BackgroundThe Game of Life General Definition of Cellular Automata One-Dimensional AutomataExamples of Cellular AutomataComparison with a Continuous Mathematical Model Computational UniversalitySelf-Replication Pseudo Code Evolutionary ComputationEvolutionary Biology and Evolutionary ComputationGenetic AlgorithmsExample ApplicationsAnalysis of the Behavior of Genetic AlgorithmsLamarckian Evolution Genet

  18. Multiscale Biological Materials

    DEFF Research Database (Denmark)

    Frølich, Simon

    Materials formed by organisms, also known as biological materials, exhibit outstanding structural properties. The range of materials formed in nature is remarkable and their functions include support, protection, motion, sensing, storage, and maintenance of physiological homeostasis. These complex...... materials are characterized by their hierarchical and composite design, where features with sizes ranging from nanometers to centimeters provide the basis for the functionality of the material. Understanding of biological materials is, while very interesting from a basic research perspective, also valuable...... as inspiration for the development of new materials for medical and technological applications. In order to successfully mimic biological materials we must first have a thorough understanding of their design. As such, the purpose of the characterization of biological materials can be defined as the establishment...

  19. Biologi Radiasi

    OpenAIRE

    Milla Yoesfianda

    2008-01-01

    Biologi radiasi adalah ilmu yang mempelajari tentang pengaruh dari ionisasi radiasi dalam tubuh makhluk hidup. Kemungkinan terjadinya efek biologis akibat interaksi radiasi dan jaringan tubuh manusia, berbanding lurus dengan besarnya dosis radiasi yang mengenai jaringan tubuh tersebut. Radiasi dapat mengakibatkan efek baik secara langsung maupun tidak langsung. Efek yang merusak secara biologis dari radiasi ionisasi diklasifikasikan menjadi tiga kategori utama, yaitu efek somatik determin...

  20. Research on the Interaction of Hydrogen-Bond Acidic Polymer Sensitive Sensor Materials with Chemical Warfare Agents Simulants by Inverse Gas Chromatography

    OpenAIRE

    Liu Yang; Qiang Han; Shuya Cao; Feng Huang; Molin Qin; Chenghai Guo; Mingyu Ding

    2015-01-01

    Hydrogen-bond acidic polymers are important high affinity materials sensitive to organophosphates in the chemical warfare agent sensor detection process. Interactions between the sensor sensitive materials and chemical warfare agent simulants were studied by inverse gas chromatography. Hydrogen bonded acidic polymers, i.e., BSP3, were prepared for micro-packed columns to examine the interaction. DMMP (a nerve gas simulant) and 2-CEES (a blister agent simulant) were used as probes. Chemical an...

  1. Possible Long Term Effects of Chemical Warfare Using Visual Evoked Potentials

    Directory of Open Access Journals (Sweden)

    Abbas Riazi

    2014-09-01

    Full Text Available Some studies have already addressed the effects of occupational organic solvent exposure on the visually evoked potentials (VEPs. Visual system is an important target for Sulphur Mustard (SM toxicity. A number of Iranian victims of Sulphur Mustard (SM agent were apprehensive about the delay effect of SM on their vision and a possible delay effect of SM on their visual cortex. This investigation was performed on 34 individuals with a history of chemical exposure and a control group of 15 normal people. The Toennies electro-diagnosis device was used and its signals were saved as the latencies. The mean of N75, N140 and P100 of victims of chemical warfare (VCWs and control group indicated no significant results (P>0.05. The VCWs did not show any visual symptoms and there was no clear deficit in their VEPs.

  2. NETWORK-CENTRIC WARFARE AND SOME PARTICULAR ASPECTS OF LOGISTICS BASED ON NETWORKING

    Directory of Open Access Journals (Sweden)

    Petrişor JALBĂ

    2015-04-01

    Full Text Available Within the framework of the current revolution in military affairs, at the End of the Cold War a new concept was born: the concept of War Based on Computer Networking or NCW Network Centric-Warfare which was established as a central element of modern military operations. Determined by theprogress recorded in the field of communication systems of all types, technology of information (HI-Tech, IT, war based on computer networking brings a change in the war paradigm and its inherent components In this respect, logistics based on computer networking represents one of the ways in which the reality of the battlefield is preserved which enhances the joint perspective upon the military forces.

  3. The art of antibacterial warfare: Deception through interference with quorum sensing-mediated communication.

    Science.gov (United States)

    Rampioni, Giordano; Leoni, Livia; Williams, Paul

    2014-08-01

    Almost a century on from the discovery of penicillin, the war against bacterial infection still rages compounded by the emergence of strains resistant to virtually every clinically approved antibiotic and the dearth of new antibacterial agents entering the clinic. Consequently there is renewed interest in drugs which attenuate virulence rather than bacterial growth. Since the metaphors of warfare are often used to describe the battle between pathogen and host, we will describe in such a context, the molecular communication (quorum sensing) mechanisms used by bacteria to co-ordinate virulence at the population level. Recent progress in exploiting this information through the design of anti-virulence deception strategies that disrupt quorum sensing through signal molecule inactivation, inhibition of signal molecule biosynthesis or the blockade of signal transduction and their advantages and disadvantages are considered.

  4. Approximation and Filtering Techniques for Navigation Data in Time-critical Electronic Warfare Systems

    Directory of Open Access Journals (Sweden)

    Vanitha D.

    2013-03-01

    Full Text Available This paper presents a holistic solution to the navigation requirements in a time critical electronic warfare systems like missile warning systems (MWS. In a passive MWS using IR sensors the efficiency of the system is determined by attributes such as low false alarm rate, minimal response time and ability to track different IR radiating objects by association and correlation of consecutive detections through time. Such a system is required to be supported by a navigation system capable of accurate estimation of the aircraft position, attitude angles and altitude. In this paper, estimation techniques used to accurately calculate aircraft navigation data at the time of capture of IR frames are discussed. The paper discusses about synchronization of INGPS, IR sensors & Processor on to same timeline. The paper also intends to evaluate the performance of wavelet transform filter in effective elimination of noise in navigation parameters like acceleration and attitude angle rates for a better estimation of position and attitude.

  5. High-temperature superconductivity for avionic electronic warfare and radar systems

    Energy Technology Data Exchange (ETDEWEB)

    Ryan, P.A. [Wright Lab., Wright-Patterson AFB, OH (United States). Avionics Directorate

    1994-12-31

    The electronic warfare (EW) and radar communities expect to be major beneficiaries of the performance advantages high-temperature superconductivity (HTS) has to offer over conventional technology. Near term upgrades to system hardware can be envisioned using extremely small, high Q, microwave filters and resonators; compact, wideband, low loss, microwave delay and transmission lines; as well as, wideband, low loss, monolithic microwave integrated circuit phase shifters. The most dramatic impact will be in the far term, using HTS to develop new, real time threat identification and response strategy receiver/processing systems designed to utilize the unique high frequency properties of microwave and ultimately digital HTS. To make superconductivity practical for operational systems, however, technological obstacles need to be overcome. Compact cryogenically cooled subsystems with exceptional performance able to withstand rugged operational environments for long periods of time need to be developed.

  6. A war psychiatry approach to warfare in the Middle Byzantine period.

    Science.gov (United States)

    Ntafoulis, Pavlos

    2016-12-01

    Combat stress cases were traced in historical texts and military manuals on warfare from the Middle Byzantine period; they were mainly labelled as cowardice. Soldiers suffered from nostalgia or exhaustion; officers looked stunned, or could not speak during the battle. Cruel punishments were often enforced. Suicide and alcohol abuse were rarely mentioned. The Byzantines' evacuation system for battle casualties was well organized. Psychological operations were conducted and prisoners-of-war were usually part of them. The Byzantine army had 'parakletores', officers assigned to encourage soldiers before combat. The leaders dealt with combat stress by using their rhetoric skills and emphasizing religious faith in eternal life. The treatment of the 'cowards' was rather similar to modern war psychiatry principles of treatment. No description of PTSD was found. © The Author(s) 2016.

  7. Research on Electronic Warfare Operational Simulation Experiment Design%电子对抗作战仿真实验设计研究

    Institute of Scientific and Technical Information of China (English)

    陶玉; 耿松涛; 王枭犇

    2013-01-01

      针对目前电子对抗作战仿真实验设计中存在的突出问题,对电子对抗作战仿真实验设计进行研究。介绍我军电子对抗作战仿真实验设计的发展现状,分析电子对抗作战仿真实验设计中存在的问题,提出结合实验目的规范电子对抗作战仿真实验设计的思路。该研究为实现电子对抗作战仿真实验设计的规范化、标准化做出了有益探索。%Aiming at the problems existed in designing electronic warfare operational simulation experiment, electronic warfare operational simulation experiment design is researched. It introduces the development situation of PLA’s electronic warfare operational simulation experiment firstly, analyses the problems in designing electronic warfare operational simulation experiment, and brings a design idea that combines it with experiment goals for electronic warfare operational simulation experiment. The research can offer reference for realize the normalization and standardization of electronic warfare campaign simulation experimental design.

  8. Media Discourse in an Atmosphere of Information Warfare: From Manipulation to Aggression

    Directory of Open Access Journals (Sweden)

    Владимир Иванович Озюменко

    2017-12-01

    Full Text Available In todays atmosphere of information warfare the biased impact of the media has increased, pushing behind other functions, including the informative one. The forms of media influence have also changed: direct persuasion has been replaced by implicit manipulation, which develops into outright aggression. Since, in the media discourse aggression can be both verbal and non-verbal, we propose to use the term information (or media aggression , which is broader than verbal aggression . Media aggression can be considered as a binary process - in relation to the referent (affective aggression and in relation to the audience (cognitive aggression. As a result, the information under media aggression refers to the expression of open hostility and animosity towards the referent and meaningful impact on the consciousness of the recipient (the target audience to its ideological subordination. The purpose of this article is to justify the hypothesis that the growing media aggression is a feature of modern media discourse in the atmosphere of information warfare, and this function can be analysed within the framework of manipulative discourse as manipulative persuasion. The data has been taken from quality British and American newspapers, news websites of The BBC, The Economist, The Guardian, The New York Times, The Washington Post, and some others covering the relations between Russia and the USA, the situation in the Middle East, particularly in Syria. The the study was conducted using critical discourse analysis (Fairclough 2001, Van Dijk 2006, 2009; Wodak 2007; Weiss, Wodak 2007 and the multimodal approach (Ivanova, Spodarets 2010; Ponton 2016, and reveals various strategies and means of linguistic manipulation and media aggression. It also shows that the main aim of linguistic manipulation accentuated by verbal and non-verbal aggression is to deliberately mislead the audience imposing on it the desired idea of ideological subordination. Therefore, a

  9. Mathematical biology

    CERN Document Server

    Murray, James D

    1993-01-01

    The book is a textbook (with many exercises) giving an in-depth account of the practical use of mathematical modelling in the biomedical sciences. The mathematical level required is generally not high and the emphasis is on what is required to solve the real biological problem. The subject matter is drawn, e.g. from population biology, reaction kinetics, biological oscillators and switches, Belousov-Zhabotinskii reaction, reaction-diffusion theory, biological wave phenomena, central pattern generators, neural models, spread of epidemics, mechanochemical theory of biological pattern formation and importance in evolution. Most of the models are based on real biological problems and the predictions and explanations offered as a direct result of mathematical analysis of the models are important aspects of the book. The aim is to provide a thorough training in practical mathematical biology and to show how exciting and novel mathematical challenges arise from a genuine interdisciplinary involvement with the biosci...

  10. Effectiveness of Unmanned Surface Vehicles in Anti-submarine Warfare with the Goal of Protecting a High Value Unit

    Science.gov (United States)

    2015-06-01

    computational mathematics systems such as MATLAB and Mathematica; general programming languages such as Python, Java , C++, and C; and other agent...A. Peters, Eds., Inst. of Elect. and Electron. Engineers, Piscataway, NJ, 2004, pp. 171–180. [29] C. Macal and M. North, “ Tutorial on agent-based

  11. North Korean Protective Mine Warfare: An Analysis of the Naval Minefields at Wonsan, Chinnampo and Hungnam during the Korean War

    Science.gov (United States)

    2010-04-01

    return to Hango, Osel and Moon Islands and the Aland Islands; also not to be forgotten is the Russian foothold in the Baltic at Kaliningrad . If the...defense missile system at Kaliningrad (see Fig. 28). Due to the distance from Russian naval defenses, these mines would likely be laid by submarines... Kaliningrad , to support the defense of that enclave. An advantage of placing mines this far out is that it demonstrates intent to mine throughout the

  12. Synthetic biology and occupational risk.

    Science.gov (United States)

    Howard, John; Murashov, Vladimir; Schulte, Paul

    2017-03-01

    Synthetic biology is an emerging interdisciplinary field of biotechnology that involves applying the principles of engineering and chemical design to biological systems. Biosafety professionals have done an excellent job in addressing research laboratory safety as synthetic biology and gene editing have emerged from the larger field of biotechnology. Despite these efforts, risks posed by synthetic biology are of increasing concern as research procedures scale up to industrial processes in the larger bioeconomy. A greater number and variety of workers will be exposed to commercial synthetic biology risks in the future, including risks to a variety of workers from the use of lentiviral vectors as gene transfer devices. There is a need to review and enhance current protection measures in the field of synthetic biology, whether in experimental laboratories where new advances are being researched, in health care settings where treatments using viral vectors as gene delivery systems are increasingly being used, or in the industrial bioeconomy. Enhanced worker protection measures should include increased injury and illness surveillance of the synthetic biology workforce; proactive risk assessment and management of synthetic biology products; research on the relative effectiveness of extrinsic and intrinsic biocontainment methods; specific safety guidance for synthetic biology industrial processes; determination of appropriate medical mitigation measures for lentiviral vector exposure incidents; and greater awareness and involvement in synthetic biology safety by the general occupational safety and health community as well as by government occupational safety and health research and regulatory agencies.

  13. Development of a Polymerase Chain Reaction Assay for Detection of Burkholderia mallei, a Potent Biological Warfare Agent

    OpenAIRE

    2016-01-01

    Burkholderia mallei is the etiological agent of glanders, primarily a disease of equines. B. mallei is closely related to B. pseudomallei, the causative agent of melioidosis. Therefore, detection of B. mallei and its differentiation from B. pseudomallei, has always been troublesome. In present investigation, a B. mallei specific DNA sequence was identified by performing BLASTn search using ~3000 ORFs of B. mallei NCTC 10229. A polymerase chain reaction (PCR) assay with internal amplification ...

  14. Development of a Polymerase Chain Reaction Assay for Detection of Burkholderia mallei, a Potent Biological Warfare Agent

    Directory of Open Access Journals (Sweden)

    Vijai Pal

    2016-09-01

    Full Text Available Burkholderia mallei is the etiological agent of glanders, primarily a disease of equines. B. mallei is closely related to B. pseudomallei, the causative agent of melioidosis. Therefore, detection of B. mallei and its differentiation from B. pseudomallei, has always been troublesome. In present investigation, a B. mallei specific DNA sequence was identified by performing BLASTn search using ~3000 ORFs of B. mallei NCTC 10229. A polymerase chain reaction (PCR assay with internal amplification control (IAC was developed for detection of B. mallei and its differentiation from B. pseudomallei. The PCR assay could amplify a specific 224-bp fragment from all the six B. mallei strains used in the study, whereas other closely related organisms were tested negative. The detection limit of the assay was found to be 10 pg of purified DNA of B. mallei. Incorporation of IAC in the assay makes the results reliable as false negative results which may arise due to presence of PCR inhibitors, can be avoided. For validation, the assay was tested on tap water, Bengal gram and grass artificially spiked with B. mallei. The developed assay can be used as a simple and rapid tool for detection of B. mallei.

  15. Report of Investigation: The Presence of Biological and Chemical Warfare Materiel at AFMC Bases within the United States

    Science.gov (United States)

    2000-06-01

    Eglin AFB for flight tests with the TMU series of spray tanks. 148 Weekly Activity Report and SWOT Staff Project Report for Period Ending 20 January...Base, November 1950, SMAMA-November 30- 3M , p. 22. 194 DISTRIBUTION STATEMENT A. Approved for public release: distribution is unlimited

  16. Immobilization of Enzymes in Nanoporous Host Materials: A Nanobiotechnological Approach to Decontamination and Demilitarization of Chemical and Biological Warfare Agents

    Science.gov (United States)

    2007-11-02

    Type IV with H2 hysteresis loop, typical of mesoporous materials. The incorporation of the methyl group into the silica matrix (OPAA-HF series samples...compared to that of the immobilized enzymes in TMOS-derived materials. The non-surfactant template pathway58-59 to the mesoporous silica materials...biocatalyst OPAA into mesoporous silica host materials of various compositions. OPAA was chosen owing to its ability to catalyze the hydrolysis of highly

  17. Mobile Warfare

    Institute of Scientific and Technical Information of China (English)

    SEBASTIAN COHEN

    2008-01-01

    @@ In 1984, US computer manufacturer Apple spent almost USD 1.5 million on a lavish, Ridley Scott-directed commercial for its new Macintosh 128k personal computer. A year later, Microsoft released Microsoft Windows for IBM PC, signaling the start of the battle for domi-nation of the personal computer market which has waged ever since.

  18. Toxic Warfare

    Science.gov (United States)

    2002-02-01

    suicide squad from the LTTE sea ______________ 34See “FARC Allegedly Using Acid, Tar, Feces to Make Bombs,” El Tiempo , September 6, 2001, accessed from...Program and ser - vices provided by the University of Texas A&M Emergency Re- sponder Training Program. Three interactive training CD-ROMs for the emergency...Bombs,” El Tiempo , September 6, 2001, accessed from FBIS-LAP-20010906000034. “FBI Starts Nationwide Records Check on HAZMAT Truckers,” CNN Online

  19. Nuclear warfare

    CERN Multimedia

    Broda

    1981-01-01

    Le Prof.Broda a étudié à Vienne et Berlin et a travaillé pendant la dernière guerre mondiale en Grande Bretagne pour le conseil de la recherche médicale, notamment sur la chimie de la vision. Il est maintenant Prof. de la chimie, physique et radiochimie à l'Université de Vienne, où il concentre ses travaux sur les méchanisme de transport d'énergie à travers les cellules de membranes.

  20. Millennial Warfare

    Science.gov (United States)

    2017-06-09

    processes of segmentation and fragmentation, and sovereignty. Segmentation is accomplished through dividing the terrain into zones of monopolistic...discussed idea of segmentation , and form the foundation for Kalyvas’ idea of zones. He breaks down the area of operations into fives zones, each with...dataset may have been motivated by frustration over failure to achieve expected success in the job market following their education.54 This analysis