WorldWideScience

Sample records for centric warfare tenets

  1. Implications of Network Centric Warfare

    National Research Council Canada - National Science Library

    Bailey, Alvin

    2004-01-01

    .... These areas of dependence also provide numerous vulnerabilities. This paper will focus specifically on Network Centric Warfare's vulnerabilities in terms of sensors cyberterrorism/ Electro-Magnetic Pulse (EMP...

  2. Attrition in Network Centric Warfare

    National Research Council Canada - National Science Library

    Erbetta, John

    2003-01-01

    .... Information warfare means that positive attacks on systems themselves compound the problem. Emerging technologies applicable to NCW as a force multiplier need to be recognized as counter to the impediments to progress...

  3. Cultural Competence and the Operational Commander: Moving Beyond Cultural Awareness into Culture-Centric Warfare

    National Research Council Canada - National Science Library

    Karcanes, James A

    2007-01-01

    .... Understanding the different levels of cultural awareness -- cultural consideration, cultural understanding, and cultural competence -- will help usher in a new focus on culture-centric warfare...

  4. Understanding "Understanding" Flow for Network-Centric Warfare: Military Knowledge-Flow Mechanics

    National Research Council Canada - National Science Library

    Nissen, Mark

    2002-01-01

    Network-centric warfare (NCW) emphasizes information superiority for battlespace efficacy, but it is clear that the mechanics of how knowledge flows are just as important as those pertaining to the networks and communication...

  5. Russian Perspectives on Network-Centric Warfare: The Key Aim of Serdyukov’s Reform

    Science.gov (United States)

    2011-01-01

    has faced with its GLObal’naya NAvigatsionnaya Sputnikovaya Sistema —(GLONASS) system, and introducing advanced digitized communications in the armed...of targeting data will be accomplished by organizing virtual channels for data transmission or via a web -portal. The successful function- ing of the...Operations: Tactical Web Takes Shape,” Signal, November 2003; Col. Alan D. Campen, USAF (Ret.), “Look Closely At Network-Centric Warfare: Technology Can

  6. The Abbott and Costello Effect: Who's on What, and What's Where When? A Human-Centered Method to Investigate Network Centric Warfare Systems

    National Research Council Canada - National Science Library

    Reed, Derek W

    2007-01-01

    ...), fundamentally changing how warfare is being conducted. Network centric warfare (NCW) systems are being rushed to the field and are offered as a solution for the fog of war and as a way to reduce manpower costs...

  7. Getting the Next War Right: Beyond Population-centric Warfare

    Science.gov (United States)

    2010-06-01

    respectively: Che Guevara and Mao Tse -tung. Che’s foco theory, as we have discussed, advocates mobilizing from the top. The armed challenger chooses an...example, Thomas A. Marks, “Guerrillas in the Mist: Hmong Resistance Continues in Laos ,” Combat and Survival 8, no. 5 (August 1996), 4–11. 12 Theory and...Mao Tse -tung, On Guerrilla Warfare, trans. and ed. Samuel B. Grif!th (Mineola, NY: Dover Publications, 2005). The book is available from a wide

  8. Network Centric Warfare Case Study: U.S. V Corps and 3rd Infantry Division (Mechanized) During Operation Iraqi Freedom Combat Operations (Mar-Apr 2003). Volume 3. Network Centric Warfare Insights

    Science.gov (United States)

    2003-01-01

    OPSEC), military deception, psychological operations (PSYOPS), special information operations (IO), information assurance, physical security...nonlethal effects, such as operational 8 Network Centric Warfare Case Study security (OPSEC), military deception, psychological operations (PSYOP...Support Operations Group ASR Alternate Supply Route; or, Ammunition Supply Rate ATACMS Army Tactical Missile System ATARS Advanced

  9. An Approach to Modelling the Effects of Network Centricity in Maritime Warfare

    National Research Council Canada - National Science Library

    Fewell, Matthew; Grivell, Ian

    2003-01-01

    Partial context: TTCP MAR AG-1 Quantitative modelling of NCW, Outline, TACSITS and hypotheses, Maritime interception a coastline of recent interest, Platform-Centric Case Interceptors have an area of responsibility...

  10. Marketing Network Centric Warfare

    National Research Council Canada - National Science Library

    McCarthy, Shannon

    2001-01-01

    ... the other services. In order to be effective, NCW must transition from a Navy concept to a joint product. NCW advocates can effect this transition by using basic business principles to market NCW...

  11. NETWORK-CENTRIC WARFARE AND NETWORK ENABLED CAPABILITY IMPLICATIONS OVER THE C4ISR TYPE INFORMATION NETWORKS IN THE ROMANIAN ARMED FORCES

    Directory of Open Access Journals (Sweden)

    Cristea DUMITRU

    2015-06-01

    Full Text Available The last two decades mark out the humankind evolution toward the Information Age, a new stage of societal development where the modern society is affected, among other factors, by the explosive technological changes. Within the context, technology represents the main changing driver. To be more specific, small innovations appeared in the information technology and communications are considered to be responsible global transformations in the economy, politics or culture structure. This assertion also extends its validity over the military phenomenon, which is just another human behavior. The use on large scale of the information technology and communications led to a cybernetic battlefield and the change of the waging war philosophy, with the arising of new concepts that better describe the new reality: Network Centric Warfare, and Network Enabled Capabilities.

  12. Human Systems Integration Assessment of Network Centric Command and Control

    National Research Council Canada - National Science Library

    Quashnock, Dee; Kelly, Richard T; Dunaway, John; Smillie, Robert J

    2004-01-01

    .... FORCEnet is the operational construct and architectural framework for Naval Network Centric Warfare in the information age that integrates warriors, sensors, networks, command and control, platforms...

  13. Bridging the Gap in Port Security; Network Centric Theory Applied to Public/Private Collaboration

    National Research Council Canada - National Science Library

    Wright, Candice L

    2007-01-01

    ...." Admiral Thad Allen, 2007 The application of Network Centric Warfare theory enables all port stakeholders to better prepare for a disaster through increased information sharing and collaboration...

  14. A Commander in Chief's Network-Centric Odyssey

    National Research Council Canada - National Science Library

    Copley, E

    2002-01-01

    .... Each Armed Service has begun training and equipping its force using the tenets of Network-Centric Operations, but those forces come together for the first time under the combatant Commander-in-Chief...

  15. Should the Concept of Network-Centric Warfare Form a Central Pillar of the Australian Army’s Transformation, as Articulated in the Hardened and Networked Army Concept?

    Science.gov (United States)

    2007-05-08

    Clausewitz Kantian philosophic framework for war, which contends that due to the inherent nature of war, it cannot be predicted or controlled by man. The...the key themes identified within Clausewitz On War has identified that NCW could be considered the anti-thesis of Clausewitz Kantian study of warfare...industries and centers of population remote from the surface forces. While not discussing the ethical implication of legitimizing the attack of civilian

  16. A Reference Architecture for Network-Centric Information Systems

    National Research Council Canada - National Science Library

    Renner, Scott; Schaefer, Ronald

    2003-01-01

    This paper presents the "C2 Enterprise Reference Architecture" (C2ERA), which is a new technical concept of operations for building information systems better suited to the Network-Centric Warfare (NCW) environment...

  17. Tenet: An Architecture for Tiered Embedded Networks

    OpenAIRE

    Ramesh Govindan; Eddie Kohler; Deborah Estrin; Fang Bian; Krishna Chintalapudi; Om Gnawali; Sumit Rangwala; Ramakrishna Gummadi; Thanos Stathopoulos

    2005-01-01

    Future large-scale sensor network deployments will be tiered, with the motes providing dense sensing and a higher tier of 32-bit master nodes with more powerful radios providing increased overall network capacity. In this paper, we describe a functional architecture for wireless sensor networks that leverages this structure to simplify the overall system. Our Tenet architecture has the nice property that the mote-layer software is generic and reusable, and all application functionality reside...

  18. Irregular Warfare Centric Foreign Internal Defense

    Science.gov (United States)

    2013-06-01

    ransacking homes, humiliating automobile occupants during searches and harassment of pedestrians on the streets.87 The Commission of Human Rights ruled...the surface often appears reactive and inconsistent, both Labour and Conservative governments have consistently adhered to a set of basic principles

  19. A Dialectic for Network Centric Warfare

    Science.gov (United States)

    2005-06-01

    scientific realism through Salmon (1966), Popper (1934) and Kuhn (1962) to the epistemological anarchism of Feyerabend (1975). In this paper, we use an...Factors Society. Feyerabend , P. (1975), Against Method, Verso, London. Fischer, K., Muller, J.P. and Pischel, M. (1996). Cooperative

  20. Complexity Theory and Network Centric Warfare

    Science.gov (United States)

    2003-09-01

    in Surface Growth. Cambridge University Press. Cambridge, UK. 10 MANDELBROT B (1997). Fractals and Scaling in Finance . Springer-Verlag. 11 TURNER A...to Econophysics; Correlations and Complexity in Finance . Cambridge University Press. Cambridge, UK. ADDITIONAL REFERENCE 14 PEITGEN H-O, JURGENS H...realms of the unknown. Defence thinkers everywhere are searching forward for the science and alchemy that will deliver operational success. CCRP

  1. Implications of Outsourcing on Network Centric Warfare

    National Research Council Canada - National Science Library

    Brown, Michael

    2002-01-01

    The Department of Defense (DoD) has taken about 80 percent of the government cutbacks since the end of the Cold Wan As a means to fashion cost savings and gain efficiencies, DoD is seeking to streamline much of its infrastructure...

  2. Governing Warfare

    DEFF Research Database (Denmark)

    Harste, Gorm

      It would seem as though warfare has gotten out of control, not only in Iraq and Afghanistan, but also in Central Africa. The paper outlines the strategic history of politically controlled warfare since the early Enlightenment. The argument is that control is implausible. The idea of control has...

  3. Establishing Cyber Warfare Doctrine

    Directory of Open Access Journals (Sweden)

    Andrew M. Colarik

    2012-01-01

    Full Text Available Over the past several decades, advances in technology have transformed communications and the ability to acquire, disseminate, and utilize information in a range of environments. Modern societies and their respective militaries have taken advantage of a robust information space through network-centric systems. Because military and commercial operations have increasingly converged, communication and information infrastructures are now high-priority military objectives in times of war. This article examines the theoretical underpinning of current cyber warfare research, what we have learned so far about its application, and some of the emerging themes to be considered; it also postulates the development of a (national cyber warfare doctrine (CWD. An endeavor of this scale requires lots of considerations and preparation for its development if it is to be cooperatively embraced. This article considers why information technology systems and their supporting infrastructures should be considered legitimate military targets in conflicts, and offers several events that support this supposition. In addition, it identifies the various forms of doctrine that will become the basis for developing a CWD, discusses a CWD's possible components, and proposes a national collaborative and discussion framework for obtaining a nation's stakeholder buy-in for such an endeavor.

  4. Centralized Control/Decentralized Execution: A Valid Tenet of Airpower

    National Research Council Canada - National Science Library

    Santicola, Henry J

    2005-01-01

    ...) and Effects-Based Operations (EBO). This paper examines the history of the concept of centralized control/decentralized execution from the advent of modern warfare through Operation Enduring Freedom...

  5. SYS6: Tenet: An Architecture for Tiered Embedded Networks

    OpenAIRE

    Krishna Chintalapudi; Deborah Estrin; Om Gnawali; Ramesh Govindan; Eddie Kohler; Jeong Paek; Sumit Rangwala; Thanos Sthathopoulos

    2005-01-01

    Over the last five years, sensor network research has seen significant advances in the development of hardware devices and platforms, and in the design of services and infrastructural elements such as routing, localization, and time synchronization. Deployed systems, however, have lagged behind. In this poster, we will describe an alternative architecture, called Tenet, for sensor networks that constrains placement of application-specific functionality on relatively unconstrained nodes. We w...

  6. Defence Adademies and Colleges 2009 International Conference. Network Centric Learning: Towards Authentic ePractices, 25 - 27 March 2009

    Science.gov (United States)

    2009-03-27

    Keywords/phrases: Network-Centric Learning; Network-Centric Warfare& Security; student ICT skills; student engagement ; first year experience; faculty...learning policies supportive of strategies that scaffold staff and student engagement in TELT is also critical in an already stressful new environment...Generation ‘Y’ stereotyping for deploying VLE is likely to be problematic in terms of effective student engagement and the targeting of staff development. The

  7. Acceptance and Commitment Therapy: Western adoption of Buddhist tenets?

    Science.gov (United States)

    Fung, Kenneth

    2015-08-01

    Acceptance and Commitment Therapy (ACT) is a psychological intervention that has wide clinical applications with emerging empirical support. It is based on Functional Contextualism and is derived as a clinical application of the Relational Frame Theory, a behavioral account of the development of human thought and cognition. The six core ACT therapeutic processes include: Acceptance, Defusion, Present Moment, Self-as-Context, Values, and Committed Action. In addition to its explicit use of the concept of mindfulness, the therapeutic techniques of ACT implicitly incorporate other aspects of Buddhism. This article describes the basic principles and processes of ACT, explores the similarities and differences between ACT processes and some of the common tenets in Buddhism such as the Four Noble Truths and No-Self, and reports on the experience of running a pilot intervention ACT group for the Cambodian community in Toronto in partnership with the community's Buddhist Holy Monk. Based on this preliminary exploration in theory and the reflections of the group experience, ACT appears to be consistent with some of the core tenets of Buddhism in the approach towards alleviating suffering, with notable differences in scope reflecting their different aims and objectives. Further development of integrative therapies that can incorporate psychological and spiritual as well as diverse cultural perspectives may help the continued advancement and evolution of more effective psychotherapies that can benefit diverse populations. © The Author(s) 2014.

  8. Data Centric Development Methodology

    Science.gov (United States)

    Khoury, Fadi E.

    2012-01-01

    Data centric applications, an important effort of software development in large organizations, have been mostly adopting a software methodology, such as a waterfall or Rational Unified Process, as the framework for its development. These methodologies could work on structural, procedural, or object oriented based applications, but fails to capture…

  9. Drone warfare

    Science.gov (United States)

    Gusterson, Hugh

    2017-11-01

    Crude drones existed as early as World War I, but the technology matured in the Yugoslav Wars of the 1990s and the current wars around the Middle East. The U.S. first used a weaponized drone in late 2001, in Afghanistan. Drones may cause more or less civilian casualties depending on the targeting protocols employed by their operators. There is an inherent ambiguity in determining who is an insurgent from several thousand feet, but civilian casualties are likely to be higher if targeters emphasize "signature strikes" over "personality strikes," if they engage in "double-tap strikes," if they rely too much on local informants, and if they rely too heavily on cellphone identification in the absence of corroboration from other intelligence sources. The legality of drone warfare is fairly clear in established battle zones such as Afghanistan, but is more problematic in terms of both international and domestic law when it comes to drone strikes in countries such as Yemen, Pakistan and Somalia with which the U.S. is not at war. Looking to the future, the U.S. would be well advised to sponsor negotiations for an international drone convention that might establish clear international rules for the use of drones, ban autonomous smart drones, and establish adjudicatory procedures to handle allegations of war crimes.

  10. Towards a Semiotic Information Position Framework for Network Centric Warfare

    Science.gov (United States)

    2011-06-01

    study of anything which stands for something else [10]. Swiss linguist Ferdinand de Saussure and American logician and philosopher Charles Sanders Peirce...are considered as the founders of semiotics [10]. As a linguist, Saussure was interested in the relationships between words (or signs) and he argued...to Eco, Saussure “did not define the signified any too clearly, leaving it half way between a mental image, a concept and a psychological reality

  11. Space Technology and Network Centric Warfare: A Strategic Paradox

    National Research Council Canada - National Science Library

    Ginter, Karl

    2007-01-01

    The Department of Defense (DoD) force transformation is in large measure predicated on harnessing and exploiting the benefits of shared information on the battlefield to develop a common operating picture...

  12. I-centric Communications

    CERN Document Server

    Arbanowski, S; Steglich, S; Popescu-Zeletin, R

    2001-01-01

    During the last years, a variety of concepts for service integration and corresponding systems have gained momentum. On the one hand, they aim for the interworking and integration of classical telecommunications and data communications services. On the other hand, they are focusing on universal service access from a variety of end user systems. Looking at humans' communication behavior and communication space, it is obvious that human beings interact frequently in a set of contexts in their environment (communication space). Following this view, we want to build communication systems on the analysis of the individual communication spaces. The results are communication systems adapted to the specific demands of each individual. The authors introduce I-centric Communication Systems, an approach to design communication systems which adapt to the individual communication space and individual environment and situation. In this context "I" means I, or individual, "Centric" means adaptable to I requirements and a ce...

  13. Three tenets for secure cyber-physical system design and assessment

    Science.gov (United States)

    Hughes, Jeff; Cybenko, George

    2014-06-01

    This paper presents a threat-driven quantitative mathematical framework for secure cyber-physical system design and assessment. Called The Three Tenets, this originally empirical approach has been used by the US Air Force Research Laboratory (AFRL) for secure system research and development. The Tenets were first documented in 2005 as a teachable methodology. The Tenets are motivated by a system threat model that itself consists of three elements which must exist for successful attacks to occur: - system susceptibility; - threat accessibility and; - threat capability. The Three Tenets arise naturally by countering each threat element individually. Specifically, the tenets are: Tenet 1: Focus on What's Critical - systems should include only essential functions (to reduce susceptibility); Tenet 2: Move Key Assets Out-of-Band - make mission essential elements and security controls difficult for attackers to reach logically and physically (to reduce accessibility); Tenet 3: Detect, React, Adapt - confound the attacker by implementing sensing system elements with dynamic response technologies (to counteract the attackers' capabilities). As a design methodology, the Tenets mitigate reverse engineering and subsequent attacks on complex systems. Quantified by a Bayesian analysis and further justified by analytic properties of attack graph models, the Tenets suggest concrete cyber security metrics for system assessment.

  14. 2005 Net Centric Operations, Interoperability and Systems Integration Conference - Facilitating Net Centric Operations and Warfare

    Science.gov (United States)

    2005-03-24

    QoS to “the edge” – High bandwidth tactical ad-hoc mobile communications – Laser communications and high bandwidth RF relays – QoS management...Information Management Information Assurance Director, Information Assurance Cross- Cutting & Inter-Dependent Domains ASD(NII)/CIO leads Intelligence...Layer Common ServicesDCGS Integration Backbone (DIB) Data level – J2EE and the Metadata Framework ( MDF ) Application level – J2EE and the workflow engine

  15. Flying Electronic Warfare Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides NP-3D aircraft host platforms for Effectiveness of Navy Electronic Warfare Systems (ENEWS) Program antiship missile (ASM) seeker simulators used...

  16. Information Warfare and Ethics

    Directory of Open Access Journals (Sweden)

    M.J. Warren

    2001-05-01

    Full Text Available This paper examines the ethics of the practice of information warfare at both the national and corporate levels. Initially examining the present and past actions of individual hackers, it moves to the more organised, future military and economic warfare scenarios. It examines the lack of legal or policy initiatives in this area.

  17. Difficult Decisions: Chemical Warfare.

    Science.gov (United States)

    Slesnick, Irwin L.; Miller, John A.

    1988-01-01

    Gives the background history and chemistry of modern day chemical warfare from World War I to the present. Provides discussion questions to stimulate deeper thinking on the issue. Contains a discussion activity called "Can New Chemical Weapons Lead to Humane Warfare?" (CW)

  18. The Airpower Tenet of Centralized Control From Organizational and Battle Management Perspectives

    National Research Council Canada - National Science Library

    Depalmer, Steven

    1997-01-01

    .... The tenet is examined from both an organizational and a battle management aspect. The organizational aspect refers to the command and procedural arrangements that permit a Joint Forces Air Component Commander (JFACC...

  19. Defining cyber warfare

    Directory of Open Access Journals (Sweden)

    Dragan D. Mladenović

    2012-04-01

    Full Text Available Cyber conflicts represent a new kind of warfare that is technologically developing very rapidly. Such development results in more frequent and more intensive cyber attacks undertaken by states against adversary targets, with a wide range of diverse operations, from information operations to physical destruction of targets. Nevertheless, cyber warfare is waged through the application of the same means, techniques and methods as those used in cyber criminal, terrorism and intelligence activities. Moreover, it has a very specific nature that enables states to covertly initiate attacks against their adversaries. The starting point in defining doctrines, procedures and standards in the area of cyber warfare is determining its true nature. In this paper, a contribution to this effort was made through the analysis of the existing state doctrines and international practice in the area of cyber warfare towards the determination of its nationally acceptable definition.

  20. Expeditionary Warfare- Force Protection

    National Research Council Canada - National Science Library

    Higgins, Eric

    2004-01-01

    In 2003, the Systems Engineering and Analysis students were tasked to develop a system of systems conceptual solution to provide force protection for the Sea Base conceptualized in the 2002 Expeditionary Warfare study...

  1. Biological warfare agents

    Directory of Open Access Journals (Sweden)

    Duraipandian Thavaselvam

    2010-01-01

    Full Text Available The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies.

  2. Biological warfare agents

    Science.gov (United States)

    Thavaselvam, Duraipandian; Vijayaraghavan, Rajagopalan

    2010-01-01

    The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies. PMID:21829313

  3. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    Section 1 of this paper provides an overview of cyber warfare as an element of information warfare, starting with the general background of the current strategic environment the United States is operating...

  4. Chemical warfare agents.

    Science.gov (United States)

    Kuca, Kamil; Pohanka, Miroslav

    2010-01-01

    Chemical warfare agents are compounds of different chemical structures. Simple molecules such as chlorine as well as complex structures such as ricin belong to this group. Nerve agents, vesicants, incapacitating agents, blood agents, lung-damaging agents, riot-control agents and several toxins are among chemical warfare agents. Although the use of these compounds is strictly prohibited, the possible misuse by terrorist groups is a reality nowadays. Owing to this fact, knowledge of the basic properties of these substances is of a high importance. This chapter briefly introduces the separate groups of chemical warfare agents together with their members and the potential therapy that should be applied in case someone is intoxicated by these agents.

  5. Chemical warfare agents

    Directory of Open Access Journals (Sweden)

    Vijayaraghavan R

    2010-01-01

    Full Text Available Among the Weapons of Mass Destruction, chemical warfare (CW is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided.

  6. Chemical warfare agents

    Science.gov (United States)

    Ganesan, K.; Raza, S. K.; Vijayaraghavan, R.

    2010-01-01

    Among the Weapons of Mass Destruction, chemical warfare (CW) is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided. PMID:21829312

  7. The Physics of Warfare

    Science.gov (United States)

    Giordano, Gerardo

    2015-01-01

    Recently, I was tasked with the creation and execution of a new themed general education physics class called The Physics of Warfare. In the past, I had used the theme of a class, such as the physics of sports medicine, as a way to create homework and in-class activities, generate discussions, and provide an application to demonstrate that physics…

  8. Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System

    Directory of Open Access Journals (Sweden)

    Sudip Misra

    2010-04-01

    Full Text Available The proposed mechanism for jamming attack detection for wireless sensor networks is novel in three respects: firstly, it upgrades the jammer to include versatile military jammers; secondly, it graduates from the existing node-centric detection system to the network-centric system making it robust and economical at the nodes, and thirdly, it tackles the problem through fuzzy inference system, as the decision regarding intensity of jamming is seldom crisp. The system with its high robustness, ability to grade nodes with jamming indices, and its true-detection rate as high as 99.8%, is worthy of consideration for information warfare defense purposes.

  9. Concept of „long centric"

    OpenAIRE

    Martinović Željko; Obradović-Đuričić Kosovka; Teodorović Nevenka S.; Živković Rade

    2004-01-01

    The objective of this paper was to show the historical perspective of the „long centric" occlusal concept and its importance in the modern dentistry, especially from the gnathological aspect. The „long centric" concept represents therapeutic modality used in modern dentistry and occlusal adjustment in all patients showing differences in strong and weak closure of the lower jaw starting from the position of physiological rest/long centric" concept is applied only for anterior teeth and occlusa...

  10. Information Warfare and International Law

    National Research Council Canada - National Science Library

    Greenberg, Lawrence T; Goodman, Seymour E; Soo Hoo, Kevin J

    1998-01-01

    .... Some legal constraints will certainly apply to information warfare, either because the constraints explicitly regulate particular actions, or because more general principles of international law...

  11. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  12. Antifragile Electronic Warfare

    OpenAIRE

    Lichtman, Marc

    2014-01-01

    This letter introduces the concept of antifragile electronic warfare (EW), which we define as the ability to allow a communications link to improve performance due to the presence of a jammer. This concept should not be confused with jamming countermeasures (a.k.a. anti-jamming or electronic protection). Rather, antifragile EW can be thought of as the next step beyond simply avoiding or mitigating jamming. After introducing the concept we narrow down the subset of jammers this concept can be ...

  13. US Army Europe: Sharing the ITAM Tenets with Multinational Partners in Africa

    Science.gov (United States)

    2011-05-01

    TenetsUNCLASSIFIED  Initiate a conservation partnership to support land management activities on 303rd training lands.  Significance of Brigade 303...World Wildlife Fund ( WWF ) African Wildlife Foundation (AWF) Local surrounding communities Partners Any Mission, Anywhere UNCLASSIFIED As of 5 May... Partnerships which should help sustain TPDF’s valuable training area resources Any Mission, Anywhere UNCLASSIFIED As of 5 May 2011 USAREUR; Sharing

  14. Psychological effects of nuclear warfare

    International Nuclear Information System (INIS)

    Mickley, G.A.

    1987-01-01

    This report is divided into five parts. (1) Discussion of the psychological milieu before a nuclear confrontation. (2) Acute psychological reactions to nuclear warfare (some of which may reflect, in part, direct radiogenic alteration of nervous system functions). (3) Chronic psychological effects of a nuclear confrontation. (4) Issues concerning treatment of these psychological changes. (5) Prevention of adverse psychological reactions to nuclear warfare

  15. Theorizing Network-Centric Activity in Education

    Science.gov (United States)

    HaLevi, Andrew

    2011-01-01

    Networks and network-centric activity are increasingly prevalent in schools and school districts. In addition to ubiquitous social network tools like Facebook and Twitter, educational leaders deal with a wide variety of network organizational forms that include professional development, advocacy, informational networks and network-centric reforms.…

  16. Cyber warfare and electronic warfare integration in the operational environment of the future: cyber electronic warfare

    Science.gov (United States)

    Askin, Osman; Irmak, Riza; Avsever, Mustafa

    2015-05-01

    For the states with advanced technology, effective use of electronic warfare and cyber warfare will be the main determining factor of winning a war in the future's operational environment. The developed states will be able to finalize the struggles they have entered with a minimum of human casualties and minimum cost thanks to high-tech. Considering the increasing number of world economic problems, the development of human rights and humanitarian law it is easy to understand the importance of minimum cost and minimum loss of human. In this paper, cyber warfare and electronic warfare concepts are examined in conjunction with the historical development and the relationship between them is explained. Finally, assessments were carried out about the use of cyber electronic warfare in the coming years.

  17. Hybrid Maritime Warfare

    DEFF Research Database (Denmark)

    Schaub Jr, Gary John; Murphy, Martin; Hoffman, Frank

    2017-01-01

    Russia’s use of hybrid warfare techniques has raised concerns about the security of the Baltic States. Gary Schaub, Jr, Martin Murphy and Frank G Hoffman recommend a series of measures to augment NATO’s Readiness Action Plan in the Baltic region, including increasing the breadth and depth of naval...... exercises, and improving maritime domain awareness through cooperative programmes. They also suggest unilateral and cooperative measures to develop a sound strategic communications strategy to counter Moscow’s information operations, reduce dependence on Russian energy supplies and build the resilience...

  18. Understanding the Key Tenets of Heidegger’s Philosophy for Interpretive Phenomenological Research

    Directory of Open Access Journals (Sweden)

    Marcella Horrigan-Kelly

    2016-11-01

    Full Text Available Martin Heidegger’s phenomenology provides methodological guidance for qualitative researchers seeking to explicate the lived experience of study participants. However, most phenomenological researchers apply his philosophy loosely. This is not surprising because Heidegger’s phenomenological philosophy is challenging and the influence of his philosophy in shaping the conduct of interpretive phenomenological research is broadly debated. This article presents an exploration of Dasein, a key tenet of Martin Heidegger’s interpretive phenomenology and explicates its usefulness for phenomenological research. From this perspective, we present guidance for researchers planning to utilize Heidegger’s philosophy underpinning their research.

  19. Target-Centric Network Modeling

    DEFF Research Database (Denmark)

    Mitchell, Dr. William L.; Clark, Dr. Robert M.

    In Target-Centric Network Modeling: Case Studies in Analyzing Complex Intelligence Issues, authors Robert Clark and William Mitchell take an entirely new approach to teaching intelligence analysis. Unlike any other book on the market, it offers case study scenarios using actual intelligence...... reporting formats, along with a tested process that facilitates the production of a wide range of analytical products for civilian, military, and hybrid intelligence environments. Readers will learn how to perform the specific actions of problem definition modeling, target network modeling......, and collaborative sharing in the process of creating a high-quality, actionable intelligence product. The case studies reflect the complexity of twenty-first century intelligence issues by dealing with multi-layered target networks that cut across political, economic, social, technological, and military issues...

  20. Large scale network-centric distributed systems

    CERN Document Server

    Sarbazi-Azad, Hamid

    2014-01-01

    A highly accessible reference offering a broad range of topics and insights on large scale network-centric distributed systems Evolving from the fields of high-performance computing and networking, large scale network-centric distributed systems continues to grow as one of the most important topics in computing and communication and many interdisciplinary areas. Dealing with both wired and wireless networks, this book focuses on the design and performance issues of such systems. Large Scale Network-Centric Distributed Systems provides in-depth coverage ranging from ground-level hardware issu

  1. User-centric networking future perspectives

    CERN Document Server

    Aldini, Alessandro

    2014-01-01

    This work represents a milestone for the? 'ULOOP User-centric Wireless Local Loop' project funded by the EU IST Seventh Framework Programme.ULOOP is focused on the robust, secure, and autonomic deployment of user-centric wireless networks. Contributions by ULOOP partners as well as invited tutorials by international experts in the field. The expected impact is to increase awareness to user-centric networking in terms, e.g., of business opportunities and quality of experience, and to present adequate technology to sustain the growth of user-friendly wireless architectures.Throughout the last 3

  2. Avoiding the Achilles heel of network-centric enterprises

    Science.gov (United States)

    McVey, Michelle; Dryer, Jay E.; Randall, Lance

    2003-08-01

    Corporate, government and military bodies focus significant resources to develop sophisticated and capable information-based systems. The concept of people and resources connected by a robust network capable of extremely high rates of information exchange is very attractive because it allows smaller groups to coordinate together and focus effects from geographically diverse locations. However, there is also a hidden danger that comes with such advanced technology. For example, in the case of the U.S. Military, clearly United States holds a technological advantage over our adversaries and that this advantage is still expanding. This technology gap has resulted in the emergence of potent asymmetrical warfare. All too often in science fiction movies, we see a small group of humans defeat a technologically superior alien race by striking at a hidden weakness that renders all of their advanced weapons as useless, as a result of pervasive connectivity and interdependence. The analogy holds for any large network-centric enterprise, corporate or governmental. This paper focuses on specific technologies and methods that preempt this Achilles Heal scenario.

  3. Group Centric Networking: Large Scale Over the Air Testing of Group Centric Networking

    Science.gov (United States)

    2016-11-01

    Large Scale Over-the-Air Testing of Group Centric Networking Logan Mercer, Greg Kuperman, Andrew Hunter, Brian Proulx MIT Lincoln Laboratory...performance of Group Centric Networking (GCN), a networking protocol developed for robust and scalable communications in lossy networks where users are...devices, and the ad-hoc nature of the network . Group Centric Networking (GCN) is a proposed networking protocol that addresses challenges specific to

  4. Stormy weather. Echoes of Columbia/HCA heard as Tenet overhauls management amid scrutiny of outliner payments and investor protests.

    Science.gov (United States)

    Galloro, Vince

    2002-11-11

    What began as a small shower of questions quickly transformed into a storm of investor protest last week as Tenet Healthcare Corp. underwent a management overhaul and analysts asked questions about its fiscal future. Tenet's business strategy came under scrutiny because a large proportion of its Medicare revenue was generated by so-called outlier payments. Chairman and CEO Jeffrey Barbakow (left) says that's not how he wants to do business.

  5. Revisiting the Tenets of Critical Pedagogy in Postmethod Pedagogy to Highlight the Concept of Intellectualism

    Directory of Open Access Journals (Sweden)

    Siavash Zokaeieh

    2018-05-01

    Full Text Available Postmethod pedagogy and critical pedagogy have influential roles in education and language teaching. A number of practitioners may claim to instruct based on the tenets of postmethod pedagogy, however, they may not be entirely aware of the oppositional intention and dynamicity of this model. This article aims at revisiting the tenets and constructing elements of critical pedagogy and Freire’s point of view vis-a-vis postmethod pedagogy and Kumaravadivelu’s developed model to enlighten the open-mindedness and dynamic perceptions of these interwoven approaches. Furthermore, some criticisms towards critical pedagogy and postmethod pedagogy are brought into consideration for better understanding of the relevance and the weaknesses. It is hoped that by bringing these two notions, teachers especially those who wish to use postmethod pedagogy in their setting become more aware of the intellectual priorities of critical pedagogy and postmethod pedagogy such as moving from banking model of education, absence of bias and deviation from predetermined and fixed frameworks in the classrooms.

  6. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    .... Section 1 concludes with a review of offensive and defensive cyber warfare concepts. Section 2 presents a general overview of cyber terrorism, including definitions of cyber terrorism and cyber terrorism support...

  7. The ethics of information warfare

    CERN Document Server

    Floridi, Luciano

    2014-01-01

    This book offers an overview of the ethical problems posed by Information Warfare, and of the different approaches and methods used to solve them, in order to provide the reader with a better grasp of the ethical conundrums posed by this new form of warfare.The volume is divided into three parts, each comprising four chapters. The first part focuses on issues pertaining to the concept of Information Warfare and the clarifications that need to be made in order to address its ethical implications. The second part collects contributions focusing on Just War Theory and its application to the case of Information Warfare. The third part adopts alternative approaches to Just War Theory for analysing the ethical implications of this phenomenon. Finally, an afterword by Neelie Kroes - Vice President of the European Commission and European Digital Agenda Commissioner - concludes the volume. Her contribution describes the interests and commitments of the European Digital Agenda with respect to research for the developme...

  8. Network Centric Information Structure - Crisis Information Management

    National Research Council Canada - National Science Library

    Aarholt, Eldar; Berg, Olav

    2004-01-01

    This paper presents a generic Network Centric Information Structure (NCIS) that can be used by civilian, military and public sectors, and that supports information handling applied to crises management and emergency response...

  9. Nuclear radiation in warfare

    International Nuclear Information System (INIS)

    Rotblat, J.

    1986-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios; biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion. (orig./HP) [de

  10. Nuclear radiation in warfare

    International Nuclear Information System (INIS)

    Rotblat, J.

    1981-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios); biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion. (U.K.)

  11. Reflections on nuclear warfare

    International Nuclear Information System (INIS)

    Evans, J.P.

    1983-01-01

    The author looks back on his more than 70 years of familiarity with Americans involved in warfare, noting their loyal support for our country's objectives. Drawing on the Einstein equation, his own visits to Hiroshima and Nagasaki, and current literature, he, as a physician, belatedly concurs with those who look on the use of nuclear weapons as irrational and untenable. Their employment under present circumstances would create a ''final epidemic'' to be avoided only by prevention. He suggests that medical perceptions must be considered by our national leaders in assessing the many factors that he hopes will lead to rational answers to this urgent, highly complex, and vital enigma. He cites physicians' efforts to help in finding answers and asks that his colleagues consider the issues with attention to the gravity of the situation and act according to their best judgment

  12. Concept of „long centric"

    Directory of Open Access Journals (Sweden)

    Martinović Željko

    2004-01-01

    Full Text Available The objective of this paper was to show the historical perspective of the „long centric" occlusal concept and its importance in the modern dentistry, especially from the gnathological aspect. The „long centric" concept represents therapeutic modality used in modern dentistry and occlusal adjustment in all patients showing differences in strong and weak closure of the lower jaw starting from the position of physiological rest/long centric" concept is applied only for anterior teeth and occlusal movements from rather than toward the center. Whenever the „long centric" parameters are not adequate, occlusal disturbance, resulting from the „wedge" effect during the initial closure of the lower jaw, is present. Different degrees of abrasion or hypermobility of the teeth are often the result of the above-mentioned occlusal disturbances and can potentially trigger bruxism and malfunction. Modus procedendi should be the regular approach of every dentist to any occlusion, because only the built-in „long centric" efficiently contributes to the occlusal stability of the anterior portion of the dentition. All occlusions should be routinely tested regarding their need for „long centric", especially when the extensive therapeutic interventions (conservative, prosthetics of the occlusal complex are required.

  13. Intelligence Strategy for Fourth Generation Warfare

    National Research Council Canada - National Science Library

    Jamison, Edward P

    2006-01-01

    ...." They have named this new era of war "fourth generation warfare." Currently the Department of Defense's intelligence strategy is designed to defeat conventional adversaries vise a fourth generation warfare opponent...

  14. Four tenets of modern validity theory for medical education assessment and evaluation.

    Science.gov (United States)

    Royal, Kenneth D

    2017-01-01

    Validity is considered by many to be the most important criterion for evaluating a set of scores, yet few agree on what exactly the term means. Since the mid-1800s, scholars have been concerned with the notion of validity, but over time, the term has developed a variety of meanings across academic disciplines and contexts. Accordingly, when scholars with different academic backgrounds, many of whom hold deeply entrenched perspectives about validity conceptualizations, converge in the field of medical education assessment, it is a recipe for confusion. Thus, it is important to work toward a consensus about validity in the context of medical education assessment. Thus, the purpose of this work was to present four fundamental tenets of modern validity theory in an effort to establish a framework for scholars in the field of medical education assessment to follow when conceptualizing validity, interpreting validity evidence, and reporting research findings.

  15. Defining Patient Centric Pharmaceutical Drug Product Design.

    Science.gov (United States)

    Stegemann, Sven; Ternik, Robert L; Onder, Graziano; Khan, Mansoor A; van Riet-Nales, Diana A

    2016-09-01

    The term "patient centered," "patient centric," or "patient centricity" is increasingly used in the scientific literature in a wide variety of contexts. Generally, patient centric medicines are recognized as an essential contributor to healthy aging and the overall patient's quality of life and life expectancy. Besides the selection of the appropriate type of drug substance and strength for a particular indication in a particular patient, due attention must be paid that the pharmaceutical drug product design is also adequately addressing the particular patient's needs, i.e., assuring adequate patient adherence and the anticipate drug safety and effectiveness. Relevant pharmaceutical design aspects may e.g., involve the selection of the route of administration, the tablet size and shape, the ease of opening the package, the ability to read the user instruction, or the ability to follow the recommended (in-use) storage conditions. Currently, a harmonized definition on patient centric drug development/design has not yet been established. To stimulate scientific research and discussions and the consistent interpretation of test results, it is essential that such a definition is established. We have developed a first draft definition through various rounds of discussions within an interdisciplinary AAPS focus group of experts. This publication summarizes the outcomes and is intended to stimulate further discussions with all stakeholders towards a common definition of patient centric pharmaceutical drug product design that is useable across all disciplines involved.

  16. The ethics of drone warfare

    Directory of Open Access Journals (Sweden)

    Fatić Aleksandar

    2017-01-01

    Full Text Available The paper investigates the compatibility of the modern technologies of warfare, specifically the use of offensive drones, with traditional military ethics and suggests that the new technologies radically change the value system of the military in ways which make large parts of the traditional military ethics inapplicable. The author suggests that Agamben’s concept of ‘effectivity’ through ‘special actions’ which mark one’s belonging to a particular community or profession is a useful conceptual strategy to explore the compatibility of drone warfare with traditional military ethics; this strategy shows mixed results at best.

  17. The doctor and nuclear warfare

    International Nuclear Information System (INIS)

    Anon.

    1982-01-01

    At the 34th World Medical Assembly in Lisbon in 1981 the World Medical Association adopted a motion proposed by the American Medical Association that national medical associations should develop programs to educate the civilian population on the medical consequences of nuclear war. This article discusses the attitude the medical professions should have, should nuclear warfare in some form confront them in the future. The conclusion is drawn that defence against nuclear warfare is only a part of civil defence against any disaster, including the natural disasters such as flood and fire and the man-made disasters of transport accidents, even of problems at nuclear plants designed to supply energy

  18. Biological warfare, bioterrorism, and biocrime

    NARCIS (Netherlands)

    Jansen, H. J.; Breeveld, F. J.; Stijnis, C.; Grobusch, M. P.

    2014-01-01

    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria

  19. European Curricula, Xenophobia and Warfare.

    Science.gov (United States)

    Coulby, David

    1997-01-01

    Examines school and university curricula in Europe and the extent of their influence on xenophobia. Considers the pluralistic nature of the European population. Discusses the role of curriculum selection and language policy in state efforts to promote nationalism. Assesses the role of curricular systems in the actual encouragement of warfare,…

  20. The Anatomy of Counterinsurgency Warfare

    DEFF Research Database (Denmark)

    Mouritsen, Lars; Pedersen, Kenneth; Thruelsen, Peter Dahl

    Since the beginning of the new millennium, the West has been increasingly involved in a tiresome and rather particular type of conflict: insurgency warfare. The bloody and shocking terrorist attacks on New York and Washington in September 2001 marked the beginning of a new era, and the introducti...

  1. Strategic Analysis of Irregular Warfare

    Science.gov (United States)

    2010-03-01

    the same mathematical equations used by Lanchester .10 Irregular Warfare Theory and Doctrine It is time to develop new analytical methods and models...basis on which to build, similar to what Lanchester provided almost 100 years ago. Figure 9 portrays both Lanchester’s approach and an irregular 17

  2. Roots of Russian Irregular Warfare

    Science.gov (United States)

    2016-12-01

    PAGE INTENTIONALLY LEFT BLANK xiii ACKNOWLEDGMENTS Crissy, your encouragement throughout my career and especially during this project has been...all of the Russian disinformation techniques in Ukraine came directly “from Soviet toolkits .” Maria Snegovaya, “Putin’s Information Warfare In

  3. Technology Transition for Hybrid Warfare

    Science.gov (United States)

    2010-02-16

    and Iraq. At the same time, the science and technology base must provide the disruptive technologies to defeat future conventional enemies. This... disruptive technologies will be needed to retain long-term technological superiority in conventional warfare. Incremental improvement is the most...technology to be missed. Disruptive technologies are the second type of technological change and involve revolutionary concepts involving large technological

  4. A design perspective on aligning process-centric and technology-centric approaches

    DEFF Research Database (Denmark)

    Siurdyban, Artur Henryk; Svejvig, Per; Møller, Charles

    2012-01-01

    Enterprise systems management (ESM) and business process management (BPM), although highly correlated, have evolved as alternative approaches to operational transformation. As a result, companies struggle to find the right balance when prioritizing technology and processes as change drivers....... The purpose of this paper is to propose a direction towards aligning the process-centric and technology-centric approaches. Using the case study method, we gain insight into two implementation projects: one of an information technology (IT) system and one of a process. We compare them using design thinking...... and strategic alignment theories. Based on the discussion, we assess the shortcomings of the process-centric and technology-centric approaches and argue that a conjoint design approach is required to achieve alignment between processes and technology. From a theoretical stance, this paper offers design-informed...

  5. Towards a service centric contextualized vehicular cloud

    NARCIS (Netherlands)

    Hu, Xiping; Wang, Lei; Sheng, Zhengguo; TalebiFard, Peyman; Zhou, Li; Liu, Jia; Leung, Victor C.M.

    2014-01-01

    This paper proposes a service-centric contextualized vehicular (SCCV) cloud platform to facilitate the deployment and delivery of cloud-based mobile applications over vehicular networks. SCCV cloud employs a multi-tier architecture that consists of the network, mobile device, and cloud tiers. Based

  6. Cooperative Human-Centric Sensing Cooperation

    DEFF Research Database (Denmark)

    Mihovska, Albena

    Human-Centric Sensing (HCS) is a new concept relevant to Internet of Things (IoT). HCS connectivity, referred to as “smart connectivity” enables applications that are highly personalized and often time-critical. In a typical HCS scenario, there may be many hundreds of sensor streams connections...

  7. Application of the Strategic Alignment Model and Information Technology Governance Concepts to Support Network Centric Warfare

    Science.gov (United States)

    2006-03-01

    Defense, Editor. 2001. 12. Defense, D.o., Department of Defense Architecture Framework Deskbook. 2004, Department of Defense. 13. Denzin , N. and...Y. Lincoln , Handbook of Qualitative Research. 2000, California: Sage. 14. Flick, U., An Introduction to Qualitative research: Theory, method and

  8. Cultural Competence and the Operational Commander: Moving Beyond Cultural Awareness into Culture-Centric Warfare

    National Research Council Canada - National Science Library

    Karcanes, James A

    2007-01-01

    The term "cultural awareness" serves as the new favorite Department of Defense buzzword but fails in its definition to adequately articulate the complexity of culture and the high level of cultural...

  9. A Framework for the Management of Evolving Requirements in Software Systems Supporting Network-Centric Warfare

    National Research Council Canada - National Science Library

    Reynolds, Linda K

    2006-01-01

    .... There are many sources of requirements for these software systems supporting NCO, which may increase in number as the Services continue to develop the capabilities necessary for the transformation...

  10. Trust and Influence in the Information Age: Operational Requirements for Network Centric Warfare

    National Research Council Canada - National Science Library

    Blatt, Nicole

    2004-01-01

    ...) based on information technology. This thesis will show that the Information RMA not only exists, but will also reshape how we plan, operate, educate, organize, train, and equip forces for the 21st century...

  11. Using the Dynamic Model of Situated Cognition to Assess Network Centric Warfare in Field Settings

    National Research Council Canada - National Science Library

    Shattuck, Lawrence G; Miller, Nita L; Miller, Gregory A

    2007-01-01

    ...: modeling individual performance, military C2, naval operations, human error in military mishaps, team behaviors in complex organizations and, most recently serving as an aid to system designers...

  12. The Data Warehouse in Service Oriented Architectures and Network Centric Warfare

    National Research Council Canada - National Science Library

    Lenahan, Jack

    2005-01-01

    ... at all policy and command levels to support superior decision making? Analyzing the anticipated massive amount of GIG data will almost certainly require data warehouses and federated data warehouses...

  13. Application of the Strategic Alignment Model and Information Technology Governance Concepts to Support Network Centric Warfare

    National Research Council Canada - National Science Library

    Valentine, Jennifer R

    2006-01-01

    .... This thesis proposes that while the two areas? success fundamentally resides in the implementation and exploitation of technology, it is only through sound IT Governance policies and strategic alignment practices that success can be measured...

  14. Network Centric Warfare and Its Effect on Unit of Employmentx (UEx) Use of Mission Command

    National Research Council Canada - National Science Library

    Hannon, Jeffery A

    2005-01-01

    The 2002 NSS call for "transformING to meet the challenges and opportunities of the twenty-first century", and the Army's leadership elected to concentrate the service's transformation efforts on battle command...

  15. Network Centric Warfare Concepts in the Royal Netherlands Army C2 Architecture

    NARCIS (Netherlands)

    Meijden, M.G. van der

    2004-01-01

    The Royal Netherlands Army (RNLA) has been working on its second generation C2 Information System since 2000. Its first generation Integrated Staff Information System (ISIS) that is currently deployed is based on ATCCIS specifications and uses the ATCCIS Replication Mechanism for database to

  16. Network-Centric Warfare: Implications for Applying the Principles of War

    National Research Council Canada - National Science Library

    Caneva, Joseph

    1999-01-01

    Noting the competitive advantage that a computer network system completely integrated into a firm's structure and operations has provided to businesses, individuals have begun to argue that adoption...

  17. Computing and Communications Infrastructure for Network-Centric Warfare: Exploiting COTS, Assuring Performance

    Science.gov (United States)

    2004-06-01

    remote databases, has seen little vendor acceptance. Each database ( Oracle , DB2, MySQL , etc.) has its own client- server protocol. Therefore each...existing standards – SQL , X.500/LDAP, FTP, etc. • View information dissemination as selective replication – State-oriented vs . message-oriented...allowing the 8 application to start. The resource management system would serve as a broker to the resources, making sure that resources are not

  18. Unconventional Cyber Warfare: Cyber Opportunities in Unconventional Warfare

    Science.gov (United States)

    2014-06-01

    Internet service provider IW irregular warfare MCO major combat operations MySQL open-source relational database management system NATO North...today, often with no regard for legal or ethical constraints. A better course of action would be to conduct operations in cyberspace within the precepts...built in feature of MySQL that 97 John Markoff, “Before the Gunfire, Cyberattacks,” York Times, August 13, 2008, sec. Technology, 1, http

  19. Hybrid Warfare: the 21st Century Russian Way of Warfare

    Science.gov (United States)

    2017-05-25

    to wage information operations— from television, to the Internet, to unconventional forces on the ground spreading the message word -of- mouth ...adversarial vulnerabilities. Many of the peculiarities of hybrid warfare described herein are inextricably linked to Russia’s social , political, and...the US election. Then they utilized various means of media to distribute that information with the goal to discredit the US political process and

  20. 2008 13th Expeditionary Warfare Conference

    Science.gov (United States)

    2008-10-23

    platforms – Emphasize a mixed fleet approach that spans the “iron triangle” – Integrate MRAP into the fleet mix – Transition to a fleet of tactical...Urban Warfare Mountain Warfare Desert Warfare Jungle Riverine Special Skills Recon LOG CSS ENG MT HS Ord Maint EOD Pers Retrival ...Detection (Specialized Platform FLGPR)Stand-off (60M) Scaleable Neutralization (Area coverage) ABV Delivery Ground Cueing Stand-off (800M) Scaleable

  1. Information Warfare in the Cyber Domain

    National Research Council Canada - National Science Library

    Takemoto, Glenn

    2001-01-01

    ...). This paper lays a foundation by defining the terminology associated with Information Warfare in the Cyber Domain, reviews the threat and illustrates the vulnerabilities of our information systems...

  2. MEANS AND METHODS OF CYBER WARFARE

    Directory of Open Access Journals (Sweden)

    Dan-Iulian VOITAȘEC

    2016-06-01

    Full Text Available According to the Declaration of Saint Petersburg of 1868 “the only legitimate object which States should endeavor to accomplish during war is to weaken the military forces of the enemy”. Thus, International Humanitarian Law prohibits or limits the use of certain means and methods of warfare. The rapid development of technology has led to the emergence of a new dimension of warfare. The cyber aspect of armed conflict has led to the development of new means and methods of warfare. The purpose of this paper is to study how the norms of international humanitarian law apply to the means and methods of cyber warfare.

  3. Cyber warfare building the scientific foundation

    CERN Document Server

    Jajodia, Sushil; Subrahmanian, VS; Swarup, Vipin; Wang, Cliff

    2015-01-01

    This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially gove

  4. Shadow Wars: An Analysis of Counterinsurgency Warfare

    National Research Council Canada - National Science Library

    Dogan, Osman

    2005-01-01

    ... of the current strategic approaches to counterinsurgency warfare. Toward this end, a systems model approach, which views insurgent organizations as open systems, is adapted to the insurgent environment...

  5. The ethics of drone warfare

    OpenAIRE

    Fatić Aleksandar

    2017-01-01

    The paper investigates the compatibility of the modern technologies of warfare, specifically the use of offensive drones, with traditional military ethics and suggests that the new technologies radically change the value system of the military in ways which make large parts of the traditional military ethics inapplicable. The author suggests that Agamben’s concept of ‘effectivity’ through ‘special actions’ which mark one’s belonging to a particular communit...

  6. Radioecological aspects of nuclear warfare

    International Nuclear Information System (INIS)

    Edvardson, Kay

    1977-01-01

    Radioactive fallout, one of the major effects of nuclear warfare, will cause acute radiation sickness within the close-in or intermediate areas downwind from surface bursts. Global fallout from high yield explosions will be fairly evenly distributed in the hemisphere where the explosions occur, and will cause irradiation from ground deposit, inhaled material and contaminated food. Estimates of collective doses and the approximate number of late casualties from the global contamination are presented for a given total explosion yield. (author)

  7. Betting on change: Tenet deal with Vanguard shows it's primed to try ACO effort, new payment model.

    Science.gov (United States)

    Kutscher, Beth

    2013-07-01

    Tenet Healthcare Corp.'s acquisition of Vanguard Health Systems is a sign the investor-owned chain is willing to take a chance on alternative payment models such as accountable care organizations. There's no certainty that ACOs will deliver the improvements on quality or cost savings, but Vanguard Vice Chairman Keith Pitts, left, says his system's Pioneer ACO in Detroit has already achieved some cost savings.

  8. Process-centric IT in Practice

    DEFF Research Database (Denmark)

    Siurdyban, Artur; Nielsen, Peter Axel

    2012-01-01

    , they should find governance structures which ensure that there is a fruitful collaboration between the corporate IT department and the local business units. This collaboration should also include different competences with both IT and process management and competences differing because they are centralized......This case illustrates and discusses the issues and challenges at Kerrtec Corporation in their effort to establish process-centric IT management. The case describes how a local business unit in Kerrtec managed their business processes and how that created a necessity for IT to be managed to match...... the business processes. It also describes how the central IT department at corporate headquarters responded to requests rooted in business processes. In discussing the challenges for Kerrtec, it is clear that they will have to map out the needed competences for process-centric IT management. In particular...

  9. EVALUATING A CUSTOMER-CENTRIC APPROACH

    Directory of Open Access Journals (Sweden)

    Luigi-Nicolae DUMITRESCU

    2007-01-01

    Full Text Available Customer focus is, at best, only one element of the relationship between a company and its customers. At worst it is a board-room buzzworld, witch makes every board member feel a little more secure. Not unlike the phrase “working towards equal opportunities”, it is showing an awareness of a need but is not addressing the issues. Customer focus must lead to something meaningful, will probably require sacrifices and is just one of the steps necessary to become truly customer-centric. A customer focus puts your customers high on your list of priorities. When you put your customers into the heart of your business, make customers part of the culture, then you to become customer-centric.

  10. Transforming Systems Engineering through Model Centric Engineering

    Science.gov (United States)

    2017-08-08

    Contract No. HQ0034-13-D-0004 Report No. SERC-2017-TR-110 Date: August 8, 2017 Transforming Systems Engineering through Model-Centric... Engineering Technical Report SERC-2017-TR-110 Update: August 8, 2017 Principal Investigator: Mark Blackburn, Stevens Institute of Technology Co...Evangelista Sponsor: U.S. Army Armament Research, Development and Engineering Center (ARDEC), Office of the Deputy Assistant Secretary of Defense for

  11. Using big data for customer centric marketing

    OpenAIRE

    Camilleri, Mark Anthony; Evans, Chris

    2016-01-01

    This chapter deliberates on “big data” and provides a short overview of business intelligence and emerging analytics. It underlines the importance of data for customer-centricity in marketing. This contribution contends that businesses ought to engage in marketing automation tools and apply them to create relevant, targeted customer experiences. Today’s business increasingly rely on digital media and mobile technologies as on-demand, real-time marketing has become more personalised than ever....

  12. Grid Service for User-Centric Job

    Energy Technology Data Exchange (ETDEWEB)

    Lauret, Jerome

    2009-07-31

    The User Centric Monitoring (UCM) project was aimed at developing a toolkit that provides the Virtual Organization (VO) with tools to build systems that serve a rich set of intuitive job and application monitoring information to the VO’s scientists so that they can be more productive. The tools help collect and serve the status and error information through a Web interface. The proposed UCM toolkit is composed of a set of library functions, a database schema, and a Web portal that will collect and filter available job monitoring information from various resources and present it to users in a user-centric view rather than and administrative-centric point of view. The goal is to create a set of tools that can be used to augment grid job scheduling systems, meta-schedulers, applications, and script sets in order to provide the UCM information. The system provides various levels of an application programming interface that is useful through out the Grid environment and at the application level for logging messages, which are combined with the other user-centric monitoring information in a abstracted “data store”. A planned monitoring portal will also dynamically present the information to users in their web browser in a secure manor, which is also easily integrated into any JSR-compliant portal deployment that a VO might employ. The UCM is meant to be flexible and modular in the ways that it can be adopted to give the VO many choices to build a solution that works for them with special attention to the smaller VOs that do not have the resources to implement home-grown solutions.

  13. Hybrid Warfare: Preparing for Future Conflict

    Science.gov (United States)

    2015-02-17

    ciceromagazine.com/?s=getting+behind+hybrid+warfare. Brown , Col Leslie F. “Twenty-First Century Warfare Will be Hybrid.” Carlisle Barracks, PA...Lebanon and Gaza.” Rand Corporation Occasional Paper. Santa Monica, CA: Rand Corporation, 2010. Jones, Gareth and Darya Korsunskaya. “U.S., EU

  14. Joint Polar Satellite System (JPSS) Common Ground System (CGS) Overview and Architectural Tenets

    Science.gov (United States)

    Miller, S. W.; Grant, K. D.; Jamilkowski, M. L.

    2013-12-01

    objectives: 1) 'Operationalizing' Suomi NPP, which had originally been intended as a risk reduction mission 2) Leveraging lessons learned to date in multi-mission support 3) Taking advantage of newer, more reliable and efficient technologies 4) Satisfying new requirements and constraints due to the continually evolving budgetary environment To meet these needs, we are upgrading the CGS in the following ways: 1) Performing a system-wide technology refresh for enhanced performance and security 2) Establishing a new front end architecture and augmenting the PRN for mission data transport 3) Standardizing data protocols to accommodate an even wider variety of missions 4) Enhancing flexibility and modularity in IDPS for new and evolving algorithms 5) Achieving comprehensive situational awareness 6) Deploying a full backup capability for Continuity of Operations (COOP) 7) Providing an enclave in compliance with the latest security standards from the National Institute of Standards and Technology (NIST) 800-53 This paper will provide an overview of the CGS as it is deployed and operating today, along with a summary of the architectural tenets that will facilitate even easier incorporation of new missions and applications in 2015.

  15. performance evaluation of a pilot paraplegic centricity mobility aid

    African Journals Online (AJOL)

    eobe

    PERFORMANCE EVALUATION OF A PILOT PARAPLEGIC CENTRICITY. MOBILITY AID. MOBILITY ... The result of the test showed a remarkable improvement in. Wilcoxin's signed rank test. .... RESEARCH METHOD. RESEARCH METHOD.

  16. Reactivity of Dual-Use Decontaminants with Chemical Warfare Agents

    Science.gov (United States)

    2016-07-01

    REACTIVITY OF DUAL-USE DECONTAMINANTS WITH CHEMICAL WARFARE AGENTS ECBC-TR-1384... Decontaminants with Chemical Warfare Agents 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Willis, Matthew P...extraction) of chemical warfare agents from materials. 15. SUBJECT TERMS GD HD Decontamination Hazard mitigation VX Chemical warfare agent Liquid-phase

  17. The Information Warfare Life Cycle Model

    Directory of Open Access Journals (Sweden)

    Brett van Niekerk

    2011-11-01

    Full Text Available Information warfare (IW is a dynamic and developing concept, which constitutes a number of disciplines. This paper aims to develop a life cycle model for information warfare that is applicable to all of the constituent disciplines. The model aims to be scalable and applicable to civilian and military incidents where information warfare tactics are employed. Existing information warfare models are discussed, and a new model is developed from the common aspects of these existing models. The proposed model is then applied to a variety of incidents to test its applicability and scalability. The proposed model is shown to be applicable to multiple disciplines of information warfare and is scalable, thus meeting the objectives of the model.

  18. The Information Warfare Life Cycle Model

    Directory of Open Access Journals (Sweden)

    Brett van Niekerk

    2011-03-01

    Full Text Available Information warfare (IW is a dynamic and developing concept, which constitutes a number of disciplines. This paper aims to develop a life cycle model for information warfare that is applicable to all of the constituent disciplines. The model aims to be scalable and applicable to civilian and military incidents where information warfare tactics are employed. Existing information warfare models are discussed, and a new model is developed from the common aspects of these existing models. The proposed model is then applied to a variety of incidents to test its applicability and scalability. The proposed model is shown to be applicable to multiple disciplines of information warfare and is scalable, thus meeting the objectives of the model.

  19. Radioecological aspects of nuclear warfare

    International Nuclear Information System (INIS)

    Edvarson, K.

    1975-01-01

    The radioactive fallout from nuclear explosions is one of the major effects of nuclear warfare. Those levels causing acute radiation sickness are to be expected only within the close-in or intermediate areas downwind from surface bursts. Global fallout from high yield explosions will be fairly evenly distributed in the hemisphere where the explosions occurred and cause irradiation from ground deposit, inhaled material and contaminated food. The collective doses and the order of magnitude of late casualties from this global contamination are estimated for a given total explosion yield. (auth)

  20. Information warfare technologies in political discourse

    Directory of Open Access Journals (Sweden)

    Karpova Anna Yu.

    2016-01-01

    Full Text Available We attempt to examine the technology of «information warfare» in this paper. The dominant theme of the paper is that the outcome of the information warfare is important not only for the future of a state itself but for the future of the world balance of forces. The main task of geopolitical actors in information warfare is to introduce ideas corresponding to their interests into mass consciousness. All participants of political conflicts have common features in technologies of Information warfare. The information anomie is the indicator of the great geopolitical actors’ personified interests on the stage of «information warfare» - the process resulted in destroying the communicative line: report-information understanding and disrupting the social order in society. In this paper authors describe the following Information Warfare technologies: "Political volcano" technology; "SPIN" technology; "Widening media resource" technology; "specific gravity" technology; "Cold War 2.0" technology and Information cleaningup technology. It is assumed that in the future there will be new instructions on applying technologies of information warfare. To impart perspective to the paper we consider examples, opinions and trends.

  1. Human-Centric Interfaces for Ambient Intelligence

    CERN Document Server

    Aghajan, Hamid; Delgado, Ramon Lopez-Cozar

    2009-01-01

    To create truly effective human-centric ambient intelligence systems both engineering and computing methods are needed. This is the first book to bridge data processing and intelligent reasoning methods for the creation of human-centered ambient intelligence systems. Interdisciplinary in nature, the book covers topics such as multi-modal interfaces, human-computer interaction, smart environments and pervasive computing, addressing principles, paradigms, methods and applications. This book will be an ideal reference for university researchers, R&D engineers, computer engineers, and graduate s

  2. Variability of centric relation position in TMD patients.

    NARCIS (Netherlands)

    Zonnenberg, A.J.J.; Mulder, J.

    2006-01-01

    Reproducibility of the centric relation position for patients with temporomandibular disorders (TMD) is not documented in the current literature. It was the objective of this study to assess clinical variability of the centric relation position for TMD patients with a muscle-determined technique by

  3. Task and Interruption Management in Activity-Centric Computing

    DEFF Research Database (Denmark)

    Jeuris, Steven

    to address these not in isolation, but by fundamentally reevaluating the current computing paradigm. To this end, activity-centric computing has been brought forward as an alternative computing paradigm, addressing the increasing strain put on modern-day computing systems. Activity-centric computing follows...... the scalability and intelligibility of current research prototypes. In this dissertation, I postulate that such issues arise due to a lack of support for the full set of practices which make up activity management. Most notably, although task and interruption management are an integral part of personal...... information management, they have thus far been neglected in prior activity-centric computing systems. Advancing the research agenda of activity-centric computing, I (1) implement and evaluate an activity-centric desktop computing system, incorporating support for interruptions and long-term task management...

  4. Moltke as a Model for Information Warfare

    National Research Council Canada - National Science Library

    Gallagher, Daniel P

    1998-01-01

    ... with late 20th century Information Warfare (IW). Clausewitz, with his emphasis on concentrating forces for a decisive battle, or Sun Tzu, with his focus on an indirect approach and subduing the enemy without battle, might appear to be more...

  5. Gas Warfare in World War I.

    Science.gov (United States)

    Flintham, A. J.

    1978-01-01

    The effectiveness of gas warfare during World War I was increased by the lack of a basic understanding of the behavior of gases on the part of the soldiers. This was a result of deficiencies in science education. (BB)

  6. Prehistoric ceremonial warfare: beginning of institutionalized violence

    Czech Academy of Sciences Publication Activity Database

    Turek, Jan

    2017-01-01

    Roč. 13, č. 3 (2017), s. 535-548 ISSN 1555-8622 Institutional support: RVO:67985912 Keywords : human aggression * ceremonial warfare * archery symbolism * Neolithic * Chalcolithic * Europe Subject RIV: AC - Archeology, Anthropology, Ethnology OBOR OECD: Archaeology

  7. On Cyber Warfare Command and Control Systems

    National Research Council Canada - National Science Library

    Howes, Norman R; Mezzino, Michael; Sarkesain, John

    2004-01-01

    .... Cyber warfare then becomes a one-sided battle where the attacker makes all the strikes and the target of the attack responds so slowly that the attacker usually gets away without being identified...

  8. Enzymatic Decontamination of Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Raushel, Frank

    2000-01-01

    The primary objective of this research program is the development of a versatile enzyme-based system that is fully optimized for the decontamination, destruction, and detection of know chemical warfare agents...

  9. Mountain Warfare: The Need for Specialist Training

    National Research Council Canada - National Science Library

    Malik, Muhammad

    2003-01-01

    This study focuses on the need for specialist training for mountain warfare. It analyzes the special characteristics of mountain and high altitude terrain which affect conduct of military operations...

  10. Insurgent Uprising: An Unconventional Warfare Wargame

    Science.gov (United States)

    2017-12-01

    Cleveland, Charles T. Connett, and Will Irwin. “Unconventional Warfare in the Gray Zone.” Joint Forces Quarterly 80, no. 1 (2016). Work, Robert O...CODE 13. ABSTRACT (maximum 200 words) Today, and in the future, unconventional solutions will present U.S. policymakers with options for dealing...training objectives and will complement existing training exercises. 14. SUBJECT TERMS unconventional warfare, foreign internal defense, direct

  11. Distributed computing environment for Mine Warfare Command

    OpenAIRE

    Pritchard, Lane L.

    1993-01-01

    Approved for public release; distribution is unlimited. The Mine Warfare Command in Charleston, South Carolina has been converting its information systems architecture from a centralized mainframe based system to a decentralized network of personal computers over the past several years. This thesis analyzes the progress Of the evolution as of May of 1992. The building blocks of a distributed architecture are discussed in relation to the choices the Mine Warfare Command has made to date. Ar...

  12. Route survey periodicity for mine warfare

    OpenAIRE

    Coke, Hartwell F.

    2009-01-01

    Approved for public release, distribution unlimited One of the Navy's most long standing challenges has been conquering the mine warfare threat. As mines and mine warfare techniques evolve and become more sophisticated, so does the United States' ability to counter the threat. The United States newest technique for countering a potential mined harbor, or route, is a process known as "change detection." This concept uses previous side scan sonar images of the area prior to a mining event an...

  13. Revisiting video game ratings: Shift from content-centric to parent-centric approach

    Directory of Open Access Journals (Sweden)

    Jiow Hee Jhee

    2017-01-01

    Full Text Available The rapid adoption of video gaming among children has placed tremendous strain on parents’ ability to manage their children’s consumption. While parents refer online to video games ratings (VGR information to support their mediation efforts, there are many difficulties associated with such practice. This paper explores the popular VGR sites, and highlights the inadequacies of VGRs to capture the parents’ concerns, such as time displacement, social interactions, financial spending and various video game effects, beyond the widespread panics over content issues, that is subjective, ever-changing and irrelevant. As such, this paper argues for a shift from content-centric to a parent-centric approach in VGRs, that captures the evolving nature of video gaming, and support parents, the main users of VGRs, in their management of their young video gaming children. This paper proposes a Video Games Repository for Parents to represent that shift.

  14. On the Probability of Predicting and Mapping Traditional Warfare Measurements to the Cyber Warfare Domain

    CSIR Research Space (South Africa)

    Grobler, M

    2014-07-01

    Full Text Available Cyber warfare is a contentious topic, with no agreement on whether this is a real possibility or an unrealistic extension of the physical battlefield. This article will not debate the validity and legality of the concept of cyber warfare...

  15. People-centric sensing in assistive healthcare

    DEFF Research Database (Denmark)

    Giannetsos, Thanassis; Dimitriou, Tassos; Prasad, Neeli R.

    2011-01-01

    , we discuss the latest advances in security and privacy protection strategies that hold promise in this new exciting paradigm. We hope this work will better highlight the need for privacy in people-centric sensing applications and spawn further research in this area. Copyright © 2011 John Wiley & Sons......As the domains of pervasive computing and sensor networking are expanding, there is an ongoing trend towards assistive living and healthcare support environments that can effectively assimilate these technologies according to human needs. Most of the existing research in assistive healthcare...... follows a more passive approach and has focused on collecting and processing data using a static-topology and an application-aware infrastructure. However, with the technological advances in sensing, computation, storage, and communications, a new era is about to emerge changing the traditional view...

  16. OptiCentric lathe centering machine

    Science.gov (United States)

    Buß, C.; Heinisch, J.

    2013-09-01

    High precision optics depend on precisely aligned lenses. The shift and tilt of individual lenses as well as the air gap between elements require accuracies in the single micron regime. These accuracies are hard to meet with traditional assembly methods. Instead, lathe centering can be used to machine the mount with respect to the optical axis. Using a diamond turning process, all relevant errors of single mounted lenses can be corrected in one post-machining step. Building on the OptiCentric® and OptiSurf® measurement systems, Trioptics has developed their first lathe centering machines. The machine and specific design elements of the setup will be shown. For example, the machine can be used to turn optics for i-line steppers with highest precision.

  17. 2012 International Conference on Human-centric Computing

    CERN Document Server

    Jin, Qun; Yeo, Martin; Hu, Bin; Human Centric Technology and Service in Smart Space, HumanCom 2012

    2012-01-01

    The theme of HumanCom is focused on the various aspects of human-centric computing for advances in computer science and its applications and provides an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of human-centric computing. In addition, the conference will publish high quality papers which are closely related to the various theories and practical applications in human-centric computing. Furthermore, we expect that the conference and its publications will be a trigger for further related research and technology improvements in this important subject.

  18. Manage customer-centric innovation--systematically.

    Science.gov (United States)

    Selden, Larry; MacMillan, Ian C

    2006-04-01

    No matter how hard companies try, their approaches to innovation often don't grow the top line in the sustained, profitable way investors expect. For many companies, there's a huge difference between what's in their business plans and the market's expectations for growth (as reflected in firms' share prices, market capitalizations, and P/E ratios). This growth gap springs from the fact that companies are pouring money into their insular R&D labs instead of working to understand what the customer wants and using that understanding to drive innovation. As a result, even companies that spend the most on R&D remain starved for both customer innovation and market-capitalization growth. In this article, the authors spell out a systematic approach to innovation that continuously fuels sustained, profitable growth. They call this approach customer-centric innovation, or CCI. At the heart of CCI is a rigorous customer R&D process that helps companies to continually improve their understanding of who their customers are and what they need. By so doing, they consistently create or improve their customer value proposition. Customer R&D also focuses on better ways of communicating value propositions and delivering the complete experience to real customers. Since so much of the learning about customers and so much of the experimentation with different segmentations, value propositions, and delivery mechanisms involve the people who regularly deal with customers, it is absolutely essential for frontline employees to be at the center of the CCI process. Simply put, customer R&D propels the innovation effort away from headquarters and the traditional R&D lab out to those closest to the customer. Using the example of the luggage manufacturer Tumi, the authors provide a step-by-step approach for achieving true customer-centric innovation.

  19. The Impact of Irregular Warfare on the US Army

    National Research Council Canada - National Science Library

    McDonald, III, Roger L

    2006-01-01

    Although the U.S. Army has yet to clearly define irregular warfare, it is imperative that the Army take near-term action to enhance the ability of Soldiers and units to operate effectively in an irregular warfare environment...

  20. Dilemmas of Warfare in Densely Populated Civilian Areas

    OpenAIRE

    Moshe Tamir

    2012-01-01

    This essay attempts to present operational perspectives on conducting warfare in densely populated areas. It also distinguishes between three types of combat within this general category, with the goal of shedding light on this complex type of warfare.

  1. Architecture design in global and model-centric software development

    NARCIS (Netherlands)

    Heijstek, Werner

    2012-01-01

    This doctoral dissertation describes a series of empirical investigations into representation, dissemination and coordination of software architecture design in the context of global software development. A particular focus is placed on model-centric and model-driven software development.

  2. Firewall Mechanism in a User Centric Smart Card Ownership Model

    OpenAIRE

    Akram , Raja Naeem; Markantonakis , Konstantinos; Mayes , Keith

    2010-01-01

    International audience; Multi-application smart card technology facilitates applications to securely share their data and functionality. The security enforcement and assurance in application sharing is provided by the smart card firewall. The firewall mechanism is well defined and studied in the Issuer Centric Smart Card Ownership Model (ICOM), in which a smart card is under total control of its issuer. However, it is not analysed in the User Centric Smart Card Ownership Model (UCOM) that del...

  3. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  4. ISIL's Hybrid Warfare in Syria & Iraq

    DEFF Research Database (Denmark)

    Sørensen, Heine

    2016-01-01

    of and ability to synchronize various instruments of power with a view to achieving their end-state. With regards to the second part of the problem statement, the analysis demonstrates how ISIL employed horizontal escalation and ambiguity initially, but later on turned to vertical escalation, within the military......The case study specifically seeks to answer the following problem statement: Does ISIL qualify as an actor using hybrid warfare and if so what characterizes their particular use of this type of warfare? Based on an analysis of ISIL’s warfare from August 2012 to August 2016 the chapter argues......, that it is possible to answer the first part of the problem statement in an affirmative way. Hence, ISIL is not only theoretically prone to hybridity by organizational setup, and by the people comprising the organization, but has in fact continuously acted according to a hybrid logic in its prioritization...

  5. Survey on Urban Warfare Augmented Reality

    Directory of Open Access Journals (Sweden)

    Xiong You

    2018-01-01

    Full Text Available Urban warfare has become one of the main forms of modern combat in the twenty-first century. The main reason why urban warfare results in hundreds of casualties is that the situational information of the combatant is insufficient. Accessing information via an Augmented Reality system can elevate combatants’ situational awareness to effectively improve the efficiency of decision-making and reduce the injuries. This paper begins with the concept of Urban Warfare Augmented Reality (UWAR and illuminates the objectives of developing UWAR, i.e., transparent battlefield, intuitional perception and natural interaction. Real-time outdoor registration, information presentation and natural interaction are presented as key technologies of a practical UWAR system. Then, the history and current research state of these technologies are summarized and their future developments are highlighted from three perspectives, i.e., (1 Better integration with Geographic Information System and Virtual Geographic Environment; (2 More intelligent software; (3 More powerful hardware.

  6. Mongol Warfare in the Pre-Dissolution Period »

    Directory of Open Access Journals (Sweden)

    Timothy May

    2015-01-01

    Full Text Available Although the Mongols used many of the tactics and strategies that steppe nomads had used for centuries, the Mongols refined steppe warfare so that this style of warfare reached its apogee during the Mongol Empire. Furthermore, the Mongols developed a style of warfare that made them possibly the greatest military force in history. This work examines several facets of the pre-dissolution period (1200–1260. With the dissolution of the Mongol Empire, Mongol warfare once again changed. In some areas it remained complex while in others it regressed to traditional forces of steppe warfare, still potent but not as effective as the pre-dissolution period.

  7. Weather-centric rangeland revegetation planning

    Science.gov (United States)

    Hardegree, Stuart P.; Abatzoglou, John T.; Brunson, Mark W.; Germino, Matthew; Hegewisch, Katherine C.; Moffet, Corey A.; Pilliod, David S.; Roundy, Bruce A.; Boehm, Alex R.; Meredith, Gwendwr R.

    2018-01-01

    Invasive annual weeds negatively impact ecosystem services and pose a major conservation threat on semiarid rangelands throughout the western United States. Rehabilitation of these rangelands is challenging due to interannual climate and subseasonal weather variability that impacts seed germination, seedling survival and establishment, annual weed dynamics, wildfire frequency, and soil stability. Rehabilitation and restoration outcomes could be improved by adopting a weather-centric approach that uses the full spectrum of available site-specific weather information from historical observations, seasonal climate forecasts, and climate-change projections. Climate data can be used retrospectively to interpret success or failure of past seedings by describing seasonal and longer-term patterns of environmental variability subsequent to planting. A more detailed evaluation of weather impacts on site conditions may yield more flexible adaptive-management strategies for rangeland restoration and rehabilitation, as well as provide estimates of transition probabilities between desirable and undesirable vegetation states. Skillful seasonal climate forecasts could greatly improve the cost efficiency of management treatments by limiting revegetation activities to time periods where forecasts suggest higher probabilities of successful seedling establishment. Climate-change projections are key to the application of current environmental models for development of mitigation and adaptation strategies and for management practices that require a multidecadal planning horizon. Adoption of new weather technology will require collaboration between land managers and revegetation specialists and modifications to the way we currently plan and conduct rangeland rehabilitation and restoration in the Intermountain West.

  8. Living in a Patient-Centric Universe.

    Science.gov (United States)

    Kraus, Dennis H

    2016-12-01

    Patients with head and neck cancer face a number of challenges in terms of treatment, cure of their underlying malignant condition, and quality of survivorship. This presentation will focus on the patient perception of both the quality of care and the empathy and availability of the head and neck oncology team. It has become evident that the quality of survivorship plays a central role in the patient's decision-making process. The process of decision making by the patient facing head and neck cancer and the impact on treatment choices will be explored. The ability of the patient and her or his support system to navigate through the increasingly complicated health care system will be considered, with an emphasis on strategies for success. Finally, the role of the of the head and neck surgeon, and the need for physician wellness in predicating successful patient outcomes will be considered. The ultimate goal of achieving optimal care, superior patient outcomes, and patient satisfaction is the true objective of the concept of living in a patient-centric universe.

  9. Experiences with a researcher-centric ELN.

    Science.gov (United States)

    Badiola, Katrina A; Bird, Colin; Brocklesby, William S; Casson, John; Chapman, Richard T; Coles, Simon J; Cronshaw, James R; Fisher, Adam; Frey, Jeremy G; Gloria, Danmar; Grossel, Martin C; Hibbert, D Brynn; Knight, Nicola; Mapp, Lucy K; Marazzi, Luke; Matthews, Brian; Milsted, Andy; Minns, Russell S; Mueller, Karl T; Murphy, Kelly; Parkinson, Tim; Quinnell, Rosanne; Robinson, John S; Robertson, Murray N; Robins, Michael; Springate, Emma; Tizzard, Graham; Todd, Matthew H; Williamson, Alice E; Willoughby, Cerys; Yang, Erica; Ylioja, Paul M

    2015-03-01

    Electronic Laboratory Notebooks (ELNs) are progressively replacing traditional paper books in both commercial research establishments and academic institutions. University researchers require specific features from ELNs, given the need to promote cross-institutional collaborative working, to enable the sharing of procedures and results, and to facilitate publication. The LabTrove ELN, which we use as our exemplar, was designed to be researcher-centric ( i.e. , not only aimed at the individual researcher's basic needs rather than to a specific institutional or subject or disciplinary agenda, but also able to be tailored because it is open source). LabTrove is being used in a heterogeneous set of academic laboratories, for a range of purposes, including analytical chemistry, X-ray studies, drug discovery and a biomaterials project. Researchers use the ELN for recording experiments, preserving data collected, and for project coordination. This perspective article describes the experiences of those researchers from several viewpoints, demonstrating how a web-based open source electronic notebook can meet the diverse needs of academic researchers.

  10. Guiding Warfare to Reach Sustainable Peace

    DEFF Research Database (Denmark)

    Vestenskov, David; Drewes, Line

    The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition of develo......The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition...... of developing best practices in the education and implementation of IHL in capacity building of security forces....

  11. Biological warfare, bioterrorism, and biocrime.

    Science.gov (United States)

    Jansen, H J; Breeveld, F J; Stijnis, C; Grobusch, M P

    2014-06-01

    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria or other agents used to cause illness or death in people, but also in animals or plants. It is aimed at creating casualties, terror, societal disruption, or economic loss, inspired by ideological, religious or political beliefs. The success of bioterroristic attempts is defined by the measure of societal disruption and panic, and not necessarily by the sheer number of casualties. Thus, making only a few individuals ill by the use of crude methods may be sufficient, as long as it creates the impact that is aimed for. The assessment of bioterrorism threats and motives have been described before. Biocrime implies the use of a biological agent to kill or make ill a single individual or small group of individuals, motivated by revenge or the desire for monetary gain by extortion, rather than by political, ideological, religious or other beliefs. The likelihood of a successful bioterrorist attack is not very large, given the technical difficulties and constraints. However, even if the number of casualties is likely to be limited, the impact of a bioterrorist attack can still be high. Measures aimed at enhancing diagnostic and therapeutic capabilities and capacities alongside training and education will improve the ability of society to combat 'regular' infectious diseases outbreaks, as well as mitigating the effects of bioterrorist attacks. © 2014 The Authors Clinical Microbiology and Infection © 2014 European Society of Clinical Microbiology and Infectious Diseases.

  12. Overview on Patient Centricity in Cancer Care

    Directory of Open Access Journals (Sweden)

    Šarunas Narbutas

    2017-10-01

    Full Text Available Successful implementation of treatment in cancer care partially depends on how patients' perspectives are taken into account, as preferences of health care professionals and patients may differ. Objectives of this exploratory research were (I to identify patient preferences and values (PPVs in cancer care as indicated by patient organizations (POs, (II to determine how these PPVs are captured in cancer care guidelines and (III to review how guidelines take into account these PPVs. Based on a survey developed and completed by 19 POs, a literature review was conducted to analyse how patient perspectives are incorporated in oncology treatment guidelines. Based on survey results traditional health technology assessment value propositions of oncology care, such as extended life, treatment-free remission and pain reduction, were also highly rated by POs. However, the heterogeneity of cancer PPVs were clearly reflected in the survey results. PPVs in cancer care guidelines were mostly limited to those micro-level aspects that are strictly related to health care provision, such as side-effects and comorbidities. Patient experience, emotional support and convenience of care were relatively neglected fields in the reviewed guidelines. Patient engagement was rarely presented in the guideline development phase. POs believe that patients should be encouraged to take an active role in their own care due to the heterogeneity of cancer patients and PPVs. Even if patient-centricity is a leading paradigm in cancer policy, based on our research it is not yet standard practice to include patients or POs at all appropriate levels of decision-making processes that are related to their health and well-being. Patient engagement should be an integral part of cancer care decision-making. This complexity must be reflected throughout policy making, avoiding a population level “one-size-fits-all” solution.

  13. Toward Operational Art in Special Warfare

    Science.gov (United States)

    2016-02-23

    combatant commanders develop special warfare cam- paign options for their theaters that can be integral parts of the national approach. Getting buy -in at...the resistance spawning franchise operations at home or abroad? – Is the resistance attracting funding or other forms of assistance (indigenous

  14. Warfare and the Teaching of History.

    Science.gov (United States)

    Salevouris, Michael J.

    1989-01-01

    Maintains that history teachers must challenge simplistic romantic notions about war. Proposes two approaches to teaching about war: the use of personal war narratives; and examining the relationship between warfare and society. Discusses literature related to these approaches. Contends that only through realistic assessments of war can peace be…

  15. The technical Dimensions of Nuclear Warfare

    International Nuclear Information System (INIS)

    Broda, E.

    1977-01-01

    This text, written by Engelbert Broda in 1977 is about the dimensions of nuclear warfare. Broda describes the devastating effects of the nuclear bombs dropped in 1945 in Hiroshima and Nagasaki and compares these effects with the explosive power of Hydrogen weapons. He also expresses his concerns about another nuclear ware and analyses possible worsening situations like change in the military doctrine. (nowak)

  16. Book Review COMPOSITE WARFARE: THE CONDUCT OF ...

    African Journals Online (AJOL)

    COMPOSITE WARFARE: THE CONDUCT OF. SUCCESSFUL GROUND FORCE. OPERATIONS IN AFRICA. Eeben Barlow. Abel Esterhuyse, PhD. Stellenbosch University. Pinetown: 30 Degrees South Publishers. 2015, 576 pages. ISBN 9781928211761. Africa is still one of the most conflict-ridden places on earth – from ...

  17. MOSES, development of an Underwater Warfare Testbed

    NARCIS (Netherlands)

    Lentze, S.G.

    2001-01-01

    The TNO underwater warfare (UWW) research programme results in a large number of models used in operational research projects. To enhance the accessibility and re-use of these models for new projects, TNO-FEL has developed the modelling environment ‘MOSES - Maritime Operations Simulation and

  18. Biomonitoring of exposure to chemical warfare agents

    NARCIS (Netherlands)

    Noort, D.; Schans, M.J. van der; Benschop, H.P.

    2006-01-01

    An overview is presented of the major methods that are presently available for biomonitoring of exposure to chemical warfare agents, i.e., nerve agents and sulfur mustard. These methods can be applied for a variety of purposes such as diagnosis and dosimetry of exposure of casualties, verification

  19. New Developments in Chinese Strategic Psychological Warfare

    Science.gov (United States)

    2005-01-01

    Taoism , which coupled hardness with softness in warfare, was not the only influence on the theory of psychological operations in ancient China. Other...portraying Islamic martyrs who appear to speak to soldiers from the clouds.38 In contemporary wars, such as the Gulf War, the first targets attacked have

  20. Preface for the book: Antennas And Propagation for Body-Centric Wireless Communications

    DEFF Research Database (Denmark)

    Frederiksen, Flemming Bjerge; Prasad, Ramjee

    2006-01-01

    The book address the following subjects: Body Centric Wireless Communications possibilities, Electromagnetic properties of the body, On-body Communication Channels at high and low frequency bands, Body Centric UWB Communications, Wearable Antennas for cellular and WLAN communications, Body...

  1. Integrative Health Coach Training: A Model for Shifting the Paradigm Toward Patient-centricity and Meeting New National Prevention Goals.

    Science.gov (United States)

    Smith, Linda L; Lake, Noelle H; Simmons, Leigh Ann; Perlman, Adam; Wroth, Shelley; Wolever, Ruth Q

    2013-05-01

    To describe the evolution, training, and results of an emerging allied health profession skilled in eliciting sustainable health-related behavior change and charged with improving patient engagement. Through techniques sourced from humanistic and positive psychology, solution-focused and mindfulness-based therapies, and leadership coaching, Integrative Health Coaching (IHC) provides a mechanism to empower patients through various stages of learning and change. IHC also provides a method for the creation and implementation of forward-focused personalized health plans. Clinical studies employing Duke University Integrative Medicine's model of IHC have demonstrated improvements in measures of diabetes and diabetes risk, weight management, and risk for cardiovascular disease and stroke. By supporting and enabling individuals in making major lifestyle changes for the improvement of their health, IHC carries the potential to reduce rates and morbidity of chronic disease and impact myriad aspects of healthcare. As a model of educational and clinical innovation aimed at patient empowerment and lifestyle modification, IHC is aligned well with the tenets and goals of recently sanctioned federal healthcare reform, specifically the creation of the first National Prevention and Health Promotion Strategy. IHC may allow greater patient-centricity while targeting the lifestyle-related chronic disease that lies at the heart of the current healthcare crisis.

  2. Advanced Technologies, Embedded and Multimedia for Human-Centric Computing

    CERN Document Server

    Chao, Han-Chieh; Deng, Der-Jiunn; Park, James; HumanCom and EMC 2013

    2014-01-01

    The theme of HumanCom and EMC are focused on the various aspects of human-centric computing for advances in computer science and its applications, embedded and multimedia computing and provides an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of human-centric computing. And the theme of EMC (Advanced in Embedded and Multimedia Computing) is focused on the various aspects of embedded system, smart grid, cloud and multimedia computing, and it provides an opportunity for academic, industry professionals to discuss the latest issues and progress in the area of embedded and multimedia computing. Therefore this book will be include the various theories and practical applications in human-centric computing and embedded and multimedia computing.

  3. Network Centric Warfare Case Study: U.S. V Corps and 3rd Infantry Division (Mechanized) During Operation Iraqi Freedom Combat Operations (Mar-Apr 2003). Volume 3. Network Centric Warfare Insights

    National Research Council Canada - National Science Library

    Tisserand, III, John B

    2003-01-01

    ...), which hypothesizes that a robustly networked force improves information sharing, collaboration, quality of information, and shared situational awareness resulting in significantly increased mission effectiveness...

  4. A Predictive Model of Surface Warfare Officer Retention: Factors Affecting Turnover

    National Research Council Canada - National Science Library

    Gjurich, Gregory

    1999-01-01

    Junior Surface Warfare Officer retention is in a crisis. The Surface Warfare Officer community anticipates an inability to fill Department Head billets due to the number of junior Surface Warfare Officers leaving military service...

  5. The First Salvo: Implications of Standing Rules of Engagement for U.S. Forces in Network-Centric Warfare

    National Research Council Canada - National Science Library

    Donnelly, Michael

    2002-01-01

    .... Information superiority, the capability for cooperatively engaged precision effects, and a responsive command and control architecture will enable commanders operating in NCW to preempt enemy forces...

  6. An Evaluation of the Human Domain Concept: Organizing the Knowledge, Influence, and Activity in Population-Centric Warfare

    Science.gov (United States)

    2015-05-21

    competence inventories that are represented by markets in contract services, rather than a collection of in- house skills, the politics of knowledge...maritime economic and trade market interests stood aside for European powers, such as Spain and Great Britain, who possessed superior technology and...216-232. Accessed November 30, 2014. Business Source Complete, EBSCOhost . Andrews, Frank L. “A Stability Force: The Missing Link in Achieving Full

  7. The Effects of Collaborative Technologies on Individual and Team Performance in a Network Centric Warfare (NCW) Environment

    Science.gov (United States)

    2007-02-01

    realizations of success. For example, Alberts , Garstka, & Stein (1999) identify three domains of research necessary for NCW to become plausibly effective...internal cognitive and affective states, as well as behavioral task processes ( Bandura , 1986). Without an understanding of the present

  8. The Effects of Collaborative Technologies on Individual and Team Performance in a Network Centric Warfare (NCW) Environment

    National Research Council Canada - National Science Library

    Guthrie, Joseph W; Rosen, Michael A; Salas, Eduardo; Nelson, W. T; Bolia, Robert S

    2007-01-01

    .... In the public and private business sector, organizations foster global partnerships that require employees from different parts of the world to work together to develop new ideas, solve problems, and make decisions...

  9. Applying Semantic Web Concepts to Support Net-Centric Warfare Using the Tactical Assessment Markup Language (TAML)

    National Research Council Canada - National Science Library

    Childers, Candace M

    2006-01-01

    .... The current approach to automating data processing is to hard-code programs to parse particular data formats, but this approach is not flexible enough to handle the constantly changing data world...

  10. Information operation/information warfare modeling and simulation

    OpenAIRE

    Buettner, Raymond

    2000-01-01

    Information Operations have always been a part of warfare. However, this aspect of warfare is having ever-greater importance as forces rely more and more on information as an enabler. Modern information systems make possible very rapid creation, distribution, and utilization of information. These same systems have vulnerabilities that can be exploited by enemy forces. Information force-on-force is important and complex. New tools and procedures are needed for this warfare arena. As these t...

  11. Military Engineers and Chemical Warfare Troops (Inzhenernye Voiska Khimicheskie Voiska),

    Science.gov (United States)

    MILITARY FORCES(FOREIGN), *MILITARY ORGANIZATIONS, MILITARY ENGINEERING , INFANTRY, AMPHIBIOUS OPERATIONS, MINELAYING, ARMORED VEHICLES, NUCLEAR...RADIATION, DOSIMETERS, CHEMICAL WARFARE, PROTECTIVE CLOTHING, DECONTAMINATION, HEALTH PHYSICS.

  12. Electronic Warfare: Comprehensive Strategy Needed for Suppressing Enemy Air Defenses

    National Research Council Canada - National Science Library

    2001-01-01

    .... To achieve this suppression, the services use specialized aircraft designed to neutralize, destroy, or temporarily degrade enemy air defense systems through either physical attack or electronic warfare...

  13. Are Current Psychological Operations Procedures Adequate in Information Warfare?

    National Research Council Canada - National Science Library

    Duff, Murray

    1997-01-01

    .... While some aspects of information warfare are conducted domestically, many are executed on foreign soil and involve extensive interaction with other governments, their population, non-governmental...

  14. On bridging relational and document-centric data stores

    NARCIS (Netherlands)

    Roijackers, J.; Fletcher, G.H.L.; Gottlob, G.; Grasso, G.; Olteanu, D.; Schallhart, C.

    2013-01-01

    Big Data scenarios often involve massive collections of nested data objects, typically referred to as "documents." The challenges of document management at web scale have stimulated a recent trend towards the development of document-centric "NoSQL" data stores. Many query tasks naturally involve

  15. User-Centric Multi-Criteria Information Retrieval

    Science.gov (United States)

    Wolfe, Shawn R.; Zhang, Yi

    2009-01-01

    Information retrieval models usually represent content only, and not other considerations, such as authority, cost, and recency. How could multiple criteria be utilized in information retrieval, and how would it affect the results? In our experiments, using multiple user-centric criteria always produced better results than a single criteria.

  16. Ontology for customer centric digital services and analytics

    Science.gov (United States)

    Keat, Ng Wai; Shahrir, Mohammad Shazri

    2017-11-01

    In computer science research, ontologies are commonly utilised to create a unified abstract across many rich and different fields. In this paper, we apply the concept to the customer centric domain of digital services analytics and present an analytics solution ontology. The essence is based from traditional Entity Relationship Diagram (ERD), which then was abstracted out to cover wider areas on customer centric digital services. The ontology we developed covers both static aspects (customer identifiers) and dynamic aspects (customer's temporal interactions). The structure of the customer scape is modeled with classes that represent different types of customer touch points, ranging from digital and digital-stamps which represent physical analogies. The dynamic aspects of customer centric digital service are modeled with a set of classes, with the importance is represented in different associations involving establishment and termination of the target interaction. The realized ontology can be used in development of frameworks for customer centric applications, and for specification of common data format used by cooperating digital service applications.

  17. Interactive Model-Centric Systems Engineering (IMCSE) Phase 5

    Science.gov (United States)

    2018-02-28

    Interactive Model-Centric Systems Engineering (IMCSE) Phase 5 Technical Report SERC-2018-TR-104 Feb 28, 2018 Principal Investigator...Date February 28, 2018 Copyright © 2018 Stevens Institute of Technology, Systems Engineering ...Research Center The Systems Engineering Research Center (SERC) is a federally funded University Affiliated Research Center managed by Stevens

  18. SDN Based User-Centric Framework for Heterogeneous Wireless Networks

    Directory of Open Access Journals (Sweden)

    Zhaoming Lu

    2016-01-01

    Full Text Available Due to the rapid growth of mobile data traffic, more and more basestations and access points (APs have been densely deployed to provide users with ubiquitous network access, which make current wireless network a complex heterogeneous network (HetNet. However, traditional wireless networks are designed with network-centric approaches where different networks have different quality of service (QoS strategies and cannot easily cooperate with each other to serve network users. Massive network infrastructures could not assure users perceived network and service quality, which is an indisputable fact. To address this issue, we design a new framework for heterogeneous wireless networks with the principle of user-centricity, refactoring the network from users’ perspective to suffice their requirements and preferences. Different from network-centric approaches, the proposed framework takes advantage of Software Defined Networking (SDN and virtualization technology, which will bring better perceived services quality for wireless network users. In the proposed user-centric framework, control plane and data plane are decoupled to manage the HetNets in a flexible and coadjutant way, and resource virtualization technology is introduced to abstract physical resources of HetNets into unified virtualized resources. Hence, ubiquitous and undifferentiated network connectivity and QoE (quality of experience driven fine-grained resource management could be achieved for wireless network users.

  19. Game-centric pedagogy and curriculums in higher education

    DEFF Research Database (Denmark)

    Nørgård, Rikke Toft; Murray, John; Morgan, James

    2017-01-01

    This paper examines some recent trends in game-centric education for STEAM (science, technology,engineering, art and mathematics) fields, especially those that explore and promote collaborationamong multiple disciplines. We discuss various multimodal design research activities that draw uponthe a...

  20. Discourse-Centric Learning Analytics: Mapping the Terrain

    Science.gov (United States)

    Knight, Simon; Littleton, Karen

    2015-01-01

    There is an increasing interest in developing learning analytic techniques for the analysis, and support of, high-quality learning discourse. This paper maps the terrain of discourse-centric learning analytics (DCLA), outlining the distinctive contribution of DCLA and outlining a definition for the field moving forwards. It is our claim that DCLA…

  1. Device-Centric Monitoring for Mobile Device Management

    Directory of Open Access Journals (Sweden)

    Luke Chircop

    2016-03-01

    Full Text Available The ubiquity of computing devices has led to an increased need to ensure not only that the applications deployed on them are correct with respect to their specifications, but also that the devices are used in an appropriate manner, especially in situations where the device is provided by a party other than the actual user. Much work which has been done on runtime verification for mobile devices and operating systems is mostly application-centric, resulting in global, device-centric properties (e.g. the user may not send more than 100 messages per day across all applications being difficult or impossible to verify. In this paper we present a device-centric approach to runtime verify the device behaviour against a device policy with the different applications acting as independent components contributing to the overall behaviour of the device. We also present an implementation for Android devices, and evaluate it on a number of device-centric policies, reporting the empirical results obtained.

  2. Guided interaction exploration in artifact-centric process models

    NARCIS (Netherlands)

    van Eck, M.L.; Sidorova, N.; van der Aalst, W.M.P.

    2017-01-01

    Artifact-centric process models aim to describe complex processes as a collection of interacting artifacts. Recent development in process mining allow for the discovery of such models. However, the focus is often on the representation of the individual artifacts rather than their interactions. Based

  3. Computational models of intergroup competition and warfare.

    Energy Technology Data Exchange (ETDEWEB)

    Letendre, Kenneth (University of New Mexico); Abbott, Robert G.

    2011-11-01

    This document reports on the research of Kenneth Letendre, the recipient of a Sandia Graduate Research Fellowship at the University of New Mexico. Warfare is an extreme form of intergroup competition in which individuals make extreme sacrifices for the benefit of their nation or other group to which they belong. Among animals, limited, non-lethal competition is the norm. It is not fully understood what factors lead to warfare. We studied the global variation in the frequency of civil conflict among countries of the world, and its positive association with variation in the intensity of infectious disease. We demonstrated that the burden of human infectious disease importantly predicts the frequency of civil conflict and tested a causal model for this association based on the parasite-stress theory of sociality. We also investigated the organization of social foraging by colonies of harvester ants in the genus Pogonomyrmex, using both field studies and computer models.

  4. Handbook of toxicology of chemical warfare agents

    CERN Document Server

    2010-01-01

    This groundbreaking book covers every aspect of deadly toxic chemicals used as weapons of mass destruction and employed in conflicts, warfare and terrorism. Including findings from experimental as well as clinical studies, this one-of-a-kind handbook is prepared in a very user- friendly format that can easily be followed by students, teachers and researchers, as well as lay people. Stand-alone chapters on individual chemicals and major topics allow the reader to easily access required information without searching through the entire book. This is the first book that offers in-depth coverage of individual toxicants, target organ toxicity, major incidents, toxic effects in humans, animals and wildlife, biosensors, biomarkers, on-site and laboratory analytical methods, decontamination and detoxification procedures, prophylactic, therapeutic and countermeasures, and the role of homeland security. Presents a comprehensive look at all aspects of chemical warfare toxicology in one reference work. This saves research...

  5. Chemical warfare agents. Classes and targets.

    Science.gov (United States)

    Schwenk, Michael

    2018-09-01

    Synthetic toxic chemicals (toxicants) and biological poisons (toxins) have been developed as chemical warfare agents in the last century. At the time of their initial consideration as chemical weapon, only restricted knowledge existed about their mechanisms of action. There exist two different types of acute toxic action: nonspecific cytotoxic mechanisms with multiple chemo-biological interactions versus specific mechanisms that tend to have just a single or a few target biomolecules. TRPV1- and TRPA-receptors are often involved as chemosensors that induce neurogenic inflammation. The present work briefly surveys classes and toxicologically relevant features of chemical warfare agents and describes mechanisms of toxic action. Copyright © 2017 Elsevier B.V. All rights reserved.

  6. Mapping the Spread of Mounted Warfare

    Directory of Open Access Journals (Sweden)

    Peter Turchin

    2016-12-01

    Full Text Available Military technology is one of the most important factors affecting the evolution of complex societies. In particular, mounted warfare, the use of horse-riders in military operations, revolutionized war as it spread to different parts of Eurasia and Africa during the Ancient and Medieval eras, and to the Americas during the Early Modern period. Here we use a variety of sources to map this spread.

  7. UML modelling of network warfare examples

    CSIR Research Space (South Africa)

    Veerasamy, N

    2011-08-01

    Full Text Available ] Affects both civilian and military domains [8] [9] Related to the concepts of infowar, information operations, hacking, hackivism, cyberterrorism and cybotage depending on motivations and techniques [10] Encompasses both technological solutions...]. In addition, Williers as well as Qingbao and Anwar discuss more offensive aspects of information security and Network Warfare like Hacking, Vulnerability Injection, Network Attacks, Denial of Capability, Interception and Blockage [6] [18] [19]. Various...

  8. Maritime Trade Warfare Against a Modern Power

    Science.gov (United States)

    2013-05-20

    Malaysian and Singaporean support. Operational Environment The previous sections have assessed that an oil embargo would be effective at influencing...will be addressed. The first approach is to stop the trade at its source. This approach forms the foundation of many contemporary sanctions. Under...antisubmarine warfare capable ships, could be sufficient to defend against forces attempting to break a blockade, and a carrier battle group in the Indian Ocean

  9. Navy Operational Planner - Undersea Warfare Module

    Science.gov (United States)

    2016-09-01

    concepts are considered in NOP–USW that are not in previous research: time phasing of missions, mutually exclusive missions, and asset availability...operational planning efforts. NOP–USW suggests the correct allocation of assets across a wide theater of operation to accomplish missions in the...Master’s thesis 4. TITLE AND SUBTITLE NAVY OPERATIONAL PLANNER – UNDERSEA WARFARE MODULE 5. FUNDING NUMBERS 6. AUTHOR(S) Guy A. Molina 7

  10. Toward Operational Art in Special Warfare: Appendixes

    Science.gov (United States)

    2016-01-01

    language, proficiency in small-unit tactics, and the ability to build and fight alongside indigenous combat formations in a permissive, uncertain, or...counterinsurgency through and with indigenous forces or personnel.”1 The report has four aims: (1) to adapt conventional operational art to the unique...perfect near-real-time situational awareness,” at least at the tactical level of land warfare in complex terrain. But the idea of leveraging information

  11. The Cycle of Warfare - Analysis of an Analytical Model

    DEFF Research Database (Denmark)

    Jensen, Mikkel Storm

    2016-01-01

    by its economic, political and ideological characteristics. With the single assumption of economic rationality in human behaviour, Cycle of Warfare is not only coherent, it is applicable to all entities engaged in competition anywhere in the world at any point in history. The Cycle of Warfare can be used...

  12. Surface Warfare Officers Initial Training For Future Success

    Science.gov (United States)

    2018-03-01

    9 A school is initial rating specific technical training that is given to sailors. 14 Figure 4. Less...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA MBA PROFESSIONAL REPORT SURFACE WARFARE OFFICERS— INITIAL TRAINING FOR FUTURE SUCCESS March 2018...professional report 4. TITLE AND SUBTITLE SURFACE WARFARE OFFICERS—INITIAL TRAINING FOR FUTURE SUCCESS 5. FUNDING NUMBERS 6. AUTHOR(S) Arron J

  13. Anti-Air Warfare Research for Naval Forces

    NARCIS (Netherlands)

    Bloemen, A.A.F.; Witberg, R.

    2000-01-01

    AAW is a warfare area with wide-spread spectrum. Command and Control Systems, sensors, effectors and electronic warfare are integrated to a system, they influence each other and must eventually be effective in coordinated action. This complexity asks for Operations Research methods to measure

  14. Chemical profiling of chemical warfare agents for forensic purposes

    NARCIS (Netherlands)

    Noort, D.; Reuver, L.P.J. de; Fidder, A.; Tromp, M.; Verschraagen, M.

    2010-01-01

    A program has been initiated towards the chemical profiling of chemical warfare agents, in order to support forensic investigations towards synthesis routes, production sites and suspect chemical suppliers. Within the first stage of the project various chemical warfare agents (VX, sulfur mustard,

  15. American Military History and its Insights into Fourth Generation Warfare

    National Research Council Canada - National Science Library

    Davis, Scott A

    2006-01-01

    .... The case studies of Braddock's Campaign, the Southern Campaign of the American Revolution, and the Philippines Insurrection provide justification for the presence of the tenets of 4GW throughout...

  16. Hybrid Warfare Studies and Russia’s Example in Crimea

    Directory of Open Access Journals (Sweden)

    Mehmet Seyfettin EROL

    2015-12-01

    Full Text Available Although Hybrid Warfare is an old concept, theoretical studies in the western countries mainly began in the post-Col War era, focusing on asymmetrical threats against conventional superiority of western countries such as USA or Israel. September 11th attacks and 2006 Israel-Lebanon war played important roles for the evolution of hybrid warfare theories. However, there has not any consensus among scholars on a exact or unique definition of hybrid warfare. Hybrid warfare became one of the main security issues for the West and especially for NATO after the Russia-Ukraine crisis. Russian military strategies, called “hybrid warfare” by the western countries, resulted in the successful annexation of Crimea and, caused a serious security problem for the West resulting important structural and functional changes for the military system of NATO. Russian activities, which have been based on surprise, ambiguity and deniability, presented a unique example for hybrid warfare studies.

  17. From school centric to ‘material centric’ education

    DEFF Research Database (Denmark)

    Christensen, Suna Møller

    2015-01-01

    as craftsman. A pilot-project in spring 2014 revealed that designing talent education pushed teachers (who all have a personal background in vocational jobs) to challenge a theory based and in this sense school centric curriculum objectifying materials as pre-existing elements or resources in an assignment...... ([1934]2005) in ‘Art as Experience’ draws between art as an object and art as experience, this presentation examines the way in which education for particularly skilled students at vocational education schools in Denmark re-focus teachers attention to materials and student-material relations. Technically......, and re-consider relations with materials as dimensions facilitating the professional development of vocational ‘talent’. The broader topic of school centric versus ‘material centric’ education ties this research into vocational skills and craftsmanship with inquiries into framing and structuring...

  18. Additive manufacturing for consumer-centric business models

    DEFF Research Database (Denmark)

    Bogers, Marcel; Hadar, Ronen; Bilberg, Arne

    2016-01-01

    Digital fabrication—including additive manufacturing (AM), rapid prototyping and 3D printing—has the potential to revolutionize the way in which products are produced and delivered to the customer. Therefore, it challenges companies to reinvent their business model—describing the logic of creating...... and capturing value. In this paper, we explore the implications that AM technologies have for manufacturing systems in the new business models that they enable. In particular, we consider how a consumer goods manufacturer can organize the operations of a more open business model when moving from a manufacturer......-centric to a consumer-centric value logic. A major shift includes a move from centralized to decentralized supply chains, where consumer goods manufacturers can implement a “hybrid” approach with a focus on localization and accessibility or develop a fully personalized model where the consumer effectively takes over...

  19. Game-centric pedagogy and curriculums in higher education

    DEFF Research Database (Denmark)

    Nørgård, Rikke Toft; Murray, John; Morgan, James

    2017-01-01

    This paper examines some recent trends in game-centric education for STEAM (science, technology,engineering, art and mathematics) fields, especially those that explore and promote collaborationamong multiple disciplines. We discuss various multimodal design research activities that draw uponthe...... applications and usage of popular technical hackathons and game design jams in educationalenvironments. The intent of this work is to guide and inform new approaches to the corecomponents of STEAM curriculums.Game-centric methods appear to be well-suited to a variety of education and trainingcircumstances...... a valuable vehicle for enhancing general education andlong-term life skills.We conclude by describing some opportunities to undertake qualitative and quantitative research on teams of participants in popular game development events, such as the multinational Global GameJam (GGJ) series. This process involves...

  20. Efficient Asymmetric Index Encapsulation Scheme for Anonymous Content Centric Networking

    Directory of Open Access Journals (Sweden)

    Rong Ma

    2017-01-01

    Full Text Available Content Centric Networking (CCN is an effective communication paradigm that well matches the features of wireless environments. To be considered a viable candidate in the emerging wireless networks, despite the clear benefits of location-independent security, CCN must at least have parity with existing solutions for confidential and anonymous communication. This paper designs a new cryptographic scheme, called Asymmetric Index Encapsulation (AIE, that enables the router to test whether an encapsulated header matches the token without learning anything else about both of them. We suggest using the AIE as the core protocol of anonymous Content Centric Networking. A construction of AIE which strikes a balance between efficiency and security is given. The scheme is proved to be secure based on the DBDH assumption in the random oracle with tight reduction, while the encapsulated header and the token in our system consist of only three elements.

  1. Content-centric networks an overview, applications and research challenges

    CERN Document Server

    Ahmed, Syed Hassan; Kim, Dongkyun

    2016-01-01

    This book introduces Content-Centric Networking (CCN), a networking paradigm that provides a simple and effective solution to the challenging demands of future wired and wireless communications. It provides an overview of the recent developments in the area of future internet technologies, bringing together the advancements that have been made in Information-Centric Networking (ICN) in general, with a focus on CCN. It begins with an introduction to the basics of CCN is followed by an overview of the current internet paradigm and its challenges. Next, an application perspective has been included, where the authors encompass the selected applications for CCN with recent refereed research and developments. These applications include Internet of Things (IoT), Smart Grid, Vehicular Ad hoc Networks (VANETs), and Wireless Sensor Networks (WSNs). The book is a useful reference source for practising researchers, and can be used as supporting material for undergraduate and graduate level courses in computer science and...

  2. Internet-centric collaborative design in a distributed environment

    International Nuclear Information System (INIS)

    Kim, Hyun; Kim, Hyoung Sun; Do, Nam Chul; Lee, Jae Yeol; Lee, Joo Haeng; Myong, Jae Hyong

    2001-01-01

    Recently, advanced information technologies including internet-related technology and distributed object technology have opened new possibilities for collaborative designs. In this paper, we discuss computer supports for collaborative design in a distributed environment. The proposed system is the internet-centric system composed of an engineering framework, collaborative virtual workspace and engineering service. It allows the distributed designers to more efficiently and collaboratively work their engineering tasks throughout the design process

  3. Transforming Systems Engineering through Model-Centric Engineering

    Science.gov (United States)

    2018-02-28

    Contract No. HQ0034-13-D-0004 Research Tasks: 48, 118, 141, 157, 170 Report No. SERC-2018-TR-103 Transforming Systems Engineering through...Model-Centric Engineering Technical Report SERC-2018-TR-103 February 28, 2018 Principal Investigator Dr. Mark Blackburn, Stevens Institute of...Systems Engineering Research Center This material is based upon work supported, in whole or in part, by the U.S. Department of Defense through the

  4. Not para-, not peri-, but centric inversion of chromosome 12

    DEFF Research Database (Denmark)

    Silahtaroglu, A N; Hacihanefioglu, S; Güven, G S

    1998-01-01

    a break in the alphoid repeats followed by an inversion within the short arm, resulting in a pseudodicentric chromosome. Further FISH analyses using telomeric and subtelomeric probes showed that the other breakpoint was in the subtelomeric region of the short arm. The karyotype is designated 47,XXY,inv(12......)(p10p13.3). To our knowledge this is the first report of a case of "centric inversion"....

  5. Does Mobile Technology Matter? A Student Centric Perspective

    OpenAIRE

    Chen, Wenshin

    2010-01-01

    Based on a student-centric perspective, this study seeks to understand how mobile technology influences students’ learning experiences. Our research motivation is driven by the increasing attention paid to mobile technology in the research and business community. Set in a public university setting, our investigation seeks to shed light on how teaching and learning could be reshaped by mobile technology, most specifically, emerging tablet PCs. The findings, based on two MIS (Management Informa...

  6. Device-Centric Monitoring for Mobile Device Management

    OpenAIRE

    Chircop, Luke; Colombo, Christian; Pace, Gordon J.

    2016-01-01

    The ubiquity of computing devices has led to an increased need to ensure not only that the applications deployed on them are correct with respect to their specifications, but also that the devices are used in an appropriate manner, especially in situations where the device is provided by a party other than the actual user. Much work which has been done on runtime verification for mobile devices and operating systems is mostly application-centric, resulting in global, device-centri...

  7. OFFICER AND COMMANDER IN ASYMMETRIC WARFARE OPERATIONS

    Directory of Open Access Journals (Sweden)

    Giuseppe CAFORIO

    2013-01-01

    Full Text Available Starting from the data of a field research conducted among soldiers with asymmetric warfare experiences from nine different countries, the author seeks to identify and shed light on the various problems that officers with command responsibilities had to face during their missions. A picture emerges of feelings and experiences relating to their first impression upon arriving in the theatre, relations with local armed forces, relations with the local population and local authorities, relations with NGOs, relations with other armies, the impact of the rules of engagement (ROEs, training and education, and operational experiences. The paper ends with a discussion of the lessons learned.

  8. Axial Vircator for Electronic Warfare Applications

    Directory of Open Access Journals (Sweden)

    L. Drazan

    2009-12-01

    Full Text Available This paper deals with a high power microwave generator with virtual cathode – vircator in axial release for electronic warfare applications. The classification of directed energy weapons microwave (DEWM is introduced together with basic block diagrams of a particular class of DEWM. In the paper, methods for designing vircator pulsed power supply, axial vircator structure, measurement methods and experimental results are presented. The vircator in electromagnetic ammunition is powered by magneto-cumulative generator and in weapons for defense of objects (WDO, it is powered by Marx generator. The possible applications of a vircator in the DEWM area are discussed.

  9. Electronic warfare receivers and receiving systems

    CERN Document Server

    Poisel, Richard A

    2014-01-01

    Receivers systems are considered the core of electronic warfare (EW) intercept systems. Without them, the fundamental purpose of such systems is null and void. This book considers the major elements that make up receiver systems and the receivers that go in them.This resource provides system design engineers with techniques for design and development of EW receivers for modern modulations (spread spectrum) in addition to receivers for older, common modulation formats. Each major module in these receivers is considered in detail. Design information is included as well as performance tradeoffs o

  10. The Influence of Local Ethnic Diversity on Group-Centric Crime Attitudes

    DEFF Research Database (Denmark)

    Hjorth, Frederik

    2017-01-01

    Several studies provide evidence of group-centric policy attitudes, that is, citizens evaluating policies based on linkages with visible social groups. The existing literature generally points to the role of media imagery, rhetoric and prominent political sponsors in driving group-centric attitudes......-down’ influence on group-centric attitudes by elite actors is complemented by ‘bottom-up’ local processes of experiential learning about group–policy linkages....

  11. History of chemical and biological warfare agents

    International Nuclear Information System (INIS)

    Szinicz, L.

    2005-01-01

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents

  12. History of chemical and biological warfare agents.

    Science.gov (United States)

    Szinicz, L

    2005-10-30

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents.

  13. [Decontamination of chemical and biological warfare agents].

    Science.gov (United States)

    Seto, Yasuo

    2009-01-01

    Chemical and biological warfare agents (CBWA's) are diverse in nature; volatile acute low-molecular-weight toxic compounds, chemical warfare agents (CWA's, gaseous choking and blood agents, volatile nerve gases and blister agents, nonvolatile vomit agents and lacrymators), biological toxins (nonvolatile low-molecular-weight toxins, proteinous toxins) and microbes (bacteria, viruses, rickettsiae). In the consequence management against chemical and biological terrorism, speedy decontamination of victims, facilities and equipment is required for the minimization of the damage. In the present situation, washing victims and contaminated materials with large volumes of water is the basic way, and additionally hypochlorite salt solution is used for decomposition of CWA's. However, it still remains unsolved how to dispose large volumes of waste water, and the decontamination reagents have serious limitation of high toxicity, despoiling nature against the environments, long finishing time and non-durability in effective decontamination. Namely, the existing decontamination system is not effective, nonspecifically affecting the surrounding non-target materials. Therefore, it is the urgent matter to build up the usable decontamination system surpassing the present technologies. The symposiast presents the on-going joint project of research and development of the novel decontamination system against CBWA's, in the purpose of realizing nontoxic, fast, specific, effective and economical terrorism on-site decontamination. The projects consists of (1) establishment of the decontamination evaluation methods and verification of the existing technologies and adaptation of bacterial organophosphorus hydrolase, (2) development of adsorptive elimination technologies using molecular recognition tools, and (4) development of deactivation technologies using photocatalysis.

  14. Graph Theoretical Analysis of Network Centric Operations Using Multi-Layer Models

    National Research Council Canada - National Science Library

    Wong-Jiru, Ann

    2006-01-01

    .... The research incorporates the importance of understanding network topology for evaluating an environment for net-centricity and using network characteristics to help commanders assess the effects...

  15. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  16. Irregular Warfare: Impact on Future Professional Military Education

    National Research Council Canada - National Science Library

    Paschal, David G

    2006-01-01

    ... to operate effectively in an irregular warfare environment. The utility of a decisive war between nation states continues to decline and will eventually reach critical mass based upon the extreme imbalance of military power and a U.S. monopoly...

  17. FFT Based VLSI Digital One Bit Electronic Warfare Receiver

    National Research Council Canada - National Science Library

    Chien-In, Henry

    1998-01-01

    ... (1 GHz) digital receiver designed for electronic warfare applications. The receiver can process two simultaneous signals and has the potential for fabrication on a single multi-chip module (MCM...

  18. Back to the Basics: An Aviation Solution to Counterinsurgent Warfare

    National Research Council Canada - National Science Library

    Davis, Arthur D

    2005-01-01

    .... By examining past examples of the use of air power in counterinsurgent warfare, this study sheds light on the United States' current failings in both equipment and doctrine as it wages this type of war...

  19. Precision Warfare Enables Interdependent Fires and Maneuver in 2010

    National Research Council Canada - National Science Library

    Smith, John

    1997-01-01

    The U.S. Army is in the midst of a revolution in military affairs (RMA). Significant advancements in informational technologies and precision weapons are providing unprecedented potential for future warfare...

  20. Irregular Warfare: Special Operations Joint Professional Military Education Transformation

    National Research Council Canada - National Science Library

    Cannady, Bryan H

    2008-01-01

    ... on today's battlefront in Afghanistan and Iraq and in the Global War on Terrorism (GWOT). At the forefront of the GWOT and irregular warfare are the United States Special Operations Command (USSOCOM...

  1. Irregular Warfare: New Challenges for Civil-Military Relations

    National Research Council Canada - National Science Library

    Cronin, Patrick M

    2008-01-01

    .... Irregular warfare introduces new complications to what Eliot Cohen has called an unequal dialogue between civilian and military leaders in which civilian leaders hold the true power but must modulate...

  2. Echoes of Chechnya Warfare Resound in Moscow, Quantico

    National Research Council Canada - National Science Library

    Ackerman, Robert

    2000-01-01

    .... thinking about urban warfare. After suffering stunning public defeats just a few years ago, Russian forces applied painful lessons learned then to drive Chechen forces out of their capital city, Grozny, this year...

  3. zero day exploits and national readiness for cyber-warfare

    African Journals Online (AJOL)

    HOD

    A zero day vulnerability is an unknown exploit that divulges security flaws in software before such a flaw is publicly ... Keywords: exploits, zero day, vulnerability, cyberspace, cyber-warfare. 1. ..... industries and companies across the globe. The.

  4. The Role of Airpower in Urban Warfare. An Airman's Perspective

    National Research Council Canada - National Science Library

    Saffold, Timothy

    1998-01-01

    .... This emphasis on surface force employment stifles innovative thought as to how military forces can achieve operational and strategic effects by employing airpower as the key instrument of force in urban warfare...

  5. Fourth Generation Warfare: The Need for a Comprehensive Approach

    National Research Council Canada - National Science Library

    Benton, LeRoy D

    2008-01-01

    .... A definition of Fourth Generation Warfare is developed, based on Col. Thomas X. Hammes' writings. The definition is further developed to show relevance and applicability to current operations in the Long War on Terrorism...

  6. Towards a framework for a network warfare capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available . These include the legal issues, ethical dilemmas, technical solutions, financial impact and skill/manpower investment. Logical constraints/implications have been grouped together in the discussion that follows. 5.1.1 Legal Ethical Issues As network warfare... but the underlying causes of crime also needs to be understood. Ethics and morals play a significant role in determining the personality traits of an individual. Users will need to balance ethical dilemmas before engaging in offensive network warfare. Computers...

  7. Structuring Naval Special Warfare junior officer professional military education

    OpenAIRE

    Donovan, Thomas A.

    2007-01-01

    Naval Special Warfare does not currently have a designated career path for an officer that requires professional military education (PME) for SEAL junior officers after the rank of Ensign (O-1) and before the rank of Lieutenant Commander (O-4). There currently is interest in this subject matter at the Naval Special Warfare Command and Center. SEAL officers increasingly hold key leadership positions and influence critical decisions in the execution of national strategy. This growing respo...

  8. Strategy in the Robotic Age: A Case for Autonomous Warfare

    Science.gov (United States)

    2014-09-01

    enabling technology that augments human performance, such as exoskeleton suits, and other complementary fields that make robotics function...philosophy of maneuver warfare with new technologies from the Robotic Age, such as unmanned systems and exoskeleton suits, to present a new warfighting...and Brimley, “20YY,” 12. 49 the exoskeleton suit, but rather that the full benefit of autonomous warfare will be achieved by leveraging mass and

  9. MODA A Framework for Memory Centric Performance Characterization

    Energy Technology Data Exchange (ETDEWEB)

    Shrestha, Sunil; Su, Chun-Yi; White, Amanda M.; Manzano Franco, Joseph B.; Marquez, Andres; Feo, John T.

    2012-06-29

    In the age of massive parallelism, the focus of performance analysis has switched from the processor and related structures to the memory and I/O resources. Adapting to this new reality, a performance analysis tool has to provide a way to analyze resource usage to pinpoint existing and potential problems in a given application. This paper provides an overview of the Memory Observant Data Analysis (MODA) tool, a memory-centric tool first implemented on the Cray XMT supercomputer. Throughout the paper, MODA's capabilities have been showcased with experiments done on matrix multiply and Graph-500 application codes.

  10. The Impacts of Modern Warfare on Freshwater Ecosystems

    Science.gov (United States)

    Francis, Robert A.

    2011-11-01

    There is increasing recognition and concern regarding the impacts of modern industrial warfare on the environment. Freshwater ecosystems are perhaps the most vulnerable to warfare-related impacts, which is of concern given that they provide so many essential environmental resources and services to society. Despite this, there has been little work to establish and quantify the types of impacts (both negative and positive) that warfare may have on such systems. This paper firstly highlights why rivers and lakes may be susceptible to warfare-related impacts, before synthesizing the available literature to explore the following main themes: intensification of wartime resource acquisition, use of water as an offensive or defensive weapon, direct and indirect effects of explosive ordnance, increased pollution, introduction of invasive alien species, and positive ecological impacts. This is then followed by a discussion of the implications of such impacts in relation to future warfare, including a consideration of the efficacy of existing legal instruments to protect the environment during conflict, and the trend for war to become more localized and `informal', and therefore less regulated. Finally, the paper identifies key research foci for understanding and mitigating the effects of warfare on freshwater ecosystems.

  11. The Manipulation of Human Behavior in Guerrilla Warfare: Can It Enhance U.S. Army Special Forces Guerrilla Warfare Operations?

    National Research Council Canada - National Science Library

    Harris, William

    1997-01-01

    .... Proper integration of psychological communications to manipulate behavior in guerrilla warfare may facilitate the recruiting1 motivation, morale, sustainment and popular support for a guerrilla movement and its cause...

  12. Information Warfare, Threats and Information Security

    Directory of Open Access Journals (Sweden)

    Dmitriy Nikolaevich Bespalov

    2014-01-01

    Full Text Available The article presents the opposite, but dependent on each other's reality - Revolutionary War information,information security goals and objectives of their study within the scheme "challenge-response", methodological and analytical support, the role of elites and the information society in promoting information security. One of the features of contemporaneityis the global spread of ICT, combined with poor governance and other difficulties in the construction of innovation infrastructures that are based on them in some countries. This leads to the reproduction of threats, primarily related to the ability to use ICT for purposes that are inconsistent with the objectives of maintaining international peace and security, compliance with the principles of non-use of force, non-interference in the internal affairs of states, etc. In this regard, include such terms as "a threat of information warfare", "information terrorism" and so forth. Information warfare, which stay in the policy declared the struggle for existence, and relationships are defined in terms of "friend-enemy", "ours-foreign". Superiority over the opponent or "capture of its territory" is the aim of political activity. And information security, serving activities similar process of political control, including a set of components, is a technology until their humanitarian. From the context and the decision itself is the ratio of the achieved results of information and political influence to the target - a positive image of Russia. Bringing its policy in line with the demands of a healthy public opinion provides conductivity of theauthorities initiatives in the country and increases the legitimacy of the Russian Federation actions in the world.

  13. Future consumer mobile phone security: A case study using the data-centric security model

    NARCIS (Netherlands)

    van Cleeff, A.

    Consumer mobile phone security requires more attention, now that their data storage capacity is increasing. At the same time, much effort is spent on data-centric security for large enterprises. In this article we try to apply data-centric security to consumer mobile phones. We show a maturity model

  14. On Lifecycle Constraints of Artifact-Centric Workflows

    Science.gov (United States)

    Kucukoguz, Esra; Su, Jianwen

    Data plays a fundamental role in modeling and management of business processes and workflows. Among the recent "data-aware" workflow models, artifact-centric models are particularly interesting. (Business) artifacts are the key data entities that are used in workflows and can reflect both the business logic and the execution states of a running workflow. The notion of artifacts succinctly captures the fluidity aspect of data during workflow executions. However, much of the technical dimension concerning artifacts in workflows is not well understood. In this paper, we study a key concept of an artifact "lifecycle". In particular, we allow declarative specifications/constraints of artifact lifecycle in the spirit of DecSerFlow, and formulate the notion of lifecycle as the set of all possible paths an artifact can navigate through. We investigate two technical problems: (Compliance) does a given workflow (schema) contain only lifecycle allowed by a constraint? And (automated construction) from a given lifecycle specification (constraint), is it possible to construct a "compliant" workflow? The study is based on a new formal variant of artifact-centric workflow model called "ArtiNets" and two classes of lifecycle constraints named "regular" and "counting" constraints. We present a range of technical results concerning compliance and automated construction, including: (1) compliance is decidable when workflow is atomic or constraints are regular, (2) for each constraint, we can always construct a workflow that satisfies the constraint, and (3) sufficient conditions where atomic workflows can be constructed.

  15. User-centric incentive design for participatory mobile phone sensing

    Science.gov (United States)

    Gao, Wei; Lu, Haoyang

    2014-05-01

    Mobile phone sensing is a critical underpinning of pervasive mobile computing, and is one of the key factors for improving people's quality of life in modern society via collective utilization of the on-board sensing capabilities of people's smartphones. The increasing demands for sensing services and ambient awareness in mobile environments highlight the necessity of active participation of individual mobile users in sensing tasks. User incentives for such participation have been continuously offered from an application-centric perspective, i.e., as payments from the sensing server, to compensate users' sensing costs. These payments, however, are manipulated to maximize the benefits of the sensing server, ignoring the runtime flexibility and benefits of participating users. This paper presents a novel framework of user-centric incentive design, and develops a universal sensing platform which translates heterogenous sensing tasks to a generic sensing plan specifying the task-independent requirements of sensing performance. We use this sensing plan as input to reduce three categories of sensing costs, which together cover the possible sources hindering users' participation in sensing.

  16. SPARTex: A Vertex-Centric Framework for RDF Data Analytics

    KAUST Repository

    Abdelaziz, Ibrahim

    2015-08-31

    A growing number of applications require combining SPARQL queries with generic graph search on RDF data. However, the lack of procedural capabilities in SPARQL makes it inappropriate for graph analytics. Moreover, RDF engines focus on SPARQL query evaluation whereas graph management frameworks perform only generic graph computations. In this work, we bridge the gap by introducing SPARTex, an RDF analytics framework based on the vertex-centric computation model. In SPARTex, user-defined vertex centric programs can be invoked from SPARQL as stored procedures. SPARTex allows the execution of a pipeline of graph algorithms without the need for multiple reads/writes of input data and intermediate results. We use a cost-based optimizer for minimizing the communication cost. SPARTex evaluates queries that combine SPARQL and generic graph computations orders of magnitude faster than existing RDF engines. We demonstrate a real system prototype of SPARTex running on a local cluster using real and synthetic datasets. SPARTex has a real-time graphical user interface that allows the participants to write regular SPARQL queries, use our proposed SPARQL extension to declaratively invoke graph algorithms or combine/pipeline both SPARQL querying and generic graph analytics.

  17. A distributed name resolution system in information centric networks

    Science.gov (United States)

    Elbreiki, Walid; Arlimatti, Shivaleela; Hassan, Suhaidi; Habbal, Adib; Elshaikh, Mohamed

    2016-08-01

    Information Centric Networks (ICN) is the new paradigm that envisages to shift the Internet away from its existing Point-to-Point architecture to a data centric, where communication is based on named hosts rather than the information stored on these hosts. Name Resolution is the center of attraction for ICN, where Named Data Objects (NDO) are used for identifying the information and guiding for routing or forwarding inside ICN. Recently, several researches use distributed NRS to overcome the problem of interest flooding, congestion and overloading. Yet the distribution of NRS is based on random distribution. How to distribute the NRS is still an important and challenging problem. In this work, we address the problem of distribution of NRS by proposing a new mechanism called Distributed Name Resolution System (DNRS), by considering the time of publishing the NDOs in the NRS. This mechanism partitions the network to distribute the workload among NRSs by increasing storage capacity. In addition, partitioning the network increases flexibility and scalability of NRS. We evaluate the effectiveness of our proposed mechanism, which achieves lesser end-to-end delay with more average throughputs compared to random distribution of NRS without disturbing the underlying routing or forwarding strategies.

  18. Nuclear, biological and chemical warfare. Part I: Medical aspects of nuclear warfare.

    Science.gov (United States)

    Kasthuri, A S; Pradhan, A B; Dham, S K; Bhalla, I P; Paul, J S

    1990-04-01

    Casualties in earlier wars were due much more to diseases than to weapons. Mention has been made in history of the use of biological agents in warfare, to deny the enemy food and water and to cause disease. In the first world war chemical agents were used to cause mass casualties. Nuclear weapons were introduced in the second world war. Several countries are now involved in developing nuclear, biological and chemical weapon systems, for the mass annihilation of human beings, animals and plants, and to destroy the economy of their enemies. Recently, natural calamities and accidents in nuclear, chemical and biological laboratories and industries have caused mass instantaneous deaths in civilian population. The effects of future wars will not be restricted to uniformed persons. It is time that physicians become aware of the destructive potential of these weapons. Awareness, immediate protective measures and first aid will save a large number of persons. This series of articles will outline the medical aspects of nuclear, biological and chemical weapon systems in three parts. Part I will deal with the biological effects of a nuclear explosion. The short and long term effects due to blast, heat and associated radiation are highlighted. In Part II, the role of biological agents which cause commoner or new disease patterns is mentioned. Some of the accidents from biological warfare laboratories are a testimony to its potential deleterious effects. Part III deals with medical aspects of chemical warfare agents, which in view of their mass effects can overwhelm the existing medical resources, both civilian and military.(ABSTRACT TRUNCATED AT 250 WORDS)

  19. Using Agent Based Distillation to Explore Issues Related to Asymmetric Warfare

    Science.gov (United States)

    2009-10-01

    official definition of asymmetric warfare , considering that its use was redundant to irregular warfare [30]. 2 Such as the Lanchester Equations...RTP-MP-MSG-069 23 - 1 Using Agent Based Distillation to Explore Issues Related to Asymmetric Warfare Martin Adelantado, Jean-Michel Mathé...shows that both conventional and asymmetric warfare are characterised by nonlinear behaviours and that engagement is a Complex Adaptive System (CAS

  20. Transport and Reactivity of Decontaminants to Provide Hazard Mitigation of Chemical Warfare Agents from Materials

    Science.gov (United States)

    2016-06-01

    2013 4. TITLE AND SUBTITLE Transport and Reactivity of Decontaminants to Provide Hazard Mitigation of Chemical Warfare Agents from Materials 5a...directions for future decontamination formulation approaches. 15. SUBJECT TERMS GD HD Decontamination Hazard mitigation VX Chemical warfare agent... DECONTAMINANTS TO PROVIDE HAZARD MITIGATION OF CHEMICAL WARFARE AGENTS FROM MATERIALS 1. INTRODUCTION Decontamination of materials is the

  1. GoFFish: A Sub-Graph Centric Framework for Large-Scale Graph Analytics1

    Energy Technology Data Exchange (ETDEWEB)

    Simmhan, Yogesh; Kumbhare, Alok; Wickramaarachchi, Charith; Nagarkar, Soonil; Ravi, Santosh; Raghavendra, Cauligi; Prasanna, Viktor

    2014-08-25

    Large scale graph processing is a major research area for Big Data exploration. Vertex centric programming models like Pregel are gaining traction due to their simple abstraction that allows for scalable execution on distributed systems naturally. However, there are limitations to this approach which cause vertex centric algorithms to under-perform due to poor compute to communication overhead ratio and slow convergence of iterative superstep. In this paper we introduce GoFFish a scalable sub-graph centric framework co-designed with a distributed persistent graph storage for large scale graph analytics on commodity clusters. We introduce a sub-graph centric programming abstraction that combines the scalability of a vertex centric approach with the flexibility of shared memory sub-graph computation. We map Connected Components, SSSP and PageRank algorithms to this model to illustrate its flexibility. Further, we empirically analyze GoFFish using several real world graphs and demonstrate its significant performance improvement, orders of magnitude in some cases, compared to Apache Giraph, the leading open source vertex centric implementation. We map Connected Components, SSSP and PageRank algorithms to this model to illustrate its flexibility. Further, we empirically analyze GoFFish using several real world graphs and demonstrate its significant performance improvement, orders of magnitude in some cases, compared to Apache Giraph, the leading open source vertex centric implementation.

  2. Russian New Art of Hybrid Warfare in Ukraine

    Directory of Open Access Journals (Sweden)

    Rusnáková Soňa

    2017-10-01

    Full Text Available The main aim of this paper is to analyse the annexation of Crimea by the Russian Federation. For the purposes of the paper, the theory of hybrid warfare was chosen as an analytical category. Throughout the paper, the concept of hybrid warfare is examined and applied on case study of Crimean annexation. Hybrid warfare, especially in connection with Russian actions in Crimea has been an intensely debated concept. There is an ongoing debate among scholars concerning the meaning of the concept, its existence and employment by the Russian Federation. This paper showed that the article of Valeriy Gerasimov – the incumbent Chief of the General Staff of the Russian Federation-invoked a new warfare strategy for the Russian Federation which was consequently for the very first time in its full spectre and effectivity employed on case of Crimean annexation in March 2014. Observing the application of the hybrid warfare in practice serves the purposes of countering its further potential application in post-Soviet space and Russian ‘near abroad’.

  3. Nondestructive inspection of chemical warfare based on API-TOF

    International Nuclear Information System (INIS)

    Wang Xinhua; Zheng Pu; He Tie; An Li; Yang Jie; Fan Yu

    2013-01-01

    Background: Real-time, fast, accurate, nondestructive inspection (NDI) and quantitative analysis for chemical warfare are very imperative for chemical defense, anti-terror and nation security. Purpose: Associated Particles Technique (APT)/Neutron Time of Flight (TOF) has been developed for non-invasive inspection of sealed containers with chemical warfare agents. Methods: A prototype equipment for chemical warfare is consisted of an APT neutron generator with a 3×3 matrix of semiconductor detectors of associated alpha-particles, the shielding protection of neutron and gamma-ray, arrayed NaI(Tl)-based detectors of gamma-rays, fully-digital data acquisition electronics, data analysis, decision-making software, support platform and remote control system. Inelastic scattering gamma-ray pulse height spectra of sarin, VX, mustard gas and adamsite induced by 14-MeV neutron are measured. The energies of these gamma rays are used to identify the inelastic scattering elements, and the intensities of the peaks at these energies are used to reveal their concentrations. Results: The characteristic peaks of inelastic scattering gamma-ray pulse height spectra show that the prototype equipment can fast and accurately inspect chemical warfare. Conclusion: The equipment can be used to detect not only chemical warfare agents but also other hazardous materials, such as chemical/toxic/drug materials, if their chemical composition is in any way different from that of the surrounding materials. (authors)

  4. Numerical simulation of RCS for carrier electronic warfare airplanes

    Directory of Open Access Journals (Sweden)

    Yue Kuizhi

    2015-04-01

    Full Text Available This paper studies the radar cross section (RCS of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carrier electronic warfare airplanes Model A and Model B with weapons were established. Based on the physical optics method and the equivalent electromagnetic flow method, by the use of the RCSAnsys software, the characteristics of carrier electronic warfare airplanes’ RCS under steady and dynamic flights were simulated under the UHF, X, and S radar bands. This paper researches the detection probability of aircraft by radars under the condition of electronic warfare, and completes the mathematical statistical analysis of the simulation results. The results show that: The Model A of carrier electronic warfare airplane is better than Model B on stealth performance and on discover probability by radar detection effectively.

  5. CMS Dashboard Task Monitoring: A user-centric monitoring view

    International Nuclear Information System (INIS)

    Karavakis, Edward; Khan, Akram; Andreeva, Julia; Maier, Gerhild; Gaidioz, Benjamin

    2010-01-01

    We are now in a phase change of the CMS experiment where people are turning more intensely to physics analysis and away from construction. This brings a lot of challenging issues with respect to monitoring of the user analysis. The physicists must be able to monitor the execution status, application and grid-level messages of their tasks that may run at any site within the CMS Virtual Organisation. The CMS Dashboard Task Monitoring project provides this information towards individual analysis users by collecting and exposing a user-centric set of information regarding submitted tasks including reason of failure, distribution by site and over time, consumed time and efficiency. The development was user-driven with physicists invited to test the prototype in order to assemble further requirements and identify weaknesses with the application.

  6. A Probabilistic, Facility-Centric Approach to Lightning Strike Location

    Science.gov (United States)

    Huddleston, Lisa L.; Roeder, William p.; Merceret, Francis J.

    2012-01-01

    A new probabilistic facility-centric approach to lightning strike location has been developed. This process uses the bivariate Gaussian distribution of probability density provided by the current lightning location error ellipse for the most likely location of a lightning stroke and integrates it to determine the probability that the stroke is inside any specified radius of any location, even if that location is not centered on or even with the location error ellipse. This technique is adapted from a method of calculating the probability of debris collisionith spacecraft. Such a technique is important in spaceport processing activities because it allows engineers to quantify the risk of induced current damage to critical electronics due to nearby lightning strokes. This technique was tested extensively and is now in use by space launch organizations at Kennedy Space Center and Cape Canaveral Air Force Station. Future applications could include forensic meteorology.

  7. Human-centric decision-making models for social sciences

    CERN Document Server

    Pedrycz, Witold

    2014-01-01

    The volume delivers a wealth of effective methods to deal with various types of uncertainty inherently existing in human-centric decision problems. It elaborates on  comprehensive decision frameworks to handle different decision scenarios, which help use effectively the explicit and tacit knowledge and intuition, model perceptions and preferences in a more human-oriented style. The book presents original approaches and delivers new results on fundamentals and applications related to human-centered decision making approaches to business, economics and social systems. Individual chapters cover multi-criteria (multiattribute) decision making, decision making with prospect theory, decision making with incomplete probabilistic information, granular models of decision making and decision making realized with the use of non-additive measures. New emerging decision theories being presented as along with a wide spectrum of ongoing research make the book valuable to all interested in the field of advanced decision-mak...

  8. Securing Gateways within Clustered Power Centric Network of Nodes

    Directory of Open Access Journals (Sweden)

    Qaisar Javaid

    2016-01-01

    Full Text Available Knowledge Networks are gaining momentum within cyber world. Knowledge leads to innovation and for this reason organizations focus on research and information gathering in order to gain and improve existing knowledge. This of information era, which is primarily based on world wide web technologies, enables significantly expanded networks of people to communicate and collaborate 'virtually' across teams, across entire organizations and across the world, anytime and anywhere. Innovations in computing and telecommunications have transformed the corporations from structured and manageable types to interwoven network of blurred boundaries such as; ad hoc networks and mobile wireless networks, etc. This study explores knowledge networks in Information Technology and security leaks that are found, as well as measures that are taken to counter this menace which is coming up with optimal Secure Clustered Power Centric node network. The paper concludes these measures, evaluating and integrating them to come up with a secured network design.

  9. Agile IT: Thinking in User-Centric Models

    Science.gov (United States)

    Margaria, Tiziana; Steffen, Bernhard

    We advocate a new teaching direction for modern CS curricula: extreme model-driven development (XMDD), a new development paradigm designed to continuously involve the customer/application expert throughout the whole systems' life cycle. Based on the `One-Thing Approach', which works by successively enriching and refining one single artifact, system development becomes in essence a user-centric orchestration of intuitive service functionality. XMDD differs radically from classical software development, which, in our opinion is no longer adequate for the bulk of application programming - in particular when it comes to heterogeneous, cross organizational systems which must adapt to rapidly changing market requirements. Thus there is a need for new curricula addressing this model-driven, lightweight, and cooperative development paradigm that puts the user process in the center of the development and the application expert in control of the process evolution.

  10. An OAI repository centric peer-review model

    CERN Multimedia

    CERN. Geneva

    2005-01-01

    Pre-print repositories have seen a significant increase in use over the past fifteen years across multiple research domains. Researchers are beginning to develop applications capable of using these repositories to assist the scientific community above and beyond the pure dissemination of information. The contributions set forth by this paper emphasize a deconstructed publication model where in which the peer-review certification phase of a pre-print is mediated by an OAI-compliant peer-review service. This peer-review service uses a social-network algorithm for determining potential reviewers for a submitted manuscript and for weighting the influence of each participating reviewer’s evaluations. The paper also provides a set of peer-review specific metadata tags that can accompany a pre-prints existing metadata record. The combinations of these contributions provide a unique repository-centric peer-review model within the framework of the current OAI standards existing today.

  11. A Cloud Computing Based Patient Centric Medical Information System

    Science.gov (United States)

    Agarwal, Ankur; Henehan, Nathan; Somashekarappa, Vivek; Pandya, A. S.; Kalva, Hari; Furht, Borko

    This chapter discusses an emerging concept of a cloud computing based Patient Centric Medical Information System framework that will allow various authorized users to securely access patient records from various Care Delivery Organizations (CDOs) such as hospitals, urgent care centers, doctors, laboratories, imaging centers among others, from any location. Such a system must seamlessly integrate all patient records including images such as CT-SCANS and MRI'S which can easily be accessed from any location and reviewed by any authorized user. In such a scenario the storage and transmission of medical records will have be conducted in a totally secure and safe environment with a very high standard of data integrity, protecting patient privacy and complying with all Health Insurance Portability and Accountability Act (HIPAA) regulations.

  12. Metrics for measuring net-centric data strategy implementation

    Science.gov (United States)

    Kroculick, Joseph B.

    2010-04-01

    An enterprise data strategy outlines an organization's vision and objectives for improved collection and use of data. We propose generic metrics and quantifiable measures for each of the DoD Net-Centric Data Strategy (NCDS) data goals. Data strategy metrics can be adapted to the business processes of an enterprise and the needs of stakeholders in leveraging the organization's data assets to provide for more effective decision making. Generic metrics are applied to a specific application where logistics supply and transportation data is integrated across multiple functional groups. A dashboard presents a multidimensional view of the current progress to a state where logistics data shared in a timely and seamless manner among users, applications, and systems.

  13. Data Centric Sensor Stream Reduction for Real-Time Applications in Wireless Sensor Networks

    Science.gov (United States)

    Aquino, Andre Luiz Lins; Nakamura, Eduardo Freire

    2009-01-01

    This work presents a data-centric strategy to meet deadlines in soft real-time applications in wireless sensor networks. This strategy considers three main aspects: (i) The design of real-time application to obtain the minimum deadlines; (ii) An analytic model to estimate the ideal sample size used by data-reduction algorithms; and (iii) Two data-centric stream-based sampling algorithms to perform data reduction whenever necessary. Simulation results show that our data-centric strategies meet deadlines without loosing data representativeness. PMID:22303145

  14. [Decontamination of chemical warfare agents by photocatalysis].

    Science.gov (United States)

    Hirakawa, Tsutomu; Mera, Nobuaki; Sano, Taizo; Negishi, Nobuaki; Takeuchi, Koji

    2009-01-01

    Photocatalysis has been widely applied to solar-energy conversion and environmental purification. Photocatalyst, typically titanium dioxide (TiO(2)), produces active oxygen species under irradiation of ultraviolet light, and can decompose not only conventional pollutants but also different types of hazardous substances at mild conditions. We have recently started the study of photocatalytic decontamination of chemical warfare agents (CWAs) under collaboration with the National Research Institute of Police Science. This article reviews environmental applications of semiconductor photocatalysis, decontamination methods for CWAs, and previous photocatalytic studies applied to CWA degradation, together with some of our results obtained with CWAs and their simulant compounds. The data indicate that photocatalysis, which may not always give a striking power, certainly helps detoxification of such hazardous compounds. Unfortunately, there are not enough data obtained with real CWAs due to the difficulty in handling. We will add more scientific data using CWAs in the near future to develop useful decontamination systems that can reduce the damage caused by possible terrorism.

  15. Biomaterials for mediation of chemical and biological warfare agents.

    Science.gov (United States)

    Russell, Alan J; Berberich, Jason A; Drevon, Geraldine F; Koepsel, Richard R

    2003-01-01

    Recent events have emphasized the threat from chemical and biological warfare agents. Within the efforts to counter this threat, the biocatalytic destruction and sensing of chemical and biological weapons has become an important area of focus. The specificity and high catalytic rates of biological catalysts make them appropriate for decommissioning nerve agent stockpiles, counteracting nerve agent attacks, and remediation of organophosphate spills. A number of materials have been prepared containing enzymes for the destruction of and protection against organophosphate nerve agents and biological warfare agents. This review discusses the major chemical and biological warfare agents, decontamination methods, and biomaterials that have potential for the preparation of decontamination wipes, gas filters, column packings, protective wear, and self-decontaminating paints and coatings.

  16. Lanchester-Type Models of Warfare, Volume II

    OpenAIRE

    Taylor, James G.

    1980-01-01

    This monograph is a comprehensive treatist on Lanchester-type models of warfare, i.e. differential-equation models of attrition in force-on-force combat operations. Its goal is to provide both an introduction to and current-state-of-the-art overview of Lanchester-type models of warfare as well as a comprehensive and unified in-depth treatment of them. Both deterministic as well as stochastic models are considered. Such models have been widely used in the United States and elsewhere for the...

  17. Theory of information warfare: basic framework, methodology and conceptual apparatus

    Directory of Open Access Journals (Sweden)

    Олександр Васильович Курбан

    2015-11-01

    Full Text Available It is conducted a comprehensive theoretical study and determine the basic provisions of the modern theory of information warfare in on-line social networks. Three basic blocks, which systematized the theoretical and methodological basis of the topic, are established. There are information and psychological war, social off-line and on-line network. According to the three blocks, theoretical concepts are defined and methodological substantiation of information processes within the information warfare in the social on-line networks is formed

  18. Hybrid warfare of the USA in South America

    Directory of Open Access Journals (Sweden)

    A. V. Budaev

    2015-01-01

    Full Text Available Washington’s hybrid warfare in Latin American region differs by its inventive and sophisticated methods and in fact represents a complex and multidimensional phenomenon including symbiosis of the “soft” and “hard” power as well as their combination in the form of the “smart power”. The increasing importance of hybrid warfare technologies in the US foreign policy in Latin America predetermines the necessity of thorough studies and analysis of this phenomenon for providing Russian interests.

  19. IMS software developments for the detection of chemical warfare agent

    Science.gov (United States)

    Klepel, ST.; Graefenhain, U.; Lippe, R.; Stach, J.; Starrock, V.

    1995-01-01

    Interference compounds like gasoline, diesel, burning wood or fuel, etc. are presented in common battlefield situations. These compounds can cause detectors to respond as a false positive or interfere with the detector's ability to respond to target compounds such as chemical warfare agents. To ensure proper response of the ion mobility spectrometer to chemical warfare agents, two special software packages were developed and incorporated into the Bruker RAID-1. The programs suppress interferring signals caused by car exhaust or smoke gases resulting from burning materials and correct the influence of variable sample gas humidity which is important for detection and quantification of blister agents like mustard gas or lewisite.

  20. Preventing Network Centric Overload (End State Education for the Operational Commander/Staff)

    National Research Council Canada - National Science Library

    Beck, John

    2001-01-01

    .... An end state education system must be devised that prepares our senior leaders to operate a newly formed network centric task force with equipment, organizations and theory of use that most likely...

  1. Featureous: infrastructure for feature-centric analysis of object-oriented software

    DEFF Research Database (Denmark)

    Olszak, Andrzej; Jørgensen, Bo Nørregaard

    2010-01-01

    The decentralized nature of collaborations between objects in object-oriented software makes it difficult to understand how user-observable program features are implemented and how their implementations relate to each other. It is worthwhile to improve this situation, since feature-centric program...... understanding and modification are essential during software evolution and maintenance. In this paper, we present an infrastructure built on top of the NetBeans IDE called Featureous that allows for rapid construction of tools for feature-centric analysis of object-oriented software. Our infrastructure...... encompasses a lightweight feature location mechanism, a number of analytical views and an API allowing for addition of third-party extensions. To form a common conceptual framework for future feature-centric extensions, we propose to structure feature centric analysis along three dimensions: perspective...

  2. Introducing the religio-centric positional advantage to Indonesian small businesses

    Directory of Open Access Journals (Sweden)

    Hendar Hendar

    2017-03-01

    Full Text Available With a focus on small religion-based businesses in Indonesia, this research examines whether marketing innovativeness, customers responsiveness and competitors′ responsiveness can improve marketing performance. A conceptual model on the correlation of these three variables with religio-centric positional advantage and marketing performance is examined by using structural equation model. For this purpose 335 small businesses of Islamic Fashion had been studied using purposive sampling from 11 regencies/cities in Central Java (Indonesia. The results showed that (1 small companies in these market segments based on religion is likely to have better marketing performance when they have the Religio-centric positional advantage, (2 The increase in marketing innovativeness, CuR and CoR is required to improve and maintain religio-centric positional advantage, and (3 religio-centric positional advantage is definitely a mediator in the correlation of marketing innovativeness, customer responsiveness and competitors responsiveness with marketing performance.

  3. Enhancing network centric operations doctrine to support civil military cooperation in disaster management

    NARCIS (Netherlands)

    Wolbers, J.J.; Beeres, R.; Bakx, G.; de Waard, E.; Rietjens, S.

    2016-01-01

    Network Centric Operations is a promising command doctrine in both military operations and during civil disaster management. As both sectors started intensifying their joint operational capacity through civil-military collaboration, it becomes increasingly relevant to address the different command

  4. Aulacoseira kruegeriana (Bacillariophyta, Coscinodiscophyceae): a new centric diatom from high-elevation Andean streams of Bolivia

    Czech Academy of Sciences Publication Activity Database

    Morales, E. A.; Rivera, S. F.; Rubin, S. D. C.; Vis, M. L.; Houk, Václav

    2015-01-01

    Roč. 30, č. 3 (2015), s. 269-277 ISSN 0269-249X Institutional support: RVO:67985939 Keywords : centric diatoms * taxonomy * valve ultrastructure Subject RIV: EF - Botanics Impact factor: 1.868, year: 2015

  5. From unified messaging towards I-centric Services for the virtual home environment

    CERN Document Server

    van der Meer, S

    2001-01-01

    The vision of user centric information and an architecture for the realization of user centric services was discussed. The illustrated framework shows that these ideas can be assembled to set up an environment where services that allow users to interact with their environment are possible. The technologies integrated into the system were platform localization capabilities, environment awareness, communication capabilities and information storage capabilities. (Edited abstract)

  6. Nanostructured Metal Oxides for Stoichiometric Degradation of Chemical Warfare Agents

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Henych, Jiří; Janos, P.; Skoumal, M.

    2016-01-01

    Roč. 236, č. 2016 (2016), s. 239-258 ISSN 0179-5953 R&D Projects: GA ČR(CZ) GAP106/12/1116 Institutional support: RVO:61388980 Keywords : chemical warfare agent * metal nanoparticle * unique surface- chemistry * mesoporous manganese oxide Subject RIV: CA - Inorganic Chemistry Impact factor: 3.930, year: 2016

  7. The Role of Civil Affairs in Unconventional Warfare

    Science.gov (United States)

    2012-12-01

    neighbor to the west, and secured the eastern border of Laos 32 Mao Tse -Tung, On Guerrilla Warfare...INTRODUCTION..........................................................................................19  B.  BRIEF HISTORY OF LAOS ...Royal Lao Army SCA Support to Civil Administration SCIRI Supreme Council of Iraq SG Shadow Government SOF Special Operations Forces TAI Targeted

  8. Management information systems for electronic warfare command and decision support

    CSIR Research Space (South Africa)

    Van Niekerk, B

    2015-04-01

    Full Text Available information to allow them to manage their own spectrum, to identify threats, and to deny adversaries’ use of the spectrum. In this paper, the concepts of integrated electronic warfare and spectrum battle management are introduced, and the relevant information...

  9. Manoeuvre warfare analysis of South Africa's 1914-1915 German ...

    African Journals Online (AJOL)

    The study reported in this article explored the nexus between military theory and history. Military theory attempts to quantify, qualify and illuminate the often unpredictable phenomenon of war. The article consists of two parts: the theory of manoeuvre warfare and the history of the 1914-1915 South African campaign in ...

  10. blitzkrieg to desert storm: the evolution of operational warfare

    African Journals Online (AJOL)

    a_nabb

    disease of stalemates infecting militaries before the Second World War. The invasion did not change the world; instead, it brought about an increased awareness of the importance of the operational level of war, a dimension of warfare previously neglected. The German operational effectiveness represented an evolution ...

  11. A identification system for chemical warfare agents with PGNAA method

    International Nuclear Information System (INIS)

    Wang Bairong; Yin Guanghua; Yang Zhongping

    2006-01-01

    The principle and the experimental commanding of Chemical warfare Agents Identification with PGNAA method are discussed in this paper. The choosing of Detector, neutron source and the data processing method are detailed. Finally, a set of experimental instruments composed of Cf-232 and BGO detector is developed based on the theory discussed above. (authors)

  12. Identification system for chemical warfare agents with PGNAA method

    International Nuclear Information System (INIS)

    Wang Bairong; Yin Guanghua; Yang Zhongpin

    2007-01-01

    The principle and the experimental commanding of Chemical warfare Agents Identification with PGNAA method are discussed in this paper. The choosing of detector, neutron source and the data processing method are detailed. Finally, a set of experimental instruments composed of Cf-232 and BGO detector is developed based on this theory discussed above. (authors)

  13. Biomonitoring of exposure to chemical warfare agents: A review

    NARCIS (Netherlands)

    Noort, D.; Benschop, H.P.; Black, R.M.

    2002-01-01

    In this report an overview of the methods currently available for detection of exposure to a number of chemical warfare agents (CWA), i.e., sulfur mustard, lewisite and nerve agents, is presented. Such methods can be applied for various purposes, e.g., diagnosis and dosimetry of exposure of

  14. Researchers study decontamination of chemical, biological warfare agents

    OpenAIRE

    Trulove, Susan

    2007-01-01

    The U.S. Army Research Office has awarded Virginia Tech a $680,000 grant over two years to build an instrument that can be used to study the chemistry of gases that will decompose both chemical and biological warfare agents on surfaces.

  15. Recent canadian experience in chemical warfare agent destruction. An overview

    Energy Technology Data Exchange (ETDEWEB)

    McAndless, J.M.

    1995-09-01

    A Canadian chemical warfare agent destruction project (Swiftsure) was recently completed in which stockpiles of aged mustard, lewisite, nerve agents and contaminated scrap metal were incinerated or chemically neutralized in a safe, environmentally-responsible manner. The project scope, destruction technologies, environmental monitoring and public consultation programs are described.

  16. Simulating cyber warfare and cyber defenses: information value considerations

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber

  17. Understanding Health Information Seeking from an Actor-Centric Perspective

    Directory of Open Access Journals (Sweden)

    Simon Batchelor

    2015-07-01

    Full Text Available This paper presents a conceptual approach for discussing health information seeking among poor households in Africa and Asia. This approach is part of a larger research endeavor aimed at understanding how health systems are adapting; with possibilities and constraints emerging. These health systems can be found in a context of the changing relationships between states, markets and civil society in low and middle income countries. The paper starts from an understanding of the health sector as a “health knowledge economy”, organized to provide people with access to knowledge and advice. The use of the term “health knowledge economy” draws attention to the ways the health sector is part of a broader knowledge economy changing the way individuals and households obtain and use specialist information. The paper integrates an actor centric approach with the theory of planned behavior. It seeks to identify the actors engaged in the health knowledge economy as a precursor to longer term studies on the uptake of innovations integrating health services with mobile phones, commonly designated as mHealth, contributing to an understanding of the potential vulnerabilities of poor people, and highlighting possible dangers if providers of health information and advice are strongly influenced by interest groups.

  18. A Liver-Centric Multiscale Modeling Framework for Xenobiotics.

    Directory of Open Access Journals (Sweden)

    James P Sluka

    Full Text Available We describe a multi-scale, liver-centric in silico modeling framework for acetaminophen pharmacology and metabolism. We focus on a computational model to characterize whole body uptake and clearance, liver transport and phase I and phase II metabolism. We do this by incorporating sub-models that span three scales; Physiologically Based Pharmacokinetic (PBPK modeling of acetaminophen uptake and distribution at the whole body level, cell and blood flow modeling at the tissue/organ level and metabolism at the sub-cellular level. We have used standard modeling modalities at each of the three scales. In particular, we have used the Systems Biology Markup Language (SBML to create both the whole-body and sub-cellular scales. Our modeling approach allows us to run the individual sub-models separately and allows us to easily exchange models at a particular scale without the need to extensively rework the sub-models at other scales. In addition, the use of SBML greatly facilitates the inclusion of biological annotations directly in the model code. The model was calibrated using human in vivo data for acetaminophen and its sulfate and glucuronate metabolites. We then carried out extensive parameter sensitivity studies including the pairwise interaction of parameters. We also simulated population variation of exposure and sensitivity to acetaminophen. Our modeling framework can be extended to the prediction of liver toxicity following acetaminophen overdose, or used as a general purpose pharmacokinetic model for xenobiotics.

  19. Ontology-centric integration and navigation of the dengue literature.

    Science.gov (United States)

    Rajapakse, Menaka; Kanagasabai, Rajaraman; Ang, Wee Tiong; Veeramani, Anitha; Schreiber, Mark J; Baker, Christopher J O

    2008-10-01

    Uninhibited access to the unstructured information distributed across the web and in scientific literature databases continues to be beyond the reach of scientists and health professionals. To address this challenge we have developed a literature driven, ontology-centric navigation infrastructure consisting of a content acquisition engine, a domain-specific ontology (in OWL-DL) and an ontology instantiation pipeline delivering sentences derived by domain-specific text mining. A visual query tool for reasoning over A-box instances in the populated ontology is presented and used to build conceptual queries that can be issued to the knowledgebase. We have deployed this generic infrastructure to facilitate data integration and knowledge sharing in the domain of dengue, which is one of the most prevalent viral diseases that continue to infect millions of people in the tropical and subtropical regions annually. Using our unique methodology we illustrate simplified search and discovery on dengue information derived from distributed resources and aggregated according to dengue ontology. Furthermore we apply data mining to the instantiated ontology to elucidate trends in the mentions of dengue serotypes in scientific abstracts since 1974.

  20. Standard guidelines for the chromosome-centric human proteome project.

    Science.gov (United States)

    Paik, Young-Ki; Omenn, Gilbert S; Uhlen, Mathias; Hanash, Samir; Marko-Varga, György; Aebersold, Ruedi; Bairoch, Amos; Yamamoto, Tadashi; Legrain, Pierre; Lee, Hyoung-Joo; Na, Keun; Jeong, Seul-Ki; He, Fuchu; Binz, Pierre-Alain; Nishimura, Toshihide; Keown, Paul; Baker, Mark S; Yoo, Jong Shin; Garin, Jerome; Archakov, Alexander; Bergeron, John; Salekdeh, Ghasem Hosseini; Hancock, William S

    2012-04-06

    The objective of the international Chromosome-Centric Human Proteome Project (C-HPP) is to map and annotate all proteins encoded by the genes on each human chromosome. The C-HPP consortium was established to organize a collaborative network among the research teams responsible for protein mapping of individual chromosomes and to identify compelling biological and genetic mechanisms influencing colocated genes and their protein products. The C-HPP aims to foster the development of proteome analysis and integration of the findings from related molecular -omics technology platforms through collaborations among universities, industries, and private research groups. The C-HPP consortium leadership has elicited broad input for standard guidelines to manage these international efforts more efficiently by mobilizing existing resources and collaborative networks. The C-HPP guidelines set out the collaborative consensus of the C-HPP teams, introduce topics associated with experimental approaches, data production, quality control, treatment, and transparency of data, governance of the consortium, and collaborative benefits. A companion approach for the Biology and Disease-Driven HPP (B/D-HPP) component of the Human Proteome Project is currently being organized, building upon the Human Proteome Organization's organ-based and biofluid-based initiatives (www.hupo.org/research). The common application of these guidelines in the participating laboratories is expected to facilitate the goal of a comprehensive analysis of the human proteome.

  1. Athena: Towards Decision-Centric Anticipatory Sensor Information Delivery

    Directory of Open Access Journals (Sweden)

    Jongdeog Lee

    2018-01-01

    Full Text Available The paper introduces a new direction in quality-of-service-aware networked sensing that designs communication protocols and scheduling policies for data delivery that are optimized specifically for decision needs. The work complements present decision monitoring and support tools and falls in the larger framework of decision-driven resource management. A hallmark of the new protocols is that they are aware of the inference structure used to arrive at decisions (from logical predicates, as well as the data (and data quality that need to be furnished to successfully evaluate the unknowns on which these decisions are based. Such protocols can therefore anticipate and deliver precisely the right data, at the right level of quality, from the right sources, at the right time, to enable valid and timely decisions at minimum cost to the underlying network. This paper presents the decision model used and the protocol design philosophy, reviews the key recent results and describes a novel system, called Athena, that is the first to embody the aforementioned data delivery paradigm. Evaluation results are presented that compare the performance of decision-centric anticipatory information delivery to several baselines, demonstrating its various advantages in terms of decision timeliness, validity and network resources used. The paper concludes with a discussion of remaining future challenges in this emerging area.

  2. Problem-centric Process for Research-based Learning

    Directory of Open Access Journals (Sweden)

    Khaled Shaban

    2015-05-01

    Full Text Available Research-based Learning (RbL extends Inquiry and Project-based Learning by facilitating an early stage exposure and training for future scientists through authentic research activities. In this paper, an iterative problem-centric RbL process is introduced, and its activities and management aspects are described. The process helps implement course-integrated research systematically and practically. Furthermore, the novel process follows constructivist methods in incorporating inquiry, scaffolding, open-ended projects, as well as a goal oriented learning approach. The RbL process is adopted in two advanced computing courses, at two different universities: a leading comprehensive Western university and a new university in a developing country. The paper summarizes new lessons learned in these rewarding experiences. In particular, the instructor should help students start their projects, by providing them with previous work or data and pre-approving the papers to review by students. He should also maintain a continuous feedback to and from students to keep the students motivated and help the instructor refine and adapt the RBL process. We note that research collaborators can help students in identifying the research topics early. The paper also shows how to alleviate difficulties that may be encountered by students who find the novel approach demanding, and consequently it also helps the instructors better manage the course contents.

  3. A Skyline Plugin for Pathway-Centric Data Browsing

    Energy Technology Data Exchange (ETDEWEB)

    Degan, Michael G.; Ryadinskiy, Lillian; Fujimoto, Grant M.; Wilkins, Christopher S.; Lichti, Cheryl F.; Payne, Samuel H.

    2016-08-16

    For targeted proteomics to be broadly adopted in biological laboratories as a routine experimental protocol, wet-bench biologists must be able to approach SRM assay design in the same way they approach biological experimental design. Most often, biological hypotheses are envisioned in a set of protein interactions, networks and pathways. We present a plugin for the popular Skyline tool that presents public mass spectrometry data in a pathway-centric view to assist users in browsing available data and determining how to design quantitative experiments. Selected proteins and their underlying mass spectra are imported to Skyline for further assay design (transition selection). The same plugin can be used for hypothesis-drive DIA data analysis, again utilizing the pathway view to help narrow down the set of proteins which will be investigated. The plugin is backed by the PNNL Biodiversity Library, a corpus of 3 million peptides from >100 organisms, and the draft human proteome. Users can upload personal data to the plugin to use the pathway navigation prior to importing their own data into Skyline.

  4. Defending Our Satellites: The Need for Electronic Warfare Education and Training

    Science.gov (United States)

    2015-12-01

    intercept Allied bombers attacking at night.9 As a result of the electronic warfare advantage that systems like Window and Airborne Cigar be- stowed...74 | Air & Space Power Journal Defending Our Satellites The Need for Electronic Warfare Education and Training Lt Col E. Lincoln Bonner, USAF...expanding education and training in the use of electronic warfare to defend US satellites and improve their survivability. The following discussion

  5. Utilization of a radiology-centric search engine.

    Science.gov (United States)

    Sharpe, Richard E; Sharpe, Megan; Siegel, Eliot; Siddiqui, Khan

    2010-04-01

    Internet-based search engines have become a significant component of medical practice. Physicians increasingly rely on information available from search engines as a means to improve patient care, provide better education, and enhance research. Specialized search engines have emerged to more efficiently meet the needs of physicians. Details about the ways in which radiologists utilize search engines have not been documented. The authors categorized every 25th search query in a radiology-centric vertical search engine by radiologic subspecialty, imaging modality, geographic location of access, time of day, use of abbreviations, misspellings, and search language. Musculoskeletal and neurologic imagings were the most frequently searched subspecialties. The least frequently searched were breast imaging, pediatric imaging, and nuclear medicine. Magnetic resonance imaging and computed tomography were the most frequently searched modalities. A majority of searches were initiated in North America, but all continents were represented. Searches occurred 24 h/day in converted local times, with a majority occurring during the normal business day. Misspellings and abbreviations were common. Almost all searches were performed in English. Search engine utilization trends are likely to mirror trends in diagnostic imaging in the region from which searches originate. Internet searching appears to function as a real-time clinical decision-making tool, a research tool, and an educational resource. A more thorough understanding of search utilization patterns can be obtained by analyzing phrases as actually entered as well as the geographic location and time of origination. This knowledge may contribute to the development of more efficient and personalized search engines.

  6. An Audience-Centric Approach for Museums Sustainability

    Directory of Open Access Journals (Sweden)

    Laura Di Pietro

    2014-08-01

    Full Text Available The main purpose of this study is to propose a visitor centric perspective that can support museums towards sustainability. The main premise of this study is due to a concept of economic and social sustainability of museums, defined as the possession of sufficient resources to maintain the existence of an organization, and achieve their goals in the future, ensuring a certain flow of visitors. A great number of museums are characterized by a low number of visits; therefore, in order to become sustainable, museums should pay attention to audience and its internal diversity. In this way, a cultural site can plan tailored strategies to increase the number of visits and re-visits and to achieve community support. For this reason it is necessary to understand the cultural needs of visitors, acquiring appropriate monitoring tools, such as qualitative and quantitative ones. Generally, quantitative analyses are more reliable and complete, even if they require a considerable number of observations for the reliability of the results. Moreover, qualitative analysis provides more in depth information, even if their data do not allow us to make generalizations. The qualitative and quantitative methods for the detection of satisfaction are usually used separately, but their integration may bring significant added value in terms of the wealth of information. This study follows the analysis of the potential of the integration of qualitative and quantitative analysis techniques customized with respect to different types of targets. The results of the experimentation performed on ethnographic museums shows a consistency of the results obtained by the two different tools that increase the capacity information of survey instruments.

  7. Ending the Debate: Unconventional Warfare, Foreign Internal Defense, and Why Words Matter

    National Research Council Canada - National Science Library

    Jones, D

    2006-01-01

    There is an ongoing debate within the Special Forces community whether unconventional warfare and foreign internal defense are applicable in the contemporary and future Special Operations environments...

  8. Mass Spectrometric Determination of Chemical Warfare Agents in Indoor Sample Media Typically Collected During Forensic Investigations

    National Research Council Canada - National Science Library

    D'Agostino, P. A; Hancock, J. R; Chenier, C. L

    2005-01-01

    .... DRDC Suffield, in collaboration with the Royal Canadian Mounted Police, identified a need for analytical methods for chemical warfare agent identification in media, including flooring, wall surfaces...

  9. Redefining Hybrid Warfare: Russia's Non-linear War against the West

    Directory of Open Access Journals (Sweden)

    Tad Schnaufer

    2017-03-01

    Full Text Available The term hybrid warfare fails to properly describe Russian operations in Ukraine and elsewhere. Russia has undertaken unconventional techniques to build its influence and test the boundaries of a shaken international system. Notably, Russia’s actions in Ukraine display an evolved style of warfare that goes beyond its initial label of hybrid warfare. The term non-linear war (NLW will be defined in this article to encompass Russia’s actions and allow policymakers the correct framework to discuss and respond to Russia. NLW plays to the advantage of countries like Russia and constitute the future of warfare.

  10. Technological advancements for the detection of and protection against biological and chemical warfare agents.

    Science.gov (United States)

    Eubanks, Lisa M; Dickerson, Tobin J; Janda, Kim D

    2007-03-01

    There is a growing need for technological advancements to combat agents of chemical and biological warfare, particularly in the context of the deliberate use of a chemical and/or biological warfare agent by a terrorist organization. In this tutorial review, we describe methods that have been developed both for the specific detection of biological and chemical warfare agents in a field setting, as well as potential therapeutic approaches for treating exposure to these toxic species. In particular, nerve agents are described as a typical chemical warfare agent, and the two potent biothreat agents, anthrax and botulinum neurotoxin, are used as illustrative examples of potent weapons for which countermeasures are urgently needed.

  11. Development of Bicarbonate-Activated Peroxide as a Chemical and Biological Warfare Agent Decontaminant

    National Research Council Canada - National Science Library

    Richardson, David E

    2006-01-01

    ...) and other chemistry for the decontamination of chemical and biological warfare agents. The mechanism of formation of the active oxidant, peroxymonocarbonate, has been investigated in detail. New surfoxidants...

  12. Decontamination and Detoxification of Toxic Chemical Warfare Agents Using Polyurethane Sponges

    National Research Council Canada - National Science Library

    Gordon, Richard K; Gunduz, Alper T; Askins, LaTawnya Y; Strating, Simon J; Doctor, Bhupendra P; Clarkson, Edward D; Mitchelree, Larry W; Lukey, Brian; Railer, Roy; Schulz, Susan

    2003-01-01

    .... Another serious problem that may be encountered while caring for personnel contaminated with organophosphorus chemical warfare nerve agents is the possibility that there will be cross-contamination...

  13. Stuxnet and Cyber-Warfare (2/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic.   Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction. The lecturer invites comments via email to Gian.Piero.Siroli@cern.ch NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  14. Stuxnet and Cyber-Warfare (1/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic. Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction.   NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  15. Tissue-based standoff biosensors for detecting chemical warfare agents

    Science.gov (United States)

    Greenbaum, Elias; Sanders, Charlene A.

    2003-11-18

    A tissue-based, deployable, standoff air quality sensor for detecting the presence of at least one chemical or biological warfare agent, includes: a cell containing entrapped photosynthetic tissue, the cell adapted for analyzing photosynthetic activity of the entrapped photosynthetic tissue; means for introducing an air sample into the cell and contacting the air sample with the entrapped photosynthetic tissue; a fluorometer in operable relationship with the cell for measuring photosynthetic activity of the entrapped photosynthetic tissue; and transmitting means for transmitting analytical data generated by the fluorometer relating to the presence of at least one chemical or biological warfare agent in the air sample, the sensor adapted for deployment into a selected area.

  16. Cutaneous reactions in nuclear, biological and chemical warfare

    Directory of Open Access Journals (Sweden)

    Arora Sandeep

    2005-03-01

    Full Text Available Nuclear, biological and chemical warfare have in recent times been responsible for an increasing number of otherwise rare dermatoses. Many nations are now maintaining overt and clandestine stockpiles of such arsenal. With increasing terrorist threats, these agents of mass destruction pose a risk to the civilian population. Nuclear and chemical attacks manifest immediately while biological attacks manifest later. Chemical and biological attacks pose a significant risk to the attending medical personnel. The large scale of anticipated casualties in the event of such an occurrence would need the expertise of all physicians, including dermatologists, both military and civilian. Dermatologists are uniquely qualified in this respect. This article aims at presenting a review of the cutaneous manifestations in nuclear, chemical and biological warfare and their management.

  17. Identification of chemical warfare agent with radiological measurements

    International Nuclear Information System (INIS)

    Liu Boxue; Li Yun; Ai Xianyun

    2000-01-01

    There are three non-destructive radiological methods for identification of warfare agents and TNT. Their principles and problems related were discussed. Portable isotopic neutron spectroscopy is based on the assay of key elemental composition (such as Cl, P, H, As, S, N) in chemical agents by neutron induced prompt gamma ray analysis. Hydrogen concentration measurement by means of using thermal neutron can be employed to identify chemical warfare agents and TNT that contains different hydrogen fraction. The calibration curves of thermal neutron count rate against hydrogen concentration were measured. X ray imagination system can be used to determine the internal structure of chemical bombs, there by to identify them. The radiological methods are very useful for identification of old chemical weapons abandoned by Japan Army during World War 2

  18. Being or Becoming: Toward an Open-System, Process-Centric Model of Personality.

    Science.gov (United States)

    Giordano, Peter J

    2015-12-01

    Mainstream personality psychology in the West neglects the investigation of intra-individual process and variation, because it favors a Being over a Becoming ontology. A Being ontology privileges a structural (e.g., traits or selves) conception of personality. Structure-centric models in turn suggest nomothetic research strategies and the investigation of individual and group differences. This article argues for an open-system, process-centric understanding of personality anchored in an ontology of Becoming. A classical Confucian model of personality is offered as an example of a process-centric approach for investigating and appreciating within-person personality process and variation. Both quantitative and qualitative idiographic strategies can be used as methods of scientific inquiry, particularly the exploration of the Confucian exemplar of psychological health and well-being.

  19. U.S. Unmanned Aerial Vehicles (UAVS) and Network Centric Warfare (NCW) impacts on combat aviation tactics from Gulf War I through 2007 Iraq

    OpenAIRE

    Oveyik, Kaan.; Kurkcu, Coskun

    2008-01-01

    Approved for public release; distribution is unlimited Unmanned, aerial vehicles (UAVs) are an increasingly important element of many modern militaries. Their success on battlefields in Afghanistan, Iraq, and around the globe has driven demand for a variety of types of unmanned vehicles. Their proven value consists in low risk and low cost, and their capabilities include persistent surveillance, tactical and combat reconnaissance, resilience, and dynamic re-tasking. This research evaluat...

  20. U.S. Unmanned Aerial Vehicles (UAVs) and Network Centric Warfare (NCW): Impacts on Combat Aviation Tactics from Gulf War I Through 2007 Iraq

    Science.gov (United States)

    2008-03-01

    early warning AIM Air-intercept missile AJCN Adaptive, joint, C4ISR node AOR Area of responsibility ARM Anti-radiation missile ATARS Advanced...and economic considerations are offered, including relevant technological advancements. UAV impacts on these four conflicts are examined in the next...Tactical Airborne Reconnaissance System ( ATARS ) on F-16 and F/A-18 aircraft, and satellites. Manned platforms were adapted to multiple mission scenarios

  1. Just War and Postmodern Warfare: A German Case Study

    Science.gov (United States)

    2015-04-01

    warfare construct, Germany is shaping a military concept based on recent conflicts and unfettered by biases of conventional strategies, organizations...remain sovereign while subconsciously evolving toward liberal democratic ideas. In respecting each country’s political sensitivities, Germany’s...before exhausting all diplomatic, economic and information instruments. Whereas the term AU/ACSC/PINSON/AY15 13 “interests” may bias the United

  2. Conflict Without Casualties: Non-Lethal Weapons in Irregular Warfare

    Science.gov (United States)

    2007-09-01

    the body,” and the Geneva Protocol of 1925, bans the use of chemical and biological weapons .11 On 8 April 1975, President Ford issued Executive...E Funding – PE 63851M) (accessed 15 December 2006). The American Journal of Bioethics . “Medical Ethics and Non-Lethal Weapons .” Bioethics.net...CASUALTIES: NON-LETHAL WEAPONS IN IRREGULAR WARFARE by Richard L. Scott September 2007 Thesis Advisor: Robert McNab Second Reader

  3. Nodes and Codes: The Reality of Cyber Warfare

    Science.gov (United States)

    2012-05-17

    respectively. The avionics in Boeing’s 787 Dreamliner require approximately 6.5 million lines of code while the current S-Class Mercedes Benz requires over 20...leaders (demonstrated through outdated policy, theory, and doctrine) and the reality of warfare in 1914 (dictated by innovation, technology , and...or the guidelines to military action codified in doctrine? How are states using the latest technological innovations as violent instruments of

  4. Attacking the infrastructure: exploring potential uses of offensive information warfare

    OpenAIRE

    Elam, Donald Emmett.

    1996-01-01

    The world has entered the Third Wave; it has entered the Information Age. One of the fundamentals of this paradigm shift is the fact that information is power. The side that controls information more effectively will be victorious. Thus, countries and militaries must change their mentality in order to survive. A new form of conflict, Information Warfare, has been born. This new discipline is large, dynamic, and complex. The need exists for education among military officers and other concerned...

  5. Built to Outlast: Operational Approaches to Hybrid Warfare

    Science.gov (United States)

    2012-05-17

    29Robert T. Ames, Sun Tzu: The Art of War (New York: Ballantine Books, 1993), 78-80; Mao Tse -Tung, On Guerrilla Warfare, trans. Samuel B. Griffith...Chicago: University of Illinois Press, 1961), 25, 42.The works of Sun Tzu and Mao Tse -Tung both illustrate aspects of this concept. In a work...toreador’s cape, not the toreador himself. - Norman B. Hannah, The Key to Failure: Laos and the Vietnam War114 Against the backdrop of the Cold

  6. Warfare, genocide, and ethnic conflict: a Darwinian approach

    OpenAIRE

    Dimijian, Gregory G.

    2010-01-01

    As the 21st century dawns, I reflect on the history of humankind with growing concern about the need to understand the underlying biological and cultural roots of ethnic conflict and warfare. In the many studies of human conflict, innate biological predispositions have been neglected. This article is the third part of a series of seminars for medical residents at the University of Texas Southwestern Medical School at Dallas (see http://adarwinstudygroup.org/). The series starts with in-depth ...

  7. Numerical simulation of RCS for carrier electronic warfare airplanes

    OpenAIRE

    Yue Kuizhi; Liu Wenlin; Li Guanxiong; Ji Jinzu; Yu Dazhao

    2015-01-01

    This paper studies the radar cross section (RCS) of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carr...

  8. Annihilation Prediction for Lanchester-Type Models of Modern Warfare

    OpenAIRE

    Brown, G.G.; Taylor, J.

    1983-01-01

    Operations Research, 31, p.752. This paper introduces important new functions for analytic solution of Launch-ester-type equations of modern warfare for combat between two homogeneous forces modeled by power attrtition-rate coefficients with "no offset". Tabulations of these Lanchester-Clifford-Schlatii (or LCS) functions allow one to study this particular variable-coefficient model almost as easily and thoroughly as Lanchester's classic constant-coefficient one. LCS functions allow one ...

  9. Inside the Wire: American Security and Cyber Warfare

    Science.gov (United States)

    2017-03-01

    Roberts, Kerry V. " SUN TZU and The Art of Cyber Warfare." Journal of Counterterrorism & Homeland Security International 19, no. 1(Spring 2013): 12-4...12. REPORT TYPE 3. DATES COVERED (From - To) 01-03-2017 Bibliography 4. TITLE AND SUBTITLE Sa. CONTRACT NUMBER Inside the Wire: American Security...MCDERMOTT LIBRARY U.S. AIR FORCE ACADEMY 11. SPONSOR/MONITOR’S REPORT USAF ACADEMY CO 80840-6214 NUMBER(S) Special Bibliography Series # 119 12

  10. Hungarys Alternative to Counter Hybrid Warfare - Small States Weaponized Citizenry

    Science.gov (United States)

    2017-06-09

    said “Resilience as a terminological and operational factor, will become the newest ‘ brand ’ and communication name for the Alliance.”70 He also...audiences to influence their emotions , motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and...so-called influence warfare. His study pinpointed the importance of emotion over rational facts in messages. Second, Edward Lucas and Ben Nimmo on

  11. Recent Advances in Decontamination of Chemical Warfare Agents

    OpenAIRE

    Abdul Wadood Khan; Sabna Kotta; Shahid Husain Ansari; Javed Ali; Rakesh Kumar Sharma

    2013-01-01

    The recent turmoil and volatile situation in many countries and the increased risk of terrorist activities have raised alarm bells for the field of defense against toxic chemical/materials. These situations poses threats to society as terrorists can take advantage of such situations to strike and cause public mayhem. A number of chemicals have the potential of being used as chemical warfare (CW) agents. CW agents could immediately kill or incapacitate the affected individuals even when they a...

  12. Cyber warfare:terms, issues, laws and controversies

    OpenAIRE

    Seviş, Kamile Nur; Şeker, Ensar

    2016-01-01

    Recent years have shown us the importance of cybersecurity. Especially, when the matter is national security, it is even more essential and crucial. Increasing cyber attacks, especially between countries in governmental level, created a new term cyber warfare. Creating some rules and regulations for this kind of war is necessary therefore international justice systems are working on it continuously. In this paper, we mentioned fundamental terms of cyber...

  13. Littoral Combat Ship Open Ocean Anti-Submarine Warfare

    Science.gov (United States)

    2014-06-01

    maintain stealth and its defense in order to properly conduct an attack on a surface vessel (Sternhell and Thorndike 2014, 102). This statement...its target, the surface combatants can counter by increasing their speed (Sternhell and Thorndike 2014). While the maximum speed of the current...120316_PS.pdf Sternhell, Charles M, and Alan M Thorndike . 2014. “Antisubmarine Warfare in World War II.” CNA Analysis & Solutions. Accessed April 14, 2014

  14. Russian and Chinese Information Warfare: Theory and Practice

    Science.gov (United States)

    2004-06-01

    Integral neurolinguistic programming •Placing essential programs into the conscious or sub- conscious mind •Subconscious suggestions that modify human...Generators of special rays •Optical systems • Neurolinguistic programming •Computer psychotechnology •The mass media •Audiovisual effects •Special effects...Information Warfare: Theory and Practice 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e

  15. A comparative evaluation of static and functional methods for recording centric relation and condylar guidance: a clinical study.

    Science.gov (United States)

    Thakur, Mridul; Jain, Veena; Parkash, Hari; Kumar, Pravesh

    2012-09-01

    To evaluate and compare the centric relation and horizontal condylar guidance using interocclusal wax and extra oral Gothic arch methods and subjective evaluation of dentures thus fabricated. Centric relation and horizontal condylar guidance was recorded by using interocclusal wax and gothic arch tracing in 28 completely edentulous patients. These records were transferred to the articulator and difference in both values was recorded. After that patients were divided in two groups according to the centric relation and horizontal condylar guidance recording method used to achieve balanced occlusion. Response of the dentures was subjectively evaluated using "Woelfel subjective evaluation criteria". Centric relation recorded by both the methods did coincide in 7.14 % of patients. Centric relation recorded by interocclusal wax was posterior to Gothic centric relation in 21.43 % of patients, and anterior to Gothic centric relation in 71.42 % patients. Gothic arch tracings gave higher mean guidance values on both the sides as compared to protrusive wax record in all the subjects, although the difference was statistically insignificant (P > 0.05). Subjective evaluation showed statistical insignificance for all the parameters in both groups. Gothic arch method records the centric relation at a more posterior position than the Static method, but it does not make any difference in clinical performance of the complete denture. Horizontal condylar guidance angle was approximately similar by both the methods.

  16. Special Forces and the Art of Influence: A Grassroots Approach to Psychological Operations in an Unconventional Warfare Environment

    National Research Council Canada - National Science Library

    Thomas, II, Joel W

    2006-01-01

    This thesis researches the intricacies of the art of influence in an unconventional warfare environment to develop a model of influence that can be utilized by Special Forces conducting unconventional warfare...

  17. Chemical warfare agents identification by thermal neutron detection

    International Nuclear Information System (INIS)

    Liu Boxue; Ai Xianyun; Tan Daoyuan; Zhang Dianqin

    2000-01-01

    The hydrogen concentration determination by thermal neutron detection is a non-destructive, fast and effective method to identify chemical warfare agents and TNT that contain different hydrogen fraction. When an isotropic neutron source is used to irradiate chemical ammunition, hydrogen atoms of the agent inside shell act as a moderator and slow down neutrons. The number of induced thermal neutrons depends mainly upon hydrogen content of the agent. Therefore measurement of thermal neutron influence can be used to determine hydrogen atom concentration, thereby to determine the chemical warfare agents. Under a certain geometry three calibration curves of count rate against hydrogen concentration were measured. According to the calibration curves, response of a chemical agent or TNT could be calculated. Differences of count rate among chemical agents and TNT for each kind of shells is greater than five times of standard deviations of count rate for any agent, so chemical agents or TNT could be identified correctly. Meanwhile, blast tube or liquid level of chemical warfare agent could affect the response of thermal neutron count rate, and thereby the result of identification. (author)

  18. Quality of Life in Iranian Chemical Warfare Veteran's.

    Science.gov (United States)

    Ebadi, Abbas; Moradian, Tayeb; Mollahadi, Mohsen; Saeed, Yaser; Refahi, Ali Akbar

    2014-05-01

    Mustard gas has different effects on different body systems such as respiratory tract, blood, gastrointestinal, skin, eye, endocrine and peripheral nervous system. The purpose of this study was to determine the quality of life in chemical warfare veterans due to sulfur mustard exposure. In a cross-sectional and analytic study, 242 patients who had a chemical injury during the Iran-Iraq war (1980-1983) and their lung damage was proven were investigated in our study. The quality of life was measured in these patients using an extensively validated Iranian version of SF-36. The mean age of veterans was 44.12 ± 4.9 ranging from 22 to 62 years. Our results showed that chemical warfare had a decreased quality of life in all subscales of the SF-36. The lowest scores in SF-36 subscales were related to role physical and general health. The data also showed a significant relationship between the number of organs involved and the quality of life in these patients (P chemical warfare survivors suffering from late complications have a low health related quality of life.

  19. Distribution-centric 3-parameter thermodynamic models of partition gas chromatography.

    Science.gov (United States)

    Blumberg, Leonid M

    2017-03-31

    If both parameters (the entropy, ΔS, and the enthalpy, ΔH) of the classic van't Hoff model of dependence of distribution coefficients (K) of analytes on temperature (T) are treated as the temperature-independent constants then the accuracy of the model is known to be insufficient for the needed accuracy of retention time prediction. A more accurate 3-parameter Clarke-Glew model offers a way to treat ΔS and ΔH as functions, ΔS(T) and ΔH(T), of T. A known T-centric construction of these functions is based on relating them to the reference values (ΔS ref and ΔH ref ) corresponding to a predetermined reference temperature (T ref ). Choosing a single T ref for all analytes in a complex sample or in a large database might lead to practically irrelevant values of ΔS ref and ΔH ref for those analytes that have too small or too large retention factors at T ref . Breaking all analytes in several subsets each with its own T ref leads to discontinuities in the analyte parameters. These problems are avoided in the K-centric modeling where ΔS(T) and ΔS(T) and other analyte parameters are described in relation to their values corresponding to a predetermined reference distribution coefficient (K Ref ) - the same for all analytes. In this report, the mathematics of the K-centric modeling are described and the properties of several types of K-centric parameters are discussed. It has been shown that the earlier introduced characteristic parameters of the analyte-column interaction (the characteristic temperature, T char , and the characteristic thermal constant, θ char ) are a special chromatographically convenient case of the K-centric parameters. Transformations of T-centric parameters into K-centric ones and vice-versa as well as the transformations of one set of K-centric parameters into another set and vice-versa are described. Copyright © 2017 Elsevier B.V. All rights reserved.

  20. Featureous: A Tool for Feature-Centric Analysis of Java Software

    DEFF Research Database (Denmark)

    Olszak, Andrzej; Jørgensen, Bo Nørregaard

    2010-01-01

    Feature-centric comprehension of source code is necessary for incorporating user-requested modifications during software evolution and maintenance. However, such comprehension is difficult to achieve in case of large object-oriented programs due to the size, complexity, and implicit character...... of mappings between features and source code. To support programmers in overcoming these difficulties, we present a feature-centric analysis tool, Featureous. Our tool extends the NetBeans IDE with mechanisms for efficient location of feature implementations in legacy source code, and an extensive analysis...

  1. United States Coast Guard Antisubmarine Warfare (ASW) in the Maritime Defense Zone (MDZ) - A Strategic Approach

    Science.gov (United States)

    1989-03-01

    RIC ILE COPY AIR WAR COLLGE REEAC R~pCR UNITED STATES COAST GUARD ANTISUBMARINE WARFARE (ASW) IN THE MARITIME DEFENSE ZONE (MDZ) -A STRATEGIC...going to perform in these MDZs. Those tasks identified so far include: port and coastal physical security & preventive safety, mine warfare

  2. The Utility of Freedom: A Principal-Agent Model for Unconventional Warfare

    Science.gov (United States)

    2011-06-01

    Lanchester Model of Guerrilla Warfare,‖ Operations Research 10, no. 6 (December 1962): 818–827; William A. Niskanen, ―Review: The Economics of Insurgency...http://galenet.galegroup.com/servlet/DDRS?locID=navalps. Deitchman, S. J. ―A Lanchester Model of Guerrilla Warfare.‖ Operations Research 10, no

  3. Understanding the elementary considerations in a network warfare environment: an introductory framework

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available . It seeks to offer a better introductory understanding to the field of network warfare. This paper addresses the requirements for a network warfare capability and will look at the high-level approach, constraints, focus areas, levels, techniques...

  4. Metal organic frameworks for the catalytic detoxification of chemical warfare nerve agents

    Science.gov (United States)

    Hupp, Joseph T.; Farha, Omar K.; Katz, Michael J.; Mondloch, Joseph E.

    2017-04-18

    A method of using a metal organic framework (MOF) comprising a metal ion and an at least bidendate organic ligand to catalytically detoxify chemical warfare nerve agents including exposing the metal-organic-framework (MOF) to the chemical warfare nerve agent and catalytically decomposing the nerve agent with the MOF.

  5. Study on the identification method of chemical warfare agents with spectroscopy of neutron induced γ rays

    International Nuclear Information System (INIS)

    Liu Boxue; Li Yun; Li Xiangbao

    1996-01-01

    The paper briefly describes some non-destructive verification technologies of chemical warfare agents in-site, and some application of neutron induced gamma ray analysis, such as multi-elements analysis of coal, hidden explosive detection and identification of chemical agents. It also describes some problems in developing the portable isotopic neutron spectroscopy for non-destructive evaluation of chemical warfare agents

  6. Antidotes and treatments for chemical warfare/terrorism agents: an evidence-based review.

    Science.gov (United States)

    Rodgers, G C; Condurache, C T

    2010-09-01

    This article reviews the evidence supporting the efficacy of antidotes used or recommended for the potential chemical warfare agents of most concern. Chemical warfare agents considered include cyanide, vesicants, pulmonary irritants such as chlorine and phosgene, and nerve agents. The strength of evidence for most antidotes is weak, highlighting the need for additional research in this area.

  7. Status of dental health in chemical warfare victims: The case of Isfahan, Iran

    Directory of Open Access Journals (Sweden)

    Ahmad Mottaghi

    2012-01-01

    Conclusion: Chemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  8. 75 FR 6642 - Notice of Proposed Information Collection; Naval Special Warfare Recruiting Directorate

    Science.gov (United States)

    2010-02-10

    ... Information Collection; Naval Special Warfare Recruiting Directorate AGENCY: Department of the Navy, DoD. ACTION: Notice. SUMMARY: The Naval Special Warfare (NSW) Recruiting Directorate announces the submission... any of the following methods: Federal eRulemaking Portal: http://www.regulations.gov . Follow the...

  9. DCOS, a Real-Time Light-weight Data Centric Operating System

    NARCIS (Netherlands)

    Hofmeijer, T.J.; Dulman, S.O.; Jansen, P.G.; Havinga, Paul J.M.; Sahni, S.

    2004-01-01

    DCOS is a Data Centric lightweight Operating System for embedded devices. Despite limited energy and hardware resources, it supports a data driven architecture with provisions for dynamic loadable Modules. It combines these with Real-Time provisions based on Earliest Deadline First with a simple but

  10. DCOS, a real-time light-weight Data Centric Operating System

    NARCIS (Netherlands)

    Hofmeijer, T.J.; Dulman, S.O.; Jansen, P.G.; Havinga, Paul J.M.

    2004-01-01

    DCOS is a Data Centric lightweight Operating System for embedded devices. Despite limited energy and hardware resources, it supports a data driven architecture with provisions for dynamic loadable Modules. It combines these with Real-Time provisions based on Earliest Deadline First with a simple but

  11. A Quest for Missing Proteins : update 2015 on Chromosome-Centric Human Proteome Project

    NARCIS (Netherlands)

    Horvatovich, Péter; Lundberg, Emma K; Chen, Yu-Ju; Sung, Ting-Yi; He, Fuchu; Nice, Edouard C; Goode, Robert J A; Yu, Simon; Ranganathan, Shoba; Baker, Mark S; Domont, Gilberto B; Velasquez, Erika; Li, Dong; Liu, Siqi; Wang, Quanhui; He, Qing-Yu; Menon, Rajasree; Guan, Yuanfang; Corrales, Fernando Jose; Segura, Victor; Casal, José Ignacio; Pascual-Montano, Alberto; Albar, Juan Pablo; Fuentes, Manuel; Gonzalez-Gonzalez, Maria; Diez, Paula; Ibarrola, Nieves; Degano, Rosa M; Mohammed, Yassene; Borchers, Christoph H; Urbani, Andrea; Soggiu, Alessio; Yamamoto, Tadashi; Archakov, Alexander I; Ponomarenko, Elena; Lisitsa, Andrey V; Lichti, Cheryl F; Mostovenko, Ekaterina; Kroes, Roger A; Rezeli, Melinda; Vegvari, Akos; Fehniger, Thomas E; Bischoff, Rainer; Vizcaíno, Juan Antonio; Deutsch, Eric W; Lane, Lydie; Nilsson, Carol L; Marko-Varga, György; Omenn, Gilbert S; Jeong, Seul-Ki; Cho, Jin-Young; Paik, Young-Ki; Hancock, William S

    2015-01-01

    This paper summarizes the recent activities of the Chromosome-Centric Human Proteome Project (C-HPP) consortium, which develops new technologies to identify yet-to-be annotated proteins (termed "missing proteins") in biological samples that lack sufficient experimental evidence at the protein level

  12. User-centric Query Refinement and Processing Using Granularity Based Strategies

    NARCIS (Netherlands)

    Zeng, Y.; Zhong, N.; Wang, Y.; Qin, Y.; Huang, Z.; Zhou, H; Yao, Y; van Harmelen, F.A.H.

    2011-01-01

    Under the context of large-scale scientific literatures, this paper provides a user-centric approach for refining and processing incomplete or vague query based on cognitive- and granularity-based strategies. From the viewpoints of user interests retention and granular information processing, we

  13. Architecture-Centric Evolution : New Issues and Trends. Report on the Workshop ACE at ECOOP’06

    NARCIS (Netherlands)

    Avgeriou, Paris; Zdun, Uwe; Borne, Isabelle

    2006-01-01

    Software evolution has largely been focused on low-level implementation artefacts through refactoring techniques rather than the architectural level. However code-centric evolution techniques have not managed to effectively solve the problems that software evolution entails. Instead a paradigm shift

  14. User centric monitoring (UCM) information service for the next generation of Grid-enabled scientists

    International Nuclear Information System (INIS)

    Alexander, D A; Li, C; Lauret, J; Fine, V

    2008-01-01

    Nuclear and high-energy physicists routinely execute data processing and data analysis jobs on a Grid and need to be able to easily and remotely monitor the execution of these jobs. Existing Grid monitoring tools provide abundant information about the whole system, but are geared towards production jobs and well suited for Grid administrators, while the information tailored towards an individual user is not readily available in a user-friendly and user-centric way. Such User Centric information includes monitoring information such as the status of the submitted job, queue position, time of the start/finish, percentage of being done, error messages, standard output, and reasons for failure. We proposed to develop a framework based on Grid service technology that allows scientists to track and monitor their jobs easily from a user-centric view. The proposed framework aims to be flexible so that it can be applied by any Grid Virtual Organization (VO) with various ways of collecting the user-centric job monitoring information built into the framework. Furthermore, the framework provides a rich and reusable set of methods of presenting the information to the user from within a Web browser and other clients. In this presentation, we will give an architectural overview of the UCM service, show an example implementation in the RHIC/STAR experiment context and discuss limitations and future collaborative work

  15. Ambient Assisted Living Systems in the Context of Human Centric Sensing and IoT Concept

    DEFF Research Database (Denmark)

    Zaric, Nicola; Pejanovic-Djurisic, Milica; Mihovska, Albena Dimitrova

    2016-01-01

    This paper proposes the concept of Human Centric Sensing in the context of Internet of Things and Ambient Assisted Living. The paper uses a case study to present and analyze the proposed idea, and identifies the main challenges and open issues that require research and policy attention....

  16. An integrated framework for rural electrification: Adopting a user-centric approach to business model development

    International Nuclear Information System (INIS)

    Schillebeeckx, Simon J.D.; Parikh, Priti; Bansal, Rahul; George, Gerard

    2012-01-01

    Rural electrification (RE) has gained prominence over the past two decades as an effective means for improving living conditions. This growth has largely been driven by socio-economic and political imperatives to improve rural livelihood and by technological innovation. Based on a content analysis of 232 scholarly articles, the literature is categorized into four focal lenses: technology, institutional, viability and user-centric. We find that the first two dominate the RE debate. The viability lens has been used less frequently, whilst the user-centric lens began to engage scholars as late as 2007. We provide an overview of the technological, institutional and viability lenses, and elaborate upon the user-centric lens in greater detail. For energy policy and practice, we combine the four lenses to develop a business model framework that policy makers, practitioners and investors could use to assess RE projects or to design future rural electrification strategies. - Highlights: ► Review of two decades of rural electrification research. ► Content analysis of 232 scholarly articles. ► Literature is categorized into four focal lenses: technology, institutional, viability and user-centric. ► We develop a business model framework for rural electrification strategies.

  17. Development of flexible process-centric web applications: An integrated model driven approach

    NARCIS (Netherlands)

    Bernardi, M.L.; Cimitile, M.; Di Lucca, G.A.; Maggi, F.M.

    2012-01-01

    In recent years, Model Driven Engineering (MDE) approaches have been proposed and used to develop and evolve WAs. However, the definition of appropriate MDE approaches for the development of flexible process-centric WAs is still limited. In particular, (flexible) workflow models have never been

  18. Using declarative workflow languages to develop process-centric web applications

    NARCIS (Netherlands)

    Bernardi, M.L.; Cimitile, M.; Di Lucca, G.A.; Maggi, F.M.

    2012-01-01

    Nowadays, process-centric Web Applications (WAs) are extensively used in contexts where multi-user, coordinated work is required. Recently, Model Driven Engineering (MDE) techniques have been investigated for the development of this kind of applications. However, there are still some open issues.

  19. User centric monitoring (UCM) information service for the next generation of Grid-enabled scientists

    Energy Technology Data Exchange (ETDEWEB)

    Alexander, D A; Li, C [Tech-X Corporation, 5621 Arapahoe Avenue Suite A, Boulder, CO 80303 (United States); Lauret, J; Fine, V [Physics Department, Brookhaven National Laboratory, Upton, NY 11973 (United States)], E-mail: alexanda@txcorp.com

    2008-07-15

    Nuclear and high-energy physicists routinely execute data processing and data analysis jobs on a Grid and need to be able to easily and remotely monitor the execution of these jobs. Existing Grid monitoring tools provide abundant information about the whole system, but are geared towards production jobs and well suited for Grid administrators, while the information tailored towards an individual user is not readily available in a user-friendly and user-centric way. Such User Centric information includes monitoring information such as the status of the submitted job, queue position, time of the start/finish, percentage of being done, error messages, standard output, and reasons for failure. We proposed to develop a framework based on Grid service technology that allows scientists to track and monitor their jobs easily from a user-centric view. The proposed framework aims to be flexible so that it can be applied by any Grid Virtual Organization (VO) with various ways of collecting the user-centric job monitoring information built into the framework. Furthermore, the framework provides a rich and reusable set of methods of presenting the information to the user from within a Web browser and other clients. In this presentation, we will give an architectural overview of the UCM service, show an example implementation in the RHIC/STAR experiment context and discuss limitations and future collaborative work.

  20. User Location Identification for Cooperative Human-Centric Sensing (HCS) Scenario

    DEFF Research Database (Denmark)

    Mihovska, Albena Dimitrova

    – Human-Centric Sensing (HCS) is a newly emerged concept in the context of the Internet of Things (IoT) and the active and assisted living (AAL) scenario. HCS connectivity, also referred to as “smart connectivity” enables applications that are highly personalized and often time...

  1. Constructing disease-centric knowledge graphs : A case study for depression (short version)

    NARCIS (Netherlands)

    Huang, Zhisheng; Yang, Jie; van Harmelen, Frank; Hu, Qing

    2017-01-01

    In this paper we show how we used multiple large knowledge sources to construct a much smaller knowledge graph that is focussed on single disease (in our case major depression disorder). Such a disease-centric knowledge-graph makes it more convenient for doctors (in our case psychiatric doctors) to

  2. On a User-Centric Base Station Cooperation Scheme for Reliable Communications

    DEFF Research Database (Denmark)

    Kim, Dong Min; Thomsen, Henning; Popovski, Petar

    2017-01-01

    In this paper, we describe CoMP2flex, a user-centric base station (BS) cooperation scheme that provides improvements in reliability of both uplink (UL) and downlink (DL) communications of wireless cellular networks. CoMP2flex supports not only cooperation of two BSs with same direction of traffic...

  3. Got risk? risk-centric perspective for spacecraft technology decision-making

    Science.gov (United States)

    Feather, Martin S.; Cornford, Steven L.; Moran, Kelly

    2004-01-01

    A risk-based decision-making methodology conceived and developed at JPL and NASA has been used to aid in decision making for spacecraft technology assessment, adoption, development and operation. It takes a risk-centric perspective, through which risks are used as a reasoning step to interpose between mission objectives and risk mitigation measures.

  4. The Human - Nature Relationship i n t he Context o f Theo - Centric Environmental Ethics

    Directory of Open Access Journals (Sweden)

    Gülşen YAYLI

    2015-07-01

    Full Text Available The environmental problems are one of the issues that intensively occupy the agenda of humankind. This fact mainly derives from the ambiguity of the s pan and the content of the issue. The concept of environmental problems can not be confined to th e soil, air and water pollution for the reason that it covers a scope wider than a classical pollution issues. Initially the form of the relations hip between h uman and nature has been relying on the “consumption at the level of content” which stands for a level that is enough to sustain the living. The perception of the nature used to be described with the metaphor of mother while natural environment was defined as the “mother earth”. However subsequent to natural environment definition of the Cartesian philosophy with its approach to the human nature relationship, the core metaphor to describe the natural environment has changed from the metaphor of “mother” to the “slave” which should serve by any means. The human - nature relationship within the context of ethics, both the parties an d their respective statues bear an importance. In terms of ethics of human - nature relationship, it is possible to mention three main approaches. First one is the anthropo - centric approach. Within the scope of historical process, human - nature relationship is addressed according to anthropo - centric ethics comprehension so human has remained at the center of discussion. Following the change of the perception regarding the issue of environment, new approaches have emerged that give emphasis not only on human beings but also others; on li ving and non - living beings with in the eco - system. In principle, this represents a departure from an anthropo - centric ethics to a new ethic approach which fall s into two categories, bio centric and eco - centric. The theo - centric ethics should also be included to these ethics approaches that are shaped within the sphere of positive sciences. The Abrahamic

  5. Network Centric Operations NCO Case Study. The British Approach to Low-Intensity Operations: Part I

    Science.gov (United States)

    2007-02-12

    Army’s institutional memory of jungle warfare (during WW2 ) had dissipated by 1948. Nonetheless, individuals within the Army who had experienced such...with a specially stabilised TV camera mounting. It also fitted infrared surveillance systems to its Beaver spotter planes, which helped detect

  6. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  7. Chemical and biological warfare. Should defenses be researched and deployed?

    Science.gov (United States)

    Orient, J M

    1989-08-04

    The threat of chemical and biological weapons of mass destruction has intensified because of improved delivery systems and advances in chemistry, genetics, and other sciences. Possible US responses to this threat include deterrence, defenses, and/or disarmament, including a reaffirmation of the Biological and Toxin Weapons Convention of 1972, which is now in jeopardy. This article discusses the history of chemical and biological warfare, existing and potential weapons, the proliferation of weapons and delivery systems, ways to prevent the use of these weapons, and ways to protect populations from their effects.

  8. Environmental assessments of sea dumped chemical warfare agents

    DEFF Research Database (Denmark)

    Sanderson, Hans; Fauser, Patrik

    This is a report on the information gathered during work related to sea dumped chemical warfare agents. It mainly reviews the work conducted in relation to the installation of the two Nord Stream gas pipeline from 2008-2012. The focus was on the weight-of-evidence risk assessment of disturbed CWA...... residues in connection with the installation of the pipelines. Novel exposure and toxicity assessments are presented and the risk is assessed. The overall conclusion is that there is a negligible acute added CWA risk towards the fish community from the installation of the pipelines....

  9. Ultraviolet Raman scattering from persistent chemical warfare agents

    Science.gov (United States)

    Kullander, Fredrik; Wästerby, Pär.; Landström, Lars

    2016-05-01

    Laser induced Raman scattering at excitation wavelengths in the middle ultraviolet was examined using a pulsed tunable laser based spectrometer system. Droplets of chemical warfare agents, with a volume of 2 μl, were placed on a silicon surface and irradiated with sequences of laser pulses. The Raman scattering from V-series nerve agents, Tabun (GA) and Mustard gas (HD) was studied with the aim of finding the optimum parameters and the requirements for a detection system. A particular emphasis was put on V-agents that have been previously shown to yield relatively weak Raman scattering in this excitation band.

  10. Status of dental health in chemical warfare victims: the case of Isfahan, Iran.

    Science.gov (United States)

    Mottaghi, Ahmad; Hoseinzade, Abolfath; Zamani, Elham; Araghizade, Habib Allah

    2012-01-01

    Little evidence is available regarding the dental health of victims of chemical warfare in Iran. Therefore, in this study, we examined the decayed, missing, and filled teeth index (DMFT), community periodontal index of treatment needs (CPITN), and saliva secretion rate of chemical warfare victims living in the province of Isfahan in Iran. This case-control study was conducted with 300 chemical warfare victims as the treatment group and 300 age-matched individuals without exposure to chemical warfare as the control group. DMFT and CPITN indices and saliva secretion rate were measured and compared between the two groups. Chemical warfare victims had significantly higher scores than the control group for decayed teeth (4.25 ± 3.88 vs 3.52 ± 2.81; P=0.009), missing teeth (8.79 ± 9.3 vs 6.15 ± 8.43; Pwarfare victims was significantly lower than that in the control group (1.71 ± 0.05 vs 3.85 ± 1.95 cc/5 min; PChemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  11. COORDINATION IN MULTILEVEL NETWORK-CENTRIC CONTROL SYSTEMS OF REGIONAL SECURITY: APPROACH AND FORMAL MODEL

    Directory of Open Access Journals (Sweden)

    A. V. Masloboev

    2015-01-01

    Full Text Available The paper deals with development of methods and tools for mathematical and computer modeling of the multilevel network-centric control systems of regional security. This research is carried out under development strategy implementation of the Arctic zone of the Russian Federation and national safeguarding for the period before 2020 in the Murmansk region territory. Creation of unified interdepartmental multilevel computer-aided system is proposed intended for decision-making information support and socio-economic security monitoring of the Arctic regions of Russia. The distinctive features of the investigated system class are openness, self-organization, decentralization of management functions and decision-making, weak hierarchy in the decision-making circuit and goal generation capability inside itself. Research techniques include functional-target approach, mathematical apparatus of multilevel hierarchical system theory and principles of network-centric control of distributed systems with pro-active components and variable structure. The work considers network-centric management local decisions coordination problem-solving within the multilevel distributed systems intended for information support of regional security. The coordination problem-solving approach and problem formalization in the multilevel network-centric control systems of regional security have been proposed based on developed multilevel recurrent hierarchical model of regional socio-economic system complex security. The model provides coordination of regional security indexes, optimized by the different elements of multilevel control systems, subject to decentralized decision-making. The model specificity consists in application of functional-target technology and mathematical apparatus of multilevel hierarchical system theory for coordination procedures implementation of the network-centric management local decisions. The work-out and research results can find further

  12. Punishment sustains large-scale cooperation in prestate warfare

    Science.gov (United States)

    Mathew, Sarah; Boyd, Robert

    2011-01-01

    Understanding cooperation and punishment in small-scale societies is crucial for explaining the origins of human cooperation. We studied warfare among the Turkana, a politically uncentralized, egalitarian, nomadic pastoral society in East Africa. Based on a representative sample of 88 recent raids, we show that the Turkana sustain costly cooperation in combat at a remarkably large scale, at least in part, through punishment of free-riders. Raiding parties comprised several hundred warriors and participants are not kin or day-to-day interactants. Warriors incur substantial risk of death and produce collective benefits. Cowardice and desertions occur, and are punished by community-imposed sanctions, including collective corporal punishment and fines. Furthermore, Turkana norms governing warfare benefit the ethnolinguistic group, a population of a half-million people, at the expense of smaller social groupings. These results challenge current views that punishment is unimportant in small-scale societies and that human cooperation evolved in small groups of kin and familiar individuals. Instead, these results suggest that cooperation at the larger scale of ethnolinguistic units enforced by third-party sanctions could have a deep evolutionary history in the human species. PMID:21670285

  13. China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence

    Directory of Open Access Journals (Sweden)

    Magnus Hjortdal

    2011-01-01

    Full Text Available This article presents three reasons for states to use cyber warfare and shows that cyberspace is—and will continue to be—a decisive element in China's strategy to ascend in the international system. The three reasons are: deterrence through infiltration of critical infrastructure; military technological espionage to gain military knowledge; and industrial espionage to gain economic advantage. China has a greater interest in using cyberspace offensively than other actors, such as the United States, since it has more to gain from spying on and deterring the United States than the other way around. The article also documents China's progress in cyber warfare and shows how it works as an extension of its traditional strategic thinking and the current debate within the country. Several examples of cyber attacks traceable to China are also presented. This includes cyber intrusions on a nuclear arms laboratory, attacks on defense ministries (including the Joint Strike Fighter and an airbase and the U.S. electric grid, as well as the current Google affair, which has proved to be a small part of a broader attack that also targeted the U.S. Government. There are, however, certain constraints that qualify the image of China as an aggressive actor in cyberspace. Some believe that China itself is the victim of just as many attacks from other states. Furthermore, certain actors in the United States and the West have an interest in overestimating China's capabilities in cyberspace in order to maintain their budgets.

  14. Biodiversity conservation and armed conflict: a warfare ecology perspective.

    Science.gov (United States)

    Hanson, Thor

    2018-04-23

    The activities involved in preparing for, executing, and recovering from armed conflict are globally pervasive and consequential, with significant impacts on natural systems. Effects on biodiversity are predominantly negative, produced by direct and indirect battlefield impacts, as well as the general breakdown of social, economic, and governance systems during wartime. Certain conservation opportunities do occur, however, particularly on lands set aside for training exercises, buffer zones, and peace parks. Here, the relationship between armed conflict and biodiversity is reviewed using the temporal framework of warfare ecology, which defines warfare as an ongoing process of three overlapping stages: preparations, war (armed conflict), and postwar activities. Several themes emerge from recent studies, including a heightened awareness of biodiversity conservation on military lands, the potential for scientific and conservation engagement to mitigate negative biodiversity impacts in war zones, and the importance of the postwar period for incorporating biodiversity priorities into reconstruction and recovery efforts. Research limitations and knowledge gaps are also discussed. © 2018 New York Academy of Sciences.

  15. Functional Assessment of the Stomatognathic System, after the Treatment of Edentulous Patients, with Different Methods of Establishing the Centric Relation.

    Science.gov (United States)

    Nitecka-Buchta, Aleksandra; Proba, Thomas; Proba, Paulina; Stefański, Kamil; Baron, Stefan

    2018-01-01

    The study compares subjective experiences of patients, wearing complete dentures. Two different methods of determining a centric relation were performed: the traditional method using wax occlusal rims and the Gerber method, based on gothic arch tracings. The success rate of establishing a centric relation in both methods was evaluated (rentgenodiagnostics). The influence of the method used to obtain the centric relation on patients' stomatognathic system (condyle centralization, pain) was also evaluated. Better results were achieved in gothic arch tracing method. Before every prosthetic treatment of edentulous patients, a functional analysis of the TMJ is necessary. The lack of centric relation, in a long term adaptation patients, does not lead to TMD symptoms. This trial is registered with NCT03343015.

  16. Functional Assessment of the Stomatognathic System, after the Treatment of Edentulous Patients, with Different Methods of Establishing the Centric Relation

    Directory of Open Access Journals (Sweden)

    Aleksandra Nitecka-Buchta

    2018-01-01

    Full Text Available The study compares subjective experiences of patients, wearing complete dentures. Two different methods of determining a centric relation were performed: the traditional method using wax occlusal rims and the Gerber method, based on gothic arch tracings. The success rate of establishing a centric relation in both methods was evaluated (rentgenodiagnostics. The influence of the method used to obtain the centric relation on patients’ stomatognathic system (condyle centralization, pain was also evaluated. Better results were achieved in gothic arch tracing method. Before every prosthetic treatment of edentulous patients, a functional analysis of the TMJ is necessary. The lack of centric relation, in a long term adaptation patients, does not lead to TMD symptoms. This trial is registered with NCT03343015.

  17. The effect of a customer-centric approach towards doctors in a private hospital / Mario van der Westhuizen

    OpenAIRE

    Van der Westhuizen, Mario

    2014-01-01

    Globally, trade and industry has shifted its focus from the traditional service delivery approaches to various alternative practices to be more successful, cost efficient, customer orientated, flexible and innovative. This shift in focus has lead to organisations applying a customer centric approach in their business. In order to understand customer centricity, it is necessary to be familiar with the term customer service. Customer service is the offering of services to customers before, d...

  18. Comparative evaluation of the efficacy of occlusal splints fabricated in centric relation or maximum intercuspation in temporomandibular disorders patients

    OpenAIRE

    Hamata,Marcelo Matida; Zuim,Paulo Renato Junqueira; Garcia,Alicio Rosalino

    2009-01-01

    Fabrication of occlusal splints in centric relation for temporomandibular disorders (TMD) patients is arguable, since this position has been defined for asymptomatic stomatognathic system. Thus, maximum intercuspation might be employed in patients with occlusal stability, eliminating the need for interocclusal records. This study compared occlusal splints fabricated in centric relation and maximum intercuspation in muscle pain reduction of TMD patients. Twenty patients with TMD of myogenous o...

  19. Evaluating mobile centric readiness of students: A case of computer science students in open-distance learning

    CSIR Research Space (South Africa)

    Chipangura, B

    2015-07-01

    Full Text Available and Education]: Distance learning Keywords Mobile centric services, mobile information access, mobile readiness 1. INTRODUCTION As the mobile phone market matures in terms of penetration rate, subscription rate, handsets functionality and mobile centric..., this reflects a ratio of one mobile phone per person. High mobile phone penetration has made it possible for digitally alienated communities in developing countries to have improved access to business, health, education and social services. Indeed, this has...

  20. FEATUREOUS: AN INTEGRATED ENVIRONMENT FOR FEATURE-CENTRIC ANALYSIS AND MODIFICATION OF OBJECT-ORIENTED SOFTWARE

    DEFF Research Database (Denmark)

    Olszak, Andrzej; Jørgensen, Bo Nørregaard

    2011-01-01

    The decentralized nature of collaborations between objects in object-oriented software makes it difficult to understand the implementations of user-observable program features and their respective interdependencies. As feature-centric program understanding and modification are essential during...... software maintenance and evolution, this situation needs to change. In this paper, we present Featureous, an integrated development environment built on top of the NetBeans IDE that facilitates feature-centric analysis of object-oriented software. Our integrated development environment encompasses...... a lightweight feature location mechanism, a number of reusable analytical views, and necessary APIs for supporting future extensions. The base of the integrated development environment is a conceptual framework comprising of three complementary dimensions of comprehension: perspective, abstraction...

  1. Applied data-centric social sciences concepts, data, computation, and theory

    CERN Document Server

    Sato, Aki-Hiro

    2014-01-01

    Applied data-centric social sciences aim to develop both methodology and practical applications of various fields of social sciences and businesses with rich data. Specifically, in the social sciences, a vast amount of data on human activities may be useful for understanding collective human nature. In this book, the author introduces several mathematical techniques for handling a huge volume of data and analysing collective human behaviour. The book is constructed from data-oriented investigation, with mathematical methods and expressions used for dealing with data for several specific problems. The fundamental philosophy underlying the book is that both mathematical and physical concepts are determined by the purposes of data analysis. This philosophy is shown throughout exemplar studies of several fields in socio-economic systems. From a data-centric point of view, the author proposes a concept that may change people’s minds and cause them to start thinking from the basis of data. Several goals underlie ...

  2. Sustaining Innovative Success: A Case Study on Consumer-Centric Innovation in the ICT Industry

    Directory of Open Access Journals (Sweden)

    Minkyung Choy

    2016-09-01

    Full Text Available The phenomenon of innovation growing rapidly and having a shorter lifespan is a structural change due to the development of ICT (Information and Communications Technology, diverse investment methods, and reduced pattern of innovation adoption. For ICT companies to survive and maintain their success in this ever-changing environment, they need to succeed in fulfilling both productivity and accuracy of innovation. To sustain their innovative success, ICT companies should consistently maintain the direction of innovation towards consumers. The present study analyzes various cases of ICT companies which succeeded or failed to maintain their prior innovative success, and suggests consumer-centric innovation as a solution. To create consumer-centric innovations, companies have to (1 predict the dynamically evolving demand of consumers and continuously transform; (2 proactively employ observation method and big data analysis to discover hidden demands; and (3 identify hassles such as wastes, inconveniences, and anxieties, and put effort in solving these hassles.

  3. Hierarchical Brokering with Feedback Control Framework in Mobile Device-Centric Clouds

    Directory of Open Access Journals (Sweden)

    Chao-Lieh Chen

    2016-01-01

    Full Text Available We propose a hierarchical brokering architecture (HiBA and Mobile Multicloud Networking (MMCN feedback control framework for mobile device-centric cloud (MDC2 computing. Exploiting the MMCN framework and RESTful web-based interconnection, each tier broker probes resource state of its federation for control and management. Real-time and seamless services were developed. Case studies including intrafederation energy-aware balancing based on fuzzy feedback control and higher tier load balancing are further demonstrated to show how HiBA with MMCN relieves the embedding of algorithms when developing services. Theoretical performance model and real-world experiments both show that an MDC2 based on HiBA features better quality in terms of resource availability and network latency if it federates devices with enough resources distributed in lower tier hierarchy. The proposed HiBA realizes a development platform for MDC2 computing which is a feasible solution to User-Centric Networks (UCNs.

  4. Tactical Web Services: Using XML and Java Web Services to Conduct Real-Time Net-Centric Sonar Visualization

    National Research Council Canada - National Science Library

    Rosetti, Scott

    2004-01-01

    With the unveiling of ForceNet, the Navy's architectural framework for how naval warfare is to be conducted in the information age, much of the technological focus has been placed on Web technology...

  5. Elastic LiDAR Fusion: Dense Map-Centric Continuous-Time SLAM

    OpenAIRE

    Park, Chanoh; Moghadam, Peyman; Kim, Soohwan; Elfes, Alberto; Fookes, Clinton; Sridharan, Sridha

    2017-01-01

    The concept of continuous-time trajectory representation has brought increased accuracy and efficiency to multi-modal sensor fusion in modern SLAM. However, regardless of these advantages, its offline property caused by the requirement of global batch optimization is critically hindering its relevance for real-time and life-long applications. In this paper, we present a dense map-centric SLAM method based on a continuous-time trajectory to cope with this problem. The proposed system locally f...

  6. Upscaling key ecosystem functions across the conterminous United States by a water‐centric ecosystem model

    Science.gov (United States)

    Ge Sun; Peter Caldwell; Asko Noormets; Steven G. McNulty; Erika Cohen; al. et.

    2011-01-01

    We developed a water‐centric monthly scale simulation model (WaSSI‐C) by integrating empirical water and carbon flux measurements from the FLUXNET network and an existing water supply and demand accounting model (WaSSI). The WaSSI‐C model was evaluated with basin‐scale evapotranspiration (ET), gross ecosystem productivity (GEP), and net ecosystem exchange (NEE)...

  7. Group Centric Networking: Addressing Information Sharing Requirements at the Tactical Edge

    Science.gov (United States)

    2016-04-10

    Group Centric Networking: Addressing Information Sharing Requirements at the Tactical Edge Bow-Nan Cheng, Greg Kuperman, Patricia Deutsch, Logan...been a large push in the U.S. Department of Defense to move to an all Internet Protocol (IP) infrastructure, particularly on the tactical edge . IP and...lossy links, and scaling to large numbers of users. Unfortunately, these are the exact conditions military tactical edge networks must operate within

  8. Resistance against brute-force attacks on stateless forwarding in information centric networking

    OpenAIRE

    Alzahrani, Bander A.; Reed, Martin J.; Vassilakis, Vassilios G.

    2015-01-01

    Line Speed Publish/Subscribe Inter-networking (LIPSIN) is one of the proposed forwarding mechanisms in Information Centric Networking (ICN). It is a stateless source-routing approach based on Bloom filters. However, it has been shown that LIPSIN is vulnerable to brute-force attacks which may lead to distributed denial-of-service (DDoS) attacks and unsolicited messages. In this work, we propose a new forwarding approach that maintains the advantages of Bloom filter based forwarding while allow...

  9. Developing a customer-centric digital marketing communication strategy : Commissioner Salusfin Oy

    OpenAIRE

    Lokteva, Daria

    2015-01-01

    The present study relates to the field of digital marketing communication. The purpose of the study is to create a customer-centric digital marketing communication strategy for Salusfin, a technological start-up company in need of an effective digital strategy. The key issue of the study is to provide an insight on how digital marketing communication tools can fulfil the needs and benefit the company while adding value for the customers. The research questions addressed in the study are 1. Wh...

  10. Identification and management of distributed data NGN, content-centric networks and the web

    CERN Document Server

    Bartolomeo, Giovanni

    2013-01-01

    Although several books and academic courses discuss data management and networking, few of them focus on the convergence of networking and software technologies for identifying, addressing, and managing distributed data. Focusing on this convergence, Identification and Management of Distributed Data: NGN, Content-Centric Networks and the Web collates and describes the various distributed data management technologies to help readers from various backgrounds understand the common aspects that govern distributed data management. With a focus on the primary problems in identifying, addressing, and

  11. A product feature-based user-centric product search model

    OpenAIRE

    Ben Jabeur, Lamjed; Soulier, Laure; Tamine, Lynda; Mousset, Paul

    2016-01-01

    During the online shopping process, users would search for interesting products and quickly access those that fit with their needs among a long tail of similar or closely related products. Our contribution addresses head queries that are frequently submitted on e-commerce Web sites. Head queries usually target featured products with several variations, accessories, and complementary products. We present in this paper a product feature-based user-centric model for product search involving in a...

  12. Ferocia gen. nov., a new centric diatom genus (Bacillariophyceae) from the sub-Antarctic region

    Czech Academy of Sciences Publication Activity Database

    Van de Vijver, B.; Chattová, B.; Lebouvier, M.; Houk, Václav

    2017-01-01

    Roč. 332, č. 1 (2017), s. 22-30 ISSN 1179-3155 R&D Projects: GA ČR GA205/05/0204 Institutional research plan: CEZ:AV0Z60050516 Institutional support: RVO:67985939 Keywords : centric diatoms * new genus * Melosira * Ferocia * sub-Antarctic Region Subject RIV: EF - Botanics OBOR OECD: Plant sciences, botany Impact factor: 1.240, year: 2016

  13. DRUG: An Energy-Efficient Data-Centric Routing Protocol for Wireless Sensor Networks

    OpenAIRE

    Sahoo, B. P. S.; Puthal, Deepak

    2014-01-01

    In general, sensor nodes are deployed in left unattended area. In such situation feeding energy to the batteries or replacing the batteries is difficult or even sometimes impossible too. Therefore, prolonging the network lifetime is an important optimization goal in this aspect. In this paper, we propose a new Energy-efficient Datacentric RoUtinG protocol called DRUG. In this paper, we propose an adaptive Data centric approach to find an optimal routing path from source to sink when the senso...

  14. A NEW PARADIGM FOR INDIAN SUPERMARKET RETAILERS BASED ON CUSTOMER-CENTRIC STRATEGIC APPROACH

    Directory of Open Access Journals (Sweden)

    Seema S. Shenoy

    2011-12-01

    Full Text Available Supermarket retailers in India admist fierce competition and the only way out is through the attainment of competitive advantage. Strategy is the route to attain competitive advantage that could facilitate firms attain superior performance. The objective of this paper is to develop a conceptual framework on customer-centric retail strategy, to facilitate supermarket retailers in India attain competitive advantage. The paper draws heavily from existing literature on retail strategies and competitive advantage in order to ascertain the most effective customer-centric strategies. Adding strength to the research is the result derived from interviews of supermarket managers and customers; and also the results of pilot study .The work involves identification of constructs and research hypothesis for the proposed framework. The framework contributes to literature by emphasizing on not just effective customer-centric strategies but also, on specific performance outcomes that supermarket retailers could be enjoying riding on these strategies. A new dimension to attainment of competitive advantage and superior performance has definitely been recognized by this research effort. Supermarket retailers in India can be certain of attaining competitive advantage by riding on the proposed strategies.

  15. RCAS: an RNA centric annotation system for transcriptome-wide regions of interest.

    Science.gov (United States)

    Uyar, Bora; Yusuf, Dilmurat; Wurmus, Ricardo; Rajewsky, Nikolaus; Ohler, Uwe; Akalin, Altuna

    2017-06-02

    In the field of RNA, the technologies for studying the transcriptome have created a tremendous potential for deciphering the puzzles of the RNA biology. Along with the excitement, the unprecedented volume of RNA related omics data is creating great challenges in bioinformatics analyses. Here, we present the RNA Centric Annotation System (RCAS), an R package, which is designed to ease the process of creating gene-centric annotations and analysis for the genomic regions of interest obtained from various RNA-based omics technologies. The design of RCAS is modular, which enables flexible usage and convenient integration with other bioinformatics workflows. RCAS is an R/Bioconductor package but we also created graphical user interfaces including a Galaxy wrapper and a stand-alone web service. The application of RCAS on published datasets shows that RCAS is not only able to reproduce published findings but also helps generate novel knowledge and hypotheses. The meta-gene profiles, gene-centric annotation, motif analysis and gene-set analysis provided by RCAS provide contextual knowledge which is necessary for understanding the functional aspects of different biological events that involve RNAs. In addition, the array of different interfaces and deployment options adds the convenience of use for different levels of users. RCAS is available at http://bioconductor.org/packages/release/bioc/html/RCAS.html and http://rcas.mdc-berlin.de. © The Author(s) 2017. Published by Oxford University Press on behalf of Nucleic Acids Research.

  16. Cognition to Collaboration: User-Centric Approach and Information Behaviour Theories/Models

    Directory of Open Access Journals (Sweden)

    Alperen M Aydin

    2016-12-01

    Full Text Available Aim/Purpose: The objective of this paper is to review the vast literature of user-centric in-formation science and inform about the emerging themes in information behaviour science. Background:\tThe paradigmatic shift from system-centric to user-centric approach facilitates research on the cognitive and individual information processing. Various information behaviour theories/models emerged. Methodology: Recent information behaviour theories and models are presented. Features, strengths and weaknesses of the models are discussed through the analysis of the information behaviour literature. Contribution: This paper sheds light onto the weaknesses in earlier information behaviour models and stresses (and advocates the need for research on social information behaviour. Findings: Prominent information behaviour models deal with individual information behaviour. People live in a social world and sort out most of their daily or work problems in groups. However, only seven papers discuss social information behaviour (Scopus search. Recommendations for Practitioners\t: ICT tools used for inter-organisational sharing should be redesigned for effective information-sharing during disaster/emergency times. Recommendation for Researchers: There are scarce sources on social side of the information behaviour, however, most of the work tasks are carried out in groups/teams. Impact on Society: In dynamic work contexts like disaster management and health care settings, collaborative information-sharing may result in decreasing the losses. Future Research: A fieldwork will be conducted in disaster management context investigating the inter-organisational information-sharing.

  17. Value-centric design architecture based on analysis of space system characteristics

    Science.gov (United States)

    Xu, Q.; Hollingsworth, P.; Smith, K.

    2018-03-01

    Emerging design concepts such as miniaturisation, modularity, and standardisation, have contributed to the rapid development of small and inexpensive platforms, particularly cubesats. This has been stimulating an upcoming revolution in space design and development, leading satellites into the era of "smaller, faster, and cheaper". However, the current requirement-centric design philosophy, focused on bespoke monolithic systems, along with the associated development and production process does not inherently fit with the innovative modular, standardised, and mass-produced technologies. This paper presents a new categorisation, characterisation, and value-centric design architecture to address this need for both traditional and novel system designs. Based on the categorisation of system configurations, a characterisation of space systems, comprised of duplication, fractionation, and derivation, is proposed to capture the overall system configuration characteristics and promote potential hybrid designs. Complying with the definitions of the system characterisation, mathematical mapping relations between the system characterisation and the system properties are described to establish the mathematical foundation of the proposed value-centric design methodology. To illustrate the methodology, subsystem reliability relationships are therefore analysed to explore potential system configurations in the design space. The results of the applications of system characteristic analysis clearly show that the effects of different configuration characteristics on the system properties can be effectively analysed and evaluated, enabling the optimization of system configurations.

  18. Combining Vertex-centric Graph Processing with SPARQL for Large-scale RDF Data Analytics

    KAUST Repository

    Abdelaziz, Ibrahim

    2017-06-27

    Modern applications, such as drug repositioning, require sophisticated analytics on RDF graphs that combine structural queries with generic graph computations. Existing systems support either declarative SPARQL queries, or generic graph processing, but not both. We bridge the gap by introducing Spartex, a versatile framework for complex RDF analytics. Spartex extends SPARQL to support programs that combine seamlessly generic graph algorithms (e.g., PageRank, Shortest Paths, etc.) with SPARQL queries. Spartex builds on existing vertex-centric graph processing frameworks, such as Graphlab or Pregel. It implements a generic SPARQL operator as a vertex-centric program that interprets SPARQL queries and executes them efficiently using a built-in optimizer. In addition, any graph algorithm implemented in the underlying vertex-centric framework, can be executed in Spartex. We present various scenarios where our framework simplifies significantly the implementation of complex RDF data analytics programs. We demonstrate that Spartex scales to datasets with billions of edges, and show that our core SPARQL engine is at least as fast as the state-of-the-art specialized RDF engines. For complex analytical tasks that combine generic graph processing with SPARQL, Spartex is at least an order of magnitude faster than existing alternatives.

  19. An Efficient and Secure m-IPS Scheme of Mobile Devices for Human-Centric Computing

    Directory of Open Access Journals (Sweden)

    Young-Sik Jeong

    2014-01-01

    Full Text Available Recent rapid developments in wireless and mobile IT technologies have led to their application in many real-life areas, such as disasters, home networks, mobile social networks, medical services, industry, schools, and the military. Business/work environments have become wire/wireless, integrated with wireless networks. Although the increase in the use of mobile devices that can use wireless networks increases work efficiency and provides greater convenience, wireless access to networks represents a security threat. Currently, wireless intrusion prevention systems (IPSs are used to prevent wireless security threats. However, these are not an ideal security measure for businesses that utilize mobile devices because they do not take account of temporal-spatial and role information factors. Therefore, in this paper, an efficient and secure mobile-IPS (m-IPS is proposed for businesses utilizing mobile devices in mobile environments for human-centric computing. The m-IPS system incorporates temporal-spatial awareness in human-centric computing with various mobile devices and checks users’ temporal spatial information, profiles, and role information to provide precise access control. And it also can extend application of m-IPS to the Internet of things (IoT, which is one of the important advanced technologies for supporting human-centric computing environment completely, for real ubiquitous field with mobile devices.

  20. Information Warfare: Issues Associated with the Defense of DOD Computers and Computer Networks

    National Research Council Canada - National Science Library

    Franklin, Derek

    2002-01-01

    ... that may threaten the critical information pathways of the armed forces An analysis of the history of computer information warfare reveals that there was an embarrassing lack of readiness and defense...

  1. Cerium oxide for the destruction of chemical warfare agents: A comparison of synthetic routes

    Czech Academy of Sciences Publication Activity Database

    Janos, P.; Henych, Jiří; Pelant, O.; Pilařová, V.; Vrtoch, L.; Kormunda, M.; Mazanec, K.; Štengl, Václav

    2016-01-01

    Roč. 304, MAR (2016), s. 259-268 ISSN 0304-3894 Institutional support: RVO:61388980 Keywords : Cerium oxide * Chemical warfare agents * Organophosphate compounds * Decontamination Subject RIV: CA - Inorganic Chemistry Impact factor: 6.065, year: 2016

  2. From Douhet to drones, air warfare, and the evolution of targeting

    NARCIS (Netherlands)

    Osinga, F.P.B.; Roorda, M.P.; Ducheine, P.A.L.; Schmitt, M.N.; Osinga, F.P.B.

    2016-01-01

    Through the prism of the experience of air warfare, this chapter identifies key factors that have shaped targeting. These include technological developments, organizational structures, and processes and inter-service competition for scarce resources. Moreover, targeting is informed by perspectives

  3. Defense Base Closure and Realignment Budget Data for the Naval Surface Warfare Center

    National Research Council Canada - National Science Library

    1993-01-01

    ... and realignment military construction projects. This report provides the results of the audit related to the realignment of Naval Surface Warfare Centers elements in White Oak, Maryland, and Panama City, Florida, to Dahlgren, Virginia...

  4. CRUSER's Warfare Innovation Workshop Focused on Hybrid War in the Urban Littorals

    OpenAIRE

    Ehrlich, Michael

    2017-01-01

    News Stories Archive The Naval Postgraduate School (NPS) Consortium for Robotics and Unmanned Systems Education and Research, CRUSER, hosted its annual Warfare Innovation Workshop (WIW) in Glasgow Hall, Sept. 18-21.

  5. The Army Ground Forces Training for Mountain and Winter Warfare - Study No. 23

    National Research Council Canada - National Science Library

    Govan, Thomas

    1946-01-01

    This general study of the experiments in mountain and winter warfare training from 1940 to 1944 is designed as an introduction to the histories of the Mountain Training Center and The 10th Mountain...

  6. Electronic Warfare: Towed Decoys Could Improve Survivability of Current Navy Aircraft

    National Research Council Canada - National Science Library

    Aiken, Michael

    1997-01-01

    Traditionally, DOD'S combat aircraft have used on-board electronic warfare devices called jammers for self-protection against radar-controlled weapons, including missiles and anti-aircraft artillery...

  7. Optimizing Armed Forces Capabilities for Hybrid Warfare – New Challenge for Slovak Armed Forces

    Directory of Open Access Journals (Sweden)

    Peter PINDJÁK

    2015-09-01

    Full Text Available The paper deals with the optimization of military capabilities of the Slovak Armed Forces for conducting operations in a hybrid conflict, which represents one of the possible scenarios of irregular warfare. Whereas in the regular warfare adversaries intend to eliminate the centers of gravity of each other, most often command and control structures, in irregular conflicts, the center of gravity shifts towards the will and cognitive perception of the target population. Hybrid warfare comprises a thoroughly planned combination of conventional military approaches and kinetic operations with subversive, irregular activities, including information and cyber operations. These efforts are often accompanied by intensified activities of intelligence services, special operation forces, and even mercenary and other paramilitary groups. The development of irregular warfare capabilities within the Slovak Armed Forces will require a progressive transformation process that may turn the armed forces into a modern and adaptable element of power, capable of deployment in national and international crisis management operations.

  8. Surface Warfare Officer Retention: Analysis of Individual Ready Reserve Survey Data

    National Research Council Canada - National Science Library

    Stoker, Carol; Crawford, Alice

    2008-01-01

    ... (including morale and lack of mentoring), push both men and women out of the Navy. Nonetheless, the Navy s primary effort to improve retention has been to introduce the Surface Warfare Officer Continuation Pay (SWOCP...

  9. DRES Database of Methods for the Analysis of Chemical Warfare Agents

    National Research Council Canada - National Science Library

    D'Agostino, Paul

    1997-01-01

    .... Update of the database continues as an ongoing effort and the DRES Database of Methods for the Analysis of Chemical Warfare Agents is available panel in hardcopy form or as a softcopy Procite or Wordperfect file...

  10. The Rapier or the Club: The Relationship between Attrition and Maneuver Warfare

    National Research Council Canada - National Science Library

    Springman, Jeffrey A

    2006-01-01

    ...? This project compares the relationship between attrition and maneuver warfare. The study considers whether there are times when wars of attrition should be fought, and whether there are conditions that force wars of attrition...

  11. Diagnosis of Exposure to Chemical Warfare Agents: A Comprehensive Literature Survey 1990-2005

    National Research Council Canada - National Science Library

    Noort, D

    2006-01-01

    This report is an update of TNO report PML 2003-A63. In this report an overview is presented of the methods currently available for detection of exposure to a number of chemical warfare agents (CWA), i.e...

  12. Anxiety, depression, and posttraumatic stress in Iranian survivors of chemical warfare.

    Science.gov (United States)

    Hashemian, Farnoosh; Khoshnood, Kaveh; Desai, Mayur M; Falahati, Farahnaz; Kasl, Stanislav; Southwick, Steven

    2006-08-02

    In the 1980-1988 Iran-Iraq War, extensive use of chemical weapons resulted in high rates of morbidity and mortality. While much is known about the physical consequences of chemical warfare, there is a paucity of information about the long-term effects of chemical attacks on mental health. To assess the long-term psychological impact of chemical warfare on a civilian population. Cross-sectional randomized survey conducted in July 2004 of 153 civilians in 3 towns exposed to warfare in northwestern Iran: Oshnaviyeh (low-intensity conventional warfare), Rabat (high-intensity conventional warfare), and Sardasht (both high-intensity conventional warfare and chemical weapons). Full or partial posttraumatic stress disorder (PTSD) diagnosis, anxiety symptoms, and depressive symptoms were assessed using Farsi versions of the Clinician-Administered PTSD Scale, Hamilton Scale for Anxiety, and Beck Depression Inventory, respectively. Overall participation rate was 93%. Respondents had a mean age of 45 years and were all of Kurdish ethnicity. Among individuals exposed to both high-intensity warfare and chemical weapons, prevalence rates for lifetime PTSD, current PTSD, major anxiety symptoms, and severe depressive symptoms were 59%, 33%, 65%, and 41%, respectively. Among the low-intensity warfare group, the corresponding rates were 8%, 2%, 18%, and 6%, respectively, while intermediate rates were found among those exposed to high-intensity warfare but not to chemical weapons (31%, 8%, 26%, and 12%, respectively). Compared with individuals exposed to low-intensity warfare, those exposed to both high-intensity warfare and chemical weapons were at higher risk for lifetime PTSD (odds ratio [OR], 18.6; 95% confidence interval [CI], 5.8-59.4), current PTSD (OR, 27.4; 95% CI, 3.4-218.2), increased anxiety symptoms (OR, 14.6; 95% CI, 6.0-35.6), and increased depressive symptoms (OR, 7.2; 95% CI, 3.3-15.9). Exposure to high-intensity warfare but not to chemical weapons was also

  13. Improving Blood Monitoring of Enzymes as Biomarkers of Risk from Anticholinergic Pesticides and Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wilson, Barry W

    2006-01-01

    Blood biomarkers are an important way to monitor exposure to anticholinergic pesticides and chemical warfare agents and to establish whether some personnel are at greater risk than others from exposure...

  14. A new General Purpose Decontamination System for Chemical and Biological Warfare and Terrorism Agents

    National Research Council Canada - National Science Library

    Khetan, Sushil; Banerjee, xdDeboshri; Chanda, Arani; Collins, Terry

    2003-01-01

    Partial contents: Fe-TAML Activator of Peroxide,Activators of Hydrogen peroxide,Biological Warfare Agents,Bacterial Endospore,Bacterial Spore Deactivation,Modeling Studies,Deactivation Studies with Bacillus spores...

  15. Second NATO/SIBCA Exercise on Sampling of Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wils, E

    1999-01-01

    In order to practise the sampling of chemical warfare agents under realistic conditions, the Netherlands participated successfully in the second NATO/SIBCA sampling exercise conducted in Poland on 1-3...

  16. The Third World War? In The Cyberspace. Cyber Warfare in the Middle East.

    Directory of Open Access Journals (Sweden)

    Martina

    2014-06-01

    Full Text Available This article aims to provide a brief and comprehensive introduction to the issue of cyber warfare and to display the recent development in this area. Geographically, it focuses on the Middle East region, since the vast majority of the most important recent cyber attacks appeared just in there or were connected to it. The first part of the article tries to define the key notion of cyber warfare, compares it to the standard warfare and presents different types of cyber weapons that are known today. The second part points out examples of the most striking recent cyber attacks and uses them as evidences to demonstrate today's importance and dissemination of cyber warfare. Finally, the article sums up pros and cons of the cyber weapons and, in view of these, predicts a significant increase in their use in any future war conflicts.

  17. Improving Blood Monitoring of Enzymes as Biomarkers of Risk from Anticholinergic Pesticides and Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wilson, Barry W

    2005-01-01

    Blood biomarkers are an important way to monitor exposure to anticholinergic pesticides and chemical warfare agents and to establish whether some personnel are at greater risk than others from exposure...

  18. Special Operations Forces: C-130 Upgrade Plan Could Help Fix Electronic Warfare Deficiencies

    National Research Council Canada - National Science Library

    1998-01-01

    In response to a concern that threats to the U.S. Special Operations Command's (USSOCOM) aircraft are increasing, while funds available for electronic warfare are decreasing, the General Accounting Office...

  19. Combinatorial Auction Theory Applied to the Selection of Surface Warfare Officer Retention Incentives

    National Research Council Canada - National Science Library

    Denmond, Constance M; Johnson, Derek N; Lewis, Chavius G; Zegley, Christopher R

    2007-01-01

    The purpose of this project is to investigate the potential retention and cost impacts of offering combinations of retention base incentives to members of the Surface Warfare Officer (SWO) community...

  20. Cyber crime and cyber warfare with international cyber collaboration for RSA – preparing communities

    CSIR Research Space (South Africa)

    Grobler, M

    2012-03-01

    Full Text Available aspects come into play that may have an influence on the manner in which the military reacts to cyber attacks (Wilson 2007): ? new national security policy issues; ? consideration of psychological operations used to affect friendly nations... relationship between modern cyber space, cyber warfare and traditional legislation. As a starting point, cyber warfare is defined for the purpose of this article as the use of exploits in cyber space as a way to intentionally cause harm to people, assets...

  1. Modeling Anti-Air Warfare With Discrete Event Simulation and Analyzing Naval Convoy Operations

    Science.gov (United States)

    2016-06-01

    W., & Scheaffer, R. L. (2008). Mathematical statistics with applications . Belmont, CA: Cengage Learning. 118 THIS PAGE INTENTIONALLY LEFT BLANK...WARFARE WITH DISCRETE EVENT SIMULATION AND ANALYZING NAVAL CONVOY OPERATIONS by Ali E. Opcin June 2016 Thesis Advisor: Arnold H. Buss Co...REPORT DATE June 2016 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE MODELING ANTI-AIR WARFARE WITH DISCRETE EVENT

  2. Drone Warfare: Is the United States Violating the Law of Armed Conflict

    Science.gov (United States)

    2011-02-16

    NOTE AIR WAR COLLEGE AIR UNIVERSITY DRONE WARFARE: IS THE UNITED STATES VIOLATING THE LAW OF ARMED CONFLICT? by Barbara E. Shestko, Col...Base, Alabama. 1 Introduction The United States has become increasingly dependent upon the use of unmanned aircraft systems (UASs) or “ drones ” to...kill targeted members of al-Qaeda and the Taliban.1 Due to the success of drone warfare, we can expect the United States to continue its current

  3. Warfare, genocide, and ethnic conflict: a Darwinian approach.

    Science.gov (United States)

    Dimijian, Gregory G

    2010-07-01

    As the 21st century dawns, I reflect on the history of humankind with growing concern about the need to understand the underlying biological and cultural roots of ethnic conflict and warfare. In the many studies of human conflict, innate biological predispositions have been neglected. This article is the third part of a series of seminars for medical residents at the University of Texas Southwestern Medical School at Dallas (see http://adarwinstudygroup.org/). The series starts with in-depth coverage of Darwinian natural and sexual selection, with examples from the domestication of animals and plants and the crisis of antibiotic resistance. The series strives to show how biology has been neglected in the study of the we-they orientation of human behavior, with its devastating consequences. The subject material is profoundly disturbing, as it looks at "human nature" and contrasts the "dark side" of human behavior with the opposite, profoundly caring and loving side.

  4. Information Warfare on Social Media: A Brand Management Perspective

    Directory of Open Access Journals (Sweden)

    Kalpokas Ignas

    2017-06-01

    Full Text Available Employing a perspective informed by brand management, this article aims at understanding information warfare operations in social media. The state, seen as brand, must project an image of itself to both internal and foreign audiences to unite the domestic audience and/or attract global support. However, in constructing a brand, states are vulnerable to ‘sofa warriors’ – ordinary individuals who have been unwittingly recruited by hostile actors to disseminate (over social media or other platforms a counter-brand, harmful to the state concerned. These new threats are investigated in light of recent tendencies in online branding, elucidating their status as a national security threat, with the potential to significantly disrupt life in political communities.

  5. Book Review: Conquest in Cyberspace: National Security and Information Warfare

    Directory of Open Access Journals (Sweden)

    Gary C. Kessler

    2007-06-01

    Full Text Available Libicki, M.C. (2007. Conquest in Cyberspace: National Security and Information Warfare. New York: Cambridge University Press. 323 pages, ISBN: 978-0-521-69214-4 (paper, US$80Reviewed by Gary C. Kessler (gary.kessler@champlain.eduMany books -- and even movies ("Live Free or Die Hard" -- are based upon the premise of an impending information war. In these scenarios -- made all too plausible by the increased frequency with which we read about and experience major information security incidents -- a Bad Guy exploits known computer security vulnerabilities in order to control major national infrastructures via the Internet so as to reap financial, economic, and/or personal power.(see PDF for full review

  6. Nanostructured Metal Oxides for Stoichiometric Degradation of Chemical Warfare Agents.

    Science.gov (United States)

    Štengl, Václav; Henych, Jiří; Janoš, Pavel; Skoumal, Miroslav

    2016-01-01

    Metal oxides have very important applications in many areas of chemistry, physics and materials science; their properties are dependent on the method of preparation, the morphology and texture. Nanostructured metal oxides can exhibit unique characteristics unlike those of the bulk form depending on their morphology, with a high density of edges, corners and defect surfaces. In recent years, methods have been developed for the preparation of metal oxide powders with tunable control of the primary particle size as well as of a secondary particle size: the size of agglomerates of crystallites. One of the many ways to take advantage of unique properties of nanostructured oxide materials is stoichiometric degradation of chemical warfare agents (CWAs) and volatile organic compounds (VOC) pollutants on their surfaces.

  7. Chemical warfare protection for the cockpit of future aircraft

    Science.gov (United States)

    Pickl, William C.

    1988-01-01

    Currently systems are being developed which will filter chemical and biological contaminants from crew station air. In order to maximize the benefits of these systems, a method of keeping the cockpit contaminant free during pilot ingress and egress is needed. One solution is to use a rectangular plastic curtain to seal the four edges of the canopy frame to the canopy sill. The curtain is stored in a tray which is recessed into the canopy sill and unfolds in accordion fashion as the canopy is raised. A two way zipper developed by Calspan could be used as an airlock between the pilot's oversuit and the cockpit. This system eliminates the pilot's need for heavy and restrictive CB gear because he would never be exposed to the chemical warfare environment.

  8. Decontamination of biological warfare agents by a microwave plasma torch

    International Nuclear Information System (INIS)

    Lai, Wilson; Lai, Henry; Kuo, Spencer P.; Tarasenko, Olga; Levon, Kalle

    2005-01-01

    A portable arc-seeded microwave plasma torch running stably with airflow is described and applied for the decontamination of biological warfare agents. Emission spectroscopy of the plasma torch indicated that this torch produced an abundance of reactive atomic oxygen that could effectively oxidize biological agents. Bacillus cereus was chosen as a simulant of Bacillus anthracis spores for biological agent in the decontamination experiments. Decontamination was performed with the airflow rate of 0.393 l/s, corresponding to a maximum concentration of atomic oxygen produced by the torch. The experimental results showed that all spores were killed in less than 8 s at 3 cm distance, 12 s at 4 cm distance, and 16 s at 5 cm distance away from the nozzle of the torch

  9. [Cutaneous and systemic toxicology of vesicants used in warfare].

    Science.gov (United States)

    Pita, R; Vidal-Asensi, S

    2010-01-01

    Vesicants are a group of chemicals used in warfare. The most representative agent is yperite, also known as mustard gas. The blisters that appeared on those exposed to yperite during combat in the First World War are responsible for the current name--vesicants--for this group of chemicals. Their affects are produced mainly through localized action of liquid or vapor forms on the skin, eyes, and respiratory tract. However, the high absorption of the liquid form through the skin or the vapor form on inhalation may cause substantial systemic effects. Here we analyze these effects, treatment of intoxication, and long-term sequelae, drawing on our experience and a review of the literature.

  10. An Open Architecture Framework for Electronic Warfare Based Approach to HLA Federate Development

    Directory of Open Access Journals (Sweden)

    HyunSeo Kang

    2018-01-01

    Full Text Available A variety of electronic warfare models are developed in the Electronic Warfare Research Center. An Open Architecture Framework for Electronic Warfare (OAFEw has been developed for reusability of various object models participating in the electronic warfare simulation and for extensibility of the electronic warfare simulator. OAFEw is a kind of component-based software (SW lifecycle management support framework. This OAFEw is defined by six components and ten rules. The purpose of this study is to construct a Distributed Simulation Interface Model, according to the rules of OAFEw, and create Use Case Model of OAFEw Reference Conceptual Model version 1.0. This is embodied in the OAFEw-FOM (Federate Object Model for High-Level Architecture (HLA based distributed simulation. Therefore, we design and implement EW real-time distributed simulation that can work with a model in C++ and MATLAB API (Application Programming Interface. In addition, OAFEw-FOM, electronic component model, and scenario of the electronic warfare domain were designed through simple scenarios for verification, and real-time distributed simulation between C++ and MATLAB was performed through OAFEw-Distributed Simulation Interface.

  11. A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios

    Directory of Open Access Journals (Sweden)

    Kathryn Merrick

    2016-07-01

    Full Text Available Our increasing dependence on information technologies and autonomous systems has escalated international concern for information- and cyber-security in the face of politically, socially and religiously motivated cyber-attacks. Information warfare tactics that interfere with the flow of information can challenge the survival of individuals and groups. It is increasingly important that both humans and machines can make decisions that ensure the trustworthiness of information, communication and autonomous systems. Subsequently, an important research direction is concerned with modelling decision-making processes. One approach to this involves modelling decision-making scenarios as games using game theory. This paper presents a survey of information warfare literature, with the purpose of identifying games that model different types of information warfare operations. Our contribution is a systematic identification and classification of information warfare games, as a basis for modelling decision-making by humans and machines in such scenarios. We also present a taxonomy of games that map to information warfare and cyber crime problems as a precursor to future research on decision-making in such scenarios. We identify and discuss open research questions including the role of behavioural game theory in modelling human decision making and the role of machine decision-making in information warfare scenarios.

  12. Using cheminformatics to find simulants for chemical warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Lavoie, J.; Srinivasan, Sree [Molecular Sciences and Engineering Team, U.S. Army Natick Soldier Research, Development and Engineering Center, 15 Kansas Street, Natick, MA 01760 (United States); Nagarajan, R., E-mail: Ramanathan.Nagarajan@us.army.mil [Molecular Sciences and Engineering Team, U.S. Army Natick Soldier Research, Development and Engineering Center, 15 Kansas Street, Natick, MA 01760 (United States)

    2011-10-30

    Highlights: {yields} Summary of chemical warfare agent (CWA) simulants in current use. {yields} Application of method of molecular similarity to CWA and simulants. {yields} Quantitative metric for CWA-simulant similarity. {yields} Rank ordering of simulants in current use. {yields} Potential of method to identify simulants for emerging agents. - Abstract: Direct experimentation with chemical warfare agents (CWA) to study important problems such as their permeation across protective barrier materials, decontamination of equipment and facilities, or the environmental transport and fate of CWAs is not feasible because of the obvious toxicity of the CWAs and associated restrictions on their laboratory use. The common practice is to use 'simulants,' namely, analogous chemicals that closely resemble the CWAs but are less toxic, with the expectation that the results attained for simulants can be correlated to how the CWAs would perform. Simulants have been traditionally chosen by experts, by means of intuition, using similarity in one or more physical properties (such as vapor pressure or aqueous solubility) or in the molecular structural features (such as functional groups) between the stimulant and the CWA. This work is designed to automate the simulant identification process backed by quantitative metrics, by means of chemical similarity search software routinely used in pharmaceutical drug discovery. The question addressed here is: By the metrics of such software, how similar are traditional simulants to CWAs? That is, what is the numerical 'distance' between each CWA and its customary simulants in the quantitative space of molecular descriptors? The answers show promise for finding close but less toxic simulants for the ever-increasing numbers of CWAs objectively and fast.

  13. Using cheminformatics to find simulants for chemical warfare agents

    International Nuclear Information System (INIS)

    Lavoie, J.; Srinivasan, Sree; Nagarajan, R.

    2011-01-01

    Highlights: → Summary of chemical warfare agent (CWA) simulants in current use. → Application of method of molecular similarity to CWA and simulants. → Quantitative metric for CWA-simulant similarity. → Rank ordering of simulants in current use. → Potential of method to identify simulants for emerging agents. - Abstract: Direct experimentation with chemical warfare agents (CWA) to study important problems such as their permeation across protective barrier materials, decontamination of equipment and facilities, or the environmental transport and fate of CWAs is not feasible because of the obvious toxicity of the CWAs and associated restrictions on their laboratory use. The common practice is to use 'simulants,' namely, analogous chemicals that closely resemble the CWAs but are less toxic, with the expectation that the results attained for simulants can be correlated to how the CWAs would perform. Simulants have been traditionally chosen by experts, by means of intuition, using similarity in one or more physical properties (such as vapor pressure or aqueous solubility) or in the molecular structural features (such as functional groups) between the stimulant and the CWA. This work is designed to automate the simulant identification process backed by quantitative metrics, by means of chemical similarity search software routinely used in pharmaceutical drug discovery. The question addressed here is: By the metrics of such software, how similar are traditional simulants to CWAs? That is, what is the numerical 'distance' between each CWA and its customary simulants in the quantitative space of molecular descriptors? The answers show promise for finding close but less toxic simulants for the ever-increasing numbers of CWAs objectively and fast.

  14. The Patient's Voice in Pharmacovigilance: Pragmatic Approaches to Building a Patient-Centric Drug Safety Organization.

    Science.gov (United States)

    Smith, Meredith Y; Benattia, Isma

    2016-09-01

    Patient-centeredness has become an acknowledged hallmark of not only high-quality health care but also high-quality drug development. Biopharmaceutical companies are actively seeking to be more patient-centric in drug research and development by involving patients in identifying target disease conditions, participating in the design of, and recruitment for, clinical trials, and disseminating study results. Drug safety departments within the biopharmaceutical industry are at a similar inflection point. Rising rates of per capita prescription drug use underscore the importance of having robust pharmacovigilance systems in place to detect and assess adverse drug reactions (ADRs). At the same time, the practice of pharmacovigilance is being transformed by a host of recent regulatory guidances and related initiatives which emphasize the importance of the patient's perspective in drug safety. Collectively, these initiatives impact the full range of activities that fall within the remit of pharmacovigilance, including ADR reporting, signal detection and evaluation, risk management, medication error assessment, benefit-risk assessment and risk communication. Examples include the fact that manufacturing authorization holders are now expected to monitor all digital sources under their control for potential reports of ADRs, and the emergence of new methods for collecting, analysing and reporting patient-generated ADR reports for signal detection and evaluation purposes. A drug safety department's ability to transition successfully into a more patient-centric organization will depend on three defining attributes: (1) a patient-centered culture; (2) deployment of a framework to guide patient engagement activities; and (3) demonstrated proficiency in patient-centered competencies, including patient engagement, risk communication and patient preference assessment. Whether, and to what extent, drug safety departments embrace the new patient-centric imperative, and the methods and

  15. Patient centric approach for clinical trials: Current trend and new opportunities.

    Science.gov (United States)

    Sharma, Neha Shankar

    2015-01-01

    The clinical research industry today is undergoing a major facelift. Companies are continuously looking to adopt and implement effective and innovative ways to accelerate drug launches in the market. Companies today are more open and do not view patients as mere "subjects" who generate data, - but as informed collaborators whose participation is "core" to the overall success of trials leading to the emergence of the concept of "patient-centric trials." This paper is intended to highlight the current trends and new opportunities that can be seen in industry -indicative of crucial role patients today play in their own health care using technology, social media and self education.

  16. Patient centric approach for clinical trials: Current trend and new opportunities

    Directory of Open Access Journals (Sweden)

    Neha Shankar Sharma

    2015-01-01

    Full Text Available The clinical research industry today is undergoing a major facelift. Companies are continuously looking to adopt and implement effective and innovative ways to accelerate drug launches in the market. Companies today are more open and do not view patients as mere "subjects" who generate data, - but as informed collaborators whose participation is "core" to the overall success of trials leading to the emergence of the concept of "patient-centric trials." This paper is intended to highlight the current trends and new opportunities that can be seen in industry -indicative of crucial role patients today play in their own health care using technology, social media and self education.

  17. A mesoscale iron enrichment in the western subarctic Pacific induces a large centric diatom bloom.

    Science.gov (United States)

    Tsuda, Atsushi; Takeda, Shigenobu; Saito, Hiroaki; Nishioka, Jun; Nojiri, Yukihiro; Kudo, Isao; Kiyosawa, Hiroshi; Shiomoto, Akihiro; Imai, Keiri; Ono, Tsuneo; Shimamoto, Akifumi; Tsumune, Daisuke; Yoshimura, Takeshi; Aono, Tatsuo; Hinuma, Akira; Kinugasa, Masatoshi; Suzuki, Koji; Sohrin, Yoshiki; Noiri, Yoshifumi; Tani, Heihachiro; Deguchi, Yuji; Tsurushima, Nobuo; Ogawa, Hiroshi; Fukami, Kimio; Kuma, Kenshi; Saino, Toshiro

    2003-05-09

    We have performed an in situ test of the iron limitation hypothesis in the subarctic North Pacific Ocean. A single enrichment of dissolved iron caused a large increase in phytoplankton standing stock and decreases in macronutrients and dissolved carbon dioxide. The dominant phytoplankton species shifted after the iron addition from pennate diatoms to a centric diatom, Chaetoceros debilis, that showed a very high growth rate, 2.6 doublings per day. We conclude that the bioavailability of iron regulates the magnitude of the phytoplankton biomass and the key phytoplankton species that determine the biogeochemical sensitivity to iron supply of high-nitrate, low-chlorophyll waters.

  18. Value-centric business development: descriptive and prescriptive research into five different companies

    DEFF Research Database (Denmark)

    Kukushkin, Merili; Otto, Tauno; Howard, Thomas J.

    2015-01-01

    The companies that discover changes and possibilities within the value system first and make use of them are considered to be prime movers and often are more successful than those who adapt late. Research has been done on multiple levels for understanding value-centric business from a practical......, and results involved in both the descriptive and the prescriptive phases of the research....... perspective as well as from a theoretical perspective. In the first stage of the research (Descriptive Study 1), practical experience and knowledge were gained simultaneously from a case company and from literature-based case analysis. As output of a prescriptive study, a specification of a proactive value...

  19. A Privacy-Preserving Platform for User-Centric Quantitative Benchmarking

    Science.gov (United States)

    Herrmann, Dominik; Scheuer, Florian; Feustel, Philipp; Nowey, Thomas; Federrath, Hannes

    We propose a centralised platform for quantitative benchmarking of key performance indicators (KPI) among mutually distrustful organisations. Our platform offers users the opportunity to request an ad-hoc benchmarking for a specific KPI within a peer group of their choice. Architecture and protocol are designed to provide anonymity to its users and to hide the sensitive KPI values from other clients and the central server. To this end, we integrate user-centric peer group formation, exchangeable secure multi-party computation protocols, short-lived ephemeral key pairs as pseudonyms, and attribute certificates. We show by empirical evaluation of a prototype that the performance is acceptable for reasonably sized peer groups.

  20. Rain-Induced Wash-Off of Chemical Warfare Agent (VX) from Foliar Surfaces of Living Plants Maintained in a Surety Hood

    Science.gov (United States)

    2016-09-01

    RAIN-INDUCED WASH-OFF OF CHEMICAL WARFARE AGENT (VX) FROM FOLIAR SURFACES OF LIVING PLANTS MAINTAINED IN A...Final 3. DATES COVERED (From - To) May 2014 – Sep 2015 4. TITLE AND SUBTITLE Rain-Induced Wash-Off of Chemical Warfare Agent (VX) from Foliar...galli Foliage Chemical warfare agent (CWA) O-ethyl-S-(2

  1. The Dangers of Test Preparation: What Students Learn (And Don't Learn) about Reading Comprehension from Test-Centric Literacy Instruction

    Science.gov (United States)

    Davis, Dennis S.; Vehabovic, Nermin

    2018-01-01

    The authors offer guidance on recognizing and resisting test-centric instruction in reading comprehension. They posit that five practices indicate a test-centric view of comprehension: when the tested content is privileged, when the test becomes the text, when annotation requirements replace strategic thinking, when test items frame how students…

  2. Guerilla Warfare & Law Enforcement: Combating the 21st Century Terrorist Cell within the U.S.

    Directory of Open Access Journals (Sweden)

    Major Richard Hughbank

    2009-01-01

    Full Text Available Both domestic and international terrorist organizations employ guerrilla warfare tactics, techniques, and procedures. Thus, the ability to identify and defeat the members of these organizations, cripple their infrastructures, and disrupt their financial resources lies in the understanding of modern guerrilla warfare as it develops in the twenty-first century within the United States.3 The forms of asymmetric warfare4 adopted by domestic and international terrorist groups alike is no longer intended to gain simple media exposure or governmental manipulation; they want to make an overpowering impact by causing massive loss of life and severe damage to infrastructure and are often motivated by religious imperatives and political goals. As terrorism analyst Stephen Flynn has observed, "Throughout the 20th century [Americans] were able to treat national security as essentially an out-of-body experience. When confronted by threats, [America] dealt with them on the turf of our allies or our adversaries. Aside from the occasional disaster and heinous crime, civilian life [in the United States] has been virtually terror-free." With the turn of the twenty-first century, terrorist operations have become more prevalent in the United States and are taking shape in the form of modern guerrilla warfare, thus creating new challenges for federal, state, and local law enforcement agencies. After reviewing the origin and nature of these challenges, this article will offer some suggestions for countering guerilla warfare in the United States.

  3. Potential Science and Technology Game Changers for the Ground Warfare of 2050: Selected Projections Made in 2017

    Science.gov (United States)

    2018-02-01

    ARL-TR-8283 ● FEB 2018 US Army Research Laboratory Potential Science and Technology Game Changers for the Ground Warfare of 2050...Science and Technology Game Changers for the Ground Warfare of 2050: Selected Projections Made in 2017 by Alexander Kott Office of the Director...Brian Sadler Vehicle Technology Directorate, ARL Ananthram Swami Computational and Information Sciences Directorate, ARL Approved for

  4. Individual Syllabus for Personalized Learner-Centric E-Courses in E-Learning and M-Learning

    OpenAIRE

    Khaled Nasser ElSayed

    2014-01-01

    Most of e-learning and m-learning systems are course-centric. These systems provided services that concentrated on course material and pedagogical. They did not take into account varieties of student levels, skills, interests or preferences. This paper provides a design of an approach for personalized and self-adapted agent-based learning systems for enhancing e-learning and mobile learning (m-learning) services to be learner-centric. It presents a modeling of goals of different learners of a...

  5. Basic Study on Data-Centric design information integration system framework development for adapting Nuclear Power Plant construction in Korea

    Energy Technology Data Exchange (ETDEWEB)

    Lim, Byung Ki [KHNP, Gyeongju (Korea, Republic of)

    2016-05-15

    This study established the concept of data-centric design, which is the latest design technique, by analyzing the existing literature so that the data-centric design would be applied to the nuclear power plant projects in Korea and analyzed the status of data-centric design application by the advanced companies and the domestic design companies participating in the nuclear power plant projects. By analyzing the function of the 3D CAD commercial system and all design drawings used in the nuclear power plant projects in Korea, a data-centric design integrated system model has been developed. This study established the concept of data-centric design technology, analyzed the functions of the plant architect engineering (A/E) software being globally used in the plant field and the design process status of nuclear power plant projects in Korea. A design information integration system building model, which is capable of data-centric design, in the place of the existing document-centric system design such as P and ID and SLD, has been suggested through the investigation on the data-centric design cases of the advanced companies. The major functions of the suggested model required for the application to the domestic industry were drawn. The suggested framework builds the field design, which was performed in the 3D system of the constructor, as an owner's field design system, which can manage all design drawings generated from the field design and the related information in integrated way. An as-built full model integrated of plant architect engineering, supplier design and field design is built. It is handed over to the operation team at the O and M stage and utilized in the maintenance and repair. As a power plant full model of future construction project has been enabled, an improved design process has been suggested, in which only the design change information during the plant architect engineering (A/E) and the design change information during the field design

  6. Naval Undersea Warfare Center Division Newport utilities metering, Phase 1

    Energy Technology Data Exchange (ETDEWEB)

    Carroll, D.M.

    1992-11-01

    Pacific Northwest Laboratory developed this report for the US Navy`s Naval Undersea Warfare Center Division Newport, Rhode Island (NUWC). The purpose of the report was to review options for metering electricity and steam used in the NUWC compound, and to make recommendations to NUWC for implementation under a follow-on project. An additional NUWC concern is a proposed rate change by the servicing utility, Newport Electric, which would make a significant shift from consumption to demand billing, and what effect that rate change would have on the NUWC utility budget. Automated, remote reading meters are available which would allow NUWC to monitor its actual utility consumption and demand for both the entire NUWC compound and by end-use in individual buildings. Technology is available to perform the meter reads and manipulate the data using a personal computer with minimal staff requirement. This is not meant to mislead the reader into assuming that there is no requirement for routine preventive maintenance. All equipment requires routine maintenance to maintain its accuracy. While PNL reviewed the data collected during the site visit, however, it became obvious that significant opportunities exist for reducing the utility costs other than accounting for actual consumption and demand. Unit costs for both steam and electricity are unnecessarily high, and options are presented in this report for reducing them. Additionally, NUWC has an opportunity to undertake a comprehensive energy resource management program to significantly reduce its energy demand, consumption, and costs.

  7. Naval Undersea Warfare Center Division Newport utilities metering, Phase 1

    Energy Technology Data Exchange (ETDEWEB)

    Carroll, D.M.

    1992-11-01

    Pacific Northwest Laboratory developed this report for the US Navy's Naval Undersea Warfare Center Division Newport, Rhode Island (NUWC). The purpose of the report was to review options for metering electricity and steam used in the NUWC compound, and to make recommendations to NUWC for implementation under a follow-on project. An additional NUWC concern is a proposed rate change by the servicing utility, Newport Electric, which would make a significant shift from consumption to demand billing, and what effect that rate change would have on the NUWC utility budget. Automated, remote reading meters are available which would allow NUWC to monitor its actual utility consumption and demand for both the entire NUWC compound and by end-use in individual buildings. Technology is available to perform the meter reads and manipulate the data using a personal computer with minimal staff requirement. This is not meant to mislead the reader into assuming that there is no requirement for routine preventive maintenance. All equipment requires routine maintenance to maintain its accuracy. While PNL reviewed the data collected during the site visit, however, it became obvious that significant opportunities exist for reducing the utility costs other than accounting for actual consumption and demand. Unit costs for both steam and electricity are unnecessarily high, and options are presented in this report for reducing them. Additionally, NUWC has an opportunity to undertake a comprehensive energy resource management program to significantly reduce its energy demand, consumption, and costs.

  8. Simulation-based planning for theater air warfare

    Science.gov (United States)

    Popken, Douglas A.; Cox, Louis A., Jr.

    2004-08-01

    Planning for Theatre Air Warfare can be represented as a hierarchy of decisions. At the top level, surviving airframes must be assigned to roles (e.g., Air Defense, Counter Air, Close Air Support, and AAF Suppression) in each time period in response to changing enemy air defense capabilities, remaining targets, and roles of opposing aircraft. At the middle level, aircraft are allocated to specific targets to support their assigned roles. At the lowest level, routing and engagement decisions are made for individual missions. The decisions at each level form a set of time-sequenced Courses of Action taken by opposing forces. This paper introduces a set of simulation-based optimization heuristics operating within this planning hierarchy to optimize allocations of aircraft. The algorithms estimate distributions for stochastic outcomes of the pairs of Red/Blue decisions. Rather than using traditional stochastic dynamic programming to determine optimal strategies, we use an innovative combination of heuristics, simulation-optimization, and mathematical programming. Blue decisions are guided by a stochastic hill-climbing search algorithm while Red decisions are found by optimizing over a continuous representation of the decision space. Stochastic outcomes are then provided by fast, Lanchester-type attrition simulations. This paper summarizes preliminary results from top and middle level models.

  9. Back to the future: aerial warfare in Libya

    Directory of Open Access Journals (Sweden)

    João Paulo Nunes Vicente

    2013-05-01

    Full Text Available A century after the first air bomb mission, a new intervention in the same geographic space has made evident the changes in Airpower. The Aerial Warfare in Libya has radically changed the civil war, complying with a UN mission to protect Libyan population, imposing a no-fly zone and an arms embargo. Therefore, Operation Unified Protector became one of the most successful campaigns in the history of NATO. We aim to assess the operational efficiency of Airpower in the conflict in Libya, focusing on the challenges of a War essentially Aerial. Despite the military results and the fact that some political objectives were met, we can identify some concerning trends that, if not shifted, may negatively influence future NATO operations. We do not aim to draw general and universal conclusions on the strategic value of Airpower based on the analysis of a specific case. Above all, we focus on identifying some lessons which have influenced OUP operational efficiency. Thus, we must analyze some factors, such as the scope of objectives, the type of opposing action and aerial strategy used by the coalition and then focus on the challenges arising from the OUP.

  10. Drone Warfare: Twenty-First Century Empire and Communications

    Directory of Open Access Journals (Sweden)

    Kevin Howley

    2017-02-01

    Full Text Available This paper, part of a larger project that examines drones from a social-construction of technology perspective, considers drone warfare in light of Harold Innis’s seminal work on empire and communication. Leveraging leading-edge aeronautics with advanced optics, data processing, and networked communication, drones represent an archetypal “space-biased” technology. Indeed, by allowing remote operators and others to monitor, select, and strike targets from half a world away, and in real-time, these weapon systems epitomize the “pernicious neglect of time” Innis sought to identify and remedy in his later writing. With Innis’s time-space dialectic as a starting point, then, the paper considers drones in light of a longstanding paradox of American culture: the impulse to collapse the geographical distance between the United States and other parts of the globe, while simultaneously magnifying the cultural difference between Americans and other peoples and societies. In the midst of the worldwide proliferation of drones, this quintessentially sublime technology embodies this (disconnect in important, profound, and ominous ways.

  11. Prevalence of Asthma in Children of Chemical Warfare Victims

    Science.gov (United States)

    Mirsadraee, Majid; Mozaffari, Abolfazl; Attaran, Davood

    2011-01-01

    Objective Exposure of DNA to sulfur mustard gas may increase the inheritance of asthma in chemical warfare victims' (CWV) offspring. The objective of this study was to determine the prevalence of asthma in children of CWV and compare it to asthmatic children in the general population. Methods Four hundred and nine children from 130 CWV fathers and 440 children from 145 asthmatic parents from two cities in Iran participated in this study. The prevalence of asthma was determined by standard questionnaire released for epidemiological survey of asthma in children and compared between two groups. Findings The prevalence of asthma in the CWV group was 15%; this was not significantly different from the control group (12.5%). The children of the CWV group reported a significantly greater incidence of wheezing (1.2±3.1 attacks) per year, but the control group reported more severe attacks leading to speech difficulties (3%) and coughing (7%). Regression analysis showed that with increasing family size in the control group, the number of subjects suffering from asthmatic symptoms decreases significantly (r=0.86, P=0.001). Conclusion Chemical agents may increase the prevalence of asthma in the offspring of CWV. PMID:23056804

  12. Studies on residue-free decontaminants for chemical warfare agents.

    Science.gov (United States)

    Wagner, George W

    2015-03-17

    Residue-free decontaminants based on hydrogen peroxide, which decomposes to water and oxygen in the environment, are examined as decontaminants for chemical warfare agents (CWA). For the apparent special case of CWA on concrete, H2O2 alone, without any additives, effectively decontaminates S-2-(diisopropylamino)ethyl O-ethyl methylphosphonothioate (VX), pinacolyl methylphosphorofluoridate (GD), and bis(2-choroethyl) sulfide (HD) in a process thought to involve H2O2 activation by surface-bound carbonates/bicarbonates (known H2O2 activators for CWA decontamination). A plethora of products are formed during the H2O2 decontamination of HD on concrete, and these are characterized by comparison to synthesized authentic compounds. As a potential residue-free decontaminant for surfaces other than concrete (or those lacking adsorbed carbonate/bicarbonate) H2O2 activation for CWA decontamination is feasible using residue-free NH3 and CO2 as demonstrated by reaction studies for VX, GD, and HD in homogeneous solution. Although H2O2/NH3/CO2 ("HPAC") decontaminants are active for CWA decontamination in solution, they require testing on actual surfaces of interest to assess their true efficacy for surface decontamination.

  13. The Foundational Tenets of Johannes Althusius' Constitutionalism

    African Journals Online (AJOL)

    MJM Venter

    2017-11-02

    Nov 2, 2017 ... On close analysis utilitarianism, as for example conceived by Bentham, provides the other original impetus for statist collectivism. In the name of what is perceived to serve the interest of the majority best (which is identified with the public good) utilitarianism also disregards deviant communities and.

  14. The foundational tenets of Johannes Althusius' constitutionalism ...

    African Journals Online (AJOL)

    Potchefstroom Electronic Law Journal/Potchefstroomse Elektroniese Regsblad ... sovereignty, in contrast to undivided (statist) sovereignty and his views on public office provided the framework for constitutionalism and limited government which could arguably improve on that of contemporary statist constitutionalism.

  15. Software Service Engineering : Tenets and Challenges

    NARCIS (Netherlands)

    Heuvel, Willem-Jan van den; Zimmermann, Olaf; Leymann, Frank; Lago, Patricia; Schieferdecker, Ina; Zdun, Uwe; Avgeriou, Paris

    2009-01-01

    Service-Oriented Architecture (SOA) constitutes a modern, standards-based and technology-independent paradigm and architectural style for distributed enterprise computing. The SOA style promotes the publishing, discovery, and binding of loosely-coupled, network-accessible software services. With SOA

  16. AlphaSpace: Fragment-Centric Topographical Mapping To Target Protein–Protein Interaction Interfaces

    Science.gov (United States)

    2016-01-01

    Inhibition of protein–protein interactions (PPIs) is emerging as a promising therapeutic strategy despite the difficulty in targeting such interfaces with drug-like small molecules. PPIs generally feature large and flat binding surfaces as compared to typical drug targets. These features pose a challenge for structural characterization of the surface using geometry-based pocket-detection methods. An attractive mapping strategy—that builds on the principles of fragment-based drug discovery (FBDD)—is to detect the fragment-centric modularity at the protein surface and then characterize the large PPI interface as a set of localized, fragment-targetable interaction regions. Here, we introduce AlphaSpace, a computational analysis tool designed for fragment-centric topographical mapping (FCTM) of PPI interfaces. Our approach uses the alpha sphere construct, a geometric feature of a protein’s Voronoi diagram, to map out concave interaction space at the protein surface. We introduce two new features—alpha-atom and alpha-space—and the concept of the alpha-atom/alpha-space pair to rank pockets for fragment-targetability and to facilitate the evaluation of pocket/fragment complementarity. The resulting high-resolution interfacial map of targetable pocket space can be used to guide the rational design and optimization of small molecule or biomimetic PPI inhibitors. PMID:26225450

  17. Genome-centric resolution of microbial diversity, metabolism and interactions in anaerobic digestion.

    Science.gov (United States)

    Vanwonterghem, Inka; Jensen, Paul D; Rabaey, Korneel; Tyson, Gene W

    2016-09-01

    Our understanding of the complex interconnected processes performed by microbial communities is hindered by our inability to culture the vast majority of microorganisms. Metagenomics provides a way to bypass this cultivation bottleneck and recent advances in this field now allow us to recover a growing number of genomes representing previously uncultured populations from increasingly complex environments. In this study, a temporal genome-centric metagenomic analysis was performed of lab-scale anaerobic digesters that host complex microbial communities fulfilling a series of interlinked metabolic processes to enable the conversion of cellulose to methane. In total, 101 population genomes that were moderate to near-complete were recovered based primarily on differential coverage binning. These populations span 19 phyla, represent mostly novel species and expand the genomic coverage of several rare phyla. Classification into functional guilds based on their metabolic potential revealed metabolic networks with a high level of functional redundancy as well as niche specialization, and allowed us to identify potential roles such as hydrolytic specialists for several rare, uncultured populations. Genome-centric analyses of complex microbial communities across diverse environments provide the key to understanding the phylogenetic and metabolic diversity of these interactive communities. © 2016 Society for Applied Microbiology and John Wiley & Sons Ltd.

  18. Taxonomic studies of centric diatoms (Diatomeae: unusual nanoplanktonic forms and new records for Brazil

    Directory of Open Access Journals (Sweden)

    Kaoli Pereira Cavalcante

    2013-06-01

    Full Text Available There have been few taxonomic studies of centric diatoms in lotic freshwater environments in Brazil, especially in terms of those including nanoplanktonic forms, which are often neglected in studies of local floras, because of their small size or confusing taxonomy. This is the first study focusing on centric diatoms in the flora of the state of Bahia, in northeastern Brazil. Plankton and periphyton attached to Eichornia crassipes were collected in the winter of 2009 in the Cachoeira River. The diatoms were analyzed and described under light and electron microscopies. Seventeen infrageneric taxa were identified. Cyclotella was represented by five taxa, and concerning of similarities between diacritical features of species in this genus, their descriptions were thoroughly detailed. This was the first time that Cyclotella atomus var. marina, previously recorded only in coastal areas of Japan and Korea, has been documented in a river in South America. We also identified two diatom taxa previously unrecorded in the flora of Brazil: C. cryptica and C. meduanae. Finally, we present a detailed light, transmission and scanning electron microscopy analysis of Skeletonema potamos, a diatom rarely found in the Brazilian literature.

  19. Reuse-centric Requirements Analysis with Task Models, Scenarios, and Critical Parameters

    Directory of Open Access Journals (Sweden)

    Cyril Montabert

    2007-02-01

    Full Text Available This paper outlines a requirements-analysis process that unites task models, scenarios, and critical parameters to exploit and generate reusable knowledge at the requirements phase. Through the deployment of a critical-parameter-based approach to task modeling, the process yields the establishment of an integrative and formalized model issued from scenarios that can be used for requirements characterization. Furthermore, not only can this entity serve as interface to a knowledge repository relying on a critical-parameter-based taxonomy to support reuse but its characterization in terms of critical parameters also allows the model to constitute a broader reuse solution. We discuss our vision for a user-centric and reuse-centric approach to requirements analysis, present previous efforts implicated with this line of work, and state the revisions brought to extend the reuse potential and effectiveness of a previous iteration of a requirements tool implementing such process. Finally, the paper describes the sequence and nature of the activities involved with the conduct of our proposed requirements-analysis technique, concluding by previewing ongoing work in the field that will explore the feasibility for designers to use our approach.

  20. Follower-Centric Influences on Sexual Decision Making in a Pentecostal Church Faith Community

    Directory of Open Access Journals (Sweden)

    Elias Mpofu

    2016-06-01

    Full Text Available This study utilized participatory action research approaches to construct a follower-centric framework for measuring influences on sexual decision making by youth members of a church organization. Participants were Batswana Pentecostal church members self-reporting on their engagement in pre-marital sex (n = 68, females = 62%; age range 15–23 years; median age = 20.3 years from eight of 26 randomly selected congregations. They completed a multi-stage concept mapping process that included free listing of statements of potential influences on their sexual decisions. They then sorted the statements into groupings similar in meaning to them, and rated the same statements for relative importance to their sexual decisions. Multidimensional scaling and hierarchical cluster analysis of the data yielded a five cluster solution in which church teachings emerged as most salient to the teenagers’ sexual decision making followed by future orientation, community norms, knowledge about HIV/AIDS and prevention education. While the youth believed to be influenced by religion teachings on primary sexual abstinence, they self-reported with pre-marital sex. This suggests a need for secondary abstinence education with them to reduce their risk for STIs/HIV and unwanted pregnancies. Concept mapping is serviceable to construct frameworks and to identify content of follower-centric influences on sexual decision making by church youth members.

  1. Exploring the Nature and Implementation Process of User-Centric Business Models

    DEFF Research Database (Denmark)

    Hienerth, Christoph; Keinz, Peter; Lettl, Christopher

    2011-01-01

    Recent ICT advances have allowed companies to interact with external stakeholders, especially users, in more efficient and effective ways, with the result that more and more companies are striving to take advantage of these new opportunities and harness their users’ creative potential by integrat......Recent ICT advances have allowed companies to interact with external stakeholders, especially users, in more efficient and effective ways, with the result that more and more companies are striving to take advantage of these new opportunities and harness their users’ creative potential...... by integrating them into core business processes. Successful companies like Threadless or Dell - which were designed to allow user innovation and co-creation from the outset - have clearly demonstrated the potential value of such approaches. However, introducing user-centric value creation processes...... at established companies is a complex task, requiring major adaptations to traditional manufacturer-centered business models. At present, little is known about how such companies can successfully implement user-centric business models: this article explores (1) the success factors for attracting and engaging...

  2. Creep and cracking of concrete hinges: insight from centric and eccentric compression experiments.

    Science.gov (United States)

    Schlappal, Thomas; Schweigler, Michael; Gmainer, Susanne; Peyerl, Martin; Pichler, Bernhard

    2017-01-01

    Existing design guidelines for concrete hinges consider bending-induced tensile cracking, but the structural behavior is oversimplified to be time-independent. This is the motivation to study creep and bending-induced tensile cracking of initially monolithic concrete hinges systematically. Material tests on plain concrete specimens and structural tests on marginally reinforced concrete hinges are performed. The experiments characterize material and structural creep under centric compression as well as bending-induced tensile cracking and the interaction between creep and cracking of concrete hinges. As for the latter two aims, three nominally identical concrete hinges are subjected to short-term and to longer-term eccentric compression tests. Obtained material and structural creep functions referring to centric compression are found to be very similar. The structural creep activity under eccentric compression is significantly larger because of the interaction between creep and cracking, i.e. bending-induced cracks progressively open and propagate under sustained eccentric loading. As for concrete hinges in frame-like integral bridge construction, it is concluded (i) that realistic simulation of variable loads requires consideration of the here-studied time-dependent behavior and (ii) that permanent compressive normal forces shall be limited by 45% of the ultimate load carrying capacity, in order to avoid damage of concrete hinges under sustained loading.

  3. Detection of biological warfare agents using ultra violet-laser induced fluorescence LIDAR.

    Science.gov (United States)

    Joshi, Deepti; Kumar, Deepak; Maini, Anil K; Sharma, Ramesh C

    2013-08-01

    This review has been written to highlight the threat of biological warfare agents, their types and detection. Bacterial biological agent Bacillus anthracis (bacteria causing the disease anthrax) which is most likely to be employed in biological warfare is being discussed in detail. Standoff detection of biological warfare agents in aerosol form using Ultra violet-Laser Induced Fluorescence (UV-LIF) spectroscopy method has been studied. Range-resolved detection and identification of biological aerosols by both nano-second and non-linear femto-second LIDAR is also discussed. Calculated received fluorescence signal for a cloud of typical biological agent Bacillus globigii (Simulants of B. anthracis) at a location of ~5.0 km at different concentrations in presence of solar background radiation has been described. Overview of current research efforts in internationally available working UV-LIF LIDAR systems are also mentioned briefly. Copyright © 2013 Elsevier B.V. All rights reserved.

  4. The United States and biological warfare: secrets from the early cold war and Korea.

    Science.gov (United States)

    Bruwer, A

    2001-01-01

    The United States and Biological Warfare is about accusations that the United States resorted to bacteriological warfare at a time of great military stress during the Korean War. In December 1951, the then US Secretary of Defense ordered early readiness for offensive use of biological weapons. Soon afterwards, the North Korean and Chinese armies accused the United States of starting a large-scale biological warfare experiment in Korea. The US State Department denied the accusation. Both parties to the dispute maintain their positions today. The authors spent 20 years researching the accusations in North America, Europe and Japan. They were the first foreigners to be given access to Chinese classified documents. The reader is also introduced to the concept of 'plausible denial', an official US policy which allowed responsible governmental representatives to deny knowledge of certain events. The authors hope that their work will contribute to the understanding of a time when modern war expanded into a new type of violence.

  5. SiGe-based re-engineering of electronic warfare subsystems

    CERN Document Server

    Lambrechts, Wynand

    2017-01-01

    This book equips readers with a thorough understanding of the applicability of new-generation silicon-germanium (SiGe) electronic subsystems for the military purposes of electronic warfare and defensive countermeasures. The theoretical and technical background is extensively explained and all aspects of the integration of SiGe as an enabling technology for maritime, land, and airborne (including space) electronic warfare are addressed, including research, design, development, and implementation. The coverage is supported by mathematical derivations, informative illustrations, practical examples, and case studies. While SiGe technology provides speed, performance, and price advantages in many markets, sharing of information on its use in electronic warfare systems has to date been limited, especially in developing nations. This book will therefore be warmly welcomed as an engineering guideline that focuses especially on the speed and reliability of current-generation SiGe circuits and highlights emerging innov...

  6. THE CYBER DIMENSION OF MODERN HYBRID WARFARE AND ITS RELEVANCE FOR NATO

    Directory of Open Access Journals (Sweden)

    Sorin DUCARU

    2016-06-01

    Full Text Available The technological development and the instant communication possibilities advanced not only economic and social developments, but also evolving threats from those who exploit the vulnerabilities of communication and information systems. The cyber threat landscape points to a significant increase of the frequency, intensity, duration and sophistication of cyber-attacks. One of the new and concerning trends is the use of cyber capabilities in relation with military of hybrid operations – the so-called cyber dimension of hybrid warfare. NATO’s strategy on countering hybrid warfare is based on the triad: prepare-deter-defend, which also applies to cyber. Nations represent the first line of defence in countering hybrid strategies. International cooperation is also a key factor in this sense. It is in this context that NATO’s response to cyber-attacks in the context of hybrid warfare must be further refined.

  7. An evolutionary theory of large-scale human warfare: Group-structured cultural selection.

    Science.gov (United States)

    Zefferman, Matthew R; Mathew, Sarah

    2015-01-01

    When humans wage war, it is not unusual for battlefields to be strewn with dead warriors. These warriors typically were men in their reproductive prime who, had they not died in battle, might have gone on to father more children. Typically, they are also genetically unrelated to one another. We know of no other animal species in which reproductively capable, genetically unrelated individuals risk their lives in this manner. Because the immense private costs borne by individual warriors create benefits that are shared widely by others in their group, warfare is a stark evolutionary puzzle that is difficult to explain. Although several scholars have posited models of the evolution of human warfare, these models do not adequately explain how humans solve the problem of collective action in warfare at the evolutionarily novel scale of hundreds of genetically unrelated individuals. We propose that group-structured cultural selection explains this phenomenon. © 2015 Wiley Periodicals, Inc.

  8. Changing the Scale and Efficiency of Chemical Warfare Countermeasure Discovery Using the Zebrafish

    Science.gov (United States)

    Peterson, Randall T.; MacRae, Calum A.

    2013-01-01

    As the scope of potential chemical warfare agents grows rapidly and as the diversity of potential threat scenarios expands with non-state actors, so a need for innovative approaches to countermeasure development has emerged. In the last few years, the utility of the zebrafish as a model organism that is amenable to high-throughput screening has become apparent and this system has been applied to the unbiased discovery of chemical warfare countermeasures. This review summarizes the in vivo screening approach that has been pioneered in the countermeasure discovery arena, and highlights the successes to date as well as the potential challenges in moving the field forward. Importantly, the establishment of a zebrafish platform for countermeasure discovery would offer a rapid response system for the development of antidotes to the continuous stream of new potential chemical warfare agents. PMID:24273586

  9. Skeletal evidence for Inca warfare from the Cuzco region of Peru.

    Science.gov (United States)

    Andrushko, Valerie A; Torres, Elva C

    2011-11-01

    This article addresses the bioarchaeological evidence for Inca warfare through an analysis of 454 adult skeletons from 11 sites in the Inca capital region of Cuzco, Peru. These 11 sites span almost 1000 years (AD 600-1532), which allows for a comparison of the evidence for warfare before the Inca came to power (Middle Horizon AD 600-1000), during the time of Inca ascendency in the Late Intermediate Period (AD 1000-1400), and after the Inca came to power and expanded throughout the Cuzco region and beyond (Inca Imperial Period, AD 1400-1532). The results indicate that 100 of 454 adults (22.0%) showed evidence of cranial trauma. Of these, 23 individuals had major cranial injuries suggestive of warfare, consisting of large, complete, and/or perimortem fractures. There was scant evidence for major injuries during the Middle Horizon (2.8%, 1/36) and Late Intermediate Period (2.5%, 5/199), suggesting that warfare was not prevalent in the Cuzco region before and during the Inca rise to power. Only in the Inca Imperial Period was there a significant rise in major injuries suggestive of warfare (7.8%, 17/219). Despite the significant increase in Inca times, the evidence for major cranial injuries was only sporadically distributed at Cuzco periphery sites and was entirely absent at Cuzco core sites. These findings suggest that while the Inca used warfare as a mechanism for expansion in the Cuzco region, it was only one part of a complex expansion strategy that included economic, political, and ideological means to gain and maintain control. Copyright © 2011 Wiley-Liss, Inc.

  10. Blaptica dubia as sentinels for exposure to chemical warfare agents - a pilot study.

    Science.gov (United States)

    Worek, Franz; Seeger, Thomas; Neumaier, Katharina; Wille, Timo; Thiermann, Horst

    2016-11-16

    The increased interest of terrorist groups in toxic chemicals and chemical warfare agents presents a continuing threat to our societies. Early warning and detection is a key component for effective countermeasures against such deadly agents. Presently available and near term solutions have a number of major drawbacks, e.g. lack of automated, remote warning and detection of primarily low volatile chemical warfare agents. An alternative approach is the use of animals as sentinels for exposure to toxic chemicals. To overcome disadvantages of vertebrates the present pilot study was initiated to investigate the suitability of South American cockroaches (Blaptica dubia) as warning system for exposure to chemical warfare nerve and blister agents. Initial in vitro experiments with nerve agents showed an increasing inhibitory potency in the order tabun - cyclosarin - sarin - soman - VX of cockroach cholinesterase. Exposure of cockroaches to chemical warfare agents resulted in clearly visible and reproducible reactions, the onset being dependent on the agent and dose. With nerve agents the onset was related to the volatility of the agents. The blister agent lewisite induced signs largely comparable to those of nerve agents while sulfur mustard exposed animals exhibited a different sequence of events. In conclusion, this first pilot study indicates that Blaptica dubia could serve as a warning system to exposure of chemical warfare agents. A cockroach-based system will not detect or identify a particular chemical warfare agent but could trigger further actions, e.g. specific detection and increased protective status. By designing appropriate boxes with (IR) motion sensors and remote control (IR) camera automated off-site warning systems could be realized. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  11. Efikasnost sistema PVO u uslovima elektronskih dejstava / Efficiency of antiaircraft system in electronic warfare

    Directory of Open Access Journals (Sweden)

    Vladimir V. Šepec

    2007-01-01

    Full Text Available U radu je primenjena teorija masovnog opsluživanja u analizi efikasnosti sistema protivvazduhoplovne odbrane (sistema PVO u uslovima elektronskih dejstava protivnika. Prikazan je model za ocenu efikasnosti sistema PVO i predstavljeni su izrazi za procenu efikasnosti sistema PVO u uslovima elektronskih dejstava. / In this article the theory of mass servicing is used in the analysis of efficiency of antiaircraft system in the conditions of electronic warfare. The model for analysis of the antiaircraft system efficiency has been shown and formulas for qualitative analysis of antiaircraft system efficiency have been presented in the conditions of electronic warfare.

  12. Particle Swarm Social Adaptive Model for Multi-Agent Based Insurgency Warfare Simulation

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Xiaohui [ORNL; Potok, Thomas E [ORNL

    2009-12-01

    To better understand insurgent activities and asymmetric warfare, a social adaptive model for modeling multiple insurgent groups attacking multiple military and civilian targets is proposed and investigated. This report presents a pilot study using the particle swarm modeling, a widely used non-linear optimal tool to model the emergence of insurgency campaign. The objective of this research is to apply the particle swarm metaphor as a model of insurgent social adaptation for the dynamically changing environment and to provide insight and understanding of insurgency warfare. Our results show that unified leadership, strategic planning, and effective communication between insurgent groups are not the necessary requirements for insurgents to efficiently attain their objective.

  13. Tissue-based water quality biosensors for detecting chemical warfare agents

    Science.gov (United States)

    Greenbaum, Elias [Oak Ridge, TN; Sanders, Charlene A [Knoxville, TN

    2003-05-27

    A water quality sensor for detecting the presence of at least one chemical or biological warfare agent includes: a cell; apparatus for introducing water into the cell and discharging water from the cell adapted for analyzing photosynthetic activity of naturally occurring, free-living, indigenous photosynthetic organisms in water; a fluorometer for measuring photosynthetic activity of naturally occurring, free-living, indigenous photosynthetic organisms drawn into the cell; and an electronics package that analyzes raw data from the fluorometer and emits a signal indicating the presence of at least one chemical or biological warfare agent in the water.

  14. Comparative evaluation of the efficacy of occlusal splints fabricated in centric relation or maximum intercuspation in temporomandibular disorders patients

    Directory of Open Access Journals (Sweden)

    Marcelo Matida Hamata

    2009-02-01

    Full Text Available Fabrication of occlusal splints in centric relation for temporomandibular disorders (TMD patients is arguable, since this position has been defined for asymptomatic stomatognathic system. Thus, maximum intercuspation might be employed in patients with occlusal stability, eliminating the need for interocclusal records. This study compared occlusal splints fabricated in centric relation and maximum intercuspation in muscle pain reduction of TMD patients. Twenty patients with TMD of myogenous origin and bruxism were divided into 2 groups treated with splints in maximum intercuspation (I or centric relation (II. Clinical, electrognathographic and electromyographic examinations were performed before and 3 months after therapy. Data were analyzed by the Student's t test. Differences at 5% level of probability were considered statistically significant. There was a remarkable reduction in pain symptomatology, without statistically significant differences (p>0.05 between the groups. There was mandibular repositioning during therapy, as demonstrated by the change in occlusal contacts on the splints. Electrognathographic examination demonstrated a significant increase in maximum left lateral movement for group I and right lateral movement for group II (p0.05 in the electromyographic activities at rest after utilization of both splints. In conclusion, both occlusal splints were effective for pain control and presented similar action. The results suggest that maximum intercuspation may be used for fabrication of occlusal splints in patients with occlusal stability without large discrepancies between centric relation and maximum intercuspation. Moreover, this technique is simpler and less expensive.

  15. Support given to lecturers when providing mobile centric services in teaching and learning: a policy analysis perspective

    CSIR Research Space (South Africa)

    Chipangura, B

    2015-05-01

    Full Text Available The objective of this study is to examine the status of Higher Education Institutions (HEIs) policies in supporting lecturers when providing mobile centric services to students. The research was undertaken as a single case study within the Open...

  16. Evaluating mobile-centric readiness of higher education institutions: the case of institutional policies and information systems students

    CSIR Research Space (South Africa)

    Chipangura, B

    2015-12-01

    Full Text Available . To investigate this question from a policy perspective, nine policies from the open and distance learning (ODL) university in South Africa were analysed for providing institutional mobile-centric support. Policy document analysis was used to evaluate five...

  17. Teaching Customer-Centric Operations Management--Evidence from an Experiential Learning-Oriented Mass Customisation Class

    Science.gov (United States)

    Medini, Khaled

    2018-01-01

    The increase of individualised customer demands and tough competition in the manufacturing sector gave rise to more customer-centric operations management such as products and services (mass) customisation. Mass customisation (MC), which inherits the "economy of scale" from mass production (MP), aims to meet specific customer demands…

  18. Atlas of Freshwater centric diatoms with a brief key and descriptions. Part II. Melosiraceae and Aulacoseiraceae (Supplement to Part I)

    Czech Academy of Sciences Publication Activity Database

    Houk, Václav; Klee, R.

    2007-01-01

    Roč. 7, č. 2 (2007), s. 85-255 ISSN 1802-5439 R&D Projects: GA ČR GA205/05/0204 Institutional research plan: CEZ:AV0Z60050516 Keywords : centric diatoms * recent, * fossil Subject RIV: EF - Botanics

  19. Comparative evaluation of the efficacy of occlusal splints fabricated in centric relation or maximum intercuspation in temporomandibular disorders patients.

    Science.gov (United States)

    Hamata, Marcelo Matida; Zuim, Paulo Renato Junqueira; Garcia, Alicio Rosalino

    2009-01-01

    Fabrication of occlusal splints in centric relation for temporomandibular disorders (TMD) patients is arguable, since this position has been defined for asymptomatic stomatognathic system. Thus, maximum intercuspation might be employed in patients with occlusal stability, eliminating the need for interocclusal records. This study compared occlusal splints fabricated in centric relation and maximum intercuspation in muscle pain reduction of TMD patients. Twenty patients with TMD of myogenous origin and bruxism were divided into 2 groups treated with splints in maximum intercuspation (I) or centric relation (II). Clinical, electrognathographic and electromyographic examinations were performed before and 3 months after therapy. Data were analyzed by the Student's t test. Differences at 5% level of probability were considered statistically significant. There was a remarkable reduction in pain symptomatology, without statistically significant differences (p>0.05) between the groups. There was mandibular repositioning during therapy, as demonstrated by the change in occlusal contacts on the splints. Electrognathographic examination demonstrated a significant increase in maximum left lateral movement for group I and right lateral movement for group II (p0.05) in the electromyographic activities at rest after utilization of both splints. In conclusion, both occlusal splints were effective for pain control and presented similar action. The results suggest that maximum intercuspation may be used for fabrication of occlusal splints in patients with occlusal stability without large discrepancies between centric relation and maximum intercuspation. Moreover, this technique is simpler and less expensive.

  20. Using Appreciative Inquiry to Explore the Professional Practice of a Lecturer in Higher Education: Moving towards Life-Centric Practice

    Science.gov (United States)

    Giles, David; Kung, Susie

    2010-01-01

    This paper reports on a strategy for exploring the life-centric practice of a lecturer in Higher Education. The initiative for this inquiry arose out of the realisation that there did not appear to be positive, heart-lifting stories in a lecturer's current teaching experiences. Using an appreciative eye and supported by a critical friend,…

  1. Using a layered model to place EW in context within the information sphere

    CSIR Research Space (South Africa)

    Maasdorp, FDV

    2012-11-01

    Full Text Available In recent years, a discussion on the relationship between Electronic Warfare (EW), Information Warfare (IW), Cyber Operations, Net-Centric Warfare, Command and Control, Information Operations (IO) and other constructs have emerged. This paper...

  2. User Centric Job Monitoring – a redesign and novel approach in the STAR experiment

    International Nuclear Information System (INIS)

    Arkhipkin, D; Lauret, J; Zulkarneeva, Y

    2014-01-01

    User Centric Monitoring (or UCM) has been a long awaited feature in STAR, whereas programs, workflows and system 'events' could be logged, broadcast and later analyzed. UCM allows to collect and filter available job monitoring information from various resources and present it to users in a user-centric view rather than an administrative-centric point of view. The first attempt and implementation of 'a' UCM approach was made in STAR 2004 using a log4cxx plug-in back-end and then further evolved with an attempt to push toward a scalable database back-end (2006) and finally using a Web-Service approach (2010, CSW4DB SBIR). The latest showed to be incomplete and not addressing the evolving needs of the experiment where streamlined messages for online (data acquisition) purposes as well as the continuous support for the data mining needs and event analysis need to coexists and unified in a seamless approach. The code also revealed to be hardly maintainable. This paper presents the next evolutionary step of the UCM toolkit, a redesign and redirection of our latest attempt acknowledging and integrating recent technologies and a simpler, maintainable and yet scalable manner. The extended version of the job logging package is built upon three-tier approach based on Task, Job and Event, and features a Web-Service based logging API, a responsive AJAX-powered user interface, and a database back-end relying on MongoDB, which is uniquely suited for STAR needs. In addition, we present details of integration of this logging package with the STAR offline and online software frameworks. Leveraging on the reported experience and work from the ATLAS and CMS experience on using the ESPER engine, we discuss and show how such approach has been implemented in STAR for meta-data event triggering stream processing and filtering. An ESPER based solution seems to fit well into the online data acquisition system where many systems are monitored.

  3. Physical Training Strategies for Military Women's Performance Optimization in Combat-Centric Occupations.

    Science.gov (United States)

    Nindl, Bradley C

    2015-11-01

    The physiological differences, particularly of upper-body strength and power, between women and men, and the rigors of combat-centric occupational demands would seem to place women at a significant disadvantage, as the U.S. military opens up previously closed combat-arms military occupational specialties (MOSs) to women. This inherent disadvantage can be significantly mitigated by implementing effective and comprehensive physical training (PT) regimens for women targeting those fitness components most critical for those tasks considered most essential for solider warfighting duties (i.e., strength and power). Regrettably, the military historical and legacy overemphasis on aerobic fitness and on "field expediency" as the major criteria for implementing training have limited the extent to which the military has fully operationalized state-of-the-science PT policies. This continued legacy approach could be problematic regarding fully enhancing women's abilities to perform physically demanding combat-centric occupations and could place the successful integration of women into ground combat MOSs at significant risk. Seminal studies from the literature indicate that (a) a minimum of 6 months of periodized combined resistance/endurance training preparedness is recommended for untrained women considering entering combat-arms MOS training; (b) any comprehensive PT program should incorporate and emphasize progressive load carriage training; (c) a greater emphasis on upper body on strength/power development in military women is needed; (d) heavy resistance training in the range of 3-8 repetition maximum sets should be incorporated into training programs to target type II motor units and muscle fibers (those fibers that produce the most force and have the greatest capacity to hypertrophy); (e) low-volume, high-intensity interval training should be considered as a time-efficient training method to improve aerobic fitness while protecting against lower-body musculoskeletal

  4. Revisiting the Robustness of PET-Based Textural Features in the Context of Multi-Centric Trials.

    Directory of Open Access Journals (Sweden)

    Clément Bailly

    Full Text Available This study aimed to investigate the variability of textural features (TF as a function of acquisition and reconstruction parameters within the context of multi-centric trials.The robustness of 15 selected TFs were studied as a function of the number of iterations, the post-filtering level, input data noise, the reconstruction algorithm and the matrix size. A combination of several reconstruction and acquisition settings was devised to mimic multi-centric conditions. We retrospectively studied data from 26 patients enrolled in a diagnostic study that aimed to evaluate the performance of PET/CT 68Ga-DOTANOC in gastro-entero-pancreatic neuroendocrine tumors. Forty-one tumors were extracted and served as the database. The coefficient of variation (COV or the absolute deviation (for the noise study was derived and compared statistically with SUVmax and SUVmean results.The majority of investigated TFs can be used in a multi-centric context when each parameter is considered individually. The impact of voxel size and noise in the input data were predominant as only 4 TFs presented a high/intermediate robustness against SUV-based metrics (Entropy, Homogeneity, RP and ZP. When combining several reconstruction settings to mimic multi-centric conditions, most of the investigated TFs were robust enough against SUVmax except Correlation, Contrast, LGRE, LGZE and LZLGE.Considering previously published results on either reproducibility or sensitivity against delineation approach and our findings, it is feasible to consider Homogeneity, Entropy, Dissimilarity, HGRE, HGZE and ZP as relevant for being used in multi-centric trials.

  5. Revisiting the Robustness of PET-Based Textural Features in the Context of Multi-Centric Trials.

    Science.gov (United States)

    Bailly, Clément; Bodet-Milin, Caroline; Couespel, Solène; Necib, Hatem; Kraeber-Bodéré, Françoise; Ansquer, Catherine; Carlier, Thomas

    2016-01-01

    This study aimed to investigate the variability of textural features (TF) as a function of acquisition and reconstruction parameters within the context of multi-centric trials. The robustness of 15 selected TFs were studied as a function of the number of iterations, the post-filtering level, input data noise, the reconstruction algorithm and the matrix size. A combination of several reconstruction and acquisition settings was devised to mimic multi-centric conditions. We retrospectively studied data from 26 patients enrolled in a diagnostic study that aimed to evaluate the performance of PET/CT 68Ga-DOTANOC in gastro-entero-pancreatic neuroendocrine tumors. Forty-one tumors were extracted and served as the database. The coefficient of variation (COV) or the absolute deviation (for the noise study) was derived and compared statistically with SUVmax and SUVmean results. The majority of investigated TFs can be used in a multi-centric context when each parameter is considered individually. The impact of voxel size and noise in the input data were predominant as only 4 TFs presented a high/intermediate robustness against SUV-based metrics (Entropy, Homogeneity, RP and ZP). When combining several reconstruction settings to mimic multi-centric conditions, most of the investigated TFs were robust enough against SUVmax except Correlation, Contrast, LGRE, LGZE and LZLGE. Considering previously published results on either reproducibility or sensitivity against delineation approach and our findings, it is feasible to consider Homogeneity, Entropy, Dissimilarity, HGRE, HGZE and ZP as relevant for being used in multi-centric trials.

  6. Debugging systems-on-chip communication-centric and abstraction-based techniques

    CERN Document Server

    Vermeulen, Bart

    2014-01-01

    This book describes an approach and supporting infrastructure to facilitate debugging the silicon implementation of a System-on-Chip (SOC), allowing its associated product to be introduced into the market more quickly.  Readers learn step-by-step the key requirements for debugging a modern, silicon SOC implementation, nine factors that complicate this debugging task, and a new debug approach that addresses these requirements and complicating factors.  The authors’ novel communication-centric, scan-based, abstraction-based, run/stop-based (CSAR) debug approach is discussed in detail, showing how it helps to meet debug requirements and address the nine, previously identified factors that complicate debugging silicon implementations of SOCs. The authors also derive the debug infrastructure requirements to support debugging of a silicon implementation of an SOC with their CSAR debug approach. This debug infrastructure consists of a generic on-chip debug architecture, a configurable automated design-for-debug ...

  7. Cytoskeleton-centric protein transportation by exosomes transforms tumor-favorable macrophages

    Science.gov (United States)

    Cui, Yizhi; Zhou, Yanlong; Yin, Xingfeng; Guo, Jiahui; Zhang, Gong; Wang, Tong; He, Qing-Yu

    2016-01-01

    The exosome is a key initiator of pre-metastatic niche in numerous cancers, where macrophages serve as primary inducers of tumor microenvironment. However, the proteome that can be exosomally transported from cancer cells to macrophages has not been sufficiently characterized so far. Here, we used colorectal cancer (CRC) exosomes to educate tumor-favorable macrophages. With a SILAC-based mass spectrometry strategy, we successfully traced the proteome transported from CRC exosomes to macrophages. Such a proteome primarily focused on promoting cytoskeleton rearrangement, which was biologically validated with multiple cell lines. We reproduced the exosomal transportation of functional vimentin as a proof-of-concept example. In addition, we found that some CRC exosomes could be recognized by macrophages via Fc receptors. Therefore, we revealed the active and necessary role of exosomes secreted from CRC cells to transform cancer-favorable macrophages, with the cytoskeleton-centric proteins serving as the top functional unit. PMID:27602764

  8. Anonysense: privacy-aware people-centric sensing

    DEFF Research Database (Denmark)

    Triandopoulos, Nikolaos; Cornelius, Cory; Kapadia, Apu

    2008-01-01

    applications. For example, users' mobile phones may contribute data to community-oriented information services, from city-wide pollution monitoring to enterprise-wide detection of unauthorized Wi-Fi access points. This people-centric mobile-sensing model introduces a new security challenge in the design...... of mobile systems: protecting the privacy of participants while allowing their devices to reliably contribute high-quality data to these large-scale applications. We describe AnonySense, a privacy-aware architecture for realizing pervasive applications based on collaborative, opportunistic sensing...... by personal mobile devices. AnonySense allows applications to submit sensing tasks that will be distributed across anonymous participating mobile devices, later receiving verified, yet anonymized, sensor data reports back from the field, thus providing the first secure implementation of this participatory...

  9. Connecting Social Science and Information Technology through an Interface-Centric Framework of Analysis

    Directory of Open Access Journals (Sweden)

    Mikael Sundström

    2008-06-01

    Full Text Available The gathering pace of IT innovation has, or ought to have had notable methodological repercussions for the social-science community (and beyond. Where yesterday the researcher could unhurriedly unlock the social-scientific significance of a chosen medium, secure in the knowledge that his or her work would have bearing for many years, by now there is every reason to confront a fear that the prodded IT implementation may in fact be gone or at least heavily altered by the time such comprehensive research is concluded. This paper will propose a complementing systematic "interface-centric" research model capable of interconnecting a non-finite variety of IT implementations and social science studies in a coherent way. The paper also outlines how users "downstream", whether political actors or technology operators can use the proposed framework to more easily approach and weight academic input when evaluating complex IT effects.

  10. A Cross-Layer User Centric Vertical Handover Decision Approach Based on MIH Local Triggers

    Science.gov (United States)

    Rehan, Maaz; Yousaf, Muhammad; Qayyum, Amir; Malik, Shahzad

    Vertical handover decision algorithm that is based on user preferences and coupled with Media Independent Handover (MIH) local triggers have not been explored much in the literature. We have developed a comprehensive cross-layer solution, called Vertical Handover Decision (VHOD) approach, which consists of three parts viz. mechanism for collecting and storing user preferences, Vertical Handover Decision (VHOD) algorithm and the MIH Function (MIHF). MIHF triggers the VHOD algorithm which operates on user preferences to issue handover commands to mobility management protocol. VHOD algorithm is an MIH User and therefore needs to subscribe events and configure thresholds for receiving triggers from MIHF. In this regard, we have performed experiments in WLAN to suggest thresholds for Link Going Down trigger. We have also critically evaluated the handover decision process, proposed Just-in-time interface activation technique, compared our proposed approach with prominent user centric approaches and analyzed our approach from different aspects.

  11. A Project-Centric Course on Cyberinfrastructure to Support High School STEM Education

    Directory of Open Access Journals (Sweden)

    Daphne Rainey

    2013-06-01

    Full Text Available Recent rapid advances in information technology pose new challenges for teachers in the Science, Technology, Engineering, and Mathematics (STEM fields to incorporate the latest knowledge and technical expertise into courses in a way that will be applicable to students as future scientists. A demonstration project was designed, developed, and deployed by university faculty and high school teachers for their students to explore the use of the components of cyberinfrastructure. The project explored the introduction of cyberinfrastructure through the use of bioinformatics and the use of team science. This paper describes the high school course that was deployed at Galileo Magnet High School (GMHS in collaboration with the scientists at Virginia Tech University, and details its overall assessment. Implementation of a project-centric teaching paradigm to engage students in applying the concepts of cyberinfrastructure by integrating the disciplines of biology, computer science, mathematics, and statistics through bioinformatics was an integral part of this study.

  12. Application of remote debugging techniques in user-centric job monitoring

    International Nuclear Information System (INIS)

    Dos Santos, T; Mättig, P; Harenberg, T; Volkmer, F; Beermann, T; Kalinin, S; Ahrens, R; Wulff, N

    2012-01-01

    With the Job Execution Monitor, a user-centric job monitoring software developed at the University of Wuppertal and integrated into the job brokerage systems of the WLCG, job progress and grid worker node health can be supervised in real time. Imminent error conditions can thus be detected early by the submitter and countermeasures can be taken. Grid site admins can access aggregated data of all monitored jobs to infer the site status and to detect job misbehaviour. To remove the last 'blind spot' from this monitoring, a remote debugging technique based on the GNU C compiler suite was developed and integrated into the software; its design concept and architecture is described in this paper and its application discussed.

  13. Model-centric approaches for the development of health information systems.

    Science.gov (United States)

    Tuomainen, Mika; Mykkänen, Juha; Luostarinen, Heli; Pöyhölä, Assi; Paakkanen, Esa

    2007-01-01

    Modeling is used increasingly in healthcare to increase shared knowledge, to improve the processes, and to document the requirements of the solutions related to health information systems (HIS). There are numerous modeling approaches which aim to support these aims, but a careful assessment of their strengths, weaknesses and deficiencies is needed. In this paper, we compare three model-centric approaches in the context of HIS development: the Model-Driven Architecture, Business Process Modeling with BPMN and BPEL and the HL7 Development Framework. The comparison reveals that all these approaches are viable candidates for the development of HIS. However, they have distinct strengths and abstraction levels, they require local and project-specific adaptation and offer varying levels of automation. In addition, illustration of the solutions to the end users must be improved.

  14. A framework for implementation of user-centric identity management systems

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    2010-01-01

    Users increasingly become part of electronic transactions, which take place instantaneously without direct user involvement. This leads to the risk of data manipulation, identity theft and privacy violation, and it has become a major concern for individuals and businesses around the world. Gov......-ernments in many countries are implementing identity man-agement systems (IdMS) to curtail these incidences and to offer citizens the power to exercise informational self-determination. Using concepts from technology adoption and fit-viability theo-ries as well as the laws of identity, this paper analyzes...... the crite-ria for successful implementation and defines a framework for a citizen-centric national IdMS. Results from a survey con-ducted in Ghana are also included....

  15. An Integrated Framework to Achieve Interoperability in Person-Centric Health Management

    Directory of Open Access Journals (Sweden)

    Fabio Vergari

    2011-01-01

    Full Text Available The need for high-quality out-of-hospital healthcare is a known socioeconomic problem. Exploiting ICT's evolution, ad-hoc telemedicine solutions have been proposed in the past. Integrating such ad-hoc solutions in order to cost-effectively support the entire healthcare cycle is still a research challenge. In order to handle the heterogeneity of relevant information and to overcome the fragmentation of out-of-hospital instrumentation in person-centric healthcare systems, a shared and open source interoperability component can be adopted, which is ontology driven and based on the semantic web data model. The feasibility and the advantages of the proposed approach are demonstrated by presenting the use case of real-time monitoring of patients' health and their environmental context.

  16. Peering Strategic Game Models for Interdependent ISPs in Content Centric Internet

    Directory of Open Access Journals (Sweden)

    Jia Zhao

    2013-01-01

    Full Text Available Emergent content-oriented networks prompt Internet service providers (ISPs to evolve and take major responsibility for content delivery. Numerous content items and varying content popularities motivate interdependence between peering ISPs to elaborate their content caching and sharing strategies. In this paper, we propose the concept of peering for content exchange between interdependent ISPs in content centric Internet to minimize content delivery cost by a proper peering strategy. We model four peering strategic games to formulate four types of peering relationships between ISPs who are characterized by varying degrees of cooperative willingness from egoism to altruism and interconnected as profit-individuals or profit-coalition. Simulation results show the price of anarchy (PoA and communication cost in the four games to validate that ISPs should decide their peering strategies by balancing intradomain content demand and interdomain peering relations for an optimal cost of content delivery.

  17. Peering Strategic Game Models for Interdependent ISPs in Content Centric Internet

    Science.gov (United States)

    Guan, Jianfeng; Xu, Changqiao; Su, Wei; Zhang, Hongke

    2013-01-01

    Emergent content-oriented networks prompt Internet service providers (ISPs) to evolve and take major responsibility for content delivery. Numerous content items and varying content popularities motivate interdependence between peering ISPs to elaborate their content caching and sharing strategies. In this paper, we propose the concept of peering for content exchange between interdependent ISPs in content centric Internet to minimize content delivery cost by a proper peering strategy. We model four peering strategic games to formulate four types of peering relationships between ISPs who are characterized by varying degrees of cooperative willingness from egoism to altruism and interconnected as profit-individuals or profit-coalition. Simulation results show the price of anarchy (PoA) and communication cost in the four games to validate that ISPs should decide their peering strategies by balancing intradomain content demand and interdomain peering relations for an optimal cost of content delivery. PMID:24381517

  18. Cytoskeleton-centric protein transportation by exosomes transforms tumor-favorable macrophages.

    Science.gov (United States)

    Chen, Zhipeng; Yang, Lijuan; Cui, Yizhi; Zhou, Yanlong; Yin, Xingfeng; Guo, Jiahui; Zhang, Gong; Wang, Tong; He, Qing-Yu

    2016-10-11

    The exosome is a key initiator of pre-metastatic niche in numerous cancers, where macrophages serve as primary inducers of tumor microenvironment. However, the proteome that can be exosomally transported from cancer cells to macrophages has not been sufficiently characterized so far. Here, we used colorectal cancer (CRC) exosomes to educate tumor-favorable macrophages. With a SILAC-based mass spectrometry strategy, we successfully traced the proteome transported from CRC exosomes to macrophages. Such a proteome primarily focused on promoting cytoskeleton rearrangement, which was biologically validated with multiple cell lines. We reproduced the exosomal transportation of functional vimentin as a proof-of-concept example. In addition, we found that some CRC exosomes could be recognized by macrophages via Fc receptors. Therefore, we revealed the active and necessary role of exosomes secreted from CRC cells to transform cancer-favorable macrophages, with the cytoskeleton-centric proteins serving as the top functional unit.

  19. The perspective matters! Multisensory integration in ego-centric reference frames determines full body ownership

    Directory of Open Access Journals (Sweden)

    Valeria Ivanova Petkova

    2011-03-01

    Full Text Available Recent advances in experimental science have made it possible to investigate the perceptual processes involved in generating a sense of owning an entire body. This is achieved by full-body ownership illusions which make use of specific patterns of visual and somatic stimuli integration. Here we investigate the fundamental question of the reference frames used in the process of attributing an entire body to the self. We quantified the strength of the body-swap illusion in conditions where the participants were observing this artificial body from the perspective of the first or third person. Consistent results from subjective reports and physiological recordings show that the first person visual perspective is critical for the induction of this full-body ownership illusion. This demonstrates that the multisensory integration processes producing the sense of corporeal self operates in an ego-centric reference frame.

  20. The Perspective Matters! Multisensory Integration in Ego-Centric Reference Frames Determines Full-Body Ownership

    Science.gov (United States)

    Petkova, Valeria I.; Khoshnevis, Mehrnoush; Ehrsson, H. Henrik

    2011-01-01

    Recent advances in experimental science have made it possible to investigate the perceptual processes involved in generating a sense of owning an entire body. This is achieved by full-body ownership illusions which make use of specific patterns of visual and somatic stimuli integration. Here we investigate the fundamental question of the reference frames used in the process of attributing an entire body to the self. We quantified the strength of the body-swap illusion in conditions where the participants were observing this artificial body from the perspective of the first or third person. Consistent results from subjective reports and physiological recordings show that the first person visual perspective is critical for the induction of this full-body ownership illusion. This demonstrates that the multisensory integration processes producing the sense of corporeal self operates in an ego-centric reference frame. PMID:21687436

  1. Data-Centric Knowledge Discovery Strategy for a Safety-Critical Sensor Application

    Directory of Open Access Journals (Sweden)

    Nilamadhab Mishra

    2014-01-01

    Full Text Available In an indoor safety-critical application, sensors and actuators are clustered together to accomplish critical actions within a limited time constraint. The cluster may be controlled by a dedicated programmed autonomous microcontroller device powered with electricity to perform in-network time critical functions, such as data collection, data processing, and knowledge production. In a data-centric sensor network, approximately 3–60% of the sensor data are faulty, and the data collected from the sensor environment are highly unstructured and ambiguous. Therefore, for safety-critical sensor applications, actuators must function intelligently within a hard time frame and have proper knowledge to perform their logical actions. This paper proposes a knowledge discovery strategy and an exploration algorithm for indoor safety-critical industrial applications. The application evidence and discussion validate that the proposed strategy and algorithm can be implemented for knowledge discovery within the operational framework.

  2. Holistic and consumer-centric assessment of beer: A multi-measurement approach.

    Science.gov (United States)

    Jaeger, Sara R; Cardello, Armand V; Chheang, Sok L; Beresford, Michelle K; Hedderley, Duncan I; Pineau, Benedicte

    2017-09-01

    Despite occupying a cornerstone position in consumer research and innovation, product liking/disliking provides only partial insight into consumer behaviour. By adopting a consumer-centric perspective and drawing on additional factors that underpin food-related consumer behaviour, a more complete product understanding is gained. The present research showcases this approach in a study with New Zealand beer (incl. pilsner, lager and ale categories). Implementation of a multi-variate approach with 128 regular beer drinkers provided assessments pertaining to liking and sensory novelty/complexity, situational appropriateness of consumption, as well as attitudes/perceptions and emotional associations. The 9 samples grouped into two clusters, where 4 of the beers were similar in being perceived as having less complex flavours, being appropriate for many uses and evoking stronger emotional associations of "relaxed/calm." The 4 beers were perceived as "easy to drink", and were, on average, most liked. One of the samples in this cluster was lighter in alcohol (2.5% ABV), but not inferior to beers with 4-5% ABV. The 5 beers in the second cluster were, on average, less liked and were associated with more negative emotions, e.g. "unhappy, "jittery", and "tense". Additional insights were gained from segmentation which identified two groups of consumers, named 'Lager Lovers' and 'Ale Aficionados'. Beers 1-4 were positively perceived by 'Lager Lovers' but less so by 'Ale Aficionados', and vice versa. The study was conducted under central location test conditions compatible with testing protocols often used in product research. The study protocol can be amended to include few/many consumer-centric measures and extended to product testing where packaging, brand, and other extrinsic information is available to consumers. Copyright © 2017 Elsevier Ltd. All rights reserved.

  3. Overview of Human-Centric Space Situational Awareness (SSA) Science and Technology (S&T)

    Science.gov (United States)

    Ianni, J.; Aleva, D.; Ellis, S.

    2012-09-01

    A number of organizations, within the government, industry, and academia, are researching ways to help humans understand and react to events in space. The problem is both helped and complicated by the fact that there are numerous data sources that need to be planned (i.e., tasked), collected, processed, analyzed, and disseminated. A large part of the research is in support of the Joint Space Operational Center (JSpOC), National Air and Space Intelligence Center (NASIC), and similar organizations. Much recent research has been specifically targeting the JSpOC Mission System (JMS) which has provided a unifying software architecture. This paper will first outline areas of science and technology (S&T) related to human-centric space situational awareness (SSA) and space command and control (C2) including: 1. Object visualization - especially data fused from disparate sources. Also satellite catalog visualizations that convey the physical relationships between space objects. 2. Data visualization - improve data trend analysis as in visual analytics and interactive visualization; e.g., satellite anomaly trends over time, space weather visualization, dynamic visualizations 3. Workflow support - human-computer interfaces that encapsulate multiple computer services (i.e., algorithms, programs, applications) into a 4. Command and control - e.g., tools that support course of action (COA) development and selection, tasking for satellites and sensors, etc. 5. Collaboration - improve individuals or teams ability to work with others; e.g., video teleconferencing, shared virtual spaces, file sharing, virtual white-boards, chat, and knowledge search. 6. Hardware/facilities - e.g., optimal layouts for operations centers, ergonomic workstations, immersive displays, interaction technologies, and mobile computing. Secondly we will provide a survey of organizations working these areas and suggest where more attention may be needed. Although no detailed master plan exists for human-centric

  4. Exploring the Potentials of ICT Tools for Human-Centric Regenerative Design

    Directory of Open Access Journals (Sweden)

    Giulia Sonetti

    2018-04-01

    Full Text Available Aiming for sustainable buildings and cities is critical to achieving a future that is socially just, ecologically regenerative, culturally rich, and economically viable. However, our current concepts of sustainability often exclude the essential domains of data, information, and the knowledge relating to the relationship between buildings and people that inhabit them. Thus, the research questions at the core of this paper have been as follows: Can technologies and artificial intelligence (AI be used to create systems that enhance relationships between buildings and inhabitants? Can social networks and natural interactions support further research relating to human-centric design tools for the built environment? The Human Observation Meta-Environment (HOME project was developed to address this question. The ICT architecture has been tested to observe and collect human behaviour data within a sentient room at the Politecnico di Torino (IT, where the inhabitants were strategically aware of their behaviours. Methods of analysis included technologies related to the domain of AI (such as Natural Language Analysis, Computer Vision, Machine Learning and Deep Learning that have been used in social network analysis in connection with the word ‘comfort’, and definitions resonate strongly with the realm of regenerative design. Results were used to further research the role of users that could serve as leverages to design (both spaces and related smart systems according to actual user needs. People from very different disciplinary backgrounds interacted with the prototype in a workshop and provided stimuli for further considerations regarding the possible technological, psychological, cognitive, cultural, social, political, and aesthetical impacts of the use of these technologies inside sentient buildings. The paper enriches the discourse on how ICT data can be organised and read in a human-centric regenerative design process perspective.

  5. Efficacy Evaluation of Current and Future Naval Mine Warfare Neutralization Method

    Science.gov (United States)

    2016-12-01

    ENGINEERING APPROACH Numerous systems engineering process models were considered for this study including the Waterfall , Spiral, and “Vee” models . Given the... model based systems engineering, design of experiments, requirements analysis, mine warfare, MIW, mine countermeasures, MCM, littoral combat ship, LCS...E. IMPLEMENTATION IN SIMULATION MODEL .............................47 VII. MODELING AND SIMULATION ARCHITECTURE ..................................49

  6. (Review of) Reno, William. 2011. Warfare in Independent Africa. Cambridge: Cambridge University Press

    DEFF Research Database (Denmark)

    Hagmann, Tobias

    2013-01-01

    Warfare in Independent Africa is Reno’s bold attempt to analyze the modern history of African insurgencies. The book tackles this task through the prism of five generations of rebel, which left their mark on the continent; anti-colonial rebels, majority rule rebels, reform rebels, warlord rebels ...... and parochial rebels....

  7. 11th Annual Mine Warfare Technology Symposium, May 6-8, 2014 - Monterey, CA

    OpenAIRE

    2014-01-01

    The Naval Postgraduate School (NPS), the Office of Naval Research (ONR), the Program Executive Office Littoral Combat Ships (PEO LCS), OPNAV (N95), and The Consortium for Robotics and Unmanned Systems Education and Research (CRUSER) are pleased to announce the ELEVENTH International Mine Warfare Technology Symposium in Monterey, California, May 6-8, 2014.

  8. A Communitarian Critique of the Warfare State: Implications for the Twenty-First-Century University

    Science.gov (United States)

    Theobald, Paul; Knotwell, Jim

    2007-01-01

    This article contends that the relatively recent academic movement known as communitarianism can serve as a policy guide that could work catalytically on American cultural development of the sort that would loosen the tight military-industrial connection and in so doing aid the dismantling of the "warfare state." After chronicling the development…

  9. An Empirical Examination of the Warfare Metaphor with Respect to Pre-Service Elementary Teachers

    Science.gov (United States)

    Cobern, William W.; Loving, Cathleen C.; Davis, Edward B.; Terpstra, Jeff

    2013-01-01

    Since its origination in the late nineteenth century, the warfare metaphor has been used to characterize the relationship between science and religion, especially orthodox Christianity. Though thoroughly discredited by historians of science, the ideological descendants of Thomas Huxley, who spoke of science in quasi-religious terms, have kept the…

  10. The influence of the Ratel infantry fighting vehicle on mobile warfare ...

    African Journals Online (AJOL)

    This article traces the story of how the author and a number of daring young commanders and soldiers had cast aside military textbooks in developing their own military doctrine for mobile warfare, South African style. It is clear that the Ratel infantry fighting vehicle had wielded huge influence on the development and ...

  11. Above the Influence: The Strategic Effects of Airpower in Irregular Warfare

    Science.gov (United States)

    2010-06-01

    INDOCHINA. . . . . . . . . . . . . . . . . . . . . 105 APPENDIX B: MAP OF LAOS . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 APPENDIX...perspectives. These perspectives involve the use of airpower in North Vietnam, South Vietnam, and Laos . The overarching political endstate or...Nagl, ―Principles, Imperatives, and Paradoxes of Counterinsurgency,‖ 50; Mao Tse -Tung, Problems of Strategy in Guerrilla Warfare, 215-216; Gray

  12. Emerging Threat to America: Non-State Entities Fighting Fourth Generation Warfare in Mexico

    Science.gov (United States)

    2010-09-01

    warfare in Juarez, Mexico contrasts with the “peaceful” cities of Ciudad Acuña and Piedras Negras controlled by the Zetas who demonstrate 4GW tactics...Vulliamy, 2009). Within the cities of Acuna and Piedra Negras where one Pack Virus (the Zetas) has effective control of these limited geographic

  13. Electronic Warfare (EW) Historical Perspectives and Its Relationship to Information Operations (IO) - Considerations for Turkey

    Science.gov (United States)

    2006-09-01

    Information Operations IW Information Warfare JDAM Joint Direct Attack Munition JRFL Joint Restricted Frequency List JSTARS Joint...through the preparation of the joint restricted frequency list (JRFL), which includes taboo, guarded and protected frequencies. The EC-130H Compass Call

  14. Laboratory analysis of chemical warfare agents, adducts, and metabolites in biomedial samples

    NARCIS (Netherlands)

    Schans, M.J. van der

    2015-01-01

    Chemical warfare agents (CWAs) are the most toxic compounds ever produced. To develop medical countermeasures against the effects of these agents, analytical procedures to analyze these agents in biological matrices are essential for a better understanding of the toxicological process. The need for

  15. Fluorescent discrimination between traces of chemical warfare agents and their mimics.

    Science.gov (United States)

    Díaz de Greñu, Borja; Moreno, Daniel; Torroba, Tomás; Berg, Alexander; Gunnars, Johan; Nilsson, Tobias; Nyman, Rasmus; Persson, Milton; Pettersson, Johannes; Eklind, Ida; Wästerby, Pär

    2014-03-19

    An array of fluorogenic probes is able to discriminate between nerve agents, sarin, soman, tabun, VX and their mimics, in water or organic solvent, by qualitative fluorescence patterns and quantitative multivariate analysis, thus making the system suitable for the in-the-field detection of traces of chemical warfare agents as well as to differentiate between the real nerve agents and other related compounds.

  16. On modeling of the evaporation of chemical warfare agents on the ground

    NARCIS (Netherlands)

    Westin, S.N.; Winter, S.; Karlsson, E.; Hin, A.; Oeseburg, F.

    1998-01-01

    A model for evaporation of chemical warfare agents on the ground has been developed. The process of evaporation is described in three steps: (1) the immediate drop enlargement due to impact momentum is modeled using an empirical correlation from technical literature; (2) further enlargement caused

  17. Diagnosis of exposure to chemical warfare agents: An essential tool to counteract chemical terrorism

    NARCIS (Netherlands)

    Noort, D.; Schans, M.J. van der; Bikker, F.J.; Benschop, H.P.

    2009-01-01

    Methods to analyze chemical warfare agents (CW-agents) and their decomposition products in environmental samples were developed over the last decades. In contrast herewith, procedures for analysis in biological samples have only recently been developed. Retrospective detection of exposure to

  18. Mass spectrometry in identification of ecotoxicants including chemical and biological warfare agents

    International Nuclear Information System (INIS)

    Lebedev, Albert T.

    2005-01-01

    Mass spectrometry is a unique tool to detect and identify trace levels of organic and bioorganic compounds as well as microorganisms in the environment. The range of potential chemical warfare (CW) and biological warfare (BW) agents is very broad. An important advantage of mass spectrometry over other techniques involves potential for full spectrum detection of chemical and biological agents including mid-spectrum materials (i.e. bioactive peptides, toxins, etc.) for which biological approaches are inadequate. Being very fast (seconds and minutes), extremely sensitive (zeptomoles 10 -21 ), and informative (detailed qualitative and quantitative composition of mixtures containing hundreds of chemicals), mass spectrometry is a principal analytical tool at the sites of destruction of CW. Due to its unique features, mass spectrometry is applied not only for the detection of CW agents, but for the analysis of products of metabolism and degradation of these agents in organisms or environment as well. The present paper deals with some examples of successful application of mass spectrometry for the analyses of ecotoxicants, chemical warfare agents, explosives, and microorganisms including biology warfare agents

  19. PERMANENCE OF BIOLOGICAL AND CHEMICAL WARFARE AGENTS IN MUNICIPAL SOLID WASTE LANDFILL LEACHATES

    Science.gov (United States)

    The objective of this work is to permit EPA/ORD's National Homeland Security Research Center (NHSRC) and Edgewood Chemical Biological Center to collaborate together to test the permanence of biological and chemical warfare agents in municipal solid waste landfills. Research into ...

  20. Oxidative decontamination of chemical and biological warfare agents using L-Gel.

    Science.gov (United States)

    Raber, Ellen; McGuire, Raymond

    2002-08-05

    A decontamination method has been developed using a single reagent that is effective both against chemical warfare (CW) and biological warfare (BW) agents. The new reagent, "L-Gel", consists of an aqueous solution of a mild commercial oxidizer, Oxone, together with a commercial fumed silica gelling agent, Cab-O-Sil EH-5. L-Gel is non-toxic, environmentally friendly, relatively non-corrosive, maximizes contact time because of its thixotropic nature, clings to walls and ceilings, and does not harm carpets or painted surfaces. The new reagent also addresses the most demanding requirements for decontamination in the civilian sector, including availability, low maintenance, ease of application and deployment by a variety of dispersal mechanisms, minimal training and acceptable expense. Experiments to test the effectiveness of L-Gel were conducted at Lawrence Livermore National Laboratory and independently at four other locations. L-Gel was tested against all classes of chemical warfare agents and against various biological warfare agent surrogates, including spore-forming bacteria and non-virulent strains of real biological agents. Testing showed that L-Gel is as effective against chemical agents and biological materials, including spores, as the best military decontaminants.