WorldWideScience

Sample records for concealed weapon detection

  1. Color image fusion for concealed weapon detection

    NARCIS (Netherlands)

    Toet, A.

    2003-01-01

    Recent advances in passive and active imaging sensor technology offer the potential to detect weapons that are concealed underneath a person's clothing or carried along in bags. Although the concealed weapons can sometimes easily be detected, it can be difficult to perceive their context, due to the

  2. Open-area concealed-weapon detection system

    Science.gov (United States)

    Pati, P.; Mather, P.

    2011-06-01

    Concealed Weapon Detection (CWD) has become a significant challenge to present day security needs; individuals carrying weapons into airplanes, schools, and secured establishments are threat to public security. Although controlled screening, of people for concealed weapons, has been employed in many establishments, procedures and equipment are designed to work in restricted environments like airport passport control, military checkpoints, hospitals, school and university entrance. Furthermore, screening systems do not effectively decipher between threat and non-threat metal objects, thus leading to high rate of false alarms which can become a liability to daily operational needs of establishments. Therefore, the design and development of a new CWD system to operate in a large open area environment with large numbers of people reduced incidences of false alarms and increased location accuracy is essential.

  3. Detection and identification of concealed weapons using matrix pencil

    Science.gov (United States)

    Adve, Raviraj S.; Thayaparan, Thayananthan

    2011-06-01

    The detection and identification of concealed weapons is an extremely hard problem due to the weak signature of the target buried within the much stronger signal from the human body. This paper furthers the automatic detection and identification of concealed weapons by proposing the use of an effective approach to obtain the resonant frequencies in a measurement. The technique, based on Matrix Pencil, a scheme for model based parameter estimation also provides amplitude information, hence providing a level of confidence in the results. Of specific interest is the fact that Matrix Pencil is based on a singular value decomposition, making the scheme robust against noise.

  4. Portable concealed weapon detection using millimeter-wave FMCW radar imaging

    Science.gov (United States)

    Johnson, Michael A.; Chang, Yu-Wen

    2001-02-01

    Unobtrusive detection of concealed weapons on persons or in abandoned bags would provide law enforcement a powerful tool to focus resources and increase traffic throughput in high- risk situations. We have developed a fast image scanning 94 GHz radar system that is suitable for portable operation and remote viewing of radar data. This system includes a novel fast image-scanning antenna that allows for the acquisition of medium resolution 3D millimeter wave images of stationary targets with frame times on order of one second. The 3D radar data allows for potential isolation of concealed weapons from body and environmental clutter such as nearby furniture or other people. The radar is an active system so image quality is not affected indoors, emitted power is however very low so there are no health concerns for operator or targets. The low power operation is still sufficient to penetrate heavy clothing or material. Small system size allows for easy transport and rapid deployment of the system as well as an easy migration path to future hand held systems.

  5. Unsupervised image segmentation for passive THz broadband images for concealed weapon detection

    Science.gov (United States)

    Ramírez, Mabel D.; Dietlein, Charles R.; Grossman, Erich; Popović, Zoya

    2007-04-01

    This work presents the application of a basic unsupervised classification algorithm for the segmentation of indoor passive Terahertz images. The 30,000 pixel broadband images of a person with concealed weapons under clothing are taken at a range of 0.8-2m over a frequency range of 0.1-1.2THz using single-pixel row-based raster scanning. The spiral-antenna coupled 36x1x0.02μm Nb bridge cryogenic micro-bolometers are developed at NIST-Optoelectronics Division. The antenna is evaporated on a 250μm thick Si substrate with a 4mm diameter hyper-hemispherical Si lens. The NETD of the microbolometer is 125mK at an integration time of 30 ms. The background temperature calibration is performed with a known 25 pixel source above 330 K, and a measured background fluctuation of 200-500mK. Several weapons were concealed under different fabrics: cotton, polyester, windblocker jacket and thermal sweater. Measured temperature contrasts ranged from 0.5-1K for wrinkles in clothing to 5K for a zipper and 8K for the concealed weapon. In order to automate feature detection in the images, some image processing and pattern recognition techniques have been applied and the results are presented here. We show that even simple algorithms, that can potentially be performed in real time, are capable of differentiating between a metal and a dielectric object concealed under clothing. Additionally, we show that pre-processing can reveal low temperature contrast features, such as folds in clothing.

  6. Specific NIST projects in support of the NIJ Concealed Weapon Detection and Imaging Program

    Science.gov (United States)

    Paulter, Nicholas G.

    1998-12-01

    The Electricity Division of the National Institute of Standards and Technology is developing revised performance standards for hand-held (HH) and walk-through (WT) metal weapon detectors, test procedures and systems for these detectors, and a detection/imaging system for finding concealed weapons. The revised standards will replace the existing National Institute of Justice (NIJ) standards for HH and WT devices and will include detection performance specifications as well as system specifications (environmental conditions, mechanical strength and safety, response reproducibility and repeatability, quality assurance, test reporting, etc.). These system requirements were obtained from the Law Enforcement and corrections Technology Advisory Council, an advisory council for the NIJ. Reproducible and repeatable test procedures and appropriate measurement systems will be developed for evaluating HH and WT detection performance. A guide to the technology and application of non- eddy-current-based detection/imaging methods (such as acoustic, passive millimeter-wave and microwave, active millimeter-wave and terahertz-wave, x-ray, etc.) Will be developed. The Electricity Division is also researching the development of a high- frequency/high-speed (300 GH to 1 THz) pulse-illuminated, stand- off, video-rate, concealed weapons/contraband imaging system.

  7. Ultra Wide X-Band Microwave Imaging of Concealed Weapons and Explosives Using 3D-SAR Technique

    Directory of Open Access Journals (Sweden)

    P. Millot

    2015-01-01

    Full Text Available In order to detect and image concealed weapons and explosives, an electromagnetic imaging tool with its related signal processing is presented. The aim is to penetrate clothes and to find personal-born weapons and explosives under clothes. The chosen UWB frequency range covers the whole X-band. The frequency range is justified after transmission measurements of numerous clothes that are dry or slightly wet. The apparatus and the 3D near-field SAR processor are described. A strategy for contour identification is presented with results of some simulants of weapon and explosive. A conclusion is drawn on the possible future of this technique.

  8. Three-Dimensional Microwave Imaging for Concealed Weapon Detection Using Range Stacking Technique

    Directory of Open Access Journals (Sweden)

    Weixian Tan

    2017-01-01

    Full Text Available Three-dimensional (3D microwave imaging has been proven to be well suited for concealed weapon detection application. For the 3D image reconstruction under two-dimensional (2D planar aperture condition, most of current imaging algorithms focus on decomposing the 3D free space Green function by exploiting the stationary phase and, consequently, the accuracy of the final imagery is obtained at a sacrifice of computational complexity due to the need of interpolation. In this paper, from an alternative viewpoint, we propose a novel interpolation-free imaging algorithm based on wavefront reconstruction theory. The algorithm is an extension of the 2D range stacking algorithm (RSA with the advantages of low computational cost and high precision. The algorithm uses different reference signal spectrums at different range bins and then forms the target functions at desired range bin by a concise coherent summation. Several practical issues such as the propagation loss compensation, wavefront reconstruction, and aliasing mitigating are also considered. The sampling criterion and the achievable resolutions for the proposed algorithm are also derived. Finally, the proposed method is validated through extensive computer simulations and real-field experiments. The results show that accurate 3D image can be generated at a very high speed by utilizing the proposed algorithm.

  9. Concealed Threat Detection at Multiple Frames-per-second

    Energy Technology Data Exchange (ETDEWEB)

    Chang, J T

    2005-11-08

    In this LDRD project, our research purpose is to investigate the science and technology necessary to enable real-time array imaging as a rapid way to detect hidden threats through obscurants such as smoke, fog, walls, doors, and clothing. The goal of this research is to augment the capabilities of protective forces in concealed threat detection. In the current context, threats include people as well as weapons. In most cases, security personnel must make very fast assessments of a threat based upon limited amount of data. Among other attributes, UWB has been shown and quantified to penetrate and propagate through many materials (wood, some concretes, non-metallic building materials, some soils, etc.) while maintaining high range resolution. We have build collaborations with university partners and government agencies. We have considered the impact of psychometrics on target recognition and identification. Specifically we have formulated images in real-time that will engage the user's vision system in a more active way to enhance image interpretation capabilities. In this project, we are researching the use of real time (field programmable gate arrays) integrated with high resolution (cm scale), ultra wide band (UWB) electromagnetic signals for imaging personnel through smoke and walls. We evaluated the ability of real-time UWB imaging for detecting smaller objects, such as concealed weapons that are carried by the obscured personnel. We also examined the cognitive interpretation process of real time UWB electromagnetic images.

  10. Concealed object segmentation and three-dimensional localization with passive millimeter-wave imaging

    Science.gov (United States)

    Yeom, Seokwon

    2013-05-01

    Millimeter waves imaging draws increasing attention in security applications for weapon detection under clothing. In this paper, concealed object segmentation and three-dimensional localization schemes are reviewed. A concealed object is segmented by the k-means algorithm. A feature-based stereo-matching method estimates the longitudinal distance of the concealed object. The distance is estimated by the discrepancy between the corresponding centers of the segmented objects. Experimental results are provided with the analysis of the depth resolution.

  11. Induction detection of concealed bulk banknotes

    Science.gov (United States)

    Fuller, Christopher; Chen, Antao

    2012-06-01

    The smuggling of bulk cash across borders is a serious issue that has increased in recent years. In an effort to curb the illegal transport of large numbers of paper bills, a detection scheme has been developed, based on the magnetic characteristics of bank notes. The results show that volumes of paper currency can be detected through common concealing materials such as plastics, cardboard, and fabrics making it a possible potential addition to border security methods. The detection scheme holds the potential of also reducing or eliminating false positives caused by metallic materials found in the vicinity, by observing the stark difference in received signals caused by metal and currency. The detection scheme holds the potential to detect for both the presence and number of concealed bulk notes, while maintaining the ability to reduce false positives caused by metal objects.

  12. Objective Methods for Reliable Detection of Concealed Depression

    Directory of Open Access Journals (Sweden)

    Cynthia eSolomon

    2015-04-01

    Full Text Available Recent research has shown that it is possible to automatically detect clinical depression from audio-visual recordings. Before considering integration in a clinical pathway, a key question that must be asked is whether such systems can be easily fooled. This work explores the potential of acoustic features to detect clinical depression in adults both when acting normally and when asked to conceal their depression. Nine adults diagnosed with mild to moderate depression as per the Beck Depression Inventory (BDI-II and Patient Health Questionnaire (PHQ-9 were asked a series of questions and to read a excerpt from a novel aloud under two different experimental conditions. In one, participants were asked to act naturally and in the other, to suppress anything that they felt would be indicative of their depression. Acoustic features were then extracted from this data and analysed using paired t-tests to determine any statistically significant differences between healthy and depressed participants. Most features that were found to be significantly different during normal behaviour remained so during concealed behaviour. In leave-one-subject-out automatic classification studies of the 9 depressed subjects and 8 matched healthy controls, an 88% classification accuracy and 89% sensitivity was achieved. Results remained relatively robust during concealed behaviour, with classifiers trained on only non-concealed data achieving 81% detection accuracy and 75% sensitivity when tested on concealed data. These results indicate there is good potential to build deception-proof automatic depression monitoring systems.

  13. Psychopathy and the detection of concealed information

    NARCIS (Netherlands)

    Verschuere, B.; Verschuere, B.; Ben-Shakhar, G.; Meijer, E.

    2011-01-01

    The most common application of concealed information detection is crime knowledge assessment in crime suspects. The validity of this application has mainly been investigated in healthy subjects. Criminals may differ in important aspects from healthy subjects. Psychopathy, for example, is quite

  14. Psychopathy and Physiological Detection of Concealed Information: A review

    Directory of Open Access Journals (Sweden)

    Bruno Verschuere

    2006-03-01

    Full Text Available The Concealed Information Test has been advocated as the preferred method for deception detection using the polygraph ("lie detector". The Concealed Information Test is argued to be a standardised, highly accurate psychophysiological test founded on the orienting reflex. The validity of polygraph tests for the assessment of psychopathic individuals has, however, been questioned. Two dimensions are said to underlie psychopathy: emotional detachment and antisocial behaviour. Distinct psychophysiological correlates are hypothesised in these facets of psychopathy. Emotional detachment is associated with deficient fear-potentiated startle, and antisocial behaviour with reduced orienting. Few studies have examined the effect of psychopathy on the validity of the Concealed Information Test. This review suggests that reduced orienting in high antisocial individuals is also found in the Concealed Information Test, thereby threatening its validity. Implications for criminal investigations, possible solutions and directions for future research will be discussed.

  15. Find and neutralize clandestine nuclear weapons

    International Nuclear Information System (INIS)

    Canavan, G.H.

    1997-09-01

    The objective of finding nuclear material at entry portals is to provide a secure perimeter as large as a weapon damage radius so that operations could be conducted within it relatively unencumbered. The objective of wide area search for nuclear material to provide a safe zone of similar dimensions in an area in which it is not possible to maintain a secure perimeter, to provide assurance for civilians living at an area at risk, or to provide rapid, wide area search of regions that could conceal nuclear threats to forces in the field. This rapid, wide-area, and confident detection of nuclear materials is the essential first step in developing the ability to negate terrorist nuclear assemblies or weapons. The ability to detect and negate nuclear materials are necessary to prevent the forced, massive evacuation of urban populations or the disruption of military operations in response to terrorist threats. This paper describes the limitations to current sensors used for nuclear weapon detection and discusses a novel approach to nuclear weapon detection using a combination of directional information (imaging) and gamma ray energy (color) to produce a gamma ray color camera

  16. Induction detection of concealed bulk banknotes

    International Nuclear Information System (INIS)

    Fuller, Christopher; Chen, Antao

    2011-01-01

    Bulk cash smuggling is a serious issue that has grown in volume in recent years. By building on the magnetic characteristics of paper currency, induction sensing is found to be capable of quickly detecting large masses of banknotes. The results show that this method is effective in detecting bulk cash through concealing materials such as plastics, cardboards, fabrics and aluminum foil. The significant difference in the observed phase between the received signals caused by conducting materials and ferrite compounds, found in banknotes, provides a good indication that this process can overcome the interference by metal objects in a real sensing application. This identification strategy has the potential to not only detect the presence of banknotes, but also the number, while still eliminating false positives caused by metal objects

  17. Theory of the Concealed Information Test

    NARCIS (Netherlands)

    Verschuere, B.; Ben-Shakhar, G.; Verschuere, B.; Ben-Shakhar, G.; Meijer, E.

    2011-01-01

    It is now well established that physiological measures can be validly used to detect concealed information. An important challenge is to elucidate the underlying mechanisms of concealed information detection. We review theoretical approaches that can be broadly classified in two major categories:

  18. Damaged Watermarks Detection in Frequency Domain as a Primary Method for Video Concealment

    Directory of Open Access Journals (Sweden)

    Robert Hudec

    2011-01-01

    Full Text Available This paper deals with video transmission over lossy communication networks. The main idea is to develop video concealment method for information losses and errors correction. At the beginning, three main groups of video concealment methods, divided by encoder/decoder collaboration, are briefly described. The modified algorithm based on the detection and filtration of damaged watermark blocks encapsulated to the transmitted video was developed. Finally, the efficiency of developed algorithm is presented in experimental part of this paper.

  19. Indian program for development of technologies relevant to reliable, non-intrusive, concealed-contraband detection

    International Nuclear Information System (INIS)

    Auluck, S.K.H.

    2007-01-01

    Generating capability for reliable, non-intrusive detection of concealed-contraband, particularly, organic contraband like explosives and narcotics, has become a national priority. This capability spans a spectrum of technologies. If a technology mission addressing the needs of a highly sophisticated technology like PFNA is set up, the capabilities acquired would be adequate to meet the requirements of many other sets of technologies. This forms the background of the Indian program for development of technologies relevant to reliable, non-intrusive, concealed contraband detection. One of the central themes of the technology development programs would be modularization of the neutron source and detector technologies, so that common elements can be combined in different ways for meeting a variety of application requirements. (author)

  20. Remote laser drilling and sampling system for the detection of concealed explosives

    Science.gov (United States)

    Wild, D.; Pschyklenk, L.; Theiß, C.; Holl, G.

    2017-05-01

    The detection of hazardous materials like explosives is a central issue in national security in the field of counterterrorism. One major task includes the development of new methods and sensor systems for the detection. Many existing remote or standoff methods like infrared or raman spectroscopy find their limits, if the hazardous material is concealed in an object. Imaging technologies using x-ray or terahertz radiation usually yield no information about the chemical content itself. However, the exact knowledge of the real threat potential of a suspicious object is crucial for disarming the device. A new approach deals with a laser drilling and sampling system for the use as verification detector for suspicious objects. Central part of the system is a miniaturised, diode pumped Nd:YAG laser oscillator-amplifier. The system allows drilling into most materials like metals, synthetics or textiles with bore hole diameters in the micron scale. During the drilling process, the hazardous material can be sampled for further investigation with suitable detection methods. In the reported work, laser induced breakdown spectroscopy (LIBS) is used to monitor the drilling process and to classify the drilled material. Also experiments were carried out to show the system's ability to not ignite even sensitive explosives like triacetone triperoxide (TATP). The detection of concealed hazardous material is shown for different explosives using liquid chromatography and ion mobility spectrometry.

  1. Detection and treatment of chemical weapons and/or biological pathogens

    Science.gov (United States)

    Mariella Jr., Raymond P.

    2004-09-07

    A system for detection and treatment of chemical weapons and/or biological pathogens uses a detector system, an electrostatic precipitator or scrubber, a circulation system, and a control. The precipitator or scrubber is activated in response to a signal from the detector upon the detection of chemical weapons and/or biological pathogens.

  2. Detecting Chemical Weapons: Threats, Requirements, Solutions, and Future Challenges

    Science.gov (United States)

    Boso, Brian

    2011-03-01

    Although chemicals have been reportedly used as weapons for thousands of years, it was not until 1915 at Ypres, France that an industrial chemical, chlorine, was used in World War I as an offensive weapon in significant quantity, causing mass casualties. From that point until today the development, detection, production and protection from chemical weapons has be an organized endeavor of many of the world's armed forces and in more recent times, non-governmental terrorist organizations. The number of Chemical Warfare Agents (CWAs) has steadily increased as research into more toxic substances continued for most of the 20 th century. Today there are over 70 substances including harassing agents like tear gas, incapacitating agents, and lethal agents like blister, blood, chocking, and nerve agents. The requirements for detecting chemical weapons vary depending on the context in which they are encountered and the concept of operation of the organization deploying the detection equipment. The US DoD, for example, has as a requirement, that US forces be able to continue their mission, even in the event of a chemical attack. This places stringent requirements on detection equipment. It must be lightweight (developed for this application, including, but not limited to: mass spectroscopy, IR spectroscopy, RAMAN spectroscopy, MEMs micro-cantilever sensors, surface acoustic wave sensors, differential mobility spectrometry, and amplifying fluorescence polymers. In the future the requirements for detection equipment will continue to become even more stringent. The continuing increase in the sheer number of threats that will need to be detected, the development of binary agents requiring that even the precursor chemicals be detected, the development of new types of agents unlike any of the current chemistries, and the expansion of the list of toxic industrial chemical will require new techniques with higher specificity and more sensitivity.

  3. Detecting concealed information from groups using a dynamic questioning approach: simultaneous skin conductance measurement and immediate feedback

    NARCIS (Netherlands)

    Meijer, E.H.; Bente, G.; Ben-Shakhar, G.; Schumacher, A.

    2013-01-01

    Lie detection procedures typically aim at determining the guilt or innocence of a single suspect. The Concealed Information Test (CIT), for example, has been shown to be highly successful in detecting the presence or absence of crime-related information in a suspect's memory. Many of today's

  4. Detecting concealed information in less than a second: response latency-based measures

    NARCIS (Netherlands)

    Verschuere, B.; de Houwer, J.; Verschuere, B.; Ben-Shakhar, G.; Meijer, E.

    2011-01-01

    Concealed information can be accurately assessed with physiological measures. To overcome the practical limitations of physiological measures, an assessment using response latencies has been proposed. At first sight, research findings on response latency based concealed information tests seem

  5. When interference helps: Increasing executive load to facilitate deception detection in the Concealed Information Test

    Directory of Open Access Journals (Sweden)

    George eVisu-Petra

    2013-03-01

    Full Text Available The possibility to enhance the detection efficiency of the Concealed Information Test (CIT by increasing executive load was investigated, using an interference design. After learning and executing a mock crime scenario, subjects underwent three deception detection tests: an RT-based CIT, an RT-based CIT plus a concurrent memory task (CITMem, and an RT-based CIT plus a concurrent set-shifting task (CITShift. The concealed information effect, consisting in increased RT and lower response accuracy for probe items compared to irrelevant items, was evidenced across all three conditions. The group analyses indicated a larger difference between RTs to probe and irrelevant items in the dual-task conditions, but this difference was not translated in a significantly increased detection efficiency at an individual level. Signal detection parameters based on the comparison with a simulated innocent group showed accurate discrimination for all conditions. Overall response accuracy on the CITMem was highest and the difference between response accuracy to probes and irrelevants was smallest in this condition. Accuracy on the concurrent tasks (Mem and Shift was high, and responses on these tasks were significantly influenced by CIT stimulus type (probes vs. irrelevants. The findings are interpreted in relation to the cognitive load/dual-task interference literature, generating important insights for research on the involvement of executive functions in deceptive behavior.

  6. Repeal of the concealed weapons law and its impact on gun-related injuries and deaths.

    Science.gov (United States)

    Ginwalla, Rashna; Rhee, Peter; Friese, Randall; Green, Donald J; Gries, Lynn; Joseph, Bellal; Kulvatunyou, Narong; Lubin, Dafney; O'Keeffe, Terence; Vercruysse, Gary; Wynne, Julie; Tang, Andrew

    2014-03-01

    Senate Bill 1108 (SB-1108) allows adult citizens to carry concealed weapons without a permit and without completion of a training course. It is unclear whether the law creates a "deterrent factor" to criminals or whether it escalates gun-related violence. We hypothesized that the enactment of SB-1108 resulted in an increase in gun-related injuries and deaths (GRIDs) in southern Arizona. We performed a retrospective cohort study spanning 24 months before (prelaw) and after (postlaw) SB-1108. We collected injury and death data and overall crime and accident trends. Injured patients were dichotomized based on whether their injuries were intentional (iGRIDs) or accidental (aGRIDs). The primary outcome was any GRID. To determine proportional differences in GRIDs between the two periods, we performed χ analyses. For each subgroup, we calculated relative risk (RR). The number of national and state background checks for firearms purchases increased in the postlaw period (national and state p guns had an 11% increased risk of being injured or killed by a firearm (p = 0.036) The proportion of iGRIDs to overall city violent crime remained the same during the two periods (9.74% prelaw vs. 10.36% postlaw; RR, 1.06; 95% confidence interval, 0.96-1.17). However, in the postlaw period, the proportion of gun-related homicides increased by 27% after SB-1108 (RR, 1.27; 95% confidence interval, 1.02-1.58). Both nationally and statewide, firearm purchases increased after the passage of SB-1108. Although the proportion of iGRIDs to overall city violent crime remained the same, the proportion of gun-related homicides increased. Liberalization of gun access is associated with an increase in fatalities from guns. Epidemiologic study, level III.

  7. Self-Concealment and Suicidal Behaviors

    Science.gov (United States)

    Friedlander, Adam; Nazem, Sarra; Fiske, Amy; Nadorff, Michael R.; Smith, Merideth D.

    2012-01-01

    Understanding self-concealment, the tendency to actively conceal distressing personal information from others, may be important in developing effective ways to help individuals with suicidal ideation. No published study has yet assessed the relation between self-concealment and suicidal behaviors. Additionally, most self-concealment research has…

  8. Organizational Concealment: An Incentive of Reducing the Responsibility

    OpenAIRE

    Tajika, Tomoya

    2017-01-01

    We studyworkers’ incentives of reporting problems within an OLG organization consisting of a subordinate and a manager. The subordinate is responsible for reporting a problem, and the manager is responsible for solving the reported problem. The subordinate has an incentive to conceal a detected problem since if he reports it but the manager is too lazy to solve the problem, the responsibility is transferred to the subordinate since he becomes a manager in the next period. We show that conceal...

  9. Identification of nuclear weapons

    Science.gov (United States)

    Mihalczo, J.T.; King, W.T.

    1987-04-10

    A method and apparatus for non-invasively indentifying different types of nuclear weapons is disclosed. A neutron generator is placed against the weapon to generate a stream of neutrons causing fissioning within the weapon. A first detects the generation of the neutrons and produces a signal indicative thereof. A second particle detector located on the opposite side of the weapon detects the fission particles and produces signals indicative thereof. The signals are converted into a detected pattern and a computer compares the detected pattern with known patterns of weapons and indicates which known weapon has a substantially similar pattern. Either a time distribution pattern or noise analysis pattern, or both, is used. Gamma-neutron discrimination and a third particle detector for fission particles adjacent the second particle detector are preferably used. The neutrons are generated by either a decay neutron source or a pulled neutron particle accelerator.

  10. A Concealed Information Test with multimodal measurement.

    Science.gov (United States)

    Ambach, Wolfgang; Bursch, Stephanie; Stark, Rudolf; Vaitl, Dieter

    2010-03-01

    A Concealed Information Test (CIT) investigates differential physiological responses to deed-related (probe) vs. irrelevant items. The present study focused on the detection of concealed information using simultaneous recordings of autonomic and brain electrical measures. As a secondary issue, verbal and pictorial presentations were compared with respect to their influence on the recorded measures. Thirty-one participants underwent a mock-crime scenario with a combined verbal and pictorial presentation of nine items. The subsequent CIT, designed with respect to event-related potential (ERP) measurement, used a 3-3.5s interstimulus interval. The item presentation modality, i.e. pictures or written words, was varied between subjects; no response was required from the participants. In addition to electroencephalogram (EEG), electrodermal activity (EDA), electrocardiogram (ECG), respiratory activity, and finger plethysmogram were recorded. A significant probe-vs.-irrelevant effect was found for each of the measures. Compared to sole ERP measurement, the combination of ERP and EDA yielded incremental information for detecting concealed information. Although, EDA per se did not reach the predictive value known from studies primarily designed for peripheral physiological measurement. Presentation modality neither influenced the detection accuracy for autonomic measures nor EEG measures; this underpins the equivalence of verbal and pictorial item presentation in a CIT, regardless of the physiological measures recorded. Future studies should further clarify whether the incremental validity observed in the present study reflects a differential sensitivity of ERP and EDA to different sub-processes in a CIT. Copyright 2009 Elsevier B.V. All rights reserved.

  11. Safeguards applications of far infrared radiometric techniques for the detection of contraband

    International Nuclear Information System (INIS)

    Hodges, D.T.; Reber, E.E.; Foote, F.B.; Schellenbaum, R.L.

    1980-02-01

    A new safeguards system under development employs radiometers in the 100 to 300 GHz spectral band to detect contraband, including shielding materials (used to attenuate the gamma ray emissions from nuclear materials), weapons, or explosives covertly concealed on personnel. Clothing is highly transparent at these frequencies and imaging techniques can detect contraband by its emissivity and reflectivity differences relative to human tissues. Experimental data are presented and sample images are used as a basis to discuss system advantages and limitations

  12. Safeguards applications of far infrared radiometric techniques for the detection of contraband

    Energy Technology Data Exchange (ETDEWEB)

    Hodges, D.T.; Reber, E.E.; Foote, F.B.; Schellenbaum, R.L.

    1980-02-01

    A new safeguards system under development employs radiometers in the 100 to 300 GHz spectral band to detect contraband, including shielding materials (used to attenuate the gamma ray emissions from nuclear materials), weapons, or explosives covertly concealed on personnel. Clothing is highly transparent at these frequencies and imaging techniques can detect contraband by its emissivity and reflectivity differences relative to human tissues. Experimental data are presented and sample images are used as a basis to discuss system advantages and limitations.

  13. Anti-3D Weapon Model Detection for Safe 3D Printing Based on Convolutional Neural Networks and D2 Shape Distribution

    Directory of Open Access Journals (Sweden)

    Giao N. Pham

    2018-03-01

    Full Text Available With the development of 3D printing, weapons are easily printed without any restriction from the production managers. Therefore, anti-3D weapon model detection is necessary issue in safe 3D printing to prevent the printing of 3D weapon models. In this paper, we would like to propose an anti-3D weapon model detection algorithm to prevent the printing of anti-3D weapon models for safe 3D printing based on the D2 shape distribution and an improved convolutional neural networks (CNNs. The purpose of the proposed algorithm is to detect anti-3D weapon models when they are used in 3D printing. The D2 shape distribution is computed from random points on the surface of a 3D weapon model and their geometric features in order to construct a D2 vector. The D2 vector is then trained by improved CNNs. The CNNs are used to detect anti-3D weapon models for safe 3D printing by training D2 vectors which have been constructed from the D2 shape distribution of 3D weapon models. Experiments with 3D weapon models proved that the D2 shape distribution of 3D weapon models in the same class is the same. Training and testing results also verified that the accuracy of the proposed algorithm is higher than the conventional works. The proposed algorithm is applied in a small application, and it could detect anti-3D weapon models for safe 3D printing.

  14. ID-Check: Online Concealed Information Test Reveals True Identity.

    Science.gov (United States)

    Verschuere, Bruno; Kleinberg, Bennett

    2016-01-01

    The Internet has already changed people's lives considerably and is likely to drastically change forensic research. We developed a web-based test to reveal concealed autobiographical information. Initial studies identified a number of conditions that affect diagnostic efficiency. By combining these moderators, this study investigated the full potential of the online ID-check. Participants (n = 101) tried to hide their identity and claimed a false identity in a reaction time-based Concealed Information Test. Half of the participants were presented with personal details (e.g., first name, last name, birthday), whereas the others only saw irrelevant details. Results showed that participants' true identity could be detected with high accuracy (AUC = 0.98; overall accuracy: 86-94%). Online memory detection can reliably and validly detect whether someone is hiding their true identity. This suggests that online memory detection might become a valuable tool for forensic applications. © 2015 American Academy of Forensic Sciences.

  15. A comment on Farwell : brain fingerprinting: a comprehensive tutorial review of detection of concealed information with event-related brain potentials

    NARCIS (Netherlands)

    Meijer, E.H.; Ben-Shakhar, G.; Verschuere, B.; Donchin, E.

    2013-01-01

    In a recent issue of Cognitive Neurodynamics Farwell (Cogn Neurodyn 6:115-154, 2012) published a comprehensive tutorial review of the use of Event Related Brain Potentials (ERP) in the detection of concealed information. Farwell’s review covered much of his own work employing his ‘‘brain

  16. Impulse radar imaging system for concealed object detection

    Science.gov (United States)

    Podd, F. J. W.; David, M.; Iqbal, G.; Hussain, F.; Morris, D.; Osakue, E.; Yeow, Y.; Zahir, S.; Armitage, D. W.; Peyton, A. J.

    2013-10-01

    -to-noise parameter to determine how the frequencies contained in the echo dataset are normalised. The chosen image reconstruction algorithm is based on the back-projection method. The algorithm was implemented in MATLAB and uses a pre-calculated sensitivity matrix to increase the computation speed. The results include both 2D and 3D image datasets. The 3D datasets were obtained by scanning the dual sixteen element linear antenna array over the test object. The system has been tested on both humans and mannequin test objects. The front surface of an object placed on the human/mannequin torso is clearly visible, but its presence is also seen from a tell-tale imaging characteristic. This characteristic is caused by a reduction in the wave velocity as the electromagnetic radiation passes through the object, and manifests as an indentation in the reconstructed image that is readily identifiable. The prototype system has been shown to easily detect a 12 mm x 30 mm x70 mm plastic object concealed under clothing.

  17. Techniques for detecting explosives and contraband

    International Nuclear Information System (INIS)

    Vourvopoulos, G.

    1994-01-01

    Because terrorism continues to be a societal threat, scientists are still searching for ways to identify concealed weapons that can be used in terrorist attacks. Explosives are singled out for particular attention because they can easily be shaped to look innocuous, and are still hard to detect. At present, there are three methods under development for the detection of explosives: X-ray imaging, vapour detection and nuclear techniques, and this article will concentrate on the latter. Since there is no single technology that can address all the questions concerning the detection of explosives and other illicit contraband, the philosophy that emerges is that of an integral system combining methodologies. Such a system could contain a nuclear technology device, a vapour detector, and an X-ray imaging device, all backed by an intelligence gathering system. In this paper methods are suggested for identifying explosives which may be used in terrorist attacks and for detecting concealed drugs. Techniques discussed are X-ray imaging, combining high and low energy x-ray machines, vapour detection using a ''sniffer'' to collect vapour samples then analysing the vapour by gas chromatography, chemiluminescence and mass spectroscopy and nuclear techniques. Nuclear techniques, such as neutron activation analysis, are discussed in detail but it is stressed that they need to be carried out at speed to eliminate disruption and delay at airports etc. (UK)

  18. Concealing with structured light.

    Science.gov (United States)

    Sun, Jingbo; Zeng, Jinwei; Wang, Xi; Cartwright, Alexander N; Litchinitser, Natalia M

    2014-02-13

    While making objects less visible (or invisible) to a human eye or a radar has captured people's imagination for centuries, current attempts towards realization of this long-awaited functionality range from various stealth technologies to recently proposed cloaking devices. A majority of proposed approaches share a number of common deficiencies such as design complexity, polarization effects, bandwidth, losses and the physical size or shape requirement complicating their implementation especially at optical frequencies. Here we demonstrate an alternative way to conceal macroscopic objects by structuring light itself. In our approach, the incident light is transformed into an optical vortex with a dark core that can be used to conceal macroscopic objects. Once such a beam passed around the object it is transformed back into its initial Gaussian shape with minimum amplitude and phase distortions. Therefore, we propose to use that dark core of the vortex beam to conceal an object that is macroscopic yet small enough to fit the dark (negligibly low intensity) region of the beam. The proposed concealing approach is polarization independent, easy to fabricate, lossless, operates at wavelengths ranging from 560 to 700 nm, and can be used to hide macroscopic objects providing they are smaller than vortex core.

  19. Instant detection and identification of concealed explosive-related compounds: Induced Stokes Raman versus infrared.

    Science.gov (United States)

    Elbasuney, Sherif; El-Sherif, Ashraf F

    2017-01-01

    The instant detection of explosives and explosive-related compounds has become an urgent priority in recent years for homeland security and counter-terrorism applications. Modern techniques should offer enhancement in selectivity, sensitivity, and standoff distances. Miniaturisation, portability, and field-ruggedisation are crucial requirements. This study reports on instant and standoff identification of concealed explosive-related compounds using customized Raman technique. Stokes Raman spectra of common explosive-related compounds were generated and spectrally resolved to create characteristic finger print spectra. The scattered Raman emissions over the band 400:2000cm -1 were compared to infrared absorption using FTIR. It has been demonstrated that the two vibrational spectroscopic techniques were opposite and completing each other. Molecular vibrations with strong absorption in infrared (those involve strong change in dipole moments) induced weak signals in Raman and vice versa. The tailored Raman offered instant detection, high sensitivity, and standoff detection capabilities. Raman demonstrated characteristic fingerprint spectra with stable baseline and sharp intense peaks. Complete correlations of absorption/scattered signals to certain molecular vibrations were conducted to generate an entire spectroscopic profile of explosive-related compounds. This manuscript shades the light on Raman as one of the prevailing technologies for instantaneous detection of explosive-related compounds. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  20. Understanding Where Americas Public Discussion Takes Place In Todays Society: Case Studies of Concealed Weapons Carry Reform

    Science.gov (United States)

    2016-06-01

    arguing that concealed carry permit holders are a danger to public safety and that mass shootings are taking place by citizens who are legally armed.2...who worked at an abortion clinic that had recently been bombed and whose life had been threatened was denied a license to carry because he was not...populace. The new law laid out new prohibitions and penalties enforceable statewide. Additionally, the Preemption Act was necessary to set the legal

  1. Concealable Stigmatized Identities and Psychological Well-Being

    OpenAIRE

    Quinn, Diane M.; Earnshaw, Valerie A.

    2013-01-01

    Many people have concealable stigmatized identities: Identities that can be hidden from others and that are socially devalued and negatively stereotyped. Understanding how these concealable stigmatized identities affect psychological well-being is critical. We present our model of the components of concealable stigmatized identities including valenced content – internalized stigma, experienced discrimination, anticipated stigma, disclosure reactions, and counter-stereotypic/positive informati...

  2. Segmentation of Concealed Objects in Passive Millimeter-Wave Images Based on the Gaussian Mixture Model

    Science.gov (United States)

    Yu, Wangyang; Chen, Xiangguang; Wu, Lei

    2015-04-01

    Passive millimeter wave (PMMW) imaging has become one of the most effective means to detect the objects concealed under clothing. Due to the limitations of the available hardware and the inherent physical properties of PMMW imaging systems, images often exhibit poor contrast and low signal-to-noise ratios. Thus, it is difficult to achieve ideal results by using a general segmentation algorithm. In this paper, an advanced Gaussian Mixture Model (GMM) algorithm for the segmentation of concealed objects in PMMW images is presented. Our work is concerned with the fact that the GMM is a parametric statistical model, which is often used to characterize the statistical behavior of images. Our approach is three-fold: First, we remove the noise from the image using both a notch reject filter and a total variation filter. Next, we use an adaptive parameter initialization GMM algorithm (APIGMM) for simulating the histogram of images. The APIGMM provides an initial number of Gaussian components and start with more appropriate parameter. Bayesian decision is employed to separate the pixels of concealed objects from other areas. At last, the confidence interval (CI) method, alongside local gradient information, is used to extract the concealed objects. The proposed hybrid segmentation approach detects the concealed objects more accurately, even compared to two other state-of-the-art segmentation methods.

  3. Fiber Optic Coupled Raman Based Detection of Hazardous Liquids Concealed in Commercial Products

    Directory of Open Access Journals (Sweden)

    Michael L. Ramírez-Cedeño

    2012-01-01

    Full Text Available Raman spectroscopy has been widely proposed as a technique to nondestructively and noninvasively interrogate the contents of glass and plastic bottles. In this work, Raman spectroscopy is used in a concealed threat scenario where hazardous liquids have been intentionally mixed with common consumer products to mask its appearance or spectra. The hazardous liquids under consideration included the chemical warfare agent (CWA simulant triethyl phosphate (TEP, hydrogen peroxide, and acetone as representative of toxic industrial compounds (TICs. Fiber optic coupled Raman spectroscopy (FOCRS and partial least squares (PLS algorithm analysis were used to quantify hydrogen peroxide in whiskey, acetone in perfume, and TEP in colored beverages. Spectral data was used to evaluate if the hazardous liquids can be successfully concealed in consumer products. Results demonstrated that FOC-RS systems were able to discriminate between nonhazardous consumer products and mixtures with hazardous materials at concentrations lower than 5%.

  4. Expanded opportunities of THz passive camera for the detection of concealed objects

    Science.gov (United States)

    Trofimov, Vyacheslav A.; Trofimov, Vladislav V.; Kuchik, Igor E.

    2013-10-01

    Among the security problems, the detection of object implanted into either the human body or animal body is the urgent problem. At the present time the main tool for the detection of such object is X-raying only. However, X-ray is the ionized radiation and therefore can not be used often. Other way for the problem solving is passive THz imaging using. In our opinion, using of the passive THz camera may help to detect the object implanted into the human body under certain conditions. The physical reason of such possibility arises from temperature trace on the human skin as a result of the difference in temperature between object and parts of human body. Modern passive THz cameras have not enough resolution in temperature to see this difference. That is why, we use computer processing to enhance the passive THz camera resolution for this application. After computer processing of images captured by passive THz camera TS4, developed by ThruVision Systems Ltd., we may see the pronounced temperature trace on the human body skin from the water, which is drunk by person, or other food eaten by person. Nevertheless, there are many difficulties on the way of full soution of this problem. We illustrate also an improvement of quality of the image captured by comercially available passive THz cameras using computer processing. In some cases, one can fully supress a noise on the image without loss of its quality. Using computer processing of the THz image of objects concealed on the human body, one may improve it many times. Consequently, the instrumental resolution of such device may be increased without any additional engineering efforts.

  5. National Institute of Justice (NIJ) Requirements Definition, Advanced Generation Interoperability for Law Enforcement (AGILE) Program Development, and Technical Assistance

    National Research Council Canada - National Science Library

    DeCarlo, Robert

    2001-01-01

    .... The current technology thrust areas for the Northeast Region are Concealed Weapons Detection, Secure Communications, Computer Forensics, Passive Location Tracking and Tagging, Information Management...

  6. National Institute of Justice (NIJ) Requirements Definition and Technical Assistance

    National Research Council Canada - National Science Library

    DeCarlo, Robert

    1999-01-01

    .... The current technology thrust areas for the Northeast Region are Concealed Weapons Detection, Secure Communication, Timeline Analysis, Computer Forensics, Passive Location Tracking and Tagging, Audio...

  7. National Institute of Justice (NIJ) Center Requirements Definition, Technical Assistance, and Analysis

    National Research Council Canada - National Science Library

    Frantz, Frederick

    2003-01-01

    .... The current technology thrust areas for the Northeast Region are Concealed Weapons Detection, Secure Communications, Computer Forensics, Information Management, AGILE, and various technical assistance projects...

  8. Passive Millimeter-Wave Imaging for the Detection of Concealed Weapons

    National Research Council Canada - National Science Library

    Martin, Chris

    2005-01-01

    .... A frequency-scanned phased-array antenna paired with a number of quasi-optical MMW processing boards allows the system to create a wide field-of-view video rate image while using a relatively small...

  9. Intra- and interpersonal consequences of experimentally induced concealment

    NARCIS (Netherlands)

    Bouman, T.K.

    2003-01-01

    Secrecy, concealment, and thought supression are assumed to be important aspects of psychopathology. However, most studies address these from an intrapersonal perspective. This study investigates both the intra- as well as the interpersonal consequences of experimentally induced concealment. Two

  10. A Concealed Car Extraction Method Based on Full-Waveform LiDAR Data

    Directory of Open Access Journals (Sweden)

    Chuanrong Li

    2016-01-01

    Full Text Available Concealed cars extraction from point clouds data acquired by airborne laser scanning has gained its popularity in recent years. However, due to the occlusion effect, the number of laser points for concealed cars under trees is not enough. Thus, the concealed cars extraction is difficult and unreliable. In this paper, 3D point cloud segmentation and classification approach based on full-waveform LiDAR was presented. This approach first employed the autocorrelation G coefficient and the echo ratio to determine concealed cars areas. Then the points in the concealed cars areas were segmented with regard to elevation distribution of concealed cars. Based on the previous steps, a strategy integrating backscattered waveform features and the view histogram descriptor was developed to train sample data of concealed cars and generate the feature pattern. Finally concealed cars were classified by pattern matching. The approach was validated by full-waveform LiDAR data and experimental results demonstrated that the presented approach can extract concealed cars with accuracy more than 78.6% in the experiment areas.

  11. What's on your mind? Recent advances in memory detection using the Concealed Information Test

    NARCIS (Netherlands)

    Verschuere, B.; Meijer, E.H.

    2014-01-01

    Lie detectors can be applied in a wide variety of settings. But this advantage comes with a considerable cost: False positives. The applicability of the Concealed Information Test (CIT) is more limited, yet when it can be applied, the risk of false accusations can be set a priori at a very low

  12. Quantum Image Steganography and Steganalysis Based On LSQu-Blocks Image Information Concealing Algorithm

    Science.gov (United States)

    A. AL-Salhi, Yahya E.; Lu, Songfeng

    2016-08-01

    Quantum steganography can solve some problems that are considered inefficient in image information concealing. It researches on Quantum image information concealing to have been widely exploited in recent years. Quantum image information concealing can be categorized into quantum image digital blocking, quantum image stereography, anonymity and other branches. Least significant bit (LSB) information concealing plays vital roles in the classical world because many image information concealing algorithms are designed based on it. Firstly, based on the novel enhanced quantum representation (NEQR), image uniform blocks clustering around the concrete the least significant Qu-block (LSQB) information concealing algorithm for quantum image steganography is presented. Secondly, a clustering algorithm is proposed to optimize the concealment of important data. Finally, we used Con-Steg algorithm to conceal the clustered image blocks. Information concealing located on the Fourier domain of an image can achieve the security of image information, thus we further discuss the Fourier domain LSQu-block information concealing algorithm for quantum image based on Quantum Fourier Transforms. In our algorithms, the corresponding unitary Transformations are designed to realize the aim of concealing the secret information to the least significant Qu-block representing color of the quantum cover image. Finally, the procedures of extracting the secret information are illustrated. Quantum image LSQu-block image information concealing algorithm can be applied in many fields according to different needs.

  13. The nuclear car wash: A system to detect nuclear weapons in commercial cargo shipments

    Science.gov (United States)

    Slaughter, D. R.; Accatino, M. R.; Bernstein, A.; Biltoft, P.; Church, J. A.; Descalle, M. A.; Hall, J. M.; Manatt, D. R.; Mauger, G. J.; Moore, T. L.; Norman, E. B.; Petersen, D. C.; Pruet, J. A.; Prussin, S. G.

    2007-08-01

    A concept for detecting the presence of special nuclear material ( 235U or 239Pu) concealed in intermodal cargo containers has been developed, studied, and recent performance results are described. It is based on interrogation with a pulsed beam of 3-7 MeV neutrons that produce fission events and subsequent detection of their β-delayed neutron emission or β-delayed high-energy γ-radiation reveals the presence of fissionable material. Fission product β-delayed γ-rays above 3 MeV are nearly 10 times more abundant than β-delayed neutrons and are distinct from natural radioactivity and from nearly all of the induced activity in a normal cargo. Detector backgrounds and potential interferences with the fission signature radiation have been identified and quantified. Their impact on detection sensitivity is relatively minor and can be addressed readily. Components of a simple laboratory prototype have been assembled, tested with the most challenging cargo threat scenarios, and results compared to computer simulations. Preliminary results will be presented.

  14. The nuclear car wash: A system to detect nuclear weapons in commercial cargo shipments

    International Nuclear Information System (INIS)

    Slaughter, D.R.; Accatino, M.R.; Bernstein, A.; Biltoft, P.; Church, J.A.; Descalle, M.A.; Hall, J.M.; Manatt, D.R.; Mauger, G.J.; Moore, T.L.; Norman, E.B.; Petersen, D.C.; Pruet, J.A.; Prussin, S.G.

    2007-01-01

    A concept for detecting the presence of special nuclear material ( 235 U or 239 Pu) concealed in intermodal cargo containers has been developed, studied, and recent performance results are described. It is based on interrogation with a pulsed beam of 3-7 MeV neutrons that produce fission events and subsequent detection of their β-delayed neutron emission or β-delayed high-energy γ-radiation reveals the presence of fissionable material. Fission product β-delayed γ-rays above 3 MeV are nearly 10 times more abundant than β-delayed neutrons and are distinct from natural radioactivity and from nearly all of the induced activity in a normal cargo. Detector backgrounds and potential interferences with the fission signature radiation have been identified and quantified. Their impact on detection sensitivity is relatively minor and can be addressed readily. Components of a simple laboratory prototype have been assembled, tested with the most challenging cargo threat scenarios, and results compared to computer simulations. Preliminary results will be presented

  15. Management of concealed penis with modified penoplasty.

    Science.gov (United States)

    Xu, Jian-Guo; Lv, Chuan; Wang, Yu-Chong; Zhu, Ji; Xue, Chun-Yu

    2015-03-01

    To investigate the effect of penile degloving in combination with penoscrotal angle reconstruction for the correction of concealed penis. A foreskin circumcision incision was made along the coronal sulcus. After a sharp dissection under the superficial layer of tunica albuginea, the penile shaft was degloved to release the fibrous bands of the tunica dartos. Through a longitudinal incision or Z-plasty at the penoscrotal junction, securing of the tunica albuginea to the proximal tunica dartos was performed. The penoscrotal angle was reconstructed. This procedure effectively corrected the concealed penis, while correcting other problems such as phimosis. From August 2008 to August 2013, we performed 41 procedures for concealed penis. Correction was successful in all patients with an improved median length of 2.1 cm in the flaccid state. Follow-up ranged from 6 months to 2 years, and satisfactory cosmetic outcomes were obtained without scars or erectile discomfort. Our technique includes degloving and penoscrotal angle reconstruction, which provides proper visualization for fixation of the penile base. The longitudinal or Z-plasty incision also opened the degloving dead cavity, which was good for drainage. The procedure is straight forward with good functional and cosmetic outcomes and is thus ideal for correction of the concealed penis. Copyright © 2015 Elsevier Inc. All rights reserved.

  16. Prevention of firearm-related injuries with restrictive licensing and concealed carry laws: An Eastern Association for the Surgery of Trauma systematic review.

    Science.gov (United States)

    Crandall, Marie; Eastman, Alexander; Violano, Pina; Greene, Wendy; Allen, Steven; Block, Ernest; Christmas, Ashley Britton; Dennis, Andrew; Duncan, Thomas; Foster, Shannon; Goldberg, Stephanie; Hirsh, Michael; Joseph, D'Andrea; Lommel, Karen; Pappas, Peter; Shillinglaw, William

    2016-11-01

    In the past decade, more than 300,000 people in the United States have died from firearm injuries. Our goal was to assess the effectiveness of two particular prevention strategies, restrictive licensing of firearms and concealed carry laws, on firearm-related injuries in the US Restrictive Licensing was defined to include denials of ownership for various offenses, such as performing background checks for domestic violence and felony convictions. Concealed carry laws allow licensed individuals to carry concealed weapons. A comprehensive review of the literature was performed. We used Grading of Recommendations Assessment, Development, and Evaluation methodology to assess the breadth and quality of the data specific to our Population, Intervention, Comparator, Outcomes (PICO) questions. A total of 4673 studies were initially identified, then seven more added after two subsequent, additional literature reviews. Of these, 3,623 remained after removing duplicates; 225 case reports, case series, and reviews were excluded, and 3,379 studies were removed because they did not focus on prevention or did not address our comparators of interest. This left a total of 14 studies which merited inclusion for PICO 1 and 13 studies which merited inclusion for PICO 2. PICO 1: We recommend the use of restrictive licensing to reduce firearm-related injuries.PICO 2: We recommend against the use of concealed carry laws to reduce firearm-related injuries.This committee found an association between more restrictive licensing and lower firearm injury rates. All 14 studies were population-based, longitudinal, used modeling to control for covariates, and 11 of the 14 were multi-state. Twelve of the studies reported reductions in firearm injuries, from 7% to 40%. We found no consistent effect of concealed carry laws. Of note, the varied quality of the available data demonstrates a significant information gap, and this committee recommends that we as a society foster a nurturing and encouraging

  17. [Cardioversion for paroxysmal supraventricular tachycardia during lung surgery in a patient with concealed Wolff-Parkinson-White syndrome].

    Science.gov (United States)

    Sato, Yoshiharu; Nagata, Hirofumi; Inoda, Ayako; Miura, Hiroko; Watanabe, Yoko; Suzuki, Kenji

    2014-10-01

    We report a case of paroxysmal supraventricular tachycardia (PSVT) that occurred during video-assisted thoracoscopic (VATS) lobectomy in a patient with concealed Wolff-Parkinson-White (WPW) syndrome. A 59-year-old man with lung cancer was scheduled for VATS lobectomy under general anesthesia. After inserting a thoracic epidural catheter, general anesthesia was induced with intravenous administration of propofol. Anesthesia was maintained with inhalation of desfurane in an air/oxygen mixture and intravenous infusion of remifentanil. Recurrent PSVT occurred three times, and the last episode of PSVT continued for 50 minutes regardless of administration of antiarrhythmic drugs. Synchronized electric shock via adhesive electrode pads on the patient's chest successfully converted PSVT back to normal sinus rhythm. The remaining course and postoperative period were uneventful. An electrophysiological study performed after hospital discharge detected concealed WPW syndrome, which had contributed to the development of atrioventricular reciprocating tachycardia. Concealed WPW syndrome is a rare, but critical complication that could possibly cause lethal atrial tachyarrhythmias during the perioperative period. In the present case, cardioversion using adhesive electrode pads briefly terminated PSVT in a patient with concealed WPW syndrome.

  18. Concealing Emotions at Work Is Associated with Allergic Rhinitis in Korea.

    Science.gov (United States)

    Seok, Hongdeok; Yoon, Jin-Ha; Won, Jong-Uk; Lee, Wanhyung; Lee, June-Hee; Jung, Pil Kyun; Roh, Jaehoon

    2016-01-01

    Concealing emotions at work can cause considerable psychological stress. While there is extensive research on the adverse health effects of concealing emotions and the association between allergic diseases and stress, research has not yet investigated whether concealing emotions at work is associated with allergic rhinitis. Allergic rhinitis is a common disease in many industrialized countries, and its prevalence is increasing. Thus, our aim was to determine the strength of this association using data from three years (2007-2009) of the 4th Korean National Health and Nutrition Examination Survey. Participants (aged 20-64) were 8,345 individuals who were economically active and who had completed the questionnaire items on concealing emotions at work. Odds ratio (OR) and 95% confidence intervals (95% CIs) were calculated for allergic rhinitis using logistic regression models. Among all participants, 3,140 subjects (37.6%) reported concealing their emotions at work: 1,661 men and 1,479 women. The OR (95% CIs) for allergic rhinitis among those who concealed emotions at work versus those who did not was 1.318 (1.148-1.512). Stratified by sex, the OR (95% CIs) was 1.307 (1.078-1.585) among men and 1.346 (1.105-1.639) among women. Thus, individuals who concealed their emotions at work were significantly more likely to have a diagnosis of AR in comparison to those who did not. Because concealing emotions at work has adverse health effects, labor policies that aim to reduce this practice are needed.

  19. Dynamic detection-rate-based bit allocation with genuine interval concealment for binary biometric representation.

    Science.gov (United States)

    Lim, Meng-Hui; Teoh, Andrew Beng Jin; Toh, Kar-Ann

    2013-06-01

    Biometric discretization is a key component in biometric cryptographic key generation. It converts an extracted biometric feature vector into a binary string via typical steps such as segmentation of each feature element into a number of labeled intervals, mapping of each interval-captured feature element onto a binary space, and concatenation of the resulted binary output of all feature elements into a binary string. Currently, the detection rate optimized bit allocation (DROBA) scheme is one of the most effective biometric discretization schemes in terms of its capability to assign binary bits dynamically to user-specific features with respect to their discriminability. However, we learn that DROBA suffers from potential discriminative feature misdetection and underdiscretization in its bit allocation process. This paper highlights such drawbacks and improves upon DROBA based on a novel two-stage algorithm: 1) a dynamic search method to efficiently recapture such misdetected features and to optimize the bit allocation of underdiscretized features and 2) a genuine interval concealment technique to alleviate crucial information leakage resulted from the dynamic search. Improvements in classification accuracy on two popular face data sets vindicate the feasibility of our approach compared with DROBA.

  20. Modified penoplasty for concealed penis in children.

    Science.gov (United States)

    Yang, Tianyou; Zhang, Liyu; Su, Cheng; Li, Zhongmin; Wen, Yingquan

    2013-09-01

    To report a modified penoplasty technique for concealed penis in children. Between January 2006 and June 2012, 201 cases of concealed penis were surgically repaired with modified penoplasty. The modified penoplasty technique consisted of 3 major steps: (1) degloved the penile skin and excised the inner prepuce, (2) advanced penoscrotal skin to cover penile shaft, and (3) fixed the penis base and reconstructed the penoscrotal angle. Two hundred one cases of concealed penis were enrolled in this study over a period of 6 years. Mean age at the time of surgery was 5.3 years (range 1-13 years) and mean operative time was 40 minutes (range 30-65minutes). All patients were routinely followed up at 1, 3, and 6 months after surgery. Most patients developed postoperative edema and were resolved within 1 month, whereas 20 cases developed prolonged postoperative edema, especially at the site of frenulum, which took 3 months to be resolved. Ten cases had retraction after surgery. No erection difficulties were recorded. Patients/parents reported better hygiene and improved visualization and accessibility of penis after surgery and were satisfied with the cosmetic outcome. The result of this study shows that the modified penoplasty technique is a simple, safe, and effective procedure for concealed penis with satisfied cosmetic outcome. Copyright © 2013 Elsevier Inc. All rights reserved.

  1. Management of a Concealable Stigmatized Identity: A Qualitative Study of Concealment, Disclosure, and Role Flexing Among Young, Resilient Sexual and Gender Minority Individuals.

    Science.gov (United States)

    Bry, Laura Jane; Mustanski, Brian; Garofalo, Robert; Burns, Michelle Nicole

    2017-01-01

    Disclosure of a sexual or gender minority status has been associated with both positive and negative effects on wellbeing. Few studies have explored the disclosure and concealment process in young people. Interviews were conducted with 10 sexual and/or gender minority individuals, aged 18-22 years, of male birth sex. Data were analyzed qualitatively, yielding determinants and effects of disclosure and concealment. Determinants of disclosure included holding positive attitudes about one's identity and an implicit devaluation of acceptance by society. Coming out was shown to have both positive and negative effects on communication and social support and was associated with both increases and decreases in experiences of stigma. Determinants of concealment included lack of comfort with one's identity and various motivations to avoid discrimination. Concealment was also related to hypervigilance and unique strategies of accessing social support. Results are discussed in light of their clinical implications.

  2. Video error concealment using block matching and frequency selective extrapolation algorithms

    Science.gov (United States)

    P. K., Rajani; Khaparde, Arti

    2017-06-01

    Error Concealment (EC) is a technique at the decoder side to hide the transmission errors. It is done by analyzing the spatial or temporal information from available video frames. It is very important to recover distorted video because they are used for various applications such as video-telephone, video-conference, TV, DVD, internet video streaming, video games etc .Retransmission-based and resilient-based methods, are also used for error removal. But these methods add delay and redundant data. So error concealment is the best option for error hiding. In this paper, the error concealment methods such as Block Matching error concealment algorithm is compared with Frequency Selective Extrapolation algorithm. Both the works are based on concealment of manually error video frames as input. The parameter used for objective quality measurement was PSNR (Peak Signal to Noise Ratio) and SSIM(Structural Similarity Index). The original video frames along with error video frames are compared with both the Error concealment algorithms. According to simulation results, Frequency Selective Extrapolation is showing better quality measures such as 48% improved PSNR and 94% increased SSIM than Block Matching Algorithm.

  3. An Exploratory Investigation of Social Stigma and Concealment in Patients with Multiple Sclerosis.

    Science.gov (United States)

    Cook, Jonathan E; Germano, Adriana L; Stadler, Gertraud

    2016-01-01

    We conducted a preliminary investigation into dimensions of stigma and their relation to disease concealment in a sample of American adults living with multiple sclerosis (MS). Fifty-three adults with MS in the United States completed an online survey assessing anticipated, internalized, and isolation stigma, as well as concealment. Responses to all the scales were relatively low, on average, but above scale minimums (P stigma and concealment were highest. Anticipated stigma strongly predicted concealment. Many adults living with MS may be concerned that they will be the target of social stigma because of their illness. These concerns are associated with disease concealment. More research is needed to investigate how MS stigma and concealment may be independent contributors to health in patients with MS.

  4. Applying Agile MethodstoWeapon/Weapon-Related Software

    Energy Technology Data Exchange (ETDEWEB)

    Adams, D; Armendariz, M; Blackledge, M; Campbell, F; Cloninger, M; Cox, L; Davis, J; Elliott, M; Granger, K; Hans, S; Kuhn, C; Lackner, M; Loo, P; Matthews, S; Morrell, K; Owens, C; Peercy, D; Pope, G; Quirk, R; Schilling, D; Stewart, A; Tran, A; Ward, R; Williamson, M

    2007-05-02

    This white paper provides information and guidance to the Department of Energy (DOE) sites on Agile software development methods and the impact of their application on weapon/weapon-related software development. The purpose of this white paper is to provide an overview of Agile methods, examine the accepted interpretations/uses/practices of these methodologies, and discuss the applicability of Agile methods with respect to Nuclear Weapons Complex (NWC) Technical Business Practices (TBPs). It also provides recommendations on the application of Agile methods to the development of weapon/weapon-related software.

  5. Development and validation of the Body Concealment Scale for Scleroderma

    NARCIS (Netherlands)

    Jewett, L.R.; Malcarne, V.L.; Kwakkenbos, C.M.C.; Harcourt, D.; Rumsey, N.; Körner, A.; Steele, R.J.; Hudson, M.; Baron, M.; Haythornthwaite, J.A.; Heinberg, L.; Wigley, F.M.; Thombs, B.D.

    2016-01-01

    Objective: Body concealment is a component of social avoidance among people with visible differences from disfiguring conditions, including systemic sclerosis (SSc). The study objective was to develop a measure of body concealment related to avoidance behaviors in SSc. Methods: Initial items for the

  6. Concealed identification symbols and nondestructive determination of the identification symbols

    Science.gov (United States)

    Nance, Thomas A.; Gibbs, Kenneth M.

    2014-09-16

    The concealing of one or more identification symbols into a target object and the subsequent determination or reading of such symbols through non-destructive testing is described. The symbols can be concealed in a manner so that they are not visible to the human eye and/or cannot be readily revealed to the human eye without damage or destruction of the target object. The identification symbols can be determined after concealment by e.g., the compilation of multiple X-ray images. As such, the present invention can also provide e.g., a deterrent to theft and the recovery of lost or stolen objects.

  7. Concealing their communication: exploring psychosocial predictors of young drivers' intentions and engagement in concealed texting.

    Science.gov (United States)

    Gauld, Cassandra S; Lewis, Ioni; White, Katherine M

    2014-01-01

    Making a conscious effort to hide the fact that you are texting while driving (i.e., concealed texting) is a deliberate and risky behaviour involving attention diverted away from the road. As the most frequent users of text messaging services and mobile phones while driving, young people appear at heightened risk of crashing from engaging in this behaviour. This study investigated the phenomenon of concealed texting while driving, and utilised an extended Theory of Planned Behaviour (TPB) including the additional predictors of moral norm, mobile phone involvement, and anticipated regret to predict young drivers' intentions and subsequent behaviour. Participants (n=171) were aged 17-25 years, owned a mobile phone, and had a current driver's licence. Participants completed a questionnaire measuring their intention to conceal texting while driving, and a follow-up questionnaire a week later to report their behavioural engagement. The results of hierarchical multiple regression analyses showed overall support for the predictive utility of the TPB with the standard constructs accounting for 69% of variance in drivers' intentions, and the extended predictors contributing an additional 6% of variance in intentions over and above the standard constructs. Attitude, subjective norm, PBC, moral norm, and mobile phone involvement emerged as significant predictors of intentions; and intention was the only significant predictor of drivers' self-reported behaviour. These constructs can provide insight into key focal points for countermeasures including advertising and other public education strategies aimed at influencing young drivers to reconsider their engagement in this risky behaviour. Copyright © 2013 Elsevier Ltd. All rights reserved.

  8. Terror weapons. Ridding the world of nuclear, biological and chemical weapons - Commission on mass destruction weapons

    International Nuclear Information System (INIS)

    Blix, H.; Journe, V.

    2010-01-01

    This book approaches in 8 chapters the ambitious challenge of ridding the world of all mass destruction weapons: 1 - re-launching disarmament; 2 - terror weapons: nature of threats and answers (weakness of traditional answers, counter-proliferation); 3 - nuclear weapons: preventing proliferation and terrorism, reducing threat and nuclear weapons number, from regulation to banning); 4 - biological or toxin weapons; 5 - chemical weapons; 6 - vectors, anti-missile defenses and space weapons; 7 - exports control, international assistance and non-governmental actors; 8 - respect, verification, enforcement and role of the United Nations. The recommendations and works of the Commission are presented in appendix together with the declaration adopted on April 30, 2009. (J.S.)

  9. Regulatory focus moderates the social performance of individuals who conceal a stigmatized identity.

    Science.gov (United States)

    Newheiser, Anna-Kaisa; Barreto, Manuela; Ellemers, Naomi; Derks, Belle; Scheepers, Daan

    2015-12-01

    People often choose to hide a stigmatized identity to avoid bias. However, hiding stigma can disrupt social interactions. We considered whether regulatory focus qualifies the social effects of hiding stigma by examining interactions in which stigmatized participants concealed a devalued identity from non-stigmatized partners. In the Prevention Focus condition, stigmatized participants were instructed to prevent a negative impression by concealing the identity; in the Promotion Focus condition, they were instructed to promote a positive impression by concealing the identity; in the Control condition, they were simply asked to conceal the identity. Both non-stigmatized partners and independent raters rated the interactions more positively in the Promotion Focus condition. Thus, promotion focus is interpersonally beneficial for individuals who conceal a devalued identity. © 2015 The British Psychological Society.

  10. Director of Innovation. Volume 3, November 2009

    Science.gov (United States)

    2009-11-01

    evaluated at Crimson Vi- per 2009 included the Portable Acoustic Contraband Detector (PACD) and the Fluxgate Magnetometer , two projects from SPAWAR...concealed within the containers. The Fluxgate Magnetometer is a hockey puck-sized sensor head that can detect vehicles and weapons by measuring

  11. Superiority of visual (verbal) vs. auditory test presentation modality in a P300-based CIT: The Complex Trial Protocol for concealed autobiographical memory detection.

    Science.gov (United States)

    Deng, Xiaohong; Rosenfeld, J Peter; Ward, Anne; Labkovsky, Elena

    2016-07-01

    This paper continues our efforts to determine which modality is best for presentation of stimuli in the P300-based concealed information test (CIT) called the Complex Trial Protocol (CTP). The first part of the CTP trial involves presentation of the key probe or irrelevant stimuli, and is followed by presentation of target (T) or non-target (NT). In Rosenfeld et al. (2015), probes and irrelevants regularly alternated modality over trials, but Ts and NTs were always visual. In the present study, (in both its experiments, EXP 1 and EXP 2), probes and irrelevants alternated modalities on successive trials, as before. In present EXP 1, Ts and NTs were always auditory, but in EXP 2, they were simultaneously auditory and visual. Probe P300 data were different in each study: In Rosenfeld et al. (2015) and EXP 2 here, the bootstrap-based detection rates based on probe-minus-irrelevant differences, significantly differed favoring visual probe and irrelevant presentation modality. In EXP 1 here, detection rates were the same for the two modalities. In Rosenfeld et al. (2015) there was no main effect of probe modality, visual vs. auditory on probe-minus-irrelevant P300 difference. There were such effects here in EXP 1 (pvisual modality. Probe P300 latencies were shorter for visual than for auditory stimuli in Rosenfeld et al. (2015), a trend specifically reversed in the present pair of studies. RT was faster for visual stimuli in the present studies. The T and NT modality appears to interact with probe/irrelevant modality, and the best protocol for detecting concealed information is with the 2015 study protocol or that of EXP 2, using visual stimulus presentation. Copyright © 2016 Elsevier B.V. All rights reserved.

  12. Compressed Domain Packet Loss Concealment of Sinusoidally Coded Speech

    DEFF Research Database (Denmark)

    Rødbro, Christoffer A.; Christensen, Mads Græsbøll; Andersen, Søren Vang

    2003-01-01

    We consider the problem of packet loss concealment for voice over IP (VoIP). The speech signal is compressed at the transmitter using a sinusoidal coding scheme working at 8 kbit/s. At the receiver, packet loss concealment is carried out working directly on the quantized sinusoidal parameters......, based on time-scaling of the packets surrounding the missing ones. Subjective listening tests show promising results indicating the potential of sinusoidal speech coding for VoIP....

  13. Face and voice as social stimuli enhance differential physiological responding in a Concealed Information Test

    Directory of Open Access Journals (Sweden)

    Wolfgang eAmbach

    2012-11-01

    Full Text Available Attentional, intentional, and motivational factors are known to influence the physiological responses in a Concealed Information Test (CIT. Although concealing information is essentially a social action closely related to motivation, CIT studies typically rely on testing participants in an environment lacking of social stimuli: Subjects interact with a computer while sitting alone in an experimental room. To address this gap, we examined the influence of social stimuli on the physiological responses in a CIT.Seventy-one participants underwent a mock-crime experiment with a modified CIT. In a between-subjects design, subjects were either questioned acoustically by a pre-recorded male voice presented together with a virtual male experimenter’s uniform face or by a text field on the screen, which displayed the question devoid of face and voice. Electrodermal activity (EDA, respiration line length (RLL, phasic heart rate (pHR, and finger pulse waveform length (FPWL were registered. The Psychopathic Personality Inventory - Revised (PPI-R was administered in addition. The differential responses of RLL, pHR, and FPWL to probe vs. irrelevant items were greater in the condition with social stimuli than in the text condition; interestingly, the differential responses of EDA did not differ between conditions. No modulatory influence of the PPI-R sum or subscale scores was found.The results emphasize the relevance of social aspects in the process of concealing information and in its detection. Attentional demands as well as the participants’ motivation to avoid detection might be the important links between social stimuli and physiological responses in the CIT.

  14. The association between concealing emotions at work and medical utilization in Korea.

    Science.gov (United States)

    Seok, Hongdeok; Yoon, Jin-Ha; Lee, Wanhyung; Lee, June-Hee; Jung, Pil Kyun; Kim, Inah; Won, Jong-Uk; Roh, Jaehoon

    2014-01-01

    We aimed to investigate the association between concealing emotions at work and medical utilization. Data from the 2007-2009 4th Korea National Health and Nutrition Examination Survey (KNHANES IV) was used, 7,094 participants (3,837 males, 3,257 females) aged between 20 and 54 who were economically active and completed all necessary questionnaire items were included. Odds ratios (ORs) and 95% confidence intervals (95% CI) for differences in hospitalization, outpatient visits, and pharmaceutical drug use between those who concealed their emotions and those who did not were investigated using logistic regression models with and without gender stratification. Among those who concealed their emotions (n = 2,763), 47.4% were females, and 50.1% had chronic disease. In addition, 9.7% of the concealing emotions group had been hospitalized within the last year, 24.8% had been outpatients in the last two weeks, and 28.3% had used pharmaceutical drugs in the last two weeks. All ORs represent the odds of belonging to the concealing emotions group over the non-concealing emotions group. After adjustment for individual, occupational, socioeconomic and disease factors, the adjusted ORs (95% CI) in hospitalization are 1.29 (1.08 ~ 1.53) in the total population, 1.25 (0.98 ~ 1.60) in males and 1.30 (1.02 ~ 1.66) in females, in outpatient visits are 1.15 (1.02 ~ 1.29) in the total population, 1.05 (0.88 ~ 1.24) in males and 1.25 (1.06 ~ 1.47) in females and in pharmaceutical drug use are 1.12 (1.01 ~ 1.25) in the total population, 1.08 (0.92 ~ 1.27) in males and 1.14 (0.98 ~ 1.33) in females. Those who concealed their emotions at work were more likely to use medical services. Moreover, the health effects of concealing emotions at work might be more detrimental in women than in men.

  15. The weapons effect.

    Science.gov (United States)

    Benjamin, Arlin James; Bushman, Brad J

    2018-02-01

    In some societies, weapons are plentiful and highly visible. This review examines recent trends in research on the weapons effect, which is the finding that the mere presence of weapons can prime people to behave aggressively. The General Aggression Model provides a theoretical framework to explain why the weapons effect occurs. This model postulates that exposure to weapons increases aggressive thoughts and hostile appraisals, thus explaining why weapons facilitate aggressive behavior. Data from meta-analytic reviews are consistent with the General Aggression Model. These findings have important practical as well as theoretical implications. They suggest that the link between weapons and aggression is very strong in semantic memory, and that merely seeing a weapon can make people more aggressive. Copyright © 2017 Elsevier Ltd. All rights reserved.

  16. Development of a High-Throughput Microwave Imaging System for Concealed Weapons Detection

    Science.gov (United States)

    2016-07-15

    hardware. Index Terms—Microwave imaging, multistatic radar, Fast Fourier Transform (FFT). I. INTRODUCTION Near-field microwave imaging is a non- ionizing ...real-time microwave camera at 24 ghz,” IEEE Transactions on Antennas and Propagation , vol. 60, no. 2, pp. 1114– 1125, 2012. [2] E. C. Fear, X. Li, S. C...on Biomedical Engineering, vol. 49, no. 8, pp. 812–822, 2002. [3] D. M. Sheen, D. L. McMakin, and T. E. Hall, “Three-dimensional millimeter- wave

  17. Medical makeup for concealing facial scars.

    Science.gov (United States)

    Mee, Donna; Wong, Brian J F

    2012-10-01

    Surgical, laser, and pharmacological therapies are all used to correct scars and surgical incisions, though have limits with respect to how well facial skin can be restored or enhanced. The use of cosmetics has long been a relevant adjunct to all scar treatment modalities. In recent years, technical advancements in the chemistry and composition of cosmetic products have provided the patient with a broader range of products to employ for concealing scars. This review will provide an overview of contemporary methods for concealing facial scars, birthmarks, and pigmentary changes without the use of traditional/dated, heavy appearing camouflage products. Additionally, general guidelines and information will be provided with respect to identifying competent makeup artists for care of the medical patient. The article by no means is meant to be a tutorial, but rather serves as a starting point in this allied field of medicine. Thieme Medical Publishers 333 Seventh Avenue, New York, NY 10001, USA.

  18. Detecting concealed information from groups using a dynamic questioning approach: simultaneous skin conductance measurement and immediate feedback

    Directory of Open Access Journals (Sweden)

    Ewout H Meijer

    2013-02-01

    Full Text Available Lie detection procedures typically aim at determining the guilt or innocence of a single suspect. The Concealed Information Test (CIT, for example, has been shown to be highly successful in detecting the presence or absence of crime-related information in a suspect’s memory. Many of today’s security threats, however, do not come from individuals, but from organized groups such as criminal organizations or terrorist networks. In this study, we tested whether a plan of an upcoming mock terrorist attack could be extracted from a group of suspects using a dynamic questioning approach. One-hundred participants were tested in 20 groups of 5. Each group was asked to plan a mock terrorist attack based on a list of potential countries, cities and streets. Next, three questions referring to the country, city, and street were presented, each with 5 options. Skin conductance in all 5 members of the group was measured simultaneously during this presentation. The dynamic questioning approach entailed direct analysis of the data, and if the average skin conductance of the group to a certain option exceeded a threshold, this option was followed up. E.g., if the reaction to the option ‘Italy’ exceeded the threshold, this was followed up by presenting 5 cities in Italy. Results showed that in 19 of the 20 groups the country was correctly detected using this procedure. In 13 of these remaining 19 groups the city was correctly detected. In 7 of these 13, the street was also correctly detected. The question about the country resulted in no false positives (out of 20, the question about the city resulted in 2 false positives (out of 19, while the question about the streets resulted in 2 false positives (out of 13. Furthermore, the 2 false positives at the city level also yielded a false positive at the street level. Taken together these results indicate our dynamic questioning approach can help to unveil plans about a mock terrorist attack.

  19. Flexible weapons architecture design

    Science.gov (United States)

    Pyant, William C., III

    Present day air-delivered weapons are of a closed architecture, with little to no ability to tailor the weapon for the individual engagement. The closed architectures require weaponeers to make the target fit the weapon instead of fitting the individual weapons to a target. The concept of a flexible weapons aims to modularize weapons design using an open architecture shell into which different modules are inserted to achieve the desired target fractional damage while reducing cost and civilian casualties. This thesis shows that the architecture design factors of damage mechanism, fusing, weapons weight, guidance, and propulsion are significant in enhancing weapon performance objectives, and would benefit from modularization. Additionally, this thesis constructs an algorithm that can be used to design a weapon set for a particular target class based on these modular components.

  20. Concealed semantic and episodic autobiographical memory electrified.

    Science.gov (United States)

    Ganis, Giorgio; Schendan, Haline E

    2012-01-01

    Electrophysiology-based concealed information tests (CIT) try to determine whether somebody possesses concealed information about a crime-related item (probe) by comparing event-related potentials (ERPs) between this item and comparison items (irrelevants). Although the broader field is sometimes referred to as "memory detection," little attention has been paid to the precise type of underlying memory involved. This study begins addressing this issue by examining the key distinction between semantic and episodic memory in the autobiographical domain within a CIT paradigm. This study also addresses the issue of whether multiple repetitions of the items over the course of the session habituate the brain responses. Participants were tested in a 3-stimulus CIT with semantic autobiographical probes (their own date of birth) and episodic autobiographical probes (a secret date learned just before the study). Results dissociated these two memory conditions on several ERP components. Semantic probes elicited a smaller frontal N2 than episodic probes, consistent with the idea that the frontal N2 decreases with greater pre-existing knowledge about the item. Likewise, semantic probes elicited a smaller central N400 than episodic probes. Semantic probes also elicited a larger P3b than episodic probes because of their richer meaning. In contrast, episodic probes elicited a larger late positive complex (LPC) than semantic probes, because of the recent episodic memory associated with them. All these ERPs showed a difference between probes and irrelevants in both memory conditions, except for the N400, which showed a difference only in the semantic condition. Finally, although repetition affected the ERPs, it did not reduce the difference between probes and irrelevants. These findings show that the type of memory associated with a probe has both theoretical and practical importance for CIT research.

  1. Concealed semantic and episodic autobiographical memory electrified

    Directory of Open Access Journals (Sweden)

    Giorgio eGanis

    2013-01-01

    Full Text Available Electrophysiology-based concealed information tests (CIT try to determine whether somebody possesses concealed information about a probe item by comparing event-related potentials (ERPs between this item and comparison items (irrelevants. Although the broader field is sometimes referred to as memory detection, little attention has been paid to the precise type of underlying memory involved. This study begins addressing this issue by examining the key distinction between semantic and episodic memory in the autobiographical domain within a CIT paradigm. This study also addressed the issue of whether multiple repetitions of the items over the course of the session habituate the brain responses. Participants were tested in a 3-stimulus CIT with semantic autobiographical probes (their own date of birth and episodic autobiographical probes (a secret date learned just before the study. Results dissociated these two memory conditions on several ERP components. Semantic probes elicited a smaller frontal N2 than episodic probes, consistent with the idea that the frontal N2 decreases with greater pre-existing semantic knowledge about the item. Likewise, semantic probes elicited a smaller central N400 than episodic probes. Semantic probes also elicited a larger P3b than episodic probes because of their richer meaning. In contrast, episodic probes elicited a larger late positive component (LPC than semantic probes, because of the recent episodic memory associated with them. All these ERPs showed a difference between probes and irrelevants in both memory conditions, except for the N400, which showed a difference only in the semantic condition. Finally, although repetition affected the ERPs, it did not reduce the difference between probes and irrelevants. Thus, the type of memory associated with a probe has both theoretical and practical importance for CIT research.

  2. Concealed semantic and episodic autobiographical memory electrified

    Science.gov (United States)

    Ganis, Giorgio; Schendan, Haline E.

    2013-01-01

    Electrophysiology-based concealed information tests (CIT) try to determine whether somebody possesses concealed information about a crime-related item (probe) by comparing event-related potentials (ERPs) between this item and comparison items (irrelevants). Although the broader field is sometimes referred to as “memory detection,” little attention has been paid to the precise type of underlying memory involved. This study begins addressing this issue by examining the key distinction between semantic and episodic memory in the autobiographical domain within a CIT paradigm. This study also addresses the issue of whether multiple repetitions of the items over the course of the session habituate the brain responses. Participants were tested in a 3-stimulus CIT with semantic autobiographical probes (their own date of birth) and episodic autobiographical probes (a secret date learned just before the study). Results dissociated these two memory conditions on several ERP components. Semantic probes elicited a smaller frontal N2 than episodic probes, consistent with the idea that the frontal N2 decreases with greater pre-existing knowledge about the item. Likewise, semantic probes elicited a smaller central N400 than episodic probes. Semantic probes also elicited a larger P3b than episodic probes because of their richer meaning. In contrast, episodic probes elicited a larger late positive complex (LPC) than semantic probes, because of the recent episodic memory associated with them. All these ERPs showed a difference between probes and irrelevants in both memory conditions, except for the N400, which showed a difference only in the semantic condition. Finally, although repetition affected the ERPs, it did not reduce the difference between probes and irrelevants. These findings show that the type of memory associated with a probe has both theoretical and practical importance for CIT research. PMID:23355816

  3. Nuclear weapons modernizations

    Energy Technology Data Exchange (ETDEWEB)

    Kristensen, Hans M. [Federation of American Scientists, Washington, DC (United States)

    2014-05-09

    This article reviews the nuclear weapons modernization programs underway in the world's nine nuclear weapons states. It concludes that despite significant reductions in overall weapons inventories since the end of the Cold War, the pace of reductions is slowing - four of the nuclear weapons states are even increasing their arsenals, and all the nuclear weapons states are busy modernizing their remaining arsenals in what appears to be a dynamic and counterproductive nuclear competition. The author questions whether perpetual modernization combined with no specific plan for the elimination of nuclear weapons is consistent with the nuclear Non-Proliferation Treaty and concludes that new limits on nuclear modernizations are needed.

  4. When concealed handgun licensees break bad: criminal convictions of concealed handgun licensees in Texas, 2001-2009.

    Science.gov (United States)

    Phillips, Charles D; Nwaiwu, Obioma; McMaughan Moudouni, Darcy K; Edwards, Rachel; Lin, Szu-hsuan

    2013-01-01

    We explored differences in criminal convictions between holders and nonholders of a concealed handgun license (CHL) in Texas. The Texas Department of Public Safety (DPS) provides annual data on criminal convictions of holders and nonholders of CHLs. We used 2001 to 2009 DPS data to investigate the differences in the distribution of convictions for these 2 groups across 9 types of criminal offenses. We calculated z scores for the differences in the types of crimes for which CHL holders and nonholders were convicted. CHL holders were much less likely than nonlicensees to be convicted of crimes. Most nonholder convictions involved higher-prevalence crimes (burglary, robbery, or simple assault). CHL holders' convictions were more likely to involve lower-prevalence crimes, such as sexual offenses, gun offenses, or offenses involving a death. Our results imply that expanding the settings in which concealed carry is permitted may increase the risk of specific types of crimes, some quite serious in those settings. These increased risks may be relatively small. Nonetheless, policymakers should consider these risks when contemplating reducing the scope of gun-free zones.

  5. Flexible weapons architecture design

    OpenAIRE

    Pyant, William C.

    2015-01-01

    Present day air-delivered weapons are of a closed architecture, with little to no ability to tailor the weapon for the individual engagement. The closed architectures require weaponeers to make the target fit the weapon instead of fitting the individual weapons to a target. The concept of a flexible weapons aims to modularize weapons design using an open architecture shell into which different modules are inserted to achieve the desired target fractional damage while reducing cost and civilia...

  6. CT diagnosis of concealed rupture of intestine following abdominal trauma

    International Nuclear Information System (INIS)

    Ji Jiansong; Wei Tiemin; Wang Zufei; Zhao Zhongwei; Tu Jianfei; Fan Xiaoxi; Xu Min

    2009-01-01

    Objective: To investigate CT findings of concealed rupture of intestine following abdominal trauma. Methods: CT findings of 11 cases with concealed rupture of intestine following abdominal trauma proved by surgery were identified retrospectively. Results: The main special signs included: (1) Free air in 4 cases, mainly around injured small bowel or under the diaphragm, or in the retroperitoneal space or and in the lump. (2) High density hematoma between the intestines or in the bowel wall (4 cases). (3) Bowel wall injury sign, demonstrated as low density of the injured intestinal wall, attenuated locally but relatively enhanced in neighbor wall on enhanced CT. (4) Lump around the injured bowel wall with obvious ring-shaped enhancement (4 cases). Other signs included: (1) Free fluid in the abdominal cavity or between the intestines with blurred borders. (2) Bowel obstruction. Conclusion: CT is valuable in diagnosing concealed rupture of intestine following abdominal trauma. (authors)

  7. The effects of sweep numbers per average and protocol type on the accuracy of the p300-based concealed information test.

    Science.gov (United States)

    Dietrich, Ariana B; Hu, Xiaoqing; Rosenfeld, J Peter

    2014-03-01

    In the first of two experiments, we compared the accuracy of the P300 concealed information test protocol as a function of numbers of trials experienced by subjects and ERP averages analyzed by investigators. Contrary to Farwell et al. (Cogn Neurodyn 6(2):115-154, 2012), we found no evidence that 100 trial based averages are more accurate than 66 or 33 trial based averages (all numbers led to accuracies of 84-94 %). There was actually a trend favoring the lowest trial numbers. The second study compared numbers of irrelevant stimuli recalled and recognized in the 3-stimulus protocol versus the complex trial protocol (Rosenfeld in Memory detection: theory and application of the concealed information test, Cambridge University Press, New York, pp 63-89, 2011). Again, in contrast to expectations from Farwell et al. (Cogn Neurodyn 6(2):115-154, 2012), there were no differences between protocols, although there were more irrelevant stimuli recognized than recalled, and irrelevant 4-digit number group stimuli were neither recalled nor recognized as well as irrelevant city name stimuli. We therefore conclude that stimulus processing in the P300-based complex trial protocol-with no more than 33 sweep averages-is adequate to allow accurate detection of concealed information.

  8. Guns on Campus: A Current Debate. E-Fact Sheet

    Science.gov (United States)

    Higher Education Center for Alcohol, Drug Abuse, and Violence Prevention, 2010

    2010-01-01

    Almost all U.S. college campuses ban concealed weapons. But in the aftermath of the tragic shooting deaths at Virginia Tech in 2007, the debate on whether guns should be permitted at colleges and universities has intensified. Dozens of states have considered proposals to lift bans on concealed weapons at colleges and universities, but so far none…

  9. Error Concealment for 3-D DWT Based Video Codec Using Iterative Thresholding

    DEFF Research Database (Denmark)

    Belyaev, Evgeny; Forchhammer, Søren; Codreanu, Marian

    2017-01-01

    Error concealment for video coding based on a 3-D discrete wavelet transform (DWT) is considered. We assume that the video sequence has a sparse representation in a known basis different from the DWT, e.g., in a 2-D discrete cosine transform basis. Then, we formulate the concealment problem as l1...

  10. Investigation of the structure and lithology of bedrock concealed by basin fill, using ground-based magnetic-field-profile data acquired in the San Rafael Basin, southeastern Arizona

    Science.gov (United States)

    Bultman, Mark W.

    2013-01-01

    Data on the Earth’s total-intensity magnetic field acquired near ground level and at measurement intervals as small as 1 m include information on the spatial distribution of nearsurface magnetic dipoles that in many cases are unique to a specific lithology. Such spatial information is expressed in the texture (physical appearance or characteristics) of the data at scales of hundreds of meters to kilometers. These magnetic textures are characterized by several descriptive statistics, their power spectrum, and their multifractal spectrum. On the basis of a graphical comparison and textural characterization, ground-based magnetic-field profile data can be used to estimate bedrock lithology concealed by as much as 100 m of basin fill in some cases, information that is especially important in assessing and exploring for concealed mineral deposits. I demonstrate that multifractal spectra of ground-based magnetic-field-profile data can be used to differentiate exposed lithologies and that the shape and position of the multifractal spectrum of the ground-based magnetic-field-profile of concealed lithologies can be matched to the upward-continued multifractal spectrum of an exposed lithology to help distinguish the concealed lithology. In addition, ground-based magnetic-field-profile data also detect minute differences in the magnetic susceptibility of rocks over small horizontal and vertical distances and so can be used for precise modeling of bedrock geometry and structure, even when that bedrock is concealed by 100 m or more of nonmagnetic basin fill. Such data contain valuable geologic information on the bedrock concealed by basin fill that may not be so visible in aeromagnetic data, including areas of hydrothermal alteration, faults, and other bedrock structures. Interpretation of these data in the San Rafael Basin, southeastern Arizona, has yielded results for estimating concealed lithologies, concealed structural geology, and a concealed potential mineral

  11. Detecting Illicit Nuclear Materials

    International Nuclear Information System (INIS)

    Kouzes, Richard T.

    2005-01-01

    The threat that weapons of mass destruction might enter the United States has led to a number of efforts for the detection and interdiction of nuclear, radiological, chemical, and biological weapons at our borders. There have been multiple deployments of instrumentation to detect radiation signatures to interdict radiological material, including weapons and weapons material worldwide

  12. Relationship between concealment of emotions at work and musculoskeletal symptoms: results from the third Korean Working Conditions Survey.

    Science.gov (United States)

    Jung, Kyungyong; Kim, Dae Hwan; Ryu, Ji Young

    2018-05-11

    In this study, we explored the relationship between concealing emotions at work and musculoskeletal symptoms in Korean workers using data from a national, population-based survey. Data were obtained from the third Korean Working Conditions Survey in 2011. We investigated the prevalence of three musculoskeletal symptoms ("back pain", "pain in the upper extremities", and "pain in the lower extremities"). Multiple logistic regression analysis was also performed to determine odds ratios (ORs) for musculoskeletal symptoms according to concealing emotions at work, adjusting for socioeconomic factors. In both sexes, the emotion-concealing group showed a significantly higher prevalence of "pain in the upper extremities" and "pain in the lower extremities" than the non-emotion-concealing group. For back pain, male - but not female - workers who concealed their emotions showed a higher prevalence than their non-emotion-concealing counterparts; the difference was statistically significant. Adjusted ORs for musculoskeletal symptoms (excluding "back pain" for female workers) in the emotion-concealing group were significantly higher. Our study suggests that concealment of emotions is closely associated with musculoskeletal symptoms, and the work environment should operate in consideration not only of the physical health work condition of workers but also of their emotional efforts including concealing emotion at work.

  13. Effects of modified penoplasty for concealed penis in children.

    Science.gov (United States)

    Chen, Chao; Li, Ning; Luo, Yi-Ge; Wang, Hong; Tang, Xian-Ming; Chen, Jia-Bo; Dong, Chun-Qiang; Liu, Qiang; Dong, Kun; Su, Cheng; Yang, Ti-Quan

    2016-10-01

    To evaluate the effect of modified penoplasty in the management of concealed penis. We retrospectively reviewed 96 consecutive patients with concealed penis, which had been surgically corrected between July 2013 and July 2015. All patients underwent modified Shiraki phalloplasty. All patients were scheduled for regular follow-up at 1, 3, and 6 months after the surgery. Data on the patients' age, operative time, postoperative complications, and parents' satisfaction grade were collected and analyzed. The mean follow-up period was 17.4 months (range 7-31 months). The mean operative time was 63.2 ± 8.7 min. The mean perpendicular penile length was 1.89 ± 0.77 cm preoperatively and 4.42 ± 0.87 cm postoperatively, with an improved mean length of 2.5 ± 0.68 cm in the flaccid state postoperatively (p penis can achieve maximum utilization of prepuce to assure coverage of the exposed penile shaft. It has fewer complications, achieving marked asthetics, and functional improvement. It is a relatively ideal means for treating concealed penis.

  14. [Half-gloving cordectomy: a modified procedure for concealed penis].

    Science.gov (United States)

    Sun, Wei-Gui; Zheng, Qi-Chuan; Jiang, Kun

    2012-06-01

    To search for a simple surgical procedure for the treatment of concealed penis that may have better effect and less complications. We used a modified surgical method in the treatment of 58 patients with concealed penis aged from 3 to 15 (mean 6.8) years. The operation was simplified and involved the following steps: wholly unveiling the penis glans, half-degloving the foreskins, cutting off all the adhesive fibers up to the penile suspensory ligaments, and liberating the external penis. The operation was successful in all the patients, with the operative time of 15 -45 (mean 33) minutes, hospital stay of 2 - 5 (mean 3.5) days, but no complications except mild foreskin edema in 5 cases. The external penis was prolonged from 0.5 - 2.8 (mean 1.4) cm preoperatively to 3.2 - 8.5 (mean 3.9) cm postoperatively. The patients were followed up for 1 -3 years, all satisfied with the length and appearance of the penis, and their sexual and reproductive functions were normal. The modified surgical procedure for concealed penis is simple and effective, with desirable outcomes, few postoperative complications and no damage to sexual and reproductive functions.

  15. Self-Concealment Mediates the Relationship Between Perfectionism and Attitudes Toward Seeking Psychological Help Among Adolescents.

    Science.gov (United States)

    Abdollahi, Abbas; Hosseinian, Simin; Beh-Pajooh, Ahmad; Carlbring, Per

    2017-01-01

    One of the biggest barriers in treating adolescents with mental health problems is their refusing to seek psychological help. This study was designed to examine the relationships between two forms of perfectionism, self-concealment and attitudes toward seeking psychological help and to test the mediating role of self-concealment in the relationship between perfectionism and attitudes toward seeking psychological help among Malaysian high school students. The participants were 475 Malaysian high school students from four high schools in Kuala Lumpur, Malaysia. Structural equation modelling results indicated that high school students with high levels of socially prescribed perfectionism, high levels of self-concealment, and low levels of self-oriented perfectionism reported negative attitudes toward seeking psychological help. Bootstrapping analysis showed that self-concealment emerged as a significant, full mediator in the link between socially prescribed perfectionism and attitudes toward seeking psychological help. Moderated mediation analysis also examined whether the results generalized across men and women. The results revealed that male students with socially prescribed perfectionism are more likely to engage in self-concealment, which in turn, leads to negative attitudes toward seeking psychological help more than their female counterparts. The results suggested that students high in socially prescribed perfectionism were more likely to engage in self-concealment and be less inclined to seek psychological help.

  16. The weapons effect

    NARCIS (Netherlands)

    Benjamin, Arlin James; Bushman, Brad J.

    In some societies, weapons are plentiful and highly visible. This review examines recent trends in research on the weapons effect, which is the finding that the mere presence of weapons can prime people to behave aggressively. The General Aggression Model provides a theoretical framework to explain

  17. The "good cop, bad cop" effect in the RT-based concealed information test: exploring the effect of emotional expressions displayed by a virtual investigator.

    Directory of Open Access Journals (Sweden)

    Mihai Varga

    Full Text Available Concealing the possession of relevant information represents a complex cognitive process, shaped by contextual demands and individual differences in cognitive and socio-emotional functioning. The Reaction Time-based Concealed Information Test (RT-CIT is used to detect concealed knowledge based on the difference in RTs between denying recognition of critical (probes and newly encountered (irrelevant information. Several research questions were addressed in this scenario implemented after a mock crime. First, we were interested whether the introduction of a social stimulus (facial identity simulating a virtual investigator would facilitate the process of deception detection. Next, we explored whether his emotional displays (friendly, hostile or neutral would have a differential impact on speed of responses to probe versus irrelevant items. We also compared the impact of introducing similar stimuli in a working memory (WM updating context without requirements to conceal information. Finally, we explored the association between deceptive behavior and individual differences in WM updating proficiency or in internalizing problems (state / trait anxiety and depression. Results indicated that the mere presence of a neutral virtual investigator slowed down participants' responses, but not the appended lie-specific time (difference between probes and irrelevants. Emotional expression was shown to differentially affect speed of responses to critical items, with positive displays from the virtual examiner enhancing lie-specific time, compared to negative facial expressions, which had an opposite impact. This valence-specific effect was not visible in the WM updating context. Higher levels of trait / state anxiety were related to faster responses to probes in the negative condition (hostile facial expression of the RT-CIT. These preliminary findings further emphasize the need to take into account motivational and emotional factors when considering the

  18. Combining Blink, Pupil, and Response Time Measures in a Concealed Knowledge Test

    Directory of Open Access Journals (Sweden)

    Travis eSeymour

    2013-02-01

    Full Text Available The response time (RT based Concealed Knowledge Test (CKT has been shown to accurately detect participants’ knowledge of mock-crime related information. Tests based on ocular measures such as pupil size and blink rate have sometimes resulted in poor classification, or lacked detailed classification analyses. The present study examines the fitness of multiple pupil and blink related responses in the CKT paradigm. To maximize classification efficiency, participants’ concealed knowledge was assessed using both individual test measures and combinations of test measures. Results show that individual pupil-size, pupil-slope, and pre-response blink-rate measures produce efficient classifications. Combining pupil and blink measures yielded more accuracy classifications than individual ocular measures. Although RT-based tests proved efficient, combining RT with ocular measures had little incremental benefit. It is argued that covertly assessing ocular measures during RT-based tests may guard against effective countermeasure use in applied settings. A compound classification procedure was used to categorize individual participants and yielded high hit rates and low false-alarm rates without the need for adjustments between test paradigms or subject populations. We conclude that with appropriate test paradigms and classification analyses, ocular measures may prove as effective as other indices, though additional research is needed.

  19. College Students' Reasons for Concealing Suicidal Ideation

    Science.gov (United States)

    Burton Denmark, Adryon; Hess, Elaine; Becker, Martin Swanbrow

    2012-01-01

    Self-reported reasons for concealing suicidal ideation were explored using data from a national survey of undergraduate and graduate students: 558 students indicated that they seriously considered attempting suicide during the previous year and did not tell anyone about their suicidal thoughts. Content analysis of students' qualitative responses…

  20. Combating the terrorist use of mass destruction weapons, particularly nuclear weapons

    International Nuclear Information System (INIS)

    Barakat, M.

    2008-01-01

    The risks of mass destruction weapons vary and also forms of damages resulting therefrom. While the effects of nuclear weapons are focused, sudden and comprehensive, the chemical weapons have limited impacts relatively unless used intensively severe prejudice to the element of surprise, and thus impaired the efficacy of their influences,especially that they affect exceptionally the individuals in the area of injury and biological weapons do not announce themselves except through their effect that appears later than the time of use as they affect exceptionally the organisms in the area of injury.The mass destruction weapons have turned from being a purely military means in the early twentieth century and have now become the means of violence against governments and countries that they should prepare themselves for and respond in ways of successful and effective countermeasures. Despite the fact that the acquisition of mass destruction weapons can be considered as a priority objective, which terrorist groups and organizations steadily seek but their accessibility is flanked by a lot of difficulties. Addressing the risk of further spread of nuclear weapons, and especially after doubling the power of those high-risk weapons, the international community has an approach to take a number of arrangements that complement each other to control and resist nuclear proliferation, either for the states or for terrorist groups.

  1. A new surgical technique for concealed penis using an advanced musculocutaneous scrotal flap.

    Science.gov (United States)

    Han, Dong-Seok; Jang, Hoon; Youn, Chang-Shik; Yuk, Seung-Mo

    2015-06-19

    Until recently, no single, universally accepted surgical method has existed for all types of concealed penis repairs. We describe a new surgical technique for repairing concealed penis by using an advanced musculocutaneous scrotal flap. From January 2010 to June 2014, we evaluated 12 patients (12-40 years old) with concealed penises who were surgically treated with an advanced musculocutaneous scrotal flap technique after degloving through a ventral approach. All the patients were scheduled for regular follow-up at 6, 12, and 24 weeks postoperatively. The satisfaction grade for penile size, morphology, and voiding status were evaluated using a questionnaire preoperatively and at all of the follow-ups. Information regarding complications was obtained during the postoperative hospital stay and at all follow-ups. The patients' satisfaction grades, which included the penile size, morphology, and voiding status, improved postoperatively compared to those preoperatively. All patients had penile lymphedema postoperatively; however, this disappeared within 6 weeks. There were no complications such as skin necrosis and contracture, voiding difficulty, or erectile dysfunction. Our advanced musculocutaneous scrotal flap technique for concealed penis repair is technically easy and safe. In addition, it provides a good cosmetic appearance, functional outcomes and excellent postoperative satisfaction grades. Lastly, it seems applicable in any type of concealed penis, including cases in which the ventral skin defect is difficult to cover.

  2. Anxiety and Related Disorders and Concealment in Sexual Minority Young Adults.

    Science.gov (United States)

    Cohen, Jeffrey M; Blasey, Christine; Barr Taylor, C; Weiss, Brandon J; Newman, Michelle G

    2016-01-01

    Sexual minorities face greater exposure to discrimination and rejection than heterosexuals. Given these threats, sexual minorities may engage in sexual orientation concealment in order to avoid danger. This social stigma and minority stress places sexual minorities at risk for anxiety and related disorders. Given that three fourths of anxiety disorder onset occurs before the age of 24, the current study investigated the symptoms of generalized anxiety disorder, social phobia, panic disorder, posttraumatic stress disorder, and depression in sexual minority young adults relative to their heterosexual peers. Secondarily, the study investigated sexual orientation concealment as a predictor of anxiety and related disorders. A sample of 157 sexual minority and 157 heterosexual young adults matched on age and gender completed self-report measures of the aforementioned disorders, and indicated their level of sexual orientation concealment. Results revealed that sexual minority young adults reported greater symptoms relative to heterosexuals across all outcome measures. There were no interactions between sexual minority status and gender, however, women had higher symptoms across all disorders. Sexual minority young women appeared to be at the most risk for clinical levels of anxiety and related disorders. In addition, concealment of sexual orientation significantly predicted symptoms of social phobia. Implications are offered for the cognitive and behavioral treatment of anxiety and related disorders in this population. Copyright © 2015. Published by Elsevier Ltd.

  3. Rating Emotion Communication: Display and Concealment as Effects of Culture, Gender, Emotion Type, and Relationship

    Directory of Open Access Journals (Sweden)

    Arne Vikan

    2009-01-01

    Full Text Available Students from a collectivistic (Brazilian, n= 401 and an individualistic (Norwegian, n= 418culture rated their ability to display and conceal anger, sadness, and anxiety in relation to immediate family, partner, friends, and "other persons." Norwegians showed higher display ratings for anger and sadness, and higher concealment ratings for anger and anxiety. Display ratings were much higher, and concealment ratings much lower in relation to close persons than in relation to "other persons." A culture x relationship interaction was that Brazilian' ratings suggested more emotional openness to friends than to family and partner, whereas Norwegians showed the inverse patterns. Gender differences supported previous research by showing higher display and lower concealment ratings, and less differentiation between relationships by females.

  4. A hybrid frame concealment algorithm for H.264/AVC.

    Science.gov (United States)

    Yan, Bo; Gharavi, Hamid

    2010-01-01

    In packet-based video transmissions, packets loss due to channel errors may result in the loss of the whole video frame. Recently, many error concealment algorithms have been proposed in order to combat channel errors; however, most of the existing algorithms can only deal with the loss of macroblocks and are not able to conceal the whole missing frame. In order to resolve this problem, in this paper, we have proposed a new hybrid motion vector extrapolation (HMVE) algorithm to recover the whole missing frame, and it is able to provide more accurate estimation for the motion vectors of the missing frame than other conventional methods. Simulation results show that it is highly effective and significantly outperforms other existing frame recovery methods.

  5. [Chemical weapons and chemical terrorism].

    Science.gov (United States)

    Nakamura, Katsumi

    2005-10-01

    Chemical Weapons are kind of Weapons of Mass Destruction (WMD). They were used large quantities in WWI. Historically, large quantities usage like WWI was not recorded, but small usage has appeared now and then. Chemical weapons are so called "Nuclear weapon for poor countrys" because it's very easy to produce/possession being possible. They are categorized (1) Nerve Agents, (2) Blister Agents, (3) Cyanide (blood) Agents, (4) Pulmonary Agents, (5) Incapacitating Agents (6) Tear Agents from the viewpoint of human body interaction. In 1997 the Chemical Weapons Convention has taken effect. It prohibits chemical weapons development/production, and Organization for the Prohibition of Chemical Weapons (OPCW) verification regime contributes to the chemical weapons disposal. But possibility of possession/use of weapons of mass destruction by terrorist group represented in one by Matsumoto and Tokyo Subway Sarin Attack, So new chemical terrorism countermeasures are necessary.

  6. Error Concealment using Neural Networks for Block-Based Image Coding

    Directory of Open Access Journals (Sweden)

    M. Mokos

    2006-06-01

    Full Text Available In this paper, a novel adaptive error concealment (EC algorithm, which lowers the requirements for channel coding, is proposed. It conceals errors in block-based image coding systems by using neural network. In this proposed algorithm, only the intra-frame information is used for reconstruction of the image with separated damaged blocks. The information of pixels surrounding a damaged block is used to recover the errors using the neural network models. Computer simulation results show that the visual quality and the MSE evaluation of a reconstructed image are significantly improved using the proposed EC algorithm. We propose also a simple non-neural approach for comparison.

  7. Youths Carrying a Weapon or Using a Weapon in a Fight: What Makes the Difference?

    Science.gov (United States)

    Thurnherr, Judit; Michaud, Pierre-Andre; Berchtold, Andre; Akre, Christina; Suris, Joan-Carles

    2009-01-01

    The objective of this study was to characterize weapon-carrying adolescents and to assess whether weapon carriers differ from weapon users. Data were drawn from a cross-sectional school-based survey of 7548 adolescents aged 16-20 years in Switzerland. Youths carrying a weapon were compared with those who do not. Subsequently, weapon carriers were…

  8. CONCEAL TO SURVIVE: RESISTANCE STRATEGIES

    Directory of Open Access Journals (Sweden)

    Francisca Zuleide Duarte de Souza

    2013-04-01

    Full Text Available This paper analyzes the strategy of concealment, theoretically bounded by Accetto (2001, and used by Delfina, character in the novel O Alegre Canto da Perdiz of Paulina Chiziane, Mozambican writer. Focuses, among other things, the relationship colonizer versus colonized, discussing the con­dition of female inferiority that forces a reaction apparently submissive, which assumes the sale of the body and the rejection of their ancestral tra­ditions. To interpret the attitudes of Delfina as a strategy that masks resent­ment against abusive domain power.

  9. Concealment of Child Sexual Abuse in Sports

    Science.gov (United States)

    Hartill, Mike

    2013-01-01

    When the sexual abuse of children is revealed, it is often found that other nonabusing adults were aware of the abuse but failed to act. During the past twenty years or so, the concealment of child sexual abuse (CSA) within organizations has emerged as a key challenge for child protection work. Recent events at Pennsylvania State University (PSU)…

  10. Current research and potential applications of the Concealed Information Test: An overview

    Directory of Open Access Journals (Sweden)

    Gershon eBen-Shakhar

    2012-09-01

    Full Text Available Research interest in psychophysiological detection of deception has significantly increased since the September 11 terror attack in the USA. In particular, the Concealed Information Test (CIT, designed to detect memory traces that can connect suspects to a certain crime, has been extensively studied. In this paper I will briefly review several psychophysiological detection paradigms that have been studied, with a focus on the CIT. The theoretical background of the CIT, its strength and weaknesses, its potential applications as well as research finings related to its validity, (based on a recent mata-analytic study, will be discussed. Several novel research directions, with a focus on factors that may affect CIT detection in realistic settings (e.g., memory for crime details; the effect of emotional stress during crime execution will be described. Additionally, research focusing on mal-intentions and attempts to detect terror networks using information gathered from groups of suspects using both the standard CIT and the searching CIT will be reviewed. Finally, implications of current research to the actual application of the CIT will be discussed and several recommendations that can enhance the use of the CIT will be made.

  11. Identification of chemicals related to the chemical weapons convention during an interlaboratory proficiency test

    NARCIS (Netherlands)

    Hooijschuur, E.W.J.; Hulst, A.G.; Jong, A.L. de; Reuver, L.P. de; Krimpen, S.H. van; Baar, B.L.M. van; Wils, E.R.J.; Kientz, C.E.; Brinkman, U.A.Th

    2002-01-01

    In order to test the ability of laboratories to detect and identify chemicals related to the Chemical Weapons Convention (CWC), which prohibits the development, production, stockpiling and use of chemical weapons, and to designate laboratories for this task, the Technical Secretariat of the

  12. Perceived popularity of adolescents who use weapons in violence and adolescents who only carry weapons.

    Science.gov (United States)

    Wallace, Lacey N

    2017-01-01

    Prior research has found that persistently delinquent youth or more violent youth were less popular than their less delinquent peers (Young, 2013). However, recent research has also found that weapon carrying is associated with being more popular in adolescence (Dijkstra et al., 2010). The present paper examines the perceived popularity of adolescents who carry weapons in comparison to those who both carry and use weapons in acts of violence or threatened violence. Data consist of two waves from the National Longitudinal Study of Adolescent to Adult Health. Analyses use OLS regression with lagged predictors. This paper found no differences in number of friends between weapon carriers and weapon users. However, among both male and female gang members, those who did not use or carry weapons (abstainers) named significantly fewer friends than weapon users. Among females, weapon abstainers both named and were named by significantly more people than weapon users. These differences were not observed for males. Implications of these results and directions for future research are discussed.

  13. Defining Weapons of Mass Destruction

    Science.gov (United States)

    2012-01-01

    Cyprus, Liberia, Malta, Marshall Islands , Mongolia, Panama, and St. Vin- cent and the Grenadines, according to a State Department summary available...1972 Biological and Toxin Weapons Convention, and the 1993 Chemical Weapons Convention. As such, NBC weapons represent a group of weapons that the...Development, Produc- tion and Stockpiling of Bacteriological (Biological) and Toxin Weapons and on Their Destruction contains two references to WMD

  14. Research of Raman spectroscopy to detect subsurface ingredient under non-transparent medium

    International Nuclear Information System (INIS)

    Zhang Xiaohua; Zhang Ji; Zhang Haifeng; Lu Jianxin; Sun Shuying; Wang Leijian; Xu Yongsheng; Wang Xiaojie; Tang Xiuzhang

    2014-01-01

    The measurement and contrast of NaNO 3 powder concealed in opaque/semi-transparent plastic bottles were carried out through conventional Raman spectroscopy configuration and spatially offset Raman spectroscopy configuration individually. The action mechanism why the spatially offset Raman spectroscopy can effectively detect the medium concealed in the non-transparent bottle was analyzed. The detection depth of conventional Raman spectroscopy is small and the ingredient of the subsurface under non-transparent medium can not be detected, and the spatially offset Raman spectroscopy broke through the neck of the conventional Raman spectroscopy detection. The measurement and identification of the substance concealed in the non-transparent medium (opaque/semi-transparent plastic bottle) were realized. (authors)

  15. Nonstrategic Nuclear Weapons

    Science.gov (United States)

    2017-02-21

    of their nonstrategic nuclear weapons and eliminate many of them. These 1991 announcements, coming after the abortive coup in Moscow in July 1991...of these weapons. The abortive coup in Moscow in August 1991 had also caused alarms about the strength of central control over nuclear weapons...assure other allies of the U.S. commitment to their security, but these assurances do not necessarily include legally binding commitments to retaliate

  16. Virtual nuclear weapons

    Energy Technology Data Exchange (ETDEWEB)

    Pilat, J.F.

    1997-08-01

    The term virtual nuclear weapons proliferation and arsenals, as opposed to actual weapons and arsenals, has entered in recent years the American lexicon of nuclear strategy, arms control, and nonproliferation. While the term seems to have an intuitive appeal, largely due to its cyberspace imagery, its current use is still vague and loose. The author believes, however, that if the term is clearly delineated, it might offer a promising approach to conceptualizing certain current problems of proliferation. The first use is in a reference to an old problem that has resurfaced recently: the problem of growing availability of weapon-usable nuclear materials in civilian nuclear programs along with materials made `excess` to defense needs by current arms reduction and dismantlement. It is argued that the availability of these vast materials, either by declared nuclear-weapon states or by technologically advanced nonweapon states, makes it possible for those states to rapidly assemble and deploy nuclear weapons. The second use has quite a different set of connotations. It is derived conceptually from the imagery of computer-generated reality. In this use, one thinks of virtual proliferation and arsenals not in terms of the physical hardware required to make the bomb but rather in terms of the knowledge/experience required to design, assemble, and deploy the arsenal. Virtual weapons are a physics reality and cannot be ignored in a world where knowledge, experience, materials, and other requirements to make nuclear weapons are widespread, and where dramatic army reductions and, in some cases, disarmament are realities. These concepts are useful in defining a continuum of virtual capabilities, ranging from those at the low end that derive from general technology diffusion and the existence of nuclear energy programs to those at the high end that involve conscious decisions to develop or maintain militarily significant nuclear-weapon capabilities.

  17. Correction of concealed penis with preservation of the prepuce.

    Science.gov (United States)

    Valioulis, I A; Kallergis, I C; Ioannidou, D C

    2015-10-01

    By definition, congenital concealed penis presents at birth. Children are usually referred to physicians because of parental anxiety caused by their child's penile size. Several surgical procedures have been described to treat this condition, but its correction is still technically challenging. The present study reports a simple surgical approach, which allows preservation of the prepuce. During the last 6 years, 18 children with concealed penis (according to the classification by Maizels et al.) have been treated in the present department (mean age 4.5 years, range 3-12 years). Patients with other conditions that caused buried penis were excluded from the study. The operation was performed through a longitudinal midline ventral incision, which was extended hemi-circumferentially at the penile base. The dysgenetic dartos was identified and its distal part was resected. Dissection of the corpora cavernosa was carried down to the suspensory ligament, which was sectioned. Buck's fascia was fixed to Scarpa's fascia and shaft skin was approximated in the midline. Penoscrotal angle was fashioned by Z-plasty or V-Y plasty. The median follow-up was 24 months (range 8-36). The postoperative edema was mild and resolved within a week. All children had good to excellent outcomes. The median pre-operative to postoperative difference in penile length in the flaccid state was 2.6 cm (range 2.0-3.5). No serious complications or recurrent penile retraction were noted. Recent literature mostly suggests that concealed penis is due to deficient proximal attachments of dysgenetic dartos. Consequences of this include: difficulties in maintaining proper hygiene, balanitis, voiding difficulties with prepuce ballooning and urine spraying, and embarrassment among peers. Surgical treatment for congenital concealed penis is warranted in children aged 3 years or older. The basis of the technique is the perception that in boys with congenital concealed penis, the penile integuments are normal

  18. Predictive value of ADAMTS-13 on concealed chronic renal failure in COPD patients

    Science.gov (United States)

    Zeng, Mian; Chen, Qingui; Liang, Wenjie; He, Wanmei; Zheng, Haichong; Huang, Chunrong

    2017-01-01

    Background Impaired renal function is often neglected in COPD patients. Considering that COPD patients usually have an ongoing prothrombotic state and systemic inflammation status, we investigated the association among them and explored the predictive value of a disintegrin and metalloproteinase with a thrombospondin type 1 motif, member 13 (ADAMTS-13), on concealed chronic renal failure (CRF) in COPD patients. Methods COPD patients were recruited from the First Affiliated Hospital of Sun Yat-Sen University between January 2015 and December 2016. Control was selected from contemporaneous hospitalized patients without COPD and matched by age and gender at a ratio of 1:1. Estimated glomerular filtration rate (eGFR) was calculated by using the Chronic Kidney Disease Epidemiology Collaboration formula, and all subjects were categorized as having normal renal function (eGFR ≥60 mL min−1 1.73 m−2) and having concealed CRF (normal serum creatinine while eGFR <60 mL min−1 1.73 m−2). Independent correlates of concealed CRF were investigated by logistic regression analysis, and receiver operating characteristic (ROC) curves were used to determine the predictive value of ADAMTS-13. Results In total, 106 COPD and 106 non-COPD patients were finally recruited, and the incidences of concealed CRF were 19.81% and 7.55%, respectively. ADAMTS-13 (odds ratio [OR] =0.858, 95% CI =0.795–0.926), D-dimer (OR =1.095, 95% CI =1.027–1.169), and C-reactive protein (OR =1.252, 95% CI =1.058–1.480) were significantly associated with concealed CRF. Sensitivity and specificity at an ADAMTS-13 cutoff of 318.72 ng/mL were 100% and 81.2%, respectively. The area under the ROC curve was 0.959. Conclusion Prothrombotic state and systemic inflammation status might contribute to explaining the high incidence of concealed CRF in COPD, and plasma ADAMTS-13 levels may serve as a strong predictor. PMID:29255356

  19. Crustal concealing of small-scale core-field secular variation

    DEFF Research Database (Denmark)

    Hulot, G.; Olsen, Nils; Thebault, E.

    2009-01-01

    of internal origin happen to be detectable now in spherical harmonic degrees up to, perhaps, 16. All of these changes are usually attributed to changes in the core field itself, the secular variation, on the ground that the lithospheric magnetization cannot produce such signals. It has, however, been pointed...... out, on empirical grounds, that temporal changes in the field of internal origin produced by the induced part of the lithospheric magnetization could dominate the core field signal beyond degree 22. This short note revisits this issue by taking advantage of our improved knowledge of the small...... cause of the observed changes in the field of internal origin up to some critical degree, N-C, is indeed likely to be the secular variation of the core field, but that the signal produced by the time-varying lithospheric field is bound to dominate and conceal the time-varying core signal beyond...

  20. Security with nuclear weapons

    International Nuclear Information System (INIS)

    Karp, R.C.

    1991-01-01

    Recent improvements in East-West relations and the process of dramatic political change in Europe may result in unprecedented opportunities to reduce the global arsenal of nuclear weapons. Despite these welcome developments, the prospects for effectively controlling the spread of nuclear capability in the Third World have remained much less encouraging. The possibility of large reductions in nuclear weapons poses fundamental questions about their purpose. Why have some states chosen to acquire nuclear weapons? How and why have these decisions been maintained over time? Why have some states elected to approach, but not cross, the nuclear threshold? This book examines the commonalities and differences in political approaches to nuclear weapons both within and between three groups of states: nuclear, non-nuclear and threshold. The chapters explore the evolution of thinking about nuclear weapons and the role these weapons play in national security planning, and question the official security rationales offered by the nuclear weapon states for the maintenance of nuclear capabilities. For the non-nuclear weapon states, the book presents an analysis of alternative ways of assuring security and foreign policy effectiveness. For the threshold states, it examines the regional contexts within which these states maintain their threshold status. This book transcends traditional East-West approaches to analysis of nuclear issues by giving equal prominence to the issues of nuclear proliferation and non-nuclearism. The book also provides a comprehensive analysis of how current approaches to nuclear weapons have evolved both within and among the groups of countries under study

  1. Detecting nuclear warheads

    International Nuclear Information System (INIS)

    Fetter, S.; Frolov, V.A.; Prilutsky, O.F.; Rodionov, S.N.; Sagdeev, R.Z.; Miller, M.

    1992-01-01

    To the best of our knowledge, all nuclear weapons contain at least several kilograms of fissile material - material that can sustain a chain reaction. Such material provides the energy for fission explosives such as those that destroyed Hiroshima and Nagasaki; it is also used in the fission trigger modern thermonuclear weapons. The two fissile materials used in US and Soviet warheads are weapon grade uranium (WgU) and weapon-grade plutonium (WgPu). Fissile materials are radioactive; they are very dense and absorb certain radiations very well; and they can be fissioned. This paper reports on the two basic ways to detect fissile material: passive detection of the radiation emitted by its radioactive decay, or active detection involving either radiographing (x-raying) an object with neutrons or high-energy photons and detecting particles emitted by the resulting induced fissions. Passive detection is the preferred technique for verification purposes because of its simplicity and safety

  2. Direct and indirect links between parenting styles, self-concealment (secrets), impaired control over drinking and alcohol-related outcomes.

    Science.gov (United States)

    Hartman, Jessica D; Patock-Peckham, Julie A; Corbin, William R; Gates, Jonathan R; Leeman, Robert F; Luk, Jeremy W; King, Kevin M

    2015-01-01

    Self-concealment reflects uncomfortable feelings, thoughts, and information people have about themselves that they avoid telling others (Larson & Chastain, 1990). According to Larson and Chastain (1990) these secrets range from the slightly embarrassing to the very distressing with an individual's most traumatic experiences often concealed. Parental attitudes including those involving self-disclosure are thought to be expressed in their choice of parenting style (Brand, Hatzinger, Beck, & Holsboer-Trachsler, 2009). The specific aim of this investigation was to examine the direct and indirect influences of parenting styles on self-concealment, impaired control over drinking (i.e. the inability to stop drinking when intended), alcohol use (quantity/frequency), and alcohol-related problems. A structural equation model with 419 (223 men, 196 women) university students was examined. Two and three path mediated effects were examined with the bias corrected bootstrap technique in Mplus. Having an authoritarian mother was directly linked to more self-concealment, while having an authoritative father was directly linked to less self-concealment. Higher levels of mother authoritarianism were indirectly linked to both increased alcohol use and alcohol-related problems through more self-concealment and more impaired control over drinking. Moreover, higher levels of father authoritativeness were indirectly linked to less alcohol use and alcohol-related problems through less self-concealment and less impaired control over drinking. These findings suggest that parenting styles influence vulnerabilities such as self-concealment in the impaired control over the drinking pathway to alcohol use and alcohol-related problems. Copyright © 2014 Elsevier Ltd. All rights reserved.

  3. Nuclear weapons free zones

    International Nuclear Information System (INIS)

    Stahl, K.

    1990-01-01

    The article analyses the concept and problems of the two nuclear weapons free zones in Latin America and in the South Pacific established by the Treaty of Tlatelolco and the Treaty of Rarotonga. So far the nuclear weapons states except China have refused to sign the additional protocols of the Treaties or have signed them only with considerable provisos. Therefore they don't fully recognize the nuclear weapons free status of those zones, or they don't recognize it at all. Both Treaties contain no provisions to regulate the transit of nuclear weapons through the zones. This allows de facto the stationing of nuclear weapons in the military bases of the US which are located within the nuclear weapons free zone of Latin America. The Treaty of Tlatelolco contains also the right of the states, party to the Treaty, to explode nuclear devices for peaceful purposes. Since peaceful and military nuclear explosions cannot be distinguished technically, this right could also undermine the nuclear weapons free status of the region. Important nuclear threshold countries like Argentina and Brazil have furthermore refrained from putting the Treaty into force. (orig.) [de

  4. Chemical Weapons Convention

    National Research Council Canada - National Science Library

    1997-01-01

    On April 29, 1997, the Convention on the Prohibition of the Development, Production, Stockpiling, and Use of Chemical Weapons and on Their Destruction, known as the Chemical Weapons Convention (CWC...

  5. International agreements on nuclear weapons

    International Nuclear Information System (INIS)

    Dombey, N.

    1982-01-01

    The satellite detection of a nuclear explosion in the South Atlantic and Israel's destruction of a research reactor in Iraq make it essential to strengthen existing monitoring and enforcement programs to prevent proliferation. While there was no reliable evidence that either South Africa or Iraq was violating non-proliferation agreements, worst case scenarios can demonstrate to unfriendly countries that South Africa had diverted fuel to test a nuclear weapon and that Iraq is intending to produce weapons-grade plutonium 239. The situation can be improved by formulating better terms and conditions for internationalizing access to materials. Nuclear suppliers need to agree on terms that will assure their customers that contracts for civil programs will be honored. The International Atomic Energy Agency (IAEA), which includes both nuclear suppliers and customers, could achieve stronger agreements that take into account recent technological advances that will expand enrichment and reprocessing activities. 23 references, 1 figure

  6. Antisatellite weapons

    International Nuclear Information System (INIS)

    Garwin, R.L.; Gottfried, K.; Hafner, D.L.

    1984-01-01

    The authors take issue with the assessment that the advent of antisatellite weapons implies that the beneficial role of satellites in arms control, confidence building, and conflict resolution has been judged less important than their ability to support actual military operations. They argue that there is still an opportunity to negotiate a militarily significant and verifiable constraint on the growth of antisatellite technology that would be in the security interest of the US and the world as a whole. They base their opinion on an assessment of the roles of the existing military satellites and their vulnerability to antisatellite weapons and the probable impact of antisatellite weapons on various kinds of crisis and conflict. 10 figures, 1 table

  7. Is the nuclear weapon taboo? The nuclear weapon is useless and expensive. Let us not leave the nuclear weapon as an inheritance

    International Nuclear Information System (INIS)

    Gauchet, Nathalie; Norlain, Bernard; Beach, Hugh; Beckett, Margaret; Quiles, Paul; Rocard, Michel; Ramsbotham, David

    2012-03-01

    Starting with the definition of the word taboo as stated in a dictionary (a topic it would be unbecoming to evoke, under social and moral proprieties), the author of the first article discusses the status of the nuclear weapon, outlining that it is expensive, useless and monstrous. She notices that conventions on chemical weapons seem to be more efficient than the NPT, that, even if the reasons for abolition are known as well as ways to reach it, it seems difficult to actually address this issue. She evokes different voices coming from different countries or international bodies calling for this abolition. She also states that the nuclear weapon is not a deterrent weapon but a weapon of domination, and calls for the mobilisation of the civil society throughout the world. A second article states that the nuclear weapon is useless and expensive, and that we have to get rid of this hazard for the sake of the planet. Former ministers, Prime ministers, and generals consider that we can and must give up nuclear weapons, notably because the strategic context has completely changed since the fall of the Berlin wall, and support the action of Global Zero

  8. ID-check: Online concealed information test reveals true identity

    NARCIS (Netherlands)

    Verschuere, B.; Kleinberg, B.

    2016-01-01

    The Internet has already changed people's lives considerably and is likely to drastically change forensic research. We developed a web-based test to reveal concealed autobiographical information. Initial studies identified a number of conditions that affect diagnostic efficiency. By combining these

  9. Reconversion of nuclear weapons

    CERN Document Server

    Kapitza, Sergei P

    1992-01-01

    The nuclear predicament or nuclear option. Synopsis of three lectures : 1- The physical basis of nuclear technology. Physics of fission. Chain reaction in reactors and weapons. Fission fragments. Separration of isotopes. Radiochemistry.2- Nuclear reactors with slow and fast neutrons. Power, size, fuel and waste. Plutonium production. Dose rate, shielding and health hazard. The lessons of Chernobyl3- Nuclear weapons. Types, energy, blast and fallout. Fusion and hydrogen bombs. What to do with nuclear weapons when you cannot use them? Testing. Nonmilittary use. Can we get rid of the nuclear weapon? Nuclear proliferation. Is there a nuclear future?

  10. The bioscience revolution & the biological weapons threat: levers & interventions

    Directory of Open Access Journals (Sweden)

    Martin Greg

    2009-02-01

    Full Text Available Abstract In December 2008, the US Commission on the Prevention of Weapons of Mass Destruction Proliferation and Terrorism, released a report, World At Risk. The Report points to the fact that, not only is the use of a weapon of mass destruction in a terrorist attack before the end of 2013, more likely than not, but also to the fact that terrorists are more likely to be able to obtain and use biological weapons than nuclear. This paper examines the recommendations of the report in the context of the historic and geopolitical changes, in particular globalization. The authors highlight the "dual-use" dilemma, as described in the report, as the paradoxical use of technology developed for the benefit of mankind being used for sinister purposes. The mitigation of such a threat lies in broad stakeholder involvement and cooperation, including non-state actors, governments and the bio-tech industry itself. The importance of vigilance measures within the life science community is emphasized and, the authors propose, could include a web-based didactic course in bioterrorism and weapons of mass destruction identification. The site could outline safety protocols, have detailed disaster management tutorials, and could be specifically tailored for different subsets of industry and health professionals. The paper concludes with an endorsement of a multi-pronged approach including strong international guidelines and intelligence cooperation and preparatory measures such as the wide-spread use of detection systems as well as diagnostic decision support systems for bioterrorism detection at the local level.

  11. A Qualitative Study Examining Experiences and Dilemmas in Concealment and Disclosure of People Living With Serious Mental Illness.

    Science.gov (United States)

    Bril-Barniv, Shani; Moran, Galia S; Naaman, Adi; Roe, David; Karnieli-Miller, Orit

    2017-03-01

    People with mental illnesses face the dilemma of whether to disclose or conceal their diagnosis, but this dilemma was scarcely researched. To gain in-depth understanding of this dilemma, we interviewed 29 individuals with mental illnesses: 16 with major depression/bipolar disorders and 13 with schizophrenia. Using a phenomenological design, we analyzed individuals' experiences, decision-making processes, and views of gains and costs regarding concealment and disclosure of mental illness. We found that participants employed both positive and negative disclosure/concealment practices. Positive practices included enhancing personal recovery, community integration, and/or supporting others. Negative practices occurred in forced, uncontrolled situations. We also identified various influencing factors, including familial norms of sharing, accumulated experiences with disclosure, and ascribed meaning to diagnosis. Based on these findings, we deepen the understanding about decision-making processes and the consequences of disclosing or concealing mental illness. We discuss how these finding can help consumers explore potential benefits and disadvantages of mental illness disclosure/concealment occurrences.

  12. Stability of transition to a world without nuclear weapons: Technical problems of verification

    International Nuclear Information System (INIS)

    Zhigalov, V.

    1998-01-01

    A serious psychological barrier to acceptance of the concept for achieving the nuclear-weapon-free world is fear of facing the prospect that one or more nations or extremist political groups might develop their own nuclear weapons. Actually this is a question of stability of the nuclear-weapon-free world. From this point of view the most effective system of verification is an absolute necessity. This system must ensure detection of so called undeclared nuclear activity at early stage. Scientists of Russian nuclear centers are working today on solving this problem. This paper is considered to be a comprehensive attempt to analyze the technical and organizational aspects of the problems of transition to a nuclear-weapons-free world, setting aside the difficulties of resolving purely political problems

  13. Classifying threats with a 14-MeV neutron interrogation system.

    Science.gov (United States)

    Strellis, Dan; Gozani, Tsahi

    2005-01-01

    SeaPODDS (Sea Portable Drug Detection System) is a non-intrusive tool for detecting concealed threats in hidden compartments of maritime vessels. This system consists of an electronic neutron generator, a gamma-ray detector, a data acquisition computer, and a laptop computer user-interface. Although initially developed to detect narcotics, recent algorithm developments have shown that the system is capable of correctly classifying a threat into one of four distinct categories: narcotic, explosive, chemical weapon, or radiological dispersion device (RDD). Detection of narcotics, explosives, and chemical weapons is based on gamma-ray signatures unique to the chemical elements. Elements are identified by their characteristic prompt gamma-rays induced by fast and thermal neutrons. Detection of RDD is accomplished by detecting gamma-rays emitted by common radioisotopes and nuclear reactor fission products. The algorithm phenomenology for classifying threats into the proper categories is presented here.

  14. Does Britain need nuclear weapons?

    International Nuclear Information System (INIS)

    Hill, C.R.; Pease, R.S.; Peierls, R.E.; Rotblat, J.

    1995-01-01

    This report from the British Pugwash Group follows up a detailed international study of the desirability and feasibility of a world free from nuclear weapons with an analysis of issues particular to British nuclear weapons and the associated defense policies. United Kingdom nuclear weapons are reviewed historically, as are the nuclear weapons policies of other countries. A critique of present government policy is presented, with alternative uses for nuclear weapons in the post-Cold war world. The document concludes with a summary of the text and suggests how a British government could move towards global nuclear disarmament. (UK)

  15. RT-based memory detection : Item saliency effects in the single-probe and the multiple-probe protocol

    NARCIS (Netherlands)

    Verschuere, B.; Kleinberg, B.; Theocharidou, K.

    RT-based memory detection may provide an efficient means to assess recognition of concealed information. There is, however, considerable heterogeneity in detection rates, and we explored two potential moderators: item saliency and test protocol. Participants tried to conceal low salient (e.g.,

  16. Scientific and technical development and the chemical weapon convention

    International Nuclear Information System (INIS)

    Siddiqui, P.H.

    2008-01-01

    The Chemical Weapons Convention (CWC) was drafted with the recognition that it is impossible to envision every way in which toxic chemicals might be used for aggressive purposes. As terrorist organizations and rogue states replace the major powers as the most likely candidates to employ chemical weapons, the agents of choice may differ from those developed for battlefield use. Twenty- first century chemical warfare may target civilians or agricultural production, and clandestine production-facilities may manufacture toxic agents from chemical precursors, not monitored under the CWC control regime. The effects (on CWC implementation) of changing industrial technologies, including ongoing developments in chemical process technology, dual-use industrial chemicals, and rapid methods for discovering biologically active chemicals, are considerable Also considered is how commercial technologies could be misused for the development of novel chemical weapons, and how such abuses might be detected and monitored. (author)

  17. Chemical and biological weapons

    International Nuclear Information System (INIS)

    Harris, E.D.

    1991-01-01

    This paper discusses the prospects of the multilateral negotiations aimed at achieving a complete and total ban on chemical weapons the Chemical Weapons convention (CWC). The control of the proliferation of chemical weapons is no longer just on East-West issue; it is also an issue of concern in Third World Countries, and in some of the wealthier middle eastern nations, such as Kuwait

  18. The US nuclear weapon infrastructure and a stable global nuclear weapon regime

    Energy Technology Data Exchange (ETDEWEB)

    Immele, John D [Los Alamos National Laboratory; Wagner, Richard L [Los Alamos National Laboratory

    2009-01-01

    US nuclear weapons capabilities -- extant force structure and nuclear weapons infrastructure as well as declared policy -- influence other nations' nuclear weapons postures, at least to some extent. This influence can be desirable or undesirable, and is, of course, a mixture of both. How strong the influence is, and its nature, are complicated, controversial, and -- in our view -- not well understood but often overstated. Divergent views about this influence and how it might shape the future global nuclear weapons regime seem to us to be the most serious impediment to reaching a national consensus on US weapons policy, force structure and supporting infrastructure. We believe that a paradigm shift to capability-based deterrence and dissuasion is not only consistent with the realities of the world and how it has changed, but also a desirable way for nuclear weapon postures and infrastructures to evolve. The US and other nuclear states could not get to zero nor even reduce nuclear arms and the nuclear profile much further without learning to manage latent capability. This paper has defined three principles for designing NW infrastructure both at the 'next plateau' and 'near zero.' The US can be a leader in reducing weapons and infrastructure and in creating an international regime in which capability gradually substitutes for weapons in being and is transparent. The current 'strategy' of not having policy or a Congressionally-approved plan for transforming the weapons complex is not leadership. If we can conform the US infrastructure to the next plateau and architect it in such a way that it is aligned with further arms reductions, it will have these benefits: The extant stockpile can be reduced in size, while the smaller stockpile still deters attack on the US and Allies. The capabilities of the infrastructure will dissuade emergence of new challenges/threats; if they emerge, nevertheless, the US will be able to deal with them in

  19. Nuclear weapons complex

    International Nuclear Information System (INIS)

    Rezendes, V.S.

    1992-04-01

    In addition to long-standing safety and environmental problems plaguing the nuclear weapons complex, this paper reports that the Department of Energy (DOE) faces a major new challenge-how to reconfigure the weapons complex to meet the nation's defense needs in the 21st century. Key decisions still need to be made about the size of the complex; where, if necessary, to relocate various operations; what technologies to use for new tritium production; and what to do with excess weapons-grade material. The choices confronting DOE and Congress are difficult given the conflicting demands for limited resources

  20. Guilt, censure, and concealment of active smoking status among cancer patients and family members after diagnosis: a nationwide study.

    Science.gov (United States)

    Shin, Dong Wook; Park, Jong Hyock; Kim, So Young; Park, Eal Whan; Yang, Hyung Kook; Ahn, Eunmi; Park, Seon Mee; Lee, Young Joon; Lim, Myong Cheol; Seo, Hong Gwan

    2014-05-01

    We aimed to identify the prevalence of feelings of guilt, censure, and concealment of smoking status among cancer patients and their family members who continued to smoke after the patient's diagnosis. Among 990 patient-family member dyads, 45 patients and 173 family members who continued to smoke for at least 1 month after the patients' diagnoses were administered questions examining feelings of guilt, censure, and smoking concealment. Most patients who continued to smoke reported experiencing feelings of guilt toward their families (75.6%) and censure from their family members (77.8%), and many concealed their smoking from their family members (44.4%) or healthcare professionals (46.7%). Family members who continued to smoke also reported feelings of guilt with respect to the patient (63.6%) and that the patient was critical of them (68.9%), and many concealed their smoking from the patient (28.5%) or healthcare professionals (9.3%). Patients' feeling of guilt was associated with concealment of smoking from family members (55.9% vs. 10.0%) or health care professionals (55.9% vs. 20.0%). Family members who reported feeling guilty (36.5% vs. 16.3%) or censured (34.5% vs. 16.7%) were more likely to conceal smoking from patients. Many patients and family members continue to smoke following cancer diagnosis, and the majority of them experience feelings of guilt and censure, which can lead to the concealment of smoking status from families or health care professionals. Feelings of guilt, censure, and concealment of smoking should be considered in the development and implementation of smoking cessation programs for cancer patients and family members. Copyright © 2013 John Wiley & Sons, Ltd.

  1. Defense Special Weapons Agency Advisory Panel on the Nuclear Weapon Effects Program

    National Research Council Canada - National Science Library

    1998-01-01

    We performed the audit in response to allegations made to the Defense Hotline concerning conflicts of interest among members of the Defense Special Weapons Agency Advisory Panel on the Nuclear Weapon Effects Program...

  2. Verifying a nuclear weapon`s response to radiation environments

    Energy Technology Data Exchange (ETDEWEB)

    Dean, F.F.; Barrett, W.H.

    1998-05-01

    The process described in the paper is being applied as part of the design verification of a replacement component designed for a nuclear weapon currently in the active stockpile. This process is an adaptation of the process successfully used in nuclear weapon development programs. The verification process concentrates on evaluating system response to radiation environments, verifying system performance during and after exposure to radiation environments, and assessing system survivability.

  3. Future of clip-on weapon sights: pros and cons from an applications perspective

    Science.gov (United States)

    Knight, C. Reed; Greenslade, Ken; Francisco, Glen

    2015-05-01

    US Domestic, International, allied Foreign National Warfighters and Para-Military First Responders (Police, SWAT, Special Operations, Law Enforcement, Government, Security and more) are put in harm's way all the time. To successfully complete their missions and return home safely are the primary goals of these professionals. Tactical product improvements that affect mission effectiveness and solider survivability are pivotal to understanding the past, present and future of Clip-On in-line weapon sights. Clip-On Weapon Sight (WS) technology was deemed an interim solution by the US Government for use until integrated and fused (day/night multi-sensor) Weapon Sights (WSs) were developed/fielded. Clip-On has now become the solution of choice by Users, Warriors, Soldiers and the US Government. SWaP-C (size, weight and power -cost) has been improved through progressive advances in Clip-On Image Intensified (I2), passive thermal, LL-CMOS and fused technology. Clip-On Weapon Sights are now no longer mounting position sensitive. Now they maintain aim point boresight, so they can be used for longer ranges with increased capabilities while utilizing the existing zeroed weapon and daysight optic. Active illuminated low-light level (both analog I2 and digital LL-CMOS) imaging is rightfully a real-world technology, proven to deliver daytime and low-light level identification confidence. Passive thermal imaging is also a real-world technology, proven to deliver daytime, nighttime and all-weather (including dirty battlefield) target detection confidence. Image processing detection algorithms with intelligent analytics provide documented promise to improve confidence by reducing Users, Warriors and Soldiers' work-loads and improving overall system engagement solution outcomes. In order to understand the future of Clip-On in-line weapon sights, addressing pros and cons, this paper starts with an overview of historical weapon sight applications, technologies and stakeholder decisions

  4. The morality of weapons research.

    Science.gov (United States)

    Forge, John

    2004-07-01

    I ask whether weapons research is ever justified. Weapons research is identified as the business of the engineer. It is argued that the engineer has responsibility for the uses to which the tools that he designs can be put, and that responsibility extends to the use of weapons. It is maintained that there are no inherently defensive weapons, and hence there is no such thing as 'defensive' weapons research. The issue then is what responsibilities as a professional the engineer has in regard to such research. An account is given to ground the injunction not to provide the means to harm as a duty for the engineers. This account is not, however, absolutist, and as such it allows justifiable exceptions. The answer to my question is thus not that weapons research is never justified but there must be a strong assurance that the results will only be used as a just means in a just cause.

  5. Making weapons, talking peace

    International Nuclear Information System (INIS)

    York, H.F.

    1987-01-01

    The memoirs of the author traces his life from his first-year graduate studies in physics at the University of Rochester in 1942 to his present position as Director of the University of California's Institute on Global Conflict and Cooperation. The part of his life involved in making weapons extends from 1942 to 1961. During this period, he worked with E.O. Lawrence on the Manhattan Project and served as director of Livermore after it became the Atomic Energy Commission's second nuclear weapons laboratory. He also served on many government advisory boards and commissions dealing with nuclear and other weapons. In 1961, the combination of a heart attack and changes in administration in Washington led York too return to the University of California for the talking peace portion of his life. He has since become a public exponent of arms control and disarmament and the futility of seeking increased security through more and better nuclear weapons. York's explanation of his move from making weapons to talking peace leaves the reader with a puzzle

  6. Do Weapons Facilitate Adolescent Delinquency? An Examination of Weapon Carrying and Delinquency Among Adolescents.

    Science.gov (United States)

    Emmert, Amanda D; Hall, Gina Penly; Lizotte, Alan J

    2018-03-01

    This article examines whether weapon carrying influences the frequency and variety of violent, property, and drug delinquency adolescents commit through fixed-effects analyses of data from the Rochester Youth Development Study (RYDS). We conclude that weapon carrying contributes to violent, substance, and property delinquency, and delinquent behaviors learned during weapon carrying continue to affect substance and property delinquency long after carrying has ceased.

  7. Prerequisites for a nuclear weapons convention

    International Nuclear Information System (INIS)

    Liebert, W.

    1999-01-01

    A Nuclear Weapons Convention (NWC) would prohibit the research, development, production, testing, stockpiling, transfer, use and threat of use of nuclear weapons and would serve their total elimination.' In this fashion it follows the model laid out by the biological and chemical weapons conventions. The NWC would encompass a few other treaties and while replacing them should learn from their experiences. The Nuclear Weapons Convention should at some given point in the future replace the Non-Proliferation Treaty (NPT) and so resolve its contradictions and shortcomings. The main objectives of an NWC Would be: reduction of the nuclear arsenals of the 'five' nuclear weapons powers down to zero within a set of fixed periods of time; elimination of stockpiles of weapons-usable materials and, where existent, nuclear warheads in de-facto nuclear weapon and threshold states; providing assurance that all states will retain their non-nuclear status forever

  8. Weapons and hope

    International Nuclear Information System (INIS)

    Dyson, F.

    1984-01-01

    The British-born physicist presents a full-blown critique of US weapons policy. His careful evaluation of opposing views leads him to endorse a live-and-let-live concept of arms control, which would reject both assured destruction and first use of nuclear weapons in favor of abolishing them. Dyson's faith in the humane progress of military technology and his tolerance of dangerous conventional weapons will not please dovish readers, while his denunciation of military idolatry and his support of a nuclear freeze will disappoint some hawks. Along with moving personal memories of war and pacifism, the most original sections of the book are the author's insightful comments about the Soviet Union and the issue of verification

  9. Maintaining non-nuclear weapon status

    International Nuclear Information System (INIS)

    Muller, H.

    1991-01-01

    Among the some 170 sovereign states in the world, five are legally recognized as nuclear weapon states (NWS) under the terms of the 1968 Non-Proliferation Treaty (NPT). Six countries (Argentina, Brazil, India, Israel, Pakistan, and South Africa) are counted as threshold states: they possess sizeable unsafeguarded nuclear facilities or have passed the brink of a nuclear test or of clandestine weapon production. Six other countries (Iran, Iraq, Libya, Taiwan, and North and South Korea) have been suspected periodically of either considering the nuclear weapon option or of working secretly on the development of weapons. Thus, about 150 non-nuclear weapon states (NNWS) remain which neither possess nuclear weapons nor strive to acquire them. These states are distributed throughout the globe and encompass highly industrialized as well as underdeveloped countries, liberal democracies, socialist states, sheikdoms and dictatorships. Some NNWS face acute military threats; other are far removed from the quarrels of the world, as in the case of some remote fortunate islands. Furthermore, NNWS may be members of nuclear-umbrella alliances or may have opted for a policy of neutrality or non-alignment

  10. The return of nuclear weapons

    International Nuclear Information System (INIS)

    Calvez, Jean-Yves

    2005-01-01

    Written after the 2005 NPT review conference, this article first recalls the early stages of nuclear proliferation: acquisition of nuclear weapons by Great-Britain, USSR, France and China, and creation of the NPT in 1970. The author briefly evokes some weaknesses and violations of this treaty: emergence of new nuclear powers (India, Pakistan, Israel) and of nuclear weapon programmes (Iran, North Korea). He outlines the lack of true rules to impede countries to develop nuclear weapons, and then states that the only solution seems to be a simple abolition of these weapons. This option is notably supported by the Catholic Church as outlined and recalled here. The author discusses the situation of this abolition option, and notices that, even though NPT members committed themselves on this way, some also decided to develop new and smaller weapons. Then, it becomes always more difficult to persuade countries not to possess these weapons. The author finally discusses the issues of terrorism threat in relationship to the miniaturisation process, and regrets the lack of commitment in an abolition process

  11. Wounds and weapons

    Energy Technology Data Exchange (ETDEWEB)

    Vogel, H. [Asklepios Klinik St. Georg, Roentgenabteilung, Lohmuehlenstrasse 5, 20099 Hamburg (Germany)], E-mail: Hermann.vogel@ak-stgeorg.lbk-hh.de; Dootz, B. [Asklepios Klinik St. Georg, Roentgenabteilung, Lohmuehlenstrasse 5, 20099 Hamburg (Germany)

    2007-08-15

    Purpose: X-ray findings are described, which are typical for injuries due to conventional weapons. It is intended to demonstrate that radiographs can show findings characteristic for weapons. Material and method: The radiograms have been collected in Vietnam, Croatia, Serbia, Bosnia, Chad, Iran, Afghanistan, USA, Great Britain, France, Israel, Palestine, and Germany. Results: Radiograms of injuries due to hand grenades show their content (globes) and cover fragments. The globes are localized regionally in the victim's body. Survivors of cluster bombs show singular or few globes; having been hit by many globes would have been lethal. Shotguns produce characteristic distributions of the pallets and depth of penetration different from those of hand grenades and cluster bombs; cover fragments are lacking. Gunshot wounds (GSW) can be differentiated in those to low velocity bullets, high velocity projectiles, and projectiles, which disintegrate on impact. The radiogram furnishes the information about a dangerous shock and helps to recognize the weapon. Radiograms of victims of explosion show fragments and injuries due to the blast, information valid for therapy planning and prognosis. The radiogram shows details which can be used in therapy, forensic medicine and in war propaganda - examples could be findings typical for cluster bombs and for dumdum bullets; it shows the cruelty of the employment of weapons against humans and the conflict between the goal of medical care and those of military actions. Conclusion: Radiographs may show, which weapon has been employed; they can be read as war reports.

  12. Wounds and weapons

    International Nuclear Information System (INIS)

    Vogel, H.; Dootz, B.

    2007-01-01

    Purpose: X-ray findings are described, which are typical for injuries due to conventional weapons. It is intended to demonstrate that radiographs can show findings characteristic for weapons. Material and method: The radiograms have been collected in Vietnam, Croatia, Serbia, Bosnia, Chad, Iran, Afghanistan, USA, Great Britain, France, Israel, Palestine, and Germany. Results: Radiograms of injuries due to hand grenades show their content (globes) and cover fragments. The globes are localized regionally in the victim's body. Survivors of cluster bombs show singular or few globes; having been hit by many globes would have been lethal. Shotguns produce characteristic distributions of the pallets and depth of penetration different from those of hand grenades and cluster bombs; cover fragments are lacking. Gunshot wounds (GSW) can be differentiated in those to low velocity bullets, high velocity projectiles, and projectiles, which disintegrate on impact. The radiogram furnishes the information about a dangerous shock and helps to recognize the weapon. Radiograms of victims of explosion show fragments and injuries due to the blast, information valid for therapy planning and prognosis. The radiogram shows details which can be used in therapy, forensic medicine and in war propaganda - examples could be findings typical for cluster bombs and for dumdum bullets; it shows the cruelty of the employment of weapons against humans and the conflict between the goal of medical care and those of military actions. Conclusion: Radiographs may show, which weapon has been employed; they can be read as war reports

  13. Asouzu's phenomenon of concealment and Bacon's idols of the ...

    African Journals Online (AJOL)

    The study emanates from the contentions of leaders of states, who, instead of promoting the ideals and values which promote social and political-coexistence, limit and conceal their views of leadership to some tribalistic, ethnocentric and self-serving idols, and by so doing, they cause a monumental harm to the polity. This is ...

  14. Is anterior N2 enhancement a reliable electrophysiological index of concealed information?

    Science.gov (United States)

    Ganis, Giorgio; Bridges, David; Hsu, Chun-Wei; Schendan, Haline E

    2016-12-01

    Concealed information tests (CITs) are used to determine whether an individual possesses information about an item of interest. Event-related potential (ERP) measures in CITs have focused almost exclusively on the P3b component, showing that this component is larger when lying about the item of interest (probe) than telling the truth about control items (irrelevants). Recent studies have begun to examine other ERP components, such as the anterior N2, with mixed results. A seminal CIT study found that visual probes elicit a larger anterior N2 than irrelevants (Gamer and Berti, 2010) and suggested that this component indexes cognitive control processes engaged when lying about probes. However, this study did not control for potential intrinsic differences among the stimuli: the same probe and irrelevants were used for all participants, and there was no control condition composed of uninformed participants. Here, first we show that the N2 effect found in the study by Gamer and Berti (2010) was in large part due to stimulus differences, as the effect observed in a concealed information condition was comparable to that found in two matched control conditions without any concealed information (Experiments 1 and 2). Next, we addressed the issue of the generality of the N2 findings by counterbalancing a new set of stimuli across participants and by using a control condition with uninformed participants (Experiment 3). Results show that the probe did not elicit a larger anterior N2 than the irrelevants under these controlled conditions. These findings suggest that caution should be taken in using the N2 as an index of concealed information in CITs. Furthermore, they are a reminder that results of CIT studies (not only with ERPs) performed without stimulus counterbalancing and suitable control conditions may be confounded by differential intrinsic properties of the stimuli employed. Copyright © 2016 Elsevier Inc. All rights reserved.

  15. Error Concealment using Data Hiding in Wireless Image Transmission

    Directory of Open Access Journals (Sweden)

    A. Akbari

    2016-11-01

    Full Text Available The transmission of image/video over unreliable medium like wireless networks generally results in receiving a damaged image/video. In this paper, a novel image error concealment scheme based on the idea of data hiding and Set Partitioning In Hierarchical Trees (SPIHT coding is investigated. In the encoder side, the coefficients of wavelet decomposed image are partitioned into “perfect trees”. The SPIHT coder is applied to encode each per-fect tree independently and generate an efficiently compressed reference code. This code is then embedded into the coefficients of another perfect tree which is located in a different place, using a robust data hiding scheme based on Quantization Index Modulation (QIM. In the decoder side, if a part of the image is lost, the algorithm extracts the embedded code for reference trees related to this part to reconstruct the lost information. Performance results show that for an error prone transmission, the proposed technique is promising to efficiently conceal the lost areas of the transmitted image.

  16. Sequential error concealment for video/images by weighted template matching

    DEFF Research Database (Denmark)

    Koloda, Jan; Østergaard, Jan; Jensen, Søren Holdt

    2012-01-01

    In this paper we propose a novel spatial error concealment algorithm for video and images based on convex optimization. Block-based coding schemes in packet loss environment are considered. Missing macro blocks are sequentially reconstructed by filling them with a weighted set of templates...

  17. Vulnerability assessment of a space based weapon platform electronic system exposed to a thermonuclear weapon detonation

    Science.gov (United States)

    Perez, C. L.; Johnson, J. O.

    Rapidly changing world events, the increased number of nations with inter-continental ballistic missile capability, and the proliferation of nuclear weapon technology will increase the number of nuclear threats facing the world today. Monitoring these nation's activities and providing an early warning and/or intercept system via reconnaissance and surveillance satellites and space based weapon platforms is a viable deterrent against a surprise nuclear attack. However, the deployment of satellite and weapon platform assets in space will subject the sensitive electronic equipment to a variety of natural and man-made radiation environments. These include Van Allen Belt protons and electrons; galactic and solar flare protons; and neutrons, gamma rays, and x-rays from intentionally detonated fission and fusion weapons. In this paper, the MASH vl.0 code system is used to estimate the dose to the critical electronics components of an idealized space based weapon platform from neutron and gamma-ray radiation emitted from a thermonuclear weapon detonation in space. Fluence and dose assessments were performed for the platform fully loaded, and in several stages representing limited engagement scenarios. The results indicate vulnerabilities to the Command, Control, and Communication bay instruments from radiation damage for a nuclear weapon detonation for certain source/platform orientations. The distance at which damage occurs will depend on the weapon yield (n,(gamma)/kiloton) and size (kilotons).

  18. Self-stigma among concealable minorities in Hong Kong: conceptualization and unified measurement.

    Science.gov (United States)

    Mak, Winnie W S; Cheung, Rebecca Y M

    2010-04-01

    Self-stigma refers to the internalized stigma that individuals may have toward themselves as a result of their minority status. Not only can self-stigma dampen the mental health of individuals, it can deter them from seeking professional help lest disclosing their minority status lead to being shunned by service providers. No unified instrument has been developed to measure consistently self-stigma that could be applied to different concealable minority groups. The present study presented findings based on 4 studies on the development and validation of the Self-Stigma Scale, conducted in Hong Kong with community samples of mental health consumers, recent immigrants from Mainland China, and sexual minorities. Upon a series of validation procedures, a 9-item Self-Stigma Scale-Short Form was developed. Initial support on its reliability and construct validity (convergent and criterion validities) were found among 3 stigmatized groups. Utility of this unified measure was to establish an empirical basis upon which self-stigma of different concealable minority groups could be assessed under the same dimensions. Health-care professionals could make use of this short scale to assess potential self-stigmatization among concealable minorities, which may hamper their treatment process as well as their overall well-being.

  19. Political accountability and autonomous weapons

    Directory of Open Access Journals (Sweden)

    James Igoe Walsh

    2015-09-01

    Full Text Available Autonomous weapons would have the capacity to select and attack targets without direct human input. One important objection to the introduction of such weapons is that they will make it more difficult to identify and hold accountable those responsible for undesirable outcomes such as mission failures and civilian casualties. I hypothesize that individuals can modify their attribution of responsibility in predicable ways to accommodate this new technology. The results of a survey experiment are consistent with this; subjects continue to find responsible and hold accountable political and military leaders when autonomous weapons are used, but also attribute responsibility to the designers and programmers of such weapons.

  20. Disposition of excess weapons plutonium from dismantled weapons

    International Nuclear Information System (INIS)

    Jardine, L.J.

    1997-01-01

    With the end of the Cold War and the implementation of various nuclear arms reduction agreements, US and Russia have been actively dismantling tens of thousands of nuclear weapons. As a result,large quantities of fissile materials, including more than 100 (tonnes?) of weapons-grade Pu, have become excess to both countries' military needs. To meet nonproliferation goals and to ensure the irreversibility of nuclear arms reductions, this excess weapons Pu must be placed in secure storage and then, in timely manner, either used in nuclear reactors as fuel or discarded in geologic repositories as solid waste. This disposition in US and Russia must be accomplished in a safe, secure manner and as quickly as practical. Storage of this Pu is a prerequisite to any disposition process, but the length of storage time is unknown. Whether by use as fuel or discard as solid waste, disposition of that amount of Pu will require decades--and perhaps longer, if disposition operations encounter delays. Neither US nor Russia believes that long-term secure storage is a substitute for timely disposition of excess Pu, but long-term, safe, secure storage is a critical element of all excess Pu disposition activities

  1. Decision makers use norms, not cost-benefit analysis, when choosing to conceal or reveal unfair rewards.

    Directory of Open Access Journals (Sweden)

    Marco Heimann

    Full Text Available We introduce the Conceal or Reveal Dilemma, in which individuals receive unfair benefits, and must decide whether to conceal or to reveal this unfair advantage. This dilemma has two important characteristics: it does not lend itself easily to cost-benefit analysis, neither to the application of any strong universal norm. As a consequence, it is ideally suited to the study of interindividual and intercultural variations in moral-economic norms. In this paper we focus on interindividual variations, and we report four studies showing that individuals cannot be swayed by financial incentives to conceal or to reveal, and follow instead fixed, idiosyncratic strategies. We discuss how this result can be extended to individual and cultural variations in the tendency to display or to hide unfair rewards.

  2. High-Performance Region-of-Interest Image Error Concealment with Hiding Technique

    Directory of Open Access Journals (Sweden)

    Shih-Chang Hsia

    2010-01-01

    Full Text Available Recently region-of-interest (ROI based image coding is a popular topic. Since ROI area contains much more important information for an image, it must be prevented from error decoding while suffering from channel lost or unexpected attack. This paper presents an efficient error concealment method to recover ROI information with a hiding technique. Based on the progressive transformation, the low-frequency components of ROI are encoded to disperse its information into the high-frequency bank of original image. The capability of protection is carried out with extracting the ROI coefficients from the damaged image without increasing extra information. Simulation results show that the proposed method can efficiently reconstruct the ROI image when ROI bit-stream occurs errors, and the measurement of PSNR result outperforms the conventional error concealment techniques by 2 to 5 dB.

  3. Scientific review of psychophysiological detection of deceit

    Directory of Open Access Journals (Sweden)

    Igor Areh

    2016-10-01

    Full Text Available Psychophysiological detection of deceit has been in the centre of attention in the recent decade, which correlates with heightened security challenges of a modern world. The article provides scientific discussion about polygraph that is used in criminal investigation. Two most employed polygraph techniques are critically presented, examined and compared: the Comparison Question Test (CQT and the Concealed Information Test (CIT. Theoretical foundations, objectivity and standardization of testing procedures, ethical and practical issues are analysed. Proponents of the Comparison Question Test have not been successful in their efforts to resolve fundamental problems and limitations with which the technique is challenged. It remains unstandardized and unscientific, separated from science and mainly without attempts to escape from the dead-end. The most influential theoretical backgrounds of CQT technique are examined; however, none of them represents a satisfactory scientific foundation of the technique. Without being scientifically grounded in a verifiable theory, it remains controversial and caught into self-sufficiency, mostly supported by methodologically questionable research findings gained by proponents. To the contrary, the Concealed Information Test is associated with fast development, particularly in the field of neurology, and is considered to be less disputed and to be partly supported by a sound scientific ground. Applying the Concealed Question Test, somewhat naïve and disputable detection of lies typical of the Comparison Question Test is replaced by a search for information that lies concealed in the suspects’ memory. However, the Concealed Information Test also has been challenged by serious deficiencies, which bring forward a question about justification of the use of the polygraph.

  4. Validation of the Body Concealment Scale for Scleroderma (BCSS): Replication in the Scleroderma Patient-centered Intervention Network (SPIN) Cohort

    NARCIS (Netherlands)

    Jewett, L.R.; Kwakkenbos, C.M.C.; Carrier, M.E.; Malcarne, V.L.; Harcourt, D.; Rumsey, N.; Mayes, M.D.; Assassi, S.; Körner, A.; Fox, R.S.; Gholizadeh, S.; Mills, S.D.; Fortune, C.; Thombs, B.D.

    2017-01-01

    Body concealment is an important component of appearance distress for individuals with disfiguring conditions, including scleroderma. The objective was to replicate the validation study of the Body Concealment Scale for Scleroderma (BCSS) among 897 scleroderma patients. The factor structure of the

  5. What are you hiding? : The underlying and contributing mechanisms of physiological memory detection

    NARCIS (Netherlands)

    klein Selle, N.

    2017-01-01

    The notion that physiological and behavioral measures can be used to detect concealed memories is intriguing, to say the least. Although years of research on the Concealed Information Test (CIT) have proven the validity of this method, it also raised new questions. The present dissertation focused

  6. Measurement techniques for the verification of excess weapons materials

    International Nuclear Information System (INIS)

    Tape, J.W.; Eccleston, G.W.; Yates, M.A.

    1998-01-01

    The end of the superpower arms race has resulted in an unprecedented reduction in stockpiles of deployed nuclear weapons. Numerous proposals have been put forward and actions have been taken to ensure the irreversibility of nuclear arms reductions, including unilateral initiatives such as those made by President Clinton in September 1993 to place fissile materials no longer needed for a deterrent under international inspection, and bilateral and multilateral measures currently being negotiated. For the technologist, there is a unique opportunity to develop the technical means to monitor nuclear materials that have been declared excess to nuclear weapons programs, to provide confidence that reductions are taking place and that the released materials are not being used again for nuclear explosive programs. However, because of the sensitive nature of these materials, a fundamental conflict exists between the desire to know that the bulk materials or weapon components in fact represent evidence of warhead reductions, and treaty commitments and national laws that require the protection of weapons design information. This conflict presents a unique challenge to technologists. The flow of excess weapons materials, from deployed warheads through storage, disassembly, component storage, conversion to bulk forms, and disposition, will be described in general terms. Measurement approaches based on the detection of passive or induced radiation will be discussed along with the requirement to protect sensitive information from release to unauthorized parties. Possible uses of measurement methods to assist in the verification of arms reductions will be described. The concept of measuring attributes of items rather than quantitative mass-based inventory verification will be discussed along with associated information-barrier concepts required to protect sensitive information

  7. Verification of Chemical Weapons Destruction

    International Nuclear Information System (INIS)

    Lodding, J.

    2010-01-01

    The Chemical Weapons Convention is the only multilateral treaty that bans completely an entire category of weapons of mass destruction under international verification arrangements. Possessor States, i.e. those that have chemical weapons stockpiles at the time of becoming party to the CWC, commit to destroying these. All States undertake never to acquire chemical weapons and not to help other States acquire such weapons. The CWC foresees time-bound chemical disarmament. The deadlines for destruction for early entrants to the CWC are provided in the treaty. For late entrants, the Conference of States Parties intervenes to set destruction deadlines. One of the unique features of the CWC is thus the regime for verifying destruction of chemical weapons. But how can you design a system for verification at military sites, while protecting military restricted information? What degree of assurance is considered sufficient in such circumstances? How do you divide the verification costs? How do you deal with production capability and initial declarations of existing stockpiles? The founders of the CWC had to address these and other challenges in designing the treaty. Further refinement of the verification system has followed since the treaty opened for signature in 1993 and since inspection work was initiated following entry-into-force of the treaty in 1997. Most of this work concerns destruction at the two large possessor States, Russia and the United States. Perhaps some of the lessons learned from the OPCW experience may be instructive in a future verification regime for nuclear weapons. (author)

  8. Weapons of mass destruction - current security threat

    International Nuclear Information System (INIS)

    Durdiak, J.; Gafrik, A.; Pulis, P.; Susko, M.

    2005-01-01

    This publication brings a complex and comprehensive view of the weapons of mass destruction phenomenon in the context of present military and political situation. It emphasizes the threat posed by proliferation of these destructive devices and their carriers as well as the threat present in their possession by unpredictable totalitarian regimes or terrorist groups. The publication is structured into four basic parts: Introduction Into The Topic, Nuclear Weapons, Chemical Weapons and Biological Weapons. The Introduction reflects the latest developments on the field of military technologies, which lead to the development of new destructive devices with characteristics comparable to basic types of WMDs - nuclear, chemical and biological. Based on the definition of WMD as 'weapon systems with enormous impact causing mass destruction, population, equipment and material losses', the modern mass destruction devices are assorted here, such as ecological, radiological and beam weapons, aerosol and container intelligent ammunition, the outburst of dangerous chemical substances from infrastructure, non-conventional weapons and military devices. The Nuclear Weapons part depicts the most destructive device of mass destruction mankind ever invented in close detail. It maps the history of most significant discoveries in nuclear physics, development and construction of the first nuclear weapons, accumulation of nuclear warheads and their carriers in the Cold war era, attempts of nuclear disarmament and reducing the number of nuclear weapons in possession of superpowers and their proliferation in the world's crisis regions including North Korea and Iran. The chapters devoted to theoretical grounds and physical principles of nuclear and thermonuclear weapons' functioning, the main categories and types, as well as destructive effects and consequences of use contain an adequate mathematical apparatus. This chapter's conclusion brings the overview of nuclear armament of states that

  9. [Management of moderate to severe pediatric concealed penis in children by Devine's technique via incision between the penis and scrotum].

    Science.gov (United States)

    Zhang, Xin-Sheng; Liu, Shi-Xiong; Xiang, Xue-Yan; Zhang, Wen-Gang; Tang, Da-Xing

    2014-04-01

    To search for a simple and effective surgical approach to the management of moderate to severe pediatric concealed penis in children. We used Devine's technique via incision between the penis and scrotum in the treatment of 68 cases of moderate to severe pediatric concealed penis. The patients were aged 3 -13 (mean 6.5) years, 30 with moderate and 38 with severe pediatric concealed penis. This strategy achieved good near- and long-term effects and satisfactory appearance of the penis, which was similar to that of circumcision. At 3 months after surgery, the penile length was 3 - 5.2 cm, averaging (2.35 +/- 0.35) cm. Devine's technique via incision between the penis and scrotum is a simple and effective surgical option for moderate to severe pediatric concealed penis in children.

  10. Global strike hypersonic weapons

    Science.gov (United States)

    Lewis, Mark J.

    2017-11-01

    Beginning in the 1940's, the United States has pursued the development of hypersonic technologies, enabling atmospheric flight in excess of five times the speed of sound. Hypersonic flight has application to a range of military and civilian applications, including commercial transport, space access, and various weapons and sensing platforms. A number of flight tests of hypersonic vehicles have been conducted by countries around the world, including the United States, Russia, and China, that could lead the way to future hypersonic global strike weapon systems. These weapons would be especially effective at penetrating conventional defenses, and could pose a significant risk to national security.

  11. Do Children Understand That People Selectively Conceal or Express Emotion?

    Science.gov (United States)

    Hayashi, Hajimu; Shiomi, Yuki

    2015-01-01

    This study examined whether children understand that people selectively conceal or express emotion depending upon the context. We prepared two contexts for a verbal display task for 70 first-graders, 80 third-graders, 64 fifth-graders, and 71 adults. In both contexts, protagonists had negative feelings because of the behavior of the other…

  12. Exploring the Possible Use of Information Barriers for future Biological Weapons Verification Regimes

    International Nuclear Information System (INIS)

    Luke, S.J.

    2011-01-01

    This report describes a path forward for implementing information barriers in a future generic biological arms-control verification regime. Information barriers have become a staple of discussion in the area of arms control verification approaches for nuclear weapons and components. Information barriers when used with a measurement system allow for the determination that an item has sensitive characteristics without releasing any of the sensitive information. Over the last 15 years the United States (with the Russian Federation) has led on the development of information barriers in the area of the verification of nuclear weapons and nuclear components. The work of the US and the Russian Federation has prompted other states (e.g., UK and Norway) to consider the merits of information barriers for possible verification regimes. In the context of a biological weapons control verification regime, the dual-use nature of the biotechnology will require protection of sensitive information while allowing for the verification of treaty commitments. A major question that has arisen is whether - in a biological weapons verification regime - the presence or absence of a weapon pathogen can be determined without revealing any information about possible sensitive or proprietary information contained in the genetic materials being declared under a verification regime. This study indicates that a verification regime could be constructed using a small number of pathogens that spans the range of known biological weapons agents. Since the number of possible pathogens is small it is possible and prudent to treat these pathogens as analogies to attributes in a nuclear verification regime. This study has determined that there may be some information that needs to be protected in a biological weapons control verification regime. To protect this information, the study concludes that the Lawrence Livermore Microbial Detection Array may be a suitable technology for the detection of the

  13. Exploring the Possible Use of Information Barriers for future Biological Weapons Verification Regimes

    Energy Technology Data Exchange (ETDEWEB)

    Luke, S J

    2011-12-20

    This report describes a path forward for implementing information barriers in a future generic biological arms-control verification regime. Information barriers have become a staple of discussion in the area of arms control verification approaches for nuclear weapons and components. Information barriers when used with a measurement system allow for the determination that an item has sensitive characteristics without releasing any of the sensitive information. Over the last 15 years the United States (with the Russian Federation) has led on the development of information barriers in the area of the verification of nuclear weapons and nuclear components. The work of the US and the Russian Federation has prompted other states (e.g., UK and Norway) to consider the merits of information barriers for possible verification regimes. In the context of a biological weapons control verification regime, the dual-use nature of the biotechnology will require protection of sensitive information while allowing for the verification of treaty commitments. A major question that has arisen is whether - in a biological weapons verification regime - the presence or absence of a weapon pathogen can be determined without revealing any information about possible sensitive or proprietary information contained in the genetic materials being declared under a verification regime. This study indicates that a verification regime could be constructed using a small number of pathogens that spans the range of known biological weapons agents. Since the number of possible pathogens is small it is possible and prudent to treat these pathogens as analogies to attributes in a nuclear verification regime. This study has determined that there may be some information that needs to be protected in a biological weapons control verification regime. To protect this information, the study concludes that the Lawrence Livermore Microbial Detection Array may be a suitable technology for the detection of the

  14. For a convention for nuclear weapon elimination

    International Nuclear Information System (INIS)

    2008-03-01

    This document contains two texts linked with the project of an international convention for the elimination of nuclear weapons (the text of this project has been sent to the UN General Secretary and is part of an international campaign to abolish nuclear weapons, ICAN). These two texts are contributions presented in London at the Global Summit for a Nuclear Weapon-free World. The first one calls into question the deterrence principle and the idea of a nuclear weapon-based security. It calls for different forms of action to promote a nuclear weapon-free world. The second text stresses the role and the responsibility of states with nuclear weapons in nuclear disarmament and in the reinforcement of the nuclear non proliferation treaty (NPT)

  15. Error Concealment Method Based on Motion Vector Prediction Using Particle Filters

    Directory of Open Access Journals (Sweden)

    B. Hrusovsky

    2011-09-01

    Full Text Available Video transmitted over unreliable environment, such as wireless channel or in generally any network with unreliable transport protocol, is facing the losses of video packets due to network congestion and different kind of noises. The problem is becoming more important using highly effective video codecs. Visual quality degradation could propagate into subsequent frames due to redundancy elimination in order to obtain high compression ratio. Since the video stream transmission in real time is limited by transmission channel delay, it is not possible to retransmit all faulty or lost packets. It is therefore inevitable to conceal these defects. To reduce the undesirable effects of information losses, the lost data is usually estimated from the received data, which is generally known as error concealment problem. This paper discusses packet loss modeling in order to simulate losses during video transmission, packet losses analysis and their impacts on the motion vectors losses.

  16. Nuclear power and weapons proliferation

    International Nuclear Information System (INIS)

    Greenwood, T.; Rathjens, C.W.; Ruina, J.

    1977-01-01

    The relationship between nuclear weapons development and nuclear electric power is examined. A brief description of nuclear weapons design is first given. This is then followed by a discussion of various aspects of nuclear power technology and of how they affect a nuclear weapon programme. These include fuel cycles, chemical reprocessing of spent fuel, uranium enrichment, and the control of dissemination of nuclear technology. In conclusion there is a discussion of possible political and institutional controls for limiting nuclear proliferation. (U.K.)

  17. Hidden Markov Model-based Packet Loss Concealment for Voice over IP

    DEFF Research Database (Denmark)

    Rødbro, Christoffer A.; Murthi, Manohar N.; Andersen, Søren Vang

    2006-01-01

    As voice over IP proliferates, packet loss concealment (PLC) at the receiver has emerged as an important factor in determining voice quality of service. Through the use of heuristic variations of signal and parameter repetition and overlap-add interpolation to handle packet loss, conventional PLC...

  18. Effects of the use of ABC weapons

    International Nuclear Information System (INIS)

    Karl-Rueckert, E.

    1980-01-01

    The effects of ABC-weapons are presented. The various classes of chemical weapons and their effects are discussed. It is pointed out that there is hardly a means of protection against these weapons. (MG) [de

  19. Special Weapons

    Data.gov (United States)

    Federal Laboratory Consortium — Supporting Navy special weapons, the division provides an array of engineering services, technical publication support services, logistics support services, safety...

  20. Aum Shinrikyo's Chemical and Biological Weapons: More Than Sarin.

    Science.gov (United States)

    Tu, A T

    2014-07-01

    The radical religious group Aum Shinrikyo was founded in Japan in the 1980s and grew rapidly in the 1990s. Aum members perpetrated a mass murder in Matsumoto City in 1994, where they used sarin as a chemical weapon to poison approximately 500 civilians. On March 20, 1995, Aum deployed sarin in an even larger terrorist attack on the Tokyo Subway System, which poisoned some 6,000 people. After the Tokyo Subway attack, the Japanese Police arrested the sect's senior members. From 2005 through 2011, 13 of these senior members were sentenced to death. In this article, aspects of Aum's chemical and biological terrorism are reviewed. Sarin production efforts by the sect are described, including how the degradation product of sarin in soil, methylphosphonic acid, enabled the detection of sarin production sites. Also, Aum's chemical-warfare agents other than sarin are described, as are its biological weapons. The author was permitted by the Japanese government to interview Dr. Tomomasa Nakagawa, one of the senior members of Aum Shinrikyo. From Dr. Nakagawa the author obtained valuable inside information about Aum's chemical and biological weapons programs. Copyright © 2014 Central Police University.

  1. Nuclear power and nuclear weapons

    International Nuclear Information System (INIS)

    Vaughen, V.C.A.

    1983-01-01

    The proliferation of nuclear weapons and the expanded use of nuclear energy for the production of electricity and other peaceful uses are compared. The difference in technologies associated with nuclear weapons and nuclear power plants are described

  2. Out and healthy: Being more "out" about a concealable stigmatized identity may boost the health benefits of social support.

    Science.gov (United States)

    Weisz, Bradley M; Quinn, Diane M; Williams, Michelle K

    2016-12-01

    This research examined whether the relationship between perceived social support and health would be moderated by level of outness for people living with different concealable stigmatized identities (mental illness, substance abuse, domestic violence, rape, or childhood abuse). A total of 394 people living with a concealable stigmatized identity completed a survey. Consistent with hypotheses, at high levels of outness, social support predicted better health; at low levels of outness, social support was less predictive of health. People concealing a stigmatized identity may only be able to reap the health benefits of social support if they are "out" about the stigmatized identity. © The Author(s) 2015.

  3. Terror weapons. Ridding the world of nuclear, biological and chemical weapons - Commission on mass destruction weapons; Armes de terreur. Debarrasser le monde des armes nucleaires, biologiques et chimiques - Commission sur les armes de destruction massive

    Energy Technology Data Exchange (ETDEWEB)

    Blix, H.; Journe, V.

    2010-07-01

    This book approaches in 8 chapters the ambitious challenge of ridding the world of all mass destruction weapons: 1 - re-launching disarmament; 2 - terror weapons: nature of threats and answers (weakness of traditional answers, counter-proliferation); 3 - nuclear weapons: preventing proliferation and terrorism, reducing threat and nuclear weapons number, from regulation to banning); 4 - biological or toxin weapons; 5 - chemical weapons; 6 - vectors, anti-missile defenses and space weapons; 7 - exports control, international assistance and non-governmental actors; 8 - respect, verification, enforcement and role of the United Nations. The recommendations and works of the Commission are presented in appendix together with the declaration adopted on April 30, 2009. (J.S.)

  4. Concealment tactics among HIV-positive nurses in Uganda

    OpenAIRE

    Kyakuwa, M.; Hardon, A.

    2012-01-01

    This paper is based on two-and-a-half years of ethnographic fieldwork in two rural Ugandan health centres during a period of ART scale-up. Around one-third of the nurses in these two sites were themselves HIV-positive but most concealed their status. We describe how a group of HIV-positive nurses set up a secret circle to talk about their predicament as HIV-positive healthcare professionals and how they developed innovative care technologies to overcome the skin rashes caused by ART that thre...

  5. Condition-Dependent Trade-Off Between Weapon Size and Immunity in Males of the European Earwig.

    Science.gov (United States)

    Körner, Maximilian; Vogelweith, Fanny; Foitzik, Susanne; Meunier, Joël

    2017-08-11

    Investigating the expression of trade-offs between key life-history functions is central to our understanding of how these functions evolved and are maintained. However, detecting trade-offs can be challenging due to variation in resource availability, which masks trade-offs at the population level. Here, we investigated in the European earwig Forficula auricularia whether (1) weapon size trades off with three key immune parameters - hemocyte concentration, phenoloxidase and prophenoloxidase activity - and whether (2) expression and strength of these trade-offs depend on male body condition (body size) and/or change after an immune challenge. Our results partially confirmed condition dependent trade-offs between weapon size and immunity in male earwigs. Specifically, we found that after an immune challenge, weapon size trades off with hemocyte concentrations in low-condition, but not in good-condition males. Contrastingly, weapon size was independent of pre-challenge hemocyte concentration. We also found no trade-off between weapon size and phenoloxidase activity, independent of body condition and immune challenge. Overall, our study reveals that trade-offs with sexual traits may weaken or disappear in good-condition individuals. Given the importance of weapon size for male reproductive success, our results highlight how low-condition individuals may employ alternative life-history investment strategies to cope with resource limitation.

  6. Detection of abandoned mines/caves using airborne LWIR hyperspectral data

    Science.gov (United States)

    Shen, Sylvia S.; Roettiger, Kurt A.

    2012-09-01

    The detection of underground structures, both natural and man-made, continues to be an important requirement in both the military/intelligence and civil communities. There are estimates that as many as 70,000 abandoned mines/caves exist across the nation. These mines represent significant hazards to public health and safety, and they are of concern to Government agencies at the local, state, and federal levels. NASA is interested in the detection of caves on Mars and the Moon in anticipation of future manned space missions. And, the military/ intelligence community is interested in detecting caves, mines, and other underground structures that may be used to conceal the production of weapons of mass destruction or to harbor insurgents or other persons of interest by the terrorists. Locating these mines/caves scattered over millions of square miles is an enormous task, and limited resources necessitate the development of an efficient and effective broad area search strategy using remote sensing technologies. This paper describes an internally-funded research project of The Aerospace Corporation (Aerospace) to assess the feasibility of using airborne hyperspectral data to detect abandoned cave/mine entrances in a broad-area search application. In this research, we have demonstrated the potential utility of using thermal contrast between the cave/mine entrance and the ambient environment as a discriminatory signature. We have also demonstrated the use of a water vapor absorption line at12.55 μm and a quartz absorption feature at 9.25 μm as discriminatory signatures. Further work is required to assess the broader applicability of these signatures.

  7. Bugs and gas: Agreements banning chemical and biological weapons

    Science.gov (United States)

    Mikulak, Robert P.

    2017-11-01

    The use of chemical or biological weapons, whether by a State or terrorists, continues to be a serious security concern. Both types of weapons are prohibited by multilateral treaties that have very broad membership, but both the Biological Weapons Convention and the Chemical Weapons Convention are facing major challenges. In particular, the continued use of chemical weapons in the Syrian civil war by government forces risks eroding the norm against the use of such weapons. This paper briefly explore the recent history of efforts to constrain chemical and biological weapons and outlines challenges for the future.

  8. Nuclear experts and nuclear weapons proliferation

    International Nuclear Information System (INIS)

    Mueller, H.

    1979-01-01

    In Germany the issue of nuclear weapons proliferation has attracted scant attention. Most potential nuclear weapon states are important trade partners of the FRG and, since further proliferation of nuclear weapons could worsen conflicts involving these, it should be in the FRG's interest to limit proliferation. The security of the FRG is also dependent on the common interest of the great powers to avoid nuclear war. The contradictory positions of Usa and the USSR on nuclear weapons policy regarding themselves and non-nuclear weapon states encourages less developed countries to see nuclear weaponry as useful. The NPT and IAEA safeguards have only limited inhibiting effect. The nuclear export policy of the FRG has been dominated by short term economic advantage, neglecting the negative long term effects of decreased political stability. The FRG should formulate a policy based on self-restraint, positive stimuli and extension of controls, using its economic strength to deter proliferation. (JIW)

  9. Reframing the debate against nuclear weapons

    International Nuclear Information System (INIS)

    Tyson, Rhianna

    2005-01-01

    'Some 35,000 nuclear weapons remain in the arsenals of the nuclear powers, with thousands still deployed on hair-trigger alert. Whatever rationale these weapons may once have had has long since dwindled. Political, moral, and legal constraints on actually using them further undermine their strategic utility without, however, reducing the risks of inadvertent war or proliferation. The objective of nuclear non-proliferation is not helped by the fact that the nuclear weapon States continue to insist that those weapons in their hands enhance security, while in the hands of others they are a threat to world peace. If we were making steady progress towards disarmament, this situation would be less alarming. Unfortunately, the reverse is true.' - United Nations Secretary-General Kofi Annan. 'Something is wrong with the nuclear disarmament and non-proliferation regime. Although seemingly well-equipped with an arsenal of legal and political mechanisms, such as the Nuclear Non-Proliferation Treaty (NPT), the 1996 Advisory Opinion of the International Court of Justice (ICJ), decades' worth of General Assembly (GA) resolutions and even a recent slew of ad-hoc, plurilateral initiatives such as the Proliferation Security Initiative, the regime created to prevent the catastrophe of nuclear war remains inadequate. This insufficiency is even starker when viewed in relation to the regimes controlling other weapons of mass destruction. Despite its own challenges, the Organization for the Prohibition on Chemical Weapons remains relatively well-funded and well-situated to facilitate the implementation of the Chemical Weapons Convention (CWC). Even the Biological and Toxin Weapons Convention (BTWC), while still lacking the necessary verification mechanisms, has managed to effectively criminalize not just the use and threat of use of biological weapons, but also their production, development and stockpiling. Meanwhile, the anti-nuclear regime seems to be faltering. Progress made in

  10. The Invisible Work of Closeting: A Qualitative Study About Strategies Used by Lesbian and Gay Persons to Conceal Their Sexual Orientation.

    Science.gov (United States)

    Malterud, Kirsti; Bjorkman, Mari

    2016-10-01

    The last decades have offered substantial improvement regarding human rights for lesbian and gay (LG) persons. Yet LG persons are often in the closet, concealing their sexual orientation. We present a qualitative study based on 182 histories submitted from 161 LG individuals to a Web site. The aim was to explore experiences of closeting among LG persons in Norway. A broad range of strategies was used for closeting, even among individuals who generally considered themselves to be out of the closet. Concealment was enacted by blunt denial, clever avoidance, or subtle vagueness. Other strategies included changing or eliminating the pronoun or name of the partner in ongoing conversations. Context-dependent concealment, differentiating between persons, situations, or arenas, was repeatedly applied for security or convenience. We propose a shift from "being in the closet" to "situated concealment of sexual orientation."

  11. Bioterrorism: toxins as weapons.

    Science.gov (United States)

    Anderson, Peter D

    2012-04-01

    The potential for biological weapons to be used in terrorism is a real possibility. Biological weapons include infectious agents and toxins. Toxins are poisons produced by living organisms. Toxins relevant to bioterrorism include ricin, botulinum, Clostridium perfrigens epsilson toxin, conotoxins, shigatoxins, saxitoxins, tetrodotoxins, mycotoxins, and nicotine. Toxins have properties of biological and chemical weapons. Unlike pathogens, toxins do not produce an infection. Ricin causes multiorgan toxicity by blocking protein synthesis. Botulinum blocks acetylcholine in the peripheral nervous system leading to muscle paralysis. Epsilon toxin damages cell membranes. Conotoxins block potassium and sodium channels in neurons. Shigatoxins inhibit protein synthesis and induce apoptosis. Saxitoxin and tetrodotoxin inhibit sodium channels in neurons. Mycotoxins include aflatoxins and trichothecenes. Aflatoxins are carcinogens. Trichothecenes inhibit protein and nucleic acid synthesis. Nicotine produces numerous nicotinic effects in the nervous system.

  12. JPEG2000-coded image error concealment exploiting convex sets projections.

    Science.gov (United States)

    Atzori, Luigi; Ginesu, Giaime; Raccis, Alessio

    2005-04-01

    Transmission errors in JPEG2000 can be grouped into three main classes, depending on the affected area: LL, high frequencies at the lower decomposition levels, and high frequencies at the higher decomposition levels. The first type of errors are the most annoying but can be concealed exploiting the signal spatial correlation like in a number of techniques proposed in the past; the second are less annoying but more difficult to address; the latter are often imperceptible. In this paper, we address the problem of concealing the second class or errors when high bit-planes are damaged by proposing a new approach based on the theory of projections onto convex sets. Accordingly, the error effects are masked by iteratively applying two procedures: low-pass (LP) filtering in the spatial domain and restoration of the uncorrupted wavelet coefficients in the transform domain. It has been observed that a uniform LP filtering brought to some undesired side effects that negatively compensated the advantages. This problem has been overcome by applying an adaptive solution, which exploits an edge map to choose the optimal filter mask size. Simulation results demonstrated the efficiency of the proposed approach.

  13. Weapons material and the commercial fuel cycle

    International Nuclear Information System (INIS)

    Steyn, J.J.

    1993-01-01

    In 1991, the United States and the former USSR had arsenals of ∼18,000 and 27,200 nuclear weapons, respectively. Approximately 10,000 of the US and 13,000 of the former USSR weapons were in the strategic category, and the remainder were tactical weapons. The dramatic changes in the political climate between the United States and the republics of the former USSR have resulted in the signing of the Strategic Arms Reduction Treaty (START I and II), agreements to substantially reduce nuclear weapons arsenals. Tactical weapons have already been collected in Russia, and strategic weapons are to be collected by the end of 1994. The major issues in accomplishing the treaty reductions appear to be funding, transport safety, storage capacity, and political issues between Russia and Ukraine because the latter seems to be using its weapons for political leverage on other matters. Collectively, the US and former USSR warhead stockpiles contain tremendous inventories of high-enriched uranium and weapons-grade plutonium which if converted to light water reactor fuel would equate to an enormous economic supply of natural uranium, conversion services, and enrichment separative work. The potential for this material entering the light water reactor fuel marketplace was enhanced in July 1992, when the two US industrial companies, Nuclear Fuel Services and Allied-Signal, announced that they had reached a preliminary agreement with the Russian ministry, Minatom, and the Russian Academay of Sciences to convert Russian high-enriched uranium to low-enriched uranium

  14. Effects of Weapons on Aggressive Thoughts, Angry Feelings, Hostile Appraisals, and Aggressive Behavior: A Meta-Analytic Review of the Weapons Effect Literature.

    Science.gov (United States)

    Benjamin, Arlin J; Kepes, Sven; Bushman, Brad J

    2017-09-01

    Guns are associated with aggression. A landmark 1967 study showed that simply seeing a gun can increase aggression-called the "weapons effect." This meta-analysis integrates the findings of weapons effect studies conducted from 1967 to 2017. It includes 162 effect-size estimates from 78 independent studies involving 7,668 participants. The theoretical framework used to explain the weapons effect was the General Aggression Model (GAM), which proposes three routes to aggression-cognitive, affective, and arousal. The GAM also proposes that hostile appraisals can facilitate aggression. As predicted by the GAM, the mere presence of weapons increased aggressive thoughts, hostile appraisals, and aggression, suggesting a cognitive route from weapons to aggression. Weapons did not significantly increase angry feelings. Only one study tested the effects of weapons on arousal. These findings also contribute to the debate about social priming by showing that incidental exposure to a stimulus (weapon) can affect subsequent related behavior (aggression).

  15. Characterising the online weapons trafficking on cryptomarkets.

    Science.gov (United States)

    Rhumorbarbe, Damien; Werner, Denis; Gilliéron, Quentin; Staehli, Ludovic; Broséus, Julian; Rossy, Quentin

    2018-02-01

    Weapons related webpages from nine cryptomarkets were manually duplicated in February 2016. Information about the listings (i.e. sales proposals) and vendors' profiles were extracted to draw an overview of the actual online trafficking of weapons. Relationships between vendors were also inferred through the analysis of online digital traces and content similarities. Weapons trafficking is mainly concentrated on two major cryptomarkets. Besides, it accounts for a very small proportion of the illicit trafficking on cryptomarkets compared to the illicit drugs trafficking. Among all weapon related listings (n=386), firearms only account for approximately 25% of sales proposal since the proportion of non-lethal and melee weapons is important (around 46%). Based on the recorded pseudonyms, a total of 96 vendor profiles were highlighted. Some pseudonyms were encountered on several cryptomarkets, suggesting that some vendors may manage accounts on different markets. This hypothesis was strengthened by comparing pseudonyms to online traces such as PGP keys, images and profiles descriptions. Such a method allowed to estimate more accurately the number of vendors offering weapons across cryptomarkets. Finally, according to the gathered data, the extent of the weapons trafficking on the cryptomarkets appear to be limited compared to other illicit goods. Copyright © 2017 Elsevier B.V. All rights reserved.

  16. Precursor of other nuclear-weapon-free zones

    International Nuclear Information System (INIS)

    Roman-Morey, E.

    1997-01-01

    Based on the analysis of the long process of negotiations for implementing the Treaty of Tlatelolco and its history during the last three decades, especially its influence on other regions of the world for stimulating the creation of new nuclear-weapon-free zones, the following conclusions were drawn: nuclear danger still persists; the end of Cold War implies the end of a nuclear threat; the nuclear fear should not become nuclear complacency and be accepted by international community; common security as the goal of international community should be recognised and definitive abolition of nuclear weapons should be sought; the Treaty of Tlatelolco represents the cornerstone for creating new nuclear-weapon-free zones; Treaties of Tlatelolco, Rarotonga, Bangkok and Pelindaba should be examples to be followed by other regions and groups of countries for creating new nuclear-weapon-free zones which should be recognised as very important phase in achieving a nuclear-weapon-free world and means for attaining an international regime of non-proliferation of weapons for mass destruction

  17. China's mixed signals on nuclear weapons

    International Nuclear Information System (INIS)

    Fieldhouse, R.

    1991-01-01

    Ultimately, it is nuclear whether the Chinese leadership has made up its collective mind on practical nuclear weapons. It is known from Chinese official sources, including articles in Communist Party and military publications and histories of the Chinese nuclear program, that an internal debate has proceeded for more than two decades, punctuated by occasional nuclear exercises or low-yield warhead tests. But China presumably has less reason now to pursue development of tactical nuclear weapons than in previous decades: relations with the Soviet Union have improved and military confrontation has eased; China's relations with India and Vietnam are also improving. The decision may already have been made, however, and the weapons built. The mystery surrounding Chinese tactical nuclear weapons is itself interesting, but it is also symbolic of the difficulty of understanding China's nuclear weapons program and policies. The West has accumulated a considerable body of knowledge about China's nuclear forces, especially historical material. But important aspects of China's nuclear behavior and its future as a nuclear power are hard to discern. A key question is China's future role in the spread of nuclear-capable weapons to other countries. China might add to international efforts to stem the proliferation of nuclear related technology, or it might become the world's missile merchant. It could make a constructive contribution to arms control efforts in general, or it could act as a spoiler

  18. Small Arms - Hand and Shoulder Weapons and Machine Guns

    Science.gov (United States)

    2016-06-24

    weapon barrels between firing trials is permitted. A locally fabricated rack can be used for barrels that are detached from the weapon; the air should...Lubricating oil, weapons MIL-L-14107 (LAW) 19. Hydraulic fluid, petroleum base MIL-H-5606 20. Hydraulic fluid, fire - resistant MIL-H-46170...weapon from the test environment to perform maintenance. 4.20.8 Smoke . a. Background. The smoke cloud accumulated during weapon firing can

  19. Optimized Environmental Test Sequences to Ensure the Sustainability and Reliability of Marine Weapons

    Directory of Open Access Journals (Sweden)

    Jung Ho Yang

    2014-11-01

    Full Text Available In recent years, there has been an increase in the types of marine weapons used in response to diverse hostile threats. However, because marine weapons are only tested under a single set of environmental conditions, failures due to different environmental stresses have been difficult to detect. Hence, this study proposes an environmental test sequence for multi-environment testing. The environmental test sequences for electrical units described in the international standard IEC 60068-1, and for military supply described in the United States national standard MIL-STD-810G were investigated to propose guidelines for the appropriate test sequences. This study demonstrated the need for tests in multiple environments by investigating marine weapon accidents, and evaluated which environmental stresses and test items have the largest impacts on marine weapons using a two-phase quality function deployment (QFD analysis of operational scenarios, environmental stresses, and environmental test items. Integer programming was used to determine the most influential test items and the shortest environmental test time, allowing us to propose optimal test procedures. Based on our analysis, we developed optimal environmental test sequences that could be selected by a test designer.

  20. The Regulation of the Possession of Weapons at Gatherings

    Directory of Open Access Journals (Sweden)

    Pieter du Toit

    2013-12-01

    Full Text Available The Dangerous Weapons Act 15 of 2013 provides for certain prohibitions and restrictions in respect of the possession of a dangerous weapon and it repeals the Dangerous Weapons Act 71 of 1968 as well as the different Dangerous Weapons Acts in operation in the erstwhile TBVC States. The Act also amends the Regulation of Gatherings Act 205 of 1993 to prohibit the possession of any dangerous weapon at a gathering or demonstration. The Dangerous Weapons Act provides for a uniform system of law governing the use of dangerous weapons for the whole of South Africa and it furthermore no longer places the onus on the individual charged with the offence of the possession of a dangerous weapon to show that he or she did not have any intention of using the firearm for an unlawful purpose. The Act also defines the meaning of a dangerous weapon. According to our court’s interpretation of the Dangerous Weapons Act 71 of 1968 a dangerous weapon was regarded as an object used or intended to be used as a weapon even if it had not been designed for use as a weapon. The Act, however, requires the object to be capable of causing death or inflicting serious bodily harm if it were used for an unlawful purpose. The possession of a dangerous weapon, in circumstances which may raise a reasonable suspicion that the person intends to use it for an unlawful purpose, attracts criminal liability. The Act also provides a useful set of guidelines to assist courts to determine if a person charged with the offence of the possession of a dangerous weapon had indeed intended to use the weapon for an unlawful purpose. It seems, however, that the Act prohibits the possession of a dangerous weapon at gatherings, even if the person carrying the weapon does not intend to use it for an unlawful purpose. The state will, however, have to prove that the accused had the necessary control over the object and the intention to exercise such control, as well as that the object is capable of

  1. New Weapons and the Arms Race

    Science.gov (United States)

    Tsipis, Kosta

    1983-10-01

    In speaking about technologies that could further animate the weapons competition between the United States and the U.S.S.R., it would be useful to distinguish between technologies that have already been incorporated into specific weapons systems, and new technologies that are of a generic nature, can be used in a variety of applications, adn can best be described by the tasks that they can perform rather than any specific weapons application. Let me begin with the latter class.

  2. Minority Stress and Same-Sex Relationship Satisfaction: The Role of Concealment Motivation.

    Science.gov (United States)

    Pepping, Christopher A; Cronin, Timothy J; Halford, W Kim; Lyons, Anthony

    2018-04-30

    Most lesbian, gay, and bisexual (LGB) people want a stable, satisfying romantic relationship. Although many of the predictors of relationship outcomes are similar to those of heterosexual couples, same-sex couples face some additional challenges associated with minority stress that also impact upon relationship quality. Here, we investigate the association between minority stressors and relationship quality in a sample of 363 adults (M age = 30.37, SD = 10.78) currently in a same-sex romantic relationship. Internalized homophobia and difficulties accepting one's LGB identity were each negatively associated with relationship satisfaction via heightened concealment motivation. We also examined the protective role of identity affirmation on relationship quality, finding a direct positive relationship between the two variables. Minority stressors were negatively associated with couple relationship satisfaction via heightened concealment motivation. The finding that identity affirmation directly predicted increased couple satisfaction also highlights the important role of protective factors in same-sex couple relationships. © 2018 Family Process Institute.

  3. The real value of nuclear-weapon-free zones

    International Nuclear Information System (INIS)

    Carasales, J.

    1998-01-01

    The international community has greeted the establishment of two new nuclear weapon-free zones with praise. Africa and South Asia are the regions which will join, once the respective treaties are ratified and in force, Latin America and the South Pacific to ensure that extensive areas of the earth remain free of nuclear weapons. The usual reaction to these accomplishments is to hail them as important contributions to international peace and security, and as meaningful steps towards a world free of nuclear weapons. The nuclear weapon-free zones have their value but this value relates mainly to the countries within the zone. The interest of nuclear-weapon states are not really affected, or, if they are, the influence is not significant. One should bear in mind that the really important and meaningful nuclear weapon-free zones have yet to be achieved

  4. Nuclear Weapons in Russia's approach to conflict

    International Nuclear Information System (INIS)

    Johnson, Dave

    2016-11-01

    President Putin has moved nuclear weapons to the foreground of the European security landscape. New risks and dangers arise from the apparent coupling of nuclear weapons capabilities with Moscow's revanchist and irredentist foreign and defence policies toward its neighbours. Nuclear weapons are the central feature and capstone capability in Russia's evolving concept of strategic deterrence and are important tools for achieving Russia's geopolitical aims. Russian thinking on the role and place of nuclear weapons in upholding national security and in achieving strategic aims is reflected in military policy, force structure and posture, and exercises and operations. Russia's political and military leaders are not only re-conceptualising the role of nuclear weapons. They are also building the military capabilities that can credibly threaten the calibrated employment of nuclear weapons for deterrence, de-escalation and war-fighting from the regional to large-scale and global levels of conflict. New and still developing concepts for the employment of conventional long-range precision weapons in tandem with nuclear weapons for regional deterrence and containment of local and regional conflicts add volatility to the regional tensions and uncertainties created by recent Russian aggression. Russia's reliance upon integrated conventional and nuclear capabilities in reasserting its influence in its perceived sphere of special interest, intended to contain conflicts at a manageable level, could actually increase the risk of the potential employment of nuclear weapons. NATO nations collectively, and the three NATO nuclear powers (Great Britain, France, and the United States) individually, have recognized this new reality and have begun to adapt to it. In that context, the aim of this paper is to elaborate a clearer understanding of the place and role of nuclear weapons in Russia's approach to conflict, based on nuclear-related policy statements and military-theoretical writing

  5. The Psychological Implications of Concealing a Stigma: A Cognitive-Affective-Behavioral Model

    Science.gov (United States)

    Pachankis, John E.

    2007-01-01

    Many assume that individuals with a hidden stigma escape the difficulties faced by individuals with a visible stigma. However, recent research has shown that individuals with a concealable stigma also face considerable stressors and psychological challenges. The ambiguity of social situations combined with the threat of potential discovery makes…

  6. Overall view of chemical and biochemical weapons.

    Science.gov (United States)

    Pitschmann, Vladimír

    2014-06-04

    This article describes a brief history of chemical warfare, which culminated in the signing of the Chemical Weapons Convention. It describes the current level of chemical weapons and the risk of using them. Furthermore, some traditional technology for the development of chemical weapons, such as increasing toxicity, methods of overcoming chemical protection, research on natural toxins or the introduction of binary technology, has been described. In accordance with many parameters, chemical weapons based on traditional technologies have achieved the limit of their development. There is, however, a big potential of their further development based on the most recent knowledge of modern scientific and technical disciplines, particularly at the boundary of chemistry and biology. The risk is even higher due to the fact that already, today, there is a general acceptance of the development of non-lethal chemical weapons at a technologically higher level. In the future, the chemical arsenal will be based on the accumulation of important information from the fields of chemical, biological and toxin weapons. Data banks obtained in this way will be hardly accessible and the risk of their materialization will persist.

  7. Overall View of Chemical and Biochemical Weapons

    Directory of Open Access Journals (Sweden)

    Vladimír Pitschmann

    2014-06-01

    Full Text Available This article describes a brief history of chemical warfare, which culminated in the signing of the Chemical Weapons Convention. It describes the current level of chemical weapons and the risk of using them. Furthermore, some traditional technology for the development of chemical weapons, such as increasing toxicity, methods of overcoming chemical protection, research on natural toxins or the introduction of binary technology, has been described. In accordance with many parameters, chemical weapons based on traditional technologies have achieved the limit of their development. There is, however, a big potential of their further development based on the most recent knowledge of modern scientific and technical disciplines, particularly at the boundary of chemistry and biology. The risk is even higher due to the fact that already, today, there is a general acceptance of the development of non-lethal chemical weapons at a technologically higher level. In the future, the chemical arsenal will be based on the accumulation of important information from the fields of chemical, biological and toxin weapons. Data banks obtained in this way will be hardly accessible and the risk of their materialization will persist.

  8. [Ladder step strategy for surgical repair of congenital concealed penis in children].

    Science.gov (United States)

    Wang, Fu-Ran; Zhong, Hong-Ji; Chen, Yi; Zhao, Jun-Feng; Li, Yan

    2016-11-01

    To assess the feasibility of the ladder step strategy in surgical repair of congenital concealed penis in children. This study included 52 children with congenital concealed penis treated in the past two years by surgical repair using the ladder step strategy, which consists of five main steps: cutting the narrow ring of the foreskin, degloving the penile skin, fixing the penile skin at the base, covering the penile shaft, and reshaping the prepuce. The perioperative data of the patients were prospectively collected and statistically described. Of the 52 patients, 20 needed remodeling of the frenulum and 27 received longitudinal incision in the penoscrotal junction to expose and deglove the penile shaft. The advanced scrotal flap technique was applied in 8 children to cover the penile shaft without tension, the pedicled foreskin flap technique employed in 11 to repair the penile skin defect, and excision of the webbed skin of the ventral penis performed in another 44 to remodel the penoscrotal angle. The operation time, blood loss, and postoperative hospital stay were 40-100 minutes, 5-30 ml, and 3-6 days, respectively. Wound bleeding and infection occurred in 1 and 5 cases, respectively. Follow-up examinations at 3 and 6 months after surgery showed that all the children had a satisfactory penile appearance except for some minor complications (2 cases of penile retraction, 2 cases of redundant ventral skin, and 1 case of iatrogenic penile curvature). The ladder step strategy for surgical repair of congenital concealed penis in children is a simple procedure with minor injury and satisfactory appearance of the penis.

  9. Regulatory focus moderates the social performance of individuals who conceal a stigmatized identity

    NARCIS (Netherlands)

    Newheiser, Anna-Kaisa; Barreto, Manuela; Ellemers, Naomi; Derks, Belle; Scheepers, Daan

    2015-01-01

    People often choose to hide a stigmatized identity to avoid bias. However, hiding stigma can disrupt social interactions. We considered whether regulatory focus qualifies the social effects of hiding stigma by examining interactions in which stigmatized participants concealed a devalued identity

  10. Issues of weapons of mass destruction non-proliferation in Tajikistan

    International Nuclear Information System (INIS)

    Mirsaidov, U.M.

    2010-01-01

    This article is devoted to issues of weapons of mass destruction non-proliferation in Tajikistan. Over a period of 20 century, starting from First World War, the weapons of mass destruction arouse serious concern of world community. Geneva protocol of 1925 prohibits the use of chemical and biological weapons. Once nuclear weapon was created, the weapons of mass destruction distributions become the subject of high concern. Besides, during the end of 'cold war', regional conflicts, collapse of Soviet Union, as well as access to sensitive technologies considerably increase the danger of weapons of mass destruction distribution. More than 10 countries have active programs, relating to weapons of mass destruction and, possibly, more than ten countries have potential to start implementing such kinds of programs. Nowadays, trans national organized criminal groups and international terrorist networks are appeared in the world scene, which show interest in obtaining an access to sensitive materials, technologies, weapons and their distribution. After 11 September events, the risk of such weapons of mass destruction components use by such forces for Governments blackmail become real scene, which, despite of low possibility of this threat implementation, could have very serious and disastrous consequences. International community responded to these problems and challenges, basically through the following actions, which is detailed regime development of multilateral international treaties, directed to weapons of mass destruction distribution prevention. Non-proliferation treaty of nuclear weapons, Convention on prohibition of chemical weapons and Convention on prohibition of biological and toxin weapons are some of them. As it is known, Tajikistan signed all these treaties. For different reasons these treaties were subject of serious tests. Nuclear weapons tests in India and Pakistan in 1998 year, actual Israel status as state having nuclear weapon and North Korean program on

  11. Consequences of the Use of Neutron Weapons

    International Nuclear Information System (INIS)

    Ilijas, B.

    1998-01-01

    In modern conceptions of the use of nuclear weapons there is a significant role of so called enhanced radiation weapons, also known as neutron weapons. Its most important feature is that all other effects (blast, thermal) are minimized in favour of neutron radiation. Because of the great penetrative capability and biological efficiency, neutron beam is ideal weapon against people in shelters and armoured vehicles. Material goods stay saved and also there is no significant long- term radioactive contamination. After the use of this weapons, which is possible even for tactical tasks on limited area, one must count with great number of people irradiated with doses in wide range - from those enough for instantaneous incapacitation to those which cause only long-term effects. For the purpose of maximal efficiency in this situation, it is necessary to work out plans for dosimetric control, first aid, transport and medical treatment of irradiated people (soldiers and civilians) in war conditions. (author)

  12. The Effects of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    Glasstone, Samuel

    1964-02-01

    This book is a revision of "The Effects of Nuclear Weapons" which was issued in 1957. It was prepared by the Defense Atomic Support Agency of the Department of Defense in coordination with other cognizant governmental agencies and was published by the U.S. Atomc Energy Commission. Although the complex nature of nuclear weapons effects does not always allow exact evaluation, the conclusions reached herein represent the combined judgment of a number of the most competent scientists working the problem. There is a need for widespread public understanding of the best information available on the effects of nuclear weapons. The purpose of this book is to present as accurately as possible, within the limits of national security, a comprehensive summary of this information.

  13. Why are sexually selected weapons almost absent in females?

    Directory of Open Access Journals (Sweden)

    Anders BERGLUND

    2013-08-01

    Full Text Available In sex role reversed species, predominantly females evolve sexually selected traits, such as ornaments and/or weapons. Female ornaments are common and their function well documented in many species, whether sex role reversed or not. However, sexually selected female weapons seem totally absent except for small wing spurs in three jacana species, present in both males and females. This poor female weaponry is in sharp contrast to the situation in species with conventional sex roles: males commonly have evolved sexually selected weapons as well as ornaments. At the same time, females in many taxa have naturally selected weapons, used in competition over resources or in predator defence. Why are sexually selected weapons then so rare, almost absent, in females? Here I briefly review weaponry in females and the function of these weapons, conclude that the near absence of sexually selected weapons begs an explanation, and suggest that costs of sexually selected weapons may exceed costs of ornaments. Females are more constrained when evolving sexually selected traits compared to males, at least compared to those males that do not provide direct benefits, as trait costs reduce a female’s fecundity. I suggest that this constraining trade-off between trait and fecundity restricts females to evolve ornaments but rarely weapons. The same may apply to paternally investing males. Whether sexually selected weapons actually are more costly than sexually selected ornaments remains to be investigated [Current Zoology 59 (4: 564–568, 2013].

  14. Peaceful uses of nuclear weapon plutonium

    International Nuclear Information System (INIS)

    Burtak, F.

    1996-01-01

    In 1993, the U.S.A. and the CIS signed Start 2 (the Strategic Arms Reduction Treaty) in which they committed themselves the reduce their nuclear weapon arsenals to a fraction of that of 1991. For forty-five years the antagonism between the superpowers had been a dominating factor in world history, determining large areas of social life. When Start 2 will have been completed in 2003, some 200 t of weapon grade plutonium and some 2000 t of highly enriched uranium (Heu) will arise from dismantling nuclear weapons. In the absence of the ideological ballast of the debate about Communism versus Capitalism of the past few decades there is a chance of the grave worldwide problem of safe disposal and utilization of this former nuclear weapon material being solved. Under the heading of 'swords turned into plowshares', plutonium and uranium could be used for peaceful electricity generation. (orig.) [de

  15. Weapons dismantlement issues in independent Ukraine

    International Nuclear Information System (INIS)

    Zack, N.R.

    1995-01-01

    The American Association for the Advancement of Science sponsored a seminar during September 1993 in Kiev, Ukraine, titled, ''Toward a Nuclear-Free Future--Barriers and Problems.'' It brought together Ukrainians, Belarusians and Americans to discuss the legal, political, economic, technical, and safeguards and security dimensions of nuclear weapons dismantlement and destruction. US representatives initiated discussions on legal and treaty requirements and constraints, safeguards and security issues surrounding dismantlement, storage and disposition of nuclear materials, warhead transportation, and economic considerations. Ukrainians gave presentations on arguments for and against the Ukraine keeping nuclear weapons, the Ukrainian Parliament's nonapproval of START 1, alternative strategies for dismantling silos and launchers, and economic and security implications of nuclear weapons removal from the Ukraine. Participants from Belarus discussed proliferation and control regime issues. This paper will highlight and detail the issues, concerns and possible impacts of the Ukraine's dismantlement of its nuclear weapons

  16. Emerging nuclear energy systems and nuclear weapon proliferation

    International Nuclear Information System (INIS)

    Gsponer, A.; Sahin, S.; Jasani, B.

    1983-01-01

    Generally when considering problems of proliferation of nuclear weapons, discussions are focused on horizontal proliferation. However, the emerging nuclear energy systems currently have an impact mainly on vertical proliferation. The paper indicates that technologies connected with emerging nuclear energy systems, such as fusion reactors and accelerators, enhance the knowledge of thermonuclear weapon physics and will enable production of military useful nuclear materials (including some rare elements). At present such technologies are enhancing the arsenal of the nuclear weapon states. But one should not forget the future implications for horizontal proliferation of nuclear weapons as some of the techniques will in the near future be within the technological and economic capabilities of non-nuclear weapon states. Some of these systems are not under any international control. (orig.) [de

  17. Beyond the nuclear weapon

    International Nuclear Information System (INIS)

    Quinlan, M.

    2001-01-01

    Since the end of the cold war, many people called for the elimination of nuclear weapons. That this decision seems difficult to realize because of the world political environment. Meanwhile the reduction of the nuclear weapons costs and risks believes more than ever a challenge of the international relations and more particularly in the proliferation domain. In this perspective the proliferation fight strategies need to be studied with a special interest in the domain of the alternatives and the possibilities of synergy. (A.L.B.)

  18. Pakistan's Nuclear Weapons: Proliferation and Security Issues

    National Research Council Canada - National Science Library

    Kerr, Paul; Nikitin, Mary B

    2007-01-01

    Pakistan's nuclear arsenal consists of approximately 60 nuclear warheads. Pakistan continues fissile material production for weapons, and is adding to its weapons production facilities and delivery vehicles...

  19. The sensitivity studies of a landmine explosive detection system based on neutron backscattering using Monte Carlo simulation

    Directory of Open Access Journals (Sweden)

    Khan Hamda

    2017-01-01

    Full Text Available This paper carries out a Monte Carlo simulation of a landmine detection system, using the MCNP5 code, for the detection of concealed explosives such as trinitrotoluene and cyclonite. In portable field detectors, the signal strength of backscattered neutrons and gamma rays from thermal neutron activation is sensitive to a number of parameters such as the mass of explosive, depth of concealment, neutron moderation, background soil composition, soil porosity, soil moisture, multiple scattering in the background material, and configuration of the detection system. In this work, a detection system, with BF3 detectors for neutrons and sodium iodide scintillator for g-rays, is modeled to investigate the neutron signal-to-noise ratio and to obtain an empirical formula for the photon production rate Ri(n,γ= SfGfMf(d,m from radiative capture reactions in constituent nuclides of trinitrotoluene. This formula can be used for the efficient landmine detection of explosives in quantities as small as ~200 g of trinitrotoluene concealed at depths down to about 15 cm. The empirical formula can be embedded in a field programmable gate array on a field-portable explosives' sensor for efficient online detection.

  20. TeraSCREEN: multi-frequency multi-mode Terahertz screening for border checks

    Science.gov (United States)

    Alexander, Naomi E.; Alderman, Byron; Allona, Fernando; Frijlink, Peter; Gonzalo, Ramón; Hägelen, Manfred; Ibáñez, Asier; Krozer, Viktor; Langford, Marian L.; Limiti, Ernesto; Platt, Duncan; Schikora, Marek; Wang, Hui; Weber, Marc Andree

    2014-06-01

    The challenge for any security screening system is to identify potentially harmful objects such as weapons and explosives concealed under clothing. Classical border and security checkpoints are no longer capable of fulfilling the demands of today's ever growing security requirements, especially with respect to the high throughput generally required which entails a high detection rate of threat material and a low false alarm rate. TeraSCREEN proposes to develop an innovative concept of multi-frequency multi-mode Terahertz and millimeter-wave detection with new automatic detection and classification functionalities. The system developed will demonstrate, at a live control point, the safe automatic detection and classification of objects concealed under clothing, whilst respecting privacy and increasing current throughput rates. This innovative screening system will combine multi-frequency, multi-mode images taken by passive and active subsystems which will scan the subjects and obtain complementary spatial and spectral information, thus allowing for automatic threat recognition. The TeraSCREEN project, which will run from 2013 to 2016, has received funding from the European Union's Seventh Framework Programme under the Security Call. This paper will describe the project objectives and approach.

  1. What Is the Role of Survivability Operations in the Current Force?

    National Research Council Canada - National Science Library

    Smallfield, Jason

    2003-01-01

    .... Survivability Operations (SO) are all aspects of protecting personnel, weapons, and supplies while simultaneously deceiving the enemy to include cover, concealment, camouflage, and deception (C3D...

  2. Concealing emotions: nurses' experiences with induced abortion care.

    Science.gov (United States)

    Yang, Cheng-Fang; Che, Hui-Lian; Hsieh, Hsin-Wan; Wu, Shu-Mei

    2016-05-01

    To explore the experiences of nurses involved with induced abortion care in the delivery room in Taiwan. Induced abortion has emotional, ethical and legal facets. In Taiwan, several studies have addressed the ethical issues, abortion methods and women's experiences with abortion care. Although abortion rates have increased, there has been insufficient attention on the views and experiences of nurses working in the delivery room who are involved with induced abortion care. Qualitative, semistructured interviews. This study used a purposive sampling method. In total, 22 nurses involved with induced abortion care were selected. Semistructured interviews with guidelines were conducted, and the content analysis method was used to analyse the data. Our study identified one main theme and five associated subthemes: concealing emotions, which included the inability to refuse, contradictory emotions, mental unease, respect for life and self-protection. This is the first specific qualitative study performed in Taiwan to explore nurses' experiences, and this study also sought to address the concealing of emotions by nurses when they perform induced abortion care, which causes moral distress and creates ethical dilemmas. The findings of this study showed that social-cultural beliefs profoundly influence nurses' values and that the rights of nurses are neglected. The profession should promote small-group and case-study discussions, the clarification of values and reflective thinking among nurses. Continued professional education that provides stress relief will allow nurses to develop self-healing and self-care behaviours, which will enable them to overcome the fear of death while strengthening pregnancy termination counselling, leading to better quality professional care. © 2016 John Wiley & Sons Ltd.

  3. Democracy, public opinion, and nuclear weapons

    International Nuclear Information System (INIS)

    Russett, B.

    1989-01-01

    To the degree that people's fears of nuclear war are deep and pervasive, they become subject to manipulation by cynical or politically utopian promises, whether those promises be to abolish nuclear weapons from the earth or to create a leakproof peace shield (SDI). But the basic yearning for protection could also be mobilized to support serious arms reduction and arms control agreements. Nuclear weapons provide the basis for a vivid form of symbolic politics, perhaps equivalent in foreign policy considerations to the Korean and Vietnam wars during their durations, and in similar ways (although not necessarily as severe) as unemployment does among domestic policy issues. This paper presents survey research directed specifically at the role of public opinion on nuclear imagery (difference between expectation of nuclear war versus any kind of weapon war; willingness to spend on nuclear weapons versus conventional ones or general defense spending) can help in understanding these phenomena

  4. A nuclear-weapon-free world and true disarmament

    International Nuclear Information System (INIS)

    Salvini, G.

    1999-01-01

    This preliminary note about is important to consider when discussing hopes of achieving a nuclear-weapon-free world. Without a serious effort to establish intelligent, powerful bodies to control and judge the behavior of the nations on Earth, whatever they future weapons may be, the objective to reach a nuclear-weapon-free world may even succeed, but it is not enough to stop wars and death. Even more than that: if taken alone, as the 'Great Way', it could prove negative, for it could slow down the general effort to achieve peace on out planet. A nuclear-weapon-free world is of course a very good idea but two points must be discussed: how to achieve the nuclear-weapon-free world; and what will happen afterwards. Some considerations on the second point are made

  5. Neutron weapons. War prevention by credible deterrence

    International Nuclear Information System (INIS)

    1981-11-01

    The neutron bomb has prompted fierce and controversial public discussions which are more emotional than based on facts. Unaware of the factual repercussions this weapon has, it has been described as the most inhumane weapon ever. By saying so, the public is wrongly informed and is made feel insecure. The following contributions made by competent authorities may be used for getting to the point, pointing out that the neutron bomb is primarily a defensive weapon. (orig.) [de

  6. Automated Navigation System based on Weapon-Target Assignment

    Directory of Open Access Journals (Sweden)

    Mohammad Khairudin

    2011-12-01

    Full Text Available Operating of weapon on the tank is mostly by manually. It is not desired performance for a critical operation. An automatic control system is required to operate the weapon with the target while maintaining the accuracy. In this paper has designed an automatic weapon control system using object image proccessing. Various an image processing methods used to improve the weapon accuracy to obtain the intended target. The method used in digital image processing is the Camshift motion tracking method. This method is compared with the Lucas Canade motion tracking method. This comparison is conducted to found more precise results between the two methods. Results of object image processing are used to control the direction of the weapon that towards the desired goal. The results show that the implementation of the Lucas Canade motion tracking method using fire simulation tools have been successful. The performance of the Lucas Canade motion tracking methods is better than the CamShift method. Using Lucas Canade method for weapon controller is accordance with the purposes.

  7. Nuclear weapon-free zone, non-proliferation treaty and South Asia

    International Nuclear Information System (INIS)

    Jayaramu, P.S.

    1980-01-01

    Emergence of and the motivations behind the concept of nuclear weapon free zone, the conceptual linkage between the nuclear weapon free zone and the Non-Proliferation Treaty and the problems involved in the implementation of nuclear weapon free zone proposals put forward from time to time are discussed. Pakistan's proposal for a nuclear weapon free zone in South Asia, motivations behind the proposal, and India's response to it are examined. It is pointed out that both the NPT and nuclear weapon free zone indirectly grant a certain amount of legitimacy to the use of nuclear weapons. (M.G.B.)

  8. Overview of surplus weapons plutonium disposition

    Energy Technology Data Exchange (ETDEWEB)

    Rudy, G.

    1996-05-01

    The safe disposition of surplus weapons useable plutonium is a very important and urgent task. While the functions of long term storage and disposition directly relate to the Department`s weapons program and the environmental management program, the focus of this effort is particularly national security and nonproliferation.

  9. Rays as weapons

    International Nuclear Information System (INIS)

    Vogel, H.

    2007-01-01

    individuals. The incorporation of irradiating substances may kill and be difficult to detect (Litvinenko). A new form of (government supported) terrorism/crime appears possible. Conclusion: The differences are important between a nuclear weapon explosion, the largest imaginable accident in a nuclear power plant, and an attack with a dirty bomb. Nuclear weapons kill by heat and blast; in the largest imaginable accident in a nuclear power plant, they are less strong and limited to the plant; an attack with a dirty bomb is as life threatening as an ('ordinary') bomb attack, dispersed radiating material may be a risk for individuals

  10. The future of nuclear weapons in Europe workshop summary

    International Nuclear Information System (INIS)

    Larsen, J.A.; Garrity, P.J.

    1991-12-01

    A summary is presented of a workshop that addressed the future of nuclear weapons in Europe. The workshop topics included the evolving European security environment; the Soviet Union, Eastern Europe, and nuclear weapons; the United States, NATO, and nuclear weapons; and Western Europe and nuclear weapons. The workshop, held at Los Alamos July 26, 1991, was sponsored by the Center for National Security Studies of the Los Alamos National Laboratory

  11. Public perspectives of nuclear weapons in the post-cold war environment

    Energy Technology Data Exchange (ETDEWEB)

    Jenkins-Smith, H.C.; Herron, K.G. [Univ. of New Mexico, Albuquerque, NM (United States). Institute for Public Policy; Barke, R.P. [Georgia Institute of Technology, Atlanta, GA (United States). School of Public Policy

    1994-04-01

    This report summarizes the findings of a nationwide survey of public perceptions of nuclear weapons in the post-cold war environment. Participants included 1,301 members of the general public, 1,155 randomly selected members of the Union of Concerned Scientists, and 1,226 employees randomly selected from the technical staffs of four DOE national laboratories. A majority of respondents from all three samples perceived the post-cold war security environment to pose increased likelihood of nuclear war, nuclear proliferation, and nuclear terrorism. Public perceptions of nuclear weapons threats, risks, utilities, and benefits were found to systematically affect nuclear weapons policy preferences in predictable ways. Highly significant relationships were also found between public trust and nuclear weapons policy preferences. As public trust and official government information about nuclear weapons increased, perceptions of nuclear weapons management risks decreased and perceptions of nuclear weapons utilities and benefits increased. A majority of respondents favored decreasing funding for: (1) developing and testing new nuclear weapons; (2) maintaining existing nuclear weapons, and (3) maintaining the ability to develop and improve nuclear weapons. Substantial support was found among all three groups for increasing funding for: (1) enhancing nuclear weapons safety; (2) training nuclear weapons personnel; (3) preventing nuclear proliferation; and (4) preventing nuclear terrorism. Most respondents considered nuclear weapons to be a persistent feature of the post-cold war security environment.

  12. Instruments of war weapons and technologies that have changed history

    CERN Document Server

    Tucker, Spencer C

    2015-01-01

    In war, the weapons and technologies employed have direct effects on how battles are waged. When new weapons are introduced, they can dramatically alter the outcomes of warfare-and consequently change the course of history itself. This reference work provides a fascinating overview of the major weapon systems and military technologies that have had a major impact on world history. Addressing weapons as crude as the club used by primitive man to the high-tech weapons of today such as unmanned drones, Instruments of War: Weapons and Technologies That Have Changed History offers nearly 270 profusely illustrated entries that examine the key roles played by specific weapons and identify their success and failures. The book begins with an introductory essay that frames the subject matter of the work and discusses the history of weapons as a whole. The text is concise and accessible to general readers without extensive backgrounds in military history yet provides the detailed information necessary to convey the comp...

  13. Psychological markers underlying murder weapon profile: a quantitative study.

    Science.gov (United States)

    Kamaluddin, M R; Othman, A; Ismail, K H; Mat Saat, G A

    2017-12-01

    The horrific nature of murder using different types of weapons has been an important focal point of many criminological studies. Weapons that are used in murders seem to play dominant roles in murder investigations as they may provide information leading to arrest. The established factors for weapon usage include environmental context, demography and availability of weapons. However, there is insufficient research attention on the psychological functioning of murderers for particular weapon usage. In light of this, the current study seeks to narrow this gap of information by identifying the influences of psychological traits on weapon usage among a sample of male murderers. The present cross-sectional study was conducted among 71 male murderers incarcerated in 11 prisons within Peninsular Malaysia. The selection of the sample was based on predetermined selection criteria using a purposive sampling method. A guided self-administered questionnaire comprising sociodemography variables and four Malay validated psychometric instruments: Zuckerman-Kuhlman Personality Questionnaire-40-Cross-Culture, Self-control Scale, "How I Think" Questionnaire and Aggression Questionnaire; was used. Independent sample t-test was performed to establish the mean score differences of psychological traits between the murderers who used single and multiple weapons while Kruskal-Wallis tests were carried out to ascertain the differences between the specific types of weapons used among the murderers. Following this, one-way ANOVA was carried out to ascertain the psychological trait differences among the murderers according to the different sources of weapon. Results indicated specific psychological traits influenced the number(s), source(s) and type(s) of weapon used in committing murder. The findings have implications for the psychological profiling of unknown murderers within the Malaysian context.

  14. Weapon container catalog. Volumes 1 & 2

    Energy Technology Data Exchange (ETDEWEB)

    Brown, L.A.; Higuera, M.C.

    1998-02-01

    The Weapon Container Catalog describes H-gear (shipping and storage containers, bomb hand trucks and the ancillary equipment required for loading) used for weapon programs and for special use containers. When completed, the catalog will contain five volumes. Volume 1 for enduring stockpile programs (B53, B61, B83, W62, W76, W78, W80, W84, W87, and W88) and Volume 2, Special Use Containers, are being released. The catalog is intended as a source of information for weapon program engineers and also provides historical information. The catalog also will be published on the SNL Internal Web and will undergo periodic updates.

  15. 15 CFR 742.18 - Chemical Weapons Convention (CWC or Convention).

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Chemical Weapons Convention (CWC or... REGULATIONS CONTROL POLICY-CCL BASED CONTROLS § 742.18 Chemical Weapons Convention (CWC or Convention). States... Use of Chemical Weapons and on Their Destruction, also known as the Chemical Weapons Convention (CWC...

  16. Using natural beta emission for detecting concealed tobacco in parcels

    International Nuclear Information System (INIS)

    Myers, Jeremy; Hussein, Esam M.A.

    2007-01-01

    It is suspected that postal systems are used for the illegal shipment of tobacco products to circumvent taxation and excise payments. This paper demonstrates that beta-particle emission from the potassium-40 contained in tobacco can be used to passively detect its presence in paperboard postal parcels. The same concept can be utilized for the detection of marijuana, whose leaves are also rich in 40 K. The combination of high beta activity and a low weight is a good indicator of the presence of these two contraband materials

  17. Using natural beta emission for detecting concealed tobacco in parcels

    Energy Technology Data Exchange (ETDEWEB)

    Myers, Jeremy [Laboratory for Threat Material Detection, Department of Mechanical Engineering, University of New Brunswick, Fredericton, New Brunswick, E3B 5A3 (Canada); Hussein, Esam M.A. [Laboratory for Threat Material Detection, Department of Mechanical Engineering, University of New Brunswick, Fredericton, New Brunswick, E3B 5A3 (Canada)], E-mail: hussein@unb.ca

    2007-10-15

    It is suspected that postal systems are used for the illegal shipment of tobacco products to circumvent taxation and excise payments. This paper demonstrates that beta-particle emission from the potassium-40 contained in tobacco can be used to passively detect its presence in paperboard postal parcels. The same concept can be utilized for the detection of marijuana, whose leaves are also rich in {sup 40}K. The combination of high beta activity and a low weight is a good indicator of the presence of these two contraband materials.

  18. Bayesian interpolation in a dynamic sinusoidal model with application to packet-loss concealment

    DEFF Research Database (Denmark)

    Nielsen, Jesper Kjær; Christensen, Mads Græsbøll; Cemgil, Ali Taylan

    2010-01-01

    a Bayesian inference scheme for the missing observations, hidden states and model parameters of the dynamic model. The inference scheme is based on a Markov chain Monte Carlo method known as Gibbs sampler. We illustrate the performance of the inference scheme to the application of packet-loss concealment...

  19. Dismantlement and destruction of chemical, nuclear and conventional weapons

    International Nuclear Information System (INIS)

    Schulte, N.T.

    1997-01-01

    The safe destruction and dismantling of chemical, nuclear and conventional weapons is of fundamental importance to the security of all countries represented in this volume. Expertise in the field is not confined to one country or organisation: all can benefit from each other. There is an ever present danger of proliferation of weapons of mass destruction: approximately two dozen countries have ongoing programmes to develop or acquire such weapons, and many are also gaining the capability to build air-surface delivery systems. But much can be done to prevent proliferation by reducing leakage of materials and know-how and by solving the problems of the destruction of surplus weapons systems, which has now come to be a key issue. In 13 sessions of the workshop attention was paid to (1) Dismantlement and Destruction of Chemical, Nuclear and Conventional Weapons; (2) Status of Implementation of Arms Control Treaties and Voluntary Commitments; (3) National Perspectives on Cooperation in Disarmament; (4) Stocktaking of National and Bilateral Disposal/Destruction Programmes: Chemical Weapons; (5) Stocktaking of National and Bilateral Disposal/Destruction Programmes: Nuclear Weapons; (6) Stocktaking of National and Bilateral Disposal/Destruction Programmes: Conventional Weapons. Session; (7) Experience with Currently Employed Chemical Destruction Technologies; (8) Alternative Chemical Destruction Technologies; (9) Deactivation, Dismantlement and Destruction of Delivery Systems and Infrastructure for Nuclear Weapons; (10) Storage, Safeguarding and Disposition of Fissile Materials; (11) Technologies for Conversion and Civil Use of Demilitarized Materials; (12) International Organizations; and (13) Environmental Challenges Posed by Chemical and Nuclear Disarmament

  20. Nuclear weapons in Europe: Why zero is better

    International Nuclear Information System (INIS)

    Daalder, I.H.

    1993-01-01

    Given the fundamental changes in the political context and NATO's perception of nuclear weapons, what role remains for US nuclear weapons in preserving security in Europe? Are US nuclear deployments on the continent still necessary? Is there a requirement for extended deterrence and, if so, does its credibility depend on the continued basing of US nuclear weapons in Europe? And what is the role of arms control in effecting any desirable restructuring in nuclear force postures? In addressing these questions, it becomes clear that US nuclear weapons can now be removed from Europe - they no longer serve the political and military functions they once did

  1. Strategies for denaturing the weapons-grade plutonium stockpile

    International Nuclear Information System (INIS)

    Buckner, M.R.; Parks, P.B.

    1992-10-01

    In the next few years, approximately 50 metric tons of weapons-grade plutonium and 150 metric tons of highly-enriched uranium (HEU) may be removed from nuclear weapons in the US and declared excess. These materials represent a significant energy resource that could substantially contribute to our national energy requirements. HEU can be used as fuel in naval reactors, or diluted with depleted uranium for use as fuel in commercial reactors. This paper proposes to use the weapons-grade plutonium as fuel in light water reactors. The first such reactor would demonstrate the dual objectives of producing electrical power and denaturing the plutonium to prevent use in nuclear weapons

  2. [Effects of false memories on the Concealed Information Test].

    Science.gov (United States)

    Zaitsu, Wataru

    2012-10-01

    The effects of false memories on polygraph examinations with the Concealed Information Test (CIT) were investigated by using the Deese-Roediger-McDermott (DRM) paradigm, which allows participants to evoke false memories. Physiological responses to questions consisting of learned, lure, and unlearned items were measured and recorded. The results indicated that responses to lure questions showed critical responses to questions about learned items. These responses included repression of respiration, an increase in electrodermal activity, and a drop in heart rate. These results suggest that critical response patterns are generated in the peripheral nervous system by true and false memories.

  3. Is a nuclear weapon-free world desirable?

    International Nuclear Information System (INIS)

    Tertrais, Bruno

    2009-01-01

    In this article, the author shows that a nuclear weapon-free world would probably be more dangerous than today's world because benefits of the existence of nuclear weapons are probably more important that the risks related to their existence. He outlines that nuclear deterrence has been very efficient for these last 65 years. He states that the disappearance of nuclear weapons could be envisaged only after a large transformation of safety conditions, but that such transformations are actually not at all under way. It would indeed require peaceful and democratic world governance

  4. Islamic State and Chemical Weapons

    Directory of Open Access Journals (Sweden)

    Lukáš Rafay

    2016-09-01

    Full Text Available The article deals with topic of Islamic State and chemical weapons. The issue is analysed in three dimensions: origin of used chemical weapons and possibility of independent production; known chemical attacks and tactical regularities in their execution; and traits of future chemical terrorist attacks. By providing a thorough examination of the problem, the article aims at predicting the future development of the group’s chemical program as well as describing any prospective chemical terrorist attacks in Europe

  5. Nuclear weapons in Europe

    International Nuclear Information System (INIS)

    Pierre, A.J.

    1984-01-01

    In this introduction to ''Nuclear Weapons in Europe'', the author summarized the views of two Americans and two Europeans, whose articles make up the volume. The introduction explains the different assumptions of the four authors before discussing their views on the military and political rationales for a nuclear force in the North Atlantic Treaty Organization (NATO) and the debate over battlefield nuclear weapons, conventional defense, and arms control proposals and talks. The four contributors whose views are analyzed are William G. Hyland, Lawrence D. Freeman, Paul C. Warnke, and Karstan D. Voight. The introduction notes that the agreements and differences do not fall strictly on American versus European dividing lines

  6. The medical consequences of nuclear weapons

    International Nuclear Information System (INIS)

    Humphrey, J.; Hartog, M.; Middleton, H.

    1982-01-01

    A pamphlet has been produced by the Medical Campaign Against Nuclear Weapons (MCANW) and by the Medical Association for the Prevention of War (MAPW) to bring the catastrophic effects that the use of nuclear weapons would entail to the attention of the general public, politicians and members of the medical profession. It describes the medical consequences of the effects of blast, heat and ionizing radiation from nuclear weapons, including details from the Hiroshima and Nagasaki atomic bombings. The medical consequences of a nuclear attack including consideration of the casualties, care of the injured, psychological effects and the outcome are also discussed. It is concluded that if for none other than purely medical reasons, nuclear warfare must never be allowed to happen. (UK)

  7. Space weapon technology and policy

    Science.gov (United States)

    Hitchens, Theresa

    2017-11-01

    The military use of space, including in support of nuclear weapons infrastructure, has greatly increased over the past 30 years. In the current era, rising geopolitical tensions between the United States and Russia and China have led to assumptions in all three major space powers that warfighting in space now is inevitable, and possible because of rapid technological advancements. New capabilities for disrupting and destroying satellites include radio-frequency jamming, the use of lasers, maneuverable space objects and more capable direct-ascent anti-satellite weapons. This situation, however, threatens international security and stability among nuclear powers. There is a continuing and necessary role for diplomacy, especially the establishment of normative rules of behavior, to reduce risks of misperceptions and crisis escalation, including up to the use of nuclear weapons. U.S. policy and strategy should seek a balance between traditional military approaches to protecting its space assets and diplomatic tools to create a more secure space environment.

  8. The nuclear weapon; L'arme nucleaire

    Energy Technology Data Exchange (ETDEWEB)

    Tertrais, Bruno

    2008-07-01

    The author presents the technology, the concept of deterrence, the today means and the international control, concerning the nuclear weapon. The conclusion is pessimistic. The author sees only two issues: the substitution of a new weapon more powerful, or its use. (A.L.B.)

  9. Towards the complete prohibition and elimination of nuclear weapons

    International Nuclear Information System (INIS)

    Xie Zhiqiong

    1998-01-01

    For 40 years, the Pugwash Conference on Science and world affairs has been making unremitting efforts to achieve it main objectives the struggle to eliminate nuclear weapons, the elimination of wars and maintenance of world peace. The end of the Cold War vigorously encouraged world efforts in arms control and disarmament. On the day of exploding her first nuclear bomb in October 1964, China declared solemnly that it would never be the first to use nuclear weapons at any time under any circumstances. China has also committed unconditionally not to use nuclear weapons or threaten to use nuclear weapons against non-nuclear weapon states and nuclear free zones. China is the sole nuclear weapon state that has made this commitment, and she has kept her word. China is in favour of comprehensive nuclear test ban in the move towards complete nuclear disarmament, taking an active part in the CTBT negotiations in Geneva and contributing to the conclusion of a fair, reasonable, verifiable treaty of universal adherence and unlimited duration within this year

  10. Living with a concealable stigmatized identity: the impact of anticipated stigma, centrality, salience, and cultural stigma on psychological distress and health.

    Science.gov (United States)

    Quinn, Diane M; Chaudoir, Stephenie R

    2009-10-01

    The current research provides a framework for understanding how concealable stigmatized identities impact people's psychological well-being and health. The authors hypothesize that increased anticipated stigma, greater centrality of the stigmatized identity to the self, increased salience of the identity, and possession of a stigma that is more strongly culturally devalued all predict heightened psychological distress. In Study 1, the hypotheses were supported with a sample of 300 participants who possessed 13 different concealable stigmatized identities. Analyses comparing people with an associative stigma to those with a personal stigma showed that people with an associative stigma report less distress and that this difference is fully mediated by decreased anticipated stigma, centrality, and salience. Study 2 sought to replicate the findings of Study 1 with a sample of 235 participants possessing concealable stigmatized identities and to extend the model to predicting health outcomes. Structural equation modeling showed that anticipated stigma and cultural stigma were directly related to self-reported health outcomes. Discussion centers on understanding the implications of intraindividual processes (anticipated stigma, identity centrality, and identity salience) and an external process (cultural devaluation of stigmatized identities) for mental and physical health among people living with a concealable stigmatized identity. 2009 APA, all rights reserved.

  11. Foreign trade legislation, war weapons control legislation

    International Nuclear Information System (INIS)

    Hucko, E.M.

    1993-01-01

    The volume contains, in addition to an introduction into the matter, the texts of the Foreign Trade Act (FTA), the War Weapons Control Act and all relevant ordinances. Foreign trade transactions of the Federal Republic of Germany are essentially, but not exclusively, governed by the FTA. They are strongly influenced by the legislation of the European Communities which in the form of directives are immediately effective here, and in the form of guidelines oblige the German lawgiver or ordinance giver to translate them into practice, mostly by appropriate modifications of the foreign trade ordinance, the import and export lists. It is not the war weapons which are the problem, but the so-called dual-use goods, namely articles, technologies and knowledge which, as a rule, serve civil purposes, which, however, may be used also to produce weapons, in particular ABC weapons or rockets. Nowadays we are concerned about several third-world states which are obsessed by the wish to build their own atomic bomb. (orig./HSCH) [de

  12. Oil and influence: the oil weapon examined

    Energy Technology Data Exchange (ETDEWEB)

    Maull, H

    1975-01-01

    The term ''oil weapon'' as used here signifies any manipulation of the price and/or supply of oil by exporting nations with the intention of changing the political behavior of the consumer nations. The political potential of the oil price is fairly restricted so, in effect, the supply interruptions are of prime concern. Manipulating price does, in principle, offer the possibilities of both conferring rewards and inflicting sanctions. Oil could be sold on preferential prices and terms. A precondition for using the oil weapon successfully would be the ability to cause real and serious damage to the consumer countries. Four damaging potentials for using the oil weapon could include its application by: (1) one producer against one consumer; (2) one producer against all consumers; (3) a group of producers against one consumer; and (4) by a group of producers against all consumers. It is concluded that the oil weapon will continue to be a force in the international system. (MCW)

  13. Structural adaptations to diverse fighting styles in sexually selected weapons.

    Science.gov (United States)

    McCullough, Erin L; Tobalske, Bret W; Emlen, Douglas J

    2014-10-07

    The shapes of sexually selected weapons differ widely among species, but the drivers of this diversity remain poorly understood. Existing explanations suggest weapon shapes reflect structural adaptations to different fighting styles, yet explicit tests of this hypothesis are lacking. We constructed finite element models of the horns of different rhinoceros beetle species to test whether functional specializations for increased performance under species-specific fighting styles could have contributed to the diversification of weapon form. We find that horns are both stronger and stiffer in response to species-typical fighting loads and that they perform more poorly under atypical fighting loads, which suggests weapons are structurally adapted to meet the functional demands of fighting. Our research establishes a critical link between weapon form and function, revealing one way male-male competition can drive the diversification of animal weapons.

  14. Nuclear Weapons and U.S. National Security: A Need for Weapons Programs?

    National Research Council Canada - National Science Library

    Woolf, Amy F

    2003-01-01

    .... nuclear weapons that goes beyond the concept of deterrence from the Cold War. It also identified a new targeting strategy that would seek to threaten specific capabilities in adversary nations...

  15. Concealment tactics among HIV-positive nurses in Uganda.

    Science.gov (United States)

    Kyakuwa, Margaret; Hardon, Anita

    2012-01-01

    This paper is based on two-and-a-half years of ethnographic fieldwork in two rural Ugandan health centres during a period of ART scale-up. Around one-third of the nurses in these two sites were themselves HIV-positive but most concealed their status. We describe how a group of HIV-positive nurses set up a secret circle to talk about their predicament as HIV-positive healthcare professionals and how they developed innovative care technologies to overcome the skin rashes caused by ART that threatened to give them away. Together with patients and a traditional healer, the nurses resisted hegemonic biomedical norms denouncing herbal medicines and then devised and advocated for a herbal skin cream treatment to be included in the ART programme.

  16. High-Energy Laser Weapon Integration with Ground Vehicles

    National Research Council Canada - National Science Library

    Hafften, Michael; Stratton, Robert

    2004-01-01

    .... The architecture of an electric, solid-state HEL weapon system would likely be based upon a hybrid electric vehicle that provides a common electrical power source for the propulsion and weapon subsystems...

  17. Use of Near-Infrared Spectroscopy and Chemometrics for the Nondestructive Identification of Concealed Damage in Raw Almonds (Prunus dulcis).

    Science.gov (United States)

    Rogel-Castillo, Cristian; Boulton, Roger; Opastpongkarn, Arunwong; Huang, Guangwei; Mitchell, Alyson E

    2016-07-27

    Concealed damage (CD) is defined as a brown discoloration of the kernel interior (nutmeat) that appears only after moderate to high heat treatment (e.g., blanching, drying, roasting, etc.). Raw almonds with CD have no visible defects before heat treatment. Currently, there are no screening methods available for detecting CD in raw almonds. Herein, the feasibility of using near-infrared (NIR) spectroscopy between 1125 and 2153 nm for the detection of CD in almonds is demonstrated. Almond kernels with CD have less NIR absorbance in the region related with oil, protein, and carbohydrates. With the use of partial least squares discriminant analysis (PLS-DA) and selection of specific wavelengths, three classification models were developed. The calibration models have false-positive and false-negative error rates ranging between 12.4 and 16.1% and between 10.6 and 17.2%, respectively. The percent error rates ranged between 8.2 and 9.2%. Second-derivative preprocessing of the selected wavelength resulted in the most robust predictive model.

  18. From weapons to waste: The future of the nuclear weapons complex

    International Nuclear Information System (INIS)

    Wasserman Goodman, Sherri

    1992-01-01

    This paper examines how decision-making power has shifted within the nuclear weapons complex, from the federal government operating agency, in which power was originally vested by the Atomic Energy Act, to the states and to regulatory authorities. Additionally, when the original operating agency, the Atomic Energy Commission (AEC), was abolished in the 1970s, substantial decision-making power shifted from Washington to the field sites. This paper identifies the needs for future materials and weapons production, and recommends that restart of old plants be abandoned as no longer militarily necessary. Instead, the U. S. should take advantage of what may be a unique opportunity to 'leapfrog' to new, smaller, technologically-advanced plants that will meet the needs of the nuclear arsenal in the post-Cold War world. This paper then looks at the current state of DOE's environmental restoration/waste management program, and the technological, legal and political problems it faces in trying to accomplish its mission of cleaning up all nuclear weapons sites. This paper argues that the U. S. government no longer has the exclusive authority to make and carry out critical decisions affecting a cleanup program that will cost the U. S. over $200 billion over the next 20-40 years. Moreover, there are competing theories about the principles that should guide the cleanup program. Finally, the author examines alternative futures for the DOE'S environmental restoration/waste management program. (author)

  19. Worldwide governmental efforts to locate and destroy chemical weapons and weapons materials: minimizing risk in transport and destruction.

    Science.gov (United States)

    Trapp, Ralf

    2006-09-01

    The article gives an overview on worldwide efforts to eliminate chemical weapons and facilities for their production in the context of the implementation of the 1997 Chemical Weapons Convention (CWC). It highlights the objectives of the Organisation for the Prohibition of Chemical Weapons (OPCW), the international agency set up in The Hague to implement the CWC, and provides an overview of the present status of implementation of the CWC requirements with respect to chemical weapons (CW) destruction under strict international verification. It addresses new requirements that result from an increased threat that terrorists might attempt to acquire or manufacture CW or related materials. The article provides an overview of risks associated with CW and their elimination, from storage or recovery to destruction. It differentiates between CW in stockpile and old/abandoned CW, and gives an overview on the factors and key processes that risk assessment, management, and communication need to address. This discussion is set in the overall context of the CWC that requires the completion of the destruction of all declared CW stockpiles by 2012 at the latest.

  20. Trace level detection of compounds related to the chemical weapons convention by 1H-detected 13C NMR spectroscopy executed with a sensitivity-enhanced, cryogenic probehead.

    Science.gov (United States)

    Cullinan, David B; Hondrogiannis, George; Henderson, Terry J

    2008-04-15

    Two-dimensional 1H-13C HSQC (heteronuclear single quantum correlation) and fast-HMQC (heteronuclear multiple quantum correlation) pulse sequences were implemented using a sensitivity-enhanced, cryogenic probehead for detecting compounds relevant to the Chemical Weapons Convention present in complex mixtures. The resulting methods demonstrated exceptional sensitivity for detecting the analytes at trace level concentrations. 1H-13C correlations of target analytes at chemical shift information could be derived quickly and simultaneously from the resulting spectra. The fast-HMQC pulse sequences generated magnitude mode spectra suitable for detailed analysis in approximately 4.5 h and can be used in experiments to efficiently screen a large number of samples. The HSQC pulse sequences, on the other hand, required roughly twice the data acquisition time to produce suitable spectra. These spectra, however, were phase-sensitive, contained considerably more resolution in both dimensions, and proved to be superior for detecting analyte 1H-13C correlations. Furthermore, a HSQC spectrum collected with a multiplicity-edited pulse sequence provided additional structural information valuable for identifying target analytes. The HSQC pulse sequences are ideal for collecting high-quality data sets with overnight acquisitions and logically follow the use of fast-HMQC pulse sequences to rapidly screen samples for potential target analytes. Use of the pulse sequences considerably improves the performance of NMR spectroscopy as a complimentary technique for the screening, identification, and validation of chemical warfare agents and other small-molecule analytes present in complex mixtures and environmental samples.

  1. Mobile Techniques for Rapid Detection of Concealed Nuclear Material

    International Nuclear Information System (INIS)

    Rosenstock, W.; Koeble, T.; Risse, M.; Berky, W.

    2015-01-01

    To prevent the diversion of nuclear material as well as illicit production, transport and use of nuclear material we investigated in mobile techniques to detect and identify such material in the field as early as possible. For that purpose we use a highly sensitive gamma measurement system installed in a car. It consists of two large volume plastic scintillators, one on each side of the car, each scintillator with 12 l active volume, and two extreme sensitive high purity Germanium detectors with 57 cm 2 crystal diameter, cooled electrically. The measured data are processed immediately with integrated, appropriate analysis software for direct assessment including material identification and classification within seconds. The software for the plastic scintillators can differentiate between natural and artificial radioactivity, thus giving a clear hint for the existence of unexpected material. In addition, the system is equipped with highly sensitive neutron detectors. We have performed numerous measurements by passing different radioactive and nuclear sources in relatively large distances with this measurement car. Even shielded as well as masked material was detected and identified in most of the cases. We will report on the measurements performed in the field (on an exercise area) and in the lab and discuss the capabilities of the system, especially with respect to timeliness and identification. This system will improve the nuclear verification capabilities also. (author)

  2. [On necessity to modify biochemical methods for detecting organophosphorus componds in chemical weapons extinction objects (review of literature)].

    Science.gov (United States)

    Prokofieva, D S; Shmurak, V I; Sadovnikov, S V; Gontcharov, N V

    2015-01-01

    The article covers problems of biochemical methods assessing organophosphorus toxic compounds in objects of chemical weapons extinction. The authors present results of works developing new, more specific and selective biochemical methods.

  3. Nuclear Weapons Enterprise Transformation - A Sustainable Approach

    International Nuclear Information System (INIS)

    O'Brien, K H

    2005-01-01

    Nuclear weapons play an essential role in United States (U.S.) National Security Policy and a succession of official reviews has concluded that nuclear weapons will continue to have a role for the foreseeable future. Under the evolving U.S. government policy, it is clear that role will be quite different from what it was during the Cold War. The nuclear-weapons stockpile as well as the nuclear-weapons enterprise needs to continue to change to reflect this evolving role. Stockpile reductions in the early 1990s and the Stockpile Stewardship Program (SSP), established after the cessation of nuclear testing in 1992, began this process of change. Further evolution is needed to address changing security environments, to enable further reductions in the number of stockpiled weapons, and to create a nuclear enterprise that is cost effective and sustainable for the long term. The SSP has successfully maintained the U.S. nuclear stockpile for more than a decade, since the end of nuclear testing. Current plans foresee maintaining warheads produced in the 1980s until about 2040. These warheads continue to age and they are expensive to refurbish. The current Life Extension Program plans for these legacy warheads are straining both the nuclear-weapons production and certification infrastructure making it difficult to respond rapidly to problems or changes in requirements. Furthermore, refurbishing and preserving Cold-War-era nuclear weapons requires refurbishing and preserving an infrastructure geared to support old technology. Stockpile Stewardship could continue this refurbishment approach, but an alternative approach could be considered that is more focused on sustainable technologies, and developing a more responsive nuclear weapons infrastructure. Guided by what we have learned from SSP during the last decade, the stewardship program can be evolved to address this increasing challenge using its computational and experimental tools and capabilities. This approach must start

  4. The Effects of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    Glasstone, Samuel

    1957-06-01

    This handbook prepared by the Armed Forces Special Weapons Project of the Department of Defense in coordination with other cognizant government agencies and published by the United States Atomic Energy Commission, is a comprehensive summary of current knowledge on the effects of nuclear weapons. The effects information contained herein is calculated for yields up to 20 megatons and the scaling laws for hypothetically extending the calculations beyond this limit are given. The figure of 20 megatons however is not be taken as an indication of capabilities or developments.

  5. Asynchronous data-driven classification of weapon systems

    International Nuclear Information System (INIS)

    Jin, Xin; Mukherjee, Kushal; Gupta, Shalabh; Ray, Asok; Phoha, Shashi; Damarla, Thyagaraju

    2009-01-01

    This communication addresses real-time weapon classification by analysis of asynchronous acoustic data, collected from microphones on a sensor network. The weapon classification algorithm consists of two parts: (i) feature extraction from time-series data using symbolic dynamic filtering (SDF), and (ii) pattern classification based on the extracted features using the language measure (LM) and support vector machine (SVM). The proposed algorithm has been tested on field data, generated by firing of two types of rifles. The results of analysis demonstrate high accuracy and fast execution of the pattern classification algorithm with low memory requirements. Potential applications include simultaneous shooter localization and weapon classification with soldier-wearable networked sensors. (rapid communication)

  6. ON THE OFFENSE: USING CYBER WEAPONS TO INFLUENCE COGNITIVE BEHAVIOR

    Directory of Open Access Journals (Sweden)

    Mary Fendley

    2012-12-01

    Full Text Available There is an increasing recognition that cyber warfare is an important area of development for targeting and weaponeering, with far-reaching effects in national defense and economic security. The ability to conduct effective operations in cyberspace relies on a robust situational awareness of events occurring in both the physical and information domains, with an understanding of how they affect the cognitive domain of friendly, neutral, and adversary population sets. The dynamic nature of the battlefield complicates efforts to understand shifting adversary motivations and intentions. There are very few approaches, to date, that systematically evaluate the effects of the repertoire of cyber weapons on the cognitive, perceptual, and behavioral characteristics of the adversary. In this paper, we describe a software environment called Cognitive Cyber Weapon Selection Tool (CCWST that simulates a scenario involving cyber weaponry.This tool provides the capabilities to test weapons which may induce behavioral state changes in the adversaries. CCWST provides the required situational awareness to the Cyber Information Operations (IO planner to conduct intelligent weapon selection during weapon activation in order to induce the desired behavioral change in the perception of the adversary. Weapons designed to induce the cognitive state changes of deception, distraction, distrust and confusion were then tested empirically to evaluate the capabilities and expected cognitive state changes induced by these weapons. The results demonstrated that CCWST is a powerful environment within which to test and evaluate the impact of cyber weapons on influencing cognitive behavioral states during information processing.

  7. Proposals for chemical weapons during the American Civil War.

    Science.gov (United States)

    Hasegawa, Guy R

    2008-05-01

    Proposals for chemical weapons that arose during the American Civil War are described. Most incendiary and all biological agents are excluded. The described proposals appeared primarily in periodicals or letters to government officials on both sides. The weapons were usually meant to temporarily disable enemy combatants, but some might have been lethal, and Civil War caregivers were ill-prepared to deal with the weapons' effects. Evidently, none of the proposed weapons were used. In only one instance was use against civilians mentioned. Among the agents most commonly proposed were cayenne pepper or other plant-based irritants such as black pepper, snuff, mustard, and veratria. Other suggested agents included chloroform, chlorine, hydrogen cyanide, arsenic compounds, sulfur, and acids. Proponents usually suggested that the chemicals be included in explosive artillery projectiles. Less commonly proposed vehicles of delivery included fire engines, kites, and manned balloons. Some of the proposed weapons have modern counterparts.

  8. Nuclear weapons headed for the trash

    International Nuclear Information System (INIS)

    Arkin, W.M.; Durrant, D.; Kristensen, H.

    1991-01-01

    Whether he intended it or not, Bush has taken steps that mean the beginning of the end for nuclear weapons. His proposals significantly reduce the numbers of nuclear weapons and the burdens associated with deploying and controlling them. And although he retains many of the options for continuing and regenerating the nuclear arsenal, he has exposed the fact that there are no longer any grand justifications or doctrinal needs for nuclear weapons - and that the nuclear machine is choking on its economic, political, environmental, and human contradictions. The initiatives fundamentally altered the nuclear stance of both nations. Yet, as momentous as the changes were, they were set in motion in an almost businesslike manner. Neither leader truly framed the moves as an end to the nuclear age. But they didn't need to. The steps they have taken practically guarantee it

  9. Responsibilities of the nuclear-weapon states

    International Nuclear Information System (INIS)

    Wang Jun

    1994-01-01

    The responsibilities of Nuclear Weapon States are presented by a straightforward analysis together with the ways in which they could fulfill them. The complete undertaking of all the commitments by the Nuclear Weapon States may take a long time. However they do not have a single excuse to neglect such a historic opportunity to do their best to provide a genuinely secure world environment for the international community, of which they too are members

  10. Chemical and biological weapons in the 'new wars'.

    Science.gov (United States)

    Ilchmann, Kai; Revill, James

    2014-09-01

    The strategic use of disease and poison in warfare has been subject to a longstanding and cross-cultural taboo that condemns the hostile exploitation of poisons and disease as the act of a pariah. In short, biological and chemical weapons are simply not fair game. The normative opprobrium is, however, not fixed, but context dependent and, as a social phenomenon, remains subject to erosion by social (or more specifically, antisocial) actors. The cross cultural understanding that fighting with poisons and disease is reprehensible, that they are taboo, is codified through a web of interconnected measures, principal amongst these are the 1925 Geneva Protocol; the Biological Weapons Convention; and the Chemical Weapons Convention. Whilst these treaties have weathered the storm of international events reasonably well, their continued health is premised on their being 'tended to' in the face of contextual changes, particularly facing changes in science and technology, as well as the changed nature and character of conflict. This article looks at the potential for normative erosion of the norm against chemical and biological weapons in the face of these contextual changes and the creeping legitimization of chemical and biological weapons.

  11. Application of a Dynamic Programming Algorithm for Weapon Target Assignment

    Science.gov (United States)

    2016-02-01

    evaluation and weapon assignment in maritime combat scenarios. Lloyd also acts as a liaison for the Weapons and Combat Systems Division with the ANZAC...positively identified a number of targets as threats, whether they are an enemy ship (i.e., specifically, its weapon launcher systems) or a directed

  12. Geophysical techniques for exploration of concealed uranium deposits in the Gwalior basin

    International Nuclear Information System (INIS)

    Choudhary, Kalpan; Singh, R.B.

    2004-01-01

    There is no direct geophysical method for the exploration of concealed uranium ore. Scope of geophysics for this in the Gwalior basin comprises delineating the basement topography, demarcation or zones of intense fracturing intersecting the unconformities and to identify the presence of carbonaceous rocks, specially in the graben-like structures. These geophysical problems have been successfully solved in other places by employing IP, resistivity, SP and gravity techniques for basement mapping, identification of fracture zone/shear zone, delineation of electrical conductors like carbonaceous rocks and sulphides. Three such case histories are presented here that include: a). basement and shear/fracture zone mapping in the Vindhyan basin north of Son-Narmada lineament, b). delineation of conductive zone (proved to be carbon phyllite) in the Mahakoshal Group of Kanhara area of Sonbhadra district, UP and c). Identification of a conductive zone, proved to be sulphide body, within the Mahakoshal group in the Gurharpahar area of Sidhi and Sonbhadra districts of MP and UP respectively. In the context of exploration for concealed uranium in the Gwalior basin, it is suggested to employ IP, resistivity, SP, gravity and magnetic methods for delineation of conductive zones like carbonaceous rocks, basement topography, including the graben like structures, fracture zone, geological boundaries and demarcation of the basin boundary. (author)

  13. Legality of the threat or use of nuclear weapons

    International Nuclear Information System (INIS)

    Chang Yenchiang

    2009-01-01

    This paper examines international treaties in relation to the threat or use of nuclear weapons including the 1968 Nuclear Non-Proliferation Treaty and the 1996 Comprehensive Test Ban Treaty. It can be concluded that the effect of the aforesaid international treaties is still in doubt without explicit enforcement mechanisms and penalty for non-compliance. This paper also reviews the International Court of Justice's advisory opinion on the legality of the threat or use of nuclear weapons and comments that a clear explanation on the legality of use of nuclear weapons in 'extreme circumstances of self-defence' is required. Examples from current state practice in relation to nuclear non-proliferation efforts are also provided, with special attention to China, North Korea and Iran. This paper suggests that China as a leader of developing countries should extend its efforts on nuclear non-proliferation and conduct communication between North Korea and Iran and other nuclear weapons states to reduce or prohibit nuclear weapons.

  14. Conflict Without Casualties: Non-Lethal Weapons in Irregular Warfare

    Science.gov (United States)

    2007-09-01

    the body,” and the Geneva Protocol of 1925, bans the use of chemical and biological weapons .11 On 8 April 1975, President Ford issued Executive...E Funding – PE 63851M) (accessed 15 December 2006). The American Journal of Bioethics . “Medical Ethics and Non-Lethal Weapons .” Bioethics.net...CASUALTIES: NON-LETHAL WEAPONS IN IRREGULAR WARFARE by Richard L. Scott September 2007 Thesis Advisor: Robert McNab Second Reader

  15. Prions: the danger of biochemical weapons

    Directory of Open Access Journals (Sweden)

    Eric Almeida Xavier

    2014-09-01

    Full Text Available The knowledge of biotechnology increases the risk of using biochemical weapons for mass destruction. Prions are unprecedented infectious pathogens that cause a group of fatal neurodegenerative diseases by a novel mechanism. They are transmissible particles that are devoid of nucleic acid. Due to their singular characteristics, Prions emerge as potential danger since they can be used in the development of such weapons. Prions cause fatal infectious diseases, and to date there is no therapeutic or prophylactic approach against these diseases. Furthermore, Prions are resistant to food-preparation treatments such as high heat and can find their way from the digestive system into the nervous system; recombinant Prions are infectious either bound to soil particles or in aerosols. Therefore, lethal Prions can be developed by malicious researchers who could use it to attack political enemies since such weapons cause diseases that could be above suspicion.

  16. Hamburgian weapon delivery technology: a quantitative comparative approach

    DEFF Research Database (Denmark)

    Riede, Felix

    2010-01-01

    cran). Numerous studies have addressed the question of whether these points tipped arrows fired from bows, darts launched with the help of spear-throwers, or some other projectile delivery weapon. This paper approaches the question of Hamburgian weapon delivery technology from a quantitative...

  17. Deep Attack Weapons Mix Study (DAWMS) Case Study

    National Research Council Canada - National Science Library

    Bexfield, James

    2001-01-01

    .... This report describes the process used to conduct the Deep Attack Weapons Mix Study (DAWMS) in 1995-1997. This case study focuses on the weapons being procured by the Services and whether a joint viewpoint would result in a more effective mix...

  18. Application of inertial confinement fusion to weapon technology

    International Nuclear Information System (INIS)

    Toepfer, A.J.; Posey, L.D.

    1978-12-01

    This report reviews aspects of the military applications of the inertial confinement fusion (ICF) program at Sandia Laboratories. These applications exist in the areas of: (1) weapon physics research, and (2) weapon effects simulation. In the area of weapon physics research, ICF source technology can be used to study: (1) equations-of-state at high energy densities, (2) implosion dynamics, and (3) laboratory simulation of exoatmospheric burst phenomena. In the area of weapon effects simulation, ICF technology and facilities have direct near, intermediate, and far term applications. In the near term, short pulse x-ray simulation capabilities exist for electronic component effects testing. In the intermediate term, capabilities can be developed for high energy neutron exposures and bremsstrahlung x-ray exposures of components. In the far term, system level exposures of full reentry vehicles will be possible if sufficiently high pellet gains are achieved

  19. The tale of the shrinking weapon: seasonal changes in nutrition affect weapon size and sexual dimorphism, but not contemporary evolution.

    Science.gov (United States)

    Miller, C W; McDonald, G C; Moore, A J

    2016-11-01

    Sexually selected traits are often highly variable in size within populations due to their close link with the physical condition of individuals. Nutrition has a large impact on physical condition, and thus, any seasonal changes in nutritional quality are predicted to alter the average size of sexually selected traits as well as the degree of sexual dimorphism in populations. However, although traits affected by mate choice are well studied, we have a surprising lack of knowledge of how natural variation in nutrition affects the expression of sexually selected weapons and sexual dimorphism. Further, few studies explicitly test for differences in the heritability and mean-scaled evolvability of sexually selected traits across conditions. We studied Narnia femorata (Hemiptera: Coreidae), an insect where males use their hind legs as weapons and the femurs are enlarged, to understand the extent to which weapon expression, sexual dimorphism and evolvability change across the actual range of nutrition available in the wild. We found that insects raised on a poor diet (cactus without fruit) are nearly monomorphic, whereas those raised on a high-quality diet (cactus with ripe fruit) are distinctly sexually dimorphic via the expression of large hind leg weapons in males. Contrary to our expectations, we found little evidence of a potential for evolutionary change for any trait measured. Thus, although we show weapons are highly condition dependent, and changes in weapon expression and dimorphism could alter evolutionary dynamics, our populations are unlikely to experience further evolutionary changes under current conditions. © 2016 European Society For Evolutionary Biology. Journal of Evolutionary Biology © 2016 European Society For Evolutionary Biology.

  20. Biological and Chemical Weapons: Criminal Sanctions and Federal Regulations

    National Research Council Canada - National Science Library

    Garcia, Michael J

    2004-01-01

    The Biological Weapons Convention and the Chemical Weapons Convention, both of which have been signed and ratified by the United States, obligate signatory parties to enact legislation or otherwise...

  1. AWRE: Atomic Weapons Research Establishment

    International Nuclear Information System (INIS)

    1983-01-01

    This reviews the work of AWRE at Aldermaston and Foulness. The main programme is nuclear and is concerned with the design and development of warheads for strategic and tactical nuclear weapons for the British nuclear deterrent, including those for the Royal Navy's missile carrying submarine fleet. The work is described grouped as design physics, development and materials. Services to these groups and to the whole establishment are provided by Engineering, Safety and Administration. The work ranges from long-term fundamental research, the development of technology, design, prototype development to the environmental testing of engineered products. In materials research the emphasis is on plutonium, uranium and beryllium, on high explosives and a wide range of inorganic and organic materials. The physics of the earth's crust is studied to aid detection of underground nuclear explosions. Reactor research facilities include the two reactors, Herald and Viper. (U.K.)

  2. Non-Lethal Chemical Weapons

    National Research Council Canada - National Science Library

    Weilacher, Lester A

    2003-01-01

    Little more than a month after terrorists took control of four passenger aircraft in the United States and unleashed the horror of 9/11, 50 Chechen terrorists armed with automatic weapons and carrying...

  3. Cooperative Security: A New Paradigm For A World Without Nuclear Weapons?

    Directory of Open Access Journals (Sweden)

    Marc Finaud

    2013-11-01

    Full Text Available If there is a loose consensus on aiming at a world free of nuclear weapons in the future, there are clear oppositions as to the timeframe as well as the means for achieving this goal. The approach to nuclear disarmament followed to date has only yielded limited success because it has been conceived in isolation from global and regional security environments and threat perceptions. A new paradigm should thus be sought in order to reconcile nuclear powers’ security doctrines with global aspirations for a safer world, and ensure that nuclear powers derive their security less from others’ insecurity but from mutually beneficial cooperative security. This should not become a pretext for preserving nuclear weapons for ever. It will on the contrary require parallel tracks addressing the initial motivations for acquiring nuclear weapons and other weapons of mass destruction (WMD, in particular in the context of regional conflicts, as well as dealing with the current issues necessarily related to nuclear disarmament (missile defence, weaponization of space, conventional imbalances and future weapon systems. Ultimately, in a globalised nuclear-weapon free world, state security will not require nuclear weapons because it will be inserted into a broader network encompass­ing all aspects of security addressed in cooperative and multilateral approaches.

  4. Risk factors responsible for atrial fibrillation development between symptomatic patients with concealed or manifest atrioventricular accessory pathways

    Directory of Open Access Journals (Sweden)

    Mu Chen

    2015-06-01

    Conclusions: Results from this study demonstrate that the risk factors of AF are not homogenous between concealed and manifest APs, which might suggest heterogeneous pathogenesis of AF in these two types of APs.

  5. Defense Acquisitions: Assessments of Selected Weapon Programs

    Science.gov (United States)

    2017-03-01

    Figure 17: Examples of Knowledge Scorecards 61 Page vi GAO-17-333SP Assessments of Selected Weapon Programs...programs. Page 61 GAO-17-333SP Assessments of Selected Weapon Programs Figure 17: Examples of Knowledge Scorecards Pursuant to a...had direct access to the USD AT&L and other senior acquisition officials, and some approval authorities were delegated to lower levels. For example

  6. Radiation, chemical and biological protection. Mass destruction weapons

    International Nuclear Information System (INIS)

    Janasek, D.; Svetlik, J.

    2005-01-01

    In this text-book mass destruction weapons and radiation, chemical and biological protection are reviewed. The text-book contains the following chapter: (1) Mass destruction weapons; (2) Matter and material; (3) Radioactive materials; (4) Toxic materials; (5) Biological resources; (6) Nuclear energetic equipment; Appendices; References.

  7. Can abolition of nuclear weapons be adequately verified?

    International Nuclear Information System (INIS)

    Rotblat, J.

    1993-01-01

    Speaking on the problems of preventing proliferations of nuclear weapons and nuclear disarmament the author suggests the following measures to reach these goals: signing a treaty that binds all the nuclear weapon states to the no-first-use principle as a basic policy; the United Nations should put the elimination of nuclear weapons on its agenda; having the treaty safeguarded two-pronged verification regime, one would be technological verification, the second one - so called societal verification which means that not just a group of experts but everybody would be asked to take part in ensuring that the treaty would not be violated

  8. FY71 Engineering Report on Surveillance Techniques for Civil Aviation Security

    Science.gov (United States)

    1971-11-01

    This document discusses the work performed by the TSC task group on surveillance techniques in FY71. The principal section is devoted to the technical description, classification and evaluation of commercial metal detectors for concealed weapons. It ...

  9. The use of neutron scattering in nuclear weapons research

    International Nuclear Information System (INIS)

    Juzaitis, R.J.

    1995-01-01

    We had a weapons science breakout session last week. Although it would have been better to hold it closer in time to this workshop, I think that it was very valuable. it may have been less of a 'short-sleeve' workshop environment than we would have liked, but as the first time two communities-the weapons community and the neutron scattering community- got together, it was a wonderful opportunity to transfer information during the 24 presentations that were made. This report contains discussions on the fundamental analysis of documentation of the enduring stockpile; LANSCE's contribution to weapons; spallation is critical to understanding; weapons safety assessments; applied nuclear physics requires cross section information; fission models need refinement; and establishing teams on collaborative projects

  10. A nuclear-weapon-free Middle East

    International Nuclear Information System (INIS)

    Jortner, Joshua

    1986-01-01

    The paper examines the issue of nuclear-weapon States involvement in regional conflicts, and whether such a conflict in the Middle East could trigger a nuclear war between the Super-Powers. Comments on the Middle Eastern situation are given, along with a discussion of the Non-Proliferation Treaty (NPT) and the Middle East, Israel and the NPT, and the nuclear potential in Arab countries. The proposal, by Israel, of a nuclear weapon-free zone in the Middle East is outlined. (UK)

  11. Examination of Economic Feasibility of Nuclear Weapons in the Republic of Korea

    Energy Technology Data Exchange (ETDEWEB)

    Suh, Young A; Yim, Man Sung [Korea Advanced Institute of Science and Technology, Daejeon (Korea, Republic of)

    2015-05-15

    This observation implies that the popular view on nuclear weapons amongst Korean public is in part due to lack of knowledge about overall implications of possessing nuclear weapons. In this regard, pros and cons of nuclear weapons development need to be better characterized and understood by the public to support nuclear nonproliferation culture development. Noting lack of literature on characterizing the economics of nuclear weapons development, this study aims at performing economic feasibility analysis of nuclear weapons development in the ROK. For this purpose, an approach called Index technique based on the US experiences was applied to Korean historical data along with cost-benefit analysis and Multi-Criteria Decision Making Analysis. In this study, the scenario of nuclear weapons development against North Korean nuclear threat was compared with conventional weapons-based defense strategy. The comparison was based on cost benefit analysis and qualitative multi-criteria decision analysis. Results indicate that nuclear weapons development is not a desirable option. However, as this work was a rather simplistic academic exercise, further work is needed to support the outcome of the study. Outcome of these investigations would be useful for communication with the public regarding the need for nuclear weapons for national defense and to develop nuclear nonproliferation culture in the ROK.

  12. Examination of Economic Feasibility of Nuclear Weapons in the Republic of Korea

    International Nuclear Information System (INIS)

    Suh, Young A; Yim, Man Sung

    2015-01-01

    This observation implies that the popular view on nuclear weapons amongst Korean public is in part due to lack of knowledge about overall implications of possessing nuclear weapons. In this regard, pros and cons of nuclear weapons development need to be better characterized and understood by the public to support nuclear nonproliferation culture development. Noting lack of literature on characterizing the economics of nuclear weapons development, this study aims at performing economic feasibility analysis of nuclear weapons development in the ROK. For this purpose, an approach called Index technique based on the US experiences was applied to Korean historical data along with cost-benefit analysis and Multi-Criteria Decision Making Analysis. In this study, the scenario of nuclear weapons development against North Korean nuclear threat was compared with conventional weapons-based defense strategy. The comparison was based on cost benefit analysis and qualitative multi-criteria decision analysis. Results indicate that nuclear weapons development is not a desirable option. However, as this work was a rather simplistic academic exercise, further work is needed to support the outcome of the study. Outcome of these investigations would be useful for communication with the public regarding the need for nuclear weapons for national defense and to develop nuclear nonproliferation culture in the ROK

  13. Prospective effects of social support on internalized homonegativity and sexual identity concealment among middle-aged and older gay men: a longitudinal cohort study.

    Science.gov (United States)

    Lyons, Anthony; Pepping, Christopher A

    2017-09-01

    Middle-aged and older gay men experience higher rates of depression and anxiety compared to their heterosexual counterparts, with internalized homonegativity and sexual identity concealment known to be major stress-related contributors. This study examined the prospective effect of different types and sources of social support on internalized homonegativity and sexual identity concealment experienced among middle-aged and older gay men. A longitudinal survey involving two waves of data collection separated by 12 months was conducted among a cohort of 186 gay-identified men aged 40 years and older. Two types of social support were found to be important. Greater baseline tangible or practical support independently predicted lower internalized homonegativity at 12-month follow-up, while greater baseline emotional or psychological support independently predicted a lower tendency toward sexual identity concealment at 12-month follow-up. Greater baseline support from community or government agencies, such as health services and support organizations, predicted higher internalized homonegativity at 12-month follow-up. These findings suggest that tangible and emotional support may be beneficial in reducing internalized homonegativity and sexual identity concealment among middle-aged and older gay men. Ensuring that services provide environments that do not compound the stressful impact of stigma also appears to be important.

  14. Does nuclear power lead to nuclear weapons

    International Nuclear Information System (INIS)

    Prawitz, J.

    1977-01-01

    It is pointed out that 'reactor grade' plutonium usually contains about 30 % Pu240 and is unsuitable for weapons. While it is possible to obtain an explosion, it is more difficult to initiate one and its effect, which will be considerably less than with bomb grade plutonium, is difficult to predict. The critical mass will be larger and more cooling required. The proliferation problem is then discussed and the four aspects, vertical, horizontal, sub-national and revolutionary, mentioned. In connection with nuclear power it is the second and third aspects which are of interest. In discussing the possibility of terrorist groups obtaining plutonium, a study by the Swedish Defence Research Institute is quoted as estimating that 10-20 qualified specialists and several years secret preparation would be necessary to make a nuclear weapon. Other authors, e.g. Ted Taylor, have maintained that it would be much easier, but examples of 'student designs' are primitive and unlikely to detonate. Even so, it is emphasised that safeguards and physical security are necessary. Horizontal proliferation is a more real problem and the NPT and IAEA safeguards are discussed in this connection. In conclusion the question of whether the proliferation of nuclear weapons via nuclear power can be prevented cannot be answered with a clear yes or no. Certain states may use nuclear weapon potential as a bargaining factor. However the decision to acquire nuclear weapons is political and while a nuclear power industry would be of help, it would not be decisively so. (JIW)

  15. Re-examining the 1996 ICJ Advisory Opinion: Concerning the Legality of Nuclear Weapons

    Directory of Open Access Journals (Sweden)

    Jasjit Singh

    2012-10-01

    Full Text Available The primary objections raised against total elimination of nuclear weapons are built around a few arguments mostly of non-technical nature.Nuclear weapons and the strategies for their use have resulted in the establishment of a vicious circle within which the international community is trapped.The argument that the world will be unsafe without nuclear weapons is only meant to further the narrow self-interest of the nuclear weapon states and their allies.The World Court’s far-reaching 1996 advisory opinion concluded that almost any use or threat of use of nuclear weapons would violate international humanitarian law and law applicable in armed conflict, undermining most claims of nuclear weapon states regarding the legitimacy of possession, use or threat of use of nuclear weapons. The next logical step would be an initiative for a nuclear convention banning the use and threat of use of nuclear weapons in Asia and the adjoining oceans. But as long as the dominant elites in society and the nation-state believe in the utility of nuclear weapons for national security or as the currency of power, abolition of nuclear weapons will remain a mirage.

  16. The spread of nuclear weapons among nations: militarization or development

    International Nuclear Information System (INIS)

    Khan, A.Q.

    1986-01-01

    The paper reviews nuclear proliferation among nations. Nuclear weapons promotion and proliferation are discussed, including both motivation and lack of motivation to manufacture nuclear weapons. The failure of the Non-Proliferation Treaty is examined with respect to vertical and horizontal proliferation, and the containment of horizontal proliferation. Risks of nuclear war by accident are outlined, as well as nuclear weapon development. (UK)

  17. Weapon plutonium in accelerator driven power system

    International Nuclear Information System (INIS)

    Shvedov, O.V.; Murin, B.P.; Kochurov, B.P.; Shubin, Yu.M.; Volk, V.I.; Bogdanov, P.V.

    1997-01-01

    Accelerator Driven Systems are planned to be developed for the use (or destruction) of dozens of tons of weapon-grade Plutonium (W-Pu) resulted from the reducing of nuclear weapons. In the paper are compared the parameters of various types of accelerators, the physical properties of various types of targets and blankets, and the results of fuel cycle simulation. Some economical aspects are also discussed

  18. The Uncertain Consequences of Nuclear Weapons Use

    Science.gov (United States)

    2015-04-15

    this genre is the venerable, and classified, official “bible” of nuclear weapons effects, Capabilities of Nuclear Weapons. Widely referred to by...weekly comic Shukan Shonen Jampu and was later made into several film versions, a television drama series, and ten books, which follow Gen’s...civilized behavior. The film , distributed internationally and shown on Soviet television, was widely discussed in the United States and both depressed

  19. Why are U.S. nuclear weapon modernization efforts controversial?

    Science.gov (United States)

    Acton, James

    2016-03-01

    U.S. nuclear weapon modernization programs are focused on extending the lives of existing warheads and developing new delivery vehicles to replace ageing bombers, intercontinental ballistic missiles, and ballistic missile submarines. These efforts are contested and controversial. Some critics argue that they are largely unnecessary, financially wasteful and potentially destabilizing. Other critics posit that they do not go far enough and that nuclear weapons with new military capabilities are required. At its core, this debate centers on three strategic questions. First, what roles should nuclear weapons be assigned? Second, what military capabilities do nuclear weapons need to fulfill these roles? Third, how severe are the unintended escalation risks associated with particular systems? Proponents of scaled-down modernization efforts generally argue for reducing the role of nuclear weapons but also that, even under existing policy, new military capabilities are not required. They also tend to stress the escalation risks of new--and even some existing--capabilities. Proponents of enhanced modernization efforts tend to advocate for a more expansive role for nuclear weapons in national security strategy. They also often argue that nuclear deterrence would be enhanced by lower yield weapons and/or so called bunker busters able to destroy more deeply buried targets. The debate is further fueled by technical disagreements over many aspects of ongoing and proposed modernization efforts. Some of these disagreements--such as the need for warhead life extension programs and their necessary scope--are essentially impossible to resolve at the unclassified level. By contrast, unclassified analysis can help elucidate--though not answer--other questions, such as the potential value of bunker busters.

  20. The manifest but concealed background of our communication

    Directory of Open Access Journals (Sweden)

    Erkut SEZGIN

    2012-01-01

    Full Text Available That manifest background needs to be elucidated as against intentional memory and imagination habits structured by our learning and operating with rules and pictures (representations of language. That’s the background which is concealed by our very demonstrative forms of expressions meaning and speaking habits expressed by intentional gestures and gesticulations of meaning the surrounding differences and identities: As if they are self essential representative of their own truth and certainty, which is supposed to be meant by the demonstrative, intentional form of the expression. While on the other hand, such intentional demonstrative gestures and gesticulations of meaning operate as conditioned forms of expressions of truth beliefs of imagination and memory habits expressed in reaction to the differences and identities pictured (represented by names and descriptions in deep oblivion of the internal signifying connections of the Use of pictures.

  1. The prevention of geographical proliferation of nuclear weapons: Nuclear-weapon-free zones and zones of peace in the Southern hemisphere

    International Nuclear Information System (INIS)

    Fujita, E.

    1989-01-01

    It is understandable that many Non-Nuclear Weapons States (NNWS) worry about the dangers of further geographical or spatial proliferation of nuclear weapons, as well as the extension to their regions of rivalries that are foreign to them. In this regard, there has been since the 1950's a number of proposals and initiatives to turn specific regions into nuclear-weapons-free zones and zones of peace in order to prevent or reduce the above mentioned threats. Although differences exits between the concepts of nuclear-weapon-free-zones and zones of peace as well as among the various NWFZ and ZP, inter se, they do share a common feature insofar as they represent a regional approach to the question of curbing the arms race, especially the nuclear one. This study will address some of these initiatives, examine their specific characteristics and assess their role in the prevention of the geographical proliferation of nuclear weapons. Among the relevant existing initiatives, those situated in the Southern Hemisphere offer an interesting focus of attention, in view of the fact that, together, they form a sort of a contiguous geographical area encompassing virtually half of the globe. The regions covered are the Antarctic, Latin American, South Pacific, South Atlantic and Indian Oceans. The first three have been established as nuclear-weapons-free-zones and the last two are in the process of being turned into zones of peace. The aim of this study is to compare similarities and differences among them and to identify the factors that condition their efficiency. By understanding their usefulness and their weaknesses, one many eventually construct useful paradigms for further regional initiatives to curb the arms race, specially the nuclear one

  2. Nuclear weapons in the India-Pakistan context

    International Nuclear Information System (INIS)

    Sanjay Badri-Maharaj

    2002-01-01

    This thesis deals with the possible employment of nuclear weapons in the ongoing confrontation between India and Pakistan. After reviewing the nuclear capabilities of both Indian and Pakistan and assessing their possible delivery systems, this dissertation explores the emerging picture regarding the Indian and Pakistani nuclear doctrines. It is argued that, after exploring the current structure of the armed forces in both countries and after analyzing the theatres of operations, it is highly unlikely that either country seeks to employ nuclear weapons in a tactical, battlefield role. It is also argued that neither India or Pakistan is making an effort to evolve a nuclear war-fighting doctrine. Moreover, it is shown that nuclear weapons have simply led to a re-thinking of military tactics on the part of India so as to minimize the chance of a nuclear strike by limiting the aims and objectives of any Indian military action. In stark contrast, it is shown that South Asian cities present far more lucrative targets for nuclear strikes. As a result of this and the geographic and tactical limitations of South Asian battlefields, it is argued that both India and Pakistan have based their fledgling nuclear strategies around a 'city-busting' concept. The existing command and control systems in both countries are examined and found to be adequate if both countries adopt a strict 'second-strike' approach to the employment of nuclear weapons. It is further argued that nuclear weapons, while limiting the scale of any future India-Pakistan war, will not play a major role in preventing a conflict between the two countries. Rather, the basic operational parity that exists between the two countries in terms of their conventional forces is responsible for preventing the outbreak of war. The thesis also briefly explores the rationale behind the acquisition of nuclear weapons in both countries and on their basic security perceptions. The issue of confidence building measures and the

  3. 77 FR 59891 - Proposed Information Collection; Comment Request; Chemical Weapons Convention Declaration and...

    Science.gov (United States)

    2012-10-01

    ... Request; Chemical Weapons Convention Declaration and Report Handbook and Forms AGENCY: Bureau of Industry.... Abstract The Chemical Weapons Convention Implementation Act of 1998 and Commerce Chemical Weapons... Chemical Weapons Convention (CWC), an international arms control treaty. II. Method of Collection Submitted...

  4. Research on Integrated Geophysics Detect Potential Ground Fissure in City

    Science.gov (United States)

    Qian, R.

    2017-12-01

    North China confined aquifer lied 70 to 200 meters below the earth's surface has been exploited for several decades, which resulted in confined water table declining and has generated a mass of ground fissure. Some of them has reached the surface and the other is developing. As it is very difficult to stop the ground fissure coming into being, measures of avoiding are often taken. It brings great potential risk to urban architecture and municipal engineering. It is very important to find out specific distribution and characteristic of potential ground fissure in city with high resolution. The ground fissure is concealed, therefor, geophysical method is an important technology to detecting concealed ground fissure. However, it is very difficult to detect the characteristics of the superficial part of ground fissure directly, as it lies dozens of meters below and has only scores of centimeters fault displacement. This paper studies applied ground penetration radar, surface wave and shallow refleciton seismic to detect ground fissure. It sets up model of surface by taking advantage of high resolution of ground penetrating radar data, constrains Reilay wave inversion and improves its resolution. The high resolution reflection seismic is good at detecting the geology structure. The data processing and interpretation technique is developmented to avoid the pitfall and improve the aliability of the rusult. The experiment has been conducted in Shunyi District, Beijing in 2016. 5 lines were settled to collect data of integrated geophysical method. Development zone of concealed ground fissure was found and its ultra shallow layer location was detected by ground penetrating radar. A trial trench of 6 meters in depth was dug and obvious ground fissure development was found. Its upper end was 1.5 meters beneath the earth's surface with displacement of 0.3 meters. The favorable effect of this detection has provided a new way for detecting ground fissure in cities of China, such

  5. 50 kW laser weapon demonstrator of Rheinmetall Waffe munition

    Science.gov (United States)

    Ludewigt, K.; Riesbeck, Th.; Graf, A.; Jung, M.

    2013-10-01

    We will present the setup of a 50 kW Laser Weapon Demonstrator (LWD) and results achieved with this system. The LWD is a ground based Air Defence system consisting of a Skyguard sensor unit for target acquisition and two laser equipped weapon turrets. The weapon turrets used are standard air defence turrets of Rheinmetall Air Defence which were equipped with several 10 kW Laser Weapon Modules (LWM). Each LWM consists of one 10 kW fiber laser and a beam forming unit (BFU). Commercial of the shelf fiber laser were modified for our defence applications. The BFU providing diffraction limited beam focusing, target imaging and fine tracking of the target was developed. The LWD was tested in a firing campaign at Rheinmetall test ground in Switzerland. All laser beams of both weapon turrets were superimposed on stationary and dynamic targets. Test results of the LWD for the scenarios Air Defence and C-RAMM (counter rockets, artillery, mortar and missiles) will be presented. An outlook for the next development stage towards a 100 kW class laser weapon on RWM will be given.

  6. Nuclear-weapon-free zones: Pursuing security, region by region. Conference of States Parties and Signatories of treaties that establish nuclear-weapon-free zones

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2005-01-01

    The development of nuclear-weapon-free zones, over the past four decades, is a testament to what nations can do, region by region, to achieve common security objectives. In fact, when considering the history of nuclear non-proliferation efforts, it might be said that here in Mexico City is w here it all began . The 1967 Treaty of Tlatelolco was the first multilateral treaty to establish a region free of nuclear weapons and a requirement for comprehensive IAEA safeguards for its parties - and clearly gave impetus to the conclusion of the Treaty on the Non-Proliferation of Nuclear Weapons. Nuclear-weapon-free zones provide tangible security benefits. They help to reassure the larger international community of the peaceful nuclear intentions of countries in these regions. They provide their members with security assurances against the use, or threat of use, of nuclear weapons by a nuclear-weapon State. They include control mechanisms for dealing with non-compliance in a regional setting. And in all cases, they prohibit the development, stationing or testing of nuclear weapons in their respective regions. An important benefit of these zones is that they open a forum for expanded regional dialogue on issues of security. Because the causes of insecurity vary from region to region, security solutions do not come in a 'one-size-fits-all' package. It is for this reason that regional dialogues, as we see in the nuclear-weapon-free zones, are so beneficial. It is clear that such treaties, and such security dialogues, would be invaluable in other areas of the world, such as the Middle East and the Korean Peninsula. Since the end of the Cold War, the international security landscape has undergone dramatic changes. For example, the rise in terrorism, the discovery of clandestine nuclear programmes, and the emergence of covert nuclear procurement networks have heightened our awareness of vulnerabilities in the nuclear non-proliferation regime. This statement focuses on two issues

  7. Burning weapons-grade plutonium in reactors

    International Nuclear Information System (INIS)

    Newman, D.F.

    1993-06-01

    As a result of massive reductions in deployed nuclear warheads, and their subsequent dismantlement, large quantities of surplus weapons- grade plutonium will be stored until its ultimate disposition is achieved in both the US and Russia. Ultimate disposition has the following minimum requirements: (1) preclude return of plutonium to the US and Russian stockpiles, (2) prevent environmental damage by precluding release of plutonium contamination, and (3) prevent proliferation by precluding plutonium diversion to sub-national groups or nonweapons states. The most efficient and effective way to dispose of surplus weapons-grade plutonium is to fabricate it into fuel and use it for generation of electrical energy in commercial nuclear power plants. Weapons-grade plutonium can be used as fuel in existing commercial nuclear power plants, such as those in the US and Russia. This recovers energy and economic value from weapons-grade plutonium, which otherwise represents a large cost liability to maintain in safeguarded and secure storage. The plutonium remaining in spent MOX fuel is reactor-grade, essentially the same as that being discharged in spent UO 2 fuels. MOX fuels are well developed and are currently used in a number of LWRs in Europe. Plutonium-bearing fuels without uranium (non-fertile fuels) would require some development. However, such non-fertile fuels are attractive from a nonproliferation perspective because they avoid the insitu production of additional plutonium and enhance the annihilation of the plutonium inventory on a once-through fuel cycle

  8. Advanced microwave/millimeter-wave imaging technology

    International Nuclear Information System (INIS)

    Shen, Zuowei; Yang, Lu; Luhmann, N.C. Jr.

    2007-01-01

    Millimeter wave technology advances have made possible active and passive millimeter wave imaging for a variety of applications including advanced plasma diagnostics, radio astronomy, atmospheric radiometry, concealed weapon detection, all-weather aircraft landing, contraband goods detection, harbor navigation/surveillance in fog, highway traffic monitoring in fog, helicopter and automotive collision avoidance in fog, and environmental remote sensing data associated with weather, pollution, soil moisture, oil spill detection, and monitoring of forest fires, to name but a few. The primary focus of this paper is on technology advances which have made possible advanced imaging and visualization of magnetohydrodynamic (MHD) fluctuations and microturbulence in fusion plasmas. Topics of particular emphasis include frequency selective surfaces, planar Schottky diode mixer arrays, electronically controlled beam shaping/steering arrays, and high power millimeter wave local oscillator and probe sources. (author)

  9. Males that drop a sexually selected weapon grow larger testes.

    Science.gov (United States)

    Joseph, Paul N; Emberts, Zachary; Sasson, Daniel A; Miller, Christine W

    2018-01-01

    Costly sexually selected weapons are predicted to trade off with postcopulatory traits, such as testes. Although weapons can be important for achieving access to females, individuals of some species can permanently drop (i.e. autotomize) their weapons, without regeneration, to escape danger. We capitalized on this natural behavior to experimentally address whether the loss of a sexually selected weapon leads to increased testes investment in the leaf-footed cactus bug, Narnia femorata Stål (Hemiptera: Coreidae). In a second experiment, we measured offspring production for males that lost a weapon during development. As predicted, males that dropped a hind limb during development grew significantly larger testes than the control treatments. Hind-limb autotomy did not result in the enlargement of other nearby traits. Our results are the first to experimentally demonstrate that males compensate for natural weapon loss by investing more in testes. In a second experiment we found that females paired with males that lost a hind limb had 40% lower egg hatching success than females paired with intact males, perhaps because of lower mating receptivity to males with a lost limb. Importantly, in those cases where viable offspring were produced, males missing a hind limb produced 42% more offspring than males with intact limbs. These results suggest that the loss of a hind-limb weapon can, in some cases, lead to greater fertilization success. © 2017 The Author(s). Evolution © 2017 The Society for the Study of Evolution.

  10. Acoustic firearm discharge detection and classification in an enclosed environment

    Energy Technology Data Exchange (ETDEWEB)

    Luzi, Lorenzo; Gonzalez, Eric; Bruillard, Paul; Prowant, Matthew; Skorpik, James; Hughes, Michael; Child, Scott; Kist, Duane; McCarthy, John E.

    2016-05-01

    Two different signal processing algorithms are described for detection and classification of acoustic signals generated by firearm discharges in small enclosed spaces. The first is based on the logarithm of the signal energy. The second is a joint entropy. The current study indicates that a system using both signal energy and joint entropy would be able to both detect weapon discharges and classify weapon type, in small spaces, with high statistical certainty.

  11. The risk of nuclear weapons proliferation

    International Nuclear Information System (INIS)

    Oelgaard, P.L.

    1994-01-01

    During the later years the risks of nuclear proliferation have again become a major topic of interest. This is primarily due to the acute problems caused by Iraq, North Korea, and the 3 new states of the former USSR, Ukraine, Kazakhstan and Belarus. Analysis shows that security problems and prestige are the two most important motives, when the risks of proliferation are considered. But motives are not enough. To produce nuclear weapons a number of technological requirements must also be fulfilled. The country must be able to produce almost pure fissile material, i.e. 235 U or 239 Pu. It must also be able to solve a number of metallurgical, explosive, ignition, physics and other problems. These are in particular non-trivial, if a implosion weapon is to be designed. A review is made of the nuclear facilities in a number of the countries which have been suggested as possible future nuclear weapons countries. In particular facilities which can produce almost pure fissile materials, 235 U and 239 Pu, are considered. The possibility of nuclear terrorists have often been discussed in the media. However, it seems very unlikely that even a major terrorist or mafia organization will be able to solve all the weapons design problems, even if they could steal the fissile material. It is finally discussed what can be done to reduce the risk of further nuclear proliferation. Political pressure can be brought to bear on countries outside the NPT to join it, but it can be counter-productive, and sometimes the countries that are able to exert such pressure, are not willing to do so for other political reasons. The problem of countries which are party to the NPT, but which are believed to acquire nuclear weapons capability in violation of the treaty, can be countered by unannounced inspections of non-declared facilities. However, such inspections can only be meaningfully performed if the necessary intelligence is available. (EG)

  12. The proliferation of massive destruction weapons and ballistic missiles

    International Nuclear Information System (INIS)

    Schmitt, M.

    1996-01-01

    The author studies the actual situation of nuclear deterrence policies, the possibilities of use chemical weapons as massive destructions weapons for non nuclear governments. The situation of non proliferation of nuclear weapons took a new interest with the disintegration of the communism block, but it seems that only few nuclear matter disappeared towards proliferating countries. The denuclearization of Bielorussia, Ukraine and Kazakhstan makes progress with the START I treaty; China has signed the Non proliferation treaty in 1992, it conducts an export policy in matter of equipment and know-how, towards Iran, Pakistan, North Korea, Saudi Arabia and Syria. In a future of ten years, countries such, Iran, North Korea could catch up with Israel, India and Pakistan among non declared nuclear countries. For chemical weapon, Libya, Iran and Syria could catch up with Iraq. (N.C.)

  13. #TheWeaponizationOfSocialMedia

    DEFF Research Database (Denmark)

    Nissen, Thomas Elkjer

    In today’s conflict environment, transformed by information technology and of who can communicate and how, states, non-state actors, ad hoc activist networks and individuals create effect(s) in and through social network media in support of their objectives. #TheWeaponizationOfSocialMedia develops...... a framework for understanding how social network media shapes global politics and contemporary conflicts by examining their role as a platform for conduction intelligence collection, targeting, cyber-operations, psychological warfare and command and control activities. Through these, the weaponization...... of social media shows both the possibilities and the limitations of social network media in contemporary conflicts and makes a contribution to theorizing and studying contemporary conflicts....

  14. Memory detection 2.0: the first web-based memory detection test.

    Science.gov (United States)

    Kleinberg, Bennett; Verschuere, Bruno

    2015-01-01

    There is accumulating evidence that reaction times (RTs) can be used to detect recognition of critical (e.g., crime) information. A limitation of this research base is its reliance upon small samples (average n = 24), and indications of publication bias. To advance RT-based memory detection, we report upon the development of the first web-based memory detection test. Participants in this research (Study1: n = 255; Study2: n = 262) tried to hide 2 high salient (birthday, country of origin) and 2 low salient (favourite colour, favourite animal) autobiographical details. RTs allowed to detect concealed autobiographical information, and this, as predicted, more successfully so than error rates, and for high salient than for low salient items. While much remains to be learned, memory detection 2.0 seems to offer an interesting new platform to efficiently and validly conduct RT-based memory detection research.

  15. Memory detection 2.0: the first web-based memory detection test.

    Directory of Open Access Journals (Sweden)

    Bennett Kleinberg

    Full Text Available There is accumulating evidence that reaction times (RTs can be used to detect recognition of critical (e.g., crime information. A limitation of this research base is its reliance upon small samples (average n = 24, and indications of publication bias. To advance RT-based memory detection, we report upon the development of the first web-based memory detection test. Participants in this research (Study1: n = 255; Study2: n = 262 tried to hide 2 high salient (birthday, country of origin and 2 low salient (favourite colour, favourite animal autobiographical details. RTs allowed to detect concealed autobiographical information, and this, as predicted, more successfully so than error rates, and for high salient than for low salient items. While much remains to be learned, memory detection 2.0 seems to offer an interesting new platform to efficiently and validly conduct RT-based memory detection research.

  16. The Spear: An Effective Weapon Since Antiquity

    Directory of Open Access Journals (Sweden)

    Robert E. Dohrenwend

    2012-07-01

    Full Text Available The spear is perhaps man’s oldest weapon, and may even be his oldest tool. Over the hundreds of thousands of years of the weapon’s existence, it evolved from a pointed stick into an efficient hunting missile, and then became the most effective hand-held bladed weapon humans ever devised. The spear and its use is the only martial art originally devised for use against species other than our own, and more than any other weapon, the spear emphasizes the relationship between hunting and warfare. Virtually without exception, the spear is present wherever there are humans. The spear may claim to be the senior martial art, and the weapon is still in use today. Early techniques are preserved by the small number of Japanese sojutsu schools, and modern Chinese martial artists have developed elegant and impressive gymnastic routines for the spear. The javelin throw is a modern Olympic track and field event, and there are people who have resurrected the Aztec atlatl for sporting competition. Today, the spear is still used in Europe for hunting wild boar, and the continued issue of the obsolete bayonet to modern soldiers testifies to a deep, almost instinctive respect still possessed by the military for the spear.

  17. Non-Lethal Weapons Program

    Science.gov (United States)

    Sheets Frequently Asked Questions Non-Lethal Weapons FAQs Active Denial System FAQs Human Electro -Muscular Incapacitation FAQs Related Links Business Opportunities Contact JNLWD Congressional Engagement , Wednesday, Sept 20, 2017. The Active Denial System, blunt-impact munitions, dazzling lasers, LRAD 100X

  18. Reducing health risk assigned to organic emissions from a chemical weapons incinerator.

    Science.gov (United States)

    Laman, David M; Weiler, B Douglas; Skeen, Rodney S

    2013-03-01

    Organic emissions from a chemical weapons incinerator have been characterized with an improved set of analytical methods to reduce the human health risk assigned to operations of the facility. A gas chromatography/mass selective detection method with substantially reduced detection limits has been used in conjunction with scanning electron microscopy/energy dispersive X-ray spectrometry and Fourier transform infrared microscopy to improve the speciation of semi-volatile and non-volatile organics emitted from the incinerator. The reduced detection limits have allowed a significant reduction in the assumed polycyclic aromatic hydrocarbon (PAH) and aminobiphenyl (ABP) emission rates used as inputs to the human health risk assessment for the incinerator. A mean factor of 17 decrease in assigned human health risk is realized for six common local exposure scenarios as a result of the reduced PAH and ABP detection limits.

  19. Non-proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    Fischer, D.; Haeckel, E.; Haefele, W.; Lauppe, W.D.; Mueller, H.; Ungerer, W.

    1991-01-01

    During the turbulant transitional events in world politics in the nineties, the control of nuclear weapons plays a major role. While the superpowers are reducing their nuclear arsenal, the danger of nuclear anarchy in the world remains virulent. The NPT of 1968 is up for review soon. The falling apart of the former communist sphere of power, and the regions of conflict in the Third World present new risks for the proliferation of nuclear arms. For unified Germany, which explicitly renounced nuclear weapons, this situation presents difficult questions concerning national safety policies and international responsibility. This volume presents contributions which take a new look at topical and long-term problems of nuclear NP politics. The authors evaluate the conditions under which the NP regime came into being, and assess short- and long-term possibilities and risks. The following papers are included: 1.) Basic controversies during the negotiations concerning the Treaty on non-proliferation of nuclear weapons (Ungerer); 2.) Prologation of the NPT 1995 and appropriate problems concerning safety and control (Haefele/Lauppe); 3.) Consequences of the Iraq case for NP policy (Ficher); 4.) Problems of nuclear technology control (Mueller); 5.) Framework conditions of a nuclear world system (Haeckel). (orig./HP) [de

  20. The Concealed Information Test in the Laboratory Versus Japanese Field Practice: Bridging the Scientist-Practitioner Gap

    NARCIS (Netherlands)

    Ogawa, T.; Matsuda, I.; Tsuneoka, M.; Verschuere, B.

    2015-01-01

    Whereas the Concealed Information Test (CIT) is heavily researched in laboratories, Japan is the only country that applies it on a large scale to real criminal investigations. Here we note that important differences exist in CIT design, data-analysis, and test conclusions between these two settings.

  1. Hitler's bomb: the secret story of Germans' attempts to get the nuclear weapon

    International Nuclear Information System (INIS)

    Karlsch, Rainer

    2007-01-01

    In this historical book, the author claims to have evidence concerning the development and testing of a possible 'nuclear weapon' by Nazi Germany in 1945. The 'weapon' in question is not alleged to be a standard nuclear weapon powered by nuclear fission, but something closer to either a radiological weapon (a so-called 'dirty bomb') or a hybrid-nuclear fusion weapon. Its new evidence is concerned primarily with the parts of the German nuclear energy project (an attempted clandestine scientific effort led by Germany to develop and produce atomic weapons during World War II) under Kurt Diebner, a German nuclear physicist who directed and administrated the project

  2. Between Concealing and Revealing Intersexed Bodies: Parental Strategies.

    Science.gov (United States)

    Danon, Limor Meoded; Krämer, Anike

    2017-08-01

    Parents of intersex children are perceived in many studies as hopeless, highly dependent on the medical system, and as gate keepers of normative gendered bodies. In this article, we challenge these perceptions and argue that parents of intersex children are problematically positioned between their children's needs for care and well-being and the socialmedical forces that aim to "normalize" them. Their in-between position leads them to establish different parental strategies within and outside of traditional sex/gender norms. We focus on three intertwined parental strategy frameworks: bodily dialogue, sex/gender framing, and concealing/revealing practices, and describe how, in each of these strategic frameworks, the parents maneuver, act in accordance with or against, react to, and challenge the medical system, social interactions, and the sex/gender paradigm. This is a comparative study based on narrative interviews with 22 parents of intersex children in Germany and Israel.

  3. Responding to chemical weapons violations in Syria: legal, health, and humanitarian recommendations.

    Science.gov (United States)

    Brooks, Julia; Erickson, Timothy B; Kayden, Stephanie; Ruiz, Raul; Wilkinson, Stephen; Burkle, Frederick M

    2018-01-01

    The repeated use of prohibited chemical weapons in the Syrian conflict poses serious health, humanitarian, and security threats to civilians, healthcare personnel, and first responders. Moreover, the use of chemical weapons constitutes a clear and egregious violation of international law-likely amounting to a war crime-for which continued impunity is setting a dangerous precedent in relation to current and future conflicts. This debate article calls upon concerned states, organizations, and individuals to respond urgently and unequivocally to this serious breach of international legal and humanitarian norms. Based on health, humanitarian, and legal findings, this article calls for concrete action to: 1) reduce the risk of chemical weapons being used in current and future conflicts; 2) review and support the preparedness equipment and antidote supplies of first responders, humanitarian organizations, and military forces operating in Syria; 3) support international mechanisms for monitoring and enforcing the prohibition on chemical weapons, including through criminal accountability; 4) support civilian victims of chemical weapons attacks, including refugees; and 5) re-commit to the complete elimination of chemical weapons in compliance with the Chemical Weapons Convention (1993), a comprehensive treaty that bans chemical weapons and requires their complete destruction. All involved states and organizations should take urgent steps to ensure the protection of the most vulnerable victims of conflict, including victims of chemical weapons attacks in Syria, and to reinforce international law in the face of such serious violations.

  4. Rethinking the Development of Weapons and Their Impact

    Science.gov (United States)

    Katsioloudis, Petros J.; Jones, Mildred V.

    2011-01-01

    As one reads about the history of humans, he/she sees very early on that humans are naturally "tool users." More specifically, humans used tools as a means of subsistence and survival. Even today humans use tools to extend their capabilities beyond imagination. These tools are even used as weapons. However primitive, these early weapons would soon…

  5. Constraining potential nuclear-weapons proliferation from civilian reactors

    International Nuclear Information System (INIS)

    Travelli, A.; Gaines, L.L.; Minkov, V.; Olson, A.P.; Snelgrove, J.

    1993-01-01

    Cessation of the Cold War and renewed international attention to the proliferation of weapons of mass destruction are leading to national policies aimed at restraining nuclear-weapons proliferation that could occur through the nuclear-fuel cycle. Argonne, which has unique experience, technology, and capabilities, is one of the US national laboratories contributing to this nonproliferation effort

  6. Recovery of weapon plutonium as feed material for reactor fuel

    International Nuclear Information System (INIS)

    Armantrout, G.A.; Bronson, M.A.; Choi, Jor-Shan

    1994-01-01

    This report presents preliminary considerations for recovering and converting weapon plutonium from various US weapon forms into feed material for fabrication of reactor fuel elements. An ongoing DOE study addresses the disposition of excess weapon plutonium through its use as fuel for nuclear power reactors and subsequent disposal as spent fuel. The spent fuel would have characteristics similar to those of commercial power spent fuel and could be similarly disposed of in a geologic repository

  7. U.S. assistance in the destruction of Russia's chemical weapons

    OpenAIRE

    Mostoller, Eric Charles

    2000-01-01

    The thesis examines the present status of Russia's chemical weapons destruction program, which is to be implemented according to the 1993 Chemical Weapons Convention (CWC). It assesses the magnitude of the challenges in destroying the world's largest chemical weapons stockpile, which is located at seven sites in western Russia. It also evaluates the environmental and international security concerns posed by the conditions at these sites and the disastrous implications of a failure of this che...

  8. Weapon carrying and psychopathic-like features in a population-based sample of Finnish adolescents.

    Science.gov (United States)

    Saukkonen, Suvi; Laajasalo, Taina; Jokela, Markus; Kivivuori, Janne; Salmi, Venla; Aronen, Eeva T

    2016-02-01

    We investigated the prevalence of juvenile weapon carrying and psychosocial and personality-related risk factors for carrying different types of weapons in a nationally representative, population-based sample of Finnish adolescents. Specifically, we aimed to investigate psychopathic-like personality features as a risk factor for weapon carrying. The participants were 15-16-year-old adolescents from the Finnish self-report delinquency study (n = 4855). Four different groups were formed based on self-reported weapon carrying: no weapon carrying, carrying knife, gun or other weapon. The associations between psychosocial factors, psychopathic-like features and weapon carrying were examined with multinomial logistic regression analysis. 9% of the participants had carried a weapon in the past 12 months. Adolescents with a history of delinquency, victimization and antisocial friends were more likely to carry weapons in general; however, delinquency and victimization were most strongly related to gun carrying, while perceived peer delinquency (antisocial friends) was most strongly related to carrying a knife. Better academic performance was associated with a reduced likelihood of carrying a gun and knife, while feeling secure correlated with a reduced likelihood of gun carrying only. Psychopathic-like features were related to a higher likelihood of weapon carrying, even after adjusting for other risk factors. The findings of the study suggest that adolescents carrying a weapon have a large cluster of problems in their lives, which may vary based on the type of weapon carried. Furthermore, psychopathic-like features strongly relate to a higher risk of carrying a weapon.

  9. Australia - a nuclear weapons testing ground

    International Nuclear Information System (INIS)

    Dobbs, Michael.

    1993-01-01

    Between 1952 and 1958 Britain conducted five separate nuclear weapons trials in Australia. Australia had the uninhabited wide open spaces and the facilities which such tests need and Britain was able to use its special relationship with Australia to get agreement to conduct atomic tests in Australia and establish a permanent test site at Maralinga. Other non-nuclear tests were conducted between 1953-1963. The story of Britain's involvement in atomic weapons testing in Australia is told through its postal history. Both official and private covers are used to show how the postal communications were established and maintained throughout the test years. (UK)

  10. Safeguarding nuclear weapon: Usable materials in Russia

    International Nuclear Information System (INIS)

    Cochran, T.

    1998-01-01

    Both the United States and Russia are retaining as strategic reserves more plutonium and HEU for potential reuse as weapons, than is legitimately needed. Both have engaged in discussions and have programs in various stages of development to dispose of excess plutonium and HEU. These fissile material disposition programs will take decades to complete. In the interim there will be, as there is now, hundreds of tons of separated weapon-usable fissile material stored in tens of thousands of transportable canisters, each containing from a few to several tons of kgs of weapon-usable fissile material. This material must be secured against theft and unauthorized use. To have high confidence that the material is secure, one must establish criteria against which the adequacy of the protective systems can be judged. For example, one finds such criteria in US Nuclear Regulatory Commission (USNRC) regulations for the protection of special nuclear materials

  11. BLDC technology and its application in weapon system launching ...

    African Journals Online (AJOL)

    In this paper Brushless DC (BLDC) Technology and its Application in Articulation of Weapon System Launching Platform using Electromechanical Servo Drive is presented. ... Due to inherent properties of BLDC Technology BLDC Motors and Drives are profoundly used in military and strategic weapon system applications.

  12. BLDC technology and its application in weapon system launching ...

    African Journals Online (AJOL)

    Due to inherent properties of BLDC Technology BLDC Motors and Drives are profoundly used in military and strategic weapon system applications. In this paper, BLDC Motor and Electromechanical Servo Drive System, operating principle, modeling, characteristics and its application in various weapon system programs are ...

  13. A Poor Man's Nuclear Deterrent: Assessing the Value of Radiological Weapons for State Actors

    Science.gov (United States)

    Donohue, Nathan

    The threat of weapons of mass destruction is an issue which remains at the forefront on national security. Nuclear, chemical, and biological weapons are all considered very dangerous by both state and non-state actors. Radiological weapons exist in that same category yet are not held in the same regard; the reason that is given is that these types of weapons are not the weapons of mass destruction that the other three are. Instead, radiological weapons are better considered weapons of mass disruption. Accordingly, in the academic and policy literature there has been very little perceived value associated with such weapons for use by state actors. However the historical focus on the military efficacy of radiological weapons has obscured the obvious truth that they may pose significant value for state actors. What this research shows is that the explosion of a radiological weapon could disrupt a target area in ways which could cripple the economy of an adversary state and promote widespread fear concerning exposure to radiation. Any such attack would not only necessitate large scale evacuation, but cleanup, decontamination, demolition, territory exclusion, and relocation. Moreover, the effects of such an attack would be unlikely to remain an isolated event as evacuated and displaced citizens spread across the nation carrying both fear and residual radiation. All of these factors would only be compounded by a state actor's ability to not only develop such weapons, but to manufacture them in such a composition that contemporary examples of such weapons grossly underestimate their impact. Accordingly, radiological weapons could hold great value for any state actor wishing to pursue their development and to threaten their use. Moreover, "while RDDs may not be well suited as "military weapons" in the classic sense, the use of RDDs could be powerfully coercive."1 In that sense, state actors could even acquire radiological weapons for their deterrent value. 1James L. Ford

  14. Agent-based Modeling Methodology for Analyzing Weapons Systems

    Science.gov (United States)

    2015-03-26

    technique involve model structure, system representation and the degree of validity, coupled with the simplicity, of the overall model. ABM is best suited... system representation of the air combat system . We feel that a simulation model that combines ABM with equation-based representation of weapons and...AGENT-BASED MODELING METHODOLOGY FOR ANALYZING WEAPONS SYSTEMS THESIS Casey D. Connors, Major, USA

  15. Experimental manipulation reveals a trade-off between weapons and testes.

    Science.gov (United States)

    Somjee, U; Miller, C W; Tatarnic, N J; Simmons, L W

    2018-01-01

    Theory predicts a trade-off between sexually selected weapons used to secure mates and post-copulatory traits used to maximize fertilization success. However, individuals that have a greater capacity to acquire resources from the environment may invest more in both pre- and post-copulatory traits, and trade-offs may not be readily apparent. Here, we manipulate the phenotype of developing individuals to examine allocation trade-offs between weapons and testes in Mictis profana (Hemiptera: Coreidae), a species where the hind legs are sexually selected weapons used in contests over access to females. We experimentally prevented males from developing weapons by inducing them to autotomize their hind legs before the final moult to adulthood. We compared trait expression in this group to males where autotomy was induced in the mid-legs, which are presumably not under sexual selection to the same extent. We found males without weapons invested proportionally more in testes mass than those with their mid-legs removed. Males that developed to adulthood without weapons did not differ from the mid-leg removal group in other traits potentially under precopulatory sexual selection, other post-copulatory traits or naturally selected traits. In addition, a sample of adult males from the same population in the wild revealed a positive correlation between investment in testes and weapons. Our study presents a critical contribution to a growing body of literature suggesting the allocation of resources to pre- and post-copulatory sexual traits is influenced by a resource allocation trade-off and that this trade-off may only be revealed with experimental manipulation. © 2017 European Society For Evolutionary Biology. Journal of Evolutionary Biology © 2017 European Society For Evolutionary Biology.

  16. USAF Weapon System Evaluation Program

    National Research Council Canada - National Science Library

    1999-01-01

    During this task period, Schafer Corporation provided engineering services and analysis to the USAF at Eglin AFB, Florida in direct support of the USAF Air-to-Surface Weapon System Evaluation Program (WSEP...

  17. What Happens to Deterrence as Nuclear Weapons Decrease Toward Zero?

    Science.gov (United States)

    Drell, Sidney

    2011-04-01

    Steps reducing reliance on deployed nuclear weapons en route to zero will be discussed. They include broadly enhancing cooperation and transparency agreements beyond the provisions for verifying limits on deployed strategic nuclear warheads and delivery systems in the New START treaty. Two questions that will be addressed are: What conditions would have to be established in order to maintain strategic stability among nations as nuclear weapons recede in importance? What would nuclear deterrence be like in a world without nuclear weapons?

  18. The abolition of nuclear weapons: realistic or not? For physicians, a world without nuclear weapons is possible and above all necessary. To abolish, did you say abolish? Is the elimination of the nuclear weapon realistic?

    International Nuclear Information System (INIS)

    Behar, Abraham; Gere, Francois; Lalanne, Dominique

    2010-06-01

    In a first article, a physician explains that eliminating nuclear weapons would be a way to get rid of the temptation for some persons to use this arm of massive destruction, and that it would be better for mankind to live without this threat. The author of the second article discusses the effect abolition could have, and, with a reference to President Obama's position about zero nuclear weapons, outlines that it could be at the benefit of peaceful uses of nuclear energy. He also discusses the perspectives of this 'global zero logics' with a new approach to arms control, and comments the relationships between abolition and non proliferation. He finally discusses the reserved attitude of France on these issues. In the next contribution, a nuclear physicist wanders whether the elimination of nuclear weapons is realistic: whereas it has always been a political objective, nuclear states refused to commit themselves in this direction in 2010 and keep on developing military-oriented tools to design new weapons

  19. The concealed finds from the Mühlberg-Ensemble in Kempten (southern Germany)

    DEFF Research Database (Denmark)

    Atzbach, Rainer

    2012-01-01

    history. This paper examines an exceptional collection of assemblages recovered from dead spaces within three adjacent buildings in the town of Kempten, southern Germany. It summarizes the major research project based on the wide variety of finds recovered, including numerous objects of wood, leather, fur......Concealed finds in buildings are a worldwide phenomenon. Since the 14th century, the angles of vaults, the dead space between ceilings and floors, walled niches and other voids in buildings have been used to dump waste, mostly on the occasion of rebuilding activities. In a few cases, careful...

  20. 48 CFR 225.7005 - Restriction on certain chemical weapons antidote.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Restriction on certain chemical weapons antidote. 225.7005 Section 225.7005 Federal Acquisition Regulations System DEFENSE... on certain chemical weapons antidote. ...

  1. The opportunity to limit and reduce inventories of fissionable weapon materials

    International Nuclear Information System (INIS)

    Hebel, L.C.

    1991-01-01

    As the United States and the Soviet government agree on major reductions in nuclear weapon delivery systems, they need to address the disposal of the nuclear warheads and bombs for those systems. Such measures could be strongly reinforced if the two nations also institute restraints and reductions in the total amount of fissionable materials available for weapons. Many metric tonnes of such materials would be made surplus by the reductions in strategic nuclear weapons due to the Strategic Arms Reduction Treaty (START-I). Equally large reductions in short-range (theater) nuclear weapons are expected in the wake of the recent Treaty on Conventional Forces in Europe (CFE)

  2. A Conceptual Model to Identify Intent to Use Chemical-Biological Weapons

    Directory of Open Access Journals (Sweden)

    Mary Zalesny

    2017-10-01

    Full Text Available This paper describes a conceptual model to identify and interrelate indicators of intent of non-state actors to use chemical or biological weapons. The model expands on earlier efforts to understand intent to use weapons of mass destruction by building upon well-researched theories of intent and behavior and focusing on a sub-set of weapons of mass destruction (WMD to account for the distinct challenges of employing different types of WMD in violent acts. The conceptual model is presented as a first, critical step in developing a computational model for assessing the potential for groups to use chemical or biological weapons.

  3. Near-field three-dimensional radar imaging techniques and applications.

    Science.gov (United States)

    Sheen, David; McMakin, Douglas; Hall, Thomas

    2010-07-01

    Three-dimensional radio frequency imaging techniques have been developed for a variety of near-field applications, including radar cross-section imaging, concealed weapon detection, ground penetrating radar imaging, through-barrier imaging, and nondestructive evaluation. These methods employ active radar transceivers that operate at various frequency ranges covering a wide range, from less than 100 MHz to in excess of 350 GHz, with the frequency range customized for each application. Computational wavefront reconstruction imaging techniques have been developed that optimize the resolution and illumination quality of the images. In this paper, rectilinear and cylindrical three-dimensional imaging techniques are described along with several application results.

  4. 一种基于人脸对称性的差错掩盖方法%An Error Concealment Method Based on Facial Symmetry

    Institute of Scientific and Technical Information of China (English)

    赖俊; 张江鑫

    2013-01-01

    This paper presents an error concealment method based on facial symmetry .We first execute color segmentation , determine the skin color region;then judge the symmetry of this region , conceal symmetry face regions with symmetry algorithm , conceal other regions with adaptive interpolation algorithm .Using JM86 model of H.264 standard to simulate the algorithm , the experimental results show that our method achieves better conceal results when compared with traditional interpolation algorithm .%该文提出一种基于人脸对称性的差错掩盖方法。首先进行肤色分割,判断出肤色区域;然后对检测出的肤色区域进行对称性判断,选出对称的人脸区域并采用人脸对称掩盖算法进行差错掩盖,对其它区域则采用自适应插值算法。采用H.264的JM86模型对算法进行验证,实验结果表明,与传统的插值算法相比,该文算法利用了人脸的对称性,对于对称的人脸区域获得了更好的掩盖效果。

  5. The non-proliferation policies of non-nuclear-weapon states

    International Nuclear Information System (INIS)

    Marwah, Onkar

    1987-01-01

    Eight countries are considered to be capable of producing nuclear weapons and highly suspect in their intentions to actually produce them. These are Argentina, Brazil, India, Pakistan, Israel, South Africa, the Republic of Korea and Taiwan. The policies of these suspect Non-nuclear-weapon States (NNWS) are considered in this paper. The first part assesses the non-proliferation (or proliferation) policies of the eight suspect NNWS, the second part evaluates their differences in approach from the policies urged upon them by the nuclear-weapon states (NWS) and the third and final part attempts to understand the future evolution of NNWS policies in the nuclear military field. (U.K.)

  6. Antineutrino detector for anti ν oscillation studies at fission weapon tests and at LAMPF

    International Nuclear Information System (INIS)

    Kruse, H.W.; Loncoski, R.; Mack, J.

    1980-01-01

    Two anti ν oscillation experiments are planned, incorporating large volume (4200 l) liquid scintillation detectors 1) at large distances (450 to 800 m) from fission weapon tests and 2) at 12 to 50 m from LAMPF beam dump where significant anti ν/sub e/ events are detected only if some oscillation operates, such as ν/sub μ/ → ν/sub e/. Design criteria, detector characteristics, and experimental considerations are given

  7. Financial incentive does not affect P300 (in response to certain episodic and semantic probe stimuli) in the Complex Trial Protocol (CTP) version of the Concealed Information Test (CIT) in detection of malingering.

    Science.gov (United States)

    Rosenfeld, J Peter; Labkovsky, Elena; Davydova, Elena; Ward, Anne; Rosenfeld, Lauren

    2017-05-01

    Previous research indicated that the skin conductance response of the autonomic nervous system in the Concealed Information Test (CIT) is typically increased in subjects who are financially and otherwise incentivized to defeat the CIT (the paradoxical "motivational impairment" effect). This is not the case for RT-based CITs, nor P300 tests based on the three-stimulus protocol for detection of cognitive malingering (although these are not the same as CITs). The present report is the first attempt to study the effect of financial motivation on the P300-based Complex Trial Protocol using both episodic and semantic memory probe and irrelevant stimuli. The Test of Memory Malingering (TOMM) was used to validate behavioral differences between the two groups we created by offering one (paid) group but not another (unpaid) group a financial reward for beating our tests. Group behavioral differences on the TOMM did confirm group manipulations. Probe-minus-irrelevant P300 differences did not differ between groups, although as previously, semantic memory-evoked P300s were larger than episodic memory-evoked P300s. © 2017 Society for Psychophysiological Research.

  8. Delayed effects of nuclear and chemical weapons in man

    International Nuclear Information System (INIS)

    Dienstbier, Z.

    1984-01-01

    Delayed radiation effects are discussed of the use of nuclear and chemical weapons (defoliants and herbicides). Attention is drawn to the development of delayed malignities in exposed subjects and their pathophysiologic causes are explained. The only prevention of these effects is to prohibit the use of weapons of mass destruction. (author)

  9. Nuclear weapons and NATO operations: Doctrine, studies, and exercises

    International Nuclear Information System (INIS)

    Karber, P.A.

    1994-01-01

    A listing of papers is presented on the doctrine, studies, and exercises dealing with nuclear weapons and NATO operations for the period 1950-1983. The papers deal with studies on massive retaliation, sword and shield, and flexible response. Some of the enduring issues of nuclear weapons in NATO are listed

  10. Verifying the transition from low levels of nuclear weapons to a nuclear weapon-free world. VERTIC research report no. 2

    International Nuclear Information System (INIS)

    Milne, T.; Wilson, H.

    1999-01-01

    The process of verifying the complete elimination of nuclear warheads in national stockpiles can be divided, conceptually, into four stages: first, comprehensive declarations of warhead and material inventories, as a base-line from which verified disarmament can proceed; second, the transfer of all nuclear weapons and weapons-grade fissile material into bonded store; third, demilitarisation measures, such as to render warheads unusable without disassembly and refabrication; fourth, dismantlement of warheads and disposition of fissile material. Many of the technologies and technologies and techniques needed for verifying the elimination of nuclear warheads have been worked out at a general level, largely in US studies. While it is essential that these techniques are refined and improved, what is most important now, if disarmament is to proceed expeditiously, is for each of the nuclear weapon states (NWS) themselves to study the central verification problems and requirements in order to identify particular techniques and approaches that meet their needs. As yet there is no system of integrated data exchange and verification that any of the NWS is willing to endorse. Each of the NWS should give detailed consideration to the logistics of dismantling the warheads in their respective stockpiles, including, for example, the practicalities of accommodating international verification at their potential dismantlement facilities. Each of the NWS might usefully review exactly which details of warhead design and construction have to remain secret in the course of the disarmament process, in the first place from one another, and second from the IAEA or any other international body that might be involved in international disarmament arrangements. Introducing transparency and verification into national nuclear weapons programmes might have a significant financial cost. Research and ingenuity might reduce this cost, however, and early investments in these fields, with sharing of

  11. From the lab to the battlefield? Nanotechnology and fourth generation nuclear weapons

    OpenAIRE

    Gsponer, Andre

    2005-01-01

    The paper addresses some major implications of microelectromechanical systems (MEMS) engineering and nanotechnology for the improvement of existing types of nuclear weapons, and the development of more robust versions of these weapons, as well as for the development of fourth generations nuclear weapons in which nanotechnology will play an essential role.

  12. Atomic Weapons Establishment Bill [Money

    International Nuclear Information System (INIS)

    Bennett, A.F.; Cryer, Bob; Carlisle, Kenneth; Dean, Paul.

    1990-01-01

    The debate concerns the authorisation of payment of the money required to reorganise the atomic weapons establishment in the United Kingdom provided for in the Atomic Weapons Establishment Bill in progress through Parliament. In the Bill the contractorisation of the establishment is recommended and some sort of Government owned company operated scheme set up. The debate lasted about half an hour and is reported verbatim. The issues raised concerned the actual sums likely to be incurred in the formation of a Company to carry out the designated activities of the Bill. These are connected with the research, development, production or maintenance of nuclear devices and the premises needed. The government spokesman suggested the sums required to support the Bill would not be large and the resolution was agreed to without a vote. (UK)

  13. Comparison of enclosed space detection system with conventional methods

    Energy Technology Data Exchange (ETDEWEB)

    Kercel, S.W.; Baylor, V.M.; Labaj, L.E.

    1997-09-01

    Enclosed Space Detection System (ESDS) is a fast, inexpensive, and reliable device for detecting human occupants hidden in vehicles. Operation requires less than two minutes. ESDS is used to foil attempts at smuggling illegal aliens, terrorists, and escaping prisoners. It is being tested at nuclear weapons facilities and has been operated at several prisons and international border crossings. ESDS is the first practical electronic alternative to physical searches of vehicles for hidden passengers. At critical checkpoints, a thorough physical search of a single fully loaded truck requires a team of from two to six people, and may take as long as eight hours. Despite this level of security, experience has shown that the search can occasionally be foiled. Due to the enormous time and expense of thorough physical searches of vehicles, they are seldom conducted at any but the most critical of locations, simply leaving many sites vulnerable to crime and terrorism. Prior to the development of the ESDS, the only other effective alternative to physical search was the use of specially-trained canines, which can be vastly superior to the physical search in both time and accuracy. However, as discussed in this paper, canine inspection is not really a competitive substitute for ESDS because canine reliability (80% at most) is not as high as that of the ESDS (99%+), while the costs, training requirements, and operator skill needed are significantly higher with canines than with the ESDS. In addition, the ESDS has straightforward self-diagnostic tests to ensure the system is operating correctly; such tests are not currently available with either canine or human inspectors. ESDS offers an attractive supplement or alternative to meet current security requirements for vehicle searches at portals at government, nuclear, industrial, and other facilities where concealed persons may pose a threat either by entering or leaving.

  14. Comparison of enclosed space detection system with conventional methods

    International Nuclear Information System (INIS)

    Kercel, S.W.; Baylor, V.M.; Labaj, L.E.

    1997-01-01

    Enclosed Space Detection System (ESDS) is a fast, inexpensive, and reliable device for detecting human occupants hidden in vehicles. Operation requires less than two minutes. ESDS is used to foil attempts at smuggling illegal aliens, terrorists, and escaping prisoners. It is being tested at nuclear weapons facilities and has been operated at several prisons and international border crossings. ESDS is the first practical electronic alternative to physical searches of vehicles for hidden passengers. At critical checkpoints, a thorough physical search of a single fully loaded truck requires a team of from two to six people, and may take as long as eight hours. Despite this level of security, experience has shown that the search can occasionally be foiled. Due to the enormous time and expense of thorough physical searches of vehicles, they are seldom conducted at any but the most critical of locations, simply leaving many sites vulnerable to crime and terrorism. Prior to the development of the ESDS, the only other effective alternative to physical search was the use of specially-trained canines, which can be vastly superior to the physical search in both time and accuracy. However, as discussed in this paper, canine inspection is not really a competitive substitute for ESDS because canine reliability (80% at most) is not as high as that of the ESDS (99%+), while the costs, training requirements, and operator skill needed are significantly higher with canines than with the ESDS. In addition, the ESDS has straightforward self-diagnostic tests to ensure the system is operating correctly; such tests are not currently available with either canine or human inspectors. ESDS offers an attractive supplement or alternative to meet current security requirements for vehicle searches at portals at government, nuclear, industrial, and other facilities where concealed persons may pose a threat either by entering or leaving

  15. One in a Million Given the Accident: Assuring Nuclear Weapon Safety

    Energy Technology Data Exchange (ETDEWEB)

    Weaver, Jason [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States)

    2015-08-25

    Since the introduction of nuclear weapons, there has not been a single instance of accidental or unauthorized nuclear detonation, but there have been numerous accidents and “close calls.” As the understanding of these environments has increased, the need for a robust nuclear weapon safety philosophy has grown. This paper describes some of the methods used by the Nuclear Weapon Complex today to assure nuclear weapon safety, including testing, modeling, analysis, and design features. Lastly, it also reviews safety’s continued role in the future and examines how nuclear safety’s present maturity can play a role in strengthening security and other areas and how increased coordination can improve safety and reduce long-term cost.

  16. After fifty years of the nuclear age: Non-proliferation of nuclear weapons or elimination of them?

    International Nuclear Information System (INIS)

    Sugie, Ei-Ichi

    1997-01-01

    Ever since the first test of the atomic bomb and the bombing of Hiroshima and Nagasaki in 1945, mankind lived with nuclear weapons. Nuclear weapons were inevitably connected with the Cold War, with its end new opportunity has come concerning prohibition of the use of nuclear weapons. Steps are to be undertaken in order to eliminate the nuclear weapons. First, would be the prohibition of the use or the threat of use of nuclear weapons. By excluding the possibility of the use of nuclear weapons, the world could be closer to nuclear disarmament than ever. The prohibition of the use of some type of weapons could be a breakthrough towards the elimination of such weapons. While the negotiations to eliminate nuclear weapons would be difficult, as were those to ban chemical weapons, a ban on the use of nuclear weapons would eventually lead to their elimination. During the Cold War, the imminent goal of disarmament was to stop the nuclear arms race between the two superpowers. But in the post-Cold War era an opportunity has developed for further steps towards nuclear disarmament, the elimination of nuclear weapons

  17. The research on magnetic exploring abandoned chemical weapons by Japanese

    International Nuclear Information System (INIS)

    Wang Luoguo; Li Jingyue; Wang Zezhong

    2007-01-01

    During Word war II, a lot of chemical weapons were left by Japanese on our land. It is very difficult to explore because its complicated states underground. There is no document about the details of this. Few of the research work have been done. In order to destroy completely abandoned chemical weapons by Japanese, the paper has given a serious study on the means to explore the chemical weapons for the purpose to protect our environment and benefit our people. After plenty of research and test, we get good results. (authors)

  18. Are There Limits to Collectivism? Culture and Children's Reasoning About Lying to Conceal a Group Transgression.

    Science.gov (United States)

    Sweet, Monica A; Heyman, Gail D; Fu, Genyue; Lee, Kang

    2010-07-01

    This study explored the effects of collectivism on lying to conceal a group transgression. Seven-, 9-, and 11-year-old US and Chinese children (N = 374) were asked to evaluate stories in which protagonists either lied or told the truth about their group's transgression and were then asked about either the protagonist's motivations or justification for their own evaluations. Previous research suggests that children in collectivist societies such as China find lying for one's group to be more acceptable than do children from individualistic societies such as the United States. The current study provides evidence that this is not always the case: Chinese children in this study viewed lies told to conceal a group's transgressions less favourably than did US children. An examination of children's reasoning about protagonists' motivations for lying indicated that children in both countries focused on an impact to self when discussing motivations for protagonists to lie for their group. Overall, results suggest that children living in collectivist societies do not always focus on the needs of the group.

  19. Non-proliferation of nuclear weapons and nuclear security. IAEA safeguards agreements and additional protocols

    International Nuclear Information System (INIS)

    Lodding, Jan; Kinley, David III

    2002-09-01

    One of the most urgent challenges facing the International Atomic Energy Agency (IAEA) is to strengthen the Agency's safeguards system for verification in order to increase the likelihood of detecting any clandestine nuclear weapons programme in breach of international obligations. The IAEA should be able to provide credible assurance not only about declared nuclear material in a State but also about the absence of undeclared material and activities. Realising the full potential of the strengthened system will require that all States bring into force their relevant safeguards agreements, as well as additional protocols thereto. Today, 45 years after the Agency's foundation, its verification mission is as relevant as ever. This is illustrated by the special challenges encountered with regard to verification in Iraq and North Korea in the past decade. Moreover, the horrifying events of 11 September 2001 demonstrated all too well the urgent need to strengthen worldwide control of nuclear and other radioactive material. The IAEA will continue to assist States in their efforts to counter the spread of nuclear weapons and to prevent, detect and respond to illegal uses of nuclear and radioactive material. Adherence by as many States as possible to the strengthened safeguards system is a crucial component in this endeavour

  20. Geochemical Data for Samples Collected in 2007 Near the Concealed Pebble Porphyry Cu-Au-Mo Deposit, Southwest Alaska

    Science.gov (United States)

    Fey, David L.; Granitto, Matthew; Giles, Stuart A.; Smith, Steven M.; Eppinger, Robert G.; Kelley, Karen D.

    2008-01-01

    In the summer of 2007, the U.S. Geological Survey (USGS) began an exploration geochemical research study over the Pebble porphyry copper-gold-molydenum (Cu-Au-Mo) deposit in southwest Alaska. The Pebble deposit is extremely large and is almost entirely concealed by tundra, glacial deposits, and post-Cretaceous volcanic and volcaniclastic rocks. The deposit is presently being explored by Northern Dynasty Minerals, Ltd., and Anglo-American LLC. The USGS undertakes unbiased, broad-scale mineral resource assessments of government lands to provide Congress and citizens with information on national mineral endowment. Research on known deposits is also done to refine and better constrain methods and deposit models for the mineral resource assessments. The Pebble deposit was chosen for this study because it is concealed by surficial cover rocks, it is relatively undisturbed (except for exploration company drill holes), it is a large mineral system, and it is fairly well constrained at depth by the drill hole geology and geochemistry. The goals of the USGS study are (1) to determine whether the concealed deposit can be detected with surface samples, (2) to better understand the processes of metal migration from the deposit to the surface, and (3) to test and develop methods for assessing mineral resources in similar concealed terrains. This report presents analytical results for geochemical samples collected in 2007 from the Pebble deposit and surrounding environs. The analytical data are presented digitally both as an integrated Microsoft 2003 Access? database and as Microsoft 2003 Excel? files. The Pebble deposit is located in southwestern Alaska on state lands about 30 km (18 mi) northwest of the village of Illiamna and 320 km (200 mi) southwest of Anchorage (fig. 1). Elevations in the Pebble area range from 287 m (940 ft) at Frying Pan Lake just south of the deposit to 1146 m (3760 ft) on Kaskanak Mountain about 5 km (5 mi) to the west. The deposit is in an area of

  1. From Russian weapons grade plutonium to MOX fuel

    International Nuclear Information System (INIS)

    Braehler, G.; Kudriavtsev, E.G.; Seyve, C.

    1997-01-01

    The April 1996, G7 Moscow Summit on nuclear matters provided a political framework for one of the most current significant challenges: ensuring a consistent answer to the weapons grade fissile material disposition issue resulting from the disarmament effort engaged by both the USA and Russia. International technical assessments have showed that the transformation of Weapons grade Plutonium in MOX fuel is a very efficient, safe, non proliferant and economically effective solution. In this regard, COGEMA and SIEMENS, have set up a consistent technical program properly addressing incineration of weapons grade plutonium in MOX fuels. The leading point of this program would be the construction of a Weapons grade Plutonium dedicated MOX fabrication plant in Russia. Such a plant would be based on the COGEMA-SIEMENS industrial capabilities and experience. This facility would be operated by MINATOM which is the partner for COGEMA-SIEMENS. MINATOM is in charge of coordination of the activity of the Russian research and construction institutes. The project take in account international standards for non-proliferation, safety and waste management. France and Germany officials reasserted this position during their last bilateral summits held in Fribourg in February and in Dijon in June 1996. MINATOM and the whole Russian nuclear community have already expressed their interest to cooperate with COGEMA-SIEMENS in the MOX field. This follows governmental-level agreements signed in 1992 by French, German and Russian officials. For years, Russia has been dealing with research and development on MOX fabrication and utilization. So, the COGEMA-SIEMENS MOX proposal gives a realistic answer to the management of weapons grade plutonium with regard to the technical, industrial, cost and schedule factors. (author)

  2. Joseph A. Burton Forum Award: Some Nuclear Weapons Dilemmas

    Science.gov (United States)

    May, Michael

    2014-03-01

    Nuclear weapons pose a combination of political and ethical dilemmas the solution to which has not been found. On one hand, in the view of both US government leaders and US allies, nuclear deterrence continues to play an essential part in the US role as the ultimate source of military strength for the alliances among the major democratic countries. It also continues to be in demand by countries that believe themselves to be isolated and threatened. On the other hand, nuclear weapons, besides being effective deterrents, can cause unprecedented loss of life and risk the demise of civilizations. No ban or technical precaution could prevent the rebuilding of nuclear weapons in a crisis. No diplomatic arrangement to date has erased the threat of invasion and war in the world. Only the abandonment of war and the threat of war as instruments of policy can make nuclear weapons obsolete. The slow, halting, risky road to that end remains the only hope for a world in which lasting solutions to the nuclear dilemmas are possible.

  3. Internationalization to prevent the spread of nuclear weapons

    International Nuclear Information System (INIS)

    1980-01-01

    The recent International Nuclear Fuel Cycle Evaluation (INFCE) has concluded that, in a world in which an increasing number of countries are using nuclear energy for peaceful purposes, no technical ways exist to prevent the spread of nuclear weapons. Non-proliferation is a political problem and must, therefore, be solved by political means. The reasons why countries want nuclear weapons - whether to meet their real or perceived security requirements or for political prestige - must be removed. Resolution of regional conflicts would diminish the stimulus for proliferation, while significant nuclear disarmament measures would de-emphasize the role of nuclear weapons in international politics. Meanwhile, institutional arrangements could minimize the risks of nuclear weapon proliferation. One such arrangement could be the internationalization of the sensitive, that is, the most proliferation-prone, elements of the nuclear fuel cycle. This book analyses some of the political, economic, technical and legal issues involved in internationalizing the nuclear fuel cycle. It consists of two parts. Part I is SIPRI's (Stockholm International Peace Research Institute) evaluation of the advantages, as well as the weaknesses, of the existing proposals for internationalization. Part II contains the papers contributed to the SIPRI symposium on 'internationalization of the nuclear fuel cycle', which was held in October/ November 1979. (author)

  4. Disposition of weapons-grade plutonium in Westinghouse reactors

    International Nuclear Information System (INIS)

    Alsaed, A.A.; Adams, M.

    1998-03-01

    The authors have studied the feasibility of using weapons-grade plutonium in the form of mixed-oxide (MOX) fuel in existing Westinghouse reactors. They have designed three transition Cycles from an all LEU core to a partial MOX core. They found that four-loop Westinghouse reactors such as the Vogtle power plant are capable of handling up to 45 percent weapons-grade MOX loading without any modifications. The authors have also designed two kinds of weapons-grade MOX assemblies with three enrichments per assembly and four total enrichments. Wet annular burnable absorber (WABA) rods were used in all the MOX feed assemblies, some burned MOX assemblies, and some LEU feed assemblies. Integral fuel burnable absorber (IFBA) was used in the rest of the LEU feed assemblies. The average discharge burnup of MOX assemblies was over 47,000 MWD/MTM, which is more than enough to meet the open-quotes spent fuel standard.close quotes One unit is capable of consuming 0.462 MT of weapons-grade plutonium per year. Preliminary analyses showed that important reactor physics parameters for the three transitions cycles are comparable to those of LEU cores including boron levels, reactivity coefficients, peaking factors, and shutdown margins. Further transient analyses will need to be performed

  5. Mobile Pit verification system design based on passive special nuclear material verification in weapons storage facilities

    Energy Technology Data Exchange (ETDEWEB)

    Paul, J. N.; Chin, M. R.; Sjoden, G. E. [Nuclear and Radiological Engineering Program, George W. Woodruff School of Mechanical Engineering, Georgia Institute of Technology, 770 State St, Atlanta, GA 30332-0745 (United States)

    2013-07-01

    A mobile 'drive by' passive radiation detection system to be applied in special nuclear materials (SNM) storage facilities for validation and compliance purposes has been designed through the use of computational modeling and new radiation detection methods. This project was the result of work over a 1 year period to create optimal design specifications to include creation of 3D models using both Monte Carlo and deterministic codes to characterize the gamma and neutron leakage out each surface of SNM-bearing canisters. Results were compared and agreement was demonstrated between both models. Container leakages were then used to determine the expected reaction rates using transport theory in the detectors when placed at varying distances from the can. A 'typical' background signature was incorporated to determine the minimum signatures versus the probability of detection to evaluate moving source protocols with collimation. This established the criteria for verification of source presence and time gating at a given vehicle speed. New methods for the passive detection of SNM were employed and shown to give reliable identification of age and material for highly enriched uranium (HEU) and weapons grade plutonium (WGPu). The finalized 'Mobile Pit Verification System' (MPVS) design demonstrated that a 'drive-by' detection system, collimated and operating at nominally 2 mph, is capable of rapidly verifying each and every weapon pit stored in regularly spaced, shelved storage containers, using completely passive gamma and neutron signatures for HEU and WGPu. This system is ready for real evaluation to demonstrate passive total material accountability in storage facilities. (authors)

  6. Measures to implement the Chemical Weapons Convention

    International Nuclear Information System (INIS)

    Tanzman, E.; Kellman, B.

    1999-01-01

    This seminar is another excellent opportunity for those involved in preventing chemical weapons production and use to learn from each other about how the Chemical Weapons Convention (CWC) can become a foundation of arms control in Africa and around the world. The author is grateful to the staff of the Organization for the Prohibition of Chemical Weapons (OPCW) for inviting him to address this distinguished seminar. The views expressed in this paper are those of the authors alone, and do not represent the position of the government of the US nor or of any other institution. In 1993, as the process of CWC ratification was beginning, concerns arose that the complexity of integrating the treaty with national law would cause each nation to implement the Convention without regard to what other nations were doing, thereby causing inconsistencies among States Parties in how the Convention would be carried out. As a result the Manual for National Implementation of the Chemical Weapons Convention was prepared and presented it to each national delegation at the December 1993 meeting of the Preparatory Commission in The Hague. During its preparation, the Manual was reviewed by the Committee of Legal Experts on National Implementation of the Chemical Weapons Convention, a group of distinguished international jurists, law professors, legally-trained diplomats, government officials, and Parliamentarians from every region of the world, including Mica. In February 1998, the second edition of the Manual was published in order to update it in light of developments since the CWC entered into force on 29 April 1997. The second edition 1998 clarified the national implementation options to reflect post-entry-into-force thinking, added extensive references to national implementing measures that had been enacted by various States Parties, and included a prototype national implementing statute developed by the authors to provide a starting point for those whose national implementing

  7. Measures to implement the Chemical Weapons Convention

    Energy Technology Data Exchange (ETDEWEB)

    Tanzman, E.; Kellman, B.

    1999-11-05

    This seminar is another excellent opportunity for those involved in preventing chemical weapons production and use to learn from each other about how the Chemical Weapons Convention (CWC) can become a foundation of arms control in Africa and around the world. The author is grateful to the staff of the Organization for the Prohibition of Chemical Weapons (OPCW) for inviting him to address this distinguished seminar. The views expressed in this paper are those of the authors alone, and do not represent the position of the government of the US nor or of any other institution. In 1993, as the process of CWC ratification was beginning, concerns arose that the complexity of integrating the treaty with national law would cause each nation to implement the Convention without regard to what other nations were doing, thereby causing inconsistencies among States Parties in how the Convention would be carried out. As a result the Manual for National Implementation of the Chemical Weapons Convention was prepared and presented it to each national delegation at the December 1993 meeting of the Preparatory Commission in The Hague. During its preparation, the Manual was reviewed by the Committee of Legal Experts on National Implementation of the Chemical Weapons Convention, a group of distinguished international jurists, law professors, legally-trained diplomats, government officials, and Parliamentarians from every region of the world, including Mica. In February 1998, the second edition of the Manual was published in order to update it in light of developments since the CWC entered into force on 29 April 1997. The second edition 1998 clarified the national implementation options to reflect post-entry-into-force thinking, added extensive references to national implementing measures that had been enacted by various States Parties, and included a prototype national implementing statute developed by the authors to provide a starting point for those whose national implementing

  8. Blood pressure shifts resulting from a concealed arteriovenous fistula associated with an iliac aneurysm: a case report.

    Science.gov (United States)

    Doi, Shintaro; Motoyama, Yoshiaki; Ito, Hiromi

    2016-01-01

    A solitary iliac aneurysm (SIA) is more uncommon than an abdominal aortic aneurysm. The aneurysm is located in the deep pelvis and is diagnosed when it reaches a large size with symptoms of compression around adjacent structures and organs or when it ruptures. A definite diagnosis of an arteriovenous fistula (AVF) associated with a SIA is difficult preoperatively because there might not be enough symptoms and time for diagnosis. Here, we present a patient with asymptomatic rupture of SIA into the common iliac vein with characteristic blood pressure shifts. A 41-year-old man with a huge SIA underwent aortobifemoral graft replacement. Preoperatively, his blood pressure showed characteristic shifts for one or two heartbeats out of five beats, indicating that an AVF was present and that the shunt was about to having a high flow. During surgery, an AVF associated with the SIA was found to be concealed owing to compression from the huge iliac artery aneurysm, and the shunt showed a high flow, resulting in shock during the surgery. No complications were noted after aortobifemoral graft replacement. Postoperatively, we noted an enhanced paravertebral vein on computed tomography (CT), which indicated the presence of an AVF. Definite diagnosis of an AVF offers advantages in surgical and anesthetic management. We emphasize that a large SIA can push the iliac vein and occlude an AVF laceration, concealing the enhancement of the veins in the arterial phase on CT. Blood pressure shifts might predict the existence of a concealed AVF that has a large shunt. Even if the vena cava and the iliac veins are not enhanced on CT, anesthesiologists should carefully determine whether their distal branches are enhanced.

  9. Weapons of Mass Destruction Commission, final report, 'Weapons of Terror: Freeing the World of Nuclear, Biological, and Chemical Arms', Stockholm, Sweden, 1 June 2006

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2006-07-01

    Nuclear, biological and chemical weapons are rightly called weapons of mass destruction (WMD). Designed to terrify as well as destroy, they have the potential to kill thousands and thousands of people in a single attack, and their effects may persist in the environment and in our bodies, in some cases indefinitely. Many efforts have been made to free the world from the threat of these weapons and some progress has been made. Paradoxically, despite the end of the Cold War, the past decade has seen more setbacks than successes. States have failed to comply with their disarmament and non-proliferation commitments, and terrorist groups have emerged that recognize no restraints. In September 2005, the United Nations World Summit was unable to agree on a single recommendation on disarmament and non-proliferation. It is time for all to wake up to the awesome reality that many of the old threats continue to hang over the world and that many new ones have emerged. It is time for all governments to revive their cooperation and to breathe new life into the disarmament work of the United Nations. Efforts to eradicate poverty and to protect the global environment must be matched by a dismantling of the world's most destructive capabilities. The gearshift now needs to be moved from reverse to drive. Biological and chemical weapons have been comprehensively outlawed through global conventions, but these need to be universally accepted and fully implemented. Nuclear weapons must also be outlawed. Before this aim is realized, there must be new initiatives to reduce the number of nuclear weapons and the threat posed by them. It is equally urgent to prevent proliferation and to take special measures to ensure that terrorists do not acquire any weapons of mass destruction. This report presents ideas and recommendations on what the world community - including national governments and civil society - can and should do.

  10. Weapons of Mass Destruction Commission, final report, 'Weapons of Terror: Freeing the World of Nuclear, Biological, and Chemical Arms', Stockholm, Sweden, 1 June 2006

    International Nuclear Information System (INIS)

    2006-01-01

    Nuclear, biological and chemical weapons are rightly called weapons of mass destruction (WMD). Designed to terrify as well as destroy, they have the potential to kill thousands and thousands of people in a single attack, and their effects may persist in the environment and in our bodies, in some cases indefinitely. Many efforts have been made to free the world from the threat of these weapons and some progress has been made. Paradoxically, despite the end of the Cold War, the past decade has seen more setbacks than successes. States have failed to comply with their disarmament and non-proliferation commitments, and terrorist groups have emerged that recognize no restraints. In September 2005, the United Nations World Summit was unable to agree on a single recommendation on disarmament and non-proliferation. It is time for all to wake up to the awesome reality that many of the old threats continue to hang over the world and that many new ones have emerged. It is time for all governments to revive their cooperation and to breathe new life into the disarmament work of the United Nations. Efforts to eradicate poverty and to protect the global environment must be matched by a dismantling of the world's most destructive capabilities. The gearshift now needs to be moved from reverse to drive. Biological and chemical weapons have been comprehensively outlawed through global conventions, but these need to be universally accepted and fully implemented. Nuclear weapons must also be outlawed. Before this aim is realized, there must be new initiatives to reduce the number of nuclear weapons and the threat posed by them. It is equally urgent to prevent proliferation and to take special measures to ensure that terrorists do not acquire any weapons of mass destruction. This report presents ideas and recommendations on what the world community - including national governments and civil society - can and should do

  11. Plus c'est la meme chose: The future of nuclear weapons in Europe

    International Nuclear Information System (INIS)

    Maaranen, S.A.

    1996-01-01

    Since the end of the Cold War, the United States perhaps more than any other nuclear weapon state has deeply questioned the future role of nuclear weapons, both in a strategic sense and in Europe. It is probably the United States that has raised the most questions about the continuing need for and efficacy of nuclear weapons, and has expressed the greatest concerns about the negative consequences of continuing nuclear weapons deployment. In the US, this period of questioning has now come to a pause, if not a conclusion. In late 1994 the United States decided to continue to pursue reductions in numbers of nuclear weapons as well as other changes designed to reduce the dangers associated with the possession of nuclear weapons. But at the same time the US concluded that some number of nuclear forces would continue to be needed for national security for the foreseeable future. These necessary nuclear forces include a continuing but greatly reduced stockpile of nuclear bombs deployed in Europe under NATO's New Strategic Concept. If further changes to the US position on nuclear weapons in Europe are to occur, it is likely to be after many years, and only in the context of dramatic additional improvements in the political and geo-political climate in and around Europe. The future role of nuclear weapons in Europe, as discussed in this report, depends in part on past and future decisions by the United States. but it must also be noted that other states that deploy nuclear weapons in Europe--Britain, France, and Russia, as well as the NATO alliance--have shown little inclination to discontinue their deployment of such weapons, whatever the United States might choose to do in the future

  12. Bill related to the struggle against proliferation of mass destruction weapons and their vectors

    International Nuclear Information System (INIS)

    2010-01-01

    This bill indicates the modifications brought to different French laws and codes (penal code, defence code, custom code) and defines provisions and penalties within the frame of struggle against the proliferation of weapons of mass destruction (nuclear weapons, biological weapons and toxin-based weapons, chemical weapons), and against the proliferation of their vectors. These modifications, provisions and penalties also concern double-use products. The bill also defines the modifications brought to the French penal procedure code. It finally addresses offenses related to these proliferations which can be considered as an act of terrorism

  13. A Comparison of the Detection Rates for Infrared and Visual Imagery of a Person Holdina an RPG

    National Research Council Canada - National Science Library

    Sohn, Euijung; Meitzler, Tom; Bryk, Darryl; Jozwiak, Rachel; Bednarz, David; Lane, Kim; Bankowski, Elena; Vala, John

    2004-01-01

    Detection of potential threats that are camouflaged or concealed is important not only for military acquisition problems but, also for crowd surveillance as well as tactical use such as on border patrols...

  14. A Comparison of the Detection Rates for Infrared and Visual Imagery of a Person Holding an RPG

    National Research Council Canada - National Science Library

    Sohn, Euijung; Meitzler, Tom; Bryk, Darryl; Jozwiak, Rachel; Bednarz, David; Lane, Kim; Bankowski, Elena; Vala, John

    2004-01-01

    Detection of potential threats that are camouflaged or concealed is important not only for military acquisition problems but, also for crowd surveillance as well as tactical use such as on border patrols...

  15. Gamma-ray identification of nuclear weapon materials

    International Nuclear Information System (INIS)

    Gosnell, T. B.; Hall, J. M.; Jam, C. L.; Knapp, D. A.; Koenig, Z. M.; Luke, S. J.; Pohl, B. A.; Schach Wittenau, A. von; Wolford, J. K.

    1997-01-01

    There has been an accelerating national interest in countering nuclear smuggling. This has caused a corresponding expansion of interest in the use of gamma-ray spectrometers for checkpoint monitoring, nuclear search, and within networks of nuclear and collateral sensors. All of these are fieldable instruments--ranging from large, fixed portal monitors to hand-held and remote monitoring equipment. For operational reasons, detectors with widely varying energy resolution and detection efficiency will be employed. In many instances, such instruments must be sensitive to weak signals, always capable of recognizing the gamma-ray signatures from nuclear weapons materials (NWM), often largely insensitive to spectral alteration by radiation transport through intervening materials, capable of real-time implementation, and able to discriminate against signals from commonly encountered legitimate gamma-ray sources, such as radiopharmaceuticals. Several decades of experience in classified programs have shown that all of these properties are not easily achieved and successful approaches were of limited scope--such as the detection of plutonium only. This project was originally planned as a two-year LDRD-ER. Since funding for 1997 was not sustained, this is a report of the first year's progress

  16. Civil nuclear energy and the proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    1990-04-01

    The issue of whether civil nuclear programmes contribute to the risk of proliferation of nuclear weapons has been discussed since civil programmes were first considered, and has always complicated public attitudes to civil nuclear energy. This paper seeks to define the extent to which there is such ''linkage''. It does not deal with the linkages that exist between nuclear weapons and other industries and activities - for example, those involved in weapons delivery systems -since these are not within the Uranium Institute's area of competence. Linkage concerns regarding civil nuclear programmes arise primarily over the possibility of their being used to produce highly enriched uranium or plutonium for use in weapons. The technologies which can give rise directly to these materials are therefore ''sensitive'' in proliferation terms. Linkage may also arise through the relevant experience of the trained workforce. Such linkage is, however, limited by institutional, technical and economic factors. First, important institutional constraints on using a civil programme for military purposes exist in the form of a network of bilateral agreements and international treaties - most particularly the Nuclear Non-Proliferation Treaty - and the international safeguards inspections. Secondly, without access to the technologies of enrichment or reprocessing, the fissile material needed for an explosive cannot be obtained from any plant or process used to produce electricity. Finally, establishing a civil programme - with equipment whose design is optimized for electricity production - in order to develop weapons is an expensive route compared to specialized facilities. (author)

  17. Critical Success Factors and Their Application to DOD Weapon System Acquisition

    National Research Council Canada - National Science Library

    Harris, Chad M

    2006-01-01

    Department of Defense weapon systems are growing more complex and expensive and the services are under increasing pressure from Congress to improve the cost schedule and performance of their weapons programs...

  18. 32 CFR 552.127 - Prohibitions.

    Science.gov (United States)

    2010-07-01

    ... than 3 inches. Swords, sabers, and machetes with sharpened blades. (8) Any object which carries an... handles which convert into a sword type instrument. (b) Carrying a concealed weapon. A person commits the..., carrying, transporting, or storing decorative, ornamental, and ceremonial swords and sabers within the...

  19. Decision-Making Processes in Texas School Districts That Arm Personnel

    Science.gov (United States)

    Domain, Melinda Willoughby

    2014-01-01

    This qualitative phenomenological study employed narrative inquiry to describe the decision-making processes that Texas school districts followed in enacting firearms policies that allow school employees to carry concealed weapons on district property. Exploration of the lived experiences of eight Texas superintendents in such schools contributed…

  20. Some think of all rises on efficiency and performance for antisubmarine weapon

    International Nuclear Information System (INIS)

    Wan Qian

    2003-01-01

    The integrated antisubmarine weapon system is new antisubmarine weapon system studied by our country. The efficiency and performance of the system was not put into fullplay in the trying on. The reason for thus is much, such as: personnel, training, management, use, arm system and son on. The author presented some think of all rises on efficiency and performance for integrated antisubmarine weapon

  1. The German Debate on Tactical Nuclear Weapons

    International Nuclear Information System (INIS)

    Meier, Olivier

    2008-01-01

    This report analyses the debate in Germany about tactical nuclear weapons deployments in Europe. It is mainly based on interviews conducted with senior officials from the German Federal Foreign Ministry, the Federal Ministry of Defence, senior members of Parliament as well as experts from research institutes and think-tanks. The interviews focused on the more recent past in the German debate as well as the future of tactical nuclear weapon deployments in Germany and Europe. The report concludes that while a change of Germany's position on tactical nuclear weapons is unlikely to change in the short-term, several developments will make it unlikely that the continued involvement of Germany in NATO nuclear sharing will have to be debated in the medium term. Should the next Parliamentary elections, which will take place in 2009 at the latest, result in a Social Democrat-led government, a push for a reduction of Germany's involvement in NATO nuclear sharing appears possible. A conservative-led government is likely to maintain the nuclear status quo within NATO

  2. The Combat with Short Edged Weapons in Persian SwordsmanshiP

    Directory of Open Access Journals (Sweden)

    Manouchehr Moshtagh Khorasani

    2012-07-01

    Full Text Available The combat with short-edged weapons has a long tradition in Iran. There are several traditional types of Persian knives and daggers. They can generally be classified into three main categories that were used by Persian warriors in close cambat: kārd (knife, xanjar (dagger, and pišqabz (a type of knife/dagger with an S-shaped blade. The pišqabz was also called dešne. The following article presents these different weapons, analyzing their basic features and variations, the way of carrying and unsheathing them, and the corresponding techniques of use of each weapon.

  3. [EFFECTIVENESS OF ADVANCED SKIN FLAP AND V-SHAPED VENTRAL INCISION ALONG THE ROOT OF PENILE SHAFT FOR CONCEALED PENIS].

    Science.gov (United States)

    Lin, Junshan; Li, Dumiao; Zhang, Jianxing; Wu, Qiang; Xu, Yali; Lin, Li

    2015-09-01

    To investigate effectiveness of advanced skin flap and V-shaped ventral incision along the root of penile shaft for concealed penis in children. Between July 2007 and January 2015, 121 boys with concealed penis were treated with advanced skin flap and V-shaped ventral incision along the root of penile shaft. The age varied from 18 months to 13 years (mean, 7.2 years). Repair was based on a vertical incision in median raphe, complete degloving of penis and tacking its base to the dermis of the skin. Advanced skin flap and a V-shaped ventral incision along the root of penile shaft were used to cover the penile shaft. The operation time ranged from 60 to 100 minutes (mean, 75 minutes). Disruption of wound occurred in 1 case, and was cured after dressing change; and primary healing of incision was obtained in the others. The follow-up period ranged from 3 months to 7 years (median, 24 months). All patients achieved good to excellent cosmetic results with a low incidence of complications. The results were satisfactory in exposure of penis and prepuce appearance. No obvious scar was observed. The penis had similar appearance to that after prepuce circumcision. A combination of advanced skin flap and V-shaped ventral incision along the root of penile shaft is a simple, safe, and effective procedure for concealed penis with a similar appearance result to the prepuce circumcision.

  4. World hazards and nuclear weapons: right and wrong answers. To reach a treaty of interdiction of nuclear weapons is possible

    International Nuclear Information System (INIS)

    Durand, Daniel; Nivet, Roland

    2017-01-01

    A first article notices that modernisation of nuclear weapons are resumed with the emergence of new nuclear temptations: ambitious modernisation programme in the USA, catching-up race by Russia to be able to pierce antimissile defences, Chinese modernisation, renewal of the British Trident programme, doubling of nuclear military budgets in France, developments in India and Pakistan. However, the author discusses the possible emergence of new opportunities for a nuclear disarmament: humanitarian ICAN campaign for a treaty of interdiction of nuclear weapons. He highlights the need of a debate in France on these issues even though no politician dares to take a strong position in favour of nuclear disarmament. In a third article, a member of an activist association shows that, after the adoption of a U N resolution on favour of the elaboration of a treaty of interdiction of nuclear weapons, reaching such a treaty is possible. The action of civil society seems necessary

  5. The immediate need for US universities to promote research related to a nuclear-weapon-free world

    International Nuclear Information System (INIS)

    Ionno, S.

    1999-01-01

    If disarmament is a goal, then the requisite skills must be fostered in academic research. Too many students today view nuclear weapons as a non-issue. It is crucial that those people in positions of influence encourage more young people to explore in-depth the political, scientific, and social changes that a nuclear-weapon-free world will require. The data presented are based on a search of nuclear-weapons-related keywords in the UMI Dissertation Abstracts Database which includes work from over 1000 North American graduate schools and European Universities. The search was focused on US Phd dissertations between 1987 and 1996. There was no PhDs focused on issues such as: zero-level nuclear-weapons-free world; nuclear-weapons-free zones; decreasing nuclear alert status; a nuclear weapons convention; no-first-use or-no use against non-nuclear-weapons-states; START; French nuclear weapons; a possible 'Eurobomb'; peace groups outside the USA, UK, and Germany; nuclear-weapons secrecy; funding disarmament; the role od UN in a nuclear-weapons-free world; an so on

  6. Comprehensive study on nuclear weapons. Summary of a United Nations study

    International Nuclear Information System (INIS)

    1991-01-01

    In December 1988, by resolution 43/75N, the United Nations General Assembly requested the Secretary-General to carry out a comprehensive update of a 1980 study on nuclear weapons. The study was to take into account recent relevant studies, and consider the political, legal and security aspects of: (a) nuclear arsenals and pertinent technological developments; (b) doctrines concerning nuclear weapons; (c) efforts to reduce nuclear weapons; (d) physical, environmental, medical and other effects of the use of nuclear weapons and of nuclear testing; (e) efforts to achieve a comprehensive nuclear-test ban; (f) efforts to prevent the use of nuclear weapons and their horizontal and vertical proliferation; and (g) the question of verification of compliance with nuclear-arms limitation agreements. The Group's report is presented in nine chapters, eight of which are summarized here; chapter 9, entitled ''Conclusions'', is included in its entirety. In his foreword to the report, the Secretary-General observes that the study represents the most comprehensive review of the relevant developments in the field over the last decade and was carried out during a period of ''far-reaching changes in international relations'' and an ''unprecedented evolution in the relationship between East and West''. This period experienced for the first time the initiation of an effective process of reduction of nuclear weapon stockpiles

  7. Safeguards for a nuclear weapon convention

    International Nuclear Information System (INIS)

    Fischer, D.

    1999-01-01

    An NDT presupposes a fundamental commitment by all parties to its final objective and hence requires a high and sustained level of confidence amongst all states concerned. The appropriate format for an Nuclear Disarmament Treaty (NDT) would probably be a multilateral treaty open to all states. The treaty must necessarily include the five nuclear weapon states and a procedure would have to be found for securing the ratification of the threshold states without conferring upon them the status of nuclear weapon states. While the IAEA may well be able to carry out the safeguards tasks required by an NDT it would probably be necessary to establish a new international organization to verify the elimination of all nuclear weapons. The experience of UNSCOM and the IAEA in Iraq, and of the IAEA in the DPRK, have shown how difficult the verification of international obligations is in the absence of a commitment to disarm, while the experience of the INF and START treaties, and of the IAEA in South Africa have shown how much simpler it is when the parties concerned are fully committed to the process. Verifying and safeguarding an NDT would be largely an extrapolation of activities already carried out by the nuclear weapon states under the INF and START treaties and by the IAEA in the routine application of safeguards as well as in its less routine work in Iraq, South Africa and the DPRK. Both the verification and safeguarding tasks would be made very much easier if it were possible to bring down to a few hundred the number of nuclear warheads remaining in the hands of any avowed nuclear weapon state, and to conclude a cutoff convention. Experience is needed to show whether the additional safeguards authority accorded to the IAEA by 'programme 93+2' will enable it to effectively safeguard the facilities that would be decommissioned as a result of an NDT and those that would remain in operation to satisfy civilian needs. Subject to this rider and on condition that the IAEA

  8. Fourth and Fifth Amendment issues raised by Chemical Weapons Convention inspections

    Energy Technology Data Exchange (ETDEWEB)

    Tanzman, E.A. [Argonne National Lab., IL (United States). Economics and Law Section

    1994-10-21

    The Chemical Weapons Convention (CWC) offers a unique challenge to the United States system of constitutional law. This discussion is about the Fourth and Fifth Amendment issues raised by the CWC and about how federal implementing legislation can allow verification inspections to take place in the United States under the Chemical Weapons Convention while remaining in compliance with the Constitution. By implementing legislation, the author means a federal statute that would be enacted separately from Senate approval of the Convention itself. Although implementing legislation is a relatively unusual accompaniment to a treaty, it will be necessary to the CWC, and the Administration has submitted a bill that was under consideration in the last Congress and presumably will be reintroduced early next year. The Fourth and Fifth Amendment problems posed by the CWC arise from the verification inspection scheme embodied in the treaty. The CWC depends heavily on on-site inspections to verify compliance with its key requirements. These include destroying all chemicals weapons stockpiles and bringing potential chemical weapons precursors under international control. The Convention contains four distinct kinds of inspections: systematic inspections of chemical weapons storage and destruction facilities, routine inspections of various declared facilities, challenge inspections, and a variant on challenge inspections in cases of alleged use of chemical weapons. All inspections are supposed to be only as intrusive as necessary to carry out the Convention. These inspections will be carried out by inspectors employed by the Organization for the Prohibition of Chemical Weapons (OPCW), located in The Hague, which is responsible for enforcing the Convention. Generally, the inspected State Party is permitted to assign observers to accompany the inspectors.

  9. Strong neutron sources - How to cope with weapon material production capabilities of fusion and spallation neutron sources?

    International Nuclear Information System (INIS)

    Englert, M.; Franceschini, G.; Liebert, W.

    2013-01-01

    In this article we investigate the potential and relevance for weapon material production in future fusion power plants and spallation neutron sources (SNS) and sketch what should be done to strengthen these technologies against a non-peaceful use. It is shown that future commercial fusion reactors may have military implications: first, they provide an easy source of tritium for weapons, an element that does not fall under safeguards and for which diversion from a plant could probably not be detected even if some tritium accountancy is implemented. Secondly, large fusion reactors - even if not designed for fissile material breeding - could easily produce several hundred kg Pu per year with high weapon quality and very low source material requirements. If fusion-only reactors will prevail over fission-fusion hybrids in the commercialization phase of fusion technology, the safeguard challenge will be more of a legal than of a technical nature. In pure fusion reactors (and in most SNS) there should be no nuclear material present at any time by design. The presence of undeclared nuclear material would indicate a military use of the plant. This fact offers a clear-cut detection criterion for a covert use of a declared facility. Another important point is that tritium does not fall under the definition of 'nuclear material', so a pure fusion reactor or a SNS that do not use nuclear materials are not directly falling under any international non-proliferation treaty requirements. Non-proliferation treaties have to be amended to take into account that fact. (A.C.)

  10. Managing nuclear weapons in a changing world: Proceedings

    International Nuclear Information System (INIS)

    1992-01-01

    The Center for Security and Technology Studies was established at the Lawrence Livermore National Laboratory to support long-range technical studies on issues of importance to US national security. An important goal of the Center is to bring together Laboratory staff and the broader outside community through a program of technical studies, visitors, symposia, seminars, workshops, and publications. With this in mind, the Center and LLNL's Defense Systems Program sponsored a conference on Managing Nuclear Weapons in a Changing World held on November 17--18,1992. The first day of the meeting focused on nuclear weapons issues in the major geographical areas of the world. On the second day, the conference participants discussed what could be done to manage, control, and account for nuclear weapons in this changing world. Each of the talks and the concluding panel discussion are being indexed as separate documents

  11. Managing nuclear weapons in a changing world: Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    1992-12-31

    The Center for Security and Technology Studies was established at the Lawrence Livermore National Laboratory to support long-range technical studies on issues of importance to US national security. An important goal of the Center is to bring together Laboratory staff and the broader outside community through a program of technical studies, visitors, symposia, seminars, workshops, and publications. With this in mind, the Center and LLNL`s Defense Systems Program sponsored a conference on Managing Nuclear Weapons in a Changing World held on November 17--18,1992. The first day of the meeting focused on nuclear weapons issues in the major geographical areas of the world. On the second day, the conference participants discussed what could be done to manage, control, and account for nuclear weapons in this changing world. Each of the talks and the concluding panel discussion are being indexed as separate documents.

  12. Someone at School Has a Weapon. What Should I Do?

    Science.gov (United States)

    ... animals talking about weapons and violence fascination with violent video games, TV shows, and movies threatening or bullying others isolation from family and friends Of course, these signs don't necessarily mean that a person will become violent or bring a weapon to school. Still, you ...

  13. Sharp and blunt force trauma concealment by thermal alteration in homicides: an in-vitro experiment for methodology and protocol development in forensic anthropological analysis of burnt bones

    OpenAIRE

    Macoveciuc, I; Marquez-Grant, N; Horsfall, I; Zioupos, P

    2017-01-01

    Burning of human remains is one method used by perpetrators to conceal fatal trauma and expert opinions regarding the degree of skeletal evidence concealment are often disparate. This experiment aimed to reduce this incongruence in forensic anthropological interpretation of burned human remains and implicitly contribute to the development of research methodologies sufficiently robust to withstand forensic scrutiny in the courtroom. We have tested the influence of thermal alteration on pre-exi...

  14. Arms Control: US and International efforts to ban biological weapons

    Energy Technology Data Exchange (ETDEWEB)

    1992-12-01

    The Bacteriological (Biological) and Toxin Weapons Convention, the treaty that bans the development, production, and stockpiling and acquisition of biological weapons was opened for signature in 1972 and came into force in 1975 after being ratified by 22 governments, including the depository nations of the USA, the United Kingdom, and the former Soviet Union. In support of the Convention, the USA later established export controls on items used to make biological weapons. Further, in accordance with the 1990 President`s Enhanced Proliferation Control Initiative, actions were taken to redefine and expand US export controls, as well as to encourage multilateral controls through the Australia Group. Thus far, the Convention has not been effective in stopping the development of biological weapons. The principal findings as to the reasons of the failures of the Convention are found to be: the Convention lacks universality, compliance measures are effective, advantage of verification may outweigh disadvantages. Recommendations for mitigating these failures are outlined in this report.

  15. Just war and nuclear weapons : just war theory and its application to the Korean nuclear weapons issue in Korean Christianity

    OpenAIRE

    Son, Changwan

    2009-01-01

    This thesis is primarily an application of the Christian tradition of Just War to the problems arising from the basing of US nuclear weapons in South Korea and the development of nuclear weapons by the regime in the North. The Christian theology of Just War has developed over the last two thousand years, adapting as first Christianity became the state religion of the Roman Empire, through the break down of any enforceable norms in Europe‘s 'Dark Ages‘, to the emergence of the concept of th...

  16. Nuclear weapon testing and the monkey business

    International Nuclear Information System (INIS)

    Murthy, M.S.S.

    1978-01-01

    Reasons for India's total ban on the export of rhesus monkeys to U.S. have been explained. The major reason is that some of the animals were used in nuclear weapon related radiation experiments. This was a clear violation of a stricture in the agreement about supply of monkeys. The stricture prohibited the use of animals for research concerning military operations, including nuclear weapon testing. It is pleaded that a strict enforcement of strictures rather than a total ban on the export of monkeys would be better in the interest of advancement of knowledge in human medicine and disease control. (M.G.B.)

  17. 36 CFR 327.13 - Explosives, firearms, other weapons and fireworks.

    Science.gov (United States)

    2010-07-01

    ... weapons and fireworks. 327.13 Section 327.13 Parks, Forests, and Public Property CORPS OF ENGINEERS... ADMINISTERED BY THE CHIEF OF ENGINEERS § 327.13 Explosives, firearms, other weapons and fireworks. (a) The... explosives or explosive devices of any kind, including fireworks or other pyrotechnics, is prohibited unless...

  18. Between Allies and Rivals: Turkey, Nuclear Weapons, and BMD

    International Nuclear Information System (INIS)

    Kibaroglu, Mustafa

    2014-01-01

    This paper discusses Turkey's attitudes vis-a-vis nuclear weapons and Ballistic Missile Defense in the light of recent developments in the Iranian nuclear program and NATO's evolving concept of extended deterrence. On the one hand, the long-standing forward deployment of US tactical nuclear weapons in Turkey and the country's role in the US Phased Adaptive Approach BMD architecture are still considered to be key elements of national security. On the other, security guarantees offered to Turkey by NATO and the US appear less and less credible in the face of rising regional threats. As this paper shows, there is a growing gap between official policy and public perceptions inside Turkey vis-a-vis the US, Iran, and nuclear weapons, as well as a growing Turkish aspiration to autonomy in its security and defense policy. While one should not expect Turkey to develop nuclear weapons anytime soon, an unchecked Iranian regional power could bring Ankara to hedge its bets in the long term. Turkey's controversial recent decision to buy a Chinese system for its national air and missile defense rather than European or US equipment should be seen in the light of this search for autonomy. (author)

  19. North Korea's nuclear weapons development. Implications for future policy

    International Nuclear Information System (INIS)

    Pollack, J.D.

    2010-01-01

    This essay assesses North Korea's long-standing quest for nuclear weapons; alternative strategies for inhibiting Pyongyang's weapons development; and the potential implications for regional security and nonproliferation should the Democratic People's Republic of Korea (DPRK) retain and enhance its weapons programs. North Korea's pursuit of a nuclear weapons capability has long provoked heated debate among policy makers and research analysts about the purposes of engagement with the North, reflecting the repeated frustrations in efforts to negotiate Korean denuclearization. These debates reflect widely divergent views of the North Korean regime; its sustainability as an autonomous political, economic, and military system; and the potential consequences of continued nuclear development in this isolated, highly idiosyncratic state. These questions assume additional salience as North Korea approaches a leadership succession for only the second time in its six-decade history. The effort to inhibit North Korea's pursuit of nuclear weapons is among the longest running and least successful sagas in international security and non-proliferation policy of the past quarter century. In early 2010, Pyongyang claims a rudimentary nuclear capability by possession of weaponized plutonium, the conduct of two nuclear tests, and advances in the production of enriched uranium as an alternative means of fissile material production, though the latter step is nominally justified as a source for reactor fuel. North Korea defends its pursuit of a nuclear deterrent to counter what Pyongyang deems existential threats posed by the United States.Despite the resumption of high-level diplomatic contact between Washington and Pyongyang in late 2009, realization of a non-nuclear Korean Peninsula remains a very remote prospect. The DPRK insists that a peace agreement between the U.S. and North Korea and hence the cessation of 'hostile DPRK-U.S. relations' are necessary before any consideration of

  20. Nuclear weapons Latin American Proscription Treaty

    International Nuclear Information System (INIS)

    1967-01-01

    Military descentralization of Latin America will constitute a measure that will keep its peoples from squandering in nuclear weapons out of their limited resources and will protect them from eventually being attacked in such fashion within their territories. This constitutes a considerable contribution award avoiding proliferation of nuclear weapons as well as a giant step towards general and complete disarmament. It will also constitute evidence that Latin America, faithful to its universalist tradition, not only must make a greater effort towards proscribing from its territories the treat of a nuclear war, but also must use all its resources to persevere in its struggle for welfare and progress of its peoples, cooperating along with the rest of the world to achieve the ideals of mankind as a whole

  1. Linking legacies: Connecting the Cold War nuclear weapons production processes to their environmental consequences

    International Nuclear Information System (INIS)

    1997-01-01

    In the aftermath of the Cold War, the US has begun addressing the environmental consequences of five decades of nuclear weapons production. In support of this effort, the National Defense Authorization Act for Fiscal Year 1995 directed the Department of Energy (DOE) to describe the waste streams generated during each step in the production of nuclear weapons. Accordingly, this report responds to this mandate, and it is the Department's first comprehensive analysis of the sources of waste and contamination generated by the production of nuclear weapons. The report also contains information on the missions and functions of nuclear weapons facilities, on the inventories of waste and materials remaining at these facilities, as well as on the extent and characteristics of contamination in and around these facilities. This analysis unites specific environmental impacts of nuclear weapons production with particular production processes. The Department used historical records to connect nuclear weapons production processes with emerging data on waste and contamination. In this way, two of the Department's legacies--nuclear weapons manufacturing and environmental management--have become systematically linked. The goal of this report is to provide Congress, DOE program managers, non-governmental analysts, and the public with an explicit picture of the environmental results of each step in the nuclear weapons production and disposition cycle

  2. Linking legacies: Connecting the Cold War nuclear weapons production processes to their environmental consequences

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-01-01

    In the aftermath of the Cold War, the US has begun addressing the environmental consequences of five decades of nuclear weapons production. In support of this effort, the National Defense Authorization Act for Fiscal Year 1995 directed the Department of Energy (DOE) to describe the waste streams generated during each step in the production of nuclear weapons. Accordingly, this report responds to this mandate, and it is the Department`s first comprehensive analysis of the sources of waste and contamination generated by the production of nuclear weapons. The report also contains information on the missions and functions of nuclear weapons facilities, on the inventories of waste and materials remaining at these facilities, as well as on the extent and characteristics of contamination in and around these facilities. This analysis unites specific environmental impacts of nuclear weapons production with particular production processes. The Department used historical records to connect nuclear weapons production processes with emerging data on waste and contamination. In this way, two of the Department`s legacies--nuclear weapons manufacturing and environmental management--have become systematically linked. The goal of this report is to provide Congress, DOE program managers, non-governmental analysts, and the public with an explicit picture of the environmental results of each step in the nuclear weapons production and disposition cycle.

  3. Proliferation of massive destruction weapons: fantasy or reality?

    International Nuclear Information System (INIS)

    Duval, M.

    2001-01-01

    This article evaluates the threat of massive destruction weapons (nuclear, chemical, biological) for Europe and recalls the existing safeguards against the different forms of nuclear proliferation: legal (non-proliferation treaty (NPT), comprehensive nuclear test ban treaty (CTBT), fissile material cut off treaty (FMCT) etc..), technical (fabrication of fissile materials, delays). However, all these safeguards can be overcome as proven by the activities of some countries. The situation of proliferation for the other type of massive destruction weapons is presented too. (J.S.)

  4. Can we stop the spread of nuclear weapons?

    International Nuclear Information System (INIS)

    Blix, H.

    1990-02-01

    In his address to the Graduate Institute of International Studies in Geneva, IAEA Director General Hans Blix reviewed the world's non-proliferation regime and the role of IAEA safeguards in preventing the spread of nuclear weapons. He emphasized that the first and fundamental barrier to proliferation is the political will and determination of individual States not to acquire nuclear weapons, other barriers being legal obligations under treaties or agreements and the acceptance of safeguards inspections to verify peaceful uses of nuclear facilities

  5. Canadians, nuclear weapons, and the Cold War security dilemma

    International Nuclear Information System (INIS)

    Eaton, M.A.

    2007-01-01

    This dissertation provides a history of Canadian ideas about nuclear weapons from the late 1950s until the end of the Trudeau era in 1984. Throughout this period, Canadians reacted to the insecurity they felt in the world around them by expressing many conflicting, often irreconcilable views about a range of nuclear weapon issues, including Canada's acquisition of nuclear warheads in 1963, the U.S. ABM program in the 1960s and early 1970s, the role of Canadian nuclear technology in the development of India's first nuclear explosion, and the Trudeau government's decision to allow the U.S. military to test cruise missiles in northern Canada The dissertation concludes with an examination of the emergence of a broadly-based, increasingly mainstream and influential anti-nuclear movement in the early 1980s, the clearest manifestation of the insecurity Canadians experienced at the time. .The nuclear debates examined in this dissertation reveal that Canadians were divided over nuclear weapons, nuclear strategy, the arms race, proliferation, and arms control and disarmament. In particular, they came to fundamentally different conclusions about how Canada's nuclear weapon policies, and its support for the nuclear policies of its alliances, would contribute to international stability and order. Some believed that their security rested on the maintenance of a strong Western nuclear deterrent and supported Canada contributing to its credibility; others believed that the constant modernisation of nuclear arsenals fuelled by the superpower arms race posed a serious threat to their security. This conceptual dilemma-the security through nuclear strength argument versus the fear that the quest for security through quantitative and qualitative improvements of nuclear stockpiles increased the likelihood of nuclear war-left Canadians divided over the value and utility of nuclear weapons and the strategies developed around them. At the same time, Canadians' ideas about nuclear weapons

  6. Canadians, nuclear weapons, and the Cold War security dilemma

    Energy Technology Data Exchange (ETDEWEB)

    Eaton, M.A

    2007-07-01

    This dissertation provides a history of Canadian ideas about nuclear weapons from the late 1950s until the end of the Trudeau era in 1984. Throughout this period, Canadians reacted to the insecurity they felt in the world around them by expressing many conflicting, often irreconcilable views about a range of nuclear weapon issues, including Canada's acquisition of nuclear warheads in 1963, the U.S. ABM program in the 1960s and early 1970s, the role of Canadian nuclear technology in the development of India's first nuclear explosion, and the Trudeau government's decision to allow the U.S. military to test cruise missiles in northern Canada The dissertation concludes with an examination of the emergence of a broadly-based, increasingly mainstream and influential anti-nuclear movement in the early 1980s, the clearest manifestation of the insecurity Canadians experienced at the time. .The nuclear debates examined in this dissertation reveal that Canadians were divided over nuclear weapons, nuclear strategy, the arms race, proliferation, and arms control and disarmament. In particular, they came to fundamentally different conclusions about how Canada's nuclear weapon policies, and its support for the nuclear policies of its alliances, would contribute to international stability and order. Some believed that their security rested on the maintenance of a strong Western nuclear deterrent and supported Canada contributing to its credibility; others believed that the constant modernisation of nuclear arsenals fuelled by the superpower arms race posed a serious threat to their security. This conceptual dilemma-the security through nuclear strength argument versus the fear that the quest for security through quantitative and qualitative improvements of nuclear stockpiles increased the likelihood of nuclear war-left Canadians divided over the value and utility of nuclear weapons and the strategies developed around them. At the same time, Canadians

  7. Self-Concealment, Social Network Sites Usage, Social Appearance Anxiety, Loneliness of High School Students: A Model Testing

    Science.gov (United States)

    Dogan, Ugur; Çolak, Tugba Seda

    2016-01-01

    This study was tested a model for explain to social networks sites (SNS) usage with structural equation modeling (SEM). Using SEM on a sample of 475 high school students (35% male, 65% female) students, model was investigated the relationship between self-concealment, social appearance anxiety, loneliness on SNS such as Twitter and Facebook usage.…

  8. Physics studies of weapons plutonium disposition in the IFR closed fuel cycle

    International Nuclear Information System (INIS)

    Hill, R.N.; Wade, D.C.; Liaw, J.R.; Fujita, E.K.

    1994-01-01

    The core performance impact of weapons plutonium introduction into the IFR closed fuel cycle is investigated by comparing three disposition scenarios: a power production mode, a moderate destruction mode, and a maximum destruction mode all at a constant heat rating of 840 MWt. For each scenario, two fuel cycle models are evaluated: cores using weapons material as the sole source of transuranics in a once-through mode, and recycle corns using weapons material only as required for a make-up feed. Calculated results include mass flows, detailed isotopic distributions, neutronic performance characteristics, and reactivity feedback coefficients. In general, it is shown that weapons plutonium feed does not have an adverse impact on IFR core performance characteristics

  9. A open-quotes Newclose quotes regime for nuclear weapons and materials

    International Nuclear Information System (INIS)

    Sutcliffe, W.G.

    1994-01-01

    In this paper, I discuss the principal ideas that I covered in my presentation on December 8, 1993, at the Future of Foreign Nuclear Materials Symposium held by the Naval Postgraduate School in Monterey, California. I was asked to discuss issues related to military inventories of plutonium, and I took this opportunity to describe a possible declaratory regime that could encompass military as well as civilian inventories of plutonium. The open-quote newclose quotes in the title does not imply that the regime discussed here is an original idea. Rather, the regime will be open-quotes new,close quotes when it is adopted. The regime proposed here and in other works is one in which all stocks of nuclear weapons and materials are declared. Originally, declarations were proposed as a traditional arms control measure. Here, declarations are proposed to support the prevention of misuse of nuclear weapons and materials, including support for the nonproliferation regime. In the following, I discuss: (1) Worldwide inventories of nuclear weapons and materials, including the fact that military plutonium must be viewed as part of that worldwide inventory. (2) Life cycles of nuclear weapons and materials, including the various stages from the creation of nuclear materials for weapons through deployment and retirement of weapons to the final disposition of the materials. (3) Mechanisms for making declarations. (4) Risks and benefits to be derived from declarations. (5) Possibilities for supporting evidence or verification

  10. Trends in weapon-related injuries from violence in Odense Municipality, Denmark 1991-2009

    DEFF Research Database (Denmark)

    Møller Luef, Stefan; Lauritsen, Jens Martin; Faergemann, Christian

    2016-01-01

    rate was 4.8 per 1,000 victims in males and 29.1 per 1,000 victims in females. More than half (57%) of the homicides were caused by lesions due to sharp weapons. CONCLUSION: Weapon-related injuries are rare in the Odense Municipality. The incidence rate of weapon-related violence did not increase...

  11. Environmental Restoration Strategic Plan. Remediating the nuclear weapons complex

    International Nuclear Information System (INIS)

    1995-08-01

    With the end of the cold war, the US has a reduced need for nuclear weapons production. In response, the Department of Energy has redirected resources from weapons production to weapons dismantlement and environmental remediation. To this end, in November 1989, the US Department of Energy (DOE) established the Office of Environmental Restoration and Waste Management (renamed the Office of Environmental Management in 1994). It was created to bring under a central authority the management of radioactive and hazardous wastes at DOE sites and inactive or shut down facilities. The Environmental Restoration Program, a major component of DOE's Environmental Management Program, is responsible for the remediation and management of contaminated environmental media (e.g., soil, groundwater, sediments) and the decommissioning of facilities and structures at 130 sites in over 30 states and territories

  12. New Organic Scintillators for Neutron Detection

    Science.gov (United States)

    2016-03-01

    gamma rays. For heterogeneous or dense materials such as samples of metals , oxides , and nuclear waste, gamma ray attenuation can be too high to...highly enriched uranium and weapons grade plutonium. Neutrons and gamma rays are two signatures of these materials. Gamma ray detection techniques are... uranium ). Thus, neutron detection is an important component of the overall detection techniques used in identifying SNMs. Important requirements for

  13. Narratives around concealment and agency for stigma-reduction: a study of women affected by leprosy in Cirebon District, Indonesia.

    NARCIS (Netherlands)

    Peters, R.M.H.; Hofker, M.E.; Zweekhorst, M.B.M.; van Brakel, W.H.; Bunders-Aelen, J.G.F.

    2014-01-01

    Purpose: This study analyses the experiences of women affected by leprosy, taking into consideration whether they concealed or disclosed their status, and looks specifically at their ‘agency’. The aim is to provide recommendations for stigma-reduction interventions. Methods: The study population

  14. The Chemical Weapons Convention -- Legal issues

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-08-01

    The Chemical Weapons Convention (CWC) offers a unique challenge to the US system of constitutional law. Its promise of eliminating what is the most purely genocidal type of weapon from the world`s arsenals as well as of destroying the facilities for producing these weapons, brings with it a set of novel legal issues. The reservations about the CWC expressed by US business people are rooted in concern about safeguarding confidential business information and protecting the constitutional right to privacy. The chief worry is that international verification inspectors will misuse their power to enter commercial property and that trade secrets or other private information will be compromised as a result. It has been charged that the Convention is probably unconstitutional. The author categorically disagrees with that view and is aware of no scholarly writing that supports it. The purpose of this presentation is to show that CWC verification activities can be implemented in the US consistently with the traditional constitutional regard for commercial and individual privacy. First, he very briefly reviews the types of verification inspections that the CWC permits, as well as some of its specific privacy protections. Second, he explains how the Fourth Amendment right to privacy works in the context of CWC verification inspections. Finally, he reviews how verification inspections can be integrated into these constitutional requirements in the SU through a federal implementing statute.

  15. 77 FR 22559 - Proposed Information Collection; Comment Request; Chemical Weapons Convention Provisions of the...

    Science.gov (United States)

    2012-04-16

    ... Request; Chemical Weapons Convention Provisions of the Export Administration Regulations AGENCY: Bureau of.... Abstract The Chemical Weapons Convention (CWC) is a multilateral arms control treaty that seeks to achieve an international ban on chemical weapons (CW). The CWC prohibits the use, development, production...

  16. 15 CFR 745.2 - End-Use Certificate reporting requirements under the Chemical Weapons Convention.

    Science.gov (United States)

    2010-01-01

    ... requirements under the Chemical Weapons Convention. 745.2 Section 745.2 Commerce and Foreign Trade Regulations... EXPORT ADMINISTRATION REGULATIONS CHEMICAL WEAPONS CONVENTION REQUIREMENTS § 745.2 End-Use Certificate reporting requirements under the Chemical Weapons Convention. Note: The End-Use Certificate requirement of...

  17. Nuclear weapons and the World Court ruling

    International Nuclear Information System (INIS)

    Singh, J.

    1998-01-01

    based on the initiatives by non-governmental organizations, the World Health Organisation (WHO) Assembly asked the International Court of Justice for an advisory opinion in 1993 whether, considering the environmental and health consequences, the use of nuclear weapons by a state in war or other armed conflict would be a breach of its obligations under international law. The World Court decided that it was not able to give an advisory opinion as requested, because of the fact that questions of use of force and such like were beyond the scope of specialized agencies like the WHO. The Court has ruled that the international community, especially the five nuclear weapon states have not only an obligation to negotiate a treaty for total nuclear disarmament, but also have an obligation to conclude such treaty. We may expect that the nuclear weapon states will cynically disregard the ruling of the World Court as they have been doing to the basic obligation itself in pursuit of nuclear hegemony. But the remaining 150 countries or so also bear a responsibility to keep nudging the recalcitrant states into implementing their commitments to disarm

  18. Directed-Energy Weapons: Invisible and Invincible?

    National Research Council Canada - National Science Library

    Deveci, Bayram M

    2007-01-01

    ... capacity, low operational cost, reduced logistic support, a nearly unlimited magazine, and wide area coverage for offensive and defensive purposes, seem to be at the forefront of the next revolution in military weapons...

  19. Low yield nuclear weapons and nuclear terrorism

    International Nuclear Information System (INIS)

    Rodionov, S.

    1999-01-01

    It is unlikely that anybody would imagine the route to a nuclear-weapon-free world as a straight and unimpeded one. At the moment, there is a fading interest in the possibility of the concerted bilateral reduction of the US and Russian nuclear weapon stockpiles. The reason is evident: these powers demonstrate quite different approaches to two large political campaigns initiated in American political circles, namely NATO expansion to the East, and the attack on Anti-Ballistic-Missile (ABM) Treaty. Russia considers these initiatives as provocative in content and high-handed in the form. The West argues that Russian response is unjustified and insists on the peaceful nature of its plans?

  20. Towards a nuclear-weapon-free zone in the Middle East

    International Nuclear Information System (INIS)

    1991-01-01

    Every year since 1974 the General Assembly adopted a resolution on the subject ''Establishment of a nuclear-weapon-free zone in the Middle East''. By that resolution, the General Assembly requested the Secretary-General to undertake a study on effective and verifiable measures which would facilitate the establishment of a nuclear-weapon-free zone in the Middle East, taking into account the circumstances and characteristics of the Middle East, as well as the views and the suggestions of the parties of the region, and to submit this study to the General Assembly. The study was carried out between July 1989 and August 1990. The study discusses a number of steps and measures that could ease the process leading to the establishment of a nuclear-weapon-free zone in the Middle East. Those measures could be undertaken independently or in conjunction with each other, as well as by individual States or jointly by several, and also on a reciprocal basis; each of them would move the States concerned closer to their ultimate objective - the establishment of a zone free of nuclear weapons

  1. Selection on an extreme weapon in the frog-legged leaf beetle (Sagra femorata).

    Science.gov (United States)

    O'Brien, Devin M; Katsuki, Masako; Emlen, Douglas J

    2017-11-01

    Biologists have been fascinated with the extreme products of sexual selection for decades. However, relatively few studies have characterized patterns of selection acting on ornaments and weapons in the wild. Here, we measure selection on a wild population of weapon-bearing beetles (frog-legged leaf beetles: Sagra femorata) for two consecutive breeding seasons. We consider variation in both weapon size (hind leg length) and in relative weapon size (deviations from the population average scaling relationship between hind leg length and body size), and provide evidence for directional selection on weapon size per se and stabilizing selection on a particular scaling relationship in this population. We suggest that whenever growth in body size is sensitive to external circumstance such as nutrition, then considering deviations from population-level scaling relationships will better reflect patterns of selection relevant to evolution of the ornament or weapon than will variation in trait size per se. This is because trait-size versus body-size scaling relationships approximate underlying developmental reaction norms relating trait growth with body condition in these species. Heightened condition-sensitive expression is a hallmark of the exaggerated ornaments and weapons favored by sexual selection, yet this plasticity is rarely reflected in the way we think about-and measure-selection acting on these structures in the wild. © 2017 The Author(s). Evolution © 2017 The Society for the Study of Evolution.

  2. North Korea's Nuclear Weapons: Latest Developments

    National Research Council Canada - National Science Library

    Nikitin, Mary B

    2007-01-01

    .... The Six-Party Talks include the United States, South Korea, Japan, China, Russia, and North Korea, and were begun in August 2003 to attempt to resolve the current crisis over North Korean nuclear weapons...

  3. HA03 as an Iranian Candidate Concealed Antigen for Vaccination against Hyalomma anatolicum anatolicum: Comparative Structural and In silico Studies

    Directory of Open Access Journals (Sweden)

    Mohammadi, A.

    2013-12-01

    Full Text Available In the last decades researchers had focused on developing a vaccine against tick based on protective antigen. Recombinant vaccines based on concealed antigen from Boophilus microplus have been developed in Australia and Cuba by the name of TICKGARD and GAVAC (De La Fuente and Kocan, 2006. Further studies on this antigen have shown some extent of protection against other species (De Vos et al., 2001. In Iran most important species is Hyalomma anatolicum and limited information about its control are available. This paper reports structural and polymorphic analysis of HA03 as an Iranian candidate concealed antigen of H. a. anatolicum deposited in Gen-Bank .(Aghaeipour et al. GQ228820. The comparison between this antigen and other mid gut concealed antigen that their characteristics are available in GenBank showed there are high rate of similarity between them. The HA03 amino acid sequence had a homology of around 89%, 64%, 56% with HA98, BM86, BM95 respectively. Potential of MHC class I and II binding region indicated a considerable variation between BM86 antigen and its efficiency against Iranian H. a. anatolicum. In addition, predicted major of hydrophobisity and similarity in N-glycosylation besides large amount of cystein and seven EGF like regions presented in protein structure revealed that value of HA03 as a new protective antigen and the necessity of the development, BM86 homolog of H. a. anatolicum HA03 based recombinant vaccine.

  4. Study on combat effectiveness of air defense missile weapon system based on queuing theory

    Science.gov (United States)

    Zhao, Z. Q.; Hao, J. X.; Li, L. J.

    2017-01-01

    Queuing Theory is a method to analyze the combat effectiveness of air defense missile weapon system. The model of service probability based on the queuing theory was constructed, and applied to analyzing the combat effectiveness of "Sidewinder" and "Tor-M1" air defense missile weapon system. Finally aimed at different targets densities, the combat effectiveness of different combat units of two types' defense missile weapon system is calculated. This method can be used to analyze the usefulness of air defense missile weapon system.

  5. Igniting the Light Elements: The Los Alamos Thermonuclear Weapon Project, 1942-1952

    Energy Technology Data Exchange (ETDEWEB)

    Fitzpatrick, Anne C. [Virginia Polytechnic Inst. and State Univ. (Virginia Tech), Blacksburg, VA (United States)

    1999-07-01

    The American system of nuclear weapons research and development was conceived and developed not as a result of technological determinism, but by a number of individual architects who promoted the growth of this large technologically-based complex. While some of the technological artifacts of this system, such as the fission weapons used in World War II, have been the subject of many historical studies, their technical successors--fusion (or hydrogen) devices--are representative of the largely unstudied highly secret realms of nuclear weapons science and engineering. In the postwar period a small number of Los Alamos Scientific Laboratory's staff and affiliates were responsible for theoretical work on fusion weapons, yet the program was subject to both the provisions and constraints of the US Atomic Energy Commission, of which Los Alamos was a part. The Commission leadership's struggle to establish a mission for its network of laboratories, least of all to keep them operating, affected Los Alamos's leaders' decisions as to the course of weapons design and development projects. Adapting Thomas P. Hughes's ''large technological systems'' thesis, I focus on the technical, social, political, and human problems that nuclear weapons scientists faced while pursuing the thermonuclear project, demonstrating why the early American thermonuclear bomb project was an immensely complicated scientific and technological undertaking. I concentrate mainly on Los Alamos Scientific Laboratory's Theoretical, or T, Division, and its members' attempts to complete an accurate mathematical treatment of the ''Super''--the most difficult problem in physics in the postwar period--and other fusion weapon theories. Although tackling a theoretical problem, theoreticians had to address technical and engineering issues as well. I demonstrate the relative value and importance of H-bomb research over time in the postwar era to

  6. Emergency management of chemical weapons injuries.

    Science.gov (United States)

    Anderson, Peter D

    2012-02-01

    The potential for chemical weapons to be used in terrorism is a real possibility. Classes of chemical weapons include nerve agents, vesicants (blister agents), choking agents, incapacitating agents, riot control agents, blood agents, and toxic industrial chemicals. The nerve agents work by blocking the actions of acetylcholinesterase leading to a cholinergic syndrome. Nerve agents include sarin, tabun, VX, cyclosarin, and soman. The vesicants include sulfur mustard and lewisite. The vesicants produce blisters and also damage the upper airways. Choking agents include phosgene and chlorine gas. Choking agents cause pulmonary edema. Incapacitating agents include fentanyl and its derivatives and adamsite. Riot control agents include Mace and pepper spray. Blood agents include cyanide. The mechanism of toxicity for cyanide is blocking oxidative phosphorylation. Toxic industrial chemicals include agents such as formaldehyde, hydrofluoric acid, and ammonia.

  7. Nuclear power and nuclear weapon proliferation

    International Nuclear Information System (INIS)

    Apold, A.

    1978-01-01

    The theme of Dr. Marshall's lecture was that it is, from the viewpoint of prevention of proliferation of nuclear weapons,preferable to use plutonium as a fuel in FBR reactors rather than store it in what, in effect, would be plutonium mines. The true threat of proliferation lies in uranium enrichment. The FBR reactor is misunderstood and the US policy is not against breeders as such. Safeguards against the misuse of plutonium by leaving a residue of radioactivity after reprocessing is quite feasible, despite certain practical problems and extra costs. Weapon proliferation is subject to political objectives and intentions. Definite proposals are, (a) a limited number of reprocessing centres, (b) an accelerated development of FBR reactors, (c) a new FBR fuel cycle, (d) stop storage of spent thermal reactor fuel, (e) reinforced safeguards. (JIW)

  8. Novel inversion method for land mine imaging and detection

    Science.gov (United States)

    Sindoni, Orazio I.; Cohoon, David K.

    2000-08-01

    We have developed, using both partial differential equation approaches and integral equation formulations, a precise method to invert acoustic or electromagnetic scattering data from macroscopic concealed objects. Our approach makes use of the ideas associated with our exact solution of partial differential equations as described in our paper where we were able to collapse the number of equations by elimination of transcendentals therefore preserving the absolute mathematical precision inherent in the partial differential equation formulation. Our mathematical method, as a consequence, has not encountered the traditional loss of precision when inverting the scattered data. The unrestricted wavelength range allows us to penetrate any material which may surround the object and differentiate between the object and the media. For this reason we have applied our inversion scheme to landmine detection as we can penetrate and differentiate under both wet and dry conditions. Also, we are able to account, under certain conditions, for dielectric nonlinearities of material in the concealed object. Therefore, we are able to build in density dependent false colors a 3D grid representative of both the media and of the embedded object including the internal structure of the object. We have surveyed the literature on the subject of recovery of physical location of concealed objects and we have found that most of the present applications such as land mine detection, and we have found that most of the present applications have shortcomings due to the physical changes that are present in the surrounding media or the discontinuities of physical properties of the media. For all the above reasons we believe that we may have the most versatile and mathematically precise approach to the solution of this problem.

  9. Civil nuclear energy and the proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    1990-04-01

    The issue of whether civil nuclear programmes contribute to the risk of proliferation of nuclear weapons has been discussed since civil programmes were first considered, and has always complicated public attitudes to civil nuclear energy. This paper seeks to define the extent to which there is such 'linkage'. Linkage concerns arise primarily over the possibility of their being used to produce highly enriched uranium or plutonium for use in weapons. Linkage may also arise through the relevant experience of the trained workforce. Such linkage is, however, limited by institutional, technical and economic factors. First important institutional constraints on using a civil programme for military purposes exist in the form of a network of bilateral agreements and international treaties - most particularly the Nuclear Non-Proliferation Treaty - and the international safeguards inspections. Secondly, without access to the technologies of enrichment or reprocessing, the fissile material needed for an explosive cannot be obtained from any plant or process used to produce electricity. Even enrichment and reprocessing, as normally used in electricity programmes, do not give rise to the materials used in weapons. Finally, establishing a civil programme - with equipment whose design is optimized for electricity production - in order to develop weapons is an expensive route compared to specialized facilities. (Author)

  10. Biological effects of nuclear weapons

    International Nuclear Information System (INIS)

    Frischauf, H.

    1983-01-01

    Prompt and delayed biological effects of nuclear weapons are discussed. The response to excess pressure on man is estimated, the acute radiation syndrome caused by different radiation doses and cancerogenous and genetic effects are described. Medical care after a nuclear explosion would be difficult and imperfect. (M.J.)

  11. Weapons of mass destruction: Overview of the CBRNEs (Chemical, Biological, Radiological, Nuclear, and Explosives).

    Science.gov (United States)

    Prockop, Leon D

    2006-11-01

    The events of September 11, 2001, made citizens of the world acutely aware of disasters consequent to present-day terrorism. This is a war being waged for reasons obscure to many of its potential victims. The term "NBCs" was coined in reference to terrorist weapons of mass destruction, i.e., nuclear, biological and chemical. The currently accepted acronym is "CBRNE" which includes Chemical, Biological, Radiological, Nuclear, and Explosive weapons. Non-nuclear explosives are the most common terrorist weapon now in use. Nuclear and radiological weapons are beyond the scope of this publication, which focuses on the "CBEs", i.e. chemical, biological and explosive weapons. Although neurologists will not be the first responders to CBEs, they must know about the neurological effects in order to provide diagnosis and treatment to survivors. Neurological complications of chemical, biological and explosive weapons which have or may be used by terrorists are reviewed by international experts in this publication. Management and treatment profiles are outlined.

  12. Weapons grade plutonium disposition in PWR, CANDU and FR

    International Nuclear Information System (INIS)

    Deplech, M.; Tommasi, J.; Zaetta, A.

    2000-01-01

    In the frame work of the AIDA/MOX phase I/I/ program (1994-1997) between France and Russia, the disposition of plutonium in reactors was studied. The LWR (Light Water Reactor), FR (Fast reactors), CANDU (Heavy Water Reactors), HTR (High Temperature Reactors) options for using excess dismantled weapons plutonium for peaceful commercial nuclear power generating purposes offer some advantages over the remaining options (storage). The AIDA/MOX phase 1 program covers different topics, among which are the neutronic aspects of loading reactors with weapons-grade plutonium. The conclusions are that the weapon plutonium consumption is similar in the different type of reactors. However, the use of inert matrices allows to increase the mass balance for a same denaturing level. The use of Thorium as a matrix or special isotopes to increase the proliferation resistance prove to be insufficient. (author)

  13. Chemical and biological weapons: new questions, new answers.

    Science.gov (United States)

    Hood, E

    1999-01-01

    The words "chemical and biological weapons" (CBW) send a shiver down most spines these days. With the end of the Cold War, the possibility of a massive nuclear confrontation appears remote, so today many popular doomsday scenarios center on the aggressive use of chemical or biological warfare by rogue nations or terrorist groups. As exaggerated as some of the accounts are, with CBW cast as the latest unseen, unstoppable enemy, the threat posed by these weapons is all too real, and growing. Images p931-a PMID:10585899

  14. A strategy for weapons-grade plutonium disposition

    International Nuclear Information System (INIS)

    Sylvester, K.W.B.

    1994-09-01

    A political as well as technical analysis was performed to determine the feasibility of glassification (vitrification) for weapons grade plutonium (WGPu) disposition. The political analysis provided the criteria necessary to compare alternative storage forms. The technical areas of weapon useability and environmental safety were then computationally and experimentally explored and a vitrification implementation strategy postulated. The Monte Carlo Neutron Photon (MCNP) computer code was used to model the effect of blending WGPu with reactor grade Pu (RGPu). A mixture of 30% RGPu and 70% WGPu more than doubled the surface flux from a bare sphere of the mixture which assumedly correlates to a significantly increased predetonation probability. Rare earth diluents were also examined (using MCNP) for their ability to increase the compressed critical mass of the WGPu mixture. The rare earths (notably Eu) were effective in this regard. As Pu-239 has a 24,100 year half life, reactivity control in the long term is an environmental safety issue. Rare earths were investigated as criticality controllers due to their neutron absorption capabilities and insolubility in aqueous environments. Thorium (a Pu surrogate) and the rare earths Eu, Gd, and Sm were added to two standard frits (ARM-1 and SRL-165) and formed into glass. Aqueous leach tests were performed (using MCC-1P guidelines) to measure rare earth leaching and determine the added elements' effects on glass durability. Europium was much more leach resistant than boron in the glasses tested. The elements had no negative effect on the environmental durability of the glasses tested at 90 C and minimal effect at room temperature. No fission product releases were detected in the ARM-1 compositions (which contained numerous simulated fission products)

  15. A strategy for weapons-grade plutonium disposition

    Energy Technology Data Exchange (ETDEWEB)

    Sylvester, K.W.B. [Iowa State Univ., Ames, IA (United States)

    1994-09-01

    A political as well as technical analysis was performed to determine the feasibility of glassification (vitrification) for weapons grade plutonium (WGPu) disposition. The political analysis provided the criteria necessary to compare alternative storage forms. The technical areas of weapon useability and environmental safety were then computationally and experimentally explored and a vitrification implementation strategy postulated. The Monte Carlo Neutron Photon (MCNP) computer code was used to model the effect of blending WGPu with reactor grade Pu (RGPu). A mixture of 30% RGPu and 70% WGPu more than doubled the surface flux from a bare sphere of the mixture which assumedly correlates to a significantly increased predetonation probability. Rare earth diluents were also examined (using MCNP) for their ability to increase the compressed critical mass of the WGPu mixture. The rare earths (notably Eu) were effective in this regard. As Pu-239 has a 24,100 year half life, reactivity control in the long term is an environmental safety issue. Rare earths were investigated as criticality controllers due to their neutron absorption capabilities and insolubility in aqueous environments. Thorium (a Pu surrogate) and the rare earths Eu, Gd, and Sm were added to two standard frits (ARM-1 and SRL-165) and formed into glass. Aqueous leach tests were performed (using MCC-1P guidelines) to measure rare earth leaching and determine the added elements` effects on glass durability. Europium was much more leach resistant than boron in the glasses tested. The elements had no negative effect on the environmental durability of the glasses tested at 90 C and minimal effect at room temperature. No fission product releases were detected in the ARM-1 compositions (which contained numerous simulated fission products).

  16. Historical fencing and scientific research medieval weapons: common ground

    Directory of Open Access Journals (Sweden)

    B. V. Hrynchyshyn

    2015-07-01

    We considered various approaches to the reconstruction of the historical fencing. It is proved that the activities of such societies has a positive effect on the process research of features of medieval weapons, fighting tactics of different periods The various approaches to the reconstruction of the historical fencing. Proved that the activities of such societies has a positive effect on the process research of features of medieval weapons, fighting tactics of different periods.

  17. Nonproliferation of Nuclear Weapons and the Nuclear Program of the DPRK

    Directory of Open Access Journals (Sweden)

    - Park Sang Hoon

    2012-09-01

    Full Text Available The article analyzes the contemporary aspects of the nuclear weapon nonproliferation issue as exemplified by the international approaches to the DPRK nuclear weapons program, as well as the international community efforts to resolve it, in particular via the Six-Party Talks.

  18. The Chemical Weapons Convention and the Role of Engineers and Scientists

    Directory of Open Access Journals (Sweden)

    Matoušek, J

    2010-02-01

    Full Text Available Chemical weapons, like all military technology, are associated with activities of scientists and engineers. However, chemical weapons differ from any other military technology because they were invented, and their first mass use directly developed by famous chemists. The active contribution of engineers and scientists and their organisations in the negotiations on chemical disarmament, including drafting the Chemical Weapons Convention, is described. Their present and future role in implementing the Convention is analysed, taking into consideration the threats and benefits of advances in science and technology, and stressing the independent expertise of the OPCW Scientific Advisory Board.

  19. Elimination of ballistic missiles: An important step towards a nuclear-weapon-free world

    International Nuclear Information System (INIS)

    Scheffran, J.

    1997-01-01

    Although the Non-Proliferation Treaty preamble emphasises 'the elimination from national arsenals of nuclear weapons and the means of their delivery pursuant to a Treaty on general and complete disarmament under strict and effective international control', the Non-Proliferation Treaty does not further specify how this ultimate goal could be achieved for delivery systems. Delivery systems are an important and costly part of nuclear weapons which should be sophisticated, therefore the control of nuclear-capable delivery systems would be an important step to make nuclear weapons useless and reduce the threat od their use. This is especially true for ballistic missiles, which represent effective and powerful means to deploy nuclear weapons

  20. Why we must abolish nuclear weapons after the end of the Cold War

    International Nuclear Information System (INIS)

    Ohnishi, Hitoshi

    1997-01-01

    The end of the Cold War has offered a great opportunity to reduce or even abolish nuclear weapons, but the international community seemed to lose interest in nuclear weapons issues. Today, however, there are a lot of other major menaces to the survival of the mankind: pollution, hunger, poverty, ethnic conflicts. So the nuclear weapons issue is merely one of the most pressing threats to survival

  1. Weapons engineering tritium facility overview

    Energy Technology Data Exchange (ETDEWEB)

    Najera, Larry [Los Alamos National Laboratory

    2011-01-20

    Materials provide an overview of the Weapons Engineering Tritium Facility (WETF) as introductory material for January 2011 visit to SRS. Purpose of the visit is to discuss Safety Basis, Conduct of Engineering, and Conduct of Operations. WETF general description and general GTS program capabilities are presented in an unclassified format.

  2. Safety and injury profile of conducted electrical weapons used by law enforcement officers against criminal suspects.

    Science.gov (United States)

    Bozeman, William P; Hauda, William E; Heck, Joseph J; Graham, Derrel D; Martin, Brian P; Winslow, James E

    2009-04-01

    Conducted electrical weapons such as the Taser are commonly used by law enforcement agencies. The safety of these weapons has been the subject of scrutiny and controversy; previous controlled studies in animals and healthy humans may not accurately reflect the risks of conducted electrical weapons used in actual conditions. We seek to determine the safety and injury profile of conducted electrical weapons used against criminal suspects in a field setting. This prospective, multicenter, observational trial tracked a consecutive case series of all conducted electrical weapon uses against criminal suspects at 6 US law enforcement agencies. Mandatory review of each conducted electrical weapon use incorporated physician review of police and medical records. Injuries were classified as mild, moderate, or severe according to a priori definitions. The primary outcome was a composite of moderate and severe injuries, termed significant injuries. Conducted electrical weapons were used against 1,201 subjects during 36 months. One thousand one hundred twenty-five subjects (94%) were men; the median age was 30 years (range 13 to 80 years). Mild or no injuries were observed after conducted electrical weapon use in 1,198 subjects (99.75%; 95% confidence interval 99.3% to 99.9%). Of mild injuries, 83% were superficial puncture wounds from conducted electrical weapon probes. Significant injuries occurred in 3 subjects (0.25%; 95% confidence interval 0.07% to 0.7%), including 2 intracranial injuries from falls and 1 case of rhabdomyolysis. Two subjects died in police custody; medical examiners did not find conducted electrical weapon use to be causal or contributory in either case. To our knowledge, these findings represent the first large, independent, multicenter study of conducted electrical weapon injury epidemiology and suggest that more than 99% of subjects do not experience significant injuries after conducted electrical weapon use.

  3. Confidence in Nuclear Weapons as Numbers Decrease and Time Since Testing Increases

    Science.gov (United States)

    Adams, Marvin

    2011-04-01

    As numbers and types of nuclear weapons are reduced, the U.S. objective is to maintain a safe, secure and effective nuclear deterrent without nuclear-explosive testing. A host of issues combine to make this a challenge. An evolving threat environment may prompt changes to security systems. Aging of weapons has led to ``life extension programs'' that produce weapons that differ in some ways from the originals. Outdated and changing facilities pose difficulties for life-extension, surveillance, and dismantlement efforts. A variety of factors can make it a challenge to recruit, develop, and retain outstanding people with the skills and experience that are needed to form the foundation of a credible deterrent. These and other issues will be discussed in the framework of proposals to reduce and perhaps eliminate nuclear weapons.

  4. Warhead politics: Livermore and the competitive system of nuclear weapon design

    Energy Technology Data Exchange (ETDEWEB)

    Francis, Sybil [Massachusetts Inst. of Technology (MIT), Cambridge, MA (United States)

    1995-06-01

    From the 1950s onward, US evolved a two-laboratory system to design, develop, and test nuclear weapons. LANL (New Mexico) dates from World War II. The founding in 1952 of LLNL in California effectively established the two-laboratory system. Despite essentially identical missions, LANL and LLNL adopted different strategies and approaches to the development of nuclear weapons. This thesis looks to their joint history for an explanation of this and consequent questions (how did the two-laboratory system originate and evolve? how did it function? what impact did it have on nuclear weapons development?) The incentives and constraints that shaped laboratory strategies and outputs was determined by military demand for nuclear weapons, an informal mandate against laboratory duplication, congressional support for competition, and Livermore`s role as the ``second lab.`` This thesis discusses the laboratories` role in the arms race, organizational strategies for coping with changing political environments, dynamics of technological innovation, and the leverage of policymakers over large organizations.

  5. 15 CFR 710.6 - Relationship between the Chemical Weapons Convention Regulations and the Export Administration...

    Science.gov (United States)

    2010-01-01

    ... INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS GENERAL INFORMATION AND OVERVIEW OF THE CHEMICAL WEAPONS CONVENTION REGULATIONS (CWCR) § 710.6 Relationship between the Chemical Weapons Convention Regulations and the Export Administration Regulations, the International...

  6. Multidepot UAV Routing Problem with Weapon Configuration and Time Window

    Directory of Open Access Journals (Sweden)

    Tianren Zhou

    2018-01-01

    Full Text Available In recent wars, there is an increasing trend that unmanned aerial vehicles (UAVs are utilized to conduct military attacking missions. In this paper, we investigate a novel multidepot UAV routing problem with consideration of weapon configuration in the UAV and the attacking time window of the target. A mixed-integer linear programming model is developed to jointly optimize three kinds of decisions: the weapon configuration strategy in the UAV, the routing strategy of target, and the allocation strategy of weapons to targets. An adaptive large neighborhood search (ALNS algorithm is proposed for solving the problem, which is tested by randomly generated instances covering the small, medium, and large sizes. Experimental results confirm the effectiveness and robustness of the proposed ALNS algorithm.

  7. US and Russia face urgent decisions on weapons plutonium

    International Nuclear Information System (INIS)

    Hileman, B.

    1994-01-01

    Surplus plutonium poses a ''clear and present danger to national and international security,'' warns a National Academy of Sciences (NAS) study released in January, titled ''The Management and Disposition of Excess Weapons Plutonium.'' Over the past few years, many different methods of disposing of plutonium have been proposed. They range from shooting it into the Sun with missiles, to deep-seabed disposal, to fissioning it within a new generation of nuclear reactors. The NAS report rejects most of the methods suggested so far, but does recommend pursuing two of the options. One is to incorporate the plutonium in mixed-oxide fuel, a mixture of plutonium and uranium oxides, and use it to fuel commercial nuclear reactors. The other is to mix the plutonium with high-level waste and molten glass and mold the resulting material into large glass logs for eventual geologic disposal. Both are discussed here. The panel that wrote the NAS study is a standing committee called the Committee on International Security ampersand Arms Control. It suggests steps that should be taken now to guard supplies of plutonium removed from weapons. One step is bilateral US-Russian monitoring of warhead dismantlement. Others include setting up secure interim storage for the fissile materials and establishing an international monitoring system to verify the stockpiles and ensure that materials are not withdrawn for use in new weapons. The panel also urges Russia to stop producing fissile weapons materials and both countries to commit a very large fraction of their plutonium and highly enriched uranium from dismantled weapons to nonaggressive uses. The US and Russia have already made initial moves to accomplish these goals but have not fully implemented any of them

  8. Western Option - Disarmament of Russian Weapon Plutonium

    International Nuclear Information System (INIS)

    Tveiten, B.; Petroll, M.R.

    2002-01-01

    The Western Option concept describes an approach to the conversion of weapon-grade plutonium from Russian nuclear warheads under the special aspects of meeting the criteria of irreversible utilization. Putting this concept of plutonium conversion into non-weapon-grade material into effect would make a major contribution to improving security worldwide. This study is based on an agreement between the Russian Federation and the United States of America concluded in September 2000. It provides for the conversion of 34 t of weapon-grade plutonium in each of the two states. This goal is also supported by other G8 countries. While the United States performs its part of the agreement under its sole national responsibility, the Russian program needs financial support by Western states. Expert groups have pointed out several options as a so-called basic scenario. The funds of approx. US Dollar 2 billion required to put them into effect have not so far been raised. The Western Option approach described in this contribution combines results of the basic scenario with other existing experience and with technical solutions available for plutonium conversion. One of the attractions of the Western Option lies in its financial advantages, which are estimated to amount to approx. US Dollar 1 billion. (orig.) [de

  9. Ionitriding of Weapon Components

    Science.gov (United States)

    1974-01-01

    and documented tho production sequences required for the case- hardening of AISI 4140 and Nitralloy 13514 steels. Determination of processina...depths were established experimentally for Nitralloy 135M and for AISI 4140 steels. These steels are commonly used for the manufacture of nitrlded...weapons components. A temperature of 050F, upper limit for lonitrlding, was selected for the Nitralloy 135M to keep treatment times short. Since AISI 4140

  10. Current and potential technologies for the detection of radionuclide signatures of proliferation (R and D efforts)

    International Nuclear Information System (INIS)

    Perkins, R.W.; Wogman, N.A.

    1993-03-01

    A country with the goal of developing nuclear weapons could pursue their ambition in several ways. These could range from the purchase or theft of a weapon or of the principal weapons components to a basic development program which may independently produce all the materials and components which are necessary. If the latter approach were pursued, there would be many signatures of such an effort and the more definitive of these include the actual materials which would be produced in each phase of the fuel cycle/weapons production process. By identifying the more definitive signatures and employing appropriate environmental sampling and analysis techniques for their observation, including imaging procedures, it should be possible to detect nuclear proliferation processes. Possible proliferation processes include: uranium acquisition through fuel fabrication; uranium enrichment for weapons production; reactor operation for plutonium production; fuel reprocessing for plutonium extraction; weapons fabrication; and uranium 233 production. Each of these are briefly discussed. The technologies for the detection of proliferation signatures which are in concept or research and development phase are: whole air beta counter; radiokrypton/xenon separator/analyzer; I-129 detector; isotope analyzer; deuterium/tritium analysis by IR/Raman spectroscopy and scintillation counting; noble gas daughter analysis; and airborne radionuclide collector/analyzer

  11. Deconstructing the 'energy weapon': Russia's threat to Europe as case study

    International Nuclear Information System (INIS)

    Smith Stegen, Karen

    2011-01-01

    As the likelihood increases that Russia will dominate the European Union's (EU) energy supply, questions have emerged as to whether Russia would use the energy weapon to influence EU member policies and extract political concessions. Countervailing voices argue that Russia would be restricted by interdependence and market forces. As of yet, no one has analyzed the assumptions underlying the energy weapon thesis. Moreover, many scholars examining EU-Russian energy relations rely on non-Russian data. This article seeks to fill several informational and theoretical gaps by including Russian sources and first-hand data and by systematically analyzing the conditions that must obtain before an energy supplier can successfully convert its energy resources into political power. The resulting model can be utilized to analyze the capacity of a supplier to use the energy weapon-whether it be Russia, Iran, Venezuela or any other energy heavyweight-and to assess whether the deployment was successful. Five purported cases of Russian manipulation are analyzed in this article and the findings indicate that, more often than not, Russia failed to achieve political concessions. Looking to the future, the plausibility of Russia using the energy weapon to exploit Europe's dependence, particularly on gas, is also examined. - Highlights: → Energy producers may manipulate supply and prices to coerce political concessions. → Energy weapon model: four conditions must obtain for successful deployment. → Western policy-makers worry about EU dependence on and vulnerability to Russia. → Analysis of five Russian cases reveals tenuous link between weapon use and success. → In medium term, EU can likely avoid yielding political autonomy for supply security.

  12. Weapons-grade nuclear material - open questions of a safe disposal

    International Nuclear Information System (INIS)

    Closs, K.D.; Giraud, J.P.; Grill, K.D.; Hensing, I.; Hippel, F. von; Holik, J.; Pellaud, B.

    1995-01-01

    There are suitable technologies available for destruction of weapons-grade uranium and plutonium. Weapons-grade uranium, consisting to 90% of the isotope U-235, can be diluted with the uranium isotope U-238 to make it non-weapons-grade, but it will then still be a material that can be used as a fuel in civil nuclear reactors. For safe plutonium disposal, several options are under debate. There is for instance a process called ''reverse reprocessing'', with the plutonium being blended with high-level radioactive fission products and then being put into a waste form accepted for direct ultimate disposal. The other option is to convert weapons-grade plutonium into MOX nuclear fuel elements and then ''burn'' them in civil nuclear power reactors. This is an option favoured by many experts. Such fuel elements should stay for a long time in the reactor core in order to achieve high burnups, and should then be ready for ultimate disposal. This disposal pathway offers essential advantages: the plutonium is used up or depleted as a component of reactor fuel, and thus is no longer available for illegal activities, and it serves as an energy source for power generation. (orig./HP) [de

  13. Weapon Simulator Test Methodology Investigation: Comparison of Live Fire and Weapon Simulator Test Methodologies and the Effects of Clothing and Individual Equipment on Marksmanship

    Science.gov (United States)

    2016-09-15

    variables analyzed included shot group tightness, radial error from the center of the target, and multiple time variables. The weapon simulator and...performance could be analyzed to determine if the weapon simulator data aligns with live fire data (i.e., if similar performance decrements appear in the...Analysis and Reporting The Noptel NOS4 software records shot performance data real-time and presents multiple statistical calculations as well as

  14. Method for Derivatization and Detection of Chemical Weapons Convention Related Sulfur Chlorides via Electrophilic Addition with 3-Hexyne.

    Science.gov (United States)

    Goud, D Raghavender; Pardasani, Deepak; Purohit, Ajay Kumar; Tak, Vijay; Dubey, Devendra Kumar

    2015-07-07

    Sulfur monochloride (S2Cl2) and sulfur dichloride (SCl2) are important precursors of the extremely toxic chemical warfare agent sulfur mustard and classified, respectively, into schedule 3.B.12 and 3.B.13 of the Chemical Weapons Convention (CWC). Hence, their detection and identification is of vital importance for verification of CWC. These chemicals are difficult to detect directly using chromatographic techniques as they decompose and do not elute. Until now, the use of gas chromatographic approaches to follow the derivatized sulfur chlorides is not reported in the literature. The electrophilic addition reaction of sulfur monochloride and sulfur dichloride toward 3-hexyne was explored for the development of a novel derivatization protocol, and the products were subjected to gas chromatography-mass spectrometric (GC-MS) analysis. Among various unsaturated reagents like alkenes and alkynes, symmetrical alkyne 3-hexyne was optimized to be the suitable derivatizing agent for these analytes. Acetonitrile was found to be the suitable solvent for the derivatization reaction. The sample preparation protocol for the identification of these analytes from hexane spiked with petrol matrix was also optimized. Liquid-liquid extraction followed by derivatization was employed for the identification of these analytes from petrol matrix. Under the established conditions, the detection and quantification limits are 2.6 μg/mL, 8.6 μg/mL for S2Cl2 and 2.3 μg/mL, 7.7 μg/mL for SCl2, respectively, in selected ion monitoring (SIM) mode. The calibration curve had a linear relationship with y = 0.022x - 0.331 and r(2) = 0.992 for the working range of 10 to 500 μg/mL for S2Cl2 and y = 0.007x - 0.064 and r(2) = 0.991 for the working range of 10 to 100 μg/mL for SCl2, respectively. The intraday RSDs were between 4.80 to 6.41%, 2.73 to 6.44% and interday RSDs were between 2.20 to 7.25% and 2.34 to 5.95% for S2Cl2 and SCl2, respectively.

  15. Building Foundations for Nuclear Security Enterprise Analysis Utilizing Nuclear Weapon Data

    Energy Technology Data Exchange (ETDEWEB)

    Josserand, Terry Michael [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Nuclear Security Enterprise and Cost Analysis; Young, Leone [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Nuclear Security Enterprise and Cost Analysis; Chamberlin, Edwin Phillip [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Nuclear Security Enterprise and Cost Analysis

    2017-09-01

    The Nuclear Security Enterprise, managed by the National Nuclear Security Administration - a semiautonomous agency within the Department of Energy - has been associated with numerous assessments with respect to the estimating, management capabilities, and practices pertaining to nuclear weapon modernization efforts. This report identifies challenges in estimating and analyzing the Nuclear Security Enterprise through an analysis of analogous timeframe conditions utilizing two types of nuclear weapon data - (1) a measure of effort and (2) a function of time. The analysis of analogous timeframe conditions that utilizes only two types of nuclear weapon data yields four summary observations that estimators and analysts of the Nuclear Security Enterprise will find useful.

  16. IFR starts to burn up weapons-grade material

    International Nuclear Information System (INIS)

    Anon.

    1994-01-01

    With funding from different parts of the federal government, the Integral Fast Reactor (IFR) project has survived into fiscal year 1994 and is now embarking on a demonstration of how this type of liquid-metal-cooled reactor (LMR) can be used to burn fuel derived from weapons-grade plutonium. This month, an assembly made from weapons-grade material is to be loaded into Experimental Breeder Reactor-II in Idaho, which is serving as the prototype for the IFR concept. Although FY 1994 work is being funded by the DOE, this particular examination of plutonium burnup is backed by the Department of Defense

  17. The Regulation of the Possession of Weapons at Gatherings | du Toit

    African Journals Online (AJOL)

    The Act also amends the Regulation of Gatherings Act 205 of 1993 to prohibit the possession of any dangerous weapon at a gathering or demonstration. ... (b) possession of dangerous weapons during the participation in any religious or cultural activities or lawful sport, recreation or entertainment or (c) legitimate collection, ...

  18. For a convention for nuclear weapon elimination; Pour une convention d'elimination des armes nucleaires

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2008-03-15

    This document contains two texts linked with the project of an international convention for the elimination of nuclear weapons (the text of this project has been sent to the UN General Secretary and is part of an international campaign to abolish nuclear weapons, ICAN). These two texts are contributions presented in London at the Global Summit for a Nuclear Weapon-free World. The first one calls into question the deterrence principle and the idea of a nuclear weapon-based security. It calls for different forms of action to promote a nuclear weapon-free world. The second text stresses the role and the responsibility of states with nuclear weapons in nuclear disarmament and in the reinforcement of the nuclear non proliferation treaty (NPT)

  19. Homicide-suicide cases in Switzerland and their impact on the Swiss Weapon Law.

    Science.gov (United States)

    Grabherr, Silke; Johner, Stephan; Dilitz, Carine; Buck, Ursula; Killias, Martin; Mangin, Patrice; Plattner, Thomas

    2010-12-01

    Homicide followed by the suicide of the offender is a well-known phenomenon. In most cases, it takes place in the context of the so-called "family tragedies." A recent series of such family tragedies in Switzerland prompted an intensive debate in the media and the Swiss government concerning the Swiss Weapon Law, in particular the requirement to keep personal army weapons at home. The present study of Homicide-Suicide cases in Switzerland, thus focuses on the role played by guns, especially military weapons, in such crimes. We investigated retrospectively 75 cases of Homicide-Suicide, comprising 172 individuals and spanning a period of 23 years in western and central Switzerland. Our results show that if guns were used in 76% of the cases, army weapons were the cause of death in 25% of the total. In 28% of the deaths caused by a gunshot, the exact type of the gun and its origin could not be determined. Thus, the majority of Homicide-Suicide cases in Switzerland involve the use of guns. The exact percentage of cases were military weapons were involved could not be defined. In our opinion, a stricter weapons law, restricting access to firearms, would be a factor of prevention of Homicide- Suicide cases in Switzerland.

  20. The Future of Killing: Ethical and Legal Implications of Fully Autonomous Weapon Systems

    Directory of Open Access Journals (Sweden)

    Martin Lark

    2017-03-01

    Full Text Available Warfare is moving towards full weapon autonomy. Already, there are weapons in service that replace a human at the point of engagement. The remote pilot must adhere to the law and consider the moral and ethical implications of using lethal force. Future fully autonomous weapons will be able to search for, identify and engage targets without human intervention, raising the question of who is responsible for the moral and ethical considerations of using such weapons. In the chaos of war, people are fallible, but they can apply judgement and discretion and identify subtle signals. For example, humans can identify when an enemy wants to surrender, are burying their dead, or are assisting non-combatants. An autonomous weapon may not be so discerning and may not be capable of being programmed to apply discretion, compassion, or mercy, nor can it adapt commanders’ intent or apply initiative. Before fully autonomous weapons use lethal force, it is argued that there needs to be assurances that the ethical implications are understood and that control mechanisms are in place to ensure that oversight of the system is able to prevent incidents that could amount to breaches of the laws of armed conflict.

  1. Evaluation of coping strategies in established rheumatoid arthritis patients: emergence of concealment in an Asian cohort.

    Science.gov (United States)

    Chew, Elizabeth; Griva, Konstadina; Cheung, Peter P

    2016-11-01

    To evaluate coping strategies of Asian RA patients and their associations with health-related quality of life (HRQoL). A cross-sectional sample of patients with established RA was evaluated using measures of coping (Coping in Rheumatoid Arthritis Questionnaire [C-RAQ]; appraisal of coping effectiveness and helplessness), HRQoL (Mental and Physical Components [MCS/PCS] of the Short Form 12v2; Rheumatoid Arthritis Impact of Disease score [RAID]) and clinical/laboratory assessments. Principal component analysis was conducted to identify coping strategies. Multiple linear regression analyses were performed to evaluate the associations between coping strategies and HRQoL outcomes. The study sample comprised 101 patients, 81% female, 72.3% Chinese, mean age 54.2 ± 12.6 years. Five coping strategies were identified: Active problem solving (E = 5.36), Distancing (E = 2.30), Concealment (E = 1.89), Cognitive reframing (E = 1.55) and Emotional expression (E = 1.26). Concealment was consistently associated with PCS (r s = -0.23, P = 0.049), MCS (r s = -0.24, P = 0.04) and RAID (r s = 0.39, P culture-specific. Interventions should tailor psychosocial support needs to address not only coping strategies, but patients' perception of their coping. © 2016 Asia Pacific League of Associations for Rheumatology and John Wiley & Sons Australia, Ltd.

  2. Physical and emotional health problems experienced by youth engaged in physical fighting and weapon carrying.

    Directory of Open Access Journals (Sweden)

    Sophie D Walsh

    Full Text Available Then aims of the current study were 1 to provide cross-national estimates of the prevalence of physical fighting and weapon carrying among adolescents aged 11-15 years; (2 To examine the possible effects of physical fighting and weapon carrying on the occurrence of physical (medically treated injuries and emotional health outcomes (multiple health complaints among adolescents within the theoretical framework of Problem Behaviour Theory. 20,125 adolescents aged 11-15 in five countries (Belgium, Israel, USA, Canada, FYR Macedonia were surveyed via the 2006 Health Behaviour in School Aged Children survey. Prevalence was calculated for physical fighting and weapon carrying along with physical and emotional measures that potentially result from violence. Regression analyses were used to quantify associations between violence/weapon carrying and the potential health consequences within each country. Large variations in fighting and weapon carrying were observed across countries. Boys reported more frequent episodes of fighting/weapon carrying and medically attended injuries in every country, while girls reported more emotional symptoms. Although there were some notable variations in findings between different participating countries, increased weapon carrying and physical fighting were both independently and consistently associated with more frequent reports of the potential health outcomes. Adolescents engaging in fighting and weapon carrying are also at risk for physical and emotional health outcomes. Involvement in fighting and weapon carrying can be seen as part of a constellation of risk behaviours with obvious health implications. Our findings also highlight the importance of the cultural context when examining the nature of violent behaviour for adolescents.

  3. Origins of the Tactical Nuclear Weapons Modernization Program: 1969-1979

    Science.gov (United States)

    Yaffe, Michael David

    On December 12, 1979, the North Atlantic Treaty Organization decided to deploy new long-range theater nuclear forces, Pershing II and Ground-Launched Cruise Missiles. This marked the first major change in NATO's nuclear stockpile since the adoption of the flexible response strategy in 1967. The decision was controversial inasmuch as the Allies disagreed on the fundamental role of nuclear weapons in this strategy and, thereby, the types and number of weapons required for an effective deterrent posture. Europeans generally preferred long-range weapons capable of striking the Soviet Union and small conventional forces while Americans preferred shorter-range nuclear weapons and a stalwart conventional defense. Thus, the December decision is often described as purely politically motivated, in which the Americans reluctantly acquiesced to a European initiative for long-range weapons, prominently expressed by West German Chancellor Helmut Schmidt in 1977. Recently declassified US government documents reveal, however, that long-range missiles were part of a long-term comprehensive nuclear modernization program conceived in the Pentagon under Defense Secretary James Schlesinger during the period of 1973 through 1975, and presented to skeptical European elites who favored arms control negotiations over costly new deployments. This program was motivated as much by changes in the American national security culture as by an increase in the Soviet military threat to Europe. It was grounded on a clear military rationale: "that a feasible and affordable conventional defense is only possible if NATO has modern nuclear forces" that can effectively hold at risk Warsaw Pact ground and air forces throughout the depth of their employment from the inner-German border to the western military districts of the Soviet Union. When the new US administration in 1977 disagreed with the modernization plan and its rationale, opting instead for more conventional forces, the Allies in a reversal of

  4. Defense and Regional Integration: Brazil’s Weapons Industry Case

    OpenAIRE

    Suzeley Kalil Mathias; Eduardo Lucas de Vasconcelos Cruz

    2009-01-01

    This paper works with the relation between technological development and weapons industry in Brazil, pointing out the dependence of this to that one. One reveals as the changes in the commerce of armaments that currently privileges the production of small weapons for exportation. The conclusion is that to keep projects of this nature, is using to advantage the industrial park for the dual production, that is, that one takes care the civil and the military demands. At last, it defends the poss...

  5. Nuclear weapons non proliferation treaty

    International Nuclear Information System (INIS)

    1969-01-01

    Taking into account the devastation that a nuclear war would inflict upon mankind, and the resulting need to do all that is in our power to keep such a tragedy from occuring, as well as to implement measures to safeguard all the peoples' safety, each State that owns nuclear weapons and that is a part of the Treaty pledges not to trade nuclear weapons, other explosive devices nor the control over such instruments to any other entity whatsoever, wether directly or indirectly. Likewise, all States that does not posses any nuclear weaponry and that are part of the Treaty, in turn pledge not to receive from any other entity nuclear weaponry or other explosive devices in trade, wether directly or indirectly; not to manufacture or otherwise acquire this fashion of weaponry and not to request or accept any help whatsoever in the manufacturing of nuclear weaponry or related devices. The present Treaty remains open to the subscription of other countries, on July 26, 1968, with Mexico as one of the signatory countries

  6. Nuclear weapons and conflict transformation: the case of India-Pakistan. - Pbk ed.

    NARCIS (Netherlands)

    Khan, S.

    2010-01-01

    Introduction Part 1: Theory 1. Studies on Conflict Transformation 2. Scholarship on Ramifications of Nuclear Weapons Acquisition 3. Elucidating Conflict Transformation with Nuclear Weapons Part 2: The India-Pakistan Protracted Conflict 4. Life of the Protracted Conflict 5. Introduction of Nuclear

  7. Simulated ICJ Judgment : Revisiting the Lawfulness of the Threat or Use of Nuclear Weapons

    Directory of Open Access Journals (Sweden)

    Winston P. Nagan

    2012-04-01

    Full Text Available The author prepared this simulated judgment at the request of Cadmus editors to demonstrate that there is ample ground for revisiting and revising the landmark 1996 advisory opinion of the ICJ on the legality of nuclear weapons. The ICJ failed to anticipate the proliferation of nuclear weapons, which expands the evolution of the concept of sovereignty, the potential cataclysmic impact of nuclear war on climate change, the multiplication of nuclear-weapon-free zones as evidence of a widespread rejection, mounting evidence regarding the physical and psychological harm, and unwillingness of the nuclear weapons states to fulfill their obligations under the NPT. This article challenges the notion that a few sovereign states should be the sole arbiters of international law and affirms the legitimate claim of the global community of protection from the existential threat posed by nuclear weapons. The use or threat of use undermines foundational values of the international legal system and the specific rules of self-defense and humanitarian law. The contribution seeks to give an accentuated role for the explicit use of the fundamental values of international legal order, in crafting an innovative methodology for the formulation of the judgment. The very existence of these weapons undermines the rights of all of humanity. The ICJ should be moved to categorically declare the use and possession of nuclear weapons a crime against humanity.

  8. Vitamin D and Musculoskeletal Status in Nova Scotian Women Who Wear Concealing Clothing

    Directory of Open Access Journals (Sweden)

    Jo M. Welch

    2012-05-01

    Full Text Available Bone and muscle weakness due to vitamin D deficiency is common among Muslim women who reside in sunny, equatorial countries. The purpose of this study was to determine if living in a northern maritime location additionally disadvantages women who wear concealing clothes. A cross-sectional matched pair design was used to compare women who habitually wore concealing clothing with women who dressed according to western norms. Each premenopausal hijab-wearing woman (n = 11 was matched by age, height, weight and skin tone with a western-dressed woman. Subjects were tested by hand grip dynamometry to assess muscular strength and by quantitative ultrasound at the calcaneus to assess bone status. Nutritional intake was obtained by 24 h recall. Serum 25-hydroxyvitamin D (s-25(OHD status was determined in seven matched pairs. The hijab group had lower s-25(OHD than women who wore western clothes (40 ± 28 vs. 81 ± 32 nmol/L, p = 0.01. Grip strength in the right hand was lower in the hijab-wearing women (p = 0.05 but this appeared to be due to less participation in intense exercise. Bone status did not differ between groups (p = 0.9. Dietary intake of vitamin D was lower in the hijab-wearers (316 ± 353 vs. 601 ± 341 IU/day, p = 0.001. This pilot study suggests that women living in a northern maritime location appear to be at risk for vitamin D insufficiency and therefore should consider taking vitamin D supplements.

  9. Hazards of chemical weapons release during war: new perspectives.

    Science.gov (United States)

    Reutter, S

    1999-01-01

    The two major threat classes of chemical weapons are mustard gas and the nerve agents, and this has not changed in over 50 years. Both types are commonly called gases, but they are actually liquids that are not remarkably volatile. These agents were designed specifically to harm people by any route of exposure and to be effective at low doses. Mustard gas was used in World War I, and the nerve agents were developed shortly before, during, and after World War II. Our perception of the potency of chemical weapons has changed, as well as our concern over potential effects of prolonged exposures to low doses and potential target populations that include women and children. Many of the toxicologic studies and human toxicity estimates for both mustard and nerve agents were designed for the purpose of quickly developing maximal casualties in the least sensitive male soldier. The "toxicity" of the chemical weapons has not changed, but our perception of "toxicity" has. PMID:10585902

  10. Evidence suggesting superiority of visual (verbal) vs. auditory test presentation modality in the P300-based, Complex Trial Protocol for concealed autobiographical memory detection.

    Science.gov (United States)

    Rosenfeld, J Peter; Ward, Anne; Frigo, Vincent; Drapekin, Jesse; Labkovsky, Elena

    2015-04-01

    One group of participants received a series of city name stimuli presented on trials of the Complex Trial Protocol (CTP) version of a P300-based, concealed information test (CIT). Stimuli were presented on alternating trials in either auditory or visual presentation modality. In 1/7 of the trials the participant's home town (probe) repeatedly appeared in a series of 6 other (irrelevant) repeated city names. In both modalities, probe stimuli produced larger P300s than irrelevant stimuli. Visual stimuli produced shorter behavioral reaction times and P300 latencies, as well as larger P300 probe amplitudes, probe-irrelevant amplitude differences, and individual diagnostic accuracies than the same stimuli presented in the auditory modality. Possible reasons for these effects are discussed, and subject to discussed limitations, the applied conclusion reached is that in all CITs, visual presentation of stimuli, if feasible, should be preferentially used. Copyright © 2015 Elsevier B.V. All rights reserved.

  11. Detection of dim targets in multiple environments

    Science.gov (United States)

    Mirsky, Grace M.; Woods, Matthew; Grasso, Robert J.

    2013-10-01

    The proliferation of a wide variety of weapons including Anti-Aircraft Artillery (AAA), rockets, and small arms presents a substantial threat to both military and civilian aircraft. To address this ever-present threat, Northrop Grumman has assessed unguided threat phenomenology to understand the underlying physical principles for detection. These principles, based upon threat transit through the atmosphere, exploit a simple phenomenon universal to all objects moving through an atmosphere comprised of gaseous media to detect and track the threat in the presence of background and clutter. Threat detection has rapidly become a crucial component of aircraft survivability systems that provide situational awareness to the crew. It is particularly important to platforms which may spend a majority of their time at low altitudes and within the effective range of a large variety of weapons. Detection of these threats presents a unique challenge as this class of threat typically has a dim signature coupled with a short duration. Correct identification of each of the threat components (muzzle flash and projectile) is important to determine trajectory and intent while minimizing false alarms and maintaining a high detection probability in all environments.

  12. External Second Gate, Fourier Transform Ion Mobility Spectrometry: Parametric Optimization for Detection of Weapons of Mass Destruction

    Directory of Open Access Journals (Sweden)

    Edward E. Tarver

    2004-03-01

    Full Text Available Abstract: Ion mobility spectrometry (IMS is recognized as one of the most sensitive and robust techniques for the detection of narcotics, explosives and chemical warfare agents. IMS is widely used in forensic, military and security applications. Increasing threat of terrorist attacks, the proliferation of narcotics, Chemical Weapons Convention (CWC treaty verification as well as humanitarian de-mining efforts have mandated that equal importance be placed on the time required to obtain results as well as the quality of the analytical data. [1] In this regard IMS is virtually unrivaled when both speed of response and sensitivity have to be considered. [2] The problem with conventional (signal averaging IMS systems is the fixed duty cycle of the entrance gate that restricts to less than 1%, the number of available ions contributing to the measured signal. Furthermore, the signal averaging process incorporates scan-to-scan variations that degrade the spectral resolution contributing to misidentifications and false positives. With external second gate, Fourier Transform ion mobility spectrometry (FT-IMS the entrance gate frequency is variable and can be altered in conjunction with other data acquisition parameters (scan time and sampling rate to increase the spectral resolution to reduce false alarms and improve the sensitivity for early warning and contamination avoidance. In addition, with FT-IMS the entrance gate operates with a 50% duty cycle and so affords a seven-fold increase in sensitivity. Recent data on high explosives are presented to demonstrate the parametric optimization in sensitivity and resolution of our system.

  13. Scope for nuclear weapon-free zone in central and eastern Europe

    International Nuclear Information System (INIS)

    Pande, Savita

    1998-01-01

    The idea of a Central Europe free of nuclear weapons has its roots, of course, in the end of the cold war and the break-up of the former Union. These historical developments created the necessary conditions for the Lisbon Protocol, the successful withdrawal of all nuclear weapons from Belarus, Ukraine, and Kazakhstan as well as these countries' accession to the Non-Proliferation Treaty. It is admitted that even before these steps had been achieved, Belarus had put forward the nuclear-free zone initiative at the United Nations General Assembly in 1991. Like all the other nuclear weapon-free zones, existing or potential, a proposal for such a zone entails that it be analysed in the context of its political environment, regional specificity as well as the role, and implications of the relevant outside powers. These include Warsaw Pact dissolution and its impact on control of tactical nuclear weapons as well as the North Atlantic Treaty Organisation (NATO's) expansion eastwards. It is equally important to look at the issue in the context of its history, or, in other words, the past attempts

  14. WEAPONS COMPLEX OF RUSSIAN SERVING TATARS IN XV-XVII TH CENTURIES

    Directory of Open Access Journals (Sweden)

    Б А Илюшин

    2014-12-01

    Full Text Available The article considers the issue of the offensive and defensive armament of the serving Tatars of the Moscow state in the XV-XVIIth centuries, its research degree in the national historiography, the opportunities and prospects of its enhanced studying. The serving Tatars were one of the categories of the Moscow state nobility, which is reflected, first of all, in written sources. The weapons complex of Russian serving Tatars included minimal armour. European sources do not mention armour and helms or shield. But noble Tatars could have costly armour of many types that were used in that epoch by peoples of Eastern Europe and Middle East - Russians, Persians, Turks. The basic weapons of the serving Tatars were bows and arrows. In the close combat they were using sabres, and (rarely spears. The fire weapon was not used by the serving Tatars (or they used it very rarely and it was not characteristic for their weapons complex, because it was ineffective in their tactics. The serving Tatars were light mobile horse archers that preferred battles of long-distance.

  15. TH : ACTIO~ AT ZOUT()A~S[)RIFTf

    African Journals Online (AJOL)

    with Martini-Henry rifles with the result that a position cannot be successfully concealed.' That soldiers should in 1914 still be using an obsolete weapon and black powder cartrid- ges may occasion surprise; but it is a little- known fact that Defence Rifle Associations, to which the men of the Rustenburg Commando belonged ...

  16. Long-term retrievability and safeguards for immobilized weapons plutonium in geologic storage

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, P.F. [Univ. of California, Berkeley, CA (United States)

    1996-05-01

    If plutonium is not ultimately used as an energy source, the quantity of excess weapons plutonium (w-Pu) that would go into a US repository will be small compared to the quantity of plutonium contained in the commercial spent fuel in the repository, and the US repository(ies) will likely be only one (or two) locations out of many around the world where commercial spent fuel will be stored. Therefore excess weapons plutonium creates a small perturbation to the long-term (over 200,000 yr) global safeguard requirements for spent fuel. There are details in the differences between spent fuel and immobilized w-Pu waste forms (i.e. chemical separation methods, utility for weapons, nuclear testing requirements), but these are sufficiently small to be unlikely to play a significant role in any US political decision to rebuild weapons inventories, or to change the long-term risks of theft by subnational groups.

  17. Long-term retrievability and safeguards for immobilized weapons plutonium in geologic storage

    International Nuclear Information System (INIS)

    Peterson, P.F.

    1996-01-01

    If plutonium is not ultimately used as an energy source, the quantity of excess weapons plutonium (w-Pu) that would go into a US repository will be small compared to the quantity of plutonium contained in the commercial spent fuel in the repository, and the US repository(ies) will likely be only one (or two) locations out of many around the world where commercial spent fuel will be stored. Therefore excess weapons plutonium creates a small perturbation to the long-term (over 200,000 yr) global safeguard requirements for spent fuel. There are details in the differences between spent fuel and immobilized w-Pu waste forms (i.e. chemical separation methods, utility for weapons, nuclear testing requirements), but these are sufficiently small to be unlikely to play a significant role in any US political decision to rebuild weapons inventories, or to change the long-term risks of theft by subnational groups

  18. The threat of nuclear terrorism: Nuclear weapons or other nuclear explosive devices

    International Nuclear Information System (INIS)

    Maerli, Morten Bremer

    2001-01-01

    Full text: Conventional weaponry and tactics are likely to remain the primary terrorist means for a definitive majority of sub-national groups. No non-state actors have ever deployed or used a nuclear device. However, recent developments in international terrorism may point in the direction of future terrorist uses of weapons of mass destruction, including nuclear devices. Some terrorist groups with a high international profile have showed disturbing interests in acquiring nuclear weapon capabilities. As the 'terrorist nuclear weapon standards' are likely to be lower than the strict requirements for traditional state nuclear weapons, technical barriers should not be considered sufficient to avoid future nuclear terrorist violence. Preventing any extremist group from achieving their goals of large-scale nuclear killing is likely best done by preventing the access to fissile materials through state compliances to rigorous standards of Material Protection, Control and Accountability (MPC and A). (author)

  19. Turkey's response to threats of weapons of mass destruction

    OpenAIRE

    Al, Guray.

    2001-01-01

    Unlike most of its NATO allies, Turkey did not emerge from the Cold War with enhanced security. The acquisition of weapons of mass destruction (WMD) and ballistic missiles by its neighbors in the Middle Eastâ Iran, Iraq and Syriaâ creates a serious security concern for Turkey. This thesis analyzes the numerous threats posed to Turkey by its neighborsα nuclear, chemical and biological weapons programs and their ballistic missiles. It evaluates Turkeyαs defense options to counter these thre...

  20. Monitoring non-proliferation of weapons of mass destruction: Can regional CBMs play a role?

    International Nuclear Information System (INIS)

    Sood, R.

    1994-01-01

    The experience of regional Confidence Building Measures (CBM), has only limited applicability for tackling proliferation of weapons of mass destruction. Where the international norm has developed as in the case of biological and chemical weapons, through international disarmament treaties, regional initiatives can strengthen this norm. Where a norm is less well-founded, regional initiatives are not likely to succeed. Specifically, with regard to nuclear weapons, consensus on negotiations for a comprehensive test ban treaty and a convention for prohibition of production of fissile materials for nuclear weapons purposes and explosive devices is a positive development. Successful conclusion of these universal and verifiable treaties will go a long way to strengthening the international norm against proliferation. Two other measures are critical - a development of a non-use assurance and commencement of multilateral nuclear disarmament negotiations among all five nuclear weapon States. If the international community witnesses improvement in these areas, regional negotiations will be stimulated. Therefore, the primary focus should be on developing an international norm to eliminate weapons of mass destruction. Regional efforts will take their cue from these international norms and would result in CBMs that are consistent with the international norm

  1. Cargo/Weapons Elevator Land Based Engineering Site

    Data.gov (United States)

    Federal Laboratory Consortium — The Cargo and Weapons Facility consists of a suite of full scale and component test facilities contiguously located in building 77H. The site was constructed in 1987...

  2. Correcting environmental problems facing the nuclear weapons complex

    International Nuclear Information System (INIS)

    Rezendes, V.S.

    1990-06-01

    This report discusses DOE's efforts to correct the environmental problems facing the nuclear weapons complex. It focuses on three main points. First, the weapons complex faces a variety of serious and costly environmental problems. Second, during the past year, DOE has made some important changes to its organization that should help change its management focus from one that emphasizes materials production to one that more clearly focuses on environmental concerns. Third, because resolution of DOE's environmental problems will require considerable resources during a period of budgetary constraints, it is imperative that DOE have internal controls in place to ensure that resources are spent efficiently

  3. The singular weapon. What remains from the atomic age?; Die Singulaere Waffe. Was bleibt vom Atomzeitalter?

    Energy Technology Data Exchange (ETDEWEB)

    Eisenbart, Constanze (ed.) [Forschungsstaette der Evangelischen Studiengemeinschaft (FEST), Heidelberg (Germany)

    2012-07-01

    The book contains the following contributions: Why do we talk about the atomic age? The language of the atomic myth - comments to a protestant debate. Nuclear singularity between fiction and reality. Only one can get through: military singularity of nuclear weapons. Physical singularity of nuclear weapons. Nuclear weapons test and fall-out. Quantitative disarmament and qualitative rearmament. Do mini nukes neutralize the singularity? The vulnerability of the industrial society by the nuclear electromagnetic momentum. Nuclear weapons as national status symbol - the example of India. The general regulations of international laws and the singularity of nuclear weapons. The construction of normative singularity - development and change of the nuclear taboo.

  4. Health and environmental effects of nuclear weapons

    International Nuclear Information System (INIS)

    1993-01-01

    This report briefly reviews previous WHO work on the health consequences of nuclear war and concentrates on current information about the effects of nuclear weapons on health, and related environmental problems. 15 refs

  5. Policy and technical issues for international safeguards in nuclear weapons states

    International Nuclear Information System (INIS)

    Markin, J.T.; Stanbro, W.D.

    1994-01-01

    Expansion of international safeguards into the military and commercial fuel cycles of the nuclear weapons states (NWS) -- the subject of previous proposals in international safeguards discussions and of studies in the safeguards literature -- has been given impetus by recent US government initiatives for safeguards on excess weapons materials and a verified fissile materials production cutoff. These proposals, if implemented, would have implications on the safeguards objectives, approaches, and technologies that are traditionally employed in international safeguards. This paper examines the modifications and innovations that might be required to the current international safeguards regime in meeting these proposed new roles. Although the examples given are in the context of the US materials and facilities, many of the conclusions are valid for other NWS. None of the statements in this paper represent official US position on policy for international safeguards in weapons states. Instead, the purpose is to identify policy and technical issues and to offer, where possible, options for their resolution. This paper limits consideration to the potential role of the IAEA in verifying these proposed initiatives for declared facilities, recognizing that there may also be a role for bilateral, multilateral, or regional verification regimes. Indeed, in some cases verification of weapons materials may be more appropriate for a bilateral arrangement. Because traditional IAEA safeguards may not be admissible for weapons materials, the concept of ''transparency'' is suggested as a less intrusive alternative providing some confidence that materials are as declared

  6. Nuclear weapons industry

    International Nuclear Information System (INIS)

    Bertsch, K.A.; Shaw, L.S.

    1984-01-01

    This unique study was written specifically as a reference source for institutional investors concerned about the threat posed to their stock portfolios by the debate over nuclear arms production. The authors focus their analysis on the 26 leading companies in the field. The perspective is neutral and refreshing. Background information on strategic policy, arms control and disarmament, and the influence of the industry on defense policy and the economy is presented rationally. The study also discusses the economic significance of both the conversion from military to civilian production and nuclear freeze initiatives. An appendix contains a fact-filled guide to nuclear weapon systems

  7. Courtesy stigma: A concealed consternation among caregivers of people affected by leprosy.

    Science.gov (United States)

    Dako-Gyeke, Mavis

    2018-01-01

    This study explored experiences of courtesy stigma among caregivers of people affected by leprosy. Using a qualitative research approach, twenty participants were purposively selected and in-depth interviews conducted. The interviews were audio-recorded, transcribed, and analyzed to identify emerging themes that addressed objectives of the study. The findings indicated that caregivers of people affected by leprosy experienced courtesy stigma. Evidence showed that fear of contagion underpinned caregivers' experiences, especially in employment and romantic relationships. In addition, participants adopted different strategies (disregarding, concealment, education, faith-based trust) to handle courtesy stigma. The findings demonstrate that psychosocial support and financial assistance to caregivers are necessary considerations for attainment of effective care for people affected by leprosy. Copyright © 2017 Elsevier Ltd. All rights reserved.

  8. A nuclear-weapon-free world. Report on working group 1

    International Nuclear Information System (INIS)

    1998-01-01

    The stages of nuclear material management are reviewed in respect to dismantlement of nuclear weapons, disposal of weapon-grade fissile materials and cut-off of their production as well as START I and II reduction which are underway. Separate chapters are dealing with the comprehensive test ban treaty, verification, control and regulation in this matter, and the advisory opinion of the International Court of Justice, Canberra Commission, the ABM USA-Soviet Treaty

  9. Defense and Regional Integration: Brazil’s Weapons Industry Case

    Directory of Open Access Journals (Sweden)

    Suzeley Kalil Mathias

    2009-06-01

    Full Text Available This paper works with the relation between technological development and weapons industry in Brazil, pointing out the dependence of this to that one. One reveals as the changes in the commerce of armaments that currently privileges the production of small weapons for exportation. The conclusion is that to keep projects of this nature, is using to advantage the industrial park for the dual production, that is, that one takes care the civil and the military demands. At last, it defends the possibility of the defense industry works as mechanism of regional integration.

  10. Nuclear-weapon-free zones in the Asia Pacific region

    International Nuclear Information System (INIS)

    Yamada, Eiji

    1997-01-01

    The Review and Extension Conference of the Parties to the Non-Proliferation Treaty decided on the indefinite extension of the Treaty, and adopted two documents 'principles and Objectives for Nuclear Non-Proliferation and Disarmament' and 'Strengthening the Review Process for the Treaty'. In the former document, the Conference encourages the establishment of nuclear-weapon-free zones, on the conviction that such zones will enhance global and regional peace and security. Besides the Rarotonga Treaty, ASEAN countries plan to establish a nuclear-weapon-free zone in the South-East Asia

  11. Making Weapons for the Terracotta Army

    Directory of Open Access Journals (Sweden)

    Marcos Martinón-Torres

    2011-10-01

    Full Text Available The Terracotta Army of the First Emperor of China is one of the most emblematic archaeological sites in the world. Many questions remain about the logistics of technology, standardisation and labour organisation behind the creation of such a colossal construction in just a few decades over 2,000 years ago. An ongoing research project co-ordinated between the UCL Institute of Archaeology and the Emperor Qin Shihang's Terracotta Army Museum is beginning to address some of these questions. This paper outlines some results of the typological, metric, microscopic, chemical and spatial analyses of the 40,000 bronze weapons recovered with the Terracotta Warriors. Thanks to a holistic approach developed specifically for this project, it is possible to reveal remarkable aspects of the organisation of the Qin workforce in production cells, of the standardisation, efficiency and quality-control procedures employed, and of the sophisticated technical knowledge of the weapon-makers.

  12. Nuclear power and nuclear weapons proliferation

    International Nuclear Information System (INIS)

    Anon.

    1978-01-01

    An appropriate non-proliferation treaty should not discriminate among the non-weapon states, but should seek a cooperative approach with all countries seeking nuclear power and willing to accept international safeguards. Near-term proliferation problems, represented by nations already on the threshold of weapon capability, should not be confused with the long-term problem of world-wide nuclear development. The first can be handled with incentives and disincentives imposed on specific countries, while the latter involves the distribution of plutonium on the basis of alternative fuel cycles. To retain world leadership, U.S. efforts along these lines should be to encourage a dialogue between suppliers and recipients and to coordinate the economic and security issues of its own non-proliferation and foreign policies. One option is a U.S. commitment to a multinational fuel storage and reprocessing facility. Technical evaluation and demonstration of alternative fuel cycles to reach an international consensus would be a parallel activity

  13. Iran's nuclear program - for power generation or nuclear weapons?

    International Nuclear Information System (INIS)

    Kippe, Halvor

    2008-11-01

    This report addresses the development of a nuclear infrastructure in Iran, and assessments are made on the near-term potential this infrastructure might yield of either nuclear power or nuclear arms production. The most significant facilities are treated in a more elaborate fashion, as these are assumed to have key roles in either a true civilian programme, or in the prospect of weapons-grade fissile material production. The future potential capacity for the latter is calculated under certain presumptions, both in the case that Iran focuses its efforts on uranium-based nuclear weapons, and in the case that it should choose the plutonium path to nuclear weapons. All the conclusions and findings in this report are based on technological considerations. This means that social or political assessments have not prevailed, rather the picture of Iran's nuclear programme is drawn through descriptions and assessments of facilities and systems, and their role in the bigger context. Definite conclusions have not been made as to whether Iran's nuclear programme currently is aimed towards nuclear arms or nuclear power. The secrecy surrounding some of the most prominent nuclear sites together with more or less credible allegations of purely weapons-related activities in the past, make it hard not to conclude that Iran until the disclosures in 2002 made as great an effort as it could on its way on developing nuclear weapons covertly. The scope of today's nuclear programme seems, on the other hand, most likely to be in part to help relieve the ever-increasing need for energy, although considerable deficits to this strategy are identified, at the same time as the Iranian people are united in a giant, high-prestige project in defiance of massive international pressure. Adding to this is a much-feared ability to rapidly being able to redirect their nuclear efforts, and develop nuclear arms in perhaps as little as one year. This so-called break-out scenario, where Iran presumably

  14. A nuclear-weapons-free zone in Southeast Asia : problems and prospects

    International Nuclear Information System (INIS)

    Alagappa, M.

    1987-01-01

    Although the idea of a nuclear-weapons-free zone was already recognised in the Kuala Lumpur Declaration of 1971 and has been on the Asean agenda since the late 1970s as a component of the package to realise a Zone of Peace, Freedom and Neutrality in Southeast Asia, the formal initiative to make the region a nuclear-weapons-free zone is of relatively recent origin. The security benefits that are likely to accrue from declaring Southeast Asia nuclear-weapons-free are rather marginal. Benefits, as there are, are in the political and diplomatic realm where the proposed agreement can be used to influence the conduct of international relations which in turn may have the potential to modify the strategic environment of Southeast Asia

  15. Sparse interferometric millimeter-wave array for centimeter-level 100-m standoff imaging

    Science.gov (United States)

    Suen, Jonathan Y.; Lubin, Philip M.; Solomon, Steven L.; Ginn, Robert P.

    2013-05-01

    We present work on the development of a long range standoff concealed weapons detection system capable of imaging under very heavy clothing at distances exceeding 100 m with a cm resolution. The system is based off a combination of phased array technologies used in radio astronomy and SAR radar by using a coherent, multi-frequency reconstruction algorithm which can run at up to 1000 Hz frame rates and high SNR with a multi-tone transceiver. We show the flexible design space of our system as well as algorithm development, predicted system performance and impairments, and simulated reconstructed images. The system can be used for a variety of purposes including portal applications, crowd scanning and tactical situations. Additional uses include seeing through dust and fog.

  16. Shipborne Laser Beam Weapon System for Defence against Cruise Missiles

    OpenAIRE

    J.P. Dudeja; G.S. Kalsey

    2000-01-01

    Sea-skim~ing cruise missiles pose the greatest threat to a surface ship in the present-day war scenario. The convenitional close-in-weapon-systems (CIWSs) are becoming less reliable against these new challenges requiring extremely fast reaction time. Naval Forces see a high energy laser as a feasible andjeffective directed energy weapon against sea-skimming antiship cruise missiles becauseof its .ability to deliver destructive energy at the speed of light on to a distant target. The paper com...

  17. Dangerous deterrent: nuclear weapons proliferation and conflict in South Asia

    International Nuclear Information System (INIS)

    Paul Kapur, S.

    2008-01-01

    This book discusses the acquisition of nuclear weapons by India and Pakistan and its effect on security of the South Asian region. The author uses quantitative analysis to establish the relationship between nuclearization and conventional stability in the region between 1971 and 2002. He shows a positive correlation between nuclear proliferation and conventional instability during these three decades. Thus, this study affirms that nuclear weapons have failed to prevent conflict in South Asia. In fact, they have escalated tensions

  18. Options for the destruction of chemical weapons and management of the associated risks.

    Science.gov (United States)

    Manley, Ron G

    2006-09-01

    The destruction of chemical weapons is a hazardous operation. The degree of hazard posed, however, is not uniform and is dependent on the specific chemical agent and the configuration of the weapon or bulk storage vessel in which it is contained. For example, a highly volatile nerve agent in an explosively configured munition, such as a rocket, poses a very different hazard from that of a bulk storage container of viscous mustard gas. Equally the handling of recovered, often highly corroded, World War (WW)I or WWII chemical munitions will pose a very different hazard from that associated with dealing with modern chemical weapons stored under the appropriate conditions. Over the years, a number of technologies have been developed for the destruction of chemical weapons. Each has its advantages and disadvantages. None of them provide a universal solution to the problem. When assessing options for the destruction of these weapons and the management of the associated risks, therefore, it is important to give due consideration and weight to these differences. To ensure that the destruction technology selected takes due account of them and that the resulting overall risk assessment accurately reflects the actual risks involved.

  19. Nuclear weapons proliferation as a world order problem

    International Nuclear Information System (INIS)

    Falk, R.

    1977-01-01

    World-order concerns have intensified recently in light of mounting evidence that a weapons capability will soon be within easy reach of more and more governments and of certain nongovernmental groupings as well. One reliable source estimates that by 1985 as many as fifty countries could ''produce enough plutonium each year for at least several dozen nuclear explosives.'' In an even more immediate sense, ''economic competition among nuclear suppliers today could soon lead to a world in which twenty or more nations are but a few months from a nuclear weapons force.'' Three developments have created this ''world order'' sense of concern: (1) increased pace of civilian nuclear power deployment globally as a consequence of rising oil prices, unreliability of oil supplies, and reality of dwindling oil reserves in any case; (2) actuality of India's nuclear explosion in May 1974 which demonstrated vividly how any state that pursues a ''civilian'' program can also develop its own weapons capability; and (3) the intensification of competition for international nuclear sales which makes it increasingly evident that nonproliferation goals are no longer compatible with the pursuit of national commercial advantage; essentially, this reality has emerged from a break in the American monopoly over civilian nuclear technology and the willingness of French and German suppliers to provide all elements of the nuclear fuel cycle, including enrichment and reprocessing facilities,to any nation that feels it can afford to buy them; the German-Brazilian deal (worth at least $4 billion) has proven to be the equivalent in the commercial realm of India's ''peaceful'' nuclear explosion. Such developments disclose the alarming prospect that easier access to nuclear technology will make it relatively simple and thus more likely for a beleaguered government or a desperate political actor of any sort to acquire and possibly use nuclear weapons

  20. Violence and weapon carrying in music videos. A content analysis.

    Science.gov (United States)

    DuRant, R H; Rich, M; Emans, S J; Rome, E S; Allred, E; Woods, E R

    1997-05-01

    The positive portrayal of violence and weapon carrying in televised music videos is thought to have a considerable influence on the normative expectations of adolescents about these behaviors. To perform a content analysis of the depictions of violence and weapon carrying in music videos, including 5 genres of music (rock, rap, adult contemporary, rhythm and blues, and country), from 4 television networks and to analyze the degree of sexuality or eroticism portrayed in each video and its association with violence and weapon carrying, as an indicator of the desirability of violent behaviors. Five hundred eighteen videos were recorded during randomly selected days and times of the day from the Music Television, Video Hits One, Black Entertainment Television, and Country Music Television networks. Four female and 4 male observers aged 17 to 24 years were trained to use a standardized content analysis instrument. Interobserver reliability testing resulted in a mean (+/- SD) percentage agreement of 89.25% +/- 7.10% and a mean (+/- SD) kappa of 0.73 +/- 0.20. All videos were observed by rotating 2-person, male-female teams that were required to reach agreement on each behavior that was scored. Music genre and network differences in behaviors were analyzed with chi 2 tests. A higher percentage (22.4%) of Music Television videos portrayed overt violence than Video Hits One (11.8%), Country Music Television (11.8%), and Black Entertainment Television (11.5%) videos (P = .02). Rap (20.4%) had the highest portrayal of violence, followed by rock (19.8%), country (10.8%), adult contemporary (9.7%), and rhythm and blues (5.9%) (P = .006). Weapon carrying was higher on Music Television (25.0%) than on Black Entertainment Television (11.5%), Video Hits One (8.4%), and Country Music Television (6.9%) (P violence (P violence and weapon carrying, which is glamorized by music artists, actors, and actresses.