WorldWideScience

Sample records for conventional warfare

  1. Multi Service Tactics, Techniques, and Procedures for Treatment of Chemical Warfare Agent Casualties and Conventional Military Chemical Injuries

    Science.gov (United States)

    2016-08-02

    Carbon Monoxide 1 B Phosgene 3 B Hydrogen Cyanide 3 B Chlorine 4 A Cyanogen Chloride 4 A Ethylene Oxide 2 C Formaldehyde 2 B Methyl Bromide 3 B...10-7 Chlorine ............................................................................................................ 10-8...especially vulnerable and may be targeted as part of a plan to defeat U.S. force projection. Chemical warfare agents and TICs (such as chlorine , phosgene

  2. Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    Dev Vrat Kamboj

    2006-10-01

    Full Text Available There is a long historic record of use of biological warfare (BW agents by warring countriesagainst their enemies. However, the frequency of their use has increased since the beginningof the twentieth century. World war I witnessed the use of anthrax agent against human beingsand animals by Germans, followed by large-scale field trials by Japanese against war prisonersand Chinese population during world war II. Ironically, research and development in biologicalwarfare agents increased tremendously after the Geneva Protocol, signed in 1925, because ofits drawbacks which were overcome by Biological and Toxin Weapons Convention (BTWC in1972. Biological warfare programme took back seat after the 1972 convention but biologicalagents regained their importance after the bioterrorist attacks of anthrax powder in 2001. In thelight of these attacks, many of which turned out to be hoax, general awareness is required aboutbiological warfare agents that can be used against them. This review has been written highlightingimportant biological warfare agents, diseases caused by them, possible therapies and otherprotection measures.

  3. Roman Warfare

    Directory of Open Access Journals (Sweden)

    D.B. Saddington

    2012-03-01

    Full Text Available

    ROTH, Jonathan P 2009. Roman Warfare. Cambridge: Cambridge University Press. Pbk. R250. ISBN 978-0-521-53726-1.

    Jonathan Roth of San Jose State University, known as an expert on military logistics, has written this attractive Cambridge Introduction to Roman Civilization volume on Roman Warfare. The series is designed for students with no prior knowledge of Roman antiquity. The book comprises an Introduction on Sources and Methods (pp. 1-6 and 15 chapters on Roman warfare from the beginnings to the fall of the Western Empire in AD 476, using a chronological approach. There are 68 illustrations and maps, a Timeline, a Glossary, a Glossary of People, a Bibliography (which includes several websites and an Index.

  4. Governing Warfare

    DEFF Research Database (Denmark)

    Harste, Gorm

      It would seem as though warfare has gotten out of control, not only in Iraq and Afghanistan, but also in Central Africa. The paper outlines the strategic history of politically controlled warfare since the early Enlightenment. The argument is that control is implausible. The idea of control has...... the risks of lacking unity and displays the organisational trap to the fatal political myth of controlled warfare: Does it come from the military organisation system itself, from political ideologies of goal-rational governance, or from the chameleonic logic of wars?  ...... administration. While organisation systems continue to make some kind of political control possible, this is not the case in relation to wars. The organisation system is the in-between that should mediatise politics and war but is not functionally equivalent to just and unjust wars. The paper investigates...

  5. Biological warfare agents.

    Science.gov (United States)

    Pohanka, Miroslav; Kuca, Kamil

    2010-01-01

    Biological warfare agents are a group of pathogens and toxins of biological origin that can be potentially misused for military or criminal purposes. The present review attempts to summarize necessary knowledge about biological warfare agents. The historical aspects, examples of applications of these agents such as anthrax letters, biological weapons impact, a summary of biological warfare agents and epidemiology of infections are described. The last section tries to estimate future trends in research on biological warfare agents.

  6. Organizing for Irregular Warfare: Implications for the Brigade Combat Team

    Science.gov (United States)

    2007-12-01

    Glenn, Russell, John Gordon, Tom Herbert, John Matsumura, Randall Steeb, and Paul Steinberg. Lightning Over Water: Sharpening America’s Light...conventional and unconventional warfare.” Special Warfare Journal, March-April (2007). Hersey , John. A Bell for Adano. New York: Vintage Books

  7. Analysis of chemical warfare agents in organic liquid samples with magnetic dispersive solid phase extraction and gas chromatography mass spectrometry for verification of the chemical weapons convention.

    Science.gov (United States)

    Singh, Varoon; Purohit, Ajay Kumar; Chinthakindi, Sridhar; Goud, Raghavender D; Tak, Vijay; Pardasani, Deepak; Shrivastava, Anchal Roy; Dubey, Devendra Kumar

    2016-05-27

    A simple, sensitive and low temperature sample preparation method is developed for detection and identification of Chemical Warfare Agents (CWAs) and scheduled esters in organic liquid using magnetic dispersive solid phase extraction (MDSPE) followed by gas chromatography-mass spectrometry analysis. The method utilizes Iron oxide@Poly(methacrylic acid-co-ethylene glycol dimethacrylate) resin (Fe2O3@Poly(MAA-co-EGDMA)) as sorbent. Variants of these sorbents were prepared by precipitation polymerization of methacrylic acid-co-ethylene glycol dimethacrylate (MAA-co-EGDMA) onto Fe2O3 nanoparticles. Fe2O3@poly(MAA-co-EGDMA) with 20% MAA showed highest recovery of analytes. Extractions were performed with magnetic microspheres by MDSPE. Parameters affecting the extraction efficiency were studied and optimized. Under the optimized conditions, method showed linearity in the range of 0.1-3.0μgmL(-1) (r(2)=0.9966-0.9987). The repeatability and reproducibility (relative standard deviations (RSDs) %) were in the range of 4.5-7.6% and 3.4-6.2% respectively for organophosphorous esters in dodecane. Limits of detection (S/N=3/1) and limit of quantification (S/N=10/1) were found to be in the range of 0.05-0.1μgmL(-1) and 0.1-0.12μgmL(-1) respectively in SIM mode for selected analytes. The method was successfully validated and applied to the extraction and identification of targeted analytes from three different organic liquids i.e. n-hexane, dodecane and silicon oil. Recoveries ranged from 58.7 to 97.3% and 53.8 to 95.5% at 3μgmL(-1) and 1μgmL(-1) spiking concentrations. Detection of diethyl methylphosphonate (DEMP) and O-Ethyl S-2-diisopropylaminoethyl methylphosphonothiolate (VX) in samples provided by the Organization for Prohibition of Chemical Weapons Proficiency Test (OPCW-PT) proved the utility of the developed method for the off-site analysis of CWC relevant chemicals.

  8. Flying Electronic Warfare Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides NP-3D aircraft host platforms for Effectiveness of Navy Electronic Warfare Systems (ENEWS) Program antiship missile (ASM) seeker simulators used...

  9. Flying Electronic Warfare Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides NP-3D aircraft host platforms for Effectiveness of Navy Electronic Warfare Systems (ENEWS) Program antiship missile (ASM) seeker simulators used...

  10. Defining cyber warfare

    Directory of Open Access Journals (Sweden)

    Dragan D. Mladenović

    2012-04-01

    Full Text Available Cyber conflicts represent a new kind of warfare that is technologically developing very rapidly. Such development results in more frequent and more intensive cyber attacks undertaken by states against adversary targets, with a wide range of diverse operations, from information operations to physical destruction of targets. Nevertheless, cyber warfare is waged through the application of the same means, techniques and methods as those used in cyber criminal, terrorism and intelligence activities. Moreover, it has a very specific nature that enables states to covertly initiate attacks against their adversaries. The starting point in defining doctrines, procedures and standards in the area of cyber warfare is determining its true nature. In this paper, a contribution to this effort was made through the analysis of the existing state doctrines and international practice in the area of cyber warfare towards the determination of its nationally acceptable definition.

  11. Rethinking Defensive Information Warfare

    Science.gov (United States)

    2004-06-01

    electronic warfare, and special information operations. Defensive information operations ensure timely, accurate, and relevant information access...information and information systems. IA, physical security, OPSEC, counter-deception, counter-psyops, CI, EW, and special information operations. Ensure

  12. Biological warfare agents

    Directory of Open Access Journals (Sweden)

    Duraipandian Thavaselvam

    2010-01-01

    Full Text Available The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies.

  13. On the Probability of Predicting and Mapping Traditional Warfare Measurements to the Cyber Warfare Domain

    CSIR Research Space (South Africa)

    Grobler, M

    2014-07-01

    Full Text Available to cyber warfare. This article aims to provide evidence towards the probability of predicting and mapping traditional warfare measurements to the cyber warfare domain. Currently the only way of cyber warfare measurement is located in traditional information...

  14. The Physics of Warfare

    Science.gov (United States)

    Giordano, Gerardo

    2015-01-01

    Recently, I was tasked with the creation and execution of a new themed general education physics class called The Physics of Warfare. In the past, I had used the theme of a class, such as the physics of sports medicine, as a way to create homework and in-class activities, generate discussions, and provide an application to demonstrate that physics…

  15. Hybrid Warfare: the 21st Century Russian Way of Warfare

    Science.gov (United States)

    2017-05-25

    social, military, information, and diplomatic means. Russian information operations are a critical component of their hybrid theory of warfare and...in which NATO discontinues encroaching on Russia’s sphere of influence and in which Russia ascends to regional hegemony .2 Although unsuccessful, this...Russian model of hybrid warfare illuminates several critical innovations to warfare that transpired while the United States was committed to operations

  16. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  17. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  18. Electronic Warfare in Operations

    Science.gov (United States)

    2009-02-25

    through gamma radiation (at the short-wavelength end). It covers wavelengths from thousands of kilometers to a fraction of the size of an atom...INFORMATION FUSION EXCHANGE F-13. The Knowledge and Information Fusion Exchange (sometimes called KnIFE ) is a program sponsored by U.S. Joint Forces...Warfare Analysis Center, 7-9 K–L–M Knowledge and Information Fusion Exchange ( KnIFE ), F-13 lasers, directed energy and, A-7 leadership (element

  19. Modern Maritime Trade Warfare

    Science.gov (United States)

    2013-05-20

    historically established method for conducting maritime trade warfare is Maritime Interdiction Operations ( MIO ). In the context of this paper, the...operating far from friendly shores. Accordingly, this tool would be most useful against nations with less capable navies. An advantage of MIO in...or collateral damage. 6 Large-scale MIO can be resource intensive and time consuming, and the U.S. Navy and Coast Guard have limited ships and

  20. Anti-submarine warfare with continuously active sonar

    NARCIS (Netherlands)

    Vossen, R. van; Beerens, S.P.; Spek, E. van der

    2011-01-01

    Existing surveillance sonar systems for anti-submarine warfare (ASW) use a pulsed sonar deployed at a low duty cycle. Continuously active sonar (CAS) is of special interest since the technique could provide better detection performance than conventional pulsed sonar, and it will provide the operator

  1. Biological warfare, bioterrorism, and biocrime.

    Science.gov (United States)

    Jansen, H J; Breeveld, F J; Stijnis, C; Grobusch, M P

    2014-06-01

    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria or other agents used to cause illness or death in people, but also in animals or plants. It is aimed at creating casualties, terror, societal disruption, or economic loss, inspired by ideological, religious or political beliefs. The success of bioterroristic attempts is defined by the measure of societal disruption and panic, and not necessarily by the sheer number of casualties. Thus, making only a few individuals ill by the use of crude methods may be sufficient, as long as it creates the impact that is aimed for. The assessment of bioterrorism threats and motives have been described before. Biocrime implies the use of a biological agent to kill or make ill a single individual or small group of individuals, motivated by revenge or the desire for monetary gain by extortion, rather than by political, ideological, religious or other beliefs. The likelihood of a successful bioterrorist attack is not very large, given the technical difficulties and constraints. However, even if the number of casualties is likely to be limited, the impact of a bioterrorist attack can still be high. Measures aimed at enhancing diagnostic and therapeutic capabilities and capacities alongside training and education will improve the ability of society to combat 'regular' infectious diseases outbreaks, as well as mitigating the effects of bioterrorist attacks.

  2. Establishing Cyber Warfare Doctrine

    Directory of Open Access Journals (Sweden)

    Andrew M. Colarik

    2012-01-01

    Full Text Available Over the past several decades, advances in technology have transformed communications and the ability to acquire, disseminate, and utilize information in a range of environments. Modern societies and their respective militaries have taken advantage of a robust information space through network-centric systems. Because military and commercial operations have increasingly converged, communication and information infrastructures are now high-priority military objectives in times of war. This article examines the theoretical underpinning of current cyber warfare research, what we have learned so far about its application, and some of the emerging themes to be considered; it also postulates the development of a (national cyber warfare doctrine (CWD. An endeavor of this scale requires lots of considerations and preparation for its development if it is to be cooperatively embraced. This article considers why information technology systems and their supporting infrastructures should be considered legitimate military targets in conflicts, and offers several events that support this supposition. In addition, it identifies the various forms of doctrine that will become the basis for developing a CWD, discusses a CWD's possible components, and proposes a national collaborative and discussion framework for obtaining a nation's stakeholder buy-in for such an endeavor.

  3. The ethics of information warfare

    CERN Document Server

    Floridi, Luciano

    2014-01-01

    This book offers an overview of the ethical problems posed by Information Warfare, and of the different approaches and methods used to solve them, in order to provide the reader with a better grasp of the ethical conundrums posed by this new form of warfare.The volume is divided into three parts, each comprising four chapters. The first part focuses on issues pertaining to the concept of Information Warfare and the clarifications that need to be made in order to address its ethical implications. The second part collects contributions focusing on Just War Theory and its application to the case of Information Warfare. The third part adopts alternative approaches to Just War Theory for analysing the ethical implications of this phenomenon. Finally, an afterword by Neelie Kroes - Vice President of the European Commission and European Digital Agenda Commissioner - concludes the volume. Her contribution describes the interests and commitments of the European Digital Agenda with respect to research for the developme...

  4. Airpower Support to Unconventional Warfare

    Science.gov (United States)

    2009-12-11

    supplies to isolated mountain outposts (Trest 2000, 109). The Helio Couriers operated out of small dirt strips, referred to as lima sites, usually... rosa : The O.S.S. and American espionage. New York: Reynal and Hitchcock. AF Special Operations Command white paper. 2007. USAF irregular warfare...Symposium on the role of airpower in counterinsurgency and unconventional warfare: A brief summary of viewpoints. Santa Monica, CA: The RAND

  5. Military medicine and the ethics of war: British colonial warfare during the Seven Years War (1756-63).

    Science.gov (United States)

    Charters, Erica

    2010-01-01

    This article examines 18th-century European warfare, tracing the first formal codifications of conventions of war, frequently introduced by military physicians and initially regarding the treatment of the sick and wounded. It outlines to what extent these conventions were followed in practice, particularly in the challenging environment of American irregular warfare, with a focus on the most well-known incident of "biological warfare" in the period: the deliberate spread of smallpox by British officers among Amerindians in 1763. More broadly, it demonstrates that the history of military medicine provides a fruitful method with which to uncover assumptions about the ethics of war.

  6. ISIL's Hybrid Warfare in Syria & Iraq

    DEFF Research Database (Denmark)

    Sørensen, Heine

    2016-01-01

    The case study specifically seeks to answer the following problem statement: Does ISIL qualify as an actor using hybrid warfare and if so what characterizes their particular use of this type of warfare? Based on an analysis of ISIL’s warfare from August 2012 to August 2016 the chapter argues, tha...

  7. Optimizing Armed Forces Capabilities for Hybrid Warfare – New Challenge for Slovak Armed Forces

    Directory of Open Access Journals (Sweden)

    Peter PINDJÁK

    2015-09-01

    Full Text Available The paper deals with the optimization of military capabilities of the Slovak Armed Forces for conducting operations in a hybrid conflict, which represents one of the possible scenarios of irregular warfare. Whereas in the regular warfare adversaries intend to eliminate the centers of gravity of each other, most often command and control structures, in irregular conflicts, the center of gravity shifts towards the will and cognitive perception of the target population. Hybrid warfare comprises a thoroughly planned combination of conventional military approaches and kinetic operations with subversive, irregular activities, including information and cyber operations. These efforts are often accompanied by intensified activities of intelligence services, special operation forces, and even mercenary and other paramilitary groups. The development of irregular warfare capabilities within the Slovak Armed Forces will require a progressive transformation process that may turn the armed forces into a modern and adaptable element of power, capable of deployment in national and international crisis management operations.

  8. The ethics of drone warfare

    Directory of Open Access Journals (Sweden)

    Fatić Aleksandar

    2017-01-01

    Full Text Available The paper investigates the compatibility of the modern technologies of warfare, specifically the use of offensive drones, with traditional military ethics and suggests that the new technologies radically change the value system of the military in ways which make large parts of the traditional military ethics inapplicable. The author suggests that Agamben’s concept of ‘effectivity’ through ‘special actions’ which mark one’s belonging to a particular community or profession is a useful conceptual strategy to explore the compatibility of drone warfare with traditional military ethics; this strategy shows mixed results at best.

  9. The Anatomy of Counterinsurgency Warfare

    DEFF Research Database (Denmark)

    Ringsmose, Jens; Pedersen, Kenneth

    Since the beginning of the new millennium, the West has been increasingly involved in a tiresome and rather particular type of conflict: insurgency warfare. The bloody and shocking terrorist attacks on New York and Washington in September 2001 marked the beginning of a new era, and the introducti...

  10. Evolutionary Models of Irregular Warfare

    Science.gov (United States)

    2013-03-01

    G. (2010) Decentralize, adapt and cooperate. Nature 465:292-293. Sagarin, R. (2012) Learning From the Octopus : How Secrets from Nature Can Help Us...because the concepts map on to important features of modern irregular warfare. For example, small-scale behaviors are increasingly thought to

  11. Stuxnet and Cyber-Warfare (1/2)

    CERN Document Server

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic. Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction.   NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  12. Stuxnet and Cyber-Warfare (2/2)

    CERN Document Server

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic.   Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction. The lecturer invites comments via email to Gian.Piero.Siroli@cern.ch NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  13. Conventional Armaments for coming decades .

    Directory of Open Access Journals (Sweden)

    S.K. Salwan

    1997-10-01

    Full Text Available Conventional arnaments have continued to play a decisive role even in the present scenario of nuclear weapons and electronic warfare. As a war-fighting technology, they are low cost, reliable, highly effective and proven in several battlefield situations. With the application of advancements in electronics, materials and manufacturing technologies, computers and propulsion technologies to conventional weapon systems, they are capable of having greater flexibility, lethality , accuracy and effectiveness. This communication gives an overview on advancements in conventional armament systems, emerging trends in weapon technologies and modern enabling technologies for advanced weapon systems.

  14. Sustaining Unconventional Warfare

    Science.gov (United States)

    2013-05-23

    establishment of a similar organization, the Special Project Operations Center ( SPOC ). SPOC adopted SOE’s practice of consolidating requirements and...That success depended largely on coordination between SFHQ personnel and a multitude of conventional force units. SPOC provided a unique capability

  15. MEANS AND METHODS OF CYBER WARFARE

    Directory of Open Access Journals (Sweden)

    Dan-Iulian VOITAȘEC

    2016-06-01

    Full Text Available According to the Declaration of Saint Petersburg of 1868 “the only legitimate object which States should endeavor to accomplish during war is to weaken the military forces of the enemy”. Thus, International Humanitarian Law prohibits or limits the use of certain means and methods of warfare. The rapid development of technology has led to the emergence of a new dimension of warfare. The cyber aspect of armed conflict has led to the development of new means and methods of warfare. The purpose of this paper is to study how the norms of international humanitarian law apply to the means and methods of cyber warfare.

  16. Cyber warfare building the scientific foundation

    CERN Document Server

    Jajodia, Sushil; Subrahmanian, VS; Swarup, Vipin; Wang, Cliff

    2015-01-01

    This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially gove

  17. Roots of Russian Irregular Warfare

    Science.gov (United States)

    2016-12-01

    concluded that the United States has a national policy gap in our own ability to wage “unconventional warfare in the gray zone.”3 That statement...advancing army—few have studied the irregular nature of the campaign waged against Napoleon. Napoleon’s overstretched logistics and the elusiveness of...94 Karl E. Meyer and Shareen Blair Brysac, Tournament of Shadows: The Great Game and the Race for Empire in Central Asia (Washington, DC: Basic

  18. Rethinking Cultural Influences on Warfare

    Science.gov (United States)

    2012-05-17

    militaries turn toward understanding culture as an important corrective action to naive ethnocentrism , but warns about the dangers of... Ethnocentrism (Holmes and Meier, 1979); Robert E. Harkavy and Stephanie G. Neuman, Warfare in the Third World (Palgrave, 2001); more recently, Mary...influence of ethnocentrism and the mirror imaging of our cultural values on to another culture with its own history. Scholars according to John Ferris

  19. Air Power in Irregular Warfare

    Science.gov (United States)

    2012-12-01

    Intelligence, Surveillance, and Reconnaisance IW Irregular Warfare JFC Joint Force Commander JP Joint Publication xii MCP Malayan Communist Party...being or acting in accord with laws , rules, or established custom.”5 Combined with the Clausewitzian definition of war as “an act of violence meant...Quarterly and Defence Journal , October, 1920), accessed March 21, 2012, http://usacac.army.mil/cac2/cgsc/carl/download/csipubs/lawrence.pdf, 17. 22 Bruce

  20. Electronic warfare target location methods

    CERN Document Server

    Poisel, Richard

    2012-01-01

    Describing the mathematical development underlying current and classical methods of geolocating electronic systems that are emitting, this newly revised and greatly expanded edition of a classic Artech House book offers practical guidance in electronic warfare target location. The Second Edition features a wealth of additional material including new chapters on time delay estimation, direction finding techniques, and the MUSIC algorithm. This practical resource provides you with critical design information on geolocation algorithms, and establishes the fundamentals of existing algorithms as a

  1. Russia’s Approach to Cyber Warfare

    Science.gov (United States)

    2016-09-01

    psychological operations, and information operations. • In keeping with traditional Soviet notions of battling constant threats from abroad and within...theorists, is a holistic concept that includes computer network operations, electronic warfare, psychological operations, and information operations.3...that “in the ongoing revolution in information technologies, information and psychological warfare will largely lay the groundwork for victory.”10

  2. The Art of Aerial Warfare

    Science.gov (United States)

    2005-03-01

    the  Strait  of  Gibraltar   from  North  Africa  during  the Spanish Civil War. 11 FAIRCHILD PAPER A Comparison of Aerial Warfare to Land... Hitler , for example, the United States cannot assume that Nazi aggression would have  evaporated  instantly. Although  Hitler himself profoundly affected

  3. WARFARE IN THE INFORMATION AGE

    Directory of Open Access Journals (Sweden)

    Laurian GHERMAN

    2010-01-01

    Full Text Available The paper is focused on changes occurred in military organizations in Information Age. During Industrial Age the military structure of forces evolved according with principles of decomposition, specialization, hierarchy, optimization, deconfliction, centralized planning, and decentralized execution. But now the solutions based upon Industrial Age assumptions and practices will break down and fail in the Information Age. This will happen no matter how well intentioned, hardworking, or dedicated the leadership and the force are. Two key force capabilities needed by Information Age militaries are interoperability and agility. Both interoperability and agility are provided by Network centric warfare theory of war.

  4. Information warfare technologies in political discourse

    Directory of Open Access Journals (Sweden)

    Karpova Anna Yu.

    2016-01-01

    Full Text Available We attempt to examine the technology of «information warfare» in this paper. The dominant theme of the paper is that the outcome of the information warfare is important not only for the future of a state itself but for the future of the world balance of forces. The main task of geopolitical actors in information warfare is to introduce ideas corresponding to their interests into mass consciousness. All participants of political conflicts have common features in technologies of Information warfare. The information anomie is the indicator of the great geopolitical actors’ personified interests on the stage of «information warfare» - the process resulted in destroying the communicative line: report-information understanding and disrupting the social order in society. In this paper authors describe the following Information Warfare technologies: "Political volcano" technology; "SPIN" technology; "Widening media resource" technology; "specific gravity" technology; "Cold War 2.0" technology and Information cleaningup technology. It is assumed that in the future there will be new instructions on applying technologies of information warfare. To impart perspective to the paper we consider examples, opinions and trends.

  5. Grid architecture model of network centric warfare

    Institute of Scientific and Technical Information of China (English)

    Yan Tihua; Wang Baoshu

    2006-01-01

    NCW(network centric warfare) is an information warfare concentrating on network. A global network-centric warfare architecture with OGSA grid technology is put forward, which is a four levels system including the user level, the application level, the grid middleware layer and the resource level. In grid middleware layer, based on virtual hosting environment, a BEPL4WS grid service composition method is introduced. In addition, the NCW grid service model is built with the help of Eclipse-SDK-3.0.1 and Bpws4j.

  6. A Taxonomy of Network Centric Warfare Architectures

    Science.gov (United States)

    2008-01-01

    Distributed Database Theory, an area of Computer Science that has studied information flow in networks extensively ( Ceri & Pelagatti 1984, Mullender 1993...Australian Department of Defence, 2003, Australian Defence Force Network Centric Warfare Roadmap (First Draft), September. Ceri , S. & Pelagatti

  7. Topic modelling in the information warfare domain

    CSIR Research Space (South Africa)

    De Waal, A

    2013-11-01

    Full Text Available In this paper the authors provide context to Topic Modelling as an Information Warfare technique. Topic modelling is a technique that discovers latent topics in unstructured and unlabelled collection of documents. The topic structure can be searched...

  8. A Dialectic for Network Centric Warfare

    Science.gov (United States)

    2005-06-01

    Giffin, 2003; Borgu , 2003; Kaufman, 2004). For example, from a standpoint of Popperian methodological falsificationism (Popper, 1934), Reid and...focused term network-centric warfare has common favor ( Borgu , 2003) despite the organisational decree to use the term ‘network centric warfare...Commonwealth Department of Defence, June. Borgu , A., (2003), “The Challenges and Limitations of Network Centric Warfare”, Presented at NCW: Improving ADF

  9. Finding Lawrence recruiting talent for unconventional warfare

    OpenAIRE

    Mourouzis, Michael G.

    2011-01-01

    Approved for public release; distribution is unlimited. From Francis Marion's guerrilla war against the British to advising the resistance against the Nazis and Japanese, the United States has depended on unconventional warfare (UW) as a component of national defense. Today, the U.S. Army Special Forces (SF) is the premiere unconventional warfare unit in the U.S. military. With a smaller Army and increasing missions, SF must expand its recruiting efforts. This thesis analyzes the recruitme...

  10. Cyber Warfare: New Character with Strategic Results

    Science.gov (United States)

    2013-03-01

    defense ( CND ).”7 Thus cyber warfare is distinguished from cyber criminal acts based upon its coercive nature to attain a strategic end, whereas...CNA and CND . Conceptually, CNA effects “range from disrupting the adversary’s electronic systems and what operations they enable (communications...or self-destruct.”10 The second component of cyber warfare seeks to eliminate or minimize the risk of the first. The role of CND is to defend

  11. UML modelling of network warfare examples

    CSIR Research Space (South Africa)

    Veerasamy, N

    2011-08-01

    Full Text Available , Analysis, Development and Maintenance [6] [12] [13]. Furthermore, Baker and Harris also discuss techniques like Intrusion Prevention, Personnel Security and Security Awareness as part of information security [14] [12]. Moreover, when considering... techniques that are core to information security and to Network Warfare were thus identified. The following summary of the techniques found in Network Warfare is given: Risk Analysis, Intrusion Prevention, Physical Security, Personnel Security, Cyber...

  12. Hybrid Warfare: Implications for CAF Force Development

    Science.gov (United States)

    2014-08-01

    also McCulloh and Johnson who demonstrate throughout their study that context is critical . Indeed, their summary statement for “hybrid warfare theory ...Muhr, eds., Hybrid and Cyber War as Consequences of the Asymmetry, Frankfurt : Peter Lang, 2011, p.95. Interestingly, the CFD Hybrid Warfare Concept...the highest political and military levels. The study of hybrid-type case studies yields the critical lesson that: “leadership is essential to victory

  13. Intrafamily and intragenomic conflicts in human warfare

    Science.gov (United States)

    2017-01-01

    Recent years have seen an explosion of multidisciplinary interest in ancient human warfare. Theory has emphasized a key role for kin-selected cooperation, modulated by sex-specific demography, in explaining intergroup violence. However, conflicts of interest remain a relatively underexplored factor in the evolutionary-ecological study of warfare, with little consideration given to which parties influence the decision to go to war and how their motivations may differ. We develop a mathematical model to investigate the interplay between sex-specific demography and human warfare, showing that: the ecology of warfare drives the evolution of sex-biased dispersal; sex-biased dispersal modulates intrafamily and intragenomic conflicts in relation to warfare; intragenomic conflict drives parent-of-origin-specific patterns of gene expression—i.e. ‘genomic imprinting’—in relation to warfare phenotypes; and an ecological perspective of conflicts at the levels of the gene, individual, and social group yields novel predictions as to pathologies associated with mutations and epimutations at loci underpinning human violence. PMID:28228515

  14. Towards a framework for a network warfare capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available aspects to its network enabled capabilities and functionality (network warfare). Various computer and information security practices form part of network warfare techniques. Whilst various information and security practices are well-known and applied...

  15. [New challenges in the biological weapons convention].

    Science.gov (United States)

    Sissonen, Susanna; Raijas, Tiina; Haikala, Olli; Hietala, Heikki; Virri, Markku; Nikkari, Simo

    2012-01-01

    Microbes and their toxins are biological weapons that can cause disease in humans, animals or plants, and which can be used with hostile intent in warfare and terrorism. Biological agents can be used as weapons of mass destruction and therefore, immense human and social and major economical damage can be caused. Rapid development of life sciences and technologies during the recent decades has posed new challenges to the Biological Weapons Convention. The Convention states that the States Parties to the BWC strive to ensure that the Convention remains relevant and effective, despite changes in science, technology or politics.

  16. Hybrid Warfare: A Military Revolution or Revolution in Military Affairs?

    Science.gov (United States)

    2012-12-14

    warfare intersect and blend to create a new form of warfare. This thesis uses the Williamson Murray and McGregor Knox definitions of Military...irregular warfare intersect and blend to create a new form of warfare. This thesis uses the Williamson Murray and McGregor Knox definitions of...understand new concepts. Douglas C Lovelace. Director Strategic Studies Institute has this insight to offer regarding the importance of

  17. Motivation and requirements for determining a Network Warfare Capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2010-06-01

    Full Text Available to prevent misconceptions, as well as to ensure that the necessary input data is incorporated. They include the following: • The involved parties must grasp the difference between auditing and determining a Network Warfare Capability. It is encouraged... to incorporate the use of auditing in the technique set underlying Network Warfare. • To determine a Network Warfare Capability, assessments of the various techniques that contribute to Network Warfare are necessary. This will incorporate expert opinion...

  18. Warfare has changed - so should have methods: Ammunition and weapon performance induced operational risk and safety issues

    NARCIS (Netherlands)

    Verhagen, T.L.A.; Voorde, M.J. van de

    2010-01-01

    Warfare has changed. Out-of-area operations have increased the awareness that we are unfamiliar with the performance of the current conventional medium and large calibre ammunitions in day-to-day practice. Current ammunition is primarily developed and procured to defeat the traditional ‘steel’

  19. Warfare has changed - so should have methods: Ammunition and weapon performance induced operational risk and safety issues

    NARCIS (Netherlands)

    Verhagen, T.L.A.; Voorde, M.J. van de

    2010-01-01

    Warfare has changed. Out-of-area operations have increased the awareness that we are unfamiliar with the performance of the current conventional medium and large calibre ammunitions in day-to-day practice. Current ammunition is primarily developed and procured to defeat the traditional ‘steel’ targe

  20. Modern sample preparation techniques for gas chromatography-mass spectrometry analysis of environmental markers of chemical warfare agents use

    NARCIS (Netherlands)

    Terzic, O.; de Voogt, P.; Banoub, J.

    2014-01-01

    The chapter introduces problematics of on-site chemical analysis in the investigations of past chemical warfare agents (CWA) events. An overview of primary environmental degradation pathways of CWA leading to formation of chemical markers of their use is given. Conventional and modern sample

  1. Pirates of the Nuclear Age: The Role of U.S. Submarines in Modern Trade Warfare

    Science.gov (United States)

    2016-07-14

    the Department of the Navy. Signature: _____________________ 14 July 2016 ii Contents Page...World War II ,” (U.S. Navy, Office of the Chief of Naval Operations, Submarine Warfare Division, 1999). 2 Geoffrey Till, “A Changing Focus for the...escalation to nuclear war or a major conventional war such as the forcible reunification of Taiwan via a cross-strait invasion. If U.S. national strategic

  2. A Need for Systems Architecture Approach for Next Generation Mine Warfare Capability

    Science.gov (United States)

    2006-09-01

    uncontrolled mining ultimately led to the first Hague convention where 10 Henry Petroski (1992). To Engineer is...Littoral and Mine Warfare, without which I would not have been able to participate in this program. Jon, Henry and Capt. “J” juggling between work, home...Palmer, M. (1992). Guardians of the Gulf. [Photograph], Free Press, New York. Petroski , H (1992). To Engineer is Human: The Role of Failure in

  3. General George Crook’s development as a practitioner of irregular warfare during the Indian wars.

    Science.gov (United States)

    2017-06-09

    continue to prepare, train, and equip for large-scale peer or near-peer conventional warfare, the breadth of the republic’s history teaches that Irregular...considered many of the officers he encountered to be selfish, self- important, and worse yet, out of touch with the realities facing them. They limited...of Cottonwood generally, thereby virtually acknowledging himself whipped by a small party of Indians and leaving our citizens and their property

  4. [The history of biological warfare].

    Science.gov (United States)

    Cohen, Amir; Robenshtok, Eyal; Rotman, Eran; Sagi, Rami

    2002-05-01

    Selected events in the history of biological weapons are highlighted to increase the physician's awareness of this crucial threat. The deliberate use of biological substances originated in antiquity and has pervaded the history of human wars throughout time until the 21th century. The history of biological warfare is difficult to assess because of a number of confounding factors. These include the difficulty in verification of allegation, the use of the threat of this weapon for propaganda purposes, the lack of microbiological or epidemiological data, and the incidence of natural occurring endemic or epidemic diseases during hostilities. Although it may be problematic to verify at times, the use of such weapons has not been limited to national armies or militia. Frustrated civilians, terrorists and even physicians have used biological substances to promote their interests. Today, the biological threat has become more serious. It's potency, cost-effectiveness, and the ability to manufacture and deploy it with little sophistication, or under the semblance of legitimate commercial endeavors, will ensure that biological weapons remain a constant threat to human health.

  5. Agroterrorism, Biological Crimes, and Biological Warfare Targeting Animal Agriculture

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, Terry M.; Logan-Henfrey, Linda; Weller, Richard E.; Kellman, Brian

    2000-04-12

    There is a rising level of concern that agriculture might be targeted for economic sabotage by terrorists. Knowledge gathered about the Soviet Union biological weapons program and Iraq following the Gulf War, confirmed that animals and agricultural crops were targets of bioweapon development. These revelations are particularly disturbing in light of the fact that both countries are States Parties to the Biological and Toxin Weapons Convention that entered into force in 1975. The potential for misusing biotechnology to create more virulent pathogens and the lack of international means to detect unethical uses of new technologies to create destructive bioweapons is of increasing concern. Disease outbreaks, whether naturally occurring or intentionally, involving agricultural pathogens that destroy livestock and crops would have a profound impact on a country's infrastructure, economy and export markets. This chapter deals with the history of agroterrorism, biological crimes and biological warfare directed toward animal agriculture, specifically, horses, cattle, swine, sheep, goats, and poultry.

  6. RELATIONAL APPROACHES REGARDING FOCUSED LOGISTICS IN MODERN WARFARE JOINT OPERATIONS

    Directory of Open Access Journals (Sweden)

    Gheorghe MINCULETE

    2015-10-01

    Full Text Available The military joint operations of the future are characterized by large concentrations of forces and conventional means on the directions that permit the exploitation of the technological superiority and the manifestation of the offensive spirit of the commanders of the joint operation force groups. Having in mind the fact that the relation between the combatant forces and the logistic ones will shift more and more in favour of the latter, the aforementioned operations will be usually supported by modern flexible logistic structures. The constituted force groups will have a significant joint force character, ensuring superior quality of the troops’ combat training, both at individual level and collective level of units and large units. The current article presents innovative aspects of focused logistics, adapted for the modern warfare, which should be designed and achieved in order to increase the operational potential of the joint force groups.

  7. Cognitive systems in electronic warfare

    Science.gov (United States)

    Kulpa, Krzysztof; Szczepankiewicz, Michał; Żywek, Marcin; Malanowski, Mateusz; Misiurewicz, Jacek; Samczyński, Piotr

    2017-04-01

    Electronic warfare (EW) techniques were invented 70 years ago and are still being developed, all the time with a key role played by their operators. However, a human operator responds far too slowly for the on-going needs since to be adequate to current threats the EW system reaction should be within 1 ms or less. Too slow reaction defers an achievement of the objectives, and generally may lead to disclosure of the applied strategy and to waste of resources. Developing the adequate response to the threat is a multifaceted matter that requires considerable experience and knowledge on the one hand, and thorough observation of outcomes of the applied strategy on the other hand. Such action requires the use of not only intelligence but also more complex algorithms for automatic control than the classical ones, and it heavily builds on the experience. It is therefore a cognitive task in its nature, and a human operator acts naturally this way. Consequently, a proper training and experience gained are what really matters. As a result of tests and actions in EW the operator builds his own knowledge base, thus, gains a capability of responding to the known threats in a balanced way. New threats, however, are much more challenging since they should be handled as fast as possible but in a fresh and creative manner. To this end, adapting the algorithms of radar jamming protection for the new conditions of the battlefield is an example of such challenging tasks. At present, such adjustments are done in a long feedback loop when the operator, after recognizing the problem, notifies the equipment manufacturers, and then, their engineers work on required solutions accordingly. Thus, the reaction time is counted in years, not a single milliseconds or seconds. Speeding up the response time is therefore the key issue, and a solution to it would be feasible only when cognitive systems were used. A concept of such cognitive system is presented in this paper.

  8. Looming Threat of Chemical and Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    A.K. Goel

    2016-09-01

    Full Text Available In the recent past, a dramatic shift has been observed in the strategies of warfare from conventional to non-conventional. Now-a-days, traditional power is of less importance than it used to be earlier. Weapons of mass destruction, which comprise of nuclear weapons, and chemical and biological warfare agents, are posing a great peril to the world due to their devastating potential. Though, there are several bilateral as well as multilateral treaties to control the use and proliferation of these weapons, yet the risk of use of such agents by non-state actors cannot be overlooked. Chances of use of chemical and biological agents are more likely than the nuclear weapons. A comparison of nuclear, chemical and biological weapons in terms of technology, cost, signature, effectiveness on protected and un-protected troops shows that chemical and biological weapon programmes require much lower level of technology and cost than the nuclear weapon programme. Further, there is no or least distinctive and readily observable signature in biological weapon programme in comparison to nuclear and chemical weapon facilities. There can be two possibilities of use of these agents in terrorist attacks. First, there is a risk of transfer of material or know-how of these weapons to terrorists for using against the adversaries and second, the risk of these agents being pilfered due to poor security, thereby sabotaging the national security. The International Committee of Red Cross in February 1918 reckoned these agents as ‘barbarous inventions’ that can ‘only be called criminal’.

  9. US Army Special Warfare. Its Origins: Psychological and Unconventional Warfare, 1941-1952

    Science.gov (United States)

    1982-01-01

    sug- F P _ _ 6 PSYCHOLOGICAL WARFARE IN WORLD WAR I! gestion of a single agency which would serve as a clearinghouse for all intelligence, as well as...organizations, communications, demoli- tions, organization and training of civilians for guerrilla warfare, para- chute jumping, and amphibious...General Bolte, Director, P&O, was reluctant to endorse this latter sug- gestion , indicating, "as he had indicated from time to time at other points

  10. Guiding Warfare to Reach Sustainable Peace

    DEFF Research Database (Denmark)

    Vestenskov, David; Drewes, Line

    The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition of develo...

  11. Agricultural Warfare and Bioterrorism using Invasive Species

    Science.gov (United States)

    The chapter on Agricultural Warfare and Bioterrorism using Invasive Species is part of the book titled Pest Management and Phytosanitary Trade Barriers authored by Neil Heather (Australia) and Guy Hallman. The chapter attempts to briefly put the topic into context with phytosanitation. It presents...

  12. Information Warfare Arms Control: Risks and Costs

    Science.gov (United States)

    2006-03-01

    legal system and the modern concept of arms control were able to provide for national and international collective security during the Cold War...information warfare presents many challenges that question their viability. The most significant challenges are to the international legal system , which

  13. Operational advantages of using Cyber Electronic Warfare (CEW) in the battlefield

    Science.gov (United States)

    Yasar, Nurgul; Yasar, Fatih M.; Topcu, Yucel

    2012-06-01

    While cyberspace is emerging as a new battlefield, conventional Electronic Warfare (EW) methods and applications are likely to change. Cyber Electronic Warfare (CEW) concept which merges cyberspace capabilities with traditional EW methods, is a new and enhanced form of the electronic attack. In this study, cyberspace domain of the battlefield is emphazised and the feasibility of integrating Cyber Warfare (CW) concept into EW measures is researched. The SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis method is used to state the operational advantages of using CEW concept in the battlefield. The operational advantages of CEW are assessed by means of its effects on adversary air defense systems, communication networks and information systems. Outstanding technological and operational difficulties are pointed out as well. As a result, a comparison of CEW concept and conventional EW applications is presented. It is concluded that, utilization of CEW concept is feasible at the battlefield and it may yield important operational advantages. Even though the computers of developed military systems are less complex than normal computers, they are not subjected to cyber threats since they are closed systems. This concept intends to show that these closed systems are also open to the cyber threats. As a result of the SWOT analysis, CEW concept provides Air Forces to be used in cyber operations effectively. On the other hand, since its Collateral Damage Criteria (CDC) is low, the usage of cyber electronic attack systems seems to grow up.

  14. Unconventional Warfare: A Mission Metamorphosis for the 21st Century?

    Science.gov (United States)

    2000-06-01

    brigadier general and publish several more noted works on Mao and revolutionary warfare. See Samuel B. Giffith, Mao Tse-Tung on Guerrilla Warfare (New...and propagators of the faith. The bibles (in English translation) are Mao Tse-tung on Guerrilla Warfare by Brigadier General Samuel B. Griffith...Barnett, B. Hugh Tovar , and Richard H. Schultz eds., Special Operations in US Strategy (Washington, D.C.: US Government Printing Office, 1984), 2. 58

  15. Computational models of intergroup competition and warfare.

    Energy Technology Data Exchange (ETDEWEB)

    Letendre, Kenneth (University of New Mexico); Abbott, Robert G.

    2011-11-01

    This document reports on the research of Kenneth Letendre, the recipient of a Sandia Graduate Research Fellowship at the University of New Mexico. Warfare is an extreme form of intergroup competition in which individuals make extreme sacrifices for the benefit of their nation or other group to which they belong. Among animals, limited, non-lethal competition is the norm. It is not fully understood what factors lead to warfare. We studied the global variation in the frequency of civil conflict among countries of the world, and its positive association with variation in the intensity of infectious disease. We demonstrated that the burden of human infectious disease importantly predicts the frequency of civil conflict and tested a causal model for this association based on the parasite-stress theory of sociality. We also investigated the organization of social foraging by colonies of harvester ants in the genus Pogonomyrmex, using both field studies and computer models.

  16. Handbook of toxicology of chemical warfare agents

    CERN Document Server

    2010-01-01

    This groundbreaking book covers every aspect of deadly toxic chemicals used as weapons of mass destruction and employed in conflicts, warfare and terrorism. Including findings from experimental as well as clinical studies, this one-of-a-kind handbook is prepared in a very user- friendly format that can easily be followed by students, teachers and researchers, as well as lay people. Stand-alone chapters on individual chemicals and major topics allow the reader to easily access required information without searching through the entire book. This is the first book that offers in-depth coverage of individual toxicants, target organ toxicity, major incidents, toxic effects in humans, animals and wildlife, biosensors, biomarkers, on-site and laboratory analytical methods, decontamination and detoxification procedures, prophylactic, therapeutic and countermeasures, and the role of homeland security. Presents a comprehensive look at all aspects of chemical warfare toxicology in one reference work. This saves research...

  17. Violence and Warfare in Precontact Melanesia

    Directory of Open Access Journals (Sweden)

    Stephen M. Younger

    2014-01-01

    Full Text Available Levels of interpersonal violence and warfare for 30 Melanesian societies at the time of contact with Europeans are estimated based on ethnographic and historical records. While violence was common in indigenous Melanesia, it was not ubiquitous and some societies experienced extended periods of internal and external peace. Interpersonal violence and warfare were correlated-when one occurred there was a high probability of finding the other. Violence was not dependent on total population. It was, however, higher for population density greater than 50 persons per square kilometer. Violence in Melanesia may have been stimulated by the large number of relatively small polities, many of which competed with one another for prestige and, in some cases, land.

  18. Mapping the Spread of Mounted Warfare

    Directory of Open Access Journals (Sweden)

    Peter Turchin

    2016-12-01

    Full Text Available Military technology is one of the most important factors affecting the evolution of complex societies. In particular, mounted warfare, the use of horse-riders in military operations, revolutionized war as it spread to different parts of Eurasia and Africa during the Ancient and Medieval eras, and to the Americas during the Early Modern period. Here we use a variety of sources to map this spread.

  19. New dimensions of the modern warfare

    Directory of Open Access Journals (Sweden)

    CĂLIN HENTEA

    2008-02-01

    Full Text Available The huge scientific and technologic progress made by mankind during the last century has had an obvious impact on the military phenomenon. It is a common place to say that the present day wars do not look like the previous ones at all. The military are not the same as the one in former days either, whatever their national insignia on various uniforms. Hence, some questions require a clear and imperative answer. How has the contemporary war been changed? How has the 21 Century military prophile evolved? Which is the trigger of all these changes? What are the new concepts of the modern warfare? To all those questions we are trying to get an answer based on our personal experience gained during a couple of NATO missions and on the respective military doctrines and policies. Why both the military and the politicians are trying to avoid the term „war" by placing instead the much more innofensive syntagm of „military operations" and what are the main characteristics of the 3rd Millenium officer? These are some of the topics of this essay. Quite new military concepts experimented by the most powefull armed forces of the world, such as Effect Based Operations Approach, Network Based Warfare, Information Operations and Psychologiocal Operations will be also examined as pillars of the modern warfare.

  20. Working on warfare-related sites. Review after 15 years and perspectives

    Energy Technology Data Exchange (ETDEWEB)

    Schneider, U. [Umweltberatung und Planung, Kassel (Germany)

    2003-07-01

    Fifteen years ago, in 1988, in connection with the Second International TNO/BMFT-Congress for the first time sites contaminated due to armaments production were mentioned, caused by the results of the first systematic investigation of a former explosives production plant in Hessisch Lichtenau. The authors referred to another 72 large chemical armament production plants in the FRG and 39 in the GDR. At the Third International TNO/BMFT-Congress in 1990 the complex of problems were substantiated and at the same time more topics were added. The Federal Government of Germany named the following areas suspected of being warfare-related contaminated sites: former production plants, ammunition depots, defusing sites, demolition areas and firing ranges, disassembly plants and intermediate and final storage plants for conventional and chemical combat agents. Soil, water and air pollution could be caused by the following products: explosives, chemical warfare agents, incendiaries, smoke agents, propellants, additives, primary and waste products and residues from the destruction of combat agents. In 1995 the Federal Environmental Agency (UBA) presented the results of the national survey showing that there are 3240 suspected contaminated sites. In 1995 also began the soil clean-up at the warfare-related contaminated sites Stadtallendorf and Hessisch Lichtenau. 8 respectively 10 years after the beginning of the systematic investigations the first contaminated soil was removed and treated in a thermal plant. In the run-up several R and D projects funded by the Federal Government were carried out (Stadtallendorf: MOSAL = Model Remediation of Contaminated Sites, Hessisch Lichtenau: Joint project Biological Remediation of Warfare-Related Contamination). At these sites basics were worked out and technologies were put to the test which can be used for the remediation of other sites. (orig.)

  1. The Cycle of Warfare - Analysis of an Analytical Model

    DEFF Research Database (Denmark)

    Jensen, Mikkel Storm

    2016-01-01

    The abstract has the title: “The Cycle of Warfare - Analysis of an Analytical Model” The Cycle of Warfare is an analytical model designed to illustrate the coherence between the organization, doctrine and technology of a military entity and the influence of the surrounding society as expressed...

  2. Chemical profiling of chemical warfare agents for forensic purposes

    NARCIS (Netherlands)

    Noort, D.; Reuver, L.P.J. de; Fidder, A.; Tromp, M.; Verschraagen, M.

    2010-01-01

    A program has been initiated towards the chemical profiling of chemical warfare agents, in order to support forensic investigations towards synthesis routes, production sites and suspect chemical suppliers. Within the first stage of the project various chemical warfare agents (VX, sulfur mustard, sa

  3. Dirty Fighting: How to Counter Total Warfare Mentality

    Science.gov (United States)

    2015-06-12

    DIRTY FIGHTING: HOW TO COUNTER TOTAL WARFARE MENTALITY A thesis presented to the Faculty of the U.S. Army Command and...to Counter Total Warfare Mentality Approved by: , Thesis Committee Chair LTC Sandra J. Sanchez, MBA , Member Marlyn R. Pierce...

  4. Built to Outlast: Operational Approaches to Hybrid Warfare

    Science.gov (United States)

    2012-05-17

    second evolutionary generation of warfare incorporating political, economic, social, and technical changes, and maneuver warfare. Much of this concept is...aligns itself with the emerging understanding of the world through nonlinear sciences, epistemological and ontological foundations.308 In this, Unified

  5. Nodes and Codes: The Reality of Cyber Warfare

    Science.gov (United States)

    2012-05-17

    Options ‘Off the Table’ for US Response to Cyber Attacks,” Stars and Stripes, May 8, 2009. 34 Scott Shackelford , “From Nuclear War to Net War...whitepapers/warfare/redefining-role- information-warfare-chinese-strategy_896 (accessed February 18, 2012). Shackelford , Scott. “From Nuclear War to

  6. Combat Simulation Modeling in Naval Special Warfare Mission Planning.

    Science.gov (United States)

    1995-12-01

    This thesis explores the potential role of combat simulation modeling in the Naval Special Warfare mission planning cycle. It discusses methods for...at the tactical level. The thesis concludes by discussing additional applications of combat simulation modeling within the Naval Special Warfare community and makes recommendations for its effective and efficient implementation.

  7. Passive front-ends for wideband millimeter wave electronic warfare

    Science.gov (United States)

    Jastram, Nathan Joseph

    This thesis presents the analysis, design and measurements of novel passive front ends of interest to millimeter wave electronic warfare systems. However, emerging threats in the millimeter waves (18 GHz and above) has led to a push for new systems capable of addressing these threats. At these frequencies, traditional techniques of design and fabrication are challenging due to small size, limited bandwidth and losses. The use of surface micromachining technology for wideband direction finding with multiple element antenna arrays for electronic support is demonstrated. A wideband tapered slot antenna is first designed and measured as an array element for the subsequent arrays. Both 18--36 GHz and 75--110 GHz amplitude only and amplitude/phase two element direction finding front ends are designed and measured. The design of arrays using Butler matrix and Rotman lens beamformers for greater than two element direction finding over W band and beyond using is also presented. The design of a dual polarized high power capable front end for electronic attack over an 18--45 GHz band is presented. To combine two polarizations into the same radiating aperture, an orthomode transducer (OMT) based upon a new double ridge waveguide cross section is developed. To provide greater flexibility in needed performance characteristics, several different turnstile junction matching sections are tested. A modular horn section is proposed to address flexible and ever changing operational requirements, and is designed for performance criteria such as constant gain, beamwidth, etc. A multi-section branch guide coupler and low loss Rotman lens based upon the proposed cross section are also developed. Prototyping methods for the herein designed millimeter wave electronic warfare front ends are investigated. Specifically, both printed circuit board (PCB) prototyping of micromachined systems and 3D printing of conventionally machined horns are presented. A 4--8 GHz two element array with

  8. Textbook of Military Medicine. Part 1. Warfare, Weaponry, and the Casualty. Part 5. Conventional Warfare. Ballistic, Blast, and Burn Injuries

    Science.gov (United States)

    1991-01-01

    submunitions are becoming increasingly common in projection that resembles a butterfly’s wings combat (Figure 1-50). around the detonation site (Figure 1...T.; Phillips, Y. Y III. 1988. Computer modelir.g -. thoracic response to blast. J. Trauma 28:S149-$152. 240 Wing , Chapter 7 THE PHYSICS AND...or postmortem sphenoid , and lacrimal bones on the medial surface of examination unless a retrobulbar hemorrhage has re- the orbital wall. In studies

  9. Hybrid Warfare: Preparing for Future Conflict

    Science.gov (United States)

    2015-02-17

    Fukuyama , Francis . “At the ‘End of History’ Still Stands Democracy.” The Wall Street Journal, 6 June 2014. http://www.wsj.com/articles/at-the-end-of...warfare is cultural instead of political (in the traditional Clausewitzian sense). 15 Hoffman is referring to Francis Fukuyama’s idea of “the end of...history,” as argued in his 1989 essay and subsequent book. Fukuyama first published an essay titled “The End of History” in the National Interest in

  10. Microwave receivers with electronic warfare applications

    CERN Document Server

    Tsui, James

    2005-01-01

    This book by the author of Digital Techniques for Wideband Receivers willbe like no other one on your book shelf as the definitive word on electronicwarfare (EW) receiver design and performance. Whether you are an EWscientist involved in the test and evaluation of EW receivers or a designerof RWR's and other EW-related receivers, Microwave Receivers withElectronic Warfare Applications is a handy reference through which you canperfect your technical art. Lucidly written, this book is a treatise on EWreceivers that is relevant to you if you are just looking for a top-levelinsight into EW receive

  11. Electronic warfare receivers and receiving systems

    CERN Document Server

    Poisel, Richard A

    2014-01-01

    Receivers systems are considered the core of electronic warfare (EW) intercept systems. Without them, the fundamental purpose of such systems is null and void. This book considers the major elements that make up receiver systems and the receivers that go in them.This resource provides system design engineers with techniques for design and development of EW receivers for modern modulations (spread spectrum) in addition to receivers for older, common modulation formats. Each major module in these receivers is considered in detail. Design information is included as well as performance tradeoffs o

  12. Axial Vircator for Electronic Warfare Applications

    Directory of Open Access Journals (Sweden)

    L. Drazan

    2009-12-01

    Full Text Available This paper deals with a high power microwave generator with virtual cathode – vircator in axial release for electronic warfare applications. The classification of directed energy weapons microwave (DEWM is introduced together with basic block diagrams of a particular class of DEWM. In the paper, methods for designing vircator pulsed power supply, axial vircator structure, measurement methods and experimental results are presented. The vircator in electromagnetic ammunition is powered by magneto-cumulative generator and in weapons for defense of objects (WDO, it is powered by Marx generator. The possible applications of a vircator in the DEWM area are discussed.

  13. Environmental chemistry of chemical warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    MacNaughton, M.G.; Brewer, J.H.; Ledbetter-Ferrill, J. [Southwest Research Inst., San Antonio, TX (United States)

    1995-06-01

    This paper summarizes the approach used in the preparation of a Handbook for the Corps of Engineers, Huntsville Division, on the environmental chemistry of chemical warfare agents. The agents GB and HD will be used to illustrate the type of information in the report. Those readers interested in the full report should contact Mr. Arkie Fanning, Huntsville Corps of Engineers at (505) 955-5256. The U.S. Army Corps of Engineers (ACE) has identified approximately 7,200 formerly used defense sites (FUDS) in the United States, some of which are suspected to be contaminated with chemical warfare agents (CWA). The ACE has responsibility for environmental clean-up of FUDS, including site characterization, evaluation and remediation of the site. Thirty-four FUDS and 48 active DOD installations that may contain CWA were identified in an Interim Survey and Analysis Report by the USACMDA Program Manager for Non-Stockpile Chemical Material (NSCM). The chemical agents listed include sulfur mustard (H), lewisite (L), tabun (GA), sarin (GB), VX, hydrogen cyanide (AC), cyanogen chloride (CK), phosgene (CG), BZ, and CS.

  14. [Decontamination of chemical and biological warfare agents].

    Science.gov (United States)

    Seto, Yasuo

    2009-01-01

    Chemical and biological warfare agents (CBWA's) are diverse in nature; volatile acute low-molecular-weight toxic compounds, chemical warfare agents (CWA's, gaseous choking and blood agents, volatile nerve gases and blister agents, nonvolatile vomit agents and lacrymators), biological toxins (nonvolatile low-molecular-weight toxins, proteinous toxins) and microbes (bacteria, viruses, rickettsiae). In the consequence management against chemical and biological terrorism, speedy decontamination of victims, facilities and equipment is required for the minimization of the damage. In the present situation, washing victims and contaminated materials with large volumes of water is the basic way, and additionally hypochlorite salt solution is used for decomposition of CWA's. However, it still remains unsolved how to dispose large volumes of waste water, and the decontamination reagents have serious limitation of high toxicity, despoiling nature against the environments, long finishing time and non-durability in effective decontamination. Namely, the existing decontamination system is not effective, nonspecifically affecting the surrounding non-target materials. Therefore, it is the urgent matter to build up the usable decontamination system surpassing the present technologies. The symposiast presents the on-going joint project of research and development of the novel decontamination system against CBWA's, in the purpose of realizing nontoxic, fast, specific, effective and economical terrorism on-site decontamination. The projects consists of (1) establishment of the decontamination evaluation methods and verification of the existing technologies and adaptation of bacterial organophosphorus hydrolase, (2) development of adsorptive elimination technologies using molecular recognition tools, and (4) development of deactivation technologies using photocatalysis.

  15. Helicopters in Irregular Warfare: Algeria, Vietnam, and Afghanistan

    Science.gov (United States)

    2013-06-13

    the political group associated with the Algerian nationalist independence movement GALAT Groupement d’ Aviation Légère de l’Armée de Terre ...unique from most conflicts because the expeditionary forces’ parent country rarely perceives an existential threat.19 The lack of perceived threat...dominance rarely guarantees success in irregular warfare.22 Instead, success in irregular warfare requires synergy between government and military efforts

  16. Littoral Combat Ship Open Ocean Anti-Submarine Warfare

    Science.gov (United States)

    2014-06-01

    COVERED Capstone 4. TITLE AND SUBTITLE LITTORAL COMBAT SHIP OPEN OCEAN ANTI-SUBMARINE WARFARE 5. FUNDING NUMBERS 6. AUTHOR(S) 311-124O/Team LCS...Life cycle cost LCCE Life cycle cost estimate LCS Littoral combat ship LHA Landing ship, helicopter assault LHD Landing ship, helicopter...is unlimited LITTORAL COMBAT SHIP OPEN OCEAN ANTI- SUBMARINE WARFARE by Team LCS 311-124O June 2014 Capstone Advisors: John Green Dan

  17. Fourth Generation Warfare and Its Impact on the Army

    Science.gov (United States)

    2007-11-02

    In 1989, the authors of an article entitled, "The Changing Face of War: Into the Fourth Generation ," offered a glimpse of the future rooted in the...decline of the West in a world rife with cultural conflicts and the powerful influences of a form of cultural Marxism known as political correctness...were combining in America to create conditions for a new generation of warfare. Their vision included a form of warfare that bypassed the military

  18. The Chinese People’s Liberation Army and Information Warfare

    Science.gov (United States)

    2014-03-01

    information confrontation operations across the elec- tromagnetic spectrum. In doing so, as Dr. Wortzel’s monograph explains, the PLA used innovative means...and in- formation confrontation operations across the electro- magnetic spectrum. As this monograph explains, the PLA used innovative means to...information warfare concepts as a barometer of how the PLA approached the concept, by 2007 the threads of integrated network electronic warfare

  19. Depth vs. breadth: talent management for special warfare

    OpenAIRE

    Krebs, William K.

    2016-01-01

    Approved for public release; distribution is unlimited This thesis presents recommendations for improving officer talent management for Special Warfare units. Success in this complex human domain demands that key planners and commanders of a Special Warfare campaign operate with a long-term perspective, a depth of expertise, and a strong network of relationships. However, on any given day in a U.S. Army Special Forces Group, the preponderance of field grade officers are in their first year...

  20. Naval Special Warfare Injury Prevention and Human Performance Initiative

    Science.gov (United States)

    2012-06-30

    3. DATES COVERED (From - To) 01 JUL 10-30 JUN 12 4. TITLE AND SUBTITLE Naval Special Warfare Group 4 Injury Prevention and Human Performance...from suboptimal biomechanical, musculoskeletal, and physiological characteristics and is further compounded with poor or inadequate nutrition . The...Prescribed by ANSI Std. Z39.18 OFFICE OF NAVAL RESEARCH FINAL TECHNICAL REPORT Naval Special Warfare Injury Prevention and Human Performance

  1. The World War Two Allied Economic Warfare: The Case of Turkish Chrome Sales

    OpenAIRE

    ÖNSOY, Murat

    2009-01-01

    Economic character of "modern warfare" is too important to be underestimated. In the Economic Warfare belligerents attempt to reduce the war capacity of the enemy through various methods. In World War II crushing down the German war production and economy was the main target of the British Ministry of Economic Warfare. For Germany, one of the many ways of overcoming the British Economic Warfare was to trade with the neutral countries that had land connection to the Third Reich. Turkey was one...

  2. Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development

    Science.gov (United States)

    2016-09-01

    ARL-TN-0779 ● SEP 2016 US Army Research Laboratory Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and...Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development by Neal Tesny Sensors and Electron Devices Directorate...TITLE AND SUBTITLE Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development 5a. CONTRACT NUMBER 5b

  3. Numerical simulation of RCS for carrier electronic warfare airplanes

    Directory of Open Access Journals (Sweden)

    Yue Kuizhi

    2015-04-01

    Full Text Available This paper studies the radar cross section (RCS of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carrier electronic warfare airplanes Model A and Model B with weapons were established. Based on the physical optics method and the equivalent electromagnetic flow method, by the use of the RCSAnsys software, the characteristics of carrier electronic warfare airplanes’ RCS under steady and dynamic flights were simulated under the UHF, X, and S radar bands. This paper researches the detection probability of aircraft by radars under the condition of electronic warfare, and completes the mathematical statistical analysis of the simulation results. The results show that: The Model A of carrier electronic warfare airplane is better than Model B on stealth performance and on discover probability by radar detection effectively.

  4. Chemical Warfare Agent Degradation and Decontamination

    Energy Technology Data Exchange (ETDEWEB)

    Talmage, Sylvia Smith [ORNL; Watson, Annetta Paule [ORNL; Hauschild, Veronique [U.S. Environmental Protection Agency; Munro, Nancy B [ORNL; King, J. [U.S. Army Environmental Center

    2007-02-01

    The decontamination of chemical warfare agents (CWA) from structures, environmental media, and even personnel has become an area of particular interest in recent years due to increased homeland security concerns. In addition to terrorist attacks, scenarios such as accidental releases of CWA from U.S. stockpile sites or from historic, buried munitions are also subjects for response planning. To facilitate rapid identification of practical and effective decontamination approaches, this paper reviews pathways of CWA degradation by natural means as well as those resulting from deliberately applied solutions and technologies; these pathways and technologies are compared and contrasted. We then review various technologies, both traditional and recent, with some emphasis on decontamination materials used for surfaces that are difficult to clean. Discussion is limited to the major threat CWA, namely sulfur mustard (HD, bis(2-chloroethyl)sulfide), VX (O-ethyl S-(2-diisopropylaminoethyl) methylphosphonothioate), and the G-series nerve agents. The principal G-agents are GA (tabun, ethyl N,N-dimethylphosphoramidocyanidate), GB (sarin, isopropyl methylphosphonofluoridate), and GD (soman, pinacolyl methylphosphonofluoridate). The chemical decontamination pathways of each agent are outlined, with some discussion of intermediate and final degradation product toxicity. In all cases, and regardless of the CWA degradation pathway chosen for decontamination, it will be necessary to collect and analyze pertinent environmental samples during the treatment phase to confirm attainment of clearance levels.

  5. History of biological warfare and bioterrorism.

    Science.gov (United States)

    Barras, V; Greub, G

    2014-06-01

    Bioterrorism literally means using microorganisms or infected samples to cause terror and panic in populations. Bioterrorism had already started 14 centuries before Christ, when the Hittites sent infected rams to their enemies. However, apart from some rare well-documented events, it is often very difficult for historians and microbiologists to differentiate natural epidemics from alleged biological attacks, because: (i) little information is available for times before the advent of modern microbiology; (ii) truth may be manipulated for political reasons, especially for a hot topic such as a biological attack; and (iii) the passage of time may also have distorted the reality of the past. Nevertheless, we have tried to provide to clinical microbiologists an overview of some likely biological warfare that occurred before the 18th century and that included the intentional spread of epidemic diseases such as tularaemia, plague, malaria, smallpox, yellow fever, and leprosy. We also summarize the main events that occurred during the modern microbiology era, from World War I to the recent 'anthrax letters' that followed the World Trade Center attack of September 2001. Again, the political polemic surrounding the use of infectious agents as a weapon may distort the truth. This is nicely exemplified by the Sverdlovsk accident, which was initially attributed by the authorities to a natural foodborne outbreak, and was officially recognized as having a military cause only 13 years later.

  6. Concepto y fuentes para el estudio de la Information Warfare

    OpenAIRE

    Tramullas Saz, Jesús

    1998-01-01

    En este trabajo se aborda el concepto de Información Warfare, así como las principales definiciones que se han propuesto para el mismo. Se establecen los diferentes tipos de acciones que se inscriben en este ámbito, y se delinean algunas implicaciones para el especialista en información. Como punto de partida para su estudio, se incluyen una selección de fuentes de información sobre el tema objeto de estudio. ABSTRACT: This paper broaches the concept of Information Warfare, as ...

  7. Enhancing Full-Spectrum Flexibility: Striking the Balance to Maximize Air Force Effectiveness in Conventional and Counterinsurgency Operations

    Science.gov (United States)

    2009-04-01

    Judo for Insurgent Warfare ........................................................... 8  Destructive and Constructive Elements of...transform into a conventional force in 1948 leading to their swift defeat in the Greek Civil War. Exploiting Asymmetries:   Judo  for Insurgent

  8. High-temperature superconductivity for avionic electronic warfare and radar systems

    Energy Technology Data Exchange (ETDEWEB)

    Ryan, P.A. [Wright Lab., Wright-Patterson AFB, OH (United States). Avionics Directorate

    1994-12-31

    The electronic warfare (EW) and radar communities expect to be major beneficiaries of the performance advantages high-temperature superconductivity (HTS) has to offer over conventional technology. Near term upgrades to system hardware can be envisioned using extremely small, high Q, microwave filters and resonators; compact, wideband, low loss, microwave delay and transmission lines; as well as, wideband, low loss, monolithic microwave integrated circuit phase shifters. The most dramatic impact will be in the far term, using HTS to develop new, real time threat identification and response strategy receiver/processing systems designed to utilize the unique high frequency properties of microwave and ultimately digital HTS. To make superconductivity practical for operational systems, however, technological obstacles need to be overcome. Compact cryogenically cooled subsystems with exceptional performance able to withstand rugged operational environments for long periods of time need to be developed.

  9. Biological warfare in a historical perspective.

    Science.gov (United States)

    Roffey, R; Tegnell, A; Elgh, F

    2002-08-01

    There are some early examples of biological warfare (BW), but in modern times it was used first for sabotage by Germany during WWI. Development of biological weapons on a military significant scale was initiated in several countries in the period between the world wars. During WWII, several countries had active programs such as the USA, UK, Canada, Germany, Japan and the Soviet Union. It was only Japan that on a fairly large scale used BW. The US program continued until 1969, when President Nixon took a decision to end it in connection with signing the BTWC. The Soviet Union had also continued its program after the war, and this was enhanced after signing the BTWC: in the 1980s the program consisted of around fifty facilities and involved around 60,000 people. The Soviet Union produced and maintained a large stockpile of BW-agents. After the collapse of the Soviet Union, and due to pressure from USA and UK, President Yeltsin issued a decree in 1992 banning continued offensive BW activity. However, there are still concerns of residual activity in Russia. Another program of concern is the Iraqi BW-program. After 10 years of UN inspections that were stopped in 1998, there are still many unanswered questions concerning the BW program. There was also a covert BW-program in South Africa that was terminated around 1993. There have also been a number of allegations of alleged use or possession. In addition, there are indications that 10-12 states are now trying to acquire BW, and this assessment is based on intelligence information, mainly from the USA. For example Iraq, North Korea, Iran, Syria, Sudan and Libya. Another aspect is the strong driving force of technology developments to promote this type of program, opening new risks for future potential military misuse.

  10. Integration and Interoperability of Special Operations Forces and Conventional Forces in Irregular Warfare

    Science.gov (United States)

    2009-06-12

    narco -trafficking, illicit arms dealing, illegal financial transactions); and law enforcement activities focusing on countering irregular...accustomed to working in scenarios and in situations that are very unstructured…Our people will generally come up with a very novel approach of how to solve

  11. Why So Conventional? America’s Propensity to Wage Traditional Large-Scale Warfare

    Science.gov (United States)

    2013-12-01

    that once the nomadic “irregulars” started to live a more sedentary lifestyle , they lost their superior individual talents and unit cohesion that...barrel floated away and exploded prematurely killing two boys who attempted to retrieve it.214 When Washington had the better resources and

  12. Employing U.S. Information Operations Against Hybrid Warfare Threats

    Science.gov (United States)

    2013-03-01

    activities” ( CEMA ), which is a combination of Cyber and Electronic Warfare.115 However, the relationship between cyber and EW must be carefully considered...generating effects by themselves, as well as serving as a delivery means for MISO. The focus of CEMA may be as much to support combat operations

  13. Trends in underwater warfare : From an underwater acoustics perspective

    NARCIS (Netherlands)

    Ort, C.M.; Driessen, F.P.G.

    2002-01-01

    Technological developments concerning underwater systems for Anti Submarine Warfare (ASW) and Mine Counter Measures (MCM) are directed at optimally countering the underwater threat in the near future. Countering the existing underwater threat is already extremely difficult, but there are several tre

  14. Public Discussion of Nuclear Warfare: A Time for Hope.

    Science.gov (United States)

    Cooper, Martha

    Anti-nuclear discourse, which peaked in 1981-82, signaled an emergence of public discourse on the nuclear warfare issue. During the development of the original atomic bomb, public discussion of the issue was severely restricted, but immediately after the bombing of Hiroshima and Nagasaki, discourse on the subject increased. During the Cold War…

  15. Reactivity of Dual-Use Decontaminants with Chemical Warfare Agents

    Science.gov (United States)

    2016-07-01

    decrease the logistical burden associated with transport and storage of decontaminants. The experiments in this study were focused on evaluating...propanediammonium dichloride, isopropanol, inert ingredients/water, hydrogen peroxide, diacetin Decontaminant formulated for chemical warfare agents F...potassium bisulfate, potassium sulfate, dipotassium peroxodisulfate, magnesium carbonate Acidic oxidative chemistry, used for VX laboratory waste

  16. Environmental assessments of sea dumped chemical warfare agents

    DEFF Research Database (Denmark)

    Sanderson, Hans; Fauser, Patrik

    This is a report on the information gathered during work related to sea dumped chemical warfare agents. It mainly reviews the work conducted in relation to the installation of the two Nord Stream gas pipeline from 2008-2012. The focus was on the weight-of-evidence risk assessment of disturbed CWA...

  17. Just War and Postmodern Warfare: A German Case Study

    Science.gov (United States)

    2015-04-01

    Germany’s cognitive dissonance about the importance of military force and counter-insurgency operations in Afghanistan is an uphill battle they are still...1 Summary of Walzer’s Contemporary Just War Theory : ……............................................................2 Summary of...Postmodern Warfare Theory : .......................................................................................5 German Foreign Policy and Military

  18. Ethical Considerations of Computer Network Attack in Information Warfare

    Science.gov (United States)

    2001-01-16

    attack/destruction, and special information operations (SIO). CNA and the other methods of offensive IO represent the incorporation of information...psychological operations, electronic warfare, physical attack and/or destruction, and special information operations, and could include computer network...to computer networks to record information sent over them. 41 special information operations. Information operations that by their sensitive nature

  19. Management information systems for electronic warfare command and decision support

    CSIR Research Space (South Africa)

    Van Niekerk, B

    2015-04-01

    Full Text Available information to allow them to manage their own spectrum, to identify threats, and to deny adversaries’ use of the spectrum. In this paper, the concepts of integrated electronic warfare and spectrum battle management are introduced, and the relevant information...

  20. Improving Professional Development for USAF Electronic Warfare Officers

    Science.gov (United States)

    2012-02-15

    NOTE AIR WAR COLLEGE AIR UNIVERSITY IMPROVING PROFESSIONAL DEVELOPMENT FOR USAF ELECTRONIC WARFARE OFFICERS by Gregory M. Patschke, Col...and planning. Professional development comprises both continuing education and career development. In the US Air Force, the acquisition, space...and cyberspace communities have professional development programs already in place. For the continuing education half of professional development , the

  1. Simulating cyber warfare and cyber defenses: information value considerations

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber

  2. Integrated Assessment Systems for Chemical Warfare Material

    Energy Technology Data Exchange (ETDEWEB)

    A. M. Snyder; D. A. Verrill; G. L. Thinnes; K. D. Watts; R. J. McMorland

    1999-05-27

    The US Army must respond to a variety of situations involving suspect discovered, recovered, stored, and buried chemical warfare materiel (CWM). In some cases, the identity of the fill materiel and the status of the fusing and firing train cannot be visually determined due to aging of the container, or because the item is contained in an over-pack. In these cases, non-intrusive assessments are required to provide information to allow safe handling, storage, and disposal of the materiel. This paper will provide an overview of the integrated mobile and facility-based CWM assessment system prototypes that have been, and are being developed, at the Idaho National Engineering and Environmental Laboratory (INEEL) for the US Army Non-Stockpile Chemical Materiel Project. In addition, this paper will discuss advanced sensors being developed to enhance the capability of the existing and future assessment systems. The Phase I Mobile Munitions Assessment System (MMAS) is currently being used by the Army's Technical Escort Unit (TEU) at Dugway Proving Ground, Utah. This system includes equipment for non-intrusively identifying the munitions fill materiel and for assessing the condition and stability of the fuzes, firing trains, and other potential safety hazards. The system provides a self-contained, integrated command post including an on-board computer system, communications equipment, video and photographic equipment, weather monitoring equipment, and miscellaneous safety-related equipment. The Phase II MMAS is currently being tested and qualified for use by the INEEL and the US Army. The Phase II system contains several new assessment systems that significantly enhance the ability to assess CWM. A facility-based munitions assessment system prototype is being developed for the assessment of CWM stored in igloos at Pine Bluff Arsenal, Arkansas. This system is currently in the design and fabrication stages. Numerous CWM advanced sensors are being developed and tested, and

  3. FOA Information from the Research Institute of Swedish National Defence on Electronic Warfare (FOA Orientar om Electronic Warfare),

    Science.gov (United States)

    1967-01-01

    modified. If it is appears as if the psychological It is hardly likely. however. known that the opponent has a warfare element involved there- that the most...34 . -roadeatla - ".-Rhdar Raa -* * - cldignsl Toi~loieey aft u comunication , ntavigation -ctionl Examples of applications Radar bands FroquaP" UMI 0.1

  4. Bioterrorism and Biological Warfare, from Past to the Present: A classic review

    Directory of Open Access Journals (Sweden)

    Majid Zare Bidaki

    2015-10-01

    Full Text Available Bioterrorism is defined as any terrorist action of intentional release or dissemination of highly pathogenic biological agents, including a variety of microorganisms or biological toxins. With the growing threat of terrorism, is necessary that the potential danger of various microorganisms – as a powerful tool of aggression and threat- to be taken seriously. This review tries to explain the concept of biological weapons and their historical development process with an emphasis on efforts to control the proliferation of these types of weapons over the last century. Potential impact of infectious diseases on people and armed forces was known from since 600 BC. Using the victims of the plague as a weapon in medieval warfare and spread of smallpox as a weapon during the war against the Indians when initially America was discovered, the development of biological weapons during the World War I, World War II and the Cold War, and even since the beginning of the third millennium, all show the strategic importance of pathogenic microorganisms as a deterrent power for the superiority of some governments and cults. Historical attempts to use infectious diseases as biological weapons reveal that the distinction between a natural outbreak of an infectious disease and that of a deliberate biological attack is very difficult. Abusing this characteristic of infectious diseases has made it possible for the purposes of superiority. International agreements to control the development of biological weapons, such as “the 1925 Geneva Protocol” and “the Convention on the Prohibition of the Development, Production and Stockpiling of Biological and Toxic Weapons” have not been able to control the development and using of biological warfare.  The current paper is a classic review (Overview article aiming at increasing the knowledge and awareness of people especially of health authorities and government officials.

  5. Evolution of Unmanned Aerial Warfare: A Historical Look at Remote Airpower - A Case Study in Innovation

    Science.gov (United States)

    2016-06-10

    EVOLUTION OF UNMANNED AERIAL WARFARE: A HISTORICAL LOOK AT REMOTE AIRPOWER—A CASE STUDY IN INNOVATION A thesis presented to...JUN 2016 4. TITLE AND SUBTITLE Evolution of Unmanned Aerial Warfare: A Historical Look at Remote Airpower—A Case Study in Innovation 5a...Warfare: A Historical Look at Remote Airpower—A Case Study in Innovation Approved by: , Thesis Committee Chair John T. Kuehn, Ph.D

  6. Electronic Warfare M-on-N Digital Simulation Logging Requirements and HDF5: A Preliminary Analysis

    Science.gov (United States)

    2017-04-12

    E. Jarvis Electronic Warfare M-on- N Digital Simulation Logging Requirements and HDF5: A Preliminary Analysis Advanced Techniques Branch Tactical...12-04-2017 NRL Memorandum Report Electronic Warfare M-on- N Digital Simulation Logging Requirements and HDF5: A Preliminary Analysis Donald E...ELECTRONIC WARFARE M-ON- N DIGITAL SIMULATION LOGGING REQUIREMENTS AND HDF5: A PRELIMINARY ANALYSIS 1. INTRODUCTION HDF5 technology [Folk] has been

  7. Chemical and biological warfare: General studies. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-10-01

    The bibliography contains citations concerning federally sponsored and conducted studies into chemical and biological warfare operations and planning. These studies cover areas not addressed in other parts of this series. The topics include production and storage of agents, delivery techniques, training, military and civil defense, general planning studies, psychological reactions to chemical warfare, evaluations of materials exposed to chemical agents, and studies on banning or limiting chemical warfare. Other published searches in this series on chemical warfare cover detection and warning, defoliants, protection, and biological studies, including chemistry and toxicology. (Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  8. Chemical and biological warfare: General studies. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-11-01

    The bibliography contains citations concerning federally sponsored and conducted studies into chemical and biological warfare operations and planning. These studies cover areas not addressed in other parts of this series. The topics include production and storage of agents, delivery techniques, training, military and civil defense, general planning studies, psychological reactions to chemical warfare, evaluations of materials exposed to chemical agents, and studies on banning or limiting chemical warfare. Other published searches in this series on chemical warfare cover detection and warning, defoliants, protection, and biological studies, including chemistry and toxicology.(Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  9. Cutaneous reactions in nuclear, biological and chemical warfare

    Directory of Open Access Journals (Sweden)

    Arora Sandeep

    2005-03-01

    Full Text Available Nuclear, biological and chemical warfare have in recent times been responsible for an increasing number of otherwise rare dermatoses. Many nations are now maintaining overt and clandestine stockpiles of such arsenal. With increasing terrorist threats, these agents of mass destruction pose a risk to the civilian population. Nuclear and chemical attacks manifest immediately while biological attacks manifest later. Chemical and biological attacks pose a significant risk to the attending medical personnel. The large scale of anticipated casualties in the event of such an occurrence would need the expertise of all physicians, including dermatologists, both military and civilian. Dermatologists are uniquely qualified in this respect. This article aims at presenting a review of the cutaneous manifestations in nuclear, chemical and biological warfare and their management.

  10. USMC Electronic Warfare 2025: Trading Expertise for Advanced Technology

    Science.gov (United States)

    2011-04-15

    airborne electronic warlare during the transition period away from legacy equipment. EA-6B pilots and Electroilic Countermeasures Officers ( ECMOs ...Electronic Warfare (EW) capability. As an EA-6B Electronic Countenneasures Officer ( ECMO ), I anticipate that both the United States Marine Corps and all... ECMOs . An increased workload for Radio Battalion will have the same effect that the assumption of an additional function of Marine aviation will have on

  11. China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence

    OpenAIRE

    2011-01-01

    This article presents three reasons for states to use cyber warfare and shows that cyberspace is—and will continue to be—a decisive element in China's strategy to ascend in the international system. The three reasons are: deterrence through infiltration of critical infrastructure; military technological espionage to gain military knowledge; and industrial espionage to gain economic advantage. China has a greater interest in using cyberspace offensively than other actors, such as the United St...

  12. Enterprises as Inquiring Systems with Implications for Information Warfare

    Science.gov (United States)

    2014-06-01

    defined as the “integrated employment of the core capabilities of electronic warfare, computer network operations, psychological operations, military...comprehension (also explicitly included in Figure 3). The entire spectrum of deception, psychological operations, and all means to impact human-centered...with the same input data (other than ground truth) via different channels and that data must be consistent within itself. The belief in empiricism to

  13. Wrestling the Bear: The Rise of Russian Hybrid Warfare

    Science.gov (United States)

    2015-04-13

    integrity. Essentially, Russia - and more directly- Vladimir Putin perceive that Russia is in an ideological struggle with the US and Europe. 1 Carl Von...conducted in a hybrid manner, though all the instruments of national power. 31 Though the nearly continuous strategic leadership of Vladimir Putin , Russia ...with a sharp focus on Vladimir Putin ’s strategic leadership, highlights the evolution ofthe Russian brand of hybrid warfare (HW). The analysis also

  14. Beyond Mission Command: Maneuver Warfare for Cyber Command and Control

    Science.gov (United States)

    2015-05-18

    elements with maneuver warfare, mission command’s decentralization of execution through the use of mission-type orders is a more centralized form... decentralized command and control organization will instill an innovative organizational culture. Innovation will be able to freely prosper in an...warfare’s decentralized command and control doctrine to maximize military cyberspace operations. Since the establishment of U.S. Cyber Command in 2009

  15. The Enemy Below: Preparing Ground Forces for Subterranean Warfare

    Science.gov (United States)

    2013-12-01

    can endanger the lives of U.S. forces and render mechanical breaching tools inoperable. Air blowers can be used as a hasty means to ventilate a... Penguin Books, 1996). 179 Tom Mangold, The Tunnels of Cu Chi (New York, NY: Random House, 1985). 147 6. A Historical Analysis of Tunnel Warfare and... Penguin Group, 1996. 157 Lester, W. G., & Ali, A. J. “Underground Combat: Stereophonic Blasting, tunnel Rats, and the Soviet-Afghan War.” Engineer

  16. Russian and Chinese Information Warfare: Theory and Practice

    Science.gov (United States)

    2004-06-01

    Integral neurolinguistic programming •Placing essential programs into the conscious or sub- conscious mind •Subconscious suggestions that modify human...Generators of special rays •Optical systems • Neurolinguistic programming •Computer psychotechnology •The mass media •Audiovisual effects •Special effects...Information Warfare: Theory and Practice 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e

  17. Cyberspace Warfare: A New DoD Core Mission Area

    Science.gov (United States)

    2013-05-01

    states to take note. Cyber issues such as these should be seen in light of the ancient dictum that “a victorious army first wins and then seeks...Examples from ancient Greece, Prussia, and World War II are illustrated to present cases where innovative leaders adapted and modified their methods to...conduct warfare and integrated them into their strategic approach to achieve their desired end states. Alexander the Great conquered Persia in three

  18. Constitution aims to bring an end to health economy warfare.

    Science.gov (United States)

    Harding, Mary-Louise; Martin, Daniel

    2005-02-10

    A rough new constitution is being drawn up for the NHS in a bid to prevent health economies sliding into bitter 'Bradford-style' warfare in the era of foundations trusts and payment by results. The rules of engagement are part of a package of measures designed to rescue some of the government's flagship reforms amid warnings from audit chiefs on the impact of PbR.

  19. Echo chamber and trench warfare dynamics in online debates.

    Science.gov (United States)

    Karlsen, Rune; Steen-Johnsen, Kari; Wollebæk, Dag; Enjolras, Bernard

    2017-06-01

    In this article, we take issue with the claim by Sunstein and others that online discussion takes place in echo chambers, and suggest that the dynamics of online debates could be more aptly described by the logic of 'trench warfare', in which opinions are reinforced through contradiction as well as confirmation. We use a unique online survey and an experimental approach to investigate and test echo chamber and trench warfare dynamics in online debates. The results show that people do indeed claim to discuss with those who hold opposite views from themselves. Furthermore, our survey experiments suggest that both confirming and contradicting arguments have similar effects on attitude reinforcement. Together, this indicates that both echo chamber and trench warfare dynamics - a situation where attitudes are reinforced through both confirmation and disconfirmation biases - characterize online debates. However, we also find that two-sided neutral arguments have weaker effects on reinforcement than one-sided confirming and contradicting arguments, suggesting that online debates could contribute to collective learning and qualification of arguments.

  20. Electronic Warfare:Issues and Challenges for Emitter Classification

    Directory of Open Access Journals (Sweden)

    Manish Gupta

    2011-04-01

    Full Text Available Electronic warfare (EW is an important capability that provides advantage to defence forces over their adversaries. Defence forces gather tactical intelligence through EW sensors, which provide the means to counter hostile actions of enemy forces. Functions of an EW system is threat detection and the area surveillance so as to determine the identity of surrounding emitters. Emitter classification system identifies possible threats by analysing intercepted signals. Problem of identifying emitters based on its intercepted signal characteristics is a challenging problem in electronic warfare studies. Major issues and challenges for emitter classification such as drifting of emitter parameters due to aging, operational characteristic of an emitter, i.e., same emitter can operate on multiple bands and multiple pulse repetition frequencies (PRFs are highlighted. A novel approach based on some well-known statistical methods, e.g., regression analysis, hypothesis testing, and discriminent analysis is proposed. The effectiveness of the proposed approach has been tested over ELINT (Electronic Intelligence data and illustrated using simulation data. The proposed approach can play a solution for wide variety of problems in emitter classification in electronic warfare studies.Defence Science Journal, 2011, 61(3, pp.228-234, DOI:http://dx.doi.org/10.14429/dsj.61.529

  1. Status of dental health in chemical warfare victims: The case of Isfahan, Iran

    Directory of Open Access Journals (Sweden)

    Ahmad Mottaghi

    2012-01-01

    Conclusion: Chemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  2. Metal organic frameworks for the catalytic detoxification of chemical warfare nerve agents

    Energy Technology Data Exchange (ETDEWEB)

    Hupp, Joseph T.; Farha, Omar K.; Katz, Michael J.; Mondloch, Joseph E.

    2017-04-18

    A method of using a metal organic framework (MOF) comprising a metal ion and an at least bidendate organic ligand to catalytically detoxify chemical warfare nerve agents including exposing the metal-organic-framework (MOF) to the chemical warfare nerve agent and catalytically decomposing the nerve agent with the MOF.

  3. Antidotes and treatments for chemical warfare/terrorism agents: an evidence-based review.

    Science.gov (United States)

    Rodgers, G C; Condurache, C T

    2010-09-01

    This article reviews the evidence supporting the efficacy of antidotes used or recommended for the potential chemical warfare agents of most concern. Chemical warfare agents considered include cyanide, vesicants, pulmonary irritants such as chlorine and phosgene, and nerve agents. The strength of evidence for most antidotes is weak, highlighting the need for additional research in this area.

  4. Cyber Warfare: China’s Strategy to Dominate in Cyber Space

    Science.gov (United States)

    2011-06-10

    Revolution.‖ 64Jason Fritz, ―How China will use cyber warfare to leapfrog in military competitiveness,‖ Culture Mandala : The Bulletin of the Centre for East...cyber warfare to leapfrog in military competitiveness.‖ Culture Mandala : The Bulletin of the Centre for East-West Culture and Economic Studies 8 no. 1

  5. The Hague Judgments Convention

    DEFF Research Database (Denmark)

    Nielsen, Peter Arnt

    2011-01-01

    The Hague Judgments Convention of 2005 is the first global convention on international jurisdiction and recognition and enforcement of judgments in civil and commercial matters. The author explains the political and legal background of the Convention, its content and certain crucial issues during...

  6. A short history of biological warfare.

    Science.gov (United States)

    Metcalfe, Neil

    2002-01-01

    Biological weapons have been used in war from the start of recorded history. This article reviews the history of the subject, including the outbreak of the Black Death and the use of smallpox against American Indians. The new science of microbiology was misused from soon after its start and, despite the 1925 Geneva Protocol, the Japanese experimented extensively on prisoners in China. The Allies carried out extensive research during the Second World War, notably the United Kingdom into anthrax on Gruinard Island and the United States into a variety of agents. Despite the 1972 Biological Weapons Convention (BWC), a major programme continued in the former Soviet Union (leading to an accidental outbreak of anthrax). Most recently Iraq was revealed as having an extensive programme, with weaponization of large amounts of various agents, and several terrorists groups have attempted to use biological agents as weapons. Modern developments in biotechnology could lead to even more serious developments, and effective preventive measures, including strengthening of the BWC, are imperative.

  7. Hand-held analyser based on microchip electrophoresis with contactless conductivity detection for measurement of chemical warfare agent degradation products

    Science.gov (United States)

    Duran, Karolina-Petkovic; Zhu, Yonggang; Chen, Chuanpin; Swallow, Anthony; Stewart, Robert; Hoobin, Pam; Leech, Patrick; Ovenden, Simon

    2008-12-01

    This paper reports on the development of a hand-held device for on-site detection of organophosphonate nerve agent degradation products. This field-deployable analyzer relies on efficient microchip electrophoresis separation of alkyl methylphosphonic acids and their sensitive contactless conductivity detection. Miniaturized, low-powered design is coupled with promising analytical performance for separating the breakdown products of chemical warfare agents such as Soman, Sarin and VX . The detector has a detection limit of about 10 μg/mL and has a good linear response in the range 10-300 μg/mL concentration range. Applicability to environmental samples is demonstrated .The new hand-held analyzer offers great promise for converting conventional ion chromatography or capillary electrophoresis sophisticated systems into a portable forensic laboratory for faster, simpler and more reliable on-site screening.

  8. Ultraviolet Raman scattering from persistent chemical warfare agents

    Science.gov (United States)

    Kullander, Fredrik; Wästerby, Pär.; Landström, Lars

    2016-05-01

    Laser induced Raman scattering at excitation wavelengths in the middle ultraviolet was examined using a pulsed tunable laser based spectrometer system. Droplets of chemical warfare agents, with a volume of 2 μl, were placed on a silicon surface and irradiated with sequences of laser pulses. The Raman scattering from V-series nerve agents, Tabun (GA) and Mustard gas (HD) was studied with the aim of finding the optimum parameters and the requirements for a detection system. A particular emphasis was put on V-agents that have been previously shown to yield relatively weak Raman scattering in this excitation band.

  9. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  10. Carbon Nanotubes: Detection of Chemical and Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    Om Kumar

    2008-09-01

    Full Text Available Discovery of carbon nanotubes has great impact on the development of newer methodologies and devicesuseful for the analysis of various types of chemicals. The functionalisation of CNTs with biomolecules relatedto chemical and biological warfare agents makes these useful for the detection of these agents. The detectionsensitivity can be increased manyfold. Various types of chemical and biological sensors were developed usingvarious type of carbon nanotubes as well as nano particles of different metals.Defence Science Journal, 2008, 58(5, pp.617-625, DOI:http://dx.doi.org/10.14429/dsj.58.1684

  11. Women and Warfare in Pre-Colonial Akokoland

    Directory of Open Access Journals (Sweden)

    Olusanya Faboyede

    2013-06-01

    Full Text Available In pre-colonial Akokoland, the most conspicuous fact about its political economy and peace was security challenges and mismanagement through internal and external manipulation. This paper analyses the role of women in warfare in pre-colonial Akokoland as a potential to integrate Akokoland, a multi-cultural community for productive and sustained effort to promote economic development in the region. Thus, the paper is conceptualised on historical objectivity. The paper argues that one of the ways of dealing with the scale of insecurity in the society is to assimilate historical thinking into the intention of the security agents (women warriors.

  12. Chemical and Biological Warfare: Should Rapid Detection Techniques Be Researched To Dissuade Usage? A Review

    Directory of Open Access Journals (Sweden)

    Mark R. Hurst

    2005-01-01

    Full Text Available Chemistry, microbiology and genetic engineering have opened new doorways for the human race to propel itself to a better future. However, there is a darker side to Bioengineering. One element of this is the manufacture and proliferation of biological and chemical weapons. It is clearly in the interest of humankind to prevent the future use of such weapons of mass destruction. Though many agents have been proposed as potential biological and chemical weapons, the feasibility of these weapons is a matter of conjecture. The unpredictable and indiscriminate devastation caused by natural epidemics and hazardous chemicals during wartime without medical treatment should warn humans of the dangers of employing them as weapons. This study argues rapid detection techniques may dissuade future use. Many agents are far less toxic to treatment. A quick response time to most attacks will decrease the chances of serious health issues. The agent will be less effective and discourage the attacker from using the weapon. Fortunately, the Chemical and Biological Weapons Convention (CWCIBWC allows defensive work in the area of biological and chemical weapons. Consequently, the review will discuss history, delivery/dispersal systems and specific agents of the warfare. The study presents current developments in biosensors for toxic materials of defense interest. It concludes with future directions for biosensor development.

  13. Varieties of conventional implicature

    Directory of Open Access Journals (Sweden)

    Eric Scott McCready

    2010-07-01

    Full Text Available This paper provides a system capable of analyzing the combinatorics of a wide range of conventionally implicated and expressive constructions in natural language via an extension of Potts's (2005 L_CI logic for supplementary conventional implicatures. In particular, the system is capable of analyzing objects of mixed conventionally implicated/expressive and at-issue type, and objects with conventionally implicated or expressive meanings which provide the main content of their utterances. The logic is applied to a range of constructions and lexical items in several languages. doi:10.3765/sp.3.8 BibTeX info

  14. The development of immunoassays for detection of chemical warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Lenz, D.E. [Army Medical Research Inst. of Chemical Defense, Aberdeen Proving Ground, MD (United States)

    1995-06-01

    With the advent of enzyme linked immunoabsorbant assays (ELISA) and monoclonal antibodies in the last two decades, there has been considerable effort devoted to the development of antibodies to detect and quantify low molecular weight toxic substances in environmental or biological fluids. Polyclonal antibodies against paraoxon (the toxic metabolite of parathion) were reported as capable of detecting paraoxon in body fluids at a level of 10{sup -9} M ({approximately}260 pg/mL) when used in a competitive inhibition enzyme immunoassay (CIEIA). Monoclonal antibodies developed against a structural analogue of the chemical warfare agent soman were capable of detecting soman in buffer solutions at a level of 10{sup -6} M ({approximately}180 ng/mL). In addition, these antibodies were highly specific for soman even in the presence of its major hydrolysis product. Subsequent studies with antisoman monoclonal antibodies reported an extension of the level of sensitivity to -80 ng/mL. Furthermore these antibodies did not cross react with other chemical warfare nerve agents such as sarin or tabun. In all cases, the time for a confirmatory test was two hours or less. Immunoassays for T-2 micotoxins have also been reported with a minimal detection range of 2 pg/assay to 50 ng/assay for the polyclonal and monoclonal T-2 antibodies respectively. These antibodies offer a sensitive, rapid and low cost approach to the diagnosis or detection of the presence of toxic chemical substances.

  15. Evanescent planar waveguide detection of biological warfare simulants

    Science.gov (United States)

    Sipe, David M.; Schoonmaker, Kenneth P.; Herron, James N.; Mostert, Michael J.

    2000-04-01

    An evanescent planar waveguide Mark 1.5 instrument was used to detect simulants of biological warfare agents; ovalbumin (OV), MS2 bacteriophage, BG, and Erwinia herbicola (EH). Polyclonal tracer antibodies were labeled with the fluorescent dye, Cy5. Discrete bands of polyclonal capture antibodies were immobilized to a polystyrene planar waveguide with molded integral lenses. An ST-6 CCD camera was used for detection. OV. MS2 and BG were detected in a simultaneous 3 by 3 array; with a total of nine measurements within 6 minutes. EH was analyzed in a separate array. Results were evaluate dat the US Army Joint Field Trials V, at the Dugway Proving Grounds. Over a 10 day period, 32 unknown samples were analyzed daily for each simulant. Detection limits: OV 10 ng/ml, MS2 107 pfu/ml, BG 105 cfu/ml. EH was detectable at 5 X 105 cfu/ml. Overall false positives were 3.0 percent. Therefore, the Mark 1.5 instrument, with a parallel array of detectors, evanescent flourescent excitation, and CCD imaging provides for rapid, sensitive, and specific detection of biological warfare agent simulants.

  16. China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence

    Directory of Open Access Journals (Sweden)

    Magnus Hjortdal

    2011-01-01

    Full Text Available This article presents three reasons for states to use cyber warfare and shows that cyberspace is—and will continue to be—a decisive element in China's strategy to ascend in the international system. The three reasons are: deterrence through infiltration of critical infrastructure; military technological espionage to gain military knowledge; and industrial espionage to gain economic advantage. China has a greater interest in using cyberspace offensively than other actors, such as the United States, since it has more to gain from spying on and deterring the United States than the other way around. The article also documents China's progress in cyber warfare and shows how it works as an extension of its traditional strategic thinking and the current debate within the country. Several examples of cyber attacks traceable to China are also presented. This includes cyber intrusions on a nuclear arms laboratory, attacks on defense ministries (including the Joint Strike Fighter and an airbase and the U.S. electric grid, as well as the current Google affair, which has proved to be a small part of a broader attack that also targeted the U.S. Government. There are, however, certain constraints that qualify the image of China as an aggressive actor in cyberspace. Some believe that China itself is the victim of just as many attacks from other states. Furthermore, certain actors in the United States and the West have an interest in overestimating China's capabilities in cyberspace in order to maintain their budgets.

  17. The Geometry of Conventionality

    CERN Document Server

    Weatherall, James Owen

    2013-01-01

    Hans Reichenbach famously argued that the geometry of spacetime is conventional in relativity theory, in the sense that one can freely choose the spacetime metric so long as one is willing to postulate a "universal force field". Here we make precise a sense in which the field Reichenbach defines fails to be a "force". We then argue that there is an interesting and perhaps tenable sense in which geometry is conventional in classical spacetimes. We conclude with a no-go result showing that the variety of conventionalism available in classical spacetimes does not extend to relativistic spacetimes.

  18. The Third World War? In The Cyberspace. Cyber Warfare in the Middle East.

    Directory of Open Access Journals (Sweden)

    Martina

    2014-06-01

    Full Text Available This article aims to provide a brief and comprehensive introduction to the issue of cyber warfare and to display the recent development in this area. Geographically, it focuses on the Middle East region, since the vast majority of the most important recent cyber attacks appeared just in there or were connected to it. The first part of the article tries to define the key notion of cyber warfare, compares it to the standard warfare and presents different types of cyber weapons that are known today. The second part points out examples of the most striking recent cyber attacks and uses them as evidences to demonstrate today's importance and dissemination of cyber warfare. Finally, the article sums up pros and cons of the cyber weapons and, in view of these, predicts a significant increase in their use in any future war conflicts.

  19. Changing the face of cyber warfare with international cyber defense collaboration

    CSIR Research Space (South Africa)

    Grobler, M

    2011-03-01

    Full Text Available of the Government, as well as cyber security and cyber warfare acts and the command and control aspects thereof. The research presented is largely theoretical in nature, focusing on recent events in the public international domain....

  20. Conventional Spinal Anaesthesia

    African Journals Online (AJOL)

    patients scheduled for clcctive unilateral lower limb surgery. ... the conventional group were turned supine immediately after injection. Blood pressure, heart rate, respiratory rate and oxygen .... Characteristic Type of spinal anaesthcsia P-value.

  1. A Better State of War: Surmounting the Ethical Cliff in Cyber Warfare

    Science.gov (United States)

    2014-06-01

    Unlike landmines, for example, that litter historical battlefields to this day, cyber weapons offer a more hygienic approach to warfare. In...institutions have protected civilians from harm through established regulations and norms ranging from merchant shipping protection under the law of...targeted the Laconia, a merchant vessel, in 1942.80 Citizens engaged in cyber warfare, however, may be targeted with commensurate cyber weapons

  2. Electronic Warfare: Rethinking the Importance of Its Role In Military Operations

    Science.gov (United States)

    2016-06-10

    EW mindset changes. 15. SUBJECT TERMS Electronic Warfare, Vulnerability, Military, Threat , Technology, Technological 16. SECURITY...Signature: Kevin nernen, C USAF Corn i e Signatu P er e, , C Directo JointA ancedWarfighting Signature: 10 June 2016 Thesis Advisor: Approved by: School...Electronic warfare support actions taken to identify, locate sources of energy emitted by enemy systems for the purpose of providing threat warning

  3. Understanding the elementary considerations in a network warfare environment: an introductory framework

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available framework. 5.1 Constrains and Implications Several factors can constrain network warfare and have associated consequences. These include the legal issues, ethical dilemmas, technical solutions, financial impact and skill/manpower investment. Logical... the personality traits of an individual. Users will need to balance ethical dilemmas before engaging in offensive network warfare. Computers and network are powerful tools and great harm can be caused with them. Motive, attitude, values, upbringing, experience...

  4. ‘Lest we forget’*: a veteran and son share a ‘warfare tourism’ experience

    OpenAIRE

    Fallon, Paul; Robinson, Peter

    2016-01-01

    Warfare tourism’ represents an increasingly significant dimension of contemporary tourism. This paper provides a fresh perspective on participation in ‘warfare tourism’ by investigating the behaviour and experiences of a living veteran and his son returning to two theatres of war in which the veteran had served in the Royal Navy during the Second World War. Active interviews with the two family members were used to gather rich data regarding the two extended trips, which had been funded by ‘H...

  5. Estimated Chemical Warfare Agent Surface Clearance Goals for Remediation Pre-Planning

    Energy Technology Data Exchange (ETDEWEB)

    Dolislager, Frederick [University of Tennessee, Knoxville (UTK); Bansleben, Dr. Donald [U.S. Department of Homeland Security; Watson, Annetta Paule [ORNL

    2010-01-01

    Health-based surface clearance goals, in units of mg/cm2, have been developed for the persistent chemical warfare agents sulfur mustard (HD) and nerve agent VX as well as their principal degradation products. Selection of model parameters and critical receptor (toddler child) allow calculation of surface residue estimates protective for the toddler child, the general population and adult employees of a facilty that has undergone chemical warfare agent attack.

  6. Narrowing the zone of uncertainty between research and development in biological warfare defense.

    Science.gov (United States)

    Huxsoll, D L

    1992-12-31

    Although "research" is not prohibited by the Biological Weapons Convention, States Parties to the Convention have maintained the spirit of the Convention in actions relating to research. The confidence-building measures agreed to at RC2 refer to research facilities, publication of research results, and promotion of contacts between scientists engaged in research related to the Convention. However, assessment of basic research on biological agents is not a productive way to distinguish an offensive from a defensive program. Additionally, if a country were to initiate a biological weapons program, basic research on biological agents may not be necessary. For example, the extensive published research on Bacillus anthracis, both as a cause of anthrax in cattle and other species and as a biological-warfare agent, would enable any motivated group or nation to initiate a biological weapons program that could immediately advance to the development and scale-up stages. Research on biological agents for offensive purposes would be characterized by activities such as selection for growth, virulence, and toxin production; improving stability under varying environmental conditions; and selection of strains that might overcome existing means of prophylaxis and treatment. A biological program with an offensive intent would in most cases be characterized by evidence of development efforts in mass production and dissemination, which are often agent-specific. Thus, an assessment of development may distinguish offensive from defensive programs. If a country were to initiate a biological weapons research program, and were willing to risk worldwide condemnation should existence of such a program become known, it is likely that such a program would include development and production capabilities. If a country were not committed to production capability, there would be no rationale for an offensive biological research that would bring worldwide condemnation. Critics of the U

  7. Methodology and biological monitoring of exposure to chemical warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Shih, M.L.; Smith, J.R.; McMonagle, J.D. [Army Medical Research Inst. of Chemical Defense, Aberdeen Proving Ground, MD (United States)

    1995-06-01

    In the past few years, our institute has developed several GC/MS methods for the detection of the breakdown products of toxic organophosphonates (soman, sarin, GF) and vesicant sulfur mustard in biological samples. Recently we developed a modified GC/MS method for VX and are continually working on the methodology for lewisite and tabun. The purpose is to have an analytical tool to verify the exposure of chemical warfare agents in humans. Analytical procedures for quantitating the hydrolyzed phosphonic acids from nerve agents in environmental samples have been reported by many analysts. For more complex matrices such as biological samples, there is not yet a method reported. To make these polar acids amenable to gas chromatographic analysis a prior derivatization is needed. We found the pentafluorobenzyl ester derivatives of the phosphonates are suitable for verification and pharmacokinetic studies in biological samples. This method may also serve as an alternative method for confirmation purposes in environmental samples.

  8. Book Review: Conquest in Cyberspace: National Security and Information Warfare

    Directory of Open Access Journals (Sweden)

    Gary C. Kessler

    2007-06-01

    Full Text Available Libicki, M.C. (2007. Conquest in Cyberspace: National Security and Information Warfare. New York: Cambridge University Press. 323 pages, ISBN: 978-0-521-69214-4 (paper, US$80Reviewed by Gary C. Kessler (gary.kessler@champlain.eduMany books -- and even movies ("Live Free or Die Hard" -- are based upon the premise of an impending information war. In these scenarios -- made all too plausible by the increased frequency with which we read about and experience major information security incidents -- a Bad Guy exploits known computer security vulnerabilities in order to control major national infrastructures via the Internet so as to reap financial, economic, and/or personal power.(see PDF for full review

  9. Respiratory Protection Against Chemical and Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    G.K. Prasad

    2008-09-01

    Full Text Available Chemical and biological warfare (CBW agents pose unavoidable threat, both to soldiers and civilians.Exposure to such deadly agents amidst the CBW agents contaminated environment can be avoided bytaking proper protective measures. Respiratory protection is indispensable when the soldiers or civiliansare surrounded by such deadly environment as contamination-free air is needed for respiration purposes.In this context, an attempt has been made to review the literature for the past five decades on developmentof various protective devices for respiratory protection against aerosols, gases, and vapours of CBWagents. This review covers structural, textural, and adsorption properties of materials used in gas filtersand mechanical filters for the removal of CBW agents.Defence Science Journal, 2008, 58(5, pp.686-697, DOI:http://dx.doi.org/10.14429/dsj.58.1692

  10. Spectroscopic investigations of surface deposited biological warfare simulants

    Science.gov (United States)

    Barrington, Stephen J.; Bird, Hilary; Hurst, Daniel; McIntosh, Alastair J. S.; Spencer, Phillippa; Pelfrey, Suzanne H.; Baker, Matthew J.

    2012-06-01

    This paper reports a proof-of-principle study aimed at discriminating biological warfare (BW) simulants from common environmental bacteria in order to differentiate pathogenic endospores in situ, to aid any required response for hazard management. We used FTIR spectroscopy combined with multivariate analysis; FTIR is a versatile technique for the non-destructive analysis of a range of materials. We also report an evaluation of multiple pre-processing techniques and subsequent differences in cross-validation accuracy of two pattern recognition models (Support Vector Machines (SVM) and Principal Component - Linear Discriminant Analysis (PC-LDA)) for two classifications: a two class classification (Gram + ve spores vs. Gram -ve vegetative cells) and a six class classification (bacterial classification). Six bacterial strains Bacillus atrophaeus, Bacillus thuringiensis var. kurstaki, Bacillus thuringiensis, Escherichia coli, Pantaeoa agglomerans and Pseudomonas fluorescens were analysed.

  11. Technological, military and social causes for the application of cyber warfare

    Directory of Open Access Journals (Sweden)

    Dragan D. Mladenović

    2012-01-01

    Full Text Available Cyber warfare is a specific new form of military conflicts the use of which is growing rapidly in the international community. However, its nature is specific and differs from all previously known forms of warfare. For the purpose of clear understanding of the nature of cyber warfare, this paper covers the basic groups of preconditions for its broad application and fast development from technological, military and social aspects. Understanding the true nature of cyber warfare is a necessary condition for building national capacities for its application that are military justified and harmonized with the international law. The paper explores the characteristic instances of cyber warfare, ranging from information propaganda to physical destruction, with the goal to determine guidelines for the possible development of cyber capacities at the national level. Based on the analysis of previous cyber warfare cases, a prediction of future development directions is made and the necessity to apply suitable methods and techniques for defense against them is analyzed.

  12. A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios

    Directory of Open Access Journals (Sweden)

    Kathryn Merrick

    2016-07-01

    Full Text Available Our increasing dependence on information technologies and autonomous systems has escalated international concern for information- and cyber-security in the face of politically, socially and religiously motivated cyber-attacks. Information warfare tactics that interfere with the flow of information can challenge the survival of individuals and groups. It is increasingly important that both humans and machines can make decisions that ensure the trustworthiness of information, communication and autonomous systems. Subsequently, an important research direction is concerned with modelling decision-making processes. One approach to this involves modelling decision-making scenarios as games using game theory. This paper presents a survey of information warfare literature, with the purpose of identifying games that model different types of information warfare operations. Our contribution is a systematic identification and classification of information warfare games, as a basis for modelling decision-making by humans and machines in such scenarios. We also present a taxonomy of games that map to information warfare and cyber crime problems as a precursor to future research on decision-making in such scenarios. We identify and discuss open research questions including the role of behavioural game theory in modelling human decision making and the role of machine decision-making in information warfare scenarios.

  13. Platform-level Distributed Warfare Model-based on Multi-Agent System Framework

    Directory of Open Access Journals (Sweden)

    Xiong Li

    2012-05-01

    Full Text Available The multi-agent paradigm has become a useful tool in solving military problems. However, one of key challenges in multi-agent model for distributed warfare could be how to describe the microcosmic  tactical warfare platforms actions. In this paper, a platform-level distributed warfare model based on multi-agent system framework is designed to tackle this challenge. The basic ideas include:  Establishing multi-agent model by mapping from tactical warfare system’s members, i.e., warfare platforms, to respective agents; performing task decomposition and task allocation by using task-tree decomposition method and improved contract net protocol model technique; and implementing simulation by presenting battlefield terrain environment analysis algorithm based on grid approach. The  simulation demonstration results show that our model provides a feasible and effective approach to supporting the abstraction and representation of microcosmic tactical actions for complex warfare system.Defence Science Journal, 2012, 62(1, pp.180-186, DOI:http://dx.doi.org/10.14429/dsj.62.964

  14. LIDAR for Detection of Chemical and Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    S Veerabuthiran

    2011-04-01

    Full Text Available Remote detection of chemical and biological warfare agents and toxic gases in the atmosphere is of current interest to both the military and civilian agencies. Out of all currently available techniques, no single technique provides efficient detection against such threats at significant standoff distances. Light detection and ranging (LIDAR technologies, based on the transmission of laser pulses and analysis of the return signals, have demonstrated impressive capabilities in remote detection of such toxic chemicals. LIDAR is a highly sensitive tool to detect the extremely low concentrations of various toxic agents present in the form of thin clouds at distances of few kilometer. The detection of these toxic clouds is based on the approach of first detecting and measuring the range of the clouds using the scattering phenomena and subsequently identifying the composition of toxic clouds using absorption and fluorescence phenomena. Laser Science and Technology Centre (LASTEC, Delhi has been working on the design and development of LIDAR systems for detection of chemical and biological warfare (CBW agents. In this paper, theoretical analysis of differential absorption LIDAR (DIAL for detection of chemical agents and fluorescence LIDAR for detection of biological agents has been discussed. For some typical parametric conditions, the received power levels from different ranges to detect specific concentrations of chemical or biological clouds have been computed and discussed. The technical details of the indigenously developed backscattering LIDAR, which detects and measures the distance of cloud layers up to 5 km is also presented.Defence Science Journal, 2011, 61(3, pp.241-250, DOI:http://dx.doi.org/10.14429/dsj.61.556

  15. The development of immunoassays for detection of chemical warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Lenz, D.E.; Brimfield, A.A.; Cook, L. [Army Medical Research Institute of Chemical Defense, Aberdeen Proving Ground, MD (United States)

    1996-10-01

    With the advent of enzyme linked immunoabsorbent assays (ELISA) and monoclonal antibodies in the last two decades, there has been considerable effort devoted to the development of antibodies to detect and quantify low molecular weight toxic substances in environmental or biological fluids. Polyclonal antibodies against paraoxon (the toxic metabolite of parathion) were capable of detecting paraoxon in body fluids at a level of 10{sup -9} M ({approximately}260 pg/mL) when used in a competitive inhibition enzyme immunoassay (CIEIA). Monoclonal antibodies developed against a structural analogue of the chemical warfare agent soman were capable of detection soman in buffer solutions at a level of 10{sup -6} M ({approximately}180 ng/mL). In addition these antibodies were found to be highly specific for soman even in the presence of its major hydrolysis product. Subsequent studies with antisoman monoclonal antibodies extended the level of sensitivity to {approximately}80 ng/mL. Furthermore these antibodies did not cross react with other chemical warfare nerve agents such as sarin or tabun. In all cases, the time for a confirmatory test was two hours or less. Immunoassays for T-2 micotoxins have also been reported with a minimal detection range of 2 pg/assay to 50 ng/assay for the polyclonal and monoclonal T-2 antibodies respectively. These reagents offer a sensitive, rapid and low cost approach to the diagnosis or detection of the presence of toxic chemical substances. More recent efforts have focussed on developing antibodies specific for sulfur mustard a highly reactive vesicating agent.

  16. Editorial: Discovery from Lake Turkana and History of Human Warfare

    Directory of Open Access Journals (Sweden)

    Professor S. P. Singh, Ph.D.

    2016-02-01

    Full Text Available Very interesting finds have come to light of violently killed humans from Lake Turkana in the Kenyan Rift Valley around 10000 years ago. A stunning discovery of skeletons of 27 persons who are believed to have been killed at the same time and are supposed to have suffered violent wounds has been reported recently (Nature 529, 394–398, 21 January 2016. These finds belong to a period of late Pleistocene/early Holocene of the hunter-gatherer societies from Nataruk. Among the victims were men, women and children. The individuals were killed with projectiles and blunt weapons. These skeletons were found in the lagoon and were preserved very nicely. Such type of mass killing probably could never happen as a consequence of intra-group conflict. The evidence seems to be towards warfare and aggression in ancient societies. The experts ruled out the possibility of a cemetery and ceremonial burial. This discovery of 27 skeletons points to the fact that there may have been more causalities and many individuals might have escaped death at that time. According to one of the co-authors of this research Dr. R.A. Foley, the groups were elatively more densely packed populations than the hunter gatherers and had more chances of having inter-group conflicts because of sharing the resources which would have been plentiful near the lagoons and water bodies. Violence probably has been in the instinct of early humans and that the warfare among humans has a history of 10000 years or even earlier.

  17. A Square Peg in a Round Hole: A Case Study of Center Gravity Application in Counter Insurgency Warfare

    Science.gov (United States)

    2011-06-01

    D.C.: Potomac Books, 2010. Griffith, Samuel B. The Illustrated Art of War. New York: Oxford University Press, 2005. Guevara , Ernesto Che, Brian... Guevara provided another approach to insurgency, encapsulated in the concept of the foco, which he described in his 1960 work Guerrilla Warfare. The... Guevara , Guerrilla Warfare, edited by Brian Loveman and Thomas Davies, (Oxford: SR Books, 1997), 7. 21 Guevara , Guerrilla Warfare, 256. 22 Guevara

  18. Detection of aqueous phase chemical warfare agent degradation products by negative mode ion mobility time-of-flight mass spectrometry [IM(tof)MS].

    Science.gov (United States)

    Steiner, Wes E; Harden, Charles S; Hong, Feng; Klopsch, Steve J; Hill, Herbert H; McHugh, Vincent M

    2006-02-01

    The use of negative ion monitoring mode with an atmospheric pressure ion mobility orthogonal reflector time-of-flight mass spectrometer [IM(tof)MS] to detect chemical warfare agent (CWA) degradation products from aqueous phase samples has been determined. Aqueous phase sampling used a traditional electrospray ionization (ESI) source for sample introduction and ionization. Certified reference materials (CRM) of CWA degradation products for the detection of Schedule 1, 2, or 3 toxic chemicals or their precursors as defined by the chemical warfare convention (CWC) treaty verification were used in this study. A mixture of six G-series nerve related CWA degradation products (EMPA, IMPA, EHEP, IHEP, CHMPA, and PMPA) and their related collision induced dissociation (CID) fragment ions (MPA and EPA) were found in each case to be clearly resolved and detected using the IM(tof)MS instrument in negative ion monitoring mode. Corresponding ions, masses, drift times, K(o) values, and signal intensities for each of the CWA degradation products are reported.

  19. Conventional cerebrospinal fluid scanning

    Energy Technology Data Exchange (ETDEWEB)

    Schicha, H.

    1985-06-01

    Conventional cerebrospinal fluid scanning (CSF scanning) today is mainly carried out in addition to computerized tomography to obtain information about liquor flow kinetics. Especially in patients with communicating obstructive hydrocephalus, CSF scanning is clinically useful for the decision for shunt surgery. In patients with intracranial cysts, CSF scanning can provide information about liquor circulation. Further indications for CSF scanning include the assessment of shunt patency especially in children, as well as the detection and localization of cerebrospinal fluid leaks.

  20. The Implications of a Biological Weapons Convention Verification Protocol on U.S. Biological Warfare Nonproliferation Strategy

    Science.gov (United States)

    2006-05-31

    legitimate concerns of the pharmaceutical and biotechnology industry and research groups. Effectiveness of Other Means to Identify BW Threats The U.S...tripled in size since 1992. Finally the U.S. biotechnology industry is heavily engaged in research and development, having spent $15.6 billion on new...projects in 2001 ( Biotechnology Industry Organization 2003). The DNA genome patent alone could be worth billions of dollars (National Review (New York

  1. The Knowledge Level of United States Air Force Flight Nurses Regarding the Injuries of Conventional Warfare Casualties

    Science.gov (United States)

    1989-01-01

    penetrating wound of brain " (United States Department of Defense, 1987, p. 182). Since it was virtually impossible to construct one question covering...exhaustion is characterized by which of the following? a. Euphoria, sharpened skills and senses b. Insomnia, anorexia , and malaise c. Unrelenting fatigue... malnutrition d. Don’t know 11. An external fixation device to immobilize a fractured extremity is best described by which of the following? a. A special cast

  2. Guerilla Warfare & Law Enforcement: Combating the 21st Century Terrorist Cell within the U.S.

    Directory of Open Access Journals (Sweden)

    Major Richard Hughbank

    2009-01-01

    Full Text Available Both domestic and international terrorist organizations employ guerrilla warfare tactics, techniques, and procedures. Thus, the ability to identify and defeat the members of these organizations, cripple their infrastructures, and disrupt their financial resources lies in the understanding of modern guerrilla warfare as it develops in the twenty-first century within the United States.3 The forms of asymmetric warfare4 adopted by domestic and international terrorist groups alike is no longer intended to gain simple media exposure or governmental manipulation; they want to make an overpowering impact by causing massive loss of life and severe damage to infrastructure and are often motivated by religious imperatives and political goals. As terrorism analyst Stephen Flynn has observed, "Throughout the 20th century [Americans] were able to treat national security as essentially an out-of-body experience. When confronted by threats, [America] dealt with them on the turf of our allies or our adversaries. Aside from the occasional disaster and heinous crime, civilian life [in the United States] has been virtually terror-free." With the turn of the twenty-first century, terrorist operations have become more prevalent in the United States and are taking shape in the form of modern guerrilla warfare, thus creating new challenges for federal, state, and local law enforcement agencies. After reviewing the origin and nature of these challenges, this article will offer some suggestions for countering guerilla warfare in the United States.

  3. Treatability study report for remediation of chemical warfare agent contaminated soils using peroxysulfate ex-situ treatment. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Pugh, J.R.; Grinstead, J.H.; Farley, J.A.; Enlow, P.D.; Kelly, D.A.

    1996-07-01

    This laboratory scale study examines the feasibility of using peroxysulfate based oxidants to remediate soils contaminated with GB, Hi, and VX. The project was conducted with chemical warfare agent simulants. The study concludes that peroxysulfates, and particularly peroxydisulfate, can degrade chemical warfare agent simulants in soil and recommends continuing research.

  4. Research on performance of ethernet interface in network centric warfare

    Institute of Scientific and Technical Information of China (English)

    梁永生; 张乃通

    2004-01-01

    The concept of network centric warfare (NCW) and its character, high requirement of real-time synchronization are introduced. The distributed equal-node network architecture in NCW is presented. Based on theoretical analysis on ethernet interface performance, this paper presents that forwarding latency between ethernet interface devices is a key influence factor of real-time synchronization in NCW. Ethernet fundamental is briefly introduced. The model between a switch under test (SUT) and a smartbits card is presented and used for two interconnecting switches in NCW. On condition that ignoring the latency of connecting fiber or twisted pairs and processing latency of the smartbits test system, this paper presents that clock frequency tolerance (CFT) between a SUT and a smartbits card is a leading influence factor of forwarding latency of an ethernet switch. The formulae to calculate internal forwarding latency and forwarding latency caused by its CFT are deduced. Theoretical calculation on forwarding latency of an ethernet switch based on the given CFT and test time is implemented. Experimental study on primary forwarding latency and secondary forwarding latency is implemented and forwarding latency between the SUT and the smartbits card is measured, thus testifying the accuracy of the above theoretical analysis that the CFT is a key influence factor of forwarding latency. The measures to satisfy the needs of forwarding latency in NCW are presented.

  5. Drone Warfare: Twenty-First Century Empire and Communications

    Directory of Open Access Journals (Sweden)

    Kevin Howley

    2017-02-01

    Full Text Available This paper, part of a larger project that examines drones from a social-construction of technology perspective, considers drone warfare in light of Harold Innis’s seminal work on empire and communication. Leveraging leading-edge aeronautics with advanced optics, data processing, and networked communication, drones represent an archetypal “space-biased” technology. Indeed, by allowing remote operators and others to monitor, select, and strike targets from half a world away, and in real-time, these weapon systems epitomize the “pernicious neglect of time” Innis sought to identify and remedy in his later writing. With Innis’s time-space dialectic as a starting point, then, the paper considers drones in light of a longstanding paradox of American culture: the impulse to collapse the geographical distance between the United States and other parts of the globe, while simultaneously magnifying the cultural difference between Americans and other peoples and societies. In the midst of the worldwide proliferation of drones, this quintessentially sublime technology embodies this (disconnect in important, profound, and ominous ways.

  6. Back to the future: aerial warfare in Libya

    Directory of Open Access Journals (Sweden)

    João Paulo Nunes Vicente

    2013-05-01

    Full Text Available A century after the first air bomb mission, a new intervention in the same geographic space has made evident the changes in Airpower. The Aerial Warfare in Libya has radically changed the civil war, complying with a UN mission to protect Libyan population, imposing a no-fly zone and an arms embargo. Therefore, Operation Unified Protector became one of the most successful campaigns in the history of NATO. We aim to assess the operational efficiency of Airpower in the conflict in Libya, focusing on the challenges of a War essentially Aerial. Despite the military results and the fact that some political objectives were met, we can identify some concerning trends that, if not shifted, may negatively influence future NATO operations. We do not aim to draw general and universal conclusions on the strategic value of Airpower based on the analysis of a specific case. Above all, we focus on identifying some lessons which have influenced OUP operational efficiency. Thus, we must analyze some factors, such as the scope of objectives, the type of opposing action and aerial strategy used by the coalition and then focus on the challenges arising from the OUP.

  7. Prevalence of Asthma in Children of Chemical Warfare Victims

    Science.gov (United States)

    Mirsadraee, Majid; Mozaffari, Abolfazl; Attaran, Davood

    2011-01-01

    Objective Exposure of DNA to sulfur mustard gas may increase the inheritance of asthma in chemical warfare victims' (CWV) offspring. The objective of this study was to determine the prevalence of asthma in children of CWV and compare it to asthmatic children in the general population. Methods Four hundred and nine children from 130 CWV fathers and 440 children from 145 asthmatic parents from two cities in Iran participated in this study. The prevalence of asthma was determined by standard questionnaire released for epidemiological survey of asthma in children and compared between two groups. Findings The prevalence of asthma in the CWV group was 15%; this was not significantly different from the control group (12.5%). The children of the CWV group reported a significantly greater incidence of wheezing (1.2±3.1 attacks) per year, but the control group reported more severe attacks leading to speech difficulties (3%) and coughing (7%). Regression analysis showed that with increasing family size in the control group, the number of subjects suffering from asthmatic symptoms decreases significantly (r=0.86, P=0.001). Conclusion Chemical agents may increase the prevalence of asthma in the offspring of CWV. PMID:23056804

  8. Human scalp permeability to the chemical warfare agent VX.

    Science.gov (United States)

    Rolland, P; Bolzinger, M-A; Cruz, C; Briançon, S; Josse, D

    2011-12-01

    The use of chemical warfare agents such as VX in terrorism act might lead to contamination of the civilian population. Human scalp decontamination may require appropriate products and procedures. Due to ethical reasons, skin decontamination studies usually involve in vitro skin models, but human scalp skin samples are uncommon and expensive. The purpose of this study was to characterize the in vitro permeability to VX of human scalp, and to compare it with (a) human abdominal skin, and (b) pig skin from two different anatomic sites: ear and skull roof, in order to design a relevant model. Based on the VX skin permeation kinetics and distribution, we demonstrated that (a) human scalp was significantly more permeable to VX than abdominal skin and (b) pig-ear skin was the most relevant model to predict the in vitro human scalp permeability. Our results indicated that the follicular pathway significantly contributed to the skin absorption of VX through human scalp. In addition, the hair follicles and the stratum corneum significantly contributed to the formation of a skin reservoir for VX.

  9. SiGe-based re-engineering of electronic warfare subsystems

    CERN Document Server

    Lambrechts, Wynand

    2017-01-01

    This book equips readers with a thorough understanding of the applicability of new-generation silicon-germanium (SiGe) electronic subsystems for the military purposes of electronic warfare and defensive countermeasures. The theoretical and technical background is extensively explained and all aspects of the integration of SiGe as an enabling technology for maritime, land, and airborne (including space) electronic warfare are addressed, including research, design, development, and implementation. The coverage is supported by mathematical derivations, informative illustrations, practical examples, and case studies. While SiGe technology provides speed, performance, and price advantages in many markets, sharing of information on its use in electronic warfare systems has to date been limited, especially in developing nations. This book will therefore be warmly welcomed as an engineering guideline that focuses especially on the speed and reliability of current-generation SiGe circuits and highlights emerging innov...

  10. THE CYBER DIMENSION OF MODERN HYBRID WARFARE AND ITS RELEVANCE FOR NATO

    Directory of Open Access Journals (Sweden)

    Sorin DUCARU

    2016-06-01

    Full Text Available The technological development and the instant communication possibilities advanced not only economic and social developments, but also evolving threats from those who exploit the vulnerabilities of communication and information systems. The cyber threat landscape points to a significant increase of the frequency, intensity, duration and sophistication of cyber-attacks. One of the new and concerning trends is the use of cyber capabilities in relation with military of hybrid operations – the so-called cyber dimension of hybrid warfare. NATO’s strategy on countering hybrid warfare is based on the triad: prepare-deter-defend, which also applies to cyber. Nations represent the first line of defence in countering hybrid strategies. International cooperation is also a key factor in this sense. It is in this context that NATO’s response to cyber-attacks in the context of hybrid warfare must be further refined.

  11. Fear as a medium of communication in asymmetric forms of warfare

    DEFF Research Database (Denmark)

    Harste, Gorm

    2011-01-01

    Fear is defined as the distinction between risk and danger, a distinction that operates in communicative forms. War is always also warfare about the form of war. The article describes how fear in warfare becomes a symbolically generalized medium of communication, mainly focusing on how the form...... of fear evolves in asymmetric warfare. Asymmetric war induces fear in both parties, but in a communicative form that leads to very different experiences of fear. Fear is observed and analysed with Niklas Luhmann’s theory of self-referential systems of communication and well as his theory of risk....... Following Luhmann and in continuation of Clausewitz’ conceptual tools, yet with other means, the article proposes to observe war as a system that can de-ontologize itself and thereby concern moving centres of gravity such as communication lines, motivation, public fear as well as perceptions of risk...

  12. The United States and biological warfare: secrets from the early cold war and Korea.

    Science.gov (United States)

    Bruwer, A

    2001-01-01

    The United States and Biological Warfare is about accusations that the United States resorted to bacteriological warfare at a time of great military stress during the Korean War. In December 1951, the then US Secretary of Defense ordered early readiness for offensive use of biological weapons. Soon afterwards, the North Korean and Chinese armies accused the United States of starting a large-scale biological warfare experiment in Korea. The US State Department denied the accusation. Both parties to the dispute maintain their positions today. The authors spent 20 years researching the accusations in North America, Europe and Japan. They were the first foreigners to be given access to Chinese classified documents. The reader is also introduced to the concept of 'plausible denial', an official US policy which allowed responsible governmental representatives to deny knowledge of certain events. The authors hope that their work will contribute to the understanding of a time when modern war expanded into a new type of violence.

  13. Conventional and unconventional superconductivity

    Science.gov (United States)

    Fernandes, R. M.

    2012-02-01

    Superconductivity has been one of the most fruitful areas of research in condensed matter physics, bringing together researchers with distinct interests in a collaborative effort to understand from its microscopic basis to its potential for unprecedented technological applications. The concepts, techniques, and methods developed along its centennial history have gone beyond the realm of condensed matter physics and influenced the development of other fascinating areas, such as particle physics and atomic physics. These notes, based on a set of lectures given at the 2011 Advanced Summer School of Cinvestav, aim to motivate the young undergraduate student in getting involved in the exciting world of conventional and unconventional superconductors.

  14. Strategic interaction and conventions

    Directory of Open Access Journals (Sweden)

    Espinosa, María Paz

    2012-03-01

    Full Text Available The scope of the paper is to review the literature that employs coordination games to study social norms and conventions from the viewpoint of game theory and cognitive psychology. We claim that those two alternative approaches are in fact complementary, as they provide different insights to explain how people converge to a unique system of self-fulfilling expectations in presence of multiple, equally viable, conventions. While game theory explains the emergence of conventions relying on efficiency and risk considerations, the psychological view is more concerned with frame and labeling effects. The interaction between these alternative (and, sometimes, competing effects leads to the result that coordination failures may well occur and, even when coordination takes place, there is no guarantee that the convention eventually established will be the most efficient.

    El objetivo de este artículo es presentar la literatura que emplea los juegos de coordinación para el estudio de normas y convenciones sociales, que se han analizado tanto desde el punto de vista de la teoría de juegos como de la psicología cognitiva. Argumentamos en este trabajo que estos dos enfoques alternativos son en realidad complementarios, dado que ambos contribuyen al entendimiento de los procesos mediante los cuales las personas llegan a coordinarse en un único sistema de expectativas autorrealizadas, en presencia de múltiples convenciones todas ellas igualmente viables. Mientras que la teoría de juegos explica la aparición de convenciones basándose en argumentos de eficiencia y comportamientos frente al riesgo, el enfoque de la psicología cognitiva utiliza en mayor medida consideraciones referidas al entorno y naturaleza de las decisiones. La interacción entre estos efectos diferentes (y en ocasiones, rivales desemboca con frecuencia en fallos de coordinación y, aun cuando la coordinación se produce, no hay garantía de que la convención en vigor sea la m

  15. Skeletal evidence for Inca warfare from the Cuzco region of Peru.

    Science.gov (United States)

    Andrushko, Valerie A; Torres, Elva C

    2011-11-01

    This article addresses the bioarchaeological evidence for Inca warfare through an analysis of 454 adult skeletons from 11 sites in the Inca capital region of Cuzco, Peru. These 11 sites span almost 1000 years (AD 600-1532), which allows for a comparison of the evidence for warfare before the Inca came to power (Middle Horizon AD 600-1000), during the time of Inca ascendency in the Late Intermediate Period (AD 1000-1400), and after the Inca came to power and expanded throughout the Cuzco region and beyond (Inca Imperial Period, AD 1400-1532). The results indicate that 100 of 454 adults (22.0%) showed evidence of cranial trauma. Of these, 23 individuals had major cranial injuries suggestive of warfare, consisting of large, complete, and/or perimortem fractures. There was scant evidence for major injuries during the Middle Horizon (2.8%, 1/36) and Late Intermediate Period (2.5%, 5/199), suggesting that warfare was not prevalent in the Cuzco region before and during the Inca rise to power. Only in the Inca Imperial Period was there a significant rise in major injuries suggestive of warfare (7.8%, 17/219). Despite the significant increase in Inca times, the evidence for major cranial injuries was only sporadically distributed at Cuzco periphery sites and was entirely absent at Cuzco core sites. These findings suggest that while the Inca used warfare as a mechanism for expansion in the Cuzco region, it was only one part of a complex expansion strategy that included economic, political, and ideological means to gain and maintain control. Copyright © 2011 Wiley-Liss, Inc.

  16. Blaptica dubia as sentinels for exposure to chemical warfare agents - a pilot study.

    Science.gov (United States)

    Worek, Franz; Seeger, Thomas; Neumaier, Katharina; Wille, Timo; Thiermann, Horst

    2016-11-16

    The increased interest of terrorist groups in toxic chemicals and chemical warfare agents presents a continuing threat to our societies. Early warning and detection is a key component for effective countermeasures against such deadly agents. Presently available and near term solutions have a number of major drawbacks, e.g. lack of automated, remote warning and detection of primarily low volatile chemical warfare agents. An alternative approach is the use of animals as sentinels for exposure to toxic chemicals. To overcome disadvantages of vertebrates the present pilot study was initiated to investigate the suitability of South American cockroaches (Blaptica dubia) as warning system for exposure to chemical warfare nerve and blister agents. Initial in vitro experiments with nerve agents showed an increasing inhibitory potency in the order tabun - cyclosarin - sarin - soman - VX of cockroach cholinesterase. Exposure of cockroaches to chemical warfare agents resulted in clearly visible and reproducible reactions, the onset being dependent on the agent and dose. With nerve agents the onset was related to the volatility of the agents. The blister agent lewisite induced signs largely comparable to those of nerve agents while sulfur mustard exposed animals exhibited a different sequence of events. In conclusion, this first pilot study indicates that Blaptica dubia could serve as a warning system to exposure of chemical warfare agents. A cockroach-based system will not detect or identify a particular chemical warfare agent but could trigger further actions, e.g. specific detection and increased protective status. By designing appropriate boxes with (IR) motion sensors and remote control (IR) camera automated off-site warning systems could be realized.

  17. NONDESTRUCTIVE IDENTIFICATION OF CHEMICAL WARFARE AGENTS AND EXPLOSIVES BY NEUTRON GENERATOR-DRIVEN PGNAA

    Energy Technology Data Exchange (ETDEWEB)

    T. R. Twomey; A. J. Caffrey; D. L. Chichester

    2007-02-01

    Prompt gamma-ray neutron activation analysis (PGNAA) is now a proven method for the identification of chemical warfare agents and explosives in military projectiles and storage containers. Idaho National Laboratory is developing a next-generation PGNAA instrument based on the new Ortec Detective mechanically-cooled HPGe detector and a neutron generator. In this paper we review PGNAA analysis of suspect chemical warfare munitions, and we discuss the advantages and disadvantages of replacing the californium-252 radioisotopic neutron source with a compact accelerator neutron generator.

  18. Particle Swarm Social Adaptive Model for Multi-Agent Based Insurgency Warfare Simulation

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Xiaohui [ORNL; Potok, Thomas E [ORNL

    2009-12-01

    To better understand insurgent activities and asymmetric warfare, a social adaptive model for modeling multiple insurgent groups attacking multiple military and civilian targets is proposed and investigated. This report presents a pilot study using the particle swarm modeling, a widely used non-linear optimal tool to model the emergence of insurgency campaign. The objective of this research is to apply the particle swarm metaphor as a model of insurgent social adaptation for the dynamically changing environment and to provide insight and understanding of insurgency warfare. Our results show that unified leadership, strategic planning, and effective communication between insurgent groups are not the necessary requirements for insurgents to efficiently attain their objective.

  19. Biodiesel from conventional feedstocks.

    Science.gov (United States)

    Du, Wei; Liu, De-Hua

    2012-01-01

    At present, traditional fossil fuels are used predominantly in China, presenting the country with challenges that include sustainable energy supply, energy efficiency improvement, and reduction of greenhouse gas emissions. In 2007, China issued The Strategic Plan of the Mid-and-Long Term Development of Renewable Energy, which aims to increase the share of clean energy in the country's energy consumption to 15% by 2020 from only 7.5% in 2005. Biodiesel, an important renewable fuel with significant advantages over fossil diesel, has attracted great attention in the USA and European countries. However, biodiesel is still in its infancy in China, although its future is promising. This chapter reviews biodiesel production from conventional feedstocks in the country, including feedstock supply and state of the art technologies for the transesterification reaction through which biodiesel is made, particularly the enzymatic catalytic process developed by Chinese scientists. Finally, the constraints and perspectives for China's biodiesel development are highlighted.

  20. What constitutes a convention? : implications for the coexistence of conventions

    OpenAIRE

    Kolstad, Ivar

    2002-01-01

    A model of repeated play of a coordination game, where stage games have a location in social space, and players receive noisy signals of the true location of their games, is reviewed. Sugden (1995) suggests that in such a model, there can be a stationary state of convention coexistence only if interaction is non-uniform across social space. This paper shows that an alternative definition of conventions, which links conventions to actions rather than expectations, permits convention coexistenc...

  1. A statistical analysis of the effect of warfare on the human secondary sex ratio

    NARCIS (Netherlands)

    Graffelman, J.; Hoekstra, R.F.

    2000-01-01

    Many factors have been hypothesized to affect the human secondary sex ratio (the annual percentage of males among all live births), among them race, parental ages, and birth order. Some authors have even proposed warfare as a factor influencing live birth sex ratios. The hypothesis that during and s

  2. Sandals and Robes to Business Suits and Gulf Streams: Warfare in the 21st Century

    Science.gov (United States)

    2011-04-20

    cartels, or simply shooting an American for the price of a loaf of bread to feed their families, we need to better understand what we’re facing. From...our goals, but as warfare becomes more untenable in the age of social media, as the unacceptable killing of civilians on any battlefield could lose

  3. (Review of) Reno, William. 2011. Warfare in Independent Africa. Cambridge: Cambridge University Press

    DEFF Research Database (Denmark)

    Hagmann, Tobias

    2013-01-01

    Warfare in Independent Africa is Reno’s bold attempt to analyze the modern history of African insurgencies. The book tackles this task through the prism of five generations of rebel, which left their mark on the continent; anti-colonial rebels, majority rule rebels, reform rebels, warlord rebels ...

  4. Ion mobility spectrometry and its applications in detection of chemical warfare agents.

    Science.gov (United States)

    Mäkinen, Marko A; Anttalainen, Osmo A; Sillanpää, Mika E T

    2010-12-01

    When fast detection of chemical warfare agents in the field is required, the ion mobility spectrometer may be the only suitable option. This article provides an essential survey of the different ion mobility spectrometry detection technologies. (To listen to a podcast about this feature, please go to the Analytical Chemistry multimedia page at pubs.acs.org/page/ancham/audio/index.html.).

  5. Analysis of Urinary Metabolites of Nerve and Blister Chemical Warfare Agents

    Science.gov (United States)

    2014-08-01

    Warfare Agents GA Tabun , ethyl dimethylphosphoramidate GB Sarin, isopropyl methylphosphonofluoridate GD Soman, pinacolyl methylphosphonofluoridate...and their metabolites Agent Metabolite GA, Tabun O P O N CN Ethyl Dimethylphosphoroamidate, EDMAP, GA Acid HO P O N CN GB, Sarin P O

  6. THE PECULIARITIES OF SOCIAL PERCEPTION IN THE CONTEXT OF INFORMATION-PSYCHOLOGICAL WARFARE

    Directory of Open Access Journals (Sweden)

    Nane Zeynalyan

    2016-09-01

    Full Text Available In the recent decades, war fields have moved into the information sphere. Today’s person has reason to “be informed”; as having information provides a sense of security. In the modern world, great effort is invested in expanding information sources, because it serves to articulate both international policies and the context of wars. The exchange of information in domestic and international platforms influences the quality of public debate and ideology, which affects social attitudes and decision-making processes. This article presents the role of information-psychological warfare as a factor in forming public opinion. It discusses the peculiarities of organizing an information-psychological warfare during military conflicts. The goal of our research is to explore how social groups might perceive peculiarities in the information-psychological warfare. The research involves methods of survey, content analysis, and free associations. The effectiveness of psychological warfare significantly depends on how people perceive information. Consequently, in the contemporary world, it is necessary to not only protect or fight on the battlefield, but also to use information weapons. This imposes requirements on psychological scientists to explore peculiarities around the perception of information to help find mechanisms that safeguard people’s lives by way of contributing to the formation of necessary attitudes and stereotypes.

  7. Detachment 101 in the CBI: An Unconventional Warfare Paradigm for Contemporary Special Operations

    Science.gov (United States)

    2010-05-13

    American Espionage. NY: Reynal and Hitchcock , 1946. Barrett, Neil H. Chingpaw. NY: Vantage, 1962. Bartholomew-Feis, Dixee R. The O.S.S. and Ho Chi...United States Army. Washington, D.C.: U.S. Government Printing Office, 1990. Paddock, Alfred H. U.S. Army Special Warfare; Its Origins. Lawrence, KS

  8. Development of Novel Alternative Technologies for Decontamination of Warfare Agents: Electric Heating with Intrinsically Conductive Polymers

    Science.gov (United States)

    2007-11-02

    in converting electric energy to thermal energy for the decon applications. Other conductive materials, such as polythiophenes , polypyrroles, carbon...Development of Novel Alternative Technologies for Decontamination of Warfare Agents: Electric Heating with Intrinsically Conductive Polymers...Joule)-heating with conducting polymers. The basic concept is that electrically conducting polymers, such as polyaniline, can be used as coatings or

  9. Key Planning Factors for Recovery from a Chemical Warfare Agent Incident

    Science.gov (United States)

    2012-07-01

    chemical scenario involving the release of a blister agent (mustard lewisite) would result in a waste that the State of Colorado would regulate as... Waste Management ................................................................. 24 4.3 Key Planning Factors: Recovery Planning...Planning Factors, this document presents a chemical warfare agent scenario featuring Agent Yellow, a blister agent. Agent Yellow is a mixture of

  10. Application of non-quantitative modelling in the analysis of a network warfare environment

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available of the various interacting components, a model to better understand the complexity in a network warfare environment would be beneficial. Non-quantitative modelling is a useful method to better characterize the field due to the rich ideas that can be generated...

  11. Disruption of a binary organogel by the chemical warfare agent soman (GD) and common organophosphorus simulants

    OpenAIRE

    Hiscock, Jennifer R.; Sambrook, Mark R; Ede, Jayne A.; Wells, Neil J.; Philip A. Gale

    2014-01-01

    The chemical warfare agent (CWA) soman (GD) acts as a molecular stimulus for the disruption of an anthracene-based binary organogel prepared in cyclohexane. The CWA simulants dimethyl methylphosphonate (DMMP) and diethyl chlorophosphate (DCP) were also found to disrupt the binary organogel through changes in solvent polarity and reactions with the gelator.\\ud \\ud

  12. On modeling of the evaporation of chemical warfare agents on the ground

    NARCIS (Netherlands)

    Westin, S.N.; Winter, S.; Karlsson, E.; Hin, A.; Oeseburg, F.

    1998-01-01

    A model for evaporation of chemical warfare agents on the ground has been developed. The process of evaporation is described in three steps: (1) the immediate drop enlargement due to impact momentum is modeled using an empirical correlation from technical literature; (2) further enlargement caused b

  13. From Douhet to drones, air warfare, and the evolution of targeting

    NARCIS (Netherlands)

    Osinga, F.P.B.; Roorda, M.P.; Ducheine, P.A.L.; Schmitt, M.N.; Osinga, F.P.B.

    2016-01-01

    Through the prism of the experience of air warfare, this chapter identifies key factors that have shaped targeting. These include technological developments, organizational structures, and processes and inter-service competition for scarce resources. Moreover, targeting is informed by perspectives o

  14. Evaluating Effectiveness of a Frigate in an Anti-Air Warfare (AAW) Environment

    Science.gov (United States)

    2016-06-01

    air warfare (AAW), weapon selection, unmanned aerial vehicle, simulation, design of experiments, combat systems 15. NUMBER OF PAGES 81 16. PRICE ...Explanation of a Cookie-Cutter Sensor. ........................ 19 Figure 12. Stop Conditions Menu in MANA...companies sell these deadly missiles at affordable prices to allow many countries to easily employ them onboard their warships. Missiles also offer

  15. Conventional mechanical ventilation

    Directory of Open Access Journals (Sweden)

    Tobias Joseph

    2010-01-01

    Full Text Available The provision of mechanical ventilation for the support of infants and children with respiratory failure or insufficiency is one of the most common techniques that are performed in the Pediatric Intensive Care Unit (PICU. Despite its widespread application in the PICUs of the 21st century, before the 1930s, respiratory failure was uniformly fatal due to the lack of equipment and techniques for airway management and ventilatory support. The operating rooms of the 1950s and 1960s provided the arena for the development of the manual skills and the refinement of the equipment needed for airway management, which subsequently led to the more widespread use of endotracheal intubation thereby ushering in the era of positive pressure ventilation. Although there seems to be an ever increasing complexity in the techniques of mechanical ventilation, its successful use in the PICU should be guided by the basic principles of gas exchange and the physiology of respiratory function. With an understanding of these key concepts and the use of basic concepts of mechanical ventilation, this technique can be successfully applied in both the PICU and the operating room. This article reviews the basic physiology of gas exchange, principles of pulmonary physiology, and the concepts of mechanical ventilation to provide an overview of the knowledge required for the provision of conventional mechanical ventilation in various clinical arenas.

  16. ESD and the Rio Conventions

    Science.gov (United States)

    Sarabhai, Kartikeya V.; Ravindranath, Shailaja; Schwarz, Rixa; Vyas, Purvi

    2012-01-01

    Chapter 36 of Agenda 21, a key document of the 1992 Earth Summit, emphasised reorienting education towards sustainable development. While two of the Rio conventions, the Convention on Biological Diversity (CBD) and the United Nations Framework Convention on Climate Change (UNFCCC), developed communication, education and public awareness (CEPA)…

  17. Irregular Warfare and Future War: Strategy and Defense Planning; Strategic Insights, v. 10, Special issue (October 2011), 92-98. Topic: Global Trends and Future Warfare ; Part II: Technological and Doctrinal Innovation

    OpenAIRE

    Russell, James A.

    2011-01-01

    This article appeared in Strategic Insights, v.10, Special issue (October 2011), 92-98. Topic: Global Trends and Future Warfare ; Part II: Technological and Doctrinal Innovation Approved for public display, distribution unlimited The purpose of this paper is threefold: to speculate on the role and prominence of irregular warfare in the strategic environment over the next quarter century, to comment on the impact that phenomenon may have on shaping the postulated scenarios addressed in t...

  18. Chromatography and mass spectrometry of chemical warfare agents, toxins and related compounds: state of the art and future prospects

    NARCIS (Netherlands)

    Kientz, C.E.

    1998-01-01

    Methods for the identification of chemical warfare agents, toxins, bioregulators and related products are frequently reported in literature. These methods are often based on instrumental analysis using chromatography (gas and liquid) and mass spectrometry. Here, these instrumental techniques are dis

  19. Autonomous-agent based simulation of anti-submarine warfare operations with the goal of protecting a high value unit

    OpenAIRE

    Akbori, Fahrettin

    2004-01-01

    Approved for public release, distribution unlimited The Anti-Submarine Warfare screen design simulation is a program that provides a model for operations in anti-submarine warfare (ASW). The purpose of the program is to aid ASW commanders, allowing them to configure an ASW screen, including the sonar policy, convoy speed, and the number of ships, to gain insight into how these and other factors beyond their control, such as water conditions, impact ASW effectiveness. It is also designed to...

  20. The Short-Term Effect of Chest Physiotherapy on Spirometric Indices in Chemical Warfare Victims Exposed to Mustard Gas

    OpenAIRE

    Abedi, A.; HR Koohestani; Z Roosta

    2008-01-01

    ABCTRACT Introduction & Objective: Chronic respiratory diseases are the most prevalent late sequels of sulfur mustard gas injury among Iranian chemical warfare victims. Chest physiotherapy is one of the useful methods in care, cure and infection prevention of these patients. The aim of this study was to determine the short-term effect of chest physiotherapy on spirometric indices in chemical warfare victims exposed to sulfur mustard gas. Materials & Methods: In this study, 27 of the chemical ...

  1. The Military-Entertainment Complex: A New Facet of Information Warfare

    Directory of Open Access Journals (Sweden)

    Adam Muir

    2003-01-01

    Full Text Available The second Gulf War will become synonymous with the emergence of fully-fledged information warfare where the military-entertainment complex has so influenced strategic and logistic possibilities that it becomes apparent that the war was waged as entertainment. This is entertainment not as an amusement or diversion but utilising the techniques and tropes of the burgeoning entertainment industry as a means to achieve military objectives. This paper offers a short history of the military-entertainment complex as reality and simulation become fused in the practices of the US military machine. The paper then briefly explores three central aspects of this phenomenon evident in recent developments: the military function of computer games; the role of the Hollywood scenario and the blurring between news and reality TV. Finally the suggestion is made that subverting, co-opting and reconstructing the military-entertainment complex provides new possibilities for alternative strategies of information warfare.

  2. Reactive skin decontamination lotion (RSDL) for the decontamination of chemical warfare agent (CWA) dermal exposure.

    Science.gov (United States)

    Schwartz, M D; Hurst, C G; Kirk, M A; Reedy, S J D; Braue, E H

    2012-08-01

    Rapid decontamination of the skin is the single most important action to prevent dermal absorption of chemical contaminants in persons exposed to chemical warfare agents (CWA) and toxic industrial chemicals (TICs) as a result of accidental or intentional release. Chemicals on the skin may be removed by mechanical means through the use of dry sorbents or water. Recent interest in decontamination systems which both partition contaminants away from the skin and actively neutralize the chemical has led to the development of several reactive decontamination solutions. This article will review the recently FDA-approved Reactive Skin Decontamination Lotion (RSDL) and will summarize the toxicity and efficacy studies conducted to date. Evidence of RSDL's superior performance against vesicant and organophosphorus chemical warfare agents compared to water, bleach, and dry sorbents, suggests that RSDL may have a role in mass human exposure chemical decontamination in both the military and civilian arenas.

  3. New studies disputing allegations of bacteriological warfare during the Korean War.

    Science.gov (United States)

    Rolicka, M

    1995-03-01

    In the television series Korea the Unknown War produced jointly by Thames Television (London) and WGBH (Boston) in 1990, General Matthew Ridgway, Commander in Chief of United Nations forces during the Korean War, called the accusations that the United States waged bacteriological warfare "black propaganda." The charges discredited the United States and, despite denials and many international discussions, have not been completely refuted until new. Following studies in archives previously not available for research and after uncovering new sources, many specific examples of black propaganda were discovered that contained false information and lies discrediting the United States. The mechanism of lies, which convinced the Korean population that bacteriological warfare was going on and that the only way not to become victims of the United States' inhuman cruelty was to fight, are shown in this paper.

  4. Naval Air Warfare Center Aircraft Division Patent Portfolio

    Science.gov (United States)

    2012-01-01

    vest has removably attachable pockets as well as a removably attachable hoisting harness so as to facilitate the needs for survival and, in addition... friction that can be used generated between the hands, arms, upper body, thighs and legs and the rope in controlling the rate of descent is an unavoidable...vehicles or structures. For convention ropes, the level of friction generated between a person and the rope is the basis for controlling rate of descent or

  5. Hybrid Warfare: How to Shape Special Operations Forces

    Science.gov (United States)

    2016-06-10

    psychological pressure, actively supporting a domestic opposition, and using insurgency or subversive methods.”69 He says, “States under hybrid...that combine low-level conventional and special operations; offensive cyber and space actions; and psychological operations that use social and...1. The aim is to control the minds. Primarily control the minds of the political leadership and the population through propaganda ( psychological

  6. Venezuela as an Exporter of 4th Generation Warfare Instability

    Science.gov (United States)

    2012-12-01

    e.g., Colombia and Peru, to date); and, • Diplomatic war/media war/conventional war (e.g., Algeria, 1954-62). 13 Any one of the above...financial war, trade war, psychological war, network ( virus ) war, cyber war, chemical-biological-radiological war, etc. Professional soldiers no...support to the insurgent and drug trafficking Revo- lutionary Armed Forces of Colombia (FARC), Ira- 23 nian surrogate and terrorist Hezbollah

  7. Russia’s Approach to Cyber Warfare (1Rev)

    Science.gov (United States)

    2017-03-01

    threat and an opportunity in this regard.  Russian military theorists generally do not use the terms cyber or cyberwarfare. Instead, they...Ukraine, Russia appeared to employ cyber as a conventional force enabler.  The Georgia and Ukraine conflicts also provided opportunities for Russia...Ministerstvo Vnutrennikh Del: MVD) focuses on cyber crime.14 For a brief period in the 1990s, Russia had a separate information security agency, the Federal

  8. Cyberspace as a Complex Adaptive System and the Policy and Operational Implications for Cyber Warfare

    Science.gov (United States)

    2014-05-22

    accessed 13 February 2014). 66Teresa Degenhard “Between War and Crime: The Overlap between War and Crime: Unpacking Foucault and Agamben’s Studies...Article-2-Revision- for- Foucault -and-Agamben-Degenhardt-July-2013.pdf (accessed 5 April 2014). 26... Foucault and Agamben’s Studies within the Context of the War on Terror.”, 34. 68US Department of Defense, Electronic Warfare, Joint Publication 3-13, I-2

  9. Integrated electronic warfare framework for infrared self-protection of transport aircraft

    CSIR Research Space (South Africa)

    Annamalai, L

    2007-09-01

    Full Text Available Warfare Framework for Infrared Self-protection of Transport Aircraft L. Annamalai Council for Scientific and Industrial Research (CSIR) Abstract - In the African scenario, slow-moving airborne platforms such as transport aircraft have in recent... predetermined baseline were considered the best method of optimising aircraft operating procedures against threats. L. Annamalai, Defence Peace, Safety and Security (DPSS), Council for Scientific and Industrial Research (CSIR), PO Box 395, 0001...

  10. Aerospace Power in Urban Warfare: Beware the Hornet’s Nest

    Science.gov (United States)

    2001-05-01

    Board Task Force on Military Operations in Built-Up Areas ( MOBA )," (Washington, DC: Office of the Undersecretary of Defense for Acquisition and...Smithsonian Institute Press, 1999), 130. 45 Vick, et al., 120. 46 Rebecca A. Grant, "The Radar Game ," Air Force Magazine, February 1999, 52-60. Grant...University Press, 1962. Grant, Rebecca A. "The Radar Game ." Air Force Magazine, February 1999, 52-60. Hawkins, William R. Putting Urban Warfare in

  11. Diagnosing Guerilla Warfare: Was William Clarke Quantrill Missouri’s Francis Marion?

    Science.gov (United States)

    2010-04-28

    frightful epoch when priests, women, and children throughout Spain plotted the murder of isolated soldiers." -Antoine-Henri J omini Jomini2...there are setbacks at any stage there sequences can be reversed to a previous phase.29 FRANCIS MARION AND GUERILLA WARFARE One of the most famous...Militia under General 28 D.M. Frost to stage his forces near the St. Louis Arsenal, as a "training camp," at what became known as Camp Jackson. 148

  12. Management of DoD Irregular Warfare (IW) and Security Force Assistance (SFA) Capabilities

    Science.gov (United States)

    2016-05-03

    manage DoD personnel with skills , training, education, and experience related to IW and SFA. DoDI 3000.11, May 3, 2016 TABLE OF CONTENTS 2...DOD INSTRUCTION 3000.11 MANAGEMENT OF DOD IRREGULAR WARFARE (IW) AND SECURITY FORCE ASSISTANCE (SFA) CAPABILITIES Originating Component...well as building the security capacity and capability of U.S. partners and allies. c. IW and SFA skills , training, education, and experience must be

  13. A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios

    OpenAIRE

    Kathryn Merrick; Medria Hardhienata; Kamran Shafi; Jiankun Hu

    2016-01-01

    Our increasing dependence on information technologies and autonomous systems has escalated international concern for information- and cyber-security in the face of politically, socially and religiously motivated cyber-attacks. Information warfare tactics that interfere with the flow of information can challenge the survival of individuals and groups. It is increasingly important that both humans and machines can make decisions that ensure the trustworthiness of information, communication and ...

  14. Investigating Iraq’s Chemical Warfare Program: Updated and Expanded Research Plan

    Science.gov (United States)

    2012-07-01

    chemical warfare, chemical weapons, Conflict Records Research Center, Tabun , Sarin, UN Sepcial Commission, UN UN Monitoring, Verification and Inspection...7 for tabun and sarin; and Ahmed 2 & 3 for production of precursors for tabun and sarin. The general contractor is Al Fao General Establishment that... tabun , and sarin. “mid- 1970s” Al Hazen Institute has by this time set up contacts with “30 major foreign organizations and companies” for securing

  15. Coalition Warfare Program Tactile Situation Awareness System for Aviation Applications: Simulator Flight Test

    Science.gov (United States)

    2015-12-01

    USAARL Report No. 2016-07 Coalition Warfare Program Tactile Situation Awareness System for Aviation Applications: Simulator Flight Test By...pilot evaluation of The Tactile Situation Awareness System (TSAS) during simulated flight . The objective was to evaluate the ability of TSAS to improve...summarizes recent findings obtained during a simulated helicopter flight employing TSAS. The objective was to evaluate the ability of TSAS to improve a

  16. Landmine Warfare in Support of Multi-domain Battle: Balancing Discrimination and Military Effectiveness

    Science.gov (United States)

    2017-05-25

    military personnel, obstruct economic development and reconstruction following a conflict, inhibit the repatriation of refugees and internally displaced...Basing themselves on the principle of international law that the right of the parties to an armed conflict to choose methods or means of warfare is...Conflict in the Gulf (London: Atlantic Books, 2006), 120-21. 30 Human Rights Watch, “Back in Business? US Landmine Production and Exports,” briefing

  17. Special Operations, Irregular Warfare, and Operational Art: A Theory of Special Operations

    Science.gov (United States)

    2013-12-10

    D.C.: U.S. Army Center of Military History, 2002), 304–308. 66Walter Laqueur , Guerrilla Warfare: A Historical & Critical Study (New Brunswick, NJ...Strategy in Guerrilla War Against Japan, 15–16. 72Peter L. Berger and Thomas Luckmann, The Social Construction of Reality (New York: Anchor Books...each other, undermining each other’s positions, or making a separate peace. The Some authors, such as Thomas Hammes, have argued that the

  18. Guerrilla Operations in the Civil War: Assessing Compound Warfare During Price’s Raid

    Science.gov (United States)

    2007-11-02

    hand, Three Years with Quantrill by O. S. Barton and Noted Guerrillas, or the Warfare on the Border by John Edwards provide alternate views of...events described in other sources. For example, Barton relates John McCorkle’s account of the story about guerrillas who Price’s army before the Battle of...Jay Monaghan provided excellent accounts of the major operations in the Trans-Mississippi Department during the Civil War. Finally, the framework for

  19. China’s Development of Asymmetric Warfare and the Security of Taiwan, Republic of China

    Science.gov (United States)

    2004-12-01

    thanks to my loving and devoted wife, Anita . Her patience, understanding, and remarkable ability to maintain a pleasant, comforting home during this...should arise (Bolt, Brenner , 2004, p.130). Information warfare technology can delay a United States response and commitment in the Taiwan Strait in...destruction of C4 systems by missiles, airpower, and high-energy weapons (Bolt & Brenner , 2004, p.133). Perhaps the most astonishing view of the PRC’s IW

  20. Molecular modeling toward selective inhibitors of dihydrofolate reductase from the biological warfare agent Bacillus anthracis.

    Science.gov (United States)

    Giacoppo, Juliana O S; Mancini, Daiana T; Guimarães, Ana P; Gonçalves, Arlan S; da Cunha, Elaine F F; França, Tanos C C; Ramalho, Teodorico C

    2015-02-16

    In the present work, we applied docking and molecular dynamics techniques to study 11 compounds inside the enzymes dihydrofolate reductase (DHFR) from the biological warfare agent Bacillus anthracis (BaDHFR) and Homo sapiens sapiens (HssDHFR). Six of these compounds were selected for a study with the mutant BaF96IDHFR. Our results corroborated with experimental data and allowed the proposition of a new molecule with potential activity and better selectivity for BaDHFR.

  1. Challenges in Coalition Unconventional Warfare: The Allied Campaign in Yugoslavia, 1941-1945

    Science.gov (United States)

    2014-01-01

    JFQ 75, 4th Quarter 2014 Duke, Phil lips, and Conover 129 Challenges in Coalition Unconventional Warfare The Allied Campaign in Yugoslavia , 1941...resistance elements in Yugoslavia . The resistance movement effectively fixed in place 35 German and Italian divisions, consisting of roughly 660,000...mountain headquarters in Yugoslavia on May 14, 1944 (Imperial War Museum) Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting

  2. Hungary’s alternative to counter hybrid warfare small state’s weaponized citizenry.

    Science.gov (United States)

    2017-06-09

    Wales and Warsaw emphasized the importance of cyber defense as a crucial capability of the international security environment against hybrid threats ...and “raising public awareness on cyber threats and cyber security .”214 In other words, the Cyber Defence Unit promotes the connection between the...from asymmetric threats , and has to cover all domains–including cyber . Former studies on countering hybrid warfare have identified these

  3. Courses of Action for Enhancing USAF ’Irregular Warfare’ Capabilities: A Functional Solutions Analysis

    Science.gov (United States)

    2010-01-01

    Warfare Center to ensure that technological opportunities for novel IW appli- cations were explored, developed, and fielded. (See pp. 38–40...activities; transnational criminal activities, including narco -trafficking, illicit arms dealing, and illegal financial transactions, that support or...opportunities for novel IW applications are explored, devel- oped, and fielded. In fact, over time, it might be appropriate for the USAF to create a

  4. Transport and Reactivity of Decontaminants to Provide Hazard Mitigation of Chemical Warfare Agents from Materials

    Science.gov (United States)

    2016-06-01

    of Additives and Impurities from Polymeric Materials; EPA 560/5-85-015; U.S. Environmental Protection Agency, Office of Pesticides and Toxic...performance, a penetrating decontaminant may cause damage to the material, such as the swelling of polymers caused by solvents or any active...Chemical Warfare Agent Degradation Products. Environ . Health Perspect. 1999, 107 (12), 933–974. 5. Kim, K.; Tsay, O.G.; Atwood, D.A.; Churchill, D.G

  5. No Compromise: Establishing Balance in the US Army’s Approach to Full-Spectrum Warfare

    Science.gov (United States)

    2011-04-04

    also needlessly prolongs corporate acceptance for a leadership culture that appreciates the ’ fluid character of warfare in the modern era. Beyond the...of Iraq, reveals that a numl?er of tactical leaders exhibited superb situational awareness and thoughtful response to extremely dynamic security...Paul D. Batchelor , Fixing Intel: · . A B lneprint for Making Intelligence Relevant in Afghanistan, Center for a New American Security, Washington

  6. Mountain Warfare and Other Lofty Problems: Foreign Perspectives on High-Altitude Combat

    Science.gov (United States)

    2011-01-01

    rope. The two primary ropes should be thoroughly tested when crossing along a rope with a climbing harness and pulley or carabiner. Gear should be...consequently, the Russian Army has a long history of mountain troops, production of specialized mountain warfare gear , and mountain training centers...The mountain units of foreign armies have spent years developing a well-worked-out technique for training Jägers. What gear should you to take to the

  7. Chemical Warfare in World War 1: The American Experience, 1917-1918 (Leavenworth Papers, Number 10)

    Science.gov (United States)

    1984-09-01

    before they reached the front. While moving forward one night toward Chauteau Thierry , the men stopped to rest in shallow shell holes near the road. A...20-23; Curt Wachtel, Chemical Warfare (Brooklyn, NY: Chemical Publishing Co., 1941), 66. 8. Hogg, Gas, 23. 9. Augustin Mitchell Prentiss...Magazine, 10 March 1980:28. Powell, E. Alexander. The Army Behind the Army. New York: Charles Scribner’s Sons, 1919. Prentiss, Augustin Mitchell

  8. [Glanders--a potential disease for biological warfare in humans and animals].

    Science.gov (United States)

    Lehavi, Ofer; Aizenstien, Orna; Katz, Lior H; Hourvitz, Ariel

    2002-05-01

    Infection with Burkholderia mallei (formerly Pseudomonas mallei) can cause a subcutaneous infection known as "farcy" or can disseminate to condition known as Glanders. It is primarily a disease affecting horses, donkeys and mules. In humans, Glanders can produce four types of disease: localized form, pulmonary form, septicemia, and chronic form. Necrosis of the tracheobronchial tree and pustular skin lesions characterize acute infection with B. mallei. Other symptoms include febrile pneumonia, if the organism was inhaled, or signs of sepsis and multiple abscesses, if the skin was the port of entry. Glanders is endemic in Africa, Asia, the Middle East, and Central and South America. Glanders has low contiguous potential, but because of the efficacy of aerosolized dissemination and the lethal nature of the disease, B. mallei was considered a candidate for biological warfare. During World War I, Glanders was believed to have been spread to infect large numbers of Russian horses and mules on the Eastern front. The Japanese infected horses, civilians and prisoners of war during World War II. The USA and the Soviet Union have shown interest in B. mallei in their biological warfare program. The treatment is empiric and includes mono or poly-therapy with Ceftazidime, Sulfadiazine, Trimethoprim + Sulfamethoxazol, Gentamicin, Imipenem etc. Aggressive control measures essentially eliminated Glanders from the west. However, with the resurgent concern about biological warfare, B. mallei is now being studied in a few laboratories worldwide. This review provides an overview of the disease and presents the only case reported in the western world since 1949.

  9. CONVENTIONAL DEVELOPMENT OF ENVIRONMENTAL PREOCCUPATIONS

    OpenAIRE

    2011-01-01

    A great number of the conventions referring to nature, even if they do not refer ton particular species, were limited from the point of view of geography and territories: we may give as example here a convention for the protection of flora, fauna and panoramic beauties of America, the African convention for nature and natural resources… By the Stockholm conferences, from the 5th of June 1972, we entered in a “dynamic of globalization”. Article 1 of the Declaration that followed the conference...

  10. NULL Convention Floating Point Multiplier

    OpenAIRE

    Anitha Juliette Albert; Seshasayanan Ramachandran

    2015-01-01

    Floating point multiplication is a critical part in high dynamic range and computational intensive digital signal processing applications which require high precision and low power. This paper presents the design of an IEEE 754 single precision floating point multiplier using asynchronous NULL convention logic paradigm. Rounding has not been implemented to suit high precision applications. The novelty of the research is that it is the first ever NULL convention logic multiplier, designed to p...

  11. Functionalized polymer nanofibre membranes for protection from chemical warfare stimulants

    Energy Technology Data Exchange (ETDEWEB)

    Ramaseshan, Ramakrishnan [Nanoscience and Nanotechnology Initiative, National University of Singapore, 2 Engineering Drive 3, Singapore 117576, Singapore (Singapore); Sundarrajan, Subramanian [Nanoscience and Nanotechnology Initiative, National University of Singapore, 2 Engineering Drive 3, Singapore 117576, Singapore (Singapore); Liu, Yingjun [Department of Mechanical Engineering, National University of Singapore, 9 Engineering Drive 1, Singapore 117576, Singapore (Singapore); Barhate, R S [Nanoscience and Nanotechnology Initiative, National University of Singapore, 2 Engineering Drive 3, Singapore 117576, Singapore (Singapore); Lala, Neeta L [Nanoscience and Nanotechnology Initiative, National University of Singapore, 2 Engineering Drive 3, Singapore 117576, Singapore (Singapore); Ramakrishna, S [Nanoscience and Nanotechnology Initiative, National University of Singapore, 2 Engineering Drive 3, Singapore 117576, Singapore (Singapore)

    2006-06-28

    A catalyst for the detoxification of nerve agents is synthesized from {beta}-cyclodextrin ({beta}-CD) and o-iodosobenzoic acid (IBA). Functionalized polymer nanofibre membranes from PVC polymer are fabricated with {beta}-CD, IBA, a blend of {beta}-CD+IBA, and the synthesized catalyst. These functionalized nanofibres are then tested for the decontamination of paraoxon, a nerve agent stimulant, and it is observed that the stimulant gets hydrolysed. The kinetics of hydrolysis is investigated using UV spectroscopy. The rates of hydrolysis for different organophosphate hydrolyzing agents are compared. The reactivity and amount of adsorption of these catalysts are of higher capacity than the conventionally used activated charcoal. A new design for protective wear is proposed based on the functionalized nanofibre membrane.

  12. NULL Convention Floating Point Multiplier

    Directory of Open Access Journals (Sweden)

    Anitha Juliette Albert

    2015-01-01

    Full Text Available Floating point multiplication is a critical part in high dynamic range and computational intensive digital signal processing applications which require high precision and low power. This paper presents the design of an IEEE 754 single precision floating point multiplier using asynchronous NULL convention logic paradigm. Rounding has not been implemented to suit high precision applications. The novelty of the research is that it is the first ever NULL convention logic multiplier, designed to perform floating point multiplication. The proposed multiplier offers substantial decrease in power consumption when compared with its synchronous version. Performance attributes of the NULL convention logic floating point multiplier, obtained from Xilinx simulation and Cadence, are compared with its equivalent synchronous implementation.

  13. NULL convention floating point multiplier.

    Science.gov (United States)

    Albert, Anitha Juliette; Ramachandran, Seshasayanan

    2015-01-01

    Floating point multiplication is a critical part in high dynamic range and computational intensive digital signal processing applications which require high precision and low power. This paper presents the design of an IEEE 754 single precision floating point multiplier using asynchronous NULL convention logic paradigm. Rounding has not been implemented to suit high precision applications. The novelty of the research is that it is the first ever NULL convention logic multiplier, designed to perform floating point multiplication. The proposed multiplier offers substantial decrease in power consumption when compared with its synchronous version. Performance attributes of the NULL convention logic floating point multiplier, obtained from Xilinx simulation and Cadence, are compared with its equivalent synchronous implementation.

  14. Towards a Theory of Convention

    DEFF Research Database (Denmark)

    Hansen, Pelle Guldborg

    2006-01-01

    theory. Like for the study of common knowledge much has happened in this latter field since then. The theory of convention has been developed and extended so as to include multiple types as well as a basis for the study of social norms. However, classical game theory is currently undergoing severe crisis...... as a tool for understanding and explaining social phenomena; a crisis emerging from the problem of equilibrium selection around which any theory of convention must revolve. The so-called evolutionary turn in game theory marks a transition from the classical assumptions of rationality and common knowledge...... of such to evolutionary game theoretical frameworks inspired by the models of (Maynard Smith & Price 1973), (Taylor & Jonker 1978) and (Maynard Smith 1982). By providing an account of equilibrium selection these are thought to work as well-defined metaphors of learning processes upon which a revised theory of convention...

  15. Towards a Theory of Convention

    DEFF Research Database (Denmark)

    Hansen, Pelle Guldborg

    2006-01-01

    theory. Like for the study of common knowledge much has happened in this latter field since then. The theory of convention has been developed and extended so as to include multiple types as well as a basis for the study of social norms. However, classical game theory is currently undergoing severe crisis...... as a tool for understanding and explaining social phenomena; a crisis emerging from the problem of equilibrium selection around which any theory of convention must revolve. The so-called evolutionary turn in game theory marks a transition from the classical assumptions of rationality and common knowledge...

  16. Quality of life in chemical warfare survivors with ophthalmologic injuries: the first results form Iran Chemical Warfare Victims Health Assessment Study

    Directory of Open Access Journals (Sweden)

    Soroush Mohammad

    2009-01-01

    Full Text Available Abstract Background Iraq used chemical weapons extensively against the Iranians during the Iran-Iraq war (1980–1988. The aim of this study was to assess the health related quality of life (HRQOL in people who had ophthalmologic complications due to the sulfur mustard gas exposure during the war. Methods The Veterans and Martyrs Affair Foundation (VMAF database indicated that there were 196 patients with severe ophthalmologic complications due to chemical weapons exposure. Of these, those who gave consent (n = 147 entered into the study. Quality of life was measured using the 36-item Short Form Health Survey (SF-36 and scores were compared to those of the general public. In addition logistic regression analysis was performed to indicate variables that contribute to physical and mental health related quality of life. Results The mean age of the patients was 44.8 (SD = 8.7 ranging from 21 to 75 years. About one-third of the cases (n= 50 reported exposure to chemical weapons more than once. The mean exposure duration to sulfur mustard gas was 21.6 years (SD = 1.2. The lowest scores on the SF-36 subscales were found to be: the role physical and the general health. Quality of life in chemical warfare victims who had ophthalmologic problems was significantly lower than the general public (P Conclusion The study findings suggest that chemical warfare victims with ophthalmologic complications suffer from poor health related quality of life. It seems that the need for provision of health and support for this population is urgent. In addition, further research is necessary to measure health related quality of life in victims with different types of disabilities in order to support and enhance quality of life among this population.

  17. Mass Spectrometry Applications for the Identification and Quantitation of Biomarkers Resulting from Human Exposure to Chemical Warfare Agents

    Science.gov (United States)

    Smith, J. Richard; Capacio, Benedict R.

    In recent years, a number of analytical methods using biomedical samples such as blood and urine have been developed for the verification of exposure to chemical warfare agents. The majority of methods utilize gas or liquid chromatography in conjunction with mass spectrometry. In a small number of cases of suspected human exposure to chemical warfare agents, biomedical specimens have been made available for testing. This chapter provides an overview of biomarkers that have been verified in human biomedical samples, details of the exposure incidents, the methods utilized for analysis, and the biomarker concentration levels determined in the blood and/or urine.

  18. Hydrogen storage: beyond conventional methods.

    Science.gov (United States)

    Dalebrook, Andrew F; Gan, Weijia; Grasemann, Martin; Moret, Séverine; Laurenczy, Gábor

    2013-10-09

    The efficient storage of hydrogen is one of three major hurdles towards a potential hydrogen economy. This report begins with conventional storage methods for hydrogen and broadly covers new technology, ranging from physical media involving solid adsorbents, to chemical materials including metal hydrides, ammonia borane and liquid precursors such as alcohols and formic acid.

  19. Grounding Damage to Conventional Vessels

    DEFF Research Database (Denmark)

    Lützen, Marie; Simonsen, Bo Cerup

    2003-01-01

    The present paper is concerned with rational design of conventional vessels with regard to bottom damage generated in grounding accidents. The aim of the work described here is to improve the design basis, primarily through analysis of new statistical data for grounding damage. The current...

  20. Inventory non-conventional gas

    Energy Technology Data Exchange (ETDEWEB)

    Muntendam-Bos, A.G.; Wassing, B.B.T.; Ter Heege, J.H.; Van Bergen, F.; Schavemaker, Y.A.; Van Gessel, S.F.; De Jong, M.L.; Nelskamp, S.; Van Thienen-Visser, K.; Guasti, E.; Van den Belt; Marges, V.C. [TNO Built Environment and Geosciences, Utrecht (Netherlands)

    2009-10-15

    This report describes the results of the inventory for each non-conventional gas resource expected to be present in the Netherlands, which are: Tight Gas, Shallow gas, Coal bed Methane (CBM), Shale gas, Basin Centered Gas, Aquifer Gas and Stratigraphic traps.

  1. Programming Coup D’Oeil: The Impact of Decision Making Technology in Operational Warfare

    Science.gov (United States)

    2010-05-03

    that it is time consuming and it requires a high degree of good information to yield accurate options for success. In warfare, tempo is vital and...influence decision makers and planners is ethnocentrism . Dong, Day, and Collaço defined ethnocentrism as the “belief that 6 one‟s ethnic or cultural...group is the center of everything, and all other things are related to or dependent on it.” 12 Ethnocentrism plays a role in shaping stereotypes

  2. THE CONTRIBUTION MADE BY T.E. LAWRENCE TO THE THEORY OF REVOLUTIONARY WARFARE

    Directory of Open Access Journals (Sweden)

    G.K.B. Barron

    2012-02-01

    Full Text Available Lawrence was basically an academic thrown into the hurly-burly of leading an Arab revolt against Turkish domination. It could be said that the war in the Middle East was a sideshow of the First World War and Lawrence's part was a ' ... sideshow to the sideshow'l Why then has Lawrence been remembered when greater military men have been forgotten? The romanticism of his exploits are surely the reason, and yet the fact that he is the first modern theorist and possibly the "father" of modern revolutionary warfare, tends to be forgotten.

  3. Development of Bicarbonate-Activated Peroxide as a Chemical and Biological Warfare Agent Decontaminant

    Science.gov (United States)

    2006-06-30

    Peroxide (HOO-) 7.8 29 26.7 ± 0.2 t-Butyl hydroperoxide ((CH3)3COO-) 7.8 9.7 39 Cumene hydroperoxide ((C6H6)C(CH3)2OO-) 7.8 9.3 22 All reactions run with...peroxymonocarbonate ion (HCO4-) as the oxidant in the catalytic oxidation reactions . For perhydrolytic cleavage of organophosphates the peroxycarbonate dianion...solubility and reaction rates for applications in chemical warfare agent decontamination. -O *C O O OH -O *C OH O HO *C OH O *CO2 HO2 - H2OHO *C O O OH pKa

  4. New concepts and their applications in underwater acoustic warfare simulation system

    Institute of Scientific and Technical Information of China (English)

    DONG Yangze; YAO Lan

    2004-01-01

    An underwater acoustic warfare simulation system (UAWSS) with a structure of high level architecture (HLA) is studied based upon a previous research project. With the experience and lessons learned, some new concepts are adopted in the implementation of UAWSS according to the essence of simulation and the objective of the system, among which are simulation synthetic environment, signal processing at other simulation nodes, decomposition of underwater sound channel, channel varying law and rules on system and parts evaluation, etc. Applications of these new ideas show that they are effective.

  5. A Wolfram in Sheep's Clothing: Economic Warfare in Spain and Portugal, 1940-1944

    OpenAIRE

    Rockoff, Hugh; Caruana, Leonard

    2000-01-01

    One of the most sustained uses of economic warfare by the United States, at least judged by the variety of means used and the issue at stake, occurred in Spain and Portugal during WWII. We provide an overview of this episode by weaving together findings from the secondary literature and from new research in the Spanish archives. The war evolved through several distinct phases. (1) An oil embargo against Spain, although launched when Germany appeared to be winning the war (July 27 to September...

  6. Evolutionary Games and Social Conventions

    DEFF Research Database (Denmark)

    Hansen, Pelle Guldborg

    2007-01-01

    Some thirty years ago Lewis published his Convention: A Philosophical Study (Lewis, 2002). This laid the foundation for a game-theoretic approach to social conventions, but became more famously known for its seminal analysis of common knowledge; the concept receiving its canonical analysis...... in Aumann (1976) and which, together with the assumptions of perfect rationality, came to be defining of classical game theory. However, classical game theory is currently undergoing severe crisis as a tool for exploring social phenomena; a crisis emerging from the problem of equilibrium selection around...... knowledge to assumptions characterising agents as conditioned for playing certain strategies upon the population of which evolutionary processes operate. By providing accounts of equilibrium selection and stability properties of behaviours, the resulting frameworks have been brought to work as well...

  7. Conventional treatments for ankylosing spondylitis

    OpenAIRE

    Dougados, M; Dijkmans, B; Khan, M.(Department of Physics, Aligarh Muslim University, Aligarh, India); Maksymowych, W; van der Linden, S; Brandt, J

    2002-01-01

    Management of ankylosing spondylitis (AS) is challenged by the progressive nature of the disease. To date, no intervention is available that alters the underlying mechanism of inflammation in AS. Currently available conventional treatments are palliative at best, and often fail to control symptoms in the long term. Current drug treatment may perhaps induce a spurious state of "disease remission," which is merely a low level of disease activity. Non-steroidal anti-inflammatory drugs are first ...

  8. CONVENTIONAL DEVELOPMENT OF ENVIRONMENTAL PREOCCUPATIONS

    Directory of Open Access Journals (Sweden)

    Claudia ANDRITOI

    2011-12-01

    Full Text Available A great number of the conventions referring to nature, even if they do not refer ton particular species, were limited from the point of view of geography and territories: we may give as example here a convention for the protection of flora, fauna and panoramic beauties of America, the African convention for nature and natural resources… By the Stockholm conferences, from the 5th of June 1972, we entered in a “dynamic of globalization”. Article 1 of the Declaration that followed the conference is important for the global awareness: “Human beings have the basic right for freedom, equality and conditions of a satisfying life, in an environment with a quality that allows him to live with dignity and well being. He has the solemn duty to protect and improve the environment for the present and future generations (…”. This article proclaims a right for the environment. A new law seems to have arisen with the apparition of this convention: the right of a healthy human being and of a healthy environment. This law is bipolar because it associates the human beings to nature. Human beings have the right to live in a healthy environment and this is why he has to protect nature. This does not represent a right of the human beings from a strict point of view. This is a right that has a universal value. The right to a healthy environment can not be put in the same category as the right to live or the right to be healthy, because this right contains the latter.

  9. Academic Training Lectures | Stuxnet and Cyber-Warfare | 13-14 January 2016

    CERN Multimedia

    2015-01-01

    Please note that the next series of Academic Training Lectures will take place on 13 and 14 January 2016. The lectures will be given by Gian Piero Siroli (Università e INFN, Bologna (IT))   Stuxnet and Cyber-Warfare (1/2)​ on Wednesday, 13 January from 11 a.m. to 12 p.m. http://indico.cern.ch/event/438525/ Stuxnet and Cyber-Warfare (2/2) on Thursday, 14 January from 11 a.m. to 12 p.m. http://indico.cern.ch/event/438526/ at CERN, Council Chamber (503-1-001)  Description: The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran&...

  10. Bioarchaeological investigation of ancient Maya violence and warfare in inland Northwest Yucatan, Mexico.

    Science.gov (United States)

    Serafin, Stanley; Lope, Carlos Peraza; Uc González, Eunice

    2014-05-01

    This study investigates evidence of changes and continuities in ancient Maya violence and warfare in inland northwest Yucatan, Mexico from the Middle Preclassic (600-300 BC) to the Postclassic (AD 1050-1542) through bioarchaeological analysis of cranial and projectile trauma. It is hypothesized that the frequency of violence increases before the Classic Maya collapse and remains high during the Postclassic period. It is also hypothesized that the flat, open terrain was conducive to warfare and resulted in higher trauma frequencies than in other parts of the Maya area. Results show that the frequency of cranial trauma decreases before the Classic collapse and increases in the Postclassic, partially matching the expected chronological trends. The frequency of cranial trauma does not differ significantly from other Maya regions but the pattern does: for all periods, males have more healed injuries than females and they are concentrated on the left side of the anterior of the skull. Some injuries appear to be from small points hafted in wooden clubs. In addition, projectile trauma is evident in a scapula with an embedded arrowhead tip, the first such case reported in a Maya skeleton. Overall, these results suggest greater reliance on open combat and less on raids in this region compared with other parts of the Maya area, possibly due to the flat, open terrain, though the identification of perimortem trauma in both women and men indicates surprise raids on settlements were also practiced. Copyright © 2014 Wiley Periodicals, Inc.

  11. Ge{sup 4+} doped TiO{sub 2} for stoichiometric degradation of warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Stengl, Vaclav, E-mail: stengl@iic.cas.cz [Department of Solid State Chemistry, Institute of Inorganic Chemistry AS CR v.v.i., 250 68 Rez (Czech Republic); Grygar, Tomas Matys [Department of Solid State Chemistry, Institute of Inorganic Chemistry AS CR v.v.i., 250 68 Rez (Czech Republic); Oplustil, Frantisek; Nemec, Tomas [Military Technical Institute of Protection Brno, Veslarska 230, 628 00 Brno (Czech Republic)

    2012-08-15

    Highlights: Black-Right-Pointing-Pointer We prepared nanodisperse Ge{sup 4+} doped titania by a novel synthesis method. Black-Right-Pointing-Pointer Synthesis does not involve organic solvents, organometallics nor thermal processes. Black-Right-Pointing-Pointer The prepared materials are efficient in removal of chemical warfare agents. Black-Right-Pointing-Pointer Ge{sup 4+} doping improves rate of removal of soman and agent VX by TiO{sub 2}. - Abstract: Germanium doped TiO{sub 2} was prepared by homogeneous hydrolysis of aqueous solutions of GeCl{sub 4} and TiOSO{sub 4} with urea. The synthesized samples were characterized by X-ray diffraction, scanning electron microscopy, EDS analysis, specific surface area (BET) and porosity determination (BJH). Ge{sup 4+} doping increases surface area and content of amorphous phase in prepared samples. These oxides were used in an experimental evaluation of their reactivity with chemical warfare agent, sulphur mustard, soman and agent VX. Ge{sup 4+} doping worsens sulphur mustard degradation and improves soman and agent VX degradation. The best degree of removal (degradation), 100% of soman, 99% of agent VX and 95% of sulphur mustard, is achieved with sample with 2 wt.% of germanium.

  12. An Empirical Examination of the Warfare Metaphor with Respect to Pre-Service Elementary Teachers

    Science.gov (United States)

    Cobern, William W.; Loving, Cathleen C.; Davis, Edward B.; Terpstra, Jeff

    2013-08-01

    Since its origination in the late nineteenth century, the warfare metaphor has been used to characterize the relationship between science and religion, especially orthodox Christianity. Though thoroughly discredited by historians of science, the ideological descendants of Thomas Huxley, who spoke of science in quasi-religious terms, have kept the warfare metaphor alive. On the other hand, there are substantial numbers of Christians who at least appear to oppose science given their high-profile opposition to the general theory of evolution. The research reported in this paper asked, "Does anti-science sentiment increase with increasing orthodox Christian belief?" Two validated, published instruments were used: The Thinking about Science Survey Instrument and the Christian Fundamentalist Belief Scale. The subjects for the study were 545 preservice elementary teachers. The analysis did not show that anti-science sentiment increases with increasing Christian belief. Subjects with strong Christian beliefs were found to be just as supportive of science, if not more so, than subjects with no Christian beliefs. The study concludes with a caution against projecting attitudes toward science "on the whole" based on attitudes specifically toward evolution when working with preservice elementary teachers. Such a projection could well be counterproductive. The study has implications for other modern countries having highly religious populations such as Turkey.

  13. A decade of major vascular trauma: Lessons learned from gang and civilian warfare.

    Science.gov (United States)

    Ramdass, M J; Harnarayan, P

    2017-01-01

    INTRODUCTION Trinidad and Tobago is a trans-shipment point for the illegal trade of drugs, arms and ammunition and, as such, has a high incidence of gang-related warfare and drug-related crimes. This has led to a high incidence of gunshot and stab wounds, with associated major vascular injuries. We describe our management strategies learned from a decade of vascular trauma experience. METHODS A retrospective analysis of age, gender, type of trauma, vessel injured, procedure and outcome for all cases of vascular trauma between 2006 and 2015 at two surgical units in Trinidad and Tobago. RESULTS There were 198 vascular trauma cases (232 procedures), involving 159 (80%) males at a mean age of 33 years. Gunshots accounted for 103 (52%) cases, followed by stabs/chops (n=50; 25%) and lacerations (n=15; 8%). The most commonly injured vessels were the radial/ulnar arteries (n=39; 20%) and the superficial femoral artery (n=37; 19%). There were seven pseudoaneurysms and three traumatic arteriovenous fistulae. Repair techniques included primary (n=82; 35%), reversed vein (n=63; 27%), polytetrafluoroethylene (n=58; 25%), oversew (n=24; 10%) and endovascular (n=5; 2%) techniques. There were eight (4%) secondary amputations and eight (4%) deaths. CONCLUSIONS Major vascular trauma causes significant morbidity and mortality in Trinidad and Tobago, with the majority of cases due to gunshot injuries secondary to gang-related warfare and civilian violence. We compare our experience with that in the literature on the epidemiology and management of vascular trauma.

  14. Investigating the Relationship Between Drone Warfare and Civilian Casualties in Gaza

    Directory of Open Access Journals (Sweden)

    Dr. Ann Rogers

    2014-12-01

    Full Text Available Unmanned aerial vehicles (UAVs, better known as drones, are increasingly touted as ‘humanitarian’ weapons that contribute positively to fighting just wars and saving innocent lives. At the same time, civilian casualties have become the most visible and criticized aspect of drone warfare. It is argued here that drones contribute to civilian casualties not in spite of, but because of, their unique attributes. They greatly extend war across time and space, pulling more potential threats and targets into play over long periods, and because they are low-risk and highly accurate, they are more likely to be used. The assumption that drones save lives obscures a new turn in strategic thinking that sees states such as Israel and the US rely on large numbers of small, highly discriminating attacks applied over time to achieve their objectives. This examination of Israel’s 2014 war in Gaza argues that civilian casualties are not an unexpected or unintended consequence of drone warfare, but an entirely predictable outcome.

  15. Next Generation Non-particulate Dry Nonwoven Pad for Chemical Warfare Agent Decontamination

    Energy Technology Data Exchange (ETDEWEB)

    Ramkumar, S S; Love, A; Sata, U R; Koester, C J; Smith, W J; Keating, G A; Hobbs, L; Cox, S B; Lagna, W M; Kendall, R J

    2008-05-01

    New, non-particulate decontamination materials promise to reduce both military and civilian casualties by enabling individuals to decontaminate themselves and their equipment within minutes of exposure to chemical warfare agents or other toxic materials. One of the most promising new materials has been developed using a needlepunching nonwoven process to construct a novel and non-particulate composite fabric of multiple layers, including an inner layer of activated carbon fabric, which is well-suited for the decontamination of both personnel and equipment. This paper describes the development of a composite nonwoven pad and compares efficacy test results for this pad with results from testing other decontamination systems. The efficacy of the dry nonwoven fabric pad was demonstrated specifically for decontamination of the chemical warfare blister agent bis(2-chloroethyl)sulfide (H or sulfur mustard). GC/MS results indicate that the composite fabric was capable of significantly reducing the vapor hazard from mustard liquid absorbed into the nonwoven dry fabric pad. The mustard adsorption efficiency of the nonwoven pad was significantly higher than particulate activated carbon (p=0.041) and was similar to the currently fielded US military M291 kit (p=0.952). The nonwoven pad has several advantages over other materials, especially its non-particulate, yet flexible, construction. This composite fabric was also shown to be chemically compatible with potential toxic and hazardous liquids, which span a range of hydrophilic and hydrophobic chemicals, including a concentrated acid, an organic solvent and a mild oxidant, bleach.

  16. APSTNG: neutron interrogation for detection of explosives, drugs, and nuclear and chemical warfare materials

    Science.gov (United States)

    Rhodes, Edgar A.; Peters, Charles W.

    1993-02-01

    A recently developed neutron diagnostic probe system has the potential to satisfy a significant number of van-mobile and fixed-portal requirements for nondestructive detection, including monitoring of contraband explosives, drugs, and weapon materials, and treaty verification of sealed munitions. The probe is based on a unique associated-particle sealed-tube neutron generator (APSTNG) that interrogates the object of interest with a low-intensity beam of 14- MeV neutrons generated from the deuterium-tritium reaction and that detects the alpha-particle associated with each neutron. Gamma-ray spectra of resulting neutron reactions identify nuclides associated with all major chemicals in explosives, drugs, and chemical warfare agents, as well as many pollutants and fissile and fertile special nuclear material. Flight times determined from detection times of the gamma-rays and alpha-particles yield a separate coarse tomographic image of each identified nuclide. The APSTNG also forms the basis for a compact fast-neutron transmission imaging system that can be used along with or instead of the emission imaging system. Proof-of-concept experiments have been performed under laboratory conditions for simulated nuclear and chemical warfare munitions and for explosives and drugs. The small and relatively inexpensive APSTNG exhibits high reliability and can be quickly replaced. Surveillance systems based on APSTNG technology can avoid the large physical size, high capital and operating expenses, and reliability problems associated with complex accelerators.

  17. Three-dimensional visualization and control of electronic warfare (EW) payloads

    Science.gov (United States)

    Kirsch, Patricia; Tremper, David; Cortesi, Roger

    2008-04-01

    The proliferation of unmanned vehicles carrying tactical payloads in the battle-space has accelerated the need for user-friendly visualization with graphical interfaces to provide remote command and control. Often these platforms and payloads receive their control functions from command centers located half a world away via satellite communications. Operators require situational awareness tools capable of graphically presenting the remote battlefield asset positions and collected sensor data. Often these systems use 2D software mapping tools in conjunction with video for real time situational awareness. The Special Projects Group (SPG) in the Tactical Electronic Warfare Division of the U.S. Naval Research Laboratory has been developing an operator control interface called the Jammer Control Station (JCS) to provide 3D battle-space visualization with built-in, remote EW payload command and control (C2) capabilities. The JCS interface presents the operator with graphic depictions of both the platforms' states and the RF environment. Text based messaging between the JCS and the EW payload reduces the impact of the system on the available bandwidth. This paper will discuss the use of the SIMDIS 3-D visualization tool as a real-time command and control interface for electronic warfare (EW) payloads.

  18. Implications for studying team cognition and team performance in network-centric warfare paradigms.

    Science.gov (United States)

    Krueger, Gerald P; Banderet, Louis E

    2007-05-01

    Network-centric warfare's (NCW) information-rich systems involving sophisticated sensors, tracking systems, smart weapons, and enhanced digital communications threaten to overload combatants with voluminous amounts of data. It is unclear whether warfighters will perceive such extensive data as actionable information to which they will respond accurately in a timely enough manner. Members of small teams in command and control centers, operating in crew-served vehicles, or simply "grunting it out" as ground-pounding infantrymen, may be disparately separated by space, but will communicate and be connected by electronic linkages, e.g., radio, text messages, situation displays, or global positioning data. However, team members will also have to remember shared mental models of tasks at hand, pay attention to and share common situation awareness in complex operational environments, perform team cognition and team coordination, and integrate both lower and higher cognitive processes with those of team behaviors. Such exceptional capabilities are required more now than ever before; such capabilities today are far from assured. After two workshops to establish performance metrics for assessing cognitive performance of military personnel in NCW, this preface introduces five manuscripts addressing team cognition and team performance from both a theoretical and a practical perspective. The authors of this preface question if NCW, and perhaps the politico-social ramifications of modern warfare, have already outstripped behavioral scientists' approach to researching team cognition and team performance-expertise that is so crucially needed for combatants on the rapidly changing 21st-century battlegrounds.

  19. 76 FR 10522 - Naval Surface Warfare Center, Upper Machodoc Creek and the Potomac River, Dahlgren, VA; Danger Zone

    Science.gov (United States)

    2011-02-25

    ... and the Potomac River, Dahlgren, VA; Danger Zone AGENCY: U.S. Army Corps of Engineers, DoD. ACTION... danger zone in the vicinity of Naval Surface Warfare Center, Dahlgren, in King George County, Virginia..., and expands the boundaries of a portion of the danger zone. The amendment is necessary to protect...

  20. Chemical and biological warfare: Detection and warning systems. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-10-01

    The bibliography contains citations concerning the detection, identification, verification, and warning systems of chemical and biological warfare agents. Citations discuss agents sampling, monitoring, and assessment. Techniques include chromotography, biosensing, chemical analysis, and DNA probes. Land pollution, soil tests, and skin protection are examined. (Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  1. Chemical and biological warfare: Biology, chemistry, and toxicology. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-10-01

    The bibliography contains citations concerning the physiological effects, physicochemical effects, and toxicology of chemical and biological warfare agents. Citations discuss toxic chemicals, chemical agent simulants, detoxification and decontamination, environmental toxicity, and land pollution. Detection techniques and warning systems are examined in a separate bibliography. (Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  2. Chemical and biological warfare: Biology, chemistry, and toxicology. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-11-01

    The bibliography contains citations concerning the physiological effects, physicochemical effects, and toxicology of chemical and biological warfare agents. Citations discuss toxic chemicals, chemical agent simulants, detoxification and decontamination, environmental toxicity, and land pollution. Detection techniques and warning systems are examined in a separate bibliography. (Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  3. Global Survey of Research and Capabilities in Genetically Engineered Organisms That Could be Used in Biological Warfare or Bioterrorism

    Science.gov (United States)

    2008-12-01

    advances (summarized in Section 4) that could facilitate or at least inspire the pursuit of biological warfare capabilities. We share the opinion that...a)bccdc.ca Infectious Diseases Control Unit of the Direction de la sante publique , Montreal Chest Institute, Montreal Division of Infectious and

  4. An Assessment of the Effectiveness of Computer-based Training for Newly Commissioned Surface Warfare Division Officers

    Science.gov (United States)

    2009-08-24

    Chief of Naval Operations Surface Warfare Directorate. (2002, June 15). Navigation, seamanship and shiphandling training requirements document...unlimited. Prepared for: Naval Postgraduate School, Monterey, California 93943 An Assessment of the Effectiveness of Computer-based Training...Stephen Mehay, Professor With the assistance of Carol Stoker and Robert Paynter Naval Postgraduate School Naval Postgraduate School

  5. Groundwater geochemical and selected volatile organic compound data, Operable Unit 1, Naval Undersea Warfare Center, Division Keyport, Washington, July 2015

    Science.gov (United States)

    Huffman, Raegan L.

    2016-05-18

    Previous investigations indicate that concentrations of chlorinated volatile organic compounds (CVOCs) are substantial in groundwater beneath the 9-acre former landfill at Operable Unit 1, Naval Undersea Warfare Center, Division Keyport, Washington. The U.S. Geological Survey has continued to monitor groundwater geochemistry to ensure that conditions remain favorable for contaminant biodegradation as specified in the Record of Decision for the site.

  6. Speed of adaptation and genomic footprints of host-parasite coevolution under arms race and trench warfare dynamics.

    Science.gov (United States)

    Tellier, Aurélien; Moreno-Gámez, Stefany; Stephan, Wolfgang

    2014-08-01

    Coevolution between hosts and their parasites is expected to follow a range of possible dynamics, the two extreme cases being called trench warfare (or Red Queen) and arms races. Long-term stable polymorphism at the host and parasite coevolving loci is characteristic of trench warfare, and is expected to promote molecular signatures of balancing selection, while the recurrent allele fixation in arms races should generate selective sweeps. We compare these two scenarios using a finite size haploid gene-for-gene model that includes both mutation and genetic drift. We first show that trench warfare do not necessarily display larger numbers of coevolutionary cycles per unit of time than arms races. We subsequently perform coalescent simulations under these dynamics to generate sequences at both host and parasite loci. Genomic footprints of recurrent selective sweeps are often found, whereas trench warfare yield signatures of balancing selection only in parasite sequences, and only in a limited parameter space. Our results suggest that deterministic models of coevolution with infinite population sizes do not predict reliably the observed genomic signatures, and it may be best to study parasite rather than host populations to find genomic signatures of coevolution, such as selective sweeps or balancing selection.

  7. Recommended Architecture for a Knowledge Management System for the Undersea Launchers Division at the Naval Undersea Warfare Center

    Science.gov (United States)

    2010-09-01

    suggested using a systematic approach to the development of a KM system through understanding of the organization’s core competencies. One of the benefits...Kaistha, V. (2007). NAVSEA 05D ship design and certification network knowledge mangement project. West Bethesda, MD: Naval Surface Warfare Center

  8. 75 FR 3395 - Taking and Importing Marine Mammals; U.S. Naval Surface Warfare Center Panama City Division...

    Science.gov (United States)

    2010-01-21

    ..., and provide the opportunity for an experienced biologist to collect data on marine mammal behavior... National Oceanic and Atmospheric Administration 50 CFR Part 218 RIN 0648-AW80 Taking and Importing Marine Mammals; U.S. Naval Surface Warfare Center Panama City Division Mission Activities AGENCY: National Marine...

  9. 78 FR 53109 - Security Zones; Naval Base Point Loma; Naval Mine Anti-Submarine Warfare Command; San Diego Bay...

    Science.gov (United States)

    2013-08-28

    ...-Submarine Warfare Command; San Diego Bay, San Diego, CA AGENCY: Coast Guard, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The Coast Guard proposes extending a portion of an existing San Diego Bay security zone... security zone modifications are intended to restrict vessels from a portion of the San Diego Bay in order...

  10. 78 FR 72025 - Security Zones; Naval Base Point Loma; Naval Mine Anti Submarine Warfare Command; San Diego Bay...

    Science.gov (United States)

    2013-12-02

    ... Submarine Warfare Command; San Diego Bay, San Diego, CA AGENCY: Coast Guard, DHS. ACTION: Final rule. SUMMARY: The Coast Guard is increasing a portion of an existing San Diego Bay security zone at Naval Base... Diego Bay in order to ensure the safety and security of Naval assets. Both security zones will safeguard...

  11. Reevaluation of 1999 Health-Based Environmental Screening Levels (HBESLs) for Chemical Warfare Agents

    Energy Technology Data Exchange (ETDEWEB)

    Watson, Annetta Paule [ORNL; Dolislager, Fredrick G [ORNL

    2007-05-01

    This report evaluates whether new information and updated scientific models require that changes be made to previously published health-based environmental soil screening levels (HBESLs) and associated environmental fate/breakdown information for chemical warfare agents (USACHPPM 1999). Specifically, the present evaluation describes and compares changes that have been made since 1999 to U.S. Environmental Protection Agency (EPA) risk assessment models, EPA exposure assumptions, as well as to specific chemical warfare agent parameters (e.g., toxicity values). Comparison was made between screening value estimates recalculated with current assumptions and earlier health-based environmental screening levels presented in 1999. The chemical warfare agents evaluated include the G-series and VX nerve agents and the vesicants sulfur mustard (agent HD) and Lewisite (agent L). In addition, key degradation products of these agents were also evaluated. Study findings indicate that the combined effect of updates and/or changes to EPA risk models, EPA default exposure parameters, and certain chemical warfare agent toxicity criteria does not result in significant alteration to the USACHPPM (1999) health-based environmental screening level estimates for the G-series and VX nerve agents or the vesicant agents HD and L. Given that EPA's final position on separate Tier 1 screening levels for indoor and outdoor worker screening assessments has not yet been released as of May 2007, the study authors find that the 1999 screening level estimates (see Table ES.1) are still appropriate and protective for screening residential as well as nonresidential sites. As such, risk management decisions made on the basis of USACHPPM (1999) recommendations do not require reconsideration. While the 1999 HBESL values are appropriate for continued use as general screening criteria, the updated '2007' estimates (presented below) that follow the new EPA protocols currently under development

  12. The Venus "Shell-over-Star" hieroglyph and Maya warfare: An examination of the interpretation of a Mayan symbol

    Science.gov (United States)

    Voit, Claudia Ann

    For decades, Maya scholars have associated the Mayan "Shell-Star" (also referred to as "Star-War") hieroglyph with Maya warfare. Put forward by scholars such as Floyd Lounsbury and David Kelley, and later advanced by Linda Schele, David Freidel, Ian Graham, Peter Matthews, Anthony Aveni and others, there are now dozens of published articles and chapters relating the hieroglyph to Venus and warfare. Venus is one of the most notable celestial objects outside of the Sun and Moon and was highly visible to the inhabitants of the Maya world. The Dresden Codex (an astronomical almanac) contains important information about the planet Venus, and the calendar section was deciphered by the librarian and mathematician, Ernst Förstemann in the late 1800s. In his decipherment, he deduced that the numbers contained in the tables must be connected to the orbital period of the planet. There is no other planet with the same orbital period 3 as Venus. Förstemann suggested that the decoded astronomy tables were used by the Maya to determine when to wage war. This interpretation, along with others, like Floyd Lounsbury`s study of Venus and the Long Count date at Bonampak were the seeds that have led to methodological errors that first began to take root in Maya research. The idea of the Venus association with warfare took hold and continues to propagate. Many scholars continue to assert that the "shell-star" glyph is related to warfare events. Others, like Gerardo Aldana, and Stanley Guenter, have recently come forward to reexamine and question the hieroglyph and its relationship, if any, to Maya warfare. I suggest, further, that methodological errors may have occurred along the way. I propose that these errors include data lost in translation, and inaccurate translations. In addition, the statistical analysis of Venus cycles has weak points. If this identification of the errors is correct, we need to re-evaluate the weakened foundation on which we are building our assertions about

  13. Implementing the chemical weapons convention

    Energy Technology Data Exchange (ETDEWEB)

    Kellman, B.; Tanzman, E. A.

    1999-12-07

    In 1993, as the CWC ratification process was beginning, concerns arose that the complexity of integrating the CWC with national law could cause each nation to implement the Convention without regard to what other nations were doing, thereby causing inconsistencies among States as to how the CWC would be carried out. As a result, the author's colleagues and the author prepared the Manual for National Implementation of the Chemical Weapons Convention and presented it to each national delegation at the December 1993 meeting of the Preparatory Commission in The Hague. During its preparation, the Committee of CWC Legal Experts, a group of distinguished international jurists, law professors, legally-trained diplomats, government officials, and Parliamentarians from every region of the world, including Central Europe, reviewed the Manual. In February 1998, they finished the second edition of the Manual in order to update it in light of developments since the CWC entered into force on 29 April 1997. The Manual tries to increase understanding of the Convention by identifying its obligations and suggesting methods of meeting them. Education about CWC obligations and available alternatives to comply with these requirements can facilitate national response that are consistent among States Parties. Thus, the Manual offers options that can strengthen international realization of the Convention's goals if States Parties act compatibly in implementing them. Equally important, it is intended to build confidence that the legal issues raised by the Convention are finite and addressable. They are now nearing competition of an internet version of this document so that interested persons can access it electronically and can view the full text of all of the national implementing legislation it cites. The internet address, or URL, for the internet version of the Manual is http: //www.cwc.ard.gov. This paper draws from the Manual. It comparatively addresses approximately thirty

  14. Research on the Interaction of Hydrogen-Bond Acidic Polymer Sensitive Sensor Materials with Chemical Warfare Agents Simulants by Inverse Gas Chromatography

    OpenAIRE

    Liu Yang; Qiang Han; Shuya Cao; Feng Huang; Molin Qin; Chenghai Guo; Mingyu Ding

    2015-01-01

    Hydrogen-bond acidic polymers are important high affinity materials sensitive to organophosphates in the chemical warfare agent sensor detection process. Interactions between the sensor sensitive materials and chemical warfare agent simulants were studied by inverse gas chromatography. Hydrogen bonded acidic polymers, i.e., BSP3, were prepared for micro-packed columns to examine the interaction. DMMP (a nerve gas simulant) and 2-CEES (a blister agent simulant) were used as probes. Chemical an...

  15. Conventionalism and integrable Weyl geometry

    Science.gov (United States)

    Pucheu, M. L.

    2015-03-01

    Since the appearance of Einstein's general relativity, gravitation has been associated to the space-time curvature. This theory introduced a geometrodynamic language which became a convenient tool to predict matter behaviour. However, the properties of space-time itself cannot be measurable by experiments. Taking Poincaré idea that the geometry of space-time is merely a convention, we show that the general theory of relativity can be completely reformulated in a more general setting, a generalization of Riemannian geometry, namely, the Weyl integrable geometry. The choice of this new mathematical language implies, among other things, that the path of particles and light rays should now correspond to Weylian geodesies. Such modification in the dynamic of bodies brings a new perception of physical phenomena that we will explore.

  16. Laparoscopic splenectomy using conventional instruments

    Directory of Open Access Journals (Sweden)

    Dalvi A

    2005-01-01

    Full Text Available INTRODUCTION : Laparoscopic splenectomy (LS is an accepted procedure for elective splenectomy. Advancement in technology has extended the possibility of LS in massive splenomegaly [Choy et al., J Laparoendosc Adv Surg Tech A 14(4, 197-200 (2004], trauma [Ren et al., Surg Endosc 15(3, 324 (2001; Mostafa et al., Surg Laparosc Endosc Percutan Tech 12(4, 283-286 (2002], and cirrhosis with portal hypertension [Hashizume et al., Hepatogastroenterology 49(45, 847-852 (2002]. In a developing country, these advanced gadgets may not be always available. We performed LS using conventional and reusable instruments in a public teaching the hospital without the use of the advanced technology. The technique of LS and the outcome in these patients is reported. MATERIALS AND METHODS : Patients undergoing LS for various hematological disorders from 1998 to 2004 were included. Electrocoagulation, clips, and intracorporeal knotting were the techniques used for tackling short-gastric vessels and splenic pedicle. Specimen was delivered through a Pfannensteil incision. RESULTS : A total of 26 patients underwent LS. Twenty-two (85% of patients had spleen size more than 500 g (average weight being 942.55 g. Mean operative time was 214 min (45-390 min. The conversion rate was 11.5% ( n = 3. Average duration of stay was 5.65 days (3-30 days. Accessory spleen was detected and successfully removed in two patients. One patient developed subphrenic abscess. There was no mortality. There was no recurrence of hematological disease. CONCLUSION : Laparoscopic splenectomy using conventional equipment and instruments is safe and effective. Advanced technology has a definite advantage but is not a deterrent to the practice of LS.

  17. Possible Long Term Effects of Chemical Warfare Using Visual Evoked Potentials

    Directory of Open Access Journals (Sweden)

    Abbas Riazi

    2014-09-01

    Full Text Available Some studies have already addressed the effects of occupational organic solvent exposure on the visually evoked potentials (VEPs. Visual system is an important target for Sulphur Mustard (SM toxicity. A number of Iranian victims of Sulphur Mustard (SM agent were apprehensive about the delay effect of SM on their vision and a possible delay effect of SM on their visual cortex. This investigation was performed on 34 individuals with a history of chemical exposure and a control group of 15 normal people. The Toennies electro-diagnosis device was used and its signals were saved as the latencies. The mean of N75, N140 and P100 of victims of chemical warfare (VCWs and control group indicated no significant results (P>0.05. The VCWs did not show any visual symptoms and there was no clear deficit in their VEPs.

  18. Investigation of Acute Toxicity of a Chemical Warfare Agent in Kidneys

    Directory of Open Access Journals (Sweden)

    Turgut Topal

    2007-08-01

    Full Text Available One of the most important chemical warfare agents, sulfur mustard (SM causes crucial acute and chronic toxic effects. Lung, skin, eye and kidneys are the most affected organs. In this work, it was investigated if increased nitric oxide (NO and peroxynitrite are involved in nitrogen mustard (NM induced kidney damage. In this experimen, aminoguanidine (AG as inducible nitric oxide synthase (iNOS inhibitor and ebselen as peroxynitrite scavenger were used. NM administration resulted in important oxidant and antioxidant changes as well as tissue damage in kidneys. Therapeutic agents showed significant protection and reduced oxidant parameteres leading to tissue healing was observed. Results of this study suggest that drugs with similar properties can be used to protect kidney damage caused by NM. [TAF Prev Med Bull. 2007; 6(4: 227-232

  19. Investigation of Acute Toxicity of a Chemical Warfare Agent in Kidneys

    Directory of Open Access Journals (Sweden)

    Turgut Topal

    2007-08-01

    Full Text Available One of the most important chemical warfare agents, sulfur mustard (SM causes crucial acute and chronic toxic effects. Lung, skin, eye and kidneys are the most affected organs. In this work, it was investigated if increased nitric oxide (NO and peroxynitrite are involved in nitrogen mustard (NM induced kidney damage. In this experimen, aminoguanidine (AG as inducible nitric oxide synthase (iNOS inhibitor and ebselen as peroxynitrite scavenger were used. NM administration resulted in important oxidant and antioxidant changes as well as tissue damage in kidneys. Therapeutic agents showed significant protection and reduced oxidant parameteres leading to tissue healing was observed. Results of this study suggest that drugs with similar properties can be used to protect kidney damage caused by NM. [TAF Prev Med Bull 2007; 6(4.000: 227-232

  20. NETWORK-CENTRIC WARFARE AND SOME PARTICULAR ASPECTS OF LOGISTICS BASED ON NETWORKING

    Directory of Open Access Journals (Sweden)

    Petrişor JALBĂ

    2015-04-01

    Full Text Available Within the framework of the current revolution in military affairs, at the End of the Cold War a new concept was born: the concept of War Based on Computer Networking or NCW Network Centric-Warfare which was established as a central element of modern military operations. Determined by theprogress recorded in the field of communication systems of all types, technology of information (HI-Tech, IT, war based on computer networking brings a change in the war paradigm and its inherent components In this respect, logistics based on computer networking represents one of the ways in which the reality of the battlefield is preserved which enhances the joint perspective upon the military forces.

  1. The art of antibacterial warfare: Deception through interference with quorum sensing-mediated communication.

    Science.gov (United States)

    Rampioni, Giordano; Leoni, Livia; Williams, Paul

    2014-08-01

    Almost a century on from the discovery of penicillin, the war against bacterial infection still rages compounded by the emergence of strains resistant to virtually every clinically approved antibiotic and the dearth of new antibacterial agents entering the clinic. Consequently there is renewed interest in drugs which attenuate virulence rather than bacterial growth. Since the metaphors of warfare are often used to describe the battle between pathogen and host, we will describe in such a context, the molecular communication (quorum sensing) mechanisms used by bacteria to co-ordinate virulence at the population level. Recent progress in exploiting this information through the design of anti-virulence deception strategies that disrupt quorum sensing through signal molecule inactivation, inhibition of signal molecule biosynthesis or the blockade of signal transduction and their advantages and disadvantages are considered.

  2. Decontamination of adsorbed chemical warfare agents on activated carbon using hydrogen peroxide solutions.

    Science.gov (United States)

    Osovsky, Ruth; Kaplan, Doron; Nir, Ido; Rotter, Hadar; Elisha, Shmuel; Columbus, Ishay

    2014-09-16

    Mild treatment with hydrogen peroxide solutions (3-30%) efficiently decomposes adsorbed chemical warfare agents (CWAs) on microporous activated carbons used in protective garments and air filters. Better than 95% decomposition of adsorbed sulfur mustard (HD), sarin, and VX was achieved at ambient temperatures within 1-24 h, depending on the H2O2 concentration. HD was oxidized to the nontoxic HD-sulfoxide. The nerve agents were perhydrolyzed to the respective nontoxic methylphosphonic acids. The relative rapidity of the oxidation and perhydrolysis under these conditions is attributed to the microenvironment of the micropores. Apparently, the reactions are favored due to basic sites on the carbon surface. Our findings suggest a potential environmentally friendly route for decontamination of adsorbed CWAs, using H2O2 without the need of cosolvents or activators.

  3. Rapid Ultrasensitive Chemical-Fingerprint Detection of Chemical and Biochemical Warfare Agents

    Energy Technology Data Exchange (ETDEWEB)

    ASHBY, CAROL I.; SHEPODD, TIMOTHY J.; YELTON, WILLIAM G.; MURON, DAVID J.

    2002-12-01

    Vibrational spectra can serve as chemical fingerprints for positive identification of chemical and biological warfare molecules. The required speed and sensitivity might be achieved with surface-enhanced Raman spectroscopy (SERS) using nanotextured metal surfaces. Systematic and reproducible methods for preparing metallic surfaces that maximize sensitivity have not been previously developed. This work sought to develop methods for forming high-efficiency metallic nanostructures that can be integrated with either gas or liquid-phase chem-lab-on-a-chip separation columns to provide a highly sensitive, highly selective microanalytical system for detecting current and future chem/bio agents. In addition, improved protein microchromatographic systems have been made by the creation of acrylate-based porous polymer monoliths that can serve as protein preconcentrators to reduce the optical system sensitivity required to detect and identify a particular protein, such as a bacterial toxin.

  4. Love-Wave Sensors Combined with Microfluidics for Fast Detection of Biological Warfare Agents

    Science.gov (United States)

    Matatagui, Daniel; Fontecha, José Luis; Fernández, María Jesús; Gràcia, Isabel; Cané, Carles; Santos, José Pedro; Horrillo, María Carmen

    2014-01-01

    The following paper examines a time-efficient method for detecting biological warfare agents (BWAs). The method is based on a system of a Love-wave immunosensor combined with a microfluidic chip which detects BWA samples in a dynamic mode. In this way a continuous flow-through of the sample is created, promoting the reaction between antigen and antibody and allowing a fast detection of the BWAs. In order to prove this method, static and dynamic modes have been simulated and different concentrations of BWA simulants have been tested with two immunoreactions: phage M13 has been detected using the mouse monoclonal antibody anti-M13 (AM13), and the rabbit immunoglobulin (Rabbit IgG) has been detected using the polyclonal antibody goat anti-rabbit (GAR). Finally, different concentrations of each BWA simulants have been detected with a fast response time and a desirable level of discrimination among them has been achieved. PMID:25029282

  5. Approximation and Filtering Techniques for Navigation Data in Time-critical Electronic Warfare Systems

    Directory of Open Access Journals (Sweden)

    Vanitha D.

    2013-03-01

    Full Text Available This paper presents a holistic solution to the navigation requirements in a time critical electronic warfare systems like missile warning systems (MWS. In a passive MWS using IR sensors the efficiency of the system is determined by attributes such as low false alarm rate, minimal response time and ability to track different IR radiating objects by association and correlation of consecutive detections through time. Such a system is required to be supported by a navigation system capable of accurate estimation of the aircraft position, attitude angles and altitude. In this paper, estimation techniques used to accurately calculate aircraft navigation data at the time of capture of IR frames are discussed. The paper discusses about synchronization of INGPS, IR sensors & Processor on to same timeline. The paper also intends to evaluate the performance of wavelet transform filter in effective elimination of noise in navigation parameters like acceleration and attitude angle rates for a better estimation of position and attitude.

  6. A war psychiatry approach to warfare in the Middle Byzantine period.

    Science.gov (United States)

    Ntafoulis, Pavlos

    2016-12-01

    Combat stress cases were traced in historical texts and military manuals on warfare from the Middle Byzantine period; they were mainly labelled as cowardice. Soldiers suffered from nostalgia or exhaustion; officers looked stunned, or could not speak during the battle. Cruel punishments were often enforced. Suicide and alcohol abuse were rarely mentioned. The Byzantines' evacuation system for battle casualties was well organized. Psychological operations were conducted and prisoners-of-war were usually part of them. The Byzantine army had 'parakletores', officers assigned to encourage soldiers before combat. The leaders dealt with combat stress by using their rhetoric skills and emphasizing religious faith in eternal life. The treatment of the 'cowards' was rather similar to modern war psychiatry principles of treatment. No description of PTSD was found. © The Author(s) 2016.

  7. Love-Wave Sensors Combined with Microfluidics for Fast Detection of Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    Daniel Matatagui

    2014-07-01

    Full Text Available The following paper examines a time-efficient method for detecting biological warfare agents (BWAs. The method is based on a system of a Love-wave immunosensor combined with a microfluidic chip which detects BWA samples in a dynamic mode. In this way a continuous flow-through of the sample is created, promoting the reaction between antigen and antibody and allowing a fast detection of the BWAs. In order to prove this method, static and dynamic modes have been simulated and different concentrations of BWA simulants have been tested with two immunoreactions: phage M13 has been detected using the mouse monoclonal antibody anti-M13 (AM13, and the rabbit immunoglobulin (Rabbit IgG has been detected using the polyclonal antibody goat anti-rabbit (GAR. Finally, different concentrations of each BWA simulants have been detected with a fast response time and a desirable level of discrimination among them has been achieved.

  8. Love-wave sensors combined with microfluidics for fast detection of biological warfare agents.

    Science.gov (United States)

    Matatagui, Daniel; Fontecha, José Luis; Fernández, María Jesús; Gràcia, Isabel; Cané, Carles; Santos, José Pedro; Horrillo, María Carmen

    2014-07-15

    The following paper examines a time-efficient method for detecting biological warfare agents (BWAs). The method is based on a system of a Love-wave immunosensor combined with a microfluidic chip which detects BWA samples in a dynamic mode. In this way a continuous flow-through of the sample is created, promoting the reaction between antigen and antibody and allowing a fast detection of the BWAs. In order to prove this method, static and dynamic modes have been simulated and different concentrations of BWA simulants have been tested with two immunoreactions: phage M13 has been detected using the mouse monoclonal antibody anti-M13 (AM13), and the rabbit immunoglobulin (Rabbit IgG) has been detected using the polyclonal antibody goat anti-rabbit (GAR). Finally, different concentrations of each BWA simulants have been detected with a fast response time and a desirable level of discrimination among them has been achieved.

  9. Research on Electronic Warfare Operational Simulation Experiment Design%电子对抗作战仿真实验设计研究

    Institute of Scientific and Technical Information of China (English)

    陶玉; 耿松涛; 王枭犇

    2013-01-01

      针对目前电子对抗作战仿真实验设计中存在的突出问题,对电子对抗作战仿真实验设计进行研究。介绍我军电子对抗作战仿真实验设计的发展现状,分析电子对抗作战仿真实验设计中存在的问题,提出结合实验目的规范电子对抗作战仿真实验设计的思路。该研究为实现电子对抗作战仿真实验设计的规范化、标准化做出了有益探索。%Aiming at the problems existed in designing electronic warfare operational simulation experiment, electronic warfare operational simulation experiment design is researched. It introduces the development situation of PLA’s electronic warfare operational simulation experiment firstly, analyses the problems in designing electronic warfare operational simulation experiment, and brings a design idea that combines it with experiment goals for electronic warfare operational simulation experiment. The research can offer reference for realize the normalization and standardization of electronic warfare campaign simulation experimental design.

  10. Naval electronic warfare simulation for effectiveness assessment and softkill programmability facility

    Science.gov (United States)

    Lançon, F.

    2011-06-01

    The Anti-ship Missile (ASM) threat to be faced by ships will become more diverse and difficult. Intelligence, rules of engagement constraints, fast reaction-time for effective softkill solution require specific tools to design Electronic Warfare (EW) systems and to integrate it onboard ship. SAGEM Company provides decoy launcher system [1] and its associated Naval Electronic Warfare Simulation tool (NEWS) to permit softkill effectiveness analysis for anti-ship missile defence. NEWS tool generates virtual environment for missile-ship engagement and counter-measure simulator over a wide spectrum: RF, IR, EO. It integrates EW Command & Control (EWC2) process which is implemented in decoy launcher system and performs Monte-Carlo batch processing to evaluate softkill effectiveness in different engagement situations. NEWS is designed to allow immediate EWC2 process integration from simulation to real decoy launcher system. By design, it allows the final operator to be able to program, test and integrate its own EWC2 module and EW library onboard, so intelligence of each user is protected and evolution of threat can be taken into account through EW library update. The objectives of NEWS tool are also to define a methodology for trial definition and trial data reduction. Growth potential would permit to design new concept for EWC2 programmability and real time effectiveness estimation in EW system. This tool can also be used for operator training purpose. This paper presents the architecture design, the softkill programmability facility concept and the flexibility for onboard integration on ship. The concept of this operationally focused simulation, which is to use only one tool for design, development, trial validation and operational use, will be demonstrated.

  11. Media Discourse in an Atmosphere of Information Warfare: From Manipulation to Aggression

    Directory of Open Access Journals (Sweden)

    Владимир Иванович Озюменко

    2017-12-01

    Full Text Available In todays atmosphere of information warfare the biased impact of the media has increased, pushing behind other functions, including the informative one. The forms of media influence have also changed: direct persuasion has been replaced by implicit manipulation, which develops into outright aggression. Since, in the media discourse aggression can be both verbal and non-verbal, we propose to use the term information (or media aggression , which is broader than verbal aggression . Media aggression can be considered as a binary process - in relation to the referent (affective aggression and in relation to the audience (cognitive aggression. As a result, the information under media aggression refers to the expression of open hostility and animosity towards the referent and meaningful impact on the consciousness of the recipient (the target audience to its ideological subordination. The purpose of this article is to justify the hypothesis that the growing media aggression is a feature of modern media discourse in the atmosphere of information warfare, and this function can be analysed within the framework of manipulative discourse as manipulative persuasion. The data has been taken from quality British and American newspapers, news websites of The BBC, The Economist, The Guardian, The New York Times, The Washington Post, and some others covering the relations between Russia and the USA, the situation in the Middle East, particularly in Syria. The the study was conducted using critical discourse analysis (Fairclough 2001, Van Dijk 2006, 2009; Wodak 2007; Weiss, Wodak 2007 and the multimodal approach (Ivanova, Spodarets 2010; Ponton 2016, and reveals various strategies and means of linguistic manipulation and media aggression. It also shows that the main aim of linguistic manipulation accentuated by verbal and non-verbal aggression is to deliberately mislead the audience imposing on it the desired idea of ideological subordination. Therefore, a

  12. Conventional and advanced liquid biofuels

    Directory of Open Access Journals (Sweden)

    Đurišić-Mladenović Nataša L.

    2016-01-01

    Full Text Available Energy security and independence, increase and fluctuation of the oil price, fossil fuel resources depletion and global climate change are some of the greatest challanges facing societies today and in incoming decades. Sustainable economic and industrial growth of every country and the world in general requires safe and renewable resources of energy. It has been expected that re-arrangement of economies towards biofuels would mitigate at least partially problems arised from fossil fuel consumption and create more sustainable development. Of the renewable energy sources, bioenergy draws major and particular development endeavors, primarily due to the extensive availability of biomass, already-existence of biomass production technologies and infrastructure, and biomass being the sole feedstock for liquid fuels. The evolution of biofuels is classified into four generations (from 1st to 4th in accordance to the feedstock origin; if the technologies of feedstock processing are taken into account, than there are two classes of biofuels - conventional and advanced. The conventional biofuels, also known as the 1st generation biofuels, are those produced currently in large quantities using well known, commercially-practiced technologies. The major feedstocks for these biofuels are cereals or oleaginous plants, used also in the food or feed production. Thus, viability of the 1st generation biofuels is questionable due to the conflict with food supply and high feedstocks’ cost. This limitation favoured the search for non-edible biomass for the production of the advanced biofuels. In a general and comparative way, this paper discusses about various definitions of biomass, classification of biofuels, and brief overview of the biomass conversion routes to liquid biofuels depending on the main constituents of the biomass. Liquid biofuels covered by this paper are those compatible with existing infrastructure for gasoline and diesel and ready to be used in

  13. Mobile Warfare

    Institute of Scientific and Technical Information of China (English)

    SEBASTIAN COHEN

    2008-01-01

    @@ In 1984, US computer manufacturer Apple spent almost USD 1.5 million on a lavish, Ridley Scott-directed commercial for its new Macintosh 128k personal computer. A year later, Microsoft released Microsoft Windows for IBM PC, signaling the start of the battle for domi-nation of the personal computer market which has waged ever since.

  14. Toxic Warfare

    Science.gov (United States)

    2002-02-01

    suicide squad from the LTTE sea ______________ 34See “FARC Allegedly Using Acid, Tar, Feces to Make Bombs,” El Tiempo , September 6, 2001, accessed from...Program and ser - vices provided by the University of Texas A&M Emergency Re- sponder Training Program. Three interactive training CD-ROMs for the emergency...Bombs,” El Tiempo , September 6, 2001, accessed from FBIS-LAP-20010906000034. “FBI Starts Nationwide Records Check on HAZMAT Truckers,” CNN Online

  15. Nuclear warfare

    CERN Multimedia

    Broda

    1981-01-01

    Le Prof.Broda a étudié à Vienne et Berlin et a travaillé pendant la dernière guerre mondiale en Grande Bretagne pour le conseil de la recherche médicale, notamment sur la chimie de la vision. Il est maintenant Prof. de la chimie, physique et radiochimie à l'Université de Vienne, où il concentre ses travaux sur les méchanisme de transport d'énergie à travers les cellules de membranes.

  16. Millennial Warfare

    Science.gov (United States)

    2017-06-09

    processes of segmentation and fragmentation, and sovereignty. Segmentation is accomplished through dividing the terrain into zones of monopolistic...discussed idea of segmentation , and form the foundation for Kalyvas’ idea of zones. He breaks down the area of operations into fives zones, each with...dataset may have been motivated by frustration over failure to achieve expected success in the job market following their education.54 This analysis

  17. Hybrid Warfare

    Science.gov (United States)

    2013-08-01

    Air and Space Studies, Air University and JSOU Associate Fellow William W. Mendel Colonel, U.S. Army, Ret. JSOU Senior Fellow Alvaro de Souza... Gregor , “Military Planning Systems and Stability Operations,” Prism 1, no. 3 (June 2010). Gregor’s analysis is an even account regarding the role of

  18. Electronic Warfare

    Science.gov (United States)

    2012-02-08

    2) The use of the EMS is essential to control the OE during all military operations. The transfer of information from the collectors to the...frequencies used for satellite communications (SATCOM); the effects of solar activities such as sunspots, solar flares, and atmospheric fluctuations on...re-radiation, alteration, suppression, absorption , denial, enhancement, or reflection of EM energy in a manner intended to convey misleading

  19. Air Warfare

    Science.gov (United States)

    2002-03-01

    advanced waves of friendly troops, have already been described. It was noted also that the airplane finally came to be relied on for the performance of...vivid imagination to conjure up one, where it would be justifiable to use all bom- bardment units against the very advanced waves of infantry. Another

  20. Equal Remuneration Convention (ILO No. 100).

    Science.gov (United States)

    1989-01-01

    The government of Uruguay ratified this UN International Labor Organization convention on equal remuneration on November 16, 1989, and the Government of Zimbabwe ratified this Convention on December 14, 1989.

  1. Conventional therapy for Crohn's disease

    Institute of Scientific and Technical Information of China (English)

    Carsten Büning; Herbert Lochs

    2006-01-01

    Crohn's disease (CD) is a multifactorial disorder of unknown cause. Outstanding progress regarding the pathophysiology of CD has led to the development of innovative therapeutic concepts. Numerous controlled trials have been performed in CD over the last years. However, many drugs have not been approved by regulatory authorities due to lack of efficacy or severe side effects. Therefore, well-known drugs, including 5-ASA, systemic or topical corticosteroids, and immunosuppressants such as azathioprine, are still the mainstay of CD therapy. Importantly, biologicals such as infliximab have shown to be efficacious in problematic settings such as fistulizing or steroid-dependent CD. This review is intended to give practical guidelines to clinicians for the conventional treatment of CD. We concentrated on the results of randomized, placebo-controlled trials and meta-analyses, when available, that provide the highest degree of evidence. We provide evidence-based treatment algorithms whenever possible. However, many clinical situations have not been answered by controlled clinical trials and it is important to fill these gaps through expert opinions. We hope that this review offers a useful tool for clinicians in the challenging treatment of CD.

  2. Chemical and biological warfare: Protection, decontamination, and disposal. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-11-01

    The bibliography contains citations concerning the means to defend against chemical and biological agents used in military operations, and to eliminate the effects of such agents on personnel, equipment, and grounds. Protection is accomplished through protective clothing and masks, and in buildings and shelters through filtration. Elimination of effects includes decontamination and removal of the agents from clothing, equipment, buildings, grounds, and water, using chemical deactivation, incineration, and controlled disposal of material in injection wells and ocean dumping. Other Published Searches in this series cover chemical warfare detection; defoliants; general studies; biochemistry and therapy; and biology, chemistry, and toxicology associated with chemical warfare agents.(Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  3. Chemical and biological warfare: Protection, decontamination, and disposal. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-10-01

    The bibliography contains citations concerning the means to defend against chemical and biological agents used in military operations, and to eliminate the effects of such agents on personnel, equipment, and grounds. Protection is accomplished through protective clothing and masks, and in buildings and shelters through filtration. Elimination of effects includes decontamination and removal of the agents from clothing, equipment, buildings, grounds, and water, using chemical deactivation, incineration, and controlled disposal of material in injection wells and ocean dumping. Other Published Searches in this series cover chemical warfare detection; defoliants; general studies; biochemistry and therapy; and biology, chemistry, and toxicology associated with chemical warfare agents. (Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  4. Modeling and Optimal Control of a Class of Warfare Hybrid Dynamic Systems Based on Lanchester (n,1 Attrition Model

    Directory of Open Access Journals (Sweden)

    Xiangyong Chen

    2014-01-01

    hybrid dynamic systems is established based on Lanchester equation in a (n,1 battle, where a heterogeneous force of n different troop types faces a homogeneous force. This model can be characterized by the interaction of continuous-time models (governed by Lanchester equation, and discrete event systems (described by variable tactics. Furthermore, an expository discussion is presented on an optimal variable tactics control problem for warfare hybrid dynamic system. The optimal control strategies are designed based on dynamic programming and differential game theory. As an example of the consequences of this optimal control problem, we take the (2, 1 case and solve the optimal strategies in a (2, 1 case. Simulation results show the feasibility of warfare hybrid system model and the effectiveness of the optimal control strategies designed.

  5. A Comparison of Neutron-Based Non-Destructive Assessment Methods for Chemical Warfare Materiel and High Explosives

    Energy Technology Data Exchange (ETDEWEB)

    E.H. Seabury; D.L. Chichester; C.J. Wharton; A.J. Caffrey

    2008-08-01

    Prompt Gamma Neutron Activation Analysis (PGNAA) systems employ neutrons as a probe to interrogate items, e.g. chemical warfare materiel-filled munitions. The choice of a neutron source in field-portable systems is determined by its ability to excite nuclei of interest, operational concerns such as radiological safety and ease-of-use, and cost. Idaho National Laboratory’s PINS Chemical Assay System has traditionally used a Cf-252 isotopic neutron source, but recently a Deuterium-Tritium (DT) Electronic Neutron Generator (ENG) has been tested as an alternate neutron source. This paper presents the results of using both of these neutron sources to interrogate chemical warfare materiel (CWM) and high explosive (HE) filled munitions.

  6. A hybrid method for protection against threats to a network infrastructure for an electronic warfare management system

    Science.gov (United States)

    Byłak, Michał; RóŻański, Grzegorz

    2017-04-01

    The article presents the concept of ensuring the security of network information infrastructure for the management of Electronic Warfare (EW) systems. The concept takes into account the reactive and proactive tools against threats. An overview of the methods used to support the safety of IT networks and information sources about threats is presented. Integration of mechanisms that allow for effective intrusion detection and rapid response to threats in a network has been proposed. The architecture of the research environment is also presented.

  7. Enterprise Resource Planning (ERP) : a case study of Space and Naval Warfare Systems Center San Diego's Project Cabrillo

    OpenAIRE

    Hoffman, Dean M.; Oxendine, Eric

    2002-01-01

    Approved for public release; distribution unlimited This thesis examines the Enterprise Resource Planning (ERP) pilot implementation conducted at the Space and Naval Warfare Systems Center San Diego (SSC-SD), the first of four Department of the Navy (DON) pilot implementations. Specifically, comparisons are drawn between both successful and unsuccessful ERP implementations within private sector organizations and that of SSC-SD. Any commonalities in implementation challenges could be...

  8. An Irony of War: Human Development as Warfare in Afghanistan (Colloquium, Volume 3, Number 3, October 2010)

    Science.gov (United States)

    2010-10-01

    other type of warfare, do not associate human development with counterinsurgency (COIN). In fact, " Human development " is not a standard term in the...34 Human development is a process of enlarging people’s choices. The most critical of these wide-ranging choices are to live a long and healthy life, to...public administration, health system, communications, education, and, sometimes, the rule of law and security, they are trying to build human

  9. The Short-Term Effect of Chest Physiotherapy on Spirometric Indices in Chemical Warfare Victims Exposed to Mustard Gas

    Directory of Open Access Journals (Sweden)

    A Abedi

    2008-12-01

    Full Text Available ABCTRACT Introduction & Objective: Chronic respiratory diseases are the most prevalent late sequels of sulfur mustard gas injury among Iranian chemical warfare victims. Chest physiotherapy is one of the useful methods in care, cure and infection prevention of these patients. The aim of this study was to determine the short-term effect of chest physiotherapy on spirometric indices in chemical warfare victims exposed to sulfur mustard gas. Materials & Methods: In this study, 27 of the chemical warfare victims with respiratory diseases were selected. Chest physiotherapy including postural drainage percussion and vibration were used in four positions for all patients. Pulmonary function test (PFT was obtained before (baseline, immediately and 20 minute after the chest physiotherapy. The SPSS software was used for the data analysis of the collected data. Results: Results of this study showed the significant effect (p<0.01 of chest physiotherapy upon forced expiratory volume in first second (FEV1 (baseline mean, 44.19 immediately after intervention mean 47.3 and 20 minute after intervention mean 48.3 and forced vital capacity (FVC (baseline mean, 69.37 immediately after intervention mean, 73.67 20 minute after intervention 75.74. Chest physiotherapy had significant effect (p<0.01 in asthmatic bronchitis group and also had significant effect (p<0.05 in both severe and moderate groups. Conclusion: Chest physiotherapy was able to improve pulmonary function test indices in chemical warfare victims suffering from respiratory problems. The effect on asthmatic bronchitis group, as well as both severe and moderate groups, was significant.

  10. The Soldier-Cyborg Transformation: A Framework for Analysis of Social and Ethical Issues of Future Warfare

    Science.gov (United States)

    1998-05-26

    government agency. STRATEGY RESEARCH PROJECT THE SOLDIER- CYBORG TRANSFORMATION: A FRAMEWORK FOR ANALYSIS OF SOCIAL AND ETHICAL ISSUES OF FUTURE...UNCLASSIFIED USAWC STRATEGY RESEARCH PROJECT THE SOLDIER- CYBORG TRANSFORMATION: A FRAMEWORK FOR ANALYSIS OF SOCIAL AND ETHICAL ISSUES OF FUTURE...P) Donald A. Gagliano, M.D. TITLE: THE SOLDIER CYBORG TRANSFORMATION: A FRAMEWORK FOR ANALYSIS OF SOCIAL AND ETHICAL ISSUES OF FUTURE WARFARE

  11. Multifunctional ultra-high vacuum apparatus for studies of the interactions of chemical warfare agents on complex surfaces

    Energy Technology Data Exchange (ETDEWEB)

    Wilmsmeyer, Amanda R.; Morris, John R. [Department of Chemistry, Virginia Tech, Blacksburg, Virginia 24061 (United States); Gordon, Wesley O.; Mantooth, Brent A.; Lalain, Teri A. [Research and Technology Directorate, U.S. Army Edgewood Chemical Biological Center, Aberdeen Proving Ground, Maryland 21010 (United States); Davis, Erin Durke [OptiMetrics, Inc., Abingdon, Maryland 21009 (United States)

    2014-01-15

    A fundamental understanding of the surface chemistry of chemical warfare agents is needed to fully predict the interaction of these toxic molecules with militarily relevant materials, catalysts, and environmental surfaces. For example, rules for predicting the surface chemistry of agents can be applied to the creation of next generation decontaminants, reactive coatings, and protective materials for the warfighter. Here, we describe a multifunctional ultra-high vacuum instrument for conducting comprehensive studies of the adsorption, desorption, and surface chemistry of chemical warfare agents on model and militarily relevant surfaces. The system applies reflection-absorption infrared spectroscopy, x-ray photoelectron spectroscopy, and mass spectrometry to study adsorption and surface reactions of chemical warfare agents. Several novel components have been developed to address the unique safety and sample exposure challenges that accompany the research of these toxic, often very low vapor pressure, compounds. While results of vacuum-based surface science techniques may not necessarily translate directly to environmental processes, learning about the fundamental chemistry will begin to inform scientists about the critical aspects that impact real-world applications.

  12. Social networks as a new tool of information warfare in the modern world

    Directory of Open Access Journals (Sweden)

    B. W. Kovalevych

    2014-03-01

    Full Text Available With the rapid development of information technologies, especially the Internet, people are becoming increasingly dependent on information that surrounds them. And social networks, where a person spends most of their time, become the ideal instruments of influence on the people consciousness and information warfare. Due to psychological factors ( such as ‘spiral of silence’, the herd instinct, the entire credibility of published information, opinion leaders, the desire for self­realization or replacement of reality that influence the human behavior in the network and the use of models of influence (model of network attack, model of involving users as volunteers, total block model, social networks become a platform for the dissemination of political ideas, ideologies and implementation of the ‘color revolutions’. However, social media play a positive role, especially in the establishment of civil society and the free flow of information. Positive or negative impact of networks primary depends on the purpose of use of social networking tools.

  13. Healthcare and warfare. Medical space, mission and apartheid in twentieth century northern Namibia.

    Science.gov (United States)

    Nord, Catharina

    2014-07-01

    In the year 1966, the first government hospital, Oshakati hospital, was inaugurated in northern South-West Africa. It was constructed by the apartheid regime of South Africa which was occupying the territory. Prior to this inauguration, Finnish missionaries had, for 65 years, provided healthcare to the indigenous people in a number of healthcare facilities of which Onandjokwe hospital was the most important. This article discusses these two agents' ideological standpoints. The same year, the war between the South-West African guerrillas and the South African state started, and continued up to 1988. The two hospitals became involved in the war; Oshakati hospital as a part of the South African war machinery, and Onandjokwe hospital as a 'terrorist hospital' in the eyes of the South Africans. The missionary Onandjokwe hospital was linked to the Lutheran church in South-West Africa, which became one of the main critics of the apartheid system early in the liberation war. Warfare and healthcare became intertwined with apartheid policies and aggression, materialised by healthcare provision based on strategic rationales rather than the people's healthcare needs. When the Namibian state took over a ruined healthcare system in 1990, the two hospitals were hubs in a healthcare landscape shaped by missionary ambitions, war and apartheid logic.

  14. Efficacy of liquid and foam decontamination technologies for chemical warfare agents on indoor surfaces.

    Science.gov (United States)

    Love, Adam H; Bailey, Christopher G; Hanna, M Leslie; Hok, Saphon; Vu, Alex K; Reutter, Dennis J; Raber, Ellen

    2011-11-30

    Bench-scale testing was used to evaluate the efficacy of four decontamination formulations on typical indoor surfaces following exposure to the liquid chemical warfare agents sarin (GB), soman (GD), sulfur mustard (HD), and VX. Residual surface contamination on coupons was periodically measured for up to 24h after applying one of four selected decontamination technologies [0.5% bleach solution with trisodium phosphate, Allen Vanguard Surface Decontamination Foam (SDF™), U.S. military Decon Green™, and Modec Inc. and EnviroFoam Technologies Sandia Decontamination Foam (DF-200)]. All decontamination technologies tested, except for the bleach solution, performed well on nonporous and nonpermeable glass and stainless-steel surfaces. However, chemical agent residual contamination typically remained on porous and permeable surfaces, especially for the more persistent agents, HD and VX. Solvent-based Decon Green™ performed better than aqueous-based bleach or foams on polymeric surfaces, possibly because the solvent is able to penetrate the polymer matrix. Bleach and foams out-performed Decon Green for penetrating the highly polar concrete surface. Results suggest that the different characteristics needed for an ideal and universal decontamination technology may be incompatible in a single formulation and a strategy for decontaminating a complex facility will require a range of technologies.

  15. Plastic antibody for the recognition of chemical warfare agent sulphur mustard.

    Science.gov (United States)

    Boopathi, M; Suryanarayana, M V S; Nigam, Anil Kumar; Pandey, Pratibha; Ganesan, K; Singh, Beer; Sekhar, K

    2006-06-15

    Molecularly imprinted polymers (MIPs) known as plastic antibodies (PAs) represent a new class of materials possessing high selectivity and affinity for the target molecule. Since their discovery, PAs have attracted considerable interest from bio- and chemical laboratories to pharmaceutical institutes. PAs are becoming an important class of synthetic materials mimicking molecular recognition by natural receptors. In addition, they have been utilized as catalysts, sorbents for solid-phase extraction, stationary phase for liquid chromatography and mimics of enzymes. In this paper, first time we report the preparation and characterization of a PA for the recognition of blistering chemical warfare agent sulphur mustard (SM). The SM imprinted PA exhibited more surface area when compared to the control non-imprinted polymer (NIP). In addition, SEM image showed an ordered nano-pattern for the PA of SM that is entirely different from the image of NIP. The imprinting also enhanced SM rebinding ability to the PA when compared to the NIP with an imprinting efficiency (alpha) of 1.3.

  16. Virtual Warfare: Masculinity, Sexuality, and Propaganda in the Russo-Ukrainian War

    Directory of Open Access Journals (Sweden)

    Maryna Romanets

    2017-03-01

    Full Text Available This paper explores the intersection of sexual and political discourses as a particular aspect of the body politics that Russia has employed, among other strategies, in its massive propaganda offensive during the hybrid warfare against Ukraine.While recognizing sexuality as one of the mainstream concepts in political analysis, the paper draws on sexually explicit imagery and idiom used in Russian social media, and public discursive space in general, as propaganda techniques, and maps their “genealogy” within wider sociocultural and political contexts. Being conceptualized in terms of Russian hegemonic masculinity in relation to subordinated femininity and non-hegemonic masculinities of its adversarial others, these setups reveal how sexuality constitutes uneven and contradictory nexuses of power once being co-opted by Putin’s propaganda machine. It is noteworthy that Russia’s neo-imperial discursive tactics of homologizing sexual and political dominance—when supplemented with the official rhetoric of restituting Russia as a great power, Orthodox Christian fundamentalism as an integral part of Russian unique “state-civilization,” state-sanctioned homophobia, and traditional macho gender ideology—contribute quite effectively to sustaining public support in Russia for aggression against Ukraine in the process of Russian reimperialization of the former Soviet space.

  17. Ultra-Fast Degradation of Chemical Warfare Agents Using MOF-Nanofiber Kebabs.

    Science.gov (United States)

    Zhao, Junjie; Lee, Dennis T; Yaga, Robert W; Hall, Morgan G; Barton, Heather F; Woodward, Ian R; Oldham, Christopher J; Walls, Howard J; Peterson, Gregory W; Parsons, Gregory N

    2016-10-10

    The threat associated with chemical warfare agents (CWAs) motivates the development of new materials to provide enhanced protection with a reduced burden. Metal-organic frame-works (MOFs) have recently been shown as highly effective catalysts for detoxifying CWAs, but challenges still remain for integrating MOFs into functional filter media and/or protective garments. Herein, we report a series of MOF-nanofiber kebab structures for fast degradation of CWAs. We found TiO2 coatings deposited via atomic layer deposition (ALD) onto polyamide-6 nanofibers enable the formation of conformal Zr-based MOF thin films including UiO-66, UiO-66-NH2 , and UiO-67. Cross-sectional TEM images show that these MOF crystals nucleate and grow directly on and around the nanofibers, with strong attachment to the substrates. These MOF-functionalized nanofibers exhibit excellent reactivity for detoxifying CWAs. The half-lives of a CWA simulant compound and nerve agent soman (GD) are as short as 7.3 min and 2.3 min, respectively. These results therefore provide the earliest report of MOF-nanofiber textile composites capable of ultra-fast degradation of CWAs.

  18. Medical effects of internal contamination with actinides: further controversy on depleted uranium and radioactive warfare.

    Science.gov (United States)

    Durakovic, Asaf

    2016-05-01

    The Nuclear Age began in 1945 with testing in New Mexico, USA, and the subsequent bombings of Hiroshima and Nagasaki. Regardless of attempts to limit the development of nuclear weapons, the current world arsenal has reached the staggering dimensions and presents a significant concern for the biosphere and mankind. In an explosion of a nuclear weapon, over 400 radioactive isotopes are released into the biosphere, 40 of which pose potential dangers including iodine, cesium, alkaline earths, and actinides. The immediate health effects of nuclear explosions include thermal, mechanical, and acute radiation syndrome. Long-term effects include radioactive fallout, internal contamination, and long-term genotoxicity. The current controversial concern over depleted uranium's somatic and genetic toxicity is still a subject of worldwide sustained research. The host of data generated in the past decades has demonstrated conflicting findings, with the most recent evidence showing that its genotoxicity is greater than previously considered. Of particular concern are the osteotropic properties of uranium isotopes due to their final retention in the crystals of exchangeable and nonexchangeable bone as well as their proximity to pluripotent stem cells. Depleted uranium remains an unresolved issue in both warfare and the search for alternative energy sources.

  19. Measurements of Raman scattering in the middle ultraviolet band from persistent chemical warfare agents

    Science.gov (United States)

    Kullander, Fredrik; Landström, Lars; Lundén, Hampus; Mohammed, Abdesalam; Olofsson, Göran; Wästerby, Pär.

    2014-05-01

    The very low Raman scattering cross section and the fluorescence background limit the measuring range of Raman based instruments operating in the visible or infrared band. We are exploring if laser excitation in the middle ultraviolet (UV) band between 200 and 300 nm is useful and advantageous for detection of persistent chemical warfare agents (CWA) on various kinds of surfaces. The UV Raman scattering from tabun, mustard gas, VX and relevant simulants in the form of liquid surface contaminations has been measured using a laboratory experimental setup with a short standoff distance around 1 meter. Droplets having a volume of 1 μl were irradiated with a tunable pulsed laser swept within the middle UV band. A general trend is that the signal strength moves through an optimum when the laser excitation wavelength is swept between 240 and 300 nm. The signal from tabun reaches a maximum around 265 nm, the signal from mustard gas around 275 nm. The Raman signal from VX is comparably weak. Raman imaging by the use of a narrow bandpass UV filter is also demonstrated.

  20. Metabolic Syndrome in Chemical Warfare Patients with Chronic Obstructive Pulmonary Disease

    Directory of Open Access Journals (Sweden)

    Shahrzad M. Lari

    2014-11-01

    Full Text Available   Introduction: Sulfur mustard (SM, a toxic alkylating gas, can cause serious long-term pulmonary complications such as chronic obstructive pulmonary disease (COPD. Metabolic syndrome (MetS is one of the important comorbidities of COPD. This study was designed to evaluate the frequency of metabolic syndrome in Iranian chemical warfare patients (CWPs with COPD. Materials and Methods: Thirty CWPs with a mean age of 46.93± 6.8 were enrolled in this study. The following parameters were studied in: complete pulmonary function tests, health-related quality of life, serum triglycerides (TG, high density lipoprotein (HDL and fasting blood sugar (FBS levels. Additionally, 32 COPD patients and 56 healthy persons were considered as control groups who were matched to CWPs. Results: We found a statistically significant difference in the frequency of MetS between the COPD patients and the healthy control group (p=0.04. Additionally, we observed a statistically significant difference in the mean HDL levels among these groups (p=

  1. China’s Three Warfares Strategy Mitigates Fallout From Cyber Espionage Activities

    Directory of Open Access Journals (Sweden)

    Emilio Iasiello

    2016-06-01

    Full Text Available China is engaged in longstanding cyber espionage against the U.S., as well as other nations, to collect sensitive public and private information in support of national objectives laid out in its 12th Five Year Plan. Foreign governments citing China’s malfeasance have rebuked these activities, a claim vehemently denied by Beijing. In response, China is leveraging the “Three Warfares” an integrated three-prong information warfare strategy to combat these accusations by leveraging Media, Legal, and Psychological components designed to influence the international community. While the United States has threatened the imposition of economic sanctions, Beijing has successfully parried consequential actions by arresting U.S.-identified hackers, thereby demonstrating its commitment toward preserving a stable and peaceful cyberspace. These interrelated “Three Warfares” disciplines have targeted the cognitive processes of the U.S. leadership, as well as the international public’s perception of China as a global threat, thereby having successfully forestalled the implementation of any effective punitive or economic deterrence strategy to include the imposition of cyber sanctions.

  2. Modified clay minerals efficiency against chemical and biological warfare agents for civil human protection.

    Science.gov (United States)

    Plachá, Daniela; Rosenbergová, Kateřina; Slabotínský, Jiří; Kutláková, Kateřina Mamulová; Studentová, Soňa; Martynková, Gražyna Simha

    2014-04-30

    Sorption efficiencies of modified montmorillonite and vermiculite of their mono ionic Na and organic HDTMA and HDP forms were studied against chemical and biological warfare agents such as yperite and selected bacterial strains. Yperite interactions with modified clay minerals were observed through its capture in low-density polyethylene foil-modified clay composites by measuring yperite gas permeation with using chemical indication and gas chromatography methods. The antibacterial activities of synthetized organoclays were tested against selected Gram-positive and Gram-negative bacterial species in minimum inhibitory concentration tests. The obtained results showed a positive influence of modified clay minerals on the significant yperite breakthrough-time increase. The most effective material was the polyethylene-Na form montmorillonite, while the polyethylene-Na form vermiculite showed the lowest efficiency. With increasing organic cations loading in the interlayer space the montmorillonite efficiency decreased, and in the case of vermiculite an opposite effect was observed. Generally the modified montmorillonites were more effective than modified vermiculites. The HDP cations seem to be more effective compare to the HDTMA. The antibacterial activity tests confirmed efficiency of all organically modified clay minerals against Gram-positive bacteria. The confirmation of antibacterial activity against Y. pestis, plague bacteria, is the most interesting result of this part of the study.

  3. Extraordinary Measures: Drone Warfare, Securitization, and the “War on Terror”

    Directory of Open Access Journals (Sweden)

    Romaniuk Scott Nicholas

    2015-07-01

    Full Text Available The use of unmanned aerial vehicles or “drones,” as part of the United States’ (US targeted killing (TK program dramatically increased after the War on Terror (WoT was declared. With the ambiguous nature and parameters of the WoT, and stemming from the postulation of numerous low-level, niche-, and other securitizations producing a monolithic threat, US drone operations now constitute a vital stitch in the extensive fabric of US counterterrorism policy. This article employs the theories of securitization and macrosecuritization as discussed by Buzan (1991, 2006, and Buzan and Wæver (2009 to understand targeted killing, by means of weaponized drones, as an extraordinary measure according to the Copenhagen School’s interpretation. An overarching securitization and the use of the “security” label warrants the emergency action of targeted killing through the use of drones as an extraordinary measure. We argue that the WoT serves as a means of securitizing global terrorism as a threat significant enough to warrant the use of drone warfare as an extraordinary use of force. By accepting the WoT as a securitization process we can reasonably accept that the US’ response(s against that threat are also securitized and therefore become extraordinary measures.

  4. The possible role of intravenous lipid emulsion in the treatment of chemical warfare agent poisoning

    Directory of Open Access Journals (Sweden)

    Arik Eisenkraft

    2016-01-01

    Full Text Available Organophosphates (OPs are cholinesterase inhibitors that lead to a characteristic toxidrome of hypersecretion, miosis, dyspnea, respiratory insufficiency, convulsions and, without proper and early antidotal treatment, death. Most of these compounds are highly lipophilic. Sulfur mustard is a toxic lipophilic alkylating agent, exerting its damage through alkylation of cellular macromolecules (e.g., DNA, proteins and intense activation of pro-inflammatory pathways. Currently approved antidotes against OPs include the peripheral anticholinergic drug atropine and an oxime that reactivates the inhibited cholinesterase. Benzodiazepines are used to stop organophosphate-induced seizures. Despite these approved drugs, efforts have been made to introduce other medical countermeasures in order to attenuate both the short-term and long-term clinical effects following exposure. Currently, there is no antidote against sulfur mustard poisoning. Intravenous lipid emulsions are used as a source of calories in parenteral nutrition. In recent years, efficacy of lipid emulsions has been shown in the treatment of poisoning by fat-soluble compounds in animal models as well as clinically in humans. In this review we discuss the usefulness of intravenous lipid emulsions as an adjunct to the in-hospital treatment of chemical warfare agent poisoning.

  5. Nanowire-based surface-enhanced Raman spectroscopy (SERS) for chemical warfare simulants

    Science.gov (United States)

    Hoffmann, J. A.; Miragliotta, J. A.; Wang, J.; Tyagi, P.; Maddanimath, T.; Gracias, D. H.; Papadakis, S. J.

    2012-06-01

    Hand-held instruments capable of spectroscopic identification of chemical warfare agents (CWA) would find extensive use in the field. Because CWA can be toxic at very low concentrations compared to typical background levels of commonly-used compounds (flame retardants, pesticides) that are chemically similar, spectroscopic measurements have the potential to reduce false alarms by distinguishing between dangerous and benign compounds. Unfortunately, most true spectroscopic instruments (infrared spectrometers, mass spectrometers, and gas chromatograph-mass spectrometers) are bench-top instruments. Surface-acoustic wave (SAW) sensors are commercially available in hand-held form, but rely on a handful of functionalized surfaces to achieve specificity. Here, we consider the potential for a hand-held device based on surface enhanced Raman scattering (SERS) using templated nanowires as enhancing substrates. We examine the magnitude of enhancement generated by the nanowires and the specificity achieved in measurements of a range of CWA simulants. We predict the ultimate sensitivity of a device based on a nanowire-based SERS core to be 1-2 orders of magnitude greater than a comparable SAW system, with a detection limit of approximately 0.01 mg m-3.

  6. Approximation and Filtering Techniques for Navigation Data in Time-critical Electronic Warfare Systems

    Directory of Open Access Journals (Sweden)

    Vanitha D.

    2013-03-01

    Full Text Available This paper presents a holistic solution to the navigation requirements in a time critical electronic warfare systems like missile warning systems (MWS. In a passive MWS using IR sensors the efficiency of the system is determined by attributes such as low false alarm rate, minimal response time and ability to track different IR radiating objects by association and correlation of consecutive detections through time. Such a system is required to be supported by a navigation system capable of accurate estimation of the aircraft position, attitude angles and altitude. In this paper, estimation techniques used to accurately calculate aircraft navigation data at the time of capture of IR frames are discussed. The paper discusses about synchronization of INGPS, IR sensors & Processor on to same timeline. The paper also intends to evaluate the performance of wavelet transform filter in effective elimination of noise in navigation parameters like acceleration and attitude angle rates for a better estimation of position and attitude.Defence Science Journal, 2013, 63(2, pp.204-209, DOI:http://dx.doi.org/10.14429/dsj.63.4265

  7. Toxicogenomic studies of human neural cells following exposure to organophosphorus chemical warfare nerve agent VX.

    Science.gov (United States)

    Gao, Xiugong; Lin, Hsiuling; Ray, Radharaman; Ray, Prabhati

    2013-05-01

    Organophosphorus (OP) compounds represent an important group of chemical warfare nerve agents that remains a significant and constant military and civilian threat. OP compounds are considered acting primarily via cholinergic pathways by binding irreversibly to acetylcholinesterase, an important regulator of the neurotransmitter acetylcholine. Many studies over the past years have suggested that other mechanisms of OP toxicity exist, which need to be unraveled by a comprehensive and systematic approach such as genome-wide gene expression analysis. Here we performed a microarray study in which cultured human neural cells were exposed to 0.1 or 10 μM of VX for 1 h. Global gene expression changes were analyzed 6, 24, and 72 h post exposure. Functional annotation and pathway analysis of the differentially expressed genes has revealed many genes, networks and canonical pathways that are related to nervous system development and function, or to neurodegenerative diseases such as Alzheimer's disease, Huntington's disease, and Parkinson's disease. In particular, the neuregulin pathway impacted by VX exposure has important implications in many nervous system diseases including schizophrenia. These results provide useful information valuable in developing suitable antidotes for more effective prevention and treatment of, as well as in developing biomarkers for, VX-induced chronic neurotoxicity.

  8. Global physics: from percolation to terrorism, guerilla warfare and clandestine activities

    Science.gov (United States)

    Galam, Serge

    2003-12-01

    The September 11 attack on the US has revealed an unprecedented terrorism with worldwide range of destruction. It is argued to result from the first worldwide percolation of passive supporters. They are people sympathetic to the terrorism cause but without being involved with it. They just do not oppose it in case they could. This scheme puts suppression of the percolation as the major strategic issue in the fight against terrorism. Acting on the population is shown to be useless. Instead a new strategic scheme is suggested to increase the terrorism percolation threshold and in turn suppress the percolation. The relevant associated space is identified as a multi-dimensional social space including both the ground earth surface and all various independent flags displayed by the terrorist group. Some hints are given on how to shrink the geographical spreading of terrorism threat. The model apply to a large spectrum of clandestine activities including guerilla warfare as well as tax evasion, corruption, illegal gambling, illegal prostitution and black markets.

  9. AECT Convention, Orlando, Florida 2008 Report

    Science.gov (United States)

    Vega, Eddie

    2009-01-01

    This article presents several reports that highlight the events at the 2008 Association for Educational Communications and Technology (AECT) International Convention in Orlando, Florida. At the annual convention this year, the Multimedia Production Division goal was to continue to share information about the latest tools in multimedia production,…

  10. French Economics of Convention and Economic Sociology

    DEFF Research Database (Denmark)

    Jagd, Søren

    The French Economics of convention tradition has developed to be an influential research tradition situated in the area between economics and sociology. The aim of the paper is to explore some of the themes that may be common to economics of conventions and economic sociology by looking more...

  11. Using Conventional Sequences in L2 French

    Science.gov (United States)

    Forsberg, Fanny

    2010-01-01

    By means of a phraseological identification method, this study provides a general description of the use of conventional sequences (CSs) in interviews at four different levels of spoken L2 French as well as in interviews with native speakers. Use of conventional sequences is studied with regard to overall quantity, category distribution and type…

  12. 竞技排球运动心理战理论模型的构建%Theoretical Models of Psychological Warfare Built in Competitive Volleyball

    Institute of Scientific and Technical Information of China (English)

    洪庆

    2011-01-01

    通过对军事心理学中心理战思想的精心研读,结合竞技排球运动与战场心理战的共通之处,从理论建设、专业人才建设、规章制度建设、谋略创新建设以及球队心理素质建设五个方面构建了竞技排球运动心理战的理论模型。%This article through the study of thoughts of psychological warfare in military psychology carefully, combined with the commons of volleyball and psychological warfare, from five aspects that construction of theory, construction of professional, and construction of rules and regulations, construction of counsel innovation and construction of team psychological quality to construct the theoretical model of psychological warfare of volleyball.

  13. Research on the Interaction of Hydrogen-Bond Acidic Polymer Sensitive Sensor Materials with Chemical Warfare Agents Simulants by Inverse Gas Chromatography

    Directory of Open Access Journals (Sweden)

    Liu Yang

    2015-06-01

    Full Text Available Hydrogen-bond acidic polymers are important high affinity materials sensitive to organophosphates in the chemical warfare agent sensor detection process. Interactions between the sensor sensitive materials and chemical warfare agent simulants were studied by inverse gas chromatography. Hydrogen bonded acidic polymers, i.e., BSP3, were prepared for micro-packed columns to examine the interaction. DMMP (a nerve gas simulant and 2-CEES (a blister agent simulant were used as probes. Chemical and physical parameters such as heats of absorption and Henry constants of the polymers to DMMP and 2-CEES were determined by inverse gas chromatography. Details concerning absorption performance are also discussed in this paper.

  14. Research on the interaction of hydrogen-bond acidic polymer sensitive sensor materials with chemical warfare agents simulants by inverse gas chromatography.

    Science.gov (United States)

    Yang, Liu; Han, Qiang; Cao, Shuya; Huang, Feng; Qin, Molin; Guo, Chenghai; Ding, Mingyu

    2015-06-02

    Hydrogen-bond acidic polymers are important high affinity materials sensitive to organophosphates in the chemical warfare agent sensor detection process. Interactions between the sensor sensitive materials and chemical warfare agent simulants were studied by inverse gas chromatography. Hydrogen bonded acidic polymers, i.e., BSP3, were prepared for micro-packed columns to examine the interaction. DMMP (a nerve gas simulant) and 2-CEES (a blister agent simulant) were used as probes. Chemical and physical parameters such as heats of absorption and Henry constants of the polymers to DMMP and 2-CEES were determined by inverse gas chromatography. Details concerning absorption performance are also discussed in this paper.

  15. Drone Warfare: Is the United States Violating the Law of Armed Conflict

    Science.gov (United States)

    2011-02-16

    of the Red Cross Commentary on the Additional Protocols of 8 June 1977 to the Geneva Conventions of 12 August 1949, 515 (Y. Sandoz , C. Swinarski, B...Additional to the Geneva Conventions of 12 August 1949, 8 June 1977, ed. Yves Sandoz , Christophe Swinarski, and Bruno Zimmermann (International

  16. Bridging the Gap: Historical Analysis of Conventional and Unconventional Forces Integration

    Science.gov (United States)

    2006-06-01

    Case Studies in Special Operations Warfare: Theory and Practice (New York: Ballantine Press, 1996), 246. This book offers a detailed description of...however, all too often in the past egoism , elitism, and the need for secrecy within units have created insurmountable barriers that have prevented the...Ops Case Studies in Special Operations Warfare: Theory and Practice. New York: Ballantine Press, 1996. Norling, Bernard. The Intrepid

  17. Adapting conventional cancer treatment for immunotherapy.

    Science.gov (United States)

    Qiao, Jian; Liu, Zhida; Fu, Yang-Xin

    2016-05-01

    The efficacy of directly killing tumors by conventional cancer therapies, such as chemotherapy and radiotherapy, has been for several decades well established. But, a suppressed immune response might become a lethal side effect after repeated cycles of intensive treatment. Recently, achievements in immune checkpoint inhibitors and adoptive T cell-mediated immunotherapies have resulted in changes in frontline management of advanced cancer diseases. However, accumulated evidence indicates that immunotherapeutic and conventional strategies alone are often ineffective to eradicate big tumors or metastasis. To improve the outcomes of treatment for advanced cancer diseases, the combination of conventional cancer treatment with various immunotherapeutic approaches has been attempted and has shown potential synergistic effects. Recent studies have unexpectedly demonstrated that some strategies of conventional cancer treatment can regulate the immune response positively, thus the understanding of how to adapt conventional treatment for immunotherapy is crucial to the design of effective combination therapy of conventional treatment with immunotherapy. Here, we review both experimental and clinical studies on the therapeutic effect and its mechanisms of combining conventional therapy with immunotherapy in treatment of cancer.

  18. Chemical and biological warfare: Biochemistry, therapy, and treatment. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-12-01

    The bibliography contains citations concerning biochemistry, therapy, and treatment of the effects of military chemical and biological warfare agents. References include surveys and studies of immunizing agents and drugs, the efficacy of these drugs, and the effect of the drugs on the patient. Also included are biochemical studies, assay techniques, and antidote development, some of which is supported by animal studies. Citations concerning detection and warning, defoliants, protection, biology and toxicology, and general studies are covered in separate bibliographies.(Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  19. Chemical and biological warfare: Biochemistry, therapy, and treatment. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-11-01

    The bibliography contains citations concerning biochemistry, therapy, and treatment of the effects of military chemical and biological warfare agents. References include surveys and studies of immunizing agents and drugs, the efficacy of these drugs, and the effect of the drugs on the patient. Also included are biochemical studies, assay techniques, and antidote development, some of which is supported by animal studies. Citations concerning detection and warning, defoliants, protection, biology and toxicology, and general studies are covered in separate bibliographies.(Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  20. The Effect of the Goldwater-Nichols Department of Defense Reorganization Act on Surface Warfare Officer Career Paths.

    Science.gov (United States)

    1987-12-01

    OF THE GOLDWATER-NIaIS DEARnhmr OF DESE REOFGANIZATION ACr ON SURFACE WARFARE OFFICER CAREER PATHS 12. PERSONAL AUTHOR(S) Steward, Thomas F. 13a...at these levels. The stocks at tour 12D increase 160o by the 5 %i year of the simulation. This is depicted graphically in Figure -4.2. The stocks of...with Datj B.,e Management ,DB.MI and graphics software to provide a powerful decisIon sUpporT " for the manpower analyst. e.r5 dt r APPENDIX A FLOW

  1. Chemical Warfare Materiel in Sediment at a Deep-Water Discarded Military Munitions Site

    Science.gov (United States)

    Briggs, C. W.; Bissonnette, M. C.; Edwards, M.; Shjegstad, S. M.

    2016-12-01

    Understanding the release and transformation of chemical agent (CA) at underwater discarded military munitions (DMM) sites is essential to determine the potential risk to human health and impact on the ocean environment; yet few studies have been conducted at sites in excess of 250 m, the depth at which most U.S. CA munitions were disposed. Maritime construction workers installing cables or pipelines at a CA DMM site, as well as fishermen and scientific researchers deploying bottom-contact gear, represent possible exposure pathways to human receptors. The Hawai`i Undersea Military Munitions Assessment (HUMMA) sought to characterize a historic munitions sea-disposal site at depths between 400-650 m. During the 2014 HUMMA Sampling Survey, the Jason 2 remotely operated vehicle was used to collect sediments within two meters of suspected World War II chemical munitions, confirmed to be 100-lb M47 series bombs containing sulfur mustard. When environmental media was brought to the surface, samples were screened for distilled sulfur mustard (HD) and related agent breakdown products (ABP) (collectively referred to as chemical warfare materiel [CWM]). Detectable concentrations of HD and/or its ABP 1,4-dithiane were found in sediments collected at all CA DMM sites; HD was also detected at two control sites. The location and extent of munitions casing deterioration strongly influenced the distribution and level of CWM in sediment. The interior of the casing contained levels of CWM orders of magnitudes higher than that observed in the surrounding sediment at one meter distance, indicating the majority of the CWM is hydrolyzed as it is released from the munitions casing and a fraction of the fill materiel persists in the environment for decades following disposal. Although the potential for future site users to become exposed to CWA in recovered sediments and debris exists, the level of risk is significantly mitigated by the depth and location of the sea-disposal site.

  2. Surface plasmon resonance detection of biological warfare agent Staphylococcal enterotoxin B using high affinity monoclonal antibody

    Energy Technology Data Exchange (ETDEWEB)

    Gupta, Garima; Singh, Pawan K.; Boopathi, M., E-mail: mannanboopathi@yahoo.com; Kamboj, D.V.; Singh, Beer; Vijayaraghavan, R.

    2010-11-30

    A novel sensitive method was developed for the detection as well as quantification of Staphylococcal enterotoxin B (SEB) using surface plasmon resonance (SPR). It is well known that the amount of SEB needed to cause the intoxication to human beings is very less and this concentration (0.02 {mu}g/kg) is highly dangerous, hence, it is used as biological warfare agent. Thus, the need to develop a reliable and potential detection system against SEB is warranted. In the present work, SEB antibody was immobilized on carboxymethyldextran modified gold chip. The immobilization of SEB antibody and interaction of antigen with immobilized antibody were in-situ characterized by SPR and electrochemical impedance spectroscopy. A sample solution containing SEB antigen was injected in a working channel and the results revealed linearity in the concentration from 2.0 to 32.0 pM with a detection limit of 1.0 pM. By using kinetic evaluation software, K{sub D} (equilibrium constant) and Bmax (maximum binding capacity of analyte) values were calculated and found to be 13 pM and 424.23, respectively. Moreover, the thermodynamic parameter, change in Gibb's free energy was deduced and found to be -62.08 kJ/mol and this value shows the spontaneous interaction between SEB antigen and SEB antibody. In order to optimize the detection method, temperature and pH variation studies were also performed. Interference study was conducted to know the selectivity for the antigen-antibody interaction of SEB. The selectivity efficiency of SEB, SEC, SEA and SED were 100, 27.15, 20.01 and 12.05%, respectively towards SEB antibody.

  3. Fate of chemical warfare agents and toxic industrial chemicals in landfills.

    Science.gov (United States)

    Bartelt-Hunt, Shannon L; Barlaz, Morton A; Knappe, Detlef R U; Kjeldsen, Peter

    2006-07-01

    One component of preparedness for a chemical attack is planning for the disposal of contaminated debris. To assess the feasibility of contaminated debris disposal in municipal solid waste (MSW) landfills, the fate of selected chemical warfare agents (CWAs) and toxic industrial chemicals (TICs) in MSW landfills was predicted with a mathematical model. Five blister agents [sulfur mustard (HD), nitrogen mustard (HN-2), lewisite (L), ethyldichloroarsine (ED), and phosgene oxime (CX)], eight nerve agents [tabun (GA), sarin (GB), soman (GD), GE, GF, VX, VG, and VM], one riot-control agent [CS], and two TICs [furan and carbon disulfide] were studied. The effects of both infiltration (climate) and contaminant biodegradability on fate predictions were assessed. Model results showed that hydrolysis and gas-phase advection were the principal fate pathways for CWAs and TICs, respectively. Apart from CX and the TICs, none of the investigated compounds was predicted to persist in a landfill for more than 5 years. Climate had little impact on CWA/TIC fate, and biodegradability was only important for compounds with long hydrolysis half-lives. Monte Carlo simulations were performed to assess the influence of uncertainty in model input parameters on CWA/TIC fate predictions. Correlation analyses showed that uncertainty in hydrolysis rate constants was the primary contributor to variance of CWA fate predictions, while uncertainty in the Henry's Law constant and landfill gas-production rate accounted for most of the variance of TIC fate predictions. CWA hydrolysates were more persistent than the parent CWAs, but limited information is available on abiotic or biotic transformation rates for these chemicals.

  4. Advances in toxicology and medical treatment of chemical warfare nerve agents

    Directory of Open Access Journals (Sweden)

    Moshiri Mohammd

    2012-11-01

    Full Text Available Abstract Organophosphorous (OP Nerve agents (NAs are known as the deadliest chemical warfare agents. They are divided into two classes of G and V agents. Most of them are liquid at room temperature. NAs chemical structures and mechanisms of actions are similar to OP pesticides, but their toxicities are higher than these compounds. The main mechanism of action is irreversible inhibition of Acetyl Choline Esterase (AChE resulting in accumulation of toxic levels of acetylcholine (ACh at the synaptic junctions and thus induces muscarinic and nicotinic receptors stimulation. However, other mechanisms have recently been described. Central nervous system (CNS depression particularly on respiratory and vasomotor centers may induce respiratory failure and cardiac arrest. Intermediate syndrome after NAs exposure is less common than OP pesticides poisoning. There are four approaches to detect exposure to NAs in biological samples: (I AChE activity measurement, (II Determination of hydrolysis products in plasma and urine, (III Fluoride reactivation of phosphylated binding sites and (IV Mass spectrometric determination of cholinesterase adducts. The clinical manifestations are similar to OP pesticides poisoning, but with more severity and fatalities. The management should be started as soon as possible. The victims should immediately be removed from the field and treatment is commenced with auto-injector antidotes (atropine and oximes such as MARK I kit. A 0.5% hypochlorite solution as well as novel products like M291 Resin kit, G117H and Phosphotriesterase isolated from soil bacterias, are now available for decontamination of NAs. Atropine and oximes are the well known antidotes that should be infused as clinically indicated. However, some new adjuvant and additional treatment such as magnesium sulfate, sodium bicarbonate, gacyclidine, benactyzine, tezampanel, hemoperfusion, antioxidants and bioscavengers have recently been used for OP NAs poisoning.

  5. Mass spectrometric analysis of chemical warfare agents in support of a chemical terrorist event

    Energy Technology Data Exchange (ETDEWEB)

    Hancock, J.R.; D' Agostino, P.A.; Chenier, C.L. [Defence R and D Canada Suffield, Medicine Hat, AB (Canada)

    2003-07-01

    Chemical warfare (CW) agents are considered to be any chemicals which, through their chemical action on life processes can cause death, temporary incapacitation or permanent harm to humans or animals. In Canada, the probability of a CW terrorist attack is low despite the catastrophic consequences that would result from such an attack. The three levels of government would be responding to such an event. CW agent response training for all levels of government is offered at Defence R and D Canada-Suffield. Appropriate samples must be collected for analysis in a laboratory, as such an event would lead to a criminal investigation. Research into new methods for the identification of CW agents is being conducted by the analytical laboratory at Defence R and D Canada-Suffield. Gas chromatography and mass spectrometry (GC-MS) are being used extensively to separate and characterize CW agents in organic extracts. In the case of aqueous samples, another method might be more appropriate, since additional sample handling is required before GC-MS analysis can be performed. Minimal sample handling is required when using liquid chromatography-electrospray ionization-mass spectrometry (LC-ESI-MS) for direct analysis of CW agents. The authors demonstrated the use of LC-ESI-MS for analyzing CW agents and their hydrolysis products in aqueous samples. For the analysis of nerve agents and phosphonic acids in soil, comparable or superior results to organic extraction and GC-MS were obtained for aqueous extractions followed by LC-ESI-MS. The combination of GC-MS and LC-ESI-MS for the analysis of mustard related compounds in soil extracts from a former mustard storage area showed that the two methods are complementary in this situation. 9 refs., 3 tabs., 5 figs.

  6. Multiple functional UV devices based on III-Nitride quantum wells for biological warfare agent detection

    Science.gov (United States)

    Wang, Qin; Savage, Susan; Persson, Sirpa; Noharet, Bertrand; Junique, Stéphane; Andersson, Jan Y.; Liuolia, Vytautas; Marcinkevicius, Saulius

    2009-02-01

    We have demonstrated surface normal detecting/filtering/emitting multiple functional ultraviolet (UV) optoelectronic devices based on InGaN/GaN, InGaN/AlGaN and AlxGa1-xN/AlyGa1-yN multiple quantum well (MQW) structures with operation wavelengths ranging from 270 nm to 450 nm. Utilizing MQW structure as device active layer offers a flexibility to tune its long cut-off wavelength in a wide UV range from solar-blind to visible by adjusting the well width, well composition and barrier height. Similarly, its short cut-off wavelength can be adjusted by using a GaN or AlGaN block layer on a sapphire substrate when the device is illuminated from its backside, which further provides an optical filtering effect. When a current injects into the device under forward bias the device acts as an UV light emitter, whereas the device performs as a typical photodetector under reverse biases. With applying an alternating external bias the device might be used as electroabsorption modulator due to quantum confined Stark effect. In present work fabricated devices have been characterized by transmission/absorption spectra, photoresponsivity, electroluminescence, and photoluminescence measurements under various forward and reverse biases. The piezoelectric effect, alloy broadening and Stokes shift between the emission and absorption spectra in different InGaN- and AlGaN-based QW structures have been investigated and compared. Possibilities of monolithic or hybrid integration using such multiple functional devices for biological warfare agents sensing application have also be discussed.

  7. Limitations and challenges in treatment of acute chemical warfare agent poisoning.

    Science.gov (United States)

    Thiermann, Horst; Worek, Franz; Kehe, Kai

    2013-12-01

    Recent news from Syria on a possible use of chemical warfare agents made the headlines. Furthermore, the motivation of terrorists to cause maximal harm shifts these agents into the public focus. For incidents with mass casualties appropriate medical countermeasures must be available. At present, the most important threats arise from nerve agents and sulfur mustard. At first, self-protection and protection of medical units from contamination is of utmost importance. Volatile nerve agent exposure, e.g. sarin, results in fast development of cholinergic crisis. Immediate clinical diagnosis can be confirmed on-site by assessment of acetylcholinesterase activity. Treatment with autoinjectors that are filled with 2mg atropine and an oxime (at present obidoxime, pralidoxime, TMB-4 or HI-6) are not effective against all nerve agents. A more aggressive atropinisation has to be considered and more effective oximes (if possible with a broad spectrum or a combination of different oximes) as well as alternative strategies to cope with high acetylcholine levels at synaptic sites should be developed. A further gap exists for the treatment of patients with sustained cholinergic crisis that has to be expected after exposure to persistent nerve agents, e.g. VX. The requirement for long-lasting artificial ventilation can be reduced with an oxime therapy that is optimized by using the cholinesterase status for guidance or by measures (e.g. scavengers) that are able to reduce the poison load substantially in the patients. For sulfur mustard poisoning no specific antidote is available until now. Symptomatic measures as used for treatment of burns are recommended together with surgical or laser debridement. Thus, huge amounts of resources are expected to be consumed as wound healing is impaired. Possible depots of sulfur mustard in tissues may aggravate the situation. More basic knowledge is necessary to improve substantially therapeutic options. The use of stem cells may provide a new

  8. French Economics of Convention and Economic Sociology

    DEFF Research Database (Denmark)

    Jagd, Søren

    The French Economics of convention tradition has developed to be an influential research tradition situated in the area between economics and sociology. The aim of the paper is to explore some of the themes that may be common to economics of conventions and economic sociology by looking more...... closely into three recent texts from the economics of convention tradition discussing, in slightly different ways, differences and similarities between economics of convention and economic sociology. It is argued that André Orléan’s point that a common aim could be to ‘denaturalise’ the institutional...... foundation of markets and of money may be an occasion for economic sociology to focus even more on elaborating on the institutional void created by traditional economic theory. A second point is that economic sociology could benefit from the perspective of a plurality of forms of coordination involved...

  9. Less tachycardia during transnasal versus conventional gastroscopy

    DEFF Research Database (Denmark)

    Neuenschwander, Anders U; Christensen, Merete; Schulze, Svend

    2012-01-01

    Transnasal endoscopy is well tolerated, but physiological benefits compared with conventional gastroscopy have not been studied in detail. The aims of this randomised study were to evaluate cardiopulmonary features, patient tolerance, and the endoscopist's evaluation of transnasal versus conventi...

  10. numerical assessment of conventional regulation effectiveness for ...

    African Journals Online (AJOL)

    Benkoussas B, Djedjig R, and Vauquelin O

    2016-05-01

    May 1, 2016 ... International License. Libraries Resource ... Keywords: underground station; conventional regulation; ventilation strategies; smoke ... Intuitively, ventilation is the first practice which is applied to secure the space and users.

  11. Convergence of Distance Education and Conventional Learning ...

    African Journals Online (AJOL)

    Convergence of Distance Education and Conventional Learning: Innovations ... using various blended learning media including print, ICTs, electronic platforms, ... Admittedly, the blending of offline and online learning enhances significantly ...

  12. Reflexive convention: civil partnership, marriage and family.

    Science.gov (United States)

    Heaphy, Brian

    2017-09-14

    Drawing on an analysis of qualitative interview data from a study of formalized same-sex relationships (civil partnerships) this paper examines the enduring significance of marriage and family as social institutions. In doing so, it intervenes in current debates in the sociology of family and personal life about how such institutions are undermined by reflexivity or bolstered by convention. Against the backdrop of dominating sociological frames for understanding the links between the changing nature of marriage and family and same-sex relationship recognition, the paper analyses the diverse and overlapping ways (including the simple, relational, strategic, ambivalent and critical ways) in which same-sex partners reflexively constructed and engaged with marriage and family conventions. My analysis suggests that instead of viewing reflexivity and convention as mutually undermining, as some sociologists of family and personal life do, it is insightful to explore how diverse forms of reflexivity and convention interact in everyday life to reconfigure the social institutions of marriage and family, but do not undermine them as such. I argue the case for recognizing the ways in which 'reflexive convention', or reflexive investment in convention, contributes to the continuing significance of marriage and family as social institutions. © London School of Economics and Political Science 2017.

  13. Proceedings of the 4th Workshop on ICT Uses in Warfare and the Safeguarding of Peace 2012 (IWSP 2012), Protea Hotel Balalaika, Sandton, 16 August 2012

    CSIR Research Space (South Africa)

    Van Niekerk, B

    2012-07-01

    Full Text Available -1 Proceedings of the 4th Workshop on ICT Uses in Warfare and the Safeguarding of Peace 2012 (IWSP 2012), Protea Hotel Balalaika, Sandton, 16 August 2012 Edited by Dr Brett van Niekerk, Dr Louise Leenen, Trishana Ramluckan, and Prof. Manoj Maharaj A conference...

  14. Determination of contamination of a chemical warfare-proof operating theatre with volatile anaesthetic agents and assessment of anaesthetic gas scavenging systems.

    Science.gov (United States)

    Yoganathan, S; Johnston, I G; Parnell, C J; Houghton, I T; Restall, J

    1991-11-01

    Three types of anaesthetic waste scavenging systems (active antipollution system, Papworth Block passive system and activated charcoal absorber system) were compared with a non-scavenging control to assess their effectiveness in reducing waste halothane concentrations in a chemical warfare-proof operating theatre. All three systems were found to reduce the level of pollution significantly.

  15. Mechanism of injury and microbiological flora of the geographical location are essential for the prognosis in soldiers with serious warfare injuries

    DEFF Research Database (Denmark)

    Wetterslev, Mik; Rose-Larsen, Katrine; Hansen-Schwartz, Jacob

    2013-01-01

    has been and remains a substantial part of warfare, and this review has showed us that the knowledge of the mechanism of injury is indeed essential, and that intelligence on the microbiological flora of the geographical location of the conflict is essential. FUNDING: not relevant. TRIAL REGISTRATION...

  16. Knee bone tumors: findings on conventional radiology*

    Science.gov (United States)

    Andrade Neto, Francisco; Teixeira, Manuel Joaquim Diógenes; Araújo, Leonardo Heráclio do Carmo; Ponte, Carlos Eduardo Barbosa

    2016-01-01

    The knee is a common site for bone tumors, whether clinically painful or not. Conventional radiology has been established as the first line of investigation in patients with knee pain and can reveal lesions that often generate questions not only for the generalist physician but also for the radiologist or general orthopedist. History, image examination, and histopathological analysis compose the essential tripod of the diagnosis of bone tumors, and conventional radiology is an essential diagnostic tool in patients with knee pain. This pictorial essay proposes to depict the main conventional radiography findings of the most common bone tumors around the knee, including benign and malignant tumors, as well as pseudo-tumors. PMID:27403019

  17. Economic Sociology and Economics of Convention

    DEFF Research Database (Denmark)

    Jagd, Søren

    This paper is part of a larger exploration of the French Economics of Convention tradition. The aim of the paper is to explore potential themes of common interest to economic sociology and Economics of Conventions. The paper is in two parts. First, I summarise the main theoretical features of EC...... the institutional framework of social action. Second, I explore two issues raised by economics of conventions that may be particularly important to consider for economic sociology. The first issue is the explicit exploration of the consequences of a plurality of forms of justification suggested by Luc Boltanski...... and Laurent Thévenot in ‘économie de la grandeur’. This perspective has already been taken up in economic sociology in David Stark’s notion of a ‘Sociology of Worth’. The second issue, recently suggested by André Orléan, is the need to denaturalise economic theory and economic action to demonstrate the social...

  18. Economics of Convention and New Economic Sociology

    DEFF Research Database (Denmark)

    Jagd, Søren

    2007-01-01

    The aim of the article is to explore potential common themes in economic sociology and economics of conventions. The article explores two issues raised by economics of conventions that may be of particular importance to economic sociology. First, the explicit exploration of the consequences...... of a plurality of forms of justification, as elaborated in économie de la grandeur. This perspective was recently taken up in economic sociology by David Stark's introduction of the notion ‘sociology of worth'. The second issue, recently suggested by André Orléan, is the need to denaturalize economic theory...... and economic action to demonstrate the social constructed nature of economic action. It is argued that these two issues demonstrate that a fruitful dialogue is indeed possible between economic sociology and economics of convention and should be encouraged....

  19. The collapse of the conventional career.

    Science.gov (United States)

    Mangan, P

    The Collapse of the Conventional Career was commissioned by the ENB as 'the first in a number of discussion papers in which important issues were to be explored so that the professional could debate them fully' (Jean Hooper, chairwoman of the ENB, in her foreword). The author Celia Davis' premise was that, conventionally, a career was seen as comprising full-time work carried out without a break in service. Because many female nurses could not fulfil this expectation they were disadvantaged in a number of ways. In order to address the problems faced in practice by those who would not be able, for various reasons, to undertake a conventional career, Professor Davis looked at what changes in thinking and policy would be required.

  20. Estimating areas threatened by contamination from leaking chemical warfare agents dumped into the Baltic Sea

    Science.gov (United States)

    Jakacki, Jaromir; Przyborska, Anna; Andrzejewski, Jan

    2017-04-01

    Approximately 60,000 tons of chemical munitions were dumped into the Baltic Sea after World War II (the exact amount is unknown and some sources estimate it as more than 200,000 tons). Dumped munitions still pose a risk of leakage caused by erosion and corrosion, and it is important to know the danger areas. Because of wide dispersion of the dumped munitions, modelling is only one tool that could provide wide image of physical state of the sea at all locations and which could also be used for analysing contamination during a potential leakage. Obviously, it is possible to take samples at each dumpsite, but modelling also allows to develop possible scenarios of leakages under specific physical conditions. For the purpose of analysis of potential leakage a high-resolution model (HRM) of the contamination will be embedded in the hydrodynamic model (HM) of the Baltic Sea. The HRM will use data from general circulation model results of estimated resolution of nearly 2 km. The Parallel Ocean Program will be implemented as the HM for the whole Baltic Sea. Atmospheric data from regional implementation of the Weather Research and Forecasting System (WRF) have been used as the top boundary conditions of the HM, and sea level data from Gothenburg had been included into model barotropic equation as lateral boundary conditions. Passive tracer will represent the contamination in the HRM and horizontal resolution of the HRM will be close to 50 meters. Passive tracers will also be implemented in the HM - for comparison of the results. For proper representation of potential leakage of chemical warfare agents the HRM will have included diffusion and advection processes. The results from the HM are going to be interpolated into the HRM domain and then integration will be performed. Based on the implemented simulations, estimated contaminated area and its comparison from the HRM as well as from the HM will be presented. The research work was fund by the European Union (European

  1. Anthropogenic landforms of warfare origin and their ecological significance: the Verdun Forest, NE France

    Science.gov (United States)

    De Matos Machado, Rémi; Amat, Jean-Paul; Arnaud-Fassetta, Gilles; Bétard, François; Bilodeau, Clélia; Jacquemot, Stéphanie; Toumazet, Jean-Pierre

    2017-04-01

    By its unprecedented industrial character, the First World War marked landscapes like no other conflict in the world. As a result of artillery bombardment and building facilities, the relief suffered major disturbances giving rise to millions anthropogenic landforms of warfare origin on the Western front: shell craters, trenches, shelters and gun sites. This landscape made of bumps and holes that dominated the lands of West Flanders and North-eastern France during the four years of war took chaotic aspects on the great battle sites. In some areas, substrate crushing by repeated bombings resulted in a field lowering of several metres. Although these geomorphological legacies of war are still present on these scarred lands, their effects on local environment and on present-day biodiversity patterns are not fully understood. On the battlefield of Verdun, where a huge number and range of conflict-induced landforms may be observed, special attention is being paid to the ecological significance of these anthropogenic landforms in a current landscape matrix dominated by forest. In 2013, an airborne LiDAR mission conducted over the battlefield has brought to light the relief inherited from the fighting that was until now concealed by the Verdun forest planted in the 1930's. Through a digital terrain model (DTM) with centimetre level accuracy, it is now possible to observe the smallest traces of the fighting. A first programmatic mapping work allowed to inventory and to locate these reliefs on the whole 10,000 hectares covered by the DTM. Also, the calculation of their geometry enabled us to quantify the erosion rate due to the military activities on the battlefield. On the basis of these morphometric measurements, a typology was developed to better appreciate the morphological diversity of conflict-induced landforms. The results show that these anthropogenic landforms are generally hollow. Because of this particular morphology, the conflict-induced landforms provide

  2. Interleukin-6 and airflow limitation in chemical warfare patients with chronic obstructive pulmonary disease

    Directory of Open Access Journals (Sweden)

    Davood Attaran

    2010-09-01

    disease, interleukin-6, inflammation, chemical warfare

  3. Coalition Warfare Program (CWP): secure policy controlled information query and dissemination over a Bices network

    Science.gov (United States)

    Toth, Andrew; Pham, Tien; Karr, Todd; Bent, Graham; Harries, Dominic; Knox, Alan

    2013-05-01

    In 2006, the US Army Research Laboratory (ARL) and the UK Ministry of Defence (MoD) established a collaborative research alliance with academia and industry, called the International Technology Alliance (ITA) to address fundamental issues concerning Network and Information Sciences. Under the ITA research program, a US-UK transition project on "ITA Policy Controlled Information Query and Dissemination" was funded in 2011 by OSD's Coalition Warfare Program (CWP). The goal of this CWP project is to develop an extensible capability of performing distributed federated query and information dissemination across a coalition network of distributed disparate data/information sources with access­ controlled policies. The CWP project is lead by US Army Research Laboratory (ARL) and UK Defence Science Technology Laboratory (Dstl) with software development by IBM UK and IBM US. The CWP project exploits two key technology components developed within the ITA, namely the Gaian Database and integrated Access Policy Decision and Enforcement mechanisms. The Gaian Database (GaianDB) is a Dynamic Distributed Federated Database (DDFD) that addresses a need to share information among coalition members by providing a means for policy-controlled access to data across a network of heterogeneous data sources. GaianDB implements a SQL-compliant Store-Locally-Query-Anywhere (SLQA) approach providing software applications with global access to data from any node in the database network via standard SQL queries. Security policy is stored locally and enforced at the database node level, reducing potential for unauthorized data access and waste of network bandwidth. A key metric of success for a CWP project is the transition of coalition-related technology from TRL-3 or 4 to TRL-6 or higher. Thus, the end goal of this CWP project was to demonstrate the GaianDB and policy technology within an operational environment at the NATO Intelligence Fusion Centre (NIFC) at Molesworth RAF. An initial

  4. Investigation of Surfaces after Non Conventional Machining

    Science.gov (United States)

    Micietova, Anna; Neslusan, Miroslav; Cillikova, Maria

    2016-12-01

    This paper deals with analysis of surface integrity of steel after electro discharge machining (EDM), water jet machining, (WJM) laser beam machining (LBM) and plasma beam machining (PBM). The paper discusses surface integrity expressed in surface roughness, sample precision expressed in perpendicularity deviation as well as stress state. This study also demonstrates influence of the various non-conventional methods on structure transformations and reports about sensitivity of the different non-conventional methods of machining with regard to variable thickness of machined samples.

  5. Control of non-conventional synchronous motors

    CERN Document Server

    Louis, Jean-Paul

    2013-01-01

    Classical synchronous motors are the most effective device to drive industrial production systems and robots with precision and rapidity. However, numerous applications require efficient controls in non-conventional situations. Firstly, this is the case with synchronous motors supplied by thyristor line-commutated inverters, or with synchronous motors with faults on one or several phases. Secondly, many drive systems use non-conventional motors such as polyphase (more than three phases) synchronous motors, synchronous motors with double excitation, permanent magnet linear synchronous motors,

  6. 1985 CSEG/CGU National Convention

    Science.gov (United States)

    Peirce, John W.; Millington, Graham

    The Canadian Society of Exploration Geophysicists (CSEG) and the Canadian Geophysical Union (CGU) held their first joint national meeting in Calgary, Canada, May 7-10, 1985. As the CSEG represents primarily the oil exploration side of geophysics and the CGU represents mainly the academic side, both groups felt that a joint convention would broaden their perspectives. Some 1750 delegates and over 100 students registered for the meeting. The Convention Committee was chaired by Ian Baker (Atlantis Resources Ltd.), and CGU was represented by Peter Savage (Pan Canadian Petroleum Ltd.). The Technical Committee was chaired by John Peirce (Petro-Canada Inc.) for CGU and Graham Millington (Canadian Superior Oil Ltd.) for CSEG

  7. Economic Sociology and Economics of Convention

    DEFF Research Database (Denmark)

    Jagd, Søren

    as 1) the reformulation of the theory of action focusing on the uncertainty of social action; 2) pointing to the importance of collective frames of reference for individual rationality; and 3) the elaboration of a theory of institutions, focusing on the importance of conventions as forming...... the institutional framework of social action. Second, I explore two issues raised by economics of conventions that may be particularly important to consider for economic sociology. The first issue is the explicit exploration of the consequences of a plurality of forms of justification suggested by Luc Boltanski...

  8. Teaching the Conventions of Academic Discourse

    Science.gov (United States)

    Thonney, Teresa

    2011-01-01

    Given the current emphasis on disciplinary discourses, it's not surprising that so little recent attention has been devoted to identifying conventions that are universal in academic discourse. In this essay, the author argues that there are shared features that unite academic writing, and that by introducing these features to first-year students…

  9. Fracture healing: direct magnification versus conventional radiography

    Energy Technology Data Exchange (ETDEWEB)

    Link, T.M. [Dept. of Clinical Radiology, Westfaelische Wilhelms-Univ., Muenster (Germany); Kessler, T. [Dept. of Traumatic and Hand Surgery, Westfaelische Wilhelms-Univ., Muenster (Germany); Lange, T. [Dept. of Clinical Radiology, Westfaelische Wilhelms-Univ., Muenster (Germany); Overbeck, J. [Dept. of Traumatic and Hand Surgery, Westfaelische Wilhelms-Univ., Muenster (Germany); Fiebich, M. [Dept. of Clinical Radiology, Westfaelische Wilhelms-Univ., Muenster (Germany); Peters, P.E. [Dept. of Clinical Radiology, Westfaelische Wilhelms-Univ., Muenster (Germany)

    1994-08-01

    The aim of the study was to evaluate the potential of magnification radiography in diagnosing fracture healing and assessing its complications. Seventy-three patients with fractures or who had undergone osteotomy were radiographed with both conventional (non-magnified) and magnification (5-fold) techniques. Since 10 patients were radiographed twice and 1 three times, 83 radiographs using each technique were obtained. All radiographs were analysed and the findings correlated with the patients` follow-up studies. The microfocal X-ray unit used for magnification radiography had a focal spot size of 20-130 {mu}m. As an imaging system, digital luminescence radiography was employed with magnification, while normal film-screen systems were used with conventional radiography. Magnification radiography proved superior to conventional radiography in 47% of cases: endosteal and periosteal callus formations were seen earlier and better in 26 cases, and osseous union could be evaluated with greater certainty in 33 cases. In 49% of cases magnification radiography was equal and in 4% inferior to conventional radiography. Additionally an ``inter-observer analysis`` was carried out. Anatomical and pathological structures were classified into one of four grades. Results were significantly (P < 0.01) better using magnification radiography. We conclude that the magnification technique is a good method for monitoring fracture healing in its early stages. (orig.)

  10. Electric and Conventional Vehicle Driving Patterns

    DEFF Research Database (Denmark)

    Krogh, Benjamin Bjerre; Andersen, Ove; Torp, Kristian

    2014-01-01

    The electric vehicle (EV) is an interesting vehicle type that can reduce the dependence on fossil fuels, e.g., by using electricity from wind turbines. A significant disadvantage of EVs is a very limited range, typically less than 200 km. This paper compares EVs to conventional vehicles (CVs...

  11. Children's Impressions of Moral and Conventional Transgressors.

    Science.gov (United States)

    Smetana, Judith G.

    1985-01-01

    Two studies examined children's inferences of personality for actors engaging in different domains of behavior. In both studies, first, fourth, and seventh graders were given two descriptions of actors engaging in either moral or conventional transgressions. Findings indicated that children's concepts of persons were inferred from information…

  12. The Conventional and Unconventional about Disability Conventions: A Reflective Analysis of United Nations Convention on the Rights of Persons with Disabilities

    Science.gov (United States)

    Umeasiegbu, Veronica I.; Bishop, Malachy; Mpofu, Elias

    2013-01-01

    This article presents an analysis of the United Nations Convention on the Rights of Persons with Disabilities (CRPD) in relation to prior United Nations conventions on disability and U.S. disability policy law with a view to identifying the conventional and also the incremental advances of the CRPD. Previous United Nations conventions related to…

  13. QUESTIONING CONVENTIONS: ARE PRODUCT CONVENTIONS TRADING OFF THE USABILITY OF PRODUCTS FOR SHORT TERM USER SATISFACTION

    Directory of Open Access Journals (Sweden)

    Bryan Gough Young

    2015-12-01

    Full Text Available Mapping conventions are a key aspect of user centered design as they present users with familiar interactions in unfamiliar products. Conventions evolve over time and are slow to be adopted, requiring a high percentage of acceptance within a society, ensuring that conventions exhibit a sufficient level of usability. However this paper argues that while usability is a necessary condition for good interactions it is not a sufficient one. Therefore user centered design which accents individuals bias towards conventions my in fact be hindering the innovation of product interactions. This paper argues that a cognitive approach should be adopted in order understand and reassess product interactions. An experiment was carried out that demonstrates the influence that simple mappings can have on cognitive load. The results showed that basic mappings of the types that are found throughout product conventions can have a substantial impact on mental load and subsequently product interaction.

  14. Evaluation of Molecular Markers and Analytical Methods Documenting the Occurrence of Mustard Gas and Arsenical Warfare Agents in Soil.

    Science.gov (United States)

    Sassolini, Alessandro; Brinchi, Giampaolo; Di Gennaro, Antonio; Dionisi, Simone; Dominici, Carola; Fantozzi, Luca; Onofri, Giorgio; Piazza, Rosario; Guidotti, Maurizio

    2016-09-01

    The chemicals warfare agents (CWAs) are an extremely toxic class of molecules widely produced in many industrialized countries for decades, these compounds frequently contained arsenic. The plants where the CWAs have been produced or the plants where they have been demilitarized after the Second World War with unacceptable techniques can represent a serious environmental problem. CWAs standards are difficult to find on market so in present work an environmental assessment method based on markers has been proposed. Triphenylarsine, phenylarsine oxide and thiodiglycol have been selected as markers. Three reliable analytical methods based on gaschromatography and mass detection have been proposed and tested for quantitative analysis of markers. Methods performance have been evaluated testing uncertainty, linearity, recovery and detection limits and also comparing detection limits with exposure limits of reference CWAs. Proposed assessment methods have been applied to a case study of a former industrial plant sited in an area characterized by a high background of mineral arsenic.

  15. Wearable Atmospheric Pressure Plasma Fabrics Produced by Knitting Flexible Wire Electrodes for the Decontamination of Chemical Warfare Agents

    Science.gov (United States)

    Jung, Heesoo; Seo, Jin Ah; Choi, Seungki

    2017-01-01

    One of the key reasons for the limited use of atmospheric pressure plasma (APP) is its inability to treat non-flat, three-dimensional (3D) surface structures, such as electronic devices and the human body, because of the rigid electrode structure required. In this study, a new APP system design—wearable APP (WAPP)—that utilizes a knitting technique to assemble flexible co-axial wire electrodes into a large-area plasma fabric is presented. The WAPP device operates in ambient air with a fully enclosed power electrode and grounded outer electrode. The plasma fabric is flexible and lightweight, and it can be scaled up for larger areas, making it attractive for wearable APP applications. Here, we report the various plasma properties of the WAPP device and successful test results showing the decontamination of toxic chemical warfare agents, namely, mustard (HD), soman (GD), and nerve (VX) agents.

  16. NATO Advanced Research Workshop on Fluorescence and other Optical Properties of Biological Particles for Biological Warfare Agent Sensors

    CERN Document Server

    Hoekstra, Alfons; Videen, Gorden; Optics of Biological Particles

    2007-01-01

    This book covers the optics of single biological particles, both theory and experiment, with emphasis on Elastic Light Scattering and Fluorescence. It deals with the optics of bacteria (bio-aerosols), marine particles (selected phytoplankton communities) and red and white blood cells. Moreover, there are dedicated chapters on a general theory for scattering by a cell, and modelling and simulation of scattering by inhomogeneous biological cells. Finally, one chapter is dedicated to astro-biological signatures, discussing the possibilities for detecting non-terrestrial biological material. The volume has up-to-date discussions on new experimental and numerical techniques, and many examples of applications of these techniques in real-life systems, as used to detect and characterize e.g. biological warfare agents or human blood cells.

  17. Dual-Function Metal-Organic Framework as a Versatile Catalyst for Detoxifying Chemical Warfare Agent Simulants.

    Science.gov (United States)

    Liu, Yangyang; Moon, Su-Young; Hupp, Joseph T; Farha, Omar K

    2015-12-22

    The nanocrystals of a porphyrin-based zirconium(IV) metal-organic framework (MOF) are used as a dual-function catalyst for the simultaneous detoxification of two chemical warfare agent simulants at room temperature. Simulants of nerve agent (such as GD, VX) and mustard gas, dimethyl 4-nitrophenyl phosphate and 2-chloroethyl ethyl sulfide, have been hydrolyzed and oxidized, respectively, to nontoxic products via a pair of pathways catalyzed by the same MOF. Phosphotriesterase-like activity of the Zr6-containing node combined with photoactivity of the porphyrin linker gives rise to a versatile MOF catalyst. In addition, bringing the MOF crystals down to the nanoregime leads to acceleration of the catalysis.

  18. Capillary zone electrophoresis analysis and detection of mid-spectrum biological warfare agents. Suffield memorandum No. 1463

    Energy Technology Data Exchange (ETDEWEB)

    Boulet, C.A.

    1995-12-31

    Mid-spectrum biological warfare agents such as proteins, peptides, and toxins are often difficult to analyze and often require individually developed assay methods for detection and identification. In this regard, capillary electrophoresis is an important, emerging technique for separation and quantitation of peptides and proteins, providing separation efficiencies up to two orders of magnitude greater than high performance liquid chromatography. The technique can also analyze a broad range of compounds, has a simple instrument design which can be automated, and has low sample volume requirements. In this study, a highly efficient and reproducible capillary zone electrophoresis method was developed to separate and identify a series of nine peptides of defense interest including bradykinin, leucine enkephalin, and oxytocin. The paper demonstrates three strategies which could be used in a fully automated field detection and identification system for unknown peptides.

  19. Biological warfare warriors, secrecy and pure science in the Cold War: how to understand dialogue and the classifications of science.

    Science.gov (United States)

    Bud, Robert

    2014-01-01

    This paper uses a case study from the Cold War to reflect on the meaning at the time of the term 'Pure Science'. In 1961, four senior scientists from Britain's biological warfare centre at Porton Down visited Moscow both attending an International Congress and visiting Russian microbiological and biochemical laboratories. The reports of the British scientists in talking about a limited range of topics encountered in the Soviet Union expressed qualities of openness, sociologists of the time associated with pure science. The paper reflects on the discourses of "Pure Science", secrecy and security in the Cold War. Using Bakhtin's approach, I suggest the cordial communication between scientists from opposing sides can be seen in terms of the performance, or speaking, of one language among several at their disposal. Pure science was the language they were allowed to share outside their institutions, and indeed political blocs.

  20. PSYCHOLOGICAL PROBLEMS AND STRESS FACED BY SOLDIERS WHO OPERATE IN ASYMMETRIC WARFARE ENVIRONMENTS: EXPERIENCES IN THE FIELD

    Directory of Open Access Journals (Sweden)

    Giuseppe CAFORIO

    2014-10-01

    Full Text Available This article deals with the problems of anxiety, stress and psychological discomfort that can affect soldiers sent on asymmetric warfare operations. It is based on secondary analysis of the data of two important field researches whose results have recently (2013 been published. Although the two researches adopted different methodologies, the testimonies are fully comparable and show that soldiers from different countries and cultures display common or similar reactions when they are placed in the stress conditions that the asymmetric environment involves. The approach of the paper is drawn up in such a way as to make the reader a participating observer of the reality of such missions. It is therefore centered on the personal testimonies of the soldiers interviewed in the two researches, testimonies reported just as they are, in their simplicity and, often, drama, with comments by the author kept to a minimum in order to give readers ample opportunity to evaluate and interpret the reported texts on their own. The research data, drawn from the declarations of those directly concerned, reveal the existence of a problem of psychological distress resulting from deployment in asymmetric warfare situations that is in part different in the causes of the problems resulting from deployment in traditional combat and affects percentages of participating soldiers that are not high but definitely significant. The highest incidence appears to be constituted by problems relating to reintegration into normal social and working life upon returning from the mission. This is followed in percentage terms by anxiety situations relating to life far from the family, due in large part to a sense of powerlessness for the scant possibility of managing family situations that may have cropped up or already existed beforehand.

  1. 网络电磁空间作战威胁分析%Analysis of Cyber Electromagnetic Space Warfare Threat

    Institute of Scientific and Technical Information of China (English)

    栾胜利

    2014-01-01

    提出了网电空间作战几个需要关注的问题以及解决方案,使得部队可以根据战场具体环境,进行适应性的应用。首先陈述了网电空间作战的特点,接着阐述了在网电空间中军队所要面临、应对的现实威胁。然后针对这些威胁进行了进一步分析,并且确定了战场环境下所需要的基础安全条件。最后从四个层面阐述了网电空间的脆弱性,同时给出了防御措施。该工作可以对确立可实施的网电空间战术以及有效地组织网电空间行动形成支撑。%A cyber warfare scenario is shown ,which is applicable on the basis of modern battlefield situations .The sce-nario removes misconceptions about present cyber warfare properties and defines actual dangers that should be prepared for in the background of the cyberspace .The dangers are analyzed further and the basic security prerequisites are determined . Technologies are proposed that offer the basic necessary for achieving these prerequisites .An organization of cyberspace weaknesses and the correlative defenses in four levels is shown .Conclusions are drawn that demonstrate the manner in which cyber threats should be determined ,their likelihood assessed and averted .This knowledge leads to the determination of im-plementable cyber tactics and effective organization of cyber operations .

  2. Strategies for the prevention of a successful biological warfare aerosol attack.

    Science.gov (United States)

    Wiener, S L

    1996-05-01

    Biological warfare (BW) aerosol attacks are different from chemical attacks in that they may provide no warning/all clear signals that allow the soldier to put on or remove his M17/M40 protective mask. Methods are now being perfected to detect a BW aerosol cloud using an airborne (helicopter) pulsed laser system to scan the lower altitudes upwind from a troop concentration of corps size, and to sample and analyze the nature of the aerosol within a brief time interval. This system has certain limitations and vulnerabilities, since it is designed specifically to detect a line-type aerosol attack. Provision of, training with, and field use of a lightweight dust mist or HEPA filter respirator for each soldier is proposed for protection against undetected aerosol attacks. This particulate filter respirator would be issued in addition to the M17/M40 mask. Such a BW respirator will be able to purify the soldier's air by removing particles in the 0.3- to 15-micro m-diameter range with an efficiency of 98 to 100%. Particle size of BW aerosols is in the same range, with an optimum size for high-efficiency casualty production of 1 to 5 micro m mass median diameter. The proposed BW respirator will be lightweight; will require low inhalation pressures; will be comfortable to wear for prolonged periods; will not interfere with vision, hearing, and communication; and will not degrade overall effectiveness and performance to the degree observed with the M17/M40 masks. Such respirators would be worn as part of a contingency defense against an enemy likely to use BW agents. This respirator could be worn for prolonged periods when under threat of an undetectable BW attack during weather conditions favorable to the success of such an attack (i.e., low wind velocity and temperature inversion in the target area). In addition, tactically important assets such as command and control centers and missile batteries can also be protected continuously by air filtration systems powered by

  3. Merging conventional and laser wakefield accelerators

    Energy Technology Data Exchange (ETDEWEB)

    Zeitler, Benno; Schnepp, Matthias; Gehrke, Tim; Gruener, Florian [Hamburg Univ. (Germany); Center for Free-Electron Laser Science (Germany); Grebenyuk, Julia; Mehrling, Timon; Osterhoff, Jens [Hamburg Univ. (Germany); Floettmann, Klaus [Deutsches Elektronen-Synchrotron (DESY) (Germany)

    2013-07-01

    Laser wakefield accelerators deliver high quality electron beams in terms of emittance and bunch length. However there are also parameters which cannot compete with conventional machines, namely spectral width and shot to shot stability. One reason for that is that there is no direct access to the injection mechanism. Injecting a well-characterized electron beam produced by a conventional accelerator into a plasma wakefield could help to solve that problem, since such a pump-probe type experiment should allow for a direct reconstruction of the field distribution and a better understanding of the injection process. REGAE at DESY in Hamburg is a suited accelerator for such a type of experiment. We report on the status of the beamline extension at REGAE and the plans towards the external injection project with the goal to directly measure the wakefield and further improve the stability of laser wakefield accelerators.

  4. "Conventional" CT images from spectral measurements

    Science.gov (United States)

    Rajbhandary, Paurakh L.; Pelc, Norbert J.

    2016-03-01

    Spectral imaging systems need to be able to produce "conventional" images, and it's been shown that systems with energy discriminating detectors can achieve higher CNR than conventional systems by optimal weighting. Combining measured data in energy bins (EBs) and also combining basis material images have previously been proposed, but there are no studies systematically comparing the two methods. In this paper, we analytically evaluate the two methods for systems with ideal photon counting detectors using CNR and beam hardening (BH) artifact as metrics. For a 120-kVp polychromatic simulations of a water phantom with low contrast inserts, the difference of the optimal CNR between the two methods for the studied phantom is within 2%. For a polychromatic spectrum, beam-hardening artifacts are noticeable in EB weighted images (BH artifact of 3.8% for 8 EB and 6.9% for 2 EB), while weighted basis material images are free of such artifacts.

  5. Non-conventional mesons at PANDA

    Science.gov (United States)

    Giacosa, Francesco

    2015-04-01

    Non-conventional mesons, such as glueballs and tetraquarks, will be in the focus of the PANDA experiment at the FAIR facility. In this lecture we recall the basic properties of QCD and describe some features of unconventional states. We focus on the search of the not-yet discovered glueballs and the use of the extended Linear Sigma Model for this purpose, and on the already discovered but not-yet understood X, Y, Z states.

  6. Non conventional engines; Moteurs non conventionnels

    Energy Technology Data Exchange (ETDEWEB)

    Descombes, G. [Conservatoire National des Arts et Metiers (CNAM), 75 - Paris (France)]|[Paris-6 Univ. Pierre-et-Marie-Curie, 75 (France). Laboratoire de mecanique physique; Magnet, J.L. [SEMT Pielstick, 93 - Saint Denis (France)]|[Conservatoire National des Arts et Metiers (CNAM), 75 - Paris (France)

    1998-07-01

    The extraordinary realizations of the last century in words of piston engines, are always current events at the dawn of 2000. This paper deals with three types of non conventional engines: the reciprocating internal combustion engines (opposed piston engines, oscillating piston engines, variable geometry piston engines...); the internal combustion rotary engines(Wankel engine, blade engines...) and external combustion reciprocating engines (historical aspects, conception, thermodynamics and market). (A.L.B.)

  7. Dying Convention of Sanctuary for the Soul

    Institute of Scientific and Technical Information of China (English)

    HUXIAOPING

    2004-01-01

    MEN of the Yi ethnic group living in the Liangshan Mountains of Sichuan Province have for the past 2,000 years followed the convention of wearing their hair as long as it will grow. According to legend, the custom originates in the epic hero Etilaba who prevailed over an evil celestial being by letting loose his long hair and letting it stream through the air, puzzling and confusing his enemy.

  8. Non-Conventional Treatment Approaches in Pemphigus

    Directory of Open Access Journals (Sweden)

    Mutlu Çayırlı

    2013-09-01

    Full Text Available Pemphigus is a bullous auto-immune disease which has high mortality and morbidity rates and affects the skin and mucosa. Corticosteroids are still the baseline treatment modality of pemphigus management. However, non-steroidal drugs and methods have been used more frequently in patients with pemphigus who are non-responders to conventional therapy or have severe side effects. In this article we aimed to review unconventional therapy modalities in patients with pemphigus.

  9. Conventional Weapons Effects on Reinforced Soil Walls.

    Science.gov (United States)

    1995-03-01

    of the reinforced soil wall. 14. SUBJECT TERMS 15. NUMBER OF PAGES Reinforced soil, conventional weapons, protective structures, 388 geosynthetics ...high tensile strength materials such as steel strips or geosynthetics . A single face of a reinforced soil berm can be constructed to approximately...yards of geosynthetics representing $3.1 billion have been used in a wide range of civil engineering applications (Koerner, 1990). Between 1991 and 1992

  10. Archaeoastronomical Heritage and the World Heritage Convention

    Science.gov (United States)

    Cotte, Michel

    In 2009, the International Astronomical Union (IAU) and the International Council on Monuments and Sites (ICOMOS) began a joint thematic study on astronomical heritage. The initial question was, "What are the best ways to support and encourage the inscription of the most outstanding examples of astronomical heritage onto a globally balanced World Heritage List?" That led us first to a large overview across ages and countries, because every civilization had a relationship with the sky. The result is far beyond what was anticipated, showing a richness and diversity of heritage, both for various civilizations around the world and throughout human history, especially for the proto-historical period and indigenous practices of observing the sky. This chapter also reviews the World Heritage Convention, its goals, evaluation tools, and trends. A strategy must be created for a credible dossier in the UNESCO-recommended format, with proper identification of "outstanding universal value" (OUV) as a key point for the World Heritage listing. To assist in reaching such ambitious goals, this chapter examines the layout of the convention related to astronomical and archaeoastronomical heritage, though the main requirements need to be recognized. A methodology is proposed for site analysis by examples and practices of the World Heritage Convention, with a description of its origins, favorite subjects, and recent evolutions. Pure astronomical heritage is rare on the World Heritage List, but astronomy is frequently present as an associated value for complex sites and as a specific attribute that increases a global sense of the heritage.

  11. PUBLIC POLICY VIOLATION UNDER NEW YORK CONVENTION

    Directory of Open Access Journals (Sweden)

    Michelle Ayu Chinta Kristy

    2013-04-01

    Full Text Available The increasing number of the use of arbitration in Asia has highlighted the significant influence of the recognition and enforcement of arbitral awards. The New York Convention currently becomes the most widely accepted convention to which the courts would refer when recognizing and enforcing foreign arbitral awards. This article would firstly provide a comparative study of the court’s interpretation towards public policy as mentioned under Article V (2 b of the New York Convention between non-arbitration-friendly-law Indonesia and arbitration-friendly-law China. Subsequently, it will discuss whether uniformity in interpreting and reserving public policy is required or not. Peningkatan jumlah penggunaan lembaga arbitrasi di Asia mendorong peningkatan signifikansi pengakuan dan pelaksanaan putusan arbitrasi asing. Konvensi New York saat ini menjadi konvensi yang diterima secara luas dimana dijadikan referensi oleh pengadilan dalam hal pengakuan dan pelaksanaan putusan arbitrasi asing. Artikel ini akan pertama-tama membahas studi perbandingan atas interpretasi pengadilan mengenai penggunaan kebijakan publik sebagaimana tertera pada Pasal V (2 b Konvensi New York antara Indonesia yang hukumnya tidak mendukung dan China dengan hukum yang mendukung pengakuan dan pelaksanaan putusan arbitrasi asing. Apakah keseragaman antar negara dalam menginterpretasi dan menggunakan kebijakan publik diperlukan atau tidak dibahas pada diskusi selanjutnya.

  12. Einstein Synchronisation and the Conventionality of Simultaneity

    Directory of Open Access Journals (Sweden)

    Mladen Domazet

    2006-06-01

    Full Text Available Despite a broad-range title the paper settles for the related issue of whether the Special Theory of Relativity (STR necessarily advocates the demise of an ontological difference between past and future events, between past and future in general. In the jargon of H. Stein: are we forced, within the framework of the STR, to choose only between ‘solipsism’ and ‘determinism’ exclusively? A special emphasis is placed on the role that the conventionality of simultaneity plays in the STR with regards to this question. The standard arguments rely on the relativity of simultaneity, the claim that the STR negates the existence of a universal ‘present’ that divides the ‘past’ and the ‘future’, so as to conclude that there is no ontological difference between past and future events, that both are equally determined/real (‘determinism’. This often neglects the fact that to establish the ontological claims related to relativity of simultaneity, one must first resolve the issues of conventionality of simultaneity within the STR. The paper will aim to show that by addressing the issue of conventionality from Dummett’s ‘purely philosophical’ determination of the difference between the past and the future, we develop an understanding of the said difference, within the framework of the STR, beyond the (unwanted strict ontological dichotomy of ‘solipsism/determinism’, given that the criterion that is provided by the STR is understood as epistemic and not ontological.

  13. Communicating novel and conventional scientific metaphors

    DEFF Research Database (Denmark)

    Knudsen, Sanne

    2005-01-01

    Metaphors are more popular than ever in the study of scientific reasoning and culture because of their innovative and generative powers. It is assumed, that novel scientific metaphors become more clear and well-defined, as they become more established and conventional within the relevant discours...... changes too during the career of the metaphor. Whereas the standard scientific article is central in experimentally researching and explaining the metaphor, a mixture of more popular scientific genres dominate in the innovative conceptual development of the metaphor.......Metaphors are more popular than ever in the study of scientific reasoning and culture because of their innovative and generative powers. It is assumed, that novel scientific metaphors become more clear and well-defined, as they become more established and conventional within the relevant discourses....... But we still need empirical studies of the career of metaphors in scientific discourse and of the communicative strategies identifying a given metaphor as either novel or conventional. This paper presents a case study of the discursive development of the metaphor of "the genetic code" from...

  14. Measures to implement the Chemical Weapons Convention

    Energy Technology Data Exchange (ETDEWEB)

    Tanzman, E.; Kellman, B.

    1999-11-05

    This seminar is another excellent opportunity for those involved in preventing chemical weapons production and use to learn from each other about how the Chemical Weapons Convention (CWC) can become a foundation of arms control in Africa and around the world. The author is grateful to the staff of the Organization for the Prohibition of Chemical Weapons (OPCW) for inviting him to address this distinguished seminar. The views expressed in this paper are those of the authors alone, and do not represent the position of the government of the US nor or of any other institution. In 1993, as the process of CWC ratification was beginning, concerns arose that the complexity of integrating the treaty with national law would cause each nation to implement the Convention without regard to what other nations were doing, thereby causing inconsistencies among States Parties in how the Convention would be carried out. As a result the Manual for National Implementation of the Chemical Weapons Convention was prepared and presented it to each national delegation at the December 1993 meeting of the Preparatory Commission in The Hague. During its preparation, the Manual was reviewed by the Committee of Legal Experts on National Implementation of the Chemical Weapons Convention, a group of distinguished international jurists, law professors, legally-trained diplomats, government officials, and Parliamentarians from every region of the world, including Mica. In February 1998, the second edition of the Manual was published in order to update it in light of developments since the CWC entered into force on 29 April 1997. The second edition 1998 clarified the national implementation options to reflect post-entry-into-force thinking, added extensive references to national implementing measures that had been enacted by various States Parties, and included a prototype national implementing statute developed by the authors to provide a starting point for those whose national implementing

  15. Measures to implement the Chemical Weapons Convention

    Energy Technology Data Exchange (ETDEWEB)

    Tanzman, E.; Kellman, B.

    1999-11-05

    This seminar is another excellent opportunity for those involved in preventing chemical weapons production and use to learn from each other about how the Chemical Weapons Convention (CWC) can become a foundation of arms control in Africa and around the world. The author is grateful to the staff of the Organization for the Prohibition of Chemical Weapons (OPCW) for inviting him to address this distinguished seminar. The views expressed in this paper are those of the authors alone, and do not represent the position of the government of the US nor or of any other institution. In 1993, as the process of CWC ratification was beginning, concerns arose that the complexity of integrating the treaty with national law would cause each nation to implement the Convention without regard to what other nations were doing, thereby causing inconsistencies among States Parties in how the Convention would be carried out. As a result the Manual for National Implementation of the Chemical Weapons Convention was prepared and presented it to each national delegation at the December 1993 meeting of the Preparatory Commission in The Hague. During its preparation, the Manual was reviewed by the Committee of Legal Experts on National Implementation of the Chemical Weapons Convention, a group of distinguished international jurists, law professors, legally-trained diplomats, government officials, and Parliamentarians from every region of the world, including Mica. In February 1998, the second edition of the Manual was published in order to update it in light of developments since the CWC entered into force on 29 April 1997. The second edition 1998 clarified the national implementation options to reflect post-entry-into-force thinking, added extensive references to national implementing measures that had been enacted by various States Parties, and included a prototype national implementing statute developed by the authors to provide a starting point for those whose national implementing

  16. EVALUATION OF PHYTOCHEMICAL CONSTITUENT IN CONVENTIONAL AND NON CONVENTIONAL SPECIES OF CURCUMA

    OpenAIRE

    Saxena Jyoti; Sahu Rajeshwari

    2012-01-01

    Plants and plant based medicaments are the basis of many of the modern pharmaceutical we use today for our various aliment. Plant show medicinal properties as it contain phytochemical constituent. Phytochemical constituent are non nutritive plant chemical that have disease preventive properties .This paper reports an investigation of phytochemical constituent present in the Methanolic crude rhizome extract of conventional and non conventional Curcuma species i.e Curcuma caecia , Curcuma amad...

  17. Effects of CW (chemical warfare)-related chemicals on social behavior and performance. Annual report, 30 September 1984-29 September 1985

    Energy Technology Data Exchange (ETDEWEB)

    Bunnell, B.N.; Iturrian, W.B.

    1985-10-01

    This report summarizes work accomplished in the second year of a three-year project aimed at developing a battery of tests of social behavior and performance that wil be sensitive to the effects of chemical warfare-related chemicals considered for use as antidotes or prophylactics against chemical-warfare agents. Procedures for assessing social behavior in nonhuman primates are described and compared. Performance scores on three operant schedules, a test of complex problem solving, and behavior in a novel environment are presented and correlations between the social and performance variables are examined. The effects of atropines on several of the social and performance measures are reported as are data from plasma hormone assays for cortisol and prolactin.

  18. Irregular Warfare as a National Military Strategy Approach for Small States

    Science.gov (United States)

    2013-12-01

    those weapons . . . were mostly tough, hardy frontiersmen who had been riding and shooting since childhood .”199 Principle: Use available weapon...concept available to us: “in conventional war there are a few major arteries feeding sustenance to two opposing fronts; in NLDOs there 75 is a... middle of complicated conflicts outside their borders. From the perspective of international commitments, the conflicts in the last decades in

  19. Ka Pu Te Ruha, Ka Hao Te Rangatahi: Changes in Maori Warfare between the Period Prior to First European Contact and the End of the New Zealand Wars

    Science.gov (United States)

    2009-06-12

    these weapons before. During the assault of a pa in Taranaki, the Nga Puhi used their limited muskets to defeat the will of the opposition . Upon seeing...Maori warfare. As contact between Maori and European developed, the variety of goods demanded for weapons expanded. Preserved tattooed heads and female... sex slaves joined introduced items such as pigs and potatoes as suitable currency. Slaves were previously only taken as revenge or to deliberately

  20. Introduction: Envisioning Future War; Strategic Insights, v. 10, Special issue (October 2011), 1-6. Topic: Global Trends and Future Warfare

    OpenAIRE

    Moran, Daniel

    2011-01-01

    This article appeared in Strategic Insights, v.10, Special issue (October 2011), 1-6. Topic: Global Trends and Future Warfare Approved for public display, distribution unlimited The workshop whose proceedings are presented here was convened to provide the National Intelligence Council (NIC) with insight into the way war in the intermediate future, meaning the next twenty years or so, is viewed from the perspective of America's allies, partners, and potential adversaries. The group took ...

  1. Colloque S&T Symposium 2008: Understanding the Human Dimension in 21st Century Conflict/Warfare: The Complexities of Human-with-Human Relationships

    Science.gov (United States)

    2008-08-01

    Colloque S&T Symposium 2008 Undestanding the Human Dimension in 21st Century Conflict/Warfare: The Complexities of Human-with-Human Relationships ...conditions for self-sustaining stability. By working towards the development of models and concepts to better understand and influence the human in...This page intentionally left blank. Colloque S&T Symposium 2008 Undestanding the Human Dimension in 21st Century Conflict

  2. Toxin warfare agents:recognition molecules and drugs for control%生物毒素战剂:检测识别分子与防治药物

    Institute of Scientific and Technical Information of China (English)

    王景林

    2011-01-01

    There are various types of toxins in nature. However, these toxins. which are characterized by the ready availability, easy production and high toxicity, are likely biological warfare agents. Toxin warfare agents are different from traditional bacterial and viral agents or from chemical warfare agents in that they pose a great threat because of their diverse potency and the lack of efficacious drugs. Therefore, it is quite important to develop specific. sensitive recognition molecules for detection of toxins and drugs against intoxication caused by toxin agents. This review focuses on advances in recognition molecules of toxins and some drugs used as prevention and treatment hased on the characteristics of toxin warfare agents .%自然界中存在着种类繁多的毒素物质,但最有可能用作战剂的是那些获取方便、制备容易、毒性强、施放后可致人死亡或失能的毒素.毒素战剂既不同于传统的细菌、病毒战剂,也不同于化学毒剂,其最大的威胁来自它的高毒性及缺乏有效的治疗手段.因此,发展毒素战剂的检测识别分子与防治药物就显得尤为重要.本文讨论了生物毒素战剂相关概念、特征,重点综述了毒素战剂的检测识别分子与防治药物研究进展.

  3. How Do I Know? A Guide to the Selection of Personal Protective Equipment for Use in Responding to A Release of Chemical Warfare Agents

    Energy Technology Data Exchange (ETDEWEB)

    Foust, C.B.

    1999-05-01

    An incident involving chemical warfare agents requires a unique hazardous materials (HAZMAT) response. As with an HAZMAT event, federal regulations prescribe that responders must be protected from exposure to the chemical agents. But unlike other HAZMAT events, special considerations govern selection of personal protective equipment (PPE). PPE includes all clothing, respirators and monitoring devices used to respond to a chemical release. PPE can differ depending on whether responders are military or civilian personnel.

  4. The sustainability transition. Beyond conventional development

    Energy Technology Data Exchange (ETDEWEB)

    Raskin, P.; Chadwick, M.; Jackson, T.; Leach, G.

    1996-10-01

    This paper synthesizes findings of the first phase in SEI`s PoleStar Project - a project aimed at developing long-term strategies and policies for sustainable development. Taking a global and long-range perspective, the paper aims to describe a theoretical framework for addressing sustainability, to identify emerging issues and outline directions for future action. The paper begins by setting today`s development and environmental challenges in historical context, and describing the scenario method for envisioning and evaluating alternative futures, and identifying propitious areas for policy and action. It next summarizes a detailed scenario based on conventional development assumptions, and discusses the implications of this scenario for demographic and economic patterns, energy and water resources, land resources and agriculture, and pollution loads and the environment to the year 2050. The conventional scenario relies in part on the sectorally-oriented work discussed in Papers 3 through 6 of the PoleStar Project report series, and makes use of the PoleStar System, software designed for integrated resource, environment and socio-economic accounting and scenario analysis (described in Paper 2). The paper then examines the critical risks to social, resource and environmental systems lying ahead on the conventional development path. Finally, the paper surveys the requirements for sustainability across a number of policy dimensions, and raises key questions for the future. The PoleStar Project is proceeding to examine a range of alternative development scenarios, in the context of the work of the regionally-diverse Global Scenario Group, convened by SEI. The hope remains to offer wise counsel for a transition to an equitable, humane and sustainable future for the global community. 144 refs, 30 figs, 9 tabs

  5. Standardizing Naming Conventions in Radiation Oncology

    Energy Technology Data Exchange (ETDEWEB)

    Santanam, Lakshmi [Department of Radiation Oncology, Washington University School of Medicine, St. Louis, MO (United States); Hurkmans, Coen [Department of Radiation Oncology, Catharina Hospital, Eindhoven (Netherlands); Mutic, Sasa [Department of Radiation Oncology, Washington University School of Medicine, St. Louis, MO (United States); Vliet-Vroegindeweij, Corine van [Department of Radiation Oncology, Thomas Jefferson University Hospital, Philadelphia, PA (United States); Brame, Scott; Straube, William [Department of Radiation Oncology, Washington University School of Medicine, St. Louis, MO (United States); Galvin, James [Department of Radiation Oncology, Thomas Jefferson University Hospital, Philadelphia, PA (United States); Tripuraneni, Prabhakar [Department of Radiation Oncology, Scripps Clinic, LaJolla, CA (United States); Michalski, Jeff [Department of Radiation Oncology, Washington University School of Medicine, St. Louis, MO (United States); Bosch, Walter, E-mail: wbosch@radonc.wustl.edu [Department of Radiation Oncology, Washington University School of Medicine, St. Louis, MO (United States); Advanced Technology Consortium, Image-guided Therapy QA Center, St. Louis, MO (United States)

    2012-07-15

    Purpose: The aim of this study was to report on the development of a standardized target and organ-at-risk naming convention for use in radiation therapy and to present the nomenclature for structure naming for interinstitutional data sharing, clinical trial repositories, integrated multi-institutional collaborative databases, and quality control centers. This taxonomy should also enable improved plan benchmarking between clinical institutions and vendors and facilitation of automated treatment plan quality control. Materials and Methods: The Advanced Technology Consortium, Washington University in St. Louis, Radiation Therapy Oncology Group, Dutch Radiation Oncology Society, and the Clinical Trials RT QA Harmonization Group collaborated in creating this new naming convention. The International Commission on Radiation Units and Measurements guidelines have been used to create standardized nomenclature for target volumes (clinical target volume, internal target volume, planning target volume, etc.), organs at risk, and planning organ-at-risk volumes in radiation therapy. The nomenclature also includes rules for specifying laterality and margins for various structures. The naming rules distinguish tumor and nodal planning target volumes, with correspondence to their respective tumor/nodal clinical target volumes. It also provides rules for basic structure naming, as well as an option for more detailed names. Names of nonstandard structures used mainly for plan optimization or evaluation (rings, islands of dose avoidance, islands where additional dose is needed [dose painting]) are identified separately. Results: In addition to its use in 16 ongoing Radiation Therapy Oncology Group advanced technology clinical trial protocols and several new European Organization for Research and Treatment of Cancer protocols, a pilot version of this naming convention has been evaluated using patient data sets with varying treatment sites. All structures in these data sets were

  6. 9th Structural Engineering Convention 2014

    CERN Document Server

    2015-01-01

    The book presents research papers presented by academicians, researchers, and practicing structural engineers from India and abroad in the recently held Structural Engineering Convention (SEC) 2014 at Indian Institute of Technology Delhi during 22 – 24 December 2014. The book is divided into three volumes and encompasses multidisciplinary areas within structural engineering, such as earthquake engineering and structural dynamics, structural mechanics, finite element methods, structural vibration control, advanced cementitious and composite materials, bridge engineering, and soil-structure interaction. Advances in Structural Engineering is a useful reference material for structural engineering fraternity including undergraduate and postgraduate students, academicians, researchers and practicing engineers.

  7. Simulating a guitar with a conventional sonometer

    CERN Document Server

    Burstein, Zily; Varieschi, Gabriele U

    2011-01-01

    Musical acoustics is an interesting sub-field of physics which is usually able to engage students in a dual perspective, by combining science and art together. The physics principles involved in most musical instruments can be easily demonstrated with standard laboratory equipment and can become part of lecture or lab activities. In particular, we will show in this paper how to simulate a guitar using a conventional sonometer, in relation to the problem of the instrument intonation, i.e., how to obtain correctly tuned notes on a guitar or similar string instruments.

  8. Simulating a Guitar with a Conventional Sonometer

    Science.gov (United States)

    Burstein, Zily; Gower, Christina M.; Varieschi, Gabriele U.

    Musical acoustics is an interesting sub-field of physics which is usually able to engage students in a dual perspective, by combining science and art together. The physics principles involved in most musical instruments can be easily demonstrated with standard laboratory equipment and can become part of lecture or lab activities. In particular, we will show in this paper how to simulate a guitar using a conventional sonometer, in relation to the problem of the instrument intonation, i.e., how to obtain correctly tuned notes on a guitar or similar string instruments.

  9. National Convention on Family Life Education.

    Science.gov (United States)

    1973-12-01

    This secretarial report gives brief comments on some discussion of topics at the National Convention on Family Life Education. Discussion included: 1) legalized prostitution as a means to reduce venereal disease; 2) family life education promotion by government and civic groups; 3) more authority for the Population Council; 4) more liberal abortion legislation than previously; 5) statutory notification of veneral disease by medical practitioners; 6) compensatory measures for working women with young children, and 7) the need for modernization of legislation pertaining to child health, adoption, paternity, the Persons Act, infant life preservation, drugs, age of consent, and the age of minority.

  10. Direct quantification of chemical warfare agents and related compounds at low ppt levels: comparing active capillary dielectric barrier discharge plasma ionization and secondary electrospray ionization mass spectrometry.

    Science.gov (United States)

    Wolf, Jan-Christoph; Schaer, Martin; Siegenthaler, Peter; Zenobi, Renato

    2015-01-06

    A novel active capillary dielectric barrier discharge plasma ionization (DBDI) technique for mass spectrometry is applied to the direct detection of 13 chemical warfare related compounds, including sarin, and compared to secondary electrospray ionization (SESI) in terms of selectivity and sensitivity. The investigated compounds include an intact chemical warfare agent and structurally related molecules, hydrolysis products and/or precursors of highly toxic nerve agents (G-series, V-series, and "new" nerve agents), and blistering and incapacitating warfare agents. Well-defined analyte gas phase concentrations were generated by a pressure-assisted nanospray with consecutive thermal evaporation and dilution. Identification was achieved by selected reaction monitoring (SRM). The most abundant fragment ion intensity of each compound was used for quantification. For DBDI and SESI, absolute gas phase detection limits in the low ppt range (in MS/MS mode) were achieved for all compounds investigated. Although the sensitivity of both methods was comparable, the active capillary DBDI sensitivity was found to be dependent on the applied AC voltage, thus enabling direct tuning of the sensitivity and the in-source fragmentation, which may become a key feature in terms of field applicability. Our findings underline the applicability of DBDI and SESI for the direct, sensitive detection and quantification of several CWA types and their degradation products. Furthermore, they suggest the use of DBDI in combination with hand-held instruments for CWAs on-site monitoring.

  11. Acoustic Warfare of Submarine and Its Development Tendency%潜艇水声对抗及其发展趋势

    Institute of Scientific and Technical Information of China (English)

    李峰; 单广超; 李晖

    2014-01-01

    The acoustic warfare of submarine,that can effectively improve the ability to survive in the com-bat of submarine,is the main content of submarine active defense operations.With the development of an-ti-sub equipment and technology,the acoustic countermeasure equipment will truly have the ability of un-derwater acoustic warfare.The paper analyses the type of modern acoustic warfare operation and mainly studies the type of the acoustic countermeasure equipment of operation in the future.%潜艇水声对抗是潜艇积极防御作战的主要内容,实施水声对抗能够有效提高潜艇在作战中的生存能力。根据反潜装备和技术的发展,分析了现代潜艇水声对抗作战样式,并重点对未来潜艇水声对抗装备作战样式的发展趋势进行了研究。

  12. 大数据在现代战争中的价值探析%Research on the Big Data’s Value in Modern Warfare

    Institute of Scientific and Technical Information of China (English)

    李新乐

    2014-01-01

    Modern warfare is information-dominated. Information penetrates the all aspects of the warfare and becomes one of the key factors which influence the success of the warfare. Effective acquisition, storage, processing and distribution of military in-formation via big data technology can promote the ability of intelligence acquisition and command decision-making, handle the choke point of information flow, advance the integration of operational system, and strengthen the information security and pro-tection.%现代战争是“信息主导”的战争,信息渗透到战争的方方面面,成为影响战争胜负的重要因素之一,利用大数据技术对军事信息进行高效获取、存储、处理和分发,能够有效提升情报获取、指挥决策能力,疏通信息流瓶颈,推进作战体系融合,增强信息安全防护能力。

  13. Implementation of the Aarhus convention - A survey

    Directory of Open Access Journals (Sweden)

    Marina Malis Sazdovska

    2016-11-01

    Full Text Available Legislation on global and regional level in the field of environmental protection is characterized by the adoption of international conventions and agreements that attempt to regulate this matter legally. As an extremely important area, which exceeds the boundaries of nation-state and as a global environmental problem, the issues of environmental protection are a major concern to international organizations. It is directly linked to reducing the jurisdiction of the States and transfer of competences to international organizations and institutions in order to solve the problems in a global experience. In order to overcome the problems regarding the implementation of international documents, the creation of certain policies by international organizations and institutions is required to promote the idea of environmental protection as a basic mo$ o of the global world. Taking into account the recommendations of Brundtland Commission, humanity has a moral obligation to preserve natural resources for future generations. Main objective of this article is the presentation of research on the implementation of the Aarhus Convention and the proposal of measures for the creation of ideas and policies on improving access to information in the field. The research is done with the students from the faculty of Security which accessed the information in environmental matters.

  14. Conventional dental radiology; Konventionelle Dentalradiologie und Zukunftsperspektiven

    Energy Technology Data Exchange (ETDEWEB)

    Youssefzadeh, S.; Gahleitner, A. [Universitaetsklinik fuer Radiodiagnostik, Wien (Austria); Bernhart, D.; Bernhart, T. [Universitaetsklinik fuer Zahnheilkunde, Wien (Austria)

    1999-12-01

    Until recently, conventional dental radiology was performed by dentists and orofacial surgeons. Due to the rapid development of radiological technique, the demand of radiological advice is increasing. The radiologists see more and more dental patients in their daily routine. The aim of this article is to give an overview on established dental radiology and a glimpse into the future. Conventional dental radiology and digital radiography are presently in use. Intraoral technique comprises dental films, bite-wing views and occlusal radiographs. Panoramic views and cephalometric radiographs are done with extraoral technique. Digital radiography lacks all processes in behalf of film development. It leads to dose reduction and enables image manipulation. (orig.) [German] Die konventionelle Radiologie in der Zahnheilkunde (Dentalradiologie) wurde hauptsaechlich von den niedergelassenen Zahnaerzten und Mund-, Kiefer- und Gesichtschirurgen betrieben. Aufgrund der rasanten Entwicklung in der radiologischen Methodik wird die fachaerztliche Unterstuetzung durch den Radiologen immer notwendiger, und die raschen Fortschritte erfordern eine zunehmende Zusammenarbeit dieser medizinischen Faecher. Die fachspezifische Anforderung an den Radiologen tritt immer haeufiger im Routinebetrieb auf. Ziel dieses Artikels ist die Aufstellung der derzeit eingesetzten Technik sowie ein Ausblick in die nahe Zukunft. Prinzipiell wird zwischen der konventionellen Dentalradiologie und der digitalen Radiographie unterschieden. Die Dentalradiologie setzt sich aus der intraoralen Technik (Zahnfilme, Bissfluegelaufnahmen, Aufbissaufnahme) und der extraoralen Technik (Panoramaaufnahmen, Panoramaschichtaufnahmen, Fernroentgen) zusammen. Die digitale Radiographie ermoeglicht die Umgehung der konventionellen Entwicklungsverfahren, eine Strahlendosisreduktion und bietet die Moeglichkeit der Bildverarbeitung. (orig.)

  15. Non conventional fuel resources in rural India

    Energy Technology Data Exchange (ETDEWEB)

    Dixit, G.; Dixit, S.; Tiwari, S.

    2006-03-15

    In India there is a shortage of energy resources. The conventional sources are incapable to mitigate this problem by providing sufficient amount of energy. The crisis is gradually becoming more acute particularly in the countryside thus hampering the economic growth. To deal with this problem some new strategies have been envisaged. Generation of energy to meet daily requirement from non-conventional sources is one of the steps in this regard. With the increasing popularity of biogas plants in rural as well as in urban areas of India, it has become essential to find various location specific organic substances that can be used as feed material in biogas plant. In this study we have concentrated on use of cow dung and water hyacinth as feed material in biogas plants. The objective of the study is to assess the suitability of using mixture of cow dung and water hyacinth as feed material in biogas plants. Attempt has been made to find out the optimum proportion of cow dung and water hyacinth. The 1:1 mixture of cow dung and water hyacinth is the optimum proportion as per the study conducted. (author)

  16. The Chemical Weapons Convention -- Legal issues

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-08-01

    The Chemical Weapons Convention (CWC) offers a unique challenge to the US system of constitutional law. Its promise of eliminating what is the most purely genocidal type of weapon from the world`s arsenals as well as of destroying the facilities for producing these weapons, brings with it a set of novel legal issues. The reservations about the CWC expressed by US business people are rooted in concern about safeguarding confidential business information and protecting the constitutional right to privacy. The chief worry is that international verification inspectors will misuse their power to enter commercial property and that trade secrets or other private information will be compromised as a result. It has been charged that the Convention is probably unconstitutional. The author categorically disagrees with that view and is aware of no scholarly writing that supports it. The purpose of this presentation is to show that CWC verification activities can be implemented in the US consistently with the traditional constitutional regard for commercial and individual privacy. First, he very briefly reviews the types of verification inspections that the CWC permits, as well as some of its specific privacy protections. Second, he explains how the Fourth Amendment right to privacy works in the context of CWC verification inspections. Finally, he reviews how verification inspections can be integrated into these constitutional requirements in the SU through a federal implementing statute.

  17. The EU Arbitration Convention : An evaluating assessment of the governance and functioning of the EU Arbitration Convention

    NARCIS (Netherlands)

    Pit, Harm Mark

    2017-01-01

    The EU Arbitration Convention An evaluating assessment of the governance and functioning of the EU Arbitration Convention Summary for non-experts The EU Arbitration Convention is a convention between EU Member States to eliminate double taxation arising from – for tax purposes – transfer pricing pro

  18. Interpretation of a New Found Japanese Biological Warfare File%对一份新发现日本细菌战档案的解读

    Institute of Scientific and Technical Information of China (English)

    宫文婧

    2016-01-01

    Unit 731 focused on the research of Biological Warfare theory in the plan of biological warfare , But be-cause? of lack of evidence chain , this research is relatively backward .Entry Hojo who was the core member of Unit 731 , his speech draft On Biological Warfareis the recently found materials and evidences , has great academic research value.Through the interpretation of the Biological Warfare , analyzing the biological warfare is the vital criterion to e-valuate the research level and research competence , which is also an effective supplement to the evidences for the Jap-anese biological warfare war of aggression against China .%七三一部队在细菌战谋划中注重对细菌战理论的研究,但囿于相关证据链的缺失,致使此项研究相对滞后。七三一部队核心成员北条圆了的演讲稿《关于细菌战》作为新资料、新证据,具有重大的学术研究价值,是对国内所藏相关资料的重要补充,有助于丰富学术界对于日本细菌战理论问题的认知。《关于细菌战》是北条圆了在长期实践基础上积累形成的细菌战理论,可以在一定程度上还原战时日本细菌战的研究情况。通过对北条圆了其人及《关于细菌战》的梳理和解读,进而剖析日本细菌战理论是评估二战时期日本细菌战研究水平和研究能力的重要尺度,也是对日本侵华细菌战证据链的有效补充。

  19. Differences between conventional and non-conventional MRI techniques in Parkinson’s disease

    Science.gov (United States)

    Baglieri, Annalisa; Marino, Maria Adele; Morabito, Rosa; Di Lorenzo, Giuseppe; Bramanti, Placido; Marino, Silvia

    2013-01-01

    Summary Magnetic resonance imaging (MRI) provides an in vivo assessment of cortical and subcortical regions affected in Parkinson’s disease (PD). This review summarizes the most important conventional and non-conventional MRI techniques applied in this field. Standard neuroimaging techniques have played a marginal role in the diagnosis and follow-up of PD, essentially being used only to discriminate atypical syndromes from PD, to exclude secondary causes such as vascular lesions, and to confirm the absence of specific imaging features found in atypical parkinsonisms. However, non-conventional MRI techniques, i.e. new neuroimaging approaches such as magnetic resonance spectroscopy, diffusion tensor imaging, and functional MRI, may allow the detection of structural, functional and metabolic changes useful not only for differential diagnosis, but also for early diagnosis and outcome and treatment monitoring in PD. In addition, we illustrate the advantages of high-field MRI over lower magnetic fields, highlighting the great potential of advanced neuroimaging techniques. PMID:24125556

  20. The Findings of HRCT of the Lung in Chemical Warfare Veterans with Previous Sulfur Mustard (SM Gas Exposure

    Directory of Open Access Journals (Sweden)

    Saeed Naghibi

    2009-01-01

    Full Text Available "nIntroduction: To identify the findings of High-Resolution Computed Tomography (HRCT of the lung in chemical warfare veterans with previous sulfur mustard (SM gas exposure. "nMaterials and Methods: 93 patients were studied prospectively 22 years after exposure. Demographic and clinical data were recorded. HRCT of the lung was performed during expiration and was reported double blinded by two radiologists. HRCT findings include air trapping, mosaic attenuation, ground glass attenuation, nodules, signet ring, fibrosis, bronchial wall thickening, bronchodilation, tree in bud, interlobular wall thickening, bulla, cavity, air consolidation, honey comb and mediastinal and pleural abnormalities that were analyzed. Final diagnosis was identified according to HRCT findings. The relation between HRCT findings, final diagnosis and the distribution of the abnormalities with duration after exposure were evaluated. Distribution of each finding was also evaluated. "nb The most frequent HRCT finding was air trapping (56.7%. Other common findings were mosaic attenuation (35.1%, ground glass attenuation (20.6%, nodules (17.5%, signet ring (15.5% and fibrosis(12.4%. Distribution of the abnormalities were mostly local (79.4% and bilateral (73%. Abnormalities were mostly in the lower lobe (61.3%. No significant correlation was found between the HRCT findings and the duration after exposure or distribution of the abnormalities. The respiratory complications diagnosed according to HRCT included bronchiolitis obliterans (43%, chronic obstructive pulmonary disease (COPD (27.9%, asthma (23.6%, bronchiectasis (13.9%, interstitial lung disease (ILD (9.6%. All abnormalities were seen more frequently in patients with lesser duration of exposure.( P-value < 0.05. "nConclusion: Focal bilateral air trapping was the most common finding seen in expiratory HRCT in this study, and it is highly suggestive of bronchiolitis obliterance (BO. BO can be a late complication of SM

  1. Warfare and Socio-political hierarchies: reflections on non-State societies of the predynastic Nile Valley

    Directory of Open Access Journals (Sweden)

    Gayubas, Augusto

    2015-12-01

    Full Text Available In a recent article, anthropologist Robert L. Carneiro reassessed his most debated hypothesis about the emergence of chiefdoms and the State as a result of environmental or social circumscription, theorized for a series of historical contexts including that of the Predynastic Nile Valley. The problem of the origin of the State is beyond our scope, but regarding the emergence of institutionalized leadership and chiefdoms in the Nile Valley, Carneiro’s ideas about warfare as a main factor in the process of social change remain interesting, even when his insistence in circumscription is still debatable. The aim of the present paper is to briefly review the available archaeological evidence of warfare among non-State societies of the Predynastic Nile Valley, and to evaluate its possible relation to the emergence of socio-political hierarchies, in turn refering to and criticizing some of Carneiro’s recent ideas about the issue.En un artículo reciente, Robert L. Carneiro presentó una reconsideración de su muy debatida hipótesis acerca de la emergencia de sociedades de jefatura y del Estado como resultado de un contexto de circunscripción ambiental, teorizada para una serie de situaciones históricas, entre ellas el valle del Nilo predinástico. El problema del origen del Estado excede las posibilidades de este trabajo, pero en lo que respecta al surgimiento de jefaturas, consideramos que las ideas de Carneiro acerca de la guerra como factor de importancia en el proceso revisten cierto interés, aun cuando su insistencia en la circunscripción continúa siendo discutible. El objetivo del presente artículo es considerar la evidencia arqueológica de guerra disponible para las sociedades no estatales del valle del Nilo predinástico y evaluar la posible relación entre dichos testimonios y la emergencia de jerarquías sociopolíticas, refiriendo y criticando algunas de las ideas recientes de Carneiro sobre el problema.

  2. Supersymmetry Parameter Analysis : SPA Convention and Project

    CERN Document Server

    Aguilar-Saavedra, J A; Allanach, Benjamin C; Arnowitt, R; Baer, H A; Bagger, J A; Balázs, C; Barger, V; Barnett, M; Bartl, Alfred; Battaglia, M; Bechtle, P; Belyaev, A; Berger, E L; Blair, G; Boos, E; Bélanger, G; Carena, M S; Choi, S Y; Deppisch, F; Desch, Klaus; Djouadi, A; Dutta, B; Dutta, S; Díaz, M A; Eberl, H; Ellis, Jonathan Richard; Erler, Jens; Fraas, H; Freitas, A; Fritzsche, T; Godbole, Rohini M; Gounaris, George J; Guasch, J; Gunion, J F; Haba, N; Haber, Howard E; Hagiwara, K; Han, L; Han, T; He, H J; Heinemeyer, S; Hesselbach, S; Hidaka, K; Hinchliffe, Ian; Hirsch, M; Hohenwarter-Sodek, K; Hollik, W; Hou, W S; Hurth, Tobias; Jack, I; Jiang, Y; Jones, D R T; Kalinowski, Jan; Kamon, T; Kane, G; Kang, S K; Kernreiter, T; Kilian, W; Kim, C S; King, S F; Kittel, O; Klasen, M; Kneur, J L; Kovarik, K; Kraml, Sabine; Krämer, M; Lafaye, R; Langacker, P; Logan, H E; Ma, W G; Majerotto, Walter; Martyn, H U; Matchev, K; Miller, D J; Mondragon, M; Moortgat-Pick, G; Moretti, S; Mori, T; Moultaka, G; Muanza, S; Mukhopadhyaya, B; Mühlleitner, M M; Nauenberg, U; Nojiri, M M; Nomura, D; Nowak, H; Okada, N; Olive, Keith A; Oller, W; Peskin, M; Plehn, T; Polesello, G; Porod, Werner; Quevedo, Fernando; Rainwater, D L; Reuter, J; Richardson, P; Rolbiecki, K; de Roeck, A; Weber, Ch.

    2006-01-01

    High-precision analyses of supersymmetry parameters aim at reconstructing the fundamental supersymmetric theory and its breaking mechanism. A well defined theoretical framework is needed when higher-order corrections are included. We propose such a scheme, Supersymmetry Parameter Analysis SPA, based on a consistent set of conventions and input parameters. A repository for computer programs is provided which connect parameters in different schemes and relate the Lagrangian parameters to physical observables at LHC and high energy e+e- linear collider experiments, i.e., masses, mixings, decay widths and production cross sections for supersymmetric particles. In addition, programs for calculating high-precision low energy observables, the density of cold dark matter (CDM) in the universe as well as the cross sections for CDM search experiments are included. The SPA scheme still requires extended efforts on both the theoretical and experimental side before data can be evaluated in the future at the level of the d...

  3. HMI conventions for process control graphics.

    Science.gov (United States)

    Pikaar, Ruud N

    2012-01-01

    Process operators supervise and control complex processes. To enable the operator to do an adequate job, instrumentation and process control engineers need to address several related topics, such as console design, information design, navigation, and alarm management. In process control upgrade projects, usually a 1:1 conversion of existing graphics is proposed. This paper suggests another approach, efficiently leading to a reduced number of new powerful process graphics, supported by a permanent process overview displays. In addition a road map for structuring content (process information) and conventions for the presentation of objects, symbols, and so on, has been developed. The impact of the human factors engineering approach on process control upgrade projects is illustrated by several cases.

  4. CONVENTIONAL RENAL CELL CARCINOMA WITH GRANULOMATOUS REACTION

    Directory of Open Access Journals (Sweden)

    Srinivas

    2014-09-01

    Full Text Available : Granulomatous inflammation is a distinctive pattern of chronic inflammatory reaction characterized by microscopic aggregation of activated macrophages which often develop epithelioid appearance and multinucleate giant cells. Granulomas are encountered in limited number of infectious and some non-infectious conditions. Granulomas have been described within the stroma of malignancies like carcinomas of the breast and colon, seminoma and Hodgkin’s lymphoma, where they represent T-cell-mediated reaction of the tumor stroma to antigens expressed by the tumor. Granulomatous reaction in association with renal cell carcinoma (RCC is uncommon, with only few published reports in the literature. We describe a case of conventional (clear cell RCC associated with epithelioid cell granulomas within the tumor parenchyma.

  5. Conventional radiological strategy of common gastrointestinal neoplasms

    Institute of Scientific and Technical Information of China (English)

    Yi-Zhuo; Li; Pei-Hong; Wu

    2015-01-01

    This article summarizes the clinical characteristics and imaging features of common gastrointestinal(GI) neoplasms in terms of conventional radiological imaging methods. Barium studies are readily available for displaying primary malignancies and are minimallyor not at all invasive. A neoplasm may be manifested as various imaging findings, including mucosal disruption, soft mass, ulcer, submucosal invasion and lumen stenosis on barium studies. Benign tumors typically appear as smoothly marginated intramural masses. Malignant neoplasms most often appear as irregular infiltrative lesions on barium examination. Tumor extension to adjacent GI segments may be indistinct on barium images. Cross-sectional images such as computed tomography and magnetic resonance imaging may provide more accurate details of the adjacent organ invasion, omental or peritoneal spread.

  6. Human right to water and conventionality control

    Directory of Open Access Journals (Sweden)

    Adriana N. Martínez

    2013-12-01

    Full Text Available Humanity faces the challenge of achieving the sustainability of water resources supply for the satisfaction of human needs and ofensuring the sustainability of the natural ecosystems for the achievement of sustainable human development and the quality of life of present and future generations. For this reason the recognition of access to water as a Human Right has fundamental significance. We proceed to analyze the international instruments that provide content and legal basis to the human right to water and the obligations of States. In this context, we deal with the constitutional reception of human right to water in Argentina in the constitutional reform of 1994 and the control of conventionality as guarantor of access to water, which has led to different domestic courts to consider cases in which a violation ofthe right to water was proved.

  7. Conventional and nanotechniques for DNA methylation profiling.

    Science.gov (United States)

    Shanmuganathan, Rajasree; Basheer, Nazeema B; Amirthalingam, Laxmi; Muthukumar, Harshiny; Kaliaperumal, Rajendran; Shanmugam, Kumaran

    2013-01-01

    DNA methylation is critical for gene silencing and is associated with the incidence of many diseases, including cancer. Underlying molecular mechanisms of human diseases and tissue-specific gene expression have been elucidated based on DNA methylation studies. This review highlights the advantages and drawbacks of various methylation screening techniques: blotting, genomic sequencing, bisulfite sequencing, methylation-specific PCR, methylated DNA immunoprecipitation, microarray analysis, matrix-assisted laser desorption ionization time-of-flight mass spectroscopy, nanowire transistor detection procedure, quantum dot-based nanoassay, single-molecule real-time detection, fluorimetric assay, electrochemical detection, and atomic force spectroscopy. The review provides insight for selecting a method or a combination of methods for DNA methylation analysis. Convergence of conventional and contemporary nanotechniques to enumerate methylation at specific CpG sites of oncogene would fill the gap in diagnosis of cancer.

  8. Chronotopes in education: Conventional and dialogic

    Directory of Open Access Journals (Sweden)

    Eugene Matusov

    2015-06-01

    Full Text Available Bakhtin defines chronotope in his literary dialogic theory as the unity of time and space where events occur.  Here, in this conceptual paper, I expand and apply this notion to education, discuss, and illustrate the three major espoused educational chronotopes that I abstracted in my analysis of educational practices around Dialogic Pedagogy. Frist is the Assignment Chronotope based on a type of monologic pedagogy, the most common in conventional, but also in some innovative, schools, focusing on making students arrive at preset curricular endpoints. Second is the Dialogic Provocation Chronotope based on narrowly defined dialogic pedagogy and involving promotion of the students’ responsive critical authorship. Third is the Journey Chronotope focusing on promoting the students’ self-assignments and self-initiated educational journeys that can propel self-generated critical authorship in a targeted practice (or a network of practices. Educational examples, concerns, and consequences of these chronotopes are considered.

  9. Comparison of conventional and non conventional methods of extraction of heartwood of Pterocarpus marsupium Roxb.

    Science.gov (United States)

    Devgun, Manish; Nanda, Arun; Ansari, Shahid H

    2012-01-01

    The renewed interest in plant-derived drugs has led to an increased need for efficient extraction methods. The present investigation was an attempt to evaluate and compare the conventional methods of extraction with non conventional methods of extraction, such as ultrasonic-assisted extraction (UAE) and microwave-assisted extraction (MAE) methods. Pterocarpus marsupium Roxb. has been reported to contain bioactive phytochemicals, e.g., pterostilbene (3',5'-dimethoxy-4-stilbenol). The results showed that among the conventional extraction methods, percolation gave the highest yield. The non conventional methods were optimized. The extraction yield was the highest in case of MAE. The phytochemical screening of the extracts indicated similar groups of compounds in all the extracts. The thin layer chromatography showed the presence of pterostilbene in the extracts obtained by using percolation, MAE and UAE. In these extracts the quantification of pterostilbene was conducted by high performance liquid chromatography and the method was validated. The MAE method extracted significantly higher amount of pterostilbene.

  10. Transport behavior of surrogate biological warfare agents in a simulated landfill: Effect of leachate recirculation and water infiltration

    KAUST Repository

    Saikaly, Pascal

    2010-11-15

    An understanding of the transport behavior of biological warfare (BW) agents in landfills is required to evaluate the suitability of landfills for the disposal of building decontamination residue (BDR) following a bioterrorist attack on a building. Surrogate BW agents, Bacillus atrophaeus spores and Serratia marcescens, were spiked into simulated landfill reactors that were filled with synthetic building debris (SBD) and operated for 4 months with leachate recirculation or water infiltration. Quantitative polymerase chain reaction (Q-PCR) was used to monitor surrogate transport. In the leachate recirculation reactors, <10% of spiked surrogates were eluted in leachate over 4 months. In contrast, 45% and 31% of spiked S. marcescens and B. atrophaeus spores were eluted in leachate in the water infiltration reactors. At the termination of the experiment, the number of retained cells and spores in SBD was measured over the depth of the reactor. Less than 3% of the total spiked S. marcescens cells and no B. atrophaeus spores were detected in SBD. These results suggest that significant fractions of the spiked surrogates were strongly attached to SBD. © 2010 American Chemical Society.

  11. In Situ Probes of Capture and Decomposition of Chemical Warfare Agent Simulants by Zr-Based Metal Organic Frameworks

    Energy Technology Data Exchange (ETDEWEB)

    Plonka, Anna M.; Wang, Qi; Gordon, Wesley O.; Balboa, Alex; Troya, Diego; Guo, Weiwei; Sharp, Conor H.; Senanayake, Sanjaya D.; Morris, John R.; Hill, Craig L.; Frenkel, Anatoly I. (BNL); (Virginia Tech); (ECBC); (Emory); (SBU)

    2017-01-18

    Zr-based metal organic frameworks (MOFs) have been recently shown to be among the fastest catalysts of nerve-agent hydrolysis in solution. We report a detailed study of the adsorption and decomposition of a nerve-agent simulant, dimethyl methylphosphonate (DMMP), on UiO-66, UiO-67, MOF-808, and NU-1000 using synchrotron-based X-ray powder diffraction, X-ray absorption, and infrared spectroscopy, which reveals key aspects of the reaction mechanism. The diffraction measurements indicate that all four MOFs adsorb DMMP (introduced at atmospheric pressures through a flow of helium or air) within the pore space. In addition, the combination of X-ray absorption and infrared spectra suggests direct coordination of DMMP to the Zr6 cores of all MOFs, which ultimately leads to decomposition to phosphonate products. These experimental probes into the mechanism of adsorption and decomposition of chemical warfare agent simulants on Zr-based MOFs open new opportunities in rational design of new and superior decontamination materials.

  12. The application of single particle aerosol mass spectrometry for the detection and identification of high explosives and chemical warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Martin, Audrey Noreen [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2006-01-01

    Single Particle Aerosol Mass Spectrometry (SPAMS) was evaluated as a real-time detection technique for single particles of high explosives. Dual-polarity time-of-flight mass spectra were obtained for samples of 2,4,6-trinitrotoluene (TNT), 1,3,5-trinitro-1,3,5-triazinane (RDX), and pentaerythritol tetranitrate (PETN); peaks indicative of each compound were identified. Composite explosives, Comp B, Semtex 1A, and Semtex 1H were also analyzed, and peaks due to the explosive components of each sample were present in each spectrum. Mass spectral variability with laser fluence is discussed. The ability of the SPAMS system to identify explosive components in a single complex explosive particle (~1 pg) without the need for consumables is demonstrated. SPAMS was also applied to the detection of Chemical Warfare Agent (CWA) simulants in the liquid and vapor phases. Liquid simulants for sarin, cyclosarin, tabun, and VX were analyzed; peaks indicative of each simulant were identified. Vapor phase CWA simulants were adsorbed onto alumina, silica, Zeolite, activated carbon, and metal powders which were directly analyzed using SPAMS. The use of metal powders as adsorbent materials was especially useful in the analysis of triethyl phosphate (TEP), a VX stimulant, which was undetectable using SPAMS in the liquid phase. The capability of SPAMS to detect high explosives and CWA simulants using one set of operational conditions is established.

  13. Decomposition of 2-chloroethylethylsulfide on copper oxides to detoxify polymer-based spherical activated carbons from chemical warfare agents.

    Science.gov (United States)

    Fichtner, S; Hofmann, J; Möller, A; Schrage, C; Giebelhausen, J M; Böhringer, B; Gläser, R

    2013-11-15

    For the decomposition of chemical warfare agents, a hybrid material concept was applied. This consists of a copper oxide-containing phase as a component with reactive functionality supported on polymer-based spherical activated carbon (PBSAC) as a component with adsorptive functionality. A corresponding hybrid material was prepared by impregnation of PBSAC with copper(II)nitrate and subsequent calcination at 673K. The copper phase exists predominantly as copper(I)oxide which is homogeneously distributed over the PBSAC particles. The hybrid material containing 16 wt.% copper on PBSAC is capable of self-detoxifying the mustard gas surrogate 2-chloroethylethylsulfide (CEES) at room temperature. The decomposition is related to the breakthrough behavior of the reactant CEES, which displaces the reaction product ethylvinylsulfide (EVS). This leads to a combined breakthrough of CEES and EVS. The decomposition of CEES is shown to occur catalytically over the copper-containing PBSAC material. Thus, the hybrid material can even be considered to be self-cleaning.

  14. Efficient hydrolysis of the chemical warfare nerve agent tabun by recombinant and purified human and rabbit serum paraoxonase 1.

    Science.gov (United States)

    Valiyaveettil, Manojkumar; Alamneh, Yonas; Biggemann, Lionel; Soojhawon, Iswarduth; Doctor, Bhupendra P; Nambiar, Madhusoodana P

    2010-12-03

    Paraoxonase 1 (PON1) has been described as an efficient catalytic bioscavenger due to its ability to hydrolyze organophosphates (OPs) and chemical warfare nerve agents (CWNAs). It is the future most promising candidate as prophylactic medical countermeasure against highly toxic OPs and CWNAs. Most of the studies conducted so far have been focused on the hydrolyzing potential of PON1 against nerve agents, sarin, soman, and VX. Here, we investigated the hydrolysis of tabun by PON1 with the objective of comparing the hydrolysis potential of human and rabbit serum purified and recombinant human PON1. The hydrolysis potential of PON1 against tabun, sarin, and soman was evaluated by using an acetylcholinesterase (AChE) back-titration Ellman method. Efficient hydrolysis of tabun (100 nM) was observed with ∼25-40 mU of PON1, while higher concentration (80-250 mU) of the enzyme was required for the complete hydrolysis of sarin (11 nM) and soman (3 nM). Our data indicate that tabun hydrolysis with PON1 was ∼30-60 times and ∼200-260 times more efficient than that with sarin and soman, respectively. Moreover, the catalytic activity of PON1 varies from source to source, which also reflects their efficiency of hydrolyzing different types of nerve agents. Thus, efficient hydrolysis of tabun by PON1 suggests its promising potential as a prophylactic treatment against tabun exposure.

  15. Evaluation of Chemical Warfare Agent Percutaneous Vapor Toxicity: Derivation of Toxicity Guidelines for Assessing Chemical Protective Ensembles.

    Energy Technology Data Exchange (ETDEWEB)

    Watson, A.P.

    2003-07-24

    Percutaneous vapor toxicity guidelines are provided for assessment and selection of chemical protective ensembles (CPEs) to be used by civilian and military first responders operating in a chemical warfare agent vapor environment. The agents evaluated include the G-series and VX nerve agents, the vesicant sulfur mustard (agent HD) and, to a lesser extent, the vesicant Lewisite (agent L). The focus of this evaluation is percutaneous vapor permeation of CPEs and the resulting skin absorption, as inhalation and ocular exposures are assumed to be largely eliminated through use of SCBA and full-face protective masks. Selection of appropriately protective CPE designs and materials incorporates a variety of test parameters to ensure operability, practicality, and adequacy. One aspect of adequacy assessment should be based on systems tests, which focus on effective protection of the most vulnerable body regions (e.g., the groin area), as identified in this analysis. The toxicity range of agent-specific cumulative exposures (Cts) derived in this analysis can be used as decision guidelines for CPE acceptance, in conjunction with weighting consideration towards more susceptible body regions. This toxicity range is bounded by the percutaneous vapor estimated minimal effect (EME{sub pv}) Ct (as the lower end) and the 1% population threshold effect (ECt{sub 01}) estimate. Assumptions of exposure duration used in CPE certification should consider that each agent-specific percutaneous vapor cumulative exposure Ct for a given endpoint is a constant for exposure durations between 30 min and 2 hours.

  16. Extraordinary Adaptive Plasticity of Colorado Potato Beetle: “Ten-Striped Spearman” in the Era of Biotechnological Warfare

    Directory of Open Access Journals (Sweden)

    Aleksandar Cingel

    2016-09-01

    Full Text Available Expanding from remote areas of Mexico to a worldwide scale, the ten-striped insect, the Colorado potato beetle (CPB, Leptinotarsa decemlineata Say, has risen from being an innocuous beetle to a prominent global pest. A diverse life cycle, phenotypic plasticity, adaptation to adverse conditions, and capability to detoxify or tolerate toxins make this insect appear to be virtually “indestructible”. With increasing advances in molecular biology, tools of biotechnological warfare were deployed to combat CPB. In the last three decades, genetically modified potato has created a new challenge for the beetle. After reviewing hundreds of scientific papers dealing with CPB control, it became clear that even biotechnological means of control, if used alone, would not defeat the Colorado potato beetle. This control measure once again appears to be provoking the potato beetle to exhibit its remarkable adaptability. Nonetheless, the potential for adaptation to these techniques has increased our knowledge of this pest and thus opened possibilities for devising more sustainable CPB management programs.

  17. Using Metal Complex Ion-Molecule Reactions in a Miniature Rectilinear Ion Trap Mass Spectrometer to Detect Chemical Warfare Agents

    Science.gov (United States)

    Graichen, Adam M.; Vachet, Richard W.

    2013-06-01

    The gas-phase reactions of a series of coordinatively unsaturated [Ni(L)n]y+ complexes, where L is a nitrogen-containing ligand, with chemical warfare agent (CWA) simulants in a miniature rectilinear ion trap mass spectrometer were investigated as part of a new approach to detect CWAs. Results show that upon entering the vacuum system via a poly(dimethylsiloxane) (PDMS) membrane introduction, low concentrations of several CWA simulants, including dipropyl sulfide (simulant for mustard gas), acetonitrile (simulant for the nerve agent tabun), and diethyl phosphite (simulant for nerve agents sarin, soman, tabun, and VX), can react with metal complex ions generated by electrospray ionization (ESI), thereby providing a sensitive means of detecting these compounds. The [Ni(L)n]2+ complexes are found to be particularly reactive with the simulants of mustard gas and tabun, allowing their detection at low parts-per-billion (ppb) levels. These detection limits are well below reported exposure limits for these CWAs, which indicates the applicability of this new approach, and are about two orders of magnitude lower than electron ionization detection limits on the same mass spectrometer. The use of coordinatively unsaturated metal complexes as reagent ions offers the possibility of further tuning the ion-molecule chemistry so that desired compounds can be detected selectively or at even lower concentrations.

  18. Facility monitoring of chemical warfare agent simulants in air using an automated, field-deployable, miniature mass spectrometer.

    Science.gov (United States)

    Smith, Jonell N; Noll, Robert J; Cooks, R Graham

    2011-05-30

    Vapors of four chemical warfare agent (CWA) stimulants, 2-chloroethyl ethyl sulfide (CEES), diethyl malonate (DEM), dimethyl methylphosphonate (DMMP), and methyl salicylate (MeS), were detected, identified, and quantitated using a fully automated, field-deployable, miniature mass spectrometer. Samples were ionized using a glow discharge electron ionization (GDEI) source, and ions were mass analyzed with a cylindrical ion trap (CIT) mass analyzer. A dual-tube thermal desorption system was used to trap compounds on 50:50 Tenax TA/Carboxen 569 sorbent before their thermal release. The sample concentrations ranged from low parts per billion [ppb] to two parts per million [ppm]. Limits of detection (LODs) ranged from 0.26 to 5.0 ppb. Receiver operating characteristic (ROC) curves are presented for each analyte. A sample of CEES at low ppb concentration was combined separately with two interferents, bleach (saturated vapor) and diesel fuel exhaust (1%), as a way to explore the capability of detecting the simulant in an environmental matrix. Also investigated was a mixture of the four CWA simulants (at concentrations in air ranging from 270 to 380 ppb). Tandem mass (MS/MS) spectral data were used to identify and quantify the individual components. Copyright © 2011 John Wiley & Sons, Ltd.

  19. Express analysis of explosives, chemical warfare agents and drugs with multicapillary column gas chromatography and ion mobility increment spectrometry.

    Science.gov (United States)

    Buryakov, Igor A

    2004-02-05

    Description of a gas chromatograph designed for express analysis of explosives (2,4-dinitrotoluene, 2,4,6-trinitrotoluene, pentaerythritol tetranitrate), chemical warfare agents (mustard gas, lewisite, sarin) and drugs (heroin, cocaine hydrochloride, crack) is given. The devices comprises a multicapillary chromatographic column and an ion mobility increment spectrometer (MCC-IMIS). The main analytical characteristics of an IMIS (estimated detection limit (DL), linear dynamic range (LDR), speed of response) and a chromatographic column (separation power, degree of separation, a number of possible peaks at a chromatogram section, divided by analysis time) are determined. The maximum value of DL equal to 5 pg/ml was registered for cis-alpha-LW, and the lowest one of 0.001 pg/ml was for cocaine. The maximum value of LDR equal to 1000 was registered for sarin and the lowest one of 150 was for the ions of lewisite. Speed of response of one compound detection with the IMIS was 0.7 s.

  20. From energy-rich phosphate compounds to warfare agents: A review on the chemistry of organic phosphate compounds

    Directory of Open Access Journals (Sweden)

    Luciano Albino Giusti

    2008-12-01

    Full Text Available The chemistry of the phosphorus-oxygen bond is widely used in biological systems in many processes, such as energy transduction and the storage, transmission and expression of genetic information, which are essential to living beings in relation to a wide variety of functions. Compounds containing this bond have been designed for many purposes, ranging from agricultural defense systems, in order to increase food production, to nerve agents, for complaining use in warfare. In this review, features related to the chemistry of organic phosphate compounds are discussed, with particular emphasis on the role of phosphate compounds in biochemical events and in nerve agents. To this aim, the energy-rich phosphate compounds are focused, particularly the mode of their use as energy currency in cells. Historical and recent studies carried out by research groups have tried to elucidate the mechanism of action of enzymes responsible for energy transduction through the use of biochemical studies, enzyme models, and artificial enzymes. Finally, recent studies on the detoxification of nerve agents based on phosphorous esters are presented, and on the utilization of chromogenic and fluorogenic chemosensors for the detection of these phosphate species.

  1. Child Soldiery as a Tool of Modern Warfare(?: the Role of Child Soldiers in “New Wars”

    Directory of Open Access Journals (Sweden)

    Dóra SZIJJ

    2010-12-01

    Full Text Available The hardly-known but regrettably prevalent phenomenon of child soldiery, which can be considered as a new development of modern warfare, might affect approximately 250,000 – 300,000 children worldwide. According to the estimates, 40% of our planet’s armed forces or armed groups deploy “child combatants” for different tasks, while the international community is still struggling against this form of the abuse of children. The global nature of child soldiery raises many questions in many fields, because it has deep political, social, economic, military, environmental, ethnic and religious etc. roots and far reaching consequences in the so-called Third World. Moreover, if we focus on the African peacekeeping missions of the European Union, child soldiery might also have indirect impacts on the European community. The aim of this study is to offer a comprehensive approach in connection with child soldiery, and pointing out the links between the post-colonial conflicts and this form of human rights breaches.

  2. Hydrogeologic and water-quality data for the explosive experimental area, Naval Surface Warfare Center, Dahlgren Site, Dahlgren, Virginia

    Science.gov (United States)

    Hammond, E.C.; Bell, C.F.

    1995-01-01

    Hydrogeologic and water-quality data were collected at the Explosive Experimental Area, Naval Surface Warfare Center, Dahlgren Site at Dahlgren, Virginia, as part of a hydrogeologic assessment of the shallow aquifer system begun in 1993. The U.S. Geological Survey conducted this study to provide the U.S. Navy with hydrogeologic data to aid in the evaluation of the effects from remediation of contaminated sites and to protect against additional contamination. This report describes the ground-water observation- well network, hydrogeologic, and water-quality data collected between October 1993 and April 1995. The report includes a description of the locations and construction of 28 observation wells on the Explosive Experimental Area. Hydrogeologic data include lithologic logs, geophysical logs, and vertical hydraulic conductivity measurements of selected core intervals. Hydrologic data include synoptic and hourly measurements of ground-water levels, and observation-well slug tests to determine horizontal hydraulic conductivity. Water-quality data include analyses of major dissolved constituents in ground water and surface water.

  3. Continuum Model for Decontamination of Chemical Warfare Agent from a Rubbery Polymer using the Maxwell-Stefan Formulation

    Science.gov (United States)

    Varady, Mark; Bringuier, Stefan; Pearl, Thomas; Stevenson, Shawn; Mantooth, Brent

    Decontamination of polymers exposed to chemical warfare agents (CWA) often proceeds by application of a liquid solution. Absorption of some decontaminant components proceed concurrently with extraction of the CWA, resulting in multicomponent diffusion in the polymer. In this work, the Maxwell-Stefan equations were used with the Flory-Huggins model of species activity to mathematically describe the transport of two species within a polymer. This model was used to predict the extraction of the nerve agent O-ethyl S-[2(diisopropylamino)ethyl] methylphosphonothioate (VX) from a silicone elastomer into both water and methanol. Comparisons with experimental results show good agreement with minimal fitting of model parameters from pure component uptake data. Reaction of the extracted VX with sodium hydroxide in the liquid-phase was also modeled and used to predict the overall rate of destruction of VX. Although the reaction proceeds more slowly in the methanol-based solution compared to the aqueous solution, the extraction rate is faster due to increasing VX mobility as methanol absorbs into the silicone, resulting in an overall faster rate of VX destruction.

  4. Detection of chemical warfare agent-related phenylarsenic compounds in marine biota samples by LC-HESI/MS/MS.

    Science.gov (United States)

    Niemikoski, Hanna; Soderstrom, Martin; Vanninen, Paula

    2017-09-06

    A new method has been developed to determine oxidation products of three chemical warfare agent (CWA) related phenylarsenic compounds from marine biota samples by a liquid chromatography-heated electrospray ioniza-tion/tandem mass spectrometry (LC-HESI/MS/MS). The target chemicals were oxidation products of Adamsite (DM[ox]), Clark I (DA[ox]), and triphenylarsine (TPA[ox]). Method was validated within the concentration range of 1-5 ng/g, 0.2-5 ng/g and 0.2-5 ng/g for DM[ox], DA[ox] and TPA[ox], respectively. The method was linear, precise and accurate. Limits of quantification (LOQ) were 2.0, 1.3 and 2.1 ng/g for DM[ox], DA[ox] and TPA[ox], respectively. A total of ten fish samples and one lobster sample collected from near Swedish coast, Måseskär dumpsite were analysed. Trace concentrations below LOQ values were detected in three samples and the elemental composition of oxidized form of Clark I and /or II was con-firmed by LC-HESI/HRMS. To our knowledge, this is the first study that provides the presence of CWA related chemicals in marine biota samples.

  5. Effects of Conventional and Cooperative Learning Strategies on the ...

    African Journals Online (AJOL)

    Effects of Conventional and Cooperative Learning Strategies on the Academic Performance of Senior ... Journal of Technology and Education in Nigeria ... Also in the conventional class, there was no significant differences in the academic ...

  6. The Development of Toddlers' Moral and Conventional Judgments.

    Science.gov (United States)

    Smetana, Judith G.; Braeges, Judith L.

    1990-01-01

    Examines the development of toddlers' moral and conventional judgments and effects of language development on such judgments. Rudimentary distinctions between familiar moral, social and conventional transgressions are made during the child's third year. (Author/BB)

  7. An Efficient Data Communication Using Conventional Codes

    Directory of Open Access Journals (Sweden)

    Mrs. Nikam Pratibha Madhavrao

    2014-07-01

    Full Text Available The BER performance of conventional FFT-OFDM system is compared with DWT-OFDM system and DCT-OFDM system in an AWGN environment and Saleh-Valenzuela (SV channel model at 60 GHz. Several wavelets such as Haar, Daubechies, Symlet, biorthogonal are considered. The BER is calculated for signaling format BPSK and the performance is analyzed at 60 GHz. Simulation results show that DCT based scheme yields the lowest average bit error rate. While out of all wavelet mother used Haar and Daubechies wavelet based scheme yields lower BER than FFT-OFDM for an AWGN channel. But it may include the implementation of forward error correction techniques such as convolution codes. An efficient channel estimation algorithm may be included for performance evaluation of DCT-OFDM and DWT- OFDM working at 60 GHz band. We introduce the Interfacing Techniques for Accessing data transfer data delivery. By using our approach we are increasing the efficiency of the data communication.

  8. Understanding the substrate specificity of conventional calpains.

    Science.gov (United States)

    Sorimachi, Hiroyuki; Mamitsuka, Hiroshi; Ono, Yasuko

    2012-09-01

    Calpains are intracellular Ca(2+)-dependent Cys proteases that play important roles in a wide range of biological phenomena via the limited proteolysis of their substrates. Genetic defects in calpain genes cause lethality and/or functional deficits in many organisms, including humans. Despite their biological importance, the mechanisms underlying the action of calpains, particularly of their substrate specificities, remain largely unknown. Studies show that certain sequence preferences influence calpain substrate recognition, and some properties of amino acids have been related successfully to substrate specificity and to the calpains' 3D structure. The full spectrum of this substrate specificity, however, has not been clarified using standard sequence analysis algorithms, e.g., the position-specific scoring-matrix method. More advanced bioinformatics techniques were used recently to identify the substrate specificities of calpains and to develop a predictor for calpain cleavage sites, demonstrating the potential of combining empirical data acquisition and machine learning. This review discusses the calpains' substrate specificities, introducing the benefits of bioinformatics applications. In conclusion, machine learning has led to the development of useful predictors for calpain cleavage sites, although the accuracy of the predictions still needs improvement. Machine learning has also elucidated information about the properties of calpains' substrate specificities, including a preference for sequences over secondary structures and the existence of a substrate specificity difference between two similar conventional calpains, which has never been indicated biochemically.

  9. Conventional and advanced imaging in neuromyelitis optica.

    Science.gov (United States)

    Barnett, Y; Sutton, I J; Ghadiri, M; Masters, L; Zivadinov, R; Barnett, M H

    2014-08-01

    Myelitis and optic neuritis are prototypic clinical presentations of both multiple sclerosis and neuromyelitis optica. Once considered a subtype of multiple sclerosis, neuromyelitis optica, is now known to have a discrete pathogenesis in which antibodies to the water channel, aquaporin 4, play a critical role. Timely differentiation of neuromyelitis optica from MS is imperative, determining both prognosis and treatment strategy. Early, aggressive immunosuppression is required to prevent the accrual of severe disability in neuromyelitis optica; conversely, MS-specific therapies may exacerbate the disease. The diagnosis of neuromyelitis optica requires the integration of clinical, MR imaging, and laboratory data, but current criteria are insensitive and exclude patients with limited clinical syndromes. Failure to recognize the expanding spectrum of cerebral MR imaging patterns associated with aquaporin 4 antibody seropositivity adds to diagnostic uncertainty in some patients. We present the state of the art in conventional and nonconventional MR imaging in neuromyelitis optica and review the place of neuroimaging in the diagnosis, management, and research of the condition.

  10. On Self-adjustment of Social Conventions to Small Perturbations

    Institute of Scientific and Technical Information of China (English)

    JIANG Yi-Chuan

    2008-01-01

    @@ We present a model for self-adjustment of social conventions to small perturbations, and investigate how pertur-bations can influence the convergence of social convention in different situations.The experimental results show that the sensitivity of social conventions is determined by not only the perturbations themselves but also the agent adjustment functions for the perturbations; and social conventions are more sensitive to the outlier agent number than to the strategy fluctuation magnitudes and localities of perturbations.

  11. Uncertainty, Conventions and Co-ordination in the Business Enterprise

    DEFF Research Database (Denmark)

    Jagd, Søren

    The paper presents the basic propositions of convention theory with special consideration to the analysis of uncertainty, the role of institutions and conventions, and the implications this perspective has for the analysis of the business enterprise......The paper presents the basic propositions of convention theory with special consideration to the analysis of uncertainty, the role of institutions and conventions, and the implications this perspective has for the analysis of the business enterprise...

  12. Adoption of protocols to amend the Paris convention on third party liability in the field of nuclear energy and the Brussels convention supplementary to the Paris convention

    Energy Technology Data Exchange (ETDEWEB)

    Kim, S. W.; Jang, K. H.; Oh, B. J.; Song, J. M.; Jung, M. M.; Kim, H. J. [Korea Institute of Nuclear Safety, Taejon (Korea, Republic of)

    2004-07-01

    To keep in line with the world-wide tendency to strengthen the nuclear third party liability system after the Chernobyl accident, the Protocols to amend the Paris Convention on Third Party Liability in the Field of Nuclear Energy and the Brussels Convention Supplementary to the Paris Convention was adopted on 12 February, 2004. The most important feature of the revised Paris Convention is an increase in the nuclear operator's liability amount from 15 million SDRs to a new minimum of 700 million Euros. For the additional compensation to those provided by the domestic liability regime, the revised Brussels Supplementary Convention will maintain its basic three-tier compensation system but with significantly increased amounts(As a result the total amount to be compensated according to the three tiers will be 15 billions Euros). The protocols to amend the Paris Convention on Third Party Liability in the Field of Nuclear Energy will come into force when ratified by two thirds of the Signatory States, and the protocol to amend the Brussels Convention Supplementary to the Paris Convention will come into force when ratified by all the Brussels Supplementary Convention Signatory States.

  13. The marriage of conventional cancer treatments and alternative cancer therapies.

    Science.gov (United States)

    Decker, Georgia M

    2008-06-01

    The terms "alternative" or "unconventional" have been used to describe any therapy used instead of conventional approaches. Conventional approaches, known as "standard" or "traditional" or "biomedical" approaches, have had broad application in Western medicine. Complementary and alternative medicine has been referred to as "integrative," "integrated," or "complementary" when therapies are combined with conventional approaches, such as those for cancer.

  14. 46 CFR 15.701 - Officers Competency Certificates Convention, 1936.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Officers Competency Certificates Convention, 1936. 15... SEAMEN MANNING REQUIREMENTS Limitations and Qualifying Factors § 15.701 Officers Competency Certificates Convention, 1936. (a) This section implements the Officers Competency Certificates Convention, 1936,...

  15. A naming convention for atmospheric organic aerosol

    Science.gov (United States)

    Murphy, B. N.; Donahue, N. M.; Robinson, A. L.; Pandis, S. N.

    2014-06-01

    While the field of atmospheric organic aerosol scientific research has experienced thorough and insightful progress over the last half century, this progress has been accompanied by the evolution of a communicative and detailed yet, at times, complex and inconsistent language. The menagerie of detailed classification that now exists to describe organic compounds in our atmosphere reflects the wealth of observational techniques now at our disposal as well as the rich information provided by state-of-the-science instrumentation. However, the nomenclature in place to communicate these scientific gains is growing disjointed to the point that effective communication within the scientific community and to the public may be sacrificed. We propose standardizing a naming convention for organic aerosol classification that is relevant to laboratory studies, ambient observations, atmospheric models, and various stakeholders for air-quality problems. Because a critical aspect of this effort is to directly translate the essence of complex physico-chemical phenomena to a much broader, policy-oriented audience, we recommend a framework that maximizes comprehension among scientists and non-scientists alike. For example, to classify volatility, it relies on straightforward alphabetic terms (e.g., semivolatile, SV; intermediate volatility, IV; etc.) rather than possibly ambiguous numeric indices. This framework classifies organic material as primary or secondary pollutants and distinguishes among fundamental features important for science and policy questions including emission source, chemical phase, and volatility. Also useful is the addition of an alphabetic suffix identifying the volatility of the organic material or its precursor for when emission occurred. With this framework, we hope to introduce into the community a consistent connection between common notation for the general public and detailed nomenclature for highly specialized discussion. In so doing, we try to maintain

  16. Biodegradable and compostable alternatives to conventional plastics.

    Science.gov (United States)

    Song, J H; Murphy, R J; Narayan, R; Davies, G B H

    2009-07-27

    Packaging waste forms a significant part of municipal solid waste and has caused increasing environmental concerns, resulting in a strengthening of various regulations aimed at reducing the amounts generated. Among other materials, a wide range of oil-based polymers is currently used in packaging applications. These are virtually all non-biodegradable, and some are difficult to recycle or reuse due to being complex composites having varying levels of contamination. Recently, significant progress has been made in the development of biodegradable plastics, largely from renewable natural resources, to produce biodegradable materials with similar functionality to that of oil-based polymers. The expansion in these bio-based materials has several potential benefits for greenhouse gas balances and other environmental impacts over whole life cycles and in the use of renewable, rather than finite resources. It is intended that use of biodegradable materials will contribute to sustainability and reduction in the environmental impact associated with disposal of oil-based polymers. The diversity of biodegradable materials and their varying properties makes it difficult to make simple, generic assessments such as biodegradable products are all 'good' or petrochemical-based products are all 'bad'. This paper discusses the potential impacts of biodegradable packaging materials and their waste management, particularly via composting. It presents the key issues that inform judgements of the benefits these materials have in relation to conventional, petrochemical-based counterparts. Specific examples are given from new research on biodegradability in simulated 'home' composting systems. It is the view of the authors that biodegradable packaging materials are most suitable for single-use disposable applications where the post-consumer waste can be locally composted.

  17. Reconsidering "The inappropriateness of conventional cephalometrics".

    Science.gov (United States)

    Bookstein, Fred L

    2016-06-01

    Of all the articles on cephalometrics this journal has published over the last half-century, the one most cited across the scientific literature is the 1979 lecture "The inappropriateness of conventional cephalometrics" by Robert Moyers and me. But the durable salience of this article is perplexing, as its critique was misdirected (it should have been aimed at the craniometrics of the early twentieth century, not merely the roentgenographic extension used in the orthodontic clinic) and its proposed remedies have all failed to establish themselves as methods of any broad utility. When problems highlighted by Moyers and me have been resolved at all, the innovations that resolved them owe to tools very different from those suggested in our article and imported from fields quite a bit farther from biometrics than we expected back in 1979. One of these tools was the creation de novo of a new abstract mathematical construction, statistical shape space, in the 1980s and 1990s; another was a flexible and intuitive new graphic, the thin-plate spline, for meaningfully and suggestively visualizing a wide variety of biological findings in these spaces. On the other hand, many of the complaints Moyers and I enunciated back in 1979, especially those stemming from the disarticulation of morphometrics from the explanatory styles and purposes of clinical medicine, remain unanswered even today. The present essay, a retrospective historical meditation, reviews the context of the 1979 publication, its major themes, and its relevance today. This essay is dedicated to the memory of Robert E. Moyers on the 100th anniversary of the American Journal of Orthodontics and Dentofacial Orthopedics.

  18. Biodegradable and compostable alternatives to conventional plastics

    Science.gov (United States)

    Song, J. H.; Murphy, R. J.; Narayan, R.; Davies, G. B. H.

    2009-01-01

    Packaging waste forms a significant part of municipal solid waste and has caused increasing environmental concerns, resulting in a strengthening of various regulations aimed at reducing the amounts generated. Among other materials, a wide range of oil-based polymers is currently used in packaging applications. These are virtually all non-biodegradable, and some are difficult to recycle or reuse due to being complex composites having varying levels of contamination. Recently, significant progress has been made in the development of biodegradable plastics, largely from renewable natural resources, to produce biodegradable materials with similar functionality to that of oil-based polymers. The expansion in these bio-based materials has several potential benefits for greenhouse gas balances and other environmental impacts over whole life cycles and in the use of renewable, rather than finite resources. It is intended that use of biodegradable materials will contribute to sustainability and reduction in the environmental impact associated with disposal of oil-based polymers. The diversity of biodegradable materials and their varying properties makes it difficult to make simple, generic assessments such as biodegradable products are all ‘good’ or petrochemical-based products are all ‘bad’. This paper discusses the potential impacts of biodegradable packaging materials and their waste management, particularly via composting. It presents the key issues that inform judgements of the benefits these materials have in relation to conventional, petrochemical-based counterparts. Specific examples are given from new research on biodegradability in simulated ‘home’ composting systems. It is the view of the authors that biodegradable packaging materials are most suitable for single-use disposable applications where the post-consumer waste can be locally composted. PMID:19528060

  19. The semantics of Chemical Markup Language (CML): dictionaries and conventions.

    Science.gov (United States)

    Murray-Rust, Peter; Townsend, Joe A; Adams, Sam E; Phadungsukanan, Weerapong; Thomas, Jens

    2011-10-14

    The semantic architecture of CML consists of conventions, dictionaries and units. The conventions conform to a top-level specification and each convention can constrain compliant documents through machine-processing (validation). Dictionaries conform to a dictionary specification which also imposes machine validation on the dictionaries. Each dictionary can also be used to validate data in a CML document, and provide human-readable descriptions. An additional set of conventions and dictionaries are used to support scientific units. All conventions, dictionaries and dictionary elements are identifiable and addressable through unique URIs.

  20. The semantics of Chemical Markup Language (CML: dictionaries and conventions

    Directory of Open Access Journals (Sweden)

    Murray-Rust Peter

    2011-10-01

    Full Text Available Abstract The semantic architecture of CML consists of conventions, dictionaries and units. The conventions conform to a top-level specification and each convention can constrain compliant documents through machine-processing (validation. Dictionaries conform to a dictionary specification which also imposes machine validation on the dictionaries. Each dictionary can also be used to validate data in a CML document, and provide human-readable descriptions. An additional set of conventions and dictionaries are used to support scientific units. All conventions, dictionaries and dictionary elements are identifiable and addressable through unique URIs.

  1. Decontamination of Chemical/Biological Warfare (CBW) Agents Using an Atmospheric Pressure Plasma Jet (APPJ)

    Science.gov (United States)

    Herrmann, Hans W.

    1998-11-01

    The atmospheric pressure plasma jet (APPJ) is a non-thermal, high pressure, uniform glow discharge that produces a high velocity effluent stream of highly reactive chemical species. The discharge operates on a feedstock gas (e.g. He/O_2/H_2O) which flows between an outer, grounded, cylindrical electrode and an inner, coaxial electrode powered at 13.56 MHz RF. While passing through the plasma, the feedgas becomes excited, dissociated or ionized by electron impact. Once the gas exits the discharge volume, ions and electrons are rapidly lost by recombination, but the fast-flowing effluent still contains metastables (e.g. O2*, He*) and radicals (e.g. O, OH). These reactive species have been shown to be effective neutralizers of surrogates for anthrax spores, mustard blister agent and VX nerve gas. Unlike conventional, wet decontamination methods, the plasma effluent does not cause corrosion of most surfaces and does not damage wiring, electronics, nor most plastics. This makes it highly suitable for decontamination of high value sensitive equipment such as is found in vehicle interiors (i.e. tanks, planes...) for which there is currently no good decontamination technique. Furthermore, the reactive species rapidly degrade into harmless products leaving no lingering residue or harmful byproducts. Physics of the APPJ will be discussed and results of surface decontamination experiments using simulant and actual CBW agents will be presented.

  2. 26 CFR 1.168(d)-1 - Applicable conventions-half-year and mid-quarter conventions.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 2 2010-04-01 2010-04-01 false Applicable conventions-half-year and mid-quarter... and Corporations § 1.168(d)-1 Applicable conventions—half-year and mid-quarter conventions. (a) In... mid-quarter convention applies to the property. Under section 168(d)(3)(A), the mid-quarter...

  3. Koncepcija partizanskoj vojny v Litve v 1920— 1930-e gody [The concept of guerrilla warfare in Lithuania in the 1920—1930s

    Directory of Open Access Journals (Sweden)

    Jokubauskas Vytautas

    2012-01-01

    Full Text Available This article analyses the military and tactical training of the members of the Lithuanian Riflemen’s Union for guerrilla warfare in the interwar period. Small nations, such as Lithuania and other Baltic states, being unable to build up military strength in order to ensure national security, were forced to seek for unconventional methods of warfare, including guerrilla strategies. The study places emphasis on the development of the guerrilla war concept in the Union periodicals. The author retraces a change in the intensity of the guerrilla warfare concept propagation amongst Lithuanian population and riflemen, in particular, through publications in the Trimitas — a periodical of the Lithuanian Riflemen’s Union. The author also identifies the narratives associated with the guerrilla matters employed for propaganda purposes in order to create an image of a guerrilla as a defender of the Homeland — Lithuania. Additionally, the structure and numbers of the Union are analysed through a comparison with similar organisations of the other «small nations» of the Baltic North-East. The author addresses the issue of military missions planned by the Lithuanian Army, as well as the way riflemen implemented them. Since the Union did not only offer military training, but was also engaged in the patriotic propaganda, the article focuses on the network of cultural institutions, homes of riflemen, orchestras, libraries, choirs, and athletic clubs used by the Union. The article sets out to establish whether the loss of Lithuanian sovereignty could have been possible without giving rise to a protracted guerrilla war.

  4. The dependence of Islamic and conventional stocks: A copula approach

    Science.gov (United States)

    Razak, Ruzanna Ab; Ismail, Noriszura

    2015-09-01

    Recent studies have found that Islamic stocks are dependent on conventional stocks and they appear to be more risky. In Asia, particularly in Islamic countries, research on dependence involving Islamic and non-Islamic stock markets is limited. The objective of this study is to investigate the dependence between financial times stock exchange Hijrah Shariah index and conventional stocks (EMAS and KLCI indices). Using the copula approach and a time series model for each marginal distribution function, the copula parameters were estimated. The Elliptical copula was selected to present the dependence structure of each pairing of the Islamic stock and conventional stock. Specifically, the Islamic versus conventional stocks (Shariah-EMAS and Shariah-KLCI) had lower dependence compared to conventional versus conventional stocks (EMAS-KLCI). These findings suggest that the occurrence of shocks in a conventional stock will not have strong impact on the Islamic stock.

  5. Formalization Modeling on VV&A Process for Warfare Simulation by UML%基于UML的作战仿真VV&A过程形式化建模

    Institute of Scientific and Technical Information of China (English)

    唐见兵; 查亚兵

    2013-01-01

    可信性是作战仿真的生命线,对作战仿真的全生命周期进行校核、验证与确认(Verification,Validation and Accreditation,VV&A)是确保其可信性的重要途径.建立合适的VV&A过程形式化模型是开展作战仿真VV&A过程研究的前提和基础.基于统一建模语言(Unified Modeling Language,UML)分别从用例、静态结构、动态行为及交互等方面对VV&A过程进行形式化建模,建立了作战仿真VV&A过程的用例、类图、活动图及顺序图模型,并给出相应的形式化定义.实践表明:作战仿真VV&A过程形式化建模可以使VV&A的描述规范化、标准化及形式化,便于不同领域人员的相互沟通与交流,以及VV&A工程化应用,促进了VV&A工作顺利开展.%The credibility is the lifeline of warfare simulation. To execute verification, validation and accreditation (VV&A) is an important approach to insure the credibility of warfare simulation system through out the life circle. It is the precondition and foundation to make the right formal model of VV&A process for warfare simulation. In this paper,the formal models of VV&A process is carried out,in which the details of use case,static construction,dynamic activities and interactions are modeled based on UML, and their formalization definitions are put forward. The practice shows that the formalization modeling on VV&A process for warfare simulation by UML can make it standardization, regularization and formalization,which can help the researchers in different domains to communicate with each other. The research of VV&A can be used in engineering,which help the job of VV&A is developed expediently.

  6. Unbiased quantitative testing of conventional orthodontic beliefs.

    Science.gov (United States)

    Baumrind, S

    1998-03-01

    This study used a preexisting database to test in hypothesis from the appropriateness of some common orthodontic beliefs concerning upper first molar displacement and changes in facial morphology associated with conventional full bonded/banded treatment in growing subjects. In an initial pass, the author used data from a stratified random sample of 48 subjects drawn retrospectively from the practice of a single, experienced orthodontist. This sample consisted of 4 subgroups of 12 subjects each: Class I nonextraction, Class I extraction, Class II nonextraction, and Class II extraction. The findings indicate that, relative to the facial profile, chin point did not, on average, displace anteriorly during treatment, either overall or in any subgroup. Relative to the facial profile, Point A became significantly less prominent during treatment, both overall and in each subgroup. The best estimate of the mean displacement of the upper molar cusp relative to superimposition on Anterior Cranial Base was in the mesial direction in each of the four subgroups. In only one extraction subject out of 24 did the cusp appear to be displaced distally. Mesial molar cusp displacement was significantly greater in the Class II extraction subgroup than in the Class II nonextraction subgroup. Relative to superimposition on anatomical "best fit" of maxillary structures, the findings for molar cusp displacement were similar, but even more dramatic. Mean mesial migration was highly significant in both the Class II nonextraction and Class II extraction subgroups. In no subject in the entire sample was distal displacement noted relative to this superimposition. Mean increase in anterior Total Face Height was significantly greater in the Class II extraction subgroup than in the Class II nonextraction subgroup. (This finding was contrary to the author's original expectation.) The generalizability of the findings from the initial pass to other treated growing subjects was then assessed by

  7. More Effective Warfare: Warfare Waged Psychologically

    Science.gov (United States)

    2012-06-01

    Hezbollah as a Case Study, 2–112. 85Schleifer, Psychological Operations, 8. 86 Rodger Shanahan, "Hizballah Rising: The Political Battle for the Loyalty ...getting up in a bedroom, coming out to the balcony to have his morning coffee , getting dressed, putting his combat webbing on, picking up his...Teams Brand IDF Doctrine ’Completely Wrong’," Jane’s Defense Weekly (January 3, 2007): accessed February 1, 2012. 46 forces only as a last resort.155

  8. Status of miniature integrated UV resonance fluorescence and Raman sensors for detection and identification of biochemical warfare agents

    Science.gov (United States)

    Hug, William F.; Bhartia, Rohit; Taspin, Alexandre; Lane, Arthur; Conrad, Pamela; Sijapati, Kripa; Reid, Ray D.

    2005-11-01

    Laser induced native fluorescence (LINF) is the most sensitive method of detection of biological material including microorganisms, virus', and cellular residues. LINF is also a sensitive method of detection for many non-biological materials as well. The specificity with which these materials can be classified depends on the excitation wavelength and the number and location of observation wavelengths. Higher levels of specificity can be obtained using Raman spectroscopy but a much lower levels of sensitivity. Raman spectroscopy has traditionally been employed in the IR to avoid fluorescence. Fluorescence rarely occurs at wavelength below about 270nm. Therefore, when excitation occurs at a wavelength below 250nm, no fluorescence background occurs within the Raman fingerprint region for biological materials. When excitation occurs within electronic resonance bands of the biological target materials, Raman signal enhancement over one million typically occurs. Raman sensitivity within several hundred times fluorescence are possible in the deep UV where most biological materials have strong absorption. Since the Raman and fluorescence emissions occur at different wavelength, both spectra can be observed simultaneously, thereby providing a sensor with unique sensitivity and specificity capability. We will present data on our integrated, deep ultraviolet, LINF/Raman instruments that are being developed for several applications including life detection on Mars as well as biochemical warfare agents on Earth. We will demonstrate the ability to discriminate organic materials based on LINF alone. Together with UV resonance Raman, higher levels of specificity will be demonstrated. In addition, these instruments are being developed as on-line chemical sensors for industrial and municipal waste streams and product quality applications.

  9. Handheld and mobile hyperspectral imaging sensors for wide-area standoff detection of explosives and chemical warfare agents

    Science.gov (United States)

    Gomer, Nathaniel R.; Gardner, Charles W.; Nelson, Matthew P.

    2016-05-01

    Hyperspectral imaging (HSI) is a valuable tool for the investigation and analysis of targets in complex background with a high degree of autonomy. HSI is beneficial for the detection of threat materials on environmental surfaces, where the concentration of the target of interest is often very low and is typically found within complex scenery. Two HSI techniques that have proven to be valuable are Raman and shortwave infrared (SWIR) HSI. Unfortunately, current generation HSI systems have numerous size, weight, and power (SWaP) limitations that make their potential integration onto a handheld or field portable platform difficult. The systems that are field-portable do so by sacrificing system performance, typically by providing an inefficient area search rate, requiring close proximity to the target for screening, and/or eliminating the potential to conduct real-time measurements. To address these shortcomings, ChemImage Sensor Systems (CISS) is developing a variety of wide-field hyperspectral imaging systems. Raman HSI sensors are being developed to overcome two obstacles present in standard Raman detection systems: slow area search rate (due to small laser spot sizes) and lack of eye-safety. SWIR HSI sensors have been integrated into mobile, robot based platforms and handheld variants for the detection of explosives and chemical warfare agents (CWAs). In addition, the fusion of these two technologies into a single system has shown the feasibility of using both techniques concurrently to provide higher probability of detection and lower false alarm rates. This paper will provide background on Raman and SWIR HSI, discuss the applications for these techniques, and provide an overview of novel CISS HSI sensors focused on sensor design and detection results.

  10. Facile hydrolysis-based chemical destruction of the warfare agents VX, GB, and HD by alumina-supported fluoride reagents.

    Science.gov (United States)

    Gershonov, E; Columbus, I; Zafrani, Y

    2009-01-02

    A facile solvent-free hydrolysis (chemical destruction) of the warfare agents VX (O-ethyl S-2-(diisopropylamino)ethyl methylphosphonothioate), GB (O-isopropyl methylphosphonofluoridate or sarin), and HD (2,2'-dichloroethyl sulfide or sulfur mustard) upon reaction with various solid-supported fluoride reagents is described. These solid reagents include different alumina-based powders such as KF/Al(2)O(3), AgF/KF/Al(2)O(3), and KF/Al(2)O(3) enriched by so-called coordinatively unsaturated fluoride ions (termed by us as ECUF-KF/Al(2)O(3)). When adsorbed on these sorbents, the nerve agent VX quickly hydrolyzed (t(1/2) range between 0.1-6.3 h) to the corresponding nontoxic phosphonic acid EMPA as a major product (>90%) and to the relatively toxic desethyl-VX (<10%). The latter byproduct was further hydrolyzed to the nontoxic MPA product (t(1/2) range between 2.2-161 h). The reaction rates and the product distribution were found to be strongly dependent on the nature of the fluoride ions in the KF/Al(2)O(3) matrix and on its water content. All variations of the alumina-supported fluoride reagents studied caused an immediate hydrolysis of the highly toxic GB (t(1/2) < 10 min) to form the corresponding nontoxic phosphonic acid IMPA. A preliminary study of the detoxification of HD on these catalyst supports showed the formation of the nontoxic 1,4-thioxane as a major product together with minor amounts of TDG and vinylic compounds within a few days. The mechanisms and the efficiency of these processes were successfully studied by solid-state (31)P, (13)C, and (19)F MAS NMR.

  11. Real-time, wide-area hyperspectral imaging sensors for standoff detection of explosives and chemical warfare agents

    Science.gov (United States)

    Gomer, Nathaniel R.; Tazik, Shawna; Gardner, Charles W.; Nelson, Matthew P.

    2017-05-01

    Hyperspectral imaging (HSI) is a valuable tool for the detection and analysis of targets located within complex backgrounds. HSI can detect threat materials on environmental surfaces, where the concentration of the target of interest is often very low and is typically found within complex scenery. Unfortunately, current generation HSI systems have size, weight, and power limitations that prohibit their use for field-portable and/or real-time applications. Current generation systems commonly provide an inefficient area search rate, require close proximity to the target for screening, and/or are not capable of making real-time measurements. ChemImage Sensor Systems (CISS) is developing a variety of real-time, wide-field hyperspectral imaging systems that utilize shortwave infrared (SWIR) absorption and Raman spectroscopy. SWIR HSI sensors provide wide-area imagery with at or near real time detection speeds. Raman HSI sensors are being developed to overcome two obstacles present in standard Raman detection systems: slow area search rate (due to small laser spot sizes) and lack of eye-safety. SWIR HSI sensors have been integrated into mobile, robot based platforms and handheld variants for the detection of explosives and chemical warfare agents (CWAs). In addition, the fusion of these two technologies into a single system has shown the feasibility of using both techniques concurrently to provide higher probability of detection and lower false alarm rates. This paper will provide background on Raman and SWIR HSI, discuss the applications for these techniques, and provide an overview of novel CISS HSI sensors focusing on sensor design and detection results.

  12. The framework convention on climate change a convention for sustainable energy development

    Energy Technology Data Exchange (ETDEWEB)

    Hassing, P.; Mendis, M.S.; Menezes, L.M.; Gowen, M.M.

    1996-12-31

    In 1992, over 165 countries signed the United Nation`s Framework Convention on Climate Change (FCCC). These countries have implicitly agreed to alter their `anthropogenic activities` that increase the emissions of greenhouse gases (GHGs) into the atmosphere and deplete the natural sinks for these same greenhouse gases. The energy sector is the major source of the primary anthropogenic GHGs, notably carbon dioxide and methane. The Organization for Economic Co-operation and Development (OECD) countries presently account for the major share of GHG emissions from the energy sector. However, the developing countries are also rapidly increasing their contribution to global GHG emissions as a result of their growing consumption of fossil-based energy. Implementation of this global climate change convention, if seriously undertaken by the signatory countries, will necessitate changes in the energy mix and production processes in both the OECD and developing countries. International actions also will be needed to put the world on a sustainable energy path. By adoption of the FCCC, representatives of the world`s populations have indicated their desire to move toward such a path. The Conference of Parties to the Convention has just concluded its second meeting, at which the Parties endorsed a U.S. proposal that legally binding and enforceable emissions targets be adopted. It is clearly evident that the FCCC, as presently operating, cannot achieve the objective of stabilizing GHG concentrations in the atmosphere unless it adopts a major protocol to significantly reduce anthropogenic GHG emissions. As demonstrated here, a good starting point in determining the steps the Parties to the FCCC should take in designing a protocol is to remember that the primary source of anthropogenic GHG emissions is the consumption of fossil fuels and the future growth of GHG emissions will derive primarily from the ever-increasing demand for and consumption of these fuels.

  13. Effects of feeding high protein or conventional canola meal on dry cured and conventionally cured bacon.

    Science.gov (United States)

    Little, K L; Bohrer, B M; Stein, H H; Boler, D D

    2015-05-01

    Objectives were to compare belly, bacon processing, bacon slice, and sensory characteristics from pigs fed high protein canola meal (CM-HP) or conventional canola meal (CM-CV). Soybean meal was replaced with 0 (control), 33, 66, or 100% of both types of canola meal. Left side bellies from 70 carcasses were randomly assigned to conventional or dry cure treatment and matching right side bellies were assigned the opposite treatment. Secondary objectives were to test the existence of bilateral symmetry on fresh belly characteristics and fatty acid profiles of right and left side bellies originating from the same carcass. Bellies from pigs fed CM-HP were slightly lighter and thinner than bellies from pigs fed CM-CV, yet bacon processing, bacon slice, and sensory characteristics were unaffected by dietary treatment and did not differ from the control. Furthermore, testing the existence of bilateral symmetry on fresh belly characteristics revealed that bellies originating from the right side of the carcasses were slightly (P≤0.05) wider, thicker, heavier and firmer than bellies from the left side of the carcass.

  14. Beyond the conventional: meeting the challenges of landscape governance within the European Landscape Convention?

    Science.gov (United States)

    Scott, Alister

    2011-10-01

    Academics and policy makers seeking to deconstruct landscape face major challenges conceptually, methodologically and institutionally. The meaning(s), identity(ies) and management of landscape are controversial and contested. The European Landscape Convention provides an opportunity for action and change set within new governance agendas addressing interdisciplinarity and spatial planning. This paper critically reviews the complex web of conceptual and methodological frameworks that characterise landscape planning and management and then focuses on emerging landscape governance in Scotland within a mixed method approach involving policy analyses, semi-structured interviews and best practice case studies. Using Dower's (2008) criteria from the Articles of the European Landscape Convention, the results show that whilst some progress has been made in landscape policy and practice, largely through the actions of key individuals and champions, there are significant institutional hurdles and resource limitations to overcome. The need to mainstream positive landscape outcomes requires a significant culture change where a one-size-fits-all approach does not work.

  15. Scaling-up of complex whole-cell bioconversions in conventional and non-conventional media.

    Science.gov (United States)

    Marques, Marco P C; de Carvalho, Carla C C R; Cabral, Joaquim M S; Fernandes, Pedro

    2010-07-01

    The use of whole cells is becoming a more common approach in pharmaceutical and agrochemical industries in order to obtain pure compounds with fewer production steps, higher yields, and cleaner processes, as compared to those achieved with traditional strategies. Whole cells are often used as enzymes pools, in particular when multi-step reactions and/or co-factor regeneration are envisaged. Nonetheless, published information on the scale-up of such systems both in aqueous and in two-phase aqueous-organic systems is relatively scarce. The present work aims to evaluate suitable scale-up criteria in conventional and non-conventional medium for a whole-cell bioconversion that uses resting cells of Mycobacterium sp. NRRL B-3805 to cleave the side chain of beta-sitosterol, a poorly water-soluble substrate. The experiments were performed in 24-well microtiter plates and in 250 mL shaken flasks as orbital stirred systems, and in 300 mL stirred tanks as mechanically stirred systems. Results show that productivity yields were similar in all scales tested, when maintaining oxygen mass transfer coefficients constant in aqueous systems, or when maintaining constant volumetric power consumption in aqueous-organic two-phase systems.

  16. Conventional Prompt Global Strike: Capabilities Today While Planning for Tomorrow

    Science.gov (United States)

    2012-03-19

    invest in a design that will allow new Virginia class submarines to be modified to carry more cruise missiles and develop an undersea conventional...fact_display.asp?cid=2200&tid=1300&ct=2 (accessed 3 February, 2012). Woolf , Amy. Conventional Warheads for Long-Range Ballistic Missiles: Background...M.html (accessed March 2, 2012). 6 John Hundley, Maj, USAF, Personal Interview 7 Amy F. Woolf , Conventional Warheads for Long-Range Ballistic

  17. Isolated iliotibial band rupture after corticosteroid injection as a cause of subjective instability and knee pain in a military special warfare trainee.

    Science.gov (United States)

    Pandit, Sandeep R; Solomon, Daniel J; Gross, Daniel J; Golijanin, Petar; Provencher, Matthew T

    2014-04-01

    Iliotibial band friction syndrome (ITBFS) of the knee is a common overuse injury in athletes, especially in runners. The syndrome occurs when the ITB, a lateral thickening of the fascia lata of the thigh moves repetitively over the lateral femoral condyle. A variety of nonoperative measures are used for ITBFS treatment, including stretching, core strengthening, and therapeutic injection. Isolated distal ITB rupture is a rare entity and has never yet to be reported in the orthopedic literature. We present a case of isolated ITB rupture as a cause of varus instability and knee pain in a Naval Special Warfare candidate diagnosed with ITBFS and previously treated with several local corticosteroid injections before ITB rupture. Because of continued knee pain and a sense of instability, along with an inability to return to his military special warfare duties, the ITB was surgically repaired. This case highlights the presentation and management of isolated distal ITB rupture and discusses some of the potential risk factors for rupture, including prior local corticosteroid injection.

  18. 中国共产党领导的抗日心理战%Anti-Japanese Psychological Warfare Led by the Chinese Communist Party

    Institute of Scientific and Technical Information of China (English)

    及之刚

    2014-01-01

    During the Anti-Japanese War ,the Chinese Communist Party creatively applied the ancient Chinese mili-tary’s psychological warfare and developed psychological tactics .By conducting political psychological attacking and im-plementing POW policy and other measures to constantly shake ,lax and abate enemy psychological defense ,our Party achieved remarkable success because with the development of the war ,the psychological defense of the Japanese invaders gradually collapsed ,and the Chinese people finally won the victory in the Anti-Japanese psychological warfare .%抗日战争中,我党继承和发扬了中国古代兵家的心战思想,创造性地运用和发展了心理战术,取得了举世瞩目的战果。我军民通过开展政治攻心和实施俘虏政策等措施,不断动摇、涣散、消减敌军的士气军心,使日本侵略者的军心随着战争的发展而日渐动摇和瓦解,我国人民最终赢得了抗日心理战的胜利。

  19. Chemical analysis of bleach and hydroxide-based solutions after decontamination of the chemical warfare agent O-ethyl S-2-diisopropylaminoethyl methylphosphonothiolate (VX).

    Science.gov (United States)

    Hopkins, F B; Gravett, M R; Self, A J; Wang, M; Chua, Hoe-Chee; Hoe-Chee, C; Lee, H S Nancy; Sim, N Lee Hoi; Jones, J T A; Timperley, C M; Riches, J R

    2014-08-01

    Detailed chemical analysis of solutions used to decontaminate chemical warfare agents can be used to support verification and forensic attribution. Decontamination solutions are amongst the most difficult matrices for chemical analysis because of their corrosive and potentially emulsion-based nature. Consequently, there are relatively few publications that report their detailed chemical analysis. This paper describes the application of modern analytical techniques to the analysis of decontamination solutions following decontamination of the chemical warfare agent O-ethyl S-2-diisopropylaminoethyl methylphosphonothiolate (VX). We confirm the formation of N,N-diisopropylformamide and N,N-diisopropylamine following decontamination of VX with hypochlorite-based solution, whereas they were not detected in extracts of hydroxide-based decontamination solutions by nuclear magnetic resonance (NMR) spectroscopy or gas chromatography-mass spectrometry. We report the electron ionisation and chemical ionisation mass spectroscopic details, retention indices, and NMR spectra of N,N-diisopropylformamide and N,N-diisopropylamine, as well as analytical methods suitable for their analysis and identification in solvent extracts and decontamination residues.

  20. 信息化条件下计划制定与行动实施的关系%Relationship between planning and execution in information warfare

    Institute of Scientific and Technical Information of China (English)

    田仲; 李加祥

    2013-01-01

    信息化条件下的作战引发了作战指挥方式等一系列的变化,对作战计划制定与作战行动实施的关系也产生了深刻的影响.以信息化条件下“以行动为中心”的作战需求为牵引,以提升作战指挥的适应性和时效性为目的,对不同方式的计划制定与行动实施的关系进行对比分析和研究,提出了适应行动中心方式下的计划制定与行动实施关系,为深入开展信息化条件下的作战指挥研究提供了有益的参考.%Command approaches changes in information operation impact relationship between planning and execution. With the purpose to meet the demands of " operation -centric" in information warfare, and to improve the agility and timeliness for command, different approaches of planning and execution are analyzed and researched, the relationship between planning and execution suit for operation-centric approach is advanced. Therefore,it has reference value for study the command in information warfare.