WorldWideScience

Sample records for defense commander steps

  1. Defense or Diplomacy Geographic Combatant Commands

    Science.gov (United States)

    2011-06-01

    originally ruled by 1 Priest, Dana , The Mission: Waging War and Keeping Peace with America’s Military...events. US Central Command. Dana Priest describes General Zinni‟s experience as a GCC commander, wherein General Zinni found that in many ways...ignored altogether. Dr. James Forsyth and Lt Col Chance Saltzman make this argument in their Air and Space Power Journal article “Stay Out —Why

  2. Defense Contract Management Command Capitalization of Fixed Assets

    National Research Council Canada - National Science Library

    Young, Shelton

    1997-01-01

    The audit objective was to determine whether the Defense Logistics Agency and the Defense Finance and Accounting Service had implemented effective management control procedures and complied with laws...

  3. Centralized Command and Control of Theater Missile Defense: The Joint Force Missile Defense Component Coordinator

    National Research Council Canada - National Science Library

    Bucey, William H

    2006-01-01

    .... The numerous commands, decentralized command and control, and limited and expensive resources involved in TMD require changes to the joint doctrine in order to provide unity of command and economy of force...

  4. Should the Department of Defense Establish a Joint Corrections Command

    National Research Council Canada - National Science Library

    Evans, Thomas P

    2008-01-01

    ... and control element at the combatant command level. The military and the Coalition Provisional Authority's ability to establish a national penal system, conduct standardized training and effective prison operations to rebuild the Iraqi penal system...

  5. Unified Medical Command and Control in the Department of Defense

    Science.gov (United States)

    2012-03-22

    This is the Joint Task Force – Capital Medical (JTF CAPMED ) model, in which organizations, resources, and personnel are aligned under a single...This was demonstrated in the formation of the JTF- CAPMED , designed as a 3-star level command controlling military medical activities in the National...used ground vehicles, helicopters and fixed wing aircraft for strategic casualty evacuation (CASEVAC). Enroute care is standard and critical in

  6. AFRICOM: Combatant Command for the 21st Century

    National Research Council Canada - National Science Library

    Juergens, Jr., Richard A

    2008-01-01

    ...: European Command, Southern Command, Northern Command, Central Command, and Pacific Command, as the Department of Defense's unified command structure responsible for specific geographical regions of the world...

  7. Global Missile Defense: The Case for a New Operational Command Structure

    National Research Council Canada - National Science Library

    Galazin, Jared J

    2005-01-01

    ...), violates the principle of unity of command. Placing components of the BMDS under the control of different combatant commanders creates unnecessary friction in a process where speed of execution is measured in seconds...

  8. Should the Department of Defense Establish a Unified U.S. Logistics Command?

    National Research Council Canada - National Science Library

    Wenzel, Frank

    2008-01-01

    This monograph asserts that DoD should establish a Unified Combatant Command (COCOM)-level U.S. Logistics Command (USLOGCOM). DoD should begin a deliberate 10-20 year process to establish a USLOGCOM...

  9. Posture for Operational Success: Create the Theater Missile Defense Component Commander

    National Research Council Canada - National Science Library

    Hill, M

    1997-01-01

    .... Secondly, TBMs pose threat to the level that if it is subordinated in this manner, that critical operational decisions will he delegated down to levels of command and control that will have severe...

  10. A Goal Programming R&D (Research and Development) Project Funding Model of the U.S. Army Strategic Defense Command Using the Analytic Hierarchy Process.

    Science.gov (United States)

    1987-09-01

    A187 899 A GOAL PROGRANNIN R&D (RESEARCH AND DEVELOPMENT) 1/2 PROJECT FUNDING MODEL 0 (U) NAVAL POSTGRADUATE SCHOOL MONTEREY CA S M ANDERSON SEP 87...PROGRAMMING R&D PROJECT FUNDING MODEL OF THE U.S. ARMY STRATEGIC DEFENSE COMMAND USING THE ANALYTIC HIERARCHY PROCESS by Steven M. Anderson September 1987...jACCESSION NO TITI E (Influde Securt ClauAIcatsrn) A Goal Programming R&D Project Funding Model of the U.S. Army Strategic Defense Command Using the

  11. The defense waste processing facility: the final processing step for defense high-level waste disposal

    International Nuclear Information System (INIS)

    Cowan, S.P.; Sprecher, W.M.; Walton, R.D.

    1983-01-01

    The policy of the U.S. Department of Energy is to pursue an aggressive and credible waste management program that advocates final disposal of government generated (defense) high-level nuclear wastes in a manner consistent with environmental, health, and safety responsibilities and requirements. The Defense Waste Processing Facility (DWPF) is an essential component of the Department's program. It is the first project undertaken in the United States to immobilize government generated high-level nuclear wastes for geologic disposal. The DWPF will be built at the Department's Savannah River Plant near Aiken, South Carolina. When construction is complete in 1989, the DWPF will begin processing the high-level waste at the Savannah River Plant into a borosilicate glass form, a highly insoluble and non-dispersable product, in easily handled canisters. The immobilized waste will be stored on site followed by transportation to and disposal in a Federal repository. The focus of this paper is on the DWPF. The paper discusses issues which justify the project, summarizes its technical attributes, analyzes relevant environmental and insitutional factors, describes the management approach followed in transforming technical and other concepts into concrete and steel, and concludes with observations about the future role of the facility

  12. HALE UAS Command and Control Communications: Step 1 - Functional Requirements Document. Version 4.0

    Science.gov (United States)

    2006-01-01

    The High Altitude Long Endurance (HALE) unmanned aircraft system (UAS) communicates with an off-board pilot-in-command in all flight phases via the C2 data link, making it a critical component for the UA to fly in the NAS safely and routinely. This is a new requirement in current FAA communications planning and monitoring processes. This document provides a set of comprehensive C2 communications functional requirements and performance guidelines to help facilitate the future FAA certification process for civil UAS to operate in the NAS. The objective of the guidelines is to provide the ability to validate the functional requirements and in future be used to develop performance-level requirements.

  13. 32 CFR 724.406 - Commander, Naval Medical Command.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Commander, Naval Medical Command. 724.406 Section 724.406 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY PERSONNEL NAVAL DISCHARGE REVIEW BOARD Principal Elements of the Navy Department Discharge Review System § 724.406 Commander...

  14. Year 2000 Compliance of Selected Mission Critical Command, Control, and Communications Systems Managed by The Defense Information Systems Agency

    National Research Council Canada - National Science Library

    1999-01-01

    ...) has adequately planned for and managed year 2000 conversion risks to avoid undue disruption to selected mission critical command, control, and communications systems used in support of Unified...

  15. Global Command and Control Management Structure

    National Research Council Canada - National Science Library

    1995-01-01

    This instruction establishes: responsibilities for the Joint Staff, Services, Defense agencies, combatant and functional unified commands, and other activities regarding management of Global Command and Control (GCC...

  16. A Smarter Common Operational Picture : The Application of Cognitive Work Analysis to Naval Command and Control.

    NARCIS (Netherlands)

    Arciszewski, H.F.R.; Greef, T.E. de

    2011-01-01

    During the last ten years significant steps have been made in connecting military command and control systems from different defense forces in joint and combined operations. However, a common operational picture (COP) that provides all actors within the defense organization with sufficient,

  17. Regional Joint-Integrated Air and Missile Defense (RF-IAMD): An Operational Level Integrated Air and Missile Defense (IAMD) Command and Control (C2) Organization

    Science.gov (United States)

    2015-05-15

    Accessed April 26, 2015, http://www.state.gov/t/ avc /rls/2014/226073.html 24 Pacific Air Forces, PACAF establishes Pacific IAMD Center, Accessed April...U.S. Department of State. Gulf Cooperation Council and Ballistic Missile Defense. Accessed April 26, 2015. http://www.state.gov/t/ avc /rls/2014

  18. Maturing Defense Support of Civil Authorities and the Dual Status Commander Arrangement Through the Lens of Process Improvement

    Science.gov (United States)

    2015-04-01

    and complex problem solvers. Concurrently, it is our duty to the U.S. Army to also act as a “think factory” for commanders and civilian leaders at...conversation among policymakers and military strategists alike. In this context, there is a philosophical conflict between federalism and state sovereignty ...peatable, and predictable practices. By deconstructing complex processes into individual and related prac- tices or actions, process improvement offers

  19. 32 CFR 700.1053 - Commander of a task force.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Commander of a task force. 700.1053 Section 700... Command Detail to Duty § 700.1053 Commander of a task force. (a) A geographic fleet commander, and any other naval commander, may detail in command of a task force, or other task command, any eligible...

  20. 32 CFR 215.7 - Command relationships.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Command relationships. 215.7 Section 215.7 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) MISCELLANEOUS EMPLOYMENT OF MILITARY RESOURCES IN THE EVENT OF CIVIL DISTURBANCES § 215.7 Command relationships...

  1. Applications of Artificial Intelligence to the Strategic Defense Initiative’s Battle Management/Command and Control Objective.

    Science.gov (United States)

    1985-09-01

    technology issue is expected to take years of research (20:11). According to Lt Gen James A. Abrahamson, director of the SDI organization heading up...from occurring (14:79). A Wqhite House Panel known as the (Dr. James ) Fletcher Defensive Technologies Study Group has pointed out that, in the past...Handbook of Artificial Intelligence. Volume I. Los Altos CA: WilliamKaufmann Inc., 1981. 5. Basden , Andrew. "On the Application of Expert Systems,N

  2. 32 CFR 700.1054 - Command of a naval base.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Command of a naval base. 700.1054 Section 700.1054 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY... Command Detail to Duty § 700.1054 Command of a naval base. The officer detailed to command a naval base...

  3. Step 1: Human System Integration (HSI) FY05 Pilot-Technology Interface Requirements for Command, Control, and Communications (C3)

    Science.gov (United States)

    2005-01-01

    The document provides the Human System Integration(HSI) high-level functional C3 HSI requirements for the interface to the pilot. Description includes (1) the information required by the pilot to have knowledge C3 system status, and (2) the control capability needed by the pilot to obtain C3 information. Fundamentally, these requirements provide the candidate C3 technology concepts with the necessary human-related elements to make them compatible with human capabilities and limitations. The results of the analysis describe how C3 operations and functions should interface with the pilot to provide the necessary C3 functionality to the UA-pilot system. Requirements and guidelines for C3 are partitioned into three categories: (1) Pilot-Air Traffic Control (ATC) Voice Communications (2) Pilot-ATC Data Communications, and (3) command and control of the unmanned aircraft (UA). Each requirement is stated and is supported with a rationale and associated reference(s).

  4. 32 CFR 552.65 - Command supervision.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Command supervision. 552.65 Section 552.65 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY MILITARY RESERVATIONS AND NATIONAL CEMETERIES REGULATIONS AFFECTING MILITARY RESERVATIONS Solicitation on Military Reservations § 552.65 Command supervision. (a) All insurance...

  5. 76 FR 19893 - Unified Command Plan 2011

    Science.gov (United States)

    2011-04-08

    ... Plan 2011 Memorandum for the Secretary of Defense Pursuant to my authority as Commander in Chief, I hereby approve and direct the implementation of the revised Unified Command Plan. Consistent with title...

  6. 32 CFR 700.1056 - Command of a ship.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Command of a ship. 700.1056 Section 700.1056 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY REGULATIONS AND OFFICIAL RECORDS UNITED STATES NAVY REGULATIONS AND OFFICIAL RECORDS Precedence, Authority and Command Detail to Duty § 700.1056 Command of a...

  7. A smarter common operational picture : The application of abstraction hierarchies to naval command and control

    NARCIS (Netherlands)

    Arciszewski, H.F.R.; De Greef, T.E.

    2011-01-01

    The last decade shows significant steps in connecting military command and control systems from different defense forces optimizing joint and combined operations. However, a Common Operational Picture (COP) that provides all actors with sufficient, accurate, and timely information is still an

  8. Command World

    National Research Council Canada - National Science Library

    Wong, Leah Y; Lange, Douglas S; Sebastyn, Jerome T; Roof, William H

    2006-01-01

    .... The Command World scenario was expressly designed as a crisis action planning exercise in order to replicate the communications, collaboration, and information requirements inherent in a military...

  9. Contractor Support on the Battlefield -- Increased Reliance Requires Commander's Attention

    National Research Council Canada - National Science Library

    Maloney, Kathy J

    2006-01-01

    .... Department of Defense initiatives to adopt a leaner business strategy, increase efficiency, and reduce expenditures have exposed the battlefield commander to additional operational risk centered...

  10. Focused Logistics: Time for Functional Command

    National Research Council Canada - National Science Library

    Mintzlaff, Jeffrey G

    2005-01-01

    .... Military's distribution system -- the parts of the Department of Defense (DoD) that manage and execute the storage and movement of supplies to military customers -- consists of multiple entities and agencies made up of separate Services and commands...

  11. 32 CFR 536.3 - Command and organizational relationships.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Command and organizational relationships. 536.3 Section 536.3 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY CLAIMS AND... relationships. (a) The Secretary of the Army. The Secretary of the Army (SA) heads the Army Claims System and...

  12. 32 CFR 700.880 - Duties of the prospective commanding officer of a ship.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Duties of the prospective commanding officer of a ship. 700.880 Section 700.880 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY REGULATIONS AND OFFICIAL RECORDS UNITED STATES NAVY REGULATIONS AND OFFICIAL RECORDS The Commanding Officer Special...

  13. 32 CFR Appendix E to Part 247 - DoD Command Newspaper and Magazine Review System

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false DoD Command Newspaper and Magazine Review System... OF DEFENSE (CONTINUED) MISCELLANEOUS DEPARTMENT OF DEFENSE NEWSPAPERS, MAGAZINES AND CIVILIAN ENTERPRISE PUBLICATIONS Pt. 247, App. E Appendix E to Part 247—DoD Command Newspaper and Magazine Review...

  14. Commanders' Survey: School for Command Preparation Feedback

    National Research Council Canada - National Science Library

    Frame, Adela

    1997-01-01

    .... All command designees attend the PreCommand Course (PCC). PCC provides common understanding of current doctrine, and up-to-date information on Army-wide policy, programs and special items of interest...

  15. Opening the Aperture... Ending Service "Branding" of US Unified Commands

    National Research Council Canada - National Science Library

    Handy, Russell

    2003-01-01

    .... It asserts that over tine, the defense establishment runs the risk of establishing a cultural identity in the command that limits perspectives to aground-, sea-, or air and space-centric viewpoint...

  16. An Assessment of Engineered Calcium Oxalate Crystal Formation on Plant Growth and Development as a Step toward Evaluating Its Use to Enhance Plant Defense.

    Directory of Open Access Journals (Sweden)

    Paul A Nakata

    Full Text Available The establishment of new approaches to control chewing insects has been sought not only for direct use in reducing crop loss but also in managing resistance to the pesticides already in use. Engineered formation of calcium oxalate crystals is a potential strategy that could be developed to fulfill both these needs. As a step toward this development, this study investigates the effects of transforming a non-calcium oxalate crystal accumulating plant, Arabidopsis thaliana, into a crystal accumulating plant. Calcium oxalate crystal accumulating A. thaliana lines were generated by ectopic expression of a single bacterial gene encoding an oxalic acid biosynthetic enzyme. Biochemical and cellular studies suggested that the engineered A. thaliana lines formed crystals of calcium oxalate in a manner similar to naturally occurring crystal accumulating plants. The amount of calcium oxalate accumulated in leaves also reached levels similar to those measured in the leaves of Medicago truncatula in which the crystals are known to play a defensive role. Visual inspection of the different engineered lines, however, suggested a phenotypic consequence on plant growth and development with higher calcium oxalate concentrations. The restoration of a near wild-type plant phenotype through an enzymatic reduction of tissue oxalate supported this observation. Overall, this study is a first to provide initial insight into the potential consequences of engineering calcium oxalate crystal formation in non-crystal accumulating plants.

  17. Command Leadership DEOCS 4.1 Construct Validity Summary

    Science.gov (United States)

    2017-08-01

    Command Leadership DEOCS 4.1 Construct Validity Summary DEFENSE EQUAL OPPORTUNITY MANAGEMENT INSTITUTE...Report #15-18 1 Command Leadership DEOCS 4.1 Construct Validity Summary Background In 2014, DEOMI released DEOCS 4.0 for Department of Defense...individual items on the DEOCS. The following paper details the work conducted to modify the factor of Leadership Cohesion so that it focuses more

  18. 32 CFR 809a.10 - Military commanders' responsibilities.

    Science.gov (United States)

    2010-07-01

    ... authorities as soon as possible. (c) Military forces will ordinarily exercise police powers previously... 32 National Defense 6 2010-07-01 2010-07-01 false Military commanders' responsibilities. 809a.10... Disturbance Intervention and Disaster Assistance § 809a.10 Military commanders' responsibilities. (a...

  19. A Novel wave-form command shaper for overhead cranes

    Directory of Open Access Journals (Sweden)

    KHALED ALHAZZA

    2013-12-01

    Full Text Available In this work, a novel command shaping control strategy for oscillation reduction of simple harmonic oscillators is proposed, and validated experimentally. A wave-form acceleration command shaper is derived analytically. The performance of the proposed shaper is simulated numerically, and validated experimentally on a scaled model of an overhead crane. Amplitude modulation is used to enhance the shaper performance, which results in a modulated wave-form command shaper. It is determined that the proposed wave-form and modulated wave-form command shaper profiles are capable of eliminating travel and residual oscillations. Furthermore, unlike traditional impulse and step command shapers, the proposed command shaper has piecewise smoother acceleration, velocity, and displacement profiles. Experimental results using continuous and discrete commands are presented. Experiments with discrete commands involved embedding a saturation model-based feedback in the algorithm of the command shaper.

  20. Department of Defense perspective

    International Nuclear Information System (INIS)

    Devine, R.

    1985-01-01

    This paper examines radiation instrumentation from the Department of Defense perspective. Radiation survey instruments and calibration, or RADIAC, as it is called in the services, while administratively falling under the Assistant Secretary of Defense for Atomic Energy, has generally been managed at a lower level. The Naval Electronics Systems Command and Army Signal Corp are the two principles in the Department of Defense for RADIAC. The actions of the services are coordinated through the tri-service RADIAC working group, which meets about every year and a half. Several points from this organization are highlighted

  1. Veiled Normalization: The Implications of Japanese Missile Defense

    National Research Council Canada - National Science Library

    Clarke, Timothy L

    2008-01-01

    Japan's development of a missile defense system has been accompanied by the acquisition of potentially offensive military assets, an increased command and control capability, significant restructuring...

  2. 76 FR 14950 - Closed Meeting of the U.S. Strategic Command Strategic Advisory Group

    Science.gov (United States)

    2011-03-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the U.S. Strategic Command Strategic Advisory Group AGENCY: Department of Defense. ACTION: Notice of advisory committee closed meeting.... Strategic Command Strategic Advisory Group. DATES: April 7, 2011, from 8 a.m. to 5 p.m. and April 8, 2011...

  3. SOA approach to battle command: simulation interoperability

    Science.gov (United States)

    Mayott, Gregory; Self, Mid; Miller, Gordon J.; McDonnell, Joseph S.

    2010-04-01

    NVESD is developing a Sensor Data and Management Services (SDMS) Service Oriented Architecture (SOA) that provides an innovative approach to achieve seamless application functionality across simulation and battle command systems. In 2010, CERDEC will conduct a SDMS Battle Command demonstration that will highlight the SDMS SOA capability to couple simulation applications to existing Battle Command systems. The demonstration will leverage RDECOM MATREX simulation tools and TRADOC Maneuver Support Battle Laboratory Virtual Base Defense Operations Center facilities. The battle command systems are those specific to the operation of a base defense operations center in support of force protection missions. The SDMS SOA consists of four components that will be discussed. An Asset Management Service (AMS) will automatically discover the existence, state, and interface definition required to interact with a named asset (sensor or a sensor platform, a process such as level-1 fusion, or an interface to a sensor or other network endpoint). A Streaming Video Service (SVS) will automatically discover the existence, state, and interfaces required to interact with a named video stream, and abstract the consumers of the video stream from the originating device. A Task Manager Service (TMS) will be used to automatically discover the existence of a named mission task, and will interpret, translate and transmit a mission command for the blue force unit(s) described in a mission order. JC3IEDM data objects, and software development kit (SDK), will be utilized as the basic data object definition for implemented web services.

  4. US command improvements and command vulnerability

    International Nuclear Information System (INIS)

    Ball, D.; Bethe, H.A.; Blair, B.G.; Bracken, P.; Carter, A.B.; Dickinson, H.; Garwin, R.L.; Holloway, D.; Kendall, H.W.

    1988-01-01

    In essence, the United States still relies on the strategic command system erected during the 1960s and 1970s, but as we have seen, this system suffers from a number of serious weaknesses. Among these the authors emphasized the vulnerability of vital communications even before any warheads impact directly on U.S. targets, as well as the systems; heavy reliance on a relatively small number of limited-endurance aircraft as command posts and radio relays. This paper focuses on the committed improvement program, assess its impact on command vulnerability, and offer suggestions for further command improvements designed to enhance crisis stability and to facilitate ware termination should deterrence fail. The reader should note that this chapter is rather more technical than the remainder of this book

  5. 77 FR 25706 - Notice of Advisory Committee Closed Meeting; U.S. Strategic Command Strategic Advisory Group

    Science.gov (United States)

    2012-05-01

    ... DEPARTMENT OF DEFENSE Notice of Advisory Committee Closed Meeting; U.S. Strategic Command Strategic Advisory Group AGENCY: Department of Defense. ACTION: Notice of Advisory Committee closed meeting.... [[Page 25707

  6. Defense.gov - Special Report - Cybersecurity

    Science.gov (United States)

    reduce vulnerability to cyber-attack attempts that occur regularly and are likely to continue for the together to protect cyberspace. U.S. Cyber Command Preparations Under Way WASHINGTON, March 16, 2010 - Preparations for the formal establishment of U.S. Cyber Command, which will operate and defend the Defense

  7. Cyber Professionals in the Military and Industry-Partnering in Defense of the Nation: A Conversation between Maj Gen Suzanne Vautrinot, Commander, Twenty-Fourth Air Force, and Mr. Charles Beard, Chief Information Officer, Science Applications International Corporation

    Science.gov (United States)

    2013-01-01

    what truly had to be protected and where we would establish trust. The results of that exercise materially changed our defense-in-depth strategy...vice president for Global Transportation and Industrial Markets at KPMG Consulting (later BearingPoint), leading the company’s strat- egy and

  8. 76 FR 52642 - Notice of Advisory Committee Closed Meeting; U.S. Strategic Command Strategic Advisory Group

    Science.gov (United States)

    2011-08-23

    ... DEPARTMENT OF DEFENSE Notice of Advisory Committee Closed Meeting; U.S. Strategic Command Strategic Advisory Group AGENCY: Department of Defense. ACTION: Notice of Advisory Committee closed meeting.... Strategic Command Strategic Advisory Group. DATES: November 1, 2011, from 8 a.m. to 5 p.m. and November 2...

  9. The Evolving Role of the Army National Guard in Homeland Defense and Civil Support

    National Research Council Canada - National Science Library

    Rooney, Joseph

    2004-01-01

    .... To further unify the military effort U.S. Northern Command (NORTHCOM) has been created as a North American combatant command charged with the dual missions of homeland defense and civil support...

  10. Strategic Global Climate Command?

    Science.gov (United States)

    Long, J. C. S.

    2016-12-01

    Researchers have been exploring geoengineering because Anthropogenic GHG emissions could drive the globe towards unihabitability for people, wildlife and vegetation. Potential global deployment of these technologies is inherently strategic. For example, solar radiation management to reflect more sunlight might be strategically useful during a period of time where the population completes an effort to cease emissions and carbon removal technologies might then be strategically deployed to move the atmospheric concentrations back to a safer level. Consequently, deployment of these global technologies requires the ability to think and act strategically on the part of the planet's governments. Such capacity most definitely does not exist today but it behooves scientists and engineers to be involved in thinking through how global command might develop because the way they do the research could support the development of a capacity to deploy intervention rationally -- or irrationally. Internationalizing research would get countries used to working together. Organizing the research in a step-wise manner where at each step scientists become skilled at explaining what they have learned, the quality of the information they have, what they don't know and what more they can do to reduce or handle uncertainty, etc. Such a process can increase societal confidence in being able to make wise decisions about deployment. Global capacity will also be enhanced if the sceintific establishment reinvents misssion driven research so that the programs will identify the systemic issues invovled in any proposed technology and systematically address them with research while still encouraging individual creativity. Geoengineering will diverge from climate science in that geoengineering research needs to design interventions for some publically desirable goal and investigates whether a proposed intervention will acheive desired outcomes. The effort must be a systems-engineering design problem

  11. Command Relationships of Active and National Guard Forces During Domestic Disaster Response in California

    National Research Council Canada - National Science Library

    Rabe, Richard A

    2007-01-01

    ... and responding to different authorities. How authorities establish command relationships and form new organizations between these forces contributes to unity of effort during Defense Support to Civil Authorities operations...

  12. Evolutionary Acquisition of the Global Command and Control System: Lessons Learned

    National Research Council Canada - National Science Library

    Wallis, Johnathan

    1998-01-01

    This paper summarizes a "lessons learned" study that reviews DoD's approach to managing the GCCS program on behalf on the Assistant Secretary of Defense for Command, Control, Communications, and Intelligence (ASD/C3I...

  13. ARAC: A unique command and control resource

    International Nuclear Information System (INIS)

    Bradley, M.M.; Baskett, R.L.; Ellis, J.S.

    1996-04-01

    The Atmospheric Release Advisory Capability (ARAC) at Lawrence Livermore National Laboratory (LLNL) is a centralized federal facility designed to provide real-time, world-wide support to military and civilian command and control centers by predicting the impacts of inadvertent or intentional releases of nuclear, biological, or chemical materials into the atmosphere. ARAC is a complete response system consisting of highly trained and experienced personnel, continually updated computer models, redundant data collection systems, and centralized and remote computer systems. With over 20 years of experience responding to domestic and international incidents, strong linkages with the Department of Defense, and the ability to conduct classified operations, ARAC is a unique command and control resource

  14. ARAC: A unique command and control resource

    Energy Technology Data Exchange (ETDEWEB)

    Bradley, M.M.; Baskett, R.L.; Ellis, J.S. [and others

    1996-04-01

    The Atmospheric Release Advisory Capability (ARAC) at Lawrence Livermore National Laboratory (LLNL) is a centralized federal facility designed to provide real-time, world-wide support to military and civilian command and control centers by predicting the impacts of inadvertent or intentional releases of nuclear, biological, or chemical materials into the atmosphere. ARAC is a complete response system consisting of highly trained and experienced personnel, continually updated computer models, redundant data collection systems, and centralized and remote computer systems. With over 20 years of experience responding to domestic and international incidents, strong linkages with the Department of Defense, and the ability to conduct classified operations, ARAC is a unique command and control resource.

  15. 32 CFR 884.17 - Commander's instruction letter to member.

    Science.gov (United States)

    2010-07-01

    ... instruction letter to member. Subject: Instructions in Case of Release on Bail or Personal Recognizance 1. You... 32 National Defense 6 2010-07-01 2010-07-01 false Commander's instruction letter to member. 884.17... civilian custody on bail or on your own recognizance, report immediately in person or by telephone to the...

  16. 32 CFR 635.23 - DA Form 4833 (Commander's Report of Disciplinary or Administrative Action).

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true DA Form 4833 (Commander's Report of Disciplinary... Offense Reporting § 635.23 DA Form 4833 (Commander's Report of Disciplinary or Administrative Action). (a) Use. DA Form 4833 is used with DA Form 3975 to— (1) Record actions taken against identified offenders...

  17. Command and Control Software Development

    Science.gov (United States)

    Wallace, Michael

    2018-01-01

    The future of the National Aeronautics and Space Administration (NASA) depends on its innovation and efficiency in the coming years. With ambitious goals to reach Mars and explore the vast universe, correct steps must be taken to ensure our space program reaches its destination safely. The interns in the Exploration Systems and Operations Division at the Kennedy Space Center (KSC) have been tasked with building command line tools to ease the process of managing and testing the data being produced by the ground control systems while its recording system is not in use. While working alongside full-time engineers, we were able to create multiple programs that reduce the cost and time it takes to test the subsystems that launch rockets to outer space.

  18. Command History for 1990

    Science.gov (United States)

    1991-05-01

    Marine Corps Tiaining Systems (CBESS) memorization training Inteligence Center, Dam Neck Threat memorization training Commander Tactical Wings, Atlantic...News Shipbuilding Technical training AEGIS Training Center, Dare Artificial Intelligence (Al) Tools Computerized firm-end analysis tools NETSCPAC...Technology Department and provides computational and electronic mail support for research in areas of artificial intelligence, computer-assisted instruction

  19. Command Home Page

    Science.gov (United States)

    Inclusion And Diversity Navy Standard Integrated Personnel System (NSIPS) My Navy Portal Board of One Source USA.gov U.S. Office of Special Counsel Social Media Directory and Policy US Navy App Locker Navy Personnel Command (NPC) Navy SAPR Navy EEO Inclusion And Diversity Navy Standard Integrated

  20. Combatant Commanders Informational Series, USEUCOM

    National Research Council Canada - National Science Library

    Burton, Steven

    1996-01-01

    ...) and the diverse challenges it faces require it to maintain one of the highest operational and personnel tempos of the combatant command, are limited in the opportunity of personnel new to the command...

  1. Transforming Defense

    National Research Council Canada - National Science Library

    Lamb, Christopher J; Bunn, M. E; Lutes, Charles; Cavoli, Christopher

    2005-01-01

    .... Despite the resources and attention consumed by the war on terror, and recent decisions by the White House to curtail the growth of defense spending, the senior leadership of the Department of Defense (DoD...

  2. Command and motivation

    DEFF Research Database (Denmark)

    Jacobsen, Christian Bøtcher; Hvidtved, Johan; Andersen, Lotte Bøgh

    2014-01-01

    Motivated employees are crucial to organizations, but external interventions such as command systems and financial incentives may decrease motivation. If these external interventions are perceived to be controlling, they are expected to crowd out intrinsic motivation, and this may also apply...... to other types of autonomous motivation such as public service motivation. The perception of external interventions is thus expected to be vital. This article investigates how the perception of a specific command system (obligatory student plans) is associated with intrinsic motivation and public service...... motivation. Using a dataset with 3,230 school teachers in Denmark, a structural equation model shows that the perception of obligatory student plans as controlling is negatively associated with all of the investigated types of employee motivation, supporting that motivation crowding can occur....

  3. Joint Mission Command Implementation

    Science.gov (United States)

    2016-01-22

    choose. The paper finds that trust is strongly influenced by the subconscious brain and treating it like a tool ignores biology and results in... bias for action and empowerment.14 Since then, the services have evaluated their own concepts of command assessing them against Dempsey’s vision. Lt...understanding, intent, and trust, only trust is strongly influenced by the subconscious brain. Treating trust like it can be taught, or a behavior that

  4. Defense Acquisitions Acronyms and Terms

    Science.gov (United States)

    2012-12-01

    DR Decision Review DRMO Defense Reutilization Marketing Office DRPM Direct Reporting Program Manager DSAA Defense Security Assistance Agency...STE Special Test Equipment STEP Simulation, Test, and Evaluation Process STLDD Software Top Level Design Document STP Software Test Plan STPR...established catalog or market prices for specific tasks under standard commercial terms and conditions; this does not include services sold based

  5. Force Protection and Command Relationships: Who's Responsible

    National Research Council Canada - National Science Library

    Moller, James

    1998-01-01

    .... This monograph analyzes the joint force protection program by investigating the terms: command, chain of command, command relationship, and how these terms authorize and empower a commander to implement this program across the joint force...

  6. Defensive Passivity in Adolescence

    Science.gov (United States)

    Rosenheim, Eliyahu; Gaoni, Bracha

    1977-01-01

    There are potentially healthy adolescents who display excessive reluctance to move toward independent decision and action. This research presents a clinical description of this "syndrome", conceptualizes it as a defensive maneuver against mourning over cherished childhood dreams and offers steps for therapeutic intervention. (Editor/RK)

  7. Command History, 1993.

    Science.gov (United States)

    1994-04-01

    his space capsule. The ()CUILAR COtJNTI:,RROI,.L I)FVICI" was built by the Naval Air Rework Facility, NAS Pensacola. tfor NAMRI, in the early 1960s...Dunwoody, GA Kevin G. Singleton, ENS USNR Naval Aviation Schools Command Kyle W M. Taylor, ENS USNR U.S. Naval Academy Jason A. Temple, ENS USNR Auburn...Pensacola, 13-15 Oct 93. Pokorski, T.L., LICDR MSC USN, attended Aircrew Modified IEquipment for Ladies in Aviation (AMELIA) Fri -service Long-range Planning

  8. Department of Defense Involvement in Homeland Security: The Militarization of the Southwestern Border in the U.S

    National Research Council Canada - National Science Library

    Thompson, Michael A

    2008-01-01

    .... The Department of Defense (DoD) was given the lead role in Homeland Defense and it directed the U.S. Northern Command (USNORTHCOM) to implement plans and policies to defend against future terrorist attacks...

  9. Foresight for commanders: a methodology to assist planning for effects-based operations

    Science.gov (United States)

    Davis, Paul K.; Kahan, James P.

    2006-05-01

    Looking at the battlespace as a system of systems is a cornerstone of Effects-Based Operations and a key element in the planning of such operations, and in developing the Commander's Predictive Environment. Instead of a physical battleground to be approached with weapons of force, the battlespace is an interrelated super-system of political, military, economic, social, information and infrastructure systems to be approached with diplomatic, informational, military and economic actions. A concept that has proved useful in policy arenas other than defense, such as research and development for information technology, addressing cybercrime, and providing appropriate and cost-effective health care, is foresight. In this paper, we provide an overview of how the foresight approach addresses the inherent uncertainties in planning courses of action, present a set of steps in the conduct of foresight, and then illustrate the application of foresight to a commander's decision problem. We conclude that foresight approach that we describe is consistent with current doctrinal intelligence preparation of the battlespace and operational planning, but represents an advance in that it explicitly addresses the uncertainties in the environment and planning in a way that identifies strategies that are robust over different possible ground truths. It should supplement other planning methods.

  10. Combating Terrorism: North American Aerospace Defense Command Versus Asymmetric Threats

    Science.gov (United States)

    2016-02-01

    surveillance, and reconnaisance (ISR) platforms, human intelligence (HUMINT) from espionage, and open-source intelligence ( OSINT ), which is putting... OSINT : open-source intelligence OTH-B: over-the-horizon-backscatter PAVE PAWS: Perimeter Acquisition Vehicle Entry Phased Array Warning System

  11. Defense Contract Management Command Support to System Acquisition Program Managers

    National Research Council Canada - National Science Library

    1999-01-01

    .... This report discusses the planning of contract administration office support to system acquisition program managers through the program integration process and the customer support outreach program...

  12. Centralized Offense, Decentralized Defense: Command and Control of Cyberspace

    Science.gov (United States)

    2012-06-01

    emphasizing that a healthy cyberspace is essential to the nation’s economy and security.12 Missing from this definition was an emphasis that...global information grid ( GIG ).11 9 McDougall, The Heavens and the Earth, 84. 10 Antione Bousquet, The Scientific Way of Warfare: Order and Chaos on...outside influence is a significant piece of this puzzle. It is common for the United States government’s global information grid ( GIG ) to be attacked

  13. Organizational Structure Analysis: Space and Missile Defense Command - Sensors Directorate

    National Research Council Canada - National Science Library

    Blake, Stephen

    1999-01-01

    .... Why make things difficult and change? Through the responses from a survey instrument, this capstone project assesses an Army organization and defines the current organizational structure, the advantages and disadvantages of the structure...

  14. Defense.gov Special Report: Fiscal Budget

    Science.gov (United States)

    Department of Defense Submit Search 2012 Fiscal Budget Published Feb. 15, 2011 Top Stories Commanders Cite Department is losing billions of dollars by Congress' failure to pass the department's fiscal 2011 budget . Gates told a Senate committee. Story Gates, Mullen Take Budget to Senate WASHINGTON, Feb. 17, 2011 - The

  15. Defense Headquarters: Geographic Combatant Commands Rely on Subordinate Commands for Mission Management and Execution

    Science.gov (United States)

    2016-06-30

    Committee announced his priorities which included a review of DOD’s organization and lines of authority established as a result of the Goldwater...See enclosure). This report formally transmits an updated briefing and communicates the final results of our work. To describe DOD’s allocation of...its mission to manage the detention facility at Guantanamo Bay, Cuba to Joint Task Force Guantanamo (JTF-GTMO). However, the extent to which each

  16. Introduction to Command, Control and Communications (C3) through comparative case analysis

    OpenAIRE

    Berg, Scott A.

    1990-01-01

    Approved for public rerlease; distribution is unlimited This thesis contains material for the course, Introduction to Command, Control and Communications (C3). The first part of the thesis describes selected principles and concepts of C3 related to communication management, interoperability, command structure and standardization. The Crisis Action System is described emphasizing the roles and functions of the Joint Chiefs of Staff and the Office of the Secretary of Defense. A discussion of...

  17. Sharpening the Tip of the Spear: Preparing Special Forces Detachment Commanders for the Future

    Science.gov (United States)

    2008-05-19

    Persian Farsi, Korean, and Thai ) is 24 weeks long. Soldiers must successfully pass the Defense Language Proficiency Test (DLPT) by demonstrating...Brief (Fort Bragg, NC: 2007), 2. 29 real world GWOT project in coordination with one of the Theatre Special Operation Commands (TSOC).89 Weeks 13...Forces (JSOTF) with parallel major general Division commanders within theatre ? A second suggestion for future research begins with the question

  18. Planetary Defense

    Science.gov (United States)

    2016-05-01

    4 Abstract Planetary defense against asteroids should be a major concern for every government in the world . Millions of asteroids and...helps make Planetary Defense viable because defending the Earth against asteroids benefits from all the above technologies. So if our planet security...information about their physical characteristics so we can employ the right strategies. It is a crucial difference if asteroids are made up of metal

  19. Paramount Interest: Command Relationships in Amphibious Warfare

    National Research Council Canada - National Science Library

    Peabody, Hitch

    2004-01-01

    In 2001, U.S. amphibious forces abandoned sixty years of established command and control doctrine, replacing the traditional senior-subordinate relationship between Navy and Marine commanders with coequal command. Why did it change...

  20. Command in a field hospital.

    Science.gov (United States)

    Bricknell, M C M

    2003-03-01

    This paper examines the challenges involved in commanding a field hospital. There are frequent, dynamic tensions between the military culture that is based on a task-focussed, hierarchical structure and the clinical culture that is based on flat, process-focussed, multidisciplinary teams. The paper outlines the cultural environment of the field hospital and then examines the deployment sequence whereby a functioning clinical facility may be created from a group of disparate individuals. There are a number of tools that may assist with this including the personality of the Commanding Officer, individual skills, the creation of an organizational identity and the choice of command structure.

  1. Command and Control of Joint Air Operations through Mission Command

    Science.gov (United States)

    2016-06-01

    and outlines the C2 architecture systems, processes, and philosophy of com- mand required to enable mission command effectively. Mission Command...General Dempsey highlights the fact that “trust is the moral sinew that binds the distributed Joint Force 2020 together” and observes that “unless...con- fident about how their subordinates will make decisions and adapt to the dynamic battlespace environment. Processes, Systems, and Philosophy of

  2. Teaching Bibliometric Analysis and MS/DOS Commands.

    Science.gov (United States)

    Dou, Henri; And Others

    1988-01-01

    Outlines the steps involved in bibliometric studies, and demonstrates the ability to execute simple studies on microcomputers by downloading files using only the capability of MS/DOS. Detailed illustrations of the MS/DOS commands used are provided. (eight references) (CLB)

  3. Command in the Objective Force

    National Research Council Canada - National Science Library

    Wilbeck, Christopher

    2003-01-01

    This paper seeks to answer what type of command will best serve the Army's Objective Force in gaining the initiative, building momentum, and exploiting success to achieve land dominance in the future...

  4. Combatant Commanders Informational Series: USPACOM

    National Research Council Canada - National Science Library

    Comnick, Michael

    1996-01-01

    ...) introducing potential joint staff officers to their specific command. Inbound staff officers, prepared by reviewing this product, arrive on station ready to receive specialized training without needing background indoctrination...

  5. Defense waste management plan

    International Nuclear Information System (INIS)

    1983-06-01

    Defense high-level waste (HLW) and defense transuranic (TRU) waste are in interim storage at three sites, namely: at the Savannah River Plant, in South Carolina; at the Hanford Reservation, in Washington; and at the Idaho National Engineering Laboratory, in Idaho. Defense TRU waste is also in interim storage at the Oak Ridge National Laboratory, in Tennessee; at the Los Alamos National Laboratory, in New Mexico; and at the Nevada Test Site, in Nevada. (Figure E-2). This document describes a workable approach for the permanent disposal of high-level and transuranic waste from atomic energy defense activities. The plan does not address the disposal of suspect waste which has been conservatively considered to be high-level or transuranic waste but which can be shown to be low-level waste. This material will be processed and disposed of in accordance with low-level waste practices. The primary goal of this program is to utilize or dispose of high-level and transuranic waste routinely, safely, and effectively. This goal will include the disposal of the backlog of stored defense waste. A Reference Plan for each of the sites describes the sequence of steps leading to permanent disposal. No technological breakthroughs are required to implement the reference plan. Not all final decisions concerning the activities described in this document have been made. These decisions will depend on: completion of the National Environmental Policy Act process, authorization and appropriation of funds, agreements with states as appropriate, and in some cases, the results of pilot plant experiments and operational experience. The major elements of the reference plan for permanent disposal of defense high-level and transuranic waste are summarized

  6. Defense Business Board

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Business Board Search Search Defense Business Board: Search Search Defense Business Board: Search Defense Business Board Business Excellence in Defense of the Nation Defense Business Board Home Charter Members Meetings Studies Contact Us The Defense

  7. The Positive Aspects of Network Centric Command. The Ties Between Behavioral Doctrine and Technology

    National Research Council Canada - National Science Library

    Baldree, Steven

    1999-01-01

    .... Centralizing execution at the operational level due to "informational" superiority will be a step back in terms of war-fighting effectiveness and will be detrimental to commanders participating...

  8. The ergonomics of command and control

    OpenAIRE

    Stanton, NA; Baber, C

    2006-01-01

    Since its inception, just after the Second World War, ergonomics research has paid special attention to the issues surrounding human control of systems. Command and Control environments continue to represent a challenging domain for Ergonomics research. We take a broad view of Command and Control research, to include C2 (Command and Control), C3 (Command, Control and Communication), and C4 (Command, Control, Communication and Computers) as well as human supervisory control paradigms. This spe...

  9. Defense Analysis Students' SNA Research Captures the Attention of SOUTHCOM Leadership

    OpenAIRE

    Dionne, Patrick

    2017-01-01

    News Stories Archive U.S. Army Majs. Matthew Bauer, Andrew Maggard and Robert Murray, all students at the Naval Postgraduate School’s (NPS) Defense Analysis department, had the opportunity to brief members of United States Southern Command (SOUTHCOM).

  10. JPRS Report, Soviet Union, Military Affairs, Personnel Report: USSR Ministry of Defense, January 1989

    National Research Council Canada - National Science Library

    1989-01-01

    This volume lists names, ranks and assignments of Soviet commanders serving in the USSR Ministry of Defense and in some related agencies, compiled from various, open Soviet sources through January of 1989...

  11. Coming in From the Cold ... War: Defense Humint Services Support to Military Operations Other Than War

    National Research Council Canada - National Science Library

    Becker, David

    2000-01-01

    ...) and theater commander in chiefs (CINCs) in military operations other than war (MOOTW). The examination included a study into the recent history of military HUMINT, and the Department of Defense's (DoD's...

  12. The Unspoken Consequence of Command, Control Communications Technology: Enhanced Micromanagement by Risk-Averse Commanders

    National Research Council Canada - National Science Library

    Carozza, John

    2004-01-01

    .... However, along with its benefits, this command, control and communications (C3) network includes the dangerous consequence of eroding the autonomy of tactical command through enhanced micromanagement by risk-averse operational commanders...

  13. Defense Science Board 2005 Summer Study on Transformation: A Progress Assessment. Volume 2. Supporting Reports

    Science.gov (United States)

    2006-04-01

    Banking Mr. Robert Luby, IBM Dr. Robert Lucky, Telcordia Technologies Mr. William Lynn, Raytheon Mr. Dave Oliver, EADS North America GOVERNMENT...MAY 2005 Central Command (CENTCOM) COL Peter Zielinski CENTCOM Office of Force Transformation (OFT) Review of COCOM Experimentation COL Richard...for Defense Analyses Mr. Patrick McCarthy, U.S. Joint Forces Command Mr. Stephen Moore, U.S. Joint Forces Command MAY 10, 2005 COL Peter Zielinski

  14. Post-Soviet nuclear command and security

    International Nuclear Information System (INIS)

    Garwin, R.L.

    1992-01-01

    Traditionally, any nuclear command system must reckon with conflicting requirements. The system must ensure that weapons will be launched reliably when ordered, a goal known as positive control. But negative control, ensuring that the weapons will not be used without an authentic order, is also essential. These goals are often in tension; steps to make it more difficult to launch without authorization can make it less certain that weapons will be launched when desired, and vice versa. The balance struck between the two naturally shifts, with increased emphasis on negative control in peacetime, and on positive control in a major crisis. Under present circumstances, with virtually no threat of deliberate nuclear attack, both the US and Russia should be putting their emphasis overwhelmingly on ensuring negative control

  15. Transforming Airborne Command and Control and Intelligence, Surveillance, and Reconnaissance

    Science.gov (United States)

    2012-06-01

    the US Government, Department of Defense, the United States Air Force, or Air University. In accordance with Air Force Instruction 51-303, it is not...Staff level. Lt Col Roger “Charlie” Brown offered key perspective at the Major Command level. Lt Col Herb “Weed” Maraman, Sqn Ldr Mike Lyttle...studied the feasibility of using space-based radar (SBR) platforms as well as large manned aircraft like the E-10A to meet USAF C2 and ISR operational

  16. 10 commandments of smile esthetics

    Science.gov (United States)

    Machado, Andre Wilson

    2014-01-01

    The search for esthetic treatment has persisted in the routine of dental professionals. Following this trend, dental patients have sought treatment with the primary aim of improving smile esthetics. The aim of this article is to present a protocol to assess patient's smile: The 10 Commandments of smile esthetics. PMID:25279532

  17. United States Southern Command * Home

    Science.gov (United States)

    or concerns please email or call us at 305-437-2287. Testing The USAG- Miami Joint Education Testing the Air Force | The Air University | US Air Force Academy Army: Army Continued Education System | Army Marine Corps Institute | US Marine Corps Training and Education Command | US Marine Corps University Navy

  18. Apollo 11 Command Service Module

    Science.gov (United States)

    1969-01-01

    A close-up view of the Apollo 11 command service module ready to be mated with the spacecraft LEM adapter of the third stage. The towering 363-foot Saturn V was a multi-stage, multi-engine launch vehicle standing taller than the Statue of Liberty. Altogether, the Saturn V engines produced as much power as 85 Hoover Dams.

  19. Ready...Set... Command! Rethinking Training for Squadron Commanders

    Science.gov (United States)

    2016-02-16

    commander faces many difficult challenges. When discussing the Air Force’s troubling trend in suicide rates, Airmen “blame being overworked ...Air Forces total suicides despite making up only 16 percent of the service.3 Three years later the Air Force Times reveals continued challenges in...23 challenges. They must address complex issues facing the Air Force, such as troubling suicide rates, manning shortfalls, decreasing resources

  20. Issues and Solutions for Command Post Simulations

    National Research Council Canada - National Science Library

    Stytz, Martin R; Banks, Sheila B

    2006-01-01

    .... Unfortunately, the modeling of joint command post teams is still very much in its infancy and this lack of foundational research hinders our ability to assess the performance of command post teams...

  1. Command Decision-Making: Experience Counts

    National Research Council Canada - National Science Library

    Wolgast, Kelly A

    2005-01-01

    Decision-making is the mainstay of military leadership and command. Due to the changed nature of the current military environment, military commanders can no longer rely solely on the traditional Military Decision-making Process (MDMP...

  2. Defense Human Resources Activity > PERSEREC

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Human Resources Activity Search Search Defense Human Resources Activity: Search Search Defense Human Resources Activity: Search Defense Human Resources Activity U.S. Department of Defense Defense Human Resources Activity Overview

  3. For the Common Defense of Cyberspace: Implications of a US Cyber Militia on Department of Defense Cyber Operations

    Science.gov (United States)

    2015-06-12

    the Common Defense of Cyberspace: Implications of a US Cyber Militia on Department of Defense Cyber Operations 5a. CONTRACT NUMBER 5b. GRANT ...20130423/ NEWS/304230016/Navy-wants-1-000-more-cyber-warriors. 33 Edward Cardon , “Army Cyber Capabilities” (Lecture, Advanced Operations Course...Finally, once a cyber security professional is trained, many argue, to include the head of Army’s Cyber Command, Lieutenant General Edward Cardon

  4. Headquarters, Special Operations Command, Africa Stuttgart, Germany (redacted)

    Science.gov (United States)

    2016-08-09

    make sure the boss is not stepping over the line in te1ms of reprisal." - documented that conversation on November 4, 2011, in an MFR. stated that...play nice and wait until I’m gone. Smile . Act like you’re going to work ... but ifyou continue to unde1mine my authority as a commander, I’m going to

  5. On Preparing for Squadron Command

    Science.gov (United States)

    1988-04-01

    Gortler, Majur Gordon D. "Management Development---Could the Air Force Be Doing More?" Resear,;h Study, Air Command and Staff College. 1 07:3. 20...ABSTRACT (Continue on reverse If necessary and identify by block number) -This study addresses the broad issue of preparing Air Force officers for...are obsolete. SECURITY CLASSIFICATION OF THIS PAGE UNCLASSIFIED - - PREFACE This study addresses the broad Issue of preparing Air Force officers to

  6. Command and Control : faster decisions

    CSIR Research Space (South Africa)

    Venter, C

    2012-10-01

    Full Text Available Decisions 4th Biennial Conference Presented by Cobus Venter 10 October 2012 ? CSIR 2012 Slide 2 Command and Control Planning TaskingControl Assessment Si tu at io n DPSS Objective Ends Increase the Defence Capability of South Africa Ways... Supported by SAAB THALES Global CommsDPSS DDSI ERGOTECH Cooperation to make it work Example 1: Future SA Army Strategy and Joint Operations Support Campus Experiment Example 1: Future SA Army Strategy and Joint Operations Support Campus Experiment...

  7. The fragility of the Brazilian Defense Ministry

    Directory of Open Access Journals (Sweden)

    Jorge Zaverucha

    2006-01-01

    Full Text Available The present article presents different phases that the Brazilian Defense Ministry has passed through, since its inception during Fernando Henrique Cardoso's second presidential term (1999-2002 until the current administration of Luís Inácio Lula da Silva (2003-2006, under its respective ministers of Defense. It has been seen as one of the important stages in the re-constitutionalization of the country, insofar as it establishes the submission of Armed Forces commanders to a civilian minister, and although some analysts have considered that such submission is actually achieved, we point here to the military resistance and insubordination to civil power that are the result of an authoritarian legacy. To the extent that the Ministry of Defense is unable to implement its own policies in which the military would be required to follow civilian guidance, this article concludes with considerations on the civil Defense Ministry's political and institutional fragility vis-a-vis military command. The latter has been able to retain high levels of decision making autonomy in its relationship to the Ministry and its structure.

  8. Development of Information Technology for Smart Defense

    International Nuclear Information System (INIS)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun; Han, Sangcheol

    2014-01-01

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation

  9. Development of Information Technology for Smart Defense

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun [ETRI, Daejeon (Korea, Republic of); Han, Sangcheol [KEIT, Seoul (Korea, Republic of)

    2014-03-15

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation.

  10. STS-36 Commander Creighton listens to music on OV-104's forward flight deck

    Science.gov (United States)

    1990-01-01

    STS-36 Commander John O. Creighton, smiling and wearing a headset, listens to music as the tape recorder freefloats in front of him. During this lighter moment of the mission, Creighton is positioned at the commanders station on the forward flight deck of Atlantis, Orbiter Vehicle (OV) 104. Forward flight deck windows W1 and W2 appear on his left. Creighton and four other astronauts spent four days, 10 hours and 19 minutes aboard the spacecraft for the Department of Defense (DOD) devoted mission.

  11. U.S. Cyber Command Support to Geographic Combatant Commands

    Science.gov (United States)

    2011-03-02

    State Association of Colleges and Schools, 3624 Market Street, Philadelphia, PA 19104, (215) 662-5606. The Commission on Higher Education is an...the Middle States Association of Colleges and Schools, 3624 Market Street, Philadelphia, PA 19104, (215) 662-5606. The Commission on Higher...Defense Regarding Cybersecurity. 33 The NCCIC is augmented by the Cyber Unified Coordination Group ( UCG ) made up of public and private sector officials

  12. Commanders of the Great Victory

    Directory of Open Access Journals (Sweden)

    Anatoly Dmitriyevich Borshchov

    2015-01-01

    Full Text Available The honorary title of «commander» as well as the «admiral» is granted to a military or naval figure on the basis of public recognition of his personal contribution to the success of actions. Generals are usually individuals with creative thinking, the ability to foresee the development of military events. Generals usually have such personality traits as a strong will and determination, rich combat experience, credibility and high organizational skills. In an article dedicated to the 70th anniversary of the Soviet victory in the Great War examines the experience of formation and practice of the most talent-ed Soviet military leaders.

  13. Defense AT&L (Volume 37, Number 1, January-February 2008)

    Science.gov (United States)

    2008-02-01

    Senate, he serves as the senior advisor to the secretary of defense on testing Department of Defense weapon systems, and prescribing policies and...including several commands. As general, his final assign- ment was the senior air defense advisor to the chief of staff of the Army. His awards...by going to <www. usajobs.gov>. For more details, see the USA Staffing Ap- plication Manager’s online help at <http://eshelp.opm. gov/ robo /projects

  14. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  15. DolphinAtack: Inaudible Voice Commands

    OpenAIRE

    Zhang, Guoming; Yan, Chen; Ji, Xiaoyu; Zhang, Taimin; Zhang, Tianchen; Xu, Wenyuan

    2017-01-01

    Speech recognition (SR) systems such as Siri or Google Now have become an increasingly popular human-computer interaction method, and have turned various systems into voice controllable systems(VCS). Prior work on attacking VCS shows that the hidden voice commands that are incomprehensible to people can control the systems. Hidden voice commands, though hidden, are nonetheless audible. In this work, we design a completely inaudible attack, DolphinAttack, that modulates voice commands on ultra...

  16. Ballistic missile defense effectiveness

    Science.gov (United States)

    Lewis, George N.

    2017-11-01

    The potential effectiveness of ballistic missile defenses today remains a subject of debate. After a brief discussion of terminal and boost phase defenses, this chapter will focus on long-range midcourse defenses. The problems posed by potential countermeasures to such midcourse defenses are discussed as are the sensor capabilities a defense might have available to attempt to discriminate the actual missile warhead in a countermeasures environment. The role of flight testing in assessing ballistic missile defense effectiveness is discussed. Arguments made about effectiveness by missile defense supporters and critics are summarized.

  17. Scale-free Enterprise Command & Control

    National Research Council Canada - National Science Library

    Bayne, Jay; Paul, Raymond

    2005-01-01

    ...) services that provide allied teams of commanders, planners and operations personnel with collaborative, grid-based and realtime situation assessment, plan generation, and plan execution services...

  18. Blossom Point Satellite Tracking and Command Station

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: The Blossom Point Satellite Command and Tracking Facility (BP) provides engineering and operational support to several complex space systems for the Navy...

  19. Structured multi-stream command language

    International Nuclear Information System (INIS)

    Glad, A.S.

    1982-12-01

    A multi-stream command language was implemented to provide the sequential and decision-making operations necessary to run the neutral-beam ion sources connected to the Doublet III tokamak fusion device. A multi-stream command language was implemented in Pascal on a Classic 7870 running under MAX IV. The purpose of this paper is threefold. First, to provide a brief description of the programs comprising the command language including the operating system interaction. Second, to give a description of the language syntax and commands necessary to develop a procedure stream. Third, to provide a description of the normal operating procedures for executing either the sequential or interactive streams

  20. Command and Control for Homeland Security

    National Research Council Canada - National Science Library

    Greene, Marjorie

    2007-01-01

    ... Analysis of the Toronto SARS Outbreak, Vertical Integration, Vertical Integration in a Military Command Hierarchy, Information flows for a domestic incident, C2 for Homeland Security will benefit...

  1. Mission Command: Elasticity, Equilibrium, Culture, and Intent

    National Research Council Canada - National Science Library

    Stewart, Keith G

    2006-01-01

    .... It is enabled by decentralization of authority and responsibility that allows subordinate commanders the latitude to plan and conduct operations based upon their understanding of the local situation...

  2. Microprocessor controller for stepping motors

    International Nuclear Information System (INIS)

    Strait, B.G.; Thuot, M.E.

    1977-01-01

    A new concept for digital computer control of multiple stepping motors which operate in a severe electromagnetic pulse environment is presented. The motors position mirrors in the beam-alignment system of a 100-kJ CO 2 laser. An asynchronous communications channel of a computer is used to send coded messages, containing the motor address and stepping-command information, to the stepping-motor controller in a bit serial format over a fiber-optics communications link. The addressed controller responds by transmitting to the computer its address and other motor information, thus confirming the received message. Each controller is capable of controlling three stepping motors. The controller contains the fiber-optics interface, a microprocessor, and the stepping-motor driven circuits. The microprocessor program, which resides in an EPROM, decodes the received messages, transmits responses, performs the stepping-motor sequence logic, maintains motor-position information, and monitors the motor's reference switch. For multiple stepping-motor application, the controllers are connected in a daisy chain providing control of many motors from one asynchronous communications channel of the computer

  3. Optimizing Active Cyber Defense

    OpenAIRE

    Lu, Wenlian; Xu, Shouhuai; Yi, Xinlei

    2016-01-01

    Active cyber defense is one important defensive method for combating cyber attacks. Unlike traditional defensive methods such as firewall-based filtering and anti-malware tools, active cyber defense is based on spreading "white" or "benign" worms to combat against the attackers' malwares (i.e., malicious worms) that also spread over the network. In this paper, we initiate the study of {\\em optimal} active cyber defense in the setting of strategic attackers and/or strategic defenders. Specific...

  4. Command and Service Module Communications

    Science.gov (United States)

    Interbartolo, Michael

    2009-01-01

    This viewgraph presentation examines Command and Service Module (CSM) Communications. The communication system's capabilities are defined, including CSM-Earth, CSM-Lunar Module and CSM-Extravehicular crewman communications. An overview is provided for S-band communications, including data transmission and receiving rates, operating frequencies and major system components (pre-modulation processors, unified S-band electronics, S-band power amplifier and S-band antennas). Additionally, data transmission rates, operating frequencies and the capabilities of VHF communications are described. Major VHF components, including transmitters and receivers, and the VHF multiplexer and antennas are also highlighted. Finally, communications during pre-launch, ascent, in-flight and entry are discussed. Overall, the CSM communication system was rated highly by flight controllers and crew. The system was mostly autonomous for both crew and flight controllers and no major issues were encountered during flight.

  5. Gathering Ideas Online: Results of the Navy Personnel Command (NPC) Telework Virtual Suggestion Box

    Science.gov (United States)

    2012-08-01

    collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT...participate in telecommuting (another term for telework), and in 2001, the Under Secretary of Defense memorandum provided a policy for telework within...Manpower, Personnel, Training and Education Telecommuting (Telework) Program (CHNAVPERSNOTE 5330). Washington, DC: Author. Commander, Navy

  6. The Marihuana Dilemma: Challenge to Commanders.

    Science.gov (United States)

    The marihuana dilemma poses a major challenge to commanders in the US Army today. The problem was analyzed as to the characteristics of the drug...available to commanders to meet the challenge. The essay concludes that marihuana should not be legalized; drug users or former drug users should not be

  7. XTCE. XML Telemetry and Command Exchange Tutorial

    Science.gov (United States)

    Rice, Kevin; Kizzort, Brad; Simon, Jerry

    2010-01-01

    An XML Telemetry Command Exchange (XTCE) tutoral oriented towards packets or minor frames is shown. The contents include: 1) The Basics; 2) Describing Telemetry; 3) Describing the Telemetry Format; 4) Commanding; 5) Forgotten Elements; 6) Implementing XTCE; and 7) GovSat.

  8. Capturing a Commander's decision making style

    Science.gov (United States)

    Santos, Eugene; Nguyen, Hien; Russell, Jacob; Kim, Keumjoo; Veenhuis, Luke; Boparai, Ramnjit; Stautland, Thomas Kristoffer

    2017-05-01

    A Commander's decision making style represents how he weighs his choices and evaluates possible solutions with regards to his goals. Specifically, in the naval warfare domain, it relates the way he processes a large amount of information in dynamic, uncertain environments, allocates resources, and chooses appropriate actions to pursue. In this paper, we describe an approach to capture a Commander's decision style by creating a cognitive model that captures his decisionmaking process and evaluate this model using a set of scenarios using an online naval warfare simulation game. In this model, we use the Commander's past behaviors and generalize Commander's actions across multiple problems and multiple decision making sequences in order to recommend actions to a Commander in a manner that he may have taken. Our approach builds upon the Double Transition Model to represent the Commander's focus and beliefs to estimate his cognitive state. Each cognitive state reflects a stage in a Commander's decision making process, each action reflects the tasks that he has taken to move himself closer to a final decision, and the reward reflects how close he is to achieving his goal. We then use inverse reinforcement learning to compute a reward for each of the Commander's actions. These rewards and cognitive states are used to compare between different styles of decision making. We construct a set of scenarios in the game where rational, intuitive and spontaneous decision making styles will be evaluated.

  9. Strategic Defense Initiative Overview

    National Research Council Canada - National Science Library

    1990-01-01

    ... to Third World and other nations. I will then discuss the scope of the SDI effort, the evolving strategic defense system architectures and theater defense, our compliancy with the ABM Treaty, technology spinoffs resulting from SDI...

  10. ASC Addresses Unit Commanders' Concerns through LBE and Reset Programs

    National Research Council Canada - National Science Library

    Young, Mark E

    2008-01-01

    .... Army Sustainment Command (ASC), part of the U.S. Army Materiel Command (AMC) team, is available to assist, identify, and resolve equipment and maintenance problems as well as materiel readiness issues for combatant commanders...

  11. Unity of Command in Afghanistan: A Forsaken Principle of War

    National Research Council Canada - National Science Library

    Hope, Ian

    2008-01-01

    ... in the evolution of military command for Afghanistan. It examines how there was an unprecedented departure from the principle of unity of command in Afghanistan in 2006, when Combined Forces Command-Afghanistan (CFC...

  12. Unity of Command in Afghanistan: A Forsaken Principle of War

    National Research Council Canada - National Science Library

    Hope, Ian

    2008-01-01

    ... of military command for Afghanistan. It examines the unprecedented departure from the principle of unity of command in Afghanistan in 2006, when Combined Forces Command-Afghanistan passed control of the ground fight to the International...

  13. Astronaut John Young in Command Module Simulator during Apollo Simulation

    Science.gov (United States)

    1968-01-01

    Astronaut John W. Young, command module pilot, inside the Command Module Simulator in bldg 5 during an Apollo Simulation. Astronauts Thomas P. Stafford, commander and Eugene A. Cernan, lunar module pilot are out of the view.

  14. Three astronauts inside Command Module Simulator during Apollo Simulation

    Science.gov (United States)

    1968-01-01

    Three astronauts inside the Command Module Simulator in bldg 5 during an Apollo Simulation. Left to right are Astronauts Thomas P. Stafford, commander; John W. Young, command module pilot; and Eugene A. Cernan, lunar module pilot.

  15. Rethinking Defensive Information Warfare

    National Research Council Canada - National Science Library

    French, Geoffrey S

    2004-01-01

    .... This paper examines defensive tactics and strategies from the German defense in depth that emerged from World War I to the American Active Defense that developed in the Cold War and proposes a new mindset for DIW that draws on these operational concepts from military history.

  16. Recognizing Plant Defense Priming

    NARCIS (Netherlands)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J|info:eu-repo/dai/nl/113115113; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  17. Recognizing Plant Defense Priming.

    Science.gov (United States)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-10-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in plants. Copyright © 2016 Elsevier Ltd. All rights reserved.

  18. Recognizing plant defense priming

    NARCIS (Netherlands)

    Martinez-Medina, A.; Flors, V.; Heil, M.; Mauch-Mani, B.; Pieterse, C.M.J.; Pozo, M.J.; Ton, J.; Van Dam, N.M.; Conrath, U.

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  19. Literature review on medical incident command.

    Science.gov (United States)

    Rimstad, Rune; Braut, Geir Sverre

    2015-04-01

    It is not known what constitutes the optimal emergency management system, nor is there a consensus on how effectiveness and efficiency in emergency response should be measured or evaluated. Literature on the role and tasks of commanders in the prehospital emergency services in the setting of mass-casualty incidents has not been summarized and published. This comprehensive literature review addresses some of the needs for future research in emergency management through three research questions: (1) What are the basic assumptions underlying incident command systems (ICSs)? (2) What are the tasks of ambulance and medical commanders in the field? And (3) How can field commanders' performances be measured and assessed? A systematic literature search in MEDLINE, PubMed, PsycINFO, Embase, Cochrane Central Register of Controlled Trials, Cochrane Library, ISI Web of Science, Scopus, International Security & Counter Terrorism Reference Center, Current Controlled Trials, and PROSPERO covering January 1, 1990 through March 1, 2014 was conducted. Reference lists of included literature were hand searched. Included papers were analyzed using Framework synthesis. The literature search identified 6,049 unique records, of which, 76 articles and books where included in qualitative synthesis. Most ICSs are described commonly as hierarchical, bureaucratic, and based on military principles. These assumptions are contested strongly, as is the applicability of such systems. Linking of the chains of command in cooperating agencies is a basic difficulty. Incident command systems are flexible in the sense that the organization may be expanded as needed. Commanders may command by direction, by planning, or by influence. Commanders' tasks may be summarized as: conducting scene assessment, developing an action plan, distributing resources, monitoring operations, and making decisions. There is considerable variation between authors in nomenclature and what tasks are included or highlighted

  20. Linux Command Line and Shell Scripting Bible

    CERN Document Server

    Blum, Richard

    2011-01-01

    The authoritative guide to Linux command line and shell scripting?completely updated and revised [it's not a guide to Linux as a whole ? just to scripting] The Linux command line allows you to type specific Linux commands directly to the system so that you can easily manipulate files and query system resources, thereby permitting you to automate commonly used functions and even schedule those programs to run automatically. This new edition is packed with new and revised content, reflecting the many changes to new Linux versions, including coverage of alternative shells to the default bash shel

  1. The Linux command line a complete introduction

    CERN Document Server

    Shotts, William E

    2012-01-01

    You've experienced the shiny, point-and-click surface of your Linux computer—now dive below and explore its depths with the power of the command line. The Linux Command Line takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell. Along the way you'll learn the timeless skills handed down by generations of gray-bearded, mouse-shunning gurus: file navigation, environment configuration, command chaining, pattern matching with regular expressions, and more.

  2. Command and Control of Private Security Contractors: Are They a Viable Force Option for the Combatant Commander?

    National Research Council Canada - National Science Library

    Sherard, Scott H

    2008-01-01

    If a Combatant Commander (CCDR) or Joint Force Commander (JFC) were to take command of the approximately 25,000 security contractors in Iraq, a force of such size and capability would prove to be a valuable operational asset...

  3. Toward Unity of Command for Multinational Air Forces

    National Research Council Canada - National Science Library

    Asjes, David

    1998-01-01

    To assure unity of command in future multinational air operations, combatant commanders must embrace the necessity of multinational air forces, maximize the integration of allied officers within air...

  4. New Global Missions for Strategic Command

    National Research Council Canada - National Science Library

    Graham, David

    2002-01-01

    .... The focus of this White Paper is on the external decisions that will be needed to provide the Command with a clear mission, and the authority, resources and organizational support necessary to perform the mission...

  5. U.S. Pacific Command > Leadership

    Science.gov (United States)

    USPACOM U.S. Pacific Command Search USPACOM: Search Search Search USPACOM: Search Home Leadership Directory Media Inquiries Home : Leadership Admiral Harry B. Harris, Jr., U.S. Navy Read the full biography

  6. The Road to a New Unified Command

    Science.gov (United States)

    2008-01-01

    The Directorate of Command, Control, Communications, and Computers (C4) Systems is chartered with information architecture (including in Africa...Friday afternoon cinema presentations where a documentary or feature film covering an African historic event was played, followed by dialogue

  7. Spacecraft command and control using expert systems

    Science.gov (United States)

    Norcross, Scott; Grieser, William H.

    1994-01-01

    This paper describes a product called the Intelligent Mission Toolkit (IMT), which was created to meet the changing demands of the spacecraft command and control market. IMT is a command and control system built upon an expert system. Its primary functions are to send commands to the spacecraft and process telemetry data received from the spacecraft. It also controls the ground equipment used to support the system, such as encryption gear, and telemetry front-end equipment. Add-on modules allow IMT to control antennas and antenna interface equipment. The design philosophy for IMT is to utilize available commercial products wherever possible. IMT utilizes Gensym's G2 Real-time Expert System as the core of the system. G2 is responsible for overall system control, spacecraft commanding control, and spacecraft telemetry analysis and display. Other commercial products incorporated into IMT include the SYBASE relational database management system and Loral Test and Integration Systems' System 500 for telemetry front-end processing.

  8. Unit Testing for Command and Control Systems

    Science.gov (United States)

    Alexander, Joshua

    2018-01-01

    Unit tests were created to evaluate the functionality of a Data Generation and Publication tool for a command and control system. These unit tests are developed to constantly evaluate the tool and ensure it functions properly as the command and control system grows in size and scope. Unit tests are a crucial part of testing any software project and are especially instrumental in the development of a command and control system. They save resources, time and costs associated with testing, and catch issues before they become increasingly difficult and costly. The unit tests produced for the Data Generation and Publication tool to be used in a command and control system assure the users and stakeholders of its functionality and offer assurances which are vital in the launching of spacecraft safely.

  9. Basic interrupt and command structures and applications

    International Nuclear Information System (INIS)

    Davies, R.C.

    1974-01-01

    Interrupt and command structures of a real-time system are described through specific examples. References to applications of a real-time system and programing development references are supplied. (auth)

  10. An Operational Commander's Guide to the Media

    National Research Council Canada - National Science Library

    McCartney, Michael

    2005-01-01

    ... of the embedded reporter . The Operational Commander is wise to review media relations and the successes and pitfalls of past conflicts, and to examine closely the results of Operation Iraqi Freedom so as to...

  11. Schema for Spacecraft-Command Dictionary

    Science.gov (United States)

    Laubach, Sharon; Garcia, Celina; Maxwell, Scott; Wright, Jesse

    2008-01-01

    An Extensible Markup Language (XML) schema was developed as a means of defining and describing a structure for capturing spacecraft command- definition and tracking information in a single location in a form readable by both engineers and software used to generate software for flight and ground systems. A structure defined within this schema is then used as the basis for creating an XML file that contains command definitions.

  12. Distributed computing environment for Mine Warfare Command

    OpenAIRE

    Pritchard, Lane L.

    1993-01-01

    Approved for public release; distribution is unlimited. The Mine Warfare Command in Charleston, South Carolina has been converting its information systems architecture from a centralized mainframe based system to a decentralized network of personal computers over the past several years. This thesis analyzes the progress Of the evolution as of May of 1992. The building blocks of a distributed architecture are discussed in relation to the choices the Mine Warfare Command has made to date. Ar...

  13. Control of automated system with voice commands

    OpenAIRE

    Švara, Denis

    2012-01-01

    In smart houses contemporary achievements in the fields of automation, communications, security and artificial intelligence, increase comfort and improve the quality of user's lifes. For the purpose of this thesis we developed a system for managing a smart house with voice commands via smart phone. We focused at voice commands most. We want move from communication with fingers - touches, to a more natural, human relationship - speech. We developed the entire chain of communication, by which t...

  14. An Advanced Commanding and Telemetry System

    Science.gov (United States)

    Hill, Maxwell G. G.

    The Loral Instrumentation System 500 configured as an Advanced Commanding and Telemetry System (ACTS) supports the acquisition of multiple telemetry downlink streams, and simultaneously supports multiple uplink command streams for today's satellite vehicles. By using industry and federal standards, the system is able to support, without relying on a host computer, a true distributed dataflow architecture that is complemented by state-of-the-art RISC-based workstations and file servers.

  15. Proposal of Non-Contact Type Interface of Command Input Using Lip Motion Features

    Science.gov (United States)

    Sato, Yoshiyuki; Kageyama, Yoichi; Nishida, Makoto

    Lip motion features are of practical use in identifying individuals. It is therefore important to develop non-contact type interface. For the interface using lip motion features, individual differences such as accents and dialects in commands should be accepted. In this paper, we propose a method to identify commands by analyzing three kinds of lip motion features. They are lip width, lip length, and ratio of width and length. The analysis is made on the basis of these features' relative values obtained from the primary and object frame. The proposed method has three steps. First, we extracted the lip motion features on the basis of both positions and shapes of lip in each frame of facial images. Second, standard patterns were created from features of six utterances per command. The standard pattern is able to reduce the relative difference in the lip motion features. Third, similarities among commands were computed by Dynamic-Programming (DP) matching. And then, the command with the largest similarity was selected as the target one. Our experimental results suggest that proposed method is useful to construct the non-contact type interface of command input using lip motion features.

  16. Test Telemetry And Command System (TTACS)

    Science.gov (United States)

    Fogel, Alvin J.

    1994-01-01

    The Jet Propulsion Laboratory has developed a multimission Test Telemetry and Command System (TTACS) which provides a multimission telemetry and command data system in a spacecraft test environment. TTACS reuses, in the spacecraft test environment, components of the same data system used for flight operations; no new software is developed for the spacecraft test environment. Additionally, the TTACS is transportable to any spacecraft test site, including the launch site. The TTACS is currently operational in the Galileo spacecraft testbed; it is also being provided to support the Cassini and Mars Surveyor Program projects. Minimal personnel data system training is required in the transition from pre-launch spacecraft test to post-launch flight operations since test personnel are already familiar with the data system's operation. Additionally, data system components, e.g. data display, can be reused to support spacecraft software development; and the same data system components will again be reused during the spacecraft integration and system test phases. TTACS usage also results in early availability of spacecraft data to data system development and, as a result, early data system development feedback to spacecraft system developers. The TTACS consists of a multimission spacecraft support equipment interface and components of the multimission telemetry and command software adapted for a specific project. The TTACS interfaces to the spacecraft, e.g., Command Data System (CDS), support equipment. The TTACS telemetry interface to the CDS support equipment performs serial (RS-422)-to-ethernet conversion at rates between 1 bps and 1 mbps, telemetry data blocking and header generation, guaranteed data transmission to the telemetry data system, and graphical downlink routing summary and control. The TTACS command interface to the CDS support equipment is nominally a command file transferred in non-real-time via ethernet. The CDS support equipment is responsible for

  17. Application of stepping motor

    International Nuclear Information System (INIS)

    1980-10-01

    This book is divided into three parts, which is about practical using of stepping motor. The first part has six chapters. The contents of the first part are about stepping motor, classification of stepping motor, basic theory og stepping motor, characteristic and basic words, types and characteristic of stepping motor in hybrid type and basic control of stepping motor. The second part deals with application of stepping motor with hardware of stepping motor control, stepping motor control by microcomputer and software of stepping motor control. The last part mentions choice of stepping motor system, examples of stepping motor, measurement of stepping motor and practical cases of application of stepping motor.

  18. The Battle Command Sustainment Support System: Initial Analysis Report

    Science.gov (United States)

    2016-09-01

    products including jet fuels, distillate fuels, residual fuels, automotive gasoline , specified bulk lubricating oils, aircraft engine oils, fuel...contained within this report. 15. SUBJECT TERMS Mission command Software Tactical applications (TacApps) Command post ...computing environment (CPCE) Command post client Battle command sustainment support System (BCS3) Logistics

  19. Technologies for distributed defense

    Science.gov (United States)

    Seiders, Barbara; Rybka, Anthony

    2002-07-01

    For Americans, the nature of warfare changed on September 11, 2001. Our national security henceforth will require distributed defense. One extreme of distributed defense is represented by fully deployed military troops responding to a threat from a hostile nation state. At the other extreme is a country of 'citizen soldiers', with families and communities securing their common defense through heightened awareness, engagement as good neighbors, and local support of and cooperation with local law enforcement, emergency and health care providers. Technologies - for information exploitation, biological agent detection, health care surveillance, and security - will be critical to ensuring success in distributed defense.

  20. Dynamic defense workshop :

    Energy Technology Data Exchange (ETDEWEB)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  1. Next Steps for Transforming Education at National Defense University

    Science.gov (United States)

    2015-01-01

    on the Socratic method of open seminar discussion moderated by faculty has its advantages but falls short as a means of replicating complex...education that informs its graduate programs.29 The Socratic method alone does not constitute an optimum approach to adult education. A hybrid approach...ing methods , and pamper rather than challenge students (see table 2).3 Critics further contend that with a few excep- tions, war college classes are

  2. STS-37 Commander Nagel in commanders seat on OV-104's flight deck

    Science.gov (United States)

    1991-01-01

    STS-37 Commander Steven R. Nagel, wearing launch and entry suit (LES), sits at commanders station on the forward flight deck of Atlantis, Orbiter Vehicle (OV) 104. Surrounding Nagel are the seat headrest, control panels, checklists, forward flight deck windows, and three drinking water containers with straws attached to forward panel F2.

  3. Step out - Step in Sequencing Games

    NARCIS (Netherlands)

    Musegaas, M.; Borm, P.E.M.; Quant, M.

    2014-01-01

    In this paper a new class of relaxed sequencing games is introduced: the class of Step out - Step in sequencing games. In this relaxation any player within a coalition is allowed to step out from his position in the processing order and to step in at any position later in the processing order.

  4. Step out-step in sequencing games

    NARCIS (Netherlands)

    Musegaas, Marieke; Borm, Peter; Quant, Marieke

    2015-01-01

    In this paper a new class of relaxed sequencing games is introduced: the class of Step out–Step in sequencing games. In this relaxation any player within a coalition is allowed to step out from his position in the processing order and to step in at any position later in the processing order. First,

  5. Robot Task Commander with Extensible Programming Environment

    Science.gov (United States)

    Hart, Stephen W (Inventor); Yamokoski, John D. (Inventor); Wightman, Brian J (Inventor); Dinh, Duy Paul (Inventor); Gooding, Dustin R (Inventor)

    2014-01-01

    A system for developing distributed robot application-level software includes a robot having an associated control module which controls motion of the robot in response to a commanded task, and a robot task commander (RTC) in networked communication with the control module over a network transport layer (NTL). The RTC includes a script engine(s) and a GUI, with a processor and a centralized library of library blocks constructed from an interpretive computer programming code and having input and output connections. The GUI provides access to a Visual Programming Language (VPL) environment and a text editor. In executing a method, the VPL is opened, a task for the robot is built from the code library blocks, and data is assigned to input and output connections identifying input and output data for each block. A task sequence(s) is sent to the control module(s) over the NTL to command execution of the task.

  6. Reticulospinal Systems for Tuning Motor Commands

    Directory of Open Access Journals (Sweden)

    Robert M. Brownstone

    2018-04-01

    Full Text Available The pontomedullary reticular formation (RF is a key site responsible for integrating descending instructions to execute particular movements. The indiscrete nature of this region has led not only to some inconsistencies in nomenclature, but also to difficulties in understanding its role in the control of movement. In this review article, we first discuss nomenclature of the RF, and then examine the reticulospinal motor command system through evolution. These command neurons have direct monosynaptic connections with spinal interneurons and motoneurons. We next review their roles in postural adjustments, walking and sleep atonia, discussing their roles in movement activation or inhibition. We propose that knowledge of the internal organization of the RF is necessary to understand how the nervous system tunes motor commands, and that this knowledge will underlie strategies for motor functional recovery following neurological injuries or diseases.

  7. AMO EXPRESS: A Command and Control Experiment for Crew Autonomy

    Science.gov (United States)

    Stetson, Howard K.; Frank, Jeremy; Cornelius, Randy; Haddock, Angie; Wang, Lui; Garner, Larry

    2015-01-01

    NASA is investigating a range of future human spaceflight missions, including both Mars-distance and Near Earth Object (NEO) targets. Of significant importance for these missions is the balance between crew autonomy and vehicle automation. As distance from Earth results in increasing communication delays, future crews need both the capability and authority to independently make decisions. However, small crews cannot take on all functions performed by ground today, and so vehicles must be more automated to reduce the crew workload for such missions. NASA's Advanced Exploration Systems Program funded Autonomous Mission Operations (AMO) project conducted an autonomous command and control demonstration of intelligent procedures to automatically initialize a rack onboard the International Space Station (ISS) with power and thermal interfaces, and involving core and payload command and telemetry processing, without support from ground controllers. This autonomous operations capability is enabling in scenarios such as a crew medical emergency, and representative of other spacecraft autonomy challenges. The experiment was conducted using the Expedite the Processing of Experiments for Space Station (EXPRESS) rack 7, which was located in the Port 2 location within the U.S Laboratory onboard the International Space Station (ISS). Activation and deactivation of this facility is time consuming and operationally intensive, requiring coordination of three flight control positions, 47 nominal steps, 57 commands, 276 telemetry checks, and coordination of multiple ISS systems (both core and payload). The autonomous operations concept includes a reduction of the amount of data a crew operator is required to verify during activation or de-activation, as well as integration of procedure execution status and relevant data in a single integrated display. During execution, the auto-procedures provide a step-by-step messaging paradigm and a high level status upon termination. This

  8. Adaptive Command Filtered Integrated Guidance and Control for Hypersonic Vehicle with Magnitude, Rate and Bandwidth Constraints

    Directory of Open Access Journals (Sweden)

    Wang Liang

    2018-01-01

    Full Text Available This paper proposes a novel integrated guidance and control (IGC method for hypersonic vehicle in terminal phase. Firstly, the system model is developed with a second order actuator dynamics. Then the back-stepping controller is designed hierarchically with command filters, where the first order command filters are implemented to construct the virtual control input with ideal states predicted by an adaptive estimator, and the nonlinear command filter is designed to produce magnitude, rate and bandwidth limited control surface deflection finally tracked by a terminal sliding mode controller with finite convergence time. Through a series of 6-DOF numerical simulations, it’s indicated that the proposed method successfully cancels out the large aerodynamics coefficient uncertainties and disturbances in hypersonic flight under limited control surface deflection. The contribution of this paper lies in the application and determination of nonlinear integrated design of guidance and control system for hypersonic vehicle.

  9. Linux command line and shell scripting bible

    CERN Document Server

    Blum, Richard

    2014-01-01

    Talk directly to your system for a faster workflow with automation capability Linux Command Line and Shell Scripting Bible is your essential Linux guide. With detailed instruction and abundant examples, this book teaches you how to bypass the graphical interface and communicate directly with your computer, saving time and expanding capability. This third edition incorporates thirty pages of new functional examples that are fully updated to align with the latest Linux features. Beginning with command line fundamentals, the book moves into shell scripting and shows you the practical application

  10. Communication for command and control systems

    CERN Document Server

    Morris, D J

    1983-01-01

    Communication for Command and Control Systems provides a thorough exposition of the basic theoretical and practical features involved in the design of communication networks for command and control systems. This book focuses primarily on the practical side of computer-controlled communication. This text concentrates on the communication sides of the subject by surveying the means of transferring data between the various processing points and by appraising their potential advantages and possible defects in implementation. In this respect, this book should prove useful for the practicing enginee

  11. Defense Mechanisms: A Bibliography.

    Science.gov (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    This bibliography includes studies of defense mechanisms, in general, and studies of multiple mechanisms. Defense mechanisms, briefly and simply defined, are the unconscious ego defendants against unpleasure, threat, or anxiety. Sigmund Freud deserves the clinical credit for studying many mechanisms and introducing them in professional literature.…

  12. Defense Business Transformation

    Science.gov (United States)

    2009-12-01

    Defense Business Transformation by Jacques S. Gansler and William Lucyshyn The Center for Technology and National...REPORT TYPE 3. DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Defense Business Transformation 5a. CONTRACT NUMBER 5b. GRANT NUMBER...vii Part One: DoD Business Transformation

  13. Command and Data Handling Branch Internship

    Science.gov (United States)

    Billings, Rachel Mae

    2016-01-01

    Modular Integrated Stackable Layers (MISL) is a computer system designed for simple, fast, and cost effective flexible reconfiguration in space environments such as the ISS and Orion projects for various uses. Existing applications include wireless and wired communications, data acquisition and instrumentation, and camera systems, and potential applications include bus protocol converters and subsystem control. MISL is based on Texas Instruments (TI)' MSP430 16-bit ultra-low-power microcontroller device. The purpose of my project was to integrate the MISL system with a liquid crystal display (LCD) touchscreen. The LCD, manufactured by Crystalfontz and part number CFAF320240F-035T-TS, is a 320 by 240 RGB resistive color screen including an optional carrier board. The vast majority of the project was done with Altium Designer, a tool for printed circuit board (PCB) schematic capture, 3D design, and FPGA (Field Programmable Gate Array) development. The new PCB was to allow the LCD to directly stack to the rest of MISL. Research was done with datasheets for the TI microcontroller and touchscreen display in order to meet desired hardware specifications. Documentation on prior MISL projects was also utilized. The initial step was to create a schematic for the LCD, power bus, and data bus connections between components. A layout was then designed with the required physical dimensions, routed traces and vias, power and ground planes, layer stacks, and other specified design rules such as plane clearance and hole size. Multiple consultation sessions were held with Hester Yim, the technical discipline lead for the Command and Data Handling Branch, and Christy Herring, the lead PCB layout designer in the Electronic Design and Manufacturing Branch in order to ensure proper configuration. At the moment, the PCB is awaiting revision by the latter-mentioned branch. Afterwards, the board will begin to undergo the manufacturing and testing process. Throughout the internship at

  14. Unfolding Green Defense

    DEFF Research Database (Denmark)

    Larsen, Kristian Knus

    2015-01-01

    In recent years, many states have developed and implemented green solutions for defense. Building on these initiatives NATO formulated the NATO Green Defence Framework in 2014. The framework provides a broad basis for cooperation within the Alliance on green solutions for defense. This report aims...... to inform and support the further development of green solutions by unfolding how green technologies and green strategies have been developed and used to handle current security challenges. The report, initially, focuses on the security challenges that are being linked to green defense, namely fuel...... consumption in military operations, defense expenditure, energy security, and global climate change. The report then proceeds to introduce the NATO Green Defence Framework before exploring specific current uses of green technologies and green strategies for defense. The report concludes that a number...

  15. The Impact of Social Media on the Nature of Conflict, and a Commander’s Strategy for Social Media

    Science.gov (United States)

    2010-04-29

    recommendations commanders operating in an AOR may adopt to take advantage of the benefits made possible by the use of social media . The specific...or position of the Department of the Army, Department of Defense, or the U.S. Government. THE IMPACT OF SOCIAL MEDIA ON THE NATURE OF CONFLICT...associated with activism. This paper looks at case studies of recent events, examples of effective application of social media , and current U.S

  16. Detection technique of targets for missile defense system

    Science.gov (United States)

    Guo, Hua-ling; Deng, Jia-hao; Cai, Ke-rong

    2009-11-01

    Ballistic missile defense system (BMDS) is a weapon system for intercepting enemy ballistic missiles. It includes ballistic-missile warning system, target discrimination system, anti-ballistic-missile guidance systems, and command-control communication system. Infrared imaging detection and laser imaging detection are widely used in BMDS for surveillance, target detection, target tracking, and target discrimination. Based on a comprehensive review of the application of target-detection techniques in the missile defense system, including infrared focal plane arrays (IRFPA), ground-based radar detection technology, 3-dimensional imaging laser radar with a photon counting avalanche photodiode (APD) arrays and microchip laser, this paper focuses on the infrared and laser imaging detection techniques in missile defense system, as well as the trends for their future development.

  17. SciBox, an end-to-end automated science planning and commanding system

    Science.gov (United States)

    Choo, Teck H.; Murchie, Scott L.; Bedini, Peter D.; Steele, R. Josh; Skura, Joseph P.; Nguyen, Lillian; Nair, Hari; Lucks, Michael; Berman, Alice F.; McGovern, James A.; Turner, F. Scott

    2014-01-01

    SciBox is a new technology for planning and commanding science operations for Earth-orbital and planetary space missions. It has been incrementally developed since 2001 and demonstrated on several spaceflight projects. The technology has matured to the point that it is now being used to plan and command all orbital science operations for the MErcury Surface, Space ENvironment, GEochemistry, and Ranging (MESSENGER) mission to Mercury. SciBox encompasses the derivation of observing sequences from science objectives, the scheduling of those sequences, the generation of spacecraft and instrument commands, and the validation of those commands prior to uploading to the spacecraft. Although the process is automated, science and observing requirements are incorporated at each step by a series of rules and parameters to optimize observing opportunities, which are tested and validated through simulation and review. Except for limited special operations and tests, there is no manual scheduling of observations or construction of command sequences. SciBox reduces the lead time for operations planning by shortening the time-consuming coordination process, reduces cost by automating the labor-intensive processes of human-in-the-loop adjudication of observing priorities, reduces operations risk by systematically checking constraints, and maximizes science return by fully evaluating the trade space of observing opportunities to meet MESSENGER science priorities within spacecraft recorder, downlink, scheduling, and orbital-geometry constraints.

  18. 77 FR 75414 - Establishment of Department of Defense Federal Advisory Committees

    Science.gov (United States)

    2012-12-20

    ... applicable military centers; c. Assessing the DoD approach to planning and programming facility improvements...; and facility programming responsibilities between the Assistant Secretary of Defense for Health...(P&R)) and in coordination with the appropriate Military Departments and installation commanders. The...

  19. Spaceport Command and Control System Automated Verification Software Development

    Science.gov (United States)

    Backus, Michael W.

    2017-01-01

    For as long as we have walked the Earth, humans have always been explorers. We have visited our nearest celestial body and sent Voyager 1 beyond our solar system1 out into interstellar space. Now it is finally time for us to step beyond our home and onto another planet. The Spaceport Command and Control System (SCCS) is being developed along with the Space Launch System (SLS) to take us on a journey further than ever attempted. Within SCCS are separate subsystems and system level software, each of which have to be tested and verified. Testing is a long and tedious process, so automating it will be much more efficient and also helps to remove the possibility of human error from mission operations. I was part of a team of interns and full-time engineers who automated tests for the requirements on SCCS, and with that was able to help verify that the software systems are performing as expected.

  20. Man-Machine Communication in Remote Manipulation: Task-Oriented Supervisory Command Language (TOSC).

    Science.gov (United States)

    1980-03-01

    2-32 WvNIPUa.ATY wWMj.IAYCOYOLLID 𔃾 -XNEMILPU . 310?!3us mI.I Sr 1lR ROBO ........... O4WIUVISYN CP"CRIAumaN OWW411 -femi y PACISS PSTISH ’uucomC...task description 3-15 and as a machine advisor for an apprentice. Thus, the PN are developed hierarchically, by the machine from the top down to the...96734 rs Defense Technical Information Center Dr. A. L. Slafkosky Cameron Station, Bldg. 5 Scientific Advisor Alexandria, VA 22314 (12 cys) Commandant

  1. Command History. 1968. Volume 1. Sanitized.

    Science.gov (United States)

    1968-01-01

    battalions. Additionally, a diary captured on 19 December, Z1 kilometers southwest of Song Cau, revealed that on 19 November the author. a cadre member...the 306th and 312th ( AYA 308th) Bns. This reorga- nization was an apparent attempt by the headquarters of MR 3 to tighten its command and con- trol. (C

  2. Commandants' Managerial Capacity and Workers Productivity in ...

    African Journals Online (AJOL)

    The purpose of this study is to evaluate the commandant's managerial capacity as if relates to workers productivity with a view to determining whether their calling to the education terrain has been justified and to correct certain areas in need of improvement in the Nigeria Police Education set up. In doing this, the study took ...

  3. Command and Control in Littoral Operations

    Science.gov (United States)

    2016-05-13

    at the graphics on the wall displaying the position of the various forces under his command. Only a few of his 14 ships were in formation with him...Mainz, 2d MEB Lead Planner (November 11, 2014). Moskowitz, Michael, and Nolan Noble. Dawn Blitz 2015- Observations and Analysis. Exercise

  4. RELATIONSHIP BETWEEN LINGUISTIC UNITS AND MOTOR COMMANDS.

    Science.gov (United States)

    FROMKIN, VICTORIA A.

    ASSUMING THAT SPEECH IS THE RESULT OF A NUMBER OF DISCRETE NEUROMUSCULAR EVENTS AND THAT THE BRAIN CAN STORE ONLY A LIMITED NUMBER OF MOTOR COMMANDS WITH WHICH TO CONTROL THESE EVENTS, THE RESEARCH REPORTED IN THIS PAPER WAS DIRECTED TO A DETERMINATION OF THE SIZE AND NATURE OF THE STORED ITEMS AND AN EXPLANATION OF HOW SPEAKERS ENCODE A SEQUENCE…

  5. APOLLO 11 COMMANDER NEIL ARMSTRONG IN SIMULATOR

    Science.gov (United States)

    1969-01-01

    Apollo 11 commander Neil Armstrong is going through flight training in the lunar module simulator situated in the flight crew training building at KSC. Armstrong will pilot the lunar module to a moon landing on July 20, following launch from KSC on July 16.

  6. Command-And-Control or Taxation?

    DEFF Research Database (Denmark)

    Oh, Christina; Svendsen, Gert Tinggaard

    2015-01-01

    an ineffective command-and-control (CAC) tool, whereas Denmark has chosen the effective tool of taxation. One main explanation for this variation in policy choice is the variation in institutional setups, namely the corporatist route in Denmark versus the pluralistic route in California....

  7. On Some Tendencies in Defense Policy of Germany

    Directory of Open Access Journals (Sweden)

    Natalia K. Meden

    2015-01-01

    Full Text Available The paper discusses the newest trends in the German defense policy, caused by the aggravation of European geopolitical situation. The author analyzes various sources, among them official reports presented to the Ministry of Defense and the Bundestag; speeches by the Minister of Defense and by supreme commanders of the Bundeswehr; published in mass media information on condition and problems of the military forces, as well as modernization of the equipment. Officially it is deemed, that the reform of the Bundeswehr which started in 2011, so far has turned into an amorphous process of renewal (Neuausrichtung, intended to improve the military organization. Since the acting Cabinet was farmed, Ursula von der Leyen - the first woman Minister of Defense of Germany - directs these activities, and her style of work affects all the work in the Ministry. Meanwhile, the revision of the main parameters of the defensive activity and the whole German politics is caused not by a fresh leadership, but by the most sharp after the end of the "cold war" geopolitical crisis in Europe. The author comes to conclusion, that a turning point in the Defensive Policy of Germany is taking shape, so that all the aspects of military organization are now affected: command stuff training, military equipment, strengthening of ties with allies. Anti-Russian propaganda in mass-media reanimates an image of an enemy and prepares public opinion to the future growth of military expenses; it even overcomes certain pacifism, so usual in modern society. Here in Russia, one must take all this into account, as an idea of the low fighting capacity of the Bundeswehr, which was formed in the last years, is getting obsolete, and could became a dangerous illusion.

  8. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2005-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  9. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2004-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  10. Defense Transportation; The Army

    National Research Council Canada - National Science Library

    1998-01-01

    .... The statement of managers in the conference report on the Department of Defense Appropriations Act, 1997, directed us to validate the results and savings achieved from this and any other personal property pilot program...

  11. Intelligent Tutoring System for Teaching Battlefield Command Reasoning Skills

    National Research Council Canada - National Science Library

    Domeshek, Eric

    2002-01-01

    .... Achieving expert levels of proficiency in high-level command reasoning skills-whether for battlefield commanders or for executives in industry-requires extensive practice, coaching, and feedback...

  12. 'The Danger of Divided Command': British civil and military disputes ...

    African Journals Online (AJOL)

    Commander-in-Chief of the Indian Army, Lord Kitchener, which culminated in Curzon's ... and the officers commanding forces would have no doubt as to their .... but assuming financial responsibility for its own defence would have been ...

  13. Maritime Coalitions: When is Unity of Command Required

    National Research Council Canada - National Science Library

    Gahlinger, Gregory J

    2007-01-01

    .... The concepts of Unity of Command, Unity of Effort and Parallel, Lead Nation, or Integrated coalition command structures are viable across a broad spectrum of maritime coalition operations but do have...

  14. GPS and the Joint Force Commander: Critical Asset, Critical Vulnerability

    National Research Council Canada - National Science Library

    McPherson, Michael

    2001-01-01

    Joint Force Commanders (JFCs) have become over reliant on military and commercial satellite systems for intelligence gathering and dissemination, weather, command, control, communications, and navigation/guidance functions, to name a few...

  15. U.S. Africa Command: Shaping Africa for the Future

    National Research Council Canada - National Science Library

    Sholley, Hans

    2006-01-01

    .... It is argued the current Unified Command Plan is ill designed to address the complexities of the continent of Africa and that a proposed United States Africa Command would be better positioned...

  16. The Warfighting Capacity of Air Combat Command's Numbered Air Forces

    National Research Council Canada - National Science Library

    Hanser, Lawrence

    2000-01-01

    ...) of the Air Combat Command (ACC), General Richard E. Hawley, the ACC Commander, asked if RAND could offer an analysis of the number of NAFs that were needed by ACC to meet warfighting requirements...

  17. Design of a hybrid command and control mobile botnet

    CSIR Research Space (South Africa)

    Pieterse, H

    2013-05-01

    Full Text Available and control mobile botnet. The hybrid design explores the efficiency of multiple command and control channels against the following objectives: no single point of failure within the topology, low cost for command dissemination, limited network activities...

  18. Incorrect Responses to Locative Commands: A Case Study.

    Science.gov (United States)

    Duchan, Judith; Siegel, Leo

    1979-01-01

    A six-year-old with a language problem responded consistently to 100 locative commands by putting objects in containers and on flat surfaces regardless of the preposition or order of the nouns in the commands. (Author/CL)

  19. Defense Primer: DOD Contractors

    Science.gov (United States)

    2017-02-10

    functions, from intelligence analysis or software development to landscaping or food service. Why does DOD use individual contractors? Going back to...that provide professional services, from research to management support. The bulk of contractors—more than 70%—provide products, and these include...10 U.S.C. Part IV: Service, Supply, and Procurement. CRS Products CRS In Focus IF10548, Defense Primer: U.S. Defense Industrial Base, by Daniel

  20. Ballistic Missile Defense

    OpenAIRE

    Mayer, Michael

    2011-01-01

    At the 2010 NATO summit in Lisbon, the alliance decided to move forward on the development of a territorial ballistic missile defense (BMD) system and explore avenues for cooperation with Russia in this endeavor. Substantial progress on BMD has been made over the past decade, but some questions remain regarding the ultimate strategic utility of such a system and whether its benefi ts outweigh the possible opportunity costs. Missile defense has been a point of contention between the US and its...

  1. Soviet command and control in a historical context

    OpenAIRE

    Kern, Jeffrey A.

    1981-01-01

    Approved for public release; distribution is unlimited An examination is made of the historical antecedents of present day command and control doctrine in the Soviet Union. The continuity of principal characteristics is demonstrated. The ideological determinants shaping the command and control system are first developed. These include centralism, collective decision-making, unity of command, and redundancy. Practical consequences of these are explored. The functioning of Soviet command...

  2. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-11-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Revised Defense Logistics Agency...

  3. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2010-12-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  4. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  5. Air defense planning for an area with the use of very short range air defense sets

    Directory of Open Access Journals (Sweden)

    Tadeusz Pietkiewicz

    2017-12-01

    Full Text Available This paper presents a heuristic method of planning the deployment of very short-range anti-air missile and artillery sets (VSHORAD around an area (‘protected area’ in order to protect it. A function dependent on the distance between the earliest feasible points of destroying targets and the centre of the protected area was taken as an objective function. This is a different indicator from those commonly used in the literature, and based on the likelihood of a defense zone penetration by means of an air attack (MAA: the kill probability of the MAA and the probability of area losses. The model constraints resulted directly from the restrictions imposed by real air defense systems and the nature of the area being defended. This paper assumes that the VSHORAD system operates as a part of a general, superordinate air defense command and control system based on the idea of network-centric warfare, which provides the VSHORAD system with a recognized air picture, air defense plans, and combat mission specifications. The presented method has been implemented. The final part of the paper presents the computational results. Keywords: optimal planning, air defense system, area installation protection, deployment of very short range anti-air missile and artillery sets (VSHORAD

  6. Supplier Relationship Management at Army Life Cycle Management Commands: Gap Analysis of Best Practices

    Science.gov (United States)

    2012-01-01

    contracts. - 76 - In step 9, maintaining momentum in supplier management , the relationship between the customer and supplier continues to develop...REPORT DATE 2012 2. REPORT TYPE 3. DATES COVERED 00-00-2012 to 00-00-2012 4. TITLE AND SUBTITLE Supplier Relationship Management at Army Life... Relationship Management at Army Life Cycle Management Commands Gap Analysis of Best Practices Nancy Y. Moore, Amy G. Cox, Clifford A. Grammich

  7. The Navy’s Moral Compass: Commanding Officers and Personal Misconduct

    Science.gov (United States)

    2016-07-01

    commanding officer corps and our service, to take positive action to develop each officer’s moral compass and establish an ethical standard. Step One...high moral ground in their discretionary judgments. Furthermore, the Army Operating Concept of 2010 includes three pages of ethical and behavioral...Journal of Business Ethics 12, no. 6 (1993), p. 265. 24. U.S. Navy Dept., U.S. Navy Regulations (Washington, D.C.: 1990), sec. 802, para. 1. 25

  8. Command in Air War. Centralized Versus Decentralized Control of Combat Airpower

    Science.gov (United States)

    2007-06-01

    fears that Americans were the “Great Satan ” that its enemies claimed. Groups such as Ansar al-Islam incorporated these pictures into their recruit- ing...his steps. —Proverbs 16:9 —New American Standard Bible Air Force aircraft were not involved in the battle in Mogadishu, Somalia...Command and Control Research Pro- gram, Nov. 2002. http://www.dodccrp.org/publications/ pdf / Smith_EBO.PDF. Snook, Scott A. Friendly Fire: The Accidental

  9. U.S. Pacific Command > About USPACOM > History

    Science.gov (United States)

    USPACOM U.S. Pacific Command Search USPACOM: Search Search Search USPACOM: Search Home Leadership People's Republic of China, the Democratic People's Republic of Korea, Mongolia, and the Republic of its surrounding waters under the leadership of one commander, providing a unity of command absent from

  10. Design of a hybrid command and control mobile botnet: Presentation

    CSIR Research Space (South Africa)

    Pieterse, H

    2013-03-01

    Full Text Available smartphones controlled by a botmaster through a command and control network to serve a malicious purpose. This study presents the design of a hybrid command and control mobile botnet. It describes the propagation vectors, command and control channels...

  11. Automated constraint checking of spacecraft command sequences

    Science.gov (United States)

    Horvath, Joan C.; Alkalaj, Leon J.; Schneider, Karl M.; Spitale, Joseph M.; Le, Dang

    1995-01-01

    Robotic spacecraft are controlled by onboard sets of commands called "sequences." Determining that sequences will have the desired effect on the spacecraft can be expensive in terms of both labor and computer coding time, with different particular costs for different types of spacecraft. Specification languages and appropriate user interface to the languages can be used to make the most effective use of engineering validation time. This paper describes one specification and verification environment ("SAVE") designed for validating that command sequences have not violated any flight rules. This SAVE system was subsequently adapted for flight use on the TOPEX/Poseidon spacecraft. The relationship of this work to rule-based artificial intelligence and to other specification techniques is discussed, as well as the issues that arise in the transfer of technology from a research prototype to a full flight system.

  12. Operational Maneuver from the Sea and Amphibious Command Relationships: Is It time for a Joint Force Amphibious Component Commander?

    National Research Council Canada - National Science Library

    Bennett, Michael

    2004-01-01

    .... In a joint community that is becoming increasingly dependant on the use of functional component commanders in the execution of major operations, the need for a Joint Force Amphibious Component Commander (JFAMCC...

  13. Commanders’ Perception of Risk: Enabling Boldness

    Science.gov (United States)

    2008-04-01

    individual. Soldiers are trained over time to employ their weapon systems tinder a variety of conditions in, realistic simulations and scenarios, thus...from ground combat the specialty is, where th~ leader provides the same support in combat that he would in garrison with no direct relationship to an...34 safety paperwork and activities. 73 Senior commanders must aggressively search for means to communicate their intent and the relationship between

  14. Command and Control for Distributed Lethality

    Science.gov (United States)

    2017-06-01

    extended communications between the AFP CDR and the CCDR are required. As shown in Figure 20, the principle command relationships are between...frequency (RF) communications are limited by maximum antenna height of each surface platform without an airborne relay. LOS is estimated with an online ...documents the interconnections and relationship of information flow and the system requirements for maintaining the interconnection links during a

  15. Jimmy Doolittle: The Commander behind the Legend

    Science.gov (United States)

    2015-02-01

    was 35 percent and that, although luxury items were cheap, food and other necessities were expensive. He speculated that everyone in Germany...British Spitfire groups, one troop-carrier group, one light-bombardment group, and three medium-bombardment groups.123 He later observed, “I was a brand ...a very popular commander, Ira Eaker, was perhaps the first. Eaker had served in the Eighth since its incep- tion and led its first independent attack

  16. Tools virtualization for command and control systems

    Science.gov (United States)

    Piszczek, Marek; Maciejewski, Marcin; Pomianek, Mateusz; Szustakowski, Mieczysław

    2017-10-01

    Information management is an inseparable part of the command process. The result is that the person making decisions at the command post interacts with data providing devices in various ways. Tools virtualization process can introduce a number of significant modifications in the design of solutions for management and command. The general idea involves replacing physical devices user interface with their digital representation (so-called Virtual instruments). A more advanced level of the systems "digitalization" is to use the mixed reality environments. In solutions using Augmented reality (AR) customized HMI is displayed to the operator when he approaches to each device. Identification of device is done by image recognition of photo codes. Visualization is achieved by (optical) see-through head mounted display (HMD). Control can be done for example by means of a handheld touch panel. Using the immersive virtual environment, the command center can be digitally reconstructed. Workstation requires only VR system (HMD) and access to information network. Operator can interact with devices in such a way as it would perform in real world (for example with the virtual hands). Because of their procedures (an analysis of central vision, eye tracking) MR systems offers another useful feature of reducing requirements for system data throughput. Due to the fact that at the moment we focus on the single device. Experiments carried out using Moverio BT-200 and SteamVR systems and the results of experimental application testing clearly indicate the ability to create a fully functional information system with the use of mixed reality technology.

  17. Auftragstaktik: The Basis for Modern Military Command?

    Science.gov (United States)

    2012-12-06

    Pauli’s Nachf, 1892. Showalter, Dennis. The Wars of German Unification. London: Hodder Education , 2004. Simpkin, Richard. Race to the Swift. London...to the bourgeois class again, making education , not social position, the deciding factor for obtaining a commission.15 The army created a system of...only reflected the increased education and capability of the new officer corps, but also the reality of commanding an army in the Napoleonic era

  18. Mission Command In A Communications Denied Environment

    Science.gov (United States)

    2017-02-16

    the mutual trust between the echelons.8 In the United States armed forces, the Joint Chiefs have understood the value of...without being over controlling or micromanaging.12 During the execution phase the commander is the free to choose his position on the battlefield to... the Air Force Association Convention, National Harbor, MD, September 16, 2009, accessed at http://www.defenselink.mil/ speeches

  19. Naval Meteorology and Oceanography Command exhibit entrance

    Science.gov (United States)

    2000-01-01

    StenniSphere at NASA's John C. Stennis Space Center in Hancock County, Miss., invites visitors to discover why America comes to Stennis Space Center before going into space. Designed to entertain while educating, StenniSphere includes informative displays and exhibits from NASA and other agencies located at Stennis, such as this one from the Naval Meteorology and Oceanography Command. Visitors can 'travel' three-dimensionally under the sea and check on the weather back home in the Weather Center.

  20. Naval Meteorology and Oceanography Command exhibit

    Science.gov (United States)

    2000-01-01

    Designed to entertain while educating, StenniSphere at the John C. Stennis Space Center in Hancock County, Miss., includes informative displays and exhibits from NASA and other agencies located at Stennis, such as this one from the Naval Meteorology and Oceanography Command. Visitors can 'travel' three-dimensionally under the sea and check on the weather back home in the Weather Center. StenniSphere is open free of charge from 9 a.m. to 5 p.m. daily.

  1. Using the Oldest Military Force for the Newest National Defense

    Directory of Open Access Journals (Sweden)

    Brian Claus

    2015-12-01

    Full Text Available The National Guard is establishing Cyber Mission Teams (CMT that will fulfill a federal role to backfill active duty defending Department of Defense networks, but are also exploring how they could effectively fulfill state missions. The President, Council of Governors, and USCYBERCOM Commander have expressed concerns about U.S. critical infrastructure cyber network vulnerabilities and the increasing magnitude of threat our adversaries pose to those networks’ security. This article explores using this emerging National Guard capability in a state role for protection of critical infrastructure cyber networks. Most of the critical infrastructure is privately owned. Although current executive orders and policy mandate government sharing of cyber threat information, private providers’ reciprocation of sharing their vulnerabilities is voluntary. This article contends that effective cyber defense requires strong private-public partnerships. We developed a critical infrastructure cyber defense model based upon key characteristics from the literature on private-public partnerships and performed a case study of current cyber defense partnerships to validate the model. Our research shows this model to be a useful guide for emerging National Guard Cyber Mission Forces to consider when establishing partnerships for effective critical infrastructure cyber defense.

  2. COP21: defense stakes

    International Nuclear Information System (INIS)

    Coldefy, Alain; Hulot, Nicolas; Aichi, Leila; Tertrais, Bruno; Paillard, Christophe-Alexandre; Piodi, Jerome; Regnier, Serge; Volpi, Jean-Luc; Descleves, Emmanuel; Garcin, Thierry; Granholm, Niklas; Wedin, Lars; Pouvreau, Ana; Henninger, Laurent

    2015-01-01

    The 21. Conference of the Parties (COP21) from the UN Framework Convention took place in Paris between November 30 and December 11, 2015. The challenge is to reach a universal agreement of fight against global warming and to control the carbon footprint of human activities. This topic is in the core of the Defense Ministry preoccupations. This special dossier takes stock of the question of defense issues linked with global warming. The dossier comprises 13 papers dealing with: 1 - COP21: defense stakes (Coldefy, A.); 2 - Warfare climate, a chance for peace (Hulot, N.); 3 - COP21 and defense (Aichi, L.); 4 - A war climate? (Tertrais, B.); 5 - Challenges the World has to face in the 21. century (Paillard, C.A.); 6 - Desertification: a time bomb in the heart of Sahel (Piodi, J.); 7 - The infrastructure department of defense in the fight against climate disturbance (Regnier, S.); 8 - Fight against global warming, a chance for the forces? (Volpi, J.L.); 9 - Sea and sustainable development (Descleves, E.); 10 - Rationales of Arctic's surrounding powers (Garcin, T.); 11 - Arctic: strategic stake (Granholm, N.; Wedin, L.); 12 - Strategic impact of Turkey's new energy choices (Pouvreau, A.); 13 - Climate and war: a brief historical outlook (Henninger, L.)

  3. A step toward nuclear sanity

    International Nuclear Information System (INIS)

    Gottfried, K.; Long, F.

    1988-01-01

    This paper reports that Reykjavik formally ended as a diplomatic failure, but it has begun an overdue revolution in perceptions. At long last, both superpowers have the in concrete terms that vastly smaller nuclear arsenals would make them safer. Implicitly, they are saying that nuclear weapons are not useful weapons. Those insights are a prerequisite to nuclear sanity. The United States has proposed to eliminate all strategic ballistic missiles, on land and submarines, in two five-year steps. During that period, we (and presumably the Soviet Union) would develop missile defenses to be deployed in ten years. The first part of this plan makes excellent sense. Ballistic missiles explode on their targets ten to thirty minutes after launch. Today's huge and accurate missile arsenals have forced both superpowers to adopt a hair-trigger stance: they might launch missiles simply on warning of attack

  4. Internship guide : Work placements step by step

    NARCIS (Netherlands)

    Haag, Esther

    2013-01-01

    Internship Guide: Work Placements Step by Step has been written from the practical perspective of a placement coordinator. This book addresses the following questions : what problems do students encounter when they start thinking about the jobs their degree programme prepares them for? How do you

  5. The way to collisions, step by step

    CERN Multimedia

    2009-01-01

    While the LHC sectors cool down and reach the cryogenic operating temperature, spirits are warming up as we all eagerly await the first collisions. No reason to hurry, though. Making particles collide involves the complex manoeuvring of thousands of delicate components. The experts will make it happen using a step-by-step approach.

  6. Command Center Library Model Document. Comprehensive Approach to Reusable Defense Software (CARDS)

    Science.gov (United States)

    1992-05-31

    system, and functionality for specifying the layout of the document. 3.7.16.1 FrameMaker FrameMaker is a Commercial Off The Shelf (COTS) component...facilitating WYSIWYG creation of formatted reports with embedded graphics. FrameMaker is an advanced publishing tool that integrates word processing...available for the component FrameMaker : * Product evaluation reports in ASCII and postscript formats • Product assessment on line in model 0 Product

  7. The Role of North American Aerospace Defense Command (NORAD) In Military Cyber Attack Warning

    Science.gov (United States)

    2015-09-01

    2010 and 2012 targeting banks and media organizations. Pyongyang rejects these charges.33 Thus, we clearly see the Intelligence Community’s rising...development of norms for acceptable conduct in cyberspace; laws concerning cybercrime ; data preservation, protection, and privacy; and approaches

  8. Duplicate Class IV (Lumber) Ordering Within Defense Logistics Agency and Its Impact in Each Combatant Command

    Science.gov (United States)

    2015-12-01

    opened up in a foreign country. Over time this can lead to shortages for other requesting units with impact to mission requirements (Wright, Smith...security cameras, barcoding, and manpower that can contribute towards physical accountability measures. Though actions are taken, opportunity costs...position is held by a Staff Sergeant E-6” (U. S. Army, 2014a, p. 1-8). Warehouse supervisor: “Assists the SSA NCOIC in implementing policies

  9. Person or Platform: A New Look at Selecting the Air and Missile Defense Commander

    Science.gov (United States)

    2016-05-13

    approach and field incoming AMDCs that can focus on the specific mission set. The result will allow on-the- job training to be dedicated to more...Reference: DOD Directive 5230.24 13. SUPPLEMENTARY NOTES A paper submitted to the Naval War College faculty in partial satisfaction of the...for the CWC to fill the role by determining the best and most qualified person for the job . The recommendations therein lend themselves to a cadre

  10. Defensive Federal Litigation

    Science.gov (United States)

    1998-08-20

    requires that all affirmative defenses be pleaded in the answer. The rule lists 19 specific affirmative defenses, such as estoppel , laches, res judicata...Brown, 22 F.3d 516 (2d Cir. 1994); Poole v. Rourke, 779 F. Supp. 1546 (E.D. Cal. 1991). 3-40 potential collateral estoppel .4. effect of the district...the back pay claim, which was over $10,000, to the Court of Claims. The court of appeals found that ൸Collateral estoppel prohibits relitigation of

  11. Defense styles of pedophilic offenders.

    Science.gov (United States)

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas

    2008-04-01

    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization.

  12. Microsoft Office professional 2010 step by step

    CERN Document Server

    Cox, Joyce; Frye, Curtis

    2011-01-01

    Teach yourself exactly what you need to know about using Office Professional 2010-one step at a time! With STEP BY STEP, you build and practice new skills hands-on, at your own pace. Covering Microsoft Word, PowerPoint, Outlook, Excel, Access, Publisher, and OneNote, this book will help you learn the core features and capabilities needed to: Create attractive documents, publications, and spreadsheetsManage your e-mail, calendar, meetings, and communicationsPut your business data to workDevelop and deliver great presentationsOrganize your ideas and notes in one placeConnect, share, and accom

  13. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    The 1993 policy to promote the consolidation of the United States defense industry began a series of acquisitions and mergers that went beyond the intent of the policy and left the Department of Defense (DoD...

  14. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    ...% of defense product sales annually. Defense consolidation has diminished the flexibility required for surge capacity, diminished competitive innovations in products, and reduced competitive pricing based on multiple sources for products...

  15. Network attacks and defenses a hands-on approach

    CERN Document Server

    Trabelsi, Zouheir; Al Braiki, Arwa; Mathew, Sujith Samuel

    2012-01-01

    The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both offensive and defensive techniques. Using step-by-step processes to build and generate attacks using offensive techniques, Network Attacks and Defenses: A Hands-on Approach enables students to implement appropriate network security solutions within a laborat

  16. OFFICER AND COMMANDER IN ASYMMETRIC WARFARE OPERATIONS

    Directory of Open Access Journals (Sweden)

    Giuseppe CAFORIO

    2013-01-01

    Full Text Available Starting from the data of a field research conducted among soldiers with asymmetric warfare experiences from nine different countries, the author seeks to identify and shed light on the various problems that officers with command responsibilities had to face during their missions. A picture emerges of feelings and experiences relating to their first impression upon arriving in the theatre, relations with local armed forces, relations with the local population and local authorities, relations with NGOs, relations with other armies, the impact of the rules of engagement (ROEs, training and education, and operational experiences. The paper ends with a discussion of the lessons learned.

  17. Incident Command System - Environmental Unit responsibilities

    International Nuclear Information System (INIS)

    Hillman, S. O.

    1997-01-01

    The Incident Command System (ICS) for crisis management, used for response to oil spills by the Alyeska Pipeline Service Company throughout its facilities, including the Trans Alaska Pipeline and the Valdez Marine Terminal, was described. Special attention was given to the Environmental Unit within the ICS which functions as a primary support unit for the Incident Operations Section. Details of the Unit's function were provided. These include the collection, evaluation and dissemination of information on all environmental issues concerning the crisis, provision of advice and direction on environmental aspects, and up-front agency interaction. A checklist of tasks is included. 7 refs

  18. Spaceport Command and Control System Automation Testing

    Science.gov (United States)

    Hwang, Andrew

    2017-01-01

    The Spaceport Command and Control System (SCCS) is the National Aeronautics and Space Administrations (NASA) launch control system for the Orion capsule and Space Launch System, the next generation manned rocket currently in development. This large system requires high quality testing that will properly measure the capabilities of the system. Automating the test procedures would save the project time and money. Therefore, the Electrical Engineering Division at Kennedy Space Center (KSC) has recruited interns for the past two years to work alongside full-time engineers to develop these automated tests, as well as innovate upon the current automation process.

  19. 24 Command Fire Improvement Action Program Plan

    International Nuclear Information System (INIS)

    GRIFFIN, G.B.

    2000-01-01

    Fluor Hanford (FH) is responsible for providing support to the Department of Energy Richland Operations Office (RL) in the implementation of the Hanford Emergency Preparedness (EP) program. During fiscal year 2000, a number of program improvements were identified from various sources including a major range fire (24 Command Fire). Evaluations of the emergency preparedness program have confirmed that it currently meets all requirements and that performance of personnel involved is good, however the desire to effect continuous improvement resulted in the development of this improvement program plan. This program plan defines the activities that will be performed in order to achieve the desired performance improvements

  20. Spaceport Command and Control System Automation Testing

    Science.gov (United States)

    Plano, Tom

    2017-01-01

    The goal of automated testing is to create and maintain a cohesive infrastructure of robust tests that could be run independently on a software package in its entirety. To that end, the Spaceport Command and Control System (SCCS) project at the National Aeronautics and Space Administration's (NASA) Kennedy Space Center (KSC) has brought in a large group of interns to work side-by-side with full time employees to do just this work. Thus, our job is to implement the tests that will put SCCS through its paces.

  1. Spaceport Command and Control System Automated Testing

    Science.gov (United States)

    Stein, Meriel

    2017-01-01

    The Spaceport Command and Control System (SCCS) is the National Aeronautics and Space Administrations (NASA) launch control system for the Orion capsule and Space Launch System, the next generation manned rocket currently in development. This large system requires high quality testing that will properly measure the capabilities of the system. Automating the test procedures would save the project time and money. Therefore, the Electrical Engineering Division at Kennedy Space Center (KSC) has recruited interns for the past two years to work alongside full-time engineers to develop these automated tests, as well as innovate upon the current automation process.

  2. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    Directory of Open Access Journals (Sweden)

    Peng Xun

    2017-10-01

    Full Text Available A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1 the command sequence is disordered and (2 disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  3. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    Science.gov (United States)

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  4. Defense radioactive waste management

    International Nuclear Information System (INIS)

    Hindman, T.B. Jr.

    1988-01-01

    The Office of Defense Programs (DP), U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. Pursuant to this mission, DP operates a large industrial complex that employs over 60,000 people at various installations across the country. As a byproduct of their activities, these installations generate radioactive, hazardous, or mixed wastes that must be managed in a safe and cost-effective manner in compliance with all applicable Federal and STate environmental requirements. At the Federal level such requirements derive primarily from the Atomic Energy Act, the Resource Conservation and Recovery Act (RCRA), the comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) and the Superfund Amendments and Reauthorization Act (SARA). Responsibility for DP activities in connection with the disposal of defense wastes is consolidated within the Office of Defense Waste and Transportation Management (DWTM). This paper discusses these activities which consist of five principal elements: the environmental restoration of inactive DP facilities and sites, the processing storage and disposal of wastes associated with ongoing operations at active DP facilities, research and development directed toward the long-term disposal of radioactive, hazardous, mixed wastes, technology development directly supporting regulatory compliance, and the development of policies, procedures, and technologies for assuring the safe transportation of radioactive and hazardous materials

  5. Auxins in defense strategies

    Czech Academy of Sciences Publication Activity Database

    Čarná, Mária; Repka, V.; Skůpa, Petr; Šturdík, E.

    2014-01-01

    Roč. 69, č. 10 (2014), s. 1255-1263 ISSN 0006-3088 R&D Projects: GA TA ČR TA01011802 Institutional support: RVO:61389030 Keywords : auxin * defense responses * JA Subject RIV: GF - Plant Pathology, Vermin, Weed, Plant Protection Impact factor: 0.827, year: 2014

  6. Hanford defense waste studies

    International Nuclear Information System (INIS)

    Napier, B.A.; Zimmerman, M.G.; Soldat, J.K.

    1981-01-01

    PNL is assisting Rockwell Hanford Operations to prepare a programmatic environmental impact statement for the management of Hanford defense nuclear waste. The Ecological Sciences Department is leading the task of calculation of public radiation doses from a large matrix of potential routine and accidental releases of radionuclides to the environment

  7. Rethinking Defensive Information Warfare

    Science.gov (United States)

    2004-06-01

    Countless studies, however, have demonstrated the weakness in this system.15 The tension between easily remembered passwords and suffi...vulnerabilities Undiscovered flaws The patch model for Internet security has failed spectacularly. Caida , 2004 Signature-Based Defense Anti virus, intrusion

  8. Defense Logistics Agency Revenue Eliminations

    National Research Council Canada - National Science Library

    1996-01-01

    The issue of revenue eliminations was identified during our work on the Defense Logistics Agency portion of the Audit of Revenue Accounts in the FY 1996 Financial Statements of the Defense Business Operations Fund...

  9. Command Structure for Theater Warfare: The Quest for Unity of Command

    Science.gov (United States)

    1984-09-01

    that trryfari tail forth thr htst from iti—Btturki Major General« Pern M Smith. USAF. and Hark) A Hughe«. USAF. contributed more to the rndertaking...an air. ground, and sea component. These arc generic commands which control all combat operations in the media of the air. ground, and sea. There

  10. Iranian Ballistic Missile Threat and a Phased, Adaptive Approach for Missile Defense in Europe: Perceptions, Policies and Scenarios

    Science.gov (United States)

    2010-09-15

    vii ACRONYMS AA Aegis Ashore ABL Airborne Laser ABM Anti-Ballistic Missile ADCF Air Defense Command Frigates AEOI ...in September 2002 at the IAEA’s General Conference in Vienna, Iran’s Vice President and President of the Atomic Energy Organization of Iran ( AEOI

  11. Multi-step direct reactions

    International Nuclear Information System (INIS)

    Koning, A.J.

    1992-07-01

    In recent years a variety of statistical theories has been developed concerning multistep direct (MSD) nuclear reactions. In addition, dominant in applications is a whole class of semiclassical models that may be subsumed under the heading of 'generalized exciton models'; these are basically MSD-type extensions on top of compound-like concepts. In this report the relation between their underlying statistical MSD-postulates are highlighted. A command framework is sketched that enables to generate the various MSD theories through assigning statistical properties to different parts of the nuclear Hamiltonian. Then it is shown that distinct forms of nuclear randomness are embodied in the mentioned theories. All these theories appear to be very similar at a qualitative level. In order to explain the high energy-tails and forward-peaked angular distribution typical for particles emitted in MSD reactions, it is imagined that the incident continuum particle stepwise looses its energy and direction in a sequence of collisions, thereby creating new particle-hole pairs in the target system. At each step emission may take place. The statistical aspect comes in because many continuum states are involved in the process. These are supposed to display chaotic behavior, the associated randomness assumption giving rise to important simplifications in the expression for MSD emission cross sections. This picture suggests that mentioned MSD models can be interpreted as a variant of essentially one and the same theory. 113 refs.; 25 figs.; 9 tabs

  12. Unity of Command for Federal Consequence Management

    Science.gov (United States)

    2013-09-01

    143  A.  A REVITALIZED EMERGENCY SUPPORT FUNCTION LEADERSHIP GROUP...Group (ESFLG) needs to be revitalized and become the nexus for the federal interagency operational response to disasters. The ESFLG would provide a...amended (50 U.S.C. App . § 2251 et seq). Public Law 81–920. It was repealed in its entirety in 1994 by The National Defense Authorization Act for Fiscal

  13. Military Knowledge Handbook for Commanders (Selected Section)

    Science.gov (United States)

    1988-03-28

    8217 Accession For NTIS GRA&I DTIC TAB 0l Unannoun ed 0] ju,.it . " t ation Distri’muti on/ Availabilit %Codes Dist cSpeial GRAPHICS DISCLAIMER...cloud layers, the energy of ray radiation on the ground will increase due to reflection effect of the cloud layers. Water surface, ice, accumulated... water flow can direct the radioactive fallout into defense works and water sources to worsen contaminations; radioactive fallout can easily be retained in

  14. Engagement Skills Trainer: The Commander’s Perspective

    Science.gov (United States)

    2017-06-09

    CBRN Chemical Biological Radiological and Nuclear CGSOC Command and General Staff Officers Course DMG Digital Master Gunner EST Engagement Skills...commanders always emphasized SHARP ( Sexual Harassment and Response Program) training, the battery commander may vividly recall those events but not the range...soldiers in the EST generally do worse at weapons safety and orientation .26 Indicators from research show that EST results predict live fire results. The

  15. Command vector memory systems: high performance at low cost

    OpenAIRE

    Corbal San Adrián, Jesús; Espasa Sans, Roger; Valero Cortés, Mateo

    1998-01-01

    The focus of this paper is on designing both a low cost and high performance, high bandwidth vector memory system that takes advantage of modern commodity SDRAM memory chips. To successfully extract the full bandwidth from SDRAM parts, we propose a new memory system organization based on sending commands to the memory system as opposed to sending individual addresses. A command specifies, in a few bytes, a request for multiple independent memory words. A command is similar to a burst found in...

  16. XTCE: XML Telemetry and Command Exchange Tutorial, XTCE Version 1

    Science.gov (United States)

    Rice, Kevin; Kizzort, Brad

    2008-01-01

    These presentation slides are a tutorial on XML Telemetry and Command Exchange (XTCE). The goal of XTCE is to provide an industry standard mechanism for describing telemetry and command streams (particularly from satellites.) it wiill lower cost and increase validation over traditional formats, and support exchange or native format.XCTE is designed to describe bit streams, that are typical of telemetry and command in the historic space domain.

  17. Terrain Commander: Unattended Ground-Based Surveillance System

    National Research Council Canada - National Science Library

    Steadman, Bob

    2000-01-01

    .... Terrain Commander OASIS provides next generation target detection, classification, and tracking through smart sensor fusion of beamforming acoustic, seismic, passive infrared, and magnetic sensors...

  18. Deductive Sensemaking Principles Using Personal Constructs of the Field Commanders

    National Research Council Canada - National Science Library

    Ntuen, Celestine A; Leedom, Dennis

    2007-01-01

    .... It is assumed that the expert commander constructs diverse and asynchronous sensemaking models when confronted with asymmetric situations-evolving and changing dynamics of the battlefield information...

  19. U.S. Special Operations Command Training and Education Program

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1996-01-01

    .... Special Operations Command (USCINCSOC), to train assigned forces to meet special operations mission taskings and to ensure interoperability with conventional forces and other special operations forces (SOF...

  20. Human Systems Integration Assessment of Network Centric Command and Control

    National Research Council Canada - National Science Library

    Quashnock, Dee; Kelly, Richard T; Dunaway, John; Smillie, Robert J

    2004-01-01

    .... FORCEnet is the operational construct and architectural framework for Naval Network Centric Warfare in the information age that integrates warriors, sensors, networks, command and control, platforms...

  1. When Contractors Deploy: A Guide for the Operational Commander

    National Research Council Canada - National Science Library

    Buhler, Carl

    2000-01-01

    .... Furthermore, this paper also lists four recommendations for operational commanders and the military on how to better integrate contractors into the military effort, especially during hostile combat situations...

  2. Apollo 16 astronauts in Apollo Command Module Mission Simulator

    Science.gov (United States)

    1972-01-01

    Astronaut Thomas K. Mattingly II, command module pilot of the Apollo 16 lunar landing mission, participates in extravehicular activity (EVA) training in bldg 5 at the Manned Spacecraft Center (MSC). In the right background is Astronaut Charles M. Duke Jr., lunar module pilot. They are inside the Apollo Command Module Mission Simulator (31046); Mattingly (right foreground) and Duke (right backgroung) in the Apollo Command Module Mission Simulator for EVA simulation and training. Astronaut John W. Young, commander, can be seen in the left background (31047).

  3. UDK tower defense

    CERN Document Server

    Doran, John

    2013-01-01

    This book is written by someone who is passionate about games for those who are equally passionate about games. The step-by-step instructions contained within this guide will make creating your first game simple.If you have ever had the urge to know more about how all those amazing games you played for countless hours are created, then this book is definitely for you! This step-by-step tutorial will teach you how to create a complete game within UDK.Even if you have no prior experience of UDK, you can still start building the games you want today.

  4. Commande adaptive d'une machine asynchrone

    Science.gov (United States)

    Slama-Belkhodja, I.; de Fornel, B.

    1996-06-01

    The paper deals with an indirect self-tuning speed control for an induction motor supplied by a chopper-filter-inverter system. Input/Output models are identified with the recursive least squares algorithm and the controller adaptation is based on a pole assignement strategy. Emphasis is put on the evaluation of the parameter identification in order to avoid instabilities because of disturbances or insufficient excitations. This is especially of importance when the adaptive control is carried out in closed loop systems and without additional test signals. Simulation results show the improvement of the dynamic responses and the robustness against load variations or parameters variations (rotor resistance, inertia). Cat article décrit une stratégie de commande adaptive indirecte à Placement de Pôles (PP), appliquée à la commande en vitesse d'une machine asynchrone alimentée par un ensemble hacheur-filtre-onduleur de tension. L'algorithme des Moindres Carrés Récursifs (MCR) est utilisé pour l'identification des modèles de comportement type entrées/sorties. Un intérêt particulier est porté à la mise en oeuvre de cet algorithme et à la discussion de ses résultats, tenant compte des erreurs de modélisation et de la nature peu riche en excitations des entrées du processus. Différents régimes transitoires ont été simulés pour apprécier l'apport de cette association (MCR-PP) : démarrages et inversion des sens de rotation, à vide et en charges, applications d'échelons de couple résistant, variations paramétriques. Les résultats permettent d'illustrer, tant au niveau des performances que de la robustesse, l'apport d'une telle commande adaptive pour des entraînements électriques avec une machine asynchrone.

  5. Step by Step Microsoft Office Visio 2003

    CERN Document Server

    Lemke, Judy

    2004-01-01

    Experience learning made easy-and quickly teach yourself how to use Visio 2003, the Microsoft Office business and technical diagramming program. With STEP BY STEP, you can take just the lessons you need, or work from cover to cover. Either way, you drive the instruction-building and practicing the skills you need, just when you need them! Produce computer network diagrams, organization charts, floor plans, and moreUse templates to create new diagrams and drawings quicklyAdd text, color, and 1-D and 2-D shapesInsert graphics and pictures, such as company logosConnect shapes to create a basic f

  6. Defense Primer: Procurement

    Science.gov (United States)

    2017-02-10

    Usually, incremental funding is used to mitigate peaks and valleys in annual budgets caused by the cost of one item significantly changing the...base defense budget . DOD uses these funds to buy several different types of materiel, including  new items easily recognizable as military...pursues a policy of full funding for procurement, meaning that the total estimated cost of each unit must be funded in the year it is budgeted . In a

  7. Quadrennial Defense Review Report

    Science.gov (United States)

    2010-02-01

    medicine , and computer network operations. While we continue to employ a mix of programs and incentives to recruit quality personnel, we are also...Lithuania* Singapore Australia Finland Luxembourg* Slovakia* Austria France* Macedonia Slovenia* Azerbaijan Georgia Montenegro Spain* Belgium...20,000 positions by 2015. We will continue to significantly enhance Secretary of Defense Robert M. Gates meets with plant workers during a tour of an

  8. Whither Ballistic Missile Defense?

    Science.gov (United States)

    1992-11-30

    important that technology today is placing enormous power in the many camps-not only information that enables timely decision-making, but also the...WHITHER BALLISTIC MISSILE DEFENSE? BY AMBASSADOR HENRY F. COOPER NOVEMBER 30,1992 TECHNICAL MARKETING SOCIETY OF AMERICA WASHINGTON, DC...Conference on Technical Marketing 2000: Opportunities and Strategies for a Changing World) I intend to discuss the prospects for SDI in a changing

  9. A spacecraft computer repairable via command.

    Science.gov (United States)

    Fimmel, R. O.; Baker, T. E.

    1971-01-01

    The MULTIPAC is a central data system developed for deep-space probes with the distinctive feature that it may be repaired during flight via command and telemetry links by reprogramming around the failed unit. The computer organization uses pools of identical modules which the program organizes into one or more computers called processors. The interaction of these modules is dynamically controlled by the program rather than hardware. In the event of a failure, new programs are entered which reorganize the central data system with a somewhat reduced total processing capability aboard the spacecraft. Emphasis is placed on the evolution of the system architecture and the final overall system design rather than the specific logic design.

  10. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    , defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce......Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar...... defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects...

  11. Free Modal Algebras Revisited: The Step-by-Step Method

    NARCIS (Netherlands)

    Bezhanishvili, N.; Ghilardi, Silvio; Jibladze, Mamuka

    2012-01-01

    We review the step-by-step method of constructing finitely generated free modal algebras. First we discuss the global step-by-step method, which works well for rank one modal logics. Next we refine the global step-by-step method to obtain the local step-by-step method, which is applicable beyond

  12. Diabetes PSA (:30) Step By Step

    Centers for Disease Control (CDC) Podcasts

    2009-10-24

    First steps to preventing diabetes. For Hispanic and Latino American audiences.  Created: 10/24/2009 by National Diabetes Education Program (NDEP), a joint program of the Centers for Disease Control and Prevention and the National Institutes of Health.   Date Released: 10/24/2009.

  13. Diabetes PSA (:60) Step By Step

    Centers for Disease Control (CDC) Podcasts

    2009-10-24

    First steps to preventing diabetes. For Hispanic and Latino American audiences.  Created: 10/24/2009 by National Diabetes Education Program (NDEP), a joint program of the Centers for Disease Control and Prevention and the National Institutes of Health.   Date Released: 10/24/2009.

  14. Systemwide Deployment of Medical Team Training: Lessons Learned in the Department of Defense

    National Research Council Canada - National Science Library

    King, Heidi B; Kohsin, Beth; Salisbury, Mary

    2005-01-01

    .... Lessons learned within the U.S. Department of Defense indicate that for teamwork initiatives to be effective, they must possess a clear blueprint defining the solid steps for building the desired culture...

  15. An Analysis of the Competitive Strategy in the Industry Providing a Defense System of Systems

    National Research Council Canada - National Science Library

    Melone, James

    2000-01-01

    .... Both the 1996 Defense Science Board Report on Vertical Integration and DoD's 1999 report on Price Based Acquisition recommend that DoD take steps to further understanding of competitive conditions...

  16. Defense AT&L. Volume 40, Number 3, May-June 2011

    Science.gov (United States)

    2011-05-01

    of Defense Technology and the Lessons of History IGA Robert Ranquet, IHEDN, Paris The United States has long relied on tech-nology to secure...Gen. Vincent Desportes, latest commandant of the French National War College, puts it in his recent book, La Guerre Probable ( Paris , 2008: Economica...engineering, he served as manager of the nuclear propul- sion department of the French navy’s pri- mary shipbuilding unit, the Brest division of the

  17. Defense Attache Saigon: RVNAF Final Assessment, 1 January thru 25 April FY 75,

    Science.gov (United States)

    1975-06-15

    Management Center MOGAS Automotive Fuel (Gasoline) 1 MI Ministry of Interior (GVN) MOND Ministry of National Defense (GVN) MOS Military Occupational...leadership that could weld their military services and diverse staffs into a single force with common goals continued, to the end, to be a pivotal...hurriedly activatcd during th, perLod late T)ecember - early February to be used, if nec.ssary, during ’rt. 1AI’G Truong, MR I commander, was so upset

  18. Defense Inventory: Services Generally Have Reduced Excess Inventory, but Additional Actions Are Needed

    Science.gov (United States)

    2015-04-01

    MICAP Mission Impaired Capability Awaiting Parts OSD Office of the Secretary of Defense S & OP Sales and Operations Planning This is a work of...January 2013, the Army began to implement a Sales and Operations Planning ( S & OP ) process to improve its supply chain and inventory management...According to the Army Materiel Command officials, the Army’s decision to implement S & OP was recommended by an Integrated Project Team that concluded the

  19. The Emerging Shield. The Air Force and the Evolution of Continental Air Defense 1945-1960

    Science.gov (United States)

    1991-01-01

    Vanessa D. Allen began the editing of the manuscript, and Mrs. Barbara W’attig then took over the brunt of the editing, guiding the book to completion...In July 1917, Great Britain established the London Air Defense Area (LADA), under the command of Maj. Gen. Edward B. Ashmore, an experienced artillery...Stratemeyer that the crisis had passed, and it ended the emer- gency. When the emergency operations had ceased, General Hoyt S. Van - denberg had, for

  20. Is There a Need For a Joint Reserve Components Command?

    Science.gov (United States)

    2013-03-01

    Bravo Zulu ”. If these words were heard by a Soldier, it might be interpreted as poor performance. By having one organization as a single source for...Commander, Joint Reserve Components Command. Creation of the JRCC would, in time, strengthen partnerships between the reserve components of each

  1. COMMAND-AND-CONTROL AND MANAGEMENT DECISION MAKING,

    Science.gov (United States)

    Reports that the development of command-and-con trol systems in support of decision making and action taking has been accomplished by military...methods applicable to management systems. Concludes that the command-and-control type system for top management decision making is a man-machine system having as its core an on going, dynamic operation. (Author)

  2. The use of augmented reality in command and control situation ...

    African Journals Online (AJOL)

    This study identifies possible uses of augmented reality in command and control applications with specific attention to situation awareness in the South African context. Applications across the different command and control functions, as well as at the different levels of military operations are considered. The article concludes ...

  3. Army Aviation and the Mission Command Warfighting Function

    Science.gov (United States)

    2017-06-09

    information systems , processes and procedures, optimize facilities and equipment, and build understanding of the networks that link the headquarters...however further publication or sale of copyrighted images is not permissible. ii REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188...Command System , Mission Command Information Systems , Training, Mission Training Complex 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT

  4. Fit for Command: Military Leadership Attributes for Small Wars

    Science.gov (United States)

    2013-04-18

    Corps Command and StaffCollege Marine Corps University 2076 outh Street Marine Corps Combat Development Command Quantico, Virgin ia?? 134-5068...by the local imam to join him in the celebration of a religious Shi’a holiday .79 Just before departure to the mosque his translator informed him

  5. Development and Validation of Nigerian Army Commanding Officers ...

    African Journals Online (AJOL)

    The research adopted an ex-post-facto design based on a qualitative and quantitative analysis of data. Focus Group Discussions (FGDs) and In-Depth Interviews (IDIs) were conducted with commanding officers. The FGDs were conducted with officers purposively drawn from incumbent commanding officers in the Nigerian ...

  6. Doublet III neutral beam multi-stream command language system

    International Nuclear Information System (INIS)

    Campbell, L.; Garcia, J.R.

    1983-01-01

    A multi-stream command language system was developed to provide control of the dual source neutral beam injectors on the Doublet III experiment at GA Technologies Inc. The Neutral Beam command language system consists of three parts: compiler, sequencer, and interactive task. The command language, which was derived from the Doublet III tokamak command language, POPS, is compiled, using a recursive descent compiler, into reverse polish notation instructions which then can be executed by the sequencer task. The interactive task accepts operator commands via a keyboard. The interactive task directs the operation of three input streams, creating commands which are then executed by the sequencer. The streams correspond to the two sources within a Doublet III neutral beam, plus an interactive stream. The sequencer multiplexes the execution of instructions from these three streams. The instructions include reads and writes to an operator terminal, arithmetic computations, intrinsic functions such as CAMAC input and output, and logical instructions. The neutral beam command language system was implemented using Modular Computer Systems (ModComp) Pascal and consists of two tasks running on a ModComp Classic IV computer. The two tasks, the interactive and the sequencer, run independently and communicate using shared memory regions. The compiler runs as an overlay to the interactive task when so directed by operator commands. The system is succesfully being used to operate the three neutral beams on Doublet III

  7. 14 CFR 417.303 - Command control system requirements.

    Science.gov (United States)

    2010-01-01

    ... system must transmit a command signal that has the radio frequency characteristics and power needed for.... (c) Reliability prediction. A command control system must have a predicted reliability of 0.999 at... for each launch. Any demonstration of the system's predicted reliability must satisfy § 417.309(b). (d...

  8. Warfighter Associate: Decision Aiding and Metrics for Mission Command

    Science.gov (United States)

    2012-01-23

    Distributions: highlights the Pareto Principle -- the top 20% of the mission-command staff is heavily involved in collaborations. • Our...developing “Command Web”, a web service to support thin- client functionality (Intelligent Presentation Services enables this) Thank you

  9. Turn-based gaming for convoy commander training

    NARCIS (Netherlands)

    Boonekamp, R.C.; Muller, T.J.; Vrijer, J.C. de

    2015-01-01

    With the increasing complexity of current-day military operations, effective education and training of military commanders is of vital importance. Commanders need to perform within a broader range of conflicts; unpredictable threats and civil-military interaction place a great demand on their

  10. DEFENSE PROGRAMS RISK MANAGEMENT FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Constantin PREDA

    2012-01-01

    Full Text Available For the past years defense programs have faced delays in delivering defense capabilities and budget overruns. Stakeholders are looking for ways to improve program management and the decision making process given the very fluid and uncertain economic and political environment. Consequently, they have increasingly resorted to risk management as the main management tool for achieving defense programs objectives and for delivering the defense capabilities strongly needed for the soldiers on the ground on time and within limited defense budgets. Following a risk management based decision-making approach the stakeholders are expected not only to protect program objectives against a wide range of risks but, at the same time, to take advantage of the opportunities to increase the likelihood of program success. The prerequisite for making risk management the main tool for achieving defense programs objectives is the design and implementation of a strong risk management framework as a foundation providing an efficient and effective application of the best risk management practices. The aim of this paper is to examine the risk management framework for defense programs based on the ISO 31000:2009 standard, best risk management practices and the defense programs’ needs and particularities. For the purposes of this article, the term of defense programs refers to joint defense programs.

  11. Microsoft Office Word 2007 step by step

    CERN Document Server

    Cox, Joyce

    2007-01-01

    Experience learning made easy-and quickly teach yourself how to create impressive documents with Word 2007. With Step By Step, you set the pace-building and practicing the skills you need, just when you need them!Apply styles and themes to your document for a polished lookAdd graphics and text effects-and see a live previewOrganize information with new SmartArt diagrams and chartsInsert references, footnotes, indexes, a table of contentsSend documents for review and manage revisionsTurn your ideas into blogs, Web pages, and moreYour all-in-one learning experience includes:Files for building sk

  12. Defense Threat Reduction Agency > Careers

    Science.gov (United States)

    Integration Command Senior Enlisted Leader Media News News Archive Strategic Plan Videos Mission Research Support Center Contact Us FAQ Sheet Links Success Stories Contracts Business Opportunities Current Justifications & Approvals Careers Who We Are Our Values Strategic Recruiting Programs Professional

  13. Irrigation and crop management in Gandak Canal command of India

    International Nuclear Information System (INIS)

    Singh, S.S.; Khan, A.R.

    2002-05-01

    The Gandak Project is one of the biggest irrigation projects in India, covering a culturable command area (CCA) of 4.44 lakh ha in U.P., 9.6 lakh ha CCA in Bihar and 0.44 lakh ha in Nepal (Singh and Khan, 2002). The total culturable command areas are 14.44 lakh hectares. The command area is located in between latitude 25 deg 40' to 27 deg 25' and longitude between 83 deg 15' to 85 deg 15'. It is a diversion project through construction of a barrage on the river Gandak. This project area covers up to five districts in the Command of Tirhut Main Canal (TMC) and 3 districts in the Saran Main Canal (SMC) command. The length of main canal is usually long (990 and 650 R.D.'s in eastern and western side, respectively) and the channels are unlined and seepage loss is quite high. (author)

  14. Joint Logistics Commanders Guide for the Management of Multinational Program,

    Science.gov (United States)

    1981-07-01

    purchase of the A-300 Airbus and the 1977 record-breaking export performance of the French and UK aerospace industries of around $5 billion and $2 billion...DIS. They are the Defense Industrial Security Clearance Office ( DISCO ), the Defense Industrial Security Institute (DISI), and the Office of Industrial...Security International (ISI). Defense Industrial Security Clearance Office ( DISCO ) The Defense Industrial Security Program (DISP) establishes pro

  15. Nanomaterials for Defense Applications

    Science.gov (United States)

    Turaga, Uday; Singh, Vinitkumar; Lalagiri, Muralidhar; Kiekens, Paul; Ramkumar, Seshadri S.

    Nanotechnology has found a number of applications in electronics and healthcare. Within the textile field, applications of nanotechnology have been limited to filters, protective liners for chemical and biological clothing and nanocoatings. This chapter presents an overview of the applications of nanomaterials such as nanofibers and nanoparticles that are of use to military and industrial sectors. An effort has been made to categorize nanofibers based on the method of production. This chapter particularly focuses on a few latest developments that have taken place with regard to the application of nanomaterials such as metal oxides in the defense arena.

  16. Phenomenon of Psychological Defense

    Directory of Open Access Journals (Sweden)

    Elena T. Sokolova

    2011-01-01

    Full Text Available The author discusses the controversial issues of formation and functioning of psy¬chological defense mechanisms in ontogenesis and in personality disorders as they are represented in classical and contemporary psychoanalysis, in cognitivism and communication theory. The paper emphasizes the role of cognitive organi¬zation (style, sign-symbolic mediation, representative system of object relations and attachments in individual typological variability of the level organization of ciency of personal and social adaptation, in maturity and mental health of personality

  17. Defense Treaty Inspection Readiness Program

    International Nuclear Information System (INIS)

    Cronin, J.J.; Kohen, M.D.; Rivers, J.D.

    1996-01-01

    The Defense Treaty Inspection Readiness Program (DTIRP) was established by the Department of Defense in 1990 to assist defense facilities in preparing for treaty verification activities. Led by the On-Site Inspection Agency (OSIA), an element of the Department of Defense, DTIRP''s membership includes representatives from other Department of Defense agencies, the Department of Energy (DOE), the Central Intelligence Agency, the Federal Bureau of Investigation, the Department of Commerce, and others. The Office of Safeguards and Security has a significant interest in this program, due to the number of national defense facilities within its purview that are candidates for future inspections. As a result, the Office of Safeguards and Security has taken a very active role in DTIRP. This paper discusses the Office of Safeguards and Security''s increasing involvement in various elements of the DTIRP, ranging from facility assessments to training development and implementation

  18. Modelling command and control for emergency response scenarios: A marine oil spills perspective

    International Nuclear Information System (INIS)

    Weisman, R.

    1993-01-01

    Commanders in emergency response scenarios have to rapidly formulate viable plans of action in the face of uncertainty, and on the basis of incomplete information and a constantly changing situation. Automated intelligent decision support systems may be a means of helping the commander to elaborate a plan, producing the operations order, and monitoring the plan's execution. The latter aspect would permit the system to advise a commander when key assumptions upon which the plan is based are no longer valid. Any such system will invariably be complex. The first step is the development of a conceptual model which will provide a sound structure to contain all of the requisite knowledge and information. The subject model is relatively simple and includes a metric for evaluating plans, a practical means of handling uncertainty, and a constraint language to capture expert knowledge precisely. Aspects of the model are illustrated using practical examples from the domain of maritime oil spill response. Results from several computer-based implementations of parts of the model are also discussed. 13 refs., 17 figs

  19. Ballistic Missile Defense in Europe

    OpenAIRE

    Sarihan, Ali; Bush, Amy; Summers, Lawrence; Thompson, Brent; Tomasszewski, Steven

    2009-01-01

    This paper will build on ballistic missile defense in Europe. In the first part, a brief historical overview will place the current public management issue into light. This is followed by a discussion of the main actors in the international debate, the problems that arise and the available options and recommendations to address missile defense. In the second part, differences between George W. Bush and Barack H. Obama will analyze under the title “Ballistic Missile Defense in Europe: Evolving...

  20. Defense Programs and Budget Risk

    National Research Council Canada - National Science Library

    Troutman, Mark D

    2006-01-01

    .... Therefore the Defense Department has set before itself a requirement to modernize a large conventional force structure engaged in ongoing combat operations while simultaneously developing deeper...

  1. [The detector, the command neuron and plastic convergence].

    Science.gov (United States)

    Sokolov, E N

    1977-01-01

    The paper deals with the structure of detectors, the function of commanding neurones and the problem of relationship between detectors and commanding neurons. An example of hierarchial organization of detectors is provided by the colour analyser in which a layer of receptors, a layer of opponent neurones and a layer of colour-selective detectors are singled out. The colour detector is selectively sensitive to a certain combination of excitations at the input. If the detector is selectively activated by a certain combination of excitations at the input, the selective activation of the commanding neurone through a pool of motoneurones brings about a reaction at the output, specific in its organization. The reflexogenic zone of the reaction is determined by the detectors which converge on the commanding neurone controlling the given reaction. The plasticity of the reaction results from a plastic convergence of the detectors on the commanding neurone which controls the reaction. This comprises selective switching off the detectors from the commanding neurone (habituation) and connecting the detectors to the commanding neurone (facilitation).

  2. Doublet III neutral beam multi-stream command language system

    International Nuclear Information System (INIS)

    Campbell, L.; Garcia, J.R.

    1983-12-01

    A multi-stream command language system was developed to provide control of the dual source neutral beam injectors on the Doublet III experiment at GA Technologies Inc. The Neutral Beam command language system consists of three parts: compiler, sequencer, and interactive task. The command language, which was derived from the Doublet III tokamak command language, POPS, is compiled, using a recursive descent compiler, into reverse polish notation instructions which then can be executed by the sequencer task. The interactive task accepts operator commands via a keyboard. The interactive task directs the operation of three input streams, creating commands which are then executed by the sequencer. The streams correspond to the two sources within a Doublet III neutral beam, plus an interactive stream. The sequencer multiplexes the execution of instructions from these three streams. The instructions include reads and writes to an operator terminal, arithmetic computations, intrinsic functions such as CAMAC input and output, and logical instructions. The neutral beam command language system was implemented using Modular Computer Systems (ModComp) Pascal and consists of two tasks running on a ModComp Classic IV computer

  3. LABORATORY PROCESS CONTROLLER USING NATURAL LANGUAGE COMMANDS FROM A PERSONAL COMPUTER

    Science.gov (United States)

    Will, H.

    1994-01-01

    The complex environment of the typical research laboratory requires flexible process control. This program provides natural language process control from an IBM PC or compatible machine. Sometimes process control schedules require changes frequently, even several times per day. These changes may include adding, deleting, and rearranging steps in a process. This program sets up a process control system that can either run without an operator, or be run by workers with limited programming skills. The software system includes three programs. Two of the programs, written in FORTRAN77, record data and control research processes. The third program, written in Pascal, generates the FORTRAN subroutines used by the other two programs to identify the user commands with the user-written device drivers. The software system also includes an input data set which allows the user to define the user commands which are to be executed by the computer. To set the system up the operator writes device driver routines for all of the controlled devices. Once set up, this system requires only an input file containing natural language command lines which tell the system what to do and when to do it. The operator can make up custom commands for operating and taking data from external research equipment at any time of the day or night without the operator in attendance. This process control system requires a personal computer operating under MS-DOS with suitable hardware interfaces to all controlled devices. The program requires a FORTRAN77 compiler and user-written device drivers. This program was developed in 1989 and has a memory requirement of about 62 Kbytes.

  4. Defense.gov Special Report: Defense Officials Release Operational Energy

    Science.gov (United States)

    , DOD Operational Energy Strategy DOD's Operational Energy Strategy will guide the Defense Department to operations are among the goals of the Defense Department's operational energy strategy, a senior Pentagon operational energy footprint, experts in solar power, microgrids and "smart" generators recently

  5. Induction of defensive enzymes (isozymes) during defense against ...

    African Journals Online (AJOL)

    user

    2012-09-06

    Sep 6, 2012 ... defense against two different fungal pathogens in pear calli ... study the biochemical changes in relation to plant defense ... relatively easy to manipulate by empirical means, allowing for a ... earlier phase, and the degree of rot was significantly ..... resistance of fruit, and they play an important role in the.

  6. The Joint Force Air Component Commander and the Integration of Offensive Cyberspace Effects: Power Projection through Cyberspace

    Science.gov (United States)

    2016-06-14

    in theory . Offensive cyberspace operations have the potential to provide these types of power- projecting effects in the battlespace, but how can...approach to allow for the maturation of command relationships, authorities, and buildup of operational capacity. In the direct support model...send cyber- space liaisons to the air component to integrate joint cyberspace operations. A major step in the center’s maturation process is

  7. Antipredator defenses predict diversification rates

    Science.gov (United States)

    Arbuckle, Kevin; Speed, Michael P.

    2015-01-01

    The “escape-and-radiate” hypothesis predicts that antipredator defenses facilitate adaptive radiations by enabling escape from constraints of predation, diversified habitat use, and subsequently speciation. Animals have evolved diverse strategies to reduce the direct costs of predation, including cryptic coloration and behavior, chemical defenses, mimicry, and advertisement of unprofitability (conspicuous warning coloration). Whereas the survival consequences of these alternative defenses for individuals are well-studied, little attention has been given to the macroevolutionary consequences of alternative forms of defense. Here we show, using amphibians as the first, to our knowledge, large-scale empirical test in animals, that there are important macroevolutionary consequences of alternative defenses. However, the escape-and-radiate hypothesis does not adequately describe them, due to its exclusive focus on speciation. We examined how rates of speciation and extinction vary across defensive traits throughout amphibians. Lineages that use chemical defenses show higher rates of speciation as predicted by escape-and-radiate but also show higher rates of extinction compared with those without chemical defense. The effect of chemical defense is a net reduction in diversification compared with lineages without chemical defense. In contrast, acquisition of conspicuous coloration (often used as warning signals or in mimicry) is associated with heightened speciation rates but unchanged extinction rates. We conclude that predictions based on the escape-and-radiate hypothesis must incorporate the effect of traits on both speciation and extinction, which is rarely considered in such studies. Our results also suggest that knowledge of defensive traits could have a bearing on the predictability of extinction, perhaps especially important in globally threatened taxa such as amphibians. PMID:26483488

  8. Commander manipulator scoops prestigious mulit-million pound BNFL contract

    International Nuclear Information System (INIS)

    Bailey, Andrew.

    1997-01-01

    Twenty-one Commander robotic arms are on order from INBIS (formerly Ricardo Hitec) and BNFL Engineering Limited (''BEL'', the engineering arm of parent company BNFL). The multi-million pound contract was won amid fierce competition from other well-known names in robotic engineering. The specially designed Commander manipulators will be engaged in remotely handling Intermediate Level Waste (ILW) in a suite of four BNFL ILW plants, which are currently either under construction or planned at Sellafield. The first Commander will delivered to BNFL's Sellafield Silo Emptying Project in January 1998. (Author)

  9. Focal cryotherapy: step by step technique description

    Directory of Open Access Journals (Sweden)

    Cristina Redondo

    Full Text Available ABSTRACT Introduction and objective: Focal cryotherapy emerged as an efficient option to treat favorable and localized prostate cancer (PCa. The purpose of this video is to describe the procedure step by step. Materials and methods: We present the case of a 68 year-old man with localized PCa in the anterior aspect of the prostate. Results: The procedure is performed under general anesthesia, with the patient in lithotomy position. Briefly, the equipment utilized includes the cryotherapy console coupled with an ultrasound system, argon and helium gas bottles, cryoprobes, temperature probes and an urethral warming catheter. The procedure starts with a real-time trans-rectal prostate ultrasound, which is used to outline the prostate, the urethra and the rectal wall. The cryoprobes are pretested and placed in to the prostate through the perineum, following a grid template, along with the temperature sensors under ultrasound guidance. A cystoscopy confirms the right positioning of the needles and the urethral warming catheter is installed. Thereafter, the freeze sequence with argon gas is started, achieving extremely low temperatures (-40°C to induce tumor cell lysis. Sequentially, the thawing cycle is performed using helium gas. This process is repeated one time. Results among several series showed a biochemical disease-free survival between 71-93% at 9-70 month- follow-up, incontinence rates between 0-3.6% and erectile dysfunction between 0-42% (1–5. Conclusions: Focal cryotherapy is a feasible procedure to treat anterior PCa that may offer minimal morbidity, allowing good cancer control and better functional outcomes when compared to whole-gland treatment.

  10. Defense Reutilization and Marketing Manual

    Science.gov (United States)

    1990-03-01

    H -3 E Responsibilities of Defense Reutilization and Marketing Regions (D R M s...at Defense electronic products which produce radiation Reutilization and Marketing Offices, para- when energized. Among the principal radi- graph F... Sporting Equipment 7820 Games , Toys, and Wheeled Goods 7830 Recreational and Gymnastic Equipment 7910 Floor Polishers and Vacuum Cleaning Equipment

  11. Full Spectrum Operations: An Analysis of Course Content at the Command and General Staff College

    National Research Council Canada - National Science Library

    Turner, II, Frank L

    2008-01-01

    .... This monograph examined the Intermediate Level Education, the Advanced Military Studies Program, and the Tactical Commanders Development Program curricula at the Command and General Staff College...

  12. A Commander in Chief's Network-Centric Odyssey

    National Research Council Canada - National Science Library

    Copley, E

    2002-01-01

    .... Each Armed Service has begun training and equipping its force using the tenets of Network-Centric Operations, but those forces come together for the first time under the combatant Commander-in-Chief...

  13. Architecting Joint Command and Control System of System Capability Certifications

    National Research Council Canada - National Science Library

    Acosta, Jacob; Hoesly, Scot; Huseth, Scott; Krider, Steven; Lamb, Jeremy; Martin, Calvin; Medina, Vince; Medina, Jorge; Nguyen, Michael; Patel, Jaykant

    2007-01-01

    Command, Control, Communications, Computers, and Intelligence (C4I) systems, each originally designed to address a single warfighting function, have been assembled into an interdependent C4I System of Systems (SoS...

  14. Acquisition and Development of System Command (SYSCOM) Technical Manuals

    National Research Council Canada - National Science Library

    2003-01-01

    ... (NAVSEA) and Space and Naval Warfare Systems Command (SPAWAR). TMs are the primary information source for technical training, installation, operation, testing, maintenance, and repair associated with NAVSEA/SPAWAR systems or equipment...

  15. The Big Issue: Command and Combat in the Information Age

    National Research Council Canada - National Science Library

    Potts, David

    2003-01-01

    This Occasional Paper considers command and combat in the information age. A small team in the British Army's conceptual "think tank," the Directorate General Development and Doctrine, worked together on this issue for 18 months...

  16. Implementing UPDM to develop command and control systems

    CSIR Research Space (South Africa)

    Oosthuizen, R

    2016-09-01

    Full Text Available Systems engineering is an established approach to develop systems, including complex sociotechnical systems such as Command and Control (C2) Systems. These systems often occur through introduction of a new technology into an existing system...

  17. U.S. Pacific Command > Organization > Organization Chart

    Science.gov (United States)

    Responsibility USPACOM Previous Commanders Organization Organization Chart Media News Flickr Photos Video Directory Media Inquiries Home : Organization : Organization Chart About DoD DoD Careers Join the Military

  18. Contract Claims Experience at the Naval Air Systems Command

    National Research Council Canada - National Science Library

    Carty, John

    1999-01-01

    ...) experienced at the Naval Air Systems Command (NAVAIR) between January 1997 and December 1998 as a means to identify areas of potential improvement in management practices which could result in reduced numbers of claims being submitted...

  19. Measuring, Monitoring, and Managing Knowledge in Command and Control Organizations

    National Research Council Canada - National Science Library

    Freeman, Jared; Weil, Shawn A; Hess, Kathleen P

    2006-01-01

    .... Iconography and interaction standards for such displays are well defined. Less attention has been paid to representing non-geographical information, such as information about the state of knowledge and decision making in a command staff...

  20. Intelligent Tutoring System for Teaching Battlefield Command Reasoning Skills

    National Research Council Canada - National Science Library

    Domeshek, Eric

    2002-01-01

    ... (ITS) for high-level battlefield command reasoning skills. The ultimate goal of this research is to develop new ITS techniques and technology for teaching skills that cannot he taught as simple methods and procedures to he followed...

  1. From Sensory Space to Motor Commands: Lessons from Saccades

    National Research Council Canada - National Science Library

    Optican, L

    2001-01-01

    .... We conclude that intrinsic brain signals might represent non-physical signals, such as desired sensory states, approximate motor drives, and distributed motor commands, rather than physical signals (e.g...

  2. Command and Control Planning and Teamwork: Exploring the Future

    National Research Council Canada - National Science Library

    Sterling, Bruce S; Lickteig, Carl W

    2000-01-01

    .... This paper examines how participant ratings of command and control planning and observer assessments of teamwork were related in a series of futuristic missions conducted by the Mounted Maneuver...

  3. The International Criminal Court: Considerations for the Joint Force Commander

    National Research Council Canada - National Science Library

    Sutton, Michael

    2003-01-01

    An analysis of the issues and remedies a Joint Force Commander should be concerned about because of the relationship between the United States and the newly-created International Criminal Court (ICC...

  4. Gesture Commanding of a Robot with EVA Gloves

    Data.gov (United States)

    National Aeronautics and Space Administration — Gestures commands allow a human operator to directly interact with a robot without the use of intermediary hand controllers. There are two main types of hand gesture...

  5. Joint Forward Operating Base Elements of Command and Control

    National Research Council Canada - National Science Library

    Summers, William

    2002-01-01

    ... and its associated leadership, command of air assets at a joint forward operating base lacks guidance. Today, the United States prosecutes an air war over Afghanistan from bases in Uzbekistan, Pakistan, and Afghanistan...

  6. Software and commands on VAX CERN. User's guide

    International Nuclear Information System (INIS)

    Balashov, V.K.; Trofimov, V.V.

    1990-01-01

    This guide describes a structure of applications software, which is available at VAX-type computers in JINR. The software includes program libraries, scientific programs and commands developed at CERN. 20 refs

  7. Systems Engineering Management Training at Naval Air Systems Command

    National Research Council Canada - National Science Library

    Rebel, James

    2000-01-01

    Within the past few years, the Naval Air Systems Command (NAVAIR) has undergone several major changes including an engineering reorganization from a matrix organization to an Integrated Program Team/Competency Aligned Organization (IPT/CAO...

  8. Public Affairs Capacity Building: A Soft Tool for Combatant Commanders

    National Research Council Canada - National Science Library

    Salata, Jason P

    2008-01-01

    Public affairs capacity building is a valuable soft component of the Combatant Commander's Theater Campaign Plan that builds habitual relationships, fosters transparency, and enhances the ability to shape the AOR...

  9. Recommendations on Future Operational Environments Command Control and Cyber Security

    OpenAIRE

    Goztepe, Kerim

    2015-01-01

    It is a well-known fact that today a nation's telecommunication networks, critical infrastructure, and information systems are vulnerable to growing number of attacks in cyberspace. Cyber space contains very different problems involving various sets of threats, targets and costs. Cyber security is not only problem of banking, communication or transportation. It also threatens core systems of army as command control. Some significant recommendations on command control (C2) and cyber security h...

  10. Comparative Research of Navy Voluntary Education at Operational Commands

    Science.gov (United States)

    2017-03-01

    into a national and international market. This is especially effects land-grant institutions who can educate the citizens within their state by...RESEARCH OF NAVY VOLUNTARY EDUCATION AT OPERATIONAL COMMANDS by Christopher B. Veenhuis March 2017 Thesis Co-Advisors: William Hatch Chad...COVERED Master’s thesis 4. TITLE AND SUBTITLE COMPARATIVE RESEARCH OF NAVY VOLUNTARY EDUCATION AT OPERATIONAL COMMANDS 5. FUNDING NUMBERS 6. AUTHOR(S

  11. The Role of the NCO Inside the BCT Command Post

    Science.gov (United States)

    2016-11-22

    formation. Doctrine 2015 introduced the importance of mission command doctrine into operations at all levels of leadership, and in the last five...utilizing tents is crucial to support the combined arms maneuver of the brigade. Physical layout of the command post can promote or hinder the ability to...equipment when a printer starting printing or a coffee maker was turned on? Understanding how PDISE configurations distribute loads in order to maintain

  12. Environmental Licensing: an Instrument of Command and Control by Exception?

    OpenAIRE

    Sleman Chams, Juliette; Gestión Ambiental de la Corporación Autónoma Regional del Atlántico-CRA, autoridad ambiental del Departamento del Atlántico,; Velásquez Muñoz, Carlos Javier; Universidad del Norte (Barranquilla)

    2016-01-01

    This article analyzes the situation of the most important instrument of command and control existing in the Colombian environmental legislation: the environmental license. Since its first formal regulation, on behalf of Decree 1753 of August 3, 1994, has received several modifications which, apparently, have made, in spite of its importance, in an instrument of command and control by exception. The article revises on the scope of each of the modifications and the justifications put forward by...

  13. Scenario design : adaptive architecture for command and control experiment eight

    OpenAIRE

    Clark, Frankie J.

    2002-01-01

    Approved for public release; distribution is unlimited. The Adaptive Architectures for Command and Control (A2C2) project is an ongoing research effort sponsored by the Office of Naval Research to explore adaptation in joint command and control. The objective of the project's eighth experiment is to study the adjustments that organizations make when they are confronted with a scenario for which their organizational is ill-suited. To accomplish this, teams will each be in one of two fundame...

  14. An analysis of Navy Recruiting Command's officer goaling models

    OpenAIRE

    Senter, Robert R.

    1990-01-01

    Approved for public release; distribution unlimited. This study examines the goaling models used by the Navy Recruiting Command for the Nurse Corps and Nuclear Propulsion Officer Candidate (NUPOC) programs. These two programs serve as representative samples for the numerous officer recruitment programs administered by the Navy Recruiting Command. The intent of the study is to analyze and validate the accuracy of the current goaling models, to ascertain factors which could improve the accur...

  15. Commands for financial data management and portfolio optimization

    OpenAIRE

    C. Alberto Dorantes

    2013-01-01

    Several econometric software offer portfolio management tools for practitioners and researchers. For example, MatLab and R offer a great variety of tools for the simulation, optimization, and analysis of financial time series. Stata, together with Mata, offers powerful programming tools for the simulation, optimization, and analysis of financial data. However, related user commands are scarce. In this presentation, commands for online market data collection, data manipulation, and financial a...

  16. Step-by-step cyclic processes scheduling

    DEFF Research Database (Denmark)

    Bocewicz, G.; Nielsen, Izabela Ewa; Banaszak, Z.

    2013-01-01

    Automated Guided Vehicles (AGVs) fleet scheduling is one of the big problems in Flexible Manufacturing System (FMS) control. The problem is more complicated when concurrent multi-product manufacturing and resource deadlock avoidance policies are considered. The objective of the research is to pro......Automated Guided Vehicles (AGVs) fleet scheduling is one of the big problems in Flexible Manufacturing System (FMS) control. The problem is more complicated when concurrent multi-product manufacturing and resource deadlock avoidance policies are considered. The objective of the research...... is to provide a declarative model enabling to state a constraint satisfaction problem aimed at AGVs fleet scheduling subject to assumed itineraries of concurrently manufactured product types. In other words, assuming a given layout of FMS’s material handling and production routes of simultaneously manufactured...... orders, the main objective is to provide the declarative framework aimed at conditions allowing one to calculate the AGVs fleet schedule in online mode. An illustrative example of the relevant algebra-like driven step-by-stem cyclic scheduling is provided....

  17. Network, system, and status software enhancements for the autonomously managed electrical power system breadboard. Volume 3: Commands specification

    Science.gov (United States)

    Mckee, James W.

    1990-01-01

    This volume (3 of 4) contains the specification for the command language for the AMPS system. The volume contains a requirements specification for the operating system and commands and a design specification for the operating system and command. The operating system and commands sits on top of the protocol. The commands are an extension of the present set of AMPS commands in that the commands are more compact, allow multiple sub-commands to be bundled into one command, and have provisions for identifying the sender and the intended receiver. The commands make no change to the actual software that implement the commands.

  18. Rapid Response Command and Control (R2C2): a systems engineering analysis of scaleable communications for Regional Combatant Commanders

    OpenAIRE

    Sullivan, Lisa; Cannon, Lennard; Reyes, Ronel; Bae, Kitan; Colgary, James; Minerowicz, Nick; Leong, Chris; Lim, Harry; Lim, Hang Sheng; Ng, Chin Chin; Neo, Tiong Tien; Tan, Guan Chye; Ng, Yu Loon; Wong, Eric; Wong, Heng Yue

    2006-01-01

    Includes supplementary material. Disaster relief operations, such as the 2005 Tsunami and Hurricane Katrina, and wartime operations, such as Operation Enduring Freedom and Operation Iraqi Freedom, have identified the need for a standardized command and control system interoperable among Joint, Coalition, and Interagency entities. The Systems Engineering Analysis Cohort 9 (SEA-9) Rapid Response Command and Control (R2C2) integrated project team completed a systems engineering (SE) ...

  19. Defense Agencies Cash Management in the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Lane, F

    1997-01-01

    The primary audit objective was to determine whether the Fund Balance With Treasury Account on the Consolidated Financial Statements of the Defense Business Operations Fund for FY 1996 was presented...

  20. Indonesian Automatic Speech Recognition For Command Speech Controller Multimedia Player

    Directory of Open Access Journals (Sweden)

    Vivien Arief Wardhany

    2014-12-01

    Full Text Available The purpose of multimedia devices development is controlling through voice. Nowdays voice that can be recognized only in English. To overcome the issue, then recognition using Indonesian language model and accousticc model and dictionary. Automatic Speech Recognizier is build using engine CMU Sphinx with modified english language to Indonesian Language database and XBMC used as the multimedia player. The experiment is using 10 volunteers testing items based on 7 commands. The volunteers is classifiedd by the genders, 5 Male & 5 female. 10 samples is taken in each command, continue with each volunteer perform 10 testing command. Each volunteer also have to try all 7 command that already provided. Based on percentage clarification table, the word “Kanan” had the most recognize with percentage 83% while “pilih” is the lowest one. The word which had the most wrong clarification is “kembali” with percentagee 67%, while the word “kanan” is the lowest one. From the result of Recognition Rate by male there are several command such as “Kembali”, “Utama”, “Atas “ and “Bawah” has the low Recognition Rate. Especially for “kembali” cannot be recognized as the command in the female voices but in male voice that command has 4% of RR this is because the command doesn’t have similar word in english near to “kembali” so the system unrecognize the command. Also for the command “Pilih” using the female voice has 80% of RR but for the male voice has only 4% of RR. This problem is mostly because of the different voice characteristic between adult male and female which male has lower voice frequencies (from 85 to 180 Hz than woman (165 to 255 Hz.The result of the experiment showed that each man had different number of recognition rate caused by the difference tone, pronunciation, and speed of speech. For further work needs to be done in order to improving the accouracy of the Indonesian Automatic Speech Recognition system

  1. The Seven Step Strategy

    Science.gov (United States)

    Schaffer, Connie

    2017-01-01

    Many well-intended instructors use Socratic or leveled questioning to facilitate the discussion of an assigned reading. While this engages a few students, most can opt to remain silent. The seven step strategy described in this article provides an alternative to classroom silence and engages all students. Students discuss a single reading as they…

  2. Command and Control: Toward Arctic Unity of Command and Unity of Effort

    Science.gov (United States)

    2011-05-19

    accessed November 22, 2010); Toni Halpin, “Russia Warns of War Within a Decade Over Arctic Oil and Gas Riches,” The Times, May 14, 2009. http...Research Project, U.S. Army War College, 1999. Halpin, Toni . “Russia Warns of War Within a Decade Over Arctic Oil and Gas Riches,” The Times, May 14...Proceedings, 2009 U.S. Naval Institute). http://usacac.army.mil/cac2/call/docs/10-52/ch_2.asp (accessed November 22, 2010). Robbin , Daryl. “Arctic Defense

  3. Japan and Ballistic Missile Defense

    National Research Council Canada - National Science Library

    Swaine, Michael

    2001-01-01

    Spurred by a perceived growing ballistic missile threat from within the Asia-Pacific region and requests from the United States to support research and development on components of a missile defense...

  4. Proactive Self Defense in Cyberspace

    National Research Council Canada - National Science Library

    Caulkins, Bruce D

    2009-01-01

    ... and standards to properly secure and defend the Global Information Grid (GIG) from cyber attacks. This paper will discuss the strategic requirements for enacting a proactive self-defense mechanism in cyberspace...

  5. Defense Meteorological Satellite Program (DMSP)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Defense Meteorological Satellite Program (DMSP) satellites collect visible and infrared cloud imagery as well as monitoring the atmospheric, oceanographic,...

  6. PERSPECTIVES ON INTEROPERABILITY INTEGRATION WITHIN NATO DEFENSE PLANNING PROCESS

    Directory of Open Access Journals (Sweden)

    Florian CIOCAN

    2011-01-01

    Full Text Available Interoperability is not a new area of effort at NATO level. In fact, interoperability and more specifi cally standardization, has been a key element of the Alliance’s approach to fi elding forces for decades. But as the security and operational environment has been in a continuous change, the need to face the new threats and the current involvement in challenging operations in Afghanistan and elsewhere alongside with the necessity to interoperate at lower and lower levels of command with an increasing number of nations, including non-NATO ISAF partners, NGOs, and other organizations, have made the task even more challenging. In this respect Interoperability Integration within NATO Defense Planning Process will facilitate the timely identifi cation, development and delivery of required forces and capabilities that are interoperable and adequately prepared, equipped, trained and supported to undertake the Alliance’s full spectrum of missions.

  7. Getting Defense Acquisition Right

    Science.gov (United States)

    2017-01-01

    on top of events and steer them to get where we need to go as efficiently as possible. Program management is not a spectator sport . Frank Frank...I made in the e-mail above and discusses some of the proactive steps a Program Manager can take, ahead of time , to reduce the potential...The Congress will rescind funds that are not obligated in a timely way. This puts pressure on the DoD’s acquisition managers to put money on

  8. Strategic Missile Defense & Nuclear Deterrence

    Science.gov (United States)

    Grego, Laura

    The United States has pursued defenses against nuclear-armed long-range ballistic missiles since at least the 1950s. At the same time, concerns that missile defenses could undermine nuclear deterrence and potentially spark an arms race led the United States and Soviet Union to negotiate limits on these systems. The 1972 Anti-Ballistic Missile Treaty constrained strategic missile defenses for thirty years. After abandoning the treaty in 2002, President George W. Bush began fielding the Ground-based Midcourse Defense (GMD) homeland missile defense system on an extremely aggressive schedule, nominally to respond to threats from North Korea and Iran. Today, nearly fifteen years after its initial deployment, the potential and the limits of this homeland missile defense are apparent. Its test record is poor and it has no demonstrated ability to stop an incoming missile under real-world conditions. No credible strategy is in place to solve the issue of discriminating countermeasures. Insufficient oversight has not only exacerbated the GMD system's problems, but has obscured their full extent, which could encourage politicians and military leaders to make decisions that actually increase the risk of a missile attack against the United States. These are not the only costs. Both Russia and China have repeatedly expressed concerns that U.S. missile defenses adversely affect their own strategic capabilities and interests, particularly taken in light of the substantial US nuclear forces. This in turn affects these countries' nuclear modernization priorities. This talk will provide a technical overview of the US strategic missile defense system, and how it relates to deterrence against non-peer adversaries as well as how it affects deterrence with Russia and China and the long-term prospects for nuclear reductions

  9. Tactile defensiveness and stereotyped behaviors.

    Science.gov (United States)

    Baranek, G T; Foster, L G; Berkson, G

    1997-02-01

    This study explores the constructs of stereotyped behaviors (e.g., repetitive motor patterns, object manipulations, behavioral rigidities) and tactile defensiveness as relevant to occupational therapy theory and practice and attempts to test their purported relationships in children with developmental disabilities. Twenty-eight children with developmental disabilities and autism were assessed on eight factors of stereotyped behavior via a questionnaire and by four measures of tactile defensiveness. The subjects' scores from the questionnaire were correlated with their scores on the tactile defensiveness measures to see what, if any, relationship among these behaviors exists. Significant relationships emerged from the data, indicating that subjects with higher levels of tactile defensiveness were also more likely to evidence rigid or inflexible behaviors, repetitive verbalizations, visual stereotypes, and abnormal focused affections that are often associated with autism. No significant association was found between motor and object stereotypes and tactile defensiveness. These relationships could not be explained solely by maturational factors. The results suggest that clinicians should include observations of stereotyped behaviors, particularly behavioral rigidities, in conjunction with assessments of sensory defensiveness because these are related phenomena that may pose unique challenges for children with developmental disabilities and autism. Further study is needed to determine the causal mechanisms responsible for these relationships.

  10. ITOUGH2 command reference. Version 3.1

    International Nuclear Information System (INIS)

    Finsterle, S.

    1997-04-01

    This report contains a detailed description of all ITOUGH2 commands. It complements the ITOUGH2 User's Guide and the collection of ITOUGH2 sample problems. ITOUGH2 is a program for parameter estimation, sensitivity analysis, and uncertainty propagation analysis. It is based on the TOUGH2 simulator for non-isothermal multiphase flow in fractured and porous media. Extensive experience in using TOUGH2 is a prerequisite for using ITOUGH2. The preparation of an input file for TOUGH2 or its derivatives is described in separate manuals and is not part of this report. The ITOUGH2 user's guide summarizes the inverse modeling theory pertaining to ITOUGH2, and describes the program output. Furthermore, information about code architecture and installation are given. In Chapter 2 of this report, a brief summary of inverse modeling theory is given to restate the main concepts implemented in ITOUGH2 and to introduce certain definitions. Chapter 3 introduces the basic concepts of the ITHOUGH2 input language and the main structure of an ITOUGH2 input file. Chapter 4, the main part of this report, provides detailed descriptions of each ITOUGH2 command in alphabetical order. It is complemented by a command index in Appendix B in which the commands are given in logical order. The content of Chapter 4 is also available on-line using command it2help. Chapter 5 describes the usage of the UNIX script files for executing, checking, and terminating ITOUGH2 simulations

  11. Acquisition Planning at the Defense Communications Agency.

    Science.gov (United States)

    1984-04-01

    guidelines for interaction are developed under the leadership of DCA agencywide integrators with the participation of personnel from DCA, the Services...Communications System DCSO - Defense Communications System Organizatin . DDN - Defense Data Network DEC - Decision Making DG - Defense Guidance DIA - Defense

  12. 106-17 Telemetry Standards Recorder and Reproducer Command and Control Chapter 6

    Science.gov (United States)

    2017-07-01

    block identifiers (any ASCII text , one identifier per line) from the drive. A .BBLIST command is only valid following a declassify command. The type ... Processor Device Using IEEE 1394b ..... 6-49 6.5.6 Additional Mandatory Commands When Using Ethernet ........................... 6-54 6.5.7 Additional Non...state or magnetic disk). Not all commands (CLI or discrete) may be applicable to all types of R/R implementations. Commands are used to a) control the

  13. Linear step drive

    International Nuclear Information System (INIS)

    Haniger, L.; Elger, R.; Kocandrle, L.; Zdebor, J.

    1986-01-01

    A linear step drive is described developed in Czechoslovak-Soviet cooperation and intended for driving WWER-1000 control rods. The functional principle is explained of the motor and the mechanical and electrical parts of the drive, power control, and the indicator of position are described. The motor has latches situated in the reactor at a distance of 3 m from magnetic armatures, it has a low structural height above the reactor cover, which suggests its suitability for seismic localities. Its magnetic circuits use counterpoles; the mechanical shocks at the completion of each step are damped using special design features. The position indicator is of a special design and evaluates motor position within ±1% of total travel. A drive diagram and the flow chart of both the control electronics and the position indicator are presented. (author) 4 figs

  14. Computational Abstraction Steps

    DEFF Research Database (Denmark)

    Thomsen, Lone Leth; Thomsen, Bent; Nørmark, Kurt

    2010-01-01

    and class instantiations. Our teaching experience shows that many novice programmers find it difficult to write programs with abstractions that materialise to concrete objects later in the development process. The contribution of this paper is the idea of initiating a programming process by creating...... or capturing concrete values, objects, or actions. As the next step, some of these are lifted to a higher level by computational means. In the object-oriented paradigm the target of such steps is classes. We hypothesise that the proposed approach primarily will be beneficial to novice programmers or during...... the exploratory phase of a program development process. In some specific niches it is also expected that our approach will benefit professional programmers....

  15. Step 3: Manage Your Diabetes

    Science.gov (United States)

    ... please turn JavaScript on. Feature: Type 2 Diabetes Step 3: Manage Your Diabetes Past Issues / Fall 2014 ... 2 Diabetes" Articles Diabetes Is Serious But Manageable / Step 1: Learn About Diabetes / Step 2: Know Your ...

  16. Are Law and Policy Clear and Consistent? Roles and Responsibilities of the Defense Acquisition Executive and the Chief Information Officer

    Science.gov (United States)

    2010-01-01

    2223) are necessarily in conflict with one another or represent a “ prima facie ” conflict. However, we are pointing out that, because of the potentially...that DoD policy should state what constitutes “compliance” with government and DoD standards. The Secretary of Defense (SECDEF) is obligated to issue...aircraft, weap- ons, command and control, communications, intelligence, and IT business systems. In contrast, the R&R of CIOs are generally restricted to

  17. Report of the Defense Science Board/Defense Policy Board Task Force On Theater Missile Defense

    National Research Council Canada - National Science Library

    1996-01-01

    ... also tackled the controversial subject of the ABM Treaty and its effect on theater missile defenses Subsequent to its interim report, which expressed strong concerns about the demarcation path the US...

  18. Development of an expert system prototype for determining software functional requirements for command management activities at NASA Goddard

    Science.gov (United States)

    Liebowitz, J.

    1986-01-01

    The development of an expert system prototype for software functional requirement determination for NASA Goddard's Command Management System, as part of its process of transforming general requests into specific near-earth satellite commands, is described. The present knowledge base was formulated through interactions with domain experts, and was then linked to the existing Knowledge Engineering Systems (KES) expert system application generator. Steps in the knowledge-base development include problem-oriented attribute hierarchy development, knowledge management approach determination, and knowledge base encoding. The KES Parser and Inspector, in addition to backcasting and analogical mapping, were used to validate the expert system-derived requirements for one of the major functions of a spacecraft, the solar Maximum Mission. Knowledge refinement, evaluation, and implementation procedures of the expert system were then accomplished.

  19. 76 FR 28757 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-05-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary [DOCKET ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice of Availability (NOA) of Revised...

  20. 76 FR 53119 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-08-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Comment Addressed on Notice of...

  1. 75 FR 52732 - Renewal of Department of Defense Federal Advisory Committee; Missile Defense Advisory Committee

    Science.gov (United States)

    2010-08-27

    ... Committee; Missile Defense Advisory Committee AGENCY: Department of Defense (DoD). ACTION: Renewal of..., the Department of Defense gives notice that it is renewing the charter for the Missile Defense... Director, Missile Defense Agency, independent advice and recommendations on all matters relating to missile...

  2. Technical Soddi Defenses: The Trojan Horse Defense Revisited

    Directory of Open Access Journals (Sweden)

    Chad Steel

    2014-12-01

    Full Text Available In 2004, the Trojan horse defense was at a crossroads, with two child pornography cases where it was successfully employed in the United Kingdom, resulting in acquittals.  The original Trojan horse defense has now become part of the more general “technical SODDI” defense, which includes the possibility of unknown actors using unsecured Wi-Fi connections or having physical access to a computer to perform criminal acts.  In the past ten years, it has failed to be effective in the United States for criminal cases, with no published acquittals in cases where it was the primary defense.  In the criminal cases where it has been used as leverage in plea negotiations, there has been either poor forensics performed by the prosecution or political pressure to resolve a matter.  On the civil side, however, the defense has been wildly successful, effectively shutting down large John Doe copyright infringement litigation against non-commercial violators.  

  3. STS-93 Commander Collins suits up for launch

    Science.gov (United States)

    1999-01-01

    During the third launch preparations in the Operations and Checkout Building, STS-93 Commander Eileen M. Collins waves while having her launch and entry suit checked. After Space Shuttle Columbia's July 20 and 22 launch attempts were scrubbed, the launch was again rescheduled for Friday, July 23, at 12:24 a.m. EDT. STS-93 is a five-day mission primarily to release the Chandra X-ray Observatory, which will allow scientists from around the world to study some of the most distant, powerful and dynamic objects in the universe. The STS-93 crew numbers five: Commander Collins, Pilot Jeffrey S. Ashby, and Mission Specialists Stephen A. Hawley (Ph.D.), Catherine G. Coleman (Ph.D.) and Michel Tognini of France, with the Centre National d'Etudes Spatiales (CNES). Collins is the first woman to serve as commander of a shuttle mission.

  4. STS-93 Commander Eileen Collins waves to her family

    Science.gov (United States)

    1999-01-01

    STS-93 Commander Eileen M. Collins waves to her family nearby, a last meeting before launch of mission STS-93 on July 20. Liftoff is scheduled for 12:36 a.m. EDT. The primary mission of STS-93 is the release of the Chandra X-ray Observatory, which will allow scientists from around the world to study some of the most distant, powerful and dynamic objects in the universe. The new telescope is 20 to 50 times more sensitive than any previous X- ray telescope and is expected to unlock the secrets of supernovae, quasars and black holes. The STS-93 crew numbers five: Commander Collins, Pilot Jeffrey S. Ashby, and Mission Specialists Steven A. Hawley (Ph.D.), Catherine G. Coleman (Ph.D.) and Michel Tognini of France, with the Centre National d'Etudes Spatiales (CNES). Collins is the first woman to serve as commander of a shuttle mission.

  5. STS-93 Commander Eileen Collins suits up for launch

    Science.gov (United States)

    1999-01-01

    For the third time, in the Operations and Checkout Building, STS- 93 Commander Eileen M. Collins tries on her helmet with her launch and entry suit. After Space Shuttle Columbia's July 20 and 22 launch attempts were scrubbed, the launch was again rescheduled for Friday, July 23, at 12:24 a.m. EDT. STS-93 is a five-day mission primarily to release the Chandra X-ray Observatory, which will allow scientists from around the world to study some of the most distant, powerful and dynamic objects in the universe. The STS-93 crew numbers five: Commander Collins, Pilot Jeffrey S. Ashby, and Mission Specialists Stephen A. Hawley (Ph.D.), Catherine G. Coleman (Ph.D.) and Michel Tognini of France, with the Centre National d'Etudes Spatiales (CNES). Collins is the first woman to serve as commander of a shuttle mission.

  6. Modular code supervisor. Automatic generation of command language

    International Nuclear Information System (INIS)

    Dumas, M.; Thomas, J.B.

    1988-01-01

    It is shown how, starting from a problem formulated by the user, to generate the adequate calculation procedure in the command code, and acquire the data necessary for the calculation while verifying their validity. Modular codes are used, because of their flexibility and wide utilisation. Modules are written in Fortran, and calculations are done in batches according to an algorithm written in the GIBIANE command language. The action plans are based on the STRIPS and WARPLAN families. Elementary representation of a module and special instructions are illustrated. Dynamic construction macro-actions, and acquisition of the specification (which allows users to express the goal of a program without indicating which algorithm is used to reach the goal) are illustrated. The final phase consists in translating the algorithm into the command language [fr

  7. Research into command, control, and communications in space construction

    Science.gov (United States)

    Davis, Randal

    1990-01-01

    Coordinating and controlling large numbers of autonomous or semi-autonomous robot elements in a space construction activity will present problems that are very different from most command and control problems encountered in the space business. As part of our research into the feasibility of robot constructors in space, the CSC Operations Group is examining a variety of command, control, and communications (C3) issues. Two major questions being asked are: can we apply C3 techniques and technologies already developed for use in space; and are there suitable terrestrial solutions for extraterrestrial C3 problems? An overview of the control architectures, command strategies, and communications technologies that we are examining is provided and plans for simulations and demonstrations of our concepts are described.

  8. Comparison between a classical command law and a new advanced recovery command law in a MCB-ARS boost

    Science.gov (United States)

    Petit, Pierre; Saint-Eve, Frédéric; Sawicki, Jean-Paul; Aillerie, Michel

    2017-02-01

    This paper focuses on an original performed command on DC-DC boosts developed for applications in the LMOPS lab for the photovoltaic energy conversion and more specifically the Photovoltaic panels connected to HVDC smart grids. This boost, commonly named MCB-ARS (Magnetically Coupled Boost with Active Recovery Switch) presents great advantages concerning the simplicity of the command on the single constitutive switch, the global efficiency and the voltage conversion ratio. A fine analysis of the losses all over the entire converter shows that losses are not distributed uniformly in the constituting components. So a previous modification described in a previous paper consisting in the conducting assistance on the power flowing intermediate diode, performed advantageously the global efficiency. The present analysis takes into account the fact that the new configuration obtained after this important improvement looks like a classical half-bridge push-pull stage and may be controlled by a twice complementary command. In that way, a comparison has been done between a natural commutation recovery diode and an assisted switch commutation driven in a push-pull mode. As attempted, the switching command laws in charge to assume the energy transfer has been compared to the classical previous system described in anterior papers, and we demonstrate in this publication that a commutation based on a push-pull command mode within the two switches of the MCB-ARS converter is possible and increases the power transfer.

  9. [Network Design of the Spaceport Command and Control System

    Science.gov (United States)

    Teijeiro, Antonio

    2017-01-01

    I helped the Launch Control System (LCS) hardware team sustain the network design of the Spaceport Command and Control System. I wrote the procedure that will be used to satisfy an official hardware test for the hardware carrying data from the Launch Vehicle. I installed hardware and updated design documents in support of the ongoing development of the Spaceport Command and Control System and applied firewall experience I gained during my spring 2017 semester to inspect and create firewall security policies as requested. Finally, I completed several online courses concerning networking fundamentals and Unix operating systems.

  10. Circuit of synchronous logic for the transmission of safety commands

    International Nuclear Information System (INIS)

    Uberschlag, J.

    1969-01-01

    The author reports the development of a control-command circuit for the transmission of binary commands related to the safety of nuclear reactors. He presents the main design criteria (operation safety, provided safety level, flexibility, technical adaptation), the definition of the operation principle (inputs, logical outputs), the properties of a logic system. He evokes redundancy issues, and presents the system structure, proposes a possible sketch of the logic circuit. He describes the possible options for intermediate circuits and logic outputs, and tests to be performed

  11. Incident command linkup: the vital key for CBRN response

    International Nuclear Information System (INIS)

    Smith, D.

    2009-01-01

    The most vital element for responding emergency personnel to a CBRN attack is the incident command linkup and dissemination of information. Incident Command, the basic foundation of the National Incident Management System (NIMS), is the first thing that must be effectively established when a response is required in any emergency. When initial evaluation of the scene determines that the incident involves CBRN, specialized resources from a wide array of assets must be activated quickly to mitigate the hazards. In this paper, we examine the information that the Incident Commander must be prepared to convey to those specialized assets responding. We will also look at what questions those specialized resources may ask while en route and upon arrival. Another key element that will be discussed is the placement of those resources in the hierarchy of the National Incident Management System. The information that the Incident Commander (IC) must be prepared to convey to those specialized assets responding is crucial for an efficient response and effective deployment. What questions might those specialized CBRN resources ask while en route and upon arrival? At a bare minimum, the four basic questions of who is in charge of the incident, where is the incident located, what transpired to trigger a response, and when did the incident occur must be answered. These questions should be answered while en route to the scene so that the Commander of the responding CBRN unit can formulate a plan on the move and prepare his response accordingly. While in transit, the CBRN responders should maintain contact with a representative of the Incident Command at the scene so that the latest information is available. Discussions should include anticipated logistical requirements such as personal protective equipment (PPE), decon requirements, communications protocols, and medical care issues. The CBRN Commander will need to know if the site is secure, has it been cleared of explosive hazards

  12. Three dimensional visualization to support command and control

    International Nuclear Information System (INIS)

    Van Slambrook, G.A.

    1997-04-01

    Virtual reality concepts are changing the way one thinks about and with computers. The concepts have already proven their potential usefulness in a broad range of applications. This research was concerned with exploring and demonstrating the utility of virtual reality in robotics and satellite command and control applications. The robotics work addressed the need to quickly build accurate graphical models of physical environments by allowing a user to interactively build a model of a remote environment by superimposing stereo graphics onto live stereo video. The satellite work addressed the fusion of multiple data sets or models into one synergistic display for more effective training, design, and command and control of satellite systems

  13. Command injection attacks, continuations, and the Lambek calculus

    Directory of Open Access Journals (Sweden)

    Hayo Thielecke

    2016-06-01

    Full Text Available This paper shows connections between command injection attacks, continuations, and the Lambek calculus: certain command injections, such as the tautology attack on SQL, are shown to be a form of control effect that can be typed using the Lambek calculus, generalizing the double-negation typing of continuations. Lambek's syntactic calculus is a logic with two implicational connectives taking their arguments from the left and right, respectively. These connectives describe how strings interact with their left and right contexts when building up syntactic structures. The calculus is a form of propositional logic without structural rules, and so a forerunner of substructural logics like Linear Logic and Separation Logic.

  14. APOLLO 16 COMMANDER JOHN YOUNG ENTERS ALTITUDE CHAMBER FOR TESTS

    Science.gov (United States)

    1971-01-01

    Apollo 16 commander John W. Young prepares to enter the lunar module in an altitude chamber in the Manned Spacecraft Operations Building at the spaceport prior to an altitude run. During the altitude run, in which Apollo 16 lunar module pilot Charles M. Duke also participated, the chamber was pumped down to simulate pressure at an altitude in excess of 200,000 feet. Young, Duke and command module pilot Thomas K. Mattingly II, are training at the Kennedy Space Center for the Apollo 16 mission. Launch is scheduled from Pad 39A, March 17, 1972.

  15. Oracle Enterprise Manager 12c command-line interface

    CERN Document Server

    Pot'Vin, Kellyn; Smith, Ray

    2014-01-01

    Oracle Enterprise Manager 12c Command-Line Interface shows how to use Enterprise Manager's powerful scripting language to automate your database administration work and save time by scripting routine tasks, and then executing those scripts across collections of databases and instances in your environment. This book is chock full of ready-made scripting examples contributed by the authors and leading members of the community. For example, you'll find scripts and examples of commands to: Remove an Enterprise Manager agent and its related targetsQuickly create administrator accounts that are ful

  16. BuddySuite: Command-Line Toolkits for Manipulating Sequences, Alignments, and Phylogenetic Trees.

    Science.gov (United States)

    Bond, Stephen R; Keat, Karl E; Barreira, Sofia N; Baxevanis, Andreas D

    2017-06-01

    The ability to manipulate sequence, alignment, and phylogenetic tree files has become an increasingly important skill in the life sciences, whether to generate summary information or to prepare data for further downstream analysis. The command line can be an extremely powerful environment for interacting with these resources, but only if the user has the appropriate general-purpose tools on hand. BuddySuite is a collection of four independent yet interrelated command-line toolkits that facilitate each step in the workflow of sequence discovery, curation, alignment, and phylogenetic reconstruction. Most common sequence, alignment, and tree file formats are automatically detected and parsed, and over 100 tools have been implemented for manipulating these data. The project has been engineered to easily accommodate the addition of new tools, is written in the popular programming language Python, and is hosted on the Python Package Index and GitHub to maximize accessibility. Documentation for each BuddySuite tool, including usage examples, is available at http://tiny.cc/buddysuite_wiki. All software is open source and freely available through http://research.nhgri.nih.gov/software/BuddySuite. Published by Oxford University Press on behalf of the Society for Molecular Biology and Evolution 2017. This work is written by US Government employees and is in the public domain in the US.

  17. Stepping Stones through Time

    Directory of Open Access Journals (Sweden)

    Emily Lyle

    2012-03-01

    Full Text Available Indo-European mythology is known only through written records but it needs to be understood in terms of the preliterate oral-cultural context in which it was rooted. It is proposed that this world was conceptually organized through a memory-capsule consisting of the current generation and the three before it, and that there was a system of alternate generations with each generation taking a step into the future under the leadership of a white or red king.

  18. SYSTEMATIZATION OF THE BASIC STEPS OF THE STEP-AEROBICS

    Directory of Open Access Journals (Sweden)

    Darinka Korovljev

    2011-03-01

    Full Text Available Following the development of the powerful sport industry, in front of us appeared a lot of new opportunities for creating of the new programmes of exercising with certain requisites. One of such programmes is certainly step-aerobics. Step-aerobics can be defined as a type of aerobics consisting of the basic aerobic steps (basic steps applied in exercising on stepper (step bench, with a possibility to regulate its height. Step-aerobics itself can be divided into several groups, depending on the following: type of music, working methods and adopted knowledge of the attendants. In this work, the systematization of the basic steps in step-aerobics was made on the basis of the following criteria: steps origin, number of leg motions in stepping and relating the body support at the end of the step. Systematization of the basic steps of the step-aerobics is quite significant for making a concrete review of the existing basic steps, thus making creation of the step-aerobics lesson easier

  19. SPAR-H Step-by-Step Guidance

    International Nuclear Information System (INIS)

    Galyean, W.J.; Whaley, A.M.; Kelly, D.L.; Boring, R.L.

    2011-01-01

    This guide provides step-by-step guidance on the use of the SPAR-H method for quantifying Human Failure Events (HFEs). This guide is intended to be used with the worksheets provided in: 'The SPAR-H Human Reliability Analysis Method,' NUREG/CR-6883, dated August 2005. Each step in the process of producing a Human Error Probability (HEP) is discussed. These steps are: Step-1, Categorizing the HFE as Diagnosis and/or Action; Step-2, Rate the Performance Shaping Factors; Step-3, Calculate PSF-Modified HEP; Step-4, Accounting for Dependence, and; Step-5, Minimum Value Cutoff. The discussions on dependence are extensive and include an appendix that describes insights obtained from the psychology literature.

  20. SPAR-H Step-by-Step Guidance

    Energy Technology Data Exchange (ETDEWEB)

    W. J. Galyean; A. M. Whaley; D. L. Kelly; R. L. Boring

    2011-05-01

    This guide provides step-by-step guidance on the use of the SPAR-H method for quantifying Human Failure Events (HFEs). This guide is intended to be used with the worksheets provided in: 'The SPAR-H Human Reliability Analysis Method,' NUREG/CR-6883, dated August 2005. Each step in the process of producing a Human Error Probability (HEP) is discussed. These steps are: Step-1, Categorizing the HFE as Diagnosis and/or Action; Step-2, Rate the Performance Shaping Factors; Step-3, Calculate PSF-Modified HEP; Step-4, Accounting for Dependence, and; Step-5, Minimum Value Cutoff. The discussions on dependence are extensive and include an appendix that describes insights obtained from the psychology literature.

  1. REQUIREMENTS FOR SYSTEMS DEVELOPMENT LIFE CYCLE MODELS FOR LARGE-SCALE DEFENSE SYSTEMS

    Directory of Open Access Journals (Sweden)

    Kadir Alpaslan DEMIR

    2015-10-01

    Full Text Available TLarge-scale defense system projects are strategic for maintaining and increasing the national defense capability. Therefore, governments spend billions of dollars in the acquisition and development of large-scale defense systems. The scale of defense systems is always increasing and the costs to build them are skyrocketing. Today, defense systems are software intensive and they are either a system of systems or a part of it. Historically, the project performances observed in the development of these systems have been signifi cantly poor when compared to other types of projects. It is obvious that the currently used systems development life cycle models are insuffi cient to address today’s challenges of building these systems. Using a systems development life cycle model that is specifi cally designed for largescale defense system developments and is effective in dealing with today’s and near-future challenges will help to improve project performances. The fi rst step in the development a large-scale defense systems development life cycle model is the identifi cation of requirements for such a model. This paper contributes to the body of literature in the fi eld by providing a set of requirements for system development life cycle models for large-scale defense systems. Furthermore, a research agenda is proposed.

  2. US Africa Command (AFRICOM) and Nigeria's National Security ...

    African Journals Online (AJOL)

    The US decision to establish a unified combatant command (AFRICOM) in African has raised numerous questions, particularly in Africa, regarding its possible security implications for the continent. The article narrows itself to the concern for unraveling the national security implications of Nigeria's opposition to the location of

  3. Commander in chief : FDR's battle with Churchill, 1943

    NARCIS (Netherlands)

    Hamilton, Charles Nigel

    2016-01-01

    Commander in Chief is een deelbiografie van president Franklin Delano Roosevelt waarin Roosevelts rol als opperbevelhebber van de gewapende strijdkrachten van de Verenigde Staten in de Tweede Wereldoorlog het hoofdthema is. Het boek concentreert zich op het jaar 1943: een jaar waaraan biografen van

  4. Interagency Cooperation for Irregular Warfare at the Combatant Command

    Science.gov (United States)

    2009-01-01

    enemy’s command capability.16 Salamoni argued that the term “irregular warfare” belies an ethnocentric perspective of conflict that will limit military...duty military staffing to form the nucleus of the organization, which would receive augmentation from additional assigned reservists and interagency

  5. Zenith-100 Microcomputer Network for Air Command and Staff College.

    Science.gov (United States)

    1987-04-01

    34 AD-A182 495 ZENI T-ipo ml CROCOMFUT E NET WOR( FOR AIR COMAND AND h SAFF CoLLG (U) AIl COMMAND ANDCSTAFF COLL MAX(WELL AFS "CAL W L GALWAY El AL...processing of documents by eliminating the time required to physically move the documents from one office to the next. Reproduction Savings. Information

  6. NET: an inter-computer file transfer command

    International Nuclear Information System (INIS)

    Burris, R.D.

    1978-05-01

    The NET command was defined and supported in order to facilitate file transfer between computers. Among the goals of the implementation were greatest possible ease of use, maximum power (i.e., support of a diversity of equipment and operations), and protection of the operating system

  7. Commander’s Handbook on Military and Civilian Law. Revision

    Science.gov (United States)

    1992-01-01

    Cuminal Law Divio 23-8 Commander’s Handbook The accused’s possession must be knowing and conscious. Therefore, if the accused didn’t know he or she...of violence and neglect in families, for example, experiencing or witnessing abuse as a child or the stress a family experiences due to the member’s

  8. Principles of Mission Command Applied to Civil Military Relationships

    Science.gov (United States)

    2017-05-25

    to prevent tension and promote cohesive teams. While historians trace civil-military theory to Sun Tzu and Carl von Clausewitz, the beginning of...Conclusion – A Mission Command Approach .............................................................................. 34 Bibliography ...Civil-Military Relations,” Monograph, (School of Advanced Military Studies, Fort Leavenworth, KS, 2010): 3. 64 Bennett, 3. 36 Bibliography

  9. Satellite Telemetry and Command using Big LEO Mobile Telecommunications Systems

    Science.gov (United States)

    Huegel, Fred

    1998-01-01

    Various issues associated with satellite telemetry and command using Big LEO mobile telecommunications systems are presented in viewgraph form. Specific topics include: 1) Commercial Satellite system overviews: Globalstar, ICO, and Iridium; 2) System capabilities and cost reduction; 3) Satellite constellations and contact limitations; 4) Capabilities of Globalstar, ICO and Iridium with emphasis on Globalstar; and 5) Flight transceiver issues and security.

  10. Command and Control Across Space and Cyberspace Domains

    Science.gov (United States)

    2016-02-16

    debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.”16).17 From Joint...Third, push control (if not command) to the theater or operational level. Returning to the inbound ICBM scenario proposed by Maj Gen Zabel and detailed

  11. TGIN language reference manual: NAMMU and MATDIF commands

    International Nuclear Information System (INIS)

    Cliffe, K.A.; Herbert, A.W.

    1992-03-01

    NAMMU is a finite-element program for modelling groundwater flow and transport. The matrix diffusion option models the transport of radionuclides including the effects of rock-matrix diffusion. It uses the free-format structured-input TGIN. This report describes the commands in the TGIN language for running the NAMMU and MATDIF package. (author)

  12. STS-32 Commander Brandenstein adjusts IMAX camera during training session

    Science.gov (United States)

    1989-01-01

    STS-32 Commander Daniel C. Brandenstein adjusts IMAX camera setting during briefing and training session as technician looks on. The session was conducted in the JSC Mockup and Integration Laboratory (MAIL) Bldg 9B. The IMAX camera will be used onboard Columbia, Orbiter Vehicle (OV) 102, during the STS-32 mission.

  13. Cognitive Systems Modeling and Analysis of Command and Control Systems

    Science.gov (United States)

    Norlander, Arne

    2012-01-01

    Military operations, counter-terrorism operations and emergency response often oblige operators and commanders to operate within distributed organizations and systems for safe and effective mission accomplishment. Tactical commanders and operators frequently encounter violent threats and critical demands on cognitive capacity and reaction time. In the future they will make decisions in situations where operational and system characteristics are highly dynamic and non-linear, i.e. minor events, decisions or actions may have serious and irreversible consequences for the entire mission. Commanders and other decision makers must manage true real time properties at all levels; individual operators, stand-alone technical systems, higher-order integrated human-machine systems and joint operations forces alike. Coping with these conditions in performance assessment, system development and operational testing is a challenge for both practitioners and researchers. This paper reports on research from which the results led to a breakthrough: An integrated approach to information-centered systems analysis to support future command and control systems research development. This approach integrates several areas of research into a coherent framework, Action Control Theory (ACT). It comprises measurement techniques and methodological advances that facilitate a more accurate and deeper understanding of the operational environment, its agents, actors and effectors, generating new and updated models. This in turn generates theoretical advances. Some good examples of successful approaches are found in the research areas of cognitive systems engineering, systems theory, and psychophysiology, and in the fields of dynamic, distributed decision making and naturalistic decision making.

  14. 78 FR 24694 - Family Advocacy Command Assistance Team (FACAT)

    Science.gov (United States)

    2013-04-26

    ... be composed of personnel from appropriate disciplines, including, medicine, psychology, and child... in all allegations of child abuse and neglect. DATES: Comments must be received by June 25, 2013... multi-disciplinary Family Advocacy Command Assistant Team to respond to allegations of child sexual...

  15. 32 CFR 536.7 - Responsibilities of the Commander USARCS.

    Science.gov (United States)

    2010-07-01

    .... (s) Serve as proponent for the database management systems for torts, personnel and affirmative... ACCOUNTS CLAIMS AGAINST THE UNITED STATES The Army Claims System § 536.7 Responsibilities of the Commander... Department of Justice (DOJ) and the SA's designee is authorized. (h) Operate the “receiving State office” for...

  16. Computer-assisted command and control for Chooz B

    International Nuclear Information System (INIS)

    Anon.

    1995-01-01

    A new type of command and control system has been installed at the Chooz B nuclear power plant. A key feature of the system is a man/machine interface designed to provide operators with on-screen assistance more quickly than ever. (Author)

  17. Company Level Commander Development In The US Army

    Science.gov (United States)

    2013-12-01

    pedagogy and andragogy in instruction can have a significant positive impact on developing combat arms officers to be successful company level commanders...Recommendations to achieve these improvements using andragogy are discussed. In the United States (US) Army, when an officer...use Malcom Knowles’ andragogy framework for understanding adults as learners in order to analyze the trainees and maximize the training outcomes for

  18. Naval Sea Systems Command > Home > Warfare Centers > NSWC Corona

    Science.gov (United States)

    . Richard A. Braunbeck III Capt. Stephen H. Murray, left, salutes his relief, Capt. Richard A. Braunbeck III -321 NORCO, Calif. (Dec. 7, 2016) Capt. Stephen H. Murray, commanding officer of Naval Surface... https ): Dewin Andujar (Virtual Reality); Nicholas Manning (Maritime Capture the Flag); Stephen O'Grady

  19. Command and Control during Security Incidents/Emergencies

    Energy Technology Data Exchange (ETDEWEB)

    Knipper, W. [NSTec

    2013-10-16

    This presentation builds on our response to events that pose, or have the potential to pose, a serious security or law enforcement risk and must be responded to and controlled in a clear a decisive fashion. We will examine some common concepts in the command and control of security-centric events.

  20. Organizing Defense Logistics: What Strategic Structures Should Exist for the Defense Supply Chain

    National Research Council Canada - National Science Library

    Maddox, Edward D

    2005-01-01

    .... The primary research question of this study was: What strategic organizational structures should exist within the Department of Defense to facilitate further integration of the defense supply chain...

  1. The Inflammasome in Host Defense

    Directory of Open Access Journals (Sweden)

    Gang Chen

    2009-12-01

    Full Text Available Nod-like receptors have emerged as an important family of sensors in host defense. These receptors are expressed in macrophages, dendritic cells and monocytes and play an important role in microbial immunity. Some Nod-like receptors form the inflammasome, a protein complex that activates caspase-1 in response to several stimuli. Caspase-1 activation leads to processing and secretion of pro-inflammatory cytokines such as interleukin (IL-1β and IL-18. Here, we discuss recent advances in the inflammasome field with an emphasis on host defense. We also compare differential requirements for inflammasome activation in dendritic cells, macrophages and monocytes.

  2. On Three Defenses of Sentimentalism

    OpenAIRE

    Iwasa, Noriaki

    2013-01-01

    This essay shows that a moral sense or moral sentiments alone cannot identify appropriate morals. To this end, the essay analyzes three defenses of Francis Hutcheson’s, David Hume’s, and Adam Smith’s moral sense theories against the relativism charge that a moral sense or moral sentiments vary across people, societies, cultures, or times. The first defense is the claim that there is a universal moral sense or universal moral sentiments. However, even if they exist, a moral sense or moral sent...

  3. The Anthrax Vaccine Debate: A Medical Review for Commanders

    National Research Council Canada - National Science Library

    Hersack, Richard

    2001-01-01

    .... The policy decision to vaccinate is based on an assessment of relative risk. The risk to an individual of developing side effects and complications after vaccination versus, the risk that Defense Department (DoD...

  4. Defense Primer: The National Defense Budget Function (050)

    Science.gov (United States)

    2017-03-17

    individual policy activities. Subfunctions are assigned a numeric identifier (ending in a single digit ) related to the function to which they belong...operations, equipment repair, and maintenance of defense facilities, healthcare costs, and administration. 24% Military Personnel (MILPERS) Pay and

  5. Report on Defense Business Operations to the Congressional Defense Committees

    Science.gov (United States)

    2009-03-15

    Department’s strategic framework for planning and decision-making, and acknowledged the need to establish clear, actionable strategic goals and...Business Operations Department of Defense Business Transformation 5 2. Business Enterprise Priorities Six Business Enterprise Priorities ( BEPs ... framework products that facilitate the interoperability and integration of the operational activities, processes, data, information exchanges

  6. Information Management for an Automated Battlefield Command and Control System

    Science.gov (United States)

    1980-05-01

    DD) I u FJ i EDITION OF" I NOV 65, IS OSSOLIETIES"-- iUnclassified1SECURITY CLASSIFICATION OF THIS PAGE (When Data Entered) t// II. Unclassified...DIRELIOk oý INSTIhJTIONAL RSCH I USA AIP DEFENSE SCHOUL ATTN: AISA -CU)-MS I iJSAADS-LIBRARY-OUCUMLNTS) I USA AIW DEFENSE ZL~N HDAU IN: fILLS

  7. Hippocampus discovery First steps

    Directory of Open Access Journals (Sweden)

    Eliasz Engelhardt

    Full Text Available The first steps of the discovery, and the main discoverers, of the hippocampus are outlined. Arantius was the first to describe a structure he named "hippocampus" or "white silkworm". Despite numerous controversies and alternate designations, the term hippocampus has prevailed until this day as the most widely used term. Duvernoy provided an illustration of the hippocampus and surrounding structures, considered the first by most authors, which appeared more than one and a half century after Arantius' description. Some authors have identified other drawings and texts which they claim predate Duvernoy's depiction, in studies by Vesalius, Varolio, Willis, and Eustachio, albeit unconvincingly. Considering the definition of the hippocampal formation as comprising the hippocampus proper, dentate gyrus and subiculum, Arantius and Duvernoy apparently described the gross anatomy of this complex. The pioneering studies of Arantius and Duvernoy revealed a relatively small hidden formation that would become one of the most valued brain structures.

  8. Financial Reporting Procedures for Defense Distribution Depots - Defense Logistics Agency Business Area of the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Young, Shelton

    1994-01-01

    In our audit of the FY 1993 Financial Statements for the Distribution Depots--Defense Logistics Agency Business Mea of the Defense Business Operations Fund, we evaluated procedures and controls used...

  9. Astronomical sketching a step-by-step introduction

    CERN Document Server

    Handy, Richard; Perez, Jeremy; Rix, Erika; Robbins, Sol

    2007-01-01

    This book presents the amateur with fine examples of astronomical sketches and step-by-step tutorials in each medium, from pencil to computer graphics programs. This unique book can teach almost anyone to create beautiful sketches of celestial objects.

  10. Soviet debate on missile defense

    Energy Technology Data Exchange (ETDEWEB)

    Parrott, B.

    1987-04-01

    Although the Strategic Defense Initiative (SDI) is meant to cope with the danger of a Soviet nuclear attack, the recent US debate over SDI has paid surprisingly little attention to Soviet views of ballistic missile defense. Despite the existence of a substantial body of pertinent scholarship, the debate has failed to take adequate account of major changes in Soviet ballistic missile defense policy since the mid-1960s. It has also neglected the links between current Soviet military policy and broader Soviet political and economic choices. The Soviets regard SDI not as a novel undertaking to reduce the risks of nuclear war but as an extension of the geopolitical competition between the superpowers. This competition has been dominated in the 1980s, in the Soviet view, by sharply increased US assertiveness and the decline of detente. Viewing SDI as a manifestation of these general trends, Soviet decision makers find the prospect of an unregulated race in ballistic missile defenses and military space technologies deeply unsettling. The deterioration of superpower relations has raised serious doubts in Moscow about the wisdom of Soviet external policy during the 1970s and has provoked sharp internal differences over policy toward the US. Already highly suspicious of the Reagan administration, the elite is united by a general conviction that SDI is an American gambit that may ultimately undercut past Soviet strategic gains and pose a grave new threat to Soviet security. 14 references.

  11. Defense Advanced Research Projects Agency: Strategic Plan

    Science.gov (United States)

    2009-05-01

    technologies to detect, prevent, or mitigate asymmetric attacks, including suicide bombers, improvised explosive devices, and weapons of mass destruction...the Army’s Command Post of the Future (CPOF) to amplify the capabilities of overworked combat command and control staffs. Working with CPOF, PAL

  12. Managing Quadrennial Defense Review Integration: An Overview

    National Research Council Canada - National Science Library

    Schrader, John

    2001-01-01

    ...). The lessons learned from the 1997 Quadrennial Defense Review (QDR 1997) included the need for leadership guidance and integration of analytic activities to sort through the myriad issues that are always confronting the Department of Defense...

  13. Department of Defense PERSEREC (DOD PERSEREC)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for Defense Manpower Data Center (DMDC) of the Department of Defense. DMDC will use the SSA data...

  14. STEP and fundamental physics

    Science.gov (United States)

    Overduin, James; Everitt, Francis; Worden, Paul; Mester, John

    2012-09-01

    The Satellite Test of the Equivalence Principle (STEP) will advance experimental limits on violations of Einstein's equivalence principle from their present sensitivity of two parts in 1013 to one part in 1018 through multiple comparison of the motions of four pairs of test masses of different compositions in a drag-free earth-orbiting satellite. We describe the experiment, its current status and its potential implications for fundamental physics. Equivalence is at the heart of general relativity, our governing theory of gravity and violations are expected in most attempts to unify this theory with the other fundamental interactions of physics, as well as in many theoretical explanations for the phenomenon of dark energy in cosmology. Detection of such a violation would be equivalent to the discovery of a new force of nature. A null result would be almost as profound, pushing upper limits on any coupling between standard-model fields and the new light degrees of freedom generically predicted by these theories down to unnaturally small levels.

  15. STEP and fundamental physics

    International Nuclear Information System (INIS)

    Overduin, James; Everitt, Francis; Worden, Paul; Mester, John

    2012-01-01

    The Satellite Test of the Equivalence Principle (STEP) will advance experimental limits on violations of Einstein's equivalence principle from their present sensitivity of two parts in 10 13 to one part in 10 18 through multiple comparison of the motions of four pairs of test masses of different compositions in a drag-free earth-orbiting satellite. We describe the experiment, its current status and its potential implications for fundamental physics. Equivalence is at the heart of general relativity, our governing theory of gravity and violations are expected in most attempts to unify this theory with the other fundamental interactions of physics, as well as in many theoretical explanations for the phenomenon of dark energy in cosmology. Detection of such a violation would be equivalent to the discovery of a new force of nature. A null result would be almost as profound, pushing upper limits on any coupling between standard-model fields and the new light degrees of freedom generically predicted by these theories down to unnaturally small levels. (paper)

  16. One-step microlithography

    Science.gov (United States)

    Kahlen, Franz-Josef; Sankaranarayanan, Srikanth; Kar, Aravinda

    1997-09-01

    Subject of this investigation is a one-step rapid machining process to create miniaturized 3D parts, using the original sample material. An experimental setup where metal powder is fed to the laser beam-material interaction region has been built. The powder is melted and forms planar, 2D geometries as the substrate is moved under the laser beam in XY- direction. After completing the geometry in the plane, the substrate is displaced in Z-direction, and a new layer of material is placed on top of the just completed deposit. By continuous repetition of this process, 3D parts wee created. In particular, the impact of the focal spot size of the high power laser beam on the smallest achievable structures was investigated. At a translation speed of 51 mm/s a minimum material thickness of 590 micrometers was achieved. Also, it was shown that a small Z-displacement has a negligible influence on the continuity of the material deposition over this power range. A high power CO2 laser was used as energy source, the material powder under investigation was stainless steel SS304L. Helium was used as shield gas at a flow rate of 15 1/min. The incident CO2 laser beam power was varied between 300 W and 400 W, with the laser beam intensity distribute in a donut mode. The laser beam was focused to a focal diameter of 600 (Mu) m.

  17. Joint Force Headquarters - Global Strike: Preserving, Advancing, and Accelerating Operational Art for the Joint Force Commander

    National Research Council Canada - National Science Library

    Kruse, Jeffrey

    2004-01-01

    ... combatant commanders. It can be viewed as infringing upon theater unity of command, a potential avenue for increased national level control and interference, and a competitor for finite warfighting resources...

  18. American Joint Helicopter Command: Addressing a Lack of Operational Control of Rotary Assets

    National Research Council Canada - National Science Library

    Marsowicz, Brandon

    2007-01-01

    ... to achieve unity of effort. Based on the tenets of operational command and control by Milan Vego, across all services, the United States helicopter forces fare lacking operational command and control...

  19. Analysis of Recruit Attrition from the Navy's Delayed Entry Program and Recruit Training Command

    National Research Council Canada - National Science Library

    Neuhalfen, Jon K

    2007-01-01

    .... The analysis uses the PRIDE database, provided by Commander, Navy Recruiting Command. Trend analyses are used to identify significant changes in enlistment and attrition behavior for recruits who joined from fiscal years 1998 through 2005...

  20. Apollo 10 astronauts in space suits in front of Command Module

    Science.gov (United States)

    1968-01-01

    Three astronauts named as the prime crew of the Apollo 10 space mission. Left to right, are Eugene A. Cernan, lunar module pilot; John W. Young, command module pilot; and Thomas P. Stafford, commander.

  1. Validating a Model of Team Collaboration at the North American Aerospace Defense Command Using Selected Transcripts from September 11, 2001

    Science.gov (United States)

    2008-06-01

    resources. When communications are more efficient, team performance benefits . Communication plays a critical role in a team’s ability to achieve...standard operating procedure (SOP) for NORAD/NEADS is classified and therefore not useful for this thesis. However, it would be of benefit for someone...1221 Speaker 13: Once you get the tanker you’ve bingo to Langley at 1830. COA 1222 Major N: Okay. They’re working tanker support from my

  2. Defense Infrastructure: Realignment of Air Force Special Operations Command Units to Cannon Air Force Base, New Mexico

    National Research Council Canada - National Science Library

    Lepore, Brian J

    2008-01-01

    .... As a result, Cannon Air Force Base will remain open. While DOD has satisfied the intent of the recommendation by finding a new mission for the base, this BRAC recommendation was unusual because it contained a contingency clause...

  3. The Art and Science of Defense Logistics

    Science.gov (United States)

    1995-04-01

    The Art And Science Of Defense Logistics CSC 1995 SUBJECT AREA - Logistics THE ART AND SCIENCE OF DEFENSE LOGISTICS...Government EXECUTIVE SUMMARY Title: The Art and Science of Defense Logistics Author: Major S. I. Schuler, USMC Research Questions: 1...00-1995 4. TITLE AND SUBTITLE The Art And Science Of Defense Logistics 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  4. Missile defense in the United States

    OpenAIRE

    Heurlin, Bertil

    2004-01-01

    The basic arguments of this paper are, first, that the current US-missile defense, being operative from fall 2004, is based upon the former experiences with missile defense, second, that missile defense closely associated with weapons of mass destruction has gained the highest priority in American national security policy due to the 9.11 attacks, and third, that the superior argument for establishing an American missile defense is to maintain global, long term political-strategic superiority....

  5. Step 1: Learn about Diabetes

    Science.gov (United States)

    ... please turn JavaScript on. Feature: Type 2 Diabetes Step 1: Learn About Diabetes Past Issues / Fall 2014 ... the whole family healthy! Here are four key steps to help you control your diabetes and live ...

  6. SPAR-H Step-by-Step Guidance

    Energy Technology Data Exchange (ETDEWEB)

    April M. Whaley; Dana L. Kelly; Ronald L. Boring; William J. Galyean

    2012-06-01

    Step-by-step guidance was developed recently at Idaho National Laboratory for the US Nuclear Regulatory Commission on the use of the Standardized Plant Analysis Risk-Human Reliability Analysis (SPAR-H) method for quantifying Human Failure Events (HFEs). This work was done to address SPAR-H user needs, specifically requests for additional guidance on the proper application of various aspects of the methodology. This paper overviews the steps of the SPAR-H analysis process and highlights some of the most important insights gained during the development of the step-by-step directions. This supplemental guidance for analysts is applicable when plant-specific information is available, and goes beyond the general guidance provided in existing SPAR-H documentation. The steps highlighted in this paper are: Step-1, Categorizing the HFE as Diagnosis and/or Action; Step-2, Rate the Performance Shaping Factors; Step-3, Calculate PSF-Modified HEP; Step-4, Accounting for Dependence, and; Step-5, Minimum Value Cutoff.

  7. Command and Control of the U.S. Tenth Army During the Battle of Okinawa

    Science.gov (United States)

    2009-06-12

    Army‘s XXIV Corps, commanded by Major General John R . Hodge, and the U.S. Marine Corps‘ III Amphibious Corps, commanded by Major General Roy S. Geiger...Watanabe, was activated in April 1944. Ushijima assumed command in August 1944, after Watanabe was bedridden and sent back to Japan due to chronic...great success and combat experience during the war in the Pacific. Army Major General John R . Hodge commanded the XXIV Corps. Hodge was commissioned

  8. Mood States Associated with Induced Defensiveness.

    Science.gov (United States)

    Jaderlund, Natasha Slesnick; Waldron, Holly Barrett

    1994-01-01

    Compared effects of neutral and defensive mood induction in 70 students reporting conflicted versus nonconflicted families for presence of hostility, aggression, fear, anxiety, and sadness. Found that defensive students from high-conflict families reported stronger negative emotions than did neutral high-conflict and defensive low-conflict…

  9. 22 CFR 120.6 - Defense article.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this subchapter...

  10. 22 CFR 120.9 - Defense service.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense service. 120.9 Section 120.9 Foreign... Defense service. (a) Defense service means: (1) The furnishing of assistance (including training) to..., educational, or information publications and media of all kinds, training aid, orientation, training exercise...

  11. 75 FR 65462 - Renewal of Department of Defense Federal Advisory Committee; Department of Defense Military...

    Science.gov (United States)

    2010-10-25

    ... Committee; Department of Defense Military Family Readiness Council AGENCY: Department of Defense (DoD... renewing the charter for the Department of Defense Military Family Readiness Council (hereafter referred to... requirements for the support of military family readiness by the Department of Defense; and (c) evaluate and...

  12. Multiple stage miniature stepping motor

    International Nuclear Information System (INIS)

    Niven, W.A.; Shikany, S.D.; Shira, M.L.

    1981-01-01

    A stepping motor comprising a plurality of stages which may be selectively activated to effect stepping movement of the motor, and which are mounted along a common rotor shaft to achieve considerable reduction in motor size and minimum diameter, whereby sequential activation of the stages results in successive rotor steps with direction being determined by the particular activating sequence followed

  13. Africa Command: U.S. Strategic Interests and the Role of the U.S. Military in Africa

    National Research Council Canada - National Science Library

    ploch, Lauren

    2007-01-01

    .... national security objectives in Africa and in its surrounding waters. U.S. military involvement on the continent is currently divided among three commands: European Command (EUCOM), Central Command (CENTCOM...

  14. Increasing Classroom Compliance: Using a High-Probability Command Sequence with Noncompliant Students

    Science.gov (United States)

    Axelrod, Michael I.; Zank, Amber J.

    2012-01-01

    Noncompliance is one of the most problematic behaviors within the school setting. One strategy to increase compliance of noncompliant students is a high-probability command sequence (HPCS; i.e., a set of simple commands in which an individual is likely to comply immediately prior to the delivery of a command that has a lower probability of…

  15. Advances in Discrete-Event Simulation for MSL Command Validation

    Science.gov (United States)

    Patrikalakis, Alexander; O'Reilly, Taifun

    2013-01-01

    In the last five years, the discrete event simulator, SEQuence GENerator (SEQGEN), developed at the Jet Propulsion Laboratory to plan deep-space missions, has greatly increased uplink operations capacity to deal with increasingly complicated missions. In this paper, we describe how the Mars Science Laboratory (MSL) project makes full use of an interpreted environment to simulate change in more than fifty thousand flight software parameters and conditional command sequences to predict the result of executing a conditional branch in a command sequence, and enable the ability to warn users whenever one or more simulated spacecraft states change in an unexpected manner. Using these new SEQGEN features, operators plan more activities in one sol than ever before.

  16. An extended SPSS extension command for generating random data

    Directory of Open Access Journals (Sweden)

    Harding, Bradley

    2015-10-01

    Full Text Available The GRD extension command for SPSS (Harding & Cousineau, 2014 has been used in a variety of applications since its inception. Ranging from a teaching tool to demonstrate statistical analyses, to an inferential tool used to find critical values instead of looking into a z-table, GRD has been very well received. However, some users have requested other data generation components that would make GRD a more complete extension command: the possibility to add contaminants to the generated dataset as well as the ability to generate correlated variables. Another component we added is a graphical user interface (or GUI that makes GRD accessible through the drop-down menus in the SPSS Data Editor window. This GUI allows users to generate a simple dataset by entering parameters in dedicated fields rather than writing out the full script. Finally, we devised a small series of exercises to help users get acquainted with the new subcommands and GUI.

  17. Using LTE Networks for UAV Command and Control Link

    DEFF Research Database (Denmark)

    Nguyen, Huan Cong; Amorim, Rafhael Medeiros de; Wigard, Jeroen

    2017-01-01

    In this paper we investigate the ability of Long-Term Evolution (LTE) network to provide coverage for Unmanned Aerial Vehicles (UAVs) in a rural area, in particular for the Command and Control (C2) downlink. The study takes into consideration the dependency of the large-scale path loss on the hei......In this paper we investigate the ability of Long-Term Evolution (LTE) network to provide coverage for Unmanned Aerial Vehicles (UAVs) in a rural area, in particular for the Command and Control (C2) downlink. The study takes into consideration the dependency of the large-scale path loss...... on the height of the UAV, which is derived from actual measurements, and a real-world cellular network layout and configuration. The results indicate that interference is the dominant factor limiting the cellular coverage for UAVs in the downlink: outage level increases from 4.2% at 1.5 m height to 51.7% at 120...

  18. Plann: A command-line application for annotating plastome sequences.

    Science.gov (United States)

    Huang, Daisie I; Cronk, Quentin C B

    2015-08-01

    Plann automates the process of annotating a plastome sequence in GenBank format for either downstream processing or for GenBank submission by annotating a new plastome based on a similar, well-annotated plastome. Plann is a Perl script to be executed on the command line. Plann compares a new plastome sequence to the features annotated in a reference plastome and then shifts the intervals of any matching features to the locations in the new plastome. Plann's output can be used in the National Center for Biotechnology Information's tbl2asn to create a Sequin file for GenBank submission. Unlike Web-based annotation packages, Plann is a locally executable script that will accurately annotate a plastome sequence to a locally specified reference plastome. Because it executes from the command line, it is ready to use in other software pipelines and can be easily rerun as a draft plastome is improved.

  19. The Supreme Allied Commander’s Operational Approach

    Science.gov (United States)

    2014-05-22

    the Seine below Paris , and then began converging toward the northern line of march just below the first. A third line broke off from the second in a...toward the Seine Basin and Paris .” Therefore, in the aftermath of Goodwood Eisenhower felt both disappointed and deceived. After Goodwood, Eisenhower...command. Simultaneously, Bradley’s armies were to “[capture] Brest , [protect] the southern flank of the

  20. Spaceport Command and Control System User Interface Testing

    Science.gov (United States)

    Huesman, Jacob

    2016-01-01

    The Spaceport Command and Control System will be the National Aeronautics and Space Administration's newest system for launching commercial and government owned spacecraft. It's a large system with many parts all in need of testing. To improve upon testing already done by NASA engineers, the Engineering Directorate, Electrical Division (NE-E) of Kennedy Space Center has hired a group of interns each of the last few semesters to develop novel ways of improving the testing process.

  1. Deception Recognition: Rethinking the Operational Commander’s Approach

    Science.gov (United States)

    2010-10-27

    Understanding this cultural relativism gives us insight into intent. Social norms tend to be tacitly established and maintained through body...the concept of ―face‖ in dealing with people in a personal or professional relationship is first and foremost in the Chinese culture . The western... morality ,‖5 the operational commander can be and usually is directly affected by both political deception and MILDEC and must be able to recognize and

  2. Manual command component with tactile and/or kinesthetic feedback

    International Nuclear Information System (INIS)

    Foumier, R.

    1995-01-01

    The invention concerns a manual command component designed to be use by a human hand in order to control a slave system, with a tactile and/or kinesthetic feedback. It is composed by a handle and by piece(s) for the feedback. The handle contains a captor to signalize the move and the speed. The signals are transmitted to the slave system. The later send feedbacks which are transformed in a couple for the handle. (TEC)

  3. Measuring Command Post Operations in a Decisive Action Training Environment

    Science.gov (United States)

    2017-05-01

    constantly changing information requirements. Having established procedures in place to handle these challenges would seem requisite for units...maintain the continuous and rapid execution of command post operations. According to FM 3-90.2, the SOPs established and rehearsed for each CP...a rehearsed plan for a possible attack on the CP, and a rehearsed plan to move the CP. The Follow Up section emphasized the necessity of debriefing

  4. Mission Command: Making it work at Battalion Level

    Science.gov (United States)

    2013-04-01

    National Training Center, CA, February 2012. 29 Litwin, G.H., and R.A.Stringer, Motivation & Organizational Climate , Harvard University Press...for Joint Land Operations, Washington, DC: Joint Staff, 29 June 2010. Litwin, George H., and Robert A. Stringer Jr., Motivation & Organizational ...interact with one another, and develop leadership competencies that strengthen the organization. Mission command as a philosophy, a system and a

  5. Benefits Of Mission Command: Balance Of Philosophy And System

    Science.gov (United States)

    2016-05-26

    Seminar Leader Charles T. Lombardo, COL ___________________________________, Director, School of Advanced Military Studies Henry A. Arnold III...Battle of Tora Bora was convoluted. Hank Crumpton, Berntsen’s supervisor at the CIA recalls speaking to Berntsen daily and to the specific request...science of mission command in execution. It has expanded to fifteen total problems with thirteen recommended solutions being material based, while twenty

  6. Empowering Globally Integrated Operations and Mission Command: Revisiting Key West

    Science.gov (United States)

    2013-03-01

    depended on coordination between commanders. Examples include Captain Thomas McDonough’s 4 U.S...Hedgehog Concept In his book, Good to Great, which describes how good organizations become great ones, Jim Collins borrows an example from an Isaiah ...that it executes with perfection—curling into a ball with its spikes outward. 62 In the words of Archilochus (first line in quotes), Isaiah Berlin

  7. A chemical reaction in the movie The Ten Commandments

    Directory of Open Access Journals (Sweden)

    López Pérez, José Pedro;

    2012-04-01

    Full Text Available The study of natural sciences in the second year of Secondary Education must be complemented with a visit to the laboratory, where experiments should be permormed. The curriculum emphasizes the initial basis of Chemistry and the study of reactions. In this paper we describe a laboratory experience, useful for understanding the concept of chemical change. Also, we present the hypothesis that a chemical reaction was used in the classic movie The Ten Commandments.

  8. Airborne Intelligence, Surveillance, and Reconnaissance: Mission Command and Centralized Control

    Science.gov (United States)

    2014-12-10

    short stint in Texas, Stuart reported to Fort Leavenworth, where he began his career as a cavalryman and found himself confronted with the torrent of...found themselves back at the War Department in a meeting with Secretary Floyd and President James Buchanan.50 The Secretary of War placed Lee in command...and Aldie. Those fights were tactical victories for the Union cavalry and Stuart had lost 500 men , but his cavalry had served its operational

  9. Deja vu: The Unified Command Plan of the Future Revisited

    Science.gov (United States)

    2011-05-19

    Approved for Public Release; Distribution is Unlimited Déjà vu : The Unified Command Plan of the Future Revisited A Monograph by Lieutenant...DD-MM-YYYY) 19-05-2011 2. REPORT TYPE Monograph 3. DATES COVERED (From - To) JUL 2010 – MAY 2011 4. TITLE AND SUBTITLE Déjà vu : The Unified...i SCHOOL OF ADVANCED MILITARY STUDIES MONOGRAPH APPROVAL Lieutenant Colonel Edward Francis Martignetti Title of Monograph: Déjà vu : The Unified

  10. One Among Many: Building Partner Capacity in a Multinational Command

    Science.gov (United States)

    2012-03-20

    initiative-life/ (accessed March 10, 2012). UNESCO defines literacy as “The ability to read and write with understanding a simple statement related...Nations Educational, Scientific, and Cultural Organization, “ UNESCO Institute for Statistics Glossary,” 2006, http://glossary.uis.unesco.org/glossary...Command Brief, briefing slides, Fort Polk, LA , February 8, 2012 and MAJ John A. Redford, Brigade Operations Officer, 162d Infantry Brigade, Fort

  11. Disagreement, Cognitive Command, and the Indexicality of Moral Truth

    Directory of Open Access Journals (Sweden)

    Reichardt Bastian

    2015-09-01

    Full Text Available Moral Relativism can be considered an attractive alternative to realism because relativists can make good sense of cultural and societal disagreements by seeing them as faultless. However, we can show that this advantage is made possible by systematically disagreeing with moral phenomenology. Relativists make a substantial distinction between intercultural and intracultural discourses which turns out to be incoherent. This can be shown by making use of Crispin Wright’s notion of Cognitive Command.

  12. Missile Defense: Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities

    Science.gov (United States)

    2016-04-28

    Page 1 GAO-16-339R Ballistic Missile Defense 441 G St. N.W. Washington, DC 20548 April 28, 2016 Congressional Committees Missile Defense... Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities For over half a century, the Department of Defense (DOD) has been...funding efforts to develop a system to detect, track, and defeat enemy ballistic missiles. The current system—the Ballistic Missile Defense System

  13. An incident command system in practice and reality

    International Nuclear Information System (INIS)

    Spitzer, J.D.

    1992-01-01

    The basic organizational problems and options for forming a pollution response organization are described. Problems with multi-agency response organizations include poor coordination and lack of accountability. Alternatives to autonomous organizations operating with minimal coordination are the multi-agency/organization teams working under a controlling organization, and organizations formed into a single response organization (the incident command system or ICS). Design criteria for an ICS include flexibility as to the jurisdiction and agency, adaptable organizational structure, capability to expand in a logical manner, and uniform elements in terminology, organization, and procedures. ICS in practice is illustrated both by the CANUSLAK exercise undertaken in August 1990 and a real incident that occurred several days after the exercise was finished. CANUSLAK involved the US Coast Guard and its Canadian and Michigan counterparts in a simulated incident in the St. Clair river. The real incident was the explosion of the gasoline-carrying tank vessel Jupiter in the Saginaw River. In both instances, ICS combined many organizations into one team with a single incident commander. The eight basic components of ICS are common terminology, modular organization, integrated communications, unified command structure, consolidated action plan, manageable span of control, designated incident facilities, and comprehensive resource management. ICS has been tailored to a wide range of applications and is not only used in major disasters but as a part of routine operations. 18 refs., 5 figs

  14. STS-93 Commander Collins suits up before launch

    Science.gov (United States)

    1999-01-01

    In the Operations and Checkout Building, STS-93 Commander Eileen M. Collins gets help donning her launch and entry suit. After Space Shuttle Columbia's July 20 launch attempt was scrubbed at the T-7 second mark in the countdown, the launch was rescheduled for Thursday, July 22, at 12:28 a.m. EDT. The target landing date is July 26, 1999, at 11:24 p.m. EDT. STS-93 is a five-day mission primarily to release the Chandra X-ray Observatory, which will allow scientists from around the world to study some of the most distant, powerful and dynamic objects in the universe. The new telescope is 20 to 50 times more sensitive than any previous X- ray telescope and is expected unlock the secrets of supernovae, quasars and black holes. The STS-93 crew numbers five: Commander Collins, Pilot Jeffrey S. Ashby, and Mission Specialists Stephen A. Hawley (Ph.D.), Catherine G. Coleman (Ph.D.) and Michel Tognini of France, with the Centre National d'Etudes Spatiales (CNES). Collins is the first woman to serve as commander of a shuttle mission.

  15. STS-93 Commander Collins waves after suiting up before launch

    Science.gov (United States)

    1999-01-01

    During final launch preparations in the Operations and Checkout Building, STS-93 Commander Eileen M. Collins waves after donning her launch and entry suit. After Space Shuttle Columbia's July 20 launch attempt was scrubbed at the T-7 second mark in the countdown, the launch was rescheduled for Thursday, July 22, at 12:28 a.m. EDT. The target landing date is July 26, 1999, at 11:24 p.m. EDT. STS-93 is a five-day mission primarily to release the Chandra X-ray Observatory, which will allow scientists from around the world to study some of the most distant, powerful and dynamic objects in the universe. The new telescope is 20 to 50 times more sensitive than any previous X-ray telescope and is expected unlock the secrets of supernovae, quasars and black holes. The STS-93 crew numbers five: Commander Collins, Pilot Jeffrey S. Ashby, and Mission Specialists Stephen A. Hawley (Ph.D.), Catherine G. Coleman (Ph.D.) and Michel Tognini of France, with the Centre National d'Etudes Spatiales (CNES). Collins is the first woman to serve as commander of a shuttle mission.

  16. Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)

    International Nuclear Information System (INIS)

    Durling, R L; Price, D E; Spero, K K

    2005-01-01

    For over ten years, the Counterproliferation Analysis and Planning System (CAPS) at Lawrence Livermore National Laboratory (LLNL) has been a planning tool used by U.S. combatant commands for mission support planning against foreign programs engaged in the manufacture of weapons of mass destruction (WMD). CAPS is endorsed by the Secretary of Defense as the preferred counterproliferation tool to be used by the nation's armed services. A sister system, the Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging CAPS expertise designed to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented

  17. Vulnerability And Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)

    International Nuclear Information System (INIS)

    Durling, R.L. Jr.; Price, D.E.; Spero, K.K.

    2005-01-01

    For over ten years, the Counterproliferation Analysis and Planning System (CAPS) at Lawrence Livermore National Laboratory (LLNL) has been a planning tool used by U.S. combatant commands for mission support planning against foreign programs engaged in the manufacture of weapons of mass destruction (WMD). CAPS is endorsed by the Secretary of Defense as the preferred counterproliferation tool to be used by the nation's armed services. A sister system, the Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging CAPS expertise designed to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities is presented

  18. Defense bill: Earmarking as usual

    Science.gov (United States)

    Earmarked funds in the $268 billion defense appropriations bill for fiscal year 1991 stirred congressional debate in late October. Senator Sam Nunn (D-Ga.), chairman of the Senate Armed Services Committee, charged that the defense bill contains questionable projects totaling tens of millions of dollars. AGU opposes legislative earmarking of money for particular institutions, maintaining that the practice prevents the best use of federal funding by circumventing competitive review. Nunn noted on the Senate floor that the appropriations bill provided specific funds for cited institutions—contravening a federal law promoting competition. “ If these programs have merit, they will succeed in a fair and competent review in competition,” Nunn said. “If no other institution in the country is able to compete, there should be no fear whatever of competition… But no one else in the world is allowed to compete to work on these projects.”

  19. Effects of walking speed on the step-by-step control of step width.

    Science.gov (United States)

    Stimpson, Katy H; Heitkamp, Lauren N; Horne, Joscelyn S; Dean, Jesse C

    2018-02-08

    Young, healthy adults walking at typical preferred speeds use step-by-step adjustments of step width to appropriately redirect their center of mass motion and ensure mediolateral stability. However, it is presently unclear whether this control strategy is retained when walking at the slower speeds preferred by many clinical populations. We investigated whether the typical stabilization strategy is influenced by walking speed. Twelve young, neurologically intact participants walked on a treadmill at a range of prescribed speeds (0.2-1.2 m/s). The mediolateral stabilization strategy was quantified as the proportion of step width variance predicted by the mechanical state of the pelvis throughout a step (calculated as R 2 magnitude from a multiple linear regression). Our ability to accurately predict the upcoming step width increased over the course of a step. The strength of the relationship between step width and pelvis mechanics at the start of a step was reduced at slower speeds. However, these speed-dependent differences largely disappeared by the end of a step, other than at the slowest walking speed (0.2 m/s). These results suggest that mechanics-dependent adjustments in step width are a consistent component of healthy gait across speeds and contexts. However, slower walking speeds may ease this control by allowing mediolateral repositioning of the swing leg to occur later in a step, thus encouraging slower walking among clinical populations with limited sensorimotor control. Published by Elsevier Ltd.

  20. INSTITUTIONAL BASIS OF MANAGEMENT AND EVALUATION OF UKRAINIAN DEFENSE LANDS

    Directory of Open Access Journals (Sweden)

    Garazhа Y.P

    2017-02-01

    estate. Military depots with fuel for rockets and other types of substances, military training grounds are dangerous both for people and for the ecological situation of the environment. If in the future they will not be used for their intended purpose, they should be brought to its original state. This land is advisable to assign a recovery mode, which provides clearing from dangerous objects and substances. After these steps, you can change their intended purpose. These funds come from the alienation of the State budget exclusively for defense purposes. Land alienated at land auctions. Contractor of land sales is determined on a competitive basis. He receives from the CMU authority to the exclusion of military property. He must have a license to conduct land auctions. He must conclude the two treaties: the first - with the organizer about their carrying out, and the second - with the Ministry of Defence (in terms of the implementation of real military equipment of objects. Lot consists of a land plot together with the objects located on it immovable military property.

  1. Cyber Defense: An International View

    Science.gov (United States)

    2015-09-01

    and Mathematics at the Royal Institute of Tech- nology, Stockholm, Sweden; and Otto von Guericke University, Magdeburg , Germany . viii ix SUMMARY...and analysis to influence policy debate and bridge the gap between military and academia. The Center for Strategic Leadership and Development...provide an overview of four different national approaches to cyber defense: those of Nor- way, Estonia, Germany , and Sweden. While provid- ing a

  2. Defense Programs Transportation Risk Assessment

    International Nuclear Information System (INIS)

    Clauss, D.B.

    1994-01-01

    This paper provides an overview of the methodology used in a probabilistic transportation risk assessment conducted to assess the probabilities and consequences of inadvertent dispersal of radioactive materials arising from severe transportation accidents. The model was developed for the Defense Program Transportation Risk Assessment (DPTRA) study. The analysis incorporates several enhancements relative to previous risk assessments of hazardous materials transportation including newly-developed statistics on the frequencies and severities of tractor semitrailer accidents and detailed route characterization using the 1990 Census data

  3. Priming of antiherbivore defensive responses in plants

    Institute of Scientific and Technical Information of China (English)

    Jinwon Kim; Gary W.Felton

    2013-01-01

    Defense priming is defined as increased readiness of defense induction.A growing body of literature indicates that plants (or intact parts of a plant) are primed in anticipation of impending environmental stresses,both biotic and abiotic,and upon the following stimulus,induce defenses more quickly and strongly.For instance,some plants previously exposed to herbivore-inducible plant volatiles (HIPVs) from neighboring plants under herbivore attack show faster or stronger defense activation and enhanced insect resistance when challenged with secondary insect feeding.Research on priming of antiherbivore defense has been limited to the HIPV-mediated mechanism until recently,but significant advances were made in the past three years,including non-HIPV-mediated defense priming,epigenetic modifications as the molecular mechanism of priming,and others.It is timely to consider the advances in research on defense priming in the plantinsect interactions.

  4. Defense of a space elevator

    Energy Technology Data Exchange (ETDEWEB)

    Laubscher, B. E. (Bryan E.)

    2004-01-01

    The Space Elevator (SE) represents a major paradigm shift in space access. If the SE's promise of low-cost access is to be realized, everything becomes economically more feasible to accomplish in space. In this paper we describe a defensive system of the SE. The primary scenario adopted for this analysis is the SE based on a floating platform in the ocean along the equator. A second possible scenario is the SE stationed on land (island or continent) on or near the equator. The SE will capture the imaginations of people around the world. It will become a symbol of power, capability, wealth and prestige for the country that builds it. As such, it will become a prime terrorist target. Moreover, the tremendous economic leverage afforded by the SE might motivate rogue nations to plot its destruction. Therefore, it is necessary to consider the requirements for defense of the SE. For the purposes of this paper it is assumed that the SE is to be deployed by the United States or one of its companies, and the resources of the US are available for its defense.

  5. Implications of a Non-Unified Command System and the Need for a Unified Command System in Zambia

    Science.gov (United States)

    2015-06-12

    aspects. It has been found that Zambia’s two attempts to unify its system happened during the one party participatory democracy era. Since the coming...and its Implication for Democracy ,” in Ourselves to Know: Civil Military Relations and Defence Transformation in Southern Africa, eds. Rocky Williams...adopted a multiparty system of government under the Movement for Multi-Party Democracy (MMD) which decided to revert to independent commands. As

  6. Artificial Intelligence Applied to the Command, Control, Communications, and Intelligence of the U.S. Central Command.

    Science.gov (United States)

    1983-06-06

    these components will be presented. 4.17 °°,. CHAPTER III FOOTNOTES 1. Arron Barr and Edward A. Feigenbaum, eds., Te Handbook gf Artificial Inteligence ol...RD-R137 205 ARTIFICIAL INTELLIGENCE APPLIED TO THE COMIMAND CONTROL i/i COMMUNICATIONS RND..(U) ARMY WAR COLL CARLISLE BARRACKS U PA J N ENVART 06...appropriate mlitary servic or *swesmment aency. ARTIFICIAL INTELLIGENCE APPLIED TO THE COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE OF THE U.S. CENTRAL

  7. Study and realisation of cabled interfaces for the control and command of the Saturne cyclotron

    International Nuclear Information System (INIS)

    Devailly, Jean

    1975-01-01

    This research thesis addressed the assessment of needs, design and realisation of some hardware used by the Saturne cyclotron to solve problems of command and control while using connections developed for the Saturne's computer. After some generalities (description of Saturne, requirements and constraints, general statements about acquisitions and commands, selection of the acquisition and command system, codes), the author presents the different hardware for analog acquisitions, digital acquisitions, analog commands, digital commands, all-or-none control, simulators, amplifiers and memories. He reports some examples: magnetic measurements, control of ejection currents, programs. He finally presents the developed hardware

  8. The U.S.-Japan Alliance: Review of the Guidelines for Defense Cooperation

    Science.gov (United States)

    2015-03-01

    States–Japan alliance and to consider future steps to strengthen its functioning. Special thanks are due to Ambassador (Ret.) Rust Deming , Lieutenant...Defense Co- operation,” November 27, 1978, available at <http://fas.org/news/japan/sisin1e.htm>. 14 Interview with Ambassador Rust Deming . While it

  9. A kinematic analysis of the rapid step test in balance-impaired and unimpaired older women.

    Science.gov (United States)

    Schulz, Brian W; Ashton-Miller, James A; Alexander, Neil B

    2007-04-01

    Little is known about the kinematic and kinetic determinants that might explain age and balance-impairment alterations in the results of volitional stepping performance tests. Maximal unipedal stance time (UST) was used to distinguish "balance-impaired" old (BI, UST30s, N=12, mean age=71 years) before they and healthy young females (Y, UST>30s, N=13, mean age=23 years) performed the rapid step test (RST). The RST evaluates the time required to take volitional front, side, and back steps of at least 80% maximum step length in response to verbal commands. Kinematic and kinetic data were recorded during the RST. The results indicate that the initiation phase of the step was the major source of age- and balance impairment-related delays. The delays in BI were primarily caused by increased postural adjustments prior to step initiation, as measured by center-of-pressure (COP) path length (p<0.003). The Step landing phase showed similar, but non-significant, temporal trends. Step length and peak center-of-mass (COM) deceleration during the Step-Out landing decreased in O by 18% (p=0.0002) and 24% (p=0.001), respectively, and a further 12% (p=0.04) and 18% (p=0.08) in BI. We conclude that the delay in BI step initiation was due to the increase in their postural adjustments prior to step initiation.

  10. THE PARTICULARITIES OF THE COST CALCULATION METHOD ON COMMANDS IN FURNITURE INDUSTRY

    Directory of Open Access Journals (Sweden)

    Felicia Sabou

    2014-10-01

    Full Text Available The paper present the importance of the method on commands in cost calculation and the particularities of the cost calculation method on commands in the furniture industry. This paper presents a hypotetical study on the method on commands, considering the observations made during 2013-2014, on how it is organized and managed accounts management using method on commands.By presenting this hypothetical model about the accounting in management accounting using the method on commands, the paper contributes to the correct application of this method in practice, specifically in management accounting in companies from the furniture industry. In my opinion the method on commands is an appropriate method for achieving management accounting for companies that have as main activity the production of furniture. When applying the method on commands in cost calculation and in management accounting, the companies must to consider the particularities of the cost calculation, in the furniture industry, like: technical and economic factors from this sector, the technical details of each command, the codification of the commands, planning materials and labor costs for each command, monitoring and recording production costs, registration of the direct costs, distribution of the indirect costs on commands, registration of the indirect costs and registration in management accounting.

  11. Planning a transportation system for US Defense Transuranic waste

    International Nuclear Information System (INIS)

    Gilbert, K.V.; Hurley, J.D.; Smith, L.J.; McFadden, M.H.; Raudenbush, M.H.; Fedie, M.L.

    1983-05-01

    The development and planning of a transportation system for US Department of Energy (USDOE) Defense Transuranic (TRU) waste has required the talents and expertise of many people. Coordination activities, design activities, fabrication, research and development, operations, and transportation are but a few of the areas around which this system is built. Due to the large number of organizations, regulations and personalities the planning task becomes extremely complex. The intent of this paper is to discuss the steps taken in planning this system, to identify the various organizations around which this system is designed, and to discuss program progress to date, scheduling, and future plans. 9 figures, 1 table

  12. Planning a transportation system for US defense transuranic waste

    International Nuclear Information System (INIS)

    Gilbert, K.V.; Hurley, J.D.; Smith, L.J.; McFadden, M.H.; Raudenbush, M.H.; Fedie, M.L.

    1983-01-01

    The development and planning of a transportation system for US Department of Energy (USDOE) Defense Transuranic (TRU) waste has required the talents and expertise of many people. Coordination activities, design activities, fabrication, research and development, operations, and transportation are but a few of the areas around which this system is built. Due to the large number of organizations, regulations and personalities the planning task becomes extremely complex. The intent of this paper is to discuss the steps taken in planning this system, to identify the various organizations around which this system is designed, and to discuss program progress to date, scheduling, and future plans

  13. Man/terminal interaction evaluation of computer operating system command and control service concepts. [in Spacelab

    Science.gov (United States)

    Dodson, D. W.; Shields, N. L., Jr.

    1978-01-01

    The Experiment Computer Operating System (ECOS) of the Spacelab will allow the onboard Payload Specialist to command experiment devices and display information relative to the performance of experiments. Three candidate ECOS command and control service concepts were reviewed and laboratory data on operator performance was taken for each concept. The command and control service concepts evaluated included a dedicated operator's menu display from which all command inputs were issued, a dedicated command key concept with which command inputs could be issued from any display, and a multi-display concept in which command inputs were issued from several dedicated function displays. Advantages and disadvantages are discussed in terms of training, operational errors, task performance time, and subjective comments of system operators.

  14. HTSC-Josephson step contacts

    International Nuclear Information System (INIS)

    Herrmann, K.

    1994-03-01

    In this work the properties of josephson step contacts are investigated. After a short introduction into Josephson step contacts the structure, properties and the Josphson contacts of YBa 2 Cu 3 O 7-x high-T c superconductors is presented. The fabrication of HTSC step contacts and the microstructure is discussed. The electric properties of these contacts are measured together with the Josephson emission and the magnetic field dependence. The temperature dependence of the stationary transport properties is given. (WL)

  15. The NIST Step Class Library (Step Into the Future)

    Science.gov (United States)

    1990-09-01

    Figure 6. Excerpt from a STEP exclange file based on the Geometry model 1be NIST STEP Class Libary Page 13 An issue of concern in this...Scheifler, R., Gettys, J., and Newman, P., X Window System: C Library and Protocol Reference. Digital Press, Bedford, Mass, 1988. [Schenck90] Schenck, D

  16. Step-by-Step Visual Manuals: Design and Development

    Science.gov (United States)

    Urata, Toshiyuki

    2004-01-01

    The types of handouts and manuals that are used in technology training vary. Some describe procedures in a narrative way without graphics; some employ step-by-step instructions with screen captures. According to Thirlway (1994), a training manual should be like a tutor that permits a student to learn at his own pace and gives him confidence for…

  17. On the Convexity of Step out - Step in Sequencing Games

    NARCIS (Netherlands)

    Musegaas, Marieke; Borm, Peter; Quant, Marieke

    2016-01-01

    The main result of this paper is the convexity of Step out - Step in (SoSi) sequencing games, a class of relaxed sequencing games first analyzed by Musegaas, Borm, and Quant (2015). The proof makes use of a polynomial time algorithm determining the value and an optimal processing order for an

  18. Valve cam design using numerical step-by-step method

    OpenAIRE

    Vasilyev, Aleksandr; Bakhracheva, Yuliya; Kabore, Ousman; Zelenskiy, Yuriy

    2014-01-01

    This article studies the numerical step-by-step method of cam profile design. The results of the study are used for designing the internal combustion engine valve gear. This method allows to profile the peak efficiency of cams in view of many restrictions, connected with valve gear serviceability and reliability.

  19. The bounded proof property via step algebras and step frames

    NARCIS (Netherlands)

    Bezhanishvili, N.; Ghilardi, Silvio

    2013-01-01

    We develop a semantic criterion for a specific rule-based calculus Ax axiomatizing a given logic L to have the so-called bounded proof property. This property is a kind of an analytic subformula property limiting the proof search space. Our main tools are one-step frames and one-step algebras. These

  20. Leading Change Step-by-Step: Tactics, Tools, and Tales

    Science.gov (United States)

    Spiro, Jody

    2010-01-01

    "Leading Change Step-by-Step" offers a comprehensive and tactical guide for change leaders. Spiro's approach has been field-tested for more than a decade and proven effective in a wide variety of public sector organizations including K-12 schools, universities, international agencies and non-profits. The book is filled with proven tactics for…

  1. Defense Threat Reduction Agency > Careers > Professional Development

    Science.gov (United States)

    Integration Command Senior Enlisted Leader Media News News Archive Strategic Plan Videos Mission Research Support Center Contact Us FAQ Sheet Links Success Stories Contracts Business Opportunities Current Justifications & Approvals Careers Who We Are Our Values Strategic Recruiting Programs Professional

  2. Defense Threat Reduction Agency > Home > Operating Status

    Science.gov (United States)

    Integration Command Senior Enlisted Leader Media News News Archive Strategic Plan Videos Mission Research Support Center Contact Us FAQ Sheet Links Success Stories Contracts Business Opportunities Current Justifications & Approvals Careers Who We Are Our Values Strategic Recruiting Programs Professional

  3. Defense Threat Reduction Agency > About > Our Values

    Science.gov (United States)

    Integration Command Senior Enlisted Leader Media News News Archive Strategic Plan Videos Mission Research Support Center Contact Us FAQ Sheet Links Success Stories Contracts Business Opportunities Current Justifications & Approvals Careers Who We Are Our Values Strategic Recruiting Programs Professional

  4. The Role of a Commander in Military Lessons Learned Systems

    Directory of Open Access Journals (Sweden)

    Zenon Waliński

    2015-06-01

    Full Text Available The aim of the paper is to investigate the role of a commander in military Lessons Learned systems. In order to achieve the aim, the paper presents (1 the architecture of the Lessons Learned capabilities in the U.S. Army, NATO and the Polish Armed Forces, (2 the commander’s role in the Lessons Learned process (3 the commander’s role in fostering Lessons Learned organisation culture. The paper is based on multiple case study analysis including Lessons Learned systems in NATO, the U.S. Army and the Polish Armed Forces.

  5. Command History. 1972-1973. Volume 2. Sanitized

    Science.gov (United States)

    1973-07-15

    was de - ing processing Army DEROS flights, transporting veloped to handle the anticipated large number of baggage to and from the flight lines, and...VOLUME 11 B CIA IFIED CY 1 PAC F0 IG D EMN 0 EXE TED IF AMA NERA DE LASSIF A N EXEM E SY CINC CC \\’ opy ot󈨤 Cop~ies Iys BTAG pT ’’, 00- d 6,,’ 83-6 6-24...it nocoaam7 &WE Identity by black aiimiiw) Logistica , Support of RVNAF. Communications-Electronics, VNAF Support, Command Activities, The New Agencies

  6. Location of Microbial Ecology Evaluation Device in Apollo Command Module

    Science.gov (United States)

    1971-01-01

    The location of the Microbial Ecology Evaluation Device (MEED) installed on the open hatch of the Apollo Command Module is illustrated in this photograph. The MEED, equipment of the Microbial Response in Space Environment experiment, will house a selection of microbial systems. The MEED will be deployed during the extravehicular activity on the transearth coast phase of the Aopllo 16 lunar landing mission. The purpose of the experiment will be to measure the effects of certain space environmental parameters on the microbial test systems.

  7. India's nuclear command and control: perspectives from organisation theory

    International Nuclear Information System (INIS)

    Sasikumar, Shanmugasundaram

    2010-01-01

    Command and control of nuclear weapons was the edifice upon which great power nuclear strategy was based. Empirical Cold War research later proved that this edifice was, in fact, only a power keg. Therefore, US non-proliferation-minded analysts propounded logical reasons for their claim that new nuclear nations will be unable to demonstrate prudence in nuclear weapons management. The unique Indian case, pronounced from the organisation theory perspective, proves to the contrary. India's nuclear organisation is not a static entity; its unique strategic culture together with a political standard operating procedure for nuclear weapons management reduces the exaggerated possibility of any catastrophe. (author)

  8. Plant Habitat Telemetry / Command Interface and E-MIST

    Science.gov (United States)

    Walker, Uriae M.

    2013-01-01

    Plant Habitat (PH) is an experiment to be taken to the International Space Station (ISS) in 2016. It is critical that ground support computers have the ability to uplink commands to control PH, and that ISS computers have the ability to downlink PH telemetry data to ground support. This necessitates communication software that can send, receive, and process, PH specific commands and telemetry. The objective of the Plant Habitat Telemetry/ Command Interface is to provide this communication software, and to couple it with an intuitive Graphical User Interface (GUI). Initial investigation of the project objective led to the decision that code be written in C++ because of its compatibility with existing source code infrastructures and robustness. Further investigation led to a determination that multiple Ethernet packet structures would need to be created to effectively transmit data. Setting a standard for packet structures would allow us to distinguish these packets that would range from command type packets to sub categories of telemetry packets. In order to handle this range of packet types, the conclusion was made to take an object-oriented programming approach which complemented our decision to use the C++ programming language. In addition, extensive utilization of port programming concepts was required to implement the core functionality of the communication software. Also, a concrete understanding of a packet processing software was required in order to put aU the components of ISS-to-Ground Support Equipment (GSE) communication together and complete the objective. A second project discussed in this paper is Exposing Microbes to the Stratosphere (EMIST). This project exposes microbes into the stratosphere to observe how they are impacted by atmospheric effects. This paper focuses on the electrical and software expectations of the project, specifically drafting the printed circuit board, and programming the on-board sensors. The Eagle Computer-Aided Drafting

  9. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  10. Territorial Defense, Education, and Interculturalism

    Directory of Open Access Journals (Sweden)

    Claudia Patricia Sierra Pardo

    2011-10-01

    Full Text Available The article carries out a series of reflections regarding the social and economic conditions in which the cultivation of oil palm affected the Bajo Atrato region of the Department of Chocó at the end of the nineteen nineties. It also discusses the actions carried out by communities, companies, and organizations in solidarity with the region’s cause, since these expressions make it possible to understand the role of organization and education in territorial defense processes. Finally, the article examines the different tensions, struggles, challenges, and contradictions inherent to these types of processes.

  11. Cyber defense and situational awareness

    CERN Document Server

    Kott, Alexander; Erbacher, Robert F

    2015-01-01

    This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and human factors, automated learning and inference, use of ontologies and metrics, predicting and assessing impact of cyber attacks, and achieving resilience of cyber and physical mission. Chapters include case studies, recent research results and practical insights described specifically for th

  12. Disposal of Hanford defense waste

    International Nuclear Information System (INIS)

    Holten, R.A.; Burnham, J.B.; Nelson, I.C.

    1986-01-01

    An Environmental Impact Statement (EIS) on the disposal of Hanford Defense Waste is scheduled to be released near the end of March, 1986. This EIS will evaluate the impacts of alternatives for disposal of high-level, tank, and transuranic wastes which are now stored at the Department of Energy's Hanford Site or will be produced there in the future. In addition to releasing the EIS, the Department of Energy is conducting an extensive public participation process aimed at providing information to the public and receiving comments on the EIS

  13. A small step for mankind

    NARCIS (Netherlands)

    Huizing, C.; Koymans, R.L.C.; Kuiper, R.; Dams, D.; Hannemann, U.; Steffen, M.

    2010-01-01

    For many programming languages, the only formal semantics published is an SOS big-step semantics. Such a semantics is not suited for investigations that observe intermediate states, such as invariant techniques. In this paper, a construction is proposed that generates automatically a small-step SOS

  14. Grief: Difficult Times, Simple Steps.

    Science.gov (United States)

    Waszak, Emily Lane

    This guide presents techniques to assist others in coping with the loss of a loved one. Using the language of 9 layperson, the book contains more than 100 tips for caregivers or loved ones. A simple step is presented on each page, followed by reasons and instructions for each step. Chapters include: "What to Say"; "Helpful Things to Do"; "Dealing…

  15. THE DEFENSE PLANNING SYSTEMS AND THEIR IMPLICATIONS

    Directory of Open Access Journals (Sweden)

    Laszlo STICZ

    2010-01-01

    Full Text Available Defense planning in the Alliance is a fundamental element of the arrangements which enable its member countries to enjoy the crucial political, military and resource advantages of collective defense and other common military efforts to enhance security and stability. In this respect, the aim of this paper is to outline the role of the Armed Forces and the specific processes aiming to achieve the ultimate goal of a nation regarding national security, with focus on defense planning and the PDPS.

  16. Student Papers on Strategic Defense Initiative.

    Science.gov (United States)

    1985-01-01

    895. 3. "Scientific Canvas" AWST, p. 19. 4. Halliday, p. 548. 5. William Shiner, Lasers (New York: Mc Graw -Hill, 1980), p. 21. - 30...and Design. New York: Mc Graw -Hill, 1980. U.S. Department of Defense. The Strategic Defense Ini- tiative: Defensive Technologies Study. Washington...Armageddon," Armed Forces Journal, February 1983, p. 30. 7. David Baker, The Shape of Wars to Come (Cambridge: Patrick Stephens , Ltd, 1981), p. 109

  17. Defense Transuranic Waste Program Strategy Document

    International Nuclear Information System (INIS)

    1984-01-01

    The Defense Transuranic Waste Program (DTWP) Strategy Document presents the general strategy for managing transuranic (TRU) waste materials generated during defense and research activities regulated by the US Department of Energy. The Strategy Document includes discussion of objectives and activities relating to the entire Defense Transuranic Waste Program. However, the primary focus is on the specific management responsibilities of the Transuranic Waste Lead Organization (TLO). The document also includes an updated summary of progress on TLO-managed activities over the past year

  18. Status of DOE defense waste management policy

    International Nuclear Information System (INIS)

    Oertel, K.G.; Scott, R.S.

    1983-01-01

    This paper very briefly traces the statutory basis for DOE management of atomic energy defense activity wastes, touches on the authority of the Federal agencies involved in the regulation of defense nuclear waste management, and addresses the applicable regulations and their status. This background sets the stage for a fairly detailed discussion of management and disposal strategies of the Defense Waste and Byproducts Management Program

  19. Active Computer Network Defense: An Assessment

    Science.gov (United States)

    2001-04-01

    sufficient base of knowledge in information technology can be assumed to be working on some form of computer network warfare, even if only defensive in...the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/ Internet Protocol (TCP/IP) networks are inherently resistant to...aims to create this part of information superiority, and computer network defense is one of its fundamental components. Most of these efforts center

  20. Trade Costs, Conflicts, and Defense Spending

    OpenAIRE

    Seitz, Michael; Tarasov, Alexander; Zakharenko, Roman

    2013-01-01

    This paper develops a quantitative model of trade, military conflicts, and defense spending. Trade liberalization between two countries reduces probability of an armed conflict between them, causing both to cut defense spending. This in turn causes a domino effect on defense spending by other countries. As a result, both countries and the rest of the world are better off. We estimate the model using data on trade, conflicts, and military spending. We find that, after reduction of costs of tra...