WorldWideScience

Sample records for defense special weapons

  1. Special Weapons

    Data.gov (United States)

    Federal Laboratory Consortium — Supporting Navy special weapons, the division provides an array of engineering services, technical publication support services, logistics support services, safety...

  2. Willingness to pay for defense against weapons of mass destruction.

    Science.gov (United States)

    Mulvaney, J M; LaBarre, D; Pastel, R; Landauer, M

    2001-12-01

    A survey assessed the willingness to pay for defense against weapons of mass destruction. The results were evaluated according to the benefit to society. The results indicated preferences for increased spending on intelligence gathering, training, and equipment. We concluded that the United States is spending less for weapons of mass destruction defense than the sample population was willing to pay.

  3. Defensive weapons and defense signals in plants: some metabolites serve both roles.

    Science.gov (United States)

    Maag, Daniel; Erb, Matthias; Köllner, Tobias G; Gershenzon, Jonathan

    2015-02-01

    The defense of plants against herbivores and pathogens involves the participation of an enormous range of different metabolites, some of which act directly as defensive weapons against enemies (toxins or deterrents) and some of which act as components of the complex internal signaling network that insures that defense is timed to enemy attack. Recent work reveals a surprising trend: The same compounds may act as both weapons and signals of defense. For example, two groups of well-studied defensive weapons, glucosinolates and benzoxazinoids, trigger the accumulation of the protective polysaccharide callose as a barrier against aphids and pathogens. In the other direction, several hormones acting in defense signaling (and their precursors and products) exhibit activity as weapons against pathogens. Knowing which compounds are defensive weapons, which are defensive signals and which are both is vital for understanding the functioning of plant defense systems. © 2015 WILEY Periodicals, Inc.

  4. Defense Acquisitions: Assessments of Selected Weapon Programs

    Science.gov (United States)

    2016-03-01

    of contractors delivering the 10 costliest programs have performed well relative to broad-based market indices, indicating that investors expect...16-329SP Assessments of Major Weapon Programs Two programs—the B-2 Extremely High Frequency Satellite Communications and Computer...expected. The B-2 Extremely High Frequency Satellite Communications and Computer Increment 1 date was revised to reflect the actual delivery of

  5. Defense Acquisitions: Assessments of Selected Weapon Programs

    Science.gov (United States)

    2015-03-01

    Assessment 56 Figure 13: Examples of Knowledge Scorecards 58 Contents Page v GAO-15-342SP Assessments of Selected Weapon Programs Abbreviations...efficiencies realized through contract negotiations (13 programs), • design trades to balance affordability and capability (10 programs), • changed...at the time of our review with a scorecard and narrative summary at the bottom of the first page of each assessment. As illustrated in figure 12

  6. The Legend of Hot Tar or Pitch as a Defensive Weapon

    DEFF Research Database (Denmark)

    2015-01-01

    In popular culture and even in academic discourse surrounding castles, hot tar pitch has been depicted as a widespread defensive weapon. The identification of "machicoulis" (machicolations) as an architectural provision for pouring down liquid tar pitch goes back to the early days of castle...... production and use during the Middle Ages will be discussed with special focus on the application of tar pitch as an ingredient in medieval and post-medieval thermal weapons (especially Greek Fire, the firebomb and the fire arrow). The punishment of tarring and feathering will also be considered...

  7. The Legend of Hot Tar or Pitch as a Defensive Weapon

    DEFF Research Database (Denmark)

    Atzbach, Rainer

    2015-01-01

    In popular culture and even in academic discourse surrounding castles, hot tar pitch has been depicted as a widespread defensive weapon. The identification of "machicoulis" (machicolations) as an architectural provision for pouring down liquid tar pitch goes back to the early days of castle...... production and use during the Middle Ages will be discussed with special focus on the application of tar pitch as an ingredient in medieval and post-medieval thermal weapons (especially Greek Fire, the firebomb and the fire arrow). The punishment of tarring and feathering will also be considered...

  8. Defense Acquisitions: Assessments of Selected Weapon Programs

    Science.gov (United States)

    2013-03-01

    Radios, Joint Land Attack Cruise Missile Defense Elevated Netter Sensor System, C-130 Avionics Modernization Program, or National Polar-orbiting...investigation of hypoxia-like physiological symptoms experienced by some F- 22A pilots, an issue identified as being significant starting in 2008 and

  9. Study on combat effectiveness of air defense missile weapon system based on queuing theory

    Science.gov (United States)

    Zhao, Z. Q.; Hao, J. X.; Li, L. J.

    2017-01-01

    Queuing Theory is a method to analyze the combat effectiveness of air defense missile weapon system. The model of service probability based on the queuing theory was constructed, and applied to analyzing the combat effectiveness of "Sidewinder" and "Tor-M1" air defense missile weapon system. Finally aimed at different targets densities, the combat effectiveness of different combat units of two types' defense missile weapon system is calculated. This method can be used to analyze the usefulness of air defense missile weapon system.

  10. Defense Acquisitions: Assessments of Selected Major Weapon Programs

    Science.gov (United States)

    2006-03-01

    Common Name: C-130 AMPC -130 Avionics Modernization Program (C-130 AMP)The Air Force’s C-130 AMP standardizes the cockpit configurations and avionics for...GAO-06-391 Assessments of Selected Major Weapon Programs Common Name: C-130 AMPC -130 AMP Program Technology Maturity All of the C-130 AMP’s six...Selected Major Weapon Programs Common Name: C-5 AMPC -5 Avionics Modernization Program (C-5 AMP)The Air Force’s C-5 AMP is the first of two major upgrades

  11. Defense Acquisitions: How DOD Acquires Weapon Systems and Recent Efforts to Reform the Process

    Science.gov (United States)

    2013-01-02

    Weapon Systems and Recent Efforts to Reform the Process 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT ...oversee and mange acquisition programs. At each milestone, a program must meet specific statutory and regulatory requirements before the program can...the FY2007 defense authorization bill stated Simply put, the Department of Defense (DOD) acquisition process is broken. The ability of the

  12. [Specific features of wounds with a self-defense traumatic weapon "Osa"].

    Science.gov (United States)

    Khodov, A M; Zolotov, A S; Filipchenkov, L S

    2012-01-01

    Specific features and outcomes of wounds with a traumatic weapon of self-defense "Osa" were analyzed in 24 patients. Mean age of the wounded was from 21 to76 years. In 20 patients there was a single wound, in 4 patients it was multiple, in 7--blunt, in 12--perforating and 5 patients had gutter wounds. All the patients were treated according to the principles of field military surgery. Five patients had severe wounds: penetrating fracture of the skull (2 of them died), fracture of the shoulder (1 case), injury of the main artery (1 case), of the pleura (1 case). The wounds were closed up by primary intention in 19 patients, by second intention in 4 patients. The authors' experience shows that a traumatic weapon of self-defense "Osa" rather often caused permanent harm to health and can be mortal. Active surgical strategy in treatment of such patients prevents the development of serious infectious complications.

  13. Heterogeneous Defensive Naval Weapon Assignment To Swarming Threats In Real Time

    Science.gov (United States)

    2016-03-01

    four incoming targets to be countered with two multi-domain capable RAM launchers, the average model solve time using Microsoft Excel VBA for pre...Microsoft Visual Basic for Applications ( VBA ) code is used to pre-process all input data and calculations required for the model , formulate the MIP and...providing the operator with recommended weapon-target pairings based on current defensive capabilities and threat profiles. The model consists of a pre

  14. Choose your weapon: defensive behavior is associated with morphology and performance in scorpions.

    Science.gov (United States)

    van der Meijden, Arie; Lobo Coelho, Pedro; Sousa, Pedro; Herrel, Anthony

    2013-01-01

    Morphology can be adaptive through its effect on performance of an organism. The effect of performance may, however, be modulated by behavior; an organism may choose a behavioral option that does not fully utilize its maximum performance. Behavior may therefore be decoupled from morphology and performance. To gain insight into the relationships between these levels of organization, we combined morphological data on defensive structures with measures of defensive performance, and their utilization in defensive behavior. Scorpion species show significant variation in the morphology and performance of their main defensive structures; their chelae (pincers) and the metasoma ("tail") carrying the stinger. Our data show that size-corrected pinch force varies to almost two orders of magnitude among species, and is correlated with chela morphology. Chela and metasoma morphology are also correlated to the LD50 of the venom, corroborating the anecdotal rule that dangerously venomous scorpions can be recognized by their chelae and metasoma. Analyses of phylogenetic independent contrasts show that correlations between several aspects of chela and metasoma morphology, performance and behavior are present. These correlations suggest co-evolution of behavior with morphology and performance. Path analysis found a performance variable (pinch force) to partially mediate the relationship between morphology (chela aspect ratio) and behavior (defensive stinger usage). We also found a correlation between two aspects of morphology: pincer finger length correlates with the relative "thickness" (aspect ratio) of the metasoma. This suggests scorpions show a trade-off between their two main weapon complexes: the metasoma carrying the stinger, and the pedipalps carrying the chelae.

  15. 75 FR 13262 - Reporting on Offsets Agreements in Sales of Weapon Systems or Defense-Related Items to Foreign...

    Science.gov (United States)

    2010-03-19

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF COMMERCE Bureau of Industry and Security Reporting on Offsets Agreements in Sales of Weapon Systems or Defense-Related Items to Foreign Countries or Foreign Firms for Calendar Year 2009 AGENCY: Bureau of Industry and...

  16. 22 CFR 124.15 - Special Export Controls for Defense Articles and Defense Services Controlled under Category XV...

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Special Export Controls for Defense Articles...-SHORE PROCUREMENT AND OTHER DEFENSE SERVICES § 124.15 Special Export Controls for Defense Articles and Defense Services Controlled under Category XV: Space Systems and Space Launches. (a) The export of...

  17. Specialized Knowledge and the Local Defense Reporter

    Science.gov (United States)

    1989-12-01

    variety of audiences. News commentaries, educational specials, music television and sitcoms are but 1 Marshall McLuhan , Understanding Media: The...Texas. April 1989. Kidder, Louise H. and Charles M. Judd. Research Methods in Social Relations. New York: Holt, Rinehart and Winston, 1986. McLuhan ... Marshall . Understanding Media: The Extension of Man. New York: McGraw Hill, 1964. Paris Match. Publications Filipachi. Random House Dictionary of the

  18. Evolutionary changes in defensive specialized metabolism in the genus Hordeum.

    Science.gov (United States)

    Ube, Naoki; Nishizaka, Miho; Ichiyanagi, Tsuyoshi; Ueno, Kotomi; Taketa, Shin; Ishihara, Atsushi

    2017-09-01

    Plants have developed defensive specialized metabolites over the course of evolution. In the genus Hordeum, which includes the important cereal crop barley, specialized metabolites such as hordatines, benzoxazinones, and gramine have been identified. Hordeum species are classified into four clades, H, Xu, Xa, and I. The presence or absence of defensive specialized metabolites was analyzed in representative Hordeum species that included all of the four clades. In the H clade, Hordeum vulgare accumulated hordatines but not benzoxazinones, whereas H. bulbosum accumulated neither compound. Some accessions in the H clade accumulated gramine. Species in the clades I and Xa accumulated benzoxazinones without hordatines. In H. murinum, a Xu clade species, neither hordatines nor benzoxazinones were detected. Two hitherto undescribed compounds were found to commonly accumulate in H. bulbosum in the H clade and H. murinum in the Xu clade. On the basis of spectroscopic analyses, they were identified as dehydrodimers of feruloylagmatine and were designated murinamides A and B. Radical coupling reactions with feruloylagmatine as a substrate by peroxidase afforded murinamides A and B. These compounds showed antifungal activities against Bipolaris sorokiniana and Fusarium asiaticum, indicating their defensive roles. Because hordatines are also dehydrodimers of hydroxycinnamic acid amides (HCAAs) of agmatine, both the H and Xu clade species are considered to accumulate the same class of compounds. Thus, when the H/Xu clades split from the I/Xa clades during evolution, the defensive metabolites shifted from benzoxazinones to dehydrodimers of agmatine HCAAs plus gramine in the H/Xu clades. Copyright © 2017 Elsevier Ltd. All rights reserved.

  19. Weapon System Acquisitions: Opportunities Exist to Improve the Department of Defense’s Portfolio Management

    Science.gov (United States)

    2015-08-01

    use to plan and manage their investments. From a DOD perspective , portfolio reviews can help increase return on taxpayers’ investments in weapon...the organizations involved. However, when they want to analyze their portfolios from another perspective —for example, examining funding Page 13 GAO...who are to develop capability portfolio strategic plans, provide cross-component perspectives , recommend capability priorities to senior decision

  20. 32 CFR 234.10 - Weapons.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Weapons. 234.10 Section 234.10 National Defense... PENTAGON RESERVATION § 234.10 Weapons. (a) Except as otherwise authorized under this section, the following are prohibited: (1) Possessing a weapon. (2) Carrying a weapon. (3) Using a weapon. (b) This section...

  1. The Effects of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    Glasstone, Samuel

    1957-06-01

    This handbook prepared by the Armed Forces Special Weapons Project of the Department of Defense in coordination with other cognizant government agencies and published by the United States Atomic Energy Commission, is a comprehensive summary of current knowledge on the effects of nuclear weapons. The effects information contained herein is calculated for yields up to 20 megatons and the scaling laws for hypothetically extending the calculations beyond this limit are given. The figure of 20 megatons however is not be taken as an indication of capabilities or developments.

  2. Nationwide Defense against Nuclear Weapons: Properties of Prim-Read Deployments

    Science.gov (United States)

    1981-04-01

    targets has a lengthy and detailed history; work on it before 1971 is surveyed by Matlin in [11), and much general information is contained in the Air...Lambda Corporation. [10] Gorfinkel, M. (1963). "A Decision Theory Approach to Missile Defense. Operations Research 11, 199-209. [11] Matlin , S. (1970

  3. Impact of the Defense Critical Technologies Plan on Weapon Systems Test and Evaluation

    Science.gov (United States)

    1990-12-01

    middle of the 1980’s several factors led to the realization that DoD’s T&E capabilities were approaching a crisis situation. These factors included...techologies most critica to saing the long-term quai.- tative superiority of United States wampon syvtme. The number of such technologie identified in any...United States, The Defense Technology Base, Introduction and Overview, U.S. Government Printing Office, March 1988. Pastine, John, D. Dr., "A Crisis

  4. Weaponized sex: defensive pseudo-erotic aggression in the service of safety.

    Science.gov (United States)

    Kluft, Richard P

    2017-01-01

    Problematic sexual behaviors are frequently encountered in the treatment of patients suffering Dissociative Identity Disorder and related forms of dissociative disorders. These may include unfortunate patterns of ready acquiescence or submission to overtly or potentially aggressive or sexual approaches/encounters, subtle and/or overt seductive signaling and behaviors, and even overt sexually provocative patterns of verbalizations and actions. This paper discusses the possibility that in some instances, sexual behavior has become weaponized; that is, deployed in circumstances under which assertiveness and/or aggression or other self-protective measures might be expected, probably because such behaviors were not within the range of the possible or were not understood as potentially successful for some victims of trauma. Clinical manifestations are described and discussed. An animal model in which sexual behaviors substitute for aggressive behaviors is described. A speculative hypothesis is offered, postulating that in some cases, such patterns in traumatized humans might represent an epigenetic response to exogenous trauma. Exploration of this model may lead to improved understandings and approaches to trauma victims who manifest such behavior, hopefully destigmatizing them further, facilitating reduction of their shame and guilt, and supporting their recoveries. Clinical interventions are suggested.

  5. Self-Reported Physical Tasks and Exercise Training in Special Weapons and Tactics (SWAT) Teams.

    Science.gov (United States)

    Davis, Matthew R; Easter, Richard L; Carlock, Jonathan M; Weiss, Lawrence W; Longo, Elizabeth A; Smith, Lisa M; Dawes, J Jay; Schilling, Brian K

    2016-11-01

    Davis, MR, Easter, RL, Carlock, JM, Weiss, LW, Longo, EA, Smith, LM, Dawes, JJ, and Schilling, BK. Self-reported physical tasks and exercise training in Special Weapons and Tactics (SWAT) teams. J Strength Cond Res 30(11): 3242-3248, 2016-Little research has been done examining the most physically demanding tasks a SWAT officer may perform in the line of duty. Our objective was to analyze the rankings of tasks by SWAT officers based on frequency, difficulty, and importance and assess if training is addressing traits needed for successful task completion. A survey was designed using Qualtrics (Qualtrics Labs Inc). The survey had a demographics section, performance section, and training section. Officers were contacted by phone or e-mail and asked about interest in participating. Officers who agreed were sent the survey. Our results found a strong correlation between frequency of task and importance (r = 0.69, p = 0.001), and a moderate correlation was found between task difficulty and importance (r = 0.37, p = 0.005). Task rankings were averaged across the 3 domains to assess "overall" importance, and the top 3 tasks were assessed for necessary traits for successful performance. Power and strength were determined to be the most important traits for successful performance. Officers ranked the top 2 focuses of their training program in the training section as stamina/muscular endurance and cardiovascular/respiratory endurance. Training programs for SWAT officers should be developed to improve performance of the tasks with the highest "overall" importance. Therefore, a training program should emphasize strength and power improvements while not neglecting other measures of fitness.

  6. Nonlinear Effects in Transformation Optics-Based Metamaterial Shields for Counter Directed Energy Weapon Defense

    Science.gov (United States)

    2016-06-01

    usually 3 (for classical mechanics) or 4 (for special relativistic applications). Furthermore, in order to avoid confusion between contravariant tensor ...components and exponents, should the need arise to express a tensor component raised to a power, the exponent will appear outside of a set of...Metric Tensor The covariant metric tensor gi j is the collection of inner products of basis vectors in a given coordinate system. That is, gi j ≡ ei · e

  7. A Model for Operational Efficiency Evaluation of Air-defense Weapon System%地面防空武器系统的效能评估模型

    Institute of Scientific and Technical Information of China (English)

    姜广顺

    2012-01-01

    作战系统服务能力是衡量其作战效能的重要指标,结合现代作战系统的特点,运用排队论原理,建立了一种地面防空武器系统效能评估模型,确定了武器系统作为随机服务系统的主要性能指标,包括目标突防概率、目标杀伤概率、占用射击通道的平均数、射击通道占用概率和武器系统效率等.示例计算分析显示,该模型与外部条件和地面防空武器系统的综合特性密切相关,对辅助指挥员决策有一定的参考价值.%The combat system' s service capability is one of the important factors of its operational efficiency. Based on the characteristics of modern combat system, a model for operational efficiency evaluation of air-defense weapon system was established by applying basic principle of queuing theory. The main features of air-defense weapon system as a random service system were defined, such as target penetration probability, target kill probability, the average number of occupying the firing channel, shooting channel occupancy probability and weapon system efficiency and so on. The analysis and calculation to an example showed that this model was closely related to the external conditions and all-round property of air-defense weapon system, and could be taken as a reference for aiding decision-making for commanders.

  8. The Trend of Missile-Gun Combined Weapon System for Aerial Defense%弹炮结合防空武器系统新趋势

    Institute of Scientific and Technical Information of China (English)

    陈薇; 王军

    2016-01-01

    Since the Kosovo War started to use a form of simple air raids and counter-air raids,a increasing number of wars use air raids to attack the enemy,so how to defense the enemy in the air become more and more important. Missile-Gun combined weapon system not only has a big air defense area but also has a high effective-cost,so it will become the trend of air defense weapon system. This paper describes the structure and classification of Missile-Gun combined weapon system,and analyzes the advantages and disadvantages of the current systems; finally the trend of Missile-Gun combined weapon system is proposed.%自从科索沃战争开创了单纯空袭作战与反空袭作战的先例之后,空袭就成为了战争的焦点,如何更好地抵御空中目标的来袭成为各国战争防御的主题。弹炮结合防空武器系统具有防空区域大、效费比高等优点,是防空武器系统的发展趋势之一。在分析现有典型弹炮结合防空武器系统的基础上,依据弹炮结合武器系统是否共用火控系统将其分为弹炮混编式和弹炮同控式两种形式;随后,结合现代空袭的特点提出了弹炮结合武器系统的发展趋势。

  9. Effects of generalized and specialized adaptive defense by shared prey on intra-guild predation.

    Science.gov (United States)

    Ikegawa, Yusuke; Ezoe, Hideo; Namba, Toshiyuki

    2015-01-07

    Intra-guild predation (IGP), predation on consumers which share common prey with the predators, is an important community module to understand a mechanism for persistence of complex food webs. However, classical theory suggests that persistence of an IGP system is unlikely particularly at high productivity, while empirical data do not support the prediction. Recently, adaptive defense by shared prey has been recognized to enhance coexistence of species and stability of the system. Some organisms having multiple predators in IGP systems employ two types of defenses; generalized defense that is effective against multiple predators and specialized one that is effective against only a specific predator species. We consider an IGP model including shared prey that can use the two types of defenses in combination against the consumer or omnivore. Assuming that the shared prey can change the allocation of defensive effort to increase its fitness, we show that the joint use of two types of adaptive defenses promotes three species coexistence and enhances stability of the IGP system when the specialized defense is more effective than the generalized one. When the system is unstable, a variety of oscillations appear and both the population densities and defensive efforts or only the population densities oscillate. Joint use of defenses against the consumer tends to increase the equilibrium population density of the shared prey with the defense efficiencies. In contrast, efficient generalized and specialized defenses against the omnivore often decrease the prey population. Consequently, adaptive defense by shared prey may not necessarily heighten the population size of the defender but sometimes increases densities of both the attackers and defender in IGP systems. Copyright © 2014 Elsevier Ltd. All rights reserved.

  10. Genome Defense Mechanisms in Neurospora and Associated Specialized Proteins

    Directory of Open Access Journals (Sweden)

    Ranjan Tamuli

    2010-06-01

    Full Text Available Neurospora crassa, the filamentous fungus possesses widest array of genome defense mechanisms known to any eukaryotic organism, including a process called repeat-induced point mutation (RIP. RIP is a genome defense mechanism that hypermutates repetitive DNA sequences; analogous to genomic imprinting in mammals. As an impact of RIP, Neurospora possesses many fewer genes in multigene families than expected. A DNA methyltransferase homologue, RID was shown to be essential for RIP. Recently, a variant catalytic subunit of translesion DNA polymerase zeta (Pol zeta has been found to be essential for dominant RIP suppressor phenotype. Meiotic silencing and quelling are two other genome defense mechanisms in Neurospora, and proteins required for these two processes have been identified through genetic screens.

  11. 基于Multi-Agent的防空导弹武器系统模型设计%Design of Multi-Agent Based Model on Air Defense Missile Weapon System

    Institute of Scientific and Technical Information of China (English)

    陈宝印; 栾立秋; 张成斌

    2011-01-01

    建立科学的结构模型是进行防空导弹武器系统仿真的基础和关键环节.针对防空导弹武器系统的特点,提出了基于Multi-Agent的防空导弹武器系统模型建模方法,设计了防空导弹武器系统模型结构.利用Multi-Agent建模技术,把防空导弹武器系统实体映射成相应的Multi-Agent系统,并以Agent的形式对防空导弹武器系统这一客观复杂系统进行了深刻的认识,为防空导弹武器系统建模仿真奠定了基础.%Forming a scientific system model is the key of Air Defense Missile Weapon System simulation. According to the characters of Air Defense Missile Weapon System, a modeling method of multi-agent based model on Air Defense Missile Weapon System is given. The framework on Air Defense Missile Weapon System is designed. Using the Multi-Agent modeling technology, maps the Air Defense Missile Weapon System entity the corresponding Multi-Agent system, and carries on the profound understanding by the Agent form to Air Defense Missile Weapon System this objective complicated, which will be helpful to realize the modeling simulation on Air Defense Missile Weapon System.

  12. Weapons Neutron Research Facility (WNR)

    Data.gov (United States)

    Federal Laboratory Consortium — The Weapons Neutron Research Facility (WNR) provides neutron and proton beams for basic, applied, and defense-related research. Neutron beams with energies ranging...

  13. 舰载弹炮结合近程武器系统技术研究%Study on Shipped Missile-Gun Integrated Defense Weapon System

    Institute of Scientific and Technical Information of China (English)

    白奕

    2014-01-01

    现代高性能反舰导弹是舰艇末端防御的最大威胁,而舰载弹炮结合近程武器系统为舰艇的末端防御提供了一种有效的途径。分析了舰载弹炮结合近程武器系统的作战使用和主要特点,针对海上空袭武器的特点,重点研究了增强系统抗饱和攻击能力的设计方法,并探讨了舰载弹炮结合近程武器系统在现代海战中的使用方向。%Modern high-powered antiship missile is the main threaten of ship,and shipped missile-gun integrated defense weapon system is an effective way to the terminal defense of ship. This paper first analyzes the combat operation and main characteristic of missile-gun integrated defense weapon system,then studies the key factor of designing a system. At last the system usage is discussed in the modern sea war.

  14. 75 FR 72766 - Defense Support to Special Events

    Science.gov (United States)

    2010-11-26

    ... action taken or planned by another Agency; (3) Materially alter the budgetary impact of entitlements... would not, if promulgated, have a significant economic impact on a substantial number of small entities... volunteering to support special events during their non-duty time. This volunteer support is not considered...

  15. Sexual violence against women is a weapon of war. Special feature -- mothers as refugees.

    Science.gov (United States)

    1997-01-01

    Rape is recognized as a crime of war. During armed conflict in Bosnia, it was deliberate policy to rape young women to force them to bear the enemy's child. During conflicts in Rwanda, rape was systematically used as a weapon of ethnic cleansing aimed at destroying communities. The national population office in Rwanda estimates that 2000-5000 infants were born as a result of such rape. The general decline in women's health, and in their reproductive health in particular, were two consequences of the wars in Bosnia and Rwanda. Women and girls suffered most from the violence. Systematic rape also has a terrible effect upon women's physical and mental health, including pregnancy-related complications, sexually transmitted diseases (STDs), and death as a result of induced abortion. Fear of social stigma associated with being raped discourages women who have been raped from seeking help or treatment. Moreover, most women who have been raped have difficulty re-establishing intimate relations, while others desire to bear many more children in order to compensate for children lost during the war. Finally, even women who are not raped during times of conflict may find it necessary to have sex with men in order to secure food, shelter, safe conduct, and/or refugee status for themselves and their children. Health services available to people with injuries or STDs need to be better equipped to provide medical care and counseling.

  16. A Distributed Sensor Network Architecture for Defense Against the Ship as a Weapon in the Maritime Domain

    Science.gov (United States)

    2011-06-01

    To my two fantastic children, Aaron and Ava, “Let’s go Disneyland ! Daddy’s ‘homework’ is finally complete!” xviii THIS PAGE INTENTIONALLY...enforces the law, maintains order in Singaporean territorial waters, and acts to prevent and detect crime . Of interest is the coastal-patrol squadron...perform military missions Outcome of battle; cost of system; survivability; attrition rate ; exchange ratio; weapons on targets Measures of

  17. Issues With Access to Acquisition Data and Information in the Department of Defense: Doing Data Right in Weapon System Acquisition

    Science.gov (United States)

    2016-04-30

    Szafran Abstract Acquisition data lay the foundational role for decision-making, management , and oversight of the weapon-systems acquisition...2015). This data- management strategy fails to address the complete managerial prerogatives of the USD(AT&L) and the Better Buying Power initiatives...with information managers and our literature review on Master Data Management found that data governance plays a key role in the success of acquisition

  18. Damage Effect Evaluating Model of Naval Formation Air-defense Weapon%编队防空武器毁伤效果评估模型

    Institute of Scientific and Technical Information of China (English)

    粘松雷; 林云; 陈榕

    2012-01-01

    It needs a large number of unsure target signature information to effectively evaluate and test the injured targets. It is of critical technological difficulty to evaluate the injured target with uncertain information. The synthetic judgement of the information of the injured targets is the integration of decision-making process. By way of real-time monitoring the injuring effect of antiaircraft ordnance, if the target has been injured a new target should be selected. Another attack should be organized to resist the same target by redistributiing the sensor resources and weapon resources if the target has not been injured. Analysis of the influencing factor of air-defense weapon' s damage effect assessment, the model of Naval ship formation air-defense weapon' s damage effect assessment is set up based on the D-S evidence theory.%有效评测目标被毁伤情况,需要借助大量不确定性的目标特征信息.如何融合处理这些不确定信息,是对敌目标被毁伤情况进行评估的关键技术难点.对空袭目标的所有毁伤属性信息的一个综合评判,实际是一个决策层的融合过程.通过实时监控防空武器的毁伤效果,如果目标被击毁,就停止对目标进行抗击,重新选择抗击目标;当目标未被击毁时,就应协同相关系统对传感器资源、武器资源进行再分配,组织实施对同一目标的再次抗击.在对防空武器毁伤效果评估影响因素分析的基础上,建立了基于D-S证据理论的编队防空武器毁伤效果评估模型.

  19. 海岸防御战斗海防师炮兵优化兵器区分的实现%Realization of Coastal Defense Division Artillery Weapon Distribution Optimization in Coastal Defense Operation

    Institute of Scientific and Technical Information of China (English)

    单晓泉; 栗强; 肖业云

    2011-01-01

    为提高海防炮兵的作战能力,通过对炮兵打击目标的种类和数量进行分析,运用排队理论构建了数学模型,对给定条件的纵深机降步兵、气垫登陆艇和水面舰艇3种目标类型进行了毁伤计算,根据弹药消耗量计算出兵器需求,实现了炮兵兵器区分的优化.%To enhance operations capability of coastal defense artillery, by analyzing the signature and quantity of artillery fire target, this thesis builds a mathematical model using queucing theory, calculates the damage capability to three kinds of target as air-landed infantry in depth, air-cushion landing crafts and waterborne ships, calculates the requirement of weapons by ammunition expenditure, realizes the optimization of weapon distribution.

  20. The morality of weapons research.

    Science.gov (United States)

    Forge, John

    2004-07-01

    I ask whether weapons research is ever justified. Weapons research is identified as the business of the engineer. It is argued that the engineer has responsibility for the uses to which the tools that he designs can be put, and that responsibility extends to the use of weapons. It is maintained that there are no inherently defensive weapons, and hence there is no such thing as 'defensive' weapons research. The issue then is what responsibilities as a professional the engineer has in regard to such research. An account is given to ground the injunction not to provide the means to harm as a duty for the engineers. This account is not, however, absolutist, and as such it allows justifiable exceptions. The answer to my question is thus not that weapons research is never justified but there must be a strong assurance that the results will only be used as a just means in a just cause.

  1. A Scenario Tree based Stochastic Programming Approach for Multi-Stage Weapon Equipment Mix Production Planning in Defense Manufacturing

    Directory of Open Access Journals (Sweden)

    Li Xuan

    2016-01-01

    Full Text Available The evolving military capability requirements (CRs must be meted continuously by the multi-stage weapon equipment mix production planning (MWEMPP. Meanwhile, the CRs possess complex uncertainties with the variant military tasks in the whole planning horizon. The mean-value deterministic programming technique is difficult to deal with the multi-period and multi-level uncertain decision-making problem in MWEMPP. Therefore, a multi-stage stochastic programming approach is proposed to solve this problem. This approach first uses the scenario tree to quantitatively describe the bi-level uncertainty of the time and quantity of the CRs, and then build the whole off-line planning alternatives assembles for each possible scenario, at last the optimal planning alternative is selected on-line to flexibly encounter the real scenario in each period. A case is studied to validate the proposed approach. The results confirm that the proposed approach can better hedge against each scenario of the CRs than the traditional mean-value deterministic technique.

  2. 32 CFR 1903.10 - Weapons.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Weapons. 1903.10 Section 1903.10 National... INSTALLATIONS § 1903.10 Weapons. (a) Except as provided in paragraph (c) of this section, knowingly possessing or causing to be present a weapon on an Agency installation, or attempting to do so is prohibited. (b...

  3. Study on Interference Effect of Warship Close-in Defense Dazzling Weapon%舰载近区防卫眩目武器干扰效果研究

    Institute of Scientific and Technical Information of China (English)

    佘博; 李进军; 汪德虎

    2015-01-01

    眩目武器是水面舰艇防卫近区非对称威胁目标的新型武器,其作战效果分析和作战运用研究是新的课题。分析眩目武器的作用机理,建立了眩目武器干扰效果分析模型,并在仿真计算结果分析的基础上提出了眩目武器运用的一般原则和方法,可以为相关的指挥决策提供一定的借鉴和指导。%Dazzling weapon is a new weapon for Surface ships to defense the targets of asymmetric threats,operational effectiveness analysis and operational application of Dazzling weapon are also the new subject.Due to this purpose,analyzing mechanism of dazzling weapon,and the models of interference effect are also established.Based on the simulation results,putting forward the general principles and methods of using the dazzling weapon,which can provide some reference and guidance for the associated command and decision-making.

  4. A General Firepower Optimization Algorithm for Shipboard Air Defense Hard Weapon%一种通用型舰载防空硬武器火力优化算法∗

    Institute of Scientific and Technical Information of China (English)

    林桦; 王公宝

    2016-01-01

    针对当前武器优化分配算法缺少通用性,难以兼顾效率和时间的问题,提出了一种通用型舰载防空硬武器火力优化算法。该算法首先提取各舰载武器能够攻击的目标集合,然后对各武器的目标集合逐一进行时间分配,并计算对目标的毁伤概率,最终完成所有武器的分配。计算表明,该算法具有很好的通用性和实时性,可适用于较大规模舰载防空硬武器的火力优化分配问题。%Currently, weapon optimization algorithm is lack of generality, and it is difficult to balance the efficiency and time. To solve this problem, a general firepower optimization algorithm for shipboard air defense hard weapons is presented. The algorithm first extracts the target set of each shipboard weapon to attack, and then carries on the time allocation to each weapon�s target set one by one, and calculates the damage probability to the target, finally completes the distribution of all weapons. The calculation shows that the proposed algorithm is very general and real⁃time, which can be adapted to the fire⁃power optimization allocation problem of large scale shipboard air defense hard weapons.

  5. 48 CFR 217.173 - Multiyear contracts for weapon systems.

    Science.gov (United States)

    2010-10-01

    ... weapon systems. 217.173 Section 217.173 Federal Acquisition Regulations System DEFENSE ACQUISITION... Mulityear Contracting 217.173 Multiyear contracts for weapon systems. As authorized by 10 U.S.C. 2306b(h... contract for— (a) A weapon system and associated items, services, and logistics support for a weapon system...

  6. 防空导弹武控设备实现CBM方法的探讨%Research on the Condition Based Maintenance for Weapon Control Equipment of Air-defense Missile

    Institute of Scientific and Technical Information of China (English)

    曲宏宇; 向哲

    2012-01-01

    针对解决防空导弹武控设备目前维修方式中的诸多问题,基于状态的维修(CBM)方式是有效解决途径之一。分析了对防空导弹武控设备进行CBM时的状态监测、失效模型建立、故障预测和维修决策等关键技术问题,探讨了防空导弹武控设备实现CBM的技术对策。结果表明,CBM具有诸多优点,它的实践应用必将引发武控设备维修技术的根本变革,促进高新技术在防空导弹武控设备维修领域的应用。%The condition based maintenance(CBM) is one of effective maintenance methods for weapon control equipment of air-defense missile.The key techniques is analyzed about inspecting the condition,establishing invalidation modal,forecasting malfunction,maintenance decision-making of CBM that is used for weapon control equipment of air-defense missile,the technique countermeasure of carrying CBM is introduced.The results show CBM is effective,which will result in radical change in maintenance technique of weapon control equipment,and promote using of new techniques in maintenance for weapon control equipment of air-defense missile.

  7. Should bioengineering graduates seek employment in the defense industry?

    Science.gov (United States)

    Johnson, Arthur T

    2014-01-01

    They say that the difference between a mechanical engineer and a civil engineer is that the mechanical engineer develops weapons whereas a civil engineer designs targets. The implication is that some engineers are involved with building peaceful infrastructure whereas others contribute to destruction. This brings to mind the question: what is the proper role for engineers in the creation of weapons and defenses against them? In particular, should engineers specializing in biology or medicine be involved in the defense industry? After all, bioengineers are supposed to be builders or healers rather than warriors or destroyers.

  8. Virtual nuclear weapons

    Energy Technology Data Exchange (ETDEWEB)

    Pilat, J.F.

    1997-08-01

    The term virtual nuclear weapons proliferation and arsenals, as opposed to actual weapons and arsenals, has entered in recent years the American lexicon of nuclear strategy, arms control, and nonproliferation. While the term seems to have an intuitive appeal, largely due to its cyberspace imagery, its current use is still vague and loose. The author believes, however, that if the term is clearly delineated, it might offer a promising approach to conceptualizing certain current problems of proliferation. The first use is in a reference to an old problem that has resurfaced recently: the problem of growing availability of weapon-usable nuclear materials in civilian nuclear programs along with materials made `excess` to defense needs by current arms reduction and dismantlement. It is argued that the availability of these vast materials, either by declared nuclear-weapon states or by technologically advanced nonweapon states, makes it possible for those states to rapidly assemble and deploy nuclear weapons. The second use has quite a different set of connotations. It is derived conceptually from the imagery of computer-generated reality. In this use, one thinks of virtual proliferation and arsenals not in terms of the physical hardware required to make the bomb but rather in terms of the knowledge/experience required to design, assemble, and deploy the arsenal. Virtual weapons are a physics reality and cannot be ignored in a world where knowledge, experience, materials, and other requirements to make nuclear weapons are widespread, and where dramatic army reductions and, in some cases, disarmament are realities. These concepts are useful in defining a continuum of virtual capabilities, ranging from those at the low end that derive from general technology diffusion and the existence of nuclear energy programs to those at the high end that involve conscious decisions to develop or maintain militarily significant nuclear-weapon capabilities.

  9. 32 CFR 552.122 - Personnel not authorized to possess or retain personal weapons.

    Science.gov (United States)

    2010-07-01

    ... personal weapons. 552.122 Section 552.122 National Defense Department of Defense (Continued) DEPARTMENT OF... authorized to possess or retain personal weapons. (a) Possession, retention or storage of personal weapons or... enforcement officer authorized to carry the weapon under state or federal law, while on Fort Lewis or a sub...

  10. Counterproliferation of Nuclear Weapons

    Science.gov (United States)

    2010-04-01

    an occurrence. In his book, Atomic Tragedy, Sean Malloy writes that Henry Stimson, the United States Secretary of War, warned in April, 1945 that...Ibid., 380. 41 Ibid. 42 Sean L. Malloy , Atomic Tragedy: Henry L. Stimson and the Decision to use the Bomb Against Japan (Ithaca, New York...Weapons of Mass Destruction in the Middle East, 96-97. 45 Robert M. Gates, National Defense Strategy (Washington, DC: US Government Printing Office

  11. Interim Report of the Defense Science Board (DSB) Task Force on the Survivability of Systems and Assets to Electromagnetic Pulse (EMP) and other Nuclear Weapon Effects (NWE)

    Science.gov (United States)

    2011-08-01

    major platforms for High Altitude EMP ( HEMP ) protection, and the Navy implemented a requirements review process. United States Strategic Command...Army improving process for independent review of survivability – Air Force committing resources for testing major platforms for HEMP protection...battlespaces where nuclear weapons are threatening or are being employed. The most likely case(s) are use of nuclear weapons by others. Although

  12. [Biological weapons].

    Science.gov (United States)

    Kerwat, K; Becker, S; Wulf, H; Densow, D

    2010-08-01

    Biological weapons are weapons of mass destruction that use pathogens (bacteria, viruses) or the toxins produced by them to target living organisms or to contaminate non-living substances. In the past, biological warfare has been repeatedly used. Anthrax, plague and smallpox are regarded as the most dangerous biological weapons by various institutions. Nowadays it seems quite unlikely that biological warfare will be employed in any military campaigns. However, the possibility remains that biological weapons may be used in acts of bioterrorism. In addition all diseases caused by biological weapons may also occur naturally or as a result of a laboratory accident. Risk assessment with regard to biological danger often proves to be difficult. In this context, an early identification of a potentially dangerous situation through experts is essential to limit the degree of damage. Georg Thieme Verlag KG Stuttgart * New York.

  13. 防空导弹武器系统通用火控软件设计与实现%General Design and Accomplishment of Firepower Control Software in Air Defense Missile Weapon System

    Institute of Scientific and Technical Information of China (English)

    陈华

    2011-01-01

    针对不同防空导弹武器系统的火控软件之间不能互用的现状,分析了火控系统各主要功能模块之间的接口关系,提出了火控软件通用化设计的思路,并用C++实现了该设计.火控软件的通用化设计值碍将来防空导弹能武器系统火控软件的标准化设计和编程借鉴.%s :Contrasting the status of no interoperability in firepower control softwares among different aerial defense missile weapon system, the interface relation of functional module in firepower control system is analyzed.And the idea of general design of firepower control software is put forward.Furthermore, the idea is realized by using C++ programming.The general design of firepower control software is worth used for reference in the standard design and programming of future aerial defense missile weapon system.

  14. 32 CFR 552.125 - Disposition of confiscated weapons.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Disposition of confiscated weapons. 552.125..., Ammunition, and Explosives-Fort Lewis, Washington § 552.125 Disposition of confiscated weapons. Commanders will maintain confiscated weapons in the unit arms room pending final disposition. They will provide...

  15. 32 CFR 228.7 - Prohibition on weapons and explosives.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Prohibition on weapons and explosives. 228.7... (CONTINUED) MISCELLANEOUS SECURITY PROTECTIVE FORCE § 228.7 Prohibition on weapons and explosives. No persons... illegal or legally controlled weapon (e.g., throwing stars, switchblades), explosives, or items intended...

  16. The Effects of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    Glasstone, Samuel

    1964-02-01

    This book is a revision of "The Effects of Nuclear Weapons" which was issued in 1957. It was prepared by the Defense Atomic Support Agency of the Department of Defense in coordination with other cognizant governmental agencies and was published by the U.S. Atomc Energy Commission. Although the complex nature of nuclear weapons effects does not always allow exact evaluation, the conclusions reached herein represent the combined judgment of a number of the most competent scientists working the problem. There is a need for widespread public understanding of the best information available on the effects of nuclear weapons. The purpose of this book is to present as accurately as possible, within the limits of national security, a comprehensive summary of this information.

  17. [Modern pneumatic weapons and injuries they cause].

    Science.gov (United States)

    Kozachenko, I N

    2013-01-01

    The data on the history of development and further improvement of pneumatic weapons are presented with special reference to specific features of different types and varieties of these weapons, cartridges for them, and the sphere of their application. Investigations into peculiarities of damages caused by high-capacity pneumatic weapons to the objects of forensic medical expertise affected from different distances are reviewed. Results of forensic medical expertise and clinical studies on the structure of body injuries inflicted by gunshots from pneumatic weapons to the human body are discussed. The author emphasizes the necessity of developing up-to-date terminology and classification of gunshot injuries caused by shooting from pneumatic weapons.

  18. 32 CFR 552.130 - Disposition of confiscated/seized weapons.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Disposition of confiscated/seized weapons. 552..., Ammunition and Other Dangerous Weapons on Fort Gordon § 552.130 Disposition of confiscated/seized weapons. All weapons, ammunition, explosives, or other devices defined in this subpart, that are confiscated...

  19. 32 CFR 552.124 - Transportation of privately owned weapons and ammunition.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Transportation of privately owned weapons and... owned weapons and ammunition. (a) Privately owned firearms and ammunition will be transported in the following manner: (1) Weapons, other than weapons being transported into Fort Lewis for the first time, may...

  20. 32 CFR 552.104 - Disposition of confiscated/seized weapons.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Disposition of confiscated/seized weapons. 552... RESERVATIONS AND NATIONAL CEMETERIES REGULATIONS AFFECTING MILITARY RESERVATIONS Firearms and Weapons § 552.104 Disposition of confiscated/seized weapons. All weapons, ammunition, explosives or other devices defined in...

  1. 48 CFR 225.7005 - Restriction on certain chemical weapons antidote.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Restriction on certain chemical weapons antidote. 225.7005 Section 225.7005 Federal Acquisition Regulations System DEFENSE... on certain chemical weapons antidote. ...

  2. LDRD Final Report for''Tactical Laser Weapons for Defense'' SI (Tracking Code 01-SI-011)

    Energy Technology Data Exchange (ETDEWEB)

    Beach, R; Zapata, L

    2002-01-30

    The focus of this project was a convincing demonstration of two new technological approaches to high beam quality; high average power solid-state laser systems that would be of interest for tactical laser weapon applications. Two pathways had been identified to such systems that built on existing thin disk and fiber laser technologies. This SI was used as seed funding to further develop and vet these ideas. Significantly, the LLNL specific enhancements to these proposed technology paths were specifically addressed for devising systems scaleable to the 100 kW average power level. In the course of performing this work we have established an intellectual property base that protects and distinguishes us from other competitive approaches to the same end.

  3. The Importance of Designating Cyberspace Weapon Systems

    Science.gov (United States)

    2013-10-01

    PerspectiveSpace Focus Cyberspace Vulnerability Assessment / Hunter Weapon System The Air Force Cyberspace Vulnerability Assessment ( CVA ) / Hunter  weapon...system can perform defensive sorties worldwide via remote or on-site access. The  CVA /Hunter weapon sys- tem is operated by one active duty unit, the...support all of the mission crews. Developed by the for- mer Air Force Information Operations Center, the  CVA /Hunter  weapon system was fielded to the 688th

  4. 75 FR 27854 - 30-Day Notice of Proposed Information Collection: DS-4048, Projected Sales of Major Weapons in...

    Science.gov (United States)

    2010-05-18

    ... Notice of Proposed Information Collection: DS-4048, Projected Sales of Major Weapons in Support of... Major Weapons in Support of Section 25(a)(1) of the Arms Export Control Act. OMB Control Number: 1405... annual report to Congress on projected sales of major weapons and weapons-related defense equipment (if...

  5. Weapon container catalog. Volumes 1 & 2

    Energy Technology Data Exchange (ETDEWEB)

    Brown, L.A.; Higuera, M.C.

    1998-02-01

    The Weapon Container Catalog describes H-gear (shipping and storage containers, bomb hand trucks and the ancillary equipment required for loading) used for weapon programs and for special use containers. When completed, the catalog will contain five volumes. Volume 1 for enduring stockpile programs (B53, B61, B83, W62, W76, W78, W80, W84, W87, and W88) and Volume 2, Special Use Containers, are being released. The catalog is intended as a source of information for weapon program engineers and also provides historical information. The catalog also will be published on the SNL Internal Web and will undergo periodic updates.

  6. Defense Planning and Arms Control. Proceedings of a Special NSAI Conference, 12-14 June 1980, National Defense University, Washington, DC.

    Science.gov (United States)

    1980-09-01

    selected defense issues. * The President, whose schizophrenia on arms control and defense policy Issues has been demonstrated repeatedly, and whose...are politically unavoidable and overdue, may eventually have their desired effect. Meanwhile, they may also stimulate traditional Russian paranoia , of

  7. Networked Special Operations: Addressing Transnational Threats, Homeland Defense, and Breached Seams in the Western Hemisphere

    Science.gov (United States)

    2017-04-20

    34Forces of Habit: Global SOF’s Role in Countering Illicit Drug Trafficking." Journal of Strategic Security Vol 7, No. 2 (Summer 2014): 21-28. http...Focus on Land Warfare,” http://ndupress.ndu.edu/ portals /68/Documents/jfq/jfq-52.pdf (accessed 23 December 2016). 95. 31 operators to address...Dan Spengler, Kyle Larish, and Nam-young Kim, “Special Interest Aliens: Achieving an Integrated Approach,” Small Wars Journal (12 December 2016). http

  8. Toward a nuclear weapons free world?

    Energy Technology Data Exchange (ETDEWEB)

    Maaranen, S.A. [Los Alamos National Lab., NM (United States). Center for International Security Affairs

    1996-09-01

    Doubts about the wisdom of relying on nuclear weapons are as old as nuclear weapons themselves. But despite this questioning, nuclear weapons came to be seen as the indispensable element of American (indeed Western) security during the Cold War. By the 1970s and 1980s, however, discontent was growing about the intense US-Soviet nuclear arms competition, as it failed to provide any enduring improvement in security; rather, it was seen as creating ever greater risks and dangers. Arms control negotiations and limitations, adopted as a means to regulate the technical competition, may also have relieved some of the political pressures and dangers. But the balance of terror, and the fears of it, continued. The Strategic Defense Initiative (SDI) under President Reagan was a very different approach to escaping from the precarious protection of nuclear weapons, in that it sought a way to continue to defend the US and the West, but without the catastrophic risks of mutual deterrence. As such, SDI connoted unhappiness with the precarious nuclear balance and, for many, with nuclear weapons in general. The disappearance of the Warsaw Pact, the disintegration of the Soviet Union, and the sudden end of the Cold War seemed to offer a unique opportunity to fashion a new, more peaceful world order that might allow for fading away of nuclear weapons. Scholars have foreseen two different paths to a nuclear free world. The first is a fundamental improvement in the relationships between states such that nuclear weapons are no longer needed. The second path is through technological development, e.g., missile defenses which could provide effective protection against nuclear attacks. The paper discusses nuclear weapon policy in the US, views of other nuclear states, the future of nuclear weapons, and issues in a less-nuclear world.

  9. Sexually dimorphic aggression indicates male gray wolves specialize in pack defense against conspecific groups.

    Science.gov (United States)

    Cassidy, Kira A; Mech, L David; MacNulty, Daniel R; Stahler, Daniel R; Smith, Douglas W

    2017-03-01

    Aggression directed at conspecific groups is common among gregarious, territorial species, and for some species such as gray wolves (Canis lupus) intraspecific strife is the leading cause of natural mortality. Each individual in a group likely has different measures of the costs and benefits associated with a group task, such as an aggressive attack on another group, which can alter motivation and behavior. We observed 292 inter-pack aggressive interactions in Yellowstone National Park between 1 April 1995 and 1 April 2011 (>5300days of observation) in order to determine the role of both sexes, and the influence of pack, age, and other traits on aggression. We recorded the behaviors and characteristics of all individuals present during the interactions (n=534 individuals) and which individuals participated in each step (i.e. chase, attack, kill, flight) of the interaction. Overall, all wolves were more likely to chase rivals if they outnumbered their opponent, suggesting packs accurately assess their opponent's size during encounters and individuals adjust their behavior based on relative pack size. Males were more likely than females to chase rival packs and gray-colored wolves were more aggressive than black-colored wolves. Male wolves and gray-colored wolves also recorded higher cortisol levels than females and black-colored wolves, indicating hormonal support for more intense aggressive behavior. Further, we found a positive correlation between male age and probability of chasing, while age-specific participation for females remained constant. Chasing behavior was influenced by the sex of lone intruders, with males more likely to chase male intruders. This difference in behavior suggests male and female wolves may have different strategies and motivations during inter-pack aggressive interactions related to gray wolf mating systems. A division of labor between pack members concerning resource and territory defense suggests selection for specific traits related

  10. Sexually dimorphic aggression indicates male gray wolves specialize in pack defense against conspecific groups

    Science.gov (United States)

    Cassidy, Kira A.; Mech, L. David; MacNulty, Daniel R; Stahler, Daniel R.; Smith, Douglas W.

    2017-01-01

    Aggression directed at conspecific groups is common among gregarious, territorial species, and for some species such as gray wolves (Canis lupus) intraspecific strife is the leading cause of natural mortality. Each individual in a group likely has different measures of the costs and benefits associated with a group task, such as an aggressive attack on another group, which can alter motivation and behavior. We observed 292 inter-pack aggressive interactions in Yellowstone National Park between 1 April 1995 and 1 April 2011 (>5300 days of observation) in order to determine the role of both sexes, and the influence of pack, age, and other traits on aggression. We recorded the behaviors and characteristics of all individuals present during the interactions (n = 534 individuals) and which individuals participated in each step (i.e. chase, attack, kill, flight) of the interaction. Overall, all wolves were more likely to chase rivals if they outnumbered their opponent, suggesting packs accurately assess their opponent’s size during encounters and individuals adjust their behavior based on relative pack size. Males were more likely than females to chase rival packs and gray-colored wolves were more aggressive than black-colored wolves. Male wolves and gray-colored wolves also recorded higher cortisol levels than females and black-colored wolves, indicating hormonal support for more intense aggressive behavior. Further, we found a positive correlation between male age and probability of chasing, while age-specific participation for females remained constant. Chasing behavior was influenced by the sex of lone intruders, with males more likely to chase male intruders. This difference in behavior suggests male and female wolves may have different strategies and motivations during inter-pack aggressive interactions related to gray wolf mating systems. A division of labor between pack members concerning resource and territory defense suggests selection for specific traits

  11. 32 CFR 552.116 - Privately owned weapons-security.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Privately owned weapons-security. 552.116 Section..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition but...

  12. Managing nuclear weapons in the United States

    Energy Technology Data Exchange (ETDEWEB)

    Miller, G.

    1993-03-16

    This report discusses the management and security of nuclear weapons in the post-cold war United States. The definition of what constitutes security is clearly changing in the US. It is now a much more integrated view that includes defense and the economy. The author tries to bring some semblance of order to these themes in this brief adaptation of a presentation.

  13. Nuclear weapons modernizations

    Energy Technology Data Exchange (ETDEWEB)

    Kristensen, Hans M. [Federation of American Scientists, Washington, DC (United States)

    2014-05-09

    This article reviews the nuclear weapons modernization programs underway in the world's nine nuclear weapons states. It concludes that despite significant reductions in overall weapons inventories since the end of the Cold War, the pace of reductions is slowing - four of the nuclear weapons states are even increasing their arsenals, and all the nuclear weapons states are busy modernizing their remaining arsenals in what appears to be a dynamic and counterproductive nuclear competition. The author questions whether perpetual modernization combined with no specific plan for the elimination of nuclear weapons is consistent with the nuclear Non-Proliferation Treaty and concludes that new limits on nuclear modernizations are needed.

  14. 对抗高超声速武器的机载激光武器发展研究%Research on the Development of Airborne Laser Weapons Against Hypersonic Weapons

    Institute of Scientific and Technical Information of China (English)

    张同鑫; 李权

    2016-01-01

    The military threat of hypersonic weapon to current air defense system, and the potential military value of airborne laser weapon confronted to the hypersonic weapon were illustrated. Detailed introduction was made on the technical barriers of airborne laser weapon and the state of the art research progress. It is emphasized that now to research airborne laser weapon, its weight and size must be decreased, beam control system and aiming and tracking system in dynamic environments must be researched, special aerodynamic layout must be designed and smart energy sources management must be established.%介绍了高超声速武器对现有军事防御系统的威胁,机载激光武器对抗高超声速武器的军事价值。详细描述了国外机载激光武器的研究进展以及研究机载激光武器的技术难点,指出当前研究机载激光武器必须进一步降低激光武器的重量和体积,研发动态环境的光束控制与瞄准跟踪系统,开展特殊气动布局设计研究,建立周密的能源管理系统。

  15. Defense Acquisitions: Assessments of Selected Weapon Programs

    Science.gov (United States)

    2017-03-01

    more stable. However, the portfolio increased its buying power by $10.7 billion— meaning DOD is able to buy more goods or services for the same... experience cost and schedule overruns. GAO continues to emphasize the need for DOD and Congress to hold programs accountable by ensuring that they...Alternatively a program’s cost can decrease due to a reduction in quantity and may still experience a buying power gain or loss. Table 2 shows our

  16. Defense Acquisitions: Assessments of Selected Weapon Programs

    Science.gov (United States)

    2008-03-01

    108Program Performance (fiscal year 2008 dollars in millions) Figures shown are based on the December 2006 Selected Acqusition Report and do not reflect... language to permit it to contract for quantities of WIN-T Increment 1 nodes in fiscal year 2008 to support operational needs, even if prior to the

  17. Defense Acquisitions: Assessments of Selected Weapon Programs

    Science.gov (United States)

    2012-03-01

    Inc 3 Soldier Network Extension WIN-T Inc 3 Tact i lca Communications Node (While Mobile) Program/development start (7/03) Low-rate decision (4/15...Davidson, Ramzi N. Nemo Littoral Combat Ship (LCS) Rebecca A. Wilson, Molly W. Traci Littoral Combat Ship–Mission Modules Laurier R. Fish , Mya Dinh...Warfighter Information Network-Tactical (WIN-T) Increment 2 James P. Tallon, Laurier R. Fish Warfighter Information Network-Tactical (WIN-T) Increment 3

  18. Defense Acquisitions: Assessments of Selected Weapon Programs

    Science.gov (United States)

    2014-03-01

    a new initiative to reduce complexity within the cryptography required to encrypt and decrypt communications. In last year’s assessment, the program...TRL) 6. Demonstration in a realistic environment is TRL 7. See app . V for detailed description of TRLs. Page 27 GAO-14-340SP Assessments of

  19. Defense Acquisitions. Assessments of Selected Weapon Programs

    Science.gov (United States)

    2007-03-01

    countermeasure dispenser capable of loading and employing expendables, such as flares, chaff, and smoke . S Page 39ource: BAE Systems.System development...not collecting statistical data for them. As reported in our last assesment , we expect that the prime contract could overrun its target cost by

  20. Defense Acquisitions: Assessments of Selected Weapon Programs

    Science.gov (United States)

    2017-03-01

    Missile Submarine (SSBN 826) 117 Ship to Shore Connector Amphibious Craft (SSC) 119 VH-92A Presidential Helicopter Replacement Program 121... Sight Terminals (FAB-T) 143 Global Positioning System III (GPS III) 145 KC-46 Tanker Modernization Program (KC-46A) 147 Military GPS User Equipment...been incorporated into the DOD Instruction 5000.02. These and other reforms address sound management practices, such as realistic cost estimating

  1. Defense Acquisitions: Assessments of Selected Weapon Programs

    Science.gov (United States)

    2011-03-01

    cover the JPALS ship system-radio, antenna, receiver, racks , and console. The program also tracks requirement changes to monitor design stability...with stowage cradle) and berthing modules around the LCS 2 mission bay. Navy officials also report that testing of LCS 2’s twin- boom extensible

  2. Pulsed Electric Fields for Biological Weapons Defense

    Science.gov (United States)

    2008-09-30

    implanted into athymic nude mice for evaluation of solid tumor responses in vivo. In addition the following microorganisms were studied: Bacillus ...including Staphylococcus, a-hemolytic Streptococcus, Actinomyces, and Candida species. , 12% 0.1 % ° F R 3 R2 R3 .0 E R5:2 % R5: 32

  3. Nonstrategic Nuclear Weapons

    Science.gov (United States)

    2014-01-03

    William Potter , and Nikolai Sokov, Reducing and Regulating Tactical (Nonstrategic) Nuclear Weapons in Europe, The James Martin Center For...See William C. Potter and Nikolai Sokov, “Nuclear Weapons that People Forget,” International Herald Tribune, May 31, 2000. 87 Sam Nunn, Igor...their security.97 94 Kent Harris , “NATO Allies Want U.S. Nuclear Weapons out of Europe

  4. ON THE OFFENSE: USING CYBER WEAPONS TO INFLUENCE COGNITIVE BEHAVIOR

    Directory of Open Access Journals (Sweden)

    Mary Fendley

    2012-12-01

    Full Text Available There is an increasing recognition that cyber warfare is an important area of development for targeting and weaponeering, with far-reaching effects in national defense and economic security. The ability to conduct effective operations in cyberspace relies on a robust situational awareness of events occurring in both the physical and information domains, with an understanding of how they affect the cognitive domain of friendly, neutral, and adversary population sets. The dynamic nature of the battlefield complicates efforts to understand shifting adversary motivations and intentions. There are very few approaches, to date, that systematically evaluate the effects of the repertoire of cyber weapons on the cognitive, perceptual, and behavioral characteristics of the adversary. In this paper, we describe a software environment called Cognitive Cyber Weapon Selection Tool (CCWST that simulates a scenario involving cyber weaponry.This tool provides the capabilities to test weapons which may induce behavioral state changes in the adversaries. CCWST provides the required situational awareness to the Cyber Information Operations (IO planner to conduct intelligent weapon selection during weapon activation in order to induce the desired behavioral change in the perception of the adversary. Weapons designed to induce the cognitive state changes of deception, distraction, distrust and confusion were then tested empirically to evaluate the capabilities and expected cognitive state changes induced by these weapons. The results demonstrated that CCWST is a powerful environment within which to test and evaluate the impact of cyber weapons on influencing cognitive behavioral states during information processing.

  5. Reconversion of nuclear weapons

    CERN Document Server

    Kapitza, Sergei P

    1993-01-01

    The nuclear predicament or nuclear option. Synopsis of three lectures : 1- The physical basis of nuclear technology. Physics of fission. Chain reaction in reactors and weapons. Fission fragments. Separration of isotopes. Radiochemistry.2- Nuclear reactors with slow and fast neutrons. Power, size, fuel and waste. Plutonium production. Dose rate, shielding and health hazard. The lessons of Chernobyl3- Nuclear weapons. Types, energy, blast and fallout. Fusion and hydrogen bombs. What to do with nuclear weapons when you cannot use them? Testing. Nonmilittary use. Can we get rid of the nuclear weapon? Nuclear proliferation. Is there a nuclear future?

  6. Rethinking Defensive Information Warfare

    Science.gov (United States)

    2004-06-01

    electronic warfare, and special information operations. Defensive information operations ensure timely, accurate, and relevant information access...information and information systems. IA, physical security, OPSEC, counter-deception, counter-psyops, CI, EW, and special information operations. Ensure

  7. Regional Joint-Integrated Air and Missile Defense (RF-IAMD): An Operational Level Integrated Air and Missile Defense (IAMD) Command and Control (C2) Organization

    Science.gov (United States)

    2015-05-15

    the Naval Air and Missile Defense Command (NAMDC). NAMDC then began training field grade officers through a Weapons and Tactics Instructor ( WTI ...49 Integrated Air and Missile Defense (IAMD) Weapons and Tactics Instructor ( WTI ), Naval Air and Missile...and Missile Defense (IAMD) Weapons and Tactics Instructor ( WTI ). Accessed April 28, 2015. http://namdc.ahf.nmci.navy.mil/site%20pages/wti.htm

  8. DOE battery program for weapon applications

    Science.gov (United States)

    Clark, R. P.; Baldwin, A. R.

    This report discusses the Department of Energy (DOE) Weapons Battery program which originates from Sandia National Laboratories (SNL) and involves activities ranging from research, design and development to testing, consulting, and production support. The primary customer is the DOE/Office of Defense Programs, although work is also done for various Department of Defense agencies and their contractors. The majority of the SNL activities involve thermal battery (TB) and lithium ambient temperature battery (LAMB)technologies. Smaller efforts are underway in the areas of silver oxide/zinc and nickel oxide/cadmium batteries as well as double layer capacitors.

  9. Nuclear weapons and NATO-Russia relations

    Energy Technology Data Exchange (ETDEWEB)

    Cornwell, G.C.

    1998-12-01

    Despite the development of positive institutional arrangements such as Russian participation in the NATO-led peacekeeping force in Bosnia and the NATO- Russia Permanent Joint Council, the strategic culture of Russia has not changed in any fundamental sense. Russian strategic culture has not evolved in ways that would make Russian policies compatible with those of NATO countries in the necessary economic, social, technological, and military spheres. On the domestic side, Russia has yet to establish a stable democracy and the necessary legal, judicial, and regulatory institutions for a free-market economy. Russia evidently lacks the necessary cultural traditions, including concepts of accountability and transparency, to make these adaptations in the short-term. Owing in part to its institutional shortcomings, severe socioeconomic setbacks have afflicted Russia. Russian conventional military strength has been weakened, and a concomitant reliance by the Russians on nuclear weapons as their ultimate line of defense has increased. The breakdown in the infrastructure that supports Russian early warning and surveillance systems and nuclear weapons stewardship defense, coupled with a tendency towards has exacerbated Russian anxiety and distrust toward NATO. Russia`s reliance on nuclear weapons as the ultimate line of defense, coupled with a tendency toward suspicion and distrust toward NATO, could lead to dangerous strategic miscalculation and nuclear catastrophe.

  10. Military and diplomatic roles and options for managing and responding to the proliferation of ballistic missiles and weapons of mass destruction. Final report: Program on Stability and the Offense/Defense Relationship

    Energy Technology Data Exchange (ETDEWEB)

    Hallenbeck, R.A.; Gill, J.M.; Murray, B.L.

    1993-05-26

    The March seminar, ``Military and Diplomatic Roles and Options`` for managing and responding to proliferation, featured three presentations: the military and diplomatic implications of preemptive force as a counterproliferation option; an in-depth assessment of the threat posed by biological weapons; and, a new proposed US counterproliferation policy.

  11. Phenotypic plasticity in the green algae Desmodesmus and Scenedesmus with special reference to the introduction of defensive morphology

    OpenAIRE

    Lürling, M.F.L.L.W.

    2003-01-01

    Organisms belonging to the green algal genera Desmodesmus and Scenedesmus are characterized by a high degree of flexibility allowing them to be true cosmopolitans and to withstand harsh conditions. The environmental conditions determine which phenotypes are being produced and one of the most dangerous situations for the algae is when the organisms are confronted with strong grazing pressure from numerous zooplankton organisms. An overview is given of several aspect of an induced defense in ma...

  12. Defense Industry Clusters in Turkey

    Directory of Open Access Journals (Sweden)

    Kadir Alpaslan Demir

    2016-06-01

    Full Text Available All countries strive for a capable national defense supported by a strong national defense industry. Supporting national defense with imported defense systems has many limitations and risks because the terms of arms trade agreements between countries may easily be influenced by the political climate of the signatories. As a result, establishing an independent national defense requires a strong national defense industry. Furthermore, exporting defense systems may be an important source of national income. National defense industries mostly consist of large-scale defense firms that have the resources required for big defense contracts. However, small to medium enterprises (SMEs do not have the necessary resources, therefore they are at a disadvantage. To overcome this handicap and be part of the business, defense industry clusters mostly consisting of SMEs are being established. Provided that there is good national planning and support in this area, defense clusters consisting of SMEs may play a significant role in industry. SMEs have a chance to offer specialized services, special or customized products when needed. As a result, large defense firms subcontract certain portions of defense projects to SMEs. Since 2010, Turkey has shown signs of continuous improvement in defense industry clustering. In parallel with these developments, this study discusses the importance of clustering in the defense industry, briefly presents the state of the Turkish defense industry as highlighted by national statistics, and presents the current status of defense clusters in Turkey. The novelty of this article consists in its assessment of Turkish defense clusters.

  13. Neurotoxic Weapons and Syndromes.

    Science.gov (United States)

    Carota, Antonio; Calabrese, Pasquale; Bogousslavsky, Julien

    2016-01-01

    The modern era of chemical and biological warfare began in World War I with the large-scale production and use of blistering and choking agents (chlorine, phosgene and mustard gases) in the battlefield. International treaties (the 1925 Geneva Protocol, the 1975 Biological and Toxin Weapons Convention and the 1993 Chemical Weapons Convention) banned biological and chemical weapons. However, several countries are probably still engaged in their development. Hence, there is risk of these weapons being used in the future. This chapter will focus on neurotoxic weapons (e.g. nerve agents, chemical and biological neurotoxins, psychostimulants), which act specifically or preeminently on the central nervous system and/or the neuromuscular junction. Deeply affecting the function of the nervous system, these agents either have incapacitating effects or cause clusters of casualties who manifest primary symptoms of encephalopathy, seizures, muscle paralysis and respiratory failure. The neurologist should be prepared both to notice patterns of symptoms and signs that are sufficiently consistent to raise the alarm of neurotoxic attacks and to define specific therapeutic interventions. Additionally, extensive knowledge on neurotoxic syndromes should stimulate scientific research to produce more effective antidotes and antibodies (which are still lacking for most neurotoxic weapons) for rapid administration in aerosolized forms in the case of terrorist or warfare scenarios. © 2016 S. Karger AG, Basel.

  14. DoD Nuclear Weapons Personnel Reliability Assurance

    Science.gov (United States)

    2016-04-27

    Reliability Program ( PRP ),” July 16, 2012 Approved by: Frank Kendall, Under Secretary of Defense for Acquisition, Technology, and Logistics...personnel reliability assurance education and training materials. 2.4. ASSISTANT SECRETARY OF DEFENSE FOR HEALTH AFFAIRS (ASD(HA)). Under the authority...policies, standards, and procedures. c. Education and training materials for medical support to nuclear weapons personnel reliability assurance. 2.5

  15. Mitigation and propagation of sound generated by heavy weapons

    NARCIS (Netherlands)

    Berg, F. van den; Eerden, F.J.M. van der

    2011-01-01

    Much environmental research is performed on predicting the noise impact of heavy weapons or explosives, as the shock waves can propagate over large distances. In the densely populated area of the Netherlands this is of particular interest for the Ministry of Defense. In one research program the miti

  16. Changing Our Ways of Thinking: Health Professionals and Nuclear Weapons.

    Science.gov (United States)

    Neal, Mary

    1984-01-01

    Outlines the issues raised by health professionals concerned about the threat of nuclear weapons and nuclear war, including epidemics, civil defense, arms costs, psychosocial aspects, and ethical responsibility. Appendixes include lists of antinuclear organizations, medical professional associations, and 160 references. (SK)

  17. Operational research in weapon system

    Directory of Open Access Journals (Sweden)

    R. S. Varma

    1958-04-01

    Full Text Available "The paper is divided into three parts: (a The first part deals with what operational research is. (bThe second part gives what we mean by Weapon Systems and discusses considerations that determine the choice of a particular weapon system from a class weapon systems. (cThe third part deals with some aspects of weapon replacement policy.The effectiveness of a weapon system is defined as E=D/C where E is weapon effectiveness (a comparative figure of merit; D is total damage inflicted or prevented and C is total cost, D and C being reduced to common dimensions. During the course of investigations, criteria regarding to choice of weapon or weapons from a set of weapon systems are established through production function and military effect curves. A procedure is described which maximizes the expectation of military utility in order to select a weapon system from the class of weapon systems. This is done under the following simplifying assumptions: (a Non- decreasing utility function; (b Constant average cost for each kind of weapons; and (c Independence of the performance of each unit of weapon. Some of the difficulties which arises when any of these restrictions is relaxed are briefly mentioned. Finally, the policy of weapon replacement and the factors governing the same are described."

  18. Wounds and weapons

    Energy Technology Data Exchange (ETDEWEB)

    Vogel, H. [Asklepios Klinik St. Georg, Roentgenabteilung, Lohmuehlenstrasse 5, 20099 Hamburg (Germany)], E-mail: Hermann.vogel@ak-stgeorg.lbk-hh.de; Dootz, B. [Asklepios Klinik St. Georg, Roentgenabteilung, Lohmuehlenstrasse 5, 20099 Hamburg (Germany)

    2007-08-15

    Purpose: X-ray findings are described, which are typical for injuries due to conventional weapons. It is intended to demonstrate that radiographs can show findings characteristic for weapons. Material and method: The radiograms have been collected in Vietnam, Croatia, Serbia, Bosnia, Chad, Iran, Afghanistan, USA, Great Britain, France, Israel, Palestine, and Germany. Results: Radiograms of injuries due to hand grenades show their content (globes) and cover fragments. The globes are localized regionally in the victim's body. Survivors of cluster bombs show singular or few globes; having been hit by many globes would have been lethal. Shotguns produce characteristic distributions of the pallets and depth of penetration different from those of hand grenades and cluster bombs; cover fragments are lacking. Gunshot wounds (GSW) can be differentiated in those to low velocity bullets, high velocity projectiles, and projectiles, which disintegrate on impact. The radiogram furnishes the information about a dangerous shock and helps to recognize the weapon. Radiograms of victims of explosion show fragments and injuries due to the blast, information valid for therapy planning and prognosis. The radiogram shows details which can be used in therapy, forensic medicine and in war propaganda - examples could be findings typical for cluster bombs and for dumdum bullets; it shows the cruelty of the employment of weapons against humans and the conflict between the goal of medical care and those of military actions. Conclusion: Radiographs may show, which weapon has been employed; they can be read as war reports.

  19. Wounds and weapons.

    Science.gov (United States)

    Vogel, H; Dootz, B

    2007-08-01

    X-ray findings are described, which are typical for injuries due to conventional weapons. It is intended to demonstrate that radiographs can show findings characteristic for weapons. The radiograms have been collected in Vietnam, Croatia, Serbia, Bosnia, Chad, Iran, Afghanistan, USA, Great Britain, France, Israel, Palestine, and Germany. Radiograms of injuries due to hand grenades show their content (globes) and cover fragments. The globes are localized regionally in the victim's body. Survivors of cluster bombs show singular or few globes; having been hit by many globes would have been lethal. Shotguns produce characteristic distributions of the pallets and depth of penetration different from those of hand grenades and cluster bombs; cover fragments are lacking. Gunshot wounds (GSW) can be differentiated in those to low velocity bullets, high velocity projectiles, and projectiles, which disintegrate on impact. The radiogram furnishes the information about a dangerous shock and helps to recognize the weapon. Radiograms of victims of explosion show fragments and injuries due to the blast, information valid for therapy planning and prognosis. The radiogram shows details which can be used in therapy, forensic medicine and in war propaganda - examples could be findings typical for cluster bombs and for dumdum bullets; it shows the cruelty of the employment of weapons against humans and the conflict between the goal of medical care and those of military actions. Radiographs may show, which weapon has been employed; they can be read as war reports.

  20. 20 CFR 30.615 - What type of tort suits filed against beryllium vendors or atomic weapons employers may...

    Science.gov (United States)

    2010-04-01

    ... beryllium vendors or atomic weapons employers may disqualify certain claimants from receiving benefits under... Special Provisions Effect of Tort Suits Against Beryllium Vendors and Atomic Weapons Employers § 30.615 What type of tort suits filed against beryllium vendors or atomic weapons employers may disqualify...

  1. Bioterrorism: toxins as weapons.

    Science.gov (United States)

    Anderson, Peter D

    2012-04-01

    The potential for biological weapons to be used in terrorism is a real possibility. Biological weapons include infectious agents and toxins. Toxins are poisons produced by living organisms. Toxins relevant to bioterrorism include ricin, botulinum, Clostridium perfrigens epsilson toxin, conotoxins, shigatoxins, saxitoxins, tetrodotoxins, mycotoxins, and nicotine. Toxins have properties of biological and chemical weapons. Unlike pathogens, toxins do not produce an infection. Ricin causes multiorgan toxicity by blocking protein synthesis. Botulinum blocks acetylcholine in the peripheral nervous system leading to muscle paralysis. Epsilon toxin damages cell membranes. Conotoxins block potassium and sodium channels in neurons. Shigatoxins inhibit protein synthesis and induce apoptosis. Saxitoxin and tetrodotoxin inhibit sodium channels in neurons. Mycotoxins include aflatoxins and trichothecenes. Aflatoxins are carcinogens. Trichothecenes inhibit protein and nucleic acid synthesis. Nicotine produces numerous nicotinic effects in the nervous system.

  2. Examination of Economic Feasibility of Nuclear Weapons in the Republic of Korea

    Energy Technology Data Exchange (ETDEWEB)

    Suh, Young A; Yim, Man Sung [Korea Advanced Institute of Science and Technology, Daejeon (Korea, Republic of)

    2015-05-15

    This observation implies that the popular view on nuclear weapons amongst Korean public is in part due to lack of knowledge about overall implications of possessing nuclear weapons. In this regard, pros and cons of nuclear weapons development need to be better characterized and understood by the public to support nuclear nonproliferation culture development. Noting lack of literature on characterizing the economics of nuclear weapons development, this study aims at performing economic feasibility analysis of nuclear weapons development in the ROK. For this purpose, an approach called Index technique based on the US experiences was applied to Korean historical data along with cost-benefit analysis and Multi-Criteria Decision Making Analysis. In this study, the scenario of nuclear weapons development against North Korean nuclear threat was compared with conventional weapons-based defense strategy. The comparison was based on cost benefit analysis and qualitative multi-criteria decision analysis. Results indicate that nuclear weapons development is not a desirable option. However, as this work was a rather simplistic academic exercise, further work is needed to support the outcome of the study. Outcome of these investigations would be useful for communication with the public regarding the need for nuclear weapons for national defense and to develop nuclear nonproliferation culture in the ROK.

  3. Weapon of the Weak?

    DEFF Research Database (Denmark)

    Amber, Van der Graaf; Otjes, Simon; Rasmussen, Anne

    2016-01-01

    Social media have the potential to offset existing inequalities in representation among interest groups and act as a ‘weapon of the weak’ by providing a technological infrastructure that allows even groups with limited resources to create content and interact across the globe. We expand on the sp......Social media have the potential to offset existing inequalities in representation among interest groups and act as a ‘weapon of the weak’ by providing a technological infrastructure that allows even groups with limited resources to create content and interact across the globe. We expand...

  4. The Optimum Replacement of Weapon

    Institute of Scientific and Technical Information of China (English)

    ZHANG Xiao; ZHANG Jin-chun

    2002-01-01

    The theory of LCC (Life Cycle Cost) is applied in this paper. The relation between the economic life of weapon and the optimum replacement is analyzed. The method to define the optimum replacement time of weapon is discussed.

  5. Multiple smart weapons employment mechanism

    Energy Technology Data Exchange (ETDEWEB)

    McGlynn, M.P.; Meiklejohn, W.D.

    1993-07-20

    A digital communications armament network adaptor is described for carrying multiple smart weapons on a single wing pylon station of an aircraft, comprising: an aircraft having a weapons controller configured in compliance with MIL-STD 1553; multiple wing-mounted pylons on said aircraft, each providing a weapons station with communications and ejection and release mechanisms electrically connected to said controller for the airborne launch of smart weapons; a multiple ejector rack affixed to at least one pylon, said rack holding a plurality of smart weapons; and an electronic digital network connected between the controller and said rack-mounted smart weapons, said network located in said rack and including circuitry which receives coded digital communications from said controller and selectively rebroadcasts said communications to one of said smart weapons on said rack designated by said coded communications, thereby controlling all required functions of said designated smart weapon.

  6. Nuclear weapon detection categorization analysis

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-12-01

    This statement of work is for the Proof of Concept for nuclear weapon categories utility in Arms control. The focus of the project will be to collect, analyze and correlate Intrinsic Radiation (INRAD) calculation results for the purpose of defining measurable signatures that differentiate categories of nuclear weapons. The project will support START III negotiations by identifying categories of nuclear weapons. The categories could be used to clarify sub-limits on the total number of nuclear weapons.

  7. Applying Agile MethodstoWeapon/Weapon-Related Software

    Energy Technology Data Exchange (ETDEWEB)

    Adams, D; Armendariz, M; Blackledge, M; Campbell, F; Cloninger, M; Cox, L; Davis, J; Elliott, M; Granger, K; Hans, S; Kuhn, C; Lackner, M; Loo, P; Matthews, S; Morrell, K; Owens, C; Peercy, D; Pope, G; Quirk, R; Schilling, D; Stewart, A; Tran, A; Ward, R; Williamson, M

    2007-05-02

    This white paper provides information and guidance to the Department of Energy (DOE) sites on Agile software development methods and the impact of their application on weapon/weapon-related software development. The purpose of this white paper is to provide an overview of Agile methods, examine the accepted interpretations/uses/practices of these methodologies, and discuss the applicability of Agile methods with respect to Nuclear Weapons Complex (NWC) Technical Business Practices (TBPs). It also provides recommendations on the application of Agile methods to the development of weapon/weapon-related software.

  8. Nonstrategic Nuclear Weapons

    Science.gov (United States)

    2017-02-21

    have eased in recent years, with their nuclear tests in 1998 and continued animosity toward each other, India and Pakistan have joined the list of...could be complex, difficult, and very time- consuming . 137 Given the large disparity in the numbers of U.S. and Russian nonstrategic nuclear weapons

  9. Medicalized weapons & modern war.

    Science.gov (United States)

    Gross, Michael L

    2010-01-01

    "Medicalized" weapons--those that rely on advances in neuroscience, physiology, and pharmacology--offer the prospect of reducing casualties and protecting civilians. They could be especially useful in modern asymmetric wars in which conventional states are pitted against guerrilla or insurgent forces. But may physicians and other medical workers participate in their development?

  10. Neutrino Counter Nuclear Weapon

    CERN Document Server

    Tang, Alfred

    2008-01-01

    Radiations produced by neutrino-antineutrino annihilation at the Z0 pole can be used to heat up the primary stage of a thermonuclear warhead and can in principle detonate the device remotely. Neutrino-antineutrino annihilation can also be used as a tactical assault weapon to target hideouts that are unreachable by conventional means.

  11. Nuclear weapons in Europe

    CERN Document Server

    Calogero, F

    1981-01-01

    Information speech given by Prof. Calogero from the university of Roma to describe the actual situation of nuclear weapons in Europe, the strategical reasons or justifications for this deployment, the prospects of negociations, and what scientists could do and do on this issue.

  12. Pakistans Nuclear Weapons

    Science.gov (United States)

    2016-02-12

    Memorandum from Air Commodore Khalid Banuri, 2011. 84 Mahmud Ali Durrani, “Pakistan’s Strategic Thinking and the Role of Nuclear Weapons...Richard P. Cronin , K. Alan Kronstadt, and Sharon Squassoni. Also see CRS Report RL33498, Pakistan-U.S. Relations, by K. Alan Kronstadt. 168 For a

  13. Non-lethal weapons and their characteristics

    OpenAIRE

    DAMJANOVIC DRAGAN Z.

    2015-01-01

    Non-lethal weapons, also called less-lethal weapons, less-than lethal weapons, non-deadly weapons, compliance weapons, or pain-inducing weapons are weapons intended to be less likely to kill a living target than conventional weapons. It is often understood that accidental, incidental, and correlative casualties are risked wherever force is applied, but non-lethal weapons try to minimise the risk as much as possible. Non-lethal weapons are used in combat situations to limit the escalation of c...

  14. NON-LETHAL WEAPONS AND THEIR CHARACTERISTICS

    OpenAIRE

    2015-01-01

    Non-lethal weapons, also called less-lethal weapons, less-than lethal weapons, non-deadly weapons, compliance weapons, or pain-inducing weapons are weapons intended to be less likely to kill a living target than conventional weapons. It is often understood that accidental, incidental, and correlative casualties are risked wherever force is applied, but non-lethal weapons try to minimise the risk as much as possible. Non-lethal weapons are used in combat situations to limit the escalation of c...

  15. Establishing a Department of Defense Program Management Body of Knowledge

    Science.gov (United States)

    1991-09-01

    Initiation, Implementation, and Termination (19:10-11). Another definition can be gained from Dr David Cleland, in his text Project Management Strategies...The Defense Systems Management College (DSMC) was established in 1971 under the direction of Deputy Secretary of Defense David Packard (5:5).. The...intelligence activities, cryptological activities, omand and control, equipment that is an integral part of a weapon or weapon system, equipment critical

  16. 76 FR 39392 - Record of Decision for the F-35 Force Development Evaluation and Weapons School Beddown, Nellis...

    Science.gov (United States)

    2011-07-06

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF DEFENSE Department of the Air Force Record of Decision for the F-35 Force Development Evaluation and Weapons School... Air Force signed the ROD for the F-35 Force Development Evaluation (FDE) and Weapons School...

  17. Directed Energy Weapons

    Science.gov (United States)

    2007-12-01

    the USD (I) staff to be afocalpointfor advocating improvement in all dimensions of directed energy intelligence. - The Director, Defense Inteligence ...staff to be afocalpoint for advocating iprovement in all dimensions of directed energy intelligence. The Director, Defense Inteligence Ageng7 should

  18. Bioterrorism: pathogens as weapons.

    Science.gov (United States)

    Anderson, Peter D; Bokor, Gyula

    2012-10-01

    Biowarfare has been used for centuries. The use of biological weapons in terrorism remains a threat. Biological weapons include infectious agents (pathogens) and toxins. The most devastating bioterrorism scenario would be the airborne dispersal of pathogens over a concentrated population area. Characteristics that make a specific pathogen a high-risk for bioterrorism include a low infective dose, ability to be aerosolized, high contagiousness, and survival in a variety of environmental conditions. The most dangerous potential bioterrorism agents include the microorganisms that produce anthrax, plague, tularemia, and smallpox. Other diseases of interest to bioterrorism include brucellosis, glanders, melioidosis, Q fever, and viral encephalitis. Food safety and water safety threats are another area of concern.

  19. Illegal Weapons Exports?

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Amnesty International, a human rights organization, released a report on June 11 accusing China of facilitating regional conflicts and human rights violations by exporting a large quantity of weapons to Sudan, Nepal, Myanmar and the Great Lakes countries of Africa. Responding to such charges, Teng Jianqun, a researcher with the China Arms Control and Disarmament Association, told the official Xinhua News Agency that China has always put its limited arms exports under strict control and surveillance, deno...

  20. Managing nuclear weapons in a changing world: Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    1992-12-31

    The Center for Security and Technology Studies was established at the Lawrence Livermore National Laboratory to support long-range technical studies on issues of importance to US national security. An important goal of the Center is to bring together Laboratory staff and the broader outside community through a program of technical studies, visitors, symposia, seminars, workshops, and publications. With this in mind, the Center and LLNL`s Defense Systems Program sponsored a conference on Managing Nuclear Weapons in a Changing World held on November 17--18,1992. The first day of the meeting focused on nuclear weapons issues in the major geographical areas of the world. On the second day, the conference participants discussed what could be done to manage, control, and account for nuclear weapons in this changing world. Each of the talks and the concluding panel discussion are being indexed as separate documents.

  1. Handheld ultrasound concealed weapons detector

    Science.gov (United States)

    Felber, Franklin S.; Wild, Norbert C.; Nunan, Scott C.; Breuner, Dennis; Doft, Frank

    1998-12-01

    A handheld, battery-operated prototype of a remove concealed weapons detector has been built and tested. The concealed weapons detector will enable law enforcement and security officers to detect metallic and nonmetallic weapons concealed beneath clothing remotely from beyond arm's length to about 20 feet. These detectors may be used to: (1) allow hands-off, stand-off frisking of suspects for metallic and nonmetallic weapons; and (2) search for metallic and nonmetallic weapons on cooperative subjects at courthouse entrances and other monitored security portals. We have demonstrated that we image weapons concealed under heavy clothing, not just detect them, at ranges up to 15 feet using the same ultrasound frequency (40 kHz) used by commercial rangefinders. The concealed weapons detector operates much as a rangefinder, but at higher peak fluxes and pulse repetition frequencies. The detector alerts the user to concealed weapons audibly and visibly by detecting ultrasound glints above a body/clothing baseline, and by compensating for changing range and attenuation. The detector locates concealed weapons within a 6-inch illuminated spot at 10 feet. The signal processor eliminates any signal from behind the target.

  2. Crystalline ceramics: Waste forms for the disposal of weapons plutonium

    Energy Technology Data Exchange (ETDEWEB)

    Ewing, R.C.; Lutze, W. [New Mexico Univ., Albuquerque, NM (United States); Weber, W.J. [Pacific Northwest Lab., Richland, WA (United States)

    1995-05-01

    At present, there are three seriously considered options for the disposition of excess weapons plutonium: (i) incorporation, partial burn-up and direct disposal of MOX-fuel; (ii) vitrification with defense waste and disposal as glass ``logs``; (iii) deep borehole disposal (National Academy of Sciences Report, 1994). The first two options provide a safeguard due to the high activity of fission products in the irradiated fuel and the defense waste. The latter option has only been examined in a preliminary manner, and the exact form of the plutonium has not been identified. In this paper, we review the potential for the immobilization of plutonium in highly durable crystalline ceramics apatite, pyrochlore, monazite and zircon. Based on available data, we propose zircon as the preferred crystalline ceramic for the permanent disposition of excess weapons plutonium.

  3. Evaluation of the Air Force Office of Special Investigations Conduct of Internet Based Operations and Investigations (REDACTED)

    Science.gov (United States)

    2016-04-25

    Introduction 2 │ DODIG-2016-075 increasing number of children and teenagers using the Internet, the proliferation of unlawful images, contraband images, images...violence, brandishing a weapon, discharging or using a weapon, or threatening to discharge or use a weapon except in self -defense, in defense of other DoD...persons in the vicinity, or in defense of non-DoD persons; • evidence collection, security functions, crowd and traffic control , and operating

  4. Insulin as a weapon.

    Science.gov (United States)

    Robinson, Samuel D; Safavi-Hemami, Helena

    2016-12-01

    The discovery of insulin and its use for the treatment of diabetes is undoubtedly one of the true successes of modern medicine. Injectable insulin would prove the first effective treatment for a previously incurable and usually fatal disease. Soon after however, the powerful effects of insulin overdose would be reported, and subsequently exploited for dubious medical and sometimes nefarious purposes. In this article we describe the discovery that certain venomous marine snails of the genus Conus also exploit the powerful effects of insulin overdose, employing it as a weapon for prey capture. Copyright © 2016 Elsevier Ltd. All rights reserved.

  5. Automatic Weapons, Machineguns, Hand and Shoulder Weapons

    Science.gov (United States)

    1983-12-21

    to manually operate the trigger) Headspace Barrel length Length of rifled bore Direction and twist of rifling Number of lands and grooves Diameter...guns (cal .50 class and larger), with the rear sight elevated to the respective m merking for the ranges to be fired. NOTE: 1) The "zeroing-in" phase is...described in applicable technical manuals , require- ments documents, or manufacturer’s literature. Review all special warnings and safety SOP’s before testing

  6. Naval Weapons Station Earle Reassessment

    Science.gov (United States)

    2013-12-01

    surveys for their Section 110 compliance: Architectural Resources Survey, Naval Weapons Station Earle, Monmouth County, New Jersey (Louis Berger 1999...text within brackets. Berger Report 1999 Architectural Resources Survey, Naval Weapons Station Earle, Monmouth County, New Jersey (Louis Berger... architectural treatment of buildings at NWS Earle: a traditional vernacular theme with minimal decorative detailing. This so-called minimal traditional

  7. Proportionality and Autonomous Weapons Systems

    NARCIS (Netherlands)

    van den Boogaard, J.

    2015-01-01

    Given the swift technologic development, it may be expected that the availability of the first truly autonomous weapons systems is fast approaching. Once they are deployed, these weapons will use artificial intelligence to select and attack targets without further human intervention. Autonomous

  8. Proportionality and Autonomous Weapons Systems

    NARCIS (Netherlands)

    van den Boogaard, J.

    2015-01-01

    Given the swift technologic development, it may be expected that the availability of the first truly autonomous weapons systems is fast approaching. Once they are deployed, these weapons will use artificial intelligence to select and attack targets without further human intervention. Autonomous weap

  9. Department of Defense Dictionary of Military and Associated Terms

    Science.gov (United States)

    2016-02-15

    distribution and deployment. f. level VI - personnel: detail expressed by name, Service , military occupational specialty and unique identification...of one or more weapons with all related equipment, materials, services , personnel, and means of delivery and deployment (if applicable) required for...2016 A-46 JP 1-02 DCRF defense chemical, biological, radiological, and nuclear response force DCS Defense Courier Service ; deputy chief

  10. Musculoskeletal colloquialisms based on weapons.

    Science.gov (United States)

    Agrawal, Anuj

    2017-01-01

    Eponyms and colloquialisms are commonly used in orthopaedic literature and convey a great deal of information in a concise fashion. Several orthopaedic conditions have characteristic clinical or radiologic appearances, mimicking the appearance of certain arms or weapons. Most of these are easy to memorise and recognise, provided the orthopaedic surgeon is aware of the colloquialism and familiar with the appearance of the weapon on which it is based. Unfortunately, many such colloquialisms are based on traditional weapons no longer in current use, and their appearances are not familiar to most orthopaedists, creating confusion and difficulty in understanding them. In this paper, we have reviewed the musculoskeletal colloquialisms based on weapons, including a brief description of the weapon with illustrations, highlighting the importance of the colloquialism in diagnosis or treatment of musculoskeletal conditions.

  11. Nuclear weapon reliability evaluation methodology

    Energy Technology Data Exchange (ETDEWEB)

    Wright, D.L. [Sandia National Labs., Albuquerque, NM (United States)

    1993-06-01

    This document provides an overview of those activities that are normally performed by Sandia National Laboratories to provide nuclear weapon reliability evaluations for the Department of Energy. These reliability evaluations are first provided as a prediction of the attainable stockpile reliability of a proposed weapon design. Stockpile reliability assessments are provided for each weapon type as the weapon is fielded and are continuously updated throughout the weapon stockpile life. The reliability predictions and assessments depend heavily on data from both laboratory simulation and actual flight tests. An important part of the methodology are the opportunities for review that occur throughout the entire process that assure a consistent approach and appropriate use of the data for reliability evaluation purposes.

  12. A Novel Two-Staged Decision Support based Threat Evaluation and Weapon Assignment Algorithm, Asset-based Dynamic Weapon Scheduling using Artificial Intelligence Techinques

    OpenAIRE

    Naeem, Huma; Masood, Asif; Hussain, Mukhtar; Shoab A. Khan

    2009-01-01

    Surveillance control and reporting (SCR) system for air threats play an important role in the defense of a country. SCR system corresponds to air and ground situation management/processing along with information fusion, communication, coordination, simulation and other critical defense oriented tasks. Threat Evaluation and Weapon Assignment (TEWA) sits at the core of SCR system. In such a system, maximal or near maximal utilization of constrained resources is of extreme importance. Manual TEW...

  13. 75 FR 32416 - Defense Science Board

    Science.gov (United States)

    2010-06-08

    ... Systems and Assets to Electromagnetic Pulse (EMP) and other Nuclear Weapons Effects will meet in closed... discuss presentations on: findings and recommendations of the Congressional EMP Commission, the Defense...; implementation to date of DoD Instruction 3150.09; the SECDEF 2009 Report to Congress on EMP Survivability;...

  14. Weapons Systems Analysis

    Science.gov (United States)

    1981-10-01

    Defense Review, 10, 43-47 (1977). [429] Brains, S. J., Game Theory and Politics, The Free Press, New York, New York (1975). [430] Bresson , M. M., "Les...Study in Conflict and Cooperation, University of Michigan Press, Ann Arbor, Michigan (1965). [505] Roberts , D. M. and J. C. Gittins, "The Search For An

  15. Linking legacies: Connecting the Cold War nuclear weapons production processes to their environmental consequences

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-01-01

    In the aftermath of the Cold War, the US has begun addressing the environmental consequences of five decades of nuclear weapons production. In support of this effort, the National Defense Authorization Act for Fiscal Year 1995 directed the Department of Energy (DOE) to describe the waste streams generated during each step in the production of nuclear weapons. Accordingly, this report responds to this mandate, and it is the Department`s first comprehensive analysis of the sources of waste and contamination generated by the production of nuclear weapons. The report also contains information on the missions and functions of nuclear weapons facilities, on the inventories of waste and materials remaining at these facilities, as well as on the extent and characteristics of contamination in and around these facilities. This analysis unites specific environmental impacts of nuclear weapons production with particular production processes. The Department used historical records to connect nuclear weapons production processes with emerging data on waste and contamination. In this way, two of the Department`s legacies--nuclear weapons manufacturing and environmental management--have become systematically linked. The goal of this report is to provide Congress, DOE program managers, non-governmental analysts, and the public with an explicit picture of the environmental results of each step in the nuclear weapons production and disposition cycle.

  16. Youths Carrying a Weapon or Using a Weapon in a Fight: What Makes the Difference?

    Science.gov (United States)

    Thurnherr, Judit; Michaud, Pierre-Andre; Berchtold, Andre; Akre, Christina; Suris, Joan-Carles

    2009-01-01

    The objective of this study was to characterize weapon-carrying adolescents and to assess whether weapon carriers differ from weapon users. Data were drawn from a cross-sectional school-based survey of 7548 adolescents aged 16-20 years in Switzerland. Youths carrying a weapon were compared with those who do not. Subsequently, weapon carriers were…

  17. Defense Innovation and Industrialization in South Korea

    OpenAIRE

    Moon, Chung-in; Paek, Jae-Ok

    2010-01-01

    South Korea’s defense industrial transformation has been impressive by any standard. It was able to satisfy most of its basic weapons needs within a decade after launching its defense industry. Since the late 1990s, South Korea has been elevated from a third-tier arms producer to the second tier by moving from the stage of imitation and assembly to that of creative imitation and indigenization. It now competes with major arms-supplying countries. In addition, the South Korean defense...

  18. Risk in the Weapons Stockpile

    Energy Technology Data Exchange (ETDEWEB)

    Noone, Bailey C [Los Alamos National Laboratory

    2012-08-14

    When it comes to the nuclear weapons stockpile, risk must be as low as possible. Design and care to keep the stockpile healthy involves all aspects of risk management. Design diversity is a method that helps to mitigate risk.

  19. The Weaponization of Social Media

    Science.gov (United States)

    2016-06-10

    media efforts will be compared to similar Western business and civic social media centric marketing efforts from both a technical and theoretical...THE WEAPONIZATION OF SOCIAL MEDIA A thesis presented to the Faculty of the U.S. Army Command and General Staff College in...The Weaponization of Social Media 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Jack B. Irby III, MAJ 5d

  20. Proceedings of the Tungsten Workshop for Hard Target Weapons Program

    Energy Technology Data Exchange (ETDEWEB)

    Mackiewicz-Ludtka, G.; Hayden, H.W.; Davis, R.M.

    1995-06-01

    The purpose of this meeting was to review and exchange information and provide technical input for improving technologies relevant to the Hard Target Weapons Program. This workshop was attended by representatives from 17 organizations, including 4 Department of Defense (DoD) agencies, 8 industrial companies, and 5 laboratories within DOE. Hard targets are defined as reinforced underground structures that house enemy forces, weapon systems, and support equipment. DOE-ORO and Martin Marietta Energy Systems, Inc. (Energy Systems) have been involved in advanced materials research and development (R&D) for several DOE and DoD programs. These programs are conducted in close collaboration with Eglin AFB, Department of the Army`s Picatinny Arsenal, and other DoD agencies. As part of this ongoing collaboration, Eglin AFB and Oak Ridge National Laboratory planned and conducted this workshop to support the Hard Target Weapons Program. The objectives of this workshop were to (1) review and identify the technology base that exists (primarily due to anti-armor applications) and assess the applicability of this technology to the Hard Target Weapons Program requirements; (2) determine future directions to establish the W materials, processing, and manufacturing technologies suitable for use in fixed, hard target penetrators; and (3) identify and prioritize the potential areas for technical collaboration among the participants.

  1. The Anti-Satellite (ASAT) Weapon Problem And Congress

    Science.gov (United States)

    Treglio, James R.

    1984-08-01

    An amendment to the 1984 Defense Authorization Act prevents testing against objects in space of an American F-15 launched anti-satellite weapon until the President certifies that the testing is necessary to prevent harm to the national security, and that he is willing to negotiate an ASAT treaty with the Soviet Union. This extraordinary action by the Congress was taken because many members of Congress feared that the weapon was being developed without due consideration for its impact on arms control, that temporary technical superiority was being given greater importance than the long-term security of the nation. This increased Congressional scrutiny could have an impact on future weapons development programs. "Now a crucial moment is really coming: Either the interested parties will sit down at the negotiating table without delay to begin drawing up a treaty prohibiting the placement in space of weapons of any kind, or the arms race will spill over into space." YURI ANDROPOV, April 28, 1983, in response to petition from American Scientists.

  2. Using Heuristics for Supportability Analysis of Adaptive Weapon Systems in Combat

    Science.gov (United States)

    2017-01-01

    Defense ARJ, January 2017, Vol. 24 No. 1 : 30–41 Using Heuristics for Supportability Analysis http://www.dau.mil In a limited data situation , a decision...USING HEURISTICS for Supportability Analysis of Adaptive Weapon Systems in Combat Samuel H. Amber The new U.S. Army vision contends that heuristics...Image designed by Diane Fleischer 32 Defense ARJ, January 2017, Vol. 24 No. 1 : 30–41 Using Heuristics for Supportability Analysis http

  3. OIL AS POLITICAL WEAPON

    Directory of Open Access Journals (Sweden)

    Mariana, BUICAN

    2013-12-01

    Full Text Available Oil (called by some black gold has not always been as coveted and used, but only in the last hundred years has established itself as a highly sought after as an indispensable proper functioning of modern economic activity that an important factor in international politics. International oil regime has changed in the last decades. In 1960, oil regime was a private oligopol which had links with governments main consuming countries. By then the price of a barrel of oil was two U.S. dollars and seven major transnational oil companies decided the amount of oil that will be produced. Meanwhile the world region with the largest oil exports were more strongly expressed nationalism and decolonization. Result, it was so in the late 60s in the region occur independent states. They have created an organization aim of this resource to their advantage - OPEC (Organization of Petroleum Exporting Countries. Thus since 1973 there have been changes in the international regime governing oil field, namely producing countries were fixed production rate and price. After this time the oil weapon has become increasingly important in the management of international relations. Oil influenced the great powers to Middle East conflicts that occurred in the last century, but their attitude about the emergence of new sources of oil outside OPEC. In the late 90's, Russia has become a major supplier of oil to the West.

  4. A comparison of commercial/industry and nuclear weapons safety concepts

    Energy Technology Data Exchange (ETDEWEB)

    Bennett, R.R.; Summers, D.A.

    1996-07-01

    In this paper the authors identify factors which influence the safety philosophy used in the US commercial/industrial sector and compare them against those factors which influence nuclear weapons safety. Commercial/industrial safety is guided by private and public safety standards. Generally, private safety standards tend to emphasize product reliability issues while public (i.e., government) safety standards tend to emphasize human factors issues. Safety in the nuclear weapons arena is driven by federal requirements and memoranda of understanding (MOUs) between the Departments of Defense and Energy. Safety is achieved through passive design features integrated into the nuclear weapon. Though the common strand between commercial/industrial and nuclear weapons safety is the minimization of risk posed to the general population (i.e., public safety), the authors found that each sector tends to employ a different safety approach to view and resolve high-consequence safety issues.

  5. Plant Defense against Insect Herbivores

    Science.gov (United States)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar. Insect herbivory induce several internal signals from the wounded tissues, including calcium ion fluxes, phosphorylation cascades and systemic- and jasmonate signaling. These are perceived in undamaged tissues, which thereafter reinforce their defense by producing different, mostly low molecular weight, defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects have adapted to resist plant defenses, and in some cases even sequester the compounds and reuse them in their own defense. Both plant defense and insect adaptation involve metabolic costs, so most plant-insect interactions reach a stand-off, where both host and herbivore survive although their development is suboptimal. PMID:23681010

  6. Plant invasions, generalist herbivores, and novel defense weapons

    Science.gov (United States)

    Urs Schaffner; Wendy M. Ridenour; Vera C. Wolf; Thomas Bassett; Caroline Muller; Heinz Muller-Scharer; Steve Sutherland; Christopher J. Lortie; Ragan M. Callaway

    2011-01-01

    One commonly accepted mechanism for biological invasions is that species, after introduction to a new region, leave behind their natural enemies and therefore increase in distribution and abundance. However, which enemies are escaped remains unclear. Escape from specialist invertebrate herbivores has been examined in detail, but despite the profound effects of...

  7. Defense Industry Consolidation and Weapon Systems Cost Growth

    Science.gov (United States)

    2008-06-01

    consolidation in the industry. Year Buyer Target Price ($Billions) 1988 Kohlberg Kravis RJR Nabisco 25.1 1984 Chevron Gulf Oil 13.3 1988 Philip Morris Kraft...Steel Marathon Oil 6.6 1988 Campeau Federated Stores 6.5 1986 Kohlberg Kravis Beatrice 6.2 Table 7. Ten Largest Acquisitions 1981 – 1989 (Aftrer54

  8. Relevance of Nuclear Weapons Clean-Up Experience to Dirty Bomb Response

    Energy Technology Data Exchange (ETDEWEB)

    Vantine, H C; Crites, T R

    2002-08-19

    During the past 50 years, the United States has experienced 32 major nuclear weapons accidents, nine of which released special nuclear material to the environment. Response to these accidents, coupled with recovery experience following the Russian satellite reentry and weapons test site cleanup, form the basis for determining actions that might be required following a nuclear terrorist event involving the release of radioactive material. Though valuable information has been gained following the recovery from various commercial accidents, most notably the Chernobyl nuclear power plant failure and the dismantled radiography source in the Brazilian city of Goi nia, this paper will focus on the lessons learned from the U.S. nuclear weapons program.

  9. Computation of Weapons Systems Effectiveness

    Science.gov (United States)

    2013-09-01

    Aircraft Dive Angle : Initial Weapon Release Velocity at x-axis VOx VOz x: x-axis z: z-axis : Initial Weapon Release Velocity at z...altitude Impact Velocity (x− axis), Vix = VOx (3.4) Impact Velocity (z− axis), Viz = VOz + (g ∗ TOF) (3.5) Impact Velocity, Vi = �Vix2 + Viz2 (3.6...compute the ballistic partials to examine the effects that varying h, VOx and VOz have on RB using the following equations: ∂RB ∂h = New RB−Old RB

  10. 48 CFR 25.301-3 - Weapons.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Weapons. 25.301-3 Section... FOREIGN ACQUISITION Contracts Performed Outside the United States 25.301-3 Weapons. The contracting officer shall follow agency procedures and the weapons policy established by the combatant commander or...

  11. Handheld Concealed Weapons Detector Development

    Science.gov (United States)

    2003-03-01

    Enforcement, Edward M. Carapezza, Donald Spector, Eds., Proc. SPIE 2938, 110 - 119 (1997). 3. Franklin Felber, Norbert Wild, Scott Nunan , Dennis Breuner... Nunan , D. Breuner, and F. Doft, "Handheld Ultrasound Concealed-Weapons Detector," in Enforcement and Security Technologies, A. Trent DePersia, J. J

  12. A Novel Two-Staged Decision Support based Threat Evaluation and Weapon Assignment Algorithm, Asset-based Dynamic Weapon Scheduling using Artificial Intelligence Techinques

    CERN Document Server

    Naeem, Huma; Hussain, Mukhtar; Khan, Shoab A

    2009-01-01

    Surveillance control and reporting (SCR) system for air threats play an important role in the defense of a country. SCR system corresponds to air and ground situation management/processing along with information fusion, communication, coordination, simulation and other critical defense oriented tasks. Threat Evaluation and Weapon Assignment (TEWA) sits at the core of SCR system. In such a system, maximal or near maximal utilization of constrained resources is of extreme importance. Manual TEWA systems cannot provide optimality because of different limitations e.g.surface to air missile (SAM) can fire from a distance of 5Km, but manual TEWA systems are constrained by human vision range and other constraints. Current TEWA systems usually work on target-by-target basis using some type of greedy algorithm thus affecting the optimality of the solution and failing in multi-target scenario. his paper relates to a novel two-staged flexible dynamic decision support based optimal threat evaluation and weapon assignment...

  13. Why Sexually Selected Weapons Are Not Ornaments.

    Science.gov (United States)

    McCullough, Erin L; Miller, Christine W; Emlen, Douglas J

    2016-10-01

    The elaboration and diversification of sexually selected weapons remain poorly understood. We argue that progress in this topic has been hindered by a strong bias in sexual selection research, and a tendency for weapons to be conflated with ornaments used in mate choice. Here, we outline how male-male competition and female choice are distinct mechanisms of sexual selection, and why weapons and ornaments are fundamentally different types of traits. We call for research on the factors contributing to weapon divergence, the potential for male-male competition to drive speciation, and the specific use of weapons in the context of direct fights versus displays. Given that weapons are first and foremost fighting structures, biomechanical approaches are an especially promising direction for understanding weapon design. Copyright © 2016 Elsevier Ltd. All rights reserved.

  14. Missile Defense: Opportunity to Refocus on Strengthening Acquisition Management

    Science.gov (United States)

    2013-05-09

    defense operations, see the battle develop, and manage networked sensors and weapon systems. Ground-based Midcourse Defense (GMD) A ground-based...However, this retest also failed in December 2010 due to the effects of vibration on the kill vehicle’s guidance system. As a result of these...the life cycle— research and development, procurement, military construction, GAO-13-432. 15Pub. L. No. 110-181, § 223(g), repealed by Pub. L. No

  15. 76 FR 78958 - Bureau of Political Military Affairs: Directorate of Defense Trade Controls; Notifications to the...

    Science.gov (United States)

    2011-12-20

    ... Ministry of Defense of Malaysia. The United States Government is prepared to license the export of these... manufacture of the M72A5 Light Anti-Armor Weapon (LAW) system for the Canadian Department of National Defense... domestic law enforcement and government agency customers in the approved sales territory. The United...

  16. Support Assistants for Fire Emergencies; Student Manual, Part A. Firefighting for Civil Defense Emergencies.

    Science.gov (United States)

    International Association of Fire Chiefs, New York, NY.

    A manual intended to help fire departments and Civil Defense organizations train people to support regular fire forces during a national emergency is presented. It contains 11 chapters: Introduction, Modern Weapons and Radioactive Fallout, Role of Fire Service in Civil Defense, Local Fire Department Organization, Role of Support Assistants in…

  17. Plasma radome designed for the EMP effects defense

    Science.gov (United States)

    Li, Zhigang; Wang, Jiachun; Cheng, Li; Wang, Qichao

    2016-11-01

    Radar, as the main detection means, plays an extremely important role in modern warfare. However, it is easily attacked by the electromagnetic pulse (EMP) weapon. In order to defense the threat, a radome formed by plasma is designed. The plasma radome is used to protect the radar systems against EMP coupling through both `front door' and `back door'. What's more, the damage effects of EMP to the radar systems are analyzed, and the protection mechanism of plasma to EMP weapon is discussed. In addition, a simulation experiment is carried out to verify the feasibility of the plasma radome to defense against EMP. The results indicate that the structure performs well, which makes it a new method against EMP weapon.

  18. History of Laser Weapon Research

    Science.gov (United States)

    2012-01-01

    surgery/medicine, hair re- moval, presentation pointers, law enforcement, ranging and sighting devices, welding applications, and much more. Using...other laser technology develop- ments. The first chemical laser, hydrogen fluoride ( HF ), was built in 1965, producing 1 kW. It was then that DoD became...energy laser (HEL) weapons. In industry, the more powerful CO2 lasers are used for weld - ing, drilling, and cutting. There are many different types

  19. Deterrence and Cyber-Weapons

    Science.gov (United States)

    2013-03-01

    67, no. 4 (2012): 41. 4 Scott Shackelford , “Estonia Three Years Later,” Journal of Internet Law 8, no. 13 (2010): 25. 3 weapons were employed...effects of 134 Scott Shackelford , “From Nuclear War to Net War: Analogizing Cyber-Attacks in...International Law,” (unpublished paper, Stanford University), 5-6. 135 Shackelford , unpublished paper, 76. 136 Ibid., 73. 137 Mary Ellen O’Connell, “Cyber

  20. Department of Defense Homeland Security Joint Operating Concept

    Science.gov (United States)

    2004-02-01

    electronic warfare, physical attack and/or destruction, and special information operations, and could include computer network attack.”19 In 2015...electronic warfare, and special information operations. Defensive information operations ensure timely, accurate, and relevant information access while...security, counter-deception, counter- psychological operations, counter-intelligence, electronic warfare, and special information operations. Defensive

  1. The bane of "inhumane" weapons and overkill: an overview of increasingly lethal arms and the inadequacy of regulatory controls.

    Science.gov (United States)

    Richardson, Jacques G

    2004-10-01

    Weapons of both defense and offense have grown steadily in their effectiveness--especially since the industrial revolution. The mass destruction of humanity, by parts or in whole, became reality with the advent of toxic agents founded on chemistry and biology or nuclear weapons derived from physics. The military's new non-combat roles, combined with a quest for non-lethal weapons, may change the picture in regard to conventional defense establishments but are unlikely to deter bellicose tyrants or the new terrorists from using the unlimited potential of today's and tomorrow's arsenals. The author addresses the issues that are raised by this developing situation with the intent of seeking those ethics that will enable us to survive in a future and uncertain world.

  2. 36 CFR 2.4 - Weapons, traps and nets.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 1 2010-07-01 2010-07-01 false Weapons, traps and nets. 2.4... PROTECTION, PUBLIC USE AND RECREATION § 2.4 Weapons, traps and nets. (a)(1) Except as otherwise provided in... prohibited: (i) Possessing a weapon, trap or net (ii) Carrying a weapon, trap or net (iii) Using a weapon...

  3. Optimization of Aimpoints for Coordinate Seeking Weapons

    Science.gov (United States)

    2015-09-01

    process. The program works by first taking in the number of weapons used and arranging them in a fixed uniform spacing on a circle centered on the...MATLAB program is used as the coding tool for the development of this algorithm and the optimization process. The program works by first taking in the...number of weapons used and arranging them in a fixed uniform spacing on a circle centered on the assumed target location. Then, the weapon

  4. New weapons and the arms race

    Energy Technology Data Exchange (ETDEWEB)

    Tsipis, K.

    1983-01-01

    In speaking about technologies that could further animate the weapons competition between the US and the USSR, it is useful to distinguish between technologies that have already been incorporated into specific weapons systems, and new technologies that are of a generic nature, can be used in a variety of applications, and can best be described by the tasks that they can perform rather than any specific weapons' application. The author discusses these in reverse order.

  5. A different kind of weapon focus: simulated training with ballistic weapons reduces change blindness

    OpenAIRE

    Taylor, J. Eric T.; Witt, Jessica K.; Pratt, Jay

    2017-01-01

    Attentional allocation is flexibly altered by action-related priorities. Given that tools – and specifically weapons – can affect attentional allocation, we asked whether training with a weapon or holding a weapon during search would affect change detection. In three experiments, participants searched for changes to agents, shootable objects, or environments in the popular flicker paradigm. Participants trained with a simulated weapon or watched a video from the same training perspective and ...

  6. 76 FR 6087 - Draft Weapons Safety Assessment on the Use of Enhanced Weapons; Notice of Availability and...

    Science.gov (United States)

    2011-02-03

    ... Draft Weapons Safety Assessment on the Use of Enhanced Weapons; Notice of Availability and Request for... ``Weapons Safety Assessment'' (WSA). This guidance would be used by licensees and certificate holders applying to the NRC to obtain enhanced weapons under the NRC's proposed rule titled ``Enhanced Weapons...

  7. Sources Of Evolution Of The Japan Air Self Defense Force’s Strategy

    Science.gov (United States)

    2016-12-01

    EVOLUTION OF THE JAPAN AIR SELF- DEFENSE FORCE’S STRATEGY by Kisung Nam December 2016 Thesis Advisor: Wade L. Huntley Co-Advisor: Robert...COVERED Master’s thesis 4. TITLE AND SUBTITLE SOURCES OF EVOLUTION OF THE JAPAN AIR SELF-DEFENSE FORCE’S STRATEGY 5. FUNDING NUMBERS 6. AUTHOR(S...DISTRIBUTION CODE 13. ABSTRACT (maximum 200words) The Japan Air Self-Defense Force’s (JASDF) activities, training, and weapons after the first

  8. Response surface method using grey relational analysis for decision making in weapon system selection

    Institute of Scientific and Technical Information of China (English)

    Peng Wang; Peng Meng; Baowei Song

    2014-01-01

    A proper weapon system is very important for a na-tional defense system. General y, it means selecting the optimal weapon system among many alternatives, which is a multiple-attribute decision making (MADM) problem. This paper proposes a new mathematical model based on the response surface method (RSM) and the grey relational analysis (GRA). RSM is used to obtain the experimental points and analyze the factors that have a significant impact on the selection results. GRA is used to an-alyze the trend relationship between alternatives and reference series. And then an RSM model is obtained, which can be used to calculate al alternatives and obtain ranking results. A real world application is introduced to il ustrate the utilization of the model for the weapon selection problem. The results show that this model can be used to help decision-makers to make a quick comparison of alternatives and select a proper weapon system from multiple alternatives, which is an effective and adaptable method for solving the weapon system selection problem.

  9. Strategic defense and the Western alliance

    Energy Technology Data Exchange (ETDEWEB)

    Lakoff, S.; Willoughby, R. (Univ. of California, CA (US))

    1987-01-01

    Strategic defense has again become a major item on the agenda of the Western Alliance. Revived by President Ronald Reagan in his Star Wars speech of March 1983, and implemented in his Strategic Defense Initiative, it has achieved renewed emphasis in military spending, in alliance research efforts, and in arms control negotiations. SDI is packaged in a way that makes it the largest single item in the Department of Defense's annual budget. It engages researchers in industrial and military laboratories on both sides of the Atlantic as well as in Japan and Israel. In the arms control negotiations now under way between the United States and the USSR, the conduct of this research and its implications for the strategic balance and the reduction of offensive weapons are critical considerations. The implications of this largely unexpected development are the subject of this book.

  10. [Myocardial infarction after conduction electrical weapon shock].

    Science.gov (United States)

    Ben Ahmed, H; Bouzouita, K; Selmi, K; Chelli, M; Mokaddem, A; Ben Ameur, Y; Boujnah, M R

    2013-04-01

    Controversy persists over the safety of conducted electrical weapons, which are increasingly used by law enforcement agencies around the world. We report a case of 33-year-old man who had an acute inferior myocardial infarction after he was shot in the chest with an electrical weapon. Copyright © 2012 Elsevier Masson SAS. All rights reserved.

  11. Radioactive Fallout From Nuclear Weapons Testing ...

    Science.gov (United States)

    2017-08-07

    Detonating nuclear weapons above ground sends radioactive materials into the atmosphere from the ground level up to very high elevations. Overtime, these materials settle out of the atmosphere and fall to the ground. Fallout typically contains hundreds of different radionuclides. Since the end of aboveground nuclear weapons testing, radionuclides have largely decayed away.

  12. Color image fusion for concealed weapon detection

    NARCIS (Netherlands)

    Toet, A.

    2003-01-01

    Recent advances in passive and active imaging sensor technology offer the potential to detect weapons that are concealed underneath a person's clothing or carried along in bags. Although the concealed weapons can sometimes easily be detected, it can be difficult to perceive their context, due to the

  13. Weapons Acquisition. Processes of Selected Foreign Government.

    Science.gov (United States)

    1986-02-01

    period from 1977 to 1985: (1) 5.56mm calibre assault rifle. (2) Milan and Hot antitank weapon systems. (3) Roland ground-to-air weapon system. (4) AMX 30...and standardization edicts . Awards and penalties are laid on accordingly. (7/17, 13/20) The ministries stand apart from one another in the same way

  14. Nuclear weapons, nuclear effects, nuclear war

    Energy Technology Data Exchange (ETDEWEB)

    Bing, G.F.

    1991-08-20

    This paper provides a brief and mostly non-technical description of the militarily important features of nuclear weapons, of the physical phenomena associated with individual explosions, and of the expected or possible results of the use of many weapons in a nuclear war. Most emphasis is on the effects of so-called ``strategic exchanges.``

  15. Color image fusion for concealed weapon detection

    NARCIS (Netherlands)

    Toet, A.

    2003-01-01

    Recent advances in passive and active imaging sensor technology offer the potential to detect weapons that are concealed underneath a person's clothing or carried along in bags. Although the concealed weapons can sometimes easily be detected, it can be difficult to perceive their context, due to the

  16. Overview of surplus weapons plutonium disposition

    Energy Technology Data Exchange (ETDEWEB)

    Rudy, G.

    1996-05-01

    The safe disposition of surplus weapons useable plutonium is a very important and urgent task. While the functions of long term storage and disposition directly relate to the Department`s weapons program and the environmental management program, the focus of this effort is particularly national security and nonproliferation.

  17. Childhood maltreatment and threats with weapons.

    Science.gov (United States)

    Casiano, Hygiea; Mota, Natalie; Afifi, Tracie O; Enns, Murray W; Sareen, Jitender

    2009-11-01

    The relationship between childhood maltreatment and future threats with weapons is unknown. We examined data from the nationally representative National Comorbidity Survey Replication (n = 5692) and conducted multiple logistic regression analyses to determine the association between childhood maltreatment and lifetime behavior of threatening others with a gun or other weapon. After adjusting for sociodemographic variables, physical abuse, sexual abuse, and witnessing domestic violence were significantly associated with threats made with a gun (adjusted odds ratios [AOR] ranging between 3.38 and 4.07) and other weapons (AOR ranging between 2.16 and 2.83). The greater the number of types of maltreatment experienced, the stronger the association with lifetime threats made to others with guns and any weapons. Over 94% of respondents who experienced maltreatment and made threats reported that the maltreatment occurred prior to threatening others with weapons. Prevention efforts that reduce exposure to maltreatment may reduce violent behavior in later life.

  18. Weapon Control System for Airborne Application.

    Directory of Open Access Journals (Sweden)

    M. Sankar Kishore

    2000-07-01

    Full Text Available The integrated fire' control system (IFCS plays an important role in the present-day fighter aircraft and helicopters. Wecapons, such as missiles (active/passive, rockets and guns may be present on thelfighter aircraft or helicopter .IFCS monitors the status of the weapons present on the vehicle and passes the information to pilot/co-pilot. Depending upon the health/availability of the weapons, IFCS selects/fires the weapons. An attempt has been made to bring out the details of one such IFCS. As a I stepping stone, smaller version is developed and same philosophy can be used for integrating ftlore and I more weapons. Here, emphasis has been made on design and development of weapon control unit which is the heart f IFCS, both in hardware and software. The system has been developed using a 486 DX2 processor, and an elaborate software has been developed in PL/M.

  19. Origins of the Tactical Nuclear Weapons Modernization Program: 1969-1979

    Science.gov (United States)

    Yaffe, Michael David

    On December 12, 1979, the North Atlantic Treaty Organization decided to deploy new long-range theater nuclear forces, Pershing II and Ground-Launched Cruise Missiles. This marked the first major change in NATO's nuclear stockpile since the adoption of the flexible response strategy in 1967. The decision was controversial inasmuch as the Allies disagreed on the fundamental role of nuclear weapons in this strategy and, thereby, the types and number of weapons required for an effective deterrent posture. Europeans generally preferred long-range weapons capable of striking the Soviet Union and small conventional forces while Americans preferred shorter-range nuclear weapons and a stalwart conventional defense. Thus, the December decision is often described as purely politically motivated, in which the Americans reluctantly acquiesced to a European initiative for long-range weapons, prominently expressed by West German Chancellor Helmut Schmidt in 1977. Recently declassified US government documents reveal, however, that long-range missiles were part of a long-term comprehensive nuclear modernization program conceived in the Pentagon under Defense Secretary James Schlesinger during the period of 1973 through 1975, and presented to skeptical European elites who favored arms control negotiations over costly new deployments. This program was motivated as much by changes in the American national security culture as by an increase in the Soviet military threat to Europe. It was grounded on a clear military rationale: "that a feasible and affordable conventional defense is only possible if NATO has modern nuclear forces" that can effectively hold at risk Warsaw Pact ground and air forces throughout the depth of their employment from the inner-German border to the western military districts of the Soviet Union. When the new US administration in 1977 disagreed with the modernization plan and its rationale, opting instead for more conventional forces, the Allies in a reversal of

  20. Weapon Involvement in the Victimization of Children.

    Science.gov (United States)

    Mitchell, Kimberly J; Hamby, Sherry L; Turner, Heather A; Shattuck, Anne; Jones, Lisa M

    2015-07-01

    To report the prevalence of weapons involved in the victimization of youth with particular emphasis on weapons with a "high lethality risk" and how such exposure fits into the broader victimization and life experiences of children and adolescents. Data were collected as part of the Second National Survey of Children's Exposure to Violence, a nationally representative telephone survey of youth ages 2 to 17 years and caregivers (N = 4114) conducted in 2011. Estimates from the Second National Survey of Children's Exposure to Violence indicate that almost 14 million youth, ages 2–17, in the United States have been exposed to violence involving a weapon in their lifetimes as witnesses or victims,or .1 in 5 children in this age group [corrected]. More than 2 million youth in the United States (1 in 33) have been directly assaulted in incidents where the high lethality risk weapons of guns and knives were used. Differences were noted between victimizations involving higher and lower lethality risk weapons as well as between any weapon involvement versus none. Poly-victims, youth with 7 or more victimization types, were particularly likely to experience victimization with any weapon, as well as victimization with a highly lethal weapon compared with nonpoly-victims. Findings add to the field's broadening conceptualization of youth victimization highlighting the potentially highly consequential risk factor of weapon exposure as a component of victimization experiences on the mental health of youth. Further work on improving gun safety practices and taking steps to reduce children's exposure to weapon-involved violence is warranted to reduce this problem. Copyright © 2015 by the American Academy of Pediatrics.

  1. Concealed weapons detection using electromagnetic resonances

    Science.gov (United States)

    Hunt, Allen R.; Hogg, R. Douglas; Foreman, William

    1998-12-01

    Concealed weapons pose a significant threat to both law enforcement and security agency personnel. The uncontrolled environments associated with peacekeeping and the move toward relaxation of concealed weapons laws here in the U.S. provide a strong motivation for developing weapons detection technologies which are noninvasive and can function noncooperatively. Existing weapons detection systems are primarily oriented to detecting metal and require the cooperation of the person being searched. The new generation of detectors under development that focuses primarily on imaging methods, faces problems associated with privacy issues. There remains a need for a weapons detector which is portable, detects weapons remotely, avoids the issues associated with privacy rights, can tell the difference between car keys and a knife, and is affordable enough that one can be issued to every peacekeeper and law enforcement officer. AKELA is developing a concealed weapons detector that uses wideband radar techniques to excite natural electromagnetic resonances that characterize the size, shape, and material composition of an object. Neural network processing is used to classify the difference between weapons and nuisance objects. We have constructed both time and frequency domain test systems and used them to gather experimental data on a variety of armed and unarmed individuals. These experiments have been performed in an environment similar to the operational environment. Preliminary results from these experiments show that it is possible to detect a weapon being carried by an individual from a distance of 10 to 15 feet, and to detect a weapon being concealed behind the back. The power required is about 100 milliwatts. A breadboard system is being fabricated and will be used by AKELA and our law enforcement partner to gather data in operationally realistic situations. While a laptop computer will control the breadboard system, the wideband radar electronics will fit in a box the

  2. Excess Weapons Plutonium Immobilization in Russia

    Energy Technology Data Exchange (ETDEWEB)

    Jardine, L.; Borisov, G.B.

    2000-04-15

    The joint goal of the Russian work is to establish a full-scale plutonium immobilization facility at a Russian industrial site by 2005. To achieve this requires that the necessary engineering and technical basis be developed in these Russian projects and the needed Russian approvals be obtained to conduct industrial-scale immobilization of plutonium-containing materials at a Russian industrial site by the 2005 date. This meeting and future work will provide the basis for joint decisions. Supporting R&D projects are being carried out at Russian Institutes that directly support the technical needs of Russian industrial sites to immobilize plutonium-containing materials. Special R&D on plutonium materials is also being carried out to support excess weapons disposition in Russia and the US, including nonproliferation studies of plutonium recovery from immobilization forms and accelerated radiation damage studies of the US-specified plutonium ceramic for immobilizing plutonium. This intriguing and extraordinary cooperation on certain aspects of the weapons plutonium problem is now progressing well and much work with plutonium has been completed in the past two years. Because much excellent and unique scientific and engineering technical work has now been completed in Russia in many aspects of plutonium immobilization, this meeting in St. Petersburg was both timely and necessary to summarize, review, and discuss these efforts among those who performed the actual work. The results of this meeting will help the US and Russia jointly define the future direction of the Russian plutonium immobilization program, and make it an even stronger and more integrated Russian program. The two objectives for the meeting were to: (1) Bring together the Russian organizations, experts, and managers performing the work into one place for four days to review and discuss their work with each other; and (2) Publish a meeting summary and a proceedings to compile reports of all the excellent

  3. Weapons barrel life cycle determination

    Directory of Open Access Journals (Sweden)

    Nebojša Pene Hristov

    2013-10-01

    Full Text Available This article describes the dynamic processes within the gun barrel during the firing process in exploitation. It generally defines the basic principles of constructing tube elements, and shows the distortion of the basic geometry of the tube interior due to wear as well as the impact it causes during exploitation. The article also defines basic empirical models as well as a model based on fracture mechanics for the calculation of a use-life of the barrel, and other elements essential for the safe use of the barrel as the basic weapon element. Erosion causes are analysed in order to control and reduce wear and prolong the lifetime of the gun barrel. It gives directions for the reparation of barrels with wasted resources. In conclusion, the most influential elements of tube wear are given as well as possible modifications of existing systems, primarily propellant charges, with a purpose of prolonging lifetime of gun barrels. The guidelines for a proper determination of the lifetime based on the barrel condition assessment are given as well. INTRODUCTION The barrel as the basic element of each weapon is described as well as the processes occurring during the firing that have impulsive character and are accompanied by large amounts of energy. The basic elements of barrel and itheir constructive characteristics are descibed. The relation between Internal ballistics, ie calculation of the propellant gas pressure in the firing process, and structural elements defined by the barrel material resistance is shown. In general, this part of the study explains the methodology of the gun barrel structural elements calculation, ie. barrel geometry, taking into account the degrees of safety in accordance with Military Standards.   TUBE WEAR AND DEFORMATIONS The weapon barrel gradually wears out during exploitation due to which it no longer satisfies the set requirements. It is considered that the barrel has experienced a lifetime when it fails to fulfill the

  4. Audit Report on "Management Controls over the Department's Excess Weapons Inventories and Selected Sensitive Equipment used by Protective Forces"

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-01-01

    Since September 11, 2001, the Department of Energy has, on several occasions, revised its security posture based on identified threats and adversaries. These revisions in security posture have driven Departmental sites to upgrade their defensive and tactical equipment. Subsequent changes in the perceived threats have, in some cases, led to a reduction in the need for certain types of weapons, thus creating a pool of surplus equipment. These surplus weapons could potentially be used by other Department sites and Federal law enforcement agencies. Recent Office of Inspector General reports have raised concerns with the adequacy of controls related to defensive and tactical equipment. For example, our report on Management Controls Over Defense Related High Risk Property (OAS-M-08-06, April 2008) found that administrative controls over certain defense related high risk property were not sufficient for providing accountability over these items. Because of prior reported weaknesses in controls over defensive and tactical equipment, we initiated this audit to determine whether the Department and its contractors were properly managing excess weapons inventories and selected sensitive equipment used by protective forces. Our review disclosed that the Department was not always properly managing its inventories of excess weapons and selected sensitive equipment. We identified issues with the retention of unneeded weapons at many locations and with the identification and tracking of sensitive items. More specifically: Sites maintained large inventories of weapons that were no longer needed but had not been made available for use by either other Departmental sites or other Federal law enforcement agencies. For instance, at six of the locations included in our review we identified a total of 2,635 unneeded weapons with a total acquisition value of over $2.8 million that had not been officially declared as excess - an action that would have made them available for others to use

  5. Optomechanical design of a field-deployable thermal weapon sight

    Science.gov (United States)

    Boucher, Marc-André; Desnoyers, Nichola; Bernier, Sophie; Bergeron, Alain; Doucet, Michel; Lagacé, François; Laou, Philips

    2007-09-01

    The use of uncooled infrared (IR) imaging technology in Thermal Weapon Sight (TWS) systems produces a unique tool that perfectly fulfills the all-weather, day-and-night vision demands in modern battlefields by significantly increasing the effectiveness and survivability of a dismounted soldier. The main advantage of IR imaging is that no illumination is required; therefore, observation can be accomplished in a passive mode. It is particularly well adapted for target detection even through smoke, dust, fog, haze, and other battlefield obscurants. In collaboration with the Defense Research and Development Canada (DRDC Valcartier), INO engineering team developed, produced, and tested a rugged thermal weapon sight. An infrared channel provides for human detection at 800m and recognition at 200m. Technical system requirements included very low overall weight as well as the need to be field-deployable and user-friendly in harsh conditions. This paper describes the optomechanical design and focuses on the catadioptric-based system integration. The system requirements forced the optomechanical engineers to minimize weight while maintaining a sufficient level of rigidity in order to keep the tight optical tolerances. The optical system's main features are: a precision manual focus, a watertight vibration insulated front lens, a bolometer and two gold coated aluminum mirrors. Finite element analyses using ANSYS were performed to validate the subsystems performance. Some of the finite element computations were validated using different laboratory setups.

  6. Insects as weapons of war, terror, and torture.

    Science.gov (United States)

    Lockwood, Jeffrey A

    2012-01-01

    For thousands of years insects have been incorporated into human conflict, with the goals of inflicting pain, destroying food, and transmitting pathogens. Early methods used insects as "found" weapons, functioning as tactical arms (e.g., hurled nests) or in strategic habitats (e.g., mosquito-infested swamps). In the twentieth century the relationship between insects and disease was exploited; vectors were mass-produced to efficiently deliver pathogens to an enemy. The two most sophisticated programs were those of the Japanese in World War II with plague-infected fleas and cholera-coated flies and of the Americans during the Cold War with yellow fever-infected mosquitoes. With continued advances, defenses in the form of insecticides and vaccines meant that insects were no longer considered as battlefield weapons. However, in recent times sociopolitical changes have put insects back into the realm of human conflict through asymmetrical conflicts pitting combatants from nonindustrialized regions against forces from militarily and economically superior nations. Copyright © 2012 by Annual Reviews. All rights reserved.

  7. Actuality and Development Trend of New Concept Weapons%新概念武器的现状与发展趋势

    Institute of Scientific and Technical Information of China (English)

    王明东; 王天祥

    2014-01-01

    新概念武器是机理独特、杀伤破坏作用显著的高新技术武器,对未来战争将产生巨大影响。主要分析了新概念武器的特征、类别,重点介绍了起步早、效能好、相对成熟的网络攻防武器、电磁轨道炮、强激光武器、高功率微波武器的现状,对新概念武器的发展瓶颈与趋势进行了阐述。%New concept weapons are high-tech weapons with unique mechanism and significant anti-dama-ging effects.It will have huge impact on the future wars.This paper introduces characteristics,classifica-tion of new concept weapons.It focuses on development status of some earlier researched and good per-formed weapons,such as network attack and defense weapons,electromagnetic rail guns,high-energy la-ser weapons and high-power microwave weapons.The development bottleneck and development trend of new concept weapons are analyzed.

  8. Taser and Conducted Energy Weapons.

    Science.gov (United States)

    LeClair, Thomas G; Meriano, Tony

    2015-01-01

    It is clear that CEWs are an increasingly prevalent law enforcement tool, adopted to address a complex and challenging problem. The potential for serious injury from a single deployment of a CEW is extremely low. The debate regarding the link between these electrical weapons and sudden in-custody death is likely to continue because their use is often in complex and volatile situations. Any consideration of injuries has to be put into that context. One must also consider what injuries to a subject would result if an alternative force method was used. Furthermore, the potential benefits of CEWs, including reduction in injuries to the public and law-enforcement officers, need to be considered.

  9. Air guns: toys or weapons?

    Science.gov (United States)

    Aslan, Sahin; Uzkeser, Mustafa; Katirci, Yavuz; Cakir, Zeynep; Bilir, Ozlem; Bilge, Fatih; Cakir, Murtaza

    2006-09-01

    Air guns and blank guns may appear relatively harmless at first glance, but they are, in fact, potentially destructive, even lethal, weapons. Approximately 2 to 2.5 million nonpowder firearms are sold annually, and again approximately 12.9 per 100,000 population are treated for such injuries in hospital emergency departments each year in the United States. Unfortunately, these guns are considered to be a toy for children. Therefore, incidents of air gun injuries are gradually increasing. Although such injuries may initially be considered trivial, it may signify severe internal tissue pathologies. These apparently trivial injuries may have catastrophic consequences if unnoticed. In this study, we report 4 cases with head injury due to a shot by these guns. The cases indicate that these people had used the guns belonging to their parents for the purpose of suicide. The cases also show that these machines are not innocent.

  10. Electronic eyebox for weapon sights

    Science.gov (United States)

    Szapiel, Stan; Greenhalgh, Catherine; Wagner, Kevin; Nobes, Ryan

    2016-05-01

    We expand the effective size of the eyebox of a magnified telescopic weapon sight by following the movements of the operator's eye to create a larger, `electronic eyebox'. The original eyebox of the telescope is dynamically relocated in space so that proper overlap between the pupil of the eye and the exit pupil of the device is maintained. Therefore, the operator will perceive the entire field of view of the instrument in a much bigger spatial region than the one defined by the original eyebox. Proof-of-the-concept results are presented with a more than 3.5X enlargement of the eyebox volume along with recommendations for the next phase of development.

  11. Report on the bill project related to the struggle against proliferation of weapons of mass destruction and their delivery systems; Rapport fait au Nom de la Commission de la Defense Nationale et des Forces Armees sur le Projet de Loi (n. 1652) relatif a la lutte contre la proliferation des armes de destruction massive et de leurs vecteurs

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    In a first part presenting the various forms of proliferations, the author first gives a quantitative overview of illegal activities concerning nuclear materials, and then discusses the existence and activities of proliferation networks, explaining how international trade liberalization creates a favourable context for proliferations of any kind, and describing how a typical network is organised. He also discusses the example of Iraq and the case of the network created by the Pakistani scientist Abdul Q. Khan. The risk created by the hypothetical relationship between terrorism and nuclear weapon of mass destruction is also questioned. Then, after having recalled the existing international texts and the present national legislation, the author comments the contribution on the bill project and outlines aspects which are not dealt with by this bill project: radiological devices and cybernetic attacks. Then he reports the comments made by the commission on the bill project articles which define interdictions, sanctions and sentences, or procedures against people or organisations involved in the financing or the use of weapons of mass destruction (biological and chemical). A table gives a comparison between the bill project text and the commission's propositions

  12. [New challenges in the biological weapons convention].

    Science.gov (United States)

    Sissonen, Susanna; Raijas, Tiina; Haikala, Olli; Hietala, Heikki; Virri, Markku; Nikkari, Simo

    2012-01-01

    Microbes and their toxins are biological weapons that can cause disease in humans, animals or plants, and which can be used with hostile intent in warfare and terrorism. Biological agents can be used as weapons of mass destruction and therefore, immense human and social and major economical damage can be caused. Rapid development of life sciences and technologies during the recent decades has posed new challenges to the Biological Weapons Convention. The Convention states that the States Parties to the BWC strive to ensure that the Convention remains relevant and effective, despite changes in science, technology or politics.

  13. The Spear: An Effective Weapon Since Antiquity

    OpenAIRE

    Robert E. Dohrenwend

    2012-01-01

    The spear is perhaps man’s oldest weapon, and may even be his oldest tool. Over the hundreds of thousands of years of the weapon’s existence, it evolved from a pointed stick into an efficient hunting missile, and then became the most effective hand-held bladed weapon humans ever devised. The spear and its use is the only martial art originally devised for use against species other than our own, and more than any other weapon, the spear emphasizes the relationship between hunting and warfare. ...

  14. Antioxidative defense

    Directory of Open Access Journals (Sweden)

    Stevanović Jelka

    2011-01-01

    Full Text Available Free radicals occur constantly during metabolism and take part in numerous physiological processes, such as: intra-cellular and inter-cellular signalization, gene expression, removal of damaged or senescent cells, and control of the tone of blood vessels. However, there is an increased quantity of free radicals in situations of so-called oxidative stress, when they cause serious damage to cellular membranes (peroxidation of their lipids, damage of membrane proteins, and similar, to interior cellular protein molecules, as well as DNA molecules and carbohydrates. This is precisely why the organism has developed numerous mechanisms for removing free radicals and/or preventing their production. Some of these are enzyme-related and include superoxide-dismutase, catalase, glutathione-peroxidase, and others. Other, non-enzyme mechanisms, imply antioxidative activities of vitamins E and C, provitamin A, coenzyme Q, reduced glutation, and others. Since free radicals can leave the cell that has produced them and become dispersed throughout the body, in addition to antioxidative defense that functions within cellular structures, antioxidant extra-cellular defense has also been developed. This is comprised by: transferrin, lactoferrin, haptoglobin, hemopexin, ceruloplasmin, albumins, extra-cellular isoform SOD, extracellular glutathione-peroxidase, glucose, bilirubin, urates, and many other molecules.

  15. Application of a Dynamic Programming Algorithm for Weapon Target Assignment

    Science.gov (United States)

    2016-02-01

    UNCLASSIFIED UNCLASSIFIED Application of a Dynamic Programming Algorithm for Weapon Target Assignment Lloyd Hammond Weapons and...Combat Systems Division Defence Science and Technology Group DST Group-TR-3221 ABSTRACT Threat evaluation and weapon assignment...dynamic programming algorithm for Weapon Target Assignment which, after more rigorous testing, could be used as a concept demonstrator and as an auxiliary

  16. 36 CFR 1002.4 - Weapons, traps and nets.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Weapons, traps and nets. 1002... AND RECREATION § 1002.4 Weapons, traps and nets. (a)(1) Except as otherwise provided in this section, the following are prohibited: (i) Possessing a weapon, trap or net. (ii) Carrying a weapon, trap or...

  17. 43 CFR 15.11 - Explosives and dangerous weapons.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Explosives and dangerous weapons. 15.11... § 15.11 Explosives and dangerous weapons. No person shall carry, use or possess within the Preserve... other kind of weapon potentially harmful to the reef structure. The use of such weapons from beyond the...

  18. A different kind of weapon focus: simulated training with ballistic weapons reduces change blindness.

    Science.gov (United States)

    Taylor, J Eric T; Witt, Jessica K; Pratt, Jay

    2017-01-01

    Attentional allocation is flexibly altered by action-related priorities. Given that tools - and specifically weapons - can affect attentional allocation, we asked whether training with a weapon or holding a weapon during search would affect change detection. In three experiments, participants searched for changes to agents, shootable objects, or environments in the popular flicker paradigm. Participants trained with a simulated weapon or watched a video from the same training perspective and then searched for changes while holding a weapon or a control object. Results show an effect of training, highlighting the importance of sensorimotor experience for the action-relevant allocation of attention, and a possible interaction between training and the object held during search. Simulated training with ballistic weapons reduces change blindness. This result has implications for the interaction between tool use and attentional allocation.

  19. Controlling Weapons-Grade Fissile Material

    Science.gov (United States)

    Rotblat, J.

    1977-01-01

    Discusses the problems of controlling weapons-grade fissionable material. Projections of the growth of fission nuclear reactors indicates sufficient materials will be available to construct 300,000 atomic bombs each containing 10 kilograms of plutonium by 1990. (SL)

  20. Weapons dismantlement issues in independent Ukraine

    Energy Technology Data Exchange (ETDEWEB)

    Zack, N.R. [Los Alamos National Lab., NM (United States); Kirk, E.J. [American Association for the Advancement of Science, Washington, DC (United States)

    1994-07-01

    The American Association for the Advancement of Science sponsored a seminar during September 1993, in Kiev, Ukraine, entitled ``Toward a Nuclear Free Future -- Barriers and Problems.`` It brought together Ukrainians, Belarusians, and Americans to discuss the legal, political, safeguards and security, economic, and technical dimensions of nuclear weapons dismantlement and destruction. US representatives initiated discussions on legal and treaty requirements and constraints, safeguards and security issues surrounding dismantlement, storage and disposition of nuclear materials, warhead transportation, and economic considerations. Ukrainians gave presentations on arguments for and against the Ukraine keeping nuclear weapons, Ukrainian Parliament non-approval of START I, alternative strategies for dismantling silos and launchers, and economic and security implications of nuclear weapons removal from the Ukraine. Participants from Belarus discussed proliferation and control regime issues, This paper will highlight and detail the issues, concerns, and possible impacts of the Ukraine`s dismantlement of its nuclear weapons.

  1. Computational Challenges in Nuclear Weapons Simulation

    Energy Technology Data Exchange (ETDEWEB)

    McMillain, C F; Adams, T F; McCoy, M G; Christensen, R B; Pudliner, B S; Zika, M R; Brantley, P S; Vetter, J S; May, J M

    2003-08-29

    After a decade of experience, the Stockpile Stewardship Program continues to ensure the safety, security and reliability of the nation's nuclear weapons. The Advanced Simulation and Computing (ASCI) program was established to provide leading edge, high-end simulation capabilities needed to meet the program's assessment and certification requirements. The great challenge of this program lies in developing the tools and resources necessary for the complex, highly coupled, multi-physics calculations required to simulate nuclear weapons. This paper describes the hardware and software environment we have applied to fulfill our nuclear weapons responsibilities. It also presents the characteristics of our algorithms and codes, especially as they relate to supercomputing resource capabilities and requirements. It then addresses impediments to the development and application of nuclear weapon simulation software and hardware and concludes with a summary of observations and recommendations on an approach for working with industry and government agencies to address these impediments.

  2. Europium-155 in Debris from Nuclear Weapons

    DEFF Research Database (Denmark)

    Aarkrog, Asker; Lippert, Jørgen Emil

    1967-01-01

    The lithium-drifted germanium detector enables determination of europium-155 on a routine basis in environmental samples contaminated with debris from nuclear weapons. From measurements of europium-155, cesium-144, and strontium-90 in air filters collected between 1961 and 1966, the yield...... of europium-155 from weapons was estimated at 1400 atoms per 10$^{6}$ fissions, which is close to the yield of europium-155 from fast fission of uranium-238....

  3. The Basis of the Material Culture of the Highlanders Military Time (Weapons and Fortifications

    Directory of Open Access Journals (Sweden)

    Nadezhda O. Bleikh

    2015-06-01

    Full Text Available On the basis of underutilized documentary material in the article analyses the role of material culture of the highlanders wartime (XIII - XVIII centuries, includes weapons and defensive structures. It says that all Caucasian people have thought through a clear system of defense against not only external enemies, but also his countrymen, encouraged by the raids of the feudal elite, need, and personal prowess. So there in the Caucasus almost none of the village, above the buildings which did not dominate combat or residential towers, and on the adjacent territory had defensive walls and customs gate, the cave (rock fortifications and fortresses, castle complexes of the type. It is proved that the fortification culture of the Caucasian peoples had their characteristic genetic link with empirical housing and therefore was an all positive achievements of ethnic architecture. It is his creative activity, vividly reflected in the monuments of history and culture lived in the territory of the peoples.

  4. Overall View of Chemical and Biochemical Weapons

    Science.gov (United States)

    Pitschmann, Vladimír

    2014-01-01

    This article describes a brief history of chemical warfare, which culminated in the signing of the Chemical Weapons Convention. It describes the current level of chemical weapons and the risk of using them. Furthermore, some traditional technology for the development of chemical weapons, such as increasing toxicity, methods of overcoming chemical protection, research on natural toxins or the introduction of binary technology, has been described. In accordance with many parameters, chemical weapons based on traditional technologies have achieved the limit of their development. There is, however, a big potential of their further development based on the most recent knowledge of modern scientific and technical disciplines, particularly at the boundary of chemistry and biology. The risk is even higher due to the fact that already, today, there is a general acceptance of the development of non-lethal chemical weapons at a technologically higher level. In the future, the chemical arsenal will be based on the accumulation of important information from the fields of chemical, biological and toxin weapons. Data banks obtained in this way will be hardly accessible and the risk of their materialization will persist. PMID:24902078

  5. Overall view of chemical and biochemical weapons.

    Science.gov (United States)

    Pitschmann, Vladimír

    2014-06-04

    This article describes a brief history of chemical warfare, which culminated in the signing of the Chemical Weapons Convention. It describes the current level of chemical weapons and the risk of using them. Furthermore, some traditional technology for the development of chemical weapons, such as increasing toxicity, methods of overcoming chemical protection, research on natural toxins or the introduction of binary technology, has been described. In accordance with many parameters, chemical weapons based on traditional technologies have achieved the limit of their development. There is, however, a big potential of their further development based on the most recent knowledge of modern scientific and technical disciplines, particularly at the boundary of chemistry and biology. The risk is even higher due to the fact that already, today, there is a general acceptance of the development of non-lethal chemical weapons at a technologically higher level. In the future, the chemical arsenal will be based on the accumulation of important information from the fields of chemical, biological and toxin weapons. Data banks obtained in this way will be hardly accessible and the risk of their materialization will persist.

  6. Overall View of Chemical and Biochemical Weapons

    Directory of Open Access Journals (Sweden)

    Vladimír Pitschmann

    2014-06-01

    Full Text Available This article describes a brief history of chemical warfare, which culminated in the signing of the Chemical Weapons Convention. It describes the current level of chemical weapons and the risk of using them. Furthermore, some traditional technology for the development of chemical weapons, such as increasing toxicity, methods of overcoming chemical protection, research on natural toxins or the introduction of binary technology, has been described. In accordance with many parameters, chemical weapons based on traditional technologies have achieved the limit of their development. There is, however, a big potential of their further development based on the most recent knowledge of modern scientific and technical disciplines, particularly at the boundary of chemistry and biology. The risk is even higher due to the fact that already, today, there is a general acceptance of the development of non-lethal chemical weapons at a technologically higher level. In the future, the chemical arsenal will be based on the accumulation of important information from the fields of chemical, biological and toxin weapons. Data banks obtained in this way will be hardly accessible and the risk of their materialization will persist.

  7. ENVIRONMENTAL CONTAMINATION FROM WEAPON TESTS

    Energy Technology Data Exchange (ETDEWEB)

    none

    1958-10-01

    The program of the Atomic Energy Commission on environmental contamination from weapons tests is designed for the overall evaluation of the hazard to humans from test operations. It is limited to studies of the deposition of activity at long range rather than the problems associated with immediate, close-in fallout. The program has largely been a study of Sr{sup 90}, since considerations based on experience and measurement indicate that it is the isotope of greatest potential hazard. Data are presented pertinent to the monitoring of long-range fallout, particularly Sr{sup 90} and Cs{sup 137}. Values are tabulated for the fallout deposition, air concentrations, water concentrations, and the amounts in foods and human bone. In addition, results are given for some experimental investigations. The report of these results is not interpretative although certain papers that do attempt to interpret the present situation with respect to Sr{sup 90} in particular are reprinted. Bibliographies are presented covering the period since the 1957 hearings before the Joint Committee on Atomic Energy concerning the nature of radioactive fallout and its effects on man. A document list of submissions to the United Nations Scientific Committee on the Effects of Atomic Radiation is given to illustrate the work done in other countries. Several papers on the subject, which have not been generally available, are reprinted.

  8. Application of passive defense in urban housing planning

    Directory of Open Access Journals (Sweden)

    H. Kamran

    2013-01-01

    Full Text Available Extended abstract1-IntroductionToday, with advances in the technology of weapons and military equipment, urban areas are most at risk of invasion. Among the most important factors in enhancing human casualties in military attacks on urban areas, one can point to the unrealistic architecture of houses which does not conform to principles such as optimal site selection and layout of the structure of human settlements, proper distribution, principles of concealment, camouflage and deception, the high degree of vulnerability of buildings and interior architecture of buildings with regard to passive defense. Structural arrangement of spaces and their connection with surrounding areas has created great opportunities for saving lives And improves system performance and reduces its vulnerability. This study with a descriptive-qualitative approach, investigates the role of passive defense in urban housing planning and the conclusions are used to create safe city, strong city and deterrent city. Results show that determining the geometric design of house, pop location, availability and predictability of secure spaces are regarded as multi-functional space for each building in times of peace and war are among the optimal components of building architecture and vernacular architecture from the perspective of a passive defense.Crises, threats and disasters are classified into two main categories: natural, including earthquakes, floods, landslides, droughts and human category such as war, accidents and diseases which are more than 50 types. The main objective of this study is investigating crisis caused by war in residential areas. In the full-scale military conflicts, one of the ultimate goals of the parties involved is making an effort to bring the breadth and scope of the battlefield to civilian centers especially to urban centers, which is usually accompanied by heavy air strikes. This act is one of the most effective strategies in the fate of wars

  9. Modern weapons and military equipment for issue no. 3-2015

    OpenAIRE

    ЙЕВТИЧ МИЛОШ М.

    2015-01-01

    Optimal features for concealed carry weapons. The specificity of jobs and tasks that require concealed carrying of weapons by officials require specific criteria when choosing personal weapons specialist.

  10. MODERN WEAPONS AND MILITARY EQUIPMENT FOR ISSUE NO. 3-2015

    OpenAIRE

    2015-01-01

    Optimal features for concealed carry weapons. The specificity of jobs and tasks that require concealed carrying of weapons by officials require specific criteria when choosing personal weapons specialist.

  11. 32 CFR 326.11 - Special procedures for disclosure of medical and psychological records.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Special procedures for disclosure of medical and psychological records. 326.11 Section 326.11 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL RECONNAISSANCE OFFICE PRIVACY ACT PROGRAM § 326.11 Special procedures...

  12. Dynamic WTA optimization model of air defense operation of warships' formation

    Institute of Scientific and Technical Information of China (English)

    Li Jinjun; Cong Rong; Xiong Jiguang

    2006-01-01

    WTA (weapon-target allocation) of air defense operation is a very complicated problem and current models focus on static and restricted WTA problem mostly. Based on the dynamic characteristics of air defense operational command and decision of warships' formation, a dynamic WTA model is established. Simulation results show that switch fire and repetition fire of anti-air weapon systems affect the result of the air defense operation remarkably and the dynamic model is more satisfying than static ones. Related results are gained based on the analysis of the simulation results and the results are accordant with the intuitionistic tactical judgment. The model is some reference for the research of air defense C3I system of warships' formation.

  13. Color image fusion for concealed weapon detection

    Science.gov (United States)

    Toet, Alexander

    2003-09-01

    Recent advances in passive and active imaging sensor technology offer the potential to detect weapons that are concealed underneath a person's clothing or carried along in bags. Although the concealed weapons can sometimes easily be detected, it can be difficult to perceive their context, due to the non-literal nature of these images. Especially for dynamic crowd surveillance purposes it may be impossible to rapidly asses with certainty which individual in the crowd is the one carrying the observed weapon. Sensor fusion is an enabling technology that may be used to solve this problem. Through fusion the signal of the sensor that depicts the weapon can be displayed in the context provided by a sensor of a different modality. We propose an image fusion scheme in which non-literal imagery can be fused with standard color images such that the result clearly displays the observed weapons in the context of the original color image. The procedure is such that the relevant contrast details from the non-literal image are transferred to the color image without altering the original color distribution of this image. The result is a natural looking color image that fluently combines all details from both input sources. When an observer who performs a dynamic crowd surveillance task, detects a weapon in the scene, he will also be able to quickly determine which person in the crowd is actually carrying the observed weapon (e.g. "the man with the red T-shirt and blue jeans"). The method is illustrated by the fusion of thermal 8-12 μm imagery with standard RGB color images.

  14. Future of clip-on weapon sights: pros and cons from an applications perspective

    Science.gov (United States)

    Knight, C. Reed; Greenslade, Ken; Francisco, Glen

    2015-05-01

    US Domestic, International, allied Foreign National Warfighters and Para-Military First Responders (Police, SWAT, Special Operations, Law Enforcement, Government, Security and more) are put in harm's way all the time. To successfully complete their missions and return home safely are the primary goals of these professionals. Tactical product improvements that affect mission effectiveness and solider survivability are pivotal to understanding the past, present and future of Clip-On in-line weapon sights. Clip-On Weapon Sight (WS) technology was deemed an interim solution by the US Government for use until integrated and fused (day/night multi-sensor) Weapon Sights (WSs) were developed/fielded. Clip-On has now become the solution of choice by Users, Warriors, Soldiers and the US Government. SWaP-C (size, weight and power -cost) has been improved through progressive advances in Clip-On Image Intensified (I2), passive thermal, LL-CMOS and fused technology. Clip-On Weapon Sights are now no longer mounting position sensitive. Now they maintain aim point boresight, so they can be used for longer ranges with increased capabilities while utilizing the existing zeroed weapon and daysight optic. Active illuminated low-light level (both analog I2 and digital LL-CMOS) imaging is rightfully a real-world technology, proven to deliver daytime and low-light level identification confidence. Passive thermal imaging is also a real-world technology, proven to deliver daytime, nighttime and all-weather (including dirty battlefield) target detection confidence. Image processing detection algorithms with intelligent analytics provide documented promise to improve confidence by reducing Users, Warriors and Soldiers' work-loads and improving overall system engagement solution outcomes. In order to understand the future of Clip-On in-line weapon sights, addressing pros and cons, this paper starts with an overview of historical weapon sight applications, technologies and stakeholder decisions

  15. Providing for the Common Defense? The Effects of Recent Arms Trade Reform on the Army Profession

    Science.gov (United States)

    2002-01-01

    Finnemore , Martha . National Interests in International Society. Cornell Studies in Political Economy. Edited by Peter J. Katzenstein. Ithaca: Cornell...taking both the economic and security interest behind the sale of weapons abroad into account, give more credence to national , regional, and global...defense and security of the Nation and its interests is constitutionally within the jurisdiction of the military professions. Even though defense

  16. Detecting necessary and sufficient parts for assembling a functional weapon

    Science.gov (United States)

    Hempelmann, Christian F.; Solomon, Divya; Arslan, Abdullah N.; Attardo, Salvatore; Blount, Grady P.; Adkins, Tracy; Sirakov, Nikolay M.

    2017-05-01

    Continuing our previous research to visually extract and visually and conceptually match weapons, this study develops a method to determine whether a set of weapon parts visually extracted from images taken from different scenes can be assembled as a firing weapon. This new approach identifies potential weapons in the ontology via tracing detected necessary and sufficient parts through their meronymic relation to the whole weapon. A fast algorithm for identifying potential weapons that can be assembled from a given set of detected parts is presented.

  17. Corrosion and conservation of weapons and military equipment

    Directory of Open Access Journals (Sweden)

    Bore V. Jegdić

    2012-01-01

    Full Text Available This paper analyzed the conditions for the occurrence of corrosion processes on historically important weapons and military equipment made of steel during the period in outdoor environment. A considerable attention has been given to the characteristics of the most important corrosion products formed on the steel surface. The formation of akaganite, β-FeOOH is a sign of active corrosion under a layer of corrosion products. The conditions that cause the formation and regeneration of hydrochloric and sulphuric acid during the exposure to the elements were analyzed. The most often applied methods of diagnostics and procedures of removing active corrosion anions (desalination were described as well. The NaOH solution of certain pH values still has the most important application for the desalination process. The procedures for cleaning the surface before the application of protective coatings and the application of chemicals that transform rust into stable compounds were discussed. As protective coatings, different types of organic coatings plated on well-prepared steel surfaces were used and sometimes special types of waxes as well. This paper presents the results of the tests of corrosion products taken from the exhibits of weapons and military equipment from the Military Museum in Belgrade.

  18. Nuclear weapons tests and environmental consequences: a global perspective.

    Science.gov (United States)

    Prăvălie, Remus

    2014-10-01

    The beginning of the atomic age marked the outset of nuclear weapons testing, which is responsible for the radioactive contamination of a large number of sites worldwide. The paper aims to analyze nuclear weapons tests conducted in the second half of the twentieth century, highlighting the impact of radioactive pollution on the atmospheric, aquatic, and underground environments. Special attention was given to the concentration of main radioactive isotopes which were released, such as ¹⁴C, ¹³⁷Cs, and ⁹⁰Sr, generally stored in the atmosphere and marine environment. In addition, an attempt was made to trace the spatial delimitation of the most heavily contaminated sites worldwide, and to note the human exposure which has caused a significantly increased incidence of thyroidal cancer locally and regionally. The United States is one of the important examples of assessing the correlation between the increase in the thyroid cancer incidence rate and the continental-scale radioactive contamination with ¹³¹I, a radioactive isotope which was released in large amounts during the nuclear tests carried out in the main test site, Nevada.

  19. Near-field millimeter-wave imaging for weapon detection

    Energy Technology Data Exchange (ETDEWEB)

    Sheen, D.M.; McMakin, D.L.; Collins, H.D.; Hall, T.E.

    1992-11-01

    Various millimeter-wave imaging systems capable of imaging through clothing for the detection of contraband metal, plastic, or ceramic weapons, have been developed at PNL. Two dimensional scanned holographic systems, developed at 35, 90, and 350 GHz, are used to obtain high resolution images of metal and plastic targets concealed by clothing. Coherent single-frequency amplitude and phase data, which is gathered over a two-dimensional scanned aperture, is reconstructed to the target plane using a holographic wavefront reconstruction technique. Practical weapon detection systems require high-speed scanning. To achieve this goal, a 35 GHz linear sequentially switched array has been built and integrated into a high speed linear scanner. This system poses special challenges on calibration / signal processing of the holographic system. Further, significant improvements in speed are required to achieve real time operation. Toward this goal, a wideband scanned system which allows for a two-dimensional image formation from a one-dimensional scanned (or array) system has been developed . Signal / image processing techniques developed and implemented for this technique are a variation on conventional synthetic aperture radar (SAR) techniques which eliminate far-field and narrow bandwidth requirements. Performance of this technique is demonstrated with imaging results obtained from a K[sub a]-band system.

  20. Near-field millimeter-wave imaging for weapon detection

    Energy Technology Data Exchange (ETDEWEB)

    Sheen, D.M.; McMakin, D.L.; Collins, H.D.; Hall, T.E.

    1992-11-01

    Various millimeter-wave imaging systems capable of imaging through clothing for the detection of contraband metal, plastic, or ceramic weapons, have been developed at PNL. Two dimensional scanned holographic systems, developed at 35, 90, and 350 GHz, are used to obtain high resolution images of metal and plastic targets concealed by clothing. Coherent single-frequency amplitude and phase data, which is gathered over a two-dimensional scanned aperture, is reconstructed to the target plane using a holographic wavefront reconstruction technique. Practical weapon detection systems require high-speed scanning. To achieve this goal, a 35 GHz linear sequentially switched array has been built and integrated into a high speed linear scanner. This system poses special challenges on calibration / signal processing of the holographic system. Further, significant improvements in speed are required to achieve real time operation. Toward this goal, a wideband scanned system which allows for a two-dimensional image formation from a one-dimensional scanned (or array) system has been developed . Signal / image processing techniques developed and implemented for this technique are a variation on conventional synthetic aperture radar (SAR) techniques which eliminate far-field and narrow bandwidth requirements. Performance of this technique is demonstrated with imaging results obtained from a K{sub a}-band system.

  1. Application and the key technology on high power fiber-optic laser in laser weapon

    Science.gov (United States)

    Qu, Zhou; Li, Qiushi; Meng, Haihong; Sui, Xin; Zhang, Hongtao; Zhai, Xuhua

    2014-12-01

    The soft-killing laser weapon plays an important role in photoelectric defense technology. It can be used for photoelectric detection, search, blinding of photoelectric sensor and other devices on fire control and guidance devices, therefore it draws more and more attentions by many scholars. High power fiber-optic laser has many virtues such as small volume, simple structure, nimble handling, high efficiency, qualified light beam, easy thermal management, leading to blinding. Consequently, it may be used as the key device of soft-killing laser weapon. The present study introduced the development of high power fiber-optic laser and its main features. Meanwhile the key technology of large mode area (LMA) optical fiber design, the beam combination technology, double-clad fiber technology and pumping optical coupling technology was stated. The present study is aimed to design high doping LMA fiber, ensure single mode output by increasing core diameter and decrease NA. By means of reducing the spontaneous emission particle absorbed by fiber core and Increasing the power density in the optical fiber, the threshold power of nonlinear effect can increase, and the power of single fiber will be improved. Meantime, high power will be obtained by the beam combination technology. Application prospect of high power fiber laser in photoelectric defense technology was also set forth. Lastly, the present study explored the advantages of high power fiber laser in photoelectric defense technology.

  2. Of Amoebae and Men: Extracellular DNA Traps as an Ancient Cell-Intrinsic Defense Mechanism

    Science.gov (United States)

    Zhang, Xuezhi; Soldati, Thierry

    2016-01-01

    Since the discovery of the formation of DNA-based extracellular traps (ETs) by neutrophils as an innate immune defense mechanism (1), hundreds of articles describe the involvement of ETs in physiological and pathological human and animal conditions [reviewed in Ref. (2), and the previous Frontiers Research Topic on NETosis: http://www.frontiersin.org/books/NETosis_At_the_Intersection_of_Cell_Biology_Microbiology_and_Immunology/195]. Interestingly, a few reports reveal that ETs can be formed by immune cells of more ancient organisms, as far back as the common ancestor of vertebrates and invertebrates (3). Recently, we reported that the Sentinel cells of the multicellular slug of the social amoeba Dictyostelium discoideum also produce ETs to trap and kill slug-invading bacteria [see Box 1; and Figure 1 Ref. (4)]. This is a strong evidence that DNA-based cell-intrinsic defense mechanisms emerged much earlier than thought, about 1.3 billion years ago. Amazingly, using extrusion of DNA as a weapon to capture and kill uningestable microbes has its rationale. During the emergence of multicellularity, a primitive innate immune system developed in the form of a dedicated set of specialized phagocytic cells. This professionalization of immunity allowed the evolution of sophisticated defense mechanisms including the sacrifice of a small set of cells by a mechanism related to NETosis. This altruistic behavior likely emerged in steps, starting from the release of “dispensable” mitochondrial DNA by D. discoideum Sentinel cells. Grounded in this realization, one can anticipate that in the near future, many more examples of the invention and fine-tuning of ETs by early metazoan ancestors will be identified. Consequently, it can be expected that this more complete picture of the evolution of ETs will impact our views of the involvement and pathologies linked to ETs in human and animals. PMID:27458458

  3. ARPA/NIJ/Rome Laboratory concealed weapon detection program: an overview

    Science.gov (United States)

    Currie, Nicholas C.; Demma, Fred J.; Ferris, David D., Jr.; McMillan, Robert W.; Wicks, Michael C.

    1996-06-01

    Recent advances in passive and active imaging and non- imaging sensor technology offer the potential to detect weapons that are concealed beneath a person's clothing. Sensors that are discussed in this paper are characterized as either non-imaging or imaging. Non-imaging sensors include wide band radar and portal devices such as metal detectors. In general the strength of non-imaging sensors rest with the fact that they are generally inexpensive and can rapidly perform bulk separation between regions where persons are likely to be carrying concealed weapons and those regions that are likely to contain persons who are unarmed. The bulk process is typically accomplished at the expense of false alarm rate. Millimeter-wave (MMW), microwave, x-ray, acoustic, magnetic, and infrared (IR) imaging sensor technologies provide with greater certainty the means to isolate persons within a crowd that are carrying concealed weapons and to identify the weapon type. The increased certainty associated with imaging sensors is accomplished at the expense of cost and bulk surveillance of the crowd. CWD technologies have a variety of military and civilian applications. This technology focus area addresses specific military needs under the Defense Advanced Research Projects Agency's (DARPA) operations other than war/law enforcement (OOTW/LE). Additionally, this technology has numerous civilian law enforcement applications that are being investigated under the National Institute of Justice's (NIJ) Concealed Weapons Detection program. This paper discusses the wide variety of sensors that might be employed in support of a typical scenario, the strengths and weaknesses of each of the sensors relative to the given scenario, and how CWD breadboards will be tested to determine the optimal CWD application. It rapidly becomes apparent that no single sensor will completely satisfy the CWD mission necessitating the fusion of two or more of these sensors.

  4. Department of Defense Small Business (SB) Program: A Knowledge-Level Analysis of How Customer Education Relates to Meeting SB Goals

    Science.gov (United States)

    2014-12-01

    7 B. SMALL BUSINESS PROGRAM OVERVIEW ...........................................7 1. Women -Owned Small ...of Defense DSB Director of Small Business DTRA Defense Threat Reduction Agency EDWOSB economically disadvantaged women -owned small businesses EO...USTRANSCOM U.S. Transportation Command VOSB veteran-owned small business WMD weapons of mass destruction WOSB women -owned small business xiv

  5. Prions: the danger of biochemical weapons

    Directory of Open Access Journals (Sweden)

    Eric Almeida Xavier

    2014-09-01

    Full Text Available The knowledge of biotechnology increases the risk of using biochemical weapons for mass destruction. Prions are unprecedented infectious pathogens that cause a group of fatal neurodegenerative diseases by a novel mechanism. They are transmissible particles that are devoid of nucleic acid. Due to their singular characteristics, Prions emerge as potential danger since they can be used in the development of such weapons. Prions cause fatal infectious diseases, and to date there is no therapeutic or prophylactic approach against these diseases. Furthermore, Prions are resistant to food-preparation treatments such as high heat and can find their way from the digestive system into the nervous system; recombinant Prions are infectious either bound to soil particles or in aerosols. Therefore, lethal Prions can be developed by malicious researchers who could use it to attack political enemies since such weapons cause diseases that could be above suspicion.

  6. 75 FR 25165 - Defense Federal Acquisition Regulation Supplement; Cost and Software Data Reporting System

    Science.gov (United States)

    2010-05-07

    ... reporting requirements that are essential for the DoD to estimate the cost of current and future weapon... and not cost allocations. The description will also show how the data from the offeror's accounting... Regulation Supplement; Cost and Software Data Reporting System AGENCY: Defense Acquisition Regulations...

  7. Air Defense Options for Taiwan: An Assessment of Relative Costs and Operational Benefits

    Science.gov (United States)

    2016-01-01

    much more diversified threat. These include fielding new, sophisticated fighter aircraft and fighter-bombers. Highly accurate air-to-ground weapons...threats. Therefore, we do not include them for consideration as part of Taiwan’s airpower portfolio . 126 Air Defense Options for Taiwan The

  8. Fiscal Year 1985 Congressional budget request. Volume 1. Atomic energy defense activities

    Energy Technology Data Exchange (ETDEWEB)

    1984-02-01

    Contents include: summaries of estimates by appropriation, savings from management initiatives, staffing by subcommittee, staffing appropriation; appropriation language; amounts available for obligation; estimates by major category; program overview; weapons activities; verification and control technology; materials production; defense waste and by-products management; nuclear safeguards and security; security investigations; and naval reactors development.

  9. Task Analyses of Three Selected Weapons Systems.

    Science.gov (United States)

    1976-10-01

    using weapons is a joint function of the specific weapon system, the goals (missions) of the system, and the environment in which it is used. The first...Identification of fire mission profiles which state general job functions for each type of typical mission. Documentary sources such as Field Manuals...nd Arin,,, Ui, Guni i A,!i" tant uuPnrr No. I Can; n , r Grup - ( nile. .rs and Prir Diff,-ront S, tm: -inch L,,t.’r _, Fort Hood l::t Cavall, I

  10. #TheWeaponizationOfSocialMedia

    DEFF Research Database (Denmark)

    Nissen, Thomas Elkjer

    In today’s conflict environment, transformed by information technology and of who can communicate and how, states, non-state actors, ad hoc activist networks and individuals create effect(s) in and through social network media in support of their objectives. #TheWeaponizationOfSocialMedia develops...... a framework for understanding how social network media shapes global politics and contemporary conflicts by examining their role as a platform for conduction intelligence collection, targeting, cyber-operations, psychological warfare and command and control activities. Through these, the weaponization...

  11. Reflexive retaliation for violent victimization: the effect of social distance on weapon lethality.

    Science.gov (United States)

    Jacques, Scott; Rennison, Callie Marie

    2013-01-01

    During the course of being victimized, why do people sometimes fight back with their fists; in other cases, with a knife or blunt object; and at other times, with a firearm? One theory is that the weapons involved in self-defense, also known as reflexive retaliation, become less lethal as offenders and victims become more intimate and alike culturally. Using National Crime Victimization Survey data, we test hypotheses derived from this theory and primarily find support. This article concludes by discussing implications for future work.

  12. Implementing the chemical weapons convention

    Energy Technology Data Exchange (ETDEWEB)

    Kellman, B.; Tanzman, E. A.

    1999-12-07

    In 1993, as the CWC ratification process was beginning, concerns arose that the complexity of integrating the CWC with national law could cause each nation to implement the Convention without regard to what other nations were doing, thereby causing inconsistencies among States as to how the CWC would be carried out. As a result, the author's colleagues and the author prepared the Manual for National Implementation of the Chemical Weapons Convention and presented it to each national delegation at the December 1993 meeting of the Preparatory Commission in The Hague. During its preparation, the Committee of CWC Legal Experts, a group of distinguished international jurists, law professors, legally-trained diplomats, government officials, and Parliamentarians from every region of the world, including Central Europe, reviewed the Manual. In February 1998, they finished the second edition of the Manual in order to update it in light of developments since the CWC entered into force on 29 April 1997. The Manual tries to increase understanding of the Convention by identifying its obligations and suggesting methods of meeting them. Education about CWC obligations and available alternatives to comply with these requirements can facilitate national response that are consistent among States Parties. Thus, the Manual offers options that can strengthen international realization of the Convention's goals if States Parties act compatibly in implementing them. Equally important, it is intended to build confidence that the legal issues raised by the Convention are finite and addressable. They are now nearing competition of an internet version of this document so that interested persons can access it electronically and can view the full text of all of the national implementing legislation it cites. The internet address, or URL, for the internet version of the Manual is http: //www.cwc.ard.gov. This paper draws from the Manual. It comparatively addresses approximately thirty

  13. 10 CFR Appendix H to Part 73 - Weapons Qualification Criteria

    Science.gov (United States)

    2010-01-01

    ... position, then fire 2 rounds and reholster 2 15 yards 2 5 seconds Standing, draw weapon, move to kneeling...) Standing, draw weapon, fire 2 rounds, move to kneeling position and fire 2 rounds, reload and reholster Minimum qualifying = 70%. 4 15 yards 2 5 seconds Draw weapon and fire 2 rounds standing, come to low...

  14. 25 CFR 11.444 - Carrying concealed weapons.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor unless...

  15. Someone at School Has a Weapon. What Should I Do?

    Science.gov (United States)

    ... for You Shyness Someone at School Has a Weapon. What Should I Do? KidsHealth > For Teens > Someone at School Has a Weapon. What Should I Do? Print A A A ... Why do students bring guns, knives, or other weapons to school? Some are just showing off, others ...

  16. 76 FR 1136 - Electroshock Weapons Test and Measurement Workshop

    Science.gov (United States)

    2011-01-07

    ... National Institute of Standards and Technology Electroshock Weapons Test and Measurement Workshop AGENCY..., academia, military, test instrument manufacturers, etc.) of electroshock weapons that provide stand-off... requirements for electroshock weapons, the Law Enforcement Standards Office (OLES) at NIST has developed...

  17. 46 CFR 386.23 - Weapons and explosives.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 8 2010-10-01 2010-10-01 false Weapons and explosives. 386.23 Section 386.23 Shipping... AND GROUNDS AT THE UNITED STATES MERCHANT MARINE ACADEMY § 386.23 Weapons and explosives. No person shall carry or possess firearms, other dangerous or deadly weapons or parts thereof, explosives or items...

  18. Agent-based Modeling Methodology for Analyzing Weapons Systems

    Science.gov (United States)

    2015-03-26

    43 Figure 14: Simulation Study Methodology for the Weapon System Analysis Metrics Definition and Data Collection The analysis plan calls for...AGENT-BASED MODELING METHODOLOGY FOR ANALYZING WEAPONS SYSTEMS THESIS Casey D. Connors, Major, USA...AGENT-BASED MODELING METHODOLOGY FOR ANALYZING WEAPONS SYSTEMS THESIS Presented to the Faculty Department of Operational Sciences

  19. 36 CFR 702.7 - Weapons and explosives.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Weapons and explosives. 702.7... Weapons and explosives. Except where duly authorized by law, and in the performance of law enforcement functions, no person shall carry firearms, other dangerous or deadly weapons, or explosives, either openly...

  20. 7 CFR 501.12 - Weapons and explosives.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Weapons and explosives. 501.12 Section 501.12... OF AGRICULTURE CONDUCT ON U.S. MEAT ANIMAL RESEARCH CENTER, CLAY CENTER, NEBRASKA § 501.12 Weapons... arrows, darts, other dangerous or deadly weapons, or explosives, either openly or concealed, except as...

  1. 31 CFR 407.13 - Weapons and explosives.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Weapons and explosives. 407.13... TREASURY ANNEX § 407.13 Weapons and explosives. No person while on the property shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except for official purposes. ...

  2. 49 CFR 1544.219 - Carriage of accessible weapons.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Carriage of accessible weapons. 1544.219 Section...: AIR CARRIERS AND COMMERCIAL OPERATORS Operations § 1544.219 Carriage of accessible weapons. (a... weapons, do not apply to a law enforcement officer (LEO) aboard a flight for which screening is required...

  3. 31 CFR 91.13 - Weapons and explosives.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Weapons and explosives. 91.13 Section... CONDUCT IN OR ON THE BUREAU OF THE MINT BUILDINGS AND GROUNDS § 91.13 Weapons and explosives. No person while on the property shall carry firearms, other dangerous or deadly weapons, or explosives, either...

  4. 44 CFR 15.15 - Weapons and explosives.

    Science.gov (United States)

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Weapons and explosives. 15.15... EMERGENCY TRAINING CENTER § 15.15 Weapons and explosives. No person entering or while at Mt. Weather or the NETC will carry or possess firearms, other dangerous or deadly weapons, explosives or items intended to...

  5. 7 CFR 502.13 - Weapons and explosives.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Weapons and explosives. 502.13 Section 502.13....13 Weapons and explosives. No person while in or on BARC property shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except as officially authorized for...

  6. 36 CFR 504.14 - Weapons and explosives.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Weapons and explosives. 504... GOVERNING SMITHSONIAN INSTITUTION BUILDINGS AND GROUNDS § 504.14 Weapons and explosives. No person while on the premises shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or...

  7. 31 CFR 0.215 - Possession of weapons and explosives.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Possession of weapons and explosives... OF THE TREASURY EMPLOYEE RULES OF CONDUCT Rules of Conduct § 0.215 Possession of weapons and explosives. (a) Employees shall not possess firearms, explosives, or other dangerous or deadly weapons...

  8. 7 CFR 500.12 - Weapons and explosives.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Weapons and explosives. 500.12 Section 500.12... OF AGRICULTURE NATIONAL ARBORETUM Conduct on U.S. National Arboreturm Property § 500.12 Weapons and... weapons, or explosives, either openly or concealed, except for authorized official purposes. (b) No person...

  9. 7 CFR 503.13 - Weapons and explosives.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Weapons and explosives. 503.13 Section 503.13... OF AGRICULTURE CONDUCT ON PLUM ISLAND ANIMAL DISEASE CENTER § 503.13 Weapons and explosives. No person while in or on the PIADC shall carry firearms or other dangerous or deadly weapons or explosives...

  10. 36 CFR 13.30 - Weapons, traps and nets.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 1 2010-07-01 2010-07-01 false Weapons, traps and nets. 13... INTERIOR NATIONAL PARK SYSTEM UNITS IN ALASKA General Provisions § 13.30 Weapons, traps and nets. (a... of this chapter, the following are prohibited— (1) Possessing a weapon, trap, or net; (2) Carrying a...

  11. 14 CFR 135.119 - Prohibition against carriage of weapons.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Prohibition against carriage of weapons... Flight Operations § 135.119 Prohibition against carriage of weapons. No person may, while on board an aircraft being operated by a certificate holder, carry on or about that person a deadly or dangerous weapon...

  12. 4 CFR 25.14 - Weapons and explosives.

    Science.gov (United States)

    2010-01-01

    ... 4 Accounts 1 2010-01-01 2010-01-01 false Weapons and explosives. 25.14 Section 25.14 Accounts... AND ON ITS GROUNDS § 25.14 Weapons and explosives. No person while entering or in the GAO Building or on its grounds shall carry or possess firearms, other dangerous or deadly weapons, explosives or...

  13. 31 CFR 700.11 - Weapons and explosives.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Weapons and explosives. 700.11... FEDERAL LAW ENFORCEMENT TRAINING CENTER (FLETC) BUILDINGS AND GROUNDS § 700.11 Weapons and explosives. No person, while on the property, shall carry firearms, other dangerous or deadly weapons, or explosives...

  14. 50 CFR 27.43 - Weapons other than firearms.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 6 2010-10-01 2010-10-01 false Weapons other than firearms. 27.43 Section... (CONTINUED) THE NATIONAL WILDLIFE REFUGE SYSTEM PROHIBITED ACTS Disturbing Violations: With Weapons § 27.43 Weapons other than firearms. The use or possession of cross bows, bows and arrows, air guns, spears, gigs...

  15. 43 CFR 423.30 - Weapons, firearms, explosives, and fireworks.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Weapons, firearms, explosives, and... WATERBODIES Rules of Conduct § 423.30 Weapons, firearms, explosives, and fireworks. (a) You may possess... exceptions: (1) You must not have a weapon in your possession when at or in a Reclamation facility. (2) You...

  16. 36 CFR 520.15 - Weapons and explosives.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Weapons and explosives. 520... Weapons and explosives. No person while on the premises shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except for official purposes, nor shall any person...

  17. 15 CFR 265.39 - Weapons and explosives.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Weapons and explosives. 265.39 Section..., GAITHERSBURG, MARYLAND, AND BOULDER AND FORT COLLINS, COLORADO Buildings and Grounds § 265.39 Weapons and... dangerous or deadly weapons or materials, or explosives, either openly or concealed, without the written...

  18. Demand Analysis of Informational Shipboard Gun Weapon System Interface Design

    Directory of Open Access Journals (Sweden)

    WANG Hui-chuan

    2013-04-01

    Full Text Available According to development demand of informational shipboard gun weapon system, design concept of shipboard gun weapon system interface is proposed. System composition is put forward and function demand of interface is analyzed from combat, training and detection aspects. General principle need to be followed in design process. A new concept is provided for development of shipboard gun weapon system interface.

  19. Optical countermeasures against CLOS weapon systems

    NARCIS (Netherlands)

    Toet, A.; Benoist, K.W.; Lingen, J.N.J. van; Schleijpen, H.M.A.

    2013-01-01

    There are many weapon systems in which a human operator acquires a target, tracks it and designates it. Optical countermeasures against this type of systems deny the operator the possibility to fulfill this visual task. We describe the different effects that result from stimulation of the human

  20. Europium-155 in Debris from Nuclear Weapons

    DEFF Research Database (Denmark)

    Aarkrog, Asker; Lippert, Jørgen Emil

    1967-01-01

    The lithium-drifted germanium detector enables determination of europium-155 on a routine basis in environmental samples contaminated with debris from nuclear weapons. From measurements of europium-155, cesium-144, and strontium-90 in air filters collected between 1961 and 1966, the yield...

  1. The Politics of Weapons Standardization in NATO.

    Science.gov (United States)

    1981-07-01

    does raise new and useful perspectives on the problem. And, as he notes, it raises the spectre that instead of attacking the causes of NATO’s malaise...construct- ing his Utopia . 1 58 Two articles, which focus on the weapons procurement process within the United States alone, note the unnecessary

  2. Nuclear Weapon Testing Limitations and International Security

    Science.gov (United States)

    Corden, Pierce S.

    2017-01-01

    For over 50 years stopping nuclear weapon tests has been sought to support achieving international security without nuclear weapons. Testing is the critical path beyond primitive fission devices, e.g. to develop thermonuclear weapons, reduce weight and volume and increase yield. The 1958 Geneva Conference of Experts considered ways to verify a test ban. With then-limitations on seismology, and lack of in-country monitoring and on-site inspections, the 1963 Limited Test Ban Treaty prohibits testing only in the atmosphere, outer space and under water, and is verified by National Technical Means. The US and USSR agreed to a limit of 150 kilotons on underground explosions in the 1970s-80s. The 1996 Comprehensive Nuclear-Test-Ban Treaty bans all nuclear explosions. Its International Monitoring System - seismic, hydroacoustic, infrasound and radionuclide sensors - is being used, and has easily detected testing by the DPRK. On-site inspections will be available under an in-force Treaty. A 2012 National Academy report concludes that cheating attempts would not undermine U.S. security, and the program for monitoring and extending the life of US weapons has succeeded since US testing ceased in 1992.

  3. Principles of Guided Missiles and Nuclear Weapons.

    Science.gov (United States)

    Naval Personnel Program Support Activity, Washington, DC.

    Fundamentals of missile and nuclear weapons systems are presented in this book which is primarily prepared as the second text of a three-volume series for students of the Navy Reserve Officers' Training Corps and the Officer Candidate School. Following an introduction to guided missiles and nuclear physics, basic principles and theories are…

  4. The Spear: An Effective Weapon Since Antiquity

    Directory of Open Access Journals (Sweden)

    Robert E. Dohrenwend

    2012-07-01

    Full Text Available The spear is perhaps man’s oldest weapon, and may even be his oldest tool. Over the hundreds of thousands of years of the weapon’s existence, it evolved from a pointed stick into an efficient hunting missile, and then became the most effective hand-held bladed weapon humans ever devised. The spear and its use is the only martial art originally devised for use against species other than our own, and more than any other weapon, the spear emphasizes the relationship between hunting and warfare. Virtually without exception, the spear is present wherever there are humans. The spear may claim to be the senior martial art, and the weapon is still in use today. Early techniques are preserved by the small number of Japanese sojutsu schools, and modern Chinese martial artists have developed elegant and impressive gymnastic routines for the spear. The javelin throw is a modern Olympic track and field event, and there are people who have resurrected the Aztec atlatl for sporting competition. Today, the spear is still used in Europe for hunting wild boar, and the continued issue of the obsolete bayonet to modern soldiers testifies to a deep, almost instinctive respect still possessed by the military for the spear.

  5. Air gun wounding and current UK laws controlling air weapons.

    Science.gov (United States)

    Bruce-Chwatt, Robert Michael

    2010-04-01

    Air weapons whether rifles or pistols are, potentially, lethal weapons. The UK legislation is complex and yet little known to the public. Hunting with air weapons and the laws controlling those animals that are permitted to be shot with air weapons is even more labyrinthine due to the legal power limitations on the possession of air weapons. Still relatively freely available by mail order or on the Internet, an increasing number of deaths have been reported from the misuse of air weapons or accidental discharges. Ammunition for air weapons has become increasingly sophisticated, effective and therefore increasingly dangerous if misused, though freely available being a mere projectile without a concomitant cartridge containing a propellant and an initiator.

  6. Recognizing plant defense priming

    NARCIS (Netherlands)

    Martinez-Medina, A.; Flors, V.; Heil, M.; Mauch-Mani, B.; Pieterse, C.M.J.; Pozo, M.J.; Ton, J.; Van Dam, N.M.; Conrath, U.

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in plant

  7. #TheWeaponizationOfSocialMedia

    DEFF Research Database (Denmark)

    Nissen, Thomas Elkjer

    In today’s conflict environment, transformed by information technology and of who can communicate and how, states, non-state actors, ad hoc activist networks and individuals create effect(s) in and through social network media in support of their objectives. #TheWeaponizationOfSocialMedia develops...... a framework for understanding how social network media shapes global politics and contemporary conflicts by examining their role as a platform for conduction intelligence collection, targeting, cyber-operations, psychological warfare and command and control activities. Through these, the weaponization...... of social media shows both the possibilities and the limitations of social network media in contemporary conflicts and makes a contribution to theorizing and studying contemporary conflicts....

  8. Emergency management of chemical weapons injuries.

    Science.gov (United States)

    Anderson, Peter D

    2012-02-01

    The potential for chemical weapons to be used in terrorism is a real possibility. Classes of chemical weapons include nerve agents, vesicants (blister agents), choking agents, incapacitating agents, riot control agents, blood agents, and toxic industrial chemicals. The nerve agents work by blocking the actions of acetylcholinesterase leading to a cholinergic syndrome. Nerve agents include sarin, tabun, VX, cyclosarin, and soman. The vesicants include sulfur mustard and lewisite. The vesicants produce blisters and also damage the upper airways. Choking agents include phosgene and chlorine gas. Choking agents cause pulmonary edema. Incapacitating agents include fentanyl and its derivatives and adamsite. Riot control agents include Mace and pepper spray. Blood agents include cyanide. The mechanism of toxicity for cyanide is blocking oxidative phosphorylation. Toxic industrial chemicals include agents such as formaldehyde, hydrofluoric acid, and ammonia.

  9. Making Weapons for the Terracotta Army

    Directory of Open Access Journals (Sweden)

    Marcos Martinón-Torres

    2011-10-01

    Full Text Available The Terracotta Army of the First Emperor of China is one of the most emblematic archaeological sites in the world. Many questions remain about the logistics of technology, standardisation and labour organisation behind the creation of such a colossal construction in just a few decades over 2,000 years ago. An ongoing research project co-ordinated between the UCL Institute of Archaeology and the Emperor Qin Shihang's Terracotta Army Museum is beginning to address some of these questions. This paper outlines some results of the typological, metric, microscopic, chemical and spatial analyses of the 40,000 bronze weapons recovered with the Terracotta Warriors. Thanks to a holistic approach developed specifically for this project, it is possible to reveal remarkable aspects of the organisation of the Qin workforce in production cells, of the standardisation, efficiency and quality-control procedures employed, and of the sophisticated technical knowledge of the weapon-makers.

  10. Ending the scourge of chemical weapons

    Energy Technology Data Exchange (ETDEWEB)

    Brin, J.

    1993-04-01

    After more than 20 years of arduous negotiations, representatives from 131 countries gathered in Paris in January to sign a treaty banning the development, production, and transfer to other countries of chemical-warfare agents and their means of delivery. The treaty - called the Chemical Weapons Convention, or CWC - complements the more limited Geneva Protocol of 1925, which bans the use of toxic chemicals in warfare. When the CWC enters into force in about two years, it will prohibit the manufacture for military purposes of lethal chemicals such as sulfur mustard, which causes painful skin blistering and lung damage, and nerve agents, which cause rapid death by interfering with the transmission of nerve impulses. The goal is to eliminate from the earth this particularly inhumane form of warfare. The paper discusses facets of the treaty, especially the verification challenge with its inspection on demand features. Short accompanying pieces discuss classifying chemicals and the destruction of chemical weapons under the CWC.

  11. Effects of nuclear weapons. Third edition

    Energy Technology Data Exchange (ETDEWEB)

    Glasstone, S.; Dolan, P.J.

    1977-01-01

    Since the last edition of ''The Effects of Nuclear Weapons'' in 1962 much new information has become available concerning nuclear weapon effects. This has come in part from the series of atmospheric tests, including several at very high altitudes, conducted in the Pacific Ocean area in 1962. In addition, laboratory studies, theoretical calculations, and computer simulations have provided a better understanding of the various effects. A new chapter has been added on the electromagnetic pulse. The chapter titles are as follows: general principles of nuclear explosions; descriptions of nuclear explosions; air blast phenomena in air and surface bursts; air blast loading; structural damage from air blast; shock effects of surface and subsurface bursts; thermal radiation and its effects; initial nuclear radiation; residual nuclear radiation and fallout; radio and radar effects; the electromagnetic pulse and its effects; and biological effects. (LTN)

  12. The Effects of Nuclear Weapons. Third edition

    Energy Technology Data Exchange (ETDEWEB)

    Glasstone, S; Dolan, P J

    1977-01-01

    Since the last edition of ''The Effects of Nuclear Weapons'' in 1962 much new information has become available concerning nuclear weapon effects. This has come in part from the series of atmospheric tests, including several at very high altitudes, conducted in the Pacific Ocean area in 1962. In addition, laboratory studies, theoretical calculations, and computer simulations have provided a better understanding of the various effects. A new chapter has been added on the electromagnetic pulse. The chapter titles are as follows: general principles of nuclear explosions; descriptions of nuclear explosions; air blast phenomena in air and surface bursts; air blast loading; structural damage from air blast; shock effects of surface and subsurface bursts; thermal radiation and its effects; initial nuclear radiation; residual nuclear radiation and fallout; radio and radar effects; the electromagnetic pulse and its effects; and biological effects. (LTN)

  13. The US nuclear weapon infrastructure and a stable global nuclear weapon regime

    Energy Technology Data Exchange (ETDEWEB)

    Immele, John D [Los Alamos National Laboratory; Wagner, Richard L [Los Alamos National Laboratory

    2009-01-01

    US nuclear weapons capabilities -- extant force structure and nuclear weapons infrastructure as well as declared policy -- influence other nations' nuclear weapons postures, at least to some extent. This influence can be desirable or undesirable, and is, of course, a mixture of both. How strong the influence is, and its nature, are complicated, controversial, and -- in our view -- not well understood but often overstated. Divergent views about this influence and how it might shape the future global nuclear weapons regime seem to us to be the most serious impediment to reaching a national consensus on US weapons policy, force structure and supporting infrastructure. We believe that a paradigm shift to capability-based deterrence and dissuasion is not only consistent with the realities of the world and how it has changed, but also a desirable way for nuclear weapon postures and infrastructures to evolve. The US and other nuclear states could not get to zero nor even reduce nuclear arms and the nuclear profile much further without learning to manage latent capability. This paper has defined three principles for designing NW infrastructure both at the 'next plateau' and 'near zero.' The US can be a leader in reducing weapons and infrastructure and in creating an international regime in which capability gradually substitutes for weapons in being and is transparent. The current 'strategy' of not having policy or a Congressionally-approved plan for transforming the weapons complex is not leadership. If we can conform the US infrastructure to the next plateau and architect it in such a way that it is aligned with further arms reductions, it will have these benefits: The extant stockpile can be reduced in size, while the smaller stockpile still deters attack on the US and Allies. The capabilities of the infrastructure will dissuade emergence of new challenges/threats; if they emerge, nevertheless, the US will be able to deal with them in

  14. Adversarial Use of Weapons of Mass Destruction

    Science.gov (United States)

    2000-01-01

    had weaponized 10,000 liters of concentrated botu- linum toxin, 6,500 liters of concentrated anthrax, and 1,580 liters of concentrated aflatoxin .2 The...might cost only $30–50 million, according to the Research Institute for the Study of Conflict and Terrorism. That could be cut in half if safety ...10 Most nations pursuing NBC capabilities today are also consider- ing long-range delivery means. On the strategic level adversaries are likely to use

  15. The Aerodynamics of High Speed Aerial Weapons

    OpenAIRE

    Prince, Simon A.

    1999-01-01

    The focus of this work is the investigation of the complex compressible flow phenomena associated with high speed aerial weapons. A three dimen- sional multiblock finite volume flow solver was developed with the aim of studying the aerodynamics of missile configurations and their component structures. The first component of the study involved the aerodynamic investigation of the isolated components used in the design of conventional missile config- urations. The computati...

  16. Imprecise Probability Methods for Weapons UQ

    Energy Technology Data Exchange (ETDEWEB)

    Picard, Richard Roy [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Vander Wiel, Scott Alan [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-05-13

    Building on recent work in uncertainty quanti cation, we examine the use of imprecise probability methods to better characterize expert knowledge and to improve on misleading aspects of Bayesian analysis with informative prior distributions. Quantitative approaches to incorporate uncertainties in weapons certi cation are subject to rigorous external peer review, and in this regard, certain imprecise probability methods are well established in the literature and attractive. These methods are illustrated using experimental data from LANL detonator impact testing.

  17. Conventional Weapons Effects on Reinforced Soil Walls.

    Science.gov (United States)

    1995-03-01

    of the reinforced soil wall. 14. SUBJECT TERMS 15. NUMBER OF PAGES Reinforced soil, conventional weapons, protective structures, 388 geosynthetics ...high tensile strength materials such as steel strips or geosynthetics . A single face of a reinforced soil berm can be constructed to approximately...yards of geosynthetics representing $3.1 billion have been used in a wide range of civil engineering applications (Koerner, 1990). Between 1991 and 1992

  18. Can Industry Consolidation Lead to Greater Efficiencies? Evidence from the U.S. Defense Industry

    OpenAIRE

    Nayantara Hensel

    2010-01-01

    The question of whether mergers in various industries lead to greater market power or improved efficiencies has been the subject of numerous public policy debates. This analysis focuses on the impact of consolidation in the U.S. defense industry over the past 20 years and examines the reasons behind the wave of defense consolidation, the results in terms of the reduction in contractors, the antitrust response to mergers, and evidence on the impact of the mergers on weapons systems’ total and ...

  19. RESTRICTIONS BY THE USE OF WEAPONS OF RUSSIAN CITIZENS

    Directory of Open Access Journals (Sweden)

    Lyatsa A. Kodzokova

    2016-01-01

    Full Text Available Abstract: The article considers the restrictions imposed on the circulation of civilian and service weapons. The author analyzes the restrictions on the circulation of weapons, the procedure for their implementation in practice. Federal Law "On weapons" only in paragraph 6 p. 1, art. 6 "Restrictions imposed on the circulation of civilian and service weapons" refers to the prohibition of 'turnover as a civilian and service weapons and other items affecting the action is based on the use of radiation and biological factors; weapons and other items affecting the action is based on the use of electromagnetic, light, thermal, subsonic or ultrasonic radiation and which have output parameters that exceed the value set by state standards of the Russian Federation and the relevant regulations of the federal executive authority in the field of public health, as well as these weapons and items produced outside the Russian territory " How to regard this provision of the law? As the transfer of new weapons, not specific item. 25 of the Federal Law "On weapons", or items prohibited for circulation in the territory of our state? This inconsistency decreases the effectiveness of the legal regulation of arms trafficking. Unification of definitions in this area will allow applying the law correctly and reasonably, including criminal. But for this it is necessary taking into account the experience and the modern needs of the various branches of law provide a clearer definition of "weapon" and its species. The author's conclusions may be used in law enforcement. 

  20. Why are sexually selected weapons almost absent in females?

    Institute of Scientific and Technical Information of China (English)

    Anders BERGLUND

    2013-01-01

    In sex role reversed species,predominantly females evolve sexually selected traits,such as ornaments and/or weapons.Female ornaments are common and their function well documented in many species,whether sex role reversed or not.However,sexually selected female weapons seem totally absent except for small wing spurs in three jacana species,present in both males and females.This poor female weaponry is in sharp contrast to the situation in species with conventional sex roles:males commonly have evolved sexually selected weapons as well as ornaments.At the same time,females in many taxa have naturally selected weapons,used in competition over resources or in predator defence.Why are sexually selected weapons then so rare,almost absent,in females? Here I briefly review weaponry in females and the function of these weapons,conclude that the near absence of sexually selected weapons begs an explanation,and suggest that costs of sexually selected weapons may exceed costs of ornaments.Females are more constrained when evolving sexually selected traits compared to males,at least compared to those males that do not provide direct benefits,as trait costs reduce a female's fecundity.I suggest that this constraining trade-off between trait and fecundity restricts females to evolve ornaments but rarely weapons.The same may apply to paternally investing males.Whether sexually selected weapons actually are more costly than sexually selected ornaments remains to be investigated.

  1. Analysis of EW Requirements on Hipersonic Weapons%高超声速电子战需求浅析

    Institute of Scientific and Technical Information of China (English)

    康智

    2016-01-01

    高超声速武器具备改变未来战争规则的潜力,是当前大国军事竞争的焦点所在,受到了中美等国家的高度重视。提出了对高超声速武器在战术应用方面的理解,从防御和进攻两个方面分析了高超声速武器对电子战技术的需求,提出了未来高超声速电子战技术的研究方向建议。%The hypersonic weapon, which has the potential to change the rules of the future war, is the focus of the current military competition, and attached great importance to by countries such as China and the US. The understanding of hypersonic weapon is put forward in the tactical application, then the technical requirement of hypersonic weapon EW is anylized from both at-tack and defense ends, and suggestions on the future research direction of the hypersonic weapon EW technology are put forward.

  2. The Chemical Weapons Convention -- Legal issues

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-08-01

    The Chemical Weapons Convention (CWC) offers a unique challenge to the US system of constitutional law. Its promise of eliminating what is the most purely genocidal type of weapon from the world`s arsenals as well as of destroying the facilities for producing these weapons, brings with it a set of novel legal issues. The reservations about the CWC expressed by US business people are rooted in concern about safeguarding confidential business information and protecting the constitutional right to privacy. The chief worry is that international verification inspectors will misuse their power to enter commercial property and that trade secrets or other private information will be compromised as a result. It has been charged that the Convention is probably unconstitutional. The author categorically disagrees with that view and is aware of no scholarly writing that supports it. The purpose of this presentation is to show that CWC verification activities can be implemented in the US consistently with the traditional constitutional regard for commercial and individual privacy. First, he very briefly reviews the types of verification inspections that the CWC permits, as well as some of its specific privacy protections. Second, he explains how the Fourth Amendment right to privacy works in the context of CWC verification inspections. Finally, he reviews how verification inspections can be integrated into these constitutional requirements in the SU through a federal implementing statute.

  3. New rapid transfer alignment method for SINS of airborne weapon systems

    Institute of Scientific and Technical Information of China (English)

    Yu Chen; Yan Zhao

    2014-01-01

    Transfer alignment is an effective alignment method for the strapdown inertial navigation system (SINS) of airborne weapon systems. The traditional transfer alignment methods for large misalignment angles alignment use nonlinear transfer align-ment models and incorporate nonlinear filtering. A rapid transfer alignment method with linear models and linear filtering for ar-bitrary misalignment angles is presented. Through the attitude quaternion decomposition, the purpose of transfer alignment is converted to estimate a constant quaternion. Employing special manipulations on measurement equation, velocity and attitude linear measurement equations are derived. Then the linear trans-fer alignment model for arbitrary misalignment angles is built. An adaptive Kalman filter is developed to handle modeling errors of the measurement noise statistics. Simulation results show feasibili-ty and effectiveness of the proposed method, which provides an alternative rapid transfer alignment method for airborne weapons.

  4. Defense Threat Reduction Agency Radiochemical Needs

    Science.gov (United States)

    Walsh, Michael A. R.; Velazquez, Daniel L.

    2009-08-01

    The United States Government (USG) first developed nuclear forensics-related capabilities to analyze radiological and nuclear materials, including underground nuclear test debris and interdicted materials. Nuclear forensics is not a new mission for Department of Defense (DoD). The department's existing nuclear forensics capability is the result of programs that span six (6) decades and includes activities to assess foreign nuclear weapons testing activities, monitor and verify nuclear arms control treaties, and to support intelligence and law enforcement activities. Today, nuclear forensics must support not only weapons programs and nuclear smuggling incidents, but also the scientific analysis and subsequent attribution of terrorists' use of radiological or nuclear materials/devices. Nuclear forensics can help divulge the source of origin of nuclear materials, the type of design for an interdicted or detonated device, as well as the pathway of the materials or device to the incident. To accomplish this mission, the USG will need trained radiochemists and nuclear scientists to fill new positions and replace the retiring staff.

  5. Measures to implement the Chemical Weapons Convention

    Energy Technology Data Exchange (ETDEWEB)

    Tanzman, E.; Kellman, B.

    1999-11-05

    This seminar is another excellent opportunity for those involved in preventing chemical weapons production and use to learn from each other about how the Chemical Weapons Convention (CWC) can become a foundation of arms control in Africa and around the world. The author is grateful to the staff of the Organization for the Prohibition of Chemical Weapons (OPCW) for inviting him to address this distinguished seminar. The views expressed in this paper are those of the authors alone, and do not represent the position of the government of the US nor or of any other institution. In 1993, as the process of CWC ratification was beginning, concerns arose that the complexity of integrating the treaty with national law would cause each nation to implement the Convention without regard to what other nations were doing, thereby causing inconsistencies among States Parties in how the Convention would be carried out. As a result the Manual for National Implementation of the Chemical Weapons Convention was prepared and presented it to each national delegation at the December 1993 meeting of the Preparatory Commission in The Hague. During its preparation, the Manual was reviewed by the Committee of Legal Experts on National Implementation of the Chemical Weapons Convention, a group of distinguished international jurists, law professors, legally-trained diplomats, government officials, and Parliamentarians from every region of the world, including Mica. In February 1998, the second edition of the Manual was published in order to update it in light of developments since the CWC entered into force on 29 April 1997. The second edition 1998 clarified the national implementation options to reflect post-entry-into-force thinking, added extensive references to national implementing measures that had been enacted by various States Parties, and included a prototype national implementing statute developed by the authors to provide a starting point for those whose national implementing

  6. Measures to implement the Chemical Weapons Convention

    Energy Technology Data Exchange (ETDEWEB)

    Tanzman, E.; Kellman, B.

    1999-11-05

    This seminar is another excellent opportunity for those involved in preventing chemical weapons production and use to learn from each other about how the Chemical Weapons Convention (CWC) can become a foundation of arms control in Africa and around the world. The author is grateful to the staff of the Organization for the Prohibition of Chemical Weapons (OPCW) for inviting him to address this distinguished seminar. The views expressed in this paper are those of the authors alone, and do not represent the position of the government of the US nor or of any other institution. In 1993, as the process of CWC ratification was beginning, concerns arose that the complexity of integrating the treaty with national law would cause each nation to implement the Convention without regard to what other nations were doing, thereby causing inconsistencies among States Parties in how the Convention would be carried out. As a result the Manual for National Implementation of the Chemical Weapons Convention was prepared and presented it to each national delegation at the December 1993 meeting of the Preparatory Commission in The Hague. During its preparation, the Manual was reviewed by the Committee of Legal Experts on National Implementation of the Chemical Weapons Convention, a group of distinguished international jurists, law professors, legally-trained diplomats, government officials, and Parliamentarians from every region of the world, including Mica. In February 1998, the second edition of the Manual was published in order to update it in light of developments since the CWC entered into force on 29 April 1997. The second edition 1998 clarified the national implementation options to reflect post-entry-into-force thinking, added extensive references to national implementing measures that had been enacted by various States Parties, and included a prototype national implementing statute developed by the authors to provide a starting point for those whose national implementing

  7. Systems engineering analysis of kinetic energy weapon concepts

    Energy Technology Data Exchange (ETDEWEB)

    Senglaub, M.

    1996-06-01

    This study examines, from a systems engineering design perspective, the potential of kinetic energy weapons being used in the role of a conventional strategic weapon. Within the Department of Energy (DOE) complex, strategic weapon experience falls predominantly in the nuclear weapons arena. The techniques developed over the years may not be the most suitable methodologies for use in a new design/development arena. For this reason a more fundamental approach was pursued with the objective of developing an information base from which design decisions might be made concerning the conventional strategic weapon system concepts. The study examined (1) a number of generic missions, (2) the effects of a number of damage mechanisms from a physics perspective, (3) measures of effectiveness (MOE`s), and (4) a design envelope for kinetic energy weapon concepts. With the base of information a cut at developing a set of high-level system requirements was made, and a number of concepts were assessed against these requirements.

  8. Systems engineering analysis of kinetic energy weapon concepts

    Energy Technology Data Exchange (ETDEWEB)

    Senglaub, M.

    1996-06-01

    This study examines, from a systems engineering design perspective, the potential of kinetic energy weapons being used in the role of a conventional strategic weapon. Within the Department of Energy (DOE) complex, strategic weapon experience falls predominantly in the nuclear weapons arena. The techniques developed over the years may not be the most suitable methodologies for use in a new design/development arena. For this reason a more fundamental approach was pursued with the objective of developing an information base from which design decisions might be made concerning the conventional strategic weapon system concepts. The study examined (1) a number of generic missions, (2) the effects of a number of damage mechanisms from a physics perspective, (3) measures of effectiveness (MOE`s), and (4) a design envelope for kinetic energy weapon concepts. With the base of information a cut at developing a set of high-level system requirements was made, and a number of concepts were assessed against these requirements.

  9. 32 CFR 1901.31 - Special procedures for medical and psychological records.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Special procedures for medical and psychological records. 1901.31 Section 1901.31 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Additional Administrative Matters § 1901.31 Special procedures for medical...

  10. 32 CFR 1801.31 - Special procedures for medical and psychological records.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Special procedures for medical and psychological records. 1801.31 Section 1801.31 National Defense Other Regulations Relating to National Defense NATIONAL COUNTERINTELLIGENCE CENTER PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Additional Administrative Matters § 1801.31 Special procedures...

  11. 76 FR 70317 - Continuation of the National Emergency With Respect to Weapons of Mass Destruction

    Science.gov (United States)

    2011-11-10

    ... With Respect to Weapons of Mass Destruction #0; #0; #0; Presidential Documents #0; #0; #0;#0;Federal... Weapons of Mass Destruction On November 14, 1994, by Executive Order 12938, the President declared a... weapons (weapons of mass destruction) and the means of delivering such weapons. On July 28, 1998, the...

  12. Small sample Bayesian analyses in assessment of weapon performance

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Abundant test data are required in assessment of weapon performance.When weapon test data are insufficient,Bayesian analyses in small sample circumstance should be considered and the test data should be provided by simulations.The several Bayesian approaches are discussed and some limitations are founded.An improvement is put forward after limitations of Bayesian approaches available are analyzed and t he improved approach is applied to assessment of some new weapon performance.

  13. Moving Target Defense

    CERN Document Server

    Jajodia, Sushil; Swarup, Vipin; Wang, Cliff; Wang, X Sean

    2011-01-01

    Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instr

  14. Dynamic defense workshop :

    Energy Technology Data Exchange (ETDEWEB)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  15. Strategies for denaturing the weapons-grade plutonium stockpile

    Energy Technology Data Exchange (ETDEWEB)

    Buckner, M.R.; Parks, P.B.

    1992-10-01

    In the next few years, approximately 50 metric tons of weapons-grade plutonium and 150 metric tons of highly-enriched uranium (HEU) may be removed from nuclear weapons in the US and declared excess. These materials represent a significant energy resource that could substantially contribute to our national energy requirements. HEU can be used as fuel in naval reactors, or diluted with depleted uranium for use as fuel in commercial reactors. This paper proposes to use the weapons-grade plutonium as fuel in light water reactors. The first such reactor would demonstrate the dual objectives of producing electrical power and denaturing the plutonium to prevent use in nuclear weapons.

  16. DOE Nuclear Weapon Reliability Definition: History, Description, and Implementation

    Energy Technology Data Exchange (ETDEWEB)

    Wright, D.L.; Cashen, J.J.; Sjulin, J.M.; Bierbaum, R.L.; Kerschen, T.J.

    1999-04-01

    The overarching goal of the Department of Energy (DOE) nuclear weapon reliability assessment process is to provide a quantitative metric that reflects the ability of the weapons to perform their intended function successfully. This white paper is intended to provide insight into the current and long-standing DOE definition of nuclear weapon reliability, which can be summarized as: The probability of achieving the specified yield, at the target, across the Stockpile-To-Target Sequence of environments, throughout the weapon's lifetime, assuming proper inputs.

  17. Granular analyzing of weapon SoS demand description

    Institute of Scientific and Technical Information of China (English)

    Zhao Qingsong; Yang Kewei; Chen Yingwu; Li Mengjun

    2009-01-01

    The systematism of weapon combat is the typical characteristic of a modern battlefield. The process of combat is complex and the demand description of weapon system of systems (SOS) is difficult. Granular analyzing is an important method for solving the complex problem in the world. Granular thinking is introduced into the demand description of weapon SoS. Granular computing and granular combination based on a relation of compatibility is proposed. Based on the level of degree and degree of detail, the granular resolution of weapon SoS is defined and an example is illustrated at the end.

  18. National Defense: Department of Defense’s Waiver of Competitive Prototyping Requirement for the Navy’s Fleet Replenishment Oiler Program

    Science.gov (United States)

    2014-10-08

    Defense: Department of Defense’s Waiver of Competitive Prototyping Requirement for the Navy’s Fleet Replenishment Oiler Program The Weapon Systems...Department of Defense’s Waiver of Competitive Prototyping Requirement for the Navy’s Fleet Replenishment Oiler Program 5a. CONTRACT NUMBER 5b. GRANT...15, 2014, we received notice from DOD that it had waived the competitive prototyping requirement for the Fleet Replenishment Oiler (T-AO(X)) program

  19. Program specialization

    CERN Document Server

    Marlet, Renaud

    2013-01-01

    This book presents the principles and techniques of program specialization - a general method to make programs faster (and possibly smaller) when some inputs can be known in advance. As an illustration, it describes the architecture of Tempo, an offline program specializer for C that can also specialize code at runtime, and provides figures for concrete applications in various domains. Technical details address issues related to program analysis precision, value reification, incomplete program specialization, strategies to exploit specialized program, incremental specialization, and data speci

  20. Major weapon system environmental life-cycle cost estimating for Conservation, Cleanup, Compliance and Pollution Prevention (C3P2)

    Science.gov (United States)

    Hammond, Wesley; Thurston, Marland; Hood, Christopher

    1995-01-01

    The Titan 4 Space Launch Vehicle Program is one of many major weapon system programs that have modified acquisition plans and operational procedures to meet new, stringent environmental rules and regulations. The Environmental Protection Agency (EPA) and the Department of Defense (DOD) mandate to reduce the use of ozone depleting chemicals (ODC's) is just one of the regulatory changes that has affected the program. In the last few years, public environmental awareness, coupled with stricter environmental regulations, has created the need for DOD to produce environmental life-cycle cost estimates (ELCCE) for every major weapon system acquisition program. The environmental impact of the weapon system must be assessed and budgeted, considering all costs, from cradle to grave. The Office of the Secretary of Defense (OSD) has proposed that organizations consider Conservation, Cleanup, Compliance and Pollution Prevention (C(sup 3)P(sup 2)) issues associated with each acquisition program to assess life-cycle impacts and costs. The Air Force selected the Titan 4 system as the pilot program for estimating life-cycle environmental costs. The estimating task required participants to develop an ELCCE methodology, collect data to test the methodology and produce a credible cost estimate within the DOD C(sup 3)P(sup 2) definition. The estimating methodology included using the Program Office weapon system description and work breakdown structure together with operational site and manufacturing plant visits to identify environmental cost drivers. The results of the Titan IV ELCCE process are discussed and expanded to demonstrate how they can be applied to satisfy any life-cycle environmental cost estimating requirement.

  1. Militias: Exploring Alternative Force Structures for National Defense

    Science.gov (United States)

    2014-06-01

    Mountains who took part in the American revolutionary War Palmach Hebrew acronym for Plugot Mahatz, literary strike force; Haganah’s elite fighting force...the terrain gave them protection against the traditional cavalry charges that the Austrian medieval knights were seeking to use, and also greatly...might need in their fights, and the special affection they show for them. From the medieval weapons that defeated the mounted feudal knights from

  2. Cardiac fibrillation risk of Taser weapons.

    Science.gov (United States)

    Leitgeb, Norbert

    2014-06-01

    The debate on potential health hazards associated with delivering electric discharges to incapacitated subjects, in particular on whether electric discharge weapons are lethal, less lethal or non-lethal, is still controversial. The cardiac fibrillation risks of Taser weapons X26 and X3 have been investigated by measuring the delivered high-tension pulses in dependence on load impedance. Excitation thresholds and sinus-to-Taser conversion factors have been determined by numerical modeling of endocardial, myocardial, and epicardial cells. Detailed quantitative assessment of cardiac electric exposure has been performed by numerical simulation at the normal-weighted anatomical model NORMAN. The impact of anatomical variation has been quantified at an overweight model (Visible Man), both with a spatial resolution of 2 × 2 × 2 mm voxels. Spacing and location of dart electrodes were systematically varied and the worst-case position determined. Based on volume-weighted cardiac exposure assessment, the fibrillation probability of the worst-case hit was determined to 30% (Taser X26) and 9% (Taser X3). The overall risk assessment of Taser application accounting for realistic spatial hit distributions was derived from training sessions of police officers under realistic scenarios and by accounting for the influence of body (over-)weight as well as gender. The analysis of the results showed that the overall fibrillation risk of Taser use is not negligible. It is higher at Taser X26 than at Taser X3 and amounts to about 1% for Europeans with an about 20% higher risk for Asians. Results demonstrate that enhancement as well as further reduction of fibrillation risk depends on responsible use or abuse of Taser weapons.

  3. Defense AT&L. May-June 2010

    Science.gov (United States)

    2010-06-01

    change of station move to the Air Force Logistics Management Agency at Gunter Air Force Base, Ala . As I researched AFLMA, I found its mission was to...with multiple users based on technology, manu- facturer, or function? This is already being done in the areas of common avionics and weapons, but I...metal 41 Defense AT&L: May-June 2010 type modifications work out just fine. That is not to say that an avionics or more complex modification is out

  4. The Regulation of the Possession of Weapons at Gatherings

    Directory of Open Access Journals (Sweden)

    Pieter du Toit

    2013-12-01

    Full Text Available The Dangerous Weapons Act 15 of 2013 provides for certain prohibitions and restrictions in respect of the possession of a dangerous weapon and it repeals the Dangerous Weapons Act 71 of 1968 as well as the different Dangerous Weapons Acts in operation in the erstwhile TBVC States. The Act also amends the Regulation of Gatherings Act 205 of 1993 to prohibit the possession of any dangerous weapon at a gathering or demonstration. The Dangerous Weapons Act provides for a uniform system of law governing the use of dangerous weapons for the whole of South Africa and it furthermore no longer places the onus on the individual charged with the offence of the possession of a dangerous weapon to show that he or she did not have any intention of using the firearm for an unlawful purpose. The Act also defines the meaning of a dangerous weapon. According to our court’s interpretation of the Dangerous Weapons Act 71 of 1968 a dangerous weapon was regarded as an object used or intended to be used as a weapon even if it had not been designed for use as a weapon. The Act, however, requires the object to be capable of causing death or inflicting serious bodily harm if it were used for an unlawful purpose. The possession of a dangerous weapon, in circumstances which may raise a reasonable suspicion that the person intends to use it for an unlawful purpose, attracts criminal liability. The Act also provides a useful set of guidelines to assist courts to determine if a person charged with the offence of the possession of a dangerous weapon had indeed intended to use the weapon for an unlawful purpose. It seems, however, that the Act prohibits the possession of a dangerous weapon at gatherings, even if the person carrying the weapon does not intend to use it for an unlawful purpose. The state will, however, have to prove that the accused had the necessary control over the object and the intention to exercise such control, as well as that the object is capable of

  5. Postulated accident scenarios in weapons disassembly

    Energy Technology Data Exchange (ETDEWEB)

    Payne, S.S. [Dept. of Energy, Albuquerque, NM (United States)

    1997-06-01

    A very brief summary of three postulated accident scenarios for weapons disassembly is provided in the paper. The first deals with a tetrahedral configuration of four generic pits; the second, an infinite planar array of generic pits with varying interstitial water density; and the third, a spherical shell with internal mass suspension in water varying the size and mass of the shell. Calculations were performed using the Monte Carlo Neutron Photon transport code MCNP4A. Preliminary calculations pointed to a need for higher resolution of small pit separation regimes and snapshots of hydrodynamic processes of water/plutonium mixtures.

  6. Stinging plants: as future bio-weapon.

    Science.gov (United States)

    Gupta, Sanjay Mohan; Kumar, Kamal

    2016-09-01

    In the present opinion paper, we have been introducing for the first time the stinging plants and/or their biological toxins as novel bio-threat agents that may be used for the development of bio-weapons for self-defence purpose. The selected studied stinging plants are having dual role as nutraceutical and ethno-pharmacological uses apart from their less explored stinging property. However, future detailed work is required for identification and characterization of the precise stinging chemical components that will be used for the formulation of novel bio-warfare agents for self-defence purpose.

  7. Millimeter Wave Radar Applications to Weapons Systems

    Science.gov (United States)

    1976-06-01

    ocity, and azimuth and elevation arRles ; assignment of target to L weapon for engagement; and assessment of the damage by the indication of cessa- tion...paper. 29 D.E. Gray, American institute of Physics Handbook ," McGraw-Hill, New S~York, 1957. --. . - - . .A • -•• =_ . . . . •,,- - - The complex...B-13) is the target-to-clutter power ratio. I. 41I 7 Handbook of Mathematical Functions, U.S. Department of Commerce, National Bureau of Standards

  8. Environmental Detection of Clandestine Nuclear Weapon Programs

    Science.gov (United States)

    Kemp, R. Scott

    2016-06-01

    Environmental sensing of nuclear activities has the potential to detect nuclear weapon programs at early stages, deter nuclear proliferation, and help verify nuclear accords. However, no robust system of detection has been deployed to date. This can be variously attributed to high costs, technical limitations in detector technology, simple countermeasures, and uncertainty about the magnitude or behavior of potential signals. In this article, current capabilities and promising opportunities are reviewed. Systematic research in a variety of areas could improve prospects for detecting covert nuclear programs, although the potential for countermeasures suggests long-term verification of nuclear agreements will need to rely on methods other than environmental sensing.

  9. Recoil Considerations for Shoulder-Fired Weapons

    Science.gov (United States)

    2012-05-01

    2012) Steyr 15.2 mm 35 g 1450 m/s 39.6 lb 11.4 Burns (2012) Type 97 (Japanese) 20 mm 162 g 790 m/s 130 lb 28.7 Burns (2012) 12HB00 ( Remington ...shotgun 0.727 in 807 gr (12 × 00) 1225 ft/s 7.0 lb 4.37 Remington (2011) Remington Express 12B0 shotgun 0.727 in 580 gr (12 × 0) 1275 ft/s...7.0 lb 3.28 Remington 5 Table 3. Recoil-related characteristics of selected shoulder-fired weapons cited in table 1. Nomenclature

  10. [Botulinum toxin as a biological weapon].

    Science.gov (United States)

    Rossow, Heidi; Kinnunen, Paula M; Nikkari, Simo

    2012-01-01

    Botulism is caused by botulinum neurotoxin produced by the bacterium Clostridium botulinum. It is a flaccid paralysis in which consciousness and nociception are preserved. Natural botulism typically results from ingestion of inadequately heated or unheated vacuum-packed foods. In addition, botulinum toxin is one of the most feared biological weapons. In the diagnosis and treatment of botulism early suspicion is essential. Several coinciding or local clusters without a typical connecting source, or an uncommon type of toxin may indicate an intentionally caused epidemic.

  11. Interoperability In Multi-Layered Active Defense:The Need For Commonality And Robustness Between Active Defense Weapon Systems

    Science.gov (United States)

    2016-02-16

    exploded near the ballistic missile and included disruptions using an atomic explosion. Today , we know that it is possible to reach a direct hit...missile firing tests.5 The increase of ballistic missiles and rocket tests rises each year by 10 percent.6 Today , all the countries which have a...nuclear capability also have the ability to launch medium- and long-range ballistic missiles. In 2004, a report by the head of the International Atomic

  12. Operation of Integrated Weapon in the Near Area of Surface Warship%舰载近区防卫武器综合运用

    Institute of Scientific and Technical Information of China (English)

    佘博; 李进军; 汪德虎

    2014-01-01

    The research on operational application of shipboard weapons in the near area of surface warship is a new topic. Based on the analysis of the target characteristics,weapon performance and operation methods,this paper proposes the princi-ples of the integrated use of weapons.Considering the continuity of operation time domain and the superposition of effective-ness,it constructs the using logical structure of defense weapons in the near area,and builds the countermeasures models, which will provide a theoretical reference for the scientific use of the shipboard weapons.%水面舰艇近区防卫武器的作战运用研究是舰载武器作战运用研究的新课题。在分析近区防卫目标特征、武器特点、作战方法的基础上,提出近区防卫武器综合运用一般原则,基于作战时域的连续性及效果的叠加性,构建近区防卫武器使用逻辑结构,建立武器运用的对策模型,可为近区防卫武器的科学使用提供理论参考。

  13. 76 FR 6199 - Enhanced Weapons, Firearms Background Checks, and Security Event Notifications

    Science.gov (United States)

    2011-02-03

    ... Regulatory Commission 10 CFR Part 73 Enhanced Weapons, Firearms Background Checks, and Security Event... Enhanced Weapons, Firearms Background Checks, and Security Event Notifications AGENCY: Nuclear Regulatory... revisions in these implementing regulations that address the voluntary application for enhanced weapons and...

  14. 77 FR 59891 - Proposed Information Collection; Comment Request; Chemical Weapons Convention Declaration and...

    Science.gov (United States)

    2012-10-01

    ... Bureau of Industry and Security Proposed Information Collection; Comment Request; Chemical Weapons...@bis.doc.gov . SUPPLEMENTARY INFORMATION: ] I. Abstract The Chemical Weapons Convention Implementation Act of 1998 and Commerce Chemical Weapons Convention Regulations (CWCR) specify the rights...

  15. Unfolding Green Defense

    DEFF Research Database (Denmark)

    Larsen, Kristian Knus

    2015-01-01

    consumption in military operations, defense expenditure, energy security, and global climate change. The report then proceeds to introduce the NATO Green Defence Framework before exploring specific current uses of green technologies and green strategies for defense. The report concludes that a number...

  16. Avian host defense peptides

    NARCIS (Netherlands)

    Cuperus, Tryntsje; Coorens, M.; van Dijk, A.; Haagsman, H.P.

    2013-01-01

    Host defense peptides (HDPs) are important effector molecules of the innate immune system of vertebrates. These antimicrobial peptides are also present in invertebrates, plants and fungi. HDPs display broad-spectrum antimicrobial activities and fulfill an important role in the first line of defense

  17. Defense Mechanisms: A Bibliography.

    Science.gov (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    This bibliography includes studies of defense mechanisms, in general, and studies of multiple mechanisms. Defense mechanisms, briefly and simply defined, are the unconscious ego defendants against unpleasure, threat, or anxiety. Sigmund Freud deserves the clinical credit for studying many mechanisms and introducing them in professional literature.…

  18. 75 FR 27784 - Final Effect of Designation of a Class of Employees for Addition to the Special Exposure Cohort

    Science.gov (United States)

    2010-05-18

    ...., Bloomfield, New Jersey, as an addition to the Special Exposure Cohort (SEC) under the Energy Employees... Atomic Weapons Employer employees who worked at Westinghouse Electric Corp., Bloomfield, New Jersey, from...

  19. Irregular Warfare and Future War: Strategy and Defense Planning; Strategic Insights, v. 10, Special issue (October 2011), 92-98. Topic: Global Trends and Future Warfare ; Part II: Technological and Doctrinal Innovation

    OpenAIRE

    Russell, James A.

    2011-01-01

    This article appeared in Strategic Insights, v.10, Special issue (October 2011), 92-98. Topic: Global Trends and Future Warfare ; Part II: Technological and Doctrinal Innovation Approved for public display, distribution unlimited The purpose of this paper is threefold: to speculate on the role and prominence of irregular warfare in the strategic environment over the next quarter century, to comment on the impact that phenomenon may have on shaping the postulated scenarios addressed in t...

  20. Upgrading Basements for Combined Nuclear Weapons Effects: Predesigned Expedient Options II.

    Science.gov (United States)

    1980-07-01

    published by Air Force Special Weapons Center, Kirtland AFB, New Mexico , Report No. SWC-TDR 62-138, December 1962. (AD-295 408) 3 5. Manuals-Corps... 3PL //- /41 B2-28 vil~l. s T -7Z15 /Z -15𔃺 -5-2-7 S-.~~~., 7, Z W !’-. /3 Jr ’-7. 37d /3~~; 4 plp./ 7~~ la S~ /8~~ ~ ro Ale- /32 Z~2 26 ~- ~ -A

  1. The Relationship between Social Capital and Weapon Possession on Campus

    Science.gov (United States)

    Messer, Rachel H.; Bradley, Kristopher I.; Calvi, Jessica L.; Kennison, Shelia M.

    2012-01-01

    The present research focused on the problem of how college officials might be able to predict weapon possession on college campuses. We hypothesized that measures of social capital (i.e., trust and participation in society) may be useful in identifying individuals who are likely to possess weapons on campuses. Prior research has shown that those…

  2. Victimization and Health Risk Factors among Weapon-Carrying Youth

    Science.gov (United States)

    Stayton, Catherine; McVeigh, Katharine H.; Olson, E. Carolyn; Perkins, Krystal; Kerker, Bonnie D.

    2011-01-01

    Objective: To compare health risks of 2 subgroups of weapon carriers: victimized and nonvictimized youth. Methods: 2003-2007 NYC Youth Risk Behavior Surveys were analyzed using bivariate analyses and multinomial logistic regression. Results: Among NYC teens, 7.5% reported weapon carrying without victimization; 6.9% reported it with victimization.…

  3. Rethinking the Development of Weapons and Their Impact

    Science.gov (United States)

    Katsioloudis, Petros J.; Jones, Mildred V.

    2011-01-01

    As one reads about the history of humans, he/she sees very early on that humans are naturally "tool users." More specifically, humans used tools as a means of subsistence and survival. Even today humans use tools to extend their capabilities beyond imagination. These tools are even used as weapons. However primitive, these early weapons would soon…

  4. Monoclonal Antibodies to Prevent Use of Mycotoxins as Biological Weapons

    Science.gov (United States)

    2007-07-01

    Mycotoxins as Biological Weapons PRINCIPAL INVESTIGATOR: Marta Feldmesser, M.D. CONTRACTING ORGANIZATION: Albert Einstein College of...Monoclonal Antibodies to Prevent Use of Mycotoxins as Biological Weapons 5b. GRANT NUMBER W81XWH-06-1-0085 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR

  5. Adapting the Law of Armed Conflict to Autonomous Weapon Systems

    Science.gov (United States)

    2014-01-01

    remains in the realm of theory . Still, several modern highly- automated—and some would call them autonomous—weapon systems already exist. These are...CROSS, 483, 507 (2012). 58. Backstrom & Henderson, supra note 57, at 401. 59. Justin McClelland , The Review of Weapons in Accordance with Article 36

  6. Civilian preparedness and counter-terrorism: conventional weapons.

    Science.gov (United States)

    Lucci, Edward B

    2006-06-01

    Most terrorist attacks involve conventional weapons. These explosive devices produce injury patterns that are sometimes predict-able. The chaos produced from these weapons can be greatly reduced with prior planning, response practice, and realization by the entire medical community of the need to participate in preparation for these devastating events.

  7. Rethinking the Development of Weapons and Their Impact

    Science.gov (United States)

    Katsioloudis, Petros J.; Jones, Mildred V.

    2011-01-01

    As one reads about the history of humans, he/she sees very early on that humans are naturally "tool users." More specifically, humans used tools as a means of subsistence and survival. Even today humans use tools to extend their capabilities beyond imagination. These tools are even used as weapons. However primitive, these early weapons would soon…

  8. HFE (Human Factors Engineering) Technology for Navy Weapon System Acquisition.

    Science.gov (United States)

    1979-07-01

    uncovering of improved propulsion systems, sensors , weapons, etc., by industry or governr-ient agencies, may in.tiate the development of a new weapon system...needs. (No. A-109) _L a f. Tailor an acquisition stratagy for each program, as soon as the agency decides to solict alternative system design concepto

  9. Defense Primer: Procurement

    Science.gov (United States)

    2017-02-10

    provides funds to purchase major equipment. DOD classes procurement appropriations as nonconstruction-related investment costs, or the costs to acquire...capital assets, such as an F-35 Joint Strike Fighter or a Virginia-class submarine. Investment costs are distinguished from expenses, which are...4.6 Dept. of the Navy – Weapons $3.0 Remaining twelve titles $12.3 Total $107.5 Source: CRS analysis of FY2017 Public Budget Authority Database

  10. Weapons Retrieved After the Implementation of Emergency Department Metal Detection.

    Science.gov (United States)

    Malka, S Terez; Chisholm, Robin; Doehring, Marla; Chisholm, Carey

    2015-09-01

    Several high-profile violent incidents have occurred within emergency departments (EDs). There are no recent studies reporting the effectiveness of ED metal detection. Our aim was to assess the effect of metal detection on ED weapons retrieval. In September 2011, a metal detector was installed at the entrance of an urban, high-volume teaching hospital ED. The security company recorded retrieved firearms, knives, chemical sprays, and other weapons. We performed qualitative analysis of weapons retrieval data for a 26-month period. A total of 5877 weapons were retrieved, an average of 218 per month: 268 firearms, 4842 knives, 512 chemical sprays, and 275 other weapons, such as brass knuckles, stun guns, and box cutters. The number of retrieved guns decreased from 2012 to 2013 (from 182 to 47), despite an increase in metal detection hours from 8 h per day to 16 h per day. The number of retrieved knives, chemical sprays, and other weapons increased. Recovered knives increased from 2062 in 2012 to 2222 in 2013, chemical sprays increased from 170 to 305, and other weapons increased from 51 to 201. A large number of weapons were retrieved after the initiation of metal detection in the ED entrance. Increasing hours of metal detection increased the number of retrieved knives, chemical sprays, and other weapons. Retrieved firearms decreased after increasing metal detection hours. Metal detection in the ED entrance is effective in reducing entrance of weapons into the ED. Metal detectors may offer additional benefit in reducing attempts to enter with firearms. Copyright © 2015 Elsevier Inc. All rights reserved.

  11. Distinguishing among weapons offenders, drug offenders, and weapons and drug offenders based on childhood predictors and adolescent correlates.

    Science.gov (United States)

    Stephens, Skye; Day, David M

    2013-07-01

    Weapons and drug offences incur a large cost to society and tend to be strongly associated. Improved understanding of their antecedents could inform targeted early intervention and prevention programmes. This study aimed to examine differences in criminal careers, childhood predictors and adolescent correlates among weapons-only offenders, drugs-only offenders and a versatile group of weapons + drugs offenders. We conducted a longitudinal records study of 455 young Canadians charged with drug and/or weapons offences who started their offending in late childhood/early adolescence. Consistent with expectation, differences emerged in their criminal careers as the versatile group had a longer criminal career and desisted from offending at a later age than weapons-only offenders. Against prediction, weapons-only offenders experienced the greatest number of childhood predictors and adolescent correlates. The three offending groups could be differentiated on offending trajectories and developmental factors.In making links between past events and later behaviour, life-course criminology may inform development of effective early intervention and prevention strategies.As weapons-only offenders experience the greatest level of adversity in childhood and adolescence, they may benefit most (of these three groups) from early intervention and prevention programmes.A reduction in weapon carrying and use might be achieved by early identification of children risk factors (e.g. family adversity) and appropriate intervention. Copyright © 2013 John Wiley & Sons, Ltd.

  12. Specialization Patterns

    DEFF Research Database (Denmark)

    Schultz, Ulrik Pagh; Lawall, Julia Laetitia; Consel, Charles

    2000-01-01

    Design patterns offer many advantages for software development, but can introduce inefficiency into the final program. Program specialization can eliminate such overheads, but is most effective when targeted by the user to specific bottlenecks. Consequently, we propose that these concepts...... are complementary. Program specialization can optimize programs written using design patterns, and design patterns provide information about the program structure that can guide specialization. Concretely, we propose specialization patterns, which describe how to apply program specialization to optimize uses...... of design patterns. In this paper, we analyze the specialization opportunities provided by specific uses of design patterns. Based on the analysis of each design pattern, we define the associated specialization pattern. These specialization opportunities can be declared using the specialization classes...

  13. Surplus weapons-grade plutonium: a resource for exploring and terraforming Mars

    Energy Technology Data Exchange (ETDEWEB)

    Muscatello, A.C.; Houts, M.G.

    1996-12-31

    With the end of the Cold War, greater than 100 metric tons (MT) of weapons-grade plutonium (WGPu) have become surplus to defense needs in the United States and the Former Soviet Union. This paper is a proposal for an option for WGPu disposition, i.e., use of the plutonium as a fuel for nuclear reactors for Mars exploration and eventual terraforming. WGPu was used in nuclear weapons because it has a much smaller critical mass than highly enriched uranium, allowing lighter weapons with consequent longer ranges. Similarly, WGPu reactors would also require smaller amounts of fuel to attain a critical mass, making the reactor much lighter overall and resulting in large savings in launch costs. The greater than 100 MT of WGPu would generate about 1000 billion kilowatt hours of heat energy, much of which could be converted into electricity. The waste heat would also be useful to a Martian outpost or colony. A potential way of getting the WGPu reactors into space is a large gas gun like that being developed at the Lawrence Livermore National Laboratory to orbit materials by achieving high velocity at the surface, greatly reducing launch costs and enhancing reliability. Reactor components would be launched on conventional rockets or space shuttles, the reactor fuel rods would be injected into orbit using the gas gun, and the reactor would be assembled in space. Implementation of this proposal would allow disposition of a serious, expensive problem on earth by removing the WGPu from the planet and simultaneously provide a very large energy resource for Mars exploration and terraforming.

  14. Defense and the Economy

    Science.gov (United States)

    1993-01-01

    AD A 66 28 o’py 9of 27 copiesII AD-A266 288-co, .o,,,, I IDA PAPER P-28 10I * DEFENSE AND THE ECONOMY David R. Graham An-Jen Tai Barbara A...TYPE AND DATES COVERED January 1993 4. TITLE AND SUBTITLE S. FUNDING NUMBERS Defense and the Economy C-MDA 903 89C 0003i...Fomr 298 (Rev 2-4g) 3Preserked by ANSI Sid, Z39- 2I0 I I I IDA PAPER P-2810() 3 DEFENSE AND THE ECONOMY I I David R. Graham An-Jen Tai Barbara A

  15. Defense Inventory: Further Analysis and Enhanced Metrics Could Improve Service Supply and Depot Operations

    Science.gov (United States)

    2016-06-01

    to be used up beyond recovery or repair—and provides these items to the services when requisitioned in support of approximately 2,400 weapon...distribution functions for depot maintenance operations varies across the services . For example, the Air Force and DLA have agreed to a local recovery ...DEFENSE INVENTORY Further Analysis and Enhanced Metrics Could Improve Service Supply and Depot Operations Report

  16. Navy Aegis Ballistic Missile Defense (BMD) Program: Background and Issues for Congress

    Science.gov (United States)

    2011-04-19

    many ships will be available; and how the alphabet- soup of U.S. and international commanders will work together in a crisis. [Admiral Mark...meeting outside of missile defense,” Campbell said during a Nov. 3 interview with Aviation Week. These include providing weapons and manpower for...would seem a natural mission for the Army to fund and field the land-based SM-3 mission as the lead service. Campbell notes that the Army has 10

  17. China Report, Political, Sociological and Military Affairs, Introduction to National Defense Modernization %

    Science.gov (United States)

    2007-11-02

    earth satellites, and intercontin- ental balletic missiles were successfully developed, and units that could master and use these weapons and...missile. The required processing by the side that is being attacked is even more complex. A missile is fitted with seven warheads, of which some are...capacity of 1,300 telephone circuits. The Defense Communications Satellite III, which is now being developed, will be fitted with a new multibeam antenna

  18. Reform of Budgeting for Acquisition: Lessons from Private Sector Capital Budgeting for the Department of Defense

    Science.gov (United States)

    2006-09-30

    Planning Execution Budgeting Programming Planning Execution Budgeting Programming Planning After Solis 2004, 28 However, the story that these diagrams...budget be separated from the overall defense budget. This separation: would help prevent the kind of financial whiplash that causes cost overruns...notes that after nearly twenty years of reform since the Packard Commission Report and Goldwater-Nichols, “major weapons systems still cost too much

  19. FY 1978 Budget, FY 1979 Authorization Request and FY 1978-1982 Defense Programs,

    Science.gov (United States)

    1977-01-17

    petroleum comes from external sources, and more than 33 percent of that total is imported from the Persian Gulf. We draw on tin from Malaysia , Thailand and...This system, supporting laser-guided, modular glide bombs or a forward- fired weapon such as the Maverick guided missile, will provide improved...program. An additional 900 Shrike antiradiation missiles are being procured for defense suppression tasks. Some 100 laser-guided Maverick ground attack

  20. Defense AT&L. Volume 40, Number 5, September-October 2011

    Science.gov (United States)

    2011-10-01

    real difference in the field. The bottom line: Death Stars are unaffordable. Whether we’re talking about a fictional galaxy far, far away or the all... training , the path to better buying power, and the keys to career success. 9 Systems Engineering: the Affordability Secret Weapon Mike Holbert A...Wayne Turk 67 Don’t Come to the Dark Side Acquisition Lessons from a Galaxy Far, Far Away Lt. Col. Dan Ward, USAF DEPARTMENTS 30 13 Theta Defense

  1. Russian Nuclear Weapons: Past, Present, and Future

    Science.gov (United States)

    2011-11-01

    and SLBM forces, which must be re- placed as a matter of urgency. Instead, Russia has con- centrated on upgrading the electronics and avionics of...Ivanov’s meeting of U.S. Secretary of Defense Donald Rumsfeld in August 2006 in Alas - ka. Responding to Rumsfeld’s attempt to explain the benefits of

  2. Nuclear Weapons: The Reliable Replacement Warhead Program

    Science.gov (United States)

    2007-02-08

    2nd Session, Senate Hearing 99-937, 1986, pp. 167-168. 9 Ray Kidder, Stockpile Reliability and Nuclear Test Bans: Response to J.W. Rosengren’s Defense...margin of assurance. 14 Brooks statement to Senate Armed Services Committee, Apr. 4, 2005, p. 3. 15 Letter from Norris Bradbury , J. Carson Mark, and

  3. Beyond the bomb: Living without nuclear weapons

    Energy Technology Data Exchange (ETDEWEB)

    Sommer, M.

    1985-01-01

    This book is a guide to alternative strategies for building a stable peace. It provides a survey of proposals for peace. Topics covered include: alternative defense: protection without threat; nonviolence: strengths of the weak; economic conversion: swords into services; game theory: nice guys last longest; and alternative futurism: toward more practical utopias.

  4. Defensive anality and anal narcissism.

    Science.gov (United States)

    Shengold, L

    1985-01-01

    This paper aims at demonstrating a currently beleaguered assumption: the central importance, the continuing vitality, and the appropriate complexity of Freud's theory of the drives and of his idea of the primacy of the body ego. It is not enough to consider man a thinking machine or a social being; his animal nature must be given a central place in psychology. The paper postulates that 'anal or sphincter defensiveness' is one of the precursors of the repression barrier. Anality has been comparatively neglected in recent psychoanalytic literature, and so has its explorer, Karl Abraham. The paper's thesis is that there is a special defensive importance to anal erogeneity and libido, and to those aspects of ego and superego that are functionally operative (as the 'sadistic-anal organization' (Freud, 1917)) during the so-called 'sadistic-anal' developmental phase. Any of the psychic danger situations can evoke regression to manifestations of 'anal narcissim'--an attempt to master overwhelming feeling by a kind of emotional sphincter action, narrowing down the world to the controllable and the predictable. The basic assumption here is Fliess's idea that the attainment of anal sphincter control functions--with, as-it-were, 'psychic resonance'--as a means to master primal (murderous, cannibalistic) affect. For optimal psychic development, a proper balance must be attained between anal control of, and anal expression of, instinctual derivatives--especially of affect laden with aggression.

  5. U.S. weapons-usable plutonium disposition policy: Implementation of the MOX fuel option

    Energy Technology Data Exchange (ETDEWEB)

    Woods, A.L. [ed.] [Amarillo National Resource Center for Plutonium, TX (United States); Gonzalez, V.L. [Texas A and M Univ., College Station, TX (United States). Dept. of Political Science

    1998-10-01

    A comprehensive case study was conducted on the policy problem of disposing of US weapons-grade plutonium, which has been declared surplus to strategic defense needs. Specifically, implementation of the mixed-oxide fuel disposition option was examined in the context of national and international nonproliferation policy, and in contrast to US plutonium policy. The study reveals numerous difficulties in achieving effective implementation of the mixed-oxide fuel option including unresolved licensing and regulatory issues, technological uncertainties, public opposition, potentially conflicting federal policies, and the need for international assurances of reciprocal plutonium disposition activities. It is believed that these difficulties can be resolved in time so that the implementation of the mixed-oxide fuel option can eventually be effective in accomplishing its policy objective.

  6. Proportionality, just war theory and weapons innovation.

    Science.gov (United States)

    Forge, John

    2009-03-01

    Just wars are supposed to be proportional responses to aggression: the costs of war must not greatly exceed the benefits. This proportionality principle raises a corresponding 'interpretation problem': what are the costs and benefits of war, how are they to be determined, and a 'measurement problem': how are costs and benefits to be balanced? And it raises a problem about scope: how far into the future do the states of affairs to be measured stretch? It is argued here that weapons innovation always introduces costs, and that these costs cannot be determined in advance of going to war. Three examples, the atomic bomb, the AK-47 and the ancient Greek catapult, are given as examples. It is therefore argued that the proportionality principle is inapplicable prospectively. Some replies to the argument are discussed and rejected. Some more general defences of the proportionality principle are considered and also rejected. Finally, the significance of the argument for Just War Theory as a whole is discussed.

  7. Nuclear weapons issues in South Asia

    Energy Technology Data Exchange (ETDEWEB)

    Joeck, N.

    1993-07-02

    This report discusses how the US can play a productive mediating role in South Asia by engaging India and Pakistan in an international forum to manage nuclear weapons, as Edward Teller advocated. India and Pakistan have developed their nuclear capabilities because they fear their neighbors, not because they want to threaten fear their neighbors, not because they want to threaten the US. The appropriate response for the US, therefore, is diplomatic engagement and negotiations. In addition to the international approach, encouragement and facilitation of regional and bilateral interactions will also be important. Formal arms control agreements have been reached, but less formal confidence-building measures, and unilateral security pledges may well be combined to form a more secure strategic environment in South Asia than a nuclear armed confrontation across the porous South Asian border.

  8. Defense Intelligence: Additional Steps Could Better Integrate Intelligence Input into DODs Acquisition of Major Weapon Systems

    Science.gov (United States)

    2016-11-01

    Homeland Security (Office of Intelligence and Analysis ), Department of State (Bureau of Intelligence and Research), Department of Treasury (Office...of Intelligence and Analysis ), Federal Bureau of Investigation (National Security Branch), Drug Enforcement Administration (Office of National...acquisition programs that begin during the materiel solution analysis phase, intelligence inputs into the acquisition process are expected to be provided

  9. Sources of Weapon System Cost Growth. Analysis of 35 Major Defense Acquisition Programs

    Science.gov (United States)

    2008-01-01

    Resource Management Program of RAND Proj- iii ect AIR FORCE. The project’s technical monitor is Jay Jordan, Techni- cal Director of the Air Force Cost...and for his long-term support of Project AIR FORCE’s acquisi- tion and cost analysis research. Richard Hartley (SAF/FMC) and Jay Jordan from the Air...Wickman (1993), Tyson, Nelson, and Utech (1992), Shaw (1982), Tyson et al. (1989), Asher and Maggelet (1984), and Drezner et al. (1993) studied cost

  10. Impact of Defense Industry Mergers on The Cost of Military Weapons Systems

    Science.gov (United States)

    2007-12-01

    Thibodeau THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for...Grisko R. Alfonso Approved by: Nayantara Hensel Lead Advisor Nicole Thibodeau Second Reader Robert N. Beck, Dean...4. Prof. Nicole Thibodeau Naval Postgraduate School Monterey, California 5. Dean Robert N. Beck Naval Postgraduate School Monterey, California

  11. Defense Acquisitions. Measuring the Value of DOD’s Weapon Programs Requires Starting with Realistic Baselines

    Science.gov (United States)

    2009-04-01

    schedule delay in delivering initial capabilities 18 months 21 months 22 months Source: GAO analysis of DOD data. aData were obtained from DOD’s...efficient. Too many major acquisitions currently take the opposite approach by seeking to deliver a revolutionary “ big bang” capability in one step...candidate programs and to go for the “ big bang” capability without the knowledge to achieve it should be resisted. Only the best candidates--defined in

  12. The Legend of Hot Tar or Pitch as a Defensive Weapon

    DEFF Research Database (Denmark)

    2015-01-01

    research. In reality, this way of fighting can only be seen as a legend, i.e. a story with only a relative truth at its core. This paper will examine the origin of this historical tradition and its archaeological and architectural sources. The chemical and physical properties of tar pitch and its....... This practice was known in England, parts of Scandinavia and in some parts of the USA right up until the 20th century. The combination of these two completely separate lines of tradition will be considered as a possible root of this popular legend about castles at war....

  13. Report of the Defense Science Board Task Force on Nuclear Weapon Effects Test, Evaluation, and Simulation

    Science.gov (United States)

    2005-04-01

    systems may have to survive. The direct output of a nuclear burst consists of neutrons , γ rays, and X- rays, and there are facilities designed to...enriched uranium (LEU). A large pulsed-power electron accelerator - 36 - generates the initial burst of neutrons . The electron beam hits a metal...the ionizing dose in a component. Motion of the system can significantly shift the thermal and epithermal portion of the neutron spectrum

  14. Radiological Weapons: How Great Is The Danger?

    Energy Technology Data Exchange (ETDEWEB)

    Moore, G M

    2003-06-01

    One of the underlying purposes of this paper is to provoke thinking about the interplay between the regulation of radioactive materials and the risk of their use in an radiological weapon (RW). Also considered in this paper are the types of RWs that a terrorist might use, the nature of the threat and danger posed by the various types of RWs, the essential elements that must be considered in responding to the terrorist use of an RW, and what steps may need to be taken a priori to minimize the consequences of the inevitable use of an RW. Because radiological dispersal devices (RDDs) have been the focus of so much recent concern and because RDDs are arguably the most likely of RWs to be used by a terrorist group, a major focus of this paper will be on RDDs. Radiological weapons are going to be used by some individual or group, if not this year then next year, or at some time in the foreseeable future. A policy of focusing resources solely on prevention of their use would leave any government open to significant economic disruption when the inevitable use occurs. Preplanning can limit the injuries, property damage, and economic losses that might result from the use of an RW. Moreover, a combination of efforts to prevent and to minimize the impact of RWs may significantly discourage potential users. The dangers from RWs can be dealt with while society continues to enjoy the benefits of nuclear technology that were promised under Atoms for Peace. However, some restructuring of our use of radioactive materials is necessary to ensure that the current and future uses of radioactive materials outweigh the potential disruption caused by misuse of the materials in RWs.

  15. Surfing China's National Defense

    Institute of Scientific and Technical Information of China (English)

    Ji Guilin

    2010-01-01

    @@ Following the start of its first test run on August 20, 2009, the website www.mod.gov.cn of the Ministry of National Defense (MOD) of the People's Republic of China has logged more than 2 billion hits,from many countries and regions including China, the United States,the United Kingdom, Japan, Australia and Singapore. China National Defense News reporters recently interviewed Ji Guilin, the website's Editor in Chief, on its performance and the feedback of netizens.

  16. Screening adolescents in the emergency department for weapon carriage.

    Science.gov (United States)

    Cunningham, Rebecca M; Resko, Stella M; Harrison, Stephanie Roahen; Zimmerman, Marc; Stanley, Rachel; Chermack, Stephen T; Walton, Maureen A

    2010-02-01

    The objective was to describe the prevalence and correlates of past-year weapon involvement among adolescents seeking care in an inner-city emergency department (ED). This cross-sectional study administered a computerized survey to all eligible adolescents (age 14-18 years), 7 days a week, who were seeking care over an 18-month period at an inner-city Level 1 ED. Validated measures were administered, including measures of demographics, sexual activity, substance use, injury, violent behavior, weapon carriage, and/or weapon use. Zero-inflated Poisson (ZIP) regression models were used to identify correlates of the occurrence and past-year frequency of these weapons variables. Adolescents (n = 2069, 86% response rate) completed the computerized survey. Fifty-five percent were female; 56.5% were African American. In the past year, 20% of adolescents reported knife or razor carriage, 7% reported gun carriage, and 6% pulled a knife or gun on someone. Although gun carriage was more frequent among males, females were as likely to carry a knife or pull a weapon in the past year. One-fifth of all adolescents seeking care in this inner-city ED have carried a weapon. Understanding weapon carriage among teens seeking ED care is a critical first step to future ED-based injury prevention initiatives. (c) 2010 by the Society for Academic Emergency Medicine.

  17. 32 CFR 220.11 - Special rules for automobile liability insurance and no-fault automobile insurance.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Special rules for automobile liability insurance and no-fault automobile insurance. 220.11 Section 220.11 National Defense Department of Defense... OF REASONABLE CHARGES FOR HEALTHCARE SERVICES § 220.11 Special rules for automobile...

  18. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2010-12-08

    ... of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of... a closed meeting of the Defense Intelligence Agency National Defense Intelligence College Board...

  19. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2011-05-19

    ... of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of... a closed meeting of the Defense Intelligence Agency National Defense Intelligence College Board...

  20. 76 FR 28757 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-05-18

    ... of the Secretary Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice of Availability (NOA) of Revised Defense Logistics Agency Regulation. SUMMARY: The Defense Logistics...

  1. 我國智慧財產訴訟中專利權無效抗辯趨勢報導 The Defense of Patent Invalidity in the Intellectual Property Litigation Special Report

    Directory of Open Access Journals (Sweden)

    陳群顯 Chun-Hsien Chen

    2007-06-01

    Full Text Available 我國智慧財產民事訴訟中,以往囿於「公、私法訴訟二元制」之體系設計,被告即便認為原告所主張之智慧財產權有無效的理由,亦僅能循行政救濟的途徑主張,並無法直接於民事訴訟中直接提起智慧財產權無效抗辯,造成民事訴訟程序之延滯等不便。我國預計於2007 年間設立智慧財產法院,而該法院之設立對於我國智慧財產案件之爭訟將產生巨大而直接之影響,而攸關該法院成敗之主要關鍵⎯⎯「智慧財產法院組織法」及「智慧財產案件審理法」等二法案,業已送立法院進行審查。其中「智慧財產案件審理法」已 於2007 年1 月9 日經立法院三讀通過,「智慧財產法院組織法」亦已於2007 年3 月5 日經立法院三讀通過。「智慧財產案件審理法」中一項劃時代的變革,即是在第16 條第1 項規定:「當事人主張或抗辯智慧財產權有應撤銷、廢止之原因者,法院應就其主張或抗辯有無理由自為判斷」,易言之,該法條規定將直接改變目前我國「公、私法訴訟二元制」的現狀,對於專利訴訟當事人間自產生重大之影響,然依據該法案之規定,是否確能達到立法者之目的?以及是否需要有其他配套制度?本文將介紹我國智慧財產訴訟中 專利權無效抗辯相關制度沿革,並嘗試提供分析意見,同時就目前各國相關專利訴訟制度之設計,提供分析及建議。 In the past, the defendant of intellectual property (IP litigation cannot raise the defense of patent invalidity in the civil litigation. The defendant can only file an invalidity action against the IP at issue. Such judicial system design delays the proceeding of the civil litigation of the IP infringement. The IP Court is proposed to be established in 2007. The establishment of the IP Court will change the current court proceeding of the intellectual

  2. US technical assistance to two specialized agencies of the UN

    Energy Technology Data Exchange (ETDEWEB)

    Reisman, A.W.; Parsick, R.J.; Indusi, J.P.

    1995-12-31

    Specialized agencies of the United Nations are a part of the functioning of the existing world order. Those agencies which verify compliance with specific international treaties will be more important in the future. Two such agencies illustrate UN activities in the area of disarmament and have received special attention: the International Atomic Energy Agency (IAEA) in Vienna, Austria; the Organization for the Prohibition of Chemical Weapons (OPCW) in The Hague, Holland.

  3. Hamburgian weapon delivery technology: a quantitative comparative approach

    DEFF Research Database (Denmark)

    Riede, Felix

    2010-01-01

    cran). Numerous studies have addressed the question of whether these points tipped arrows fired from bows, darts launched with the help of spear-throwers, or some other projectile delivery weapon. This paper approaches the question of Hamburgian weapon delivery technology from a quantitative...... comparative angle. Lithic metric data as well as information on presumed Hamburgian projectile shafts are used to demonstrate that the bow-and-arrow was the most likely weapon delivery method. This is reflected in the shape similarity with both later prehistoric arrow-points and shafts of the Ahrensburgian...

  4. 77 FR 66513 - Continuation of the National Emergency With Respect to Weapons of Mass Destruction

    Science.gov (United States)

    2012-11-05

    ... Documents#0;#0; ] Notice of November 1, 2012 Continuation of the National Emergency With Respect to Weapons... economy of the United States posed by the proliferation of nuclear, biological, and chemical weapons (weapons of mass destruction) and the means of delivering such weapons. On July 28, 1998, the President...

  5. 3 CFR - Continuation of Emergency With Respect to Weapons of Mass Destruction

    Science.gov (United States)

    2010-01-01

    ... 3 The President 1 2010-01-01 2010-01-01 false Continuation of Emergency With Respect to Weapons of... Continuation of Emergency With Respect to Weapons of Mass Destruction On November 14, 1994, by Executive Order... of nuclear, biological, and chemical weapons (weapons of mass destruction) and the means of...

  6. 75 FR 68671 - Continuation of Emergency With Respect to Weapons of Mass Destruction

    Science.gov (United States)

    2010-11-08

    ... Notice of November 4, 2010--Continuation of Emergency With Respect to Weapons of Mass Destruction #0; #0... Continuation of Emergency With Respect to Weapons of Mass Destruction On November 14, 1994, by Executive Order... of nuclear, biological, and chemical weapons (weapons of mass destruction) and the means of...

  7. The Weaponization of Space: A Strategic Estimate

    Science.gov (United States)

    2007-11-02

    Bodies . Office for Outer Space Affairs. Vienna, Austria: October 1967. Article on-line. Available from:http://www.oosa.unvienna.org/treat/ost...Ballistic Missile Defense, Space, and the Danger of Nuclear War,” Speech to the American Philosophical Society Millenial Symposium, (29 April 2000...Other Celestial Bodies . Office for Outer Space Affairs (Vienna, Austria: October 1967), 1. Article on-line. Available from: http

  8. Industry Study, Weapons Industry, Spring 2009

    Science.gov (United States)

    2009-01-01

    Agencies Sdn. Bhd.; Malaysia Aircraft Inspection, Repair, and Overhaul Depot; Malaysia American Malaysian Chamber of Commerce; Malaysia Samsung Techwin...Defense Energy Support Center (DESC). DESC is one of four Inventory Control Points of DLA and is the DOD’s Executive Agent for all bulk petroleum...need for Service personnel to serve in positions as Item and Inventory Managers, as Buyers, as Contracting Officers, as Quality Assurance

  9. Nuclear Weapon Accident Response Procedures (NARP)

    Science.gov (United States)

    2005-02-22

    readiness for initiation to a safe condition. DL1.1.132. Second-Order Closure Integrated Puff ( SCIPUFF ). SCIPUFF is the transport model used...within the HPAC model to predict the expected dispersion on Nuclear, Biological, and Chemical (NBC) materials and associated uncertainties. SCIPUFF ...Contained Breathing Apparatus AL1.1.232. SCIPUFF Second-Order Closure Integrated Puff AL1.1.233. SDO Senior Defense Official AL1.1.234. SECDEF Secretary of

  10. Correlates of weapon carrying in school among adolescents in three countries.

    Science.gov (United States)

    Stickley, Andrew; Koyanagi, Ai; Koposov, Roman; Blatný, Marek; Hrdlička, Michal; Schwab-Stone, Mary; Ruchkin, Vladislav

    2015-01-01

    To determine the factors associated with weapon carrying in school among Czech, Russian, and US adolescents. Logistic regression was used to analyze data drawn from the Social and Health Assessment (SAHA). Violent behavior (perpetration / victimization) was linked to adolescent weapon carrying in all countries. Substance use was associated with weapon carrying among boys in all countries. Greater parental warmth reduced the odds for weapon carrying among Czech and Russian adolescents. Associating with delinquent peers was important for weapon carrying only among US adolescents. Factors associated with weapon carrying in school vary among countries although violent behavior and substance use may be associated with weapon carrying across countries.

  11. The US-China Face-Off in the Asia-Pacific Region: What Answer Can the Offense-Defense Theory Provide

    Science.gov (United States)

    2015-06-01

    of cyber technology being used as a weapon comes from Operation Orchard . On the night of 06 September 2007, Israeli fighter aircrafts destroyed the...groundwork in Artificial Intelligence (AI) to create fully automatic network defense systems. The program is aimed at finding solutions to computer

  12. Special nuclear material information, security classification guidance. Instruction

    Energy Technology Data Exchange (ETDEWEB)

    Flickinger, A.

    1982-12-03

    The Instruction reissues DoD Instruction 5210.67, July 5, 1979, and provides security classification guidance for information concerning significant quantities of special nuclear material, other than that contained in nuclear weapons and that used in the production of energy in the reactor plant of nuclear-powered ships. Security classification guidance for these data in the latter two applications is contained in Joint DoE/DoD Nuclear Weapons Classification Guide and Joint DoE/DoD Classification Guide for the Naval Nuclear Propulsion Program.

  13. The use of neutron scattering in nuclear weapons research

    Energy Technology Data Exchange (ETDEWEB)

    Juzaitis, R.J. [Los Alamos National Lab., NM (United States)

    1995-10-01

    We had a weapons science breakout session last week. Although it would have been better to hold it closer in time to this workshop, I think that it was very valuable. it may have been less of a {open_quotes}short-sleeve{close_quotes} workshop environment than we would have liked, but as the first time two communities-the weapons community and the neutron scattering community- got together, it was a wonderful opportunity to transfer information during the 24 presentations that were made. This report contains discussions on the fundamental analysis of documentation of the enduring stockpile; LANSCE`s contribution to weapons; spallation is critical to understanding; weapons safety assessments; applied nuclear physics requires cross section information; fission models need refinement; and establishing teams on collaborative projects.

  14. Perfection and the Bomb: Nuclear Weapons, Teleology, and Motives.

    Science.gov (United States)

    Brummett, Barry

    1989-01-01

    Uses Kenneth Burke's theory of perfection to explore the vocabularies of nuclear weapons in United States public discourse and how "the Bomb" as a God term has gained imbalanced ascendancy in centers of power. (MS)

  15. the international politics of nuclear weapons: a constructivist analysis

    African Journals Online (AJOL)

    JK

    interest including India, Pakistan, China, North Korea and the US; and .... and conventions against the development, stockpiling and use of nuclear weapons. ...... process, the Agency discovered illicit nuclear procurement networks (UN News.

  16. Cargo/Weapons Elevator Land Based Engineering Site

    Data.gov (United States)

    Federal Laboratory Consortium — The Cargo and Weapons Facility consists of a suite of full scale and component test facilities contiguously located in building 77H. The site was constructed in 1987...

  17. Hamburgian weapon delivery technology: a quantitative comparative approach

    DEFF Research Database (Denmark)

    Riede, Felix

    2010-01-01

    The pioneer human re-colonisation of Southern Scandinavia after the Last Ice Age began some time around 12,700 calendar years BC and is associated with the Hamburgian techno-complex. These groups were reindeer hunters whose hunting weapons were tipped with the eponymous shouldered points (pointes á...... cran). Numerous studies have addressed the question of whether these points tipped arrows fired from bows, darts launched with the help of spear-throwers, or some other projectile delivery weapon. This paper approaches the question of Hamburgian weapon delivery technology from a quantitative...... comparative angle. Lithic metric data as well as information on presumed Hamburgian projectile shafts are used to demonstrate that the bow-and-arrow was the most likely weapon delivery method. This is reflected in the shape similarity with both later prehistoric arrow-points and shafts of the Ahrensburgian...

  18. Los Alamos National Laboratory JOWOG 31 Weapons Engineering Education & Training

    Energy Technology Data Exchange (ETDEWEB)

    Domzalski, Mark W. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-10-03

    The objectives of this report are to recruit talented staff, invest in new and early/mid career staff, retain trained and talented staff and future leaders, and shorten the ~5-10 year time line to realize new Weaponeers.

  19. Revolution in military affairs, missile defence and weapons in space ...

    African Journals Online (AJOL)

    Revolution in military affairs, missile defence and weapons in space: the US ... 1991 Gulf War that captured the imagination of military planners and policy makers, ... Firstly, very few countries have the financial and technological capability to ...

  20. Application of inertial confinement fusion to weapon technology

    Energy Technology Data Exchange (ETDEWEB)

    Toepfer, A.J.; Posey, L.D.

    1978-12-01

    This report reviews aspects of the military applications of the inertial confinement fusion (ICF) program at Sandia Laboratories. These applications exist in the areas of: (1) weapon physics research, and (2) weapon effects simulation. In the area of weapon physics research, ICF source technology can be used to study: (1) equations-of-state at high energy densities, (2) implosion dynamics, and (3) laboratory simulation of exoatmospheric burst phenomena. In the area of weapon effects simulation, ICF technology and facilities have direct near, intermediate, and far term applications. In the near term, short pulse x-ray simulation capabilities exist for electronic component effects testing. In the intermediate term, capabilities can be developed for high energy neutron exposures and bremsstrahlung x-ray exposures of components. In the far term, system level exposures of full reentry vehicles will be possible if sufficiently high pellet gains are achieved.

  1. Arms Control: US and International efforts to ban biological weapons

    Energy Technology Data Exchange (ETDEWEB)

    1992-12-01

    The Bacteriological (Biological) and Toxin Weapons Convention, the treaty that bans the development, production, and stockpiling and acquisition of biological weapons was opened for signature in 1972 and came into force in 1975 after being ratified by 22 governments, including the depository nations of the USA, the United Kingdom, and the former Soviet Union. In support of the Convention, the USA later established export controls on items used to make biological weapons. Further, in accordance with the 1990 President`s Enhanced Proliferation Control Initiative, actions were taken to redefine and expand US export controls, as well as to encourage multilateral controls through the Australia Group. Thus far, the Convention has not been effective in stopping the development of biological weapons. The principal findings as to the reasons of the failures of the Convention are found to be: the Convention lacks universality, compliance measures are effective, advantage of verification may outweigh disadvantages. Recommendations for mitigating these failures are outlined in this report.

  2. Pakistan’s Nuclear Weapons: Proliferation and Security Issues

    Science.gov (United States)

    2010-10-07

    on Fissile Materials http://www.fissilematerials.org/ipfm/ site_down/gfmr07.pdf; SIPRI Yearbook 2007. The International Panel on Fissile Materials...State for Foreign and Commonwealth Affairs David Miliband told the Charlie Rose Show December 15, 2008, that Islamabad’s nuclear weapons “are under...Weapons in Pakistan,” Pakistan Security Research Unit Brief Number 22, University of Bradford, November 18, 2007. Available at http://spaces.brad.ac.uk

  3. Historical fencing and scientific research medieval weapons: common ground

    Directory of Open Access Journals (Sweden)

    B. V. Hrynchyshyn

    2015-07-01

    We considered various approaches to the reconstruction of the historical fencing. It is proved that the activities of such societies has a positive effect on the process research of features of medieval weapons, fighting tactics of different periods The various approaches to the reconstruction of the historical fencing. Proved that the activities of such societies has a positive effect on the process research of features of medieval weapons, fighting tactics of different periods.

  4. Syria’s Chemical Weapons: Issues for Congress

    Science.gov (United States)

    2013-09-12

    regime of President Bashar al Asad possesses stocks of nerve (sarin, VX ) and blister (mustard gas) agents , possibly weaponized into bombs, shells...largest in the world” during a June 2012 interview.16 Damascus possesses mustard blister agent , sarin nerve agent , and VX nerve agent , according to...chemical weapons stockpile. Syria also has several hundred metric tons of mustard agent in ready-to-use form and several tens of metric tons of VX . The

  5. Effects of Weapons on Aggressive Thoughts, Angry Feelings, Hostile Appraisals, and Aggressive Behavior: A Meta-Analytic Review of the Weapons Effect Literature.

    Science.gov (United States)

    Benjamin, Arlin J; Kepes, Sven; Bushman, Brad J

    2017-09-01

    Guns are associated with aggression. A landmark 1967 study showed that simply seeing a gun can increase aggression-called the "weapons effect." This meta-analysis integrates the findings of weapons effect studies conducted from 1967 to 2017. It includes 162 effect-size estimates from 78 independent studies involving 7,668 participants. The theoretical framework used to explain the weapons effect was the General Aggression Model (GAM), which proposes three routes to aggression-cognitive, affective, and arousal. The GAM also proposes that hostile appraisals can facilitate aggression. As predicted by the GAM, the mere presence of weapons increased aggressive thoughts, hostile appraisals, and aggression, suggesting a cognitive route from weapons to aggression. Weapons did not significantly increase angry feelings. Only one study tested the effects of weapons on arousal. These findings also contribute to the debate about social priming by showing that incidental exposure to a stimulus (weapon) can affect subsequent related behavior (aggression).

  6. Automated Navigation System based on Weapon-Target Assignment

    Directory of Open Access Journals (Sweden)

    Mohammad Khairudin

    2011-12-01

    Full Text Available Operating of weapon on the tank is mostly by manually. It is not desired performance for a critical operation. An automatic control system is required to operate the weapon with the target while maintaining the accuracy. In this paper has designed an automatic weapon control system using object image proccessing. Various an image processing methods used to improve the weapon accuracy to obtain the intended target. The method used in digital image processing is the Camshift motion tracking method. This method is compared with the Lucas Canade motion tracking method. This comparison is conducted to found more precise results between the two methods. Results of object image processing are used to control the direction of the weapon that towards the desired goal. The results show that the implementation of the Lucas Canade motion tracking method using fire simulation tools have been successful. The performance of the Lucas Canade motion tracking methods is better than the CamShift method. Using Lucas Canade method for weapon controller is accordance with the purposes.

  7. Detection of weapons of mass destruction

    Science.gov (United States)

    Bjorkholm, Paul J.

    2003-07-01

    High Energy X-ray cargo screening is a mature technology that has proven its value in the detection of contraband material hidden within cargo including fully loaded sea containers. To date high energy screening has been largely applied to manifest verification and to drug detection. However, the dramatic change in world terrorism has altered the application. Now it is essential that weapons of mass destruction (WMD"s) be interdicted with incredibly high accuracy. The implication of a missed detection has gone from loss of revenue or the lowering of the street price of drugs to potentially stopping, at least for some significant time, most world commerce. Screening containers with high energy x-rays (~250+ mm of steel penetration) is capable of detecting all nuclear threats at a fraction of the strategically important mass. The screening operation can be automated so that no human decisions are required with very low false alarms. Finally, the goal of 100% inspection of cargo inbound to the United States from the twenty largest international ports is an achievable goal with hardware costs in the area of that already spent on airport security.

  8. Defense styles of pedophilic offenders.

    Science.gov (United States)

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas

    2008-04-01

    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization.

  9. Weapon Simulator Test Methodology Investigation: Comparison of Live Fire and Weapon Simulator Test Methodologies and the Effects of Clothing and Individual Equipment on Marksmanship

    Science.gov (United States)

    2016-09-15

    marksmanship performance) mirror those which would be captured in a live fire evaluation . 1 WEAPON SIMULATOR TEST METHODOLOGY INVESTIGATION ...METHODOLOGY INVESTIGATION : COMPARISON OF LIVE FIRE AND WEAPON SIMULATOR TEST METHODOLOGIES AND THE EFFECTS OF CLOTHING AND INDIVIDUAL EQUIPMENT ON...2. REPORT TYPE Final 3. DATES COVERED (From - To) October 2014 – August 2015 4. TITLE AND SUBTITLE WEAPON SIMULATOR TEST METHODOLOGY INVESTIGATION

  10. 32 CFR 319.7 - Special procedures: Medical records.

    Science.gov (United States)

    2010-07-01

    ... (CONTINUED) PRIVACY PROGRAM DEFENSE INTELLIGENCE AGENCY PRIVACY PROGRAM § 319.7 Special procedures: Medical..., have an adverse effect on the physical or mental health or safety and welfare of the requester or...

  11. Defense Research Enterprise Assessment

    Science.gov (United States)

    2017-01-01

    Please review the report findings and recommendations. I am interested in receiving your feedback for inclusion in programs wherever these...needed culture shift to utilize their existing authorities. Finally, expanded coordination among intermural basic research portfolios across the Labs...research portfolios across the Labs without creating additional administrative burdens is needed. The defense research enterprise should

  12. AFRL Defensive IO Programs

    Science.gov (United States)

    2007-11-02

    Wireless Information Assurance • Steganography • Air Force Enterprise Defense (AFED) 10 Distributed Agents for Information Warfare Operational...information (images, documents, overlays, audio , links, etc.) •multi-level data release to coalition forces; key-based access •covert communication...maximize throughput of communication channels Data Hiding/Embedding Steganography Watermarking Steganalysis 14 Payoffs • Integrates existing

  13. Defense Business Transformation

    Science.gov (United States)

    2009-12-01

    other. SCM and ERP systems both contribute to the overall distribution and coordination of resources. Just as an ERP enhances information flow...inventory management system (Thureen 2008). It combines the Army’s disparate wholesale and retail inventories, into one combined system (Sparacino 2002...Studies.............................................................................. 73 1. Defense Integrated Military Human Resource System

  14. Robust Preallocated Preferential Defense.

    Science.gov (United States)

    1985-08-01

    Frye , W.H. and Ullman, L.L., Methodology for Calculating Minuteman Defense Effectiveness, SRD-EGI4, Stanford Research Institute, October 1973. 4. Hogg...Corporation 1500 Wilson Boulevard Arlington, VA 22209 ATTN: Dr. Tucker Battle Dr. James Skouras Dr. Iram Weinstein Northrop Corporation 8900 E. Washington

  15. Specialized languages

    DEFF Research Database (Denmark)

    Mousten, Birthe; Laursen, Anne Lise

    2016-01-01

    -disciplinarily, because they work with both derivative and contributory approaches. Derivative, because specialized language retrieves its philosophy of science as well as methods from both the natural sciences, social sciences and humanistic sciences. Contributory because language results support the communication......Across different fields of research, one feature is often overlooked: the use of language for specialized purposes (LSP) as a cross-discipline. Mastering cross-disciplinarity is the precondition for communicating detailed results within any field. Researchers in specialized languages work cross...... science fields communicate their findings. With this article, we want to create awareness of the work in this special area of language studies and of the inherent cross-disciplinarity that makes LSP special compared to common-core language. An acknowledgement of the importance of this field both in terms...

  16. 32 CFR Appendix E to Part 57 - DoD-CC on Early Intervention, Special Education, and Related Services

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false DoD-CC on Early Intervention, Special Education... SECRETARY OF DEFENSE PERSONNEL, MILITARY AND CIVILIAN PROVISION OF EARLY INTERVENTION AND SPECIAL EDUCATION..., Special Education, and Related Services A. Committee Membership The DoD-CC shall meet at least yearly to...

  17. Reducing weapon-carrying among urban American Indian young people.

    Science.gov (United States)

    Bearinger, Linda H; Pettingell, Sandra L; Resnick, Michael D; Potthoff, Sandra J

    2010-07-01

    To examine the likelihood of weapon-carrying among urban American Indian young people, given the presence of salient risk and protective factors. The study used data from a confidential, self-report Urban Indian Youth Health Survey with 200 forced-choice items examining risk and protective factors and social, contextual, and demographic information. Between 1995 and 1998, 569 American Indian youths, aged 9-15 years, completed surveys administered in public schools and an after-school program. Using logistic regression, probability profiles compared the likelihood of weapon-carrying, given the combinations of salient risk and protective factors. In the final models, weapon-carrying was associated significantly with one risk factor (substance use) and two protective factors (school connectedness, perceiving peers as having prosocial behavior attitudes/norms). With one risk factor and two protective factors, in various combinations in the models, the likelihood of weapon carrying ranged from 4% (with two protective factors and no risk factor in the model) to 80% of youth (with the risk factor and no protective factors in the model). Even in the presence of the risk factor, the two protective factors decreased the likelihood of weapon-carrying to 25%. This analysis highlights the importance of protective factors in comprehensive assessments and interventions for vulnerable youth. In that the risk factor and two protective factors significantly related to weapon-carrying are amenable to intervention at both individual and population-focused levels, study findings offer a guide for prioritizing strategies for decreasing weapon-carrying among urban American Indian young people. Copyright (c) 2010 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  18. Bullying and weapon carrying: a meta-analysis.

    Science.gov (United States)

    van Geel, Mitch; Vedder, Paul; Tanilon, Jenny

    2014-08-01

    Studies suggest that adolescents involved in bullying are more likely to carry weapons than their uninvolved peers. To use meta-analyses to determine whether victims, bullies, and bully-victims are more likely to carry weapons than uninvolved peers. PsycINFO, ERIC, MEDLINE, LILACS, EMBASE, and Dissertation Abstracts International were searched for relevant publications (1950 through January 2014). The reference list of a review article and reference lists of retrieved articles were checked for further relevant studies. Studies were included if they provided an effect size comparing the weapon carrying of adolescent victims, bullies, or bully-victims with that of uninvolved peers. Studies that included individuals older than 21 years were excluded, as were studies that focused on incarcerated youth or youth diagnosed as having a psychopathologic condition. Studies were coded independently by 2 of us. The agreement rate was 93%. Effect sizes were coded that compared victims, bullies, or bully-victims with uninvolved peers. Meta-analyses were based on 22 studies for victims (n = 257 179), 15 studies for bullies (n = 236 145), and 8 studies for bully-victims (n = 199 563). This study focused on weapon carrying among adolescents. Hypotheses were formulated before the study. Victims (odds ratio, 1.97; 95% CI, 1.62-2.39), bullies (3.25; 2.72-3.89), and bully-victims (4.95; 3.77-6.50) were more likely to carry weapons than uninvolved peers. Analyses provided no indication of publication bias. Studies conducted in the United States found stronger relations between being a bully-victim and weapon carrying (odds ratio, 7.84; 95% CI, 6.02-10.21) than studies from other countries (3.62; 2.30-5.68; Q1 = 8.401; P = .004). Involvement in bullying as a victim, bully, or bully-victim is related to weapon carrying.

  19. Why are U.S. nuclear weapon modernization efforts controversial?

    Science.gov (United States)

    Acton, James

    2016-03-01

    U.S. nuclear weapon modernization programs are focused on extending the lives of existing warheads and developing new delivery vehicles to replace ageing bombers, intercontinental ballistic missiles, and ballistic missile submarines. These efforts are contested and controversial. Some critics argue that they are largely unnecessary, financially wasteful and potentially destabilizing. Other critics posit that they do not go far enough and that nuclear weapons with new military capabilities are required. At its core, this debate centers on three strategic questions. First, what roles should nuclear weapons be assigned? Second, what military capabilities do nuclear weapons need to fulfill these roles? Third, how severe are the unintended escalation risks associated with particular systems? Proponents of scaled-down modernization efforts generally argue for reducing the role of nuclear weapons but also that, even under existing policy, new military capabilities are not required. They also tend to stress the escalation risks of new--and even some existing--capabilities. Proponents of enhanced modernization efforts tend to advocate for a more expansive role for nuclear weapons in national security strategy. They also often argue that nuclear deterrence would be enhanced by lower yield weapons and/or so called bunker busters able to destroy more deeply buried targets. The debate is further fueled by technical disagreements over many aspects of ongoing and proposed modernization efforts. Some of these disagreements--such as the need for warhead life extension programs and their necessary scope--are essentially impossible to resolve at the unclassified level. By contrast, unclassified analysis can help elucidate--though not answer--other questions, such as the potential value of bunker busters.

  20. 77 FR 26748 - Renewal of Department of Defense Federal Advisory Committees

    Science.gov (United States)

    2012-05-07

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF DEFENSE Office of the Secretary Renewal of Department of Defense Federal Advisory Committees AGENCY: DoD. ACTION... as special government employees. Board Members shall, with the exception of travel and per diem...

  1. 77 FR 26264 - Renewal of Department of Defense Federal Advisory Committees

    Science.gov (United States)

    2012-05-03

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF DEFENSE Office of the Secretary Renewal of Department of Defense Federal Advisory Committees AGENCY: DoD. ACTION....C. 3109, and to serve as special government employees. With the exception of travel and per diem...

  2. Defense Institution Building: An Assessment

    Science.gov (United States)

    2016-01-01

    MoDA and DIILS Support of DIB Activity Objectives . . . . . . . 26 2.8. Overlapping Program Objectives...Wales Initiative Fund–Defense Institution Building (WIF-DIB), the Ministry of Defense Advisors ( MoDA ) program, and the Defense Insti- tute of...other events and activities related to a partner nation’s defense institution capabilities and capacity. One exception is MoDA , where engagements are

  3. Defense display market assessment

    Science.gov (United States)

    Desjardins, Daniel D.; Hopper, Darrel G.

    1998-09-01

    This paper addresses the number, function and size of principal military displays and establishes a basis to determine the opportunities for technology insertion in the immediate future and into the next millennium. Principal military displays are defined as those occupying appreciable crewstation real-estate and/or those without which the platform could not carry out its intended mission. DoD 'office' applications are excluded from this study. The military displays market is specified by such parameters as active area and footprint size, and other characteristics such as luminance, gray scale, resolution, angle, color, video capability, and night vision imaging system (NVIS) compatibility. Funded, future acquisitions, planned and predicted crewstation modification kits, and form-fit upgrades are taken into account. This paper provides an overview of the DoD niche market, allowing both government and industry a necessary reference by which to meet DoD requirements for military displays in a timely and cost-effective manner. The aggregate DoD market for direct-view and large-area military displays is presently estimated to be in excess of 242,000. Miniature displays are those which must be magnified to be viewed, involve a significantly different manufacturing paradigm and are used in helmet mounted displays and thermal weapon sight applications. Some 114,000 miniature displays are presently included within Service weapon system acquisition plans. For vendor production planning purposes it is noted that foreign military sales could substantially increase these quantities. The vanishing vendor syndrome (VVS) for older display technologies continues to be a growing, pervasive problem throughout DoD, which consequently must leverage the more modern display technologies being developed for civil- commercial markets.

  4. Special Administrative Jurisdictions

    Directory of Open Access Journals (Sweden)

    Vasilica Negruț

    2016-05-01

    Full Text Available The Constitution of Romania revised in 2003 establishes the free and voluntary nature of the special administrative jurisdictions, a fact which allows the party concerned to address either the administrative-judicial body or directly the court. If they opted for the administrative-judicial way, it must be followed to the end, then, under the terms established by the law, the party may address the court, under the right of access to justice provided by article 21 of the constitution. The administrative jurisdiction is an activity of solving an administrative litigation by specific procedural rules of judicial procedure, based on the principle of the independence, of insuring the right to defense and the administrative-jurisdictional independence activity, which results in a jurisdictional administrative act. In order to achieve the objectives of the paper, namely to highlight the essential elements of the resolution of litigation according to special administrative jurisdictions, we have achieved an analysis of the legislative acts referring to this activity, of the doctrine and jurisprudence. After examination and empirical research, the paper summarizes and specifies the general conclusions on the role and importance of special administrative courts.

  5. 76 FR 76318 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Science.gov (United States)

    2011-12-07

    ..., Contractor Code of Business Ethics and Conduct, is the DoD Office of Inspector General at the following... (Acquisition & Procurement)''; and 0 d. Removing the Defense Business Transformation Agency Contracting Office... procedures at PGI 205.207(a)(i). (d)(i) * * * (iii) For special notices for small business events, follow the...

  6. State Defense Force Monograph Series. Winter 2006, Medical Support Teams

    Science.gov (United States)

    2006-01-01

    assets for mobile support teams, labs, immunizations, latent TB screening, and post-deployment assessments.” (COL Eric Allely, Maryland State Surgeon...infarctions ! Diabetes ! Mental health problems ! Hypertension ! Diarrhea ! Heat injuries 30 State Defense Force Monograph Series, Summer 2006...for dysentery and vomiting ! Viral meningitis ! Injuries due to off-site fighting ! Tuberculosis ! HIV ! Special medical needs. See Figures 3

  7. Challenges in the application of modular open system architecture to weapons

    Science.gov (United States)

    Shaver, Jonathan; Rose, Leo; Young, Quinn; Christensen, Jacob

    2016-05-01

    The overarching objective for Flexible Weapons is to replace current inventory weapons that will not fully utilize the increased capabilities of 6th generation platforms, with a single weapons kit made up of flexible, open architecture components. Flexible Weapon will develop a common architecture to enable modular subsystems to achieve flexible weapons capability while allowing technology refresh at the pace of technology discovery in an affordable and sustainable design. The various combinations of weapons to address multiple missions must be 100% compatible with 6th generation delivery platforms (fighters, bombers, RPAs) and backwards compatible with 4th and 5th generation platforms.

  8. FEATURES ADMINISTRATIVE VIOLATIONS IN THE WEAPONS CIRCULATION SPHERE

    Directory of Open Access Journals (Sweden)

    Lyatsa A. KODZOKOVA

    2016-01-01

    Full Text Available Any offense in the area of arms trafficking is the increased danger. On the one hand, the guilty person through weapons reinforces the illegality or even facilitates the commission of their illegal actions, on the other hand, these activities cause significant harm to individuals and society. Offences related to illicit trafficking in arms (activity without the necessary licenses and permits, for the most part involve criminal responsibility (Article 222 -..225 of the Criminal Code, etc., but some violations in this area is not covered by criminlaw. In these cases, the violators shall apply administrative sanctions (for example, when sending weapons, the illicit manufacture of pneumatic weapons, etc.. Specificity of weapons is that it is endowed with certain peculiar features of quality, depending on which branch of law regulates its turnover. Currently, the legal regime of weapons is regulated by several branches of law (civil, administrative, military, criminal, etc., Each of which considers it based on the specifics of its subject and method, and has its own legal framework, regulating the circulation of arms.

  9. Chemical and biological weapons in the 'new wars'.

    Science.gov (United States)

    Ilchmann, Kai; Revill, James

    2014-09-01

    The strategic use of disease and poison in warfare has been subject to a longstanding and cross-cultural taboo that condemns the hostile exploitation of poisons and disease as the act of a pariah. In short, biological and chemical weapons are simply not fair game. The normative opprobrium is, however, not fixed, but context dependent and, as a social phenomenon, remains subject to erosion by social (or more specifically, antisocial) actors. The cross cultural understanding that fighting with poisons and disease is reprehensible, that they are taboo, is codified through a web of interconnected measures, principal amongst these are the 1925 Geneva Protocol; the Biological Weapons Convention; and the Chemical Weapons Convention. Whilst these treaties have weathered the storm of international events reasonably well, their continued health is premised on their being 'tended to' in the face of contextual changes, particularly facing changes in science and technology, as well as the changed nature and character of conflict. This article looks at the potential for normative erosion of the norm against chemical and biological weapons in the face of these contextual changes and the creeping legitimization of chemical and biological weapons.

  10. Biophysics and medical effects of enhanced radiation weapons.

    Science.gov (United States)

    Reeves, Glen I

    2012-08-01

    Enhanced radiation weapons (ERW) are fission-fusion devices where the massive numbers of neutrons generated during the fusion process are intentionally allowed to escape rather than be confined to increase yield (and fallout products). As a result, the energy partition of the weapon output shifts from blast and thermal energies toward prompt radiation. The neutron/gamma output ratio is also increased. Neutrons emitted from ERW are of higher energy than the Eave of neutrons from fission weapons. These factors affect the patterns of injury distribution; delay wound healing in combined injuries; reduce the therapeutic efficacy of medical countermeasures; and increase the dose to radiation-only casualties, thus potentiating the likelihood of encountering radiation-induced incapacitation. The risk of radiation-induced carcinogenesis is also increased. Radiation exposure to first responders from activation products is increased over that expected from a fission weapon of similar yield. However, the zone of dangerous fallout is significantly reduced in area. At least four nations have developed the potential to produce such weapons. Although the probability of detonation of an ERW in the near future is very small, it is nonzero, and clinicians and medical planners should be aware of the medical effects of ERW.

  11. Real life identification of partially occluded weapons in video frames

    Science.gov (United States)

    Hempelmann, Christian F.; Arslan, Abdullah N.; Attardo, Salvatore; Blount, Grady P.; Sirakov, Nikolay M.

    2016-05-01

    We empirically test the capacity of an improved system to identify not just images of individual guns, but partially occluded guns and their parts appearing in a videoframe. This approach combines low-level geometrical information gleaned from the visual images and high-level semantic information stored in an ontology enriched with meronymic part-whole relations. The main improvements of the system are handling occlusion, new algorithms, and an emerging meronomy. Well-known and commonly deployed in ontologies, actual meronomies need to be engineered and populated with unique solutions. Here, this includes adjacency of weapon parts and essentiality of parts to the threat of and the diagnosticity for a weapon. In this study video sequences are processed frame by frame. The extraction method separates colors and removes the background. Then image subtraction of the next frame determines moving targets, before morphological closing is applied to the current frame in order to clean up noise and fill gaps. Next, the method calculates for each object the boundary coordinates and uses them to create a finite numerical sequence as a descriptor. Parts identification is done by cyclic sequence alignment and matching against the nodes of the weapons ontology. From the identified parts, the most-likely weapon will be determined by using the weapon ontology.

  12. Avian host defense peptides.

    Science.gov (United States)

    Cuperus, Tryntsje; Coorens, Maarten; van Dijk, Albert; Haagsman, Henk P

    2013-11-01

    Host defense peptides (HDPs) are important effector molecules of the innate immune system of vertebrates. These antimicrobial peptides are also present in invertebrates, plants and fungi. HDPs display broad-spectrum antimicrobial activities and fulfill an important role in the first line of defense of many organisms. It is becoming increasingly clear that in the animal kingdom the functions of HDPs are not confined to direct antimicrobial actions. Research in mammals has indicated that HDPs have many immunomodulatory functions and are also involved in other physiological processes ranging from development to wound healing. During the past five years our knowledge about avian HDPs has increased considerably. This review addresses our current knowledge on the evolution, regulation and biological functions of HDPs of birds.

  13. Weapon identification using antemortem CT with 3D reconstruction, is it always possible?--A report in a case of facial blunt and sharp injuries using an ashtray.

    Science.gov (United States)

    Aromatario, Mariarosaria; Cappelletti, Simone; Bottoni, Edoardo; Fiore, Paola Antonella; Ciallella, Costantino

    2016-01-01

    An interesting case of homicide involving the use of a heavy glass ashtray is described. The victim, a 81-years-old woman, has survived for few days and died in hospital. The external examination of the victim showed extensive blunt and sharp facial injuries and defense injuries on both the hands. The autopsy examination showed numerous tears on the face, as well as multiple fractures of the facial bones. Computer tomography scan, with 3D reconstruction, performed in hospital before death, was used to identify the weapon used for the crime. In recent years new diagnostics tools such as computer tomography has been widely used, especially in cases involving sharp and blunt forces. Computer tomography has proven to be very valuable in analyzing fractures of the cranial teca for forensic purpose, in particular antemortem computer tomography with 3D reconstruction is becoming an important tool in the process of weapon identification, thanks to the possibility to identify and make comparison between the shape of the object used to commit the crime, the injury and the objects found during the investigations. No previous reports on the use of this technique, for the weapon identification process, in cases of isolated facial fractures were described. We report a case in which, despite the correct use of this technique, it was not possible for the forensic pathologist to identify the weapon used to commit the crime. Authors wants to highlight the limits encountered in the use of computer tomography with 3D reconstruction as a tool for weapon identification when facial fractures occurred. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  14. A Defense Budget Primer

    Science.gov (United States)

    1998-12-09

    budget practices. See Appendix D for the actual timetable of congressional action on the FY1999 budget.65 See James V. Saturno , The Appropriations...details, see James V. Saturno , The Appropriations Process and the Congressional69 Budget Act, CRS Report 97-947. Table 6. Milestone Votes on the Defense...James V. Saturno , The74 Appropriations Process and the Congressional Budget Act, CRS Report 97-947. The Budget Enforcement Act of 1990 and subsequent

  15. Defensive Minefield Planning

    Science.gov (United States)

    1989-06-01

    Minefield Planning by Carlos Vallejo Game Lieutenant, Ecuadorian Navy B. S., Escuela Superior Naval, Ecuador 1980 Submitted in partial fulfillment of...was a superior open-ocean naval force to the North Koreans, defensive minewarfare was able to, at least temporarily, defeat U.S. Navy objectives in...Oswaldo Rosero 1 Unit 8 Coastal Route 1 Monterey, California 93940 77 11. Office of the N’aval Attache 4 Direccion de Educacion 2535 15th. st. N. W

  16. Multidisciplinary model-based-engineering for laser weapon systems: recent progress

    Science.gov (United States)

    Coy, Steve; Panthaki, Malcolm

    2013-09-01

    We are working to develop a comprehensive, integrated software framework and toolset to support model-based engineering (MBE) of laser weapons systems. MBE has been identified by the Office of the Director, Defense Science and Engineering as one of four potentially "game-changing" technologies that could bring about revolutionary advances across the entire DoD research and development and procurement cycle. To be effective, however, MBE requires robust underlying modeling and simulation technologies capable of modeling all the pertinent systems, subsystems, components, effects, and interactions at any level of fidelity that may be required in order to support crucial design decisions at any point in the system development lifecycle. Very often the greatest technical challenges are posed by systems involving interactions that cut across two or more distinct scientific or engineering domains; even in cases where there are excellent tools available for modeling each individual domain, generally none of these domain-specific tools can be used to model the cross-domain interactions. In the case of laser weapons systems R&D these tools need to be able to support modeling of systems involving combined interactions among structures, thermal, and optical effects, including both ray optics and wave optics, controls, atmospheric effects, target interaction, computational fluid dynamics, and spatiotemporal interactions between lasing light and the laser gain medium. To address this problem we are working to extend Comet™, to add the addition modeling and simulation capabilities required for this particular application area. In this paper we will describe our progress to date.

  17. Public perspectives of nuclear weapons in the post-cold war environment

    Energy Technology Data Exchange (ETDEWEB)

    Jenkins-Smith, H.C.; Herron, K.G. [Univ. of New Mexico, Albuquerque, NM (United States). Institute for Public Policy; Barke, R.P. [Georgia Institute of Technology, Atlanta, GA (United States). School of Public Policy

    1994-04-01

    This report summarizes the findings of a nationwide survey of public perceptions of nuclear weapons in the post-cold war environment. Participants included 1,301 members of the general public, 1,155 randomly selected members of the Union of Concerned Scientists, and 1,226 employees randomly selected from the technical staffs of four DOE national laboratories. A majority of respondents from all three samples perceived the post-cold war security environment to pose increased likelihood of nuclear war, nuclear proliferation, and nuclear terrorism. Public perceptions of nuclear weapons threats, risks, utilities, and benefits were found to systematically affect nuclear weapons policy preferences in predictable ways. Highly significant relationships were also found between public trust and nuclear weapons policy preferences. As public trust and official government information about nuclear weapons increased, perceptions of nuclear weapons management risks decreased and perceptions of nuclear weapons utilities and benefits increased. A majority of respondents favored decreasing funding for: (1) developing and testing new nuclear weapons; (2) maintaining existing nuclear weapons, and (3) maintaining the ability to develop and improve nuclear weapons. Substantial support was found among all three groups for increasing funding for: (1) enhancing nuclear weapons safety; (2) training nuclear weapons personnel; (3) preventing nuclear proliferation; and (4) preventing nuclear terrorism. Most respondents considered nuclear weapons to be a persistent feature of the post-cold war security environment.

  18. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    have adapted to resist plant defenses, and in some cases even sequester the compounds and reuse them in their own defense. Both plant defense and insect adaptation involve metabolic costs, so most plant-insect interactions reach a stand-off, where both host and herbivore survive although......Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar....... Insect herbivory induce several internal signals from the wounded tissues, including calcium ion fluxes, phosphorylation cascades and systemic- and jasmonate signaling. These are perceived in undamaged tissues, which thereafter reinforce their defense by producing different, mostly low molecular weight...

  19. Defense Industry of the Russian Federation at the End of 20th-Beginning of the 21st Century

    Directory of Open Access Journals (Sweden)

    Leonovich Aleksandr Nikolaevich

    2014-11-01

    Full Text Available In the developed countries claiming for global leadership permanent military and industrial complexes were formed. These complexes produce high-tech products and play the key system-forming role in the economies of their states. Country’s position in world economy as well as its position at the weapons and military equipment market depends on the military and industrial complexes development. At the end of the 20th century, there had been great changes in the military and industrial complex of the Russian Federation. Drastic remission and demerger accompanied these changes unlike those in the Unites States and Western Europe. These processes were determined by inconsiderate defense conversion, reduction of expenses and the loss of weapons and military equipment production. At the beginning of the 21st century, Russian Federation government has changed its attitude towards the military and industrial complex. Main directions of surmounting the crisis were found through creation of military and industrial corporations, increase of state defense order in the favor of national Armed Forces. Development of state-owned corporations and significant increase in financial allocations for state defense order promoted the growth of military and industrial companies’ activity and rise in weapons and military equipment export. All above-listed processes of Russian military and industrial complexes predetermined the scientific and pragmatic interest for this research.

  20. 贫信息下空袭兵器威胁能力评估方法%Research on Assessment for Threat Ability of Air Raid Weapon under Lacking Information

    Institute of Scientific and Technical Information of China (English)

    赵喜; 李修和; 沈阳

    2011-01-01

    Nowadays, at aerial defense combat, the air raid weapons become more and more powerful,which bring more menace to our key target. So it is badly needed to evaluate the menace ability of air raid weapons, so as to assign aerial defense power and protect our target. This paper researches the process of assessment for threat ability of aerial raid weapon, provides the arithmetic and math model under the background of modern aerial-defense combat and lacking information. The example given in the end shows the practicability of the model.%现代防空作战中,各种空袭兵器突袭能力不断增强,对我方目标构成了极大威胁.因此,需要对空袭兵器的威胁能力进行评估,合理分配各种防空火力,以达到保护我方目标的目的.研究了现代防空作战背景下,空袭兵器威胁能力评估的全过程,给出了贫信息下,威胁能力评估的算法,建立了数学模型,最后用实例说明了该评估方法的实用性.

  1. The Special Forces Organization for Foreign Internal Defense in 2010.

    Science.gov (United States)

    2007-11-02

    statistics . He ties together the major strategic and tactical operations of the Malayan Emergency into a truly comprehensive analysis. Thomas R...studies. Malaya In 1786, England acquired Penang in the northwest portion of the Malay Peninsula, thus initiating the long relationship between the two...example, in the Pampanga Province alone, 70 percent of the farmers were tenants. The other provinces in the Philippines shared similar statistics . 3 6

  2. State Defense Force Monograph Series. Fall 2007, Special Units

    Science.gov (United States)

    2007-01-01

    authors and the visual panorama of artists and film makers. Those World War Two soldiers for whom “taps” has not yet been sounded may still remember the...is a reenactor and living historian, with an emphasis on mounted cavalry, formed and commanded many reenactment units, trained numerous soldiers in

  3. Role of Air Force Special Operations in Foreign Internal Defense

    Science.gov (United States)

    1991-09-01

    0 AD-A271 991 0 TIC U r E -• 93-27105 ViroV.,I II publicl~ll 16, I1, i: i ",, .r , - !A Role ofArFoc pcil peain inFreg ItrnlDees JOH R. MOLO 11 6j...can detract from the menta.’ legitimacy of the state. The Salvadoran The necessity to maintain the fragile Organizacion DemocratIca Nacionallsta

  4. 77 FR 22671 - Defense Support to Special Events

    Science.gov (United States)

    2012-04-17

    ... organization that discriminates based on sex, sexual orientation, and religion. DOD support is contrary to...) Materially alter the budgetary impact of entitlements, grants, user fees, or loan programs, or the rights...

  5. Unconventional Operations Forces of Special Operations

    Science.gov (United States)

    1993-04-15

    neighbors. 28. Samuel Huntington is an Eaton Professor of the Science of Government and Director of the John M. Olin Institute of Strategic Studies at the...1944. Special Operations in US Strategy. Ed by Frank R. Barnett, B. Hugh Tovar and Richard H. Shultz. Washington: National Defense University Press

  6. Historical Cost Growth of Completed Weapon System Programs

    Science.gov (United States)

    2006-01-01

    Management Program of RAND Project AIR FORCE. The project’s technical monitor is Jay Jordan, Technical Director of the Air Force Cost Analysis Agency. Other...CGFs for development costs range from a low of 1.16 for the nine ship weapon systems reviewed in Asher and Mag- gelet (1984) to a high of 2.26 for six...to procurement) for each weapon system 2.26 (n = 6) 1.43 (n = 6) Not reported Asher and Maggelet (1984) Last SAR for program or December 1983 As of

  7. Autonomous Weapon Systems and Risk Management in Hybrid Networks

    DEFF Research Database (Denmark)

    Nørgaard, Katrine

    In recent years, the development of autonomous weapon systems and so-called ‘killer robots’, has caused a number of serious legal and ethical concerns in the international community, including questions of compliance with International Humanitarian Law and the Laws of Armed Conflict. On the other...... hand, governments and military services hope to develop game-changing technologies, that are ‘better, faster and cheaper’. In this paper, I wish to show how different and competing regimes of justification shape the technopolitical controversy and risk management of autonomous weapon systems...

  8. Blade Weapons of the Perm Cis-Urals Region

    Directory of Open Access Journals (Sweden)

    Danich Andrei V.

    2012-06-01

    Full Text Available The article is devoted to the understudied problem of bladed weapons of the Perm Cis-Urals region. For the first time the work generalizes significant archaeological and museum material dated back to the 8th-15th centuries, including the recent finds not yet interpreted by scholars. Their comprehensive analysis has made it possible to provide a detailed typological and chronological characteristic of certain types and categories of blade weapons and trace their evolution. The data on the role and place of the saber (cavalry sword in the mortuary cult are analyzed.

  9. Identification of the murder weapon by intricate patterned injury measurements.

    Science.gov (United States)

    Zugibe, F T; Costello, J T

    1986-04-01

    Critical studies of an intricate blunt force injury pattern in a brutal homicide led to the identification of the murder weapon. A 50-year-old male was bludgeoned to death in his apartment during a robbery allegedly engineered by his daughter. Careful measurements and overlay construction of the wounds relative to the magazine catch, lanyard ring, magazine chamber, and butt of a 32-caliber Eistegui Hermanos fibar (España) automatic pistol led to the conclusion that either the alleged weapon or one identical to it caused the fatal injuries.

  10. Cyber Defense Exercises and their Role in Cyber Warfare

    Directory of Open Access Journals (Sweden)

    Bogdan Alexandru Bratosin

    2014-06-01

    Full Text Available The threat of cyber-attacks is increasing with the access to PC’s and Internet of a larger number of people around the world. Although the Internet provides a large number of advantages, it can also be used as a cyber-weapon in order to serve the interests of counties, political and economic groups or individual. The cyber-attacks of today are capable to disable the manufacturing of nuclear bombs of a country. Thus, there is an increasing demand for IT security specialists. Cyber-defense exercises (CDX are by far the most complex and up to date methods of training the next generation of IT security specialists.

  11. Applications of the Strategic Defense Initiative's compact accelerators

    Science.gov (United States)

    Montanarelli, Nick; Lynch, Ted

    1991-12-01

    The Strategic Defense Initiative's (SDI) investment in particle accelerator technology for its directed energy weapons program has produced breakthroughs in the size and power of new accelerators. These accelerators, in turn, have produced spinoffs in several areas: the radio frequency quadrupole linear accelerator (RFQ linac) was recently incorporated into the design of a cancer therapy unit at the Loma Linda University Medical Center, an SDI-sponsored compact induction linear accelerator may replace Cobalt-60 radiation and hazardous ethylene-oxide as a method for sterilizing medical products, and other SDIO-funded accelerators may be used to produce the radioactive isotopes oxygen-15, nitrogen-13, carbon-11, and fluorine-18 for positron emission tomography (PET). Other applications of these accelerators include bomb detection, non-destructive inspection, decomposing toxic substances in contaminated ground water, and eliminating nuclear waste.

  12. DEFENSE PROGRAMS RISK MANAGEMENT FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Constantin PREDA

    2012-01-01

    Full Text Available For the past years defense programs have faced delays in delivering defense capabilities and budget overruns. Stakeholders are looking for ways to improve program management and the decision making process given the very fluid and uncertain economic and political environment. Consequently, they have increasingly resorted to risk management as the main management tool for achieving defense programs objectives and for delivering the defense capabilities strongly needed for the soldiers on the ground on time and within limited defense budgets. Following a risk management based decision-making approach the stakeholders are expected not only to protect program objectives against a wide range of risks but, at the same time, to take advantage of the opportunities to increase the likelihood of program success. The prerequisite for making risk management the main tool for achieving defense programs objectives is the design and implementation of a strong risk management framework as a foundation providing an efficient and effective application of the best risk management practices. The aim of this paper is to examine the risk management framework for defense programs based on the ISO 31000:2009 standard, best risk management practices and the defense programs’ needs and particularities. For the purposes of this article, the term of defense programs refers to joint defense programs.

  13. RNA interference: Antiviral weapon and beyond

    Institute of Scientific and Technical Information of China (English)

    Quan-Chu Wang; Qing-He Nie; Zhi-Hua Feng

    2003-01-01

    RNA interference (RNAi) is a remarkable type of gene regulation based on sequence-specific targeting and degradation of RNA. The term encompasses related pathways found in a broad range of eukaryotic organisms, including fungi, plants, and animals. RNA interference is part of a sophisticated network of interconnected pathways for cellular defense, RNA surveillance, and development and it may become a powerful tool to manipulate gene expression experimentally. RNAi technology is currently being evaluated not only as an extremely powerful instrument for functional genomic analyses, but also as a potentially useful method to develop specific dsRNA based gene-silencing therapeutics.Several laboratories have been interested in using RNAi to control viral infection and many reports in Nature and in Cell show that short interfering (si) RNAs can inhibit infection by HIV-1, polio and hepatitis C viruses in a sequence-specific manner. RNA-based strategies for gene inhibition in mammalian cells have recently been described, which offer the promise of antiviral therapy.

  14. John Wheeler, 1933 - 1959: Particles and Weapons

    Science.gov (United States)

    Ford, Kenneth

    2009-05-01

    During the early part of his career, John Archibald Wheeler made an astonishing number of contributions to nuclear and particle physics, as well as to classical electrodynamics, often in collaboration with another physicist. He was also a major contributor to the Manhattan Project (in Chicago and Hanford rather than Los Alamos), and, following World War II, became an influential scientific cold warrior. His early achievements in physics include the calculated scattering of light by light (with Gregory Breit), the prediction of nuclear rotational states (with Edward Teller), the theory of fission (with Niels Bohr), action-at-a-distance electrodynamics (with Richard Feynman), the theory of positronium, the universal weak interaction (with Jayme Tiomno), and the proposed use of the muon as a nuclear probe particle. He gained modest fame as the person who identified xenon 135 as a reactor poison. His Project Matterhorn contributed significantly to the design of the H bomb, and his Project 137, which he had hoped would flower into a major defense lab, served as the precursor to the Jason group.

  15. The tale of the shrinking weapon: seasonal changes in nutrition affect weapon size and sexual dimorphism, but not contemporary evolution.

    Science.gov (United States)

    Miller, C W; McDonald, G C; Moore, A J

    2016-11-01

    Sexually selected traits are often highly variable in size within populations due to their close link with the physical condition of individuals. Nutrition has a large impact on physical condition, and thus, any seasonal changes in nutritional quality are predicted to alter the average size of sexually selected traits as well as the degree of sexual dimorphism in populations. However, although traits affected by mate choice are well studied, we have a surprising lack of knowledge of how natural variation in nutrition affects the expression of sexually selected weapons and sexual dimorphism. Further, few studies explicitly test for differences in the heritability and mean-scaled evolvability of sexually selected traits across conditions. We studied Narnia femorata (Hemiptera: Coreidae), an insect where males use their hind legs as weapons and the femurs are enlarged, to understand the extent to which weapon expression, sexual dimorphism and evolvability change across the actual range of nutrition available in the wild. We found that insects raised on a poor diet (cactus without fruit) are nearly monomorphic, whereas those raised on a high-quality diet (cactus with ripe fruit) are distinctly sexually dimorphic via the expression of large hind leg weapons in males. Contrary to our expectations, we found little evidence of a potential for evolutionary change for any trait measured. Thus, although we show weapons are highly condition dependent, and changes in weapon expression and dimorphism could alter evolutionary dynamics, our populations are unlikely to experience further evolutionary changes under current conditions. © 2016 European Society For Evolutionary Biology. Journal of Evolutionary Biology © 2016 European Society For Evolutionary Biology.

  16. Defense, basic, and industrial research at the Los Alamos Neutron Science Center: Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    Longshore, A.; Salgado, K. [comps.

    1995-10-01

    The Workshop on Defense, Basic, and Industrial Research at the Los Alamos Neutron Science Center gathered scientists from Department of Energy national laboratories, other federal institutions, universities, and industry to discuss the use of neutrons in science-based stockpile stewardship, The workshop began with presentations by government officials, senior representatives from the three weapons laboratories, and scientific opinion leaders. Workshop participants then met in breakout sessions on the following topics: materials science and engineering; polymers, complex fluids, and biomaterials; fundamental neutron physics; applied nuclear physics; condensed matter physics and chemistry; and nuclear weapons research. They concluded that neutrons can play an essential role in science-based stockpile stewardship and that there is overlap and synergy between defense and other uses of neutrons in basic, applied, and industrial research from which defense and civilian research can benefit. This proceedings is a collection of talks and papers from the plenary, technical, and breakout session presentations. Selected papers are indexed separately for inclusion in the Energy Science and Technology Database.

  17. 78 FR 55326 - Determinations Regarding Use of Chemical Weapons in Syria Under the Chemical and Biological...

    Science.gov (United States)

    2013-09-10

    ... Determinations Regarding Use of Chemical Weapons in Syria Under the Chemical and Biological Weapons Control and..., 22 U.S.C. 5604(a), that the Government of Syria has used chemical weapons in violation of... Under Secretary of State for Political Affairs: (1) Determined that the Government of Syria has...

  18. Radiological Weapons Control: A Soviet and US Perspective. Occasional Paper 29.

    Science.gov (United States)

    Issraelyan, Victor L.; Flowerree, Charles C.

    Two international diplomats from the Soviet Union and the United States focus on the need for a treaty to ban the use of radiological weapons. Radiological weapons are those based on the natural decay of nuclear material such as waste from military or civilian nuclear reactors. Such devices include both weapons and equipment, other than a nuclear…

  19. Metal Detector Searches: An Effective Means To Help Keep Weapons Out of Schools.

    Science.gov (United States)

    Johnson, Robert S.

    2000-01-01

    Disagrees with Ferraraccio's views and argues that: (1) students do bring illegal weapons to school; (2) metal detectors do detect weapons and help schools to disarm students; (3) disarming students reduces the threat of violence; and (4) courts have repeatedly approved the constitutionality of weapon-related suspicionless student searches…

  20. 48 CFR 212.270 - Major weapon systems as commercial items.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Major weapon systems as... Requirements for the Acquisition of Commercial Items 212.270 Major weapon systems as commercial items. The DoD policy for acquiring major weapon systems as commercial items is in Subpart 234.70. ...

  1. Carrying a Weapon to School and Perceptions of Social Support in an Urban Middle School.

    Science.gov (United States)

    Malecki, Christine Kerres; Demaray, Michelle Kilpatrick

    2003-01-01

    This study of perceived social support and weapon possession surveyed 461 students in an urban middle school. Students who reported carrying weapons to school reported less overall or total perceived social support (from peers, parents, teachers, classmates, and school) than did their peers who did not carry weapons. Perceived social support was a…

  2. 41 CFR 102-74.440 - What is the policy concerning weapons on Federal property?

    Science.gov (United States)

    2010-07-01

    ... concerning weapons on Federal property? 102-74.440 Section 102-74.440 Public Contracts and Property... PROPERTY 74-FACILITY MANAGEMENT Conduct on Federal Property Weapons § 102-74.440 What is the policy concerning weapons on Federal property? Federal law prohibits the possession of firearms or other dangerous...

  3. 78 FR 2214 - Enhanced Weapons, Firearms Background Checks, and Security Event Notifications

    Science.gov (United States)

    2013-01-10

    ...; ] NUCLEAR REGULATORY COMMISSION 10 CFR Part 73 RIN 3150-AI49 Enhanced Weapons, Firearms Background Checks... proposing to further revise its regulations that address the voluntary application for enhanced weapons... for preemption or enhanced weapon authority. Section 161A also mandates that all security personnel...

  4. 15 CFR Supplement No. 1 to Part 742 - Nonproliferation of Chemical and Biological Weapons

    Science.gov (United States)

    2010-01-01

    ... Biological Weapons No. Supplement No. 1 to Part 742 Commerce and Foreign Trade Regulations Relating to...—Nonproliferation of Chemical and Biological Weapons Note: Exports and reexports of items in performance of...: (i) Equipment (for producing chemical weapon precursors and chemical warfare agents) described in...

  5. 33 CFR 334.930 - Anaheim Bay Harbor, Calif.; Naval Weapons Station, Seal Beach.

    Science.gov (United States)

    2010-07-01

    ... Weapons Station, Seal Beach. 334.930 Section 334.930 Navigation and Navigable Waters CORPS OF ENGINEERS... Bay Harbor, Calif.; Naval Weapons Station, Seal Beach. (a) The restricted area. The water of Anaheim Bay Harbor between the east and west jetties at the United States Naval Weapons Station, Seal Beach...

  6. 36 CFR 327.13 - Explosives, firearms, other weapons and fireworks.

    Science.gov (United States)

    2010-07-01

    ... weapons and fireworks. 327.13 Section 327.13 Parks, Forests, and Public Property CORPS OF ENGINEERS... ADMINISTERED BY THE CHIEF OF ENGINEERS § 327.13 Explosives, firearms, other weapons and fireworks. (a) The... other weapons is prohibited unless: (1) In the possession of a Federal, state or local law enforcement...

  7. 28 CFR 552.25 - Use of chemical agents or non-lethal weapons.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Use of chemical agents or non-lethal weapons. 552.25 Section 552.25 Judicial Administration BUREAU OF PRISONS, DEPARTMENT OF JUSTICE... agents or non-lethal weapons. The Warden may authorize the use of chemical agents or non-lethal weapons...

  8. 49 CFR 1540.111 - Carriage of weapons, explosives, and incendiaries by individuals.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Carriage of weapons, explosives, and incendiaries... § 1540.111 Carriage of weapons, explosives, and incendiaries by individuals. (a) On an individual's... individual may not have a weapon, explosive, or incendiary, on or about the individual's person or accessible...

  9. 10 CFR 860.4 - Unauthorized introduction of weapons or dangerous materials.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Unauthorized introduction of weapons or dangerous... § 860.4 Unauthorized introduction of weapons or dangerous materials. Unauthorized carrying, transporting, or otherwise introducing or causing to be introduced any dangerous weapon, explosive, or other...

  10. 77 FR 22559 - Proposed Information Collection; Comment Request; Chemical Weapons Convention Provisions of the...

    Science.gov (United States)

    2012-04-16

    ... Bureau of Industry and Security Proposed Information Collection; Comment Request; Chemical Weapons...) 482-4895, Lawrence.Hall@bis.doc.gov . SUPPLEMENTARY INFORMATION: I. Abstract The Chemical Weapons... weapons (CW). The CWC prohibits the use, development, production, acquisition, stockpiling, retention, and...

  11. 15 CFR 744.4 - Restrictions on certain chemical and biological weapons end-uses.

    Science.gov (United States)

    2010-01-01

    ... biological weapons end-uses. 744.4 Section 744.4 Commerce and Foreign Trade Regulations Relating to Commerce... and biological weapons end-uses. (a) General prohibition. In addition to the license requirements for... biological weapons in or by any country or destination, worldwide. (b) Additional prohibition on persons...

  12. 36 CFR 1280.18 - May I bring guns or other weapons onto NARA property?

    Science.gov (United States)

    2010-07-01

    ... weapons onto NARA property? 1280.18 Section 1280.18 Parks, Forests, and Public Property NATIONAL ARCHIVES... Conduct on NARA Property? Prohibited Activities § 1280.18 May I bring guns or other weapons onto NARA property? No, you may not bring firearms or other dangerous or deadly weapons either openly or concealed...

  13. 76 FR 43937 - Criminal Penalties for Unauthorized Introduction of Weapons and Sabotage

    Science.gov (United States)

    2011-07-22

    ... COMMISSION 10 CFR Part 73 Criminal Penalties for Unauthorized Introduction of Weapons and Sabotage AGENCY... the AEA provides Federal criminal sanctions for the wrongful introduction of weapons or explosives... Introduction of Dangerous Weapons'' (119 Stat. 812), amended Section 229 of the AEA, ``Trespass on Commission...

  14. 27 CFR 478.153 - Semiautomatic assault weapons and large capacity ammunition feeding devices manufactured or...

    Science.gov (United States)

    2010-04-01

    ... weapons and large capacity ammunition feeding devices manufactured or imported for the purposes of testing... AMMUNITION Exemptions, Seizures, and Forfeitures § 478.153 Semiautomatic assault weapons and large capacity... weapon, and § 478.40a with respect to large capacity ammunition feeding devices, shall not apply to the...

  15. 27 CFR 478.40 - Manufacture, transfer, and possession of semiautomatic assault weapons.

    Science.gov (United States)

    2010-04-01

    ... possession of semiautomatic assault weapons. 478.40 Section 478.40 Alcohol, Tobacco Products, and Firearms..., transfer, and possession of semiautomatic assault weapons. (a) Prohibition. No person shall manufacture, transfer, or possess a semiautomatic assault weapon. (b) Exceptions. The provisions of paragraph (a) of...

  16. 27 CFR 478.133 - Records of transactions in semiautomatic assault weapons.

    Science.gov (United States)

    2010-04-01

    ... semiautomatic assault weapons. 478.133 Section 478.133 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL... AMMUNITION Records § 478.133 Records of transactions in semiautomatic assault weapons. The evidence specified in § 478.40(c), relating to transactions in semiautomatic assault weapons, shall be retained in the...

  17. 10 CFR 1048.4 - Unauthorized introduction of weapons or dangerous materials.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Unauthorized introduction of weapons or dangerous... PETROLEUM RESERVE FACILITIES AND OTHER PROPERTY § 1048.4 Unauthorized introduction of weapons or dangerous... facility or real property subject to this part, of a dangerous weapon, explosive or other dangerous...

  18. 10 CFR 160.4 - Unauthorized introduction of weapons or dangerous materials.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Unauthorized introduction of weapons or dangerous... PROPERTY § 160.4 Unauthorized introduction of weapons or dangerous materials. Unauthorized carrying, transporting, or otherwise introducing or causing to be introduced any dangerous weapon, explosive, or other...

  19. 76 FR 23515 - Enhanced Weapons, Firearms Background Checks, and Security Event Notifications

    Science.gov (United States)

    2011-04-27

    ... COMMISSION 10 CFR Part 73 RIN 3150-AI49 Enhanced Weapons, Firearms Background Checks, and Security Event... material and would add new event notification requirements on the theft or loss of enhanced weapons... ``Weapons Safety Assessment'' (76 FR 6087) , the draft Regulatory Guide DG-5020, ``Applying for Enhanced...

  20. Synthetic Plant Defense Elicitors

    Directory of Open Access Journals (Sweden)

    Yasemin eBektas

    2015-01-01

    Full Text Available To defend themselves against invading pathogens plants utilize a complex regulatory network that coordinates extensive transcriptional and metabolic reprogramming. Although many of the key players of this immunity-associated network are known, the details of its topology and dynamics are still poorly understood. As an alternative to forward and reverse genetic studies, chemical genetics-related approaches based on bioactive small molecules have gained substantial popularity in the analysis of biological pathways and networks. Use of such molecular probes can allow researchers to access biological space that was previously inaccessible to genetic analyses due to gene redundancy or lethality of mutations. Synthetic elicitors are small drug like molecules that induce plant defense responses, but are distinct from known natural elicitors of plant immunity. While the discovery of the some synthetic elicitors had already been reported in the 1970s, recent breakthroughs in combinatorial chemical synthesis now allow for inexpensive high-throughput screens for bioactive plant defense-inducing compounds. Along with powerful reverse genetics tools and resources available for model plants and crop systems, comprehensive collections of new synthetic elicitors will likely allow plant scientists to study the intricacies of plant defense signaling pathways and networks in an unparalleled fashion. As synthetic elicitors can protect crops from diseases, without the need to be directly toxic for pathogenic organisms, they may also serve as promising alternatives to conventional biocidal pesticides, which often are harmful for the environment, farmers and consumers. Here we are discussing various types of synthetic elicitors that have been used for studies on the plant immune system, their modes-of-action as well as their application in crop protection.

  1. Strategic Defense Initiative Fact Book.

    Science.gov (United States)

    2007-11-02

    increasing the available decision time in the event of an acci- dental launch of offensive weapons. In this way SDI could actually alleviate the "first...avoid another Chernobyl and assist in ameliorating current damage). Foreign policy experts make the following observations concerning the two first

  2. Nanomaterials for Defense Applications

    Science.gov (United States)

    Turaga, Uday; Singh, Vinitkumar; Lalagiri, Muralidhar; Kiekens, Paul; Ramkumar, Seshadri S.

    Nanotechnology has found a number of applications in electronics and healthcare. Within the textile field, applications of nanotechnology have been limited to filters, protective liners for chemical and biological clothing and nanocoatings. This chapter presents an overview of the applications of nanomaterials such as nanofibers and nanoparticles that are of use to military and industrial sectors. An effort has been made to categorize nanofibers based on the method of production. This chapter particularly focuses on a few latest developments that have taken place with regard to the application of nanomaterials such as metal oxides in the defense arena.

  3. Phenomenon of Psychological Defense

    Directory of Open Access Journals (Sweden)

    Elena T. Sokolova

    2011-01-01

    Full Text Available The author discusses the controversial issues of formation and functioning of psy¬chological defense mechanisms in ontogenesis and in personality disorders as they are represented in classical and contemporary psychoanalysis, in cognitivism and communication theory. The paper emphasizes the role of cognitive organi¬zation (style, sign-symbolic mediation, representative system of object relations and attachments in individual typological variability of the level organization of ciency of personal and social adaptation, in maturity and mental health of personality

  4. Indicators of the development of defense logistics as a science

    Directory of Open Access Journals (Sweden)

    Marko D. Andrejić

    2012-10-01

    Full Text Available In practice, there are several approaches in discussing the achieved level of development of a scientific discipline. One group of them concentrates on external indicators of the development of a scientific discipline, i.e. its research network, while the other group analyzes the science structure, i.e. its elements. The achieved level of the development of the defense system and its (external and internal environment, general knowledge on the development and the systematic treatment of science as well as the present situation in the society require an insight into the internal and external indicators of the development of defense logistics as a scientific discipline (Defense Science. General knowledge on the creation, development and interdependence of sciences as well as internal and external indicators of the achieved development level of Defense Logistics show that it should be developed in the network environment as a multidisciplinary science, in close cooperation with other special disciplines of logistics, within defense science. It could thus contribute to the improvement of the defense as an important public function as well as to closer contacts of the scientific disciplines dealing with technical systems and technologies with the so-called. orthodox military disciplines.

  5. Autonomous Weapon Systems and Risk Management in Hybrid Networks

    DEFF Research Database (Denmark)

    Nørgaard, Katrine

    hand, governments and military services hope to develop game-changing technologies, that are ‘better, faster and cheaper’. In this paper, I wish to show how different and competing regimes of justification shape the technopolitical controversy and risk management of autonomous weapon systems...... of justification and risk management in contemporary conflicts....

  6. North Korea, Nuclear Weapons, and No Good Options?

    DEFF Research Database (Denmark)

    Cohen, Michael David

    2013-01-01

    How would Pyongyang’s development of the capability to target the United States with nuclear weapons influence North Korea’s foreign policy? I argue that it would cause more dangerous crises than those of the last decade, and predict that these crises would eventually cause Kim Jong Un and his se...

  7. Seventy Years of Computing in the Nuclear Weapons Program

    Energy Technology Data Exchange (ETDEWEB)

    Archer, Billy Joe [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-05-30

    Los Alamos has continuously been on the forefront of scientific computing since it helped found the field. This talk will explore the rich history of computing in the Los Alamos weapons program. The current status of computing will be discussed, as will the expectations for the near future.

  8. Detection of Nuclear Weapons and Materials: Science, Technologies, Observations

    Science.gov (United States)

    2010-06-04

    between Z=57 (lanthanum) and Z=72 ( hafnium ), inclusive, are very rare in commerce, making 72 a reasonable boundary between high Z and lower Z elements...materials used in nuclear weapons of other nations (e.g., for alloys ) for purposes of nuclear forensics. (2) Another task is to develop the algorithms

  9. Power Systems and Energy Storage Modeling for Directed Energy Weapons

    Science.gov (United States)

    2014-06-01

    electron laser kW Kilo-watt LCS Littoral Combat Ship LAWS Laser Weapon System MLD Maritime Laser Demonstration MW Mega -watt NiMH Nickel metal...and various littoral combat ships. Also, an accurate, working model of the capacitor energy bank is being developed and the flywheel model is being

  10. Determination of the Contribution of Live Firing to Weapons Proficiency

    Science.gov (United States)

    1975-03-01

    area requirements. These ranges are generally similar to the combat environments in which the weapons would be used. However, numerous factors place...9-foot radius position for miss direction. (5) Transmitter/Receiver— mdio frequency communication of hit-miss information between target and firing

  11. Supply Chain Resilience: Assessing USAF Weapon System Life Cycle

    Science.gov (United States)

    2010-03-01

    Appendix E: Supply Chain Resilience Storyboard ........................................................... 87 Bibliography...bolt that, in March 2000, struck a Philips semiconductor plant in Albuquerque, New Mexico , created a 10-minute blaze that contaminated millions of...strategic planning of weapon systems as they mature and progress through the life cycle. 87 Appendix E: Supply Chain Resilience Storyboard 88

  12. Veteran Transfer Students and Concealed Weapons on Campus

    Science.gov (United States)

    Pesetski, Christine; Ofstein, Jennifer; Outlaw, Stacy; Brooks, Racheal

    2014-01-01

    This case details the challenges faced by various members of a 4-year university regarding Kathryn, a non-traditional transfer student and military veteran who recently returned from a traumatic deployment in Afghanistan. Precisely, this study identifies ambiguities pertaining to (a) threat assessment, (b) university weapons policies, (c) transfer…

  13. Are Weapons Searches in the Job Descriptions of Instructional Leaders?

    Science.gov (United States)

    Zimmerman, Judith A.

    2005-01-01

    In this article, the author poses the question "Are weapons searches in the job descriptions of instructional leaders?" which brings to attention changing duties of school principals that were not faced by previous generations. The article reports observations made during time spent with a current high school principal.

  14. A proposal for the classification of biological weapons sensu lato.

    Science.gov (United States)

    Rozsa, Lajos

    2014-12-01

    Due to historical and legislation reasons, the category of bioweapons is rather poorly defined. Authors often disagree on involving or excluding agents like hormones, psychochemicals, certain plants and animals (such as weeds or pests) or synthetic organisms. Applying a wide definition apparently threatens by eroding the regime of international legislation, while narrow definitions abandon several important issues. Therefore, I propose a category of 'biological weapons sensu lato' (BWsl) that is defined here as any tool of human aggression whose acting principle is based on disciplines of biology including particularly microbiology, epidemiology, medical biology, physiology, psychology, pharmacology and ecology, but excluding those based on inorganic agents. Synthetically produced equivalents (not necessarily exact copies) and mock weapons are also included. This definition does not involve any claim to subject all these weapons to international legislation but serves a purely scholarly purpose. BWsl may be properly categorized on the base of the magnitude of the human population potentially targeted (4 levels: individuals, towns, countries, global) and the biological nature of the weapons' intended effects (4 levels: agricultural-ecological agents, and non-pathogenic, pathogenic, or lethal agents against humans).

  15. The Russian biological weapons program: vanished or disappeared?

    Science.gov (United States)

    Shoham, Dany; Wolfson, Ze'ev

    2004-01-01

    The legacy and arsenal of biological weapons Russia inherited from USSR in 1991 became a lingering unsolved issue, in terms of a prime strategic arm that ought to be eliminated, advisably, in accordance with the Biological Weapons Convention Russia is committed to, and considering further undertakings and declarations made by the Russian regime. Indeed, that inheritance was created by USSR as a powerful, highly sophisticated component of utmost importance within the Soviet military paradigm, based on a wide spectrum of virulent, stabilized pathogens and toxins plus delivery systems. Moreover, remarkably advanced biotechnologies were thus applied to procure stockpiles of military-grade pathogens and toxins. Yet, an intriguing debate aroused with regard to the extent of the weaponized biological inventory accumulated by USSR, as well as the in effect attitude of Russia towards perpetuating or wiping out that inheritance. It turned out to form a far reaching and challenging complexity, both strategically and scientifically. The present study concentrates on the strategic as well as scientific spheres shaping that overall issue at large, attempting to thoroughly analyze it through an innovative methodology. One main conclusion thereby reached at is that the Russian military still poses a potential menance, in terms of both stockpiled, probably deployable biological weapons, and prevailing production capacities.

  16. Nuclear Energy, Nuclear Weapons Proliferation, and the Arms Race.

    Science.gov (United States)

    Hollander, Jack, Ed.

    A symposium was organized to reexamine the realities of vertical proliferation between the United States and the Soviet Union and to place into perspective the horizontal proliferation of nuclear weapons throughout the world, including the possible role of commercial nuclear power in facilitating proliferation. The four invited symposium…

  17. Threat evaluation and weapon assignment decision support: A ...

    African Journals Online (AJOL)

    Evaluation and Weapon Assignment (TEWA) process with regards to Command and ... [81] TE refers to “the part of threat analysis concerned with the ...... makers are more likely to screen options with respect to cut-offs or goals when there is.

  18. Modern weapons and military equipment for issue 1/2014

    Directory of Open Access Journals (Sweden)

    Nikola M. Ostojić

    2014-02-01

    Full Text Available Unmanned air transport mules from IsraelSensor monitoring of land areaSatellite telescope Moiraorbital weapons "cosmic dome"Automat for frogmen from TulaHeckler & Koch HK XM25, smart grenade launcher

  19. Joseph A. Burton Forum Award: Some Nuclear Weapons Dilemmas

    Science.gov (United States)

    May, Michael

    2014-03-01

    Nuclear weapons pose a combination of political and ethical dilemmas the solution to which has not been found. On one hand, in the view of both US government leaders and US allies, nuclear deterrence continues to play an essential part in the US role as the ultimate source of military strength for the alliances among the major democratic countries. It also continues to be in demand by countries that believe themselves to be isolated and threatened. On the other hand, nuclear weapons, besides being effective deterrents, can cause unprecedented loss of life and risk the demise of civilizations. No ban or technical precaution could prevent the rebuilding of nuclear weapons in a crisis. No diplomatic arrangement to date has erased the threat of invasion and war in the world. Only the abandonment of war and the threat of war as instruments of policy can make nuclear weapons obsolete. The slow, halting, risky road to that end remains the only hope for a world in which lasting solutions to the nuclear dilemmas are possible.

  20. Shipborne Laser Beam Weapon System for Defence against Cruise Missiles

    Directory of Open Access Journals (Sweden)

    J.P. Dudeja

    2000-04-01

    Full Text Available Sea-skim~ing cruise missiles pose the greatest threat to a surface ship in the present-day war scenario. The convenitional close-in-weapon-systems (CIWSs are becoming less reliable against these new challenges requiring extremely fast reaction time. Naval Forces see a high energy laser as a feasible andjeffective directed energy weapon against sea-skimming antiship cruise missiles becauseof its .ability to deliver destructive energy at the speed of light on to a distant target. The paper comparesthe technology and capability of deuterium fluoride (DF and chemical-oxygen-iodine laser (COIL in effectively performing the role of a shipborne CIWS altainst sea-skimming missiles. Out of these twolasers, it is argued that DF laser wo.uld be more effective a,s a shipborne weapon for defence against sea-skimmin,g cruise missiles. Besides the high energy laser as the primary (killing laser, othersub-systems required in the complete weapon system would be: A beacon laser to sense phase distor'ions in the primary laser, adaptive optics to compensate the atmospheric distortions, beam-directing optics, illuminating lasers, IRST sensors, surveillance and tracking radars, interfacing system, etc.

  1. An overview of the future of non-lethal weapons.

    Science.gov (United States)

    Alexander, J B

    2001-01-01

    During the past decade, vast changes have occurred in the geopolitical landscape and the nature of the types of conflicts in which technologically developed countries have been involved. While the threat of conventional war remains, forces have been more frequently deployed in situations that require great restraint. Adversaries are often likely to be elusive and commingled with noncombatants. There has been some shift in public opinion away from tolerance of collateral casualties. Therefore there is a need to be able to apply force while limiting casualties. Non-lethal weapons provide part of the solution. Among the changes that will influence the future have been studies by the US and NATO concerning the use of non-lethal weapons, coincidental with increased funding for their development and testing. New concepts and policies have recently been formalized. Surprisingly, the most strident objections to the implementation of non-lethal weapons have come from organizations that are ostensibly designed to protect non-combatants. These arguments are specious and, while technically and academically challenging, actually serve to foster an environment that will result in the deaths of many more innocent civilians. They misconstrue technology with human intent. The reasons for use of force will not abate. Alternatives to bombs, missiles, tanks and artillery must therefore be found. Non-lethal weapons are not a panacea but do offer the best hope of minimizing casualties while allowing nations or alliances the means to use force in protection of national or regional interests.

  2. Veteran Transfer Students and Concealed Weapons on Campus

    Science.gov (United States)

    Pesetski, Christine; Ofstein, Jennifer; Outlaw, Stacy; Brooks, Racheal

    2014-01-01

    This case details the challenges faced by various members of a 4-year university regarding Kathryn, a non-traditional transfer student and military veteran who recently returned from a traumatic deployment in Afghanistan. Precisely, this study identifies ambiguities pertaining to (a) threat assessment, (b) university weapons policies, (c) transfer…

  3. Smart Weapons - Can We Fold the Nuclear Umbrella

    Science.gov (United States)

    1991-12-17

    However, as a weapon of mass destruction, they present unique doctrina ! problems. Doctrine must address not only their military utility, but their...p. 3. 3. Ibid., p. 4. 4. United States Army TRADOC Regulation 525-58 (Final Draft), Airland Operations, Fort Monroe , VA, 1991, p. 3. 5. Buckley

  4. The role of nuclear weapons in the year 2000

    Energy Technology Data Exchange (ETDEWEB)

    1990-01-01

    This publication presents the proceedings for the workshop, The Role of Nuclear Weapons in the Year 2000, held on October 22--24, 1990. The workshop participants considered the changing nature of deterrence and of our strategic relationship with the Soviet Union, the impact of nuclear proliferation on regional conflicts, and ways that the nuclear forces might be restructured to reflect new political circumstances.

  5. Is (-)-Catechin a "Novel Weapon" of Spotted Knapweed (Centaurea stoebe)?

    Science.gov (United States)

    The “novel weapons” hypothesis states that some invasive weed species owe part of their success as invaders to allelopathy mediated by allelochemicals that are new to the native species. Presumably, no resistance has evolved among the native species to this new allelochemical (i.e. the novel weapon...

  6. Defensive engagement and perceptual enhancement

    OpenAIRE

    Keil, Andreas; Bradley, Margaret M; Ihssen, Niklas; Heim, Sabine; Vila, Jaime; Guerra, Pedro; Lang, Peter J.

    2010-01-01

    We tested whether visual cortical sensitivity to external cues in the context of an acute defensive reaction is heightened or attenuated. A strong cardiac defense (fear) response was elicited by presenting an abrupt, loud acoustic stimulus following a 10-minute period of quiescence. Electrocortical responses to aversive and neutral pictures following defensive stimulus onset were measured using dense-array EEG. Pictures were flickered at 12.5 Hz to evoke steady-state visual evoked potentials ...

  7. Ballistic Missile Defense System (BMDS)

    Science.gov (United States)

    2015-12-01

    Estimate RDT&E - Research , Development, Test, and Evaluation SAR - Selected Acquisition Report SCP - Service Cost Position TBD - To Be Determined TY - Then...all ranges and in all phases of flight. Following guidance from the President, the Secretary of Defense approved the Ballistic Missile Defense (BMD...based Midcourse Defense (GMD) system to enhance our capability against Intercontinental Ballistic Missiles. We are currently sustaining 30

  8. Human biomonitoring in civil defense; Humanbiomonitoring im Bevoelkerungsschutz

    Energy Technology Data Exchange (ETDEWEB)

    Mueller, Michael; Schmiechen, Katharina [Universitaetsmedizin Goettingen (Germany). Arbeits-, Sozial- und Umweltmedizin

    2012-07-01

    The booklet on human biomonitoring (HBM) in civil defense covers the following issues within two sections: (1) general part: definition and importance of human biomonitoring; application in civil defense; practice in a CBRN (chemical, biological, radiation, nuclear) scenario; sampling following a CBRN assignment; HBM for antidote administration; peculiarities of sampling in case of biological agents; microbiological detection procedure; human biomonitoring of radioactive metal isotopes. (2) Special part: substance profiles; list of HBM laboratories; list of poison information centers; questionnaire for exposure assessment in case of dangerous substance accidents; agreement for human biomonitoring examination.

  9. Buying for Armageddon: Factors influencing post-World War II weapons purchases since the Cuban Missile Crisis

    Energy Technology Data Exchange (ETDEWEB)

    Boies, J.L.

    1991-01-01

    The central problem of this study is the role that the economy and economic interests play in decisions about US weapons-systems acquisition. Despite a voluminous literature discussing the formation of military policy, journalistic accounts of business influence on military policy dominate the literature. A notable exception to this pattern is Griffin, Devine, and Wallace's use of time-series data on military expenditures to assess Baran and Sweezy's thesis that military expenditures are necessary to the good health of the monopoly sector of the US economy. Using similar techniques and an expanded data set, the effect of business political action and major economic forces on the quantity and types of weapons purchased since the Cuban Missile Crisis are investigated. Findings indicate that defense contractor rates of profit have a positive relationship to procurement expenditures of most types. This is opposite of the effect posited by most of the literature. Elite political mobilization, measured by the activity of the Committee on the Present Danger, a group at the core of the New Right Social Movement, has a positive effect on expenditures.

  10. The singular weapon. What remains from the atomic age?; Die Singulaere Waffe. Was bleibt vom Atomzeitalter?

    Energy Technology Data Exchange (ETDEWEB)

    Eisenbart, Constanze (ed.) [Forschungsstaette der Evangelischen Studiengemeinschaft (FEST), Heidelberg (Germany)

    2012-07-01

    The book contains the following contributions: Why do we talk about the atomic age? The language of the atomic myth - comments to a protestant debate. Nuclear singularity between fiction and reality. Only one can get through: military singularity of nuclear weapons. Physical singularity of nuclear weapons. Nuclear weapons test and fall-out. Quantitative disarmament and qualitative rearmament. Do mini nukes neutralize the singularity? The vulnerability of the industrial society by the nuclear electromagnetic momentum. Nuclear weapons as national status symbol - the example of India. The general regulations of international laws and the singularity of nuclear weapons. The construction of normative singularity - development and change of the nuclear taboo.

  11. Radiologic signs of weapons and munitions: How will noncombatants recognize them?

    Science.gov (United States)

    Maizlin, Zeev V; Kuruvilla, Mathew; Clement, Jason J; Vos, Patrick M; Brown, Jacqueline A

    2010-08-01

    The purpose of this work was to show the radiologic signs named after weapons and munitions along with their military counterparts to help radiologists recognize these signs, which will allow confident interpretation and diagnosis. Numerous pathologic conditions have classic radiologic manifestations that resemble weapons and ammunition. Most of these signs are highly memorable and easy to recognize. However, the names of the weapons (some of them antique and some not commonly known) may confuse radiologists who are not familiar with the appearance of such weapons as the scimitar, bayonet, or dagger. The value of the signs is reduced if the radiologist is unfamiliar with the appearance of the corresponding weapon.

  12. International Specialization

    DEFF Research Database (Denmark)

    Kleindienst, Ingo; Geisler Asmussen, Christian; Hutzschenreuter, Thomas;

    2012-01-01

    Whether and how international diversification and cross-border arbitrage affects firm performance remains one of the major unresolved research questions in the strategy and international business literatures. We propose that knowing how much a firm has internationally diversified tells us very...... little about performance implications, if we do not know, and do not ask, how the firm has diversified. Therefore, building on the two broad arguments of operating flexibility and location-specific commitment, we develop a theoretical framework that focuses on the extent to which a firm's international...... arbitrage strategy is characterized by specialization versus replication and argue that these different strategies may have differential impact on profitability and risk reduction. Developing a sophisticated measure of international specialization and using a unique panel data set of 92 German MNEs to test...

  13. International Specialization

    DEFF Research Database (Denmark)

    Kleindienst, Ingo; Geisler Asmussen, Christian; Hutzschenreuter, Thomas

    2012-01-01

    Whether and how international diversification and cross-border arbitrage affects firm performance remains one of the major unresolved research questions in the strategy and international business literatures. We propose that knowing how much a firm has internationally diversified tells us very...... little about performance implications, if we do not know, and do not ask, how the firm has diversified. Therefore, building on the two broad arguments of operating flexibility and location-specific commitment, we develop a theoretical framework that focuses on the extent to which a firm's international...... arbitrage strategy is characterized by specialization versus replication and argue that these different strategies may have differential impact on profitability and risk reduction. Developing a sophisticated measure of international specialization and using a unique panel data set of 92 German MNEs to test...

  14. Weapon use increases the severity of domestic violence but neither weapon use nor firearm access increases the risk or severity of recidivism.

    Science.gov (United States)

    Folkes, Stephanie E F; Hilton, N Zoe; Harris, Grant T

    2013-04-01

    Use of weapons is a risk factor for domestic violence severity, especially lethality. It is not clear, however, whether access to firearms itself increases assault severity, or whether it is characteristic of a subgroup of offenders who are more likely to commit severe and repeated domestic assault. This reanalysis of 1,421 police reports of domestic violence by men found that 6% used a weapon during the assault and 8% had access to firearms. We expected that firearm use would be rare compared to other weapons and that actual weapon use rather than firearm access would increase the severity of domestic assaults. Firearm access was associated with assault severity, but this was mostly attributable to use of nonfirearm weapons. Weapon use was associated with older age, lower education, and relationship history as well as to assault severity. Victims were most concerned about future assaults following threats and actual injuries. Although firearm access and weapon use were related to actuarial risk of domestic violence recidivism, neither predicted the occurrence or severity of recidivism. We conclude that, consistent with previous research in the United States and Canada, firearm use in domestic violence is uncommon even among offenders with known firearm access. Weapon use is characteristic of a subgroup of offenders who commit more severe domestic violence, and seizure of weapons may be an effective intervention.

  15. Special offer

    CERN Multimedia

    Staff Association

    2010-01-01

    Special offer for members of the Staff Association and their families 10% reduction on all products in the SEPHORA shop (sells perfume, beauty products etc.) in Val Thoiry ALL YEAR ROUND. Plus 20% reduction during their “vente privée”* three or four times a year. Simply present your Staff Association membership card when you make your purchase. * next “vente privée” from 24th to 29th May 2010  

  16. Special offer

    CERN Multimedia

    Staff Association

    2011-01-01

    SPECIAL OFFER FOR OUR MEMBERS Tarif unique Adulte/Enfant Entrée Zone terrestre 19 euros instead of 23 euros Entrée “Zone terrestre + aquatique” 24 euros instead of 31 euros Free for children under 3, with limited access to the attractions. Walibi Rhône-Alpes is open daily from 22 June to 31 August, and every week end from 3 September until 31 October. Closing of the “zone aquatique” 11 September.

  17. Special offer

    CERN Multimedia

    Staff Association

    2011-01-01

    SPECIAL OFFER FOR OUR MEMBERS Tarif unique Adulte/Enfant Entrée Zone terrestre 19 euros instead of 23 euros Entrée “Zone terrestre + aquatique” 24 euros instead of 31 euros Free for children under 3, with limited access to the attractions. Walibi Rhône-Alpes is open daily from 22 June to 31 August, and every week end from 3 September until 31 October. Closing of the “zone aquatique” 11 September.

  18. Defense AT&L (Volume 36, Number 2, March-April 2007)

    Science.gov (United States)

    2007-04-01

    13 Defense AT&L: March-April 2007 MAI Technologies and the DoD and NASA Systems Impacted • High-Yield Investment Cast Superalloy Airfoils –F135, F136...E/F Drag Beam –F-22 Keelson and F-35 Weapons Bay Door Hinge –C-17 Pylon Panel and Structural Support –AE1107, AE2100 and AE3007H Compressor Discs ...Forged Titanium Alloy Modeling –F119 Fan Blades and Discs –F135, F136 Fan Discs and F-22 Plate Airframe Structure • Direct Electron-Beam-Melted

  19. 舰炮对空射击火力分配模型研究%Weapon target assignment model of navy gun's anti-aircraft firing

    Institute of Scientific and Technical Information of China (English)

    田峰; 白江

    2011-01-01

    To deal with weapon target assignment of navy guns' anti-aircraft firing in air defense operations, based on the combat capability of navy guns, the threatening trend of air targets, weapon target assignment and firing time distribution, dynamic weapon target assignment was applied to analyze primarily the effect of firing time on damage probability. At last, based on weight function and damage probability P(t), the objective function and the distribution model of firing time were calculated. The result provides some reference for theoretical analysis and practical application of navy guns' anti-aircraft firing.%为解决防空作战中舰炮对空射击火力分配问题,综合考虑舰炮武器的作战能力和空中目标的威胁态势,结合武器目标分配和射击时机分配,采用动态火力分配研究方法,重点分析了射击时机对毁伤概率的影响.结合权重函数与毁伤概率P(t)的分布律,最终计算出了射击时机目标函数和射击时机分配模型.该研究成果对于舰炮对空射击的理论分析和实际运用提供了参考.

  20. The Advanced Security Operations Corporation Special Weapons and Tactics Initiative: A Business Plan

    Science.gov (United States)

    2004-12-01

    5 Kotler , Philip . (2003). A Framework for Marketing Management (2nd ed.). New Jersey: Pearson Education. 8 teams in Los...www.ojp.usdoj.gov/odp/docs/fy04hsgp_appkit.pdf 5. Kotler , Philip . (2003). A Framework for Marketing Management (2nd ed.). New Jersey: Pearson Education. 6