WorldWideScience

Sample records for irregular warfare special

  1. Irregular Warfare: Special Operations Joint Professional Military Education Transformation

    National Research Council Canada - National Science Library

    Cannady, Bryan H

    2008-01-01

    ... on today's battlefront in Afghanistan and Iraq and in the Global War on Terrorism (GWOT). At the forefront of the GWOT and irregular warfare are the United States Special Operations Command (USSOCOM...

  2. Strategic Analysis of Irregular Warfare

    Science.gov (United States)

    2010-03-01

    the same mathematical equations used by Lanchester .10 Irregular Warfare Theory and Doctrine It is time to develop new analytical methods and models...basis on which to build, similar to what Lanchester provided almost 100 years ago. Figure 9 portrays both Lanchester’s approach and an irregular 17

  3. Special Operations, Irregular Warfare, and Operational Art: A Theory of Special Operations

    Science.gov (United States)

    2013-12-10

    is mostly but not wholly a land phenomenon. Naval forces have combatted maritime irregulars such as pirates for millennia, for example see: Plutarch ...SW2502SocialMediaAndUW.html (accessed June 15, 2013). Plaster, John L. SOG: Secret Wars of America’s Commandos in Vietnam. New York: Simon & Schuster, 1997. Plutarch

  4. Strategic Choice: United States Special Forces’ Comparative Advantage in Irregular Warfare

    Science.gov (United States)

    2017-03-01

    metrics. 124 James Kiras, Special Operations and the Nature of Strategy : From World War II to the War on Terrorism , Vol. 17 (New York: Routledge...Operations and the nature of Strategy : From World War II to the War on Terrorism . Vol. 17. New York: Routledge. 2006. Liddell Hart, B. H. Strategy . New...indirect strategies . This thesis examines the conflict interaction between weak and strong actors. For the strong actor, this thesis identifies that

  5. The Impact of Irregular Warfare on the US Army

    National Research Council Canada - National Science Library

    McDonald, III, Roger L

    2006-01-01

    Although the U.S. Army has yet to clearly define irregular warfare, it is imperative that the Army take near-term action to enhance the ability of Soldiers and units to operate effectively in an irregular warfare environment...

  6. Roots of Russian Irregular Warfare

    Science.gov (United States)

    2016-12-01

    PAGE INTENTIONALLY LEFT BLANK xiii ACKNOWLEDGMENTS Crissy, your encouragement throughout my career and especially during this project has been...all of the Russian disinformation techniques in Ukraine came directly “from Soviet toolkits .” Maria Snegovaya, “Putin’s Information Warfare In

  7. Irregular Warfare: Impact on Future Professional Military Education

    National Research Council Canada - National Science Library

    Paschal, David G

    2006-01-01

    ... to operate effectively in an irregular warfare environment. The utility of a decisive war between nation states continues to decline and will eventually reach critical mass based upon the extreme imbalance of military power and a U.S. monopoly...

  8. Irregular Warfare: New Challenges for Civil-Military Relations

    National Research Council Canada - National Science Library

    Cronin, Patrick M

    2008-01-01

    .... Irregular warfare introduces new complications to what Eliot Cohen has called an unequal dialogue between civilian and military leaders in which civilian leaders hold the true power but must modulate...

  9. Examining U.S. Irregular Warfare Doctrine

    National Research Council Canada - National Science Library

    Kimbrough, IV, James M

    2008-01-01

    ... of insurgency and terrorism. In response to the associated strategic challenges, a growing debate occurred among military historians, strategists, and leaders about the proper principles necessary for contemporary irregular...

  10. Conflict Without Casualties: Non-Lethal Weapons in Irregular Warfare

    Science.gov (United States)

    2007-09-01

    the body,” and the Geneva Protocol of 1925, bans the use of chemical and biological weapons .11 On 8 April 1975, President Ford issued Executive...E Funding – PE 63851M) (accessed 15 December 2006). The American Journal of Bioethics . “Medical Ethics and Non-Lethal Weapons .” Bioethics.net...CASUALTIES: NON-LETHAL WEAPONS IN IRREGULAR WARFARE by Richard L. Scott September 2007 Thesis Advisor: Robert McNab Second Reader

  11. Toward Operational Art in Special Warfare

    Science.gov (United States)

    2016-02-23

    combatant commanders develop special warfare cam- paign options for their theaters that can be integral parts of the national approach. Getting buy -in at...the resistance spawning franchise operations at home or abroad? – Is the resistance attracting funding or other forms of assistance (indigenous

  12. Interagency Cooperation for Irregular Warfare at the Combatant Command

    Science.gov (United States)

    2009-01-01

    enemy’s command capability.16 Salamoni argued that the term “irregular warfare” belies an ethnocentric perspective of conflict that will limit military...duty military staffing to form the nucleus of the organization, which would receive augmentation from additional assigned reservists and interagency

  13. Organizing for Irregular Warfare: Implications for the Brigade Combat Team

    Science.gov (United States)

    2007-12-01

    program on October 13, 2006. For further information see, Stew Magnuson, “Eyes Wide Open,” National Defense May 2007, 46. 227 John A. English...David Tucker and Christopher J. Lamb , “Restructuring Special Operations Forces for Emerging Threats,” Strategic Forum no. 219 (January 2006) to... Stew . “Eyes Wide Open.” National Defense, May 2007. Malcom, Ben S. White Tigers, My Secret War in Korea. U.S.: Brassey’s, 2003

  14. Structuring Naval Special Warfare junior officer professional military education

    OpenAIRE

    Donovan, Thomas A.

    2007-01-01

    Naval Special Warfare does not currently have a designated career path for an officer that requires professional military education (PME) for SEAL junior officers after the rank of Ensign (O-1) and before the rank of Lieutenant Commander (O-4). There currently is interest in this subject matter at the Naval Special Warfare Command and Center. SEAL officers increasingly hold key leadership positions and influence critical decisions in the execution of national strategy. This growing respo...

  15. Toward Operational Art in Special Warfare: Appendixes

    Science.gov (United States)

    2016-01-01

    language, proficiency in small-unit tactics, and the ability to build and fight alongside indigenous combat formations in a permissive, uncertain, or...counterinsurgency through and with indigenous forces or personnel.”1 The report has four aims: (1) to adapt conventional operational art to the unique...perfect near-real-time situational awareness,” at least at the tactical level of land warfare in complex terrain. But the idea of leveraging information

  16. Special Warfare: Restructuring for the Future

    Science.gov (United States)

    2016-06-01

    Civil affairs CAPs combined action platoons CAS close-air support CBI China-Burma-India [theater] CDI Community Defense Initiative CENTCOM [U.S...special forces’ creed has changed over time, the sentiment has remained. The history of the basic unit of special forces—the SFODA—can be traced back to...reassigned CIDG forces no longer held the advantage of insight into local cultural norms and daily activities since they were no longer operating near

  17. 75 FR 6642 - Notice of Proposed Information Collection; Naval Special Warfare Recruiting Directorate

    Science.gov (United States)

    2010-02-10

    ... Information Collection; Naval Special Warfare Recruiting Directorate AGENCY: Department of the Navy, DoD. ACTION: Notice. SUMMARY: The Naval Special Warfare (NSW) Recruiting Directorate announces the submission... any of the following methods: Federal eRulemaking Portal: http://www.regulations.gov . Follow the...

  18. Above the Influence: The Strategic Effects of Airpower in Irregular Warfare

    Science.gov (United States)

    2010-06-01

    INDOCHINA. . . . . . . . . . . . . . . . . . . . . 105 APPENDIX B: MAP OF LAOS . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 APPENDIX...perspectives. These perspectives involve the use of airpower in North Vietnam, South Vietnam, and Laos . The overarching political endstate or...Nagl, ―Principles, Imperatives, and Paradoxes of Counterinsurgency,‖ 50; Mao Tse -Tung, Problems of Strategy in Guerrilla Warfare, 215-216; Gray

  19. Special Forces and the Art of Influence: A Grassroots Approach to Psychological Operations in an Unconventional Warfare Environment

    National Research Council Canada - National Science Library

    Thomas, II, Joel W

    2006-01-01

    This thesis researches the intricacies of the art of influence in an unconventional warfare environment to develop a model of influence that can be utilized by Special Forces conducting unconventional warfare...

  20. Forgeting Lessons Learned: The United States Army’s Inability To Embrace Irregular Warfare

    Science.gov (United States)

    2014-04-01

    Revolutionary Development Support, commonly referred to as “CORDS”, was established in 1967 under Robert “Blowtorch” Komer. As the director of CORDS, Robert ...combat operations spanning the complete spectrum of warfare. As Robert Citino, the author of Blitzkrieg to Desert Storm wrote about the development of...US forces in Somalia. Haiti In 1915, Smedley Butler and 3,000 Marines invaded Haiti and quickly pacified the entire island. Eighty years

  1. Special Operations Forces: C-130 Upgrade Plan Could Help Fix Electronic Warfare Deficiencies

    National Research Council Canada - National Science Library

    1998-01-01

    In response to a concern that threats to the U.S. Special Operations Command's (USSOCOM) aircraft are increasing, while funds available for electronic warfare are decreasing, the General Accounting Office...

  2. Irregular Warfare (IW) Joint Operating Concept (JOC), Version 1.0

    Science.gov (United States)

    2007-09-11

    environment). Country C is a state sponsor of terrorism that promotes fundamentalist ideology and conducts a campaign of genocide in portions of the... Cambodians , these forces were led by US and/or South Vietnamese Special Forces personnel. Operating largely in sparsely populated areas, the Mobile

  3. Assessing the Role of Surgical Strike Operations in Support of a Special Warfare Campaign

    Science.gov (United States)

    2017-06-09

    classic example of special warfare in action is the use of Special Forces soldiers to facilitate the Northern Alliance’s overthrow of the Taliban...Finally, the tempo of surgical strike operations must be taken into account. Renowned British counterinsurgent of the Boer War, Charles Callwell...December 2016, accessed 15 December 2016, http://edition.cnn.com/2010/ WORLD /asiapcf/10/09/ afghanistan.british.worker.death/index.html?hpt=T2. 43 camps

  4. Hybrid Warfare: How to Shape Special Operations Forces

    Science.gov (United States)

    2016-06-10

    irregular tactics, information operations, and deliberate terrorism as they waged war against Russia in the territory of Chechnya and o deep in Russian...Russia initially had to withdraw its forces from Chechnya , but later led by a former KGB operative, Vladimir Putin, were able to defeat the Chechen rebels

  5. Dehumanization and Irregular Warfare

    Science.gov (United States)

    2013-06-01

    author and do not reflect the official policy or position of the Department of Defense or the U.S. Government. IRB Protocol number ____N/A____...films.122 This reframing of cultural training as a discussion of proper etiquette , rather 120

  6. Special Forces and the Art of Influence: A Grassroots Approach to Psychological Operations in an Unconventional Warfare Environment

    National Research Council Canada - National Science Library

    Thomas, II, Joel W

    2006-01-01

    .... The research was based on several premises: (1) the strategic utility of Special Forces (SF) lies in its ability to influence a target audience in an unconventional warfare (UW) environment; (2...

  7. The Manipulation of Human Behavior in Guerrilla Warfare: Can It Enhance U.S. Army Special Forces Guerrilla Warfare Operations?

    National Research Council Canada - National Science Library

    Harris, William

    1997-01-01

    .... Proper integration of psychological communications to manipulate behavior in guerrilla warfare may facilitate the recruiting1 motivation, morale, sustainment and popular support for a guerrilla movement and its cause...

  8. Optimizing Armed Forces Capabilities for Hybrid Warfare – New Challenge for Slovak Armed Forces

    Directory of Open Access Journals (Sweden)

    Peter PINDJÁK

    2015-09-01

    Full Text Available The paper deals with the optimization of military capabilities of the Slovak Armed Forces for conducting operations in a hybrid conflict, which represents one of the possible scenarios of irregular warfare. Whereas in the regular warfare adversaries intend to eliminate the centers of gravity of each other, most often command and control structures, in irregular conflicts, the center of gravity shifts towards the will and cognitive perception of the target population. Hybrid warfare comprises a thoroughly planned combination of conventional military approaches and kinetic operations with subversive, irregular activities, including information and cyber operations. These efforts are often accompanied by intensified activities of intelligence services, special operation forces, and even mercenary and other paramilitary groups. The development of irregular warfare capabilities within the Slovak Armed Forces will require a progressive transformation process that may turn the armed forces into a modern and adaptable element of power, capable of deployment in national and international crisis management operations.

  9. Strategic Usefulness of Conventional Force/Special Operations Force Interdependence in Irregular Warfare

    Science.gov (United States)

    2017-06-01

    surgical strike missions, often deep in denied territory like the Osama bin Laden raid in Pakistan or counterterrorism raids in Yemen . “Surgical strike...70 Rothstein, “Less is More,” 283. 71 Alexander George and Andrew Bennett, Case Studies and Theory Development in the Social Sciences... Media Network, September 16, 2011. 75 Ibid. 76 Max Boot, War Made New: Weapons, Warriors, and the Making of the Modern World (New York: Penguin

  10. Models, Analysis, and Recommendations Pertaining to the Retention of Naval Special Warfare s Mid-Level Officers

    Science.gov (United States)

    2013-12-01

    The Analytic Hierarch/Network Process,” in Rev. R. Acad. Cien. Serie A. Mat (RACSAM), submitted by Francisco Javier Giron (Real Academia de Ciencias ...Academia de Ciencias : Spain. Scott, Nathan. Naval Special Warfare Officer Retention Survey. Monterey, CA: NPS Press, September 2013. Whittenberger

  11. Postural Stability of Special Warfare Combatant-Craft Crewmen With Tactical Gear.

    Science.gov (United States)

    Morgan, Paul M; Williams, Valerie J; Sell, Timothy C

    The US Naval Special Warfare's Special Warfare Combatant-Craft Crewmen (SWCC) operate on small, high-speed boats while wearing tactical gear (TG). The TG increases mission safety and success but may affect postural stability, potentially increasing risk for musculoskeletal injury. Therefore, the purpose of this study was to examine the effects of TG on postural stability during the Sensory Organization Test (SOT). Eight SWCC performed the SOT on NeuroCom's Balance Manager with TG and with no tactical gear (NTG). The status of gear was performed in randomized order. The SOT consisted of six different conditions that challenge sensory systems responsible for postural stability. Each condition was performed for three trials, resulting in a total of 18 trials. Overall performance, each individual condition, and sensory system analysis (somatosensory, visual, vestibular, preference) were scored. Data were not normally distributed therefore Wilcoxon signed-rank tests were used to compare each variable (ρ = .05). No significant differences were found between NTG and TG tests. No statistically significant differences were detected under the two TG conditions. This may be due to low statistical power, or potentially insensitivity of the assessment. Also, the amount and distribution of weight worn during the TG conditions, and the SWCC's unstable occupational platform, may have contributed to the findings. The data from this sample will be used in future research to better understand how TG affects SWCC. The data show that the addition of TG used in our study did not affect postural stability of SWCC during the SOT. Although no statistically significant differences were observed, there are clinical reasons for continued study of the effect of increased load on postural stability, using more challenging conditions, greater surface perturbations, dynamic tasks, and heavier loads. 2016.

  12. Air Power in Irregular Warfare

    Science.gov (United States)

    2012-12-01

    that Americans will return and bring with them “radios, TV’s, trucks, boats, watches, iceboxes, medicine, Coca - Cola and many wonderful things.”292 Some...three American contractors were employees of the Northrop Grumman Corporation. During a reconnaissance mission looking for coca fields and drug

  13. Evolutionary Models of Irregular Warfare

    Science.gov (United States)

    2013-03-01

    the poorest data—perhaps in part because of political nervousness about advertising estimates of enemy strengths after early optimism in Iraq, as...repro- duction. These adaptations include both physiological and behavioral strategies ranging from armour and immunity to complex nervous sys- tems

  14. German Views of Irregular Warfare

    Science.gov (United States)

    2015-06-01

    retreated westward following the invasion of Russia. Karl Marx , in an 1849 speech, emphasized, A nation, fighting for its liberty, ought not to adhere...characterized these forces. “Irregular” forces, on the other hand, fell outside of such characterizations and state subordination. 82 Karl von Clausewitz, On...operations. Of note, this edition of On War uses “ Karl ” instead of “Carl.” 28 Tyrolean uprising (1809), and the Spanish insurrection and Peninsula

  15. IRREGULAR WARFARE IN AFRICAN CONFLICTS

    African Journals Online (AJOL)

    Abel

    civil war, because the factors determining the financial and military viability of civil war are .... affect a counterbalance of force”, since forces seek to negate or avoid the strengths ...... Crime and Money Laundering Programme, ISS Cape Town.

  16. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  17. Provision of health services to irregular migrants with a special focus on children.

    Science.gov (United States)

    Søvig, Karl Harald

    2011-01-01

    All European countries are now facing a situation where a part of the population consists of migrants without a permit to stay or reside. These persons may have health problems, and the question then rises regarding health services to irregular migrants. Normally, welfare benefits are offered those with a relationship to the country concerned, as citizen, asylum seeker, tourist, etc. Irregular migrants are outside the society, and it could be suggested that they therefore should be denied health services. On the other hand, common European standards of humanity lay obligations on the States, for example, where situations are life-threatening. This contribution gives an overview of relevant legal instruments, both from the UN, Council of Europe and the European Union. Although there are many similarities, the instruments have their differences, and there may even be some tensions regarding the underlying values.

  18. Electronic Warfare: Army Special Operations Acquisition Strategy for Improved Equipment Is Sound

    National Research Council Canada - National Science Library

    1999-01-01

    ... to you. The Army Special Operations Command employs modified Chinook and Blackhawk helicopters, the MH-47D/E and MH-60K/L, respectively, in support of special operations missions worldwide These aircraft...

  19. Governing Warfare

    DEFF Research Database (Denmark)

    Harste, Gorm

      It would seem as though warfare has gotten out of control, not only in Iraq and Afghanistan, but also in Central Africa. The paper outlines the strategic history of politically controlled warfare since the early Enlightenment. The argument is that control is implausible. The idea of control has...

  20. 2008 13th Expeditionary Warfare Conference

    Science.gov (United States)

    2008-10-23

    platforms – Emphasize a mixed fleet approach that spans the “iron triangle” – Integrate MRAP into the fleet mix – Transition to a fleet of tactical...Urban Warfare Mountain Warfare Desert Warfare Jungle Riverine Special Skills Recon LOG CSS ENG MT HS Ord Maint EOD Pers Retrival ...Detection (Specialized Platform FLGPR)Stand-off (60M) Scaleable Neutralization (Area coverage) ABV Delivery Ground Cueing Stand-off (800M) Scaleable

  1. Irregular Warfare Centric Foreign Internal Defense

    Science.gov (United States)

    2013-06-01

    ransacking homes, humiliating automobile occupants during searches and harassment of pedestrians on the streets.87 The Commission of Human Rights ruled...the surface often appears reactive and inconsistent, both Labour and Conservative governments have consistently adhered to a set of basic principles

  2. Africa: Irregular Warfare on the Dark Continent

    Science.gov (United States)

    2009-05-01

    CNN, MSNBC, Newsweek, and on international television in Australia, Denmark, France, Germany, Italy, Brazil , Switzerland, the Netherlands, United...and exploitation. The Niger River Delta is comprised of about 5,600 square miles of mangrove swamps and dense vegetation crisscrossed by small streams

  3. Examining U.S. Irregular Warfare Doctrine

    Science.gov (United States)

    2008-06-01

    Muslim leaders, this manual also provides inspiration to the Al-Qaeda undercover member. These are especially useful in convincing the young...A “Air Power: An Enduring Illusion,” The Economist (24 August 2006). Accessed via: http://www.economist.com/world/displaystory.cfm?story_id...USA AFIT/ILM/ENS/08-04 DEPARTMENT OF THE AIR FORCE AIR UNIVERSITY AIR FORCE INSTITUTE OF TECHNOLOGY Wright-Patterson

  4. Risk, Military Ethics and Irregular Warfare

    Science.gov (United States)

    2011-12-01

    permissible; they are obligatory. Given the state’s moral obligation to protect its citizens, 6 military operations conducted in their defense are prima ... facie obligated, even when conducting those operations exposes combatants to harm. 7 Thus, in what I will refer to as the “traditional view,” by taking...feature of the traditional view. In an article co-written in 2005 with then Major General Amos Yadlin, Kasher remarked: “the duty to minimize casualties

  5. Justice: A Problem for Military Ethics during Irregular War

    National Research Council Canada - National Science Library

    Bauer, John W

    2008-01-01

    ... is?" or "Justice according to whom?" The relative nature of the term "justice" creates a problem for military ethics, particularly when soldiers try to determine what actions are morally acceptable when they are engaged in irregular warfare...

  6. Unconventional Cyber Warfare: Cyber Opportunities in Unconventional Warfare

    Science.gov (United States)

    2014-06-01

    Internet service provider IW irregular warfare MCO major combat operations MySQL open-source relational database management system NATO North...today, often with no regard for legal or ethical constraints. A better course of action would be to conduct operations in cyberspace within the precepts...built in feature of MySQL that 97 John Markoff, “Before the Gunfire, Cyberattacks,” York Times, August 13, 2008, sec. Technology, 1, http

  7. Using Agent Based Distillation to Explore Issues Related to Asymmetric Warfare

    Science.gov (United States)

    2009-10-01

    official definition of asymmetric warfare , considering that its use was redundant to irregular warfare [30]. 2 Such as the Lanchester Equations...RTP-MP-MSG-069 23 - 1 Using Agent Based Distillation to Explore Issues Related to Asymmetric Warfare Martin Adelantado, Jean-Michel Mathé...shows that both conventional and asymmetric warfare are characterised by nonlinear behaviours and that engagement is a Complex Adaptive System (CAS

  8. Electronic Warfare: Comprehensive Strategy Needed for Suppressing Enemy Air Defenses

    National Research Council Canada - National Science Library

    2001-01-01

    .... To achieve this suppression, the services use specialized aircraft designed to neutralize, destroy, or temporarily degrade enemy air defense systems through either physical attack or electronic warfare...

  9. Mountain Warfare: The Need for Specialist Training

    National Research Council Canada - National Science Library

    Malik, Muhammad

    2003-01-01

    This study focuses on the need for specialist training for mountain warfare. It analyzes the special characteristics of mountain and high altitude terrain which affect conduct of military operations...

  10. The ethics of drone warfare

    Directory of Open Access Journals (Sweden)

    Fatić Aleksandar

    2017-01-01

    Full Text Available The paper investigates the compatibility of the modern technologies of warfare, specifically the use of offensive drones, with traditional military ethics and suggests that the new technologies radically change the value system of the military in ways which make large parts of the traditional military ethics inapplicable. The author suggests that Agamben’s concept of ‘effectivity’ through ‘special actions’ which mark one’s belonging to a particular community or profession is a useful conceptual strategy to explore the compatibility of drone warfare with traditional military ethics; this strategy shows mixed results at best.

  11. Ending the Debate: Unconventional Warfare, Foreign Internal Defense, and Why Words Matter

    National Research Council Canada - National Science Library

    Jones, D

    2006-01-01

    There is an ongoing debate within the Special Forces community whether unconventional warfare and foreign internal defense are applicable in the contemporary and future Special Operations environments...

  12. Drone warfare

    Science.gov (United States)

    Gusterson, Hugh

    2017-11-01

    Crude drones existed as early as World War I, but the technology matured in the Yugoslav Wars of the 1990s and the current wars around the Middle East. The U.S. first used a weaponized drone in late 2001, in Afghanistan. Drones may cause more or less civilian casualties depending on the targeting protocols employed by their operators. There is an inherent ambiguity in determining who is an insurgent from several thousand feet, but civilian casualties are likely to be higher if targeters emphasize "signature strikes" over "personality strikes," if they engage in "double-tap strikes," if they rely too much on local informants, and if they rely too heavily on cellphone identification in the absence of corroboration from other intelligence sources. The legality of drone warfare is fairly clear in established battle zones such as Afghanistan, but is more problematic in terms of both international and domestic law when it comes to drone strikes in countries such as Yemen, Pakistan and Somalia with which the U.S. is not at war. Looking to the future, the U.S. would be well advised to sponsor negotiations for an international drone convention that might establish clear international rules for the use of drones, ban autonomous smart drones, and establish adjudicatory procedures to handle allegations of war crimes.

  13. The ethics of drone warfare

    OpenAIRE

    Fatić Aleksandar

    2017-01-01

    The paper investigates the compatibility of the modern technologies of warfare, specifically the use of offensive drones, with traditional military ethics and suggests that the new technologies radically change the value system of the military in ways which make large parts of the traditional military ethics inapplicable. The author suggests that Agamben’s concept of ‘effectivity’ through ‘special actions’ which mark one’s belonging to a particular communit...

  14. Learning on the Move, OSS Detachment 101 Special Operations in Burma

    Science.gov (United States)

    2015-06-12

    actions would serve as shaping effects for larger conventional operations. Modern US Army Special Operations doctrine further supports this...their irregular brand of warfare as the decisive operation for a campaign where conventional forces were not suitable, prepared, or politically...Operations doctrine, America’s early SOF did not have the luxury of implementing schoolhouse solution sets and designed each solution as a campaign unfolded

  15. Impact Assessment In Special Warfare

    Science.gov (United States)

    2017-12-01

    Systematic Review and Meta-analysis,” Journal of Research in Crime and Delinquency 52, no. 4 (2015). 27 additional rigorous evaluations” of its... statistical methods, can simulate the randomized assignment into treatment and control and improve understanding of cause and effect. Lyall, Blair...demographic information and the geospatial location of each interview. I used the R statistical program to process the original survey data, filter for

  16. Innovative Practices for Special Warfare

    Science.gov (United States)

    2015-12-01

    stealing customers from traditional quick service fast food restaurants .243 Innovations in restaurant design, food preparation and distribution, are...and diverse organizations to reap the benefits of loyalty and connectivity that small teams enjoy.152 To create the linkages, JSOC strove to dissolve...those new to a field. Garage startups generate many disruptive innovations because “they are not tied to any specific customer base, product design

  17. Special Warfare: A Selected Bibliography.

    Science.gov (United States)

    1983-10-01

    Strategy. Boston: Routledge & Kegan Paul, 1981. (U162 .A78) 8. Atlantic Research Corporation. Georgetown Research Project. A Histori- cal Survey of...Corps Gazette. The Guerrillp. and How to Fight Him: Selections, ed. by T.N. Greene . Nev ’ork: Praeger, 1962. (U240 K33) 108. Martic, Milos. Insurrection

  18. Special Operations And Cyber Warfare

    Science.gov (United States)

    2016-12-01

    Cyber weapons have multiple functions and can be used for espionage or OPE. It is important to highlight the similarities between the intelligence...James Clapper, Director of National Intelligence, emphasized the importance of cyber operations as he identified cyber as the third major hazard facing...support the development of the capacity and capability of foreign security forces and their supporting institutions.”52 The DOD’s Cyber Strategy states

  19. Flying Electronic Warfare Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides NP-3D aircraft host platforms for Effectiveness of Navy Electronic Warfare Systems (ENEWS) Program antiship missile (ASM) seeker simulators used...

  20. Irregular Applications: Architectures & Algorithms

    Energy Technology Data Exchange (ETDEWEB)

    Feo, John T.; Villa, Oreste; Tumeo, Antonino; Secchi, Simone

    2012-02-06

    Irregular applications are characterized by irregular data structures, control and communication patterns. Novel irregular high performance applications which deal with large data sets and require have recently appeared. Unfortunately, current high performance systems and software infrastructures executes irregular algorithms poorly. Only coordinated efforts by end user, area specialists and computer scientists that consider both the architecture and the software stack may be able to provide solutions to the challenges of modern irregular applications.

  1. Information Warfare and Ethics

    Directory of Open Access Journals (Sweden)

    M.J. Warren

    2001-05-01

    Full Text Available This paper examines the ethics of the practice of information warfare at both the national and corporate levels. Initially examining the present and past actions of individual hackers, it moves to the more organised, future military and economic warfare scenarios. It examines the lack of legal or policy initiatives in this area.

  2. Difficult Decisions: Chemical Warfare.

    Science.gov (United States)

    Slesnick, Irwin L.; Miller, John A.

    1988-01-01

    Gives the background history and chemistry of modern day chemical warfare from World War I to the present. Provides discussion questions to stimulate deeper thinking on the issue. Contains a discussion activity called "Can New Chemical Weapons Lead to Humane Warfare?" (CW)

  3. Irregular Warfare: Brazil’s Fight Against Criminal Urban Guerrillas

    Science.gov (United States)

    2009-09-01

    reflex action on the part of the urban guerrilla. To learn how to shoot and have good aim, the urban guerrilla must train himself systematically, uti ... pharmacist , or who simply has had first-aid training is a necessity in modern guerrilla struggles. A small manual of first aid for urban guerrillas, 76 JSOU

  4. Improving Capabilities for Irregular Warfare. Volume 2. Capabilities Analysis

    Science.gov (United States)

    2007-08-01

    ranged from the Israelis and other Jews buying up all the land in Iraq, to the Coca - Cola logo (sup- posedly owned by Jews) as saying “No Mecca, No...New recruits training as bomb makers may be detected by their handling of explosives. New recruits could be discouraged by widely advertising severe

  5. Helicopters in Irregular Warfare: Algeria, Vietnam, and Afghanistan

    Science.gov (United States)

    2013-06-13

    with guns, missiles, and rockets. It is unlikely that aerial artillery won South Vietnamese hearts and minds, but 179Ibid. 180Interview with Stanley...American Struggle for Vietnam’s Hearts and Minds (Boulder, CO: Westview Press, 1995), 33. 217Bruscino, Occasional Paper #17, 37. 218Bruce Palmer... malformed or otherwise ‘reorganized’ is still one hell of a poor instrument with which to engage insurgents.358 — Anonymous U.S. General The

  6. Institutional Challenges to Developing Metrics of Success in Irregular Warfare

    Science.gov (United States)

    2011-12-01

    develop national policy and strategic goals. If an IW conflict has a 11 Richard L. Daft , Essentials...13 Richard L. Daft , Essentials of Organization Theory and Design (Mason, OH:Thomson Learning, 2003), 52. 14 Henry...37 Richard L. Daft , Essentials of Organization Theory & Design (Mason, OH: Thompson Learning, 2003), 52

  7. Characterizing and Exploring the Implications of Maritime Irregular Warfare

    Science.gov (United States)

    2012-01-01

    States and to help the Colombian government promote peace while simultane- ously contributing to South American regional security ( Marcella , 2001...Businessweek, June 15, 2010. Marcella , Gabriel, Plan Colombia: The Strategic and Operational Imperatives, Carlisle, Pa.: Strategic Studies Institute

  8. Zarqawi’s Sfumato: Operational Art in Irregular Warfare

    Science.gov (United States)

    2013-05-23

    in Baghdad and Karbala during the Shia festival of Ashura in March of 2004.80 These attacks were preceded by the bombing of the Jordanian embassy...American contractors Nick Berg and Eugene Armstrong. Zarqawi released edited videos with music and logos detailing multiple suicide bombings against

  9. Friction in the U.S. Army During Irregular Warfare

    Science.gov (United States)

    2014-05-22

    PowerPlus Books, 2002), 86–97. 29Niccolo Machiavelli and Harvey C Mansfield, The Prince (Chicago, IL: University of Chicago Press, 1985), 21–25...Gilbert, eds., Makers of Modern Strategy: From Machiavelli to the Nuclear Age (Princeton, N.J: Princeton University Press, 1986), 155. 5... Machiavelli , influenced by Greek and Roman writings, provided the basic underpinning for acquisition of land and wealth.29 Of particular importance was the

  10. Non-Kinetic Capabilities for Irregular Warfare: Four Case Studies

    Science.gov (United States)

    2009-03-01

    on the job, absenteeism , receiving free “perks”) 2. “Conventional” Corruption—Something is done or not done for some reward (bribery, kickbacks...occupational deviance that breaks departmental rules and regulations, such as sleeping on the job, absenteeism , and receiving free “perks.” “Conventional...African Security Review, Vol. 7, No. 1, 1998. Tanzi, Vito, “Corruption Around the World: Causes, Consequences, Scope, and Cures ,” IMF Staff Papers

  11. IDA Publications on Irregular Warfare: A Bibliography 2000 - Fall 2008

    Science.gov (United States)

    2008-12-01

    reconstruction effort. D-3550 Non-standard publication UNCLASSIFIED No URL No DTIC accession no. 2008 Memetics – Overview and Baseline Models This report...documents key notions and ideas that collectively com- prise what is known as meme theory or memetics – an emerging area of research for potential...and the dynamics of bio- logical systems as a platform for developing mathematical modes in memetics . D-3599 IDA CRP UNCLASSIFIED Approved for

  12. The Filipino Way of War: Irregular Warfare through the Centuries

    Science.gov (United States)

    2011-12-01

    exercised liberalism during his tenure. He encouraged the freedom of speech, abolished the censorship of the press, and most importantly, dealt with...Matalam, a Cotabato politician, to organize the Mindanao Independence Movement (MIM). Hundreds of MIM members underwent training in Malaysia .339 This...or through pilferage by AFP scalawags. The support from known sympathetic countries (e.g., Libya, Saudi Arabia, and Malaysia ) gained by the MILF in

  13. Fighting Networks: The Defining Challenge of Irregular Warfare

    Science.gov (United States)

    2011-06-01

    fighting networks, different skills allow for increased operational complexity. Lawrence and Lorsch found that organizations in more uncertain...Uncertainty in the Face of Risk,” in Cooperation and Prosocial Behavior, ed. Robert Hindle and Jo Groebel (New York: Cambridge University Press, 1991...simplistic to describe al-Qaeda as a guerrilla organization as they have transcended traditional practices by their skilled utilization of the network form

  14. Manhunting: Counter-Network Organization for Irregular Warfare

    Science.gov (United States)

    2009-09-01

    Buenos Aires, Argentina Israeli Mossad pursued Adolf Eichmann . Eichmann was finally identified in Buenos Aires. Apprehended on his way home, he...Malkin and Harry Stein, Eichmann in My Hands (New York: Warner Books, May 1990). Mossad is the Israeli intelligence service. 288. “Dr. Gerald Bull

  15. Irregular Warfare in the American West: The Geronimo Campaign

    Science.gov (United States)

    2010-05-05

    reaching the United States while under the escort of Apache scouts. Crook’s biographer and fellow Indian Wars veteran Captain John G. Bourke described...worst. Bourke observed, howevet,that the Rsychological impact of being tracked by their own . . i tribesmen, who were backed by ~ighly ~obile...hold a temporary higher rank. Brevet ranks disappeared from the U.S. military at the end of the nineteenth century. 5 Captain John G. Bourke , An

  16. Traditional and Irregular Warfare: A Flawed Concept for Categorizing Conflict

    Science.gov (United States)

    2009-05-18

    cultures, religious beliefs , economic conditions, available resources, wealth and poverty, access to information, levels and...Boulder, CO: Westview Press 1994), 187. 11 This assessment is based on Taoism , a Chinese philosophy that was becoming popular at about the time Art of...who openly challenged beliefs about the nature of the universe. Some even challenged the role of religion and the various gods of the time. This was

  17. Defining cyber warfare

    Directory of Open Access Journals (Sweden)

    Dragan D. Mladenović

    2012-04-01

    Full Text Available Cyber conflicts represent a new kind of warfare that is technologically developing very rapidly. Such development results in more frequent and more intensive cyber attacks undertaken by states against adversary targets, with a wide range of diverse operations, from information operations to physical destruction of targets. Nevertheless, cyber warfare is waged through the application of the same means, techniques and methods as those used in cyber criminal, terrorism and intelligence activities. Moreover, it has a very specific nature that enables states to covertly initiate attacks against their adversaries. The starting point in defining doctrines, procedures and standards in the area of cyber warfare is determining its true nature. In this paper, a contribution to this effort was made through the analysis of the existing state doctrines and international practice in the area of cyber warfare towards the determination of its nationally acceptable definition.

  18. Expeditionary Warfare- Force Protection

    National Research Council Canada - National Science Library

    Higgins, Eric

    2004-01-01

    In 2003, the Systems Engineering and Analysis students were tasked to develop a system of systems conceptual solution to provide force protection for the Sea Base conceptualized in the 2002 Expeditionary Warfare study...

  19. Introducing a novel method to estimate the total heat transfer coefficient inside irregular-shape cavities utilizing thermoelectric modules; Special application in solar engineering

    DEFF Research Database (Denmark)

    Asadi, Amin; Rahbar, Nader; Rezaniakolaei, Alireza

    The main objective of the present study is to introduce a novel method to measure the total heat transfer coefficient inside irregular-shape cavities, used in solar applications, utilizing thermoelectric modules. Applying mathematical and thermodynamics modeling, the governing equations related...... to the total heat transfer coefficient between thermoelectric and glass cover as a function of ambient temperature, glass temperature, and output voltage has been derived. Investigating the accuracy of the proposed equation, an experimental case study has been performed. The experimental setup consists...... of three parts; a heat sink, a thermoelectric module, and a glass cover. All the experiments have been performed on the typical winter day and under the real climatic conditions of Semnan (35° 33′ N, 53° 23′ E), Iran. The results showed that the proposed method has the ability to measure the total heat...

  20. Biological warfare agents

    Directory of Open Access Journals (Sweden)

    Duraipandian Thavaselvam

    2010-01-01

    Full Text Available The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies.

  1. Biological warfare agents

    Science.gov (United States)

    Thavaselvam, Duraipandian; Vijayaraghavan, Rajagopalan

    2010-01-01

    The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies. PMID:21829313

  2. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    Section 1 of this paper provides an overview of cyber warfare as an element of information warfare, starting with the general background of the current strategic environment the United States is operating...

  3. Why Irregulars Win: Asymmetry of Motivations and the Outcomes of Irregular Warfare

    Science.gov (United States)

    2016-12-01

    Political Science, 64. 69 Xiaoyan Xu et al., “ Motivation and Social Contexts: A Cross national Pilot Study of Achievement, Power, and Affiliation Motives ...by religion, nationalism, and social and economic inequalities. The Palestinians have stayed fully committed and motivated since they were displaced...militarily despite an asymmetry of motivations . The Russians accomplished this in part, by restricting and censoring the media to isolate the Russian

  4. Statistical Analysis of Warfare: Identification of Winning Factors with a Focus on Irregular Warfare

    Science.gov (United States)

    2015-09-01

    Defense HERO Historical Evaluation and Research Organization IDPs Internally Displaced Persons IFR Initial Force Ratio INITA Relative Imitative...armies started combating non-state, widely dispersed groups. Although this change appears to be quite simple, it has had a deep impact on military...1789–1961: A Study of the Impact of the French, Industrial, and Russian Revolutions on War and its Conduct (Boston, MA: Da Capo Press, 1992). 10 Ibid

  5. Chemical warfare agents.

    Science.gov (United States)

    Kuca, Kamil; Pohanka, Miroslav

    2010-01-01

    Chemical warfare agents are compounds of different chemical structures. Simple molecules such as chlorine as well as complex structures such as ricin belong to this group. Nerve agents, vesicants, incapacitating agents, blood agents, lung-damaging agents, riot-control agents and several toxins are among chemical warfare agents. Although the use of these compounds is strictly prohibited, the possible misuse by terrorist groups is a reality nowadays. Owing to this fact, knowledge of the basic properties of these substances is of a high importance. This chapter briefly introduces the separate groups of chemical warfare agents together with their members and the potential therapy that should be applied in case someone is intoxicated by these agents.

  6. Chemical warfare agents

    Directory of Open Access Journals (Sweden)

    Vijayaraghavan R

    2010-01-01

    Full Text Available Among the Weapons of Mass Destruction, chemical warfare (CW is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided.

  7. Chemical warfare agents

    Science.gov (United States)

    Ganesan, K.; Raza, S. K.; Vijayaraghavan, R.

    2010-01-01

    Among the Weapons of Mass Destruction, chemical warfare (CW) is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided. PMID:21829312

  8. The Marine Corps Civil Military Operations (CMO) Capability: Inadequate for Current and Future Irregular Environments

    Science.gov (United States)

    2011-05-02

    the 2011 National Military Strategy contend and numerous analysts posit, that the United States will continue to prosecute irregular warfare or a...think tank reports, and the ruminations of various luminaries that the United States will be involved in inegular wmfare throughout the remainder of

  9. Star Formation in Irregular Galaxies.

    Science.gov (United States)

    Hunter, Deidre; Wolff, Sidney

    1985-01-01

    Examines mechanisms of how stars are formed in irregular galaxies. Formation in giant irregular galaxies, formation in dwarf irregular galaxies, and comparisons with larger star-forming regions found in spiral galaxies are considered separately. (JN)

  10. The Physics of Warfare

    Science.gov (United States)

    Giordano, Gerardo

    2015-01-01

    Recently, I was tasked with the creation and execution of a new themed general education physics class called The Physics of Warfare. In the past, I had used the theme of a class, such as the physics of sports medicine, as a way to create homework and in-class activities, generate discussions, and provide an application to demonstrate that physics…

  11. Military medicine and the ethics of war: British colonial warfare during the Seven Years War (1756-63).

    Science.gov (United States)

    Charters, Erica

    2010-01-01

    This article examines 18th-century European warfare, tracing the first formal codifications of conventions of war, frequently introduced by military physicians and initially regarding the treatment of the sick and wounded. It outlines to what extent these conventions were followed in practice, particularly in the challenging environment of American irregular warfare, with a focus on the most well-known incident of "biological warfare" in the period: the deliberate spread of smallpox by British officers among Amerindians in 1763. More broadly, it demonstrates that the history of military medicine provides a fruitful method with which to uncover assumptions about the ethics of war.

  12. Information Warfare and International Law

    National Research Council Canada - National Science Library

    Greenberg, Lawrence T; Goodman, Seymour E; Soo Hoo, Kevin J

    1998-01-01

    .... Some legal constraints will certainly apply to information warfare, either because the constraints explicitly regulate particular actions, or because more general principles of international law...

  13. Implications of Network Centric Warfare

    National Research Council Canada - National Science Library

    Bailey, Alvin

    2004-01-01

    .... These areas of dependence also provide numerous vulnerabilities. This paper will focus specifically on Network Centric Warfare's vulnerabilities in terms of sensors cyberterrorism/ Electro-Magnetic Pulse (EMP...

  14. Antifragile Electronic Warfare

    OpenAIRE

    Lichtman, Marc

    2014-01-01

    This letter introduces the concept of antifragile electronic warfare (EW), which we define as the ability to allow a communications link to improve performance due to the presence of a jammer. This concept should not be confused with jamming countermeasures (a.k.a. anti-jamming or electronic protection). Rather, antifragile EW can be thought of as the next step beyond simply avoiding or mitigating jamming. After introducing the concept we narrow down the subset of jammers this concept can be ...

  15. Legal aspects of the EU policy on irregular immigration

    Directory of Open Access Journals (Sweden)

    Voinikov Vadim

    2015-12-01

    Full Text Available This article addresses the issues pertaining to the adoption and development of legislation on irregular migration in the context of uncontrolled growth in the number of immigrants from North Africa and the Middle East to the EU. The article attempts at studying the EU legislation on irregular migration, classifying it, and analysing the prospects of EU migration legislation in the light of an increase in irregular immigration into the EU. The author systematises, classifies the current EU legislation on irregular immigration, and analyses the conditions, in which this legislation was developed. Using the legislation analysis method, the author proposes the following system of EU legislation on irregular immigration: rules preventing assistance to irregular immigration, rules preventing employment of irregular immigrants, rules on the return of irregular migrants and readmission, rules on border control, and rules on collaboration with third countries. The author pays special attention to analysing the current state of irregular immigration to the EU, which was dubbed the ‘greatest migration crisis in Europe’. The conclusion is that the European Union succeeded in the development of pioneering legislation on irregular immigration, which can serve as the basis for reception by other states. However, changes in the political and economic situation in the EU’s southern borderlands made the current legal mechanisms incapable of withstanding new threats. It necessitates a radical reform of the legislation on irregular immigration.

  16. The Role of Civil Affairs in Unconventional Warfare

    Science.gov (United States)

    2012-12-01

    neighbor to the west, and secured the eastern border of Laos 32 Mao Tse -Tung, On Guerrilla Warfare...INTRODUCTION..........................................................................................19  B.  BRIEF HISTORY OF LAOS ...Royal Lao Army SCA Support to Civil Administration SCIRI Supreme Council of Iraq SG Shadow Government SOF Special Operations Forces TAI Targeted

  17. Psychological effects of nuclear warfare

    International Nuclear Information System (INIS)

    Mickley, G.A.

    1987-01-01

    This report is divided into five parts. (1) Discussion of the psychological milieu before a nuclear confrontation. (2) Acute psychological reactions to nuclear warfare (some of which may reflect, in part, direct radiogenic alteration of nervous system functions). (3) Chronic psychological effects of a nuclear confrontation. (4) Issues concerning treatment of these psychological changes. (5) Prevention of adverse psychological reactions to nuclear warfare

  18. IMS software developments for the detection of chemical warfare agent

    Science.gov (United States)

    Klepel, ST.; Graefenhain, U.; Lippe, R.; Stach, J.; Starrock, V.

    1995-01-01

    Interference compounds like gasoline, diesel, burning wood or fuel, etc. are presented in common battlefield situations. These compounds can cause detectors to respond as a false positive or interfere with the detector's ability to respond to target compounds such as chemical warfare agents. To ensure proper response of the ion mobility spectrometer to chemical warfare agents, two special software packages were developed and incorporated into the Bruker RAID-1. The programs suppress interferring signals caused by car exhaust or smoke gases resulting from burning materials and correct the influence of variable sample gas humidity which is important for detection and quantification of blister agents like mustard gas or lewisite.

  19. Cyber warfare and electronic warfare integration in the operational environment of the future: cyber electronic warfare

    Science.gov (United States)

    Askin, Osman; Irmak, Riza; Avsever, Mustafa

    2015-05-01

    For the states with advanced technology, effective use of electronic warfare and cyber warfare will be the main determining factor of winning a war in the future's operational environment. The developed states will be able to finalize the struggles they have entered with a minimum of human casualties and minimum cost thanks to high-tech. Considering the increasing number of world economic problems, the development of human rights and humanitarian law it is easy to understand the importance of minimum cost and minimum loss of human. In this paper, cyber warfare and electronic warfare concepts are examined in conjunction with the historical development and the relationship between them is explained. Finally, assessments were carried out about the use of cyber electronic warfare in the coming years.

  20. Hybrid Maritime Warfare

    DEFF Research Database (Denmark)

    Schaub Jr, Gary John; Murphy, Martin; Hoffman, Frank

    2017-01-01

    Russia’s use of hybrid warfare techniques has raised concerns about the security of the Baltic States. Gary Schaub, Jr, Martin Murphy and Frank G Hoffman recommend a series of measures to augment NATO’s Readiness Action Plan in the Baltic region, including increasing the breadth and depth of naval...... exercises, and improving maritime domain awareness through cooperative programmes. They also suggest unilateral and cooperative measures to develop a sound strategic communications strategy to counter Moscow’s information operations, reduce dependence on Russian energy supplies and build the resilience...

  1. Russian and Chinese Information Warfare: Theory and Practice

    Science.gov (United States)

    2004-06-01

    Integral neurolinguistic programming •Placing essential programs into the conscious or sub- conscious mind •Subconscious suggestions that modify human...Generators of special rays •Optical systems • Neurolinguistic programming •Computer psychotechnology •The mass media •Audiovisual effects •Special effects...Information Warfare: Theory and Practice 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e

  2. Establishing Cyber Warfare Doctrine

    Directory of Open Access Journals (Sweden)

    Andrew M. Colarik

    2012-01-01

    Full Text Available Over the past several decades, advances in technology have transformed communications and the ability to acquire, disseminate, and utilize information in a range of environments. Modern societies and their respective militaries have taken advantage of a robust information space through network-centric systems. Because military and commercial operations have increasingly converged, communication and information infrastructures are now high-priority military objectives in times of war. This article examines the theoretical underpinning of current cyber warfare research, what we have learned so far about its application, and some of the emerging themes to be considered; it also postulates the development of a (national cyber warfare doctrine (CWD. An endeavor of this scale requires lots of considerations and preparation for its development if it is to be cooperatively embraced. This article considers why information technology systems and their supporting infrastructures should be considered legitimate military targets in conflicts, and offers several events that support this supposition. In addition, it identifies the various forms of doctrine that will become the basis for developing a CWD, discusses a CWD's possible components, and proposes a national collaborative and discussion framework for obtaining a nation's stakeholder buy-in for such an endeavor.

  3. Saturn's Irregular Moon Ymir

    Science.gov (United States)

    Denk, Tilmann; Mottola, S.

    2012-10-01

    Ymir (diameter 18 km), Saturn's second largest retrograde outer or irregular moon, has been observed six times by the Cassini narrow-angle camera (NAC) during the first 7 months in 2012. The observations span phase angles from 2° up to 102° and were taken at ranges between 15 and 18 million kilometers. From such a distance, Ymir is smaller than a pixel in the Cassini NAC. The data reveal a sidereal rotation period of 11.93 hrs, which is 1.6x longer than the previously reported value (Denk et al. 2011, EPSC/DPS #1452). Reason for this discrepancy is that the rotational light curve shows a rather uncommon 3-maxima and 3-minima shape at least in the phase angle range 50° to 100°, which was not recognizable in earlier data. The data cover several rotations from different viewing and illumination geometries and allow for a convex shape inversion with possibly a unique solution for the pole direction. The model reproduces the observed light curves to a very good accuracy without requiring albedo variegation, thereby suggesting that the lightcurve is dominated by the shape of Ymir. Among Saturn's irregular moons, the phenomenon of more than two maxima and minima at moderate to high phase angles is not unique to Ymir. At least Siarnaq and Paaliaq also show light curves with a strong deviation from a double-sine curve. Their rotation periods, however, remain unknown until more data can be taken. The light curve of Phoebe is fundamentally different to Ymir's because it is mainly shaped by local albedo differences and not by shape. Other reliable rotation periods of irregular satellites measured by Cassini include: Mundilfari 6.74 h; Kari 7.70 h; Albiorix 13.32 h; Kiviuq 21.82 h. More uncertain values are: Skathi 12 h; Bebhionn 16 h; Thrymr 27 h; Erriapus 28 h.

  4. Improving Transactional Memory Performance for Irregular Applications

    OpenAIRE

    Pedrero, Manuel; Gutiérrez, Eladio; Romero, Sergio; Plata, Óscar

    2015-01-01

    Transactional memory (TM) offers optimistic concurrency support in modern multicore archi- tectures, helping the programmers to extract parallelism in irregular applications when data dependence information is not available before runtime. In fact, recent research focus on ex- ploiting thread-level parallelism using TM approaches. However, the proposed techniques are of general use, valid for any type of application. This work presents ReduxSTM, a software TM system specially d...

  5. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    .... Section 1 concludes with a review of offensive and defensive cyber warfare concepts. Section 2 presents a general overview of cyber terrorism, including definitions of cyber terrorism and cyber terrorism support...

  6. Attrition in Network Centric Warfare

    National Research Council Canada - National Science Library

    Erbetta, John

    2003-01-01

    .... Information warfare means that positive attacks on systems themselves compound the problem. Emerging technologies applicable to NCW as a force multiplier need to be recognized as counter to the impediments to progress...

  7. The ethics of information warfare

    CERN Document Server

    Floridi, Luciano

    2014-01-01

    This book offers an overview of the ethical problems posed by Information Warfare, and of the different approaches and methods used to solve them, in order to provide the reader with a better grasp of the ethical conundrums posed by this new form of warfare.The volume is divided into three parts, each comprising four chapters. The first part focuses on issues pertaining to the concept of Information Warfare and the clarifications that need to be made in order to address its ethical implications. The second part collects contributions focusing on Just War Theory and its application to the case of Information Warfare. The third part adopts alternative approaches to Just War Theory for analysing the ethical implications of this phenomenon. Finally, an afterword by Neelie Kroes - Vice President of the European Commission and European Digital Agenda Commissioner - concludes the volume. Her contribution describes the interests and commitments of the European Digital Agenda with respect to research for the developme...

  8. Nuclear radiation in warfare

    International Nuclear Information System (INIS)

    Rotblat, J.

    1986-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios; biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion. (orig./HP) [de

  9. Nuclear radiation in warfare

    International Nuclear Information System (INIS)

    Rotblat, J.

    1981-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios); biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion. (U.K.)

  10. Reflections on nuclear warfare

    International Nuclear Information System (INIS)

    Evans, J.P.

    1983-01-01

    The author looks back on his more than 70 years of familiarity with Americans involved in warfare, noting their loyal support for our country's objectives. Drawing on the Einstein equation, his own visits to Hiroshima and Nagasaki, and current literature, he, as a physician, belatedly concurs with those who look on the use of nuclear weapons as irrational and untenable. Their employment under present circumstances would create a ''final epidemic'' to be avoided only by prevention. He suggests that medical perceptions must be considered by our national leaders in assessing the many factors that he hopes will lead to rational answers to this urgent, highly complex, and vital enigma. He cites physicians' efforts to help in finding answers and asks that his colleagues consider the issues with attention to the gravity of the situation and act according to their best judgment

  11. Irregular Migrants and the Law

    OpenAIRE

    Kassim, Azizah; Mat Zin, Ragayah Hj.

    2013-01-01

    This paper examines Malaysia`s policy on irregular migrants and its implementation, and discusses its impact. A survey and interview covering 404 respondents was conducted between July 2010 and June 2011 to ascertain the real situations surrounding irregular migrants in Malaysia, which is one of the major host countries of international migrants from developing nations. The policy on foreign workers was formulated in the mid-1980s to deal with the large number of irregular migrants and their ...

  12. Intelligence Strategy for Fourth Generation Warfare

    National Research Council Canada - National Science Library

    Jamison, Edward P

    2006-01-01

    ...." They have named this new era of war "fourth generation warfare." Currently the Department of Defense's intelligence strategy is designed to defeat conventional adversaries vise a fourth generation warfare opponent...

  13. Inside the Wire: American Security and Cyber Warfare

    Science.gov (United States)

    2017-03-01

    Roberts, Kerry V. " SUN TZU and The Art of Cyber Warfare." Journal of Counterterrorism & Homeland Security International 19, no. 1(Spring 2013): 12-4...12. REPORT TYPE 3. DATES COVERED (From - To) 01-03-2017 Bibliography 4. TITLE AND SUBTITLE Sa. CONTRACT NUMBER Inside the Wire: American Security...MCDERMOTT LIBRARY U.S. AIR FORCE ACADEMY 11. SPONSOR/MONITOR’S REPORT USAF ACADEMY CO 80840-6214 NUMBER(S) Special Bibliography Series # 119 12

  14. The doctor and nuclear warfare

    International Nuclear Information System (INIS)

    Anon.

    1982-01-01

    At the 34th World Medical Assembly in Lisbon in 1981 the World Medical Association adopted a motion proposed by the American Medical Association that national medical associations should develop programs to educate the civilian population on the medical consequences of nuclear war. This article discusses the attitude the medical professions should have, should nuclear warfare in some form confront them in the future. The conclusion is drawn that defence against nuclear warfare is only a part of civil defence against any disaster, including the natural disasters such as flood and fire and the man-made disasters of transport accidents, even of problems at nuclear plants designed to supply energy

  15. Irregular Dwarf Galaxy IC 1613

    Science.gov (United States)

    2005-01-01

    Ultraviolet image (left) and visual image (right) of the irregular dwarf galaxy IC 1613. Low surface brightness galaxies, such as IC 1613, are more easily detected in the ultraviolet because of the low background levels compared to visual wavelengths.

  16. Biological warfare, bioterrorism, and biocrime

    NARCIS (Netherlands)

    Jansen, H. J.; Breeveld, F. J.; Stijnis, C.; Grobusch, M. P.

    2014-01-01

    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria

  17. European Curricula, Xenophobia and Warfare.

    Science.gov (United States)

    Coulby, David

    1997-01-01

    Examines school and university curricula in Europe and the extent of their influence on xenophobia. Considers the pluralistic nature of the European population. Discusses the role of curriculum selection and language policy in state efforts to promote nationalism. Assesses the role of curricular systems in the actual encouragement of warfare,…

  18. The Anatomy of Counterinsurgency Warfare

    DEFF Research Database (Denmark)

    Mouritsen, Lars; Pedersen, Kenneth; Thruelsen, Peter Dahl

    Since the beginning of the new millennium, the West has been increasingly involved in a tiresome and rather particular type of conflict: insurgency warfare. The bloody and shocking terrorist attacks on New York and Washington in September 2001 marked the beginning of a new era, and the introducti...

  19. Technology Transition for Hybrid Warfare

    Science.gov (United States)

    2010-02-16

    and Iraq. At the same time, the science and technology base must provide the disruptive technologies to defeat future conventional enemies. This... disruptive technologies will be needed to retain long-term technological superiority in conventional warfare. Incremental improvement is the most...technology to be missed. Disruptive technologies are the second type of technological change and involve revolutionary concepts involving large technological

  20. Hybrid Warfare: the 21st Century Russian Way of Warfare

    Science.gov (United States)

    2017-05-25

    to wage information operations— from television, to the Internet, to unconventional forces on the ground spreading the message word -of- mouth ...adversarial vulnerabilities. Many of the peculiarities of hybrid warfare described herein are inextricably linked to Russia’s social , political, and...the US election. Then they utilized various means of media to distribute that information with the goal to discredit the US political process and

  1. Information Warfare in the Cyber Domain

    National Research Council Canada - National Science Library

    Takemoto, Glenn

    2001-01-01

    ...). This paper lays a foundation by defining the terminology associated with Information Warfare in the Cyber Domain, reviews the threat and illustrates the vulnerabilities of our information systems...

  2. MEANS AND METHODS OF CYBER WARFARE

    Directory of Open Access Journals (Sweden)

    Dan-Iulian VOITAȘEC

    2016-06-01

    Full Text Available According to the Declaration of Saint Petersburg of 1868 “the only legitimate object which States should endeavor to accomplish during war is to weaken the military forces of the enemy”. Thus, International Humanitarian Law prohibits or limits the use of certain means and methods of warfare. The rapid development of technology has led to the emergence of a new dimension of warfare. The cyber aspect of armed conflict has led to the development of new means and methods of warfare. The purpose of this paper is to study how the norms of international humanitarian law apply to the means and methods of cyber warfare.

  3. Cyber warfare building the scientific foundation

    CERN Document Server

    Jajodia, Sushil; Subrahmanian, VS; Swarup, Vipin; Wang, Cliff

    2015-01-01

    This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially gove

  4. Shadow Wars: An Analysis of Counterinsurgency Warfare

    National Research Council Canada - National Science Library

    Dogan, Osman

    2005-01-01

    ... of the current strategic approaches to counterinsurgency warfare. Toward this end, a systems model approach, which views insurgent organizations as open systems, is adapted to the insurgent environment...

  5. Radioecological aspects of nuclear warfare

    International Nuclear Information System (INIS)

    Edvardson, Kay

    1977-01-01

    Radioactive fallout, one of the major effects of nuclear warfare, will cause acute radiation sickness within the close-in or intermediate areas downwind from surface bursts. Global fallout from high yield explosions will be fairly evenly distributed in the hemisphere where the explosions occur, and will cause irradiation from ground deposit, inhaled material and contaminated food. Estimates of collective doses and the approximate number of late casualties from the global contamination are presented for a given total explosion yield. (author)

  6. GARCH and Irregularly Spaced Data

    NARCIS (Netherlands)

    Meddahi, N.; Renault, E.; Werker, B.J.M.

    2003-01-01

    An exact discretization of continuous time stochastic volatility processes observed at irregularly spaced times is used to give insights on how a coherent GARCH model can be specified for such data. The relation of our approach with those in the existing literature is studied.

  7. Hybrid Warfare: Preparing for Future Conflict

    Science.gov (United States)

    2015-02-17

    ciceromagazine.com/?s=getting+behind+hybrid+warfare. Brown , Col Leslie F. “Twenty-First Century Warfare Will be Hybrid.” Carlisle Barracks, PA...Lebanon and Gaza.” Rand Corporation Occasional Paper. Santa Monica, CA: Rand Corporation, 2010. Jones, Gareth and Darya Korsunskaya. “U.S., EU

  8. Reactivity of Dual-Use Decontaminants with Chemical Warfare Agents

    Science.gov (United States)

    2016-07-01

    REACTIVITY OF DUAL-USE DECONTAMINANTS WITH CHEMICAL WARFARE AGENTS ECBC-TR-1384... Decontaminants with Chemical Warfare Agents 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Willis, Matthew P...extraction) of chemical warfare agents from materials. 15. SUBJECT TERMS GD HD Decontamination Hazard mitigation VX Chemical warfare agent Liquid-phase

  9. The Information Warfare Life Cycle Model

    Directory of Open Access Journals (Sweden)

    Brett van Niekerk

    2011-11-01

    Full Text Available Information warfare (IW is a dynamic and developing concept, which constitutes a number of disciplines. This paper aims to develop a life cycle model for information warfare that is applicable to all of the constituent disciplines. The model aims to be scalable and applicable to civilian and military incidents where information warfare tactics are employed. Existing information warfare models are discussed, and a new model is developed from the common aspects of these existing models. The proposed model is then applied to a variety of incidents to test its applicability and scalability. The proposed model is shown to be applicable to multiple disciplines of information warfare and is scalable, thus meeting the objectives of the model.

  10. The Information Warfare Life Cycle Model

    Directory of Open Access Journals (Sweden)

    Brett van Niekerk

    2011-03-01

    Full Text Available Information warfare (IW is a dynamic and developing concept, which constitutes a number of disciplines. This paper aims to develop a life cycle model for information warfare that is applicable to all of the constituent disciplines. The model aims to be scalable and applicable to civilian and military incidents where information warfare tactics are employed. Existing information warfare models are discussed, and a new model is developed from the common aspects of these existing models. The proposed model is then applied to a variety of incidents to test its applicability and scalability. The proposed model is shown to be applicable to multiple disciplines of information warfare and is scalable, thus meeting the objectives of the model.

  11. DefenseLink.mil - Special Report - Soldiers Train with Non-lethal Weapons

    Science.gov (United States)

    Spc. Yevgeniy Popov, a chemical warfare specialist with Headquarters and Headquarters Company, 3rd warfare specialist with Headquarters and Headquarters Company, 3rd Special Troops Battalion, 3rd Brigade , center, a combat engineer with Company A, 3rd Special Troops Battalion, 3rd Brigade Combat Team, 10th

  12. Radioecological aspects of nuclear warfare

    International Nuclear Information System (INIS)

    Edvarson, K.

    1975-01-01

    The radioactive fallout from nuclear explosions is one of the major effects of nuclear warfare. Those levels causing acute radiation sickness are to be expected only within the close-in or intermediate areas downwind from surface bursts. Global fallout from high yield explosions will be fairly evenly distributed in the hemisphere where the explosions occurred and cause irradiation from ground deposit, inhaled material and contaminated food. The collective doses and the order of magnitude of late casualties from this global contamination are estimated for a given total explosion yield. (auth)

  13. Information warfare technologies in political discourse

    Directory of Open Access Journals (Sweden)

    Karpova Anna Yu.

    2016-01-01

    Full Text Available We attempt to examine the technology of «information warfare» in this paper. The dominant theme of the paper is that the outcome of the information warfare is important not only for the future of a state itself but for the future of the world balance of forces. The main task of geopolitical actors in information warfare is to introduce ideas corresponding to their interests into mass consciousness. All participants of political conflicts have common features in technologies of Information warfare. The information anomie is the indicator of the great geopolitical actors’ personified interests on the stage of «information warfare» - the process resulted in destroying the communicative line: report-information understanding and disrupting the social order in society. In this paper authors describe the following Information Warfare technologies: "Political volcano" technology; "SPIN" technology; "Widening media resource" technology; "specific gravity" technology; "Cold War 2.0" technology and Information cleaningup technology. It is assumed that in the future there will be new instructions on applying technologies of information warfare. To impart perspective to the paper we consider examples, opinions and trends.

  14. Proposal to Establish a School for Irregular Warfare in the Philippines.

    Science.gov (United States)

    1987-04-16

    other reasons. If the basic causes of the insurgency are as enumerated, then the present political dispensation under President Corazon C. Aquino...countermeasures should be taken. Previous to the February 1986 Revolution that brought Mrs. Corazon C. Aquino to the Presidency, the government conducted various...political power. 6 A newspaper commentary said: The government is gambling that President Corazone Aquino’s popularity and her promise of a new era in

  15. Irregular Warfare as a National Military Strategy Approach for Small States

    Science.gov (United States)

    2013-12-01

    Accessed October 12, 2013, http://www.bbc.co.uk/history/british/ victorians /boer_wars_01.shtml. 30 Ibid. 31 Ibid. 32 Ibid. 13 After increasing tension...explains the bottom-line in this reasoning by classifying strategic plans into different patterns based on “the relative resources available to the...Pretorius, Fransjohan. “The Boer Wars.” BBC, March 29 2011. Accessed October 12, 1213. http://www.bbc.co.uk/history/british/ victorians

  16. General George Crooks Development as a Practitioner of Irregular Warfare During the Indian Wars

    Science.gov (United States)

    2017-06-09

    national identity, the profession of arms does not have that luxury : I see the American military tradition as in part a record―a record as we...represented markets and jobs, perks that the local inhabitants and their representatives in Congress were reluctant to give up.”26 This issue

  17. Religion and Resistance: Examining the Role of Religion in Irregular Warfare

    Science.gov (United States)

    2009-03-01

    behind religious conflict. As asserted by Peters, it is only by acknowledging 9 In particular...versus the religious minimalism typical of the secular-West). In his book, The Stillborn God, Mark Lilla notes that, in most civilisations , human...social order and the modern world, is found across spiritual insurgencies. For example, Osama bin Laden framed the conflict between Muslim civilisation

  18. Flattening the Learning Curve: SOF as the Supported Command in the Irregular Warfare Environment

    Science.gov (United States)

    2012-06-01

    franchises can get this right, then surely so could the United States military. The endstate should always be to become more effective and efficient...may set the conditions for Joint and integrated GPF/SOF training on a more permanent basis. Of course, the disadvantage is that any training with

  19. Navy Irregular Warfare and Counterterrorism Operations: Background and Issues for Congress

    Science.gov (United States)

    2017-03-21

    Interrogation Group, questioned the Somali terrorist on “all but a daily basis.” He was cooperative throughout and some reports suggest that subsequent U.S...Ahmed Abu Khattala faced days of questioning aboard the USS New York from separate teams of American interrogators , part of a two-step process...attention on an interrogation strategy that the Obama administration has used in just a few recent terrorism investigations and prosecutions. Abu

  20. The Role of Airpower in Irregular Warfare for the 21st Century

    Science.gov (United States)

    2009-12-01

    also installed. Equipment that was required for bombing only was removed. A monorail and roller-mounted safety belt were installed in the rear...equipped to fire rockets and drop bombs. The American advisors determined the 65 Robbins, The Ravens, 30...one 40mm and one 105mm cannon. AFSOC also has 17 AC-130U gunships, with one 25mm Gatling gun, one 40mm and one 105mm cannon.86 These side- firing

  1. Listening to Historys Rhyme:Preparing the United States Army for Future Irregular Warfare

    Science.gov (United States)

    2014-04-01

    December 2007), 10. 44. Mission: Readiness, Too Fat to Fight: Retired Military Leaders Want Junk Food Out of Schools (Washington, DC, April 2010), 2...Politics and Strategy 50, no. 1 (February-March 2008): 19-30. Mission: Readiness. Too Fat to Fight: Retired Military Leaders Want Junk Food Out

  2. Irregular Warfare: The Maoist Challenge to India’s Internal Security

    Science.gov (United States)

    2012-12-01

    rebellion singed several other states also. In Orissa (now known as Odisha), the districts particularly affected were Koraput and Ganjam on the Andhra...trekking tour on the Ganjam -Kandhamal border, were abducted by the Maoists. 24 March Maoists abducted a ruling BJD MLA, Jhina Hikaka, near Laxmipur

  3. Navy Irregular Warfare and Counterterrorism Operations: Background and Issues for Congress

    Science.gov (United States)

    2016-05-27

    in the Middle East, the Department of the Navy (DON) states the following in its FY2017 budget highlights book : Today the Marine Corps has a force...for example, Nicholas Schmidle, “Getting Bin Laden,” The New Yorker, August 8, 2011, accessed online August 10, 2011 at http://www.newyorker.com...Indonesia, Papua New Guinea and Malaysia ; we’ll work in the areas and help build relationships with those countries in order to provide security in

  4. Desert Guerrillas: Psychological Social and Economic Characteristics of the Bedouin Which Lend Themselves to Irregular Warfare

    Science.gov (United States)

    1988-11-14

    to defend their positions from the rebels; and augmenting their efforts with a well- financed and comprehensive civic action program aimed at...Royal Sussex Regiment. London, England: The Unicorn Press Ltd., 1936. Connelley, William Elsey. Duantrill and the Border Wars. Cedar Rapids, Iowa

  5. Fighting With the Air: Airpower, Violence, and Public Sentiment in Irregular Warfare

    Science.gov (United States)

    2016-12-01

    the playing field with their exploitation of information technology using mass media .18 As has been the case in segments of Yemen , Somalia...contrast, horizontal communication technologies, such as social media , may increase collective violence.68 This finding suggests that in areas where state... Media , Social Media , and the Geography of Collective Violence in African States,” Journal of Peace Research, February 11, 2015, 00223433145581 02, doi

  6. Puncturing the Counterinsurgency Myth: Britain and Irregular Warfare in the Past, Present, and Future

    Science.gov (United States)

    2011-09-01

    This is a hurdle not unique to the British Army, as the American, French , Russian, and Israeli militaries have attested. Consequently, a reliance...hardly mark a glorious first chapter in the history of that nation’s 21st century COIN campaigning. MYTH #6: THE BRITISH CAN DO COIN ALONE The bruising...five techniques” of interro- 14 gation by the security forces. These methods included wall-standing, hooding, continuous white noise, food denial, and

  7. Technology Strategy in Irregular Warfare: High-Tech Versus Right-Tech

    Science.gov (United States)

    2015-12-01

    Markov and Zaloga, Soviet/Russian Armor and Artillery Design Practices: 1945 to Present, 1–17, chapter 6. Christopher F. Foss, Jane’s Armour and...Artillery 1984–85 (New York, NY: Jane’s, 1985), 580–594. 145 Foss, Jane’s Armour and Artillery 1984–85, 685. 146 Andrius Genys, 2S9 Nona-s 120-mm self...Soviet/Russian Armor and Artillery Design Practices: 1945 to Present, V-32. 148 Foss, Jane’s Armour and Artillery 1984–85, 464–468. 57 The BM-21

  8. The Most Daring Act of the Age: Principles for Naval Irregular Warfare

    Science.gov (United States)

    2010-01-01

    autonomous, were the homes of a developed culture of piracy and slave trade that stretched as far back as the fall of the Ro- man Empire. During the...Derna), asked in a letter, “What have they [the squadron’s crews] done but dance and wench?”12 Morris’s deployment was even less successful...were putrid and unusable. On 7 February, as they approached the North African coast, a gale struck the two American ships; Intrepid’s small size and

  9. Attacking Transnational Organized Criminal Networks: Applying Principles of Irregular Warfare to an Emerging Salient Threat

    Science.gov (United States)

    2014-12-04

    each drug determines the nature of its respective market. The four traditional categories of illicit drugs include opiates , cocaine, cannabis, and... Drugs .’53 Recognizing the need to institutionalize planning and oversight foreign terrorist organizations and militant movements in general. Of...Interdiction Command and Control Plan . The directors of the JIATFs and Joint Task Force North are principal members of the Office of National Drug Control

  10. Moltke as a Model for Information Warfare

    National Research Council Canada - National Science Library

    Gallagher, Daniel P

    1998-01-01

    ... with late 20th century Information Warfare (IW). Clausewitz, with his emphasis on concentrating forces for a decisive battle, or Sun Tzu, with his focus on an indirect approach and subduing the enemy without battle, might appear to be more...

  11. Gas Warfare in World War I.

    Science.gov (United States)

    Flintham, A. J.

    1978-01-01

    The effectiveness of gas warfare during World War I was increased by the lack of a basic understanding of the behavior of gases on the part of the soldiers. This was a result of deficiencies in science education. (BB)

  12. Prehistoric ceremonial warfare: beginning of institutionalized violence

    Czech Academy of Sciences Publication Activity Database

    Turek, Jan

    2017-01-01

    Roč. 13, č. 3 (2017), s. 535-548 ISSN 1555-8622 Institutional support: RVO:67985912 Keywords : human aggression * ceremonial warfare * archery symbolism * Neolithic * Chalcolithic * Europe Subject RIV: AC - Archeology, Anthropology, Ethnology OBOR OECD: Archaeology

  13. On Cyber Warfare Command and Control Systems

    National Research Council Canada - National Science Library

    Howes, Norman R; Mezzino, Michael; Sarkesain, John

    2004-01-01

    .... Cyber warfare then becomes a one-sided battle where the attacker makes all the strikes and the target of the attack responds so slowly that the attacker usually gets away without being identified...

  14. Enzymatic Decontamination of Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Raushel, Frank

    2000-01-01

    The primary objective of this research program is the development of a versatile enzyme-based system that is fully optimized for the decontamination, destruction, and detection of know chemical warfare agents...

  15. Insurgent Uprising: An Unconventional Warfare Wargame

    Science.gov (United States)

    2017-12-01

    Cleveland, Charles T. Connett, and Will Irwin. “Unconventional Warfare in the Gray Zone.” Joint Forces Quarterly 80, no. 1 (2016). Work, Robert O...CODE 13. ABSTRACT (maximum 200 words) Today, and in the future, unconventional solutions will present U.S. policymakers with options for dealing...training objectives and will complement existing training exercises. 14. SUBJECT TERMS unconventional warfare, foreign internal defense, direct

  16. Distributed computing environment for Mine Warfare Command

    OpenAIRE

    Pritchard, Lane L.

    1993-01-01

    Approved for public release; distribution is unlimited. The Mine Warfare Command in Charleston, South Carolina has been converting its information systems architecture from a centralized mainframe based system to a decentralized network of personal computers over the past several years. This thesis analyzes the progress Of the evolution as of May of 1992. The building blocks of a distributed architecture are discussed in relation to the choices the Mine Warfare Command has made to date. Ar...

  17. Route survey periodicity for mine warfare

    OpenAIRE

    Coke, Hartwell F.

    2009-01-01

    Approved for public release, distribution unlimited One of the Navy's most long standing challenges has been conquering the mine warfare threat. As mines and mine warfare techniques evolve and become more sophisticated, so does the United States' ability to counter the threat. The United States newest technique for countering a potential mined harbor, or route, is a process known as "change detection." This concept uses previous side scan sonar images of the area prior to a mining event an...

  18. On the Probability of Predicting and Mapping Traditional Warfare Measurements to the Cyber Warfare Domain

    CSIR Research Space (South Africa)

    Grobler, M

    2014-07-01

    Full Text Available Cyber warfare is a contentious topic, with no agreement on whether this is a real possibility or an unrealistic extension of the physical battlefield. This article will not debate the validity and legality of the concept of cyber warfare...

  19. Dilemmas of Warfare in Densely Populated Civilian Areas

    OpenAIRE

    Moshe Tamir

    2012-01-01

    This essay attempts to present operational perspectives on conducting warfare in densely populated areas. It also distinguishes between three types of combat within this general category, with the goal of shedding light on this complex type of warfare.

  20. Irregular Migration in Jordan, 1995-2007

    OpenAIRE

    AROURI, Fathi A.

    2008-01-01

    Euro-Mediterranean Consortium for Applied Research on International Migration (CARIM) This paper tackles the question of irregular migration in Jordan through its four main aspects. The first concerns irregular labour migrants and has been approached by using figures showing the socio-economic profile of non Jordanians working in Jordan and, additionally, unemployment in Jordan. This is done by assuming close similarities between legal and irregular labour migrants. The second is an attemp...

  1. Network Centric Warfare Case Study: U.S. V Corps and 3rd Infantry Division (Mechanized) During Operation Iraqi Freedom Combat Operations (Mar-Apr 2003). Volume 3. Network Centric Warfare Insights

    Science.gov (United States)

    2003-01-01

    OPSEC), military deception, psychological operations (PSYOPS), special information operations (IO), information assurance, physical security...nonlethal effects, such as operational 8 Network Centric Warfare Case Study security (OPSEC), military deception, psychological operations (PSYOP...Support Operations Group ASR Alternate Supply Route; or, Ammunition Supply Rate ATACMS Army Tactical Missile System ATARS Advanced

  2. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  3. Ethical issues in irregular migration research

    NARCIS (Netherlands)

    Duvell, F.; Triandafyllidou, A.; Vollmer, B.

    2008-01-01

    This paper is concerned with the ethical issues arising for researchers engaged in the study of irregular migration. Irregular migration is by definition an elusive phenomenon as it takes place in violation of the law and at the margins of society. This very nature of the phenomenon raises important

  4. ISIL's Hybrid Warfare in Syria & Iraq

    DEFF Research Database (Denmark)

    Sørensen, Heine

    2016-01-01

    of and ability to synchronize various instruments of power with a view to achieving their end-state. With regards to the second part of the problem statement, the analysis demonstrates how ISIL employed horizontal escalation and ambiguity initially, but later on turned to vertical escalation, within the military......The case study specifically seeks to answer the following problem statement: Does ISIL qualify as an actor using hybrid warfare and if so what characterizes their particular use of this type of warfare? Based on an analysis of ISIL’s warfare from August 2012 to August 2016 the chapter argues......, that it is possible to answer the first part of the problem statement in an affirmative way. Hence, ISIL is not only theoretically prone to hybridity by organizational setup, and by the people comprising the organization, but has in fact continuously acted according to a hybrid logic in its prioritization...

  5. Survey on Urban Warfare Augmented Reality

    Directory of Open Access Journals (Sweden)

    Xiong You

    2018-01-01

    Full Text Available Urban warfare has become one of the main forms of modern combat in the twenty-first century. The main reason why urban warfare results in hundreds of casualties is that the situational information of the combatant is insufficient. Accessing information via an Augmented Reality system can elevate combatants’ situational awareness to effectively improve the efficiency of decision-making and reduce the injuries. This paper begins with the concept of Urban Warfare Augmented Reality (UWAR and illuminates the objectives of developing UWAR, i.e., transparent battlefield, intuitional perception and natural interaction. Real-time outdoor registration, information presentation and natural interaction are presented as key technologies of a practical UWAR system. Then, the history and current research state of these technologies are summarized and their future developments are highlighted from three perspectives, i.e., (1 Better integration with Geographic Information System and Virtual Geographic Environment; (2 More intelligent software; (3 More powerful hardware.

  6. Mongol Warfare in the Pre-Dissolution Period »

    Directory of Open Access Journals (Sweden)

    Timothy May

    2015-01-01

    Full Text Available Although the Mongols used many of the tactics and strategies that steppe nomads had used for centuries, the Mongols refined steppe warfare so that this style of warfare reached its apogee during the Mongol Empire. Furthermore, the Mongols developed a style of warfare that made them possibly the greatest military force in history. This work examines several facets of the pre-dissolution period (1200–1260. With the dissolution of the Mongol Empire, Mongol warfare once again changed. In some areas it remained complex while in others it regressed to traditional forces of steppe warfare, still potent but not as effective as the pre-dissolution period.

  7. The Other Quiet Professionals: Lessons for Future Cyber Forces from the Evolution of Special Forces

    Science.gov (United States)

    2014-01-01

    tions Command), John Mense (INSCOM), Paul Schuh (JFCC-NW), Russell Fenton (U.S. Army Network Enterprise Technology Command), and CW5 Todd Boudreau and...Surdu, 2009, pp. 16–17). Doctrine Irregular warfare and SOF doctrine lagged operational activities after the Vietnam War and prior to the...forces are, at their operating core, small teams of highly skilled specialists, and both communities value skilled personnel above all else. Irregular

  8. Guiding Warfare to Reach Sustainable Peace

    DEFF Research Database (Denmark)

    Vestenskov, David; Drewes, Line

    The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition of develo......The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition...... of developing best practices in the education and implementation of IHL in capacity building of security forces....

  9. Cyber-Enabled Unconventional Warfare: The Convergence of Cyberspace, Social Mobilization, and Special Warfare

    Science.gov (United States)

    2015-12-01

    Internet, to recruit, indoctrinate and train individuals.223 Cinema -quality propaganda videos are produced...ideological identity to participate in a perceived to be legitimate UW-like operation without actually physically showing-up on the battlefield, if

  10. Personal protection during resuscitation of casualties contaminated with chemical or biological warfare agents--a survey of medical first responders.

    Science.gov (United States)

    Brinker, Andrea; Prior, Kate; Schumacher, Jan

    2009-01-01

    The threat of mass casualties caused by an unconventional terrorist attack is a challenge for the public health system, with special implications for emergency medicine, anesthesia, and intensive care. Advanced life support of patients injured by chemical or biological warfare agents requires an adequate level of personal protection. The aim of this study was to evaluate the personal protection knowledge of emergency physicians and anesthetists who would be at the frontline of the initial health response to a chemical/biological warfare agent incident. After institutional review board approval, knowledge of personal protection measures among emergency medicine (n = 28) and anesthetics (n = 47) specialty registrars in the South Thames Region of the United Kingdom was surveyed using a standardized questionnaire. Participants were asked for the recommended level of personal protection if a chemical/biological warfare agent(s) casualty required advanced life support in the designated hospital resuscitation area. The best awareness within both groups was regarding severe acute respiratory syndrome, and fair knowledge was found regarding anthrax, plague, Ebola, and smallpox. In both groups, knowledge about personal protection requirements against chemical warfare agents was limited. Knowledge about personal protection measures for biological agents was acceptable, but was limited for chemical warfare agents. The results highlight the need to improve training and education regarding personal protection measures for medical first receivers.

  11. Biological warfare, bioterrorism, and biocrime.

    Science.gov (United States)

    Jansen, H J; Breeveld, F J; Stijnis, C; Grobusch, M P

    2014-06-01

    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria or other agents used to cause illness or death in people, but also in animals or plants. It is aimed at creating casualties, terror, societal disruption, or economic loss, inspired by ideological, religious or political beliefs. The success of bioterroristic attempts is defined by the measure of societal disruption and panic, and not necessarily by the sheer number of casualties. Thus, making only a few individuals ill by the use of crude methods may be sufficient, as long as it creates the impact that is aimed for. The assessment of bioterrorism threats and motives have been described before. Biocrime implies the use of a biological agent to kill or make ill a single individual or small group of individuals, motivated by revenge or the desire for monetary gain by extortion, rather than by political, ideological, religious or other beliefs. The likelihood of a successful bioterrorist attack is not very large, given the technical difficulties and constraints. However, even if the number of casualties is likely to be limited, the impact of a bioterrorist attack can still be high. Measures aimed at enhancing diagnostic and therapeutic capabilities and capacities alongside training and education will improve the ability of society to combat 'regular' infectious diseases outbreaks, as well as mitigating the effects of bioterrorist attacks. © 2014 The Authors Clinical Microbiology and Infection © 2014 European Society of Clinical Microbiology and Infectious Diseases.

  12. Capture of irregular satellites at Jupiter

    International Nuclear Information System (INIS)

    Nesvorný, David; Vokrouhlický, David; Deienno, Rogerio

    2014-01-01

    The irregular satellites of outer planets are thought to have been captured from heliocentric orbits. The exact nature of the capture process, however, remains uncertain. We examine the possibility that irregular satellites were captured from the planetesimal disk during the early solar system instability when encounters between the outer planets occurred. Nesvorný et al. already showed that the irregular satellites of Saturn, Uranus, and Neptune were plausibly captured during planetary encounters. Here we find that the current instability models present favorable conditions for capture of irregular satellites at Jupiter as well, mainly because Jupiter undergoes a phase of close encounters with an ice giant. We show that the orbital distribution of bodies captured during planetary encounters provides a good match to the observed distribution of irregular satellites at Jupiter. The capture efficiency for each particle in the original transplanetary disk is found to be (1.3-3.6) × 10 –8 . This is roughly enough to explain the observed population of jovian irregular moons. We also confirm Nesvorný et al.'s results for the irregular satellites of Saturn, Uranus, and Neptune.

  13. Warfare and the Teaching of History.

    Science.gov (United States)

    Salevouris, Michael J.

    1989-01-01

    Maintains that history teachers must challenge simplistic romantic notions about war. Proposes two approaches to teaching about war: the use of personal war narratives; and examining the relationship between warfare and society. Discusses literature related to these approaches. Contends that only through realistic assessments of war can peace be…

  14. The technical Dimensions of Nuclear Warfare

    International Nuclear Information System (INIS)

    Broda, E.

    1977-01-01

    This text, written by Engelbert Broda in 1977 is about the dimensions of nuclear warfare. Broda describes the devastating effects of the nuclear bombs dropped in 1945 in Hiroshima and Nagasaki and compares these effects with the explosive power of Hydrogen weapons. He also expresses his concerns about another nuclear ware and analyses possible worsening situations like change in the military doctrine. (nowak)

  15. Book Review COMPOSITE WARFARE: THE CONDUCT OF ...

    African Journals Online (AJOL)

    COMPOSITE WARFARE: THE CONDUCT OF. SUCCESSFUL GROUND FORCE. OPERATIONS IN AFRICA. Eeben Barlow. Abel Esterhuyse, PhD. Stellenbosch University. Pinetown: 30 Degrees South Publishers. 2015, 576 pages. ISBN 9781928211761. Africa is still one of the most conflict-ridden places on earth – from ...

  16. MOSES, development of an Underwater Warfare Testbed

    NARCIS (Netherlands)

    Lentze, S.G.

    2001-01-01

    The TNO underwater warfare (UWW) research programme results in a large number of models used in operational research projects. To enhance the accessibility and re-use of these models for new projects, TNO-FEL has developed the modelling environment ‘MOSES - Maritime Operations Simulation and

  17. Biomonitoring of exposure to chemical warfare agents

    NARCIS (Netherlands)

    Noort, D.; Schans, M.J. van der; Benschop, H.P.

    2006-01-01

    An overview is presented of the major methods that are presently available for biomonitoring of exposure to chemical warfare agents, i.e., nerve agents and sulfur mustard. These methods can be applied for a variety of purposes such as diagnosis and dosimetry of exposure of casualties, verification

  18. New Developments in Chinese Strategic Psychological Warfare

    Science.gov (United States)

    2005-01-01

    Taoism , which coupled hardness with softness in warfare, was not the only influence on the theory of psychological operations in ancient China. Other...portraying Islamic martyrs who appear to speak to soldiers from the clouds.38 In contemporary wars, such as the Gulf War, the first targets attacked have

  19. Redefining the Indirect Approach, Defining Special Operations Forces (SOF Power, and the Global Networking of SOF

    Directory of Open Access Journals (Sweden)

    Scott Morrison

    2014-07-01

    Full Text Available The current Defense Strategy assigns Special Operations Forces (SOF to play a central role in countering terrorism, weapons of mass destruction, and irregular warfare. However, there has been little published that defines the role of Special Operations alongside air, land, and sea domains. The U.S. Special Operations Community struggles to define its own theoretical concepts such as direct approach and indirect approach. The U.S. SOF circles typically define direct approach with direct action and the indirect approach with foreign internal defense or security force assistance. Military theorist Liddell Hart viewed the indirect approach as a method to orient upon, target, and upset an adversary’s equilibrium in order to plan for and direct decisive blows. Today, the SOF indirect approach is arguable more applicable due to the prevalence of non-state threats and internal conflicts. Following Hart’s definition, precision raids are among the integral components of a broader application of the indirect approach. The approach also networks U.S. government power as a force when used in concert with allies and local partners. Global networking along with balanced precision raids will exponentially increase the utility of SOF power and position it to appropriately complement all domains to tackle 21st century challenges.

  20. Naval Special Warfare Injury Prevention and Human Performance Initiative

    Science.gov (United States)

    2012-06-30

    or tactical training when the injury occurred. In 13.6% of the injuries, Operators were engaged in recreational activity/ sports when the injury...Collegiate Athletic Association (NCAA) and World Anti- Doping Agency (WADA) supplement list. Based on self-reported dietary intake, the current data indicate...knee tendonitis/ITBS (11%), and biceps and supraspinatus tendonopathy (11%) • Command PT and recreational/ sports activities accounted for 70% of

  1. Depth vs. Breadth: Talent Management for Special Warfare

    Science.gov (United States)

    2016-12-01

    a valuable and important tool when it comes to managing officer talent. In the corporate world, business skill has been strongly linked to leader ...Taking Charge, Harvard Business Professor John Gabarro discusses his research into the process behind successful (and failed) leader rotation. Gabarro’s...spend five years in a leadership role, agrees with Google’s experience. He believes that strategic leaders , like the SOCOM Commander, benefit from

  2. Influence Operations in Insurgencies: Identifying Framing Strategies for Special Warfare

    Science.gov (United States)

    2014-12-01

    1979; Tilly 1978), civil war termination (Walter 1997; Licklider 1993), the political and social consequences of civil war ( Rich and Stubbs 1997), the...from two challenges in the literature. First, scholarship on religious terrorism tends to focus on one particular motivation— apocalyptic, millennial ...factors that motivate some members of ethnic minorities to become radicalized, to form activist organizations, and to move from conventional means

  3. Naval Special Warfare Command's Implementation of the CFO Act

    National Research Council Canada - National Science Library

    Sabel, Martin

    2001-01-01

    ... out." Differences in definitions and classifications of finance categories, human error, and lack of training, and faulty accounting systems can result in inaccurate data and inability to properly utilize...

  4. A Predictive Model of Surface Warfare Officer Retention: Factors Affecting Turnover

    National Research Council Canada - National Science Library

    Gjurich, Gregory

    1999-01-01

    Junior Surface Warfare Officer retention is in a crisis. The Surface Warfare Officer community anticipates an inability to fill Department Head billets due to the number of junior Surface Warfare Officers leaving military service...

  5. Locating irregularly shaped clusters of infection intensity

    Directory of Open Access Journals (Sweden)

    Niko Yiannakoulias

    2010-05-01

    Full Text Available Patterns of disease may take on irregular geographic shapes, especially when features of the physical environment influence risk. Identifying these patterns can be important for planning, and also identifying new environmental or social factors associated with high or low risk of illness. Until recently, cluster detection methods were limited in their ability to detect irregular spatial patterns, and limited to finding clusters that were roughly circular in shape. This approach has less power to detect irregularly-shaped, yet important spatial anomalies, particularly at high spatial resolutions. We employ a new method of finding irregularly-shaped spatial clusters at micro-geographical scales using both simulated and real data on Schistosoma mansoni and hookworm infection intensities. This method, which we refer to as the “greedy growth scan”, is a modification of the spatial scan method for cluster detection. Real data are based on samples of hookworm and S. mansoni from Kitengei, Makueni district, Kenya. Our analysis of simulated data shows how methods able to find irregular shapes are more likely to identify clusters along rivers than methods constrained to fixed geometries. Our analysis of infection intensity identifies two small areas within the study region in which infection intensity is elevated, possibly due to local features of the physical or social environment. Collectively, our results show that the “greedy growth scan” is a suitable method for exploratory geographical analysis of infection intensity data when irregular shapes are suspected, especially at micro-geographical scales.

  6. Information operation/information warfare modeling and simulation

    OpenAIRE

    Buettner, Raymond

    2000-01-01

    Information Operations have always been a part of warfare. However, this aspect of warfare is having ever-greater importance as forces rely more and more on information as an enabler. Modern information systems make possible very rapid creation, distribution, and utilization of information. These same systems have vulnerabilities that can be exploited by enemy forces. Information force-on-force is important and complex. New tools and procedures are needed for this warfare arena. As these t...

  7. U.S. Special Forces: Culture Warriors

    Science.gov (United States)

    2014-12-01

    definitions include:  “ culture is that complex whole which includes knowledge, beliefs, art, law, morals , custom, and any other capabilities and habits...perceptions towards others, such as ethnocentrism, cultural relativism , stereotypes, biases and worldview. Readings: ARSOF 2022, Special Warfare, Vol. 26...FORCES: CULTURE WARRIORS by Joshua L. Hill December 2014 Thesis Advisor: Heather S. Gregg Second Reader: Robert Burks THIS PAGE

  8. Military Engineers and Chemical Warfare Troops (Inzhenernye Voiska Khimicheskie Voiska),

    Science.gov (United States)

    MILITARY FORCES(FOREIGN), *MILITARY ORGANIZATIONS, MILITARY ENGINEERING , INFANTRY, AMPHIBIOUS OPERATIONS, MINELAYING, ARMORED VEHICLES, NUCLEAR...RADIATION, DOSIMETERS, CHEMICAL WARFARE, PROTECTIVE CLOTHING, DECONTAMINATION, HEALTH PHYSICS.

  9. Are Current Psychological Operations Procedures Adequate in Information Warfare?

    National Research Council Canada - National Science Library

    Duff, Murray

    1997-01-01

    .... While some aspects of information warfare are conducted domestically, many are executed on foreign soil and involve extensive interaction with other governments, their population, non-governmental...

  10. Detecting chaos in irregularly sampled time series.

    Science.gov (United States)

    Kulp, C W

    2013-09-01

    Recently, Wiebe and Virgin [Chaos 22, 013136 (2012)] developed an algorithm which detects chaos by analyzing a time series' power spectrum which is computed using the Discrete Fourier Transform (DFT). Their algorithm, like other time series characterization algorithms, requires that the time series be regularly sampled. Real-world data, however, are often irregularly sampled, thus, making the detection of chaotic behavior difficult or impossible with those methods. In this paper, a characterization algorithm is presented, which effectively detects chaos in irregularly sampled time series. The work presented here is a modification of Wiebe and Virgin's algorithm and uses the Lomb-Scargle Periodogram (LSP) to compute a series' power spectrum instead of the DFT. The DFT is not appropriate for irregularly sampled time series. However, the LSP is capable of computing the frequency content of irregularly sampled data. Furthermore, a new method of analyzing the power spectrum is developed, which can be useful for differentiating between chaotic and non-chaotic behavior. The new characterization algorithm is successfully applied to irregularly sampled data generated by a model as well as data consisting of observations of variable stars.

  11. Computational models of intergroup competition and warfare.

    Energy Technology Data Exchange (ETDEWEB)

    Letendre, Kenneth (University of New Mexico); Abbott, Robert G.

    2011-11-01

    This document reports on the research of Kenneth Letendre, the recipient of a Sandia Graduate Research Fellowship at the University of New Mexico. Warfare is an extreme form of intergroup competition in which individuals make extreme sacrifices for the benefit of their nation or other group to which they belong. Among animals, limited, non-lethal competition is the norm. It is not fully understood what factors lead to warfare. We studied the global variation in the frequency of civil conflict among countries of the world, and its positive association with variation in the intensity of infectious disease. We demonstrated that the burden of human infectious disease importantly predicts the frequency of civil conflict and tested a causal model for this association based on the parasite-stress theory of sociality. We also investigated the organization of social foraging by colonies of harvester ants in the genus Pogonomyrmex, using both field studies and computer models.

  12. Handbook of toxicology of chemical warfare agents

    CERN Document Server

    2010-01-01

    This groundbreaking book covers every aspect of deadly toxic chemicals used as weapons of mass destruction and employed in conflicts, warfare and terrorism. Including findings from experimental as well as clinical studies, this one-of-a-kind handbook is prepared in a very user- friendly format that can easily be followed by students, teachers and researchers, as well as lay people. Stand-alone chapters on individual chemicals and major topics allow the reader to easily access required information without searching through the entire book. This is the first book that offers in-depth coverage of individual toxicants, target organ toxicity, major incidents, toxic effects in humans, animals and wildlife, biosensors, biomarkers, on-site and laboratory analytical methods, decontamination and detoxification procedures, prophylactic, therapeutic and countermeasures, and the role of homeland security. Presents a comprehensive look at all aspects of chemical warfare toxicology in one reference work. This saves research...

  13. Chemical warfare agents. Classes and targets.

    Science.gov (United States)

    Schwenk, Michael

    2018-09-01

    Synthetic toxic chemicals (toxicants) and biological poisons (toxins) have been developed as chemical warfare agents in the last century. At the time of their initial consideration as chemical weapon, only restricted knowledge existed about their mechanisms of action. There exist two different types of acute toxic action: nonspecific cytotoxic mechanisms with multiple chemo-biological interactions versus specific mechanisms that tend to have just a single or a few target biomolecules. TRPV1- and TRPA-receptors are often involved as chemosensors that induce neurogenic inflammation. The present work briefly surveys classes and toxicologically relevant features of chemical warfare agents and describes mechanisms of toxic action. Copyright © 2017 Elsevier B.V. All rights reserved.

  14. Mapping the Spread of Mounted Warfare

    Directory of Open Access Journals (Sweden)

    Peter Turchin

    2016-12-01

    Full Text Available Military technology is one of the most important factors affecting the evolution of complex societies. In particular, mounted warfare, the use of horse-riders in military operations, revolutionized war as it spread to different parts of Eurasia and Africa during the Ancient and Medieval eras, and to the Americas during the Early Modern period. Here we use a variety of sources to map this spread.

  15. UML modelling of network warfare examples

    CSIR Research Space (South Africa)

    Veerasamy, N

    2011-08-01

    Full Text Available ] Affects both civilian and military domains [8] [9] Related to the concepts of infowar, information operations, hacking, hackivism, cyberterrorism and cybotage depending on motivations and techniques [10] Encompasses both technological solutions...]. In addition, Williers as well as Qingbao and Anwar discuss more offensive aspects of information security and Network Warfare like Hacking, Vulnerability Injection, Network Attacks, Denial of Capability, Interception and Blockage [6] [18] [19]. Various...

  16. Maritime Trade Warfare Against a Modern Power

    Science.gov (United States)

    2013-05-20

    Malaysian and Singaporean support. Operational Environment The previous sections have assessed that an oil embargo would be effective at influencing...will be addressed. The first approach is to stop the trade at its source. This approach forms the foundation of many contemporary sanctions. Under...antisubmarine warfare capable ships, could be sufficient to defend against forces attempting to break a blockade, and a carrier battle group in the Indian Ocean

  17. Navy Operational Planner - Undersea Warfare Module

    Science.gov (United States)

    2016-09-01

    concepts are considered in NOP–USW that are not in previous research: time phasing of missions, mutually exclusive missions, and asset availability...operational planning efforts. NOP–USW suggests the correct allocation of assets across a wide theater of operation to accomplish missions in the...Master’s thesis 4. TITLE AND SUBTITLE NAVY OPERATIONAL PLANNER – UNDERSEA WARFARE MODULE 5. FUNDING NUMBERS 6. AUTHOR(S) Guy A. Molina 7

  18. Irregular menstruation according to occupational status.

    Science.gov (United States)

    Kwak, Yeunhee; Kim, Yoonjung

    2017-07-06

    This cross-sectional study explored associations of irregular menstruation with occupational characteristics, using secondary analyses of data from 4,731 women aged 19-54 years, collected from a nationally representative sample, the Korea National Health and Nutrition Examination Survey-V during 2010-2012. The associations between irregular menstruation and occupation were explored using multiple logistic regression. Compared to non-manual workers, service/sales workers had a greater odds of irregular menstruation (adjusted odds ratio [aOR]: 1.44; 95percent confidence interval [CI]: 1.04-1.99) as did manual workers and unemployed women (aOR: 1.56; 95percent CI: 1.10-2.22, aOR: 1.46; 95percent CI: 1.14-1.89, respectively). Compared to regular workers, temporary workers and unemployed women had aORs of 1.52 (95percent CI: 1.08-2.13) and 1.33 (95percent CI: 1.05-1.69), respectively. Also, when compared to full-time workers, part-time workers and unemployed women had greater odds of irregular menstruation (aOR: 1.41; 95percent CI: 1.00-2.00 and aOR: 1.29; 95percent CI: 1.03-1.63, respectively). Furthermore, compared to daytime workers, shift workers and unemployed women had greater odds irregular menstruation (aOR: 1.39; 95percent CI: 1.03-1.88 and aOR: 1.28; 95percent CI: 1.04-1.59, respectively). Women with these occupational characteristics should be screened for early diagnosis and intervention for irregular menstruation.

  19. Advances in electron dosimetry of irregular fields

    International Nuclear Information System (INIS)

    Mendez V, J.

    1998-01-01

    In this work it is presented an advance in Electron dosimetry of irregular fields for beams emitted by linear accelerators. At present diverse methods exist which are coming to apply in the Radiotherapy centers. In this work it is proposed a method for irregular fields dosimetry. It will be allow to calculate the dose rate absorbed required for evaluating the time for the treatment of cancer patients. Utilizing the results obtained by the dosimetric system, it has been possible to prove the validity of the method describe for 12 MeV energy and for square field 7.5 x 7.5 cm 2 with percentile error less than 1 % . (Author)

  20. New Model for Ionospheric Irregularities at Mars

    Science.gov (United States)

    Keskinen, M. J.

    2018-03-01

    A new model for ionospheric irregularities at Mars is presented. It is shown that wind-driven currents in the dynamo region of the Martian ionosphere can be unstable to the electromagnetic gradient drift instability. This plasma instability can generate ionospheric density and magnetic field irregularities with scale sizes of approximately 15-20 km down to a few kilometers. We show that the instability-driven magnetic field fluctuation amplitudes relative to background are correlated with the ionospheric density fluctuation amplitudes relative to background. Our results can explain recent observations made by the Mars Atmosphere and Volatile EvolutioN spacecraft in the Martian ionosphere dynamo region.

  1. High energy model for irregular absorbing particles

    International Nuclear Information System (INIS)

    Chiappetta, Pierre.

    1979-05-01

    In the framework of a high energy formulation of relativistic quantum scattering a model is presented which describes the scattering functions and polarization of irregular absorbing particles, whose dimensions are greater than the incident wavelength. More precisely in the forward direction an amplitude parametrization of eikonal type is defined which generalizes the usual diffraction theory, and in the backward direction a reflective model is used including a shadow function. The model predictions are in good agreement with the scattering measurements off irregular compact and fluffy particles performed by Zerull, Giese and Weiss (1977)

  2. The Cycle of Warfare - Analysis of an Analytical Model

    DEFF Research Database (Denmark)

    Jensen, Mikkel Storm

    2016-01-01

    by its economic, political and ideological characteristics. With the single assumption of economic rationality in human behaviour, Cycle of Warfare is not only coherent, it is applicable to all entities engaged in competition anywhere in the world at any point in history. The Cycle of Warfare can be used...

  3. Surface Warfare Officers Initial Training For Future Success

    Science.gov (United States)

    2018-03-01

    9 A school is initial rating specific technical training that is given to sailors. 14 Figure 4. Less...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA MBA PROFESSIONAL REPORT SURFACE WARFARE OFFICERS— INITIAL TRAINING FOR FUTURE SUCCESS March 2018...professional report 4. TITLE AND SUBTITLE SURFACE WARFARE OFFICERS—INITIAL TRAINING FOR FUTURE SUCCESS 5. FUNDING NUMBERS 6. AUTHOR(S) Arron J

  4. Anti-Air Warfare Research for Naval Forces

    NARCIS (Netherlands)

    Bloemen, A.A.F.; Witberg, R.

    2000-01-01

    AAW is a warfare area with wide-spread spectrum. Command and Control Systems, sensors, effectors and electronic warfare are integrated to a system, they influence each other and must eventually be effective in coordinated action. This complexity asks for Operations Research methods to measure

  5. Chemical profiling of chemical warfare agents for forensic purposes

    NARCIS (Netherlands)

    Noort, D.; Reuver, L.P.J. de; Fidder, A.; Tromp, M.; Verschraagen, M.

    2010-01-01

    A program has been initiated towards the chemical profiling of chemical warfare agents, in order to support forensic investigations towards synthesis routes, production sites and suspect chemical suppliers. Within the first stage of the project various chemical warfare agents (VX, sulfur mustard,

  6. U.S. Special Forces: culture warriors

    OpenAIRE

    Hill, Joshua L.

    2014-01-01

    Approved for public release; distribution is unlimited U.S. Army Special Forces (SF) are consistently called upon to work by, with, and through indigenous forces to conduct special warfare. Current SF doctrine reflects an increasing desire for SF operators to be culturally proficient in order to work closely with locals, advise foreign militaries, and build relationships with host-nation counterparts. Despite the doctrinal emphasis on cultural proficiency, SF doctrine offers little concret...

  7. Synchronizing data from irregularly sampled sensors

    Science.gov (United States)

    Uluyol, Onder

    2017-07-11

    A system and method include receiving a set of sampled measurements for each of multiple sensors, wherein the sampled measurements are at irregular intervals or different rates, re-sampling the sampled measurements of each of the multiple sensors at a higher rate than one of the sensor's set of sampled measurements, and synchronizing the sampled measurements of each of the multiple sensors.

  8. Natural convection inside an irregular porous cavity

    International Nuclear Information System (INIS)

    Beltran, Jorge I. LLagostera; Trevisan, Osvair Vidal

    1990-01-01

    Natural convection flow induced by heating from below in a irregular porous cavity is investigated numerically. The influence of the modified Rayleigh number and geometric ratios on heat transfer and fluid flow is studied. Global and local Nusselt for Rayleigh numbers covering the range 0 - 1600 and for several geometric ratios. The fluid flow and the temperature field are illustrated by contour maps. (author)

  9. Hybrid Warfare Studies and Russia’s Example in Crimea

    Directory of Open Access Journals (Sweden)

    Mehmet Seyfettin EROL

    2015-12-01

    Full Text Available Although Hybrid Warfare is an old concept, theoretical studies in the western countries mainly began in the post-Col War era, focusing on asymmetrical threats against conventional superiority of western countries such as USA or Israel. September 11th attacks and 2006 Israel-Lebanon war played important roles for the evolution of hybrid warfare theories. However, there has not any consensus among scholars on a exact or unique definition of hybrid warfare. Hybrid warfare became one of the main security issues for the West and especially for NATO after the Russia-Ukraine crisis. Russian military strategies, called “hybrid warfare” by the western countries, resulted in the successful annexation of Crimea and, caused a serious security problem for the West resulting important structural and functional changes for the military system of NATO. Russian activities, which have been based on surprise, ambiguity and deniability, presented a unique example for hybrid warfare studies.

  10. Nonadiabatic two-electron transfer mediated by an irregular bridge

    International Nuclear Information System (INIS)

    Petrov, E.G.; Shevchenko, Ye.V.; May, V.

    2004-01-01

    Nonadiabatic two-electron transfer (TET) mediated by a linear molecular bridge is studied theoretically. Special attention is put on the case of a irregular distribution of bridge site energies as well as on the inter-site Coulomb interaction. Based on the unified description of electron transfer reactions [J. Chem. Phys. 115 (2001) 7107] a closed set of kinetic equations describing the TET process is derived. A reduction of this set to a single exponential donor-acceptor (D-A) TET is performed together with a derivation of an overall D-A TET rate. The latter contains a contribution of the stepwise as well as of the concerted route of D-A TET. The stepwise contribution is determined by two single-electron steps each of them associated with a sequential and a superexchange pathway. A two-electron unistep superexchange transition between the D and A forms the concerted contribution to the overall rate. Both contributions are analyzed in their dependency on the bridge length. The irregular distribution of the bridge site energies as well as the influence of the Coulomb interaction facilitates the D-A TET via a modification of the stepwise and the concerted part of the overall rate. At low temperatures and for short bridges with a single or two units the concerted contribution exceeds the stepwise contribution. If the bridge contains more than two units, the stepwise contribution dominates the overall rate

  11. Fitting Irregular Shape Figures into Irregular Shape Areas for the Nesting Problem in the Leather Industry

    Directory of Open Access Journals (Sweden)

    Guevara-Palma Luis

    2015-01-01

    Full Text Available The nesting problem of irregular shapes within irregular areas has been studied from several approaches due to their application in different industries. The particular case of cutting leather involves several restrictions that add complexity to this problem, it is necessary to generate products that comply with the quality required by customers This paper presents a methodology for the accommodation of irregular shapes in an irregular area (leather considering the constraints set by the footwear industry, and the results of this methodology when applied by a computer system. The scope of the system is to develop a working prototype that operates under the guidelines of a commercial production line of a sponsor company. Preliminary results got a reduction of 70% of processing time and improvement of 5% to 7% of the area usage when compared with manual accommodation.

  12. OFFICER AND COMMANDER IN ASYMMETRIC WARFARE OPERATIONS

    Directory of Open Access Journals (Sweden)

    Giuseppe CAFORIO

    2013-01-01

    Full Text Available Starting from the data of a field research conducted among soldiers with asymmetric warfare experiences from nine different countries, the author seeks to identify and shed light on the various problems that officers with command responsibilities had to face during their missions. A picture emerges of feelings and experiences relating to their first impression upon arriving in the theatre, relations with local armed forces, relations with the local population and local authorities, relations with NGOs, relations with other armies, the impact of the rules of engagement (ROEs, training and education, and operational experiences. The paper ends with a discussion of the lessons learned.

  13. Axial Vircator for Electronic Warfare Applications

    Directory of Open Access Journals (Sweden)

    L. Drazan

    2009-12-01

    Full Text Available This paper deals with a high power microwave generator with virtual cathode – vircator in axial release for electronic warfare applications. The classification of directed energy weapons microwave (DEWM is introduced together with basic block diagrams of a particular class of DEWM. In the paper, methods for designing vircator pulsed power supply, axial vircator structure, measurement methods and experimental results are presented. The vircator in electromagnetic ammunition is powered by magneto-cumulative generator and in weapons for defense of objects (WDO, it is powered by Marx generator. The possible applications of a vircator in the DEWM area are discussed.

  14. Electronic warfare receivers and receiving systems

    CERN Document Server

    Poisel, Richard A

    2014-01-01

    Receivers systems are considered the core of electronic warfare (EW) intercept systems. Without them, the fundamental purpose of such systems is null and void. This book considers the major elements that make up receiver systems and the receivers that go in them.This resource provides system design engineers with techniques for design and development of EW receivers for modern modulations (spread spectrum) in addition to receivers for older, common modulation formats. Each major module in these receivers is considered in detail. Design information is included as well as performance tradeoffs o

  15. Kilometer-Spaced GNSS Array for Ionospheric Irregularity Monitoring

    Science.gov (United States)

    Su, Yang

    This dissertation presents automated, systematic data collection, processing, and analysis methods for studying the spatial-temporal properties of Global Navigation Satellite Systems (GNSS) scintillations produced by ionospheric irregularities at high latitudes using a closely spaced multi-receiver array deployed in the northern auroral zone. The main contributions include 1) automated scintillation monitoring, 2) estimation of drift and anisotropy of the irregularities, 3) error analysis of the drift estimates, and 4) multi-instrument study of the ionosphere. A radio wave propagating through the ionosphere, consisting of ionized plasma, may suffer from rapid signal amplitude and/or phase fluctuations known as scintillation. Caused by non-uniform structures in the ionosphere, intense scintillation can lead to GNSS navigation and high-frequency (HF) communication failures. With specialized GNSS receivers, scintillation can be studied to better understand the structure and dynamics of the ionospheric irregularities, which can be parameterized by altitude, drift motion, anisotropy of the shape, horizontal spatial extent and their time evolution. To study the structuring and motion of ionospheric irregularities at the sub-kilometer scale sizes that produce L-band scintillations, a closely-spaced GNSS array has been established in the auroral zone at Poker Flat Research Range, Alaska to investigate high latitude scintillation and irregularities. Routinely collecting low-rate scintillation statistics, the array database also provides 100 Hz power and phase data for each channel at L1/L2C frequency. In this work, a survey of seasonal and hourly dependence of L1 scintillation events over the course of a year is discussed. To efficiently and systematically study scintillation events, an automated low-rate scintillation detection routine is established and performed for each day by screening the phase scintillation index. The spaced-receiver technique is applied to cross

  16. Generating Performance Models for Irregular Applications

    Energy Technology Data Exchange (ETDEWEB)

    Friese, Ryan D.; Tallent, Nathan R.; Vishnu, Abhinav; Kerbyson, Darren J.; Hoisie, Adolfy

    2017-05-30

    Many applications have irregular behavior --- non-uniform input data, input-dependent solvers, irregular memory accesses, unbiased branches --- that cannot be captured using today's automated performance modeling techniques. We describe new hierarchical critical path analyses for the \\Palm model generation tool. To create a model's structure, we capture tasks along representative MPI critical paths. We create a histogram of critical tasks with parameterized task arguments and instance counts. To model each task, we identify hot instruction-level sub-paths and model each sub-path based on data flow, instruction scheduling, and data locality. We describe application models that generate accurate predictions for strong scaling when varying CPU speed, cache speed, memory speed, and architecture. We present results for the Sweep3D neutron transport benchmark; Page Rank on multiple graphs; Support Vector Machine with pruning; and PFLOTRAN's reactive flow/transport solver with domain-induced load imbalance.

  17. Long wavelength irregularities in the equatorial electrojet

    OpenAIRE

    Kudeki, E.; Farley, D. T.; Fejer, Bela G.

    1982-01-01

    We have used the radar interferometer technique at Jicamarca to study in detail irregularities with wavelengths of a few kilometers generated in the unstable equatorial electrojet plasma during strong type 1 conditions. In-situ rocket observations of the same instability process are discussed in a companion paper. These large scale primary waves travel essentially horizontally and have large amplitudes. The vertical electron drift velocities driven by the horizontal wave electric fields reach...

  18. Star formation histories of irregular galaxies

    International Nuclear Information System (INIS)

    Gallagher, J.S. III; Hunter, D.A.; Tutukov, A.V.

    1984-01-01

    We explore the star formation histories of a selection of irregular and spiral galaxies by using three parameters that sample the star formation rate (SFR) at different epochs: (1) the mass of a galaxy in the form of stars measures the SFR integrated over a galaxy's lifetime; (2) the blue luminosity is dominated primarily by stars formed over the past few billion years; and (3) Lyman continuum photon fluxes derived from Hα luminosities give the current ( 8 yr) SFR

  19. Parallel Computing Strategies for Irregular Algorithms

    Science.gov (United States)

    Biswas, Rupak; Oliker, Leonid; Shan, Hongzhang; Biegel, Bryan (Technical Monitor)

    2002-01-01

    Parallel computing promises several orders of magnitude increase in our ability to solve realistic computationally-intensive problems, but relies on their efficient mapping and execution on large-scale multiprocessor architectures. Unfortunately, many important applications are irregular and dynamic in nature, making their effective parallel implementation a daunting task. Moreover, with the proliferation of parallel architectures and programming paradigms, the typical scientist is faced with a plethora of questions that must be answered in order to obtain an acceptable parallel implementation of the solution algorithm. In this paper, we consider three representative irregular applications: unstructured remeshing, sparse matrix computations, and N-body problems, and parallelize them using various popular programming paradigms on a wide spectrum of computer platforms ranging from state-of-the-art supercomputers to PC clusters. We present the underlying problems, the solution algorithms, and the parallel implementation strategies. Smart load-balancing, partitioning, and ordering techniques are used to enhance parallel performance. Overall results demonstrate the complexity of efficiently parallelizing irregular algorithms.

  20. Studies on residue-free decontaminants for chemical warfare agents.

    Science.gov (United States)

    Wagner, George W

    2015-03-17

    Residue-free decontaminants based on hydrogen peroxide, which decomposes to water and oxygen in the environment, are examined as decontaminants for chemical warfare agents (CWA). For the apparent special case of CWA on concrete, H2O2 alone, without any additives, effectively decontaminates S-2-(diisopropylamino)ethyl O-ethyl methylphosphonothioate (VX), pinacolyl methylphosphorofluoridate (GD), and bis(2-choroethyl) sulfide (HD) in a process thought to involve H2O2 activation by surface-bound carbonates/bicarbonates (known H2O2 activators for CWA decontamination). A plethora of products are formed during the H2O2 decontamination of HD on concrete, and these are characterized by comparison to synthesized authentic compounds. As a potential residue-free decontaminant for surfaces other than concrete (or those lacking adsorbed carbonate/bicarbonate) H2O2 activation for CWA decontamination is feasible using residue-free NH3 and CO2 as demonstrated by reaction studies for VX, GD, and HD in homogeneous solution. Although H2O2/NH3/CO2 ("HPAC") decontaminants are active for CWA decontamination in solution, they require testing on actual surfaces of interest to assess their true efficacy for surface decontamination.

  1. History of chemical and biological warfare agents

    International Nuclear Information System (INIS)

    Szinicz, L.

    2005-01-01

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents

  2. History of chemical and biological warfare agents.

    Science.gov (United States)

    Szinicz, L

    2005-10-30

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents.

  3. [Decontamination of chemical and biological warfare agents].

    Science.gov (United States)

    Seto, Yasuo

    2009-01-01

    Chemical and biological warfare agents (CBWA's) are diverse in nature; volatile acute low-molecular-weight toxic compounds, chemical warfare agents (CWA's, gaseous choking and blood agents, volatile nerve gases and blister agents, nonvolatile vomit agents and lacrymators), biological toxins (nonvolatile low-molecular-weight toxins, proteinous toxins) and microbes (bacteria, viruses, rickettsiae). In the consequence management against chemical and biological terrorism, speedy decontamination of victims, facilities and equipment is required for the minimization of the damage. In the present situation, washing victims and contaminated materials with large volumes of water is the basic way, and additionally hypochlorite salt solution is used for decomposition of CWA's. However, it still remains unsolved how to dispose large volumes of waste water, and the decontamination reagents have serious limitation of high toxicity, despoiling nature against the environments, long finishing time and non-durability in effective decontamination. Namely, the existing decontamination system is not effective, nonspecifically affecting the surrounding non-target materials. Therefore, it is the urgent matter to build up the usable decontamination system surpassing the present technologies. The symposiast presents the on-going joint project of research and development of the novel decontamination system against CBWA's, in the purpose of realizing nontoxic, fast, specific, effective and economical terrorism on-site decontamination. The projects consists of (1) establishment of the decontamination evaluation methods and verification of the existing technologies and adaptation of bacterial organophosphorus hydrolase, (2) development of adsorptive elimination technologies using molecular recognition tools, and (4) development of deactivation technologies using photocatalysis.

  4. State reconstruction and irregular wavefunctions for the hydrogen atom

    Science.gov (United States)

    Krähmer, D. S.; Leonhardt, U.

    1997-07-01

    Inspired by a recently proposed procedure by Leonhardt and Raymer for wavepacket reconstruction, we calculate the irregular wavefunctions for the bound states of the Coulomb potential. We select the irregular solutions which have the simplest semiclassical limit.

  5. Countering Threat Finance as a Critical Subset of Irregular Warfare: An Interpretive Case Study of Northern Nigeria

    Science.gov (United States)

    2009-05-01

    It also includes monitoring the marketplace , craftsmanship, and manufacturing concerns to make sure that the laws of Islam are upheld by these... Yoruba Empire and infringement into the land of the Igbo in the middle and southern regions of modern day Nigeria respectively.88 The bulk of Nigeria’s...involving Muslim and non-Muslim groups; Hausa- Fulani 29 percent, Yoruba 21 percent, and Igbo 18 percent.89 The outcome of the Fulani Jihad was the

  6. TAKING THE LONG VIEW TOWARDS THE LONG WAR. Equipping General Purpose Force Leaders with Soft Power Tools for Irregular Warfare

    Science.gov (United States)

    2009-02-12

    equivalent to usual printing or typescript . Can read either representations of familiar formulaic verbal exchanges or simple language containing only...read simple, authentic written material in a form equivalent to usual printing or typescript on subjects within a familiar context. Able to read with

  7. Harsh Climates, Poor Transportation, And Irregular Warfare: Logistical Difficulties From Napoleon To The Soviet - Afghan War That Affect Operational Campaigns

    Science.gov (United States)

    2014-04-01

    confident about having two operational campaigns in the Iberian Peninsula and Russia where the climate , transportation infrastructure, and threats...campaigns in the Iberian Peninsula and Russia exhibited effects of the harsh climates on logistical effectiveness. The climates in the Iberian Peninsula ...decreasing). The Iberian Peninsula climate consists of vast infertile areas with mountains, hills, and dry regions ill-suited for logistically

  8. On irregularity strength of disjoint union of friendship graphs

    Directory of Open Access Journals (Sweden)

    Ali Ahmad

    2013-11-01

    Full Text Available We investigate the vertex total and edge total modication of the well-known irregularity strength of graphs. We have determined the exact values of the total vertex irregularity strength and the total edge irregularity strength of a disjoint union of friendship graphs.

  9. 16 CFR 501.6 - Cellulose sponges, irregular dimensions.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Cellulose sponges, irregular dimensions. 501... REQUIREMENTS AND PROHIBITIONS UNDER PART 500 § 501.6 Cellulose sponges, irregular dimensions. Variety packages of cellulose sponges of irregular dimensions, are exempted from the requirements of § 500.25 of this...

  10. The Acme of Skill: Nonkinetic Warfare

    Science.gov (United States)

    2008-05-01

    results are mixed. For the im- mense cost that often accompanies war, the returns of war are not guaranteed. On nonkinetic operations, it may appear that...ing, together with other kinetic capabilities such as emphasizing irregular operations, increasing ground troop levels, and recruiting foreign

  11. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  12. FFT Based VLSI Digital One Bit Electronic Warfare Receiver

    National Research Council Canada - National Science Library

    Chien-In, Henry

    1998-01-01

    ... (1 GHz) digital receiver designed for electronic warfare applications. The receiver can process two simultaneous signals and has the potential for fabrication on a single multi-chip module (MCM...

  13. Back to the Basics: An Aviation Solution to Counterinsurgent Warfare

    National Research Council Canada - National Science Library

    Davis, Arthur D

    2005-01-01

    .... By examining past examples of the use of air power in counterinsurgent warfare, this study sheds light on the United States' current failings in both equipment and doctrine as it wages this type of war...

  14. Precision Warfare Enables Interdependent Fires and Maneuver in 2010

    National Research Council Canada - National Science Library

    Smith, John

    1997-01-01

    The U.S. Army is in the midst of a revolution in military affairs (RMA). Significant advancements in informational technologies and precision weapons are providing unprecedented potential for future warfare...

  15. Echoes of Chechnya Warfare Resound in Moscow, Quantico

    National Research Council Canada - National Science Library

    Ackerman, Robert

    2000-01-01

    .... thinking about urban warfare. After suffering stunning public defeats just a few years ago, Russian forces applied painful lessons learned then to drive Chechen forces out of their capital city, Grozny, this year...

  16. zero day exploits and national readiness for cyber-warfare

    African Journals Online (AJOL)

    HOD

    A zero day vulnerability is an unknown exploit that divulges security flaws in software before such a flaw is publicly ... Keywords: exploits, zero day, vulnerability, cyberspace, cyber-warfare. 1. ..... industries and companies across the globe. The.

  17. The Role of Airpower in Urban Warfare. An Airman's Perspective

    National Research Council Canada - National Science Library

    Saffold, Timothy

    1998-01-01

    .... This emphasis on surface force employment stifles innovative thought as to how military forces can achieve operational and strategic effects by employing airpower as the key instrument of force in urban warfare...

  18. Fourth Generation Warfare: The Need for a Comprehensive Approach

    National Research Council Canada - National Science Library

    Benton, LeRoy D

    2008-01-01

    .... A definition of Fourth Generation Warfare is developed, based on Col. Thomas X. Hammes' writings. The definition is further developed to show relevance and applicability to current operations in the Long War on Terrorism...

  19. Locating irregularly shaped clusters of infection intensity

    DEFF Research Database (Denmark)

    Yiannakoulias, Niko; Wilson, Shona; Kariuki, H. Curtis

    2010-01-01

    of infection intensity identifies two small areas within the study region in which infection intensity is elevated, possibly due to local features of the physical or social environment. Collectively, our results show that the "greedy growth scan" is a suitable method for exploratory geographical analysis...... for cluster detection. Real data are based on samples of hookworm and S. mansoni from Kitengei, Makueni district, Kenya. Our analysis of simulated data shows how methods able to find irregular shapes are more likely to identify clusters along rivers than methods constrained to fixed geometries. Our analysis...

  20. Equatorial Ionospheric Irregularities Study from ROCSAT Data

    Science.gov (United States)

    2017-10-20

    UNLIMITED: PB Public Release 13. SUPPLEMENTARY NOTES 14. ABSTRACT Ionospheric irregularity/scintillation occurrences can be caused by external driving ...Academia Sinica, Taipei, Taiwan e-mail: chliu2@gate.sinica.edu.tw phone :886-3-4227151x34757 CoPI: Shin-Yi Su Institution: National Central...University, Chung-Li, Taiwan e-mail: sysu@csrsr.ncu.edu.tw phone :886-3-4227151x57643 CoPI: Lung-Chi Tsai Institution: National Central University, Chung-Li

  1. Artificial periodic irregularities in the auroral ionosphere

    Directory of Open Access Journals (Sweden)

    M. T. Rietveld

    1996-12-01

    Full Text Available Artificial periodic irregularities (API are produced in the ionospheric plasma by a powerful standing electromagnetic wave reflected off the F region. The resulting electron-density irregularities can scatter other high-frequency waves if the Bragg scattering condition is met. Such measurements have been performed at mid-latitudes for two decades and have been developed into a useful ionospheric diagnostic technique. We report here the first measurements from a high-latitude station, using the EISCAT heating facility near Tromsø, Norway. Both F-region and lower-altitude ionospheric echoes have been obtained, but the bulk of the data has been in the E and D regions with echoes extending down to 52-km altitude. Examples of API are shown, mainly from the D region, together with simultaneous VHF incoherent-scatter-radar (ISR data. Vertical velocities derived from the rate of phase change during the irregularity decay are shown and compared with velocities derived from the ISR. Some of the API-derived velocities in the 75–115-km height range appear consistent with vertical neutral winds as shown by their magnitudes and by evidence of gravity waves, while other data in the 50–70-km range show an unrealistically large bias. For a comparison with ISR data it has proved difficult to get good quality data sets overlapping in height and time. The initial comparisons show some agreement, but discrepancies of several metres per second do not yet allow us to conclude that the two techniques are measuring the same quantity. The irregularity decay time-constants between about 53 and 70 km are compared with the results of an advanced ion-chemistry model, and height profiles of recorded signal power are compared with model estimates in the same altitude range. The calculated amplitude shows good agreement with the data in that the maximum occurs at about the same height as that of the measured amplitude. The calculated time-constant agrees very well with the

  2. Towards a framework for a network warfare capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available . These include the legal issues, ethical dilemmas, technical solutions, financial impact and skill/manpower investment. Logical constraints/implications have been grouped together in the discussion that follows. 5.1.1 Legal Ethical Issues As network warfare... but the underlying causes of crime also needs to be understood. Ethics and morals play a significant role in determining the personality traits of an individual. Users will need to balance ethical dilemmas before engaging in offensive network warfare. Computers...

  3. Strategy in the Robotic Age: A Case for Autonomous Warfare

    Science.gov (United States)

    2014-09-01

    enabling technology that augments human performance, such as exoskeleton suits, and other complementary fields that make robotics function...philosophy of maneuver warfare with new technologies from the Robotic Age, such as unmanned systems and exoskeleton suits, to present a new warfighting...and Brimley, “20YY,” 12. 49 the exoskeleton suit, but rather that the full benefit of autonomous warfare will be achieved by leveraging mass and

  4. The Impacts of Modern Warfare on Freshwater Ecosystems

    Science.gov (United States)

    Francis, Robert A.

    2011-11-01

    There is increasing recognition and concern regarding the impacts of modern industrial warfare on the environment. Freshwater ecosystems are perhaps the most vulnerable to warfare-related impacts, which is of concern given that they provide so many essential environmental resources and services to society. Despite this, there has been little work to establish and quantify the types of impacts (both negative and positive) that warfare may have on such systems. This paper firstly highlights why rivers and lakes may be susceptible to warfare-related impacts, before synthesizing the available literature to explore the following main themes: intensification of wartime resource acquisition, use of water as an offensive or defensive weapon, direct and indirect effects of explosive ordnance, increased pollution, introduction of invasive alien species, and positive ecological impacts. This is then followed by a discussion of the implications of such impacts in relation to future warfare, including a consideration of the efficacy of existing legal instruments to protect the environment during conflict, and the trend for war to become more localized and `informal', and therefore less regulated. Finally, the paper identifies key research foci for understanding and mitigating the effects of warfare on freshwater ecosystems.

  5. Information Warfare, Threats and Information Security

    Directory of Open Access Journals (Sweden)

    Dmitriy Nikolaevich Bespalov

    2014-01-01

    Full Text Available The article presents the opposite, but dependent on each other's reality - Revolutionary War information,information security goals and objectives of their study within the scheme "challenge-response", methodological and analytical support, the role of elites and the information society in promoting information security. One of the features of contemporaneityis the global spread of ICT, combined with poor governance and other difficulties in the construction of innovation infrastructures that are based on them in some countries. This leads to the reproduction of threats, primarily related to the ability to use ICT for purposes that are inconsistent with the objectives of maintaining international peace and security, compliance with the principles of non-use of force, non-interference in the internal affairs of states, etc. In this regard, include such terms as "a threat of information warfare", "information terrorism" and so forth. Information warfare, which stay in the policy declared the struggle for existence, and relationships are defined in terms of "friend-enemy", "ours-foreign". Superiority over the opponent or "capture of its territory" is the aim of political activity. And information security, serving activities similar process of political control, including a set of components, is a technology until their humanitarian. From the context and the decision itself is the ratio of the achieved results of information and political influence to the target - a positive image of Russia. Bringing its policy in line with the demands of a healthy public opinion provides conductivity of theauthorities initiatives in the country and increases the legitimacy of the Russian Federation actions in the world.

  6. Direct solution of the biharmonic equation on rectangular regions and the Poisson equation on irregular regions

    International Nuclear Information System (INIS)

    Buzbee, B.L.; Dorr, F.W.

    1974-01-01

    The discrete biharmonic equation on a rectangular region and the discrete Poisson equation on an irregular region can be treated as modifications to matrix problems with very special structure. It is shown how to use the direct method of matrix decomposition to formulate an effective numerical algorithm for these problems. For typical applications the operation count is O(N 3 ) for an N x N grid. Numerical comparisons with other techniques are included. (U.S.)

  7. Creating Paths of Change: Under What Conditions Can Special Operations be the Supported Command

    Science.gov (United States)

    2018-03-01

    will cause an organization’s leadership to selectively decentralize units to deal with the more diverse characteristics of its environment.40 The U.S...infrastructure, which were initially attempted with local leadership . The Taliban’s ability to insert itself into villages and produce a counter narrative...Symbol for Change.”. 100 James A. Russell, “Counter-insurgency American Style : Considering David Patreus and Twenty- First Century Irregular Warfare

  8. Computing proton dose to irregularly moving targets

    International Nuclear Information System (INIS)

    Phillips, Justin; Gueorguiev, Gueorgui; Grassberger, Clemens; Dowdell, Stephen; Paganetti, Harald; Sharp, Gregory C; Shackleford, James A

    2014-01-01

    Purpose: While four-dimensional computed tomography (4DCT) and deformable registration can be used to assess the dose delivered to regularly moving targets, there are few methods available for irregularly moving targets. 4DCT captures an idealized waveform, but human respiration during treatment is characterized by gradual baseline shifts and other deviations from a periodic signal. This paper describes a method for computing the dose delivered to irregularly moving targets based on 1D or 3D waveforms captured at the time of delivery. Methods: The procedure uses CT or 4DCT images for dose calculation, and 1D or 3D respiratory waveforms of the target position at time of delivery. Dose volumes are converted from their Cartesian geometry into a beam-specific radiological depth space, parameterized in 2D by the beam aperture, and longitudinally by the radiological depth. In this new frame of reference, the proton doses are translated according to the motion found in the 1D or 3D trajectory. These translated dose volumes are weighted and summed, then transformed back into Cartesian space, yielding an estimate of the dose that includes the effect of the measured breathing motion. The method was validated using a synthetic lung phantom and a single representative patient CT. Simulated 4DCT was generated for the phantom with 2 cm peak-to-peak motion. Results: A passively-scattered proton treatment plan was generated using 6 mm and 5 mm smearing for the phantom and patient plans, respectively. The method was tested without motion, and with two simulated breathing signals: a 2 cm amplitude sinusoid, and a 2 cm amplitude sinusoid with 3 cm linear drift in the phantom. The tumor positions were equally weighted for the patient calculation. Motion-corrected dose was computed based on the mid-ventilation CT image in the phantom and the peak exhale position in the patient. Gamma evaluation was 97.8% without motion, 95.7% for 2 cm sinusoidal motion, 95.7% with 3 cm drift in

  9. Long wavelength irregularities in the equatorial electrojet

    International Nuclear Information System (INIS)

    Kudeki, E.; Farley, D.T.; Fejer, B.G.

    1982-01-01

    We have used the radar interferometer technique at Jicamarca to study in detail irregularities with wavelengths of a few kilometers generated in the unstable equatorial electrojet plasma during strong type 1 conditions. In-situ rocket observations of the same instability process are discussed in a companion paper. These large scale primary waves travel essentially horizontally and have large amplitudes. The vertical electron drift velocities driven by the horizontal wave electric fields reach or exceed the ion-acoustic velocity even though the horizontal phase velocity of the wave is considerably smaller. A straightforward extension to the long wavelength regime of the usual linear theory of the electrojet instability explains this and several other observed features of these dominant primary waves

  10. Irregular employment amongst migrants in Spanish cities.

    Science.gov (United States)

    Sole, C; Ribas, N; Bergalli, V; Parella, S

    1998-04-01

    This article presents the irregular employment situation of non-European union immigrants in Spanish cities. Foreign labor is remarkable for its heterogeneity in terms of country of origin, demographic characteristics, and the different ways in which immigrants have entered the job market. Legal immigrants tend to concentrate in five different branches of activity, such as domestic service (mostly women), hotel and restaurant industry, agriculture, building and retail trade. Migrants who work in agriculture suffer the worst labor conditions than all other migrants. However, all migrants experience difficulty in obtaining residency and labor permits. Four integration strategies among Moroccan immigrants in Catalonia are discussed and can be viewed as support networks of the immigrants.

  11. Nuclear, biological and chemical warfare. Part I: Medical aspects of nuclear warfare.

    Science.gov (United States)

    Kasthuri, A S; Pradhan, A B; Dham, S K; Bhalla, I P; Paul, J S

    1990-04-01

    Casualties in earlier wars were due much more to diseases than to weapons. Mention has been made in history of the use of biological agents in warfare, to deny the enemy food and water and to cause disease. In the first world war chemical agents were used to cause mass casualties. Nuclear weapons were introduced in the second world war. Several countries are now involved in developing nuclear, biological and chemical weapon systems, for the mass annihilation of human beings, animals and plants, and to destroy the economy of their enemies. Recently, natural calamities and accidents in nuclear, chemical and biological laboratories and industries have caused mass instantaneous deaths in civilian population. The effects of future wars will not be restricted to uniformed persons. It is time that physicians become aware of the destructive potential of these weapons. Awareness, immediate protective measures and first aid will save a large number of persons. This series of articles will outline the medical aspects of nuclear, biological and chemical weapon systems in three parts. Part I will deal with the biological effects of a nuclear explosion. The short and long term effects due to blast, heat and associated radiation are highlighted. In Part II, the role of biological agents which cause commoner or new disease patterns is mentioned. Some of the accidents from biological warfare laboratories are a testimony to its potential deleterious effects. Part III deals with medical aspects of chemical warfare agents, which in view of their mass effects can overwhelm the existing medical resources, both civilian and military.(ABSTRACT TRUNCATED AT 250 WORDS)

  12. Irregular activity arises as a natural consequence of synaptic inhibition

    International Nuclear Information System (INIS)

    Terman, D.; Rubin, J. E.; Diekman, C. O.

    2013-01-01

    Irregular neuronal activity is observed in a variety of brain regions and states. This work illustrates a novel mechanism by which irregular activity naturally emerges in two-cell neuronal networks featuring coupling by synaptic inhibition. We introduce a one-dimensional map that captures the irregular activity occurring in our simulations of conductance-based differential equations and mathematically analyze the instability of fixed points corresponding to synchronous and antiphase spiking for this map. We find that the irregular solutions that arise exhibit expansion, contraction, and folding in phase space, as expected in chaotic dynamics. Our analysis shows that these features are produced from the interplay of synaptic inhibition with sodium, potassium, and leak currents in a conductance-based framework and provides precise conditions on parameters that ensure that irregular activity will occur. In particular, the temporal details of spiking dynamics must be present for a model to exhibit this irregularity mechanism and must be considered analytically to capture these effects

  13. Irregular activity arises as a natural consequence of synaptic inhibition

    Energy Technology Data Exchange (ETDEWEB)

    Terman, D., E-mail: terman@math.ohio-state.edu [Department of Mathematics, The Ohio State University, Columbus, Ohio 43210 (United States); Rubin, J. E., E-mail: jonrubin@pitt.edu [Department of Mathematics, University of Pittsburgh, Pittsburgh, Pennsylvania 15260 (United States); Diekman, C. O., E-mail: diekman@njit.edu [Department of Mathematical Sciences, New Jersey Institute of Technology, Newark, New Jersey 07102 (United States)

    2013-12-15

    Irregular neuronal activity is observed in a variety of brain regions and states. This work illustrates a novel mechanism by which irregular activity naturally emerges in two-cell neuronal networks featuring coupling by synaptic inhibition. We introduce a one-dimensional map that captures the irregular activity occurring in our simulations of conductance-based differential equations and mathematically analyze the instability of fixed points corresponding to synchronous and antiphase spiking for this map. We find that the irregular solutions that arise exhibit expansion, contraction, and folding in phase space, as expected in chaotic dynamics. Our analysis shows that these features are produced from the interplay of synaptic inhibition with sodium, potassium, and leak currents in a conductance-based framework and provides precise conditions on parameters that ensure that irregular activity will occur. In particular, the temporal details of spiking dynamics must be present for a model to exhibit this irregularity mechanism and must be considered analytically to capture these effects.

  14. Decomposing Oriented Graphs into Six Locally Irregular Oriented Graphs

    DEFF Research Database (Denmark)

    Bensmail, Julien; Renault, Gabriel

    2016-01-01

    An undirected graph G is locally irregular if every two of its adjacent vertices have distinct degrees. We say that G is decomposable into k locally irregular graphs if there exists a partition E1∪E2∪⋯∪Ek of the edge set E(G) such that each Ei induces a locally irregular graph. It was recently co...

  15. Transport and Reactivity of Decontaminants to Provide Hazard Mitigation of Chemical Warfare Agents from Materials

    Science.gov (United States)

    2016-06-01

    2013 4. TITLE AND SUBTITLE Transport and Reactivity of Decontaminants to Provide Hazard Mitigation of Chemical Warfare Agents from Materials 5a...directions for future decontamination formulation approaches. 15. SUBJECT TERMS GD HD Decontamination Hazard mitigation VX Chemical warfare agent... DECONTAMINANTS TO PROVIDE HAZARD MITIGATION OF CHEMICAL WARFARE AGENTS FROM MATERIALS 1. INTRODUCTION Decontamination of materials is the

  16. Characteristics of ionospheric irregularities causing scintillations at VHF/UHF

    International Nuclear Information System (INIS)

    Vats, H.O.; Deshpande, M.R.; Rastogi, R.G.

    1978-01-01

    Some properties of ionization irregularities using amplitude scintillation records of radio beacons from ATS-6 (phase II) at Ootacamund, India have been investigated. For the estimation of scale-size and strength of the irregularities a simple diffraction model has been used which explains only weak and moderate equatorial scintillation observations. It was found that the scale sizes of day time E-region irregularities are smaller than those in the F-region during night time in addition, irregularities are generated initially at large scale sizes which later break up into smaller scale sizes

  17. Advances in electron dosimetry of irregular fields; Avances en dosimetria de electrones de campos irregulares

    Energy Technology Data Exchange (ETDEWEB)

    Mendez V, J. [Departamento de Radioterapia, Instituto de Enfermedades Neoplasicas, Avenida Angamos Este 2520, Lima 34 (Peru)

    1998-12-31

    In this work it is presented an advance in Electron dosimetry of irregular fields for beams emitted by linear accelerators. At present diverse methods exist which are coming to apply in the Radiotherapy centers. In this work it is proposed a method for irregular fields dosimetry. It will be allow to calculate the dose rate absorbed required for evaluating the time for the treatment of cancer patients. Utilizing the results obtained by the dosimetric system, it has been possible to prove the validity of the method describe for 12 MeV energy and for square field 7.5 x 7.5 cm{sup 2} with percentile error less than 1 % . (Author)

  18. Russian New Art of Hybrid Warfare in Ukraine

    Directory of Open Access Journals (Sweden)

    Rusnáková Soňa

    2017-10-01

    Full Text Available The main aim of this paper is to analyse the annexation of Crimea by the Russian Federation. For the purposes of the paper, the theory of hybrid warfare was chosen as an analytical category. Throughout the paper, the concept of hybrid warfare is examined and applied on case study of Crimean annexation. Hybrid warfare, especially in connection with Russian actions in Crimea has been an intensely debated concept. There is an ongoing debate among scholars concerning the meaning of the concept, its existence and employment by the Russian Federation. This paper showed that the article of Valeriy Gerasimov – the incumbent Chief of the General Staff of the Russian Federation-invoked a new warfare strategy for the Russian Federation which was consequently for the very first time in its full spectre and effectivity employed on case of Crimean annexation in March 2014. Observing the application of the hybrid warfare in practice serves the purposes of countering its further potential application in post-Soviet space and Russian ‘near abroad’.

  19. Nondestructive inspection of chemical warfare based on API-TOF

    International Nuclear Information System (INIS)

    Wang Xinhua; Zheng Pu; He Tie; An Li; Yang Jie; Fan Yu

    2013-01-01

    Background: Real-time, fast, accurate, nondestructive inspection (NDI) and quantitative analysis for chemical warfare are very imperative for chemical defense, anti-terror and nation security. Purpose: Associated Particles Technique (APT)/Neutron Time of Flight (TOF) has been developed for non-invasive inspection of sealed containers with chemical warfare agents. Methods: A prototype equipment for chemical warfare is consisted of an APT neutron generator with a 3×3 matrix of semiconductor detectors of associated alpha-particles, the shielding protection of neutron and gamma-ray, arrayed NaI(Tl)-based detectors of gamma-rays, fully-digital data acquisition electronics, data analysis, decision-making software, support platform and remote control system. Inelastic scattering gamma-ray pulse height spectra of sarin, VX, mustard gas and adamsite induced by 14-MeV neutron are measured. The energies of these gamma rays are used to identify the inelastic scattering elements, and the intensities of the peaks at these energies are used to reveal their concentrations. Results: The characteristic peaks of inelastic scattering gamma-ray pulse height spectra show that the prototype equipment can fast and accurately inspect chemical warfare. Conclusion: The equipment can be used to detect not only chemical warfare agents but also other hazardous materials, such as chemical/toxic/drug materials, if their chemical composition is in any way different from that of the surrounding materials. (authors)

  20. Numerical simulation of RCS for carrier electronic warfare airplanes

    Directory of Open Access Journals (Sweden)

    Yue Kuizhi

    2015-04-01

    Full Text Available This paper studies the radar cross section (RCS of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carrier electronic warfare airplanes Model A and Model B with weapons were established. Based on the physical optics method and the equivalent electromagnetic flow method, by the use of the RCSAnsys software, the characteristics of carrier electronic warfare airplanes’ RCS under steady and dynamic flights were simulated under the UHF, X, and S radar bands. This paper researches the detection probability of aircraft by radars under the condition of electronic warfare, and completes the mathematical statistical analysis of the simulation results. The results show that: The Model A of carrier electronic warfare airplane is better than Model B on stealth performance and on discover probability by radar detection effectively.

  1. [Decontamination of chemical warfare agents by photocatalysis].

    Science.gov (United States)

    Hirakawa, Tsutomu; Mera, Nobuaki; Sano, Taizo; Negishi, Nobuaki; Takeuchi, Koji

    2009-01-01

    Photocatalysis has been widely applied to solar-energy conversion and environmental purification. Photocatalyst, typically titanium dioxide (TiO(2)), produces active oxygen species under irradiation of ultraviolet light, and can decompose not only conventional pollutants but also different types of hazardous substances at mild conditions. We have recently started the study of photocatalytic decontamination of chemical warfare agents (CWAs) under collaboration with the National Research Institute of Police Science. This article reviews environmental applications of semiconductor photocatalysis, decontamination methods for CWAs, and previous photocatalytic studies applied to CWA degradation, together with some of our results obtained with CWAs and their simulant compounds. The data indicate that photocatalysis, which may not always give a striking power, certainly helps detoxification of such hazardous compounds. Unfortunately, there are not enough data obtained with real CWAs due to the difficulty in handling. We will add more scientific data using CWAs in the near future to develop useful decontamination systems that can reduce the damage caused by possible terrorism.

  2. How Do I Know? A Guide to the Selection of Personal Protective Equipment for Use in Responding to A Release of Chemical Warfare Agents

    Energy Technology Data Exchange (ETDEWEB)

    Foust, C.B.

    1999-05-01

    An incident involving chemical warfare agents requires a unique hazardous materials (HAZMAT) response. As with an HAZMAT event, federal regulations prescribe that responders must be protected from exposure to the chemical agents. But unlike other HAZMAT events, special considerations govern selection of personal protective equipment (PPE). PPE includes all clothing, respirators and monitoring devices used to respond to a chemical release. PPE can differ depending on whether responders are military or civilian personnel.

  3. Biomaterials for mediation of chemical and biological warfare agents.

    Science.gov (United States)

    Russell, Alan J; Berberich, Jason A; Drevon, Geraldine F; Koepsel, Richard R

    2003-01-01

    Recent events have emphasized the threat from chemical and biological warfare agents. Within the efforts to counter this threat, the biocatalytic destruction and sensing of chemical and biological weapons has become an important area of focus. The specificity and high catalytic rates of biological catalysts make them appropriate for decommissioning nerve agent stockpiles, counteracting nerve agent attacks, and remediation of organophosphate spills. A number of materials have been prepared containing enzymes for the destruction of and protection against organophosphate nerve agents and biological warfare agents. This review discusses the major chemical and biological warfare agents, decontamination methods, and biomaterials that have potential for the preparation of decontamination wipes, gas filters, column packings, protective wear, and self-decontaminating paints and coatings.

  4. Irregular radiation response of a chondrosarcoma

    International Nuclear Information System (INIS)

    Marsden, J.J.; Kember, N.F.; Shaw, J.E.H.

    1980-01-01

    The DC II mouse chondrosarcoma was shown to be a potentially valuable radiobiological tumour system since it recovered from radiation injury by regrowth from clones that could be counted in histological sections. Unfortunately, the normal growth of this tumour following s.c. implantation in the thigh was irregular both in the time before growth became evident and in the rate of growth. The response to radiation was also unreliable since tumours irradiated with the same dose (e.g. 30 Gy) showed a range of responses from shrinkage to no detectable change in growth rate. The delay in normal growth can be attributed largely to delays in vascularization while changes in growth rate may be explained by differences in tumour architecture. Radiation response may depend on variations in hypoxic fraction and in relative cellularity. Tumours having the same external dimensions may differ by a factor of 80 in the numbers of tumour cells they contain. This chondrosarcoma may prove a closer model to some human tumours than many transplantable tumours that display regular growth patterns. (author)

  5. Regularities and irregularities in order flow data

    Science.gov (United States)

    Theissen, Martin; Krause, Sebastian M.; Guhr, Thomas

    2017-11-01

    We identify and analyze statistical regularities and irregularities in the recent order flow of different NASDAQ stocks, focusing on the positions where orders are placed in the order book. This includes limit orders being placed outside of the spread, inside the spread and (effective) market orders. Based on the pairwise comparison of the order flow of different stocks, we perform a clustering of stocks into groups with similar behavior. This is useful to assess systemic aspects of stock price dynamics. We find that limit order placement inside the spread is strongly determined by the dynamics of the spread size. Most orders, however, arrive outside of the spread. While for some stocks order placement on or next to the quotes is dominating, deeper price levels are more important for other stocks. As market orders are usually adjusted to the quote volume, the impact of market orders depends on the order book structure, which we find to be quite diverse among the analyzed stocks as a result of the way limit order placement takes place.

  6. Evaporation From Soil Containers With Irregular Shapes

    Science.gov (United States)

    Assouline, Shmuel; Narkis, Kfir

    2017-11-01

    Evaporation from bare soils under laboratory conditions is generally studied using containers of regular shapes where the vertical edges are parallel to the flow lines in the drying domain. The main objective of this study was to investigate the impact of irregular container shapes, for which the flow lines either converge or diverge toward the surface. Evaporation from initially saturated sand and sandy loam soils packed in cones and inverted cones was compared to evaporation from corresponding cylindrical columns. The initial evaporation rate was higher in the cones, and close to potential evaporation. At the end of the experiment, the cumulative evaporation depth in the sand cone was equal to that in the column but higher than in the inverted cone, while in the sandy loam, the order was cone > column > inverted cone. By comparison to the column, stage 1 evaporation was longer in the cones, and practically similar in the inverted cones. Stage 2 evaporation rate decreased with the increase of the evaporating surface area. These results were more pronounced in the sandy loam. For the sand column, the transition between stage 1 and stage 2 evaporation occurred when the depth of the saturation front was approximately equal to the characteristic length of the soil. However, for the cone and the inverted cone, it occurred for a shallower depth of the saturation front. It seems therefore that the concept of the characteristic length derived from the soil hydraulic properties is related to drying systems of regular shapes.

  7. Design strategies for irregularly adapting parallel applications

    International Nuclear Information System (INIS)

    Oliker, Leonid; Biswas, Rupak; Shan, Hongzhang; Sing, Jaswinder Pal

    2000-01-01

    Achieving scalable performance for dynamic irregular applications is eminently challenging. Traditional message-passing approaches have been making steady progress towards this goal; however, they suffer from complex implementation requirements. The use of a global address space greatly simplifies the programming task, but can degrade the performance of dynamically adapting computations. In this work, we examine two major classes of adaptive applications, under five competing programming methodologies and four leading parallel architectures. Results indicate that it is possible to achieve message-passing performance using shared-memory programming techniques by carefully following the same high level strategies. Adaptive applications have computational work loads and communication patterns which change unpredictably at runtime, requiring dynamic load balancing to achieve scalable performance on parallel machines. Efficient parallel implementations of such adaptive applications are therefore a challenging task. This work examines the implementation of two typical adaptive applications, Dynamic Remeshing and N-Body, across various programming paradigms and architectural platforms. We compare several critical factors of the parallel code development, including performance, programmability, scalability, algorithmic development, and portability

  8. Multiresolution Analysis Adapted to Irregularly Spaced Data

    Directory of Open Access Journals (Sweden)

    Anissa Mokraoui

    2009-01-01

    Full Text Available This paper investigates the mathematical background of multiresolution analysis in the specific context where the signal is represented by irregularly sampled data at known locations. The study is related to the construction of nested piecewise polynomial multiresolution spaces represented by their corresponding orthonormal bases. Using simple spline basis orthonormalization procedures involves the construction of a large family of orthonormal spline scaling bases defined on consecutive bounded intervals. However, if no more additional conditions than those coming from multiresolution are imposed on each bounded interval, the orthonormal basis is represented by a set of discontinuous scaling functions. The spline wavelet basis also has the same problem. Moreover, the dimension of the corresponding wavelet basis increases with the spline degree. An appropriate orthonormalization procedure of the basic spline space basis, whatever the degree of the spline, allows us to (i provide continuous scaling and wavelet functions, (ii reduce the number of wavelets to only one, and (iii reduce the complexity of the filter bank. Examples of the multiresolution implementations illustrate that the main important features of the traditional multiresolution are also satisfied.

  9. Resolution optimization with irregularly sampled Fourier data

    International Nuclear Information System (INIS)

    Ferrara, Matthew; Parker, Jason T; Cheney, Margaret

    2013-01-01

    Image acquisition systems such as synthetic aperture radar (SAR) and magnetic resonance imaging often measure irregularly spaced Fourier samples of the desired image. In this paper we show the relationship between sample locations, their associated backprojection weights, and image resolution as characterized by the resulting point spread function (PSF). Two new methods for computing data weights, based on different optimization criteria, are proposed. The first method, which solves a maximal-eigenvector problem, optimizes a PSF-derived resolution metric which is shown to be equivalent to the volume of the Cramer–Rao (positional) error ellipsoid in the uniform-weight case. The second approach utilizes as its performance metric the Frobenius error between the PSF operator and the ideal delta function, and is an extension of a previously reported algorithm. Our proposed extension appropriately regularizes the weight estimates in the presence of noisy data and eliminates the superfluous issue of image discretization in the choice of data weights. The Frobenius-error approach results in a Tikhonov-regularized inverse problem whose Tikhonov weights are dependent on the locations of the Fourier data as well as the noise variance. The two new methods are compared against several state-of-the-art weighting strategies for synthetic multistatic point-scatterer data, as well as an ‘interrupted SAR’ dataset representative of in-band interference commonly encountered in very high frequency radar applications. (paper)

  10. Irregular Homogeneity Domains in Ternary Intermetallic Systems

    Directory of Open Access Journals (Sweden)

    Jean-Marc Joubert

    2015-12-01

    Full Text Available Ternary intermetallic A–B–C systems sometimes have unexpected behaviors. The present paper examines situations in which there is a tendency to simultaneously form the compounds ABx, ACx and BCx with the same crystal structure. This causes irregular shapes of the phase homogeneity domains and, from a structural point of view, a complete reversal of site occupancies for the B atom when crossing the homogeneity domain. This work reviews previous studies done in the systems Fe–Nb–Zr, Hf–Mo–Re, Hf–Re–W, Mo–Re–Zr, Re–W–Zr, Cr–Mn–Si, Cr–Mo–Re, and Mo–Ni–Re, and involving the topologically close-packed Laves, χ and σ phases. These systems have been studied using ternary isothermal section determination, DFT calculations, site occupancy measurement using joint X-ray, and neutron diffraction Rietveld refinement. Conclusions are drawn concerning this phenomenon. The paper also reports new experimental or calculated data on Co–Cr–Re and Fe–Nb–Zr systems.

  11. Psychological and Unconventional Warfare, 1941-1952: Origins of a Special Warfare Capability for the United States Army

    Science.gov (United States)

    1979-11-01

    nic -,L-dant orer unconventional wsr:fare? In shnrt, wfiat were-the pre-1952 roots of tbe’ P9ych𔃺rg1.ca1 WArfArPg Contme" artx], cMocom~tant y, the...General Robert A. McClure, 30 March 1948, from Co’.onel William S. Biddle , Assistant Chief, Plans and Policy Group, 1, 319, Plans and Operations Division

  12. 14 CFR 135.65 - Reporting mechanical irregularities.

    Science.gov (United States)

    2010-01-01

    ... irregularities and their correction. (b) The pilot in command shall enter or have entered in the aircraft maintenance log each mechanical irregularity that comes to the pilot's attention during flight time. Before each flight, the pilot in command shall, if the pilot does not already know, determine the status of...

  13. Uniform irradiation of irregularly shaped cavities for photodynamic therapy

    NARCIS (Netherlands)

    Rem, A. I.; van Gemert, M. J.; van der Meulen, F. W.; Gijsbers, G. H.; Beek, J. F.

    1997-01-01

    It is difficult to achieve a uniform light distribution in irregularly shaped cavities. We have conducted a study on the use of hollow 'integrating' moulds for more uniform light delivery of photodynamic therapy in irregularly shaped cavities such as the oral cavity. Simple geometries such as a

  14. Software support for irregular and loosely synchronous problems

    Science.gov (United States)

    Choudhary, A.; Fox, G.; Hiranandani, S.; Kennedy, K.; Koelbel, C.; Ranka, S.; Saltz, J.

    1992-01-01

    A large class of scientific and engineering applications may be classified as irregular and loosely synchronous from the perspective of parallel processing. We present a partial classification of such problems. This classification has motivated us to enhance FORTRAN D to provide language support for irregular, loosely synchronous problems. We present techniques for parallelization of such problems in the context of FORTRAN D.

  15. Regularisation of irregular verbs in child English second language ...

    African Journals Online (AJOL)

    Data was collected from the language of English medium preschool children. The study concludes that when the Blocking Principle interferes, children resort to a novel interlanguage rule that regularises irregular verbs. This interlanguage rule applies in a similar way to all irregular verbs, thus children produce utterances ...

  16. Lanchester-Type Models of Warfare, Volume II

    OpenAIRE

    Taylor, James G.

    1980-01-01

    This monograph is a comprehensive treatist on Lanchester-type models of warfare, i.e. differential-equation models of attrition in force-on-force combat operations. Its goal is to provide both an introduction to and current-state-of-the-art overview of Lanchester-type models of warfare as well as a comprehensive and unified in-depth treatment of them. Both deterministic as well as stochastic models are considered. Such models have been widely used in the United States and elsewhere for the...

  17. Theory of information warfare: basic framework, methodology and conceptual apparatus

    Directory of Open Access Journals (Sweden)

    Олександр Васильович Курбан

    2015-11-01

    Full Text Available It is conducted a comprehensive theoretical study and determine the basic provisions of the modern theory of information warfare in on-line social networks. Three basic blocks, which systematized the theoretical and methodological basis of the topic, are established. There are information and psychological war, social off-line and on-line network. According to the three blocks, theoretical concepts are defined and methodological substantiation of information processes within the information warfare in the social on-line networks is formed

  18. Hybrid warfare of the USA in South America

    Directory of Open Access Journals (Sweden)

    A. V. Budaev

    2015-01-01

    Full Text Available Washington’s hybrid warfare in Latin American region differs by its inventive and sophisticated methods and in fact represents a complex and multidimensional phenomenon including symbiosis of the “soft” and “hard” power as well as their combination in the form of the “smart power”. The increasing importance of hybrid warfare technologies in the US foreign policy in Latin America predetermines the necessity of thorough studies and analysis of this phenomenon for providing Russian interests.

  19. Irregular conformal block, spectral curve and flow equations

    International Nuclear Information System (INIS)

    Choi, Sang Kwan; Rim, Chaiho; Zhang, Hong

    2016-01-01

    Irregular conformal block is motivated by the Argyres-Douglas type of N=2 super conformal gauge theory. We investigate the classical/NS limit of irregular conformal block using the spectral curve on a Riemann surface with irregular punctures, which is equivalent to the loop equation of irregular matrix model. The spectral curve is reduced to the second order (Virasoro symmetry, SU(2) for the gauge theory) and third order (W_3 symmetry, SU(3)) differential equations of a polynomial with finite degree. The conformal and W symmetry generate the flow equations in the spectral curve and determine the irregular conformal block, hence the partition function of the Argyres-Douglas theory ala AGT conjecture.

  20. Star Formation Histories of Dwarf Irregular Galaxies

    Science.gov (United States)

    Skillman, Evan

    1995-07-01

    We propose to obtain deep WFPC2 `BVI' color-magnitude diagrams {CMDs} for the dwarf irregular {dI} Local Group galaxies GR 8, Leo A, Pegasus, and Sextans A. In addition to resolved stars, we will use star clusters, and especially any globulars, to probe the history of intense star formation. These data will allow us to map the Pop I and Pop II stellar components, and thereby construct the first detailed star formation histories for non-interacting dI galaxies. Our results will bear on a variety of astrophysical problems, including the evolution of small galaxies, distances in the Local Group, age-metallicity distributions in small galaxies, ages of dIs, and the physics of star formation. The four target galaxies are typical dI systems in terms of luminosity, gas content, and H II region abundance, and represent a range in current star forming activity. They are sufficiently near to allow us to reach to stars at M_V = 0, have 0.1 of the luminosity of the SMC and 0.25 of its oxygen abundance. Unlike the SMC, these dIs are not near giant galaxies. This project will allow the extension of our knowledge of stellar populations in star forming galaxies from the spirals in the Local Group down to its smallest members. We plan to take maximum advantage of the unique data which this project will provide. Our investigator team brings extensive and varied experience in studies of dwarf galaxies, stellar populations, imaging photometry, and stellar evolution to this project.

  1. Nanostructured Metal Oxides for Stoichiometric Degradation of Chemical Warfare Agents

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Henych, Jiří; Janos, P.; Skoumal, M.

    2016-01-01

    Roč. 236, č. 2016 (2016), s. 239-258 ISSN 0179-5953 R&D Projects: GA ČR(CZ) GAP106/12/1116 Institutional support: RVO:61388980 Keywords : chemical warfare agent * metal nanoparticle * unique surface- chemistry * mesoporous manganese oxide Subject RIV: CA - Inorganic Chemistry Impact factor: 3.930, year: 2016

  2. Management information systems for electronic warfare command and decision support

    CSIR Research Space (South Africa)

    Van Niekerk, B

    2015-04-01

    Full Text Available information to allow them to manage their own spectrum, to identify threats, and to deny adversaries’ use of the spectrum. In this paper, the concepts of integrated electronic warfare and spectrum battle management are introduced, and the relevant information...

  3. Manoeuvre warfare analysis of South Africa's 1914-1915 German ...

    African Journals Online (AJOL)

    The study reported in this article explored the nexus between military theory and history. Military theory attempts to quantify, qualify and illuminate the often unpredictable phenomenon of war. The article consists of two parts: the theory of manoeuvre warfare and the history of the 1914-1915 South African campaign in ...

  4. blitzkrieg to desert storm: the evolution of operational warfare

    African Journals Online (AJOL)

    a_nabb

    disease of stalemates infecting militaries before the Second World War. The invasion did not change the world; instead, it brought about an increased awareness of the importance of the operational level of war, a dimension of warfare previously neglected. The German operational effectiveness represented an evolution ...

  5. A identification system for chemical warfare agents with PGNAA method

    International Nuclear Information System (INIS)

    Wang Bairong; Yin Guanghua; Yang Zhongping

    2006-01-01

    The principle and the experimental commanding of Chemical warfare Agents Identification with PGNAA method are discussed in this paper. The choosing of Detector, neutron source and the data processing method are detailed. Finally, a set of experimental instruments composed of Cf-232 and BGO detector is developed based on the theory discussed above. (authors)

  6. Identification system for chemical warfare agents with PGNAA method

    International Nuclear Information System (INIS)

    Wang Bairong; Yin Guanghua; Yang Zhongpin

    2007-01-01

    The principle and the experimental commanding of Chemical warfare Agents Identification with PGNAA method are discussed in this paper. The choosing of detector, neutron source and the data processing method are detailed. Finally, a set of experimental instruments composed of Cf-232 and BGO detector is developed based on this theory discussed above. (authors)

  7. Biomonitoring of exposure to chemical warfare agents: A review

    NARCIS (Netherlands)

    Noort, D.; Benschop, H.P.; Black, R.M.

    2002-01-01

    In this report an overview of the methods currently available for detection of exposure to a number of chemical warfare agents (CWA), i.e., sulfur mustard, lewisite and nerve agents, is presented. Such methods can be applied for various purposes, e.g., diagnosis and dosimetry of exposure of

  8. Researchers study decontamination of chemical, biological warfare agents

    OpenAIRE

    Trulove, Susan

    2007-01-01

    The U.S. Army Research Office has awarded Virginia Tech a $680,000 grant over two years to build an instrument that can be used to study the chemistry of gases that will decompose both chemical and biological warfare agents on surfaces.

  9. Recent canadian experience in chemical warfare agent destruction. An overview

    Energy Technology Data Exchange (ETDEWEB)

    McAndless, J.M.

    1995-09-01

    A Canadian chemical warfare agent destruction project (Swiftsure) was recently completed in which stockpiles of aged mustard, lewisite, nerve agents and contaminated scrap metal were incinerated or chemically neutralized in a safe, environmentally-responsible manner. The project scope, destruction technologies, environmental monitoring and public consultation programs are described.

  10. Simulating cyber warfare and cyber defenses: information value considerations

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber

  11. Electromagnetic waves in irregular multilayered spheroidal structures of finite conductivity: full wave solutions

    International Nuclear Information System (INIS)

    Bahar, E.

    1976-01-01

    The propagation of electromagnetic waves excited by electric dipoles oriented along the axis of multilayered spheroidal structures of finite conductivity is investigated. The electromagnetic parameters and the thickness of the layers of the structure are assumed to be functions of the latitude. In the analysis, electric and magnetic field transforms that constitute a discrete and a continuous spectrum of spherical waves are used to provide a suitable basis for the expansion of the electromagnetic fields at any point in the irregular spheroidal structure. For spheroidal structures with good conducting cores, the terms in the solutions associated with the continuous part of the wave spectrum vanish. In general, however, when the skin depth for the core is large compared to its dimensions or when the sources are located in the core of the structure and propagation in the core is of special interest, the contribution from the continuous part of the wave spectrum cannot be neglected. At each interface between the layers of the irregular spheroidal structure, exact boundary conditions are imposed. Since the terms of the field expansions in the irregular structure do not individually satisfy the boundary conditions, Maxwell's equations are reduced to sets of coupled ordinary first-order differential equations for the wave amplitudes. The solutions are shown to satisfy the reciprocity relationships in electromagnetic theory. The analysis may be applied to problems of radio wave propagation in a nonuniform model of the earth-ionosphere waveguide, particularly when focusing effects at the antipodes are important

  12. Traffic dispersion through a series of signals with irregular split

    Science.gov (United States)

    Nagatani, Takashi

    2016-01-01

    We study the traffic behavior of a group of vehicles moving through a sequence of signals with irregular splits on a roadway. We present the stochastic model of vehicular traffic controlled by signals. The dynamic behavior of vehicular traffic is clarified by analyzing traffic pattern and travel time numerically. The group of vehicles breaks up more and more by the irregularity of signal's split. The traffic dispersion is induced by the irregular split. We show that the traffic dispersion depends highly on the cycle time and the strength of split's irregularity. Also, we study the traffic behavior through the series of signals at the green-wave strategy. The dependence of the travel time on offset time is derived for various values of cycle time. The region map of the traffic dispersion is shown in (cycle time, offset time)-space.

  13. Drug Intoxicated Irregular Fighters: Complications, Dangers, and Responses

    National Research Council Canada - National Science Library

    Kan, Paul R

    2008-01-01

    .... Drug consumption in contemporary wars has coincided with the use of child soldiers, has led to increased unpredictability among irregular fighters, provided the conditions for the breakdown of social...

  14. Role of parametric decay instabilities in generating ionospheric irregularities

    International Nuclear Information System (INIS)

    Kuo, S.P.; Cheo, B.R.; Lee, M.C.

    1983-01-01

    We show that purely growing instabilities driven by the saturation spectrum of parametric decay instabilities can produce a broad spectrum of ionospheric irregularities. The threshold field Vertical BarE/sub th/Vertical Bar of the instabilities decreases with the scale lengths lambda of the ionospheric irregularities as Vertical BarE/sub th/Vertical Barproportionallambda -2 in the small-scale range ( -2 with scale lengths larger than a few kilometers. The excitation of kilometer-scale irregularities is strictly restricted by the instabilities themselves and by the spatial inhomogeneity of the medium. These results are drawn from the analyses of four-wave interaction. Ion-neutral collisions impose no net effect on the instabilities when the excited ionospheric irregularities have a field-aligned nature

  15. Edge irregular total labellings for graphs of linear size

    DEFF Research Database (Denmark)

    Brandt, Stephan; Rautenbach, D.; Miškuf, J.

    2009-01-01

    As an edge variant of the well-known irregularity strength of a graph G = (V, E) we investigate edge irregular total labellings, i.e. functions f : V ∪ E → {1, 2, ..., k} such that f (u) + f (u v) + f (v) ≠ f (u) + f (u v) + f (v) for every pair of different edges u v, u v ∈ E. The smallest possi...

  16. Design Optimization of Irregular Cellular Structure for Additive Manufacturing

    Science.gov (United States)

    Song, Guo-Hua; Jing, Shi-Kai; Zhao, Fang-Lei; Wang, Ye-Dong; Xing, Hao; Zhou, Jing-Tao

    2017-09-01

    Irregularcellular structurehas great potential to be considered in light-weight design field. However, the research on optimizing irregular cellular structures has not yet been reporteddue to the difficulties in their modeling technology. Based on the variable density topology optimization theory, an efficient method for optimizing the topology of irregular cellular structures fabricated through additive manufacturing processes is proposed. The proposed method utilizes tangent circles to automatically generate the main outline of irregular cellular structure. The topological layoutof each cellstructure is optimized using the relative density informationobtained from the proposed modified SIMP method. A mapping relationship between cell structure and relative densityelement is builtto determine the diameter of each cell structure. The results show that the irregular cellular structure can be optimized with the proposed method. The results of simulation and experimental test are similar for irregular cellular structure, which indicate that the maximum deformation value obtained using the modified Solid Isotropic Microstructures with Penalization (SIMP) approach is lower 5.4×10-5 mm than that using the SIMP approach under the same under the same external load. The proposed research provides the instruction to design the other irregular cellular structure.

  17. Ionospheric Irregularities at Mars Probed by MARSIS Topside Sounding

    Science.gov (United States)

    Harada, Y.; Gurnett, D. A.; Kopf, A. J.; Halekas, J. S.; Ruhunusiri, S.

    2018-01-01

    The upper ionosphere of Mars contains a variety of perturbations driven by solar wind forcing from above and upward propagating atmospheric waves from below. Here we explore the global distribution and variability of ionospheric irregularities around the exobase at Mars by analyzing topside sounding data from the Mars Advanced Radar for Subsurface and Ionosphere Sounding (MARSIS) instrument on board Mars Express. As irregular structure gives rise to off-vertical echoes with excess propagation time, the diffuseness of ionospheric echo traces can be used as a diagnostic tool for perturbed reflection surfaces. The observed properties of diffuse echoes above unmagnetized regions suggest that ionospheric irregularities with horizontal wavelengths of tens to hundreds of kilometers are particularly enhanced in the winter hemisphere and at high solar zenith angles. Given the known inverse dependence of neutral gravity wave amplitudes on the background atmospheric temperature, the ionospheric irregularities probed by MARSIS are most likely associated with plasma perturbations driven by atmospheric gravity waves. Though extreme events with unusually diffuse echoes are more frequently observed for high solar wind dynamic pressures during some time intervals, the vast majority of the diffuse echo events are unaffected by varying solar wind conditions, implying limited influence of solar wind forcing on the generation of ionospheric irregularities. Combination of remote and in situ measurements of ionospheric irregularities would offer the opportunity for a better understanding of the ionospheric dynamics at Mars.

  18. Fatigue damage estimation using irregularity factor. First report, irregularity factor calculations for narrow and broadband random time histories

    Science.gov (United States)

    Susuki, I.

    1981-11-01

    The results of an analysis of the irregularity factors of stationary and Gaussian random processes which are generated by filtering the output of a pure or a band-limited white noise are presented. An ideal band pass filter, a trapezoidal filter, and a Butterworth type band pass filter were examined. It was found that the values of the irregularity factors were approximately equal among these filters if only the end-slopes were the same rates. As the band width of filters increases, irregularity factors increase monotonically and approach the respective constant values depending on the end-slopes. This implies that the noise characteristics relevant to the fatigue damage such as statistical aspects of the height of the rise and fall or the distribution of the peak values are not changed for a broad band random time history. It was also found that the effect of band limitation of input white noise on irregularity factors is negligibly small.

  19. Defending Our Satellites: The Need for Electronic Warfare Education and Training

    Science.gov (United States)

    2015-12-01

    intercept Allied bombers attacking at night.9 As a result of the electronic warfare advantage that systems like Window and Airborne Cigar be- stowed...74 | Air & Space Power Journal Defending Our Satellites The Need for Electronic Warfare Education and Training Lt Col E. Lincoln Bonner, USAF...expanding education and training in the use of electronic warfare to defend US satellites and improve their survivability. The following discussion

  20. Orbital and Collisional Evolution of the Irregular Satellites

    Science.gov (United States)

    Nesvorný, David; Alvarellos, Jose L. A.; Dones, Luke; Levison, Harold F.

    2003-07-01

    The irregular moons of the Jovian planets are a puzzling part of the solar system inventory. Unlike regular satellites, the irregular moons revolve around planets at large distances in tilted and eccentric orbits. Their origin, which is intimately linked with the origin of the planets themselves, is yet to be explained. Here we report a study of the orbital and collisional evolution of the irregular satellites from times after their formation to the present epoch. The purpose of this study is to find out the features of the observed irregular moons that can be attributed to this evolution and separate them from signatures of the formation process. We numerically integrated ~60,000 test satellite orbits to map orbital locations that are stable on long time intervals. We found that the orbits highly inclined to the ecliptic are unstable due to the effect of the Kozai resonance, which radially stretches them so that satellites either escape from the Hill sphere, collide with massive inner moons, or impact the parent planet. We also found that prograde satellite orbits with large semimajor axes are unstable due to the effect of the evection resonance, which locks the orbit's apocenter to the apparent motion of the Sun around the parent planet. In such a resonance, the effect of solar tides on a resonant moon accumulates at each apocenter passage of the moon, which causes a radially outward drift of its orbital apocenter; once close to the Hill sphere, the moon escapes. By contrast, retrograde moons with large orbital semimajor axes are long-lived. We have developed an analytic model of the distant satellite orbits and used it to explain the results of our numerical experiments. In particular, we analytically studied the effect of the Kozai resonance. We numerically integrated the orbits of the 50 irregular moons (known by 2002 August 16) for 108 yr. All orbits were stable on this time interval and did not show any macroscopic variations that would indicate

  1. Cultural Competence and the Operational Commander: Moving Beyond Cultural Awareness into Culture-Centric Warfare

    National Research Council Canada - National Science Library

    Karcanes, James A

    2007-01-01

    .... Understanding the different levels of cultural awareness -- cultural consideration, cultural understanding, and cultural competence -- will help usher in a new focus on culture-centric warfare...

  2. Mass Spectrometric Determination of Chemical Warfare Agents in Indoor Sample Media Typically Collected During Forensic Investigations

    National Research Council Canada - National Science Library

    D'Agostino, P. A; Hancock, J. R; Chenier, C. L

    2005-01-01

    .... DRDC Suffield, in collaboration with the Royal Canadian Mounted Police, identified a need for analytical methods for chemical warfare agent identification in media, including flooring, wall surfaces...

  3. Redefining Hybrid Warfare: Russia's Non-linear War against the West

    Directory of Open Access Journals (Sweden)

    Tad Schnaufer

    2017-03-01

    Full Text Available The term hybrid warfare fails to properly describe Russian operations in Ukraine and elsewhere. Russia has undertaken unconventional techniques to build its influence and test the boundaries of a shaken international system. Notably, Russia’s actions in Ukraine display an evolved style of warfare that goes beyond its initial label of hybrid warfare. The term non-linear war (NLW will be defined in this article to encompass Russia’s actions and allow policymakers the correct framework to discuss and respond to Russia. NLW plays to the advantage of countries like Russia and constitute the future of warfare.

  4. Technological advancements for the detection of and protection against biological and chemical warfare agents.

    Science.gov (United States)

    Eubanks, Lisa M; Dickerson, Tobin J; Janda, Kim D

    2007-03-01

    There is a growing need for technological advancements to combat agents of chemical and biological warfare, particularly in the context of the deliberate use of a chemical and/or biological warfare agent by a terrorist organization. In this tutorial review, we describe methods that have been developed both for the specific detection of biological and chemical warfare agents in a field setting, as well as potential therapeutic approaches for treating exposure to these toxic species. In particular, nerve agents are described as a typical chemical warfare agent, and the two potent biothreat agents, anthrax and botulinum neurotoxin, are used as illustrative examples of potent weapons for which countermeasures are urgently needed.

  5. Development of Bicarbonate-Activated Peroxide as a Chemical and Biological Warfare Agent Decontaminant

    National Research Council Canada - National Science Library

    Richardson, David E

    2006-01-01

    ...) and other chemistry for the decontamination of chemical and biological warfare agents. The mechanism of formation of the active oxidant, peroxymonocarbonate, has been investigated in detail. New surfoxidants...

  6. Decontamination and Detoxification of Toxic Chemical Warfare Agents Using Polyurethane Sponges

    National Research Council Canada - National Science Library

    Gordon, Richard K; Gunduz, Alper T; Askins, LaTawnya Y; Strating, Simon J; Doctor, Bhupendra P; Clarkson, Edward D; Mitchelree, Larry W; Lukey, Brian; Railer, Roy; Schulz, Susan

    2003-01-01

    .... Another serious problem that may be encountered while caring for personnel contaminated with organophosphorus chemical warfare nerve agents is the possibility that there will be cross-contamination...

  7. Stuxnet and Cyber-Warfare (2/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic.   Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction. The lecturer invites comments via email to Gian.Piero.Siroli@cern.ch NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  8. Stuxnet and Cyber-Warfare (1/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic. Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction.   NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  9. Tissue-based standoff biosensors for detecting chemical warfare agents

    Science.gov (United States)

    Greenbaum, Elias; Sanders, Charlene A.

    2003-11-18

    A tissue-based, deployable, standoff air quality sensor for detecting the presence of at least one chemical or biological warfare agent, includes: a cell containing entrapped photosynthetic tissue, the cell adapted for analyzing photosynthetic activity of the entrapped photosynthetic tissue; means for introducing an air sample into the cell and contacting the air sample with the entrapped photosynthetic tissue; a fluorometer in operable relationship with the cell for measuring photosynthetic activity of the entrapped photosynthetic tissue; and transmitting means for transmitting analytical data generated by the fluorometer relating to the presence of at least one chemical or biological warfare agent in the air sample, the sensor adapted for deployment into a selected area.

  10. Cutaneous reactions in nuclear, biological and chemical warfare

    Directory of Open Access Journals (Sweden)

    Arora Sandeep

    2005-03-01

    Full Text Available Nuclear, biological and chemical warfare have in recent times been responsible for an increasing number of otherwise rare dermatoses. Many nations are now maintaining overt and clandestine stockpiles of such arsenal. With increasing terrorist threats, these agents of mass destruction pose a risk to the civilian population. Nuclear and chemical attacks manifest immediately while biological attacks manifest later. Chemical and biological attacks pose a significant risk to the attending medical personnel. The large scale of anticipated casualties in the event of such an occurrence would need the expertise of all physicians, including dermatologists, both military and civilian. Dermatologists are uniquely qualified in this respect. This article aims at presenting a review of the cutaneous manifestations in nuclear, chemical and biological warfare and their management.

  11. Identification of chemical warfare agent with radiological measurements

    International Nuclear Information System (INIS)

    Liu Boxue; Li Yun; Ai Xianyun

    2000-01-01

    There are three non-destructive radiological methods for identification of warfare agents and TNT. Their principles and problems related were discussed. Portable isotopic neutron spectroscopy is based on the assay of key elemental composition (such as Cl, P, H, As, S, N) in chemical agents by neutron induced prompt gamma ray analysis. Hydrogen concentration measurement by means of using thermal neutron can be employed to identify chemical warfare agents and TNT that contains different hydrogen fraction. The calibration curves of thermal neutron count rate against hydrogen concentration were measured. X ray imagination system can be used to determine the internal structure of chemical bombs, there by to identify them. The radiological methods are very useful for identification of old chemical weapons abandoned by Japan Army during World War 2

  12. Just War and Postmodern Warfare: A German Case Study

    Science.gov (United States)

    2015-04-01

    warfare construct, Germany is shaping a military concept based on recent conflicts and unfettered by biases of conventional strategies, organizations...remain sovereign while subconsciously evolving toward liberal democratic ideas. In respecting each country’s political sensitivities, Germany’s...before exhausting all diplomatic, economic and information instruments. Whereas the term AU/ACSC/PINSON/AY15 13 “interests” may bias the United

  13. Nodes and Codes: The Reality of Cyber Warfare

    Science.gov (United States)

    2012-05-17

    respectively. The avionics in Boeing’s 787 Dreamliner require approximately 6.5 million lines of code while the current S-Class Mercedes Benz requires over 20...leaders (demonstrated through outdated policy, theory, and doctrine) and the reality of warfare in 1914 (dictated by innovation, technology , and...or the guidelines to military action codified in doctrine? How are states using the latest technological innovations as violent instruments of

  14. Attacking the infrastructure: exploring potential uses of offensive information warfare

    OpenAIRE

    Elam, Donald Emmett.

    1996-01-01

    The world has entered the Third Wave; it has entered the Information Age. One of the fundamentals of this paradigm shift is the fact that information is power. The side that controls information more effectively will be victorious. Thus, countries and militaries must change their mentality in order to survive. A new form of conflict, Information Warfare, has been born. This new discipline is large, dynamic, and complex. The need exists for education among military officers and other concerned...

  15. Built to Outlast: Operational Approaches to Hybrid Warfare

    Science.gov (United States)

    2012-05-17

    29Robert T. Ames, Sun Tzu: The Art of War (New York: Ballantine Books, 1993), 78-80; Mao Tse -Tung, On Guerrilla Warfare, trans. Samuel B. Griffith...Chicago: University of Illinois Press, 1961), 25, 42.The works of Sun Tzu and Mao Tse -Tung both illustrate aspects of this concept. In a work...toreador’s cape, not the toreador himself. - Norman B. Hannah, The Key to Failure: Laos and the Vietnam War114 Against the backdrop of the Cold

  16. Warfare, genocide, and ethnic conflict: a Darwinian approach

    OpenAIRE

    Dimijian, Gregory G.

    2010-01-01

    As the 21st century dawns, I reflect on the history of humankind with growing concern about the need to understand the underlying biological and cultural roots of ethnic conflict and warfare. In the many studies of human conflict, innate biological predispositions have been neglected. This article is the third part of a series of seminars for medical residents at the University of Texas Southwestern Medical School at Dallas (see http://adarwinstudygroup.org/). The series starts with in-depth ...

  17. Numerical simulation of RCS for carrier electronic warfare airplanes

    OpenAIRE

    Yue Kuizhi; Liu Wenlin; Li Guanxiong; Ji Jinzu; Yu Dazhao

    2015-01-01

    This paper studies the radar cross section (RCS) of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carr...

  18. Annihilation Prediction for Lanchester-Type Models of Modern Warfare

    OpenAIRE

    Brown, G.G.; Taylor, J.

    1983-01-01

    Operations Research, 31, p.752. This paper introduces important new functions for analytic solution of Launch-ester-type equations of modern warfare for combat between two homogeneous forces modeled by power attrtition-rate coefficients with "no offset". Tabulations of these Lanchester-Clifford-Schlatii (or LCS) functions allow one to study this particular variable-coefficient model almost as easily and thoroughly as Lanchester's classic constant-coefficient one. LCS functions allow one ...

  19. Hungarys Alternative to Counter Hybrid Warfare - Small States Weaponized Citizenry

    Science.gov (United States)

    2017-06-09

    said “Resilience as a terminological and operational factor, will become the newest ‘ brand ’ and communication name for the Alliance.”70 He also...audiences to influence their emotions , motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and...so-called influence warfare. His study pinpointed the importance of emotion over rational facts in messages. Second, Edward Lucas and Ben Nimmo on

  20. Recent Advances in Decontamination of Chemical Warfare Agents

    OpenAIRE

    Abdul Wadood Khan; Sabna Kotta; Shahid Husain Ansari; Javed Ali; Rakesh Kumar Sharma

    2013-01-01

    The recent turmoil and volatile situation in many countries and the increased risk of terrorist activities have raised alarm bells for the field of defense against toxic chemical/materials. These situations poses threats to society as terrorists can take advantage of such situations to strike and cause public mayhem. A number of chemicals have the potential of being used as chemical warfare (CW) agents. CW agents could immediately kill or incapacitate the affected individuals even when they a...

  1. Cyber warfare:terms, issues, laws and controversies

    OpenAIRE

    Seviş, Kamile Nur; Şeker, Ensar

    2016-01-01

    Recent years have shown us the importance of cybersecurity. Especially, when the matter is national security, it is even more essential and crucial. Increasing cyber attacks, especially between countries in governmental level, created a new term cyber warfare. Creating some rules and regulations for this kind of war is necessary therefore international justice systems are working on it continuously. In this paper, we mentioned fundamental terms of cyber...

  2. Littoral Combat Ship Open Ocean Anti-Submarine Warfare

    Science.gov (United States)

    2014-06-01

    maintain stealth and its defense in order to properly conduct an attack on a surface vessel (Sternhell and Thorndike 2014, 102). This statement...its target, the surface combatants can counter by increasing their speed (Sternhell and Thorndike 2014). While the maximum speed of the current...120316_PS.pdf Sternhell, Charles M, and Alan M Thorndike . 2014. “Antisubmarine Warfare in World War II.” CNA Analysis & Solutions. Accessed April 14, 2014

  3. Geostatistical regularization operators for geophysical inverse problems on irregular meshes

    Science.gov (United States)

    Jordi, C.; Doetsch, J.; Günther, T.; Schmelzbach, C.; Robertsson, J. OA

    2018-05-01

    Irregular meshes allow to include complicated subsurface structures into geophysical modelling and inverse problems. The non-uniqueness of these inverse problems requires appropriate regularization that can incorporate a priori information. However, defining regularization operators for irregular discretizations is not trivial. Different schemes for calculating smoothness operators on irregular meshes have been proposed. In contrast to classical regularization constraints that are only defined using the nearest neighbours of a cell, geostatistical operators include a larger neighbourhood around a particular cell. A correlation model defines the extent of the neighbourhood and allows to incorporate information about geological structures. We propose an approach to calculate geostatistical operators for inverse problems on irregular meshes by eigendecomposition of a covariance matrix that contains the a priori geological information. Using our approach, the calculation of the operator matrix becomes tractable for 3-D inverse problems on irregular meshes. We tested the performance of the geostatistical regularization operators and compared them against the results of anisotropic smoothing in inversions of 2-D surface synthetic electrical resistivity tomography (ERT) data as well as in the inversion of a realistic 3-D cross-well synthetic ERT scenario. The inversions of 2-D ERT and seismic traveltime field data with geostatistical regularization provide results that are in good accordance with the expected geology and thus facilitate their interpretation. In particular, for layered structures the geostatistical regularization provides geologically more plausible results compared to the anisotropic smoothness constraints.

  4. Total edge irregularity strength of (n,t)-kite graph

    Science.gov (United States)

    Winarsih, Tri; Indriati, Diari

    2018-04-01

    Let G(V, E) be a simple, connected, and undirected graph with vertex set V and edge set E. A total k-labeling is a map that carries vertices and edges of a graph G into a set of positive integer labels {1, 2, …, k}. An edge irregular total k-labeling λ :V(G)\\cup E(G)\\to \\{1,2,\\ldots,k\\} of a graph G is a labeling of vertices and edges of G in such a way that for any different edges e and f, weights wt(e) and wt(f) are distinct. The weight wt(e) of an edge e = xy is the sum of the labels of vertices x and y and the label of the edge e. The total edge irregularity strength of G, tes(G), is defined as the minimum k for which a graph G has an edge irregular total k-labeling. An (n, t)-kite graph consist of a cycle of length n with a t-edge path (the tail) attached to one vertex of a cycle. In this paper, we investigate the total edge irregularity strength of the (n, t)-kite graph, with n > 3 and t > 1. We obtain the total edge irregularity strength of the (n, t)-kite graph is tes((n, t)-kite) = \\lceil \\frac{n+t+2}{3}\\rceil .

  5. Chemical warfare agents identification by thermal neutron detection

    International Nuclear Information System (INIS)

    Liu Boxue; Ai Xianyun; Tan Daoyuan; Zhang Dianqin

    2000-01-01

    The hydrogen concentration determination by thermal neutron detection is a non-destructive, fast and effective method to identify chemical warfare agents and TNT that contain different hydrogen fraction. When an isotropic neutron source is used to irradiate chemical ammunition, hydrogen atoms of the agent inside shell act as a moderator and slow down neutrons. The number of induced thermal neutrons depends mainly upon hydrogen content of the agent. Therefore measurement of thermal neutron influence can be used to determine hydrogen atom concentration, thereby to determine the chemical warfare agents. Under a certain geometry three calibration curves of count rate against hydrogen concentration were measured. According to the calibration curves, response of a chemical agent or TNT could be calculated. Differences of count rate among chemical agents and TNT for each kind of shells is greater than five times of standard deviations of count rate for any agent, so chemical agents or TNT could be identified correctly. Meanwhile, blast tube or liquid level of chemical warfare agent could affect the response of thermal neutron count rate, and thereby the result of identification. (author)

  6. Quality of Life in Iranian Chemical Warfare Veteran's.

    Science.gov (United States)

    Ebadi, Abbas; Moradian, Tayeb; Mollahadi, Mohsen; Saeed, Yaser; Refahi, Ali Akbar

    2014-05-01

    Mustard gas has different effects on different body systems such as respiratory tract, blood, gastrointestinal, skin, eye, endocrine and peripheral nervous system. The purpose of this study was to determine the quality of life in chemical warfare veterans due to sulfur mustard exposure. In a cross-sectional and analytic study, 242 patients who had a chemical injury during the Iran-Iraq war (1980-1983) and their lung damage was proven were investigated in our study. The quality of life was measured in these patients using an extensively validated Iranian version of SF-36. The mean age of veterans was 44.12 ± 4.9 ranging from 22 to 62 years. Our results showed that chemical warfare had a decreased quality of life in all subscales of the SF-36. The lowest scores in SF-36 subscales were related to role physical and general health. The data also showed a significant relationship between the number of organs involved and the quality of life in these patients (P chemical warfare survivors suffering from late complications have a low health related quality of life.

  7. On the Automatic Parallelization of Sparse and Irregular Fortran Programs

    Directory of Open Access Journals (Sweden)

    Yuan Lin

    1999-01-01

    Full Text Available Automatic parallelization is usually believed to be less effective at exploiting implicit parallelism in sparse/irregular programs than in their dense/regular counterparts. However, not much is really known because there have been few research reports on this topic. In this work, we have studied the possibility of using an automatic parallelizing compiler to detect the parallelism in sparse/irregular programs. The study with a collection of sparse/irregular programs led us to some common loop patterns. Based on these patterns new techniques were derived that produced good speedups when manually applied to our benchmark codes. More importantly, these parallelization methods can be implemented in a parallelizing compiler and can be applied automatically.

  8. Measurement of Dynamic Friction Coefficient on the Irregular Free Surface

    International Nuclear Information System (INIS)

    Yeom, S. H.; Seo, K. S.; Lee, J. H.; Lee, K. H.

    2007-01-01

    A spent fuel storage cask must be estimated for a structural integrity when an earthquake occurs because it freely stands on ground surface without a restriction condition. Usually the integrity estimation for a seismic load is performed by a FEM analysis, the friction coefficient for a standing surface is an important parameter in seismic analysis when a sliding happens. When a storage cask is placed on an irregular ground surface, measuring a friction coefficient of an irregular surface is very difficult because the friction coefficient is affected by the surface condition. In this research, dynamic friction coefficients on the irregular surfaces between a concrete cylinder block and a flat concrete slab are measured with two methods by one direction actuator

  9. NEOWISE: OBSERVATIONS OF THE IRREGULAR SATELLITES OF JUPITER AND SATURN

    Energy Technology Data Exchange (ETDEWEB)

    Grav, T. [Planetary Science Institute, Tucson, AZ 85719 (United States); Bauer, J. M.; Mainzer, A. K.; Masiero, J. R.; Sonnett, S.; Kramer, E. [Jet Propulsion Laboratory, California Institute of Technology, Pasadena, CA 91109 (United States); Nugent, C. R.; Cutri, R. M., E-mail: tgrav@psi.edu [Infrared Processing and Analysis Center, California Institute of Technology, Pasadena, CA 91125 (United States)

    2015-08-10

    We present thermal model fits for 11 Jovian and 3 Saturnian irregular satellites based on measurements from the WISE/NEOWISE data set. Our fits confirm spacecraft-measured diameters for the objects with in situ observations (Himalia and Phoebe) and provide diameters and albedo for 12 previously unmeasured objects, 10 Jovian and 2 Saturnian irregular satellites. The best-fit thermal model beaming parameters are comparable to what is observed for other small bodies in the outer solar system, while the visible, W1, and W2 albedos trace the taxonomic classifications previously established in the literature. Reflectance properties for the irregular satellites measured are similar to the Jovian Trojan and Hilda Populations, implying common origins.

  10. Bottomside sinusoidal irregularities in the equatorial F region

    Science.gov (United States)

    Valladares, C. E.; Hanson, W. B.; Mcclure, J. P.; Cragin, B. L.

    1983-01-01

    By using the Ogo 6 satellite, McClure and Hanson (1973) have discovered sinusoidal irregularities in the equatorial F region ion number density. In the present investigation, a description is provided of the properties of a distinct category of sinusoidal irregularities found in equatorial data from the AE-C and AE-E satellites. The observed scale sizes vary from about 300 m to 3 km in the direction perpendicular to B, overlapping with and extending the range observed by using Ogo 6. Attention is given to low and high resolution data, a comparison with Huancayo ionograms, the confinement of 'bottomside sinusoidal' (BSS) irregularities essentially to the bottomside of the F layer, spectral characteristics, and BSS, scintillation, and ionosonde observations.

  11. Irregular flowering patterns in terrestrial orchids: theories vs. empirical data

    Directory of Open Access Journals (Sweden)

    P. Kindlmann

    2001-11-01

    Full Text Available Empirical data on many species of terrestrial orchids suggest that their between-year flowering pattern is extremely irregular and unpredictable. A long search for the reason has hitherto proved inconclusive. Here we summarise and critically review the hypotheses that were put forward as explanations of this phenomenon: irregular flowering was attributed to costs associated with sexual reproduction, to herbivory, or to the chaotic behaviour of the system represented by difference equations describing growth of the vegetative and reproductive organs. None of these seems to explain fully the events of a transition from flowering one year to sterility or absence the next year. Data on the seasonal growth of leaves and inflorescence of two terrestrial orchid species, Epipactis albensis and Dactylorhiza fuchsii and our previous results are then used here to fill gaps in what has been published until now and to test alternative explanations of the irregular flowering patterns of orchids.

  12. Track Irregularity Time Series Analysis and Trend Forecasting

    Directory of Open Access Journals (Sweden)

    Jia Chaolong

    2012-01-01

    Full Text Available The combination of linear and nonlinear methods is widely used in the prediction of time series data. This paper analyzes track irregularity time series data by using gray incidence degree models and methods of data transformation, trying to find the connotative relationship between the time series data. In this paper, GM (1,1 is based on first-order, single variable linear differential equations; after an adaptive improvement and error correction, it is used to predict the long-term changing trend of track irregularity at a fixed measuring point; the stochastic linear AR, Kalman filtering model, and artificial neural network model are applied to predict the short-term changing trend of track irregularity at unit section. Both long-term and short-term changes prove that the model is effective and can achieve the expected accuracy.

  13. Exploring Manycore Multinode Systems for Irregular Applications with FPGA Prototyping

    Energy Technology Data Exchange (ETDEWEB)

    Ceriani, Marco; Palermo, Gianluca; Secchi, Simone; Tumeo, Antonino; Villa, Oreste

    2013-04-29

    We present a prototype of a multi-core architecture implemented on FPGA, designed to enable efficient execution of irregular applications on distributed shared memory machines, while maintaining high performance on regular workloads. The architecture is composed of off-the-shelf soft-core cores, local interconnection and memory interface, integrated with custom components that optimize it for irregular applications. It relies on three key elements: a global address space, multithreading, and fine-grained synchronization. Global addresses are scrambled to reduce the formation of network hot-spots, while the latency of the transactions is covered by integrating an hardware scheduler within the custom load/store buffers to take advantage from the availability of multiple executions threads, increasing the efficiency in a transparent way to the application. We evaluated a dual node system irregular kernels showing scalability in the number of cores and threads.

  14. Dominant Land Forces for 21st Century Warfare

    National Research Council Canada - National Science Library

    Degen, Edmund J

    2007-01-01

    The most likely threats over the near and mid terms are irregular forces operating predominantly on the ground in complex urban environments, with the potential of being equipped with weapons of mass destruction...

  15. Criticality predicts maximum irregularity in recurrent networks of excitatory nodes.

    Directory of Open Access Journals (Sweden)

    Yahya Karimipanah

    Full Text Available A rigorous understanding of brain dynamics and function requires a conceptual bridge between multiple levels of organization, including neural spiking and network-level population activity. Mounting evidence suggests that neural networks of cerebral cortex operate at a critical regime, which is defined as a transition point between two phases of short lasting and chaotic activity. However, despite the fact that criticality brings about certain functional advantages for information processing, its supporting evidence is still far from conclusive, as it has been mostly based on power law scaling of size and durations of cascades of activity. Moreover, to what degree such hypothesis could explain some fundamental features of neural activity is still largely unknown. One of the most prevalent features of cortical activity in vivo is known to be spike irregularity of spike trains, which is measured in terms of the coefficient of variation (CV larger than one. Here, using a minimal computational model of excitatory nodes, we show that irregular spiking (CV > 1 naturally emerges in a recurrent network operating at criticality. More importantly, we show that even at the presence of other sources of spike irregularity, being at criticality maximizes the mean coefficient of variation of neurons, thereby maximizing their spike irregularity. Furthermore, we also show that such a maximized irregularity results in maximum correlation between neuronal firing rates and their corresponding spike irregularity (measured in terms of CV. On the one hand, using a model in the universality class of directed percolation, we propose new hallmarks of criticality at single-unit level, which could be applicable to any network of excitable nodes. On the other hand, given the controversy of the neural criticality hypothesis, we discuss the limitation of this approach to neural systems and to what degree they support the criticality hypothesis in real neural networks. Finally

  16. Propagation and scattering of electromagnetic waves by the ionospheric irregularities

    International Nuclear Information System (INIS)

    Ho, A.Y.; Kuo, S.P.; Lee, M.C.

    1993-01-01

    The problem of wave propagation and scattering in the ionosphere is particularly important in the areas of communications, remote-sensing and detection. The ionosphere is often perturbed with coherently structured (quasiperiodic) density irregularities. Experimental observations suggest that these irregularities could give rise to significant ionospheric effect on wave propagation such as causing spread-F of the probing HF sounding signals and scintillation of beacon satellite signals. It was show by the latter that scintillation index S 4 ∼ 0.5 and may be as high as 0.8. In this work a quasi-particle theory is developed to study the scintillation phenomenon. A Wigner distribution function for the wave intensity in the (k,r) space is introduced and its governing equation is derived with an effective collision term giving rise to the attenuation and scattering of the wave. This kinetic equation leads to a hierarchy of moment equations in r space. This systems of equations is then truncated to the second moment which is equivalent to assuming a cold quasi-particle distribution In this analysis, the irregularities are modeled as a two dimensional density modulation on an uniform background plasma. The analysis shows that this two dimensional density grating, effectively modulates the intensity of the beacon satellite signals. This spatial modulation of the wave intensity is converted into time modulation due to the drift of the ionospheric irregularities, which then contributes to the scintillation of the beacon satellite signals. Using the proper plasma parameters and equatorial measured data of irregularities, it is shown that the scintillation index defined by S4=( 2 >- 2 )/ 2 where stands for spatial average over an irregularity wavelength is in the range of the experimentally detected values

  17. Irregular Shaped Building Design Optimization with Building Information Modelling

    Directory of Open Access Journals (Sweden)

    Lee Xia Sheng

    2016-01-01

    Full Text Available This research is to recognise the function of Building Information Modelling (BIM in design optimization for irregular shaped buildings. The study focuses on a conceptual irregular shaped “twisted” building design similar to some existing sculpture-like architectures. Form and function are the two most important aspects of new buildings, which are becoming more sophisticated as parts of equally sophisticated “systems” that we are living in. Nowadays, it is common to have irregular shaped or sculpture-like buildings which are very different when compared to regular buildings. Construction industry stakeholders are facing stiff challenges in many aspects such as buildability, cost effectiveness, delivery time and facility management when dealing with irregular shaped building projects. Building Information Modelling (BIM is being utilized to enable architects, engineers and constructors to gain improved visualization for irregular shaped buildings; this has a purpose of identifying critical issues before initiating physical construction work. In this study, three variations of design options differing in rotating angle: 30 degrees, 60 degrees and 90 degrees are created to conduct quantifiable comparisons. Discussions are focused on three major aspects including structural planning, usable building space, and structural constructability. This research concludes that Building Information Modelling is instrumental in facilitating design optimization for irregular shaped building. In the process of comparing different design variations, instead of just giving “yes or no” type of response, stakeholders can now easily visualize, evaluate and decide to achieve the right balance based on their own criteria. Therefore, construction project stakeholders are empowered with superior evaluation and decision making capability.

  18. Low frequency sound reproduction in irregular rooms using CABS (Control Acoustic Bass System)

    DEFF Research Database (Denmark)

    Celestinos, Adrian; Nielsen, Sofus Birkedal

    2011-01-01

    of an irregular room model using the FDTD (Finite Difference Time Domain) method has been presented. CABS has been simulated in the irregular room model. Measurements of CABS in a real irregular room have been performed. The performance of CABS was affected by the irregular shape of the room due to the corner...

  19. Characterizing spontaneous irregular behavior in coupled map lattices

    International Nuclear Information System (INIS)

    Dobyns, York; Atmanspacher, Harald

    2005-01-01

    Two-dimensional coupled map lattices display, in a specific parameter range, a stable phase (quasi-) periodic in both space and time. With small changes to the model parameters, this stable phase develops spontaneous eruptions of non-periodic behavior. Although this behavior itself appears irregular, it can be characterized in a systematic fashion. In particular, parameter-independent features of the spontaneous eruptions may allow useful empirical characterizations of other phenomena that are intrinsically hard to predict and reproduce. Specific features of the distributions of lifetimes and emergence rates of irregular states display such parameter-independent properties

  20. Characterizing spontaneous irregular behavior in coupled map lattices

    Energy Technology Data Exchange (ETDEWEB)

    Dobyns, York [PEAR, Princeton University Princeton, NJ 08544-5263 (United States); Atmanspacher, Harald [Institut fuer Grenzgebiete der Psychologie und Psychohygiene Wilhelmstrasse 3a, Freiburg 79098 (Germany)]. E-mail: haa@igpp.de

    2005-04-01

    Two-dimensional coupled map lattices display, in a specific parameter range, a stable phase (quasi-) periodic in both space and time. With small changes to the model parameters, this stable phase develops spontaneous eruptions of non-periodic behavior. Although this behavior itself appears irregular, it can be characterized in a systematic fashion. In particular, parameter-independent features of the spontaneous eruptions may allow useful empirical characterizations of other phenomena that are intrinsically hard to predict and reproduce. Specific features of the distributions of lifetimes and emergence rates of irregular states display such parameter-independent properties.

  1. [Artificial cycle therapy of acupuncture and moxibustion for irregular menstruation].

    Science.gov (United States)

    Wu, Jie; Yang, Lijie; Chen, Yajie; Li, Qing; Chen, Lin

    2015-03-01

    Through the discussion on TCM physiological characters of females in follicular, ovulatory, luteal and menstrual phases and treatment principles, the clinical application of artificial cycle therapy of acupuncture and moxibustion was introduced for irregular menstruation and the typical cases were attached. It is suggested that the menstrual cycle follows the growth-consumption rule of yin, yang, qi and blood. The corresponding treatment principles should be applied in accordance with the change rule of menstrual cycle. Hence, it is worth to adopt the artificial cycle therapy of acupuncture and moxibustion for irregular menstruation in clinical application.

  2. Uniform irradiation of irregularly shaped cavities for photodynamic therapy.

    Science.gov (United States)

    Rem, A I; van Gemert, M J; van der Meulen, F W; Gijsbers, G H; Beek, J F

    1997-03-01

    It is difficult to achieve a uniform light distribution in irregularly shaped cavities. We have conducted a study on the use of hollow 'integrating' moulds for more uniform light delivery of photodynamic therapy in irregularly shaped cavities such as the oral cavity. Simple geometries such as a cubical box, a sphere, a cylinder and a 'bottle-neck' geometry have been investigated experimentally and the results have been compared with computed light distributions obtained using the 'radiosity method'. A high reflection coefficient of the mould and the best uniform direct irradiance possible on the inside of the mould were found to be important determinants for achieving a uniform light distribution.

  3. Program specialization

    CERN Document Server

    Marlet, Renaud

    2013-01-01

    This book presents the principles and techniques of program specialization - a general method to make programs faster (and possibly smaller) when some inputs can be known in advance. As an illustration, it describes the architecture of Tempo, an offline program specializer for C that can also specialize code at runtime, and provides figures for concrete applications in various domains. Technical details address issues related to program analysis precision, value reification, incomplete program specialization, strategies to exploit specialized program, incremental specialization, and data speci

  4. United States Coast Guard Antisubmarine Warfare (ASW) in the Maritime Defense Zone (MDZ) - A Strategic Approach

    Science.gov (United States)

    1989-03-01

    RIC ILE COPY AIR WAR COLLGE REEAC R~pCR UNITED STATES COAST GUARD ANTISUBMARINE WARFARE (ASW) IN THE MARITIME DEFENSE ZONE (MDZ) -A STRATEGIC...going to perform in these MDZs. Those tasks identified so far include: port and coastal physical security & preventive safety, mine warfare

  5. The Utility of Freedom: A Principal-Agent Model for Unconventional Warfare

    Science.gov (United States)

    2011-06-01

    Lanchester Model of Guerrilla Warfare,‖ Operations Research 10, no. 6 (December 1962): 818–827; William A. Niskanen, ―Review: The Economics of Insurgency...http://galenet.galegroup.com/servlet/DDRS?locID=navalps. Deitchman, S. J. ―A Lanchester Model of Guerrilla Warfare.‖ Operations Research 10, no

  6. Understanding the elementary considerations in a network warfare environment: an introductory framework

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available . It seeks to offer a better introductory understanding to the field of network warfare. This paper addresses the requirements for a network warfare capability and will look at the high-level approach, constraints, focus areas, levels, techniques...

  7. Metal organic frameworks for the catalytic detoxification of chemical warfare nerve agents

    Science.gov (United States)

    Hupp, Joseph T.; Farha, Omar K.; Katz, Michael J.; Mondloch, Joseph E.

    2017-04-18

    A method of using a metal organic framework (MOF) comprising a metal ion and an at least bidendate organic ligand to catalytically detoxify chemical warfare nerve agents including exposing the metal-organic-framework (MOF) to the chemical warfare nerve agent and catalytically decomposing the nerve agent with the MOF.

  8. Study on the identification method of chemical warfare agents with spectroscopy of neutron induced γ rays

    International Nuclear Information System (INIS)

    Liu Boxue; Li Yun; Li Xiangbao

    1996-01-01

    The paper briefly describes some non-destructive verification technologies of chemical warfare agents in-site, and some application of neutron induced gamma ray analysis, such as multi-elements analysis of coal, hidden explosive detection and identification of chemical agents. It also describes some problems in developing the portable isotopic neutron spectroscopy for non-destructive evaluation of chemical warfare agents

  9. Antidotes and treatments for chemical warfare/terrorism agents: an evidence-based review.

    Science.gov (United States)

    Rodgers, G C; Condurache, C T

    2010-09-01

    This article reviews the evidence supporting the efficacy of antidotes used or recommended for the potential chemical warfare agents of most concern. Chemical warfare agents considered include cyanide, vesicants, pulmonary irritants such as chlorine and phosgene, and nerve agents. The strength of evidence for most antidotes is weak, highlighting the need for additional research in this area.

  10. Status of dental health in chemical warfare victims: The case of Isfahan, Iran

    Directory of Open Access Journals (Sweden)

    Ahmad Mottaghi

    2012-01-01

    Conclusion: Chemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  11. Any Time, Any Place, Any Gender The Risks and Rewards of Integrating Females into Special Operations Forces

    Science.gov (United States)

    2015-06-02

    Service report to Congress in 1987, subsequently published commercially as John Collins, Green Berets, SEALs, and Spetsnaz: US & Soviet Special...warfare activities are their Special Forces (SF), more commonly known as “ Green Berets” due their specific cultural artifact, with the assistance of CA...2004. Howarth, Patrick. Undercover: The Men and Women of the Special Operations Executive. London, UK: Routledge and Kegan Paul, 1980. Howes, Ruth

  12. Runtime buffer management to improve the performance in irregular ...

    Indian Academy of Sciences (India)

    S¯adhan¯a Vol. 40, Part 4, June 2015, pp. 1117–1137. c Indian Academy of Sciences. Runtime buffer management to improve the performance in irregular Network-on-Chip architecture. UMAMAHESWARI S1,∗, MEGANATHAN D2 and. RAJA PAUL PERINBAM J3. 1Department of Information Technology, Anna University, ...

  13. Structure Irregularity Impedes Drop Roll-Off at Superhydrophobic Surfaces

    DEFF Research Database (Denmark)

    Larsen, Simon Tylsgaard; Andersen, Nis Korsgaard; Søgaard, Emil

    2014-01-01

    -off angles is found to be caused by a decrease of the receding contact angle, which in turn is caused by an increase of the triple phase contact line of the drops for those more irregular surfaces. To understand the observation, we propose to treat the microdrops as rigid bodies and apply a torque balance...

  14. The regularized monotonicity method: detecting irregular indefinite inclusions

    DEFF Research Database (Denmark)

    Garde, Henrik; Staboulis, Stratos

    2018-01-01

    inclusions, where the conductivity distribution has both more and less conductive parts relative to the background conductivity; one such method is the monotonicity method of Harrach, Seo, and Ullrich. We formulate the method for irregular indefinite inclusions, meaning that we make no regularity assumptions...

  15. Size and Albedo of Irregular Saturnian Satellites from Spitzer Observations

    NARCIS (Netherlands)

    Mueller, Michael; Grav, T.; Trilling, D.; Stansberry, J.; Sykes, M.

    2008-01-01

    Using MIPS onboard the Spitzer Space Telescope, we observed the thermal emission (24 and, for some targets, 70 um) of eight irregular satellites of Saturn: Albiorix, Siarnaq, Paaliaq, Kiviuq, Ijiraq, Tarvos, Erriapus, and Ymir. We determined the size and albedo of all targets. An analysis of

  16. Convection-diffusion lattice Boltzmann scheme for irregular lattices

    NARCIS (Netherlands)

    Sman, van der R.G.M.; Ernst, M.H.

    2000-01-01

    In this paper, a lattice Boltzmann (LB) scheme for convection diffusion on irregular lattices is presented, which is free of any interpolation or coarse graining step. The scheme is derived using the axioma that the velocity moments of the equilibrium distribution equal those of the

  17. Swiveling Lathe Jaw Concept for Holding Irregular Pieces

    Science.gov (United States)

    David, J.

    1966-01-01

    Clamp holds irregularly shaped pieces in lathe chuck without damage and eliminates excessive time in selecting optimum mounting. Interchangeable jaws ride in standard jaw slots but swivel so that the jaw face bears evenly against the workpiece regardless of contour. The jaws can be used on both engine and turret lathes.

  18. Why type 2 supernovae do not explode in irregular galaxies

    International Nuclear Information System (INIS)

    Shklovskij, I.S.

    1984-01-01

    The conclusion is drawn that reason for an absence of type 2 supernovae explosions in irregular galaxies is their peculiar chemical composition. The observed lack of stellar wind from massive hot giants is due to relatively low heavy element abundance. For this reason evolving massive stars do not form an extended dense envelopes that is a necessary condition for the type 2 supernova phenomenon

  19. First stellar abundances in the dwarf irregular galaxy Sextans A

    NARCIS (Netherlands)

    Kaufer, A; Venn, KA; Tolstoy, E; Pinte, C; Kudritzki, RP

    We present the abundance analyses of three isolated A-type supergiant stars in the dwarf irregular galaxy Sextans A (= DDO 75) from high-resolution spectra obtained with the Ultraviolet-Visual Echelle Spectrograph (UVES) on the Kueyen telescope (UT2) of the ESO Very Large Telescope (VLT). Detailed

  20. Spectral element method for wave propagation on irregular domains

    Indian Academy of Sciences (India)

    Yan Hui Geng

    2018-03-14

    Mar 14, 2018 ... Abstract. A spectral element approximation of acoustic propagation problems combined with a new mapping method on irregular domains is proposed. Following this method, the Gauss–Lobatto–Chebyshev nodes in the standard space are applied to the spectral element method (SEM). The nodes in the ...

  1. On the Total Edge Irregularity Strength of Generalized Butterfly Graph

    Science.gov (United States)

    Dwi Wahyuna, Hafidhyah; Indriati, Diari

    2018-04-01

    Let G(V, E) be a connected, simple, and undirected graph with vertex set V and edge set E. A total k-labeling is a map that carries vertices and edges of a graph G into a set of positive integer labels {1, 2, …, k}. An edge irregular total k-labeling λ: V(G) ∪ E(G) → {1, 2, …, k} of a graph G is a total k-labeling such that the weights calculated for all edges are distinct. The weight of an edge uv in G, denoted by wt(uv), is defined as the sum of the label of u, the label of v, and the label of uv. The total edge irregularity strength of G, denoted by tes(G), is the minimum value of the largest label k over all such edge irregular total k-labelings. A generalized butterfly graph, BFn , obtained by inserting vertices to every wing with assumption that sum of inserting vertices to every wing are same then it has 2n + 1 vertices and 4n ‑ 2 edges. In this paper, we investigate the total edge irregularity strength of generalized butterfly graph, BFn , for n > 2. The result is tes(B{F}n)=\\lceil \\frac{4n}{3}\\rceil .

  2. On a new process for cusp irregularity production

    Directory of Open Access Journals (Sweden)

    H. C. Carlson

    2008-09-01

    Full Text Available Two plasma instability mechanisms were thought until 2007 to dominate the formation of plasma irregularities in the F region high latitude and polar ionosphere; the gradient-drift driven instability, and the velocity-shear driven instability. The former mechanism was accepted as accounting for plasma structuring in polar cap patches, the latter for plasma structuring in polar cap sun aligned arcs. Recent work has established the need to replace this view of the past two decades with a new patch plasma structuring process (not a new mechanism, whereby shear-driven instabilities first rapidly structure the entering plasma, after which gradient drift instabilities build on these large "seed" irregularities. Correct modeling of cusp and early polar cap patch structuring will not be accomplished without allowing for this compound process. This compound process explains several previously unexplained characteristics of cusp and early polar cap patch irregularities. Here we introduce additional data, coincident in time and space, to extend that work to smaller irregularity scale sizes and relate it to the structured cusp current system.

  3. Irregular ionization and scintillation of the ionosphere in equator region

    International Nuclear Information System (INIS)

    Shinno, Kenji

    1974-01-01

    The latest studies on the scintillation in satellite communication and its related irregularities of ionosphere are reviewed. They were made clear by means of spread-F, the direct measurement with scientific satellites, VHF radar observation, and radio wave propagation in equator region. The fundamental occurrence mechanism may be instability of plasma caused by the interaction of movement of neutral atmosphere and magnetic field. Comparison of the main characteristics of scintillation, namely the dependence on region, solar activity, season, local time, geomagnetic activity, movement in ionosphere, scattering source, frequency and transmission mode, was made and the correlation among spread-F, TEP and scintillation was summarized. The latest principal studies were the observations made by Intelsat and by ATS. Scintillation of Syncom-3 and Intelsat-II-F2 and spread-F by ionosphere observation were compared by Huang. It is reasonable to consider that the occurrence of scintillation is caused by the irregularities in ionosphere which are particular in equator region, because of the similar characteristics of spread-F and VHF propagation in the equator region. These three phenomena may occur in relation to the irregularities of ionosphere. Interpretation of spread-F and the abnormal propagation wave across the equator are given. The study using VHF radar and the movement of irregular ionization by the direct observation with artificial satellites are reviewd. (Iwakiri, K.)

  4. Third-order theory for multi-directional irregular waves

    DEFF Research Database (Denmark)

    Madsen, Per A.; Fuhrman, David R.

    2012-01-01

    A new third-order solution for multi-directional irregular water waves in finite water depth is presented. The solution includes explicit expressions for the surface elevation, the amplitude dispersion and the vertical variation of the velocity potential. Expressions for the velocity potential at...

  5. Irregular menses: an independent risk factor for gestational diabetes mellitus.

    Science.gov (United States)

    Haver, Mary Claire; Locksmith, Gregory J; Emmet, Emily

    2003-05-01

    Our purpose was to determine whether a history of irregular menses predicts gestational diabetes mellitus independently of traditional risk factors. We analyzed demographic characteristics, body mass index, and menstrual history of 85 pregnant women with gestational diabetes mellitus and compared them with 85 systematically selected control subjects who were matched for age, race, and delivery year. Subjects with pregestational diabetes mellitus, previous gestational diabetes mellitus, family history of diabetes mellitus, weight >200 pounds, previous macrosomic infants, or previous stillbirth were excluded. Demographic characteristics between case and control groups were similar. Mean body mass index was higher among cases (26.5 kg/m(2)) versus control subjects (24.5 kg/m(2), P =.004). Irregular cycles were more prevalent in the cases (24% vs 7%, P =.006). With the use of body mass index as a stratification factor, menstrual irregularity maintained a strong association with gestational diabetes mellitus (P =.014). A history of irregular menstrual cycles was a significant independent predictor of gestational diabetes mellitus. If selective screening is implemented for gestational diabetes mellitus, such history should be considered in the decision of whom to test.

  6. Spectral element method for wave propagation on irregular domains

    Indian Academy of Sciences (India)

    A spectral element approximation of acoustic propagation problems combined with a new mapping method on irregular domains is proposed. Following this method, the Gauss–Lobatto–Chebyshev nodes in the standard space are applied to the spectral element method (SEM). The nodes in the physical space are ...

  7. Characteristics of low latitude ionospheric E-region irregularities ...

    Indian Academy of Sciences (India)

    154°E, dip angle = 37.3°, sub-ionospheric dip = 34°) have been analyzed to study the behaviour of ionospheric E-region irregularities during the active solar and magnetic periods. The autocorrelation functions, power spectral densities, signal de-correlation times are computed to study the temporal features of ionospheric ...

  8. Sexy is what you make it: organizational culture and U.S. Army Special Forces

    OpenAIRE

    Hawk, David L.

    2014-01-01

    Approved for public release; distribution is unlimited The U.S. Army Special Forces (SF) are the most highly trained, best equipped, and most seasoned soldiers to which the United States can turn to achieve national security objectives. The future, however, will require more indirect application of SF, through special warfare operations (e.g., UW, FID, etc.), in a host of hostile and undefined areas around the globe. This manner of employment is a change in emphasis from the direct combat ...

  9. Classical limit of irregular blocks and Mathieu functions

    International Nuclear Information System (INIS)

    Piątek, Marcin; Pietrykowski, Artur R.

    2016-01-01

    The Nekrasov-Shatashvili limit of the N = 2 SU(2) pure gauge (Ω-deformed) super Yang-Mills theory encodes the information about the spectrum of the Mathieu operator. On the other hand, the Mathieu equation emerges entirely within the frame of two-dimensional conformal field theory (2d CFT) as the classical limit of the null vector decoupling equation for some degenerate irregular block. Therefore, it seems to be possible to investigate the spectrum of the Mathieu operator employing the techniques of 2d CFT. To exploit this strategy, a full correspondence between the Mathieu equation and its realization within 2d CFT has to be established. In our previous paper http://dx.doi.org/10.1007/JHEP12(2014)032, we have found that the expression of the Mathieu eigenvalue given in terms of the classical irregular block exactly coincides with the well known weak coupling expansion of this eigenvalue in the case in which the auxiliary parameter is the noninteger Floquet exponent. In the present work we verify that the formula for the corresponding eigenfunction obtained from the irregular block reproduces the so-called Mathieu exponent from which the noninteger order elliptic cosine and sine functions may be constructed. The derivation of the Mathieu equation within the formalism of 2d CFT is based on conjectures concerning the asymptotic behaviour of irregular blocks in the classical limit. A proof of these hypotheses is sketched. Finally, we speculate on how it could be possible to use the methods of 2d CFT in order to get from the irregular block the eigenvalues of the Mathieu operator in other regions of the coupling constant.

  10. Comparison of correlation analysis techniques for irregularly sampled time series

    Directory of Open Access Journals (Sweden)

    K. Rehfeld

    2011-06-01

    Full Text Available Geoscientific measurements often provide time series with irregular time sampling, requiring either data reconstruction (interpolation or sophisticated methods to handle irregular sampling. We compare the linear interpolation technique and different approaches for analyzing the correlation functions and persistence of irregularly sampled time series, as Lomb-Scargle Fourier transformation and kernel-based methods. In a thorough benchmark test we investigate the performance of these techniques.

    All methods have comparable root mean square errors (RMSEs for low skewness of the inter-observation time distribution. For high skewness, very irregular data, interpolation bias and RMSE increase strongly. We find a 40 % lower RMSE for the lag-1 autocorrelation function (ACF for the Gaussian kernel method vs. the linear interpolation scheme,in the analysis of highly irregular time series. For the cross correlation function (CCF the RMSE is then lower by 60 %. The application of the Lomb-Scargle technique gave results comparable to the kernel methods for the univariate, but poorer results in the bivariate case. Especially the high-frequency components of the signal, where classical methods show a strong bias in ACF and CCF magnitude, are preserved when using the kernel methods.

    We illustrate the performances of interpolation vs. Gaussian kernel method by applying both to paleo-data from four locations, reflecting late Holocene Asian monsoon variability as derived from speleothem δ18O measurements. Cross correlation results are similar for both methods, which we attribute to the long time scales of the common variability. The persistence time (memory is strongly overestimated when using the standard, interpolation-based, approach. Hence, the Gaussian kernel is a reliable and more robust estimator with significant advantages compared to other techniques and suitable for large scale application to paleo-data.

  11. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  12. Getting the Next War Right: Beyond Population-centric Warfare

    Science.gov (United States)

    2010-06-01

    respectively: Che Guevara and Mao Tse -tung. Che’s foco theory, as we have discussed, advocates mobilizing from the top. The armed challenger chooses an...example, Thomas A. Marks, “Guerrillas in the Mist: Hmong Resistance Continues in Laos ,” Combat and Survival 8, no. 5 (August 1996), 4–11. 12 Theory and...Mao Tse -tung, On Guerrilla Warfare, trans. and ed. Samuel B. Grif!th (Mineola, NY: Dover Publications, 2005). The book is available from a wide

  13. Chemical and biological warfare. Should defenses be researched and deployed?

    Science.gov (United States)

    Orient, J M

    1989-08-04

    The threat of chemical and biological weapons of mass destruction has intensified because of improved delivery systems and advances in chemistry, genetics, and other sciences. Possible US responses to this threat include deterrence, defenses, and/or disarmament, including a reaffirmation of the Biological and Toxin Weapons Convention of 1972, which is now in jeopardy. This article discusses the history of chemical and biological warfare, existing and potential weapons, the proliferation of weapons and delivery systems, ways to prevent the use of these weapons, and ways to protect populations from their effects.

  14. Environmental assessments of sea dumped chemical warfare agents

    DEFF Research Database (Denmark)

    Sanderson, Hans; Fauser, Patrik

    This is a report on the information gathered during work related to sea dumped chemical warfare agents. It mainly reviews the work conducted in relation to the installation of the two Nord Stream gas pipeline from 2008-2012. The focus was on the weight-of-evidence risk assessment of disturbed CWA...... residues in connection with the installation of the pipelines. Novel exposure and toxicity assessments are presented and the risk is assessed. The overall conclusion is that there is a negligible acute added CWA risk towards the fish community from the installation of the pipelines....

  15. Ultraviolet Raman scattering from persistent chemical warfare agents

    Science.gov (United States)

    Kullander, Fredrik; Wästerby, Pär.; Landström, Lars

    2016-05-01

    Laser induced Raman scattering at excitation wavelengths in the middle ultraviolet was examined using a pulsed tunable laser based spectrometer system. Droplets of chemical warfare agents, with a volume of 2 μl, were placed on a silicon surface and irradiated with sequences of laser pulses. The Raman scattering from V-series nerve agents, Tabun (GA) and Mustard gas (HD) was studied with the aim of finding the optimum parameters and the requirements for a detection system. A particular emphasis was put on V-agents that have been previously shown to yield relatively weak Raman scattering in this excitation band.

  16. Specialization Patterns

    DEFF Research Database (Denmark)

    Schultz, Ulrik Pagh; Lawall, Julia Laetitia; Consel, Charles

    2000-01-01

    Design patterns offer many advantages for software development, but can introduce inefficiency into the final program. Program specialization can eliminate such overheads, but is most effective when targeted by the user to specific bottlenecks. Consequently, we propose that these concepts...... are complementary. Program specialization can optimize programs written using design patterns, and design patterns provide information about the program structure that can guide specialization. Concretely, we propose specialization patterns, which describe how to apply program specialization to optimize uses...... of design patterns. In this paper, we analyze the specialization opportunities provided by specific uses of design patterns. Based on the analysis of each design pattern, we define the associated specialization pattern. These specialization opportunities can be declared using the specialization classes...

  17. Localization in small fcc-particles with surface irregularities and disorder

    International Nuclear Information System (INIS)

    Bucher, J.P.; Bloomfield, L.A.

    1991-01-01

    A numerical eigenvector analysis is used to investigate Anderson localization in small fcc-particles of N = 309 and N = 147 atoms. Special attention is given to the way size and surface roughness of the particles influence the localization behavior. States begin to localize in a non-exponential regime several lattice spacings from the center of localization and finally converge to a fully exponentially-localized regime for strong disorder. For smooth surface particles, it is found that the states localize first at the band bottom and a mobility edge can clearly be defined for increasing disorder. This doesn't seem to be the case for the rougher particles, where the band middle and the band bottom show similar behavior towards localization. Although particles with surface irregularities show an onset of localization for smaller values of the disorder than smooth particles, the localization length is greater. (orig.)

  18. Status of dental health in chemical warfare victims: the case of Isfahan, Iran.

    Science.gov (United States)

    Mottaghi, Ahmad; Hoseinzade, Abolfath; Zamani, Elham; Araghizade, Habib Allah

    2012-01-01

    Little evidence is available regarding the dental health of victims of chemical warfare in Iran. Therefore, in this study, we examined the decayed, missing, and filled teeth index (DMFT), community periodontal index of treatment needs (CPITN), and saliva secretion rate of chemical warfare victims living in the province of Isfahan in Iran. This case-control study was conducted with 300 chemical warfare victims as the treatment group and 300 age-matched individuals without exposure to chemical warfare as the control group. DMFT and CPITN indices and saliva secretion rate were measured and compared between the two groups. Chemical warfare victims had significantly higher scores than the control group for decayed teeth (4.25 ± 3.88 vs 3.52 ± 2.81; P=0.009), missing teeth (8.79 ± 9.3 vs 6.15 ± 8.43; Pwarfare victims was significantly lower than that in the control group (1.71 ± 0.05 vs 3.85 ± 1.95 cc/5 min; PChemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  19. On-Site Detection as a Countermeasure to Chemical Warfare/Terrorism.

    Science.gov (United States)

    Seto, Y

    2014-01-01

    On-site monitoring and detection are necessary in the crisis and consequence management of wars and terrorism involving chemical warfare agents (CWAs) such as sarin. The analytical performance required for on-site detection is mainly determined by the fatal vapor concentration and volatility of the CWAs involved. The analytical performance for presently available on-site technologies and commercially available on-site equipment for detecting CWAs interpreted and compared in this review include: classical manual methods, photometric methods, ion mobile spectrometry, vibrational spectrometry, gas chromatography, mass spectrometry, sensors, and other methods. Some of the data evaluated were obtained from our experiments using authentic CWAs. We concluded that (a) no technologies perfectly fulfill all of the on-site detection requirements and (b) adequate on-site detection requires (i) a combination of the monitoring-tape method and ion-mobility spectrometry for point detection and (ii) a combination of the monitoring-tape method, atmospheric pressure chemical ionization mass spectrometry with counterflow introduction, and gas chromatography with a trap and special detectors for continuous monitoring. The basic properties of CWAs, the concept of on-site detection, and the sarin gas attacks in Japan as well as the forensic investigations thereof, are also explicated in this article. Copyright © 2014 Central Police University.

  20. Wettability measurements of irregular shapes with Wilhelmy plate method

    Science.gov (United States)

    Park, Jaehyung; Pasaogullari, Ugur; Bonville, Leonard

    2018-01-01

    One of the most accurate methods for measuring the dynamic contact angle of liquids on solid surfaces is the Wilhelmy plate method. This method generally requires the use of rectangular samples having a constant perimeter in the liquid during advancing and receding cycles. A new formulation based on the Wilhelmy force balance equation to determine the contact angle for plate samples with irregular shapes has been developed. This method employs a profile plot obtained from an optical image to determine the perimeter (i.e. wetted length) of the sample as a function of the immersion depth. The raw force data measured by the force tensiometer is manipulated using the profile plot and the Wilhelmy equation to determine the wetting force and consequently advancing and the receding contact angle. This method is verified with both triangular and irregular PTFE samples in water, and measured contact angles are in good agreement with results from conventional regular shaped samples with a constant perimeter.

  1. Rocket measurements of electron density irregularities during MAC/SINE

    Science.gov (United States)

    Ulwick, J. C.

    1989-01-01

    Four Super Arcas rockets were launched at the Andoya Rocket Range, Norway, as part of the MAC/SINE campaign to measure electron density irregularities with high spatial resolution in the cold summer polar mesosphere. They were launched as part of two salvos: the turbulent/gravity wave salvo (3 rockets) and the EISCAT/SOUSY radar salvo (one rocket). In both salvos meteorological rockets, measuring temperature and winds, were also launched and the SOUSY radar, located near the launch site, measured mesospheric turbulence. Electron density irregularities and strong gradients were measured by the rocket probes in the region of most intense backscatter observed by the radar. The electron density profiles (8 to 4 on ascent and 4 on descent) show very different characteristics in the peak scattering region and show marked spatial and temporal variability. These data are intercompared and discussed.

  2. The scholarly rebellion of the early Baker Street Irregulars

    Directory of Open Access Journals (Sweden)

    George Mills

    2017-03-01

    Full Text Available This work provides and analyzes an early institutional history of the pioneering Sherlock Holmes American fan club, the Baker Street Irregulars (BSI. Using the publications and records of these devoted Sherlockians, I track the BSI's development from a speakeasy gathering in 1934 to a national organization by the mid-1940s. This growth was built on a foundation of Victorian nostalgia and playful humor. Yet at the same time the members of the Irregulars took their fandom seriously, producing Sherlockian scholarship and creating an infrastructure of journals, conferences, and credentialing that directly mimicked the academy. They positioned themselves in contrast to prevailing scholarly practices of the period, such as New Criticism. I trace both how their fan practices developed over time and how this conflict with the academy led to many of the BSI's defining characteristics.

  3. Constructing C1 Continuous Surface on Irregular Quad Meshes

    Institute of Scientific and Technical Information of China (English)

    HE Jun; GUO Qiang

    2013-01-01

    A new method is proposed for surface construction on irregular quad meshes as extensions to uniform B-spline surfaces. Given a number of control points, which form a regular or irregular quad mesh, a weight function is constructed for each control point. The weight function is defined on a local domain and is C1 continuous. Then the whole surface is constructed by the weighted combination of all the control points. The property of the new method is that the surface is defined by piecewise C1 bi-cubic rational parametric polynomial with each quad face. It is an extension to uniform B-spline surfaces in the sense that its definition is an analogy of the B-spline surface, and it produces a uniform bi-cubic B-spline surface if the control mesh is a regular quad mesh. Examples produced by the new method are also included.

  4. Punishment sustains large-scale cooperation in prestate warfare

    Science.gov (United States)

    Mathew, Sarah; Boyd, Robert

    2011-01-01

    Understanding cooperation and punishment in small-scale societies is crucial for explaining the origins of human cooperation. We studied warfare among the Turkana, a politically uncentralized, egalitarian, nomadic pastoral society in East Africa. Based on a representative sample of 88 recent raids, we show that the Turkana sustain costly cooperation in combat at a remarkably large scale, at least in part, through punishment of free-riders. Raiding parties comprised several hundred warriors and participants are not kin or day-to-day interactants. Warriors incur substantial risk of death and produce collective benefits. Cowardice and desertions occur, and are punished by community-imposed sanctions, including collective corporal punishment and fines. Furthermore, Turkana norms governing warfare benefit the ethnolinguistic group, a population of a half-million people, at the expense of smaller social groupings. These results challenge current views that punishment is unimportant in small-scale societies and that human cooperation evolved in small groups of kin and familiar individuals. Instead, these results suggest that cooperation at the larger scale of ethnolinguistic units enforced by third-party sanctions could have a deep evolutionary history in the human species. PMID:21670285

  5. China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence

    Directory of Open Access Journals (Sweden)

    Magnus Hjortdal

    2011-01-01

    Full Text Available This article presents three reasons for states to use cyber warfare and shows that cyberspace is—and will continue to be—a decisive element in China's strategy to ascend in the international system. The three reasons are: deterrence through infiltration of critical infrastructure; military technological espionage to gain military knowledge; and industrial espionage to gain economic advantage. China has a greater interest in using cyberspace offensively than other actors, such as the United States, since it has more to gain from spying on and deterring the United States than the other way around. The article also documents China's progress in cyber warfare and shows how it works as an extension of its traditional strategic thinking and the current debate within the country. Several examples of cyber attacks traceable to China are also presented. This includes cyber intrusions on a nuclear arms laboratory, attacks on defense ministries (including the Joint Strike Fighter and an airbase and the U.S. electric grid, as well as the current Google affair, which has proved to be a small part of a broader attack that also targeted the U.S. Government. There are, however, certain constraints that qualify the image of China as an aggressive actor in cyberspace. Some believe that China itself is the victim of just as many attacks from other states. Furthermore, certain actors in the United States and the West have an interest in overestimating China's capabilities in cyberspace in order to maintain their budgets.

  6. Biodiversity conservation and armed conflict: a warfare ecology perspective.

    Science.gov (United States)

    Hanson, Thor

    2018-04-23

    The activities involved in preparing for, executing, and recovering from armed conflict are globally pervasive and consequential, with significant impacts on natural systems. Effects on biodiversity are predominantly negative, produced by direct and indirect battlefield impacts, as well as the general breakdown of social, economic, and governance systems during wartime. Certain conservation opportunities do occur, however, particularly on lands set aside for training exercises, buffer zones, and peace parks. Here, the relationship between armed conflict and biodiversity is reviewed using the temporal framework of warfare ecology, which defines warfare as an ongoing process of three overlapping stages: preparations, war (armed conflict), and postwar activities. Several themes emerge from recent studies, including a heightened awareness of biodiversity conservation on military lands, the potential for scientific and conservation engagement to mitigate negative biodiversity impacts in war zones, and the importance of the postwar period for incorporating biodiversity priorities into reconstruction and recovery efforts. Research limitations and knowledge gaps are also discussed. © 2018 New York Academy of Sciences.

  7. Active Absorption of Irregular Gravity Waves in BEM-Models

    DEFF Research Database (Denmark)

    Brorsen, Michael; Frigaard, Peter

    1992-01-01

    The boundary element method is applied to the computation of irregular gravity waves. The boundary conditions at the open boundaries are obtained by a digital filtering technique, where the surface elevations in front of the open boundary are filtered numerically yielding the velocity to be presc...... to be prescribed at the boundary. By numerical examples it is shown that well designed filters can reduce the wave reflection to a few per cent over a frequency range corresponding to a Jonswap spectrum....

  8. Using Little's Irregularity Index in orthodontics: outdated and inaccurate?

    LENUS (Irish Health Repository)

    Macauley, Donal

    2012-12-01

    Little\\'s Irregularity Index (LII) was devised to objectively score mandibular incisor alignment for epidemiological studies but has been extended to assess the relative performance of orthodontic brackets, retainer or treatment modalities. Our aim was to examine the repeatability and precision of LII measurements of four independent examiners on the maxillary arch of orthodontic patients. The hypothesis was that the reproducibility of individual contact point displacement measurements, used to calculate the LII score, are inappropriate.

  9. Computing Homology Group Generators of Images Using Irregular Graph Pyramids

    OpenAIRE

    Peltier , Samuel; Ion , Adrian; Haxhimusa , Yll; Kropatsch , Walter; Damiand , Guillaume

    2007-01-01

    International audience; We introduce a method for computing homology groups and their generators of a 2D image, using a hierarchical structure i.e. irregular graph pyramid. Starting from an image, a hierarchy of the image is built, by two operations that preserve homology of each region. Instead of computing homology generators in the base where the number of entities (cells) is large, we first reduce the number of cells by a graph pyramid. Then homology generators are computed efficiently on...

  10. Analysis of irregular opacities of silicosis using computed tomography

    International Nuclear Information System (INIS)

    Maeda, Atsushi; Shida, Hisao; Chiyotani, Keizo; Saito, Kenichi; Mishina, Michihito

    1983-01-01

    Classification in used to codify Chest CT images of abnormalities of the lung in a simple reproducible manner. Simbols to record CT features of importance are listed. We applied CT to 92 cases of silicosis and roentgenological analysis was performed. Bullae, honeycombing, cavity, emphysema, pleural thickning and calcification were more clearly demonstrated in CT images than routine chest roentgenograms. Irregular opacities were considered to be a combined profusion of small round and streak or strand. (author)

  11. Evaluation of irregular menses in perimenarcheal girls: a pilot study.

    Science.gov (United States)

    Browner-Elhanan, Karen J; Epstein, Jonathan; Alderman, Elizabeth M

    2003-12-01

    Acyclic vaginal bleeding in girls within three years of menarche is most commonly attributed to an immature hypothalamic-pituitary-ovarian axis. Assuming this diagnosis may preclude the practitioner from performing more definitive studies and thereby diagnosing other, treatable causes of menstrual irregularities. A retrospective chart review of 178 girls presenting to an inner-city hospital-based adolescent clinic within three years of menarche was performed. Personal and family medical and menarcheal history was assessed, and findings on physical and laboratory examination performed were evaluated. Of the 178 girls still perimenarcheal at presentation, 47 were the focus of this study. Of these, 39 had no significant findings on physical examination, while 3 had signs of functional ovarian hyperandrogenism (FOH) including obesity, hirsutism, and moderate acne with corresponding LH/FSH ratios>3, although pelvic ultrasound examination revealed normal ovaries. Four of the 39 patients with normal physical exams had LH/FSH testing done, and 1 of the 4 had an abnormal LH/FSH ratio, indicating possible FOH. Two of the 47 patients were pregnant. Other laboratory abnormalities included microcytic, hypochromic anemia in patients, and an elevated Erythrocyte Sedimentation Rate in a patient later diagnosed with a rheumatologic disorder. Those perimenarcheal girls presenting with irregular menses and findings including obesity, acne, or pallor, were likely to have treatable causes of menstrual irregularities. In one of the four girls with a normal physical examination, hormonal testing indicated possible FOH, thus suggesting that hormonal evaluation of perimenarcheal girls with menstrual irregularities may be justified, as it may reveal previously unsuspected pathology.

  12. Backscatter measurements of 11-cm equatorial spread-F irregularities

    International Nuclear Information System (INIS)

    Tsunoda, R.T.

    1980-01-01

    In the equatorial F-region ionosphere, a turbulent cascade process has been found to exist that extends from irregularity spatial wavelengths longer than tens of kilometers down to wavelengths as short as 36 cm. To investigate the small-scale regime of wavelengths less than 36 cm, an equatorial radar experiment was conducted using a frequency of 1320 MHz that corresponds to an irregularity wavelength of 11 cm. The first observations of radar backscatter from 11-cm field-aligned irregularities (FAI) are described. These measurements extend the spatial wavelength regime of F-region FAI to lengths that approach both electron gyroradius and the Debye length. Agreement of these results with the theory of high-frequency drift waves suggests that these observations may be unique to the equatorial ionosphere. That is, the requirement of low electron densities for which the theroy calls may preclude the existence of 11-cm FAI elsewhere in the F-region ionosphere, except in equatorial plasma bubbles

  13. [Comparision of Different Methods of Area Measurement in Irregular Scar].

    Science.gov (United States)

    Ran, D; Li, W J; Sun, Q G; Li, J Q; Xia, Q

    2016-10-01

    To determine a measurement standard of irregular scar area by comparing the advantages and disadvantages of different measurement methods in measuring same irregular scar area. Irregular scar area was scanned by digital scanning and measured by coordinate reading method, AutoCAD pixel method, Photoshop lasso pixel method, Photoshop magic bar filled pixel method and Foxit PDF reading software, and some aspects of these methods such as measurement time, repeatability, whether could be recorded and whether could be traced were compared and analyzed. There was no significant difference in the scar areas by the measurement methods above. However, there was statistical difference in the measurement time and repeatability by one or multi performers and only Foxit PDF reading software could be traced back. The methods above can be used for measuring scar area, but each one has its advantages and disadvantages. It is necessary to develop new measurement software for forensic identification. Copyright© by the Editorial Department of Journal of Forensic Medicine

  14. Seismic performance for vertical geometric irregularity frame structures

    Science.gov (United States)

    Ismail, R.; Mahmud, N. A.; Ishak, I. S.

    2018-04-01

    This research highlights the result of vertical geometric irregularity frame structures. The aid of finite element analysis software, LUSAS was used to analyse seismic performance by focusing particularly on type of irregular frame on the differences in height floors and continued in the middle of the building. Malaysia’s building structures were affected once the earthquake took place in the neighbouring country such as Indonesia (Sumatera Island). In Malaysia, concrete is widely used in building construction and limited tension resistance to prevent it. Analysing structural behavior with horizontal and vertical static load is commonly analyses by using the Plane Frame Analysis. The case study of this research is to determine the stress and displacement in the seismic response under this type of irregular frame structures. This study is based on seven-storey building of Clinical Training Centre located in Sungai Buloh, Selayang, Selangor. Since the largest earthquake occurs in Acheh, Indonesia on December 26, 2004, the data was recorded and used in conducting this research. The result of stress and displacement using IMPlus seismic analysis in LUSAS Modeller Software under the seismic response of a formwork frame system states that the building is safe to withstand the ground and in good condition under the variation of seismic performance.

  15. Irregular analytical errors in diagnostic testing - a novel concept.

    Science.gov (United States)

    Vogeser, Michael; Seger, Christoph

    2018-02-23

    In laboratory medicine, routine periodic analyses for internal and external quality control measurements interpreted by statistical methods are mandatory for batch clearance. Data analysis of these process-oriented measurements allows for insight into random analytical variation and systematic calibration bias over time. However, in such a setting, any individual sample is not under individual quality control. The quality control measurements act only at the batch level. Quantitative or qualitative data derived for many effects and interferences associated with an individual diagnostic sample can compromise any analyte. It is obvious that a process for a quality-control-sample-based approach of quality assurance is not sensitive to such errors. To address the potential causes and nature of such analytical interference in individual samples more systematically, we suggest the introduction of a new term called the irregular (individual) analytical error. Practically, this term can be applied in any analytical assay that is traceable to a reference measurement system. For an individual sample an irregular analytical error is defined as an inaccuracy (which is the deviation from a reference measurement procedure result) of a test result that is so high it cannot be explained by measurement uncertainty of the utilized routine assay operating within the accepted limitations of the associated process quality control measurements. The deviation can be defined as the linear combination of the process measurement uncertainty and the method bias for the reference measurement system. Such errors should be coined irregular analytical errors of the individual sample. The measurement result is compromised either by an irregular effect associated with the individual composition (matrix) of the sample or an individual single sample associated processing error in the analytical process. Currently, the availability of reference measurement procedures is still highly limited, but LC

  16. Stromal haze, myofibroblasts, and surface irregularity after PRK.

    Science.gov (United States)

    Netto, Marcelo V; Mohan, Rajiv R; Sinha, Sunilima; Sharma, Ajay; Dupps, William; Wilson, Steven E

    2006-05-01

    The aim of this study was to investigate the relationship between the level of stromal surface irregularity after photorefractive keratectomy (PRK) and myofibroblast generation along with the development of corneal haze. Variable levels of stromal surface irregularity were generated in rabbit corneas by positioning a fine mesh screen in the path of excimer laser during ablation for a variable percentage of the terminal pulses of the treatment for myopia that does not otherwise generate significant opacity. Ninety-six rabbits were divided into eight groups: [see table in text]. Slit lamp analysis and haze grading were performed in all groups. Rabbits were sacrificed at 4 hr or 4 weeks after surgery and histochemical analysis was performed on corneas for apoptosis (TUNEL assay), myofibroblast marker alpha-smooth muscle actin (SMA), and integrin alpha4 to delineate the epithelial basement membrane. Slit-lamp grading revealed severe haze formation in corneas in groups IV and VI, with significantly less haze in groups II, III, and VII and insignificant haze compared with the unwounded control in groups I and V. Analysis of SMA staining at 4 weeks after surgery, the approximate peak of haze formation in rabbits, revealed low myofibroblast formation in group I (1.2+/-0.2 cells/400x field) and group V (1.8+/-0.4), with significantly more in groups II (3.5+/-1.8), III (6.8+/-1.6), VII (7.9+/-3.8), IV (12.4+/-4.2) and VI (14.6+/-5.1). The screened groups were significantly different from each other (p PRK groups. The -9.0 diopter PRK group VI had significantly more myofibroblast generation than the -9.0 diopter PRK with PTK-smoothing group VII (p PRK and the level of stromal surface irregularity. PTK-smoothing with methylcellulose was an effective method to reduce stromal surface irregularity and decreased both haze and associated myofibroblast density. We hypothesize that stromal surface irregularity after PRK for high myopia results in defective basement membrane

  17. Women with minor menstrual irregularities have increased risk of preeclampsia and low birthweight in spontaneous pregnancies

    DEFF Research Database (Denmark)

    Bonnesen, Barbara; Oddgeirsdóttir, Hanna L; Naver, Klara Vinsand

    2016-01-01

    INTRODUCTION: Very few studies describe the obstetric and neonatal outcome of spontaneous pregnancies in women with irregular menstrual cycles. However, menstrual cycle irregularities are common and may be associated with increased risk, and women who develop pregnancy complications more frequent...

  18. Study of Track Irregularity Time Series Calibration and Variation Pattern at Unit Section

    Directory of Open Access Journals (Sweden)

    Chaolong Jia

    2014-01-01

    Full Text Available Focusing on problems existing in track irregularity time series data quality, this paper first presents abnormal data identification, data offset correction algorithm, local outlier data identification, and noise cancellation algorithms. And then proposes track irregularity time series decomposition and reconstruction through the wavelet decomposition and reconstruction approach. Finally, the patterns and features of track irregularity standard deviation data sequence in unit sections are studied, and the changing trend of track irregularity time series is discovered and described.

  19. High Value Talent: Identifying, Developing, and Retaining Naval Special Warfare’s Best Leaders

    Science.gov (United States)

    2012-06-01

    Southwest Airlines both rank character as the most important individual trait they look for.22,23 The importance of character will be elaborated on...Southwest Airlines likewise has character as its top hiring trait, only hiring 4% of its applicants as a result.27...incentives to much more creative concepts that cater to a High Potential’s life outside of the workplace. Paying attention to both methods is critical

  20. Naval Special Warfare: Identifying and Prioritizing Core Attributes of the Profession

    Science.gov (United States)

    2014-12-01

    sociologist named Morris Janowitz described the transition and development of American military professionalism in his book titled The Professional...Westport, CT: Praeger Publishers, 1989). 45 For a full discussion see Morris Janowitz, The Professional Soldier: A Social and Political Portrait...Sent: Tuesday , August 19, 2014 1:36 AM To: NSW Survey Distro Cc: Wisotzki, Stephen C CAPT USSOCOM NAVSOC; Voigt, Bradley D Mr CIV USSOCOM

  1. Integrating Defense, Diplomacy, and Development (3 D) in the Naval Special Warfare Operator

    Science.gov (United States)

    2010-12-01

    usually filling the executive positions, is equivalent to different roles of the players of a sports team and their coaches. The operators are the...them on what SOF resources can be provided to a country team’s counterterrorism campaign plan. 1. The Operator With Al Qaeda developing franchise

  2. The Role of Special Operations Forces in Information Warfare: Enablers, Not Cyber Warriors

    National Research Council Canada - National Science Library

    Edgar, Jeffry

    2000-01-01

    ... (IW) - is not unique to SOF. Conventional forces also execute IW. As a result, SOF runs the risk of losing its unique character as it tries to assume a role that conventional forces can fulfill...

  3. Global Trends and Future Warfare (Strategic Insights. Special Issue, October 2011)

    Science.gov (United States)

    2011-10-01

    across the Indian Ocean and Asia-Pacific Regions     change” through the use of military force, under the rubric of “Responsibility to Protect.” The...rationalizations of their attacks. Consider, for example, this 11 August 2002 communiqué issued in response to the development of genetically modified organisms

  4. Detachment 101 in the CBI: An Unconventional Warfare Paradigm for Contemporary Special Operations

    Science.gov (United States)

    2010-05-13

    have been based on either a total misreading of the situation in Japan, or a readiness for war.”15 Churchill wanted to find a softer approach to...developed to decipher Japanese diplomatic traffic during World War II. Initially, Japanese traffic was intercepted and labeled as the Japanese ‘Red’ Codes...Donovan had to face the issue and make a decision, which he did by relieving Carl “for physical and medical reasons.”67

  5. Understanding the Threat Ecosystem: A Concept for Intelligence Support to Special Warfare

    Science.gov (United States)

    2016-05-10

    international law, national law, behavioral norms and ethical principles have no restraining effects on them.5 This emerging complexity paradigm is one...similar to a biome: a major ecological community of organisms adapted to a particular climatic or environmental condition on a large geographic area in...Awareness through tracking agents and agency in the threat environment is paramount to building an accurate ecological frame of the operational environment

  6. Swimming With the Natives: Cultural Immersion and Its Applications to Naval Special Warfare

    Science.gov (United States)

    2004-09-01

    refer to as the “Struggle against the ‘Great Demon’ or ‘Great Satan ’”—which in turn refers to the western forces and their coalitions. The cell...the Cairo Bulletin, which is a sort of bible to them. (Wilson, 1990, p. 949) 28 As he had intended, Lawrence was able to use his cultural immersion...21, 2004, from http://www.oft.osd.mil/library/ library_files/document_377_National%20Military%20Strategy%2013%20May% 2004. pdf Johnson, C. (1982

  7. Past and Potential Theory for Special Warfare Operational Art: People’s War and Contentious Politics

    Science.gov (United States)

    2015-03-04

    bourgeoisie revolution, revolution from above, and peasant revolution.123 These events produced three corresponding revolutionary outcomes...the key structural variables that determined these paths and outcomes within a country were the strength of the bourgeoisie

  8. Attacking the Lion: A Study of Cohesion in Naval Special Warfare Operational Units

    Science.gov (United States)

    2011-06-01

    of Existential Courage.‖ Journal of Humanistic Psychology 44, no. 3 (Summer 2004): 279–298. ———. ―Relevance of Hardiness Assessment and Training to...stealth, teamwork, and violence of action to survive and succeed in missions against larger opponents. Developing bonds of trust between individuals and...a force that conducts kinetic action missions with an emphasis on speed, surprise, and violence of action. For the most part, this mentality

  9. Information Warfare: Issues Associated with the Defense of DOD Computers and Computer Networks

    National Research Council Canada - National Science Library

    Franklin, Derek

    2002-01-01

    ... that may threaten the critical information pathways of the armed forces An analysis of the history of computer information warfare reveals that there was an embarrassing lack of readiness and defense...

  10. Cerium oxide for the destruction of chemical warfare agents: A comparison of synthetic routes

    Czech Academy of Sciences Publication Activity Database

    Janos, P.; Henych, Jiří; Pelant, O.; Pilařová, V.; Vrtoch, L.; Kormunda, M.; Mazanec, K.; Štengl, Václav

    2016-01-01

    Roč. 304, MAR (2016), s. 259-268 ISSN 0304-3894 Institutional support: RVO:61388980 Keywords : Cerium oxide * Chemical warfare agents * Organophosphate compounds * Decontamination Subject RIV: CA - Inorganic Chemistry Impact factor: 6.065, year: 2016

  11. From Douhet to drones, air warfare, and the evolution of targeting

    NARCIS (Netherlands)

    Osinga, F.P.B.; Roorda, M.P.; Ducheine, P.A.L.; Schmitt, M.N.; Osinga, F.P.B.

    2016-01-01

    Through the prism of the experience of air warfare, this chapter identifies key factors that have shaped targeting. These include technological developments, organizational structures, and processes and inter-service competition for scarce resources. Moreover, targeting is informed by perspectives

  12. Defense Base Closure and Realignment Budget Data for the Naval Surface Warfare Center

    National Research Council Canada - National Science Library

    1993-01-01

    ... and realignment military construction projects. This report provides the results of the audit related to the realignment of Naval Surface Warfare Centers elements in White Oak, Maryland, and Panama City, Florida, to Dahlgren, Virginia...

  13. CRUSER's Warfare Innovation Workshop Focused on Hybrid War in the Urban Littorals

    OpenAIRE

    Ehrlich, Michael

    2017-01-01

    News Stories Archive The Naval Postgraduate School (NPS) Consortium for Robotics and Unmanned Systems Education and Research, CRUSER, hosted its annual Warfare Innovation Workshop (WIW) in Glasgow Hall, Sept. 18-21.

  14. The Army Ground Forces Training for Mountain and Winter Warfare - Study No. 23

    National Research Council Canada - National Science Library

    Govan, Thomas

    1946-01-01

    This general study of the experiments in mountain and winter warfare training from 1940 to 1944 is designed as an introduction to the histories of the Mountain Training Center and The 10th Mountain...

  15. Electronic Warfare: Towed Decoys Could Improve Survivability of Current Navy Aircraft

    National Research Council Canada - National Science Library

    Aiken, Michael

    1997-01-01

    Traditionally, DOD'S combat aircraft have used on-board electronic warfare devices called jammers for self-protection against radar-controlled weapons, including missiles and anti-aircraft artillery...

  16. Surface Warfare Officer Retention: Analysis of Individual Ready Reserve Survey Data

    National Research Council Canada - National Science Library

    Stoker, Carol; Crawford, Alice

    2008-01-01

    ... (including morale and lack of mentoring), push both men and women out of the Navy. Nonetheless, the Navy s primary effort to improve retention has been to introduce the Surface Warfare Officer Continuation Pay (SWOCP...

  17. Understanding "Understanding" Flow for Network-Centric Warfare: Military Knowledge-Flow Mechanics

    National Research Council Canada - National Science Library

    Nissen, Mark

    2002-01-01

    Network-centric warfare (NCW) emphasizes information superiority for battlespace efficacy, but it is clear that the mechanics of how knowledge flows are just as important as those pertaining to the networks and communication...

  18. DRES Database of Methods for the Analysis of Chemical Warfare Agents

    National Research Council Canada - National Science Library

    D'Agostino, Paul

    1997-01-01

    .... Update of the database continues as an ongoing effort and the DRES Database of Methods for the Analysis of Chemical Warfare Agents is available panel in hardcopy form or as a softcopy Procite or Wordperfect file...

  19. The Rapier or the Club: The Relationship between Attrition and Maneuver Warfare

    National Research Council Canada - National Science Library

    Springman, Jeffrey A

    2006-01-01

    ...? This project compares the relationship between attrition and maneuver warfare. The study considers whether there are times when wars of attrition should be fought, and whether there are conditions that force wars of attrition...

  20. Diagnosis of Exposure to Chemical Warfare Agents: A Comprehensive Literature Survey 1990-2005

    National Research Council Canada - National Science Library

    Noort, D

    2006-01-01

    This report is an update of TNO report PML 2003-A63. In this report an overview is presented of the methods currently available for detection of exposure to a number of chemical warfare agents (CWA), i.e...

  1. Anxiety, depression, and posttraumatic stress in Iranian survivors of chemical warfare.

    Science.gov (United States)

    Hashemian, Farnoosh; Khoshnood, Kaveh; Desai, Mayur M; Falahati, Farahnaz; Kasl, Stanislav; Southwick, Steven

    2006-08-02

    In the 1980-1988 Iran-Iraq War, extensive use of chemical weapons resulted in high rates of morbidity and mortality. While much is known about the physical consequences of chemical warfare, there is a paucity of information about the long-term effects of chemical attacks on mental health. To assess the long-term psychological impact of chemical warfare on a civilian population. Cross-sectional randomized survey conducted in July 2004 of 153 civilians in 3 towns exposed to warfare in northwestern Iran: Oshnaviyeh (low-intensity conventional warfare), Rabat (high-intensity conventional warfare), and Sardasht (both high-intensity conventional warfare and chemical weapons). Full or partial posttraumatic stress disorder (PTSD) diagnosis, anxiety symptoms, and depressive symptoms were assessed using Farsi versions of the Clinician-Administered PTSD Scale, Hamilton Scale for Anxiety, and Beck Depression Inventory, respectively. Overall participation rate was 93%. Respondents had a mean age of 45 years and were all of Kurdish ethnicity. Among individuals exposed to both high-intensity warfare and chemical weapons, prevalence rates for lifetime PTSD, current PTSD, major anxiety symptoms, and severe depressive symptoms were 59%, 33%, 65%, and 41%, respectively. Among the low-intensity warfare group, the corresponding rates were 8%, 2%, 18%, and 6%, respectively, while intermediate rates were found among those exposed to high-intensity warfare but not to chemical weapons (31%, 8%, 26%, and 12%, respectively). Compared with individuals exposed to low-intensity warfare, those exposed to both high-intensity warfare and chemical weapons were at higher risk for lifetime PTSD (odds ratio [OR], 18.6; 95% confidence interval [CI], 5.8-59.4), current PTSD (OR, 27.4; 95% CI, 3.4-218.2), increased anxiety symptoms (OR, 14.6; 95% CI, 6.0-35.6), and increased depressive symptoms (OR, 7.2; 95% CI, 3.3-15.9). Exposure to high-intensity warfare but not to chemical weapons was also

  2. Improving Blood Monitoring of Enzymes as Biomarkers of Risk from Anticholinergic Pesticides and Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wilson, Barry W

    2006-01-01

    Blood biomarkers are an important way to monitor exposure to anticholinergic pesticides and chemical warfare agents and to establish whether some personnel are at greater risk than others from exposure...

  3. A new General Purpose Decontamination System for Chemical and Biological Warfare and Terrorism Agents

    National Research Council Canada - National Science Library

    Khetan, Sushil; Banerjee, xdDeboshri; Chanda, Arani; Collins, Terry

    2003-01-01

    Partial contents: Fe-TAML Activator of Peroxide,Activators of Hydrogen peroxide,Biological Warfare Agents,Bacterial Endospore,Bacterial Spore Deactivation,Modeling Studies,Deactivation Studies with Bacillus spores...

  4. Second NATO/SIBCA Exercise on Sampling of Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wils, E

    1999-01-01

    In order to practise the sampling of chemical warfare agents under realistic conditions, the Netherlands participated successfully in the second NATO/SIBCA sampling exercise conducted in Poland on 1-3...

  5. The Third World War? In The Cyberspace. Cyber Warfare in the Middle East.

    Directory of Open Access Journals (Sweden)

    Martina

    2014-06-01

    Full Text Available This article aims to provide a brief and comprehensive introduction to the issue of cyber warfare and to display the recent development in this area. Geographically, it focuses on the Middle East region, since the vast majority of the most important recent cyber attacks appeared just in there or were connected to it. The first part of the article tries to define the key notion of cyber warfare, compares it to the standard warfare and presents different types of cyber weapons that are known today. The second part points out examples of the most striking recent cyber attacks and uses them as evidences to demonstrate today's importance and dissemination of cyber warfare. Finally, the article sums up pros and cons of the cyber weapons and, in view of these, predicts a significant increase in their use in any future war conflicts.

  6. Improving Blood Monitoring of Enzymes as Biomarkers of Risk from Anticholinergic Pesticides and Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wilson, Barry W

    2005-01-01

    Blood biomarkers are an important way to monitor exposure to anticholinergic pesticides and chemical warfare agents and to establish whether some personnel are at greater risk than others from exposure...

  7. Combinatorial Auction Theory Applied to the Selection of Surface Warfare Officer Retention Incentives

    National Research Council Canada - National Science Library

    Denmond, Constance M; Johnson, Derek N; Lewis, Chavius G; Zegley, Christopher R

    2007-01-01

    The purpose of this project is to investigate the potential retention and cost impacts of offering combinations of retention base incentives to members of the Surface Warfare Officer (SWO) community...

  8. Cyber crime and cyber warfare with international cyber collaboration for RSA – preparing communities

    CSIR Research Space (South Africa)

    Grobler, M

    2012-03-01

    Full Text Available aspects come into play that may have an influence on the manner in which the military reacts to cyber attacks (Wilson 2007): ? new national security policy issues; ? consideration of psychological operations used to affect friendly nations... relationship between modern cyber space, cyber warfare and traditional legislation. As a starting point, cyber warfare is defined for the purpose of this article as the use of exploits in cyber space as a way to intentionally cause harm to people, assets...

  9. Modeling Anti-Air Warfare With Discrete Event Simulation and Analyzing Naval Convoy Operations

    Science.gov (United States)

    2016-06-01

    W., & Scheaffer, R. L. (2008). Mathematical statistics with applications . Belmont, CA: Cengage Learning. 118 THIS PAGE INTENTIONALLY LEFT BLANK...WARFARE WITH DISCRETE EVENT SIMULATION AND ANALYZING NAVAL CONVOY OPERATIONS by Ali E. Opcin June 2016 Thesis Advisor: Arnold H. Buss Co...REPORT DATE June 2016 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE MODELING ANTI-AIR WARFARE WITH DISCRETE EVENT

  10. Drone Warfare: Is the United States Violating the Law of Armed Conflict

    Science.gov (United States)

    2011-02-16

    NOTE AIR WAR COLLEGE AIR UNIVERSITY DRONE WARFARE: IS THE UNITED STATES VIOLATING THE LAW OF ARMED CONFLICT? by Barbara E. Shestko, Col...Base, Alabama. 1 Introduction The United States has become increasingly dependent upon the use of unmanned aircraft systems (UASs) or “ drones ” to...kill targeted members of al-Qaeda and the Taliban.1 Due to the success of drone warfare, we can expect the United States to continue its current

  11. Warfare, genocide, and ethnic conflict: a Darwinian approach.

    Science.gov (United States)

    Dimijian, Gregory G

    2010-07-01

    As the 21st century dawns, I reflect on the history of humankind with growing concern about the need to understand the underlying biological and cultural roots of ethnic conflict and warfare. In the many studies of human conflict, innate biological predispositions have been neglected. This article is the third part of a series of seminars for medical residents at the University of Texas Southwestern Medical School at Dallas (see http://adarwinstudygroup.org/). The series starts with in-depth coverage of Darwinian natural and sexual selection, with examples from the domestication of animals and plants and the crisis of antibiotic resistance. The series strives to show how biology has been neglected in the study of the we-they orientation of human behavior, with its devastating consequences. The subject material is profoundly disturbing, as it looks at "human nature" and contrasts the "dark side" of human behavior with the opposite, profoundly caring and loving side.

  12. Information Warfare on Social Media: A Brand Management Perspective

    Directory of Open Access Journals (Sweden)

    Kalpokas Ignas

    2017-06-01

    Full Text Available Employing a perspective informed by brand management, this article aims at understanding information warfare operations in social media. The state, seen as brand, must project an image of itself to both internal and foreign audiences to unite the domestic audience and/or attract global support. However, in constructing a brand, states are vulnerable to ‘sofa warriors’ – ordinary individuals who have been unwittingly recruited by hostile actors to disseminate (over social media or other platforms a counter-brand, harmful to the state concerned. These new threats are investigated in light of recent tendencies in online branding, elucidating their status as a national security threat, with the potential to significantly disrupt life in political communities.

  13. Book Review: Conquest in Cyberspace: National Security and Information Warfare

    Directory of Open Access Journals (Sweden)

    Gary C. Kessler

    2007-06-01

    Full Text Available Libicki, M.C. (2007. Conquest in Cyberspace: National Security and Information Warfare. New York: Cambridge University Press. 323 pages, ISBN: 978-0-521-69214-4 (paper, US$80Reviewed by Gary C. Kessler (gary.kessler@champlain.eduMany books -- and even movies ("Live Free or Die Hard" -- are based upon the premise of an impending information war. In these scenarios -- made all too plausible by the increased frequency with which we read about and experience major information security incidents -- a Bad Guy exploits known computer security vulnerabilities in order to control major national infrastructures via the Internet so as to reap financial, economic, and/or personal power.(see PDF for full review

  14. Nanostructured Metal Oxides for Stoichiometric Degradation of Chemical Warfare Agents.

    Science.gov (United States)

    Štengl, Václav; Henych, Jiří; Janoš, Pavel; Skoumal, Miroslav

    2016-01-01

    Metal oxides have very important applications in many areas of chemistry, physics and materials science; their properties are dependent on the method of preparation, the morphology and texture. Nanostructured metal oxides can exhibit unique characteristics unlike those of the bulk form depending on their morphology, with a high density of edges, corners and defect surfaces. In recent years, methods have been developed for the preparation of metal oxide powders with tunable control of the primary particle size as well as of a secondary particle size: the size of agglomerates of crystallites. One of the many ways to take advantage of unique properties of nanostructured oxide materials is stoichiometric degradation of chemical warfare agents (CWAs) and volatile organic compounds (VOC) pollutants on their surfaces.

  15. Chemical warfare protection for the cockpit of future aircraft

    Science.gov (United States)

    Pickl, William C.

    1988-01-01

    Currently systems are being developed which will filter chemical and biological contaminants from crew station air. In order to maximize the benefits of these systems, a method of keeping the cockpit contaminant free during pilot ingress and egress is needed. One solution is to use a rectangular plastic curtain to seal the four edges of the canopy frame to the canopy sill. The curtain is stored in a tray which is recessed into the canopy sill and unfolds in accordion fashion as the canopy is raised. A two way zipper developed by Calspan could be used as an airlock between the pilot's oversuit and the cockpit. This system eliminates the pilot's need for heavy and restrictive CB gear because he would never be exposed to the chemical warfare environment.

  16. Decontamination of biological warfare agents by a microwave plasma torch

    International Nuclear Information System (INIS)

    Lai, Wilson; Lai, Henry; Kuo, Spencer P.; Tarasenko, Olga; Levon, Kalle

    2005-01-01

    A portable arc-seeded microwave plasma torch running stably with airflow is described and applied for the decontamination of biological warfare agents. Emission spectroscopy of the plasma torch indicated that this torch produced an abundance of reactive atomic oxygen that could effectively oxidize biological agents. Bacillus cereus was chosen as a simulant of Bacillus anthracis spores for biological agent in the decontamination experiments. Decontamination was performed with the airflow rate of 0.393 l/s, corresponding to a maximum concentration of atomic oxygen produced by the torch. The experimental results showed that all spores were killed in less than 8 s at 3 cm distance, 12 s at 4 cm distance, and 16 s at 5 cm distance away from the nozzle of the torch

  17. [Cutaneous and systemic toxicology of vesicants used in warfare].

    Science.gov (United States)

    Pita, R; Vidal-Asensi, S

    2010-01-01

    Vesicants are a group of chemicals used in warfare. The most representative agent is yperite, also known as mustard gas. The blisters that appeared on those exposed to yperite during combat in the First World War are responsible for the current name--vesicants--for this group of chemicals. Their affects are produced mainly through localized action of liquid or vapor forms on the skin, eyes, and respiratory tract. However, the high absorption of the liquid form through the skin or the vapor form on inhalation may cause substantial systemic effects. Here we analyze these effects, treatment of intoxication, and long-term sequelae, drawing on our experience and a review of the literature.

  18. An Open Architecture Framework for Electronic Warfare Based Approach to HLA Federate Development

    Directory of Open Access Journals (Sweden)

    HyunSeo Kang

    2018-01-01

    Full Text Available A variety of electronic warfare models are developed in the Electronic Warfare Research Center. An Open Architecture Framework for Electronic Warfare (OAFEw has been developed for reusability of various object models participating in the electronic warfare simulation and for extensibility of the electronic warfare simulator. OAFEw is a kind of component-based software (SW lifecycle management support framework. This OAFEw is defined by six components and ten rules. The purpose of this study is to construct a Distributed Simulation Interface Model, according to the rules of OAFEw, and create Use Case Model of OAFEw Reference Conceptual Model version 1.0. This is embodied in the OAFEw-FOM (Federate Object Model for High-Level Architecture (HLA based distributed simulation. Therefore, we design and implement EW real-time distributed simulation that can work with a model in C++ and MATLAB API (Application Programming Interface. In addition, OAFEw-FOM, electronic component model, and scenario of the electronic warfare domain were designed through simple scenarios for verification, and real-time distributed simulation between C++ and MATLAB was performed through OAFEw-Distributed Simulation Interface.

  19. A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios

    Directory of Open Access Journals (Sweden)

    Kathryn Merrick

    2016-07-01

    Full Text Available Our increasing dependence on information technologies and autonomous systems has escalated international concern for information- and cyber-security in the face of politically, socially and religiously motivated cyber-attacks. Information warfare tactics that interfere with the flow of information can challenge the survival of individuals and groups. It is increasingly important that both humans and machines can make decisions that ensure the trustworthiness of information, communication and autonomous systems. Subsequently, an important research direction is concerned with modelling decision-making processes. One approach to this involves modelling decision-making scenarios as games using game theory. This paper presents a survey of information warfare literature, with the purpose of identifying games that model different types of information warfare operations. Our contribution is a systematic identification and classification of information warfare games, as a basis for modelling decision-making by humans and machines in such scenarios. We also present a taxonomy of games that map to information warfare and cyber crime problems as a precursor to future research on decision-making in such scenarios. We identify and discuss open research questions including the role of behavioural game theory in modelling human decision making and the role of machine decision-making in information warfare scenarios.

  20. Specialization Patterns

    OpenAIRE

    Schultz , Ulrik Pagh; Lawall , Julia ,; Consel , Charles

    1999-01-01

    Design patterns offer numerous advantages for software development, but can introduce inefficiency into the finished program. Program specialization can eliminate such overheads, but is most effective when targeted by the user to specific bottlenecks. Consequently, we propose to consider program specialization and design patterns as complementary concepts. On the one hand, program specialization can optimize object-oriented programs written using design patterns. On the other hand, design pat...

  1. Similarity estimators for irregular and age uncertain time series

    Science.gov (United States)

    Rehfeld, K.; Kurths, J.

    2013-09-01

    Paleoclimate time series are often irregularly sampled and age uncertain, which is an important technical challenge to overcome for successful reconstruction of past climate variability and dynamics. Visual comparison and interpolation-based linear correlation approaches have been used to infer dependencies from such proxy time series. While the first is subjective, not measurable and not suitable for the comparison of many datasets at a time, the latter introduces interpolation bias, and both face difficulties if the underlying dependencies are nonlinear. In this paper we investigate similarity estimators that could be suitable for the quantitative investigation of dependencies in irregular and age uncertain time series. We compare the Gaussian-kernel based cross correlation (gXCF, Rehfeld et al., 2011) and mutual information (gMI, Rehfeld et al., 2013) against their interpolation-based counterparts and the new event synchronization function (ESF). We test the efficiency of the methods in estimating coupling strength and coupling lag numerically, using ensembles of synthetic stalagmites with short, autocorrelated, linear and nonlinearly coupled proxy time series, and in the application to real stalagmite time series. In the linear test case coupling strength increases are identified consistently for all estimators, while in the nonlinear test case the correlation-based approaches fail. The lag at which the time series are coupled is identified correctly as the maximum of the similarity functions in around 60-55% (in the linear case) to 53-42% (for the nonlinear processes) of the cases when the dating of the synthetic stalagmite is perfectly precise. If the age uncertainty increases beyond 5% of the time series length, however, the true coupling lag is not identified more often than the others for which the similarity function was estimated. Age uncertainty contributes up to half of the uncertainty in the similarity estimation process. Time series irregularity

  2. Similarity estimators for irregular and age-uncertain time series

    Science.gov (United States)

    Rehfeld, K.; Kurths, J.

    2014-01-01

    Paleoclimate time series are often irregularly sampled and age uncertain, which is an important technical challenge to overcome for successful reconstruction of past climate variability and dynamics. Visual comparison and interpolation-based linear correlation approaches have been used to infer dependencies from such proxy time series. While the first is subjective, not measurable and not suitable for the comparison of many data sets at a time, the latter introduces interpolation bias, and both face difficulties if the underlying dependencies are nonlinear. In this paper we investigate similarity estimators that could be suitable for the quantitative investigation of dependencies in irregular and age-uncertain time series. We compare the Gaussian-kernel-based cross-correlation (gXCF, Rehfeld et al., 2011) and mutual information (gMI, Rehfeld et al., 2013) against their interpolation-based counterparts and the new event synchronization function (ESF). We test the efficiency of the methods in estimating coupling strength and coupling lag numerically, using ensembles of synthetic stalagmites with short, autocorrelated, linear and nonlinearly coupled proxy time series, and in the application to real stalagmite time series. In the linear test case, coupling strength increases are identified consistently for all estimators, while in the nonlinear test case the correlation-based approaches fail. The lag at which the time series are coupled is identified correctly as the maximum of the similarity functions in around 60-55% (in the linear case) to 53-42% (for the nonlinear processes) of the cases when the dating of the synthetic stalagmite is perfectly precise. If the age uncertainty increases beyond 5% of the time series length, however, the true coupling lag is not identified more often than the others for which the similarity function was estimated. Age uncertainty contributes up to half of the uncertainty in the similarity estimation process. Time series irregularity

  3. Ionospheric wave and irregularity measurements using passive radio astronomy techniques

    International Nuclear Information System (INIS)

    Erickson, W.C.; Mahoney, M.J.; Jacobson, A.R.; Knowles, S.H.

    1988-01-01

    The observation of midlatitude structures using passive radio astronomy techniques is discussed, with particular attention being given to the low-frequency radio telescope at the Clark Lake Radio Observatory. The present telescope operates in the 10-125-MHz frequency range. Observations of the ionosphere at separations of a few kilometers to a few hundreds of kilometers by the lines of sight to sources are possible, allowing the determination of the amplitude, wavelength, direction of propagation, and propagation speed of ionospheric waves. Data are considered on large-scale ionospheric gradients and the two-dimensional shapes and sizes of ionospheric irregularities. 10 references

  4. Using cheminformatics to find simulants for chemical warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Lavoie, J.; Srinivasan, Sree [Molecular Sciences and Engineering Team, U.S. Army Natick Soldier Research, Development and Engineering Center, 15 Kansas Street, Natick, MA 01760 (United States); Nagarajan, R., E-mail: Ramanathan.Nagarajan@us.army.mil [Molecular Sciences and Engineering Team, U.S. Army Natick Soldier Research, Development and Engineering Center, 15 Kansas Street, Natick, MA 01760 (United States)

    2011-10-30

    Highlights: {yields} Summary of chemical warfare agent (CWA) simulants in current use. {yields} Application of method of molecular similarity to CWA and simulants. {yields} Quantitative metric for CWA-simulant similarity. {yields} Rank ordering of simulants in current use. {yields} Potential of method to identify simulants for emerging agents. - Abstract: Direct experimentation with chemical warfare agents (CWA) to study important problems such as their permeation across protective barrier materials, decontamination of equipment and facilities, or the environmental transport and fate of CWAs is not feasible because of the obvious toxicity of the CWAs and associated restrictions on their laboratory use. The common practice is to use 'simulants,' namely, analogous chemicals that closely resemble the CWAs but are less toxic, with the expectation that the results attained for simulants can be correlated to how the CWAs would perform. Simulants have been traditionally chosen by experts, by means of intuition, using similarity in one or more physical properties (such as vapor pressure or aqueous solubility) or in the molecular structural features (such as functional groups) between the stimulant and the CWA. This work is designed to automate the simulant identification process backed by quantitative metrics, by means of chemical similarity search software routinely used in pharmaceutical drug discovery. The question addressed here is: By the metrics of such software, how similar are traditional simulants to CWAs? That is, what is the numerical 'distance' between each CWA and its customary simulants in the quantitative space of molecular descriptors? The answers show promise for finding close but less toxic simulants for the ever-increasing numbers of CWAs objectively and fast.

  5. Using cheminformatics to find simulants for chemical warfare agents

    International Nuclear Information System (INIS)

    Lavoie, J.; Srinivasan, Sree; Nagarajan, R.

    2011-01-01

    Highlights: → Summary of chemical warfare agent (CWA) simulants in current use. → Application of method of molecular similarity to CWA and simulants. → Quantitative metric for CWA-simulant similarity. → Rank ordering of simulants in current use. → Potential of method to identify simulants for emerging agents. - Abstract: Direct experimentation with chemical warfare agents (CWA) to study important problems such as their permeation across protective barrier materials, decontamination of equipment and facilities, or the environmental transport and fate of CWAs is not feasible because of the obvious toxicity of the CWAs and associated restrictions on their laboratory use. The common practice is to use 'simulants,' namely, analogous chemicals that closely resemble the CWAs but are less toxic, with the expectation that the results attained for simulants can be correlated to how the CWAs would perform. Simulants have been traditionally chosen by experts, by means of intuition, using similarity in one or more physical properties (such as vapor pressure or aqueous solubility) or in the molecular structural features (such as functional groups) between the stimulant and the CWA. This work is designed to automate the simulant identification process backed by quantitative metrics, by means of chemical similarity search software routinely used in pharmaceutical drug discovery. The question addressed here is: By the metrics of such software, how similar are traditional simulants to CWAs? That is, what is the numerical 'distance' between each CWA and its customary simulants in the quantitative space of molecular descriptors? The answers show promise for finding close but less toxic simulants for the ever-increasing numbers of CWAs objectively and fast.

  6. Analysis of an Irregular RC Multi-storeyed Building Subjected to Dynamic Loading

    Science.gov (United States)

    AkashRaut; Pachpor, Prabodh; Dautkhani, Sanket

    2018-03-01

    Many buildings in the present scenario have irregular configurations both in plan and elevation. This in future may subject to devastating earthquakes. So it is necessary to analyze the structure. The present paper is made to study three type of irregularity wiz vertical, mass and plan irregularity as per clause 7.1 of IS 1893 (part1)2002 code. The paper discusses the analysis of RC (Reinforced Concrete) Buildings with vertical irregularity. The study as a whole makes an effort to evaluate the effect of vertical irregularity on RC buildings for which comparison of three parameters namely shear force, bending moment and deflection are taken into account.

  7. Special Weapons

    Data.gov (United States)

    Federal Laboratory Consortium — Supporting Navy special weapons, the division provides an array of engineering services, technical publication support services, logistics support services, safety...

  8. Electrical Brain Responses to Beat Irregularities in Two Cases of Beat Deafness

    Science.gov (United States)

    Mathias, Brian; Lidji, Pascale; Honing, Henkjan; Palmer, Caroline; Peretz, Isabelle

    2016-01-01

    Beat deafness, a recently documented form of congenital amusia, provides a unique window into functional specialization of neural circuitry for the processing of musical stimuli: Beat-deaf individuals exhibit deficits that are specific to the detection of a regular beat in music and the ability to move along with a beat. Studies on the neural underpinnings of beat processing in the general population suggest that the auditory system is capable of pre-attentively generating a predictive model of upcoming sounds in a rhythmic pattern, subserved largely within auditory cortex and reflected in mismatch negativity (MMN) and P3 event-related potential (ERP) components. The current study examined these neural correlates of beat perception in two beat-deaf individuals, Mathieu and Marjorie, and a group of control participants under conditions in which auditory stimuli were either attended or ignored. Compared to control participants, Mathieu demonstrated reduced behavioral sensitivity to beat omissions in metrical patterns, and Marjorie showed a bias to identify irregular patterns as regular. ERP responses to beat omissions reveal an intact pre-attentive system for processing beat irregularities in cases of beat deafness, reflected in the MMN component, and provide partial support for abnormalities in later cognitive stages of beat processing, reflected in an unreliable P3b component exhibited by Mathieu—but not Marjorie—compared to control participants. P3 abnormalities observed in the current study resemble P3 abnormalities exhibited by individuals with pitch-based amusia, and are consistent with attention or auditory-motor coupling accounts of deficits in beat perception. PMID:26941591

  9. Electrical brain responses to beat irregularities in two cases of beat deafness

    Directory of Open Access Journals (Sweden)

    Brian eMathias

    2016-02-01

    Full Text Available Beat deafness, a recently documented form of congenital amusia, provides a unique window into functional specialization of neural circuitry for the processing of musical stimuli: Beat-deaf individuals exhibit deficits that are specific to the detection of a regular beat in music and the ability to move along with a beat. Studies on the neural underpinnings of beat processing in the general population suggest that the auditory system is capable of pre-attentively generating a predictive model of upcoming sounds in a rhythmic pattern, subserved largely within auditory cortex and reflected in mismatch negativity (MMN and P3 event-related potential (ERP components. The current study examined these neural correlates of beat perception in two beat-deaf individuals, Mathieu and Marjorie, and a group of control participants under conditions in which auditory stimuli were either attended or ignored. Compared to control participants, Mathieu demonstrated reduced behavioral sensitivity to beat omissions in metrical patterns, and Marjorie showed a bias to identify irregular patterns as regular. ERP responses to beat omissions reveal an intact pre-attentive system for processing beat irregularities in cases of beat deafness, reflected in the MMN component, and provide partial support for abnormalities in later cognitive stages of beat processing, reflected in an unreliable P3b component exhibited by Mathieu – but not Marjorie – compared to control participants. P3 abnormalities observed in the current study resemble P3 abnormalities exhibited by individuals with pitch-based amusia, and are consistent with attention or auditory-motor coupling accounts of deficits in beat perception.

  10. Multiple patterns of diblock copolymer confined in irregular geometries with soft surface

    Science.gov (United States)

    Li, Ying; Sun, Min-Na; Zhang, Jin-Jun; Pan, Jun-Xing; Guo, Yu-Qi; Wang, Bao-Feng; Wu, Hai-Shun

    2015-12-01

    The different confinement shapes can induce the formation of various interesting and novel morphologies, which might inspire potential applications of materials. In this paper, we study the directed self-assembly of diblock copolymer confined in irregular geometries with a soft surface by using self-consistent field theory. Two types of confinement geometries are considered, namely, one is the concave pore with one groove and the other is the concave pore with two grooves. We obtain more novel and different structures which could not be produced in other two-dimensional (2D) confinements. Comparing these new structures with those obtained in regular square confinement, we find that the range of ordered lamellae is enlarged and the range of disordered structure is narrowed down under the concave pore confinement. We also compare the different structures obtained under the two types of confinement geometries, the results show that the effect of confinement would increase, which might induce the diblock copolymer to form novel structures. We construct the phase diagram as a function of the fraction of B block and the ratio of h/L of the groove. The simulation reveals that the wetting effect of brushes and the shape of confinement geometries play important roles in determining the morphologies of the system. Our results improve the applications in the directed self-assembly of diblock copolymer for fabricating the irregular structures. Project supported by the Specialized Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20121404110004), the Research Foundation for Excellent Talents of Shanxi Provincial Department of Human Resources and Social Security, China, and the Scientific and Technological Innovation Programs of Higher Education Institutions in Shanxi Province, China.

  11. The Biosynthetic Origin of Irregular Monoterpenes in Lavandula

    Science.gov (United States)

    Demissie, Zerihun A.; Erland, Lauren A. E.; Rheault, Mark R.; Mahmoud, Soheil S.

    2013-01-01

    Lavender essential oils are constituted predominantly of regular monoterpenes, for example linalool, 1,8-cineole, and camphor. However, they also contain irregular monoterpenes including lavandulol and lavandulyl acetate. Although the majority of genes responsible for the production of regular monoterpenes in lavenders are now known, enzymes (including lavandulyl diphosphate synthase (LPPS)) catalyzing the biosynthesis of irregular monoterpenes in these plants have not been described. Here, we report the isolation and functional characterization of a novel cis-prenyl diphosphate synthase cDNA, termed Lavandula x intermedia lavandulyl diphosphate synthase (LiLPPS), through a homology-based cloning strategy. The LiLPPS ORF, encoding for a 305-amino acid long protein, was expressed in Escherichia coli, and the recombinant protein was purified by nickel-nitrilotriacetic acid affinity chromatography. The approximately 34.5-kDa bacterially produced protein specifically catalyzed the head-to-middle condensation of two dimethylallyl diphosphate units to LPP in vitro with apparent Km and kcat values of 208 ± 12 μm and 0.1 s−1, respectively. LiLPPS is a homodimeric enzyme with a sigmoidal saturation curve and Hill coefficient of 2.7, suggesting a positive co-operative interaction among its catalytic sites. LiLPPS could be used to modulate the production of lavandulol and its derivatives in plants through metabolic engineering. PMID:23306202

  12. Size and Albedo of Irregular Saturnian Satellites from Spitzer Observations

    Science.gov (United States)

    Mueller, Michael; Grav, T.; Trilling, D.; Stansberry, J.; Sykes, M.

    2008-09-01

    Using MIPS onboard the Spitzer Space Telescope, we observed the thermal emission (24 and, for some targets, 70 um) of eight irregular satellites of Saturn: Albiorix, Siarnaq, Paaliaq, Kiviuq, Ijiraq, Tarvos, Erriapus, and Ymir. We determined the size and albedo of all targets. An analysis of archived MIPS observations of Phoebe reproduces Cassini results very accurately, thereby validating our method. For all targets, the geometric albedo is found to be low, probably below 10% and clearly below 15%. Irregular satellites are much darker than the large regular satellites. Their albedo is, however, quite similar to that of small bodies in the outer Solar System (such as cometary nuclei, Jupiter Trojans, or TNOs). This is consistent with color measurements as well as dynamical considerations which suggest a common origin of the said populations. There appear to be significant object-to-object albedo differences. Similar albedos found for some members of dynamical clusters support the idea that they may have originated in the breakup of a parent body. For three satellites, thermal data at two wavelengths are available, enabling us to constrain their thermal properties. Sub-solar temperatures are similar to that found from Cassini's Phoebe fly-by. This suggests a rather low thermal inertia, as expected for regolith-covered objects. This work is based on observations made with the Spitzer Space Telescope, which is operated by JPL under a contract with NASA. Support for this work was provided by NASA.

  13. Non-storm irregular variation of the Dst index

    Directory of Open Access Journals (Sweden)

    S. Nakano

    2012-01-01

    Full Text Available The Dst index has a long-term variation that is not associated with magnetic storms. We estimated the long-term non-storm component of the Dst variation by removing the short-term variation related to magnetic storms. The results indicate that the variation of the non-storm component includes not only a seasonal variation but also an irregular variation. The irregular long-term variation is likely to be due to an anti-correlation with the long-term variation of solar-wind activity. In particular, a clear anti-correlation is observed between the non-storm component of Dst and the long-term variation of the solar-wind dynamic pressure. This means that in the long term, the Dst index tends to increase when the solar-wind dynamic pressure decreases. We interpret this anti-correlation as an indication that the long-term non-storm variation of Dst is influenced by the tail current variation. The long-term variation of the solar-wind dynamic pressure controls the plasma sheet thermal pressure, and the change of the plasma sheet thermal pressure would cause the non-storm tail current variation, resulting in the non-storm variation of Dst.

  14. Irregular working hours and fatigue of cabin crew.

    Science.gov (United States)

    Castro, Marta; Carvalhais, José; Teles, Júlia

    2015-01-01

    Beyond workload and specific environmental factors, flight attendants can be exposed to irregular working hours, conflicting with their circadian rhythms and having a negative impact in sleep, fatigue, health, social and family life, and performance which is critical to both safety and security in flight operations. This study focuses on the irregular schedules of cabin crew as a trigger of fatigue symptoms in a wet lease Portuguese airline. The aim was to analyze: what are the requirements of the cabin crew work; whether the schedules being observed and effective resting timeouts are triggering factors of fatigue; and the existence of fatigue symptoms in the cabin crew. A questionnaire has been adapted and applied to a sample of 73 cabin crew-members (representing 61.9% of the population), 39 females and 34 males, with an average age of 27.68 ± 4.27 years. Our data indicate the presence of fatigue and corresponding health symptoms among the airline cabin crew, despite of the sample favorable characteristics. Senior workers and women are more affected. Countermeasures are required. Recommendations can be made regarding the fatigue risk management, including work organization, education and awareness training programmes and specific countermeasures.

  15. Model tracking dual stochastic controller design under irregular internal noises

    International Nuclear Information System (INIS)

    Lee, Jong Bok; Heo, Hoon; Cho, Yun Hyun; Ji, Tae Young

    2006-01-01

    Although many methods about the control of irregular external noise have been introduced and implemented, it is still necessary to design a controller that will be more effective and efficient methods to exclude for various noises. Accumulation of errors due to model tracking, internal noises (thermal noise, shot noise and l/f noise) that come from elements such as resistor, diode and transistor etc. in the circuit system and numerical errors due to digital process often destabilize the system and reduce the system performance. New stochastic controller is adopted to remove those noises using conventional controller simultaneously. Design method of a model tracking dual controller is proposed to improve the stability of system while removing external and internal noises. In the study, design process of the model tracking dual stochastic controller is introduced that improves system performance and guarantees robustness under irregular internal noises which can be created internally. The model tracking dual stochastic controller utilizing F-P-K stochastic control technique developed earlier is implemented to reveal its performance via simulation

  16. Using Radio Irregularity for Increasing Residential Energy Awareness

    Directory of Open Access Journals (Sweden)

    A. Miljković

    2012-06-01

    Full Text Available Radio irregularity phenomenon is often considered as a shortcoming of wireless networks. In this paper, the method of using radio irregularity as an efficient human presence detection sensor in smart homes is presented. The method is mainly based on monitoring variations of the received signal strength indicator (RSSI within the messages used for the communication between wireless smart power outlets. The radio signals used for the inter-outlets communication can be absorbed, diffracted or reflected by objects in their propagation paths. When a human enters the existing radio communication field, the variation of the signal strength at the receiver is even more expressed. Based on the detected changes and compared to the initial thresholds set during the initialization phase, the system detects human presence. The proposed solution increases user awareness and automates the power control in households, with the primary goal to contribute in residential energy savings. Compared to conventional sensor networks, this approach preserves the sensorial intelligence, simplicity and low installation costs, without the need for additional sensors integration.

  17. Colombia: la guerra irregular en el fin de siglo

    Directory of Open Access Journals (Sweden)

    Alfredo RANGEL SUÁREZ

    2009-11-01

    Full Text Available RESUMEN: El artículo analiza las transformaciones de la guerra irregular de las guerrillas colombianas en las últimas décadas. Para ello, se estudian los cambios que han afectado a distintos factores, como los objetivos estratégicos, los medios financieros, militares, las relaciones que mantienen con los partidos políticos tradicionales en el nivel local, sus parámetros ideológicos, el origen social de sus miembros. Con esta perspectiva, se analiza el cálculo político/temporal que la guerrilla hace en la actual coyuntura y sus consecuencias para el proceso de paz.ABSTRACT: This article examines the transformations of the irregular war of the colombian guerrillas, studying the changes of several factors such as the strategic goals, the financial and army resources, the relationship among the political parties in the local level, the evolution of their ideological parameters and of the social origin of their members. With this perspectiva, the author analyses temporal and political calculation that the guerrilla makes at this point, and its consequences for the peace process.

  18. Designing Next Generation Massively Multithreaded Architectures for Irregular Applications

    Energy Technology Data Exchange (ETDEWEB)

    Tumeo, Antonino; Secchi, Simone; Villa, Oreste

    2012-08-31

    Irregular applications, such as data mining or graph-based computations, show unpredictable memory/network access patterns and control structures. Massively multi-threaded architectures with large node count, like the Cray XMT, have been shown to address their requirements better than commodity clusters. In this paper we present the approaches that we are currently pursuing to design future generations of these architectures. First, we introduce the Cray XMT and compare it to other multithreaded architectures. We then propose an evolution of the architecture, integrating multiple cores per node and next generation network interconnect. We advocate the use of hardware support for remote memory reference aggregation to optimize network utilization. For this evaluation we developed a highly parallel, custom simulation infrastructure for multi-threaded systems. Our simulator executes unmodified XMT binaries with very large datasets, capturing effects due to contention and hot-spotting, while predicting execution times with greater than 90% accuracy. We also discuss the FPGA prototyping approach that we are employing to study efficient support for irregular applications in next generation manycore processors.

  19. Specialized science.

    Science.gov (United States)

    Casadevall, Arturo; Fang, Ferric C

    2014-04-01

    As the body of scientific knowledge in a discipline increases, there is pressure for specialization. Fields spawn subfields that then become entities in themselves that promote further specialization. The process by which scientists join specialized groups has remarkable similarities to the guild system of the middle ages. The advantages of specialization of science include efficiency, the establishment of normative standards, and the potential for greater rigor in experimental research. However, specialization also carries risks of monopoly, monotony, and isolation. The current tendency to judge scientific work by the impact factor of the journal in which it is published may have roots in overspecialization, as scientists are less able to critically evaluate work outside their field than before. Scientists in particular define themselves through group identity and adopt practices that conform to the expectations and dynamics of such groups. As part of our continuing analysis of issues confronting contemporary science, we analyze the emergence and consequences of specialization in science, with a particular emphasis on microbiology, a field highly vulnerable to balkanization along microbial phylogenetic boundaries, and suggest that specialization carries significant costs. We propose measures to mitigate the detrimental effects of scientific specialism.

  20. Special geometry

    International Nuclear Information System (INIS)

    Strominger, A.

    1990-01-01

    A special manifold is an allowed target manifold for the vector multiplets of D=4, N=2 supergravity. These manifolds are of interest for string theory because the moduli spaces of Calabi-Yau threefolds and c=9, (2,2) conformal field theories are special. Previous work has given a local, coordinate-dependent characterization of special geometry. A global description of special geometries is given herein, and their properties are studied. A special manifold M of complex dimension n is characterized by the existence of a holomorphic Sp(2n+2,R)xGL(1,C) vector bundle over M with a nowhere-vanishing holomorphic section Ω. The Kaehler potential on M is the logarithm of the Sp(2n+2,R) invariant norm of Ω. (orig.)

  1. The Abbott and Costello Effect: Who's on What, and What's Where When? A Human-Centered Method to Investigate Network Centric Warfare Systems

    National Research Council Canada - National Science Library

    Reed, Derek W

    2007-01-01

    ...), fundamentally changing how warfare is being conducted. Network centric warfare (NCW) systems are being rushed to the field and are offered as a solution for the fog of war and as a way to reduce manpower costs...

  2. Compensation for unfavorable characteristics of irregular individual shift rotas.

    Science.gov (United States)

    Knauth, Peter; Jung, Detlev; Bopp, Winfried; Gauderer, Patric C; Gissel, Andreas

    2006-01-01

    Some employees of TV companies, such as those who produce remote TV programs, have to cope with very irregular rotas and many short-term schedule deviations. Many of these employees complain about the negative effects of such on their wellbeing and private life. Therefore, a working group of employers, council representatives, and researchers developed a so-called bonus system. Based on the criteria of the BESIAK system, the following list of criteria for the ergonomic assessment of irregular shift systems was developed: proportion of night hours worked between 22 : 00 and 01 : 00 h and between 06 : 00 and 07 : 00 h, proportion of night hours worked between 01 : 00 and 06 : 00 h, number of successive night shifts, number of successive working days, number of shifts longer than 9 h, proportion of phase advances, off hours on weekends, work hours between 17 : 00 and 23 : 00 h from Monday to Friday, number of working days with leisure time at remote places, and sudden deviations from the planned shift rota. Each individual rota was evaluated in retrospect. If pre-defined thresholds of criteria were surpassed, bonus points were added to the worker's account. In general, more bonus points add up to more free time. Only in particular cases was monetary compensation possible for some criteria. The bonus point system, which was implemented in the year 2002 for about 850 employees of the TV company, has the advantages of more transparency concerning the unfavorable characteristics of working-time arrangements, incentive for superiors to design "good" rosters that avoid the bonus point thresholds (to reduce costs), positive short-term effects on the employee social life, and expected positive long-term effects on the employee health. In general, the most promising approach to cope with the problems of shift workers in irregular and flexible shift systems seems to be to increase their influence on the arrangement of working times. If this is not possible, bonus point systems

  3. Specialized languages

    DEFF Research Database (Denmark)

    Mousten, Birthe; Laursen, Anne Lise

    2016-01-01

    Across different fields of research, one feature is often overlooked: the use of language for specialized purposes (LSP) as a cross-discipline. Mastering cross-disciplinarity is the precondition for communicating detailed results within any field. Researchers in specialized languages work cross...... science fields communicate their findings. With this article, we want to create awareness of the work in this special area of language studies and of the inherent cross-disciplinarity that makes LSP special compared to common-core language. An acknowledgement of the importance of this field both in terms...... of more empirical studies and in terms of a greater application of the results would give language specialists in trade and industry a solid and updated basis for communication and language use....

  4. Airway surface irregularities promote particle diffusion in the human lung

    International Nuclear Information System (INIS)

    Martonen, T.; North Carolina Univ., Chapel Hill, NC; Zhang, Z.; Yang, Y.; Bottei, G.

    1995-01-01

    Current NCRP and ICRP particle deposition models employed in risk assessment analyses treat the airways of the human lung as smooth-walled tubes. However, the upper airways of the tracheobronchial (TB) tree are line with cartilaginous rings. Recent supercomputer simulations of in vivo conditions (cited herein), where cartilaginous ring morphologies were based upon fibre-optic bronchoscope examinations, have clearly demonstrated their profound effects upon fluid dynamics. A physiologically based analytical model of fluid dynamics is presented, focusing upon applications to particle diffusion within the TB tree. The new model is the first to describe particle motion while simultaneously simulating effects of wall irregularities, entrance conditions and tube curvatures. This study may explain the enhanced deposition by particle diffusion detected in replica case experiments and have salient implications for the clinically observed preferential distributions of bronchogenic carcinomas associated with inhaled radionuclides. (author)

  5. Massive stars in the Sagittarius Dwarf Irregular Galaxy

    Science.gov (United States)

    Garcia, Miriam

    2018-02-01

    Low metallicity massive stars hold the key to interpret numerous processes in the past Universe including re-ionization, starburst galaxies, high-redshift supernovae, and γ-ray bursts. The Sagittarius Dwarf Irregular Galaxy [SagDIG, 12+log(O/H) = 7.37] represents an important landmark in the quest for analogues accessible with 10-m class telescopes. This Letter presents low-resolution spectroscopy executed with the Gran Telescopio Canarias that confirms that SagDIG hosts massive stars. The observations unveiled three OBA-type stars and one red supergiant candidate. Pending confirmation from high-resolution follow-up studies, these could be the most metal-poor massive stars of the Local Group.

  6. Evaluation of Surface Slope Irregularity in Linear Parabolic Solar Collectors

    Directory of Open Access Journals (Sweden)

    F. Francini

    2012-01-01

    Full Text Available The paper describes a methodology, very simple in its application, for measuring surface irregularities of linear parabolic collectors. This technique was principally developed to be applied in cases where it is difficult to use cumbersome instruments and to facilitate logistic management. The instruments to be employed are a digital camera and a grating. If the reflector surface is defective, the image of the grating, reflected on the solar collector, appears distorted. Analyzing the reflected image, we can obtain the local slope of the defective surface. These profilometric tests are useful to identify and monitor the mirror portions under mechanical stress and to estimate the losses caused by the light rays deflected outside the absorber.

  7. Constructing a logical, regular axis topology from an irregular topology

    Science.gov (United States)

    Faraj, Daniel A.

    2014-07-01

    Constructing a logical regular topology from an irregular topology including, for each axial dimension and recursively, for each compute node in a subcommunicator until returning to a first node: adding to a logical line of the axial dimension a neighbor specified in a nearest neighbor list; calling the added compute node; determining, by the called node, whether any neighbor in the node's nearest neighbor list is available to add to the logical line; if a neighbor in the called compute node's nearest neighbor list is available to add to the logical line, adding, by the called compute node to the logical line, any neighbor in the called compute node's nearest neighbor list for the axial dimension not already added to the logical line; and, if no neighbor in the called compute node's nearest neighbor list is available to add to the logical line, returning to the calling compute node.

  8. Irregularities of ionospheric VTEC during lightning activity over Antarctic Peninsula

    International Nuclear Information System (INIS)

    Suparta, W; Wan Mohd Nor, W N A

    2017-01-01

    This paper investigates the irregularities of vertical total electron content (VTEC) during lightning activity and geomagnetic quiet days over Antarctic Peninsula in year 2014. During the lightning event, the ionosphere may be disturbed which may cause disruption in the radio signal. Thus, it is important to understand the influence of lightning on VTEC in the study of upper-lower interaction. The lightning data is obtained from World Wide Lightning Location Network (WWLLN) and the VTEC data has analyzed from Global Positioning System (GPS) for O’Higgins (OHI3), Palmer (PALV), and Rothera (ROTH). The results demonstrate the VTEC variation of ∼0.2 TECU during low lightning activity which could be caused by energy dissipation through lightning discharges from troposphere into the thermosphere. (paper)

  9. Global scale ionospheric irregularities associated with thunderstorm activity

    International Nuclear Information System (INIS)

    Pulinets, Sergey A.; Depuev, Victor H.

    2003-01-01

    The potential difference near 280 kV exists between ground and ionosphere. This potential difference is generated by thunderstorm discharges all over the world, and return current closes the circuit in the areas of fair weather (so-called fair weather current). The model calculations and experimental measurements clearly demonstrate non-uniform latitude-longitude distribution of electric field within the atmosphere. The recent calculations show that the strong large scale vertical atmospheric electric field can penetrate into the ionosphere and create large scale irregularities of the electron concentration. To check this the global distributions of thunderstorm activity obtained with the satellite monitoring for different seasons were compared with the global distributions of ionosphere critical frequency (which is equivalent to peak electron concentration) obtained with the help of satellite topside sounding. The similarity of the obtained global distributions clearly demonstrates the effects of thunderstorm electric fields onto the Earth's ionosphere. (author)

  10. Global scale ionospheric irregularities associated with thunderstorm activity

    CERN Document Server

    Pulinets, S A

    2002-01-01

    The potential difference near 280 kV exists between ground and ionosphere. This potential difference is generated by thunderstorm discharges all over the world, and return current closes the circuit in the areas of fair weather (so-called fair weather current). The model calculations and experimental measurements clearly demonstrate non-uniform latitude-longitude distribution of electric field within the atmosphere. The recent calculations show that the strong large scale vertical atmospheric electric field can penetrate into the ionosphere and create large scale irregularities of the electron concentration. To check this the global distributions of thunderstorm activity obtained with the satellite monitoring for different seasons were compared with the global distributions of ionosphere critical frequency (which is equivalent to peak electron concentration) obtained with the help of satellite topside sounding. The similarity of the obtained global distributions clearly demonstrates the effects of thunderstor...

  11. Asymmetry and irregularity border as discrimination factor between melanocytic lesions

    Science.gov (United States)

    Sbrissa, David; Pratavieira, Sebastião.; Salvio, Ana Gabriela; Kurachi, Cristina; Bagnato, Vanderlei Salvadori; Costa, Luciano Da Fontoura; Travieso, Gonzalo

    2015-06-01

    Image processing tools have been widely used in systems supporting medical diagnosis. The use of mobile devices for the diagnosis of melanoma can assist doctors and improve their diagnosis of a melanocytic lesion. This study proposes a method of image analysis for melanoma discrimination from other types of melanocytic lesions, such as regular and atypical nevi. The process is based on extracting features related with asymmetry and border irregularity. It were collected 104 images, from medical database of two years. The images were obtained with standard digital cameras without lighting and scale control. Metrics relating to the characteristics of shape, asymmetry and curvature of the contour were extracted from segmented images. Linear Discriminant Analysis was performed for dimensionality reduction and data visualization. Segmentation results showed good efficiency in the process, with approximately 88:5% accuracy. Validation results presents sensibility and specificity 85% and 70% for melanoma detection, respectively.

  12. Manufacturing of Cast Metal Foams with Irregular Cell Structure

    Directory of Open Access Journals (Sweden)

    Kroupová I.

    2015-06-01

    Full Text Available Metallic foams are materials of which the research is still on-going, with the broad applicability in many different areas (e.g. automotive industry, building industry, medicine, etc.. These metallic materials have specific properties, such as large rigidity at low density, high thermal conductivity, capability to absorb energy, etc. The work is focused on the preparation of these materials using conventional casting technology (infiltration method, which ensures rapid and economically feasible method for production of shaped components. In the experimental part we studied conditions of casting of metallic foams with open pores and irregular cell structure made of ferrous and nonferrous alloys by use of various types of filler material (precursors.

  13. Method for hot pressing irregularly shaped refractory articles

    Science.gov (United States)

    Steinkamp, William E.; Ballard, Ambrose H.

    1982-01-01

    The present invention is directed to a method for hot pressing irregularly haped refractory articles with these articles of varying thickness being provided with high uniform density and dimensional accuracy. Two partially pressed compacts of the refractory material are placed in a die cavity between displaceable die punches having compact-contacting surfaces of the desired article configuration. A floating, rotatable block is disposed between the compacts. The displacement of the die punches towards one another causes the block to rotate about an axis normal to the direction of movement of the die punches to uniformly distribute the pressure loading upon the compacts for maintaining substantially equal volume displacement of the powder material during the hot pressing operation.

  14. Irregular Migration - between legal status and social practices

    DEFF Research Database (Denmark)

    Lund Thomsen, Trine

    2012-01-01

    Arnfinn H. and Rogstad, Jon 2.Book reviews by null 3.INVISIBLE IMMIGRANTS, VISIBLE EXPATS? Americans in Finnish discourses on immigration and internationalization by Leinonen, Johanna 4.Migrants in the Scandinavian Welfare State by Brochmann, Grete and Hagelund, Anniken 5.TOWARD AN IDENTITY STRESS....... Language and religious affiliations of an immigrant adolescent in Norway by Haque, Shahzaman View Top 20 Most Downloaded Articles Previous Article Next Article Go to table of contents Download full text pdf (PDF, 425 KB) Irregular Migration – Between Legal Status and Social Practices Narratives of Polish...... connected to the specific area of activity and to the accumulated capital of the individual. The aim is to identify how opportunity structures affect the migration process and how migrants react to them depending on the available capital and biographical knowledge and experiences. The horizon of experience...

  15. New Computational Approach to Electron Transport in Irregular Graphene Nanostructures

    Science.gov (United States)

    Mason, Douglas; Heller, Eric; Prendergast, David; Neaton, Jeffrey

    2009-03-01

    For novel graphene devices of nanoscale-to-macroscopic scale, many aspects of their transport properties are not easily understood due to difficulties in fabricating devices with regular edges. Here we develop a framework to efficiently calculate and potentially screen electronic transport properties of arbitrary nanoscale graphene device structures. A generalization of the established recursive Green's function method is presented, providing access to arbitrary device and lead geometries with substantial computer-time savings. Using single-orbital nearest-neighbor tight-binding models and the Green's function-Landauer scattering formalism, we will explore the transmission function of irregular two-dimensional graphene-based nanostructures with arbitrary lead orientation. Prepared by LBNL under contract DE-AC02-05CH11231 and supported by the U.S. Dept. of Energy Computer Science Graduate Fellowship under grant DE-FG02-97ER25308.

  16. Kriging for interpolation of sparse and irregularly distributed geologic data

    Energy Technology Data Exchange (ETDEWEB)

    Campbell, K.

    1986-12-31

    For many geologic problems, subsurface observations are available only from a small number of irregularly distributed locations, for example from a handful of drill holes in the region of interest. These observations will be interpolated one way or another, for example by hand-drawn stratigraphic cross-sections, by trend-fitting techniques, or by simple averaging which ignores spatial correlation. In this paper we consider an interpolation technique for such situations which provides, in addition to point estimates, the error estimates which are lacking from other ad hoc methods. The proposed estimator is like a kriging estimator in form, but because direct estimation of the spatial covariance function is not possible the parameters of the estimator are selected by cross-validation. Its use in estimating subsurface stratigraphy at a candidate site for geologic waste repository provides an example.

  17. Towards intrinsic magnetism of graphene sheets with irregular zigzag edges.

    Science.gov (United States)

    Chen, Lianlian; Guo, Liwei; Li, Zhilin; Zhang, Han; Lin, Jingjing; Huang, Jiao; Jin, Shifeng; Chen, Xiaolong

    2013-01-01

    The magnetism of graphene has remained divergent and controversial due to absence of reliable experimental results. Here we show the intrinsic magnetism of graphene edge states revealed based on unidirectional aligned graphene sheets derived from completely carbonized SiC crystals. It is found that ferromagnetism, antiferromagnetism and diamagnetism along with a probable superconductivity exist in the graphene with irregular zigzag edges. A phase diagram is constructed to show the evolution of the magnetism. The ferromagnetic ordering curie-temperature of the fundamental magnetic order unit (FMOU) is 820 ± 80 K. The antiferromagnetic ordering Neel temperature of the FMOUs belonging to different sublattices is about 54 ± 2 K. The diamagnetism is similar to that of graphite and can be well described by the Kotosonov's equation. Our experimental results provide new evidences to clarify the controversial experimental phenomena observed in graphene and contribute to a deeper insight into the nature of magnetism in graphene based system.

  18. Combined radar observations of equatorial electrojet irregularities at Jicamarca

    Directory of Open Access Journals (Sweden)

    D. L. Hysell

    2007-03-01

    Full Text Available Daytime equatorial electrojet plasma irregularities were investigated using five distinct radar diagnostics at Jicamarca including range-time-intensity (RTI mapping, Faraday rotation, radar imaging, oblique scattering, and multiple-frequency scattering using the new AMISR prototype UHF radar. Data suggest the existence of plasma density striations separated by 3–5 km and propagating slowly downward. The striations may be caused by neutral atmospheric turbulence, and a possible scenario for their formation is discussed. The Doppler shifts of type 1 echoes observed at VHF and UHF frequencies are compared and interpreted in light of a model of Farley Buneman waves based on kinetic ions and fluid electrons with thermal effects included. Finally, the up-down and east-west asymmetries evident in the radar observations are described and quantified.

  19. Comparison of different dose calculation methods for irregular photon fields

    International Nuclear Information System (INIS)

    Zakaria, G.A.; Schuette, W.

    2000-01-01

    In this work, 4 calculation methods (Wrede method, Clarskon method of sector integration, beam-zone method of Quast and pencil-beam method of Ahnesjoe) are introduced to calculate point doses in different irregular photon fields. The calculations cover a typical mantle field, an inverted Y-field and different blocked fields for 4 and 10 MV photon energies. The results are compared to those of measurements in a water phantom. The Clarkson and the pencil-beam method have been proved to be the methods of equal standard in relation to accuracy. Both of these methods are being distinguished by minimum deviations and applied in our clinical routine work. The Wrede and beam-zone methods deliver useful results to central beam and yet provide larger deviations in calculating points beyond the central axis. (orig.) [de

  20. Experimental Study of Irregular Waves on a Gravel Beach

    Science.gov (United States)

    Hu, Nai-Ren; Wu, Yun-Ta; Hwung, Hwung-Hweng; Yang, Ray-Yeng

    2017-04-01

    In the east coast of Taiwan, the sort grain size more belongs to cobble or gravel, which is physically distinct compared to the sandy beach in the west coast of Taiwan. Although gravel beaches can dissipate more of wave energy, gravel beaches were eroded and coastal road were damaged especially during typhoons. The purpose of this study is to investigate the geomorphological response of gravel beach due to irregular waves. This experiment was carry out in a 21m long, 50 cm wide, 70 cm high wave tank at Tainan Hydraulics Laboratory, National Cheng-Kung University, Taiwan. To simulate of the geometry in the east coast of Taiwan, a physical model with 1/36 scale-down was used, in which the seawall was 10cm built upon a 1:10 slope and gravel grains with D50 being 3.87 mm was nourished in front of the seawall. In terms of typhoon-scale wave condition, irregular waves with scale-down conditions were generated for 600 s for each scenarios and, three different water levels with respect to the gravel beach are designed. Application of laser combined with image processing to produce 3D topographic map, the erosion zone and accretion zone would be found. The resulting morphological change of gravel beach will be measured using an integrated laser and image processing tool to have 3D topographic maps. It is expected to have more understanding about under what conditions the gravel coasts suffer the least damage. In particular, the relation between erosion rates of gravel beach, the angle of gravel slope and the length of the plane on the gravel slope will be achieved

  1. Tamoxifen treatment of bleeding irregularities associated with Norplant use.

    Science.gov (United States)

    Abdel-Aleem, Hany; Shaaban, Omar M; Amin, Ahmed F; Abdel-Aleem, Aly M

    2005-12-01

    To evaluate the possible role of tamoxifen (selective estrogen receptor modulators, SERM) in treating bleeding irregularities associated with Norplant contraceptive use. Randomized clinical trial including 100 Norplant users complaining of vaginal bleeding irregularities. The trial was conducted in the Family Planning Clinic of Assiut University Hospital. Women were assigned at random to receive tamoxifen tablets (10 mg) twice daily for 10 days or similar placebo. Women were followed-up for 3 months. The end points were percentage of women who stopped bleeding during treatment, bleeding/spotting days during the period of follow-up, effect of treatment on their lifestyle, and side effects and discontinuation of contraception. There was good compliance with treatment. At the end of treatment, a significantly higher percentage of tamoxifen users stopped bleeding in comparison to the control group (88% vs. 68%, respectively; p=.016). Women who used tamoxifen had significantly less bleeding and/or spotting days than women who used placebo, during the first and second months. During the third month, there were no significant differences between the two groups. Women who used tamoxifen reported improvement in performing household activities, religious duties and in sexual life, during the first 2 months. In the third month, there were no differences between the two groups. There were no significant differences between tamoxifen and placebo groups in reporting side effects. In the group who used tamoxifen, two women discontinued Norplant use because of bleeding vs. nine women in the placebo group. Tamoxifen use at a dose of 10 mg twice daily orally, for 10 days, has a beneficial effect on vaginal bleeding associated with Norplant use. In addition, the bleeding pattern was better in women who used tamoxifen for the following 2 months after treatment. However, these results have to be confirmed in a larger trial before advocating this line of treatment.

  2. ESA' s novel gravitational modeling of irregular planetary bodies

    Science.gov (United States)

    Ortega, Guillermo

    A detailed understanding and modeling of the gravitational modeling is required for realistic investigation of the dynamics of orbits close to irregularly shaped bodies. Gravity field modelling up to a certain maximum spherical harmonic degree N involves N2 unkown spherical harmonic coefficients or complex harmonics. The corresponding number of matrix entries reaches till N4 . For missions like CHAMP, GRACE or GOCE, the maximum degree of resolution is 75, 150 and 300 respectively. Therefore, the number of unknowns for a satellite like GOCE will be around 100.000. Since these missions usually fly for a period of time of several years, the number of observations is huge. Hence, gravity field recovery from these missions is a high demanding task. The classical approaches like spherical expansion of the potential lead generally to a high number of coefficients, which reduce the software computational efficiency of the orbit propagation and which have mostly a limited physical meaning. One of the main targets of the activity is the modelling of asteroids, small moons, and cometary bodies. All celestial bodies are irregular by definition. However, the scope of the activity is broad enough as to be able to use the models and the software in quasy-regular bodies as well. Therefore the models and tools could be used for bodies such as the Moon, Mars, Venus, Deimos, Europa, Eros, Mathilda, and Churyumov-Gerasimenko, etc., being these applications relevant for scientific (Rosetta, Bepi Colombo), exploration (Exo-Mars), NEO mitigation (Don Quijote) and Earth observation (GOCE) missions of ESA.

  3. Volume determination of irregularly-shaped quasi-spherical nanoparticles.

    Science.gov (United States)

    Attota, Ravi Kiran; Liu, Eileen Cherry

    2016-11-01

    Nanoparticles (NPs) are widely used in diverse application areas, such as medicine, engineering, and cosmetics. The size (or volume) of NPs is one of the most important parameters for their successful application. It is relatively straightforward to determine the volume of regular NPs such as spheres and cubes from a one-dimensional or two-dimensional measurement. However, due to the three-dimensional nature of NPs, it is challenging to determine the proper physical size of many types of regularly and irregularly-shaped quasi-spherical NPs at high-throughput using a single tool. Here, we present a relatively simple method that determines a better volume estimate of NPs by combining measurements from their top-down projection areas and peak heights using two tools. The proposed method is significantly faster and more economical than the electron tomography method. We demonstrate the improved accuracy of the combined method over scanning electron microscopy (SEM) or atomic force microscopy (AFM) alone by using modeling, simulations, and measurements. This study also exposes the existence of inherent measurement biases for both SEM and AFM, which usually produce larger measured diameters with SEM than with AFM. However, in some cases SEM measured diameters appear to have less error compared to AFM measured diameters, especially for widely used IS-NPs such as of gold, and silver. The method provides a much needed, proper high-throughput volumetric measurement method useful for many applications. Graphical Abstract The combined method for volume determination of irregularly-shaped quasi-spherical nanoparticles.

  4. Reproducibility of irregular radiation fields for malignant lymphoma

    International Nuclear Information System (INIS)

    Mock, U.; Dieckmann, K.; Poetter, R.; Molitor, A.M.; Haverkamp, U.

    1998-01-01

    Purpose: Radiation treatment for malignant lymphoma requires large field irradiation with irregular blocks according to the individual anatomy and tumor configuration. For determination of safety margins (PTV) we quantitatively analysed the accuracy of field and block placement with regard to different anatomical regions. Patients and Methods: Forty patients with malignant lymphoma were irradiated using the classical supra-/infradiaphragmatic field arrangements. Treatment was performed with 10-MeV photons and irregularly shaped, large opposing fields. We evaluated the accuracy of field and block placements during the treatment courses by comparing the regularly performed verification - with the simulation films. Deviations were determined with respect to the field edges and the central axis, along the x- and z-axis. Results: With regard to the field edges, mean deviations of 2.0 mm and 3.4 mm were found along the x- and z-axis. The corresponding standard deviations were 3.4 mm and 5.5 mm, respectively. With regard to the shielding blocks, mean displacement along the x- and z-axis was 2.2 mm and 3.8 mm. In addition, overall standard deviations of 5.7 mm (x-axis) and 7.1 mm (z-axis) were determined. During the course of time an improved accuracy of block placement was notable. Conclusion: Systematic analysis of port films gives information for a better defining safety margins in external radiotherapy. Evaluation of verification films on a regular basis improves set-up accuracy by reducing displacements. (orig.) [de

  5. Rain-Induced Wash-Off of Chemical Warfare Agent (VX) from Foliar Surfaces of Living Plants Maintained in a Surety Hood

    Science.gov (United States)

    2016-09-01

    RAIN-INDUCED WASH-OFF OF CHEMICAL WARFARE AGENT (VX) FROM FOLIAR SURFACES OF LIVING PLANTS MAINTAINED IN A...Final 3. DATES COVERED (From - To) May 2014 – Sep 2015 4. TITLE AND SUBTITLE Rain-Induced Wash-Off of Chemical Warfare Agent (VX) from Foliar...galli Foliage Chemical warfare agent (CWA) O-ethyl-S-(2

  6. Measurements of electron density irregularities in the ionosphere of Jupiter by Pioneer 10

    International Nuclear Information System (INIS)

    Woo, R.; Yang, F.

    1976-01-01

    In this paper we demonstrate that when the frequency spectrum of the log amplitude fluctuations is used, the radio occultation experiment is a powerful tool for detecting, identifying, and studying ionospheric irregularities. Analysis of the Pioneer 10 radio occultation measurements reveals that the Jovian ionosphere possesses electron density irregularities which are very similar to those found in the earth's ionosphere. This is the first time such irregularities have been found in a planetary ionosphere other than that of earth. The Pioneer 10 results indicate that the spatial wave number spectrum of the electron density irregularities is close to the Kolmogorov spectrum and that the outer scale size is greater than the Fresnel size (6.15 km). This type of spectrum suggests that the irregularities are probably produced by the turbulent dissipation of irregularities larger than the outer scale size

  7. Guerilla Warfare & Law Enforcement: Combating the 21st Century Terrorist Cell within the U.S.

    Directory of Open Access Journals (Sweden)

    Major Richard Hughbank

    2009-01-01

    Full Text Available Both domestic and international terrorist organizations employ guerrilla warfare tactics, techniques, and procedures. Thus, the ability to identify and defeat the members of these organizations, cripple their infrastructures, and disrupt their financial resources lies in the understanding of modern guerrilla warfare as it develops in the twenty-first century within the United States.3 The forms of asymmetric warfare4 adopted by domestic and international terrorist groups alike is no longer intended to gain simple media exposure or governmental manipulation; they want to make an overpowering impact by causing massive loss of life and severe damage to infrastructure and are often motivated by religious imperatives and political goals. As terrorism analyst Stephen Flynn has observed, "Throughout the 20th century [Americans] were able to treat national security as essentially an out-of-body experience. When confronted by threats, [America] dealt with them on the turf of our allies or our adversaries. Aside from the occasional disaster and heinous crime, civilian life [in the United States] has been virtually terror-free." With the turn of the twenty-first century, terrorist operations have become more prevalent in the United States and are taking shape in the form of modern guerrilla warfare, thus creating new challenges for federal, state, and local law enforcement agencies. After reviewing the origin and nature of these challenges, this article will offer some suggestions for countering guerilla warfare in the United States.

  8. Potential Science and Technology Game Changers for the Ground Warfare of 2050: Selected Projections Made in 2017

    Science.gov (United States)

    2018-02-01

    ARL-TR-8283 ● FEB 2018 US Army Research Laboratory Potential Science and Technology Game Changers for the Ground Warfare of 2050...Science and Technology Game Changers for the Ground Warfare of 2050: Selected Projections Made in 2017 by Alexander Kott Office of the Director...Brian Sadler Vehicle Technology Directorate, ARL Ananthram Swami Computational and Information Sciences Directorate, ARL Approved for

  9. Crime among irregular immigrants and the influence of internal border control

    OpenAIRE

    Leerkes, Arjen; Engbersen, Godfried; Leun, Joanne

    2012-01-01

    textabstractBoth the number of crime suspects without legal status and the number of irregular or undocumented immigrants held in detention facilities increased substantially in theNetherlands between 1997 and 2003. In this period, theDutch state increasingly attempted to exclude irregular immigrants from the formal labour market and public provisions. At the same time the registered crime among irregular migrants rose. The 'marginalisation thesis' asserts that a larger number of migrants hav...

  10. Naval Undersea Warfare Center Division Newport utilities metering, Phase 1

    Energy Technology Data Exchange (ETDEWEB)

    Carroll, D.M.

    1992-11-01

    Pacific Northwest Laboratory developed this report for the US Navy`s Naval Undersea Warfare Center Division Newport, Rhode Island (NUWC). The purpose of the report was to review options for metering electricity and steam used in the NUWC compound, and to make recommendations to NUWC for implementation under a follow-on project. An additional NUWC concern is a proposed rate change by the servicing utility, Newport Electric, which would make a significant shift from consumption to demand billing, and what effect that rate change would have on the NUWC utility budget. Automated, remote reading meters are available which would allow NUWC to monitor its actual utility consumption and demand for both the entire NUWC compound and by end-use in individual buildings. Technology is available to perform the meter reads and manipulate the data using a personal computer with minimal staff requirement. This is not meant to mislead the reader into assuming that there is no requirement for routine preventive maintenance. All equipment requires routine maintenance to maintain its accuracy. While PNL reviewed the data collected during the site visit, however, it became obvious that significant opportunities exist for reducing the utility costs other than accounting for actual consumption and demand. Unit costs for both steam and electricity are unnecessarily high, and options are presented in this report for reducing them. Additionally, NUWC has an opportunity to undertake a comprehensive energy resource management program to significantly reduce its energy demand, consumption, and costs.

  11. Naval Undersea Warfare Center Division Newport utilities metering, Phase 1

    Energy Technology Data Exchange (ETDEWEB)

    Carroll, D.M.

    1992-11-01

    Pacific Northwest Laboratory developed this report for the US Navy's Naval Undersea Warfare Center Division Newport, Rhode Island (NUWC). The purpose of the report was to review options for metering electricity and steam used in the NUWC compound, and to make recommendations to NUWC for implementation under a follow-on project. An additional NUWC concern is a proposed rate change by the servicing utility, Newport Electric, which would make a significant shift from consumption to demand billing, and what effect that rate change would have on the NUWC utility budget. Automated, remote reading meters are available which would allow NUWC to monitor its actual utility consumption and demand for both the entire NUWC compound and by end-use in individual buildings. Technology is available to perform the meter reads and manipulate the data using a personal computer with minimal staff requirement. This is not meant to mislead the reader into assuming that there is no requirement for routine preventive maintenance. All equipment requires routine maintenance to maintain its accuracy. While PNL reviewed the data collected during the site visit, however, it became obvious that significant opportunities exist for reducing the utility costs other than accounting for actual consumption and demand. Unit costs for both steam and electricity are unnecessarily high, and options are presented in this report for reducing them. Additionally, NUWC has an opportunity to undertake a comprehensive energy resource management program to significantly reduce its energy demand, consumption, and costs.

  12. Simulation-based planning for theater air warfare

    Science.gov (United States)

    Popken, Douglas A.; Cox, Louis A., Jr.

    2004-08-01

    Planning for Theatre Air Warfare can be represented as a hierarchy of decisions. At the top level, surviving airframes must be assigned to roles (e.g., Air Defense, Counter Air, Close Air Support, and AAF Suppression) in each time period in response to changing enemy air defense capabilities, remaining targets, and roles of opposing aircraft. At the middle level, aircraft are allocated to specific targets to support their assigned roles. At the lowest level, routing and engagement decisions are made for individual missions. The decisions at each level form a set of time-sequenced Courses of Action taken by opposing forces. This paper introduces a set of simulation-based optimization heuristics operating within this planning hierarchy to optimize allocations of aircraft. The algorithms estimate distributions for stochastic outcomes of the pairs of Red/Blue decisions. Rather than using traditional stochastic dynamic programming to determine optimal strategies, we use an innovative combination of heuristics, simulation-optimization, and mathematical programming. Blue decisions are guided by a stochastic hill-climbing search algorithm while Red decisions are found by optimizing over a continuous representation of the decision space. Stochastic outcomes are then provided by fast, Lanchester-type attrition simulations. This paper summarizes preliminary results from top and middle level models.

  13. Back to the future: aerial warfare in Libya

    Directory of Open Access Journals (Sweden)

    João Paulo Nunes Vicente

    2013-05-01

    Full Text Available A century after the first air bomb mission, a new intervention in the same geographic space has made evident the changes in Airpower. The Aerial Warfare in Libya has radically changed the civil war, complying with a UN mission to protect Libyan population, imposing a no-fly zone and an arms embargo. Therefore, Operation Unified Protector became one of the most successful campaigns in the history of NATO. We aim to assess the operational efficiency of Airpower in the conflict in Libya, focusing on the challenges of a War essentially Aerial. Despite the military results and the fact that some political objectives were met, we can identify some concerning trends that, if not shifted, may negatively influence future NATO operations. We do not aim to draw general and universal conclusions on the strategic value of Airpower based on the analysis of a specific case. Above all, we focus on identifying some lessons which have influenced OUP operational efficiency. Thus, we must analyze some factors, such as the scope of objectives, the type of opposing action and aerial strategy used by the coalition and then focus on the challenges arising from the OUP.

  14. Drone Warfare: Twenty-First Century Empire and Communications

    Directory of Open Access Journals (Sweden)

    Kevin Howley

    2017-02-01

    Full Text Available This paper, part of a larger project that examines drones from a social-construction of technology perspective, considers drone warfare in light of Harold Innis’s seminal work on empire and communication. Leveraging leading-edge aeronautics with advanced optics, data processing, and networked communication, drones represent an archetypal “space-biased” technology. Indeed, by allowing remote operators and others to monitor, select, and strike targets from half a world away, and in real-time, these weapon systems epitomize the “pernicious neglect of time” Innis sought to identify and remedy in his later writing. With Innis’s time-space dialectic as a starting point, then, the paper considers drones in light of a longstanding paradox of American culture: the impulse to collapse the geographical distance between the United States and other parts of the globe, while simultaneously magnifying the cultural difference between Americans and other peoples and societies. In the midst of the worldwide proliferation of drones, this quintessentially sublime technology embodies this (disconnect in important, profound, and ominous ways.

  15. Prevalence of Asthma in Children of Chemical Warfare Victims

    Science.gov (United States)

    Mirsadraee, Majid; Mozaffari, Abolfazl; Attaran, Davood

    2011-01-01

    Objective Exposure of DNA to sulfur mustard gas may increase the inheritance of asthma in chemical warfare victims' (CWV) offspring. The objective of this study was to determine the prevalence of asthma in children of CWV and compare it to asthmatic children in the general population. Methods Four hundred and nine children from 130 CWV fathers and 440 children from 145 asthmatic parents from two cities in Iran participated in this study. The prevalence of asthma was determined by standard questionnaire released for epidemiological survey of asthma in children and compared between two groups. Findings The prevalence of asthma in the CWV group was 15%; this was not significantly different from the control group (12.5%). The children of the CWV group reported a significantly greater incidence of wheezing (1.2±3.1 attacks) per year, but the control group reported more severe attacks leading to speech difficulties (3%) and coughing (7%). Regression analysis showed that with increasing family size in the control group, the number of subjects suffering from asthmatic symptoms decreases significantly (r=0.86, P=0.001). Conclusion Chemical agents may increase the prevalence of asthma in the offspring of CWV. PMID:23056804

  16. Effects of magnetic storm phases on F layer irregularities below the auroral oval

    International Nuclear Information System (INIS)

    Aarons, J.; Gurgiolo, C.; Rodger, A.S.

    1988-01-01

    Observations of F-layer irregularity development and intensity were obtained between September and October 1981, primarily over subauroral latitudes in the area of the plasmapause. The results reveal the descent of the auroral irregularity region to include subauroral latitudes in the general area of the plasmapause during the main phases of a series of magnetic storms. Irregularities were found primarily at lower latitudes during the subauroral or plasmapause storm. A model for the subauroral irregularities in recovery phases of magnetic storms is proposed in which energy stored in the ring current is slowly released. 27 references

  17. Dependence on zenith angle of the strength of 3-meter equatorial electrojet irregularities

    International Nuclear Information System (INIS)

    Ierkic, H.M.; Fejer, B.G.; Farley, D.T.

    1980-01-01

    Radar measurements in Peru were used to deduce the zenith angle dependence of the scattering cross section of plasma irregularities generated by instabilities in the equatorial electrojet. The irregularities probed by the 50 MHz Jicamarca radar had a wavelength of 3m. The cross section for the type 2 irregularities was isotopic in the plane perpendicular to the magnetic field, while the cross section for the stronger type 1 irregularities varied with zenith angle at a rate of approximately 0.3 dB/degree; the horizontally traveling waves were more than 100 times stronger than those traveling vertically

  18. Spatial irregularities in Jupiter's upper ionosphere observed by Voyager radio occultations

    Science.gov (United States)

    Hinson, D. P.; Tyler, G. L.

    1982-01-01

    Radio scintillations (at 3.6 and 13 cm) produced by scattering from ionospheric irregularities during the Voyager occultations are interpreted using a weak-scattering theory. Least squares solutions for ionospheric parameters derived from the observed fluctuation spectra yield estimates of (1) the axial ratio, (2) angular orientation of the anisotropic irregularities, (3) the power law exponent of the spatial spectrum of irregularities, and (4) the magnitude of the spatial variations in electron density. It is shown that the measured angular orientation of the anisotropic irregularities indicates magnetic field direction and may provide a basis for refining Jovian magnetic field models.

  19. Special relativity

    International Nuclear Information System (INIS)

    Taylor, J.G.

    1975-01-01

    It is stated that the early chapters review special relativity from an elementary mathematical viewpoint, and include discussion of recent experiments which set out to test Einstein's predictions. The theory of relativity is then reformulated in more sophisticated mathematical language to show its relation to electro-magnetism, and to lay the foundation for more general viewpoints. The final chapter discusses in simple terms where activity in the field is currently centred, and where future interest lies. Chapter headings include: the constant speed of light; measuring time and distance; the Lorentz transformation (relativity of simultaneity, space-time and causality); relativistic kinematics (including - the Dopper effect); relativistic dynamics (including - nuclear binding energy, particle creation, electrodynamics); the structure of special relativity (including - the Lorentz group, the rotation group, elementary particle scattering); extensions of special relativity. (U.K.)

  20. Detection of biological warfare agents using ultra violet-laser induced fluorescence LIDAR.

    Science.gov (United States)

    Joshi, Deepti; Kumar, Deepak; Maini, Anil K; Sharma, Ramesh C

    2013-08-01

    This review has been written to highlight the threat of biological warfare agents, their types and detection. Bacterial biological agent Bacillus anthracis (bacteria causing the disease anthrax) which is most likely to be employed in biological warfare is being discussed in detail. Standoff detection of biological warfare agents in aerosol form using Ultra violet-Laser Induced Fluorescence (UV-LIF) spectroscopy method has been studied. Range-resolved detection and identification of biological aerosols by both nano-second and non-linear femto-second LIDAR is also discussed. Calculated received fluorescence signal for a cloud of typical biological agent Bacillus globigii (Simulants of B. anthracis) at a location of ~5.0 km at different concentrations in presence of solar background radiation has been described. Overview of current research efforts in internationally available working UV-LIF LIDAR systems are also mentioned briefly. Copyright © 2013 Elsevier B.V. All rights reserved.