WorldWideScience

Sample records for irregular warfare special

  1. Irregular Warfare: Special Operations Joint Professional Military Education Transformation

    National Research Council Canada - National Science Library

    Cannady, Bryan H

    2008-01-01

    ... on today's battlefront in Afghanistan and Iraq and in the Global War on Terrorism (GWOT). At the forefront of the GWOT and irregular warfare are the United States Special Operations Command (USSOCOM...

  2. Strategic Analysis of Irregular Warfare

    Science.gov (United States)

    2010-03-01

    the same mathematical equations used by Lanchester .10 Irregular Warfare Theory and Doctrine It is time to develop new analytical methods and models...basis on which to build, similar to what Lanchester provided almost 100 years ago. Figure 9 portrays both Lanchester’s approach and an irregular 17

  3. The Impact of Irregular Warfare on the US Army

    National Research Council Canada - National Science Library

    McDonald, III, Roger L

    2006-01-01

    Although the U.S. Army has yet to clearly define irregular warfare, it is imperative that the Army take near-term action to enhance the ability of Soldiers and units to operate effectively in an irregular warfare environment...

  4. Irregular Warfare: New Challenges for Civil-Military Relations

    National Research Council Canada - National Science Library

    Cronin, Patrick M

    2008-01-01

    .... Irregular warfare introduces new complications to what Eliot Cohen has called an unequal dialogue between civilian and military leaders in which civilian leaders hold the true power but must modulate...

  5. Irregular Warfare: Impact on Future Professional Military Education

    National Research Council Canada - National Science Library

    Paschal, David G

    2006-01-01

    ... to operate effectively in an irregular warfare environment. The utility of a decisive war between nation states continues to decline and will eventually reach critical mass based upon the extreme imbalance of military power and a U.S. monopoly...

  6. Conflict Without Casualties: Non-Lethal Weapons in Irregular Warfare

    Science.gov (United States)

    2007-09-01

    the body,” and the Geneva Protocol of 1925, bans the use of chemical and biological weapons .11 On 8 April 1975, President Ford issued Executive...E Funding – PE 63851M) (accessed 15 December 2006). The American Journal of Bioethics . “Medical Ethics and Non-Lethal Weapons .” Bioethics.net...CASUALTIES: NON-LETHAL WEAPONS IN IRREGULAR WARFARE by Richard L. Scott September 2007 Thesis Advisor: Robert McNab Second Reader

  7. Optimizing Armed Forces Capabilities for Hybrid Warfare – New Challenge for Slovak Armed Forces

    Directory of Open Access Journals (Sweden)

    Peter PINDJÁK

    2015-09-01

    Full Text Available The paper deals with the optimization of military capabilities of the Slovak Armed Forces for conducting operations in a hybrid conflict, which represents one of the possible scenarios of irregular warfare. Whereas in the regular warfare adversaries intend to eliminate the centers of gravity of each other, most often command and control structures, in irregular conflicts, the center of gravity shifts towards the will and cognitive perception of the target population. Hybrid warfare comprises a thoroughly planned combination of conventional military approaches and kinetic operations with subversive, irregular activities, including information and cyber operations. These efforts are often accompanied by intensified activities of intelligence services, special operation forces, and even mercenary and other paramilitary groups. The development of irregular warfare capabilities within the Slovak Armed Forces will require a progressive transformation process that may turn the armed forces into a modern and adaptable element of power, capable of deployment in national and international crisis management operations.

  8. Structuring Naval Special Warfare junior officer professional military education

    OpenAIRE

    Donovan, Thomas A.

    2007-01-01

    Naval Special Warfare does not currently have a designated career path for an officer that requires professional military education (PME) for SEAL junior officers after the rank of Ensign (O-1) and before the rank of Lieutenant Commander (O-4). There currently is interest in this subject matter at the Naval Special Warfare Command and Center. SEAL officers increasingly hold key leadership positions and influence critical decisions in the execution of national strategy. This growing respo...

  9. Toward Operational Art in Special Warfare

    Science.gov (United States)

    2016-02-23

    combatant commanders develop special warfare cam- paign options for their theaters that can be integral parts of the national approach. Getting buy -in at...the resistance spawning franchise operations at home or abroad? – Is the resistance attracting funding or other forms of assistance (indigenous

  10. Special Operations, Irregular Warfare, and Operational Art: A Theory of Special Operations

    Science.gov (United States)

    2013-12-10

    is mostly but not wholly a land phenomenon. Naval forces have combatted maritime irregulars such as pirates for millennia, for example see: Plutarch ...SW2502SocialMediaAndUW.html (accessed June 15, 2013). Plaster, John L. SOG: Secret Wars of America’s Commandos in Vietnam. New York: Simon & Schuster, 1997. Plutarch

  11. 75 FR 6642 - Notice of Proposed Information Collection; Naval Special Warfare Recruiting Directorate

    Science.gov (United States)

    2010-02-10

    ... Information Collection; Naval Special Warfare Recruiting Directorate AGENCY: Department of the Navy, DoD. ACTION: Notice. SUMMARY: The Naval Special Warfare (NSW) Recruiting Directorate announces the submission... any of the following methods: Federal eRulemaking Portal: http://www.regulations.gov . Follow the...

  12. Roots of Russian Irregular Warfare

    Science.gov (United States)

    2016-12-01

    PAGE INTENTIONALLY LEFT BLANK xiii ACKNOWLEDGMENTS Crissy, your encouragement throughout my career and especially during this project has been...all of the Russian disinformation techniques in Ukraine came directly “from Soviet toolkits .” Maria Snegovaya, “Putin’s Information Warfare In

  13. Special Forces and the Art of Influence: A Grassroots Approach to Psychological Operations in an Unconventional Warfare Environment

    National Research Council Canada - National Science Library

    Thomas, II, Joel W

    2006-01-01

    This thesis researches the intricacies of the art of influence in an unconventional warfare environment to develop a model of influence that can be utilized by Special Forces conducting unconventional warfare...

  14. Special Operations Forces: C-130 Upgrade Plan Could Help Fix Electronic Warfare Deficiencies

    National Research Council Canada - National Science Library

    1998-01-01

    In response to a concern that threats to the U.S. Special Operations Command's (USSOCOM) aircraft are increasing, while funds available for electronic warfare are decreasing, the General Accounting Office...

  15. Using Agent Based Distillation to Explore Issues Related to Asymmetric Warfare

    Science.gov (United States)

    2009-10-01

    official definition of asymmetric warfare , considering that its use was redundant to irregular warfare [30]. 2 Such as the Lanchester Equations...RTP-MP-MSG-069 23 - 1 Using Agent Based Distillation to Explore Issues Related to Asymmetric Warfare Martin Adelantado, Jean-Michel Mathé...shows that both conventional and asymmetric warfare are characterised by nonlinear behaviours and that engagement is a Complex Adaptive System (CAS

  16. Examining U.S. Irregular Warfare Doctrine

    National Research Council Canada - National Science Library

    Kimbrough, IV, James M

    2008-01-01

    ... of insurgency and terrorism. In response to the associated strategic challenges, a growing debate occurred among military historians, strategists, and leaders about the proper principles necessary for contemporary irregular...

  17. Unconventional Cyber Warfare: Cyber Opportunities in Unconventional Warfare

    Science.gov (United States)

    2014-06-01

    Internet service provider IW irregular warfare MCO major combat operations MySQL open-source relational database management system NATO North...today, often with no regard for legal or ethical constraints. A better course of action would be to conduct operations in cyberspace within the precepts...built in feature of MySQL that 97 John Markoff, “Before the Gunfire, Cyberattacks,” York Times, August 13, 2008, sec. Technology, 1, http

  18. 2008 13th Expeditionary Warfare Conference

    Science.gov (United States)

    2008-10-23

    platforms – Emphasize a mixed fleet approach that spans the “iron triangle” – Integrate MRAP into the fleet mix – Transition to a fleet of tactical...Urban Warfare Mountain Warfare Desert Warfare Jungle Riverine Special Skills Recon LOG CSS ENG MT HS Ord Maint EOD Pers Retrival ...Detection (Specialized Platform FLGPR)Stand-off (60M) Scaleable Neutralization (Area coverage) ABV Delivery Ground Cueing Stand-off (800M) Scaleable

  19. Assessing the Role of Surgical Strike Operations in Support of a Special Warfare Campaign

    Science.gov (United States)

    2017-06-09

    classic example of special warfare in action is the use of Special Forces soldiers to facilitate the Northern Alliance’s overthrow of the Taliban...Finally, the tempo of surgical strike operations must be taken into account. Renowned British counterinsurgent of the Boer War, Charles Callwell...December 2016, accessed 15 December 2016, http://edition.cnn.com/2010/ WORLD /asiapcf/10/09/ afghanistan.british.worker.death/index.html?hpt=T2. 43 camps

  20. Justice: A Problem for Military Ethics during Irregular War

    National Research Council Canada - National Science Library

    Bauer, John W

    2008-01-01

    ... is?" or "Justice according to whom?" The relative nature of the term "justice" creates a problem for military ethics, particularly when soldiers try to determine what actions are morally acceptable when they are engaged in irregular warfare...

  1. Models, Analysis, and Recommendations Pertaining to the Retention of Naval Special Warfare s Mid-Level Officers

    Science.gov (United States)

    2013-12-01

    The Analytic Hierarch/Network Process,” in Rev. R. Acad. Cien. Serie A. Mat (RACSAM), submitted by Francisco Javier Giron (Real Academia de Ciencias ...Academia de Ciencias : Spain. Scott, Nathan. Naval Special Warfare Officer Retention Survey. Monterey, CA: NPS Press, September 2013. Whittenberger

  2. Special Forces and the Art of Influence: A Grassroots Approach to Psychological Operations in an Unconventional Warfare Environment

    National Research Council Canada - National Science Library

    Thomas, II, Joel W

    2006-01-01

    .... The research was based on several premises: (1) the strategic utility of Special Forces (SF) lies in its ability to influence a target audience in an unconventional warfare (UW) environment; (2...

  3. Learning on the Move, OSS Detachment 101 Special Operations in Burma

    Science.gov (United States)

    2015-06-12

    actions would serve as shaping effects for larger conventional operations. Modern US Army Special Operations doctrine further supports this...their irregular brand of warfare as the decisive operation for a campaign where conventional forces were not suitable, prepared, or politically...Operations doctrine, America’s early SOF did not have the luxury of implementing schoolhouse solution sets and designed each solution as a campaign unfolded

  4. Above the Influence: The Strategic Effects of Airpower in Irregular Warfare

    Science.gov (United States)

    2010-06-01

    INDOCHINA. . . . . . . . . . . . . . . . . . . . . 105 APPENDIX B: MAP OF LAOS . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 APPENDIX...perspectives. These perspectives involve the use of airpower in North Vietnam, South Vietnam, and Laos . The overarching political endstate or...Nagl, ―Principles, Imperatives, and Paradoxes of Counterinsurgency,‖ 50; Mao Tse -Tung, Problems of Strategy in Guerrilla Warfare, 215-216; Gray

  5. Strategic Choice: United States Special Forces’ Comparative Advantage in Irregular Warfare

    Science.gov (United States)

    2017-03-01

    metrics. 124 James Kiras, Special Operations and the Nature of Strategy : From World War II to the War on Terrorism , Vol. 17 (New York: Routledge...Operations and the nature of Strategy : From World War II to the War on Terrorism . Vol. 17. New York: Routledge. 2006. Liddell Hart, B. H. Strategy . New...indirect strategies . This thesis examines the conflict interaction between weak and strong actors. For the strong actor, this thesis identifies that

  6. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  7. Postural Stability of Special Warfare Combatant-Craft Crewmen With Tactical Gear.

    Science.gov (United States)

    Morgan, Paul M; Williams, Valerie J; Sell, Timothy C

    The US Naval Special Warfare's Special Warfare Combatant-Craft Crewmen (SWCC) operate on small, high-speed boats while wearing tactical gear (TG). The TG increases mission safety and success but may affect postural stability, potentially increasing risk for musculoskeletal injury. Therefore, the purpose of this study was to examine the effects of TG on postural stability during the Sensory Organization Test (SOT). Eight SWCC performed the SOT on NeuroCom's Balance Manager with TG and with no tactical gear (NTG). The status of gear was performed in randomized order. The SOT consisted of six different conditions that challenge sensory systems responsible for postural stability. Each condition was performed for three trials, resulting in a total of 18 trials. Overall performance, each individual condition, and sensory system analysis (somatosensory, visual, vestibular, preference) were scored. Data were not normally distributed therefore Wilcoxon signed-rank tests were used to compare each variable (ρ = .05). No significant differences were found between NTG and TG tests. No statistically significant differences were detected under the two TG conditions. This may be due to low statistical power, or potentially insensitivity of the assessment. Also, the amount and distribution of weight worn during the TG conditions, and the SWCC's unstable occupational platform, may have contributed to the findings. The data from this sample will be used in future research to better understand how TG affects SWCC. The data show that the addition of TG used in our study did not affect postural stability of SWCC during the SOT. Although no statistically significant differences were observed, there are clinical reasons for continued study of the effect of increased load on postural stability, using more challenging conditions, greater surface perturbations, dynamic tasks, and heavier loads. 2016.

  8. Interagency Cooperation for Irregular Warfare at the Combatant Command

    Science.gov (United States)

    2009-01-01

    enemy’s command capability.16 Salamoni argued that the term “irregular warfare” belies an ethnocentric perspective of conflict that will limit military...duty military staffing to form the nucleus of the organization, which would receive augmentation from additional assigned reservists and interagency

  9. Military medicine and the ethics of war: British colonial warfare during the Seven Years War (1756-63).

    Science.gov (United States)

    Charters, Erica

    2010-01-01

    This article examines 18th-century European warfare, tracing the first formal codifications of conventions of war, frequently introduced by military physicians and initially regarding the treatment of the sick and wounded. It outlines to what extent these conventions were followed in practice, particularly in the challenging environment of American irregular warfare, with a focus on the most well-known incident of "biological warfare" in the period: the deliberate spread of smallpox by British officers among Amerindians in 1763. More broadly, it demonstrates that the history of military medicine provides a fruitful method with which to uncover assumptions about the ethics of war.

  10. The ethics of drone warfare

    Directory of Open Access Journals (Sweden)

    Fatić Aleksandar

    2017-01-01

    Full Text Available The paper investigates the compatibility of the modern technologies of warfare, specifically the use of offensive drones, with traditional military ethics and suggests that the new technologies radically change the value system of the military in ways which make large parts of the traditional military ethics inapplicable. The author suggests that Agamben’s concept of ‘effectivity’ through ‘special actions’ which mark one’s belonging to a particular community or profession is a useful conceptual strategy to explore the compatibility of drone warfare with traditional military ethics; this strategy shows mixed results at best.

  11. Toward Operational Art in Special Warfare: Appendixes

    Science.gov (United States)

    2016-01-01

    language, proficiency in small-unit tactics, and the ability to build and fight alongside indigenous combat formations in a permissive, uncertain, or...counterinsurgency through and with indigenous forces or personnel.”1 The report has four aims: (1) to adapt conventional operational art to the unique...perfect near-real-time situational awareness,” at least at the tactical level of land warfare in complex terrain. But the idea of leveraging information

  12. The Marine Corps Civil Military Operations (CMO) Capability: Inadequate for Current and Future Irregular Environments

    Science.gov (United States)

    2011-05-02

    the 2011 National Military Strategy contend and numerous analysts posit, that the United States will continue to prosecute irregular warfare or a...think tank reports, and the ruminations of various luminaries that the United States will be involved in inegular wmfare throughout the remainder of

  13. Mountain Warfare: The Need for Specialist Training

    National Research Council Canada - National Science Library

    Malik, Muhammad

    2003-01-01

    This study focuses on the need for specialist training for mountain warfare. It analyzes the special characteristics of mountain and high altitude terrain which affect conduct of military operations...

  14. Ending the Debate: Unconventional Warfare, Foreign Internal Defense, and Why Words Matter

    National Research Council Canada - National Science Library

    Jones, D

    2006-01-01

    There is an ongoing debate within the Special Forces community whether unconventional warfare and foreign internal defense are applicable in the contemporary and future Special Operations environments...

  15. Forgeting Lessons Learned: The United States Army’s Inability To Embrace Irregular Warfare

    Science.gov (United States)

    2014-04-01

    Revolutionary Development Support, commonly referred to as “CORDS”, was established in 1967 under Robert “Blowtorch” Komer. As the director of CORDS, Robert ...combat operations spanning the complete spectrum of warfare. As Robert Citino, the author of Blitzkrieg to Desert Storm wrote about the development of...US forces in Somalia. Haiti In 1915, Smedley Butler and 3,000 Marines invaded Haiti and quickly pacified the entire island. Eighty years

  16. The Manipulation of Human Behavior in Guerrilla Warfare: Can It Enhance U.S. Army Special Forces Guerrilla Warfare Operations?

    National Research Council Canada - National Science Library

    Harris, William

    1997-01-01

    .... Proper integration of psychological communications to manipulate behavior in guerrilla warfare may facilitate the recruiting1 motivation, morale, sustainment and popular support for a guerrilla movement and its cause...

  17. Electronic Warfare: Comprehensive Strategy Needed for Suppressing Enemy Air Defenses

    National Research Council Canada - National Science Library

    2001-01-01

    .... To achieve this suppression, the services use specialized aircraft designed to neutralize, destroy, or temporarily degrade enemy air defense systems through either physical attack or electronic warfare...

  18. Cyber warfare and electronic warfare integration in the operational environment of the future: cyber electronic warfare

    Science.gov (United States)

    Askin, Osman; Irmak, Riza; Avsever, Mustafa

    2015-05-01

    For the states with advanced technology, effective use of electronic warfare and cyber warfare will be the main determining factor of winning a war in the future's operational environment. The developed states will be able to finalize the struggles they have entered with a minimum of human casualties and minimum cost thanks to high-tech. Considering the increasing number of world economic problems, the development of human rights and humanitarian law it is easy to understand the importance of minimum cost and minimum loss of human. In this paper, cyber warfare and electronic warfare concepts are examined in conjunction with the historical development and the relationship between them is explained. Finally, assessments were carried out about the use of cyber electronic warfare in the coming years.

  19. Russian and Chinese Information Warfare: Theory and Practice

    Science.gov (United States)

    2004-06-01

    Integral neurolinguistic programming •Placing essential programs into the conscious or sub- conscious mind •Subconscious suggestions that modify human...Generators of special rays •Optical systems • Neurolinguistic programming •Computer psychotechnology •The mass media •Audiovisual effects •Special effects...Information Warfare: Theory and Practice 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e

  20. The ethics of drone warfare

    OpenAIRE

    Fatić Aleksandar

    2017-01-01

    The paper investigates the compatibility of the modern technologies of warfare, specifically the use of offensive drones, with traditional military ethics and suggests that the new technologies radically change the value system of the military in ways which make large parts of the traditional military ethics inapplicable. The author suggests that Agamben’s concept of ‘effectivity’ through ‘special actions’ which mark one’s belonging to a particular communit...

  1. The Role of Civil Affairs in Unconventional Warfare

    Science.gov (United States)

    2012-12-01

    neighbor to the west, and secured the eastern border of Laos 32 Mao Tse -Tung, On Guerrilla Warfare...INTRODUCTION..........................................................................................19  B.  BRIEF HISTORY OF LAOS ...Royal Lao Army SCA Support to Civil Administration SCIRI Supreme Council of Iraq SG Shadow Government SOF Special Operations Forces TAI Targeted

  2. Biological warfare agents

    Directory of Open Access Journals (Sweden)

    Duraipandian Thavaselvam

    2010-01-01

    Full Text Available The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies.

  3. Biological warfare agents

    Science.gov (United States)

    Thavaselvam, Duraipandian; Vijayaraghavan, Rajagopalan

    2010-01-01

    The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies. PMID:21829313

  4. DefenseLink.mil - Special Report - Soldiers Train with Non-lethal Weapons

    Science.gov (United States)

    Spc. Yevgeniy Popov, a chemical warfare specialist with Headquarters and Headquarters Company, 3rd warfare specialist with Headquarters and Headquarters Company, 3rd Special Troops Battalion, 3rd Brigade , center, a combat engineer with Company A, 3rd Special Troops Battalion, 3rd Brigade Combat Team, 10th

  5. Governing Warfare

    DEFF Research Database (Denmark)

    Harste, Gorm

      It would seem as though warfare has gotten out of control, not only in Iraq and Afghanistan, but also in Central Africa. The paper outlines the strategic history of politically controlled warfare since the early Enlightenment. The argument is that control is implausible. The idea of control has...

  6. IMS software developments for the detection of chemical warfare agent

    Science.gov (United States)

    Klepel, ST.; Graefenhain, U.; Lippe, R.; Stach, J.; Starrock, V.

    1995-01-01

    Interference compounds like gasoline, diesel, burning wood or fuel, etc. are presented in common battlefield situations. These compounds can cause detectors to respond as a false positive or interfere with the detector's ability to respond to target compounds such as chemical warfare agents. To ensure proper response of the ion mobility spectrometer to chemical warfare agents, two special software packages were developed and incorporated into the Bruker RAID-1. The programs suppress interferring signals caused by car exhaust or smoke gases resulting from burning materials and correct the influence of variable sample gas humidity which is important for detection and quantification of blister agents like mustard gas or lewisite.

  7. Hybrid Warfare: How to Shape Special Operations Forces

    Science.gov (United States)

    2016-06-10

    irregular tactics, information operations, and deliberate terrorism as they waged war against Russia in the territory of Chechnya and o deep in Russian...Russia initially had to withdraw its forces from Chechnya , but later led by a former KGB operative, Vladimir Putin, were able to defeat the Chechen rebels

  8. The Other Quiet Professionals: Lessons for Future Cyber Forces from the Evolution of Special Forces

    Science.gov (United States)

    2014-01-01

    tions Command), John Mense (INSCOM), Paul Schuh (JFCC-NW), Russell Fenton (U.S. Army Network Enterprise Technology Command), and CW5 Todd Boudreau and...Surdu, 2009, pp. 16–17). Doctrine Irregular warfare and SOF doctrine lagged operational activities after the Vietnam War and prior to the...forces are, at their operating core, small teams of highly skilled specialists, and both communities value skilled personnel above all else. Irregular

  9. Defining cyber warfare

    Directory of Open Access Journals (Sweden)

    Dragan D. Mladenović

    2012-04-01

    Full Text Available Cyber conflicts represent a new kind of warfare that is technologically developing very rapidly. Such development results in more frequent and more intensive cyber attacks undertaken by states against adversary targets, with a wide range of diverse operations, from information operations to physical destruction of targets. Nevertheless, cyber warfare is waged through the application of the same means, techniques and methods as those used in cyber criminal, terrorism and intelligence activities. Moreover, it has a very specific nature that enables states to covertly initiate attacks against their adversaries. The starting point in defining doctrines, procedures and standards in the area of cyber warfare is determining its true nature. In this paper, a contribution to this effort was made through the analysis of the existing state doctrines and international practice in the area of cyber warfare towards the determination of its nationally acceptable definition.

  10. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    Section 1 of this paper provides an overview of cyber warfare as an element of information warfare, starting with the general background of the current strategic environment the United States is operating...

  11. Chemical warfare agents.

    Science.gov (United States)

    Kuca, Kamil; Pohanka, Miroslav

    2010-01-01

    Chemical warfare agents are compounds of different chemical structures. Simple molecules such as chlorine as well as complex structures such as ricin belong to this group. Nerve agents, vesicants, incapacitating agents, blood agents, lung-damaging agents, riot-control agents and several toxins are among chemical warfare agents. Although the use of these compounds is strictly prohibited, the possible misuse by terrorist groups is a reality nowadays. Owing to this fact, knowledge of the basic properties of these substances is of a high importance. This chapter briefly introduces the separate groups of chemical warfare agents together with their members and the potential therapy that should be applied in case someone is intoxicated by these agents.

  12. Inside the Wire: American Security and Cyber Warfare

    Science.gov (United States)

    2017-03-01

    Roberts, Kerry V. " SUN TZU and The Art of Cyber Warfare." Journal of Counterterrorism & Homeland Security International 19, no. 1(Spring 2013): 12-4...12. REPORT TYPE 3. DATES COVERED (From - To) 01-03-2017 Bibliography 4. TITLE AND SUBTITLE Sa. CONTRACT NUMBER Inside the Wire: American Security...MCDERMOTT LIBRARY U.S. AIR FORCE ACADEMY 11. SPONSOR/MONITOR’S REPORT USAF ACADEMY CO 80840-6214 NUMBER(S) Special Bibliography Series # 119 12

  13. The Information Warfare Life Cycle Model

    Directory of Open Access Journals (Sweden)

    Brett van Niekerk

    2011-11-01

    Full Text Available Information warfare (IW is a dynamic and developing concept, which constitutes a number of disciplines. This paper aims to develop a life cycle model for information warfare that is applicable to all of the constituent disciplines. The model aims to be scalable and applicable to civilian and military incidents where information warfare tactics are employed. Existing information warfare models are discussed, and a new model is developed from the common aspects of these existing models. The proposed model is then applied to a variety of incidents to test its applicability and scalability. The proposed model is shown to be applicable to multiple disciplines of information warfare and is scalable, thus meeting the objectives of the model.

  14. The Information Warfare Life Cycle Model

    Directory of Open Access Journals (Sweden)

    Brett van Niekerk

    2011-03-01

    Full Text Available Information warfare (IW is a dynamic and developing concept, which constitutes a number of disciplines. This paper aims to develop a life cycle model for information warfare that is applicable to all of the constituent disciplines. The model aims to be scalable and applicable to civilian and military incidents where information warfare tactics are employed. Existing information warfare models are discussed, and a new model is developed from the common aspects of these existing models. The proposed model is then applied to a variety of incidents to test its applicability and scalability. The proposed model is shown to be applicable to multiple disciplines of information warfare and is scalable, thus meeting the objectives of the model.

  15. Information warfare technologies in political discourse

    Directory of Open Access Journals (Sweden)

    Karpova Anna Yu.

    2016-01-01

    Full Text Available We attempt to examine the technology of «information warfare» in this paper. The dominant theme of the paper is that the outcome of the information warfare is important not only for the future of a state itself but for the future of the world balance of forces. The main task of geopolitical actors in information warfare is to introduce ideas corresponding to their interests into mass consciousness. All participants of political conflicts have common features in technologies of Information warfare. The information anomie is the indicator of the great geopolitical actors’ personified interests on the stage of «information warfare» - the process resulted in destroying the communicative line: report-information understanding and disrupting the social order in society. In this paper authors describe the following Information Warfare technologies: "Political volcano" technology; "SPIN" technology; "Widening media resource" technology; "specific gravity" technology; "Cold War 2.0" technology and Information cleaningup technology. It is assumed that in the future there will be new instructions on applying technologies of information warfare. To impart perspective to the paper we consider examples, opinions and trends.

  16. Difficult Decisions: Chemical Warfare.

    Science.gov (United States)

    Slesnick, Irwin L.; Miller, John A.

    1988-01-01

    Gives the background history and chemistry of modern day chemical warfare from World War I to the present. Provides discussion questions to stimulate deeper thinking on the issue. Contains a discussion activity called "Can New Chemical Weapons Lead to Humane Warfare?" (CW)

  17. Legal aspects of the EU policy on irregular immigration

    Directory of Open Access Journals (Sweden)

    Voinikov Vadim

    2015-12-01

    Full Text Available This article addresses the issues pertaining to the adoption and development of legislation on irregular migration in the context of uncontrolled growth in the number of immigrants from North Africa and the Middle East to the EU. The article attempts at studying the EU legislation on irregular migration, classifying it, and analysing the prospects of EU migration legislation in the light of an increase in irregular immigration into the EU. The author systematises, classifies the current EU legislation on irregular immigration, and analyses the conditions, in which this legislation was developed. Using the legislation analysis method, the author proposes the following system of EU legislation on irregular immigration: rules preventing assistance to irregular immigration, rules preventing employment of irregular immigrants, rules on the return of irregular migrants and readmission, rules on border control, and rules on collaboration with third countries. The author pays special attention to analysing the current state of irregular immigration to the EU, which was dubbed the ‘greatest migration crisis in Europe’. The conclusion is that the European Union succeeded in the development of pioneering legislation on irregular immigration, which can serve as the basis for reception by other states. However, changes in the political and economic situation in the EU’s southern borderlands made the current legal mechanisms incapable of withstanding new threats. It necessitates a radical reform of the legislation on irregular immigration.

  18. Cyber warfare building the scientific foundation

    CERN Document Server

    Jajodia, Sushil; Subrahmanian, VS; Swarup, Vipin; Wang, Cliff

    2015-01-01

    This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially gove

  19. Network Centric Warfare Case Study: U.S. V Corps and 3rd Infantry Division (Mechanized) During Operation Iraqi Freedom Combat Operations (Mar-Apr 2003). Volume 3. Network Centric Warfare Insights

    Science.gov (United States)

    2003-01-01

    OPSEC), military deception, psychological operations (PSYOPS), special information operations (IO), information assurance, physical security...nonlethal effects, such as operational 8 Network Centric Warfare Case Study security (OPSEC), military deception, psychological operations (PSYOP...Support Operations Group ASR Alternate Supply Route; or, Ammunition Supply Rate ATACMS Army Tactical Missile System ATARS Advanced

  20. Special Warfare: Restructuring for the Future

    Science.gov (United States)

    2016-06-01

    Civil affairs CAPs combined action platoons CAS close-air support CBI China-Burma-India [theater] CDI Community Defense Initiative CENTCOM [U.S...special forces’ creed has changed over time, the sentiment has remained. The history of the basic unit of special forces—the SFODA—can be traced back to...reassigned CIDG forces no longer held the advantage of insight into local cultural norms and daily activities since they were no longer operating near

  1. Information Warfare and Ethics

    Directory of Open Access Journals (Sweden)

    M.J. Warren

    2001-05-01

    Full Text Available This paper examines the ethics of the practice of information warfare at both the national and corporate levels. Initially examining the present and past actions of individual hackers, it moves to the more organised, future military and economic warfare scenarios. It examines the lack of legal or policy initiatives in this area.

  2. Irregular Warfare (IW) Joint Operating Concept (JOC), Version 1.0

    Science.gov (United States)

    2007-09-11

    environment). Country C is a state sponsor of terrorism that promotes fundamentalist ideology and conducts a campaign of genocide in portions of the... Cambodians , these forces were led by US and/or South Vietnamese Special Forces personnel. Operating largely in sparsely populated areas, the Mobile

  3. MEANS AND METHODS OF CYBER WARFARE

    Directory of Open Access Journals (Sweden)

    Dan-Iulian VOITAȘEC

    2016-06-01

    Full Text Available According to the Declaration of Saint Petersburg of 1868 “the only legitimate object which States should endeavor to accomplish during war is to weaken the military forces of the enemy”. Thus, International Humanitarian Law prohibits or limits the use of certain means and methods of warfare. The rapid development of technology has led to the emergence of a new dimension of warfare. The cyber aspect of armed conflict has led to the development of new means and methods of warfare. The purpose of this paper is to study how the norms of international humanitarian law apply to the means and methods of cyber warfare.

  4. On the Probability of Predicting and Mapping Traditional Warfare Measurements to the Cyber Warfare Domain

    CSIR Research Space (South Africa)

    Grobler, M

    2014-07-01

    Full Text Available Cyber warfare is a contentious topic, with no agreement on whether this is a real possibility or an unrealistic extension of the physical battlefield. This article will not debate the validity and legality of the concept of cyber warfare...

  5. Intelligence Strategy for Fourth Generation Warfare

    National Research Council Canada - National Science Library

    Jamison, Edward P

    2006-01-01

    ...." They have named this new era of war "fourth generation warfare." Currently the Department of Defense's intelligence strategy is designed to defeat conventional adversaries vise a fourth generation warfare opponent...

  6. The ethics of information warfare

    CERN Document Server

    Floridi, Luciano

    2014-01-01

    This book offers an overview of the ethical problems posed by Information Warfare, and of the different approaches and methods used to solve them, in order to provide the reader with a better grasp of the ethical conundrums posed by this new form of warfare.The volume is divided into three parts, each comprising four chapters. The first part focuses on issues pertaining to the concept of Information Warfare and the clarifications that need to be made in order to address its ethical implications. The second part collects contributions focusing on Just War Theory and its application to the case of Information Warfare. The third part adopts alternative approaches to Just War Theory for analysing the ethical implications of this phenomenon. Finally, an afterword by Neelie Kroes - Vice President of the European Commission and European Digital Agenda Commissioner - concludes the volume. Her contribution describes the interests and commitments of the European Digital Agenda with respect to research for the developme...

  7. Chemical warfare agents

    Directory of Open Access Journals (Sweden)

    Vijayaraghavan R

    2010-01-01

    Full Text Available Among the Weapons of Mass Destruction, chemical warfare (CW is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided.

  8. Chemical warfare agents

    Science.gov (United States)

    Ganesan, K.; Raza, S. K.; Vijayaraghavan, R.

    2010-01-01

    Among the Weapons of Mass Destruction, chemical warfare (CW) is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided. PMID:21829312

  9. Mongol Warfare in the Pre-Dissolution Period »

    Directory of Open Access Journals (Sweden)

    Timothy May

    2015-01-01

    Full Text Available Although the Mongols used many of the tactics and strategies that steppe nomads had used for centuries, the Mongols refined steppe warfare so that this style of warfare reached its apogee during the Mongol Empire. Furthermore, the Mongols developed a style of warfare that made them possibly the greatest military force in history. This work examines several facets of the pre-dissolution period (1200–1260. With the dissolution of the Mongol Empire, Mongol warfare once again changed. In some areas it remained complex while in others it regressed to traditional forces of steppe warfare, still potent but not as effective as the pre-dissolution period.

  10. Reactivity of Dual-Use Decontaminants with Chemical Warfare Agents

    Science.gov (United States)

    2016-07-01

    REACTIVITY OF DUAL-USE DECONTAMINANTS WITH CHEMICAL WARFARE AGENTS ECBC-TR-1384... Decontaminants with Chemical Warfare Agents 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Willis, Matthew P...extraction) of chemical warfare agents from materials. 15. SUBJECT TERMS GD HD Decontamination Hazard mitigation VX Chemical warfare agent Liquid-phase

  11. Organizing for Irregular Warfare: Implications for the Brigade Combat Team

    Science.gov (United States)

    2007-12-01

    program on October 13, 2006. For further information see, Stew Magnuson, “Eyes Wide Open,” National Defense May 2007, 46. 227 John A. English...David Tucker and Christopher J. Lamb , “Restructuring Special Operations Forces for Emerging Threats,” Strategic Forum no. 219 (January 2006) to... Stew . “Eyes Wide Open.” National Defense, May 2007. Malcom, Ben S. White Tigers, My Secret War in Korea. U.S.: Brassey’s, 2003

  12. Strategic Usefulness of Conventional Force/Special Operations Force Interdependence in Irregular Warfare

    Science.gov (United States)

    2017-06-01

    surgical strike missions, often deep in denied territory like the Osama bin Laden raid in Pakistan or counterterrorism raids in Yemen . “Surgical strike...70 Rothstein, “Less is More,” 283. 71 Alexander George and Andrew Bennett, Case Studies and Theory Development in the Social Sciences... Media Network, September 16, 2011. 75 Ibid. 76 Max Boot, War Made New: Weapons, Warriors, and the Making of the Modern World (New York: Penguin

  13. Redefining the Indirect Approach, Defining Special Operations Forces (SOF Power, and the Global Networking of SOF

    Directory of Open Access Journals (Sweden)

    Scott Morrison

    2014-07-01

    Full Text Available The current Defense Strategy assigns Special Operations Forces (SOF to play a central role in countering terrorism, weapons of mass destruction, and irregular warfare. However, there has been little published that defines the role of Special Operations alongside air, land, and sea domains. The U.S. Special Operations Community struggles to define its own theoretical concepts such as direct approach and indirect approach. The U.S. SOF circles typically define direct approach with direct action and the indirect approach with foreign internal defense or security force assistance. Military theorist Liddell Hart viewed the indirect approach as a method to orient upon, target, and upset an adversary’s equilibrium in order to plan for and direct decisive blows. Today, the SOF indirect approach is arguable more applicable due to the prevalence of non-state threats and internal conflicts. Following Hart’s definition, precision raids are among the integral components of a broader application of the indirect approach. The approach also networks U.S. government power as a force when used in concert with allies and local partners. Global networking along with balanced precision raids will exponentially increase the utility of SOF power and position it to appropriately complement all domains to tackle 21st century challenges.

  14. Psychological effects of nuclear warfare

    International Nuclear Information System (INIS)

    Mickley, G.A.

    1987-01-01

    This report is divided into five parts. (1) Discussion of the psychological milieu before a nuclear confrontation. (2) Acute psychological reactions to nuclear warfare (some of which may reflect, in part, direct radiogenic alteration of nervous system functions). (3) Chronic psychological effects of a nuclear confrontation. (4) Issues concerning treatment of these psychological changes. (5) Prevention of adverse psychological reactions to nuclear warfare

  15. Information operation/information warfare modeling and simulation

    OpenAIRE

    Buettner, Raymond

    2000-01-01

    Information Operations have always been a part of warfare. However, this aspect of warfare is having ever-greater importance as forces rely more and more on information as an enabler. Modern information systems make possible very rapid creation, distribution, and utilization of information. These same systems have vulnerabilities that can be exploited by enemy forces. Information force-on-force is important and complex. New tools and procedures are needed for this warfare arena. As these t...

  16. Hybrid Warfare: Preparing for Future Conflict

    Science.gov (United States)

    2015-02-17

    ciceromagazine.com/?s=getting+behind+hybrid+warfare. Brown , Col Leslie F. “Twenty-First Century Warfare Will be Hybrid.” Carlisle Barracks, PA...Lebanon and Gaza.” Rand Corporation Occasional Paper. Santa Monica, CA: Rand Corporation, 2010. Jones, Gareth and Darya Korsunskaya. “U.S., EU

  17. Back to the Future: The UH-1Y Utility Helicopter; A Multi-Role Solution for a Changing Security Environment

    Science.gov (United States)

    2008-01-01

    Johnson, "Teaching Irregular Warfare; Deja vu All Over Again?" a paper presented to the Joint conference Pedagogy for the Long War: Teaching Irregular...Do about Them." Marine Corps Gazette 92, no. 2 (February 2008): 18- 23. Johnson, Wray. "Teaching Irregular Warfare; Deja vu All Over Again?" a paper

  18. Dehumanization and Irregular Warfare

    Science.gov (United States)

    2013-06-01

    author and do not reflect the official policy or position of the Department of Defense or the U.S. Government. IRB Protocol number ____N/A____...films.122 This reframing of cultural training as a discussion of proper etiquette , rather 120

  19. The Impacts of Modern Warfare on Freshwater Ecosystems

    Science.gov (United States)

    Francis, Robert A.

    2011-11-01

    There is increasing recognition and concern regarding the impacts of modern industrial warfare on the environment. Freshwater ecosystems are perhaps the most vulnerable to warfare-related impacts, which is of concern given that they provide so many essential environmental resources and services to society. Despite this, there has been little work to establish and quantify the types of impacts (both negative and positive) that warfare may have on such systems. This paper firstly highlights why rivers and lakes may be susceptible to warfare-related impacts, before synthesizing the available literature to explore the following main themes: intensification of wartime resource acquisition, use of water as an offensive or defensive weapon, direct and indirect effects of explosive ordnance, increased pollution, introduction of invasive alien species, and positive ecological impacts. This is then followed by a discussion of the implications of such impacts in relation to future warfare, including a consideration of the efficacy of existing legal instruments to protect the environment during conflict, and the trend for war to become more localized and `informal', and therefore less regulated. Finally, the paper identifies key research foci for understanding and mitigating the effects of warfare on freshwater ecosystems.

  20. Creating Paths of Change: Under What Conditions Can Special Operations be the Supported Command

    Science.gov (United States)

    2018-03-01

    will cause an organization’s leadership to selectively decentralize units to deal with the more diverse characteristics of its environment.40 The U.S...infrastructure, which were initially attempted with local leadership . The Taliban’s ability to insert itself into villages and produce a counter narrative...Symbol for Change.”. 100 James A. Russell, “Counter-insurgency American Style : Considering David Patreus and Twenty- First Century Irregular Warfare

  1. Improving Transactional Memory Performance for Irregular Applications

    OpenAIRE

    Pedrero, Manuel; Gutiérrez, Eladio; Romero, Sergio; Plata, Óscar

    2015-01-01

    Transactional memory (TM) offers optimistic concurrency support in modern multicore archi- tectures, helping the programmers to extract parallelism in irregular applications when data dependence information is not available before runtime. In fact, recent research focus on ex- ploiting thread-level parallelism using TM approaches. However, the proposed techniques are of general use, valid for any type of application. This work presents ReduxSTM, a software TM system specially d...

  2. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  3. Personal protection during resuscitation of casualties contaminated with chemical or biological warfare agents--a survey of medical first responders.

    Science.gov (United States)

    Brinker, Andrea; Prior, Kate; Schumacher, Jan

    2009-01-01

    The threat of mass casualties caused by an unconventional terrorist attack is a challenge for the public health system, with special implications for emergency medicine, anesthesia, and intensive care. Advanced life support of patients injured by chemical or biological warfare agents requires an adequate level of personal protection. The aim of this study was to evaluate the personal protection knowledge of emergency physicians and anesthetists who would be at the frontline of the initial health response to a chemical/biological warfare agent incident. After institutional review board approval, knowledge of personal protection measures among emergency medicine (n = 28) and anesthetics (n = 47) specialty registrars in the South Thames Region of the United Kingdom was surveyed using a standardized questionnaire. Participants were asked for the recommended level of personal protection if a chemical/biological warfare agent(s) casualty required advanced life support in the designated hospital resuscitation area. The best awareness within both groups was regarding severe acute respiratory syndrome, and fair knowledge was found regarding anthrax, plague, Ebola, and smallpox. In both groups, knowledge about personal protection requirements against chemical warfare agents was limited. Knowledge about personal protection measures for biological agents was acceptable, but was limited for chemical warfare agents. The results highlight the need to improve training and education regarding personal protection measures for medical first receivers.

  4. U.S. Special Forces: culture warriors

    OpenAIRE

    Hill, Joshua L.

    2014-01-01

    Approved for public release; distribution is unlimited U.S. Army Special Forces (SF) are consistently called upon to work by, with, and through indigenous forces to conduct special warfare. Current SF doctrine reflects an increasing desire for SF operators to be culturally proficient in order to work closely with locals, advise foreign militaries, and build relationships with host-nation counterparts. Despite the doctrinal emphasis on cultural proficiency, SF doctrine offers little concret...

  5. Irregular Applications: Architectures & Algorithms

    Energy Technology Data Exchange (ETDEWEB)

    Feo, John T.; Villa, Oreste; Tumeo, Antonino; Secchi, Simone

    2012-02-06

    Irregular applications are characterized by irregular data structures, control and communication patterns. Novel irregular high performance applications which deal with large data sets and require have recently appeared. Unfortunately, current high performance systems and software infrastructures executes irregular algorithms poorly. Only coordinated efforts by end user, area specialists and computer scientists that consider both the architecture and the software stack may be able to provide solutions to the challenges of modern irregular applications.

  6. Anti-Air Warfare Research for Naval Forces

    NARCIS (Netherlands)

    Bloemen, A.A.F.; Witberg, R.

    2000-01-01

    AAW is a warfare area with wide-spread spectrum. Command and Control Systems, sensors, effectors and electronic warfare are integrated to a system, they influence each other and must eventually be effective in coordinated action. This complexity asks for Operations Research methods to measure

  7. Russian New Art of Hybrid Warfare in Ukraine

    Directory of Open Access Journals (Sweden)

    Rusnáková Soňa

    2017-10-01

    Full Text Available The main aim of this paper is to analyse the annexation of Crimea by the Russian Federation. For the purposes of the paper, the theory of hybrid warfare was chosen as an analytical category. Throughout the paper, the concept of hybrid warfare is examined and applied on case study of Crimean annexation. Hybrid warfare, especially in connection with Russian actions in Crimea has been an intensely debated concept. There is an ongoing debate among scholars concerning the meaning of the concept, its existence and employment by the Russian Federation. This paper showed that the article of Valeriy Gerasimov – the incumbent Chief of the General Staff of the Russian Federation-invoked a new warfare strategy for the Russian Federation which was consequently for the very first time in its full spectre and effectivity employed on case of Crimean annexation in March 2014. Observing the application of the hybrid warfare in practice serves the purposes of countering its further potential application in post-Soviet space and Russian ‘near abroad’.

  8. Anxiety, depression, and posttraumatic stress in Iranian survivors of chemical warfare.

    Science.gov (United States)

    Hashemian, Farnoosh; Khoshnood, Kaveh; Desai, Mayur M; Falahati, Farahnaz; Kasl, Stanislav; Southwick, Steven

    2006-08-02

    In the 1980-1988 Iran-Iraq War, extensive use of chemical weapons resulted in high rates of morbidity and mortality. While much is known about the physical consequences of chemical warfare, there is a paucity of information about the long-term effects of chemical attacks on mental health. To assess the long-term psychological impact of chemical warfare on a civilian population. Cross-sectional randomized survey conducted in July 2004 of 153 civilians in 3 towns exposed to warfare in northwestern Iran: Oshnaviyeh (low-intensity conventional warfare), Rabat (high-intensity conventional warfare), and Sardasht (both high-intensity conventional warfare and chemical weapons). Full or partial posttraumatic stress disorder (PTSD) diagnosis, anxiety symptoms, and depressive symptoms were assessed using Farsi versions of the Clinician-Administered PTSD Scale, Hamilton Scale for Anxiety, and Beck Depression Inventory, respectively. Overall participation rate was 93%. Respondents had a mean age of 45 years and were all of Kurdish ethnicity. Among individuals exposed to both high-intensity warfare and chemical weapons, prevalence rates for lifetime PTSD, current PTSD, major anxiety symptoms, and severe depressive symptoms were 59%, 33%, 65%, and 41%, respectively. Among the low-intensity warfare group, the corresponding rates were 8%, 2%, 18%, and 6%, respectively, while intermediate rates were found among those exposed to high-intensity warfare but not to chemical weapons (31%, 8%, 26%, and 12%, respectively). Compared with individuals exposed to low-intensity warfare, those exposed to both high-intensity warfare and chemical weapons were at higher risk for lifetime PTSD (odds ratio [OR], 18.6; 95% confidence interval [CI], 5.8-59.4), current PTSD (OR, 27.4; 95% CI, 3.4-218.2), increased anxiety symptoms (OR, 14.6; 95% CI, 6.0-35.6), and increased depressive symptoms (OR, 7.2; 95% CI, 3.3-15.9). Exposure to high-intensity warfare but not to chemical weapons was also

  9. Provision of health services to irregular migrants with a special focus on children.

    Science.gov (United States)

    Søvig, Karl Harald

    2011-01-01

    All European countries are now facing a situation where a part of the population consists of migrants without a permit to stay or reside. These persons may have health problems, and the question then rises regarding health services to irregular migrants. Normally, welfare benefits are offered those with a relationship to the country concerned, as citizen, asylum seeker, tourist, etc. Irregular migrants are outside the society, and it could be suggested that they therefore should be denied health services. On the other hand, common European standards of humanity lay obligations on the States, for example, where situations are life-threatening. This contribution gives an overview of relevant legal instruments, both from the UN, Council of Europe and the European Union. Although there are many similarities, the instruments have their differences, and there may even be some tensions regarding the underlying values.

  10. Insurgent Uprising: An Unconventional Warfare Wargame

    Science.gov (United States)

    2017-12-01

    Cleveland, Charles T. Connett, and Will Irwin. “Unconventional Warfare in the Gray Zone.” Joint Forces Quarterly 80, no. 1 (2016). Work, Robert O...CODE 13. ABSTRACT (maximum 200 words) Today, and in the future, unconventional solutions will present U.S. policymakers with options for dealing...training objectives and will complement existing training exercises. 14. SUBJECT TERMS unconventional warfare, foreign internal defense, direct

  11. A Predictive Model of Surface Warfare Officer Retention: Factors Affecting Turnover

    National Research Council Canada - National Science Library

    Gjurich, Gregory

    1999-01-01

    Junior Surface Warfare Officer retention is in a crisis. The Surface Warfare Officer community anticipates an inability to fill Department Head billets due to the number of junior Surface Warfare Officers leaving military service...

  12. Hybrid Warfare Studies and Russia’s Example in Crimea

    Directory of Open Access Journals (Sweden)

    Mehmet Seyfettin EROL

    2015-12-01

    Full Text Available Although Hybrid Warfare is an old concept, theoretical studies in the western countries mainly began in the post-Col War era, focusing on asymmetrical threats against conventional superiority of western countries such as USA or Israel. September 11th attacks and 2006 Israel-Lebanon war played important roles for the evolution of hybrid warfare theories. However, there has not any consensus among scholars on a exact or unique definition of hybrid warfare. Hybrid warfare became one of the main security issues for the West and especially for NATO after the Russia-Ukraine crisis. Russian military strategies, called “hybrid warfare” by the western countries, resulted in the successful annexation of Crimea and, caused a serious security problem for the West resulting important structural and functional changes for the military system of NATO. Russian activities, which have been based on surprise, ambiguity and deniability, presented a unique example for hybrid warfare studies.

  13. Dilemmas of Warfare in Densely Populated Civilian Areas

    OpenAIRE

    Moshe Tamir

    2012-01-01

    This essay attempts to present operational perspectives on conducting warfare in densely populated areas. It also distinguishes between three types of combat within this general category, with the goal of shedding light on this complex type of warfare.

  14. Flying Electronic Warfare Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides NP-3D aircraft host platforms for Effectiveness of Navy Electronic Warfare Systems (ENEWS) Program antiship missile (ASM) seeker simulators used...

  15. Redefining Hybrid Warfare: Russia's Non-linear War against the West

    Directory of Open Access Journals (Sweden)

    Tad Schnaufer

    2017-03-01

    Full Text Available The term hybrid warfare fails to properly describe Russian operations in Ukraine and elsewhere. Russia has undertaken unconventional techniques to build its influence and test the boundaries of a shaken international system. Notably, Russia’s actions in Ukraine display an evolved style of warfare that goes beyond its initial label of hybrid warfare. The term non-linear war (NLW will be defined in this article to encompass Russia’s actions and allow policymakers the correct framework to discuss and respond to Russia. NLW plays to the advantage of countries like Russia and constitute the future of warfare.

  16. Route survey periodicity for mine warfare

    OpenAIRE

    Coke, Hartwell F.

    2009-01-01

    Approved for public release, distribution unlimited One of the Navy's most long standing challenges has been conquering the mine warfare threat. As mines and mine warfare techniques evolve and become more sophisticated, so does the United States' ability to counter the threat. The United States newest technique for countering a potential mined harbor, or route, is a process known as "change detection." This concept uses previous side scan sonar images of the area prior to a mining event an...

  17. ISIL's Hybrid Warfare in Syria & Iraq

    DEFF Research Database (Denmark)

    Sørensen, Heine

    2016-01-01

    of and ability to synchronize various instruments of power with a view to achieving their end-state. With regards to the second part of the problem statement, the analysis demonstrates how ISIL employed horizontal escalation and ambiguity initially, but later on turned to vertical escalation, within the military......The case study specifically seeks to answer the following problem statement: Does ISIL qualify as an actor using hybrid warfare and if so what characterizes their particular use of this type of warfare? Based on an analysis of ISIL’s warfare from August 2012 to August 2016 the chapter argues......, that it is possible to answer the first part of the problem statement in an affirmative way. Hence, ISIL is not only theoretically prone to hybridity by organizational setup, and by the people comprising the organization, but has in fact continuously acted according to a hybrid logic in its prioritization...

  18. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    .... Section 1 concludes with a review of offensive and defensive cyber warfare concepts. Section 2 presents a general overview of cyber terrorism, including definitions of cyber terrorism and cyber terrorism support...

  19. Survey on Urban Warfare Augmented Reality

    Directory of Open Access Journals (Sweden)

    Xiong You

    2018-01-01

    Full Text Available Urban warfare has become one of the main forms of modern combat in the twenty-first century. The main reason why urban warfare results in hundreds of casualties is that the situational information of the combatant is insufficient. Accessing information via an Augmented Reality system can elevate combatants’ situational awareness to effectively improve the efficiency of decision-making and reduce the injuries. This paper begins with the concept of Urban Warfare Augmented Reality (UWAR and illuminates the objectives of developing UWAR, i.e., transparent battlefield, intuitional perception and natural interaction. Real-time outdoor registration, information presentation and natural interaction are presented as key technologies of a practical UWAR system. Then, the history and current research state of these technologies are summarized and their future developments are highlighted from three perspectives, i.e., (1 Better integration with Geographic Information System and Virtual Geographic Environment; (2 More intelligent software; (3 More powerful hardware.

  20. Expeditionary Warfare- Force Protection

    National Research Council Canada - National Science Library

    Higgins, Eric

    2004-01-01

    In 2003, the Systems Engineering and Analysis students were tasked to develop a system of systems conceptual solution to provide force protection for the Sea Base conceptualized in the 2002 Expeditionary Warfare study...

  1. Numerical simulation of RCS for carrier electronic warfare airplanes

    Directory of Open Access Journals (Sweden)

    Yue Kuizhi

    2015-04-01

    Full Text Available This paper studies the radar cross section (RCS of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carrier electronic warfare airplanes Model A and Model B with weapons were established. Based on the physical optics method and the equivalent electromagnetic flow method, by the use of the RCSAnsys software, the characteristics of carrier electronic warfare airplanes’ RCS under steady and dynamic flights were simulated under the UHF, X, and S radar bands. This paper researches the detection probability of aircraft by radars under the condition of electronic warfare, and completes the mathematical statistical analysis of the simulation results. The results show that: The Model A of carrier electronic warfare airplane is better than Model B on stealth performance and on discover probability by radar detection effectively.

  2. The doctor and nuclear warfare

    International Nuclear Information System (INIS)

    Anon.

    1982-01-01

    At the 34th World Medical Assembly in Lisbon in 1981 the World Medical Association adopted a motion proposed by the American Medical Association that national medical associations should develop programs to educate the civilian population on the medical consequences of nuclear war. This article discusses the attitude the medical professions should have, should nuclear warfare in some form confront them in the future. The conclusion is drawn that defence against nuclear warfare is only a part of civil defence against any disaster, including the natural disasters such as flood and fire and the man-made disasters of transport accidents, even of problems at nuclear plants designed to supply energy

  3. U.S. Special Forces: Culture Warriors

    Science.gov (United States)

    2014-12-01

    definitions include:  “ culture is that complex whole which includes knowledge, beliefs, art, law, morals , custom, and any other capabilities and habits...perceptions towards others, such as ethnocentrism, cultural relativism , stereotypes, biases and worldview. Readings: ARSOF 2022, Special Warfare, Vol. 26...FORCES: CULTURE WARRIORS by Joshua L. Hill December 2014 Thesis Advisor: Heather S. Gregg Second Reader: Robert Burks THIS PAGE

  4. Chemical profiling of chemical warfare agents for forensic purposes

    NARCIS (Netherlands)

    Noort, D.; Reuver, L.P.J. de; Fidder, A.; Tromp, M.; Verschraagen, M.

    2010-01-01

    A program has been initiated towards the chemical profiling of chemical warfare agents, in order to support forensic investigations towards synthesis routes, production sites and suspect chemical suppliers. Within the first stage of the project various chemical warfare agents (VX, sulfur mustard,

  5. Surface Warfare Officers Initial Training For Future Success

    Science.gov (United States)

    2018-03-01

    9 A school is initial rating specific technical training that is given to sailors. 14 Figure 4. Less...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA MBA PROFESSIONAL REPORT SURFACE WARFARE OFFICERS— INITIAL TRAINING FOR FUTURE SUCCESS March 2018...professional report 4. TITLE AND SUBTITLE SURFACE WARFARE OFFICERS—INITIAL TRAINING FOR FUTURE SUCCESS 5. FUNDING NUMBERS 6. AUTHOR(S) Arron J

  6. Air Power in Irregular Warfare

    Science.gov (United States)

    2012-12-01

    that Americans will return and bring with them “radios, TV’s, trucks, boats, watches, iceboxes, medicine, Coca - Cola and many wonderful things.”292 Some...three American contractors were employees of the Northrop Grumman Corporation. During a reconnaissance mission looking for coca fields and drug

  7. German Views of Irregular Warfare

    Science.gov (United States)

    2015-06-01

    retreated westward following the invasion of Russia. Karl Marx , in an 1849 speech, emphasized, A nation, fighting for its liberty, ought not to adhere...characterized these forces. “Irregular” forces, on the other hand, fell outside of such characterizations and state subordination. 82 Karl von Clausewitz, On...operations. Of note, this edition of On War uses “ Karl ” instead of “Carl.” 28 Tyrolean uprising (1809), and the Spanish insurrection and Peninsula

  8. IRREGULAR WARFARE IN AFRICAN CONFLICTS

    African Journals Online (AJOL)

    Abel

    civil war, because the factors determining the financial and military viability of civil war are .... affect a counterbalance of force”, since forces seek to negate or avoid the strengths ...... Crime and Money Laundering Programme, ISS Cape Town.

  9. Evolutionary Models of Irregular Warfare

    Science.gov (United States)

    2013-03-01

    the poorest data—perhaps in part because of political nervousness about advertising estimates of enemy strengths after early optimism in Iraq, as...repro- duction. These adaptations include both physiological and behavioral strategies ranging from armour and immunity to complex nervous sys- tems

  10. Information Warfare and International Law

    National Research Council Canada - National Science Library

    Greenberg, Lawrence T; Goodman, Seymour E; Soo Hoo, Kevin J

    1998-01-01

    .... Some legal constraints will certainly apply to information warfare, either because the constraints explicitly regulate particular actions, or because more general principles of international law...

  11. Star Formation in Irregular Galaxies.

    Science.gov (United States)

    Hunter, Deidre; Wolff, Sidney

    1985-01-01

    Examines mechanisms of how stars are formed in irregular galaxies. Formation in giant irregular galaxies, formation in dwarf irregular galaxies, and comparisons with larger star-forming regions found in spiral galaxies are considered separately. (JN)

  12. Nuclear, biological and chemical warfare. Part I: Medical aspects of nuclear warfare.

    Science.gov (United States)

    Kasthuri, A S; Pradhan, A B; Dham, S K; Bhalla, I P; Paul, J S

    1990-04-01

    Casualties in earlier wars were due much more to diseases than to weapons. Mention has been made in history of the use of biological agents in warfare, to deny the enemy food and water and to cause disease. In the first world war chemical agents were used to cause mass casualties. Nuclear weapons were introduced in the second world war. Several countries are now involved in developing nuclear, biological and chemical weapon systems, for the mass annihilation of human beings, animals and plants, and to destroy the economy of their enemies. Recently, natural calamities and accidents in nuclear, chemical and biological laboratories and industries have caused mass instantaneous deaths in civilian population. The effects of future wars will not be restricted to uniformed persons. It is time that physicians become aware of the destructive potential of these weapons. Awareness, immediate protective measures and first aid will save a large number of persons. This series of articles will outline the medical aspects of nuclear, biological and chemical weapon systems in three parts. Part I will deal with the biological effects of a nuclear explosion. The short and long term effects due to blast, heat and associated radiation are highlighted. In Part II, the role of biological agents which cause commoner or new disease patterns is mentioned. Some of the accidents from biological warfare laboratories are a testimony to its potential deleterious effects. Part III deals with medical aspects of chemical warfare agents, which in view of their mass effects can overwhelm the existing medical resources, both civilian and military.(ABSTRACT TRUNCATED AT 250 WORDS)

  13. Defending Our Satellites: The Need for Electronic Warfare Education and Training

    Science.gov (United States)

    2015-12-01

    intercept Allied bombers attacking at night.9 As a result of the electronic warfare advantage that systems like Window and Airborne Cigar be- stowed...74 | Air & Space Power Journal Defending Our Satellites The Need for Electronic Warfare Education and Training Lt Col E. Lincoln Bonner, USAF...expanding education and training in the use of electronic warfare to defend US satellites and improve their survivability. The following discussion

  14. Implications of Network Centric Warfare

    National Research Council Canada - National Science Library

    Bailey, Alvin

    2004-01-01

    .... These areas of dependence also provide numerous vulnerabilities. This paper will focus specifically on Network Centric Warfare's vulnerabilities in terms of sensors cyberterrorism/ Electro-Magnetic Pulse (EMP...

  15. Distributed computing environment for Mine Warfare Command

    OpenAIRE

    Pritchard, Lane L.

    1993-01-01

    Approved for public release; distribution is unlimited. The Mine Warfare Command in Charleston, South Carolina has been converting its information systems architecture from a centralized mainframe based system to a decentralized network of personal computers over the past several years. This thesis analyzes the progress Of the evolution as of May of 1992. The building blocks of a distributed architecture are discussed in relation to the choices the Mine Warfare Command has made to date. Ar...

  16. The Cycle of Warfare - Analysis of an Analytical Model

    DEFF Research Database (Denmark)

    Jensen, Mikkel Storm

    2016-01-01

    by its economic, political and ideological characteristics. With the single assumption of economic rationality in human behaviour, Cycle of Warfare is not only coherent, it is applicable to all entities engaged in competition anywhere in the world at any point in history. The Cycle of Warfare can be used...

  17. Guiding Warfare to Reach Sustainable Peace

    DEFF Research Database (Denmark)

    Vestenskov, David; Drewes, Line

    The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition of develo......The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition...... of developing best practices in the education and implementation of IHL in capacity building of security forces....

  18. Lanchester-Type Models of Warfare, Volume II

    OpenAIRE

    Taylor, James G.

    1980-01-01

    This monograph is a comprehensive treatist on Lanchester-type models of warfare, i.e. differential-equation models of attrition in force-on-force combat operations. Its goal is to provide both an introduction to and current-state-of-the-art overview of Lanchester-type models of warfare as well as a comprehensive and unified in-depth treatment of them. Both deterministic as well as stochastic models are considered. Such models have been widely used in the United States and elsewhere for the...

  19. Nondestructive inspection of chemical warfare based on API-TOF

    International Nuclear Information System (INIS)

    Wang Xinhua; Zheng Pu; He Tie; An Li; Yang Jie; Fan Yu

    2013-01-01

    Background: Real-time, fast, accurate, nondestructive inspection (NDI) and quantitative analysis for chemical warfare are very imperative for chemical defense, anti-terror and nation security. Purpose: Associated Particles Technique (APT)/Neutron Time of Flight (TOF) has been developed for non-invasive inspection of sealed containers with chemical warfare agents. Methods: A prototype equipment for chemical warfare is consisted of an APT neutron generator with a 3×3 matrix of semiconductor detectors of associated alpha-particles, the shielding protection of neutron and gamma-ray, arrayed NaI(Tl)-based detectors of gamma-rays, fully-digital data acquisition electronics, data analysis, decision-making software, support platform and remote control system. Inelastic scattering gamma-ray pulse height spectra of sarin, VX, mustard gas and adamsite induced by 14-MeV neutron are measured. The energies of these gamma rays are used to identify the inelastic scattering elements, and the intensities of the peaks at these energies are used to reveal their concentrations. Results: The characteristic peaks of inelastic scattering gamma-ray pulse height spectra show that the prototype equipment can fast and accurately inspect chemical warfare. Conclusion: The equipment can be used to detect not only chemical warfare agents but also other hazardous materials, such as chemical/toxic/drug materials, if their chemical composition is in any way different from that of the surrounding materials. (authors)

  20. Hybrid Warfare: the 21st Century Russian Way of Warfare

    Science.gov (United States)

    2017-05-25

    to wage information operations— from television, to the Internet, to unconventional forces on the ground spreading the message word -of- mouth ...adversarial vulnerabilities. Many of the peculiarities of hybrid warfare described herein are inextricably linked to Russia’s social , political, and...the US election. Then they utilized various means of media to distribute that information with the goal to discredit the US political process and

  1. Attrition in Network Centric Warfare

    National Research Council Canada - National Science Library

    Erbetta, John

    2003-01-01

    .... Information warfare means that positive attacks on systems themselves compound the problem. Emerging technologies applicable to NCW as a force multiplier need to be recognized as counter to the impediments to progress...

  2. Simulating cyber warfare and cyber defenses: information value considerations

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber

  3. An Open Architecture Framework for Electronic Warfare Based Approach to HLA Federate Development

    Directory of Open Access Journals (Sweden)

    HyunSeo Kang

    2018-01-01

    Full Text Available A variety of electronic warfare models are developed in the Electronic Warfare Research Center. An Open Architecture Framework for Electronic Warfare (OAFEw has been developed for reusability of various object models participating in the electronic warfare simulation and for extensibility of the electronic warfare simulator. OAFEw is a kind of component-based software (SW lifecycle management support framework. This OAFEw is defined by six components and ten rules. The purpose of this study is to construct a Distributed Simulation Interface Model, according to the rules of OAFEw, and create Use Case Model of OAFEw Reference Conceptual Model version 1.0. This is embodied in the OAFEw-FOM (Federate Object Model for High-Level Architecture (HLA based distributed simulation. Therefore, we design and implement EW real-time distributed simulation that can work with a model in C++ and MATLAB API (Application Programming Interface. In addition, OAFEw-FOM, electronic component model, and scenario of the electronic warfare domain were designed through simple scenarios for verification, and real-time distributed simulation between C++ and MATLAB was performed through OAFEw-Distributed Simulation Interface.

  4. Biomaterials for mediation of chemical and biological warfare agents.

    Science.gov (United States)

    Russell, Alan J; Berberich, Jason A; Drevon, Geraldine F; Koepsel, Richard R

    2003-01-01

    Recent events have emphasized the threat from chemical and biological warfare agents. Within the efforts to counter this threat, the biocatalytic destruction and sensing of chemical and biological weapons has become an important area of focus. The specificity and high catalytic rates of biological catalysts make them appropriate for decommissioning nerve agent stockpiles, counteracting nerve agent attacks, and remediation of organophosphate spills. A number of materials have been prepared containing enzymes for the destruction of and protection against organophosphate nerve agents and biological warfare agents. This review discusses the major chemical and biological warfare agents, decontamination methods, and biomaterials that have potential for the preparation of decontamination wipes, gas filters, column packings, protective wear, and self-decontaminating paints and coatings.

  5. Towards a framework for a network warfare capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available . These include the legal issues, ethical dilemmas, technical solutions, financial impact and skill/manpower investment. Logical constraints/implications have been grouped together in the discussion that follows. 5.1.1 Legal Ethical Issues As network warfare... but the underlying causes of crime also needs to be understood. Ethics and morals play a significant role in determining the personality traits of an individual. Users will need to balance ethical dilemmas before engaging in offensive network warfare. Computers...

  6. Chemical warfare agents. Classes and targets.

    Science.gov (United States)

    Schwenk, Michael

    2018-09-01

    Synthetic toxic chemicals (toxicants) and biological poisons (toxins) have been developed as chemical warfare agents in the last century. At the time of their initial consideration as chemical weapon, only restricted knowledge existed about their mechanisms of action. There exist two different types of acute toxic action: nonspecific cytotoxic mechanisms with multiple chemo-biological interactions versus specific mechanisms that tend to have just a single or a few target biomolecules. TRPV1- and TRPA-receptors are often involved as chemosensors that induce neurogenic inflammation. The present work briefly surveys classes and toxicologically relevant features of chemical warfare agents and describes mechanisms of toxic action. Copyright © 2017 Elsevier B.V. All rights reserved.

  7. Status of dental health in chemical warfare victims: the case of Isfahan, Iran.

    Science.gov (United States)

    Mottaghi, Ahmad; Hoseinzade, Abolfath; Zamani, Elham; Araghizade, Habib Allah

    2012-01-01

    Little evidence is available regarding the dental health of victims of chemical warfare in Iran. Therefore, in this study, we examined the decayed, missing, and filled teeth index (DMFT), community periodontal index of treatment needs (CPITN), and saliva secretion rate of chemical warfare victims living in the province of Isfahan in Iran. This case-control study was conducted with 300 chemical warfare victims as the treatment group and 300 age-matched individuals without exposure to chemical warfare as the control group. DMFT and CPITN indices and saliva secretion rate were measured and compared between the two groups. Chemical warfare victims had significantly higher scores than the control group for decayed teeth (4.25 ± 3.88 vs 3.52 ± 2.81; P=0.009), missing teeth (8.79 ± 9.3 vs 6.15 ± 8.43; Pwarfare victims was significantly lower than that in the control group (1.71 ± 0.05 vs 3.85 ± 1.95 cc/5 min; PChemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  8. Information Warfare in the Cyber Domain

    National Research Council Canada - National Science Library

    Takemoto, Glenn

    2001-01-01

    ...). This paper lays a foundation by defining the terminology associated with Information Warfare in the Cyber Domain, reviews the threat and illustrates the vulnerabilities of our information systems...

  9. Any Time, Any Place, Any Gender The Risks and Rewards of Integrating Females into Special Operations Forces

    Science.gov (United States)

    2015-06-02

    Service report to Congress in 1987, subsequently published commercially as John Collins, Green Berets, SEALs, and Spetsnaz: US & Soviet Special...warfare activities are their Special Forces (SF), more commonly known as “ Green Berets” due their specific cultural artifact, with the assistance of CA...2004. Howarth, Patrick. Undercover: The Men and Women of the Special Operations Executive. London, UK: Routledge and Kegan Paul, 1980. Howes, Ruth

  10. Hybrid warfare of the USA in South America

    Directory of Open Access Journals (Sweden)

    A. V. Budaev

    2015-01-01

    Full Text Available Washington’s hybrid warfare in Latin American region differs by its inventive and sophisticated methods and in fact represents a complex and multidimensional phenomenon including symbiosis of the “soft” and “hard” power as well as their combination in the form of the “smart power”. The increasing importance of hybrid warfare technologies in the US foreign policy in Latin America predetermines the necessity of thorough studies and analysis of this phenomenon for providing Russian interests.

  11. Capture of irregular satellites at Jupiter

    International Nuclear Information System (INIS)

    Nesvorný, David; Vokrouhlický, David; Deienno, Rogerio

    2014-01-01

    The irregular satellites of outer planets are thought to have been captured from heliocentric orbits. The exact nature of the capture process, however, remains uncertain. We examine the possibility that irregular satellites were captured from the planetesimal disk during the early solar system instability when encounters between the outer planets occurred. Nesvorný et al. already showed that the irregular satellites of Saturn, Uranus, and Neptune were plausibly captured during planetary encounters. Here we find that the current instability models present favorable conditions for capture of irregular satellites at Jupiter as well, mainly because Jupiter undergoes a phase of close encounters with an ice giant. We show that the orbital distribution of bodies captured during planetary encounters provides a good match to the observed distribution of irregular satellites at Jupiter. The capture efficiency for each particle in the original transplanetary disk is found to be (1.3-3.6) × 10 –8 . This is roughly enough to explain the observed population of jovian irregular moons. We also confirm Nesvorný et al.'s results for the irregular satellites of Saturn, Uranus, and Neptune.

  12. Irregular Migrants and the Law

    OpenAIRE

    Kassim, Azizah; Mat Zin, Ragayah Hj.

    2013-01-01

    This paper examines Malaysia`s policy on irregular migrants and its implementation, and discusses its impact. A survey and interview covering 404 respondents was conducted between July 2010 and June 2011 to ascertain the real situations surrounding irregular migrants in Malaysia, which is one of the major host countries of international migrants from developing nations. The policy on foreign workers was formulated in the mid-1980s to deal with the large number of irregular migrants and their ...

  13. Biological warfare, bioterrorism, and biocrime

    NARCIS (Netherlands)

    Jansen, H. J.; Breeveld, F. J.; Stijnis, C.; Grobusch, M. P.

    2014-01-01

    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria

  14. 2009 High Performance Computing Modernization Program Users Group Conference

    Science.gov (United States)

    2009-06-17

    Asymmetric Threats Future Peer GWoT / ungoverned areas Irregular Warfare Low-end Asymmetric 1-4-2-1 (State-to-State War) Disruptive technologies Superiority...2008 “As changes in this century’s threat environment create strategic challenges – irregular warfare, weapons of mass destruction, disruptive ... technologies – this request places greater emphasis on basic research, which in recent years has not kept pace with other parts of the budget.” • Personnel

  15. Enzymatic Decontamination of Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Raushel, Frank

    2000-01-01

    The primary objective of this research program is the development of a versatile enzyme-based system that is fully optimized for the decontamination, destruction, and detection of know chemical warfare agents...

  16. SiGe-based re-engineering of electronic warfare subsystems

    CERN Document Server

    Lambrechts, Wynand

    2017-01-01

    This book equips readers with a thorough understanding of the applicability of new-generation silicon-germanium (SiGe) electronic subsystems for the military purposes of electronic warfare and defensive countermeasures. The theoretical and technical background is extensively explained and all aspects of the integration of SiGe as an enabling technology for maritime, land, and airborne (including space) electronic warfare are addressed, including research, design, development, and implementation. The coverage is supported by mathematical derivations, informative illustrations, practical examples, and case studies. While SiGe technology provides speed, performance, and price advantages in many markets, sharing of information on its use in electronic warfare systems has to date been limited, especially in developing nations. This book will therefore be warmly welcomed as an engineering guideline that focuses especially on the speed and reliability of current-generation SiGe circuits and highlights emerging innov...

  17. Human Behaviour Representation in Constructive Modelling (Representation du comportement humain dans des modelisations creatives)

    Science.gov (United States)

    2009-09-01

    Resources and Performance. Action Group 19. Representation of Human Behavior. Lanchester , F. W. (1916). Aircraft in warfare . The dawn of the fourth...Operations and non-kinetic warfare . The second keynote presentation, by Mr. Mike Greenley, CAE Inc. provided an industry perspective, noting the need for...concentrated on tactical-conventional warfare and the emergence of world-wide “irregular warfare ” and “small wars” drive the present and future need

  18. The Utility of Freedom: A Principal-Agent Model for Unconventional Warfare

    Science.gov (United States)

    2011-06-01

    Lanchester Model of Guerrilla Warfare,‖ Operations Research 10, no. 6 (December 1962): 818–827; William A. Niskanen, ―Review: The Economics of Insurgency...http://galenet.galegroup.com/servlet/DDRS?locID=navalps. Deitchman, S. J. ―A Lanchester Model of Guerrilla Warfare.‖ Operations Research 10, no

  19. Skeletal evidence for Inca warfare from the Cuzco region of Peru.

    Science.gov (United States)

    Andrushko, Valerie A; Torres, Elva C

    2011-11-01

    This article addresses the bioarchaeological evidence for Inca warfare through an analysis of 454 adult skeletons from 11 sites in the Inca capital region of Cuzco, Peru. These 11 sites span almost 1000 years (AD 600-1532), which allows for a comparison of the evidence for warfare before the Inca came to power (Middle Horizon AD 600-1000), during the time of Inca ascendency in the Late Intermediate Period (AD 1000-1400), and after the Inca came to power and expanded throughout the Cuzco region and beyond (Inca Imperial Period, AD 1400-1532). The results indicate that 100 of 454 adults (22.0%) showed evidence of cranial trauma. Of these, 23 individuals had major cranial injuries suggestive of warfare, consisting of large, complete, and/or perimortem fractures. There was scant evidence for major injuries during the Middle Horizon (2.8%, 1/36) and Late Intermediate Period (2.5%, 5/199), suggesting that warfare was not prevalent in the Cuzco region before and during the Inca rise to power. Only in the Inca Imperial Period was there a significant rise in major injuries suggestive of warfare (7.8%, 17/219). Despite the significant increase in Inca times, the evidence for major cranial injuries was only sporadically distributed at Cuzco periphery sites and was entirely absent at Cuzco core sites. These findings suggest that while the Inca used warfare as a mechanism for expansion in the Cuzco region, it was only one part of a complex expansion strategy that included economic, political, and ideological means to gain and maintain control. Copyright © 2011 Wiley-Liss, Inc.

  20. Understanding the elementary considerations in a network warfare environment: an introductory framework

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available . It seeks to offer a better introductory understanding to the field of network warfare. This paper addresses the requirements for a network warfare capability and will look at the high-level approach, constraints, focus areas, levels, techniques...

  1. The Physics of Warfare

    Science.gov (United States)

    Giordano, Gerardo

    2015-01-01

    Recently, I was tasked with the creation and execution of a new themed general education physics class called The Physics of Warfare. In the past, I had used the theme of a class, such as the physics of sports medicine, as a way to create homework and in-class activities, generate discussions, and provide an application to demonstrate that physics…

  2. Commander’s Handbook for Strategic Communication and Communication Strategy

    Science.gov (United States)

    2010-06-24

    operations worldwide. “We changed the way we were perceived,” one [U.S. Green Beret] told [him]. “When we arrived in Basilan, Muslim kids made throat...Olson, Eric T., ADM, CDR USSOCOM, The Pedagogy of Irregular Warfare, USMC IW Conference briefing, Gray Research Center, 31 Oct 07. q. Post, Jerrold M...USSOCOM, The Pedagogy of Irregular Warfare, USMC IW Conference briefing, Gray Research Center, 31 Oct 07, 10. 69 Kessler, Graham, et al, Assessing

  3. Chemical warfare agents identification by thermal neutron detection

    International Nuclear Information System (INIS)

    Liu Boxue; Ai Xianyun; Tan Daoyuan; Zhang Dianqin

    2000-01-01

    The hydrogen concentration determination by thermal neutron detection is a non-destructive, fast and effective method to identify chemical warfare agents and TNT that contain different hydrogen fraction. When an isotropic neutron source is used to irradiate chemical ammunition, hydrogen atoms of the agent inside shell act as a moderator and slow down neutrons. The number of induced thermal neutrons depends mainly upon hydrogen content of the agent. Therefore measurement of thermal neutron influence can be used to determine hydrogen atom concentration, thereby to determine the chemical warfare agents. Under a certain geometry three calibration curves of count rate against hydrogen concentration were measured. According to the calibration curves, response of a chemical agent or TNT could be calculated. Differences of count rate among chemical agents and TNT for each kind of shells is greater than five times of standard deviations of count rate for any agent, so chemical agents or TNT could be identified correctly. Meanwhile, blast tube or liquid level of chemical warfare agent could affect the response of thermal neutron count rate, and thereby the result of identification. (author)

  4. Quality of Life in Iranian Chemical Warfare Veteran's.

    Science.gov (United States)

    Ebadi, Abbas; Moradian, Tayeb; Mollahadi, Mohsen; Saeed, Yaser; Refahi, Ali Akbar

    2014-05-01

    Mustard gas has different effects on different body systems such as respiratory tract, blood, gastrointestinal, skin, eye, endocrine and peripheral nervous system. The purpose of this study was to determine the quality of life in chemical warfare veterans due to sulfur mustard exposure. In a cross-sectional and analytic study, 242 patients who had a chemical injury during the Iran-Iraq war (1980-1983) and their lung damage was proven were investigated in our study. The quality of life was measured in these patients using an extensively validated Iranian version of SF-36. The mean age of veterans was 44.12 ± 4.9 ranging from 22 to 62 years. Our results showed that chemical warfare had a decreased quality of life in all subscales of the SF-36. The lowest scores in SF-36 subscales were related to role physical and general health. The data also showed a significant relationship between the number of organs involved and the quality of life in these patients (P chemical warfare survivors suffering from late complications have a low health related quality of life.

  5. Technological advancements for the detection of and protection against biological and chemical warfare agents.

    Science.gov (United States)

    Eubanks, Lisa M; Dickerson, Tobin J; Janda, Kim D

    2007-03-01

    There is a growing need for technological advancements to combat agents of chemical and biological warfare, particularly in the context of the deliberate use of a chemical and/or biological warfare agent by a terrorist organization. In this tutorial review, we describe methods that have been developed both for the specific detection of biological and chemical warfare agents in a field setting, as well as potential therapeutic approaches for treating exposure to these toxic species. In particular, nerve agents are described as a typical chemical warfare agent, and the two potent biothreat agents, anthrax and botulinum neurotoxin, are used as illustrative examples of potent weapons for which countermeasures are urgently needed.

  6. Irregular Warfare Centric Foreign Internal Defense

    Science.gov (United States)

    2013-06-01

    ransacking homes, humiliating automobile occupants during searches and harassment of pedestrians on the streets.87 The Commission of Human Rights ruled...the surface often appears reactive and inconsistent, both Labour and Conservative governments have consistently adhered to a set of basic principles

  7. Examining U.S. Irregular Warfare Doctrine

    Science.gov (United States)

    2008-06-01

    Muslim leaders, this manual also provides inspiration to the Al-Qaeda undercover member. These are especially useful in convincing the young...A “Air Power: An Enduring Illusion,” The Economist (24 August 2006). Accessed via: http://www.economist.com/world/displaystory.cfm?story_id...USA AFIT/ILM/ENS/08-04 DEPARTMENT OF THE AIR FORCE AIR UNIVERSITY AIR FORCE INSTITUTE OF TECHNOLOGY Wright-Patterson

  8. Risk, Military Ethics and Irregular Warfare

    Science.gov (United States)

    2011-12-01

    permissible; they are obligatory. Given the state’s moral obligation to protect its citizens, 6 military operations conducted in their defense are prima ... facie obligated, even when conducting those operations exposes combatants to harm. 7 Thus, in what I will refer to as the “traditional view,” by taking...feature of the traditional view. In an article co-written in 2005 with then Major General Amos Yadlin, Kasher remarked: “the duty to minimize casualties

  9. The Anatomy of Counterinsurgency Warfare

    DEFF Research Database (Denmark)

    Mouritsen, Lars; Pedersen, Kenneth; Thruelsen, Peter Dahl

    Since the beginning of the new millennium, the West has been increasingly involved in a tiresome and rather particular type of conflict: insurgency warfare. The bloody and shocking terrorist attacks on New York and Washington in September 2001 marked the beginning of a new era, and the introducti...

  10. Establishing Cyber Warfare Doctrine

    Directory of Open Access Journals (Sweden)

    Andrew M. Colarik

    2012-01-01

    Full Text Available Over the past several decades, advances in technology have transformed communications and the ability to acquire, disseminate, and utilize information in a range of environments. Modern societies and their respective militaries have taken advantage of a robust information space through network-centric systems. Because military and commercial operations have increasingly converged, communication and information infrastructures are now high-priority military objectives in times of war. This article examines the theoretical underpinning of current cyber warfare research, what we have learned so far about its application, and some of the emerging themes to be considered; it also postulates the development of a (national cyber warfare doctrine (CWD. An endeavor of this scale requires lots of considerations and preparation for its development if it is to be cooperatively embraced. This article considers why information technology systems and their supporting infrastructures should be considered legitimate military targets in conflicts, and offers several events that support this supposition. In addition, it identifies the various forms of doctrine that will become the basis for developing a CWD, discusses a CWD's possible components, and proposes a national collaborative and discussion framework for obtaining a nation's stakeholder buy-in for such an endeavor.

  11. Antifragile Electronic Warfare

    OpenAIRE

    Lichtman, Marc

    2014-01-01

    This letter introduces the concept of antifragile electronic warfare (EW), which we define as the ability to allow a communications link to improve performance due to the presence of a jammer. This concept should not be confused with jamming countermeasures (a.k.a. anti-jamming or electronic protection). Rather, antifragile EW can be thought of as the next step beyond simply avoiding or mitigating jamming. After introducing the concept we narrow down the subset of jammers this concept can be ...

  12. Transport and Reactivity of Decontaminants to Provide Hazard Mitigation of Chemical Warfare Agents from Materials

    Science.gov (United States)

    2016-06-01

    2013 4. TITLE AND SUBTITLE Transport and Reactivity of Decontaminants to Provide Hazard Mitigation of Chemical Warfare Agents from Materials 5a...directions for future decontamination formulation approaches. 15. SUBJECT TERMS GD HD Decontamination Hazard mitigation VX Chemical warfare agent... DECONTAMINANTS TO PROVIDE HAZARD MITIGATION OF CHEMICAL WARFARE AGENTS FROM MATERIALS 1. INTRODUCTION Decontamination of materials is the

  13. Strategy in the Robotic Age: A Case for Autonomous Warfare

    Science.gov (United States)

    2014-09-01

    enabling technology that augments human performance, such as exoskeleton suits, and other complementary fields that make robotics function...philosophy of maneuver warfare with new technologies from the Robotic Age, such as unmanned systems and exoskeleton suits, to present a new warfighting...and Brimley, “20YY,” 12. 49 the exoskeleton suit, but rather that the full benefit of autonomous warfare will be achieved by leveraging mass and

  14. European Curricula, Xenophobia and Warfare.

    Science.gov (United States)

    Coulby, David

    1997-01-01

    Examines school and university curricula in Europe and the extent of their influence on xenophobia. Considers the pluralistic nature of the European population. Discusses the role of curriculum selection and language policy in state efforts to promote nationalism. Assesses the role of curricular systems in the actual encouragement of warfare,…

  15. Shadow Wars: An Analysis of Counterinsurgency Warfare

    National Research Council Canada - National Science Library

    Dogan, Osman

    2005-01-01

    ... of the current strategic approaches to counterinsurgency warfare. Toward this end, a systems model approach, which views insurgent organizations as open systems, is adapted to the insurgent environment...

  16. Stuxnet and Cyber-Warfare (1/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic. Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction.   NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  17. Gas Warfare in World War I.

    Science.gov (United States)

    Flintham, A. J.

    1978-01-01

    The effectiveness of gas warfare during World War I was increased by the lack of a basic understanding of the behavior of gases on the part of the soldiers. This was a result of deficiencies in science education. (BB)

  18. A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios

    Directory of Open Access Journals (Sweden)

    Kathryn Merrick

    2016-07-01

    Full Text Available Our increasing dependence on information technologies and autonomous systems has escalated international concern for information- and cyber-security in the face of politically, socially and religiously motivated cyber-attacks. Information warfare tactics that interfere with the flow of information can challenge the survival of individuals and groups. It is increasingly important that both humans and machines can make decisions that ensure the trustworthiness of information, communication and autonomous systems. Subsequently, an important research direction is concerned with modelling decision-making processes. One approach to this involves modelling decision-making scenarios as games using game theory. This paper presents a survey of information warfare literature, with the purpose of identifying games that model different types of information warfare operations. Our contribution is a systematic identification and classification of information warfare games, as a basis for modelling decision-making by humans and machines in such scenarios. We also present a taxonomy of games that map to information warfare and cyber crime problems as a precursor to future research on decision-making in such scenarios. We identify and discuss open research questions including the role of behavioural game theory in modelling human decision making and the role of machine decision-making in information warfare scenarios.

  19. Irregular Migration in Jordan, 1995-2007

    OpenAIRE

    AROURI, Fathi A.

    2008-01-01

    Euro-Mediterranean Consortium for Applied Research on International Migration (CARIM) This paper tackles the question of irregular migration in Jordan through its four main aspects. The first concerns irregular labour migrants and has been approached by using figures showing the socio-economic profile of non Jordanians working in Jordan and, additionally, unemployment in Jordan. This is done by assuming close similarities between legal and irregular labour migrants. The second is an attemp...

  20. Metal organic frameworks for the catalytic detoxification of chemical warfare nerve agents

    Science.gov (United States)

    Hupp, Joseph T.; Farha, Omar K.; Katz, Michael J.; Mondloch, Joseph E.

    2017-04-18

    A method of using a metal organic framework (MOF) comprising a metal ion and an at least bidendate organic ligand to catalytically detoxify chemical warfare nerve agents including exposing the metal-organic-framework (MOF) to the chemical warfare nerve agent and catalytically decomposing the nerve agent with the MOF.

  1. Fitting Irregular Shape Figures into Irregular Shape Areas for the Nesting Problem in the Leather Industry

    Directory of Open Access Journals (Sweden)

    Guevara-Palma Luis

    2015-01-01

    Full Text Available The nesting problem of irregular shapes within irregular areas has been studied from several approaches due to their application in different industries. The particular case of cutting leather involves several restrictions that add complexity to this problem, it is necessary to generate products that comply with the quality required by customers This paper presents a methodology for the accommodation of irregular shapes in an irregular area (leather considering the constraints set by the footwear industry, and the results of this methodology when applied by a computer system. The scope of the system is to develop a working prototype that operates under the guidelines of a commercial production line of a sponsor company. Preliminary results got a reduction of 70% of processing time and improvement of 5% to 7% of the area usage when compared with manual accommodation.

  2. Stuxnet and Cyber-Warfare (2/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic.   Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction. The lecturer invites comments via email to Gian.Piero.Siroli@cern.ch NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  3. Oxidative decontamination of chemical and biological warfare agents using L-Gel.

    Science.gov (United States)

    Raber, Ellen; McGuire, Raymond

    2002-08-05

    A decontamination method has been developed using a single reagent that is effective both against chemical warfare (CW) and biological warfare (BW) agents. The new reagent, "L-Gel", consists of an aqueous solution of a mild commercial oxidizer, Oxone, together with a commercial fumed silica gelling agent, Cab-O-Sil EH-5. L-Gel is non-toxic, environmentally friendly, relatively non-corrosive, maximizes contact time because of its thixotropic nature, clings to walls and ceilings, and does not harm carpets or painted surfaces. The new reagent also addresses the most demanding requirements for decontamination in the civilian sector, including availability, low maintenance, ease of application and deployment by a variety of dispersal mechanisms, minimal training and acceptable expense. Experiments to test the effectiveness of L-Gel were conducted at Lawrence Livermore National Laboratory and independently at four other locations. L-Gel was tested against all classes of chemical warfare agents and against various biological warfare agent surrogates, including spore-forming bacteria and non-virulent strains of real biological agents. Testing showed that L-Gel is as effective against chemical agents and biological materials, including spores, as the best military decontaminants.

  4. On Cyber Warfare Command and Control Systems

    National Research Council Canada - National Science Library

    Howes, Norman R; Mezzino, Michael; Sarkesain, John

    2004-01-01

    .... Cyber warfare then becomes a one-sided battle where the attacker makes all the strikes and the target of the attack responds so slowly that the attacker usually gets away without being identified...

  5. The Third World War? In The Cyberspace. Cyber Warfare in the Middle East.

    Directory of Open Access Journals (Sweden)

    Martina

    2014-06-01

    Full Text Available This article aims to provide a brief and comprehensive introduction to the issue of cyber warfare and to display the recent development in this area. Geographically, it focuses on the Middle East region, since the vast majority of the most important recent cyber attacks appeared just in there or were connected to it. The first part of the article tries to define the key notion of cyber warfare, compares it to the standard warfare and presents different types of cyber weapons that are known today. The second part points out examples of the most striking recent cyber attacks and uses them as evidences to demonstrate today's importance and dissemination of cyber warfare. Finally, the article sums up pros and cons of the cyber weapons and, in view of these, predicts a significant increase in their use in any future war conflicts.

  6. Electronic Warfare: Army Special Operations Acquisition Strategy for Improved Equipment Is Sound

    National Research Council Canada - National Science Library

    1999-01-01

    ... to you. The Army Special Operations Command employs modified Chinook and Blackhawk helicopters, the MH-47D/E and MH-60K/L, respectively, in support of special operations missions worldwide These aircraft...

  7. Hybrid Maritime Warfare

    DEFF Research Database (Denmark)

    Schaub Jr, Gary John; Murphy, Martin; Hoffman, Frank

    2017-01-01

    Russia’s use of hybrid warfare techniques has raised concerns about the security of the Baltic States. Gary Schaub, Jr, Martin Murphy and Frank G Hoffman recommend a series of measures to augment NATO’s Readiness Action Plan in the Baltic region, including increasing the breadth and depth of naval...... exercises, and improving maritime domain awareness through cooperative programmes. They also suggest unilateral and cooperative measures to develop a sound strategic communications strategy to counter Moscow’s information operations, reduce dependence on Russian energy supplies and build the resilience...

  8. Mass spectrometry in identification of ecotoxicants including chemical and biological warfare agents

    International Nuclear Information System (INIS)

    Lebedev, Albert T.

    2005-01-01

    Mass spectrometry is a unique tool to detect and identify trace levels of organic and bioorganic compounds as well as microorganisms in the environment. The range of potential chemical warfare (CW) and biological warfare (BW) agents is very broad. An important advantage of mass spectrometry over other techniques involves potential for full spectrum detection of chemical and biological agents including mid-spectrum materials (i.e. bioactive peptides, toxins, etc.) for which biological approaches are inadequate. Being very fast (seconds and minutes), extremely sensitive (zeptomoles 10 -21 ), and informative (detailed qualitative and quantitative composition of mixtures containing hundreds of chemicals), mass spectrometry is a principal analytical tool at the sites of destruction of CW. Due to its unique features, mass spectrometry is applied not only for the detection of CW agents, but for the analysis of products of metabolism and degradation of these agents in organisms or environment as well. The present paper deals with some examples of successful application of mass spectrometry for the analyses of ecotoxicants, chemical warfare agents, explosives, and microorganisms including biology warfare agents

  9. Prehistoric ceremonial warfare: beginning of institutionalized violence

    Czech Academy of Sciences Publication Activity Database

    Turek, Jan

    2017-01-01

    Roč. 13, č. 3 (2017), s. 535-548 ISSN 1555-8622 Institutional support: RVO:67985912 Keywords : human aggression * ceremonial warfare * archery symbolism * Neolithic * Chalcolithic * Europe Subject RIV: AC - Archeology, Anthropology, Ethnology OBOR OECD: Archaeology

  10. Theory of information warfare: basic framework, methodology and conceptual apparatus

    Directory of Open Access Journals (Sweden)

    Олександр Васильович Курбан

    2015-11-01

    Full Text Available It is conducted a comprehensive theoretical study and determine the basic provisions of the modern theory of information warfare in on-line social networks. Three basic blocks, which systematized the theoretical and methodological basis of the topic, are established. There are information and psychological war, social off-line and on-line network. According to the three blocks, theoretical concepts are defined and methodological substantiation of information processes within the information warfare in the social on-line networks is formed

  11. Antidotes and treatments for chemical warfare/terrorism agents: an evidence-based review.

    Science.gov (United States)

    Rodgers, G C; Condurache, C T

    2010-09-01

    This article reviews the evidence supporting the efficacy of antidotes used or recommended for the potential chemical warfare agents of most concern. Chemical warfare agents considered include cyanide, vesicants, pulmonary irritants such as chlorine and phosgene, and nerve agents. The strength of evidence for most antidotes is weak, highlighting the need for additional research in this area.

  12. Kilometer-Spaced GNSS Array for Ionospheric Irregularity Monitoring

    Science.gov (United States)

    Su, Yang

    This dissertation presents automated, systematic data collection, processing, and analysis methods for studying the spatial-temporal properties of Global Navigation Satellite Systems (GNSS) scintillations produced by ionospheric irregularities at high latitudes using a closely spaced multi-receiver array deployed in the northern auroral zone. The main contributions include 1) automated scintillation monitoring, 2) estimation of drift and anisotropy of the irregularities, 3) error analysis of the drift estimates, and 4) multi-instrument study of the ionosphere. A radio wave propagating through the ionosphere, consisting of ionized plasma, may suffer from rapid signal amplitude and/or phase fluctuations known as scintillation. Caused by non-uniform structures in the ionosphere, intense scintillation can lead to GNSS navigation and high-frequency (HF) communication failures. With specialized GNSS receivers, scintillation can be studied to better understand the structure and dynamics of the ionospheric irregularities, which can be parameterized by altitude, drift motion, anisotropy of the shape, horizontal spatial extent and their time evolution. To study the structuring and motion of ionospheric irregularities at the sub-kilometer scale sizes that produce L-band scintillations, a closely-spaced GNSS array has been established in the auroral zone at Poker Flat Research Range, Alaska to investigate high latitude scintillation and irregularities. Routinely collecting low-rate scintillation statistics, the array database also provides 100 Hz power and phase data for each channel at L1/L2C frequency. In this work, a survey of seasonal and hourly dependence of L1 scintillation events over the course of a year is discussed. To efficiently and systematically study scintillation events, an automated low-rate scintillation detection routine is established and performed for each day by screening the phase scintillation index. The spaced-receiver technique is applied to cross

  13. Technology Transition for Hybrid Warfare

    Science.gov (United States)

    2010-02-16

    and Iraq. At the same time, the science and technology base must provide the disruptive technologies to defeat future conventional enemies. This... disruptive technologies will be needed to retain long-term technological superiority in conventional warfare. Incremental improvement is the most...technology to be missed. Disruptive technologies are the second type of technological change and involve revolutionary concepts involving large technological

  14. Warfare and the Teaching of History.

    Science.gov (United States)

    Salevouris, Michael J.

    1989-01-01

    Maintains that history teachers must challenge simplistic romantic notions about war. Proposes two approaches to teaching about war: the use of personal war narratives; and examining the relationship between warfare and society. Discusses literature related to these approaches. Contends that only through realistic assessments of war can peace be…

  15. Blaptica dubia as sentinels for exposure to chemical warfare agents - a pilot study.

    Science.gov (United States)

    Worek, Franz; Seeger, Thomas; Neumaier, Katharina; Wille, Timo; Thiermann, Horst

    2016-11-16

    The increased interest of terrorist groups in toxic chemicals and chemical warfare agents presents a continuing threat to our societies. Early warning and detection is a key component for effective countermeasures against such deadly agents. Presently available and near term solutions have a number of major drawbacks, e.g. lack of automated, remote warning and detection of primarily low volatile chemical warfare agents. An alternative approach is the use of animals as sentinels for exposure to toxic chemicals. To overcome disadvantages of vertebrates the present pilot study was initiated to investigate the suitability of South American cockroaches (Blaptica dubia) as warning system for exposure to chemical warfare nerve and blister agents. Initial in vitro experiments with nerve agents showed an increasing inhibitory potency in the order tabun - cyclosarin - sarin - soman - VX of cockroach cholinesterase. Exposure of cockroaches to chemical warfare agents resulted in clearly visible and reproducible reactions, the onset being dependent on the agent and dose. With nerve agents the onset was related to the volatility of the agents. The blister agent lewisite induced signs largely comparable to those of nerve agents while sulfur mustard exposed animals exhibited a different sequence of events. In conclusion, this first pilot study indicates that Blaptica dubia could serve as a warning system to exposure of chemical warfare agents. A cockroach-based system will not detect or identify a particular chemical warfare agent but could trigger further actions, e.g. specific detection and increased protective status. By designing appropriate boxes with (IR) motion sensors and remote control (IR) camera automated off-site warning systems could be realized. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  16. Sexy is what you make it: organizational culture and U.S. Army Special Forces

    OpenAIRE

    Hawk, David L.

    2014-01-01

    Approved for public release; distribution is unlimited The U.S. Army Special Forces (SF) are the most highly trained, best equipped, and most seasoned soldiers to which the United States can turn to achieve national security objectives. The future, however, will require more indirect application of SF, through special warfare operations (e.g., UW, FID, etc.), in a host of hostile and undefined areas around the globe. This manner of employment is a change in emphasis from the direct combat ...

  17. Irregular menstruation according to occupational status.

    Science.gov (United States)

    Kwak, Yeunhee; Kim, Yoonjung

    2017-07-06

    This cross-sectional study explored associations of irregular menstruation with occupational characteristics, using secondary analyses of data from 4,731 women aged 19-54 years, collected from a nationally representative sample, the Korea National Health and Nutrition Examination Survey-V during 2010-2012. The associations between irregular menstruation and occupation were explored using multiple logistic regression. Compared to non-manual workers, service/sales workers had a greater odds of irregular menstruation (adjusted odds ratio [aOR]: 1.44; 95percent confidence interval [CI]: 1.04-1.99) as did manual workers and unemployed women (aOR: 1.56; 95percent CI: 1.10-2.22, aOR: 1.46; 95percent CI: 1.14-1.89, respectively). Compared to regular workers, temporary workers and unemployed women had aORs of 1.52 (95percent CI: 1.08-2.13) and 1.33 (95percent CI: 1.05-1.69), respectively. Also, when compared to full-time workers, part-time workers and unemployed women had greater odds of irregular menstruation (aOR: 1.41; 95percent CI: 1.00-2.00 and aOR: 1.29; 95percent CI: 1.03-1.63, respectively). Furthermore, compared to daytime workers, shift workers and unemployed women had greater odds irregular menstruation (aOR: 1.39; 95percent CI: 1.03-1.88 and aOR: 1.28; 95percent CI: 1.04-1.59, respectively). Women with these occupational characteristics should be screened for early diagnosis and intervention for irregular menstruation.

  18. Irregular conformal block, spectral curve and flow equations

    International Nuclear Information System (INIS)

    Choi, Sang Kwan; Rim, Chaiho; Zhang, Hong

    2016-01-01

    Irregular conformal block is motivated by the Argyres-Douglas type of N=2 super conformal gauge theory. We investigate the classical/NS limit of irregular conformal block using the spectral curve on a Riemann surface with irregular punctures, which is equivalent to the loop equation of irregular matrix model. The spectral curve is reduced to the second order (Virasoro symmetry, SU(2) for the gauge theory) and third order (W_3 symmetry, SU(3)) differential equations of a polynomial with finite degree. The conformal and W symmetry generate the flow equations in the spectral curve and determine the irregular conformal block, hence the partition function of the Argyres-Douglas theory ala AGT conjecture.

  19. Moltke as a Model for Information Warfare

    National Research Council Canada - National Science Library

    Gallagher, Daniel P

    1998-01-01

    ... with late 20th century Information Warfare (IW). Clausewitz, with his emphasis on concentrating forces for a decisive battle, or Sun Tzu, with his focus on an indirect approach and subduing the enemy without battle, might appear to be more...

  20. Cutaneous reactions in nuclear, biological and chemical warfare

    Directory of Open Access Journals (Sweden)

    Arora Sandeep

    2005-03-01

    Full Text Available Nuclear, biological and chemical warfare have in recent times been responsible for an increasing number of otherwise rare dermatoses. Many nations are now maintaining overt and clandestine stockpiles of such arsenal. With increasing terrorist threats, these agents of mass destruction pose a risk to the civilian population. Nuclear and chemical attacks manifest immediately while biological attacks manifest later. Chemical and biological attacks pose a significant risk to the attending medical personnel. The large scale of anticipated casualties in the event of such an occurrence would need the expertise of all physicians, including dermatologists, both military and civilian. Dermatologists are uniquely qualified in this respect. This article aims at presenting a review of the cutaneous manifestations in nuclear, chemical and biological warfare and their management.

  1. Evolution of war and cyber attacks in the concept of conventional warfare

    Directory of Open Access Journals (Sweden)

    Huseyin Kuru

    2018-01-01

    Full Text Available Humanity have witnessed many confrontations of states whose interests challenge at some points and their struggle to neutralize problems in battlefield. While war was perceived as a way of eliminating deadlocks for some parties, some considered it as one of the international policy materials. The definition and content of conventional warfare have been subject to change for centuries, while the new weapons and technologies have been developed by human beings that it has brought constant change in the law of war and at the same time more lethal and devastating consequences. The struggle for superiority in international relations played an impulsive role in the development of weapons used in the battlefield. Countries have used their labor and financial resources to improve their military skills. Beginning with stones and sticks in the battlefield, this struggle has reached the point of using the next generation satellite controlled unmanned and armed aircrafts and having nuclear weapons has become more deterrent than using them. The struggle between strong countries and the limited countries in terms of technology and armed groups that do not have enough technology and skills completely changed the definition of conventional warfare. This fight has led Asymmetric warfare born which can turn commercial airline planes full of innocent people into a weapon like September-11 attacks. In this study, the historical development and the change in the content of the warfare were briefly explained and then cyber-attacks in the concept of the fourth generation warfare was analyzed taking into account of prominent attacks.

  2. 16 CFR 501.6 - Cellulose sponges, irregular dimensions.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Cellulose sponges, irregular dimensions. 501... REQUIREMENTS AND PROHIBITIONS UNDER PART 500 § 501.6 Cellulose sponges, irregular dimensions. Variety packages of cellulose sponges of irregular dimensions, are exempted from the requirements of § 500.25 of this...

  3. Ethical issues in irregular migration research

    NARCIS (Netherlands)

    Duvell, F.; Triandafyllidou, A.; Vollmer, B.

    2008-01-01

    This paper is concerned with the ethical issues arising for researchers engaged in the study of irregular migration. Irregular migration is by definition an elusive phenomenon as it takes place in violation of the law and at the margins of society. This very nature of the phenomenon raises important

  4. Status of dental health in chemical warfare victims: The case of Isfahan, Iran

    Directory of Open Access Journals (Sweden)

    Ahmad Mottaghi

    2012-01-01

    Conclusion: Chemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  5. Handbook of toxicology of chemical warfare agents

    CERN Document Server

    2010-01-01

    This groundbreaking book covers every aspect of deadly toxic chemicals used as weapons of mass destruction and employed in conflicts, warfare and terrorism. Including findings from experimental as well as clinical studies, this one-of-a-kind handbook is prepared in a very user- friendly format that can easily be followed by students, teachers and researchers, as well as lay people. Stand-alone chapters on individual chemicals and major topics allow the reader to easily access required information without searching through the entire book. This is the first book that offers in-depth coverage of individual toxicants, target organ toxicity, major incidents, toxic effects in humans, animals and wildlife, biosensors, biomarkers, on-site and laboratory analytical methods, decontamination and detoxification procedures, prophylactic, therapeutic and countermeasures, and the role of homeland security. Presents a comprehensive look at all aspects of chemical warfare toxicology in one reference work. This saves research...

  6. How Do I Know? A Guide to the Selection of Personal Protective Equipment for Use in Responding to A Release of Chemical Warfare Agents

    Energy Technology Data Exchange (ETDEWEB)

    Foust, C.B.

    1999-05-01

    An incident involving chemical warfare agents requires a unique hazardous materials (HAZMAT) response. As with an HAZMAT event, federal regulations prescribe that responders must be protected from exposure to the chemical agents. But unlike other HAZMAT events, special considerations govern selection of personal protective equipment (PPE). PPE includes all clothing, respirators and monitoring devices used to respond to a chemical release. PPE can differ depending on whether responders are military or civilian personnel.

  7. Echoes of Chechnya Warfare Resound in Moscow, Quantico

    National Research Council Canada - National Science Library

    Ackerman, Robert

    2000-01-01

    .... thinking about urban warfare. After suffering stunning public defeats just a few years ago, Russian forces applied painful lessons learned then to drive Chechen forces out of their capital city, Grozny, this year...

  8. Book Review COMPOSITE WARFARE: THE CONDUCT OF ...

    African Journals Online (AJOL)

    COMPOSITE WARFARE: THE CONDUCT OF. SUCCESSFUL GROUND FORCE. OPERATIONS IN AFRICA. Eeben Barlow. Abel Esterhuyse, PhD. Stellenbosch University. Pinetown: 30 Degrees South Publishers. 2015, 576 pages. ISBN 9781928211761. Africa is still one of the most conflict-ridden places on earth – from ...

  9. MOSES, development of an Underwater Warfare Testbed

    NARCIS (Netherlands)

    Lentze, S.G.

    2001-01-01

    The TNO underwater warfare (UWW) research programme results in a large number of models used in operational research projects. To enhance the accessibility and re-use of these models for new projects, TNO-FEL has developed the modelling environment ‘MOSES - Maritime Operations Simulation and

  10. Identification of chemical warfare agent with radiological measurements

    International Nuclear Information System (INIS)

    Liu Boxue; Li Yun; Ai Xianyun

    2000-01-01

    There are three non-destructive radiological methods for identification of warfare agents and TNT. Their principles and problems related were discussed. Portable isotopic neutron spectroscopy is based on the assay of key elemental composition (such as Cl, P, H, As, S, N) in chemical agents by neutron induced prompt gamma ray analysis. Hydrogen concentration measurement by means of using thermal neutron can be employed to identify chemical warfare agents and TNT that contains different hydrogen fraction. The calibration curves of thermal neutron count rate against hydrogen concentration were measured. X ray imagination system can be used to determine the internal structure of chemical bombs, there by to identify them. The radiological methods are very useful for identification of old chemical weapons abandoned by Japan Army during World War 2

  11. Are Current Psychological Operations Procedures Adequate in Information Warfare?

    National Research Council Canada - National Science Library

    Duff, Murray

    1997-01-01

    .... While some aspects of information warfare are conducted domestically, many are executed on foreign soil and involve extensive interaction with other governments, their population, non-governmental...

  12. Tissue-based water quality biosensors for detecting chemical warfare agents

    Science.gov (United States)

    Greenbaum, Elias [Oak Ridge, TN; Sanders, Charlene A [Knoxville, TN

    2003-05-27

    A water quality sensor for detecting the presence of at least one chemical or biological warfare agent includes: a cell; apparatus for introducing water into the cell and discharging water from the cell adapted for analyzing photosynthetic activity of naturally occurring, free-living, indigenous photosynthetic organisms in water; a fluorometer for measuring photosynthetic activity of naturally occurring, free-living, indigenous photosynthetic organisms drawn into the cell; and an electronics package that analyzes raw data from the fluorometer and emits a signal indicating the presence of at least one chemical or biological warfare agent in the water.

  13. Tissue-based standoff biosensors for detecting chemical warfare agents

    Science.gov (United States)

    Greenbaum, Elias; Sanders, Charlene A.

    2003-11-18

    A tissue-based, deployable, standoff air quality sensor for detecting the presence of at least one chemical or biological warfare agent, includes: a cell containing entrapped photosynthetic tissue, the cell adapted for analyzing photosynthetic activity of the entrapped photosynthetic tissue; means for introducing an air sample into the cell and contacting the air sample with the entrapped photosynthetic tissue; a fluorometer in operable relationship with the cell for measuring photosynthetic activity of the entrapped photosynthetic tissue; and transmitting means for transmitting analytical data generated by the fluorometer relating to the presence of at least one chemical or biological warfare agent in the air sample, the sensor adapted for deployment into a selected area.

  14. Drone Warfare: Is the United States Violating the Law of Armed Conflict

    Science.gov (United States)

    2011-02-16

    NOTE AIR WAR COLLEGE AIR UNIVERSITY DRONE WARFARE: IS THE UNITED STATES VIOLATING THE LAW OF ARMED CONFLICT? by Barbara E. Shestko, Col...Base, Alabama. 1 Introduction The United States has become increasingly dependent upon the use of unmanned aircraft systems (UASs) or “ drones ” to...kill targeted members of al-Qaeda and the Taliban.1 Due to the success of drone warfare, we can expect the United States to continue its current

  15. Biomonitoring of exposure to chemical warfare agents

    NARCIS (Netherlands)

    Noort, D.; Schans, M.J. van der; Benschop, H.P.

    2006-01-01

    An overview is presented of the major methods that are presently available for biomonitoring of exposure to chemical warfare agents, i.e., nerve agents and sulfur mustard. These methods can be applied for a variety of purposes such as diagnosis and dosimetry of exposure of casualties, verification

  16. Locating irregularly shaped clusters of infection intensity

    Directory of Open Access Journals (Sweden)

    Niko Yiannakoulias

    2010-05-01

    Full Text Available Patterns of disease may take on irregular geographic shapes, especially when features of the physical environment influence risk. Identifying these patterns can be important for planning, and also identifying new environmental or social factors associated with high or low risk of illness. Until recently, cluster detection methods were limited in their ability to detect irregular spatial patterns, and limited to finding clusters that were roughly circular in shape. This approach has less power to detect irregularly-shaped, yet important spatial anomalies, particularly at high spatial resolutions. We employ a new method of finding irregularly-shaped spatial clusters at micro-geographical scales using both simulated and real data on Schistosoma mansoni and hookworm infection intensities. This method, which we refer to as the “greedy growth scan”, is a modification of the spatial scan method for cluster detection. Real data are based on samples of hookworm and S. mansoni from Kitengei, Makueni district, Kenya. Our analysis of simulated data shows how methods able to find irregular shapes are more likely to identify clusters along rivers than methods constrained to fixed geometries. Our analysis of infection intensity identifies two small areas within the study region in which infection intensity is elevated, possibly due to local features of the physical or social environment. Collectively, our results show that the “greedy growth scan” is a suitable method for exploratory geographical analysis of infection intensity data when irregular shapes are suspected, especially at micro-geographical scales.

  17. Computational models of intergroup competition and warfare.

    Energy Technology Data Exchange (ETDEWEB)

    Letendre, Kenneth (University of New Mexico); Abbott, Robert G.

    2011-11-01

    This document reports on the research of Kenneth Letendre, the recipient of a Sandia Graduate Research Fellowship at the University of New Mexico. Warfare is an extreme form of intergroup competition in which individuals make extreme sacrifices for the benefit of their nation or other group to which they belong. Among animals, limited, non-lethal competition is the norm. It is not fully understood what factors lead to warfare. We studied the global variation in the frequency of civil conflict among countries of the world, and its positive association with variation in the intensity of infectious disease. We demonstrated that the burden of human infectious disease importantly predicts the frequency of civil conflict and tested a causal model for this association based on the parasite-stress theory of sociality. We also investigated the organization of social foraging by colonies of harvester ants in the genus Pogonomyrmex, using both field studies and computer models.

  18. Detecting chaos in irregularly sampled time series.

    Science.gov (United States)

    Kulp, C W

    2013-09-01

    Recently, Wiebe and Virgin [Chaos 22, 013136 (2012)] developed an algorithm which detects chaos by analyzing a time series' power spectrum which is computed using the Discrete Fourier Transform (DFT). Their algorithm, like other time series characterization algorithms, requires that the time series be regularly sampled. Real-world data, however, are often irregularly sampled, thus, making the detection of chaotic behavior difficult or impossible with those methods. In this paper, a characterization algorithm is presented, which effectively detects chaos in irregularly sampled time series. The work presented here is a modification of Wiebe and Virgin's algorithm and uses the Lomb-Scargle Periodogram (LSP) to compute a series' power spectrum instead of the DFT. The DFT is not appropriate for irregularly sampled time series. However, the LSP is capable of computing the frequency content of irregularly sampled data. Furthermore, a new method of analyzing the power spectrum is developed, which can be useful for differentiating between chaotic and non-chaotic behavior. The new characterization algorithm is successfully applied to irregularly sampled data generated by a model as well as data consisting of observations of variable stars.

  19. Africa: Irregular Warfare on the Dark Continent

    Science.gov (United States)

    2009-05-01

    CNN, MSNBC, Newsweek, and on international television in Australia, Denmark, France, Germany, Italy, Brazil , Switzerland, the Netherlands, United...and exploitation. The Niger River Delta is comprised of about 5,600 square miles of mangrove swamps and dense vegetation crisscrossed by small streams

  20. Manhunting: Counter-Network Organization for Irregular Warfare

    Science.gov (United States)

    2009-09-01

    Buenos Aires, Argentina Israeli Mossad pursued Adolf Eichmann . Eichmann was finally identified in Buenos Aires. Apprehended on his way home, he...Malkin and Harry Stein, Eichmann in My Hands (New York: Warner Books, May 1990). Mossad is the Israeli intelligence service. 288. “Dr. Gerald Bull

  1. Fatigue damage estimation using irregularity factor. First report, irregularity factor calculations for narrow and broadband random time histories

    Science.gov (United States)

    Susuki, I.

    1981-11-01

    The results of an analysis of the irregularity factors of stationary and Gaussian random processes which are generated by filtering the output of a pure or a band-limited white noise are presented. An ideal band pass filter, a trapezoidal filter, and a Butterworth type band pass filter were examined. It was found that the values of the irregularity factors were approximately equal among these filters if only the end-slopes were the same rates. As the band width of filters increases, irregularity factors increase monotonically and approach the respective constant values depending on the end-slopes. This implies that the noise characteristics relevant to the fatigue damage such as statistical aspects of the height of the rise and fall or the distribution of the peak values are not changed for a broad band random time history. It was also found that the effect of band limitation of input white noise on irregularity factors is negligibly small.

  2. Modeling Anti-Air Warfare With Discrete Event Simulation and Analyzing Naval Convoy Operations

    Science.gov (United States)

    2016-06-01

    W., & Scheaffer, R. L. (2008). Mathematical statistics with applications . Belmont, CA: Cengage Learning. 118 THIS PAGE INTENTIONALLY LEFT BLANK...WARFARE WITH DISCRETE EVENT SIMULATION AND ANALYZING NAVAL CONVOY OPERATIONS by Ali E. Opcin June 2016 Thesis Advisor: Arnold H. Buss Co...REPORT DATE June 2016 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE MODELING ANTI-AIR WARFARE WITH DISCRETE EVENT

  3. FFT Based VLSI Digital One Bit Electronic Warfare Receiver

    National Research Council Canada - National Science Library

    Chien-In, Henry

    1998-01-01

    ... (1 GHz) digital receiver designed for electronic warfare applications. The receiver can process two simultaneous signals and has the potential for fabrication on a single multi-chip module (MCM...

  4. New Developments in Chinese Strategic Psychological Warfare

    Science.gov (United States)

    2005-01-01

    Taoism , which coupled hardness with softness in warfare, was not the only influence on the theory of psychological operations in ancient China. Other...portraying Islamic martyrs who appear to speak to soldiers from the clouds.38 In contemporary wars, such as the Gulf War, the first targets attacked have

  5. The technical Dimensions of Nuclear Warfare

    International Nuclear Information System (INIS)

    Broda, E.

    1977-01-01

    This text, written by Engelbert Broda in 1977 is about the dimensions of nuclear warfare. Broda describes the devastating effects of the nuclear bombs dropped in 1945 in Hiroshima and Nagasaki and compares these effects with the explosive power of Hydrogen weapons. He also expresses his concerns about another nuclear ware and analyses possible worsening situations like change in the military doctrine. (nowak)

  6. Detection of biological warfare agents using ultra violet-laser induced fluorescence LIDAR.

    Science.gov (United States)

    Joshi, Deepti; Kumar, Deepak; Maini, Anil K; Sharma, Ramesh C

    2013-08-01

    This review has been written to highlight the threat of biological warfare agents, their types and detection. Bacterial biological agent Bacillus anthracis (bacteria causing the disease anthrax) which is most likely to be employed in biological warfare is being discussed in detail. Standoff detection of biological warfare agents in aerosol form using Ultra violet-Laser Induced Fluorescence (UV-LIF) spectroscopy method has been studied. Range-resolved detection and identification of biological aerosols by both nano-second and non-linear femto-second LIDAR is also discussed. Calculated received fluorescence signal for a cloud of typical biological agent Bacillus globigii (Simulants of B. anthracis) at a location of ~5.0 km at different concentrations in presence of solar background radiation has been described. Overview of current research efforts in internationally available working UV-LIF LIDAR systems are also mentioned briefly. Copyright © 2013 Elsevier B.V. All rights reserved.

  7. THE CYBER DIMENSION OF MODERN HYBRID WARFARE AND ITS RELEVANCE FOR NATO

    Directory of Open Access Journals (Sweden)

    Sorin DUCARU

    2016-06-01

    Full Text Available The technological development and the instant communication possibilities advanced not only economic and social developments, but also evolving threats from those who exploit the vulnerabilities of communication and information systems. The cyber threat landscape points to a significant increase of the frequency, intensity, duration and sophistication of cyber-attacks. One of the new and concerning trends is the use of cyber capabilities in relation with military of hybrid operations – the so-called cyber dimension of hybrid warfare. NATO’s strategy on countering hybrid warfare is based on the triad: prepare-deter-defend, which also applies to cyber. Nations represent the first line of defence in countering hybrid strategies. International cooperation is also a key factor in this sense. It is in this context that NATO’s response to cyber-attacks in the context of hybrid warfare must be further refined.

  8. On irregularity strength of disjoint union of friendship graphs

    Directory of Open Access Journals (Sweden)

    Ali Ahmad

    2013-11-01

    Full Text Available We investigate the vertex total and edge total modication of the well-known irregularity strength of graphs. We have determined the exact values of the total vertex irregularity strength and the total edge irregularity strength of a disjoint union of friendship graphs.

  9. Precision Warfare Enables Interdependent Fires and Maneuver in 2010

    National Research Council Canada - National Science Library

    Smith, John

    1997-01-01

    The U.S. Army is in the midst of a revolution in military affairs (RMA). Significant advancements in informational technologies and precision weapons are providing unprecedented potential for future warfare...

  10. Military Engineers and Chemical Warfare Troops (Inzhenernye Voiska Khimicheskie Voiska),

    Science.gov (United States)

    MILITARY FORCES(FOREIGN), *MILITARY ORGANIZATIONS, MILITARY ENGINEERING , INFANTRY, AMPHIBIOUS OPERATIONS, MINELAYING, ARMORED VEHICLES, NUCLEAR...RADIATION, DOSIMETERS, CHEMICAL WARFARE, PROTECTIVE CLOTHING, DECONTAMINATION, HEALTH PHYSICS.

  11. Why Irregulars Win: Asymmetry of Motivations and the Outcomes of Irregular Warfare

    Science.gov (United States)

    2016-12-01

    Political Science, 64. 69 Xiaoyan Xu et al., “ Motivation and Social Contexts: A Cross national Pilot Study of Achievement, Power, and Affiliation Motives ...by religion, nationalism, and social and economic inequalities. The Palestinians have stayed fully committed and motivated since they were displaced...militarily despite an asymmetry of motivations . The Russians accomplished this in part, by restricting and censoring the media to isolate the Russian

  12. Characteristics of ionospheric irregularities causing scintillations at VHF/UHF

    International Nuclear Information System (INIS)

    Vats, H.O.; Deshpande, M.R.; Rastogi, R.G.

    1978-01-01

    Some properties of ionization irregularities using amplitude scintillation records of radio beacons from ATS-6 (phase II) at Ootacamund, India have been investigated. For the estimation of scale-size and strength of the irregularities a simple diffraction model has been used which explains only weak and moderate equatorial scintillation observations. It was found that the scale sizes of day time E-region irregularities are smaller than those in the F-region during night time in addition, irregularities are generated initially at large scale sizes which later break up into smaller scale sizes

  13. An evolutionary theory of large-scale human warfare: Group-structured cultural selection.

    Science.gov (United States)

    Zefferman, Matthew R; Mathew, Sarah

    2015-01-01

    When humans wage war, it is not unusual for battlefields to be strewn with dead warriors. These warriors typically were men in their reproductive prime who, had they not died in battle, might have gone on to father more children. Typically, they are also genetically unrelated to one another. We know of no other animal species in which reproductively capable, genetically unrelated individuals risk their lives in this manner. Because the immense private costs borne by individual warriors create benefits that are shared widely by others in their group, warfare is a stark evolutionary puzzle that is difficult to explain. Although several scholars have posited models of the evolution of human warfare, these models do not adequately explain how humans solve the problem of collective action in warfare at the evolutionarily novel scale of hundreds of genetically unrelated individuals. We propose that group-structured cultural selection explains this phenomenon. © 2015 Wiley Periodicals, Inc.

  14. Researchers study decontamination of chemical, biological warfare agents

    OpenAIRE

    Trulove, Susan

    2007-01-01

    The U.S. Army Research Office has awarded Virginia Tech a $680,000 grant over two years to build an instrument that can be used to study the chemistry of gases that will decompose both chemical and biological warfare agents on surfaces.

  15. Changing the Scale and Efficiency of Chemical Warfare Countermeasure Discovery Using the Zebrafish

    Science.gov (United States)

    Peterson, Randall T.; MacRae, Calum A.

    2013-01-01

    As the scope of potential chemical warfare agents grows rapidly and as the diversity of potential threat scenarios expands with non-state actors, so a need for innovative approaches to countermeasure development has emerged. In the last few years, the utility of the zebrafish as a model organism that is amenable to high-throughput screening has become apparent and this system has been applied to the unbiased discovery of chemical warfare countermeasures. This review summarizes the in vivo screening approach that has been pioneered in the countermeasure discovery arena, and highlights the successes to date as well as the potential challenges in moving the field forward. Importantly, the establishment of a zebrafish platform for countermeasure discovery would offer a rapid response system for the development of antidotes to the continuous stream of new potential chemical warfare agents. PMID:24273586

  16. 14 CFR 135.65 - Reporting mechanical irregularities.

    Science.gov (United States)

    2010-01-01

    ... irregularities and their correction. (b) The pilot in command shall enter or have entered in the aircraft maintenance log each mechanical irregularity that comes to the pilot's attention during flight time. Before each flight, the pilot in command shall, if the pilot does not already know, determine the status of...

  17. Radioecological aspects of nuclear warfare

    International Nuclear Information System (INIS)

    Edvardson, Kay

    1977-01-01

    Radioactive fallout, one of the major effects of nuclear warfare, will cause acute radiation sickness within the close-in or intermediate areas downwind from surface bursts. Global fallout from high yield explosions will be fairly evenly distributed in the hemisphere where the explosions occur, and will cause irradiation from ground deposit, inhaled material and contaminated food. Estimates of collective doses and the approximate number of late casualties from the global contamination are presented for a given total explosion yield. (author)

  18. Fourth Generation Warfare: The Need for a Comprehensive Approach

    National Research Council Canada - National Science Library

    Benton, LeRoy D

    2008-01-01

    .... A definition of Fourth Generation Warfare is developed, based on Col. Thomas X. Hammes' writings. The definition is further developed to show relevance and applicability to current operations in the Long War on Terrorism...

  19. Rain-Induced Wash-Off of Chemical Warfare Agent (VX) from Foliar Surfaces of Living Plants Maintained in a Surety Hood

    Science.gov (United States)

    2016-09-01

    RAIN-INDUCED WASH-OFF OF CHEMICAL WARFARE AGENT (VX) FROM FOLIAR SURFACES OF LIVING PLANTS MAINTAINED IN A...Final 3. DATES COVERED (From - To) May 2014 – Sep 2015 4. TITLE AND SUBTITLE Rain-Induced Wash-Off of Chemical Warfare Agent (VX) from Foliar...galli Foliage Chemical warfare agent (CWA) O-ethyl-S-(2

  20. Electromagnetic waves in irregular multilayered spheroidal structures of finite conductivity: full wave solutions

    International Nuclear Information System (INIS)

    Bahar, E.

    1976-01-01

    The propagation of electromagnetic waves excited by electric dipoles oriented along the axis of multilayered spheroidal structures of finite conductivity is investigated. The electromagnetic parameters and the thickness of the layers of the structure are assumed to be functions of the latitude. In the analysis, electric and magnetic field transforms that constitute a discrete and a continuous spectrum of spherical waves are used to provide a suitable basis for the expansion of the electromagnetic fields at any point in the irregular spheroidal structure. For spheroidal structures with good conducting cores, the terms in the solutions associated with the continuous part of the wave spectrum vanish. In general, however, when the skin depth for the core is large compared to its dimensions or when the sources are located in the core of the structure and propagation in the core is of special interest, the contribution from the continuous part of the wave spectrum cannot be neglected. At each interface between the layers of the irregular spheroidal structure, exact boundary conditions are imposed. Since the terms of the field expansions in the irregular structure do not individually satisfy the boundary conditions, Maxwell's equations are reduced to sets of coupled ordinary first-order differential equations for the wave amplitudes. The solutions are shown to satisfy the reciprocity relationships in electromagnetic theory. The analysis may be applied to problems of radio wave propagation in a nonuniform model of the earth-ionosphere waveguide, particularly when focusing effects at the antipodes are important

  1. United States Coast Guard Antisubmarine Warfare (ASW) in the Maritime Defense Zone (MDZ) - A Strategic Approach

    Science.gov (United States)

    1989-03-01

    RIC ILE COPY AIR WAR COLLGE REEAC R~pCR UNITED STATES COAST GUARD ANTISUBMARINE WARFARE (ASW) IN THE MARITIME DEFENSE ZONE (MDZ) -A STRATEGIC...going to perform in these MDZs. Those tasks identified so far include: port and coastal physical security & preventive safety, mine warfare

  2. Direct solution of the biharmonic equation on rectangular regions and the Poisson equation on irregular regions

    International Nuclear Information System (INIS)

    Buzbee, B.L.; Dorr, F.W.

    1974-01-01

    The discrete biharmonic equation on a rectangular region and the discrete Poisson equation on an irregular region can be treated as modifications to matrix problems with very special structure. It is shown how to use the direct method of matrix decomposition to formulate an effective numerical algorithm for these problems. For typical applications the operation count is O(N 3 ) for an N x N grid. Numerical comparisons with other techniques are included. (U.S.)

  3. Orbital and Collisional Evolution of the Irregular Satellites

    Science.gov (United States)

    Nesvorný, David; Alvarellos, Jose L. A.; Dones, Luke; Levison, Harold F.

    2003-07-01

    The irregular moons of the Jovian planets are a puzzling part of the solar system inventory. Unlike regular satellites, the irregular moons revolve around planets at large distances in tilted and eccentric orbits. Their origin, which is intimately linked with the origin of the planets themselves, is yet to be explained. Here we report a study of the orbital and collisional evolution of the irregular satellites from times after their formation to the present epoch. The purpose of this study is to find out the features of the observed irregular moons that can be attributed to this evolution and separate them from signatures of the formation process. We numerically integrated ~60,000 test satellite orbits to map orbital locations that are stable on long time intervals. We found that the orbits highly inclined to the ecliptic are unstable due to the effect of the Kozai resonance, which radially stretches them so that satellites either escape from the Hill sphere, collide with massive inner moons, or impact the parent planet. We also found that prograde satellite orbits with large semimajor axes are unstable due to the effect of the evection resonance, which locks the orbit's apocenter to the apparent motion of the Sun around the parent planet. In such a resonance, the effect of solar tides on a resonant moon accumulates at each apocenter passage of the moon, which causes a radially outward drift of its orbital apocenter; once close to the Hill sphere, the moon escapes. By contrast, retrograde moons with large orbital semimajor axes are long-lived. We have developed an analytic model of the distant satellite orbits and used it to explain the results of our numerical experiments. In particular, we analytically studied the effect of the Kozai resonance. We numerically integrated the orbits of the 50 irregular moons (known by 2002 August 16) for 108 yr. All orbits were stable on this time interval and did not show any macroscopic variations that would indicate

  4. Mapping the Spread of Mounted Warfare

    Directory of Open Access Journals (Sweden)

    Peter Turchin

    2016-12-01

    Full Text Available Military technology is one of the most important factors affecting the evolution of complex societies. In particular, mounted warfare, the use of horse-riders in military operations, revolutionized war as it spread to different parts of Eurasia and Africa during the Ancient and Medieval eras, and to the Americas during the Early Modern period. Here we use a variety of sources to map this spread.

  5. UML modelling of network warfare examples

    CSIR Research Space (South Africa)

    Veerasamy, N

    2011-08-01

    Full Text Available ] Affects both civilian and military domains [8] [9] Related to the concepts of infowar, information operations, hacking, hackivism, cyberterrorism and cybotage depending on motivations and techniques [10] Encompasses both technological solutions...]. In addition, Williers as well as Qingbao and Anwar discuss more offensive aspects of information security and Network Warfare like Hacking, Vulnerability Injection, Network Attacks, Denial of Capability, Interception and Blockage [6] [18] [19]. Various...

  6. Navy Operational Planner - Undersea Warfare Module

    Science.gov (United States)

    2016-09-01

    concepts are considered in NOP–USW that are not in previous research: time phasing of missions, mutually exclusive missions, and asset availability...operational planning efforts. NOP–USW suggests the correct allocation of assets across a wide theater of operation to accomplish missions in the...Master’s thesis 4. TITLE AND SUBTITLE NAVY OPERATIONAL PLANNER – UNDERSEA WARFARE MODULE 5. FUNDING NUMBERS 6. AUTHOR(S) Guy A. Molina 7

  7. zero day exploits and national readiness for cyber-warfare

    African Journals Online (AJOL)

    HOD

    A zero day vulnerability is an unknown exploit that divulges security flaws in software before such a flaw is publicly ... Keywords: exploits, zero day, vulnerability, cyberspace, cyber-warfare. 1. ..... industries and companies across the globe. The.

  8. Decomposing Oriented Graphs into Six Locally Irregular Oriented Graphs

    DEFF Research Database (Denmark)

    Bensmail, Julien; Renault, Gabriel

    2016-01-01

    An undirected graph G is locally irregular if every two of its adjacent vertices have distinct degrees. We say that G is decomposable into k locally irregular graphs if there exists a partition E1∪E2∪⋯∪Ek of the edge set E(G) such that each Ei induces a locally irregular graph. It was recently co...

  9. Nonadiabatic two-electron transfer mediated by an irregular bridge

    International Nuclear Information System (INIS)

    Petrov, E.G.; Shevchenko, Ye.V.; May, V.

    2004-01-01

    Nonadiabatic two-electron transfer (TET) mediated by a linear molecular bridge is studied theoretically. Special attention is put on the case of a irregular distribution of bridge site energies as well as on the inter-site Coulomb interaction. Based on the unified description of electron transfer reactions [J. Chem. Phys. 115 (2001) 7107] a closed set of kinetic equations describing the TET process is derived. A reduction of this set to a single exponential donor-acceptor (D-A) TET is performed together with a derivation of an overall D-A TET rate. The latter contains a contribution of the stepwise as well as of the concerted route of D-A TET. The stepwise contribution is determined by two single-electron steps each of them associated with a sequential and a superexchange pathway. A two-electron unistep superexchange transition between the D and A forms the concerted contribution to the overall rate. Both contributions are analyzed in their dependency on the bridge length. The irregular distribution of the bridge site energies as well as the influence of the Coulomb interaction facilitates the D-A TET via a modification of the stepwise and the concerted part of the overall rate. At low temperatures and for short bridges with a single or two units the concerted contribution exceeds the stepwise contribution. If the bridge contains more than two units, the stepwise contribution dominates the overall rate

  10. Studies on residue-free decontaminants for chemical warfare agents.

    Science.gov (United States)

    Wagner, George W

    2015-03-17

    Residue-free decontaminants based on hydrogen peroxide, which decomposes to water and oxygen in the environment, are examined as decontaminants for chemical warfare agents (CWA). For the apparent special case of CWA on concrete, H2O2 alone, without any additives, effectively decontaminates S-2-(diisopropylamino)ethyl O-ethyl methylphosphonothioate (VX), pinacolyl methylphosphorofluoridate (GD), and bis(2-choroethyl) sulfide (HD) in a process thought to involve H2O2 activation by surface-bound carbonates/bicarbonates (known H2O2 activators for CWA decontamination). A plethora of products are formed during the H2O2 decontamination of HD on concrete, and these are characterized by comparison to synthesized authentic compounds. As a potential residue-free decontaminant for surfaces other than concrete (or those lacking adsorbed carbonate/bicarbonate) H2O2 activation for CWA decontamination is feasible using residue-free NH3 and CO2 as demonstrated by reaction studies for VX, GD, and HD in homogeneous solution. Although H2O2/NH3/CO2 ("HPAC") decontaminants are active for CWA decontamination in solution, they require testing on actual surfaces of interest to assess their true efficacy for surface decontamination.

  11. Design Optimization of Irregular Cellular Structure for Additive Manufacturing

    Science.gov (United States)

    Song, Guo-Hua; Jing, Shi-Kai; Zhao, Fang-Lei; Wang, Ye-Dong; Xing, Hao; Zhou, Jing-Tao

    2017-09-01

    Irregularcellular structurehas great potential to be considered in light-weight design field. However, the research on optimizing irregular cellular structures has not yet been reporteddue to the difficulties in their modeling technology. Based on the variable density topology optimization theory, an efficient method for optimizing the topology of irregular cellular structures fabricated through additive manufacturing processes is proposed. The proposed method utilizes tangent circles to automatically generate the main outline of irregular cellular structure. The topological layoutof each cellstructure is optimized using the relative density informationobtained from the proposed modified SIMP method. A mapping relationship between cell structure and relative densityelement is builtto determine the diameter of each cell structure. The results show that the irregular cellular structure can be optimized with the proposed method. The results of simulation and experimental test are similar for irregular cellular structure, which indicate that the maximum deformation value obtained using the modified Solid Isotropic Microstructures with Penalization (SIMP) approach is lower 5.4×10-5 mm than that using the SIMP approach under the same under the same external load. The proposed research provides the instruction to design the other irregular cellular structure.

  12. Guerilla Warfare & Law Enforcement: Combating the 21st Century Terrorist Cell within the U.S.

    Directory of Open Access Journals (Sweden)

    Major Richard Hughbank

    2009-01-01

    Full Text Available Both domestic and international terrorist organizations employ guerrilla warfare tactics, techniques, and procedures. Thus, the ability to identify and defeat the members of these organizations, cripple their infrastructures, and disrupt their financial resources lies in the understanding of modern guerrilla warfare as it develops in the twenty-first century within the United States.3 The forms of asymmetric warfare4 adopted by domestic and international terrorist groups alike is no longer intended to gain simple media exposure or governmental manipulation; they want to make an overpowering impact by causing massive loss of life and severe damage to infrastructure and are often motivated by religious imperatives and political goals. As terrorism analyst Stephen Flynn has observed, "Throughout the 20th century [Americans] were able to treat national security as essentially an out-of-body experience. When confronted by threats, [America] dealt with them on the turf of our allies or our adversaries. Aside from the occasional disaster and heinous crime, civilian life [in the United States] has been virtually terror-free." With the turn of the twenty-first century, terrorist operations have become more prevalent in the United States and are taking shape in the form of modern guerrilla warfare, thus creating new challenges for federal, state, and local law enforcement agencies. After reviewing the origin and nature of these challenges, this article will offer some suggestions for countering guerilla warfare in the United States.

  13. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  14. Second NATO/SIBCA Exercise on Sampling of Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wils, E

    1999-01-01

    In order to practise the sampling of chemical warfare agents under realistic conditions, the Netherlands participated successfully in the second NATO/SIBCA sampling exercise conducted in Poland on 1-3...

  15. Plasma Irregularity Production in the Polar Cap F-Region Ionosphere

    Science.gov (United States)

    Lamarche, Leslie

    Plasma in the Earth's ionosphere is highly irregular on scales ranging between a few centimeters and hundreds of kilometers. Small-scale irregularities or plasma waves can scatter radio waves resulting in a loss of signal for navigation and communication networks. The polar region is particularly susceptible to strong disturbances due to its direct connection with the Sun's magnetic field and energetic particles. In this thesis, factors that contribute to the production of decameter-scale plasma irregularities in the polar F region ionosphere are investigated. Both global and local control of irregularity production are studied, i.e. we consider global solar control through solar illumination and solar wind as well as much more local control by plasma density gradients and convection electric field. In the first experimental study, solar control of irregularity production is investigated using the Super Dual Auroral Radar Network (SuperDARN) radar at McMurdo, Antarctica. The occurrence trends for irregularities are analyzed statistically and a model is developed that describes the location of radar echoes within the radar's field-of-view. The trends are explained through variations in background plasma density with solar illumination affecting radar beam propagation. However, it is found that the irregularity occurrence during the night is higher than expected from ray tracing simulations based on a standard ionospheric density model. The high occurrence at night implies an additional source of plasma density and it is proposed that large-scale density enhancements called polar patches may be the source of this density. Additionally, occurrence maximizes around the terminator due to different competing irregularity production processes that favor a more or less sunlit ionosphere. The second study is concerned with modeling irregularity characteristics near a large-scale density gradient reversal, such as those expected near polar patches, with a particular focus on

  16. How Power-Laws Re-Write The Rules Of Cyber Warfare

    Directory of Open Access Journals (Sweden)

    David L. Bibighaus

    2015-12-01

    Full Text Available All warfare contains and element of randomness. This article will argue that, the kind uncertainty encountered in cyber warfare (Power-Law randomness is fundamentally different from the uncertainty the military has evolved to deal with in the physical world (Gaussian-Randomness. The article will explain the difference between these two kinds of randomness, and how cyber weapons appear to operate under Power-Law randomness. It then will show how in cyberspace, key aspects of strategic thought are based on a flaws assumption of randomness. Finally, this article shall argue that if the American military is going to be effective in cyberspace, it must re-examine the way the military assumes risk, recruits is forces, plans for war and maintains the peace.

  17. Irregular activity arises as a natural consequence of synaptic inhibition

    International Nuclear Information System (INIS)

    Terman, D.; Rubin, J. E.; Diekman, C. O.

    2013-01-01

    Irregular neuronal activity is observed in a variety of brain regions and states. This work illustrates a novel mechanism by which irregular activity naturally emerges in two-cell neuronal networks featuring coupling by synaptic inhibition. We introduce a one-dimensional map that captures the irregular activity occurring in our simulations of conductance-based differential equations and mathematically analyze the instability of fixed points corresponding to synchronous and antiphase spiking for this map. We find that the irregular solutions that arise exhibit expansion, contraction, and folding in phase space, as expected in chaotic dynamics. Our analysis shows that these features are produced from the interplay of synaptic inhibition with sodium, potassium, and leak currents in a conductance-based framework and provides precise conditions on parameters that ensure that irregular activity will occur. In particular, the temporal details of spiking dynamics must be present for a model to exhibit this irregularity mechanism and must be considered analytically to capture these effects

  18. Irregular activity arises as a natural consequence of synaptic inhibition

    Energy Technology Data Exchange (ETDEWEB)

    Terman, D., E-mail: terman@math.ohio-state.edu [Department of Mathematics, The Ohio State University, Columbus, Ohio 43210 (United States); Rubin, J. E., E-mail: jonrubin@pitt.edu [Department of Mathematics, University of Pittsburgh, Pittsburgh, Pennsylvania 15260 (United States); Diekman, C. O., E-mail: diekman@njit.edu [Department of Mathematical Sciences, New Jersey Institute of Technology, Newark, New Jersey 07102 (United States)

    2013-12-15

    Irregular neuronal activity is observed in a variety of brain regions and states. This work illustrates a novel mechanism by which irregular activity naturally emerges in two-cell neuronal networks featuring coupling by synaptic inhibition. We introduce a one-dimensional map that captures the irregular activity occurring in our simulations of conductance-based differential equations and mathematically analyze the instability of fixed points corresponding to synchronous and antiphase spiking for this map. We find that the irregular solutions that arise exhibit expansion, contraction, and folding in phase space, as expected in chaotic dynamics. Our analysis shows that these features are produced from the interplay of synaptic inhibition with sodium, potassium, and leak currents in a conductance-based framework and provides precise conditions on parameters that ensure that irregular activity will occur. In particular, the temporal details of spiking dynamics must be present for a model to exhibit this irregularity mechanism and must be considered analytically to capture these effects.

  19. Parallel Computing Strategies for Irregular Algorithms

    Science.gov (United States)

    Biswas, Rupak; Oliker, Leonid; Shan, Hongzhang; Biegel, Bryan (Technical Monitor)

    2002-01-01

    Parallel computing promises several orders of magnitude increase in our ability to solve realistic computationally-intensive problems, but relies on their efficient mapping and execution on large-scale multiprocessor architectures. Unfortunately, many important applications are irregular and dynamic in nature, making their effective parallel implementation a daunting task. Moreover, with the proliferation of parallel architectures and programming paradigms, the typical scientist is faced with a plethora of questions that must be answered in order to obtain an acceptable parallel implementation of the solution algorithm. In this paper, we consider three representative irregular applications: unstructured remeshing, sparse matrix computations, and N-body problems, and parallelize them using various popular programming paradigms on a wide spectrum of computer platforms ranging from state-of-the-art supercomputers to PC clusters. We present the underlying problems, the solution algorithms, and the parallel implementation strategies. Smart load-balancing, partitioning, and ordering techniques are used to enhance parallel performance. Overall results demonstrate the complexity of efficiently parallelizing irregular algorithms.

  20. Advances in electron dosimetry of irregular fields; Avances en dosimetria de electrones de campos irregulares

    Energy Technology Data Exchange (ETDEWEB)

    Mendez V, J. [Departamento de Radioterapia, Instituto de Enfermedades Neoplasicas, Avenida Angamos Este 2520, Lima 34 (Peru)

    1998-12-31

    In this work it is presented an advance in Electron dosimetry of irregular fields for beams emitted by linear accelerators. At present diverse methods exist which are coming to apply in the Radiotherapy centers. In this work it is proposed a method for irregular fields dosimetry. It will be allow to calculate the dose rate absorbed required for evaluating the time for the treatment of cancer patients. Utilizing the results obtained by the dosimetric system, it has been possible to prove the validity of the method describe for 12 MeV energy and for square field 7.5 x 7.5 cm{sup 2} with percentile error less than 1 % . (Author)

  1. Simulated experiment for elimination of chemical and biological warfare agents by making use of microwave plasma torch

    International Nuclear Information System (INIS)

    Hong, Yong C.; Kim, Jeong H.; Uhm, Han S.

    2004-01-01

    The threat of chemical and biological warfare agents in a domestic terrorist attack and in military conflict is increasing worldwide. Elimination and decontamination of chemical and biological warfare (CBW) agents are immediately required after such an attack. Simulated experiment for elimination of CBW agents by making use of atmospheric-pressure microwave plasma torches is carried out. Elimination of biological warfare agents indicated by the vitrification or burnout of sewage sludge powders and decomposition of toluene gas as a chemical agent stimulant are presented. A detailed characterization for the elimination of the simulant chemicals using Fourier transform infrared and gas chromatography is also presented

  2. Simulated experiment for elimination of chemical and biological warfare agents by making use of microwave plasma torch

    Science.gov (United States)

    Hong, Yong C.; Kim, Jeong H.; Uhm, Han S.

    2004-02-01

    The threat of chemical and biological warfare agents in a domestic terrorist attack and in military conflict is increasing worldwide. Elimination and decontamination of chemical and biological warfare (CBW) agents are immediately required after such an attack. Simulated experiment for elimination of CBW agents by making use of atmospheric-pressure microwave plasma torches is carried out. Elimination of biological warfare agents indicated by the vitrification or burnout of sewage sludge powders and decomposition of toluene gas as a chemical agent stimulant are presented. A detailed characterization for the elimination of the simulant chemicals using Fourier transform infrared and gas chromatography is also presented.

  3. Radioecological aspects of nuclear warfare

    International Nuclear Information System (INIS)

    Edvarson, K.

    1975-01-01

    The radioactive fallout from nuclear explosions is one of the major effects of nuclear warfare. Those levels causing acute radiation sickness are to be expected only within the close-in or intermediate areas downwind from surface bursts. Global fallout from high yield explosions will be fairly evenly distributed in the hemisphere where the explosions occurred and cause irradiation from ground deposit, inhaled material and contaminated food. The collective doses and the order of magnitude of late casualties from this global contamination are estimated for a given total explosion yield. (auth)

  4. The Role of Airpower in Urban Warfare. An Airman's Perspective

    National Research Council Canada - National Science Library

    Saffold, Timothy

    1998-01-01

    .... This emphasis on surface force employment stifles innovative thought as to how military forces can achieve operational and strategic effects by employing airpower as the key instrument of force in urban warfare...

  5. Health-related quality of life of chemical warfare victims: an assessment with the use of a specific tool.

    Science.gov (United States)

    Biat Saeed, Khaled; Parandeh, Akram; Alhani, Fatemeh; Salaree, Mohammad Mehdi

    2014-02-01

    Exposure to chemical warfare gases significantly changes the quality of life (QoL) of victims and has significant chronic adverse effects. This study sought to assess the health-related QoL (HRQoL) of chemical victims by means of a tool specifically designed for this purpose. The correlation of their QoL with several demographic factors was evaluated as well. In this descriptive cross-sectional study, 120 chemical warfare victims were selected from subjects presenting to selected medical centers in Tehran in 2012 using convenience sampling. Two questionnaires of demographic information and HRQoL of chemical warfare victims (specific tool) were used for data collection. The data were analyzed using SPSS version 20 software (IBM, Armonk, NY, USA). The mean and standard deviation (mean ± SD) of scores obtained by chemical warfare victims in physical, psychosocial and spiritual domains was 39.6 ± 16.5, 42.1 ± 15.2 and 82.4 ± 15.4, respectively. Different age groups showed a significant difference in the psychosocial domain score (P chemical warfare victims, it can be used as strategically for these patients to help them cope with their injury and improve their physical and psychosocial health and QoL.

  6. Nanoplatforms for Detection, Remediation and Protection Against Chem-Bio Warfare

    Science.gov (United States)

    Denkbaş, E. B.; Bayram, C.; Kavaz, D.; Çirak, T.; Demirbilek, M.

    Chemical and biological substances have been used as warfare agents by terrorists by varying degree of sophistication. It is critical that these agents be detected in real-time with high level of sensitively, specificity, and accuracy. Many different types of techniques and systems have been developed to detect these agents. But there are some limitations in these conventional techniques and systems. Limitations include the collection, handling and sampling procedures, detection limits, sample transfer, expensive equipment, personnel training, and detection materials. Due to the unique properties such as quantum effect, very high surface/volume ratio, enhanced surface reactivity, conductivity, electrical and magnetic properties of the nanomaterials offer great opportunity to develop very fast, sensitive, accurate and cost effective detection techniques and systems to detect chemical and biological (chem.-bio) warfare agents. Furthermore, surface modification of the materials is very easy and effective way to get functional or smart surfaces to be used as nano-biosensor platform. In that respect many different types of nanomaterials have been developed and used for the detection, remediation and protection, such as gold and silver nanoparticles, quantum dots, Nano chips and arrays, fluorescent polymeric and magnetic nanoparticles, fiber optic and cantilever based nanobiosensors, nanofibrillar nanostructures etc. This study summarizes preparation and characterization of nanotechnology based approaches for the detection of and remediation and protection against chem.-bio warfare agents.

  7. History of chemical and biological warfare agents

    International Nuclear Information System (INIS)

    Szinicz, L.

    2005-01-01

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents

  8. History of chemical and biological warfare agents.

    Science.gov (United States)

    Szinicz, L

    2005-10-30

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents.

  9. Electronic Warfare: Towed Decoys Could Improve Survivability of Current Navy Aircraft

    National Research Council Canada - National Science Library

    Aiken, Michael

    1997-01-01

    Traditionally, DOD'S combat aircraft have used on-board electronic warfare devices called jammers for self-protection against radar-controlled weapons, including missiles and anti-aircraft artillery...

  10. Role of parametric decay instabilities in generating ionospheric irregularities

    International Nuclear Information System (INIS)

    Kuo, S.P.; Cheo, B.R.; Lee, M.C.

    1983-01-01

    We show that purely growing instabilities driven by the saturation spectrum of parametric decay instabilities can produce a broad spectrum of ionospheric irregularities. The threshold field Vertical BarE/sub th/Vertical Bar of the instabilities decreases with the scale lengths lambda of the ionospheric irregularities as Vertical BarE/sub th/Vertical Barproportionallambda -2 in the small-scale range ( -2 with scale lengths larger than a few kilometers. The excitation of kilometer-scale irregularities is strictly restricted by the instabilities themselves and by the spatial inhomogeneity of the medium. These results are drawn from the analyses of four-wave interaction. Ion-neutral collisions impose no net effect on the instabilities when the excited ionospheric irregularities have a field-aligned nature

  11. Study on the identification method of chemical warfare agents with spectroscopy of neutron induced γ rays

    International Nuclear Information System (INIS)

    Liu Boxue; Li Yun; Li Xiangbao

    1996-01-01

    The paper briefly describes some non-destructive verification technologies of chemical warfare agents in-site, and some application of neutron induced gamma ray analysis, such as multi-elements analysis of coal, hidden explosive detection and identification of chemical agents. It also describes some problems in developing the portable isotopic neutron spectroscopy for non-destructive evaluation of chemical warfare agents

  12. Decontamination and Detoxification of Toxic Chemical Warfare Agents Using Polyurethane Sponges

    National Research Council Canada - National Science Library

    Gordon, Richard K; Gunduz, Alper T; Askins, LaTawnya Y; Strating, Simon J; Doctor, Bhupendra P; Clarkson, Edward D; Mitchelree, Larry W; Lukey, Brian; Railer, Roy; Schulz, Susan

    2003-01-01

    .... Another serious problem that may be encountered while caring for personnel contaminated with organophosphorus chemical warfare nerve agents is the possibility that there will be cross-contamination...

  13. Combating Daesh: A Socially Unconventional Strategy

    Science.gov (United States)

    2015-06-01

    to those that pledge political support.49 Auyero et al . outline four scenarios where clientelism may spur collective action.50 The first is...to al -Baghdadi Abu Ahmad al -Alwani Direct tie to al -Baghdadi Adnan Latif Hamid al -Sweidawi Wilaya Anbar Governor Fadel Ahmad Abdullah al -Hiyali...Exploitation, SME, Unconventional Warfare, UW, Irregular Warfare, IW, Abu Badr al -Baghdadi, Army Operating Concept, AOC, Human Domain Mapping

  14. Back to the Basics: An Aviation Solution to Counterinsurgent Warfare

    National Research Council Canada - National Science Library

    Davis, Arthur D

    2005-01-01

    .... By examining past examples of the use of air power in counterinsurgent warfare, this study sheds light on the United States' current failings in both equipment and doctrine as it wages this type of war...

  15. Cyber crime and cyber warfare with international cyber collaboration for RSA – preparing communities

    CSIR Research Space (South Africa)

    Grobler, M

    2012-03-01

    Full Text Available aspects come into play that may have an influence on the manner in which the military reacts to cyber attacks (Wilson 2007): ? new national security policy issues; ? consideration of psychological operations used to affect friendly nations... relationship between modern cyber space, cyber warfare and traditional legislation. As a starting point, cyber warfare is defined for the purpose of this article as the use of exploits in cyber space as a way to intentionally cause harm to people, assets...

  16. Particle Swarm Social Adaptive Model for Multi-Agent Based Insurgency Warfare Simulation

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Xiaohui [ORNL; Potok, Thomas E [ORNL

    2009-12-01

    To better understand insurgent activities and asymmetric warfare, a social adaptive model for modeling multiple insurgent groups attacking multiple military and civilian targets is proposed and investigated. This report presents a pilot study using the particle swarm modeling, a widely used non-linear optimal tool to model the emergence of insurgency campaign. The objective of this research is to apply the particle swarm metaphor as a model of insurgent social adaptation for the dynamically changing environment and to provide insight and understanding of insurgency warfare. Our results show that unified leadership, strategic planning, and effective communication between insurgent groups are not the necessary requirements for insurgents to efficiently attain their objective.

  17. New Opportunities for Remote Sensing Ionospheric Irregularities by Fitting Scintillation Spectra

    Science.gov (United States)

    Carrano, C. S.; Rino, C. L.; Groves, K. M.

    2017-12-01

    In a recent paper, we presented a phase screen theory for the spectrum of intensity scintillations when the refractive index irregularities follow a two-component power law [Carrano and Rino, DOI: 10.1002/2015RS005903]. More recently we have investigated the inverse problem, whereby phase screen parameters are inferred from scintillation time series. This is accomplished by fitting the spectrum of intensity fluctuations with a parametrized theoretical model using Maximum Likelihood (ML) methods. The Markov-Chain Monte-Carlo technique provides a-posteriori errors and confidence intervals. The Akaike Information Criterion (AIC) provides justification for the use of one- or two-component irregularity models. We refer to this fitting as Irregularity Parameter Estimation (IPE) since it provides a statistical description of the irregularities from the scintillations they produce. In this talk, we explore some new opportunities for remote sensing ionospheric irregularities afforded by IPE. Statistical characterization of irregularities and the plasma bubbles in which they are embedded provides insight into the development of the underlying instability. In a companion paper by Rino et al., IPE is used to interpret scintillation due to simulated EPB structure. IPE can be used to reconcile multi-frequency scintillation observations and to construct high fidelity scintillation simulation tools. In space-to-ground propagation scenarios, for which an estimate of the distance to the scattering region is available a-priori, IPE enables retrieval of zonal irregularity drift. In radio occultation scenarios, the distance to the irregularities is generally unknown but IPE enables retrieval of Fresnel frequency. A geometric model for the effective scan velocity maps Fresnel frequency to Fresnel scale, yielding the distance to the irregularities. We demonstrate this approach by geolocating irregularities observed by the CORISS instrument onboard the C/NOFS satellite.

  18. blitzkrieg to desert storm: the evolution of operational warfare

    African Journals Online (AJOL)

    a_nabb

    disease of stalemates infecting militaries before the Second World War. The invasion did not change the world; instead, it brought about an increased awareness of the importance of the operational level of war, a dimension of warfare previously neglected. The German operational effectiveness represented an evolution ...

  19. State reconstruction and irregular wavefunctions for the hydrogen atom

    Science.gov (United States)

    Krähmer, D. S.; Leonhardt, U.

    1997-07-01

    Inspired by a recently proposed procedure by Leonhardt and Raymer for wavepacket reconstruction, we calculate the irregular wavefunctions for the bound states of the Coulomb potential. We select the irregular solutions which have the simplest semiclassical limit.

  20. Contributions of Women to U.S. Combat Operations

    National Research Council Canada - National Science Library

    Burnes, Thresa

    2008-01-01

    .... combat operations from the Revolutionary War to present-day conflicts. The U.S. military continues to fight a transnational, dispersed enemy that employs irregular tactics and asymmetric warfare...

  1. Combat Training Centers: Training for Full-Spectrum Operations?

    National Research Council Canada - National Science Library

    Diano, Oscar F

    2007-01-01

    The changing strategic environment has necessitated a shift in Army training from traditional maneuver warfare to full-spectrum operations to defeat irregular, catastrophic, and disruptive challenges more effectively...

  2. Biodiversity conservation and armed conflict: a warfare ecology perspective.

    Science.gov (United States)

    Hanson, Thor

    2018-04-23

    The activities involved in preparing for, executing, and recovering from armed conflict are globally pervasive and consequential, with significant impacts on natural systems. Effects on biodiversity are predominantly negative, produced by direct and indirect battlefield impacts, as well as the general breakdown of social, economic, and governance systems during wartime. Certain conservation opportunities do occur, however, particularly on lands set aside for training exercises, buffer zones, and peace parks. Here, the relationship between armed conflict and biodiversity is reviewed using the temporal framework of warfare ecology, which defines warfare as an ongoing process of three overlapping stages: preparations, war (armed conflict), and postwar activities. Several themes emerge from recent studies, including a heightened awareness of biodiversity conservation on military lands, the potential for scientific and conservation engagement to mitigate negative biodiversity impacts in war zones, and the importance of the postwar period for incorporating biodiversity priorities into reconstruction and recovery efforts. Research limitations and knowledge gaps are also discussed. © 2018 New York Academy of Sciences.

  3. The United States and biological warfare: secrets from the early cold war and Korea.

    Science.gov (United States)

    Bruwer, A

    2001-01-01

    The United States and Biological Warfare is about accusations that the United States resorted to bacteriological warfare at a time of great military stress during the Korean War. In December 1951, the then US Secretary of Defense ordered early readiness for offensive use of biological weapons. Soon afterwards, the North Korean and Chinese armies accused the United States of starting a large-scale biological warfare experiment in Korea. The US State Department denied the accusation. Both parties to the dispute maintain their positions today. The authors spent 20 years researching the accusations in North America, Europe and Japan. They were the first foreigners to be given access to Chinese classified documents. The reader is also introduced to the concept of 'plausible denial', an official US policy which allowed responsible governmental representatives to deny knowledge of certain events. The authors hope that their work will contribute to the understanding of a time when modern war expanded into a new type of violence.

  4. Maritime Trade Warfare Against a Modern Power

    Science.gov (United States)

    2013-05-20

    Malaysian and Singaporean support. Operational Environment The previous sections have assessed that an oil embargo would be effective at influencing...will be addressed. The first approach is to stop the trade at its source. This approach forms the foundation of many contemporary sanctions. Under...antisubmarine warfare capable ships, could be sufficient to defend against forces attempting to break a blockade, and a carrier battle group in the Indian Ocean

  5. Cyber warfare:terms, issues, laws and controversies

    OpenAIRE

    Seviş, Kamile Nur; Şeker, Ensar

    2016-01-01

    Recent years have shown us the importance of cybersecurity. Especially, when the matter is national security, it is even more essential and crucial. Increasing cyber attacks, especially between countries in governmental level, created a new term cyber warfare. Creating some rules and regulations for this kind of war is necessary therefore international justice systems are working on it continuously. In this paper, we mentioned fundamental terms of cyber...

  6. On a new process for cusp irregularity production

    Directory of Open Access Journals (Sweden)

    H. C. Carlson

    2008-09-01

    Full Text Available Two plasma instability mechanisms were thought until 2007 to dominate the formation of plasma irregularities in the F region high latitude and polar ionosphere; the gradient-drift driven instability, and the velocity-shear driven instability. The former mechanism was accepted as accounting for plasma structuring in polar cap patches, the latter for plasma structuring in polar cap sun aligned arcs. Recent work has established the need to replace this view of the past two decades with a new patch plasma structuring process (not a new mechanism, whereby shear-driven instabilities first rapidly structure the entering plasma, after which gradient drift instabilities build on these large "seed" irregularities. Correct modeling of cusp and early polar cap patch structuring will not be accomplished without allowing for this compound process. This compound process explains several previously unexplained characteristics of cusp and early polar cap patch irregularities. Here we introduce additional data, coincident in time and space, to extend that work to smaller irregularity scale sizes and relate it to the structured cusp current system.

  7. Ionospheric Irregularities at Mars Probed by MARSIS Topside Sounding

    Science.gov (United States)

    Harada, Y.; Gurnett, D. A.; Kopf, A. J.; Halekas, J. S.; Ruhunusiri, S.

    2018-01-01

    The upper ionosphere of Mars contains a variety of perturbations driven by solar wind forcing from above and upward propagating atmospheric waves from below. Here we explore the global distribution and variability of ionospheric irregularities around the exobase at Mars by analyzing topside sounding data from the Mars Advanced Radar for Subsurface and Ionosphere Sounding (MARSIS) instrument on board Mars Express. As irregular structure gives rise to off-vertical echoes with excess propagation time, the diffuseness of ionospheric echo traces can be used as a diagnostic tool for perturbed reflection surfaces. The observed properties of diffuse echoes above unmagnetized regions suggest that ionospheric irregularities with horizontal wavelengths of tens to hundreds of kilometers are particularly enhanced in the winter hemisphere and at high solar zenith angles. Given the known inverse dependence of neutral gravity wave amplitudes on the background atmospheric temperature, the ionospheric irregularities probed by MARSIS are most likely associated with plasma perturbations driven by atmospheric gravity waves. Though extreme events with unusually diffuse echoes are more frequently observed for high solar wind dynamic pressures during some time intervals, the vast majority of the diffuse echo events are unaffected by varying solar wind conditions, implying limited influence of solar wind forcing on the generation of ionospheric irregularities. Combination of remote and in situ measurements of ionospheric irregularities would offer the opportunity for a better understanding of the ionospheric dynamics at Mars.

  8. Bottomside sinusoidal irregularities in the equatorial F region

    Science.gov (United States)

    Valladares, C. E.; Hanson, W. B.; Mcclure, J. P.; Cragin, B. L.

    1983-01-01

    By using the Ogo 6 satellite, McClure and Hanson (1973) have discovered sinusoidal irregularities in the equatorial F region ion number density. In the present investigation, a description is provided of the properties of a distinct category of sinusoidal irregularities found in equatorial data from the AE-C and AE-E satellites. The observed scale sizes vary from about 300 m to 3 km in the direction perpendicular to B, overlapping with and extending the range observed by using Ogo 6. Attention is given to low and high resolution data, a comparison with Huancayo ionograms, the confinement of 'bottomside sinusoidal' (BSS) irregularities essentially to the bottomside of the F layer, spectral characteristics, and BSS, scintillation, and ionosonde observations.

  9. Influence of initial stress, irregularity and heterogeneity on Love-type wave propagation in double pre-stressed irregular layers lying over a pre-stressed half-space

    Science.gov (United States)

    Singh, Abhishek Kumar; Das, Amrita; Parween, Zeenat; Chattopadhyay, Amares

    2015-10-01

    The present paper deals with the propagation of Love-type wave in an initially stressed irregular vertically heterogeneous layer lying over an initially stressed isotropic layer and an initially stressed isotropic half-space. Two different types of irregularities, viz., rectangular and parabolic, are considered at the interface of uppermost initially stressed heterogeneous layer and intermediate initially stressed isotropic layer. Dispersion equations are obtained in closed form for both cases of irregularities, distinctly. The effect of size and shape of irregularity, horizontal compressive initial stress, horizontal tensile initial stress, heterogeneity of the uppermost layer and width ratio of the layers on phase velocity of Love-type wave are the major highlights of the study. Comparative study has been made to identify the effects of different shapes of irregularity, presence of heterogeneity and initial stresses. Numerical computations have been carried out and depicted by means of graphs for the present study.

  10. Helicopters in Irregular Warfare: Algeria, Vietnam, and Afghanistan

    Science.gov (United States)

    2013-06-13

    with guns, missiles, and rockets. It is unlikely that aerial artillery won South Vietnamese hearts and minds, but 179Ibid. 180Interview with Stanley...American Struggle for Vietnam’s Hearts and Minds (Boulder, CO: Westview Press, 1995), 33. 217Bruscino, Occasional Paper #17, 37. 218Bruce Palmer... malformed or otherwise ‘reorganized’ is still one hell of a poor instrument with which to engage insurgents.358 — Anonymous U.S. General The

  11. Fighting Networks: The Defining Challenge of Irregular Warfare

    Science.gov (United States)

    2011-06-01

    fighting networks, different skills allow for increased operational complexity. Lawrence and Lorsch found that organizations in more uncertain...Uncertainty in the Face of Risk,” in Cooperation and Prosocial Behavior, ed. Robert Hindle and Jo Groebel (New York: Cambridge University Press, 1991...simplistic to describe al-Qaeda as a guerrilla organization as they have transcended traditional practices by their skilled utilization of the network form

  12. Biomonitoring of exposure to chemical warfare agents: A review

    NARCIS (Netherlands)

    Noort, D.; Benschop, H.P.; Black, R.M.

    2002-01-01

    In this report an overview of the methods currently available for detection of exposure to a number of chemical warfare agents (CWA), i.e., sulfur mustard, lewisite and nerve agents, is presented. Such methods can be applied for various purposes, e.g., diagnosis and dosimetry of exposure of

  13. Considerações sobre ocupações irregulares e parcelamento urbano em áreas de mananciais da região metropolitana de Curitiba-PR

    Directory of Open Access Journals (Sweden)

    Cristina de Araújo Lima

    2001-01-01

    Full Text Available The article presents reflection about the occupation process data on the expansion of east part of metropolitan region, specially focusing the territory of municipalities of Pinhais, Piraquara and São Josédos Pinhais where are fundamental water sources for regional public consumption. The break down of these water resources is foreseen in three decades ahead and this situation was improved by irregular forms of occupation of areas where the regional planning had fixed strategy of preservation since 1978. At the present times the irregular occupations and invasions are increasing in a very high speed andproportion what constitute harder situation for conservancy practices.

  14. Software support for irregular and loosely synchronous problems

    Science.gov (United States)

    Choudhary, A.; Fox, G.; Hiranandani, S.; Kennedy, K.; Koelbel, C.; Ranka, S.; Saltz, J.

    1992-01-01

    A large class of scientific and engineering applications may be classified as irregular and loosely synchronous from the perspective of parallel processing. We present a partial classification of such problems. This classification has motivated us to enhance FORTRAN D to provide language support for irregular, loosely synchronous problems. We present techniques for parallelization of such problems in the context of FORTRAN D.

  15. Understanding "Understanding" Flow for Network-Centric Warfare: Military Knowledge-Flow Mechanics

    National Research Council Canada - National Science Library

    Nissen, Mark

    2002-01-01

    Network-centric warfare (NCW) emphasizes information superiority for battlespace efficacy, but it is clear that the mechanics of how knowledge flows are just as important as those pertaining to the networks and communication...

  16. Irregular Shaped Building Design Optimization with Building Information Modelling

    Directory of Open Access Journals (Sweden)

    Lee Xia Sheng

    2016-01-01

    Full Text Available This research is to recognise the function of Building Information Modelling (BIM in design optimization for irregular shaped buildings. The study focuses on a conceptual irregular shaped “twisted” building design similar to some existing sculpture-like architectures. Form and function are the two most important aspects of new buildings, which are becoming more sophisticated as parts of equally sophisticated “systems” that we are living in. Nowadays, it is common to have irregular shaped or sculpture-like buildings which are very different when compared to regular buildings. Construction industry stakeholders are facing stiff challenges in many aspects such as buildability, cost effectiveness, delivery time and facility management when dealing with irregular shaped building projects. Building Information Modelling (BIM is being utilized to enable architects, engineers and constructors to gain improved visualization for irregular shaped buildings; this has a purpose of identifying critical issues before initiating physical construction work. In this study, three variations of design options differing in rotating angle: 30 degrees, 60 degrees and 90 degrees are created to conduct quantifiable comparisons. Discussions are focused on three major aspects including structural planning, usable building space, and structural constructability. This research concludes that Building Information Modelling is instrumental in facilitating design optimization for irregular shaped building. In the process of comparing different design variations, instead of just giving “yes or no” type of response, stakeholders can now easily visualize, evaluate and decide to achieve the right balance based on their own criteria. Therefore, construction project stakeholders are empowered with superior evaluation and decision making capability.

  17. Manoeuvre warfare analysis of South Africa's 1914-1915 German ...

    African Journals Online (AJOL)

    The study reported in this article explored the nexus between military theory and history. Military theory attempts to quantify, qualify and illuminate the often unpredictable phenomenon of war. The article consists of two parts: the theory of manoeuvre warfare and the history of the 1914-1915 South African campaign in ...

  18. Potential Science and Technology Game Changers for the Ground Warfare of 2050: Selected Projections Made in 2017

    Science.gov (United States)

    2018-02-01

    ARL-TR-8283 ● FEB 2018 US Army Research Laboratory Potential Science and Technology Game Changers for the Ground Warfare of 2050...Science and Technology Game Changers for the Ground Warfare of 2050: Selected Projections Made in 2017 by Alexander Kott Office of the Director...Brian Sadler Vehicle Technology Directorate, ARL Ananthram Swami Computational and Information Sciences Directorate, ARL Approved for

  19. Management information systems for electronic warfare command and decision support

    CSIR Research Space (South Africa)

    Van Niekerk, B

    2015-04-01

    Full Text Available information to allow them to manage their own spectrum, to identify threats, and to deny adversaries’ use of the spectrum. In this paper, the concepts of integrated electronic warfare and spectrum battle management are introduced, and the relevant information...

  20. Saturn's Irregular Moon Ymir

    Science.gov (United States)

    Denk, Tilmann; Mottola, S.

    2012-10-01

    Ymir (diameter 18 km), Saturn's second largest retrograde outer or irregular moon, has been observed six times by the Cassini narrow-angle camera (NAC) during the first 7 months in 2012. The observations span phase angles from 2° up to 102° and were taken at ranges between 15 and 18 million kilometers. From such a distance, Ymir is smaller than a pixel in the Cassini NAC. The data reveal a sidereal rotation period of 11.93 hrs, which is 1.6x longer than the previously reported value (Denk et al. 2011, EPSC/DPS #1452). Reason for this discrepancy is that the rotational light curve shows a rather uncommon 3-maxima and 3-minima shape at least in the phase angle range 50° to 100°, which was not recognizable in earlier data. The data cover several rotations from different viewing and illumination geometries and allow for a convex shape inversion with possibly a unique solution for the pole direction. The model reproduces the observed light curves to a very good accuracy without requiring albedo variegation, thereby suggesting that the lightcurve is dominated by the shape of Ymir. Among Saturn's irregular moons, the phenomenon of more than two maxima and minima at moderate to high phase angles is not unique to Ymir. At least Siarnaq and Paaliaq also show light curves with a strong deviation from a double-sine curve. Their rotation periods, however, remain unknown until more data can be taken. The light curve of Phoebe is fundamentally different to Ymir's because it is mainly shaped by local albedo differences and not by shape. Other reliable rotation periods of irregular satellites measured by Cassini include: Mundilfari 6.74 h; Kari 7.70 h; Albiorix 13.32 h; Kiviuq 21.82 h. More uncertain values are: Skathi 12 h; Bebhionn 16 h; Thrymr 27 h; Erriapus 28 h.

  1. Uniform irradiation of irregularly shaped cavities for photodynamic therapy

    NARCIS (Netherlands)

    Rem, A. I.; van Gemert, M. J.; van der Meulen, F. W.; Gijsbers, G. H.; Beek, J. F.

    1997-01-01

    It is difficult to achieve a uniform light distribution in irregularly shaped cavities. We have conducted a study on the use of hollow 'integrating' moulds for more uniform light delivery of photodynamic therapy in irregularly shaped cavities such as the oral cavity. Simple geometries such as a

  2. Electronic warfare receivers and receiving systems

    CERN Document Server

    Poisel, Richard A

    2014-01-01

    Receivers systems are considered the core of electronic warfare (EW) intercept systems. Without them, the fundamental purpose of such systems is null and void. This book considers the major elements that make up receiver systems and the receivers that go in them.This resource provides system design engineers with techniques for design and development of EW receivers for modern modulations (spread spectrum) in addition to receivers for older, common modulation formats. Each major module in these receivers is considered in detail. Design information is included as well as performance tradeoffs o

  3. Punishment sustains large-scale cooperation in prestate warfare

    Science.gov (United States)

    Mathew, Sarah; Boyd, Robert

    2011-01-01

    Understanding cooperation and punishment in small-scale societies is crucial for explaining the origins of human cooperation. We studied warfare among the Turkana, a politically uncentralized, egalitarian, nomadic pastoral society in East Africa. Based on a representative sample of 88 recent raids, we show that the Turkana sustain costly cooperation in combat at a remarkably large scale, at least in part, through punishment of free-riders. Raiding parties comprised several hundred warriors and participants are not kin or day-to-day interactants. Warriors incur substantial risk of death and produce collective benefits. Cowardice and desertions occur, and are punished by community-imposed sanctions, including collective corporal punishment and fines. Furthermore, Turkana norms governing warfare benefit the ethnolinguistic group, a population of a half-million people, at the expense of smaller social groupings. These results challenge current views that punishment is unimportant in small-scale societies and that human cooperation evolved in small groups of kin and familiar individuals. Instead, these results suggest that cooperation at the larger scale of ethnolinguistic units enforced by third-party sanctions could have a deep evolutionary history in the human species. PMID:21670285

  4. Surface Warfare Officer Retention: Analysis of Individual Ready Reserve Survey Data

    National Research Council Canada - National Science Library

    Stoker, Carol; Crawford, Alice

    2008-01-01

    ... (including morale and lack of mentoring), push both men and women out of the Navy. Nonetheless, the Navy s primary effort to improve retention has been to introduce the Surface Warfare Officer Continuation Pay (SWOCP...

  5. Analysis of an Irregular RC Multi-storeyed Building Subjected to Dynamic Loading

    Science.gov (United States)

    AkashRaut; Pachpor, Prabodh; Dautkhani, Sanket

    2018-03-01

    Many buildings in the present scenario have irregular configurations both in plan and elevation. This in future may subject to devastating earthquakes. So it is necessary to analyze the structure. The present paper is made to study three type of irregularity wiz vertical, mass and plan irregularity as per clause 7.1 of IS 1893 (part1)2002 code. The paper discusses the analysis of RC (Reinforced Concrete) Buildings with vertical irregularity. The study as a whole makes an effort to evaluate the effect of vertical irregularity on RC buildings for which comparison of three parameters namely shear force, bending moment and deflection are taken into account.

  6. Spatial irregularities in Jupiter's upper ionosphere observed by Voyager radio occultations

    Science.gov (United States)

    Hinson, D. P.; Tyler, G. L.

    1982-01-01

    Radio scintillations (at 3.6 and 13 cm) produced by scattering from ionospheric irregularities during the Voyager occultations are interpreted using a weak-scattering theory. Least squares solutions for ionospheric parameters derived from the observed fluctuation spectra yield estimates of (1) the axial ratio, (2) angular orientation of the anisotropic irregularities, (3) the power law exponent of the spatial spectrum of irregularities, and (4) the magnitude of the spatial variations in electron density. It is shown that the measured angular orientation of the anisotropic irregularities indicates magnetic field direction and may provide a basis for refining Jovian magnetic field models.

  7. Irregular Dwarf Galaxy IC 1613

    Science.gov (United States)

    2005-01-01

    Ultraviolet image (left) and visual image (right) of the irregular dwarf galaxy IC 1613. Low surface brightness galaxies, such as IC 1613, are more easily detected in the ultraviolet because of the low background levels compared to visual wavelengths.

  8. Regularisation of irregular verbs in child English second language ...

    African Journals Online (AJOL)

    Data was collected from the language of English medium preschool children. The study concludes that when the Blocking Principle interferes, children resort to a novel interlanguage rule that regularises irregular verbs. This interlanguage rule applies in a similar way to all irregular verbs, thus children produce utterances ...

  9. Low frequency sound reproduction in irregular rooms using CABS (Control Acoustic Bass System)

    DEFF Research Database (Denmark)

    Celestinos, Adrian; Nielsen, Sofus Birkedal

    2011-01-01

    of an irregular room model using the FDTD (Finite Difference Time Domain) method has been presented. CABS has been simulated in the irregular room model. Measurements of CABS in a real irregular room have been performed. The performance of CABS was affected by the irregular shape of the room due to the corner...

  10. DRES Database of Methods for the Analysis of Chemical Warfare Agents

    National Research Council Canada - National Science Library

    D'Agostino, Paul

    1997-01-01

    .... Update of the database continues as an ongoing effort and the DRES Database of Methods for the Analysis of Chemical Warfare Agents is available panel in hardcopy form or as a softcopy Procite or Wordperfect file...

  11. Nodes and Codes: The Reality of Cyber Warfare

    Science.gov (United States)

    2012-05-17

    respectively. The avionics in Boeing’s 787 Dreamliner require approximately 6.5 million lines of code while the current S-Class Mercedes Benz requires over 20...leaders (demonstrated through outdated policy, theory, and doctrine) and the reality of warfare in 1914 (dictated by innovation, technology , and...or the guidelines to military action codified in doctrine? How are states using the latest technological innovations as violent instruments of

  12. High energy model for irregular absorbing particles

    International Nuclear Information System (INIS)

    Chiappetta, Pierre.

    1979-05-01

    In the framework of a high energy formulation of relativistic quantum scattering a model is presented which describes the scattering functions and polarization of irregular absorbing particles, whose dimensions are greater than the incident wavelength. More precisely in the forward direction an amplitude parametrization of eikonal type is defined which generalizes the usual diffraction theory, and in the backward direction a reflective model is used including a shadow function. The model predictions are in good agreement with the scattering measurements off irregular compact and fluffy particles performed by Zerull, Giese and Weiss (1977)

  13. Identification system for chemical warfare agents with PGNAA method

    International Nuclear Information System (INIS)

    Wang Bairong; Yin Guanghua; Yang Zhongpin

    2007-01-01

    The principle and the experimental commanding of Chemical warfare Agents Identification with PGNAA method are discussed in this paper. The choosing of detector, neutron source and the data processing method are detailed. Finally, a set of experimental instruments composed of Cf-232 and BGO detector is developed based on this theory discussed above. (authors)

  14. General Purpose Force Capability; the Challenge of Versatility and Achieving Balance Along the Widest Possible Spectrum of Conflict

    Science.gov (United States)

    2010-04-01

    STRATEGY 16 Ir 16 Balance 17 The Imbalance between Traditional and Irregul 17 Finding the Proper Balance 18 CHAPTER 3 - DEFINING 20 Introduction 20...wider struggle for control and support of the contested c ir warfare as well as W 41      4. IRREGULAR WARFARE – HISTORICAL CONTEXT AND CURRENT...Congressional Research Service, Washington, D.C., July 20, 2009. R 1984. homas E. The Gamble: General David Petraeus and the American Military

  15. Total edge irregularity strength of (n,t)-kite graph

    Science.gov (United States)

    Winarsih, Tri; Indriati, Diari

    2018-04-01

    Let G(V, E) be a simple, connected, and undirected graph with vertex set V and edge set E. A total k-labeling is a map that carries vertices and edges of a graph G into a set of positive integer labels {1, 2, …, k}. An edge irregular total k-labeling λ :V(G)\\cup E(G)\\to \\{1,2,\\ldots,k\\} of a graph G is a labeling of vertices and edges of G in such a way that for any different edges e and f, weights wt(e) and wt(f) are distinct. The weight wt(e) of an edge e = xy is the sum of the labels of vertices x and y and the label of the edge e. The total edge irregularity strength of G, tes(G), is defined as the minimum k for which a graph G has an edge irregular total k-labeling. An (n, t)-kite graph consist of a cycle of length n with a t-edge path (the tail) attached to one vertex of a cycle. In this paper, we investigate the total edge irregularity strength of the (n, t)-kite graph, with n > 3 and t > 1. We obtain the total edge irregularity strength of the (n, t)-kite graph is tes((n, t)-kite) = \\lceil \\frac{n+t+2}{3}\\rceil .

  16. Nuclear radiation in warfare

    International Nuclear Information System (INIS)

    Rotblat, J.

    1986-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios; biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion. (orig./HP) [de

  17. Nuclear radiation in warfare

    International Nuclear Information System (INIS)

    Rotblat, J.

    1981-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios); biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion. (U.K.)

  18. Operational advantages of using Cyber Electronic Warfare (CEW) in the battlefield

    Science.gov (United States)

    Yasar, Nurgul; Yasar, Fatih M.; Topcu, Yucel

    2012-06-01

    While cyberspace is emerging as a new battlefield, conventional Electronic Warfare (EW) methods and applications are likely to change. Cyber Electronic Warfare (CEW) concept which merges cyberspace capabilities with traditional EW methods, is a new and enhanced form of the electronic attack. In this study, cyberspace domain of the battlefield is emphazised and the feasibility of integrating Cyber Warfare (CW) concept into EW measures is researched. The SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis method is used to state the operational advantages of using CEW concept in the battlefield. The operational advantages of CEW are assessed by means of its effects on adversary air defense systems, communication networks and information systems. Outstanding technological and operational difficulties are pointed out as well. As a result, a comparison of CEW concept and conventional EW applications is presented. It is concluded that, utilization of CEW concept is feasible at the battlefield and it may yield important operational advantages. Even though the computers of developed military systems are less complex than normal computers, they are not subjected to cyber threats since they are closed systems. This concept intends to show that these closed systems are also open to the cyber threats. As a result of the SWOT analysis, CEW concept provides Air Forces to be used in cyber operations effectively. On the other hand, since its Collateral Damage Criteria (CDC) is low, the usage of cyber electronic attack systems seems to grow up.

  19. Classical limit of irregular blocks and Mathieu functions

    International Nuclear Information System (INIS)

    Piątek, Marcin; Pietrykowski, Artur R.

    2016-01-01

    The Nekrasov-Shatashvili limit of the N = 2 SU(2) pure gauge (Ω-deformed) super Yang-Mills theory encodes the information about the spectrum of the Mathieu operator. On the other hand, the Mathieu equation emerges entirely within the frame of two-dimensional conformal field theory (2d CFT) as the classical limit of the null vector decoupling equation for some degenerate irregular block. Therefore, it seems to be possible to investigate the spectrum of the Mathieu operator employing the techniques of 2d CFT. To exploit this strategy, a full correspondence between the Mathieu equation and its realization within 2d CFT has to be established. In our previous paper http://dx.doi.org/10.1007/JHEP12(2014)032, we have found that the expression of the Mathieu eigenvalue given in terms of the classical irregular block exactly coincides with the well known weak coupling expansion of this eigenvalue in the case in which the auxiliary parameter is the noninteger Floquet exponent. In the present work we verify that the formula for the corresponding eigenfunction obtained from the irregular block reproduces the so-called Mathieu exponent from which the noninteger order elliptic cosine and sine functions may be constructed. The derivation of the Mathieu equation within the formalism of 2d CFT is based on conjectures concerning the asymptotic behaviour of irregular blocks in the classical limit. A proof of these hypotheses is sketched. Finally, we speculate on how it could be possible to use the methods of 2d CFT in order to get from the irregular block the eigenvalues of the Mathieu operator in other regions of the coupling constant.

  20. Localization in small fcc-particles with surface irregularities and disorder

    International Nuclear Information System (INIS)

    Bucher, J.P.; Bloomfield, L.A.

    1991-01-01

    A numerical eigenvector analysis is used to investigate Anderson localization in small fcc-particles of N = 309 and N = 147 atoms. Special attention is given to the way size and surface roughness of the particles influence the localization behavior. States begin to localize in a non-exponential regime several lattice spacings from the center of localization and finally converge to a fully exponentially-localized regime for strong disorder. For smooth surface particles, it is found that the states localize first at the band bottom and a mobility edge can clearly be defined for increasing disorder. This doesn't seem to be the case for the rougher particles, where the band middle and the band bottom show similar behavior towards localization. Although particles with surface irregularities show an onset of localization for smaller values of the disorder than smooth particles, the localization length is greater. (orig.)

  1. Efikasnost sistema PVO u uslovima elektronskih dejstava / Efficiency of antiaircraft system in electronic warfare

    Directory of Open Access Journals (Sweden)

    Vladimir V. Šepec

    2007-01-01

    Full Text Available U radu je primenjena teorija masovnog opsluživanja u analizi efikasnosti sistema protivvazduhoplovne odbrane (sistema PVO u uslovima elektronskih dejstava protivnika. Prikazan je model za ocenu efikasnosti sistema PVO i predstavljeni su izrazi za procenu efikasnosti sistema PVO u uslovima elektronskih dejstava. / In this article the theory of mass servicing is used in the analysis of efficiency of antiaircraft system in the conditions of electronic warfare. The model for analysis of the antiaircraft system efficiency has been shown and formulas for qualitative analysis of antiaircraft system efficiency have been presented in the conditions of electronic warfare.

  2. Track Irregularity Time Series Analysis and Trend Forecasting

    Directory of Open Access Journals (Sweden)

    Jia Chaolong

    2012-01-01

    Full Text Available The combination of linear and nonlinear methods is widely used in the prediction of time series data. This paper analyzes track irregularity time series data by using gray incidence degree models and methods of data transformation, trying to find the connotative relationship between the time series data. In this paper, GM (1,1 is based on first-order, single variable linear differential equations; after an adaptive improvement and error correction, it is used to predict the long-term changing trend of track irregularity at a fixed measuring point; the stochastic linear AR, Kalman filtering model, and artificial neural network model are applied to predict the short-term changing trend of track irregularity at unit section. Both long-term and short-term changes prove that the model is effective and can achieve the expected accuracy.

  3. CRUSER's Warfare Innovation Workshop Focused on Hybrid War in the Urban Littorals

    OpenAIRE

    Ehrlich, Michael

    2017-01-01

    News Stories Archive The Naval Postgraduate School (NPS) Consortium for Robotics and Unmanned Systems Education and Research, CRUSER, hosted its annual Warfare Innovation Workshop (WIW) in Glasgow Hall, Sept. 18-21.

  4. From Douhet to drones, air warfare, and the evolution of targeting

    NARCIS (Netherlands)

    Osinga, F.P.B.; Roorda, M.P.; Ducheine, P.A.L.; Schmitt, M.N.; Osinga, F.P.B.

    2016-01-01

    Through the prism of the experience of air warfare, this chapter identifies key factors that have shaped targeting. These include technological developments, organizational structures, and processes and inter-service competition for scarce resources. Moreover, targeting is informed by perspectives

  5. Traffic dispersion through a series of signals with irregular split

    Science.gov (United States)

    Nagatani, Takashi

    2016-01-01

    We study the traffic behavior of a group of vehicles moving through a sequence of signals with irregular splits on a roadway. We present the stochastic model of vehicular traffic controlled by signals. The dynamic behavior of vehicular traffic is clarified by analyzing traffic pattern and travel time numerically. The group of vehicles breaks up more and more by the irregularity of signal's split. The traffic dispersion is induced by the irregular split. We show that the traffic dispersion depends highly on the cycle time and the strength of split's irregularity. Also, we study the traffic behavior through the series of signals at the green-wave strategy. The dependence of the travel time on offset time is derived for various values of cycle time. The region map of the traffic dispersion is shown in (cycle time, offset time)-space.

  6. On-Site Detection as a Countermeasure to Chemical Warfare/Terrorism.

    Science.gov (United States)

    Seto, Y

    2014-01-01

    On-site monitoring and detection are necessary in the crisis and consequence management of wars and terrorism involving chemical warfare agents (CWAs) such as sarin. The analytical performance required for on-site detection is mainly determined by the fatal vapor concentration and volatility of the CWAs involved. The analytical performance for presently available on-site technologies and commercially available on-site equipment for detecting CWAs interpreted and compared in this review include: classical manual methods, photometric methods, ion mobile spectrometry, vibrational spectrometry, gas chromatography, mass spectrometry, sensors, and other methods. Some of the data evaluated were obtained from our experiments using authentic CWAs. We concluded that (a) no technologies perfectly fulfill all of the on-site detection requirements and (b) adequate on-site detection requires (i) a combination of the monitoring-tape method and ion-mobility spectrometry for point detection and (ii) a combination of the monitoring-tape method, atmospheric pressure chemical ionization mass spectrometry with counterflow introduction, and gas chromatography with a trap and special detectors for continuous monitoring. The basic properties of CWAs, the concept of on-site detection, and the sarin gas attacks in Japan as well as the forensic investigations thereof, are also explicated in this article. Copyright © 2014 Central Police University.

  7. GARCH and Irregularly Spaced Data

    NARCIS (Netherlands)

    Meddahi, N.; Renault, E.; Werker, B.J.M.

    2003-01-01

    An exact discretization of continuous time stochastic volatility processes observed at irregularly spaced times is used to give insights on how a coherent GARCH model can be specified for such data. The relation of our approach with those in the existing literature is studied.

  8. Information Warfare, Threats and Information Security

    Directory of Open Access Journals (Sweden)

    Dmitriy Nikolaevich Bespalov

    2014-01-01

    Full Text Available The article presents the opposite, but dependent on each other's reality - Revolutionary War information,information security goals and objectives of their study within the scheme "challenge-response", methodological and analytical support, the role of elites and the information society in promoting information security. One of the features of contemporaneityis the global spread of ICT, combined with poor governance and other difficulties in the construction of innovation infrastructures that are based on them in some countries. This leads to the reproduction of threats, primarily related to the ability to use ICT for purposes that are inconsistent with the objectives of maintaining international peace and security, compliance with the principles of non-use of force, non-interference in the internal affairs of states, etc. In this regard, include such terms as "a threat of information warfare", "information terrorism" and so forth. Information warfare, which stay in the policy declared the struggle for existence, and relationships are defined in terms of "friend-enemy", "ours-foreign". Superiority over the opponent or "capture of its territory" is the aim of political activity. And information security, serving activities similar process of political control, including a set of components, is a technology until their humanitarian. From the context and the decision itself is the ratio of the achieved results of information and political influence to the target - a positive image of Russia. Bringing its policy in line with the demands of a healthy public opinion provides conductivity of theauthorities initiatives in the country and increases the legitimacy of the Russian Federation actions in the world.

  9. Littoral Combat Ship Open Ocean Anti-Submarine Warfare

    Science.gov (United States)

    2014-06-01

    maintain stealth and its defense in order to properly conduct an attack on a surface vessel (Sternhell and Thorndike 2014, 102). This statement...its target, the surface combatants can counter by increasing their speed (Sternhell and Thorndike 2014). While the maximum speed of the current...120316_PS.pdf Sternhell, Charles M, and Alan M Thorndike . 2014. “Antisubmarine Warfare in World War II.” CNA Analysis & Solutions. Accessed April 14, 2014

  10. Recent canadian experience in chemical warfare agent destruction. An overview

    Energy Technology Data Exchange (ETDEWEB)

    McAndless, J.M.

    1995-09-01

    A Canadian chemical warfare agent destruction project (Swiftsure) was recently completed in which stockpiles of aged mustard, lewisite, nerve agents and contaminated scrap metal were incinerated or chemically neutralized in a safe, environmentally-responsible manner. The project scope, destruction technologies, environmental monitoring and public consultation programs are described.

  11. Destruction of chemical warfare surrogates using a portable atmospheric pressure plasma jet

    Science.gov (United States)

    Škoro, Nikola; Puač, Nevena; Živković, Suzana; Krstić-Milošević, Dijana; Cvelbar, Uroš; Malović, Gordana; Petrović, Zoran Lj.

    2018-01-01

    Today's reality is connected with mitigation of threats from the new chemical and biological warfare agents. A novel investigation of cold plasmas in contact with liquids presented in this paper demonstrated that the chemically reactive environment produced by atmospheric pressure plasma jet (APPJ) is potentially capable of rapid destruction of chemical warfare agents in a broad spectrum. The decontamination of three different chemical warfare agent surrogates dissolved in liquid is investigated by using an easily transportable APPJ. The jet is powered by a kHz signal source connected to a low-voltage DC source and with He as working gas. The detailed investigation of electrical properties is performed for various plasmas at different distances from the sample. The measurements of plasma properties in situ are supported by the optical spectrometry measurements, whereas the high performance liquid chromatography measurements before and after the treatment of aqueous solutions of Malathion, Fenitrothion and Dimethyl Methylphosphonate. These solutions are used to evaluate destruction and its efficiency for specific neural agent simulants. The particular removal rates are found to be from 56% up to 96% during 10 min treatment. The data obtained provide basis to evaluate APPJ's efficiency at different operating conditions. The presented results are promising and could be improved with different operating conditions and optimization of the decontamination process.

  12. Axial Vircator for Electronic Warfare Applications

    Directory of Open Access Journals (Sweden)

    L. Drazan

    2009-12-01

    Full Text Available This paper deals with a high power microwave generator with virtual cathode – vircator in axial release for electronic warfare applications. The classification of directed energy weapons microwave (DEWM is introduced together with basic block diagrams of a particular class of DEWM. In the paper, methods for designing vircator pulsed power supply, axial vircator structure, measurement methods and experimental results are presented. The vircator in electromagnetic ammunition is powered by magneto-cumulative generator and in weapons for defense of objects (WDO, it is powered by Marx generator. The possible applications of a vircator in the DEWM area are discussed.

  13. Study of electromagnetic wave scattering by periodic density irregularities in plasma

    International Nuclear Information System (INIS)

    Lyle, R.; Kuo, S.P.; Huang, J.

    1995-01-01

    A quasi-particle approach is used to formulate wave propagation and scattering in a periodically structured plasma. The theory is then applied to study the effect of bottomside sinusoidal (BSS) irregularities on the propagation of beacon satellites signals through the ionosphere. In this approach, the radio wave is treated as a distribution of quasi-particles described by a Wigner distribution function governed by a transport equation. The irregularities providing the collisional effect are modeled as a two dimensional density modulation on a uniform background plasma. The present work generalizes the previous work by including the spectral bandwidth (Δk/k) effect of the spatially periodic irregularities on the transionospheric signal propagation. The collision of quasi-particles with the irregularities modifies the quasi-particle distribution and give rise to the wave scattering phenomenon. The multiple scattering process is generally considered in this deterministic analysis of radio wave scattering off the ionospheric density irregularities. The analysis shows that this two dimensional density grating effectively modulates the intensity of the beacon satellite signals. This spatial modulation of the wave intensity is converted into time modulation due to the drift of the ionospheric irregularities, which then results in the scintillation of the beacon satellite signals

  14. Modeling Methodologies for Representing Urban Cultural Geographies in Stability Operations

    National Research Council Canada - National Science Library

    Ferris, Todd P

    2008-01-01

    ... 2.0.0, in an effort to provide modeling methodologies for a single simulation tool capable of exploring the complex world of urban cultural geographies undergoing Stability Operations in an irregular warfare (IW) environment...

  15. Crime among irregular immigrants and the influence of internal border control

    OpenAIRE

    Leerkes, Arjen; Engbersen, Godfried; Leun, Joanne

    2012-01-01

    textabstractBoth the number of crime suspects without legal status and the number of irregular or undocumented immigrants held in detention facilities increased substantially in theNetherlands between 1997 and 2003. In this period, theDutch state increasingly attempted to exclude irregular immigrants from the formal labour market and public provisions. At the same time the registered crime among irregular migrants rose. The 'marginalisation thesis' asserts that a larger number of migrants hav...

  16. The Rapier or the Club: The Relationship between Attrition and Maneuver Warfare

    National Research Council Canada - National Science Library

    Springman, Jeffrey A

    2006-01-01

    ...? This project compares the relationship between attrition and maneuver warfare. The study considers whether there are times when wars of attrition should be fought, and whether there are conditions that force wars of attrition...

  17. Nanostructured Metal Oxides for Stoichiometric Degradation of Chemical Warfare Agents

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Henych, Jiří; Janos, P.; Skoumal, M.

    2016-01-01

    Roč. 236, č. 2016 (2016), s. 239-258 ISSN 0179-5953 R&D Projects: GA ČR(CZ) GAP106/12/1116 Institutional support: RVO:61388980 Keywords : chemical warfare agent * metal nanoparticle * unique surface- chemistry * mesoporous manganese oxide Subject RIV: CA - Inorganic Chemistry Impact factor: 3.930, year: 2016

  18. Reflections on nuclear warfare

    International Nuclear Information System (INIS)

    Evans, J.P.

    1983-01-01

    The author looks back on his more than 70 years of familiarity with Americans involved in warfare, noting their loyal support for our country's objectives. Drawing on the Einstein equation, his own visits to Hiroshima and Nagasaki, and current literature, he, as a physician, belatedly concurs with those who look on the use of nuclear weapons as irrational and untenable. Their employment under present circumstances would create a ''final epidemic'' to be avoided only by prevention. He suggests that medical perceptions must be considered by our national leaders in assessing the many factors that he hopes will lead to rational answers to this urgent, highly complex, and vital enigma. He cites physicians' efforts to help in finding answers and asks that his colleagues consider the issues with attention to the gravity of the situation and act according to their best judgment

  19. Just War and Postmodern Warfare: A German Case Study

    Science.gov (United States)

    2015-04-01

    warfare construct, Germany is shaping a military concept based on recent conflicts and unfettered by biases of conventional strategies, organizations...remain sovereign while subconsciously evolving toward liberal democratic ideas. In respecting each country’s political sensitivities, Germany’s...before exhausting all diplomatic, economic and information instruments. Whereas the term AU/ACSC/PINSON/AY15 13 “interests” may bias the United

  20. Development of Bicarbonate-Activated Peroxide as a Chemical and Biological Warfare Agent Decontaminant

    National Research Council Canada - National Science Library

    Richardson, David E

    2006-01-01

    ...) and other chemistry for the decontamination of chemical and biological warfare agents. The mechanism of formation of the active oxidant, peroxymonocarbonate, has been investigated in detail. New surfoxidants...

  1. Measurements of electron density irregularities in the ionosphere of Jupiter by Pioneer 10

    International Nuclear Information System (INIS)

    Woo, R.; Yang, F.

    1976-01-01

    In this paper we demonstrate that when the frequency spectrum of the log amplitude fluctuations is used, the radio occultation experiment is a powerful tool for detecting, identifying, and studying ionospheric irregularities. Analysis of the Pioneer 10 radio occultation measurements reveals that the Jovian ionosphere possesses electron density irregularities which are very similar to those found in the earth's ionosphere. This is the first time such irregularities have been found in a planetary ionosphere other than that of earth. The Pioneer 10 results indicate that the spatial wave number spectrum of the electron density irregularities is close to the Kolmogorov spectrum and that the outer scale size is greater than the Fresnel size (6.15 km). This type of spectrum suggests that the irregularities are probably produced by the turbulent dissipation of irregularities larger than the outer scale size

  2. The Abbott and Costello Effect: Who's on What, and What's Where When? A Human-Centered Method to Investigate Network Centric Warfare Systems

    National Research Council Canada - National Science Library

    Reed, Derek W

    2007-01-01

    ...), fundamentally changing how warfare is being conducted. Network centric warfare (NCW) systems are being rushed to the field and are offered as a solution for the fog of war and as a way to reduce manpower costs...

  3. Modeling the transport of chemical warfare agents and simulants in polymeric substrates for reactive decontamination

    Science.gov (United States)

    Pearl, Thomas; Mantooth, Brent; Varady, Mark; Willis, Matthew

    2014-03-01

    Chemical warfare agent simulants are often used for environmental testing in place of highly toxic agents. This work sets the foundation for modeling decontamination of absorbing polymeric materials with the focus on determining relationships between agents and simulants. The correlations of agents to simulants must consider the three way interactions in the chemical-material-decontaminant system where transport and reaction occur in polymer materials. To this end, diffusion modeling of the subsurface transport of simulants and live chemical warfare agents was conducted for various polymer systems (e.g., paint coatings) with and without reaction pathways with applied decontamination. The models utilized 1D and 2D finite difference diffusion and reaction models to simulate absorption and reaction in the polymers, and subsequent flux of the chemicals out of the polymers. Experimental data including vapor flux measurements and dynamic contact angle measurements were used to determine model input parameters. Through modeling, an understanding of the relationship of simulant to live chemical warfare agent was established, focusing on vapor emission of agents and simulants from materials.

  4. Statistical Analysis of Warfare: Identification of Winning Factors with a Focus on Irregular Warfare

    Science.gov (United States)

    2015-09-01

    Defense HERO Historical Evaluation and Research Organization IDPs Internally Displaced Persons IFR Initial Force Ratio INITA Relative Imitative...armies started combating non-state, widely dispersed groups. Although this change appears to be quite simple, it has had a deep impact on military...1789–1961: A Study of the Impact of the French, Industrial, and Russian Revolutions on War and its Conduct (Boston, MA: Da Capo Press, 1992). 10 Ibid

  5. Influence of initial stress, irregularity and heterogeneity on Love-type ...

    Indian Academy of Sciences (India)

    The present paper deals with the propagation of Love-type wave in an initially stressed irregular vertically heterogeneous layer lying over an initially stressed isotropic layer and an initially stressed isotropic half- space. Two different types of irregularities, viz., rectangular and parabolic, are considered at the interface.

  6. Characterizing neural activities evoked by manual acupuncture through spiking irregularity measures

    International Nuclear Information System (INIS)

    Xue Ming; Wang Jiang; Deng Bin; Wei Xi-Le; Yu Hai-Tao; Chen Ying-Yuan

    2013-01-01

    The neural system characterizes information in external stimulations by different spiking patterns. In order to examine how neural spiking patterns are related to acupuncture manipulations, experiments are designed in such a way that different types of manual acupuncture (MA) manipulations are taken at the ‘Zusanli’ point of experimental rats, and the induced electrical signals in the spinal dorsal root ganglion are detected and recorded. The interspike interval (ISI) statistical histogram is fitted by the gamma distribution, which has two parameters: one is the time-dependent firing rate and the other is a shape parameter characterizing the spiking irregularities. The shape parameter is the measure of spiking irregularities and can be used to identify the type of MA manipulations. The coefficient of variation is mostly used to measure the spike time irregularity, but it overestimates the irregularity in the case of pronounced firing rate changes. However, experiments show that each acupuncture manipulation will lead to changes in the firing rate. So we combine four relatively rate-independent measures to study the irregularity of spike trains evoked by different types of MA manipulations. Results suggest that the MA manipulations possess unique spiking statistics and characteristics and can be distinguished according to the spiking irregularity measures. These studies have offered new insights into the coding processes and information transfer of acupuncture. (interdisciplinary physics and related areas of science and technology)

  7. Advances in electron dosimetry of irregular fields

    International Nuclear Information System (INIS)

    Mendez V, J.

    1998-01-01

    In this work it is presented an advance in Electron dosimetry of irregular fields for beams emitted by linear accelerators. At present diverse methods exist which are coming to apply in the Radiotherapy centers. In this work it is proposed a method for irregular fields dosimetry. It will be allow to calculate the dose rate absorbed required for evaluating the time for the treatment of cancer patients. Utilizing the results obtained by the dosimetric system, it has been possible to prove the validity of the method describe for 12 MeV energy and for square field 7.5 x 7.5 cm 2 with percentile error less than 1 % . (Author)

  8. New Model for Ionospheric Irregularities at Mars

    Science.gov (United States)

    Keskinen, M. J.

    2018-03-01

    A new model for ionospheric irregularities at Mars is presented. It is shown that wind-driven currents in the dynamo region of the Martian ionosphere can be unstable to the electromagnetic gradient drift instability. This plasma instability can generate ionospheric density and magnetic field irregularities with scale sizes of approximately 15-20 km down to a few kilometers. We show that the instability-driven magnetic field fluctuation amplitudes relative to background are correlated with the ionospheric density fluctuation amplitudes relative to background. Our results can explain recent observations made by the Mars Atmosphere and Volatile EvolutioN spacecraft in the Martian ionosphere dynamo region.

  9. Edge irregular total labellings for graphs of linear size

    DEFF Research Database (Denmark)

    Brandt, Stephan; Rautenbach, D.; Miškuf, J.

    2009-01-01

    As an edge variant of the well-known irregularity strength of a graph G = (V, E) we investigate edge irregular total labellings, i.e. functions f : V ∪ E → {1, 2, ..., k} such that f (u) + f (u v) + f (v) ≠ f (u) + f (u v) + f (v) for every pair of different edges u v, u v ∈ E. The smallest possi...

  10. Combinatorial Auction Theory Applied to the Selection of Surface Warfare Officer Retention Incentives

    National Research Council Canada - National Science Library

    Denmond, Constance M; Johnson, Derek N; Lewis, Chavius G; Zegley, Christopher R

    2007-01-01

    The purpose of this project is to investigate the potential retention and cost impacts of offering combinations of retention base incentives to members of the Surface Warfare Officer (SWO) community...

  11. Feasibility Study for the Use of Green, Bio-Based, Efficient Reactive Sorbent Material to Neutralize Chemical Warfare Agents

    Science.gov (United States)

    2012-08-02

    REPORT Feasibility study for the use of green, bio-based, efficient reactive sorbent material to neutralize chemical warfare agents 14. ABSTRACT 16...way cellulose, lignin and hemicelluloses interact as well as whole wood dissolution occurs in ILs. The present project was conducted to 1. REPORT...Feasibility study for the use of green, bio-based, efficient reactive sorbent material to neutralize chemical warfare agents Report Title ABSTRACT Over the

  12. Joint Special Operations University SOF-Power Workshop: A Way Forward for Special Operations Theory and Strategic Art

    Science.gov (United States)

    2011-08-01

    participants‘ particular points of view and may be helpful in researching, developing, testing, and explaining theory. The Secret War in Laos was...Jan 1985. Tse -Tung, Mao. On Guerrilla Warfare. Praeger, New York: 1961. The Use and Utility of Force; Force Fungibles Art, Robert J. and...Penguin Books, New York: 1968. Griffith, Samuel B., (BrigGen (Ret) USMC). On Guerrilla Warfare – Mao Tse -Tung. Praeger, New York: 1961

  13. Study of Track Irregularity Time Series Calibration and Variation Pattern at Unit Section

    Directory of Open Access Journals (Sweden)

    Chaolong Jia

    2014-01-01

    Full Text Available Focusing on problems existing in track irregularity time series data quality, this paper first presents abnormal data identification, data offset correction algorithm, local outlier data identification, and noise cancellation algorithms. And then proposes track irregularity time series decomposition and reconstruction through the wavelet decomposition and reconstruction approach. Finally, the patterns and features of track irregularity standard deviation data sequence in unit sections are studied, and the changing trend of track irregularity time series is discovered and described.

  14. A identification system for chemical warfare agents with PGNAA method

    International Nuclear Information System (INIS)

    Wang Bairong; Yin Guanghua; Yang Zhongping

    2006-01-01

    The principle and the experimental commanding of Chemical warfare Agents Identification with PGNAA method are discussed in this paper. The choosing of Detector, neutron source and the data processing method are detailed. Finally, a set of experimental instruments composed of Cf-232 and BGO detector is developed based on the theory discussed above. (authors)

  15. Spectral classification of medium-scale high-latitude F region plasma density irregularities

    International Nuclear Information System (INIS)

    Singh, M.; Rodriguez, P.; Szuszczewicz, E.P.; Sachs Freeman Associates, Bowie, MD)

    1985-01-01

    The high-latitude ionosphere represents a highly structured plasma. Rodriguez and Szuszczewicz (1984) reported a wide range of plasma density irregularities (150 km to 75 m) at high latitudes near 200 km. They have shown that the small-scale irregularities (7.5 km to 75 m) populated the dayside oval more often than the other phenomenological regions. It was suggested that in the lower F region the chemical recombination is fast enough to remove small-scale irregularities before convection can transport them large distances, leaving structured particle precipitation as the dominant source term for irregularities. The present paper provides the results of spectral analyses of pulsed plasma probe data collected in situ aboard the STP/S3-4 satellite during the period March-September 1978. A quantitative description of irregularity spectra in the high-latitude lower F region plasma density is given. 22 references

  16. Information Warfare: Issues Associated with the Defense of DOD Computers and Computer Networks

    National Research Council Canada - National Science Library

    Franklin, Derek

    2002-01-01

    ... that may threaten the critical information pathways of the armed forces An analysis of the history of computer information warfare reveals that there was an embarrassing lack of readiness and defense...

  17. Cultural Competence and the Operational Commander: Moving Beyond Cultural Awareness into Culture-Centric Warfare

    National Research Council Canada - National Science Library

    Karcanes, James A

    2007-01-01

    .... Understanding the different levels of cultural awareness -- cultural consideration, cultural understanding, and cultural competence -- will help usher in a new focus on culture-centric warfare...

  18. Warfare, genocide, and ethnic conflict: a Darwinian approach

    OpenAIRE

    Dimijian, Gregory G.

    2010-01-01

    As the 21st century dawns, I reflect on the history of humankind with growing concern about the need to understand the underlying biological and cultural roots of ethnic conflict and warfare. In the many studies of human conflict, innate biological predispositions have been neglected. This article is the third part of a series of seminars for medical residents at the University of Texas Southwestern Medical School at Dallas (see http://adarwinstudygroup.org/). The series starts with in-depth ...

  19. Recent Advances in Decontamination of Chemical Warfare Agents

    OpenAIRE

    Abdul Wadood Khan; Sabna Kotta; Shahid Husain Ansari; Javed Ali; Rakesh Kumar Sharma

    2013-01-01

    The recent turmoil and volatile situation in many countries and the increased risk of terrorist activities have raised alarm bells for the field of defense against toxic chemical/materials. These situations poses threats to society as terrorists can take advantage of such situations to strike and cause public mayhem. A number of chemicals have the potential of being used as chemical warfare (CW) agents. CW agents could immediately kill or incapacitate the affected individuals even when they a...

  20. Investigating the Relationship Between Drone Warfare and Civilian Casualties in Gaza

    Directory of Open Access Journals (Sweden)

    Dr. Ann Rogers

    2014-12-01

    Full Text Available Unmanned aerial vehicles (UAVs, better known as drones, are increasingly touted as ‘humanitarian’ weapons that contribute positively to fighting just wars and saving innocent lives. At the same time, civilian casualties have become the most visible and criticized aspect of drone warfare. It is argued here that drones contribute to civilian casualties not in spite of, but because of, their unique attributes. They greatly extend war across time and space, pulling more potential threats and targets into play over long periods, and because they are low-risk and highly accurate, they are more likely to be used. The assumption that drones save lives obscures a new turn in strategic thinking that sees states such as Israel and the US rely on large numbers of small, highly discriminating attacks applied over time to achieve their objectives. This examination of Israel’s 2014 war in Gaza argues that civilian casualties are not an unexpected or unintended consequence of drone warfare, but an entirely predictable outcome.

  1. Developmental Testing of Liquid and Gaseous/Vaporous Decontamination on Bacterial Spores and Other Biological Warfare Agents on Military Relevant Surfaces

    Science.gov (United States)

    2016-02-11

    Vaporous Decontamination on Bacterial Spores and Other Biological Warfare Agents on Military-Relevant Surfaces 5a. CONTRACT NUMBER 5b. GRANT... DECONTAMINATION ON BACTERIAL SPORES AND OTHER BIOLOGICAL WARFARE AGENTS ON MILITARY-RELEVANT SURFACES Page Paragraph 1. SCOPE...surfaces before and after decontamination . The protocol in this TOP is based on the developed test methodologies from Edgewood Chemical Biological

  2. Characterizing spontaneous irregular behavior in coupled map lattices

    International Nuclear Information System (INIS)

    Dobyns, York; Atmanspacher, Harald

    2005-01-01

    Two-dimensional coupled map lattices display, in a specific parameter range, a stable phase (quasi-) periodic in both space and time. With small changes to the model parameters, this stable phase develops spontaneous eruptions of non-periodic behavior. Although this behavior itself appears irregular, it can be characterized in a systematic fashion. In particular, parameter-independent features of the spontaneous eruptions may allow useful empirical characterizations of other phenomena that are intrinsically hard to predict and reproduce. Specific features of the distributions of lifetimes and emergence rates of irregular states display such parameter-independent properties

  3. Characterizing spontaneous irregular behavior in coupled map lattices

    Energy Technology Data Exchange (ETDEWEB)

    Dobyns, York [PEAR, Princeton University Princeton, NJ 08544-5263 (United States); Atmanspacher, Harald [Institut fuer Grenzgebiete der Psychologie und Psychohygiene Wilhelmstrasse 3a, Freiburg 79098 (Germany)]. E-mail: haa@igpp.de

    2005-04-01

    Two-dimensional coupled map lattices display, in a specific parameter range, a stable phase (quasi-) periodic in both space and time. With small changes to the model parameters, this stable phase develops spontaneous eruptions of non-periodic behavior. Although this behavior itself appears irregular, it can be characterized in a systematic fashion. In particular, parameter-independent features of the spontaneous eruptions may allow useful empirical characterizations of other phenomena that are intrinsically hard to predict and reproduce. Specific features of the distributions of lifetimes and emergence rates of irregular states display such parameter-independent properties.

  4. A new General Purpose Decontamination System for Chemical and Biological Warfare and Terrorism Agents

    National Research Council Canada - National Science Library

    Khetan, Sushil; Banerjee, xdDeboshri; Chanda, Arani; Collins, Terry

    2003-01-01

    Partial contents: Fe-TAML Activator of Peroxide,Activators of Hydrogen peroxide,Biological Warfare Agents,Bacterial Endospore,Bacterial Spore Deactivation,Modeling Studies,Deactivation Studies with Bacillus spores...

  5. Dose calculations for irregular fields using three-dimensional first-scatter integration

    International Nuclear Information System (INIS)

    Boesecke, R.; Scharfenberg, H.; Schlegel, W.; Hartmann, G.H.

    1986-01-01

    This paper describes a method of dose calculations for irregular fields which requires only the mean energy of the incident photons, the geometrical properties of the irregular field and of the therapy unit, and the attenuation coefficient of tissue. The method goes back to an approach including spatial aspects of photon scattering for inhomogeneities for the calculation of dose reduction factors as proposed by Sontag and Cunningham (1978). It is based on the separation of dose into a primary component and a scattered component. The scattered component can generally be calculated for each field by integration over dose contributions from scattering in neighbouring volume elements. The quotient of this scattering contribution in the irregular field and the scattering contribution in the equivalent open field is then the correction factor for scattering in an irregular field. A correction factor for the primary component can be calculated if the attenuation of the photons in the shielding block is properly taken into account. The correction factor is simply given by the quotient of primary photons of the irregular field and the primary photons of the open field. (author)

  6. MOFwich: Sandwiched Metal-Organic Framework-Containing Mixed Matrix Composites for Chemical Warfare Agent Removal.

    Science.gov (United States)

    Peterson, Gregory W; Lu, Annie X; Hall, Morgan G; Browe, Matthew A; Tovar, Trenton; Epps, Thomas H

    2018-02-28

    This work describes a new strategy for fabricating mixed matrix composites containing layered metal-organic framework (MOF)/polymer films as functional barriers for chemical warfare agent protection. Through the use of mechanically robust polymers as the top and bottom encasing layers, a high-MOF-loading, high-performance-core layer can be sandwiched within. We term this multifunctional composite "MOFwich". We found that the use of elastomeric encasing layers enabled core layer reformation after breakage, an important feature for composites and membranes alike. The incorporation of MOFs into the core layer led to enhanced removal of chemical warfare agents while simultaneously promoting moisture vapor transport through the composite, showcasing the promise of these composites for protection applications.

  7. Using forbidden ordinal patterns to detect determinism in irregularly sampled time series.

    Science.gov (United States)

    Kulp, C W; Chobot, J M; Niskala, B J; Needhammer, C J

    2016-02-01

    It is known that when symbolizing a time series into ordinal patterns using the Bandt-Pompe (BP) methodology, there will be ordinal patterns called forbidden patterns that do not occur in a deterministic series. The existence of forbidden patterns can be used to identify deterministic dynamics. In this paper, the ability to use forbidden patterns to detect determinism in irregularly sampled time series is tested on data generated from a continuous model system. The study is done in three parts. First, the effects of sampling time on the number of forbidden patterns are studied on regularly sampled time series. The next two parts focus on two types of irregular-sampling, missing data and timing jitter. It is shown that forbidden patterns can be used to detect determinism in irregularly sampled time series for low degrees of sampling irregularity (as defined in the paper). In addition, comments are made about the appropriateness of using the BP methodology to symbolize irregularly sampled time series.

  8. Scintillations associated with bottomside sinusoidal irregularities in the equatorial F region

    Science.gov (United States)

    Basu, S.; Basu, S.; Valladares, C. E.; Dasgupta, A.; Whitney, H. E.

    1986-01-01

    Multisatellite scintillation observations and spaced receiver drift measurements are presented for a category of equatorial F region plasma irregularities characterized by nearly sinusoidal waveforms in the ion number density. The observations were made at Huancayo, Peru, and the measurements at Ancon, Peru, associated with irregularities observed by the Atmospheric-Explorer-E satellite on a few nights in December 1979. Utilizing ray paths to various geostationary satellites, it was found that the irregularities grow and decay almost simultaneously in long-lived patches extending at least 1000 km in the east-west direction.

  9. Propagation and scattering of electromagnetic waves by the ionospheric irregularities

    International Nuclear Information System (INIS)

    Ho, A.Y.; Kuo, S.P.; Lee, M.C.

    1993-01-01

    The problem of wave propagation and scattering in the ionosphere is particularly important in the areas of communications, remote-sensing and detection. The ionosphere is often perturbed with coherently structured (quasiperiodic) density irregularities. Experimental observations suggest that these irregularities could give rise to significant ionospheric effect on wave propagation such as causing spread-F of the probing HF sounding signals and scintillation of beacon satellite signals. It was show by the latter that scintillation index S 4 ∼ 0.5 and may be as high as 0.8. In this work a quasi-particle theory is developed to study the scintillation phenomenon. A Wigner distribution function for the wave intensity in the (k,r) space is introduced and its governing equation is derived with an effective collision term giving rise to the attenuation and scattering of the wave. This kinetic equation leads to a hierarchy of moment equations in r space. This systems of equations is then truncated to the second moment which is equivalent to assuming a cold quasi-particle distribution In this analysis, the irregularities are modeled as a two dimensional density modulation on an uniform background plasma. The analysis shows that this two dimensional density grating, effectively modulates the intensity of the beacon satellite signals. This spatial modulation of the wave intensity is converted into time modulation due to the drift of the ionospheric irregularities, which then contributes to the scintillation of the beacon satellite signals. Using the proper plasma parameters and equatorial measured data of irregularities, it is shown that the scintillation index defined by S4=( 2 >- 2 )/ 2 where stands for spatial average over an irregularity wavelength is in the range of the experimentally detected values

  10. The structure of plasma-density irregularities in the interplanetary medium

    International Nuclear Information System (INIS)

    Singleton, D.G.

    1975-01-01

    The conflict in the literature as to whether the plasma-density spatial spectrum of the irregularities in the interplanetary medium is of Gaussian or power law form is discussed. Particular attention is paid to the interplanetary scintillation effects ascribed to these irregularities. It is shown that the phase-screen theory of scintillations can be invoked to devise a set of critical tests which provide a means of discriminating between the conflicting hypotheses. Differences in the predicted behaviour of the single sensor temporal spectra of the scintillations for the two irregularity forms provide the main tests of the conflicting hypotheses. However, it is also shown that the two hypotheses lead to different forms of the variation of scintillation index with the observing frequency and the solar elongation of the scintillating source. Consideration is given to the optimum conditions for observing the Fourier and Bessel temporal spectra modulation which is due to the Fresnel filtering of the spatial spectrum. Determination of irregularity shape, orientation and motion in terms of this modulation is also discussed. (author)

  11. On the Automatic Parallelization of Sparse and Irregular Fortran Programs

    Directory of Open Access Journals (Sweden)

    Yuan Lin

    1999-01-01

    Full Text Available Automatic parallelization is usually believed to be less effective at exploiting implicit parallelism in sparse/irregular programs than in their dense/regular counterparts. However, not much is really known because there have been few research reports on this topic. In this work, we have studied the possibility of using an automatic parallelizing compiler to detect the parallelism in sparse/irregular programs. The study with a collection of sparse/irregular programs led us to some common loop patterns. Based on these patterns new techniques were derived that produced good speedups when manually applied to our benchmark codes. More importantly, these parallelization methods can be implemented in a parallelizing compiler and can be applied automatically.

  12. NEOWISE: OBSERVATIONS OF THE IRREGULAR SATELLITES OF JUPITER AND SATURN

    Energy Technology Data Exchange (ETDEWEB)

    Grav, T. [Planetary Science Institute, Tucson, AZ 85719 (United States); Bauer, J. M.; Mainzer, A. K.; Masiero, J. R.; Sonnett, S.; Kramer, E. [Jet Propulsion Laboratory, California Institute of Technology, Pasadena, CA 91109 (United States); Nugent, C. R.; Cutri, R. M., E-mail: tgrav@psi.edu [Infrared Processing and Analysis Center, California Institute of Technology, Pasadena, CA 91125 (United States)

    2015-08-10

    We present thermal model fits for 11 Jovian and 3 Saturnian irregular satellites based on measurements from the WISE/NEOWISE data set. Our fits confirm spacecraft-measured diameters for the objects with in situ observations (Himalia and Phoebe) and provide diameters and albedo for 12 previously unmeasured objects, 10 Jovian and 2 Saturnian irregular satellites. The best-fit thermal model beaming parameters are comparable to what is observed for other small bodies in the outer solar system, while the visible, W1, and W2 albedos trace the taxonomic classifications previously established in the literature. Reflectance properties for the irregular satellites measured are similar to the Jovian Trojan and Hilda Populations, implying common origins.

  13. Defense Base Closure and Realignment Budget Data for the Naval Surface Warfare Center

    National Research Council Canada - National Science Library

    1993-01-01

    ... and realignment military construction projects. This report provides the results of the audit related to the realignment of Naval Surface Warfare Centers elements in White Oak, Maryland, and Panama City, Florida, to Dahlgren, Virginia...

  14. The Army Ground Forces Training for Mountain and Winter Warfare - Study No. 23

    National Research Council Canada - National Science Library

    Govan, Thomas

    1946-01-01

    This general study of the experiments in mountain and winter warfare training from 1940 to 1944 is designed as an introduction to the histories of the Mountain Training Center and The 10th Mountain...

  15. Annihilation Prediction for Lanchester-Type Models of Modern Warfare

    OpenAIRE

    Brown, G.G.; Taylor, J.

    1983-01-01

    Operations Research, 31, p.752. This paper introduces important new functions for analytic solution of Launch-ester-type equations of modern warfare for combat between two homogeneous forces modeled by power attrtition-rate coefficients with "no offset". Tabulations of these Lanchester-Clifford-Schlatii (or LCS) functions allow one to study this particular variable-coefficient model almost as easily and thoroughly as Lanchester's classic constant-coefficient one. LCS functions allow one ...

  16. Built to Outlast: Operational Approaches to Hybrid Warfare

    Science.gov (United States)

    2012-05-17

    29Robert T. Ames, Sun Tzu: The Art of War (New York: Ballantine Books, 1993), 78-80; Mao Tse -Tung, On Guerrilla Warfare, trans. Samuel B. Griffith...Chicago: University of Illinois Press, 1961), 25, 42.The works of Sun Tzu and Mao Tse -Tung both illustrate aspects of this concept. In a work...toreador’s cape, not the toreador himself. - Norman B. Hannah, The Key to Failure: Laos and the Vietnam War114 Against the backdrop of the Cold

  17. Crime among irregular immigrants and the influence of internal border control

    NARCIS (Netherlands)

    Leerkes, A.S.; Engbersen, G.; Leun, van der J.P.

    2012-01-01

    Abstract Both the number of crime suspects without legal status and the number of irregular or undocumented immigrants held in detention facilities increased substantially in theNetherlands between 1997 and 2003. In this period, theDutch state increasingly attempted to exclude irregular immigrants

  18. Crime among irregular immigrants and the influence of internal border control

    NARCIS (Netherlands)

    A.S. Leerkes (Arjen); G.B.M. Engbersen (Godfried); J.P. van der Leun (Joanne)

    2012-01-01

    textabstractBoth the number of crime suspects without legal status and the number of irregular or undocumented immigrants held in detention facilities increased substantially in theNetherlands between 1997 and 2003. In this period, theDutch state increasingly attempted to exclude irregular

  19. Geostatistical regularization operators for geophysical inverse problems on irregular meshes

    Science.gov (United States)

    Jordi, C.; Doetsch, J.; Günther, T.; Schmelzbach, C.; Robertsson, J. OA

    2018-05-01

    Irregular meshes allow to include complicated subsurface structures into geophysical modelling and inverse problems. The non-uniqueness of these inverse problems requires appropriate regularization that can incorporate a priori information. However, defining regularization operators for irregular discretizations is not trivial. Different schemes for calculating smoothness operators on irregular meshes have been proposed. In contrast to classical regularization constraints that are only defined using the nearest neighbours of a cell, geostatistical operators include a larger neighbourhood around a particular cell. A correlation model defines the extent of the neighbourhood and allows to incorporate information about geological structures. We propose an approach to calculate geostatistical operators for inverse problems on irregular meshes by eigendecomposition of a covariance matrix that contains the a priori geological information. Using our approach, the calculation of the operator matrix becomes tractable for 3-D inverse problems on irregular meshes. We tested the performance of the geostatistical regularization operators and compared them against the results of anisotropic smoothing in inversions of 2-D surface synthetic electrical resistivity tomography (ERT) data as well as in the inversion of a realistic 3-D cross-well synthetic ERT scenario. The inversions of 2-D ERT and seismic traveltime field data with geostatistical regularization provide results that are in good accordance with the expected geology and thus facilitate their interpretation. In particular, for layered structures the geostatistical regularization provides geologically more plausible results compared to the anisotropic smoothness constraints.

  20. Laboratory analysis of chemical warfare agents, adducts, and metabolites in biomedial samples

    NARCIS (Netherlands)

    Schans, M.J. van der

    2015-01-01

    Chemical warfare agents (CWAs) are the most toxic compounds ever produced. To develop medical countermeasures against the effects of these agents, analytical procedures to analyze these agents in biological matrices are essential for a better understanding of the toxicological process. The need for

  1. Friction in the U.S. Army During Irregular Warfare

    Science.gov (United States)

    2014-05-22

    PowerPlus Books, 2002), 86–97. 29Niccolo Machiavelli and Harvey C Mansfield, The Prince (Chicago, IL: University of Chicago Press, 1985), 21–25...Gilbert, eds., Makers of Modern Strategy: From Machiavelli to the Nuclear Age (Princeton, N.J: Princeton University Press, 1986), 155. 5... Machiavelli , influenced by Greek and Roman writings, provided the basic underpinning for acquisition of land and wealth.29 Of particular importance was the

  2. Characterizing and Exploring the Implications of Maritime Irregular Warfare

    Science.gov (United States)

    2012-01-01

    States and to help the Colombian government promote peace while simultane- ously contributing to South American regional security ( Marcella , 2001...Businessweek, June 15, 2010. Marcella , Gabriel, Plan Colombia: The Strategic and Operational Imperatives, Carlisle, Pa.: Strategic Studies Institute

  3. Improving Capabilities for Irregular Warfare. Volume 2. Capabilities Analysis

    Science.gov (United States)

    2007-08-01

    ranged from the Israelis and other Jews buying up all the land in Iraq, to the Coca - Cola logo (sup- posedly owned by Jews) as saying “No Mecca, No...New recruits training as bomb makers may be detected by their handling of explosives. New recruits could be discouraged by widely advertising severe

  4. Non-Kinetic Capabilities for Irregular Warfare: Four Case Studies

    Science.gov (United States)

    2009-03-01

    on the job, absenteeism , receiving free “perks”) 2. “Conventional” Corruption—Something is done or not done for some reward (bribery, kickbacks...occupational deviance that breaks departmental rules and regulations, such as sleeping on the job, absenteeism , and receiving free “perks.” “Conventional...African Security Review, Vol. 7, No. 1, 1998. Tanzi, Vito, “Corruption Around the World: Causes, Consequences, Scope, and Cures ,” IMF Staff Papers

  5. Zarqawi’s Sfumato: Operational Art in Irregular Warfare

    Science.gov (United States)

    2013-05-23

    in Baghdad and Karbala during the Shia festival of Ashura in March of 2004.80 These attacks were preceded by the bombing of the Jordanian embassy...American contractors Nick Berg and Eugene Armstrong. Zarqawi released edited videos with music and logos detailing multiple suicide bombings against

  6. Irregular Warfare in the American West: The Geronimo Campaign

    Science.gov (United States)

    2010-05-05

    reaching the United States while under the escort of Apache scouts. Crook’s biographer and fellow Indian Wars veteran Captain John G. Bourke described...worst. Bourke observed, howevet,that the Rsychological impact of being tracked by their own . . i tribesmen, who were backed by ~ighly ~obile...hold a temporary higher rank. Brevet ranks disappeared from the U.S. military at the end of the nineteenth century. 5 Captain John G. Bourke , An

  7. Generating Performance Models for Irregular Applications

    Energy Technology Data Exchange (ETDEWEB)

    Friese, Ryan D.; Tallent, Nathan R.; Vishnu, Abhinav; Kerbyson, Darren J.; Hoisie, Adolfy

    2017-05-30

    Many applications have irregular behavior --- non-uniform input data, input-dependent solvers, irregular memory accesses, unbiased branches --- that cannot be captured using today's automated performance modeling techniques. We describe new hierarchical critical path analyses for the \\Palm model generation tool. To create a model's structure, we capture tasks along representative MPI critical paths. We create a histogram of critical tasks with parameterized task arguments and instance counts. To model each task, we identify hot instruction-level sub-paths and model each sub-path based on data flow, instruction scheduling, and data locality. We describe application models that generate accurate predictions for strong scaling when varying CPU speed, cache speed, memory speed, and architecture. We present results for the Sweep3D neutron transport benchmark; Page Rank on multiple graphs; Support Vector Machine with pruning; and PFLOTRAN's reactive flow/transport solver with domain-induced load imbalance.

  8. [Decontamination of chemical and biological warfare agents].

    Science.gov (United States)

    Seto, Yasuo

    2009-01-01

    Chemical and biological warfare agents (CBWA's) are diverse in nature; volatile acute low-molecular-weight toxic compounds, chemical warfare agents (CWA's, gaseous choking and blood agents, volatile nerve gases and blister agents, nonvolatile vomit agents and lacrymators), biological toxins (nonvolatile low-molecular-weight toxins, proteinous toxins) and microbes (bacteria, viruses, rickettsiae). In the consequence management against chemical and biological terrorism, speedy decontamination of victims, facilities and equipment is required for the minimization of the damage. In the present situation, washing victims and contaminated materials with large volumes of water is the basic way, and additionally hypochlorite salt solution is used for decomposition of CWA's. However, it still remains unsolved how to dispose large volumes of waste water, and the decontamination reagents have serious limitation of high toxicity, despoiling nature against the environments, long finishing time and non-durability in effective decontamination. Namely, the existing decontamination system is not effective, nonspecifically affecting the surrounding non-target materials. Therefore, it is the urgent matter to build up the usable decontamination system surpassing the present technologies. The symposiast presents the on-going joint project of research and development of the novel decontamination system against CBWA's, in the purpose of realizing nontoxic, fast, specific, effective and economical terrorism on-site decontamination. The projects consists of (1) establishment of the decontamination evaluation methods and verification of the existing technologies and adaptation of bacterial organophosphorus hydrolase, (2) development of adsorptive elimination technologies using molecular recognition tools, and (4) development of deactivation technologies using photocatalysis.

  9. International humanitarian law applied to cyber-warfare: Precautions, proportionality and the notion of ‘attack’ under the humanitarian law of armed conflict

    NARCIS (Netherlands)

    Gill, T.D.; Tsagourias, N.; Buchan, R.

    2015-01-01

    This chapter examines the application of international humanitarian law to cyber warfare in the sense of rising to the level of an armed conflict. Building upon the work of the Tallinn Manual on the Application of International Law to Cyber Warfare, it places particular emphasis on the application

  10. Effects of magnetic storm phases on F layer irregularities below the auroral oval

    International Nuclear Information System (INIS)

    Aarons, J.; Gurgiolo, C.; Rodger, A.S.

    1988-01-01

    Observations of F-layer irregularity development and intensity were obtained between September and October 1981, primarily over subauroral latitudes in the area of the plasmapause. The results reveal the descent of the auroral irregularity region to include subauroral latitudes in the general area of the plasmapause during the main phases of a series of magnetic storms. Irregularities were found primarily at lower latitudes during the subauroral or plasmapause storm. A model for the subauroral irregularities in recovery phases of magnetic storms is proposed in which energy stored in the ring current is slowly released. 27 references

  11. Dependence on zenith angle of the strength of 3-meter equatorial electrojet irregularities

    International Nuclear Information System (INIS)

    Ierkic, H.M.; Fejer, B.G.; Farley, D.T.

    1980-01-01

    Radar measurements in Peru were used to deduce the zenith angle dependence of the scattering cross section of plasma irregularities generated by instabilities in the equatorial electrojet. The irregularities probed by the 50 MHz Jicamarca radar had a wavelength of 3m. The cross section for the type 2 irregularities was isotopic in the plane perpendicular to the magnetic field, while the cross section for the stronger type 1 irregularities varied with zenith angle at a rate of approximately 0.3 dB/degree; the horizontally traveling waves were more than 100 times stronger than those traveling vertically

  12. Spatial irregularities in Jupiter's upper ionosphere observed by voyager radio occultations

    Energy Technology Data Exchange (ETDEWEB)

    Hinson, D.P.; Tyler, G.L.

    1982-07-01

    Dual frequency radio occultation experiments carried out with Voyagers 1 and 2 provided data on the spatial irregularities in Jupiter's ionosphere at four different locations. Sample spectra of weak fluctuations in amplitude and phase of the 3.6-cm and 13-cm wavelength radio signals can be interpreted by using the theory for scattering from an anisotropic power law phase screen. Least squares solutions for ionospheric parameters derived from the observed fluctuation spectra yielded estimates of (1) the axial ratio, (2) angular orientation of the anisotropic irregularities, (3) the power law exponent of the spatial spectrum of irregularities, and (4) the magnitude of the spatial variations in electron density. Equipment limitations and the method of analysis constrain the observations to irregularities of approximate size 1--200 km. No evidence of the inner or outer scale of the irregularities was found. For length scales in the range given, the three-dimensional spatial spectrum obeys a power law with exponent varying from -3.0 to -3.7, and the root mean square fractional variations in electron density are 1--15%. All observed irregularities appear to be anisotropic with axial ratios between 2:1 and 10:1. Ionospheric parameters vary with altitude and latitude. We conclude that the measured angular orientation of the anisotropic irregularities indicates magnetic field direction and may provide a basis for refining Jovian magnetic field models.

  13. Measurement of Dynamic Friction Coefficient on the Irregular Free Surface

    International Nuclear Information System (INIS)

    Yeom, S. H.; Seo, K. S.; Lee, J. H.; Lee, K. H.

    2007-01-01

    A spent fuel storage cask must be estimated for a structural integrity when an earthquake occurs because it freely stands on ground surface without a restriction condition. Usually the integrity estimation for a seismic load is performed by a FEM analysis, the friction coefficient for a standing surface is an important parameter in seismic analysis when a sliding happens. When a storage cask is placed on an irregular ground surface, measuring a friction coefficient of an irregular surface is very difficult because the friction coefficient is affected by the surface condition. In this research, dynamic friction coefficients on the irregular surfaces between a concrete cylinder block and a flat concrete slab are measured with two methods by one direction actuator

  14. 30 MHz radar observations of artificial E region field-aligned plasma irregularities

    Directory of Open Access Journals (Sweden)

    D. L. Hysell

    2008-02-01

    Full Text Available Artificial E region field aligned irregularities (FAIs have been observed during heating experiments at the HAARP facility using a new 30 MHz coherent scatter radar imager deployed near Homer, Alaska. Irregularities were observed during brief experiments on three quiet days in July and August, 2007, when the daytime E region critical frequency was close to 3 MHz. Irregularities were consistently generated and detected during experiments with O-mode HF pumping on zenith with a 1-min on, 1-min off CW modulation. The scattering cross sections, rise, and fall times of the echoes were observed as well as their spectral properties. Results were found to be mainly in agreement with observations from other mid- and high-latitude sites with some discrepancies. Radar images of the irregularity-filled volume on one case exhibited clear variations in backscatter power and Doppler shift across the volume. The images furthermore show the emergence of a small irregularity-filled region to the south southwest of the main region in the approximate direction of magnetic zenith.

  15. Efficacy Evaluation of Current and Future Naval Mine Warfare Neutralization Method

    Science.gov (United States)

    2016-12-01

    ENGINEERING APPROACH Numerous systems engineering process models were considered for this study including the Waterfall , Spiral, and “Vee” models . Given the... model based systems engineering, design of experiments, requirements analysis, mine warfare, MIW, mine countermeasures, MCM, littoral combat ship, LCS...E. IMPLEMENTATION IN SIMULATION MODEL .............................47 VII. MODELING AND SIMULATION ARCHITECTURE ..................................49

  16. The influence of the Ratel infantry fighting vehicle on mobile warfare ...

    African Journals Online (AJOL)

    This article traces the story of how the author and a number of daring young commanders and soldiers had cast aside military textbooks in developing their own military doctrine for mobile warfare, South African style. It is clear that the Ratel infantry fighting vehicle had wielded huge influence on the development and ...

  17. On modeling of the evaporation of chemical warfare agents on the ground

    NARCIS (Netherlands)

    Westin, S.N.; Winter, S.; Karlsson, E.; Hin, A.; Oeseburg, F.

    1998-01-01

    A model for evaporation of chemical warfare agents on the ground has been developed. The process of evaporation is described in three steps: (1) the immediate drop enlargement due to impact momentum is modeled using an empirical correlation from technical literature; (2) further enlargement caused

  18. Ultrasensitive detection of explosives and chemical warfare agents by low-pressure photoionization mass spectrometry.

    Science.gov (United States)

    Sun, Wanqi; Liang, Miao; Li, Zhen; Shu, Jinian; Yang, Bo; Xu, Ce; Zou, Yao

    2016-08-15

    On-spot monitoring of threat agents needs high sensitive instrument. In this study, a low-pressure photoionization mass spectrometer (LPPI-MS) was employed to detect trace amounts of vapor-phase explosives and chemical warfare agent mimetics under ambient conditions. Under 10-s detection time, the limits of detection of 2,4-dinitrotoluene, nitrotoluene, nitrobenzene, and dimethyl methyl phosphonate were 30, 0.5, 4, and 1 parts per trillion by volume, respectively. As compared to those obtained previously with PI mass spectrometric techniques, an improvement of 3-4 orders of magnitude was achieved. This study indicates that LPPI-MS will open new opportunities for the sensitive detection of explosives and chemical warfare agents. Copyright © 2016 Elsevier B.V. All rights reserved.

  19. Metal-organic frameworks for the removal of toxic industrial chemicals and chemical warfare agents.

    Science.gov (United States)

    Bobbitt, N Scott; Mendonca, Matthew L; Howarth, Ashlee J; Islamoglu, Timur; Hupp, Joseph T; Farha, Omar K; Snurr, Randall Q

    2017-06-06

    Owing to the vast diversity of linkers, nodes, and topologies, metal-organic frameworks can be tailored for specific tasks, such as chemical separations or catalysis. Accordingly, these materials have attracted significant interest for capture and/or detoxification of toxic industrial chemicals and chemical warfare agents. In this paper, we review recent experimental and computational work pertaining to the capture of several industrially-relevant toxic chemicals, including NH 3 , SO 2 , NO 2 , H 2 S, and some volatile organic compounds, with particular emphasis on the challenging issue of designing materials that selectively adsorb these chemicals in the presence of water. We also examine recent research on the capture and catalytic degradation of chemical warfare agents such as sarin and sulfur mustard using metal-organic frameworks.

  20. Drone warfare

    Science.gov (United States)

    Gusterson, Hugh

    2017-11-01

    Crude drones existed as early as World War I, but the technology matured in the Yugoslav Wars of the 1990s and the current wars around the Middle East. The U.S. first used a weaponized drone in late 2001, in Afghanistan. Drones may cause more or less civilian casualties depending on the targeting protocols employed by their operators. There is an inherent ambiguity in determining who is an insurgent from several thousand feet, but civilian casualties are likely to be higher if targeters emphasize "signature strikes" over "personality strikes," if they engage in "double-tap strikes," if they rely too much on local informants, and if they rely too heavily on cellphone identification in the absence of corroboration from other intelligence sources. The legality of drone warfare is fairly clear in established battle zones such as Afghanistan, but is more problematic in terms of both international and domestic law when it comes to drone strikes in countries such as Yemen, Pakistan and Somalia with which the U.S. is not at war. Looking to the future, the U.S. would be well advised to sponsor negotiations for an international drone convention that might establish clear international rules for the use of drones, ban autonomous smart drones, and establish adjudicatory procedures to handle allegations of war crimes.

  1. Outfitting a Big-War Military with Small-War Capabilities

    National Research Council Canada - National Science Library

    Melillo, Michael R

    2006-01-01

    ... security in the 21st century. Today the US military is embroiled in Iraq and elsewhere facing a complex global insurgency where it finds itself struggling to prevail in a type of war in which the enemy employs irregular warfare...

  2. Modeling and Optimal Control of a Class of Warfare Hybrid Dynamic Systems Based on Lanchester (n,1) Attrition Model

    OpenAIRE

    Chen, Xiangyong; Zhang, Ancai

    2014-01-01

    For the particularity of warfare hybrid dynamic process, a class of warfare hybrid dynamic systems is established based on Lanchester equation in a (n,1) battle, where a heterogeneous force of n different troop types faces a homogeneous force. This model can be characterized by the interaction of continuous-time models (governed by Lanchester equation), and discrete event systems (described by variable tactics). Furthermore, an expository discussion is presented on an optimal variable tact...

  3. Irregular menses: an independent risk factor for gestational diabetes mellitus.

    Science.gov (United States)

    Haver, Mary Claire; Locksmith, Gregory J; Emmet, Emily

    2003-05-01

    Our purpose was to determine whether a history of irregular menses predicts gestational diabetes mellitus independently of traditional risk factors. We analyzed demographic characteristics, body mass index, and menstrual history of 85 pregnant women with gestational diabetes mellitus and compared them with 85 systematically selected control subjects who were matched for age, race, and delivery year. Subjects with pregestational diabetes mellitus, previous gestational diabetes mellitus, family history of diabetes mellitus, weight >200 pounds, previous macrosomic infants, or previous stillbirth were excluded. Demographic characteristics between case and control groups were similar. Mean body mass index was higher among cases (26.5 kg/m(2)) versus control subjects (24.5 kg/m(2), P =.004). Irregular cycles were more prevalent in the cases (24% vs 7%, P =.006). With the use of body mass index as a stratification factor, menstrual irregularity maintained a strong association with gestational diabetes mellitus (P =.014). A history of irregular menstrual cycles was a significant independent predictor of gestational diabetes mellitus. If selective screening is implemented for gestational diabetes mellitus, such history should be considered in the decision of whom to test.

  4. Electrical Brain Responses to Beat Irregularities in Two Cases of Beat Deafness

    Science.gov (United States)

    Mathias, Brian; Lidji, Pascale; Honing, Henkjan; Palmer, Caroline; Peretz, Isabelle

    2016-01-01

    Beat deafness, a recently documented form of congenital amusia, provides a unique window into functional specialization of neural circuitry for the processing of musical stimuli: Beat-deaf individuals exhibit deficits that are specific to the detection of a regular beat in music and the ability to move along with a beat. Studies on the neural underpinnings of beat processing in the general population suggest that the auditory system is capable of pre-attentively generating a predictive model of upcoming sounds in a rhythmic pattern, subserved largely within auditory cortex and reflected in mismatch negativity (MMN) and P3 event-related potential (ERP) components. The current study examined these neural correlates of beat perception in two beat-deaf individuals, Mathieu and Marjorie, and a group of control participants under conditions in which auditory stimuli were either attended or ignored. Compared to control participants, Mathieu demonstrated reduced behavioral sensitivity to beat omissions in metrical patterns, and Marjorie showed a bias to identify irregular patterns as regular. ERP responses to beat omissions reveal an intact pre-attentive system for processing beat irregularities in cases of beat deafness, reflected in the MMN component, and provide partial support for abnormalities in later cognitive stages of beat processing, reflected in an unreliable P3b component exhibited by Mathieu—but not Marjorie—compared to control participants. P3 abnormalities observed in the current study resemble P3 abnormalities exhibited by individuals with pitch-based amusia, and are consistent with attention or auditory-motor coupling accounts of deficits in beat perception. PMID:26941591

  5. Electrical brain responses to beat irregularities in two cases of beat deafness

    Directory of Open Access Journals (Sweden)

    Brian eMathias

    2016-02-01

    Full Text Available Beat deafness, a recently documented form of congenital amusia, provides a unique window into functional specialization of neural circuitry for the processing of musical stimuli: Beat-deaf individuals exhibit deficits that are specific to the detection of a regular beat in music and the ability to move along with a beat. Studies on the neural underpinnings of beat processing in the general population suggest that the auditory system is capable of pre-attentively generating a predictive model of upcoming sounds in a rhythmic pattern, subserved largely within auditory cortex and reflected in mismatch negativity (MMN and P3 event-related potential (ERP components. The current study examined these neural correlates of beat perception in two beat-deaf individuals, Mathieu and Marjorie, and a group of control participants under conditions in which auditory stimuli were either attended or ignored. Compared to control participants, Mathieu demonstrated reduced behavioral sensitivity to beat omissions in metrical patterns, and Marjorie showed a bias to identify irregular patterns as regular. ERP responses to beat omissions reveal an intact pre-attentive system for processing beat irregularities in cases of beat deafness, reflected in the MMN component, and provide partial support for abnormalities in later cognitive stages of beat processing, reflected in an unreliable P3b component exhibited by Mathieu – but not Marjorie – compared to control participants. P3 abnormalities observed in the current study resemble P3 abnormalities exhibited by individuals with pitch-based amusia, and are consistent with attention or auditory-motor coupling accounts of deficits in beat perception.

  6. Diagnosis of Exposure to Chemical Warfare Agents: A Comprehensive Literature Survey 1990-2005

    National Research Council Canada - National Science Library

    Noort, D

    2006-01-01

    This report is an update of TNO report PML 2003-A63. In this report an overview is presented of the methods currently available for detection of exposure to a number of chemical warfare agents (CWA), i.e...

  7. Backscatter measurements of 11-cm equatorial spread-F irregularities

    International Nuclear Information System (INIS)

    Tsunoda, R.T.

    1980-01-01

    In the equatorial F-region ionosphere, a turbulent cascade process has been found to exist that extends from irregularity spatial wavelengths longer than tens of kilometers down to wavelengths as short as 36 cm. To investigate the small-scale regime of wavelengths less than 36 cm, an equatorial radar experiment was conducted using a frequency of 1320 MHz that corresponds to an irregularity wavelength of 11 cm. The first observations of radar backscatter from 11-cm field-aligned irregularities (FAI) are described. These measurements extend the spatial wavelength regime of F-region FAI to lengths that approach both electron gyroradius and the Debye length. Agreement of these results with the theory of high-frequency drift waves suggests that these observations may be unique to the equatorial ionosphere. That is, the requirement of low electron densities for which the theroy calls may preclude the existence of 11-cm FAI elsewhere in the F-region ionosphere, except in equatorial plasma bubbles

  8. A Comparison of Predictive Thermo and Water Solvation Property Prediction Tools and Experimental Data for Selected Traditional Chemical Warfare Agents and Simulants II: COSMO RS and COSMOTherm

    Science.gov (United States)

    2017-04-01

    SELECTED TRADITIONAL CHEMICAL WARFARE AGENTS AND SIMULANTS II: COSMO-RS AND COSMOTHERM ECBC-TR-1454 Jerry B. Cabalo RESEARCH AND TECHNOLOGY...Traditional Chemical Warfare Agents and Simulants II: COSMO-RS and COSMOTherm 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER CB10115...in the ADF 2012 suite of programs for the physico- chemical properties of a set of traditional chemical warfare agents and selected simulants. To

  9. Stromal haze, myofibroblasts, and surface irregularity after PRK.

    Science.gov (United States)

    Netto, Marcelo V; Mohan, Rajiv R; Sinha, Sunilima; Sharma, Ajay; Dupps, William; Wilson, Steven E

    2006-05-01

    The aim of this study was to investigate the relationship between the level of stromal surface irregularity after photorefractive keratectomy (PRK) and myofibroblast generation along with the development of corneal haze. Variable levels of stromal surface irregularity were generated in rabbit corneas by positioning a fine mesh screen in the path of excimer laser during ablation for a variable percentage of the terminal pulses of the treatment for myopia that does not otherwise generate significant opacity. Ninety-six rabbits were divided into eight groups: [see table in text]. Slit lamp analysis and haze grading were performed in all groups. Rabbits were sacrificed at 4 hr or 4 weeks after surgery and histochemical analysis was performed on corneas for apoptosis (TUNEL assay), myofibroblast marker alpha-smooth muscle actin (SMA), and integrin alpha4 to delineate the epithelial basement membrane. Slit-lamp grading revealed severe haze formation in corneas in groups IV and VI, with significantly less haze in groups II, III, and VII and insignificant haze compared with the unwounded control in groups I and V. Analysis of SMA staining at 4 weeks after surgery, the approximate peak of haze formation in rabbits, revealed low myofibroblast formation in group I (1.2+/-0.2 cells/400x field) and group V (1.8+/-0.4), with significantly more in groups II (3.5+/-1.8), III (6.8+/-1.6), VII (7.9+/-3.8), IV (12.4+/-4.2) and VI (14.6+/-5.1). The screened groups were significantly different from each other (p PRK groups. The -9.0 diopter PRK group VI had significantly more myofibroblast generation than the -9.0 diopter PRK with PTK-smoothing group VII (p PRK and the level of stromal surface irregularity. PTK-smoothing with methylcellulose was an effective method to reduce stromal surface irregularity and decreased both haze and associated myofibroblast density. We hypothesize that stromal surface irregularity after PRK for high myopia results in defective basement membrane

  10. Criticality predicts maximum irregularity in recurrent networks of excitatory nodes.

    Directory of Open Access Journals (Sweden)

    Yahya Karimipanah

    Full Text Available A rigorous understanding of brain dynamics and function requires a conceptual bridge between multiple levels of organization, including neural spiking and network-level population activity. Mounting evidence suggests that neural networks of cerebral cortex operate at a critical regime, which is defined as a transition point between two phases of short lasting and chaotic activity. However, despite the fact that criticality brings about certain functional advantages for information processing, its supporting evidence is still far from conclusive, as it has been mostly based on power law scaling of size and durations of cascades of activity. Moreover, to what degree such hypothesis could explain some fundamental features of neural activity is still largely unknown. One of the most prevalent features of cortical activity in vivo is known to be spike irregularity of spike trains, which is measured in terms of the coefficient of variation (CV larger than one. Here, using a minimal computational model of excitatory nodes, we show that irregular spiking (CV > 1 naturally emerges in a recurrent network operating at criticality. More importantly, we show that even at the presence of other sources of spike irregularity, being at criticality maximizes the mean coefficient of variation of neurons, thereby maximizing their spike irregularity. Furthermore, we also show that such a maximized irregularity results in maximum correlation between neuronal firing rates and their corresponding spike irregularity (measured in terms of CV. On the one hand, using a model in the universality class of directed percolation, we propose new hallmarks of criticality at single-unit level, which could be applicable to any network of excitable nodes. On the other hand, given the controversy of the neural criticality hypothesis, we discuss the limitation of this approach to neural systems and to what degree they support the criticality hypothesis in real neural networks. Finally

  11. Ge 4+ doped TiO 2 for stoichiometric degradation of warfare agents

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Matys Grygar, Tomáš; Opluštil, F.; Němec, T.

    2012-01-01

    Roč. 227, AUGUST (2012), s. 62-67 ISSN 0304-3894 R&D Projects: GA ČR(CZ) GAP106/12/1116 Institutional support: RVO:61388980 Keywords : germanium * homogeneous hydrolysis * titania * urea * warfare agent degradation Subject RIV: CA - Inorganic Chemistry Impact factor: 3.925, year: 2012

  12. Target Tracking of a Linear Time Invariant System under Irregular Sampling

    Directory of Open Access Journals (Sweden)

    Jin Xue-Bo

    2012-11-01

    Full Text Available Due to event-triggered sampling in a system, or maybe with the aim of reducing data storage, tracking many applications will encounter irregular sampling time. By calculating the matrix exponential using an inverse Laplace transform, this paper transforms the irregular sampling tracking problem to the problem of tracking with time-varying parameters of a system. Using the common Kalman filter, the developed method is used to track a target for the simulated trajectory and video tracking. The results of simulation experiments have shown that it can obtain good estimation performance even at a very high irregular rate of measurement sampling time.

  13. Academic Training Lectures | Stuxnet and Cyber-Warfare | 13-14 January 2016

    CERN Multimedia

    2015-01-01

    Please note that the next series of Academic Training Lectures will take place on 13 and 14 January 2016. The lectures will be given by Gian Piero Siroli (Università e INFN, Bologna (IT))   Stuxnet and Cyber-Warfare (1/2)​ on Wednesday, 13 January from 11 a.m. to 12 p.m. http://indico.cern.ch/event/438525/ Stuxnet and Cyber-Warfare (2/2) on Thursday, 14 January from 11 a.m. to 12 p.m. http://indico.cern.ch/event/438526/ at CERN, Council Chamber (503-1-001)  Description: The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran&...

  14. Iron-montmorillonite clays as active sorbents for the decontamination of hazardous chemical warfare agents.

    Science.gov (United States)

    Carniato, F; Bisio, C; Evangelisti, C; Psaro, R; Dal Santo, V; Costenaro, D; Marchese, L; Guidotti, M

    2018-02-27

    A class of heterogeneous catalysts based on commercial bentonite from natural origin, containing at least 80 wt% of montmorillonite clay, was designed to transform selectively and under mild conditions toxic organosulfur and organophosphorus chemical warfare agents into non-noxious products with a reduced impact on health and environment. The bentonite from the natural origin was modified by introducing iron species and acid sites in the interlayer space, aiming to obtain a sorbent with strong catalytic oxidising and hydrolytic properties. The catalytic performance of these materials was evaluated in the oxidative abatement of (2-chloroethyl)ethyl sulfide (CEES), a simulant of sulfur mustard, in the presence of aqueous hydrogen peroxide as an oxidant. A new decontamination formulation was, moreover, proposed and obtained by mixing sodium perborate, as a solid oxidant, to iron-bentonite catalysts. Solid-phase decontamination tests, performed on a cotton textile support contaminated with organosulfide and organophosphonate simulant agents revealed the good activity of the solid formulation, especially in the in situ detoxification of blistering agents. Tests carried out on the real blistering warfare agent, sulfur mustard (HD agent), showed that, thanks to the co-presence of the iron-based clay together with the solid oxidant component, a good decontamination of the test surface from the real warfare agent could be achieved (80% contaminant degradation, under ambient conditions, in 24 h).

  15. A review of multi-threat medical countermeasures against chemical warfare and terrorism.

    Science.gov (United States)

    Cowan, Fred M; Broomfield, Clarence A; Stojiljkovic, Milos P; Smith, William J

    2004-11-01

    The Multi-Threat Medical Countermeasure (MTMC) hypothesis has been proposed with the aim of developing a single countermeasure drug with efficacy against different pathologies caused by multiple classes of chemical warfare agents. Although sites and mechanisms of action and the pathologies caused by different chemical insults vary, common biochemical signaling pathways, molecular mediators, and cellular processes provide targets for MTMC drugs. This article will review the MTMC hypothesis for blister and nerve agents and will expand the scope of the concept to include other chemicals as well as briefly consider biological agents. The article will also consider how common biochemical signaling pathways, molecular mediators, and cellular processes that contribute to clinical pathologies and syndromes may relate to the toxicity of threat agents. Discovery of MTMC provides the opportunity for the integration of diverse researchers and clinicians, and for the exploitation of cutting-edge technologies and drug discovery. The broad-spectrum nature of MTMC can augment military and civil defense to combat chemical warfare and chemical terrorism.

  16. Multifunctional ultra-high vacuum apparatus for studies of the interactions of chemical warfare agents on complex surfaces

    International Nuclear Information System (INIS)

    Wilmsmeyer, Amanda R.; Morris, John R.; Gordon, Wesley O.; Mantooth, Brent A.; Lalain, Teri A.; Davis, Erin Durke

    2014-01-01

    A fundamental understanding of the surface chemistry of chemical warfare agents is needed to fully predict the interaction of these toxic molecules with militarily relevant materials, catalysts, and environmental surfaces. For example, rules for predicting the surface chemistry of agents can be applied to the creation of next generation decontaminants, reactive coatings, and protective materials for the warfighter. Here, we describe a multifunctional ultra-high vacuum instrument for conducting comprehensive studies of the adsorption, desorption, and surface chemistry of chemical warfare agents on model and militarily relevant surfaces. The system applies reflection-absorption infrared spectroscopy, x-ray photoelectron spectroscopy, and mass spectrometry to study adsorption and surface reactions of chemical warfare agents. Several novel components have been developed to address the unique safety and sample exposure challenges that accompany the research of these toxic, often very low vapor pressure, compounds. While results of vacuum-based surface science techniques may not necessarily translate directly to environmental processes, learning about the fundamental chemistry will begin to inform scientists about the critical aspects that impact real-world applications

  17. The potential impact of developments in electronic technology on the future conduct of air warfare, volume 3

    Science.gov (United States)

    1986-12-01

    Advances in microelectronics have resulted in circuit densities many orders of magnitude greater than in current usage, making possible higher speed circuitry and greater storage capacity. RF techniques are also leading to monolithic microwave integrated circuits and microstrip antennas with corresponding reductions in size and weight. In addition, rapid advances are taking place in computer architecture and software that will provide improved information processing and control. This, coupled with progress in artificial intelligence and man-machine interface, offers promise of greatly improved battle management in the cockpit. The scale of changes is such that the nature of air warfare should be significantly affected over the next twenty years. This study examined the potential of electronic technology and potential benefits such as improvements in information processing, reduction in size and weight, increased reliability and maintainability; determined the applicability of such improvements to avionics and command and control systems and such functions as navigation and guidance, communications, surveillance, cockpit engineering and electronic warfare; and examined the impact on air warfare in the time period 2000 to 2010.

  18. Multifunctional ultra-high vacuum apparatus for studies of the interactions of chemical warfare agents on complex surfaces.

    Science.gov (United States)

    Wilmsmeyer, Amanda R; Gordon, Wesley O; Davis, Erin Durke; Mantooth, Brent A; Lalain, Teri A; Morris, John R

    2014-01-01

    A fundamental understanding of the surface chemistry of chemical warfare agents is needed to fully predict the interaction of these toxic molecules with militarily relevant materials, catalysts, and environmental surfaces. For example, rules for predicting the surface chemistry of agents can be applied to the creation of next generation decontaminants, reactive coatings, and protective materials for the warfighter. Here, we describe a multifunctional ultra-high vacuum instrument for conducting comprehensive studies of the adsorption, desorption, and surface chemistry of chemical warfare agents on model and militarily relevant surfaces. The system applies reflection-absorption infrared spectroscopy, x-ray photoelectron spectroscopy, and mass spectrometry to study adsorption and surface reactions of chemical warfare agents. Several novel components have been developed to address the unique safety and sample exposure challenges that accompany the research of these toxic, often very low vapor pressure, compounds. While results of vacuum-based surface science techniques may not necessarily translate directly to environmental processes, learning about the fundamental chemistry will begin to inform scientists about the critical aspects that impact real-world applications.

  19. Multifunctional ultra-high vacuum apparatus for studies of the interactions of chemical warfare agents on complex surfaces

    Energy Technology Data Exchange (ETDEWEB)

    Wilmsmeyer, Amanda R.; Morris, John R. [Department of Chemistry, Virginia Tech, Blacksburg, Virginia 24061 (United States); Gordon, Wesley O.; Mantooth, Brent A.; Lalain, Teri A. [Research and Technology Directorate, U.S. Army Edgewood Chemical Biological Center, Aberdeen Proving Ground, Maryland 21010 (United States); Davis, Erin Durke [OptiMetrics, Inc., Abingdon, Maryland 21009 (United States)

    2014-01-15

    A fundamental understanding of the surface chemistry of chemical warfare agents is needed to fully predict the interaction of these toxic molecules with militarily relevant materials, catalysts, and environmental surfaces. For example, rules for predicting the surface chemistry of agents can be applied to the creation of next generation decontaminants, reactive coatings, and protective materials for the warfighter. Here, we describe a multifunctional ultra-high vacuum instrument for conducting comprehensive studies of the adsorption, desorption, and surface chemistry of chemical warfare agents on model and militarily relevant surfaces. The system applies reflection-absorption infrared spectroscopy, x-ray photoelectron spectroscopy, and mass spectrometry to study adsorption and surface reactions of chemical warfare agents. Several novel components have been developed to address the unique safety and sample exposure challenges that accompany the research of these toxic, often very low vapor pressure, compounds. While results of vacuum-based surface science techniques may not necessarily translate directly to environmental processes, learning about the fundamental chemistry will begin to inform scientists about the critical aspects that impact real-world applications.

  20. Hungarys Alternative to Counter Hybrid Warfare - Small States Weaponized Citizenry

    Science.gov (United States)

    2017-06-09

    said “Resilience as a terminological and operational factor, will become the newest ‘ brand ’ and communication name for the Alliance.”70 He also...audiences to influence their emotions , motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and...so-called influence warfare. His study pinpointed the importance of emotion over rational facts in messages. Second, Edward Lucas and Ben Nimmo on

  1. Analysis of chemical warfare using a transient semi-Markov formulation.

    OpenAIRE

    Kierzewski, Michael O.

    1988-01-01

    Approved for public release; distribution is unlimited This thesis proposes an analytical model to test various assumptions about conventional/chemical warfare. A unit's status in conventional/chemical combat is modeled as states in a semi-Markov chain with transient and absorbing states. The effects of differing chemical threat levels, availability of decontamination assets and assumed personnel degradation rates on expected unit life and capabilities are tested. The ...

  2. PERMANENCE OF BIOLOGICAL AND CHEMICAL WARFARE AGENTS IN MUNICIPAL SOLID WASTE LANDFILL LEACHATES

    Science.gov (United States)

    The objective of this work is to permit EPA/ORD's National Homeland Security Research Center (NHSRC) and Edgewood Chemical Biological Center to collaborate together to test the permanence of biological and chemical warfare agents in municipal solid waste landfills. Research into ...

  3. Application of the pothole DAF method to vehicles traversing periodic roadway irregularities

    Science.gov (United States)

    Pesterev, A. V.; Bergman, L. A.; Tan, C. A.; Yang, B.

    2005-01-01

    This paper is a sequel to the work discussed in Pesterev et al. (Journal of Sound and Vibration, in press). In that paper, it was suggested that the technique to determine the effect of a local road surface irregularity on the dynamics of a vehicle modelled as a linear multi-degree-of-freedom system relies on the so-called pothole dynamic amplification factor (DAF), which is a complex-valued function specific to the irregularity shape. This paper discusses the companion problem of how to determine the DAF function for an irregularity represented as a superposition of simpler ones. Another purpose of this paper is to demonstrate the application of the pothole DAF functions technique to finding a priori estimates of the effect of irregularities with a repeated structure. Specifically, we solve the problem of finding the conditions under which the dynamic effect of two identical potholes located one after another is greater than that due to the single pothole. We also find the estimate for the number of periods of a periodic irregularity that are sufficient in order to consider the oscillator response as steady state. The discussions are illustrated by numerical examples.

  4. Irregular singularities in Liouville theory and Argyres-Douglas type gauge theories, I

    Energy Technology Data Exchange (ETDEWEB)

    Gaiotto, D. [Institute for Advanced Study (IAS), Princeton, NJ (United States); Teschner, J. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2012-03-15

    Motivated by problems arising in the study of N=2 supersymmetric gauge theories we introduce and study irregular singularities in two-dimensional conformal field theory, here Liouville theory. Irregular singularities are associated to representations of the Virasoro algebra in which a subset of the annihilation part of the algebra act diagonally. In this paper we define natural bases for the space of conformal blocks in the presence of irregular singularities, describe how to calculate their series expansions, and how such conformal blocks can be constructed by some delicate limiting procedure from ordinary conformal blocks. This leads us to a proposal for the structure functions appearing in the decomposition of physical correlation functions with irregular singularities into conformal blocks. Taken together, we get a precise prediction for the partition functions of some Argyres-Douglas type theories on S{sup 4}. (orig.)

  5. Irregular singularities in Liouville theory and Argyres-Douglas type gauge theories, I

    International Nuclear Information System (INIS)

    Gaiotto, D.; Teschner, J.

    2012-03-01

    Motivated by problems arising in the study of N=2 supersymmetric gauge theories we introduce and study irregular singularities in two-dimensional conformal field theory, here Liouville theory. Irregular singularities are associated to representations of the Virasoro algebra in which a subset of the annihilation part of the algebra act diagonally. In this paper we define natural bases for the space of conformal blocks in the presence of irregular singularities, describe how to calculate their series expansions, and how such conformal blocks can be constructed by some delicate limiting procedure from ordinary conformal blocks. This leads us to a proposal for the structure functions appearing in the decomposition of physical correlation functions with irregular singularities into conformal blocks. Taken together, we get a precise prediction for the partition functions of some Argyres-Douglas type theories on S 4 . (orig.)

  6. Environmental assessments of sea dumped chemical warfare agents

    DEFF Research Database (Denmark)

    Sanderson, Hans; Fauser, Patrik

    This is a report on the information gathered during work related to sea dumped chemical warfare agents. It mainly reviews the work conducted in relation to the installation of the two Nord Stream gas pipeline from 2008-2012. The focus was on the weight-of-evidence risk assessment of disturbed CWA...... residues in connection with the installation of the pipelines. Novel exposure and toxicity assessments are presented and the risk is assessed. The overall conclusion is that there is a negligible acute added CWA risk towards the fish community from the installation of the pipelines....

  7. Getting the Next War Right: Beyond Population-centric Warfare

    Science.gov (United States)

    2010-06-01

    respectively: Che Guevara and Mao Tse -tung. Che’s foco theory, as we have discussed, advocates mobilizing from the top. The armed challenger chooses an...example, Thomas A. Marks, “Guerrillas in the Mist: Hmong Resistance Continues in Laos ,” Combat and Survival 8, no. 5 (August 1996), 4–11. 12 Theory and...Mao Tse -tung, On Guerrilla Warfare, trans. and ed. Samuel B. Grif!th (Mineola, NY: Dover Publications, 2005). The book is available from a wide

  8. Numerical simulation of RCS for carrier electronic warfare airplanes

    OpenAIRE

    Yue Kuizhi; Liu Wenlin; Li Guanxiong; Ji Jinzu; Yu Dazhao

    2015-01-01

    This paper studies the radar cross section (RCS) of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carr...

  9. Reevaluation of 1999 Health-Based Environmental Screening Levels (HBESLs) for Chemical Warfare Agents

    Energy Technology Data Exchange (ETDEWEB)

    Watson, Annetta Paule [ORNL; Dolislager, Fredrick G [ORNL

    2007-05-01

    This report evaluates whether new information and updated scientific models require that changes be made to previously published health-based environmental soil screening levels (HBESLs) and associated environmental fate/breakdown information for chemical warfare agents (USACHPPM 1999). Specifically, the present evaluation describes and compares changes that have been made since 1999 to U.S. Environmental Protection Agency (EPA) risk assessment models, EPA exposure assumptions, as well as to specific chemical warfare agent parameters (e.g., toxicity values). Comparison was made between screening value estimates recalculated with current assumptions and earlier health-based environmental screening levels presented in 1999. The chemical warfare agents evaluated include the G-series and VX nerve agents and the vesicants sulfur mustard (agent HD) and Lewisite (agent L). In addition, key degradation products of these agents were also evaluated. Study findings indicate that the combined effect of updates and/or changes to EPA risk models, EPA default exposure parameters, and certain chemical warfare agent toxicity criteria does not result in significant alteration to the USACHPPM (1999) health-based environmental screening level estimates for the G-series and VX nerve agents or the vesicant agents HD and L. Given that EPA's final position on separate Tier 1 screening levels for indoor and outdoor worker screening assessments has not yet been released as of May 2007, the study authors find that the 1999 screening level estimates (see Table ES.1) are still appropriate and protective for screening residential as well as nonresidential sites. As such, risk management decisions made on the basis of USACHPPM (1999) recommendations do not require reconsideration. While the 1999 HBESL values are appropriate for continued use as general screening criteria, the updated '2007' estimates (presented below) that follow the new EPA protocols currently under development

  10. Effects of surface irregularities on intensity data from laser scanning: an experimental approach.

    Directory of Open Access Journals (Sweden)

    G. Teza

    2008-06-01

    Full Text Available The results of an experiment carried out with the aim to investigate the role of surface irregularities on the intensity data provided by a terrestrial laser scanner (TLS survey are reported here. Depending on surface roughness, the interaction between an electromagnetic wave and microscopic irregularities leads to a Lambertian-like diffusive light reflection, allowing the TLS to receive the backscattered component of the signal. The described experiment consists in a series of TLS-based acquisitions of a rotating artificial target specifically conceived in order to highlight the effects on the intensity data due to surface irregularity. This target is articulated in a flat plate and in an irregular surface, whose macro-roughness has a characteristic length with the same order of the spot size. Results point out the different behavior of the plates. The intensity of the signal backscattered by the planar element decreases if the incidence angle increases, whereas the intensity of the signal backscattered by the irregular surface is almost constant if the incidence angle varies. Since the typical surfaces acquired in a geological/geophysical survey are generally irregular, these results imply that the intensity data can be easily used in order to evaluate the reflectance of the material at the considered wavelength, e.g. for pattern recognition purposes.

  11. Radar Observations of 8.3-m scale equatorial spread F irregularities over Trivandrum

    Directory of Open Access Journals (Sweden)

    D. Tiwari

    2004-03-01

    Full Text Available In this paper, we present observations of equatorial spread F (ESF irregularities made using a newly installed 18MHz radar located at Trivandrum. We characterize the morphology and the spectral parameters of the 8.3-m ESF irregularities which are found to be remarkably different from that observed so extensively at the 3-m scale size. We also present statistical results of the irregularities in the form of percentage occurrence of the echoes and spectral parameters (SNR, Doppler velocity, Spectral width. The Doppler spectra are narrower, less structured and less variable in time as compared to those observed for 3-m scale size. We have never observed the ESF irregularity velocities to be supersonic here unlike those at Jicamarca, and the velocities are found to be within ±200ms–1. The spectral widths are found to be less than 150ms–1. Hence, the velocities and spectral width both are smaller than those reported for 3-m scale size. The velocities and spectral widths are further found to be much smaller than those of the American sector. These observations are compared with those reported elsewhere and discussed in the light of present understanding on the ESF irregularities at different wavelengths. Key words. Ionoshphere (equatorial ionosphere, plasma waves and instabilities; ionospheric irregularities

  12. Modification of transmission dose algorithm for irregularly shaped radiation field and tissue deficit

    Energy Technology Data Exchange (ETDEWEB)

    Yun, Hyong Geon; Shin, Kyo Chul [Dankook Univ., College of Medicine, Seoul (Korea, Republic of); Huh, Soon Nyung; Woo, Hong Gyun; Ha, Sung Whan [Seoul National Univ., College of Medicine, Seoul (Korea, Republic of); Lee, Hyoung Koo [The Catholic Univ., College of Medicine, Seoul (Korea, Republic of)

    2002-07-01

    Algorithm for estimation of transmission dose was modified for use in partially blocked radiation fields and in cases with tissue deficit. The beam data was measured with flat solid phantom in various conditions of beam block. And an algorithm for correction of transmission dose in cases of partially blocked radiation field was developed from the measured data. The algorithm was tested in some clinical settings with irregular shaped field. Also, another algorithm for correction of transmission dose for tissue deficit was developed by physical reasoning. This algorithm was tested in experimental settings with irregular contours mimicking breast cancer patients by using multiple sheets of solid phantoms. The algorithm for correction of beam block could accurately reflect the effect of beam block, with error within {+-}1.0%, both with square fields and irregularly shaped fields. The correction algorithm for tissue deficit could accurately reflect the effect of tissue deficit with errors within {+-}1.0% in most situations and within {+-}3.0% in experimental settings with irregular contours mimicking breast cancer treatment set-up. Developed algorithms could accurately estimate the transmission dose in most radiation treatment settings including irregularly shaped field and irregularly shaped body contour with tissue deficit in transmission dosimetry.

  13. Modification of transmission dose algorithm for irregularly shaped radiation field and tissue deficit

    International Nuclear Information System (INIS)

    Yun, Hyong Geon; Shin, Kyo Chul; Huh, Soon Nyung; Woo, Hong Gyun; Ha, Sung Whan; Lee, Hyoung Koo

    2002-01-01

    Algorithm for estimation of transmission dose was modified for use in partially blocked radiation fields and in cases with tissue deficit. The beam data was measured with flat solid phantom in various conditions of beam block. And an algorithm for correction of transmission dose in cases of partially blocked radiation field was developed from the measured data. The algorithm was tested in some clinical settings with irregular shaped field. Also, another algorithm for correction of transmission dose for tissue deficit was developed by physical reasoning. This algorithm was tested in experimental settings with irregular contours mimicking breast cancer patients by using multiple sheets of solid phantoms. The algorithm for correction of beam block could accurately reflect the effect of beam block, with error within ±1.0%, both with square fields and irregularly shaped fields. The correction algorithm for tissue deficit could accurately reflect the effect of tissue deficit with errors within ±1.0% in most situations and within ±3.0% in experimental settings with irregular contours mimicking breast cancer treatment set-up. Developed algorithms could accurately estimate the transmission dose in most radiation treatment settings including irregularly shaped field and irregularly shaped body contour with tissue deficit in transmission dosimetry

  14. 18th International Seapower Symposium

    Science.gov (United States)

    2009-01-01

    brid war or complex irregular conflict: somewhat like you see going on right now potentially in Iraq and Afghanistan, where you’ll have combinations of...pable of operating in this complex irregular warfare that our vision folks see as the wave of the future. We are attempting to stay balanced with...think less about the challenges that it raises, which are quite small, and more about the opportunities it presents, which are im- mense . And I want

  15. PERIODIC ORBIT FAMILIES IN THE GRAVITATIONAL FIELD OF IRREGULAR-SHAPED BODIES

    Energy Technology Data Exchange (ETDEWEB)

    Jiang, Yu [State Key Laboratory of Astronautic Dynamics, Xi’an Satellite Control Center, Xi’an 710043 (China); Baoyin, Hexi, E-mail: jiangyu_xian_china@163.com [School of Aerospace Engineering, Tsinghua University, Beijing 100084 (China)

    2016-11-01

    The discovery of binary and triple asteroids in addition to the execution of space missions to minor celestial bodies in the past several years have focused increasing attention on periodic orbits around irregular-shaped celestial bodies. In the present work, we adopt a polyhedron shape model for providing an accurate representation of irregular-shaped bodies and employ the model to calculate their corresponding gravitational and effective potentials. We also investigate the characteristics of periodic orbit families and the continuation of periodic orbits. We prove a fact, which provides a conserved quantity that permits restricting the number of periodic orbits in a fixed energy curved surface about an irregular-shaped body. The collisions of Floquet multipliers are maintained during the continuation of periodic orbits around the comet 1P/Halley. Multiple bifurcations in the periodic orbit families about irregular-shaped bodies are also discussed. Three bifurcations in the periodic orbit family have been found around the asteroid 216 Kleopatra, which include two real saddle bifurcations and one period-doubling bifurcation.

  16. PERIODIC ORBIT FAMILIES IN THE GRAVITATIONAL FIELD OF IRREGULAR-SHAPED BODIES

    International Nuclear Information System (INIS)

    Jiang, Yu; Baoyin, Hexi

    2016-01-01

    The discovery of binary and triple asteroids in addition to the execution of space missions to minor celestial bodies in the past several years have focused increasing attention on periodic orbits around irregular-shaped celestial bodies. In the present work, we adopt a polyhedron shape model for providing an accurate representation of irregular-shaped bodies and employ the model to calculate their corresponding gravitational and effective potentials. We also investigate the characteristics of periodic orbit families and the continuation of periodic orbits. We prove a fact, which provides a conserved quantity that permits restricting the number of periodic orbits in a fixed energy curved surface about an irregular-shaped body. The collisions of Floquet multipliers are maintained during the continuation of periodic orbits around the comet 1P/Halley. Multiple bifurcations in the periodic orbit families about irregular-shaped bodies are also discussed. Three bifurcations in the periodic orbit family have been found around the asteroid 216 Kleopatra, which include two real saddle bifurcations and one period-doubling bifurcation.

  17. Short-term magnetic field alignment variations of equatorial ionospheric irregularities

    International Nuclear Information System (INIS)

    Johnson, A.L.

    1988-01-01

    The ionospheric irregularities that cause equatorial scintillation are elongated along the north-south magnetic field lines. During a 1981 field campaign at Ascension Island, 250-MHz receivers were spaced from 300 m to 1.6 km along the field lines, and the signals received from the Marisat satellite were cross correlated. Data collected during eight nights of fading showed a linear relationship between fading rate and cross correlation. The alignment of the antennas was adjusted to give a zero time lag between the widely spaced receivers with a measurement accuracy of 0.03 s. Since the average irregularity velocity was 125 m/s, this time accuracy translated to an angular measurement accuracy of 0.1 deg. During a 4-hour period of nightly fading, occasional differences in time of arrival were noted that corresponded to a tilt in the north-south alignment of + or - 1 deg. Data from several nights of fading were analyzed, and each night exhibited the same variance in the north-south irregularity alignment. It is postulated that the shift in the measured peak correlation may have been caused by patches of irregularities at different altitudes where the magnetic field lines have a slightly different direction. 13 references

  18. On the Total Edge Irregularity Strength of Generalized Butterfly Graph

    Science.gov (United States)

    Dwi Wahyuna, Hafidhyah; Indriati, Diari

    2018-04-01

    Let G(V, E) be a connected, simple, and undirected graph with vertex set V and edge set E. A total k-labeling is a map that carries vertices and edges of a graph G into a set of positive integer labels {1, 2, …, k}. An edge irregular total k-labeling λ: V(G) ∪ E(G) → {1, 2, …, k} of a graph G is a total k-labeling such that the weights calculated for all edges are distinct. The weight of an edge uv in G, denoted by wt(uv), is defined as the sum of the label of u, the label of v, and the label of uv. The total edge irregularity strength of G, denoted by tes(G), is the minimum value of the largest label k over all such edge irregular total k-labelings. A generalized butterfly graph, BFn , obtained by inserting vertices to every wing with assumption that sum of inserting vertices to every wing are same then it has 2n + 1 vertices and 4n ‑ 2 edges. In this paper, we investigate the total edge irregularity strength of generalized butterfly graph, BFn , for n > 2. The result is tes(B{F}n)=\\lceil \\frac{4n}{3}\\rceil .

  19. Cerium oxide for the destruction of chemical warfare agents: A comparison of synthetic routes

    Czech Academy of Sciences Publication Activity Database

    Janos, P.; Henych, Jiří; Pelant, O.; Pilařová, V.; Vrtoch, L.; Kormunda, M.; Mazanec, K.; Štengl, Václav

    2016-01-01

    Roč. 304, MAR (2016), s. 259-268 ISSN 0304-3894 Institutional support: RVO:61388980 Keywords : Cerium oxide * Chemical warfare agents * Organophosphate compounds * Decontamination Subject RIV: CA - Inorganic Chemistry Impact factor: 6.065, year: 2016

  20. Exploring Manycore Multinode Systems for Irregular Applications with FPGA Prototyping

    Energy Technology Data Exchange (ETDEWEB)

    Ceriani, Marco; Palermo, Gianluca; Secchi, Simone; Tumeo, Antonino; Villa, Oreste

    2013-04-29

    We present a prototype of a multi-core architecture implemented on FPGA, designed to enable efficient execution of irregular applications on distributed shared memory machines, while maintaining high performance on regular workloads. The architecture is composed of off-the-shelf soft-core cores, local interconnection and memory interface, integrated with custom components that optimize it for irregular applications. It relies on three key elements: a global address space, multithreading, and fine-grained synchronization. Global addresses are scrambled to reduce the formation of network hot-spots, while the latency of the transactions is covered by integrating an hardware scheduler within the custom load/store buffers to take advantage from the availability of multiple executions threads, increasing the efficiency in a transparent way to the application. We evaluated a dual node system irregular kernels showing scalability in the number of cores and threads.

  1. OFFICER AND COMMANDER IN ASYMMETRIC WARFARE OPERATIONS

    Directory of Open Access Journals (Sweden)

    Giuseppe CAFORIO

    2013-01-01

    Full Text Available Starting from the data of a field research conducted among soldiers with asymmetric warfare experiences from nine different countries, the author seeks to identify and shed light on the various problems that officers with command responsibilities had to face during their missions. A picture emerges of feelings and experiences relating to their first impression upon arriving in the theatre, relations with local armed forces, relations with the local population and local authorities, relations with NGOs, relations with other armies, the impact of the rules of engagement (ROEs, training and education, and operational experiences. The paper ends with a discussion of the lessons learned.

  2. Textile/metal-organic-framework composites as self-detoxifying filters for chemical-warfare agents.

    Science.gov (United States)

    López-Maya, Elena; Montoro, Carmen; Rodríguez-Albelo, L Marleny; Aznar Cervantes, Salvador D; Lozano-Pérez, A Abel; Cenís, José Luis; Barea, Elisa; Navarro, Jorge A R

    2015-06-01

    The current technology of air-filtration materials for protection against highly toxic chemicals, that is, chemical-warfare agents, is mainly based on the broad and effective adsorptive properties of hydrophobic activated carbons. However, adsorption does not prevent these materials from behaving as secondary emitters once they are contaminated. Thus, the development of efficient self-cleaning filters is of high interest. Herein, we report how we can take advantage of the improved phosphotriesterase catalytic activity of lithium alkoxide doped zirconium(IV) metal-organic framework (MOF) materials to develop advanced self-detoxifying adsorbents of chemical-warfare agents containing hydrolysable P-F, P-O, and C-Cl bonds. Moreover, we also show that it is possible to integrate these materials onto textiles, thereby combining air-permeation properties of the textiles with the self-detoxifying properties of the MOF material. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  3. 77 FR 36419 - Feasibility of Enumerating “Specially Designed” Components

    Science.gov (United States)

    2012-06-19

    ...) ``chemical warfare (CW) agents;'' or (4) specific ``riot control agents'' listed in ECCN 1A004.a.4. 2. ECCN... and decontamination equipment therefor, designed or modified for defense against'' (1) ``biological...) ``[r]adioactive materials `adapted for use in war;' '' or (3) ``[c]hemical warfare (CW) agents.'' 3...

  4. The Acme of Skill: Nonkinetic Warfare

    Science.gov (United States)

    2008-05-01

    results are mixed. For the im- mense cost that often accompanies war, the returns of war are not guaranteed. On nonkinetic operations, it may appear that...ing, together with other kinetic capabilities such as emphasizing irregular operations, increasing ground troop levels, and recruiting foreign

  5. Thought about Strategic Demonstration Simulation Warfare Experiment%关于战略级推演模拟型作战实验的思考

    Institute of Scientific and Technical Information of China (English)

    周绍亮; 李雄; 董斐; 付佳

    2011-01-01

    Abstract:Based on classification of warfare experiments, the concept of strategic demonstration simulation warfare experiment is defined. From the standpoint of establishment of national strategic goals, grasping of international situation and education of joint operation command talents, the function and signification of strategic demonstration simulation warfare experiment are discussed. The basic requirements on military strategic policy, coordinated development of army construction and military operations, warfare lab and warfare experiment technologies are analyzed. The strategic demonstration simulation warfare lab is designed by presenting its functional framework, logic concept framework and running mode. The research results provide theoretical reference to promoting innovation development of warfare experiment.%摘要:在划分作战实验类别的基础上,界定了战略级推演模拟型作战实验的基本概念;从国家战略目标确立、国际局势把握、联合作战指挥人才培养的角度,阐述了战略级推演模拟型作战实验的作用及意义;从以军事战略方针为指导、与军队建设和军事作战协调发展、以作战实验机构为依托、以作战实验技术手段为支撑的角度,分析了战略级推演模拟型作战实验的基本要求;从功能结构、逻辑概念结构、运行模式的角度,进行了战略级推演模拟型作战实验室的初步设计。研究结果可为推动作战实验的创新发展提供理论参考。

  6. The concept of guerrilla warfare in Lithuania in the 1920—1930s

    Directory of Open Access Journals (Sweden)

    Jokubauskas Vytautas

    2012-03-01

    Full Text Available This article analyses the military and tactical training of the members of the Lithuanian Riflemen’s Union for guerrilla warfare in the interwar period. Small nations, such as Lithuania and other Baltic states, being unable to build up military strength in order to ensure national security, were forced to seek for unconventional methods of warfare, including guerrilla strategies. The study places emphasis on the development of the guerrilla war concept in the Union periodicals. The author retraces a change in the intensity of the guerrilla warfare concept propagation amongst Lithuanian population and riflemen, in particular, through publications in the Trimitas — a periodical of the Lithuanian Riflemen’s Union. The author also identifies the narratives associated with the guerrilla matters employed for propaganda purposes in order to create an image of a guerrilla as a defender of the Homeland — Lithuania. Additionally, the structure and numbers of the Union are analysed through a comparison with similar organisations of the other «small nations» of the Baltic North-East. The author addresses the issue of military missions planned by the Lithuanian Army, as well as the way riflemen implemented them. Since the Union did not only offer military training, but was also engaged in the patriotic propaganda, the article focuses on the network of cultural institutions, homes of riflemen, orchestras, libraries, choirs, and athletic clubs used by the Union. The article sets out to establish whether the loss of Lithuanian sovereignty could have been possible without giving rise to a protracted guerrilla war.

  7. Seismic performance for vertical geometric irregularity frame structures

    Science.gov (United States)

    Ismail, R.; Mahmud, N. A.; Ishak, I. S.

    2018-04-01

    This research highlights the result of vertical geometric irregularity frame structures. The aid of finite element analysis software, LUSAS was used to analyse seismic performance by focusing particularly on type of irregular frame on the differences in height floors and continued in the middle of the building. Malaysia’s building structures were affected once the earthquake took place in the neighbouring country such as Indonesia (Sumatera Island). In Malaysia, concrete is widely used in building construction and limited tension resistance to prevent it. Analysing structural behavior with horizontal and vertical static load is commonly analyses by using the Plane Frame Analysis. The case study of this research is to determine the stress and displacement in the seismic response under this type of irregular frame structures. This study is based on seven-storey building of Clinical Training Centre located in Sungai Buloh, Selayang, Selangor. Since the largest earthquake occurs in Acheh, Indonesia on December 26, 2004, the data was recorded and used in conducting this research. The result of stress and displacement using IMPlus seismic analysis in LUSAS Modeller Software under the seismic response of a formwork frame system states that the building is safe to withstand the ground and in good condition under the variation of seismic performance.

  8. Simulating Seismic Wave Propagation in Viscoelastic Media with an Irregular Free Surface

    Science.gov (United States)

    Liu, Xiaobo; Chen, Jingyi; Zhao, Zhencong; Lan, Haiqiang; Liu, Fuping

    2018-05-01

    In seismic numerical simulations of wave propagation, it is very important for us to consider surface topography and attenuation, which both have large effects (e.g., wave diffractions, conversion, amplitude/phase change) on seismic imaging and inversion. An irregular free surface provides significant information for interpreting the characteristics of seismic wave propagation in areas with rugged or rapidly varying topography, and viscoelastic media are a better representation of the earth's properties than acoustic/elastic media. In this study, we develop an approach for seismic wavefield simulation in 2D viscoelastic isotropic media with an irregular free surface. Based on the boundary-conforming grid method, the 2D time-domain second-order viscoelastic isotropic equations and irregular free surface boundary conditions are transferred from a Cartesian coordinate system to a curvilinear coordinate system. Finite difference operators with second-order accuracy are applied to discretize the viscoelastic wave equations and the irregular free surface in the curvilinear coordinate system. In addition, we select the convolutional perfectly matched layer boundary condition in order to effectively suppress artificial reflections from the edges of the model. The snapshot and seismogram results from numerical tests show that our algorithm successfully simulates seismic wavefields (e.g., P-wave, Rayleigh wave and converted waves) in viscoelastic isotropic media with an irregular free surface.

  9. Fluorescent discrimination between traces of chemical warfare agents and their mimics.

    Science.gov (United States)

    Díaz de Greñu, Borja; Moreno, Daniel; Torroba, Tomás; Berg, Alexander; Gunnars, Johan; Nilsson, Tobias; Nyman, Rasmus; Persson, Milton; Pettersson, Johannes; Eklind, Ida; Wästerby, Pär

    2014-03-19

    An array of fluorogenic probes is able to discriminate between nerve agents, sarin, soman, tabun, VX and their mimics, in water or organic solvent, by qualitative fluorescence patterns and quantitative multivariate analysis, thus making the system suitable for the in-the-field detection of traces of chemical warfare agents as well as to differentiate between the real nerve agents and other related compounds.

  10. Analysis of the Threat of Genetically Modified Organisms for Biological Warfare

    Science.gov (United States)

    2011-05-01

    biological warfare. The primary focus of the framework are those aspects of the technology directly affecting humans by inducing virulent infectious disease...applications. Simple organisms such as fruit flies have been used to study the effects of genetic changes across generations. Transgenic mice are...Analysis * Multi-cell pathogens * Toxins (Chemical products of living cells.) * Fungi (Robust organism; no genetic manipulation needed

  11. Radar Observations of 8.3-m scale equatorial spread F irregularities over Trivandrum

    Directory of Open Access Journals (Sweden)

    D. Tiwari

    2004-03-01

    Full Text Available In this paper, we present observations of equatorial spread F (ESF irregularities made using a newly installed 18MHz radar located at Trivandrum. We characterize the morphology and the spectral parameters of the 8.3-m ESF irregularities which are found to be remarkably different from that observed so extensively at the 3-m scale size. We also present statistical results of the irregularities in the form of percentage occurrence of the echoes and spectral parameters (SNR, Doppler velocity, Spectral width. The Doppler spectra are narrower, less structured and less variable in time as compared to those observed for 3-m scale size. We have never observed the ESF irregularity velocities to be supersonic here unlike those at Jicamarca, and the velocities are found to be within ±200ms–1. The spectral widths are found to be less than 150ms–1. Hence, the velocities and spectral width both are smaller than those reported for 3-m scale size. The velocities and spectral widths are further found to be much smaller than those of the American sector. These observations are compared with those reported elsewhere and discussed in the light of present understanding on the ESF irregularities at different wavelengths.

    Key words. Ionoshphere (equatorial ionosphere, plasma waves and instabilities; ionospheric irregularities

  12. Efficient irregular wavefront propagation algorithms on Intel® Xeon Phi™

    OpenAIRE

    Gomes, Jeremias M.; Teodoro, George; de Melo, Alba; Kong, Jun; Kurc, Tahsin; Saltz, Joel H.

    2015-01-01

    We investigate the execution of the Irregular Wavefront Propagation Pattern (IWPP), a fundamental computing structure used in several image analysis operations, on the Intel® Xeon Phi™ co-processor. An efficient implementation of IWPP on the Xeon Phi is a challenging problem because of IWPP’s irregularity and the use of atomic instructions in the original IWPP algorithm to resolve race conditions. On the Xeon Phi, the use of SIMD and vectorization instructions is critical to attain high perfo...

  13. Irregular menses predicts ovarian cancer: Prospective evidence from the Child Health and Development Studies.

    Science.gov (United States)

    Cirillo, Piera M; Wang, Erica T; Cedars, Marcelle I; Chen, Lee-May; Cohn, Barbara A

    2016-09-01

    We tested the hypothesis that irregular menstruation predicts lower risk for ovarian cancer, possibly due to less frequent ovulation. We conducted a 50-year prospective study of 15,528 mothers in the Child Health and Development Studies cohort recruited from the Kaiser Foundation Health Plan from 1959 to 1966. Irregular menstruation was classified via medical record and self-report at age 26. We identified 116 cases and 84 deaths due to ovarian cancer through 2011 via linkage to the California Cancer Registry and Vital Statistics. Contrary to expectation, women with irregular menstrual cycles had a higher risk of ovarian cancer incidence and mortality over the 50-year follow-up. Associations increased with age (p irregular menstruation and ovarian cancer-we unexpectedly found higher risk for women with irregular cycles. These women are easy to identify and many may have polycystic ovarian syndrome. Classifying high-risk phenotypes such as irregular menstruation creates opportunities to find novel early biomarkers, refine clinical screening protocols and potentially develop new risk reduction strategies. These efforts can lead to earlier detection and better survival for ovarian cancer. © 2016 UICC.

  14. Comparison of correlation analysis techniques for irregularly sampled time series

    Directory of Open Access Journals (Sweden)

    K. Rehfeld

    2011-06-01

    Full Text Available Geoscientific measurements often provide time series with irregular time sampling, requiring either data reconstruction (interpolation or sophisticated methods to handle irregular sampling. We compare the linear interpolation technique and different approaches for analyzing the correlation functions and persistence of irregularly sampled time series, as Lomb-Scargle Fourier transformation and kernel-based methods. In a thorough benchmark test we investigate the performance of these techniques.

    All methods have comparable root mean square errors (RMSEs for low skewness of the inter-observation time distribution. For high skewness, very irregular data, interpolation bias and RMSE increase strongly. We find a 40 % lower RMSE for the lag-1 autocorrelation function (ACF for the Gaussian kernel method vs. the linear interpolation scheme,in the analysis of highly irregular time series. For the cross correlation function (CCF the RMSE is then lower by 60 %. The application of the Lomb-Scargle technique gave results comparable to the kernel methods for the univariate, but poorer results in the bivariate case. Especially the high-frequency components of the signal, where classical methods show a strong bias in ACF and CCF magnitude, are preserved when using the kernel methods.

    We illustrate the performances of interpolation vs. Gaussian kernel method by applying both to paleo-data from four locations, reflecting late Holocene Asian monsoon variability as derived from speleothem δ18O measurements. Cross correlation results are similar for both methods, which we attribute to the long time scales of the common variability. The persistence time (memory is strongly overestimated when using the standard, interpolation-based, approach. Hence, the Gaussian kernel is a reliable and more robust estimator with significant advantages compared to other techniques and suitable for large scale application to paleo-data.

  15. Multiple patterns of diblock copolymer confined in irregular geometries with soft surface

    Science.gov (United States)

    Li, Ying; Sun, Min-Na; Zhang, Jin-Jun; Pan, Jun-Xing; Guo, Yu-Qi; Wang, Bao-Feng; Wu, Hai-Shun

    2015-12-01

    The different confinement shapes can induce the formation of various interesting and novel morphologies, which might inspire potential applications of materials. In this paper, we study the directed self-assembly of diblock copolymer confined in irregular geometries with a soft surface by using self-consistent field theory. Two types of confinement geometries are considered, namely, one is the concave pore with one groove and the other is the concave pore with two grooves. We obtain more novel and different structures which could not be produced in other two-dimensional (2D) confinements. Comparing these new structures with those obtained in regular square confinement, we find that the range of ordered lamellae is enlarged and the range of disordered structure is narrowed down under the concave pore confinement. We also compare the different structures obtained under the two types of confinement geometries, the results show that the effect of confinement would increase, which might induce the diblock copolymer to form novel structures. We construct the phase diagram as a function of the fraction of B block and the ratio of h/L of the groove. The simulation reveals that the wetting effect of brushes and the shape of confinement geometries play important roles in determining the morphologies of the system. Our results improve the applications in the directed self-assembly of diblock copolymer for fabricating the irregular structures. Project supported by the Specialized Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20121404110004), the Research Foundation for Excellent Talents of Shanxi Provincial Department of Human Resources and Social Security, China, and the Scientific and Technological Innovation Programs of Higher Education Institutions in Shanxi Province, China.

  16. A Comparison of Neutron-Based Non-Destructive Assessment Methods for Chemical Warfare Material and High Explosives

    International Nuclear Information System (INIS)

    Seabury, E. H.; Chichester, D. L.; Wharton, C. J.; Caffrey, A. J.

    2009-01-01

    Prompt Gamma Neutron Activation Analysis (PGNAA) systems employ neutrons as a probe to interrogate items, e.g. chemical warfare materiel-filled munitions. The choice of a neutron source in field-portable systems is determined by its ability to excite nuclei of interest, operational concerns such as radiological safety and ease-of-use, and cost. Idaho National Laboratory's PINS Chemical Assay System has traditionally used a 252 Cf isotopic neutron source, but recently a deuterium-tritium (DT) electronic neutron generator (ENG) has been tested as an alternate neutron source. This paper presents the results of using both of these neutron sources to interrogate chemical warfare materiel (CWM) and high explosive (HE) filled munitions.

  17. Optimized Irregular Low-Density Parity-Check Codes for Multicarrier Modulations over Frequency-Selective Channels

    Directory of Open Access Journals (Sweden)

    Valérian Mannoni

    2004-09-01

    Full Text Available This paper deals with optimized channel coding for OFDM transmissions (COFDM over frequency-selective channels using irregular low-density parity-check (LDPC codes. Firstly, we introduce a new characterization of the LDPC code irregularity called “irregularity profile.” Then, using this parameterization, we derive a new criterion based on the minimization of the transmission bit error probability to design an irregular LDPC code suited to the frequency selectivity of the channel. The optimization of this criterion is done using the Gaussian approximation technique. Simulations illustrate the good performance of our approach for different transmission channels.

  18. Drug Intoxicated Irregular Fighters: Complications, Dangers, and Responses

    National Research Council Canada - National Science Library

    Kan, Paul R

    2008-01-01

    .... Drug consumption in contemporary wars has coincided with the use of child soldiers, has led to increased unpredictability among irregular fighters, provided the conditions for the breakdown of social...

  19. Artificial periodic irregularities in the auroral ionosphere

    Directory of Open Access Journals (Sweden)

    M. T. Rietveld

    1996-12-01

    Full Text Available Artificial periodic irregularities (API are produced in the ionospheric plasma by a powerful standing electromagnetic wave reflected off the F region. The resulting electron-density irregularities can scatter other high-frequency waves if the Bragg scattering condition is met. Such measurements have been performed at mid-latitudes for two decades and have been developed into a useful ionospheric diagnostic technique. We report here the first measurements from a high-latitude station, using the EISCAT heating facility near Tromsø, Norway. Both F-region and lower-altitude ionospheric echoes have been obtained, but the bulk of the data has been in the E and D regions with echoes extending down to 52-km altitude. Examples of API are shown, mainly from the D region, together with simultaneous VHF incoherent-scatter-radar (ISR data. Vertical velocities derived from the rate of phase change during the irregularity decay are shown and compared with velocities derived from the ISR. Some of the API-derived velocities in the 75–115-km height range appear consistent with vertical neutral winds as shown by their magnitudes and by evidence of gravity waves, while other data in the 50–70-km range show an unrealistically large bias. For a comparison with ISR data it has proved difficult to get good quality data sets overlapping in height and time. The initial comparisons show some agreement, but discrepancies of several metres per second do not yet allow us to conclude that the two techniques are measuring the same quantity. The irregularity decay time-constants between about 53 and 70 km are compared with the results of an advanced ion-chemistry model, and height profiles of recorded signal power are compared with model estimates in the same altitude range. The calculated amplitude shows good agreement with the data in that the maximum occurs at about the same height as that of the measured amplitude. The calculated time-constant agrees very well with the

  20. A model for warfare in stratified small-scale societies: The effect of within-group inequality

    Science.gov (United States)

    Pandit, Sagar; van Schaik, Carel

    2017-01-01

    In order to predict the features of non-raiding human warfare in small-scale, socially stratified societies, we study a coalitionary model of war that assumes that individuals participate voluntarily because their decisions serve to maximize fitness. Individual males join the coalition if war results in a net economic and thus fitness benefit. Within the model, viable offensive war ensues if the attacking coalition of males can overpower the defending coalition. We assume that the two groups will eventually fuse after a victory, with ranks arranged according to the fighting abilities of all males and that the new group will adopt the winning group’s skew in fitness payoffs. We ask whether asymmetries in skew, group size and the amount of resources controlled by a group affect the likelihood of successful war. The model shows, other things being equal, that (i) egalitarian groups are more likely to defeat their more despotic enemies, even when these are stronger, (ii) defection to enemy groups will be rare, unless the attacked group is far more despotic than the attacking one, and (iii) genocidal war is likely under a variety of conditions, in particular when the group under attack is more egalitarian. This simple optimality model accords with several empirically observed correlations in human warfare. Its success underlines the important role of egalitarianism in warfare. PMID:29228014

  1. Mass Spectrometric Determination of Chemical Warfare Agents in Indoor Sample Media Typically Collected During Forensic Investigations

    National Research Council Canada - National Science Library

    D'Agostino, P. A; Hancock, J. R; Chenier, C. L

    2005-01-01

    .... DRDC Suffield, in collaboration with the Royal Canadian Mounted Police, identified a need for analytical methods for chemical warfare agent identification in media, including flooring, wall surfaces...

  2. Irregular ionization and scintillation of the ionosphere in equator region

    International Nuclear Information System (INIS)

    Shinno, Kenji

    1974-01-01

    The latest studies on the scintillation in satellite communication and its related irregularities of ionosphere are reviewed. They were made clear by means of spread-F, the direct measurement with scientific satellites, VHF radar observation, and radio wave propagation in equator region. The fundamental occurrence mechanism may be instability of plasma caused by the interaction of movement of neutral atmosphere and magnetic field. Comparison of the main characteristics of scintillation, namely the dependence on region, solar activity, season, local time, geomagnetic activity, movement in ionosphere, scattering source, frequency and transmission mode, was made and the correlation among spread-F, TEP and scintillation was summarized. The latest principal studies were the observations made by Intelsat and by ATS. Scintillation of Syncom-3 and Intelsat-II-F2 and spread-F by ionosphere observation were compared by Huang. It is reasonable to consider that the occurrence of scintillation is caused by the irregularities in ionosphere which are particular in equator region, because of the similar characteristics of spread-F and VHF propagation in the equator region. These three phenomena may occur in relation to the irregularities of ionosphere. Interpretation of spread-F and the abnormal propagation wave across the equator are given. The study using VHF radar and the movement of irregular ionization by the direct observation with artificial satellites are reviewd. (Iwakiri, K.)

  3. The Short-Term Effect of Chest Physiotherapy on Spirometric Indices in Chemical Warfare Victims Exposed to Mustard Gas

    Directory of Open Access Journals (Sweden)

    A Abedi

    2008-12-01

    Full Text Available ABCTRACT Introduction & Objective: Chronic respiratory diseases are the most prevalent late sequels of sulfur mustard gas injury among Iranian chemical warfare victims. Chest physiotherapy is one of the useful methods in care, cure and infection prevention of these patients. The aim of this study was to determine the short-term effect of chest physiotherapy on spirometric indices in chemical warfare victims exposed to sulfur mustard gas. Materials & Methods: In this study, 27 of the chemical warfare victims with respiratory diseases were selected. Chest physiotherapy including postural drainage percussion and vibration were used in four positions for all patients. Pulmonary function test (PFT was obtained before (baseline, immediately and 20 minute after the chest physiotherapy. The SPSS software was used for the data analysis of the collected data. Results: Results of this study showed the significant effect (p<0.01 of chest physiotherapy upon forced expiratory volume in first second (FEV1 (baseline mean, 44.19 immediately after intervention mean 47.3 and 20 minute after intervention mean 48.3 and forced vital capacity (FVC (baseline mean, 69.37 immediately after intervention mean, 73.67 20 minute after intervention 75.74. Chest physiotherapy had significant effect (p<0.01 in asthmatic bronchitis group and also had significant effect (p<0.05 in both severe and moderate groups. Conclusion: Chest physiotherapy was able to improve pulmonary function test indices in chemical warfare victims suffering from respiratory problems. The effect on asthmatic bronchitis group, as well as both severe and moderate groups, was significant.

  4. Ultraviolet Raman scattering from persistent chemical warfare agents

    Science.gov (United States)

    Kullander, Fredrik; Wästerby, Pär.; Landström, Lars

    2016-05-01

    Laser induced Raman scattering at excitation wavelengths in the middle ultraviolet was examined using a pulsed tunable laser based spectrometer system. Droplets of chemical warfare agents, with a volume of 2 μl, were placed on a silicon surface and irradiated with sequences of laser pulses. The Raman scattering from V-series nerve agents, Tabun (GA) and Mustard gas (HD) was studied with the aim of finding the optimum parameters and the requirements for a detection system. A particular emphasis was put on V-agents that have been previously shown to yield relatively weak Raman scattering in this excitation band.

  5. Method of determining effects of heat-induced irregular refractive index on an optical system.

    Science.gov (United States)

    Song, Xifa; Li, Lin; Huang, Yifan

    2015-09-01

    The effects of an irregular refractive index on optical performance are examined. A method was developed to express a lens's irregular refractive index distribution. An optical system and its mountings were modeled by a thermomechanical finite element (FE) program in the predicted operating temperature range, -45°C-50°C. FE outputs were elaborated using a MATLAB optimization routine; a nonlinear least squares algorithm was adopted to determine which gradient equation best fit each lens's refractive index distribution. The obtained gradient data were imported into Zemax for sequential ray-tracing analysis. The root mean square spot diameter, modulation transfer function, and diffraction ensquared energy were computed for an optical system under an irregular refractive index and under thermoelastic deformation. These properties are greatly reduced by the irregular refractive index effect, which is one-third to five-sevenths the size of the thermoelastic deformation effect. Thus, thermal analyses of optical systems should consider not only thermoelastic deformation but also refractive index irregularities caused by inhomogeneous temperature.

  6. Significance of scatter radar studies of E and F region irregularities at high latitudes

    International Nuclear Information System (INIS)

    Greenwald, R.A.

    1983-01-01

    This chapter considers the mechanisms by which electron density irregularities may be generated in the high latitude ionosphere and the techniques through which they are observed with ground base radars. The capabilities of radars used for studying these irregularities are compared with the capabilities of radars used for incoherent scatter measurements. The use of irregularity scatter techniques for dynamic studies of larger scale structured phenomena is discussed. Topics considered include E-region irregularities, observations with auroral radars, plasma drifts associated with a westward travelling surge, and ionospheric plasma motions associated with resonant waves. It is shown why high latitude F-region irregularity studies must be made in the HF frequency band (3-30 MHz). The joint use of the European Incoherent Scatter Association (EISCAT), STARE and SAFARI facilities is examined, and it is concluded that the various techniques will enhance each other and provide a better understanding of the various processes being studied

  7. Diagnosis of exposure to chemical warfare agents: An essential tool to counteract chemical terrorism

    NARCIS (Netherlands)

    Noort, D.; Schans, M.J. van der; Bikker, F.J.; Benschop, H.P.

    2009-01-01

    Methods to analyze chemical warfare agents (CW-agents) and their decomposition products in environmental samples were developed over the last decades. In contrast herewith, procedures for analysis in biological samples have only recently been developed. Retrospective detection of exposure to

  8. [Comparision of Different Methods of Area Measurement in Irregular Scar].

    Science.gov (United States)

    Ran, D; Li, W J; Sun, Q G; Li, J Q; Xia, Q

    2016-10-01

    To determine a measurement standard of irregular scar area by comparing the advantages and disadvantages of different measurement methods in measuring same irregular scar area. Irregular scar area was scanned by digital scanning and measured by coordinate reading method, AutoCAD pixel method, Photoshop lasso pixel method, Photoshop magic bar filled pixel method and Foxit PDF reading software, and some aspects of these methods such as measurement time, repeatability, whether could be recorded and whether could be traced were compared and analyzed. There was no significant difference in the scar areas by the measurement methods above. However, there was statistical difference in the measurement time and repeatability by one or multi performers and only Foxit PDF reading software could be traced back. The methods above can be used for measuring scar area, but each one has its advantages and disadvantages. It is necessary to develop new measurement software for forensic identification. Copyright© by the Editorial Department of Journal of Forensic Medicine

  9. Irregular flowering patterns in terrestrial orchids: theories vs. empirical data

    Directory of Open Access Journals (Sweden)

    P. Kindlmann

    2001-11-01

    Full Text Available Empirical data on many species of terrestrial orchids suggest that their between-year flowering pattern is extremely irregular and unpredictable. A long search for the reason has hitherto proved inconclusive. Here we summarise and critically review the hypotheses that were put forward as explanations of this phenomenon: irregular flowering was attributed to costs associated with sexual reproduction, to herbivory, or to the chaotic behaviour of the system represented by difference equations describing growth of the vegetative and reproductive organs. None of these seems to explain fully the events of a transition from flowering one year to sterility or absence the next year. Data on the seasonal growth of leaves and inflorescence of two terrestrial orchid species, Epipactis albensis and Dactylorhiza fuchsii and our previous results are then used here to fill gaps in what has been published until now and to test alternative explanations of the irregular flowering patterns of orchids.

  10. New prospective 4D-CT for mitigating the effects of irregular respiratory motion

    Science.gov (United States)

    Pan, Tinsu; Martin, Rachael M.; Luo, Dershan

    2017-08-01

    Artifact caused by irregular respiration is a major source of error in 4D-CT imaging. We propose a new prospective 4D-CT to mitigate this source of error without new hardware, software or off-line data-processing on the GE CT scanner. We utilize the cine CT scan in the design of the new prospective 4D-CT. The cine CT scan at each position can be stopped by the operator when an irregular respiration occurs, and resumed when the respiration becomes regular. This process can be repeated at one or multiple scan positions. After the scan, a retrospective reconstruction is initiated on the CT console to reconstruct only the images corresponding to the regular respiratory cycles. The end result is a 4D-CT free of irregular respiration. To prove feasibility, we conducted a phantom and six patient studies. The artifacts associated with the irregular respiratory cycles could be removed from both the phantom and patient studies. A new prospective 4D-CT scanning and processing technique to mitigate the impact of irregular respiration in 4D-CT has been demonstrated. This technique can save radiation dose because the repeat scans are only at the scan positions where an irregular respiration occurs. Current practice is to repeat the scans at all positions. There is no cost to apply this technique because it is applicable on the GE CT scanner without new hardware, software or off-line data-processing.

  11. Observations of inner plasmasphere irregularities with a satellite-beacon radio-interferometer array

    International Nuclear Information System (INIS)

    Jacobson, A.R.; Hoogeveen, G.; Carlos, R.C.; Wu, G.; Fejer, B.G.; Kelley, M.C.

    1996-01-01

    A radio-interferometer array illuminated by 136-MHz beacons of several geosynchronous satellites has been used to study small (≥10 13 m -2 ) transient disturbances in the total electron content along the lines of sight to the satellites. High-frequency (f>3 mHz) electron content oscillations are persistently observed, particularly during night and particularly during geomagnetically disturbed periods. The oscillations move across the array plane at speeds in the range 200 endash 2000 m/s, with propagation azimuths that are strongly peaked in lobes toward the western half-plane. Detailed analysis of this azimuth behavior, involving comparison between observations on various satellite positions, indicates compellingly that the phase oscillations originate in radio refraction due to geomagnetically aligned plasma density perturbations in the inner plasmasphere. The motion of the phase perturbations across the array plane is caused by EXB drift of the plasma medium in which the irregularities are embedded. We review the statistics of 2.5 years of around-the-clock data on the local time, magnetic disturbance, seasonal, and line-of-sight variations of these observed irregularities. We compare the irregularities close-quote inferred electrodynamic drifts to what is known about midlatitude plasma drift from incoherent scatter. Finally, we show in detail how the observation of these irregularities provides a unique and complementary monitor of inner plasmasphere irregularity incidence and zonal drift.copyright 1996 American Geophysical Union

  12. Hybrid Warfare Dilemmas in the Middle Colonies during the American Revolution

    Science.gov (United States)

    2017-05-25

    north.51 Washington urged Lee “to push for Philadelphia. The force I have with me is infinitely ...would attend the passage of the River by a march through Jersey,” he wrote, “I propose to invade Pennsylvania by sea , and from this arrangement...Hybrid Warfare Dilemmas in the Middle Colonies during the American Revolution A Monograph by MAJ William C. Murray II US Army

  13. Comparison of Selected Methods for Individual Decontamination of Chemical Warfare Agents

    OpenAIRE

    Tomas Capoun; Jana Krykorkova

    2014-01-01

    This study addresses the individual decontamination of chemical warfare agents (CWA) and other hazardous substances. The individual decontamination applies to contaminated body surfaces, protective clothing and objects immediately after contamination, performed individually or by mutual assistance using prescribed or improvised devices. The article evaluates the importance of individual decontamination, security level for Fire and Rescue Service Units of the Czech Republic (FRS CR) and demons...

  14. Influence of long-wavelength track irregularities on the motion of a high-speed train

    Science.gov (United States)

    Hung, C. F.; Hsu, W. L.

    2018-01-01

    Vertical track irregularities over viaducts in high-speed rail systems could be possibly caused by concrete creep if pre-stressed concrete bridges are used. For bridge spans that are almost uniformly distributed, track irregularity exhibits a near-regular wave profile that excites car bodies as a high-speed train moves over the bridge system. A long-wavelength irregularity induces low-frequency excitation that may be close to the natural frequencies of the train suspension system, thereby causing significant vibration of the car body. This paper investigates the relationship between the levels of car vibration, bridge vibration, track irregularity, and the train speed. First, this study investigates the vibration levels of a high-speed train and bridge system using 3D finite-element (FE) transient dynamic analysis, before and after adjustment of vertical track irregularities by means of installing shimming plates under rail pads. The analysis models are validated by in situ measurements and on-board measurement. Parametric studies of car body vibration and bridge vibration under three different levels of track irregularity at five train speeds and over two bridge span lengths are conducted using the FE model. Finally, a discontinuous shimming pattern is proposed to avoid vehicle suspension resonance.

  15. Synchronizing data from irregularly sampled sensors

    Science.gov (United States)

    Uluyol, Onder

    2017-07-11

    A system and method include receiving a set of sampled measurements for each of multiple sensors, wherein the sampled measurements are at irregular intervals or different rates, re-sampling the sampled measurements of each of the multiple sensors at a higher rate than one of the sensor's set of sampled measurements, and synchronizing the sampled measurements of each of the multiple sensors.

  16. A Bandwidth-Optimized Multi-Core Architecture for Irregular Applications

    Energy Technology Data Exchange (ETDEWEB)

    Secchi, Simone; Tumeo, Antonino; Villa, Oreste

    2012-05-31

    This paper presents an architecture template for next-generation high performance computing systems specifically targeted to irregular applications. We start our work by considering that future generation interconnection and memory bandwidth full-system numbers are expected to grow by a factor of 10. In order to keep up with such a communication capacity, while still resorting to fine-grained multithreading as the main way to tolerate unpredictable memory access latencies of irregular applications, we show how overall performance scaling can benefit from the multi-core paradigm. At the same time, we also show how such an architecture template must be coupled with specific techniques in order to optimize bandwidth utilization and achieve the maximum scalability. We propose a technique based on memory references aggregation, together with the related hardware implementation, as one of such optimization techniques. We explore the proposed architecture template by focusing on the Cray XMT architecture and, using a dedicated simulation infrastructure, validate the performance of our template with two typical irregular applications. Our experimental results prove the benefits provided by both the multi-core approach and the bandwidth optimization reference aggregation technique.

  17. China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence

    Directory of Open Access Journals (Sweden)

    Magnus Hjortdal

    2011-01-01

    Full Text Available This article presents three reasons for states to use cyber warfare and shows that cyberspace is—and will continue to be—a decisive element in China's strategy to ascend in the international system. The three reasons are: deterrence through infiltration of critical infrastructure; military technological espionage to gain military knowledge; and industrial espionage to gain economic advantage. China has a greater interest in using cyberspace offensively than other actors, such as the United States, since it has more to gain from spying on and deterring the United States than the other way around. The article also documents China's progress in cyber warfare and shows how it works as an extension of its traditional strategic thinking and the current debate within the country. Several examples of cyber attacks traceable to China are also presented. This includes cyber intrusions on a nuclear arms laboratory, attacks on defense ministries (including the Joint Strike Fighter and an airbase and the U.S. electric grid, as well as the current Google affair, which has proved to be a small part of a broader attack that also targeted the U.S. Government. There are, however, certain constraints that qualify the image of China as an aggressive actor in cyberspace. Some believe that China itself is the victim of just as many attacks from other states. Furthermore, certain actors in the United States and the West have an interest in overestimating China's capabilities in cyberspace in order to maintain their budgets.

  18. Improving Blood Monitoring of Enzymes as Biomarkers of Risk from Anticholinergic Pesticides and Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wilson, Barry W

    2006-01-01

    Blood biomarkers are an important way to monitor exposure to anticholinergic pesticides and chemical warfare agents and to establish whether some personnel are at greater risk than others from exposure...

  19. Improving Blood Monitoring of Enzymes as Biomarkers of Risk from Anticholinergic Pesticides and Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wilson, Barry W

    2005-01-01

    Blood biomarkers are an important way to monitor exposure to anticholinergic pesticides and chemical warfare agents and to establish whether some personnel are at greater risk than others from exposure...

  20. Uniform irradiation of irregularly shaped cavities for photodynamic therapy.

    Science.gov (United States)

    Rem, A I; van Gemert, M J; van der Meulen, F W; Gijsbers, G H; Beek, J F

    1997-03-01

    It is difficult to achieve a uniform light distribution in irregularly shaped cavities. We have conducted a study on the use of hollow 'integrating' moulds for more uniform light delivery of photodynamic therapy in irregularly shaped cavities such as the oral cavity. Simple geometries such as a cubical box, a sphere, a cylinder and a 'bottle-neck' geometry have been investigated experimentally and the results have been compared with computed light distributions obtained using the 'radiosity method'. A high reflection coefficient of the mould and the best uniform direct irradiance possible on the inside of the mould were found to be important determinants for achieving a uniform light distribution.

  1. Post-midnight equatorial irregularity distributions and vertical drift velocity variations during solstices

    Science.gov (United States)

    Su, S.-Y.; Liu, C. H.; Chao, C.-K.

    2018-04-01

    Longitudinal distributions of post-midnight equatorial ionospheric irregularity occurrences observed by ROCSAT-1 (1st satellite of the Republic of China) during moderate to high solar activity years in two solstices are studied with respect to the vertical drift velocity and density variations. The post-midnight irregularity distributions are found to be similar to the well-documented pre-midnight ones, but are different from some published distributions taken during solar minimum years. Even though the post-midnight ionosphere is sinking in general, longitudes of frequent positive vertical drift and high density seems to coincide with the longitudes of high irregularity occurrences. Large scatters found in the vertical drift velocity and density around the dip equator in different ROCSAT-1 orbits indicate the existence of large and frequent variations in the vertical drift velocity and density that seem to be able to provide sufficient perturbations for the Rayleigh-Taylor (RT) instability to cause the irregularity occurrences. The need of seeding agents such as gravity waves from atmospheric convective clouds to initiate the Rayleigh-Taylor instability may not be necessary.

  2. Attacking the infrastructure: exploring potential uses of offensive information warfare

    OpenAIRE

    Elam, Donald Emmett.

    1996-01-01

    The world has entered the Third Wave; it has entered the Information Age. One of the fundamentals of this paradigm shift is the fact that information is power. The side that controls information more effectively will be victorious. Thus, countries and militaries must change their mentality in order to survive. A new form of conflict, Information Warfare, has been born. This new discipline is large, dynamic, and complex. The need exists for education among military officers and other concerned...

  3. Breaking Down Anonymity: Digital surveillance on irregular migrants in Germany and the Netherlands

    NARCIS (Netherlands)

    D.W.J. Broeders (Dennis)

    2009-01-01

    textabstractThe presence of irregular migrants causes a tough problem for policy makers. Political and popular aversion against the presence of irregular migrants has mounted in most West-European societies for years, yet their presence remains. Their exact numbers are obviously unknown - only

  4. (Review of) Reno, William. 2011. Warfare in Independent Africa. Cambridge: Cambridge University Press

    DEFF Research Database (Denmark)

    Hagmann, Tobias

    2013-01-01

    Warfare in Independent Africa is Reno’s bold attempt to analyze the modern history of African insurgencies. The book tackles this task through the prism of five generations of rebel, which left their mark on the continent; anti-colonial rebels, majority rule rebels, reform rebels, warlord rebels ...... and parochial rebels....

  5. Emerging Threat to America: Non-State Entities Fighting Fourth Generation Warfare in Mexico

    Science.gov (United States)

    2010-09-01

    warfare in Juarez, Mexico contrasts with the “peaceful” cities of Ciudad Acuña and Piedras Negras controlled by the Zetas who demonstrate 4GW tactics...Vulliamy, 2009). Within the cities of Acuna and Piedra Negras where one Pack Virus (the Zetas) has effective control of these limited geographic

  6. Simultaneous radar and spaced receiver VHF scintillation observations of ESF irregularities

    Directory of Open Access Journals (Sweden)

    D. Tiwari

    2006-07-01

    Full Text Available Simultaneous observations of equatorial spread F (ESF irregularities made on 10 nights during March-April 1998 and 1999, using an 18-MHz radar at Trivandrum (77° E, 8.5° N, dip 0.5° N and two spaced receivers recording scintillations on a 251-MHz signal at Tirunelveli (77.8° E, 8.7° N, dip 0.4° N, have been used to study the evolution of Equatorial Spread F (ESF irregularities. Case studies have been carried out on the day-to-day variability in ESF structure and dynamics, as observed by 18-MHz radar, and with spaced receiver measurements of average zonal drift Vo of the 251-MHz radio wave diffraction pattern on the ground, random velocity Vc, which is a measure of random changes in the characteristics of scintillation-producing irregularities, and maximum cross-correlation CI of the spaced receivers signals. Results show that in the initial phase of plasma bubble development, the greater the maximum height of ESF irregularities responsible for the radar backscatter, the greater the decorrelation is of the spaced receiver scintillation signals, indicating greater turbulence. The relationship of the maximum spectral width derived from the radar observations and CI also supports this result.

  7. [Artificial cycle therapy of acupuncture and moxibustion for irregular menstruation].

    Science.gov (United States)

    Wu, Jie; Yang, Lijie; Chen, Yajie; Li, Qing; Chen, Lin

    2015-03-01

    Through the discussion on TCM physiological characters of females in follicular, ovulatory, luteal and menstrual phases and treatment principles, the clinical application of artificial cycle therapy of acupuncture and moxibustion was introduced for irregular menstruation and the typical cases were attached. It is suggested that the menstrual cycle follows the growth-consumption rule of yin, yang, qi and blood. The corresponding treatment principles should be applied in accordance with the change rule of menstrual cycle. Hence, it is worth to adopt the artificial cycle therapy of acupuncture and moxibustion for irregular menstruation in clinical application.

  8. Properties of the Irregular Satellite System around Uranus Inferred from K2, Herschel, and Spitzer Observations

    Science.gov (United States)

    Farkas-Takács, A.; Kiss, Cs.; Pál, A.; Molnár, L.; Szabó, Gy. M.; Hanyecz, O.; Sárneczky, K.; Szabó, R.; Marton, G.; Mommert, M.; Szakáts, R.; Müller, T.; Kiss, L. L.

    2017-09-01

    In this paper, we present visible-range light curves of the irregular Uranian satellites Sycorax, Caliban, Prospero, Ferdinand, and Setebos taken with the Kepler Space Telescope over the course of the K2 mission. Thermal emission measurements obtained with the Herschel/PACS and Spitzer/MIPS instruments of Sycorax and Caliban were also analyzed and used to determine size, albedo, and surface characteristics of these bodies. We compare these properties with the rotational and surface characteristics of irregular satellites in other giant planet systems and also with those of main belt and Trojan asteroids and trans-Neptunian objects. Our results indicate that the Uranian irregular satellite system likely went through a more intense collisional evolution than the irregular satellites of Jupiter and Saturn. Surface characteristics of Uranian irregular satellites seem to resemble the Centaurs and trans-Neptunian objects more than irregular satellites around other giant planets, suggesting the existence of a compositional discontinuity in the young solar system inside the orbit of Uranus.

  9. Properties of the Irregular Satellite System around Uranus Inferred from K2 , Herschel , and Spitzer Observations

    Energy Technology Data Exchange (ETDEWEB)

    Farkas-Takács, A.; Kiss, Cs.; Pál, A.; Molnár, L.; Szabó, Gy. M.; Hanyecz, O.; Sárneczky, K.; Szabó, R.; Marton, G.; Szakáts, R.; Kiss, L. L. [Konkoly Observatory, Research Centre for Astronomy and Earth Sciences, Hungarian Academy of Sciences, Konkoly Thege Miklós út 15-17, H-1121 Budapest (Hungary); Mommert, M. [Department of Physics and Astronomy, Northern Arizona University, P.O. Box 6010, Flagstaff, AZ 86011 (United States); Müller, T., E-mail: farkas.aniko@csfk.mta.hu [Max-Plank-Institut für extraterrestrsiche Pyhsik, Garching (Germany)

    2017-09-01

    In this paper, we present visible-range light curves of the irregular Uranian satellites Sycorax, Caliban, Prospero, Ferdinand, and Setebos taken with the Kepler Space Telescope over the course of the K2 mission. Thermal emission measurements obtained with the Herschel /PACS and Spitzer /MIPS instruments of Sycorax and Caliban were also analyzed and used to determine size, albedo, and surface characteristics of these bodies. We compare these properties with the rotational and surface characteristics of irregular satellites in other giant planet systems and also with those of main belt and Trojan asteroids and trans-Neptunian objects. Our results indicate that the Uranian irregular satellite system likely went through a more intense collisional evolution than the irregular satellites of Jupiter and Saturn. Surface characteristics of Uranian irregular satellites seem to resemble the Centaurs and trans-Neptunian objects more than irregular satellites around other giant planets, suggesting the existence of a compositional discontinuity in the young solar system inside the orbit of Uranus.

  10. On the total irregularity strength of caterpillar with each internal vertex has degree three

    Science.gov (United States)

    Indriati, Diari; Rosyida, Isnaini; Widodo

    2018-04-01

    Let G be a simple, connected and undirected graph with vertex set V and edge set E. A total k-labeling f:V \\cup E\\to \\{1,2,\\ldots,k\\} is defined as totally irregular total k-labeling if the weights of any two different both vertices and edges are distinct. The weight of vertex x is defined as wt(x)=f(x)+{\\sum }xy\\in Ef(xy), while the weight of edge xy is wt(xy)=f(x)+f(xy)+f(y). A minimum k for which G has totally irregular total k-labeling is mentioned as total irregularity strength of G and denoted by ts(G). This paper contains investigation of totally irregular total k-labeling and determination of their total irregularity strengths for caterpillar graphs with each internal vertex between two stars has degree three. The results are ts({S}n,3,n)=\\lceil \\frac{2n}{2}\\rceil, ts({S}n,3,3,n)=\\lceil \\frac{2n+1}{2}\\rceil and ts({S}n,3,3,3,n)=\\lceil \\frac{2n+2}{2}\\rceil for n > 4:

  11. The Need for a USAF Information Warfare(IW) Strategy for Military Operations Other Than War (MOOTW)

    National Research Council Canada - National Science Library

    Butler, Bradley

    1996-01-01

    .... Two areas having an impact on the answer to this question but not normally examined together are information warfare and the broad area of military operations short of large scale conventional combat...

  12. Unit Root Properties of Seasonal Adjustment and Related Filters: Special Cases

    Directory of Open Access Journals (Sweden)

    Bell William.R.

    2017-03-01

    Full Text Available Bell (2012 catalogued unit root factors contained in linear filters used in seasonal adjustment (model-based or from the X-11 method but noted that, for model-based seasonal adjustment, special cases could arise where filters could contain more unit root factors than was indicated by the general results. This article reviews some special cases that occur with canonical ARIMA model based adjustment in which, with some commonly used ARIMA models, the symmetric seasonal filters contain two extra nonseasonal differences (i.e., they include an extra (1 - B(1 - F. This increases by two the degree of polynomials in time that are annihilated by the seasonal filter and reproduced by the seasonal adjustment filter. Other results for canonical ARIMA adjustment that are reported in Bell (2012, including properties of the trend and irregular filters, and properties of the asymmetric and finite filters, are unaltered in these special cases. Special cases for seasonal adjustment with structural ARIMA component models are also briefly discussed.

  13. 11th Annual Mine Warfare Technology Symposium, May 6-8, 2014 - Monterey, CA

    OpenAIRE

    2014-01-01

    The Naval Postgraduate School (NPS), the Office of Naval Research (ONR), the Program Executive Office Littoral Combat Ships (PEO LCS), OPNAV (N95), and The Consortium for Robotics and Unmanned Systems Education and Research (CRUSER) are pleased to announce the ELEVENTH International Mine Warfare Technology Symposium in Monterey, California, May 6-8, 2014.

  14. From the Decomposition of Chemical Warfare Agents to the Decontamination of Cytostatics

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Šťastný, Martin; Janoš, P.; Mazanec, K.; Perez-Diaz, J. L.; Štenglová Netíková, I. R.

    2018-01-01

    Roč. 57, č. 6 (2018), s. 2114-2122 ISSN 0888-5885 EU Projects: European Commission(XE) 312804 - COUNTERFOG Grant - others:NATO(US) SPS984599 Program:Science for Peace and Security Institutional support: RVO:61388980 Keywords : Chemical warfare agents * Degradation * Metal oxide sorbents Subject RIV: CA - Inorganic Chemistry OBOR OECD: Inorganic and nuclear chemistry Impact factor: 2.843, year: 2016

  15. Quality of life in chemical warfare survivors with ophthalmologic injuries: the first results form Iran Chemical Warfare Victims Health Assessment Study.

    Science.gov (United States)

    Mousavi, Batool; Soroush, Mohammad Reza; Montazeri, Ali

    2009-01-19

    Iraq used chemical weapons extensively against the Iranians during the Iran-Iraq war (1980-1988). The aim of this study was to assess the health related quality of life (HRQOL) in people who had ophthalmologic complications due to the sulfur mustard gas exposure during the war. The Veterans and Martyrs Affair Foundation (VMAF) database indicated that there were 196 patients with severe ophthalmologic complications due to chemical weapons exposure. Of these, those who gave consent (n = 147) entered into the study. Quality of life was measured using the 36-item Short Form Health Survey (SF-36) and scores were compared to those of the general public. In addition logistic regression analysis was performed to indicate variables that contribute to physical and mental health related quality of life. The mean age of the patients was 44.8 (SD = 8.7) ranging from 21 to 75 years. About one-third of the cases (n= 50) reported exposure to chemical weapons more than once. The mean exposure duration to sulfur mustard gas was 21.6 years (SD = 1.2). The lowest scores on the SF-36 subscales were found to be: the role physical and the general health. Quality of life in chemical warfare victims who had ophthalmologic problems was significantly lower than the general public (P chemical warfare victims with ophthalmologic complications suffer from poor health related quality of life. It seems that the need for provision of health and support for this population is urgent. In addition, further research is necessary to measure health related quality of life in victims with different types of disabilities in order to support and enhance quality of life among this population.

  16. Zirconium doped nano-dispersed oxides of Fe, Al and Zn for destruction of warfare agents

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Houšková, Vendula; Bakardjieva, Snejana; Murafa, Nataliya; Maříková, Monika; Opluštil, F.; Němec, T.

    2010-01-01

    Roč. 61, č. 11 (2010), s. 1080-1088 ISSN 1044-5803 Institutional research plan: CEZ:AV0Z40320502 Keywords : warfare agents * nano-dispersed oxides * homogeneous hydrolysis Subject RIV: CA - Inorganic Chemistry Impact factor: 1.496, year: 2010

  17. The effect of earthquake on architecture geometry with non-parallel system irregularity configuration

    Science.gov (United States)

    Teddy, Livian; Hardiman, Gagoek; Nuroji; Tudjono, Sri

    2017-12-01

    Indonesia is an area prone to earthquake that may cause casualties and damage to buildings. The fatalities or the injured are not largely caused by the earthquake, but by building collapse. The collapse of the building is resulted from the building behaviour against the earthquake, and it depends on many factors, such as architectural design, geometry configuration of structural elements in horizontal and vertical plans, earthquake zone, geographical location (distance to earthquake center), soil type, material quality, and construction quality. One of the geometry configurations that may lead to the collapse of the building is irregular configuration of non-parallel system. In accordance with FEMA-451B, irregular configuration in non-parallel system is defined to have existed if the vertical lateral force-retaining elements are neither parallel nor symmetric with main orthogonal axes of the earthquake-retaining axis system. Such configuration may lead to torque, diagonal translation and local damage to buildings. It does not mean that non-parallel irregular configuration should not be formed on architectural design; however the designer must know the consequence of earthquake behaviour against buildings with irregular configuration of non-parallel system. The present research has the objective to identify earthquake behaviour in architectural geometry with irregular configuration of non-parallel system. The present research was quantitative with simulation experimental method. It consisted of 5 models, where architectural data and model structure data were inputted and analyzed using the software SAP2000 in order to find out its performance, and ETAB2015 to determine the eccentricity occurred. The output of the software analysis was tabulated, graphed, compared and analyzed with relevant theories. For areas of strong earthquake zones, avoid designing buildings which wholly form irregular configuration of non-parallel system. If it is inevitable to design a

  18. Irregular Warfare: Brazil’s Fight Against Criminal Urban Guerrillas

    Science.gov (United States)

    2009-09-01

    reflex action on the part of the urban guerrilla. To learn how to shoot and have good aim, the urban guerrilla must train himself systematically, uti ... pharmacist , or who simply has had first-aid training is a necessity in modern guerrilla struggles. A small manual of first aid for urban guerrillas, 76 JSOU

  19. Institutional Challenges to Developing Metrics of Success in Irregular Warfare

    Science.gov (United States)

    2011-12-01

    develop national policy and strategic goals. If an IW conflict has a 11 Richard L. Daft , Essentials...13 Richard L. Daft , Essentials of Organization Theory and Design (Mason, OH:Thomson Learning, 2003), 52. 14 Henry...37 Richard L. Daft , Essentials of Organization Theory & Design (Mason, OH: Thompson Learning, 2003), 52

  20. IDA Publications on Irregular Warfare: A Bibliography 2000 - Fall 2008

    Science.gov (United States)

    2008-12-01

    reconstruction effort. D-3550 Non-standard publication UNCLASSIFIED No URL No DTIC accession no. 2008 Memetics – Overview and Baseline Models This report...documents key notions and ideas that collectively com- prise what is known as meme theory or memetics – an emerging area of research for potential...and the dynamics of bio- logical systems as a platform for developing mathematical modes in memetics . D-3599 IDA CRP UNCLASSIFIED Approved for

  1. The Filipino Way of War: Irregular Warfare through the Centuries

    Science.gov (United States)

    2011-12-01

    exercised liberalism during his tenure. He encouraged the freedom of speech, abolished the censorship of the press, and most importantly, dealt with...Matalam, a Cotabato politician, to organize the Mindanao Independence Movement (MIM). Hundreds of MIM members underwent training in Malaysia .339 This...or through pilferage by AFP scalawags. The support from known sympathetic countries (e.g., Libya, Saudi Arabia, and Malaysia ) gained by the MILF in

  2. Technology Strategy in Irregular Warfare: High-Tech Versus Right-Tech

    Science.gov (United States)

    2015-12-01

    Markov and Zaloga, Soviet/Russian Armor and Artillery Design Practices: 1945 to Present, 1–17, chapter 6. Christopher F. Foss, Jane’s Armour and...Artillery 1984–85 (New York, NY: Jane’s, 1985), 580–594. 145 Foss, Jane’s Armour and Artillery 1984–85, 685. 146 Andrius Genys, 2S9 Nona-s 120-mm self...Soviet/Russian Armor and Artillery Design Practices: 1945 to Present, V-32. 148 Foss, Jane’s Armour and Artillery 1984–85, 464–468. 57 The BM-21

  3. Traditional and Irregular Warfare: A Flawed Concept for Categorizing Conflict

    Science.gov (United States)

    2009-05-18

    cultures, religious beliefs , economic conditions, available resources, wealth and poverty, access to information, levels and...Boulder, CO: Westview Press 1994), 187. 11 This assessment is based on Taoism , a Chinese philosophy that was becoming popular at about the time Art of...who openly challenged beliefs about the nature of the universe. Some even challenged the role of religion and the various gods of the time. This was

  4. Innovative Practices for Special Warfare

    Science.gov (United States)

    2015-12-01

    stealing customers from traditional quick service fast food restaurants .243 Innovations in restaurant design, food preparation and distribution, are...and diverse organizations to reap the benefits of loyalty and connectivity that small teams enjoy.152 To create the linkages, JSOC strove to dissolve...those new to a field. Garage startups generate many disruptive innovations because “they are not tied to any specific customer base, product design

  5. Special Warfare: A Selected Bibliography.

    Science.gov (United States)

    1983-10-01

    Strategy. Boston: Routledge & Kegan Paul, 1981. (U162 .A78) 8. Atlantic Research Corporation. Georgetown Research Project. A Histori- cal Survey of...Corps Gazette. The Guerrillp. and How to Fight Him: Selections, ed. by T.N. Greene . Nev ’ork: Praeger, 1962. (U240 K33) 108. Martic, Milos. Insurrection

  6. Impact Assessment In Special Warfare

    Science.gov (United States)

    2017-12-01

    Systematic Review and Meta-analysis,” Journal of Research in Crime and Delinquency 52, no. 4 (2015). 27 additional rigorous evaluations” of its... statistical methods, can simulate the randomized assignment into treatment and control and improve understanding of cause and effect. Lyall, Blair...demographic information and the geospatial location of each interview. I used the R statistical program to process the original survey data, filter for

  7. Special Operations And Cyber Warfare

    Science.gov (United States)

    2016-12-01

    Cyber weapons have multiple functions and can be used for espionage or OPE. It is important to highlight the similarities between the intelligence...James Clapper, Director of National Intelligence, emphasized the importance of cyber operations as he identified cyber as the third major hazard facing...support the development of the capacity and capability of foreign security forces and their supporting institutions.”52 The DOD’s Cyber Strategy states

  8. An Assessment of the Effectiveness of Computer-based Training for Newly Commissioned Surface Warfare Division Officers

    National Research Council Canada - National Science Library

    Bowman, William R; Crawford, Alice M; Mehay, Stephen; Stoker, Carol; Paynter, Robert

    2008-01-01

    ...) on-board an officer's ship. The study relied on a variety of analytical techniques, including a literature review of CBT and OJT training, interviews and focus groups with junior and senior surface warfare officers...

  9. Plasma flame for mass purification of contaminated air with chemical and biological warfare agents

    International Nuclear Information System (INIS)

    Uhm, Han S.; Shin, Dong H.; Hong, Yong C.

    2006-01-01

    An elimination of airborne simulated chemical and biological warfare agents was carried out by making use of a plasma flame made of atmospheric plasma and a fuel-burning flame, which can purify the interior air of a large volume in isolated spaces such as buildings, public transportation systems, and military vehicles. The plasma flame generator consists of a microwave plasma torch connected in series to a fuel injector and a reaction chamber. For example, a reaction chamber, with the dimensions of a 22 cm diameter and 30 cm length, purifies an airflow rate of 5000 lpm contaminated with toluene (the simulated chemical agent) and soot from a diesel engine (the simulated aerosol for biological agents). Large volumes of purification by the plasma flame will free mankind from the threat of airborne warfare agents. The plasma flame may also effectively purify air that is contaminated with volatile organic compounds, in addition to eliminating soot from diesel engines as an environmental application

  10. Electronic Warfare (EW) Historical Perspectives and Its Relationship to Information Operations (IO) - Considerations for Turkey

    Science.gov (United States)

    2006-09-01

    Information Operations IW Information Warfare JDAM Joint Direct Attack Munition JRFL Joint Restricted Frequency List JSTARS Joint...through the preparation of the joint restricted frequency list (JRFL), which includes taboo, guarded and protected frequencies. The EC-130H Compass Call

  11. Evaluation of irregular menses in perimenarcheal girls: a pilot study.

    Science.gov (United States)

    Browner-Elhanan, Karen J; Epstein, Jonathan; Alderman, Elizabeth M

    2003-12-01

    Acyclic vaginal bleeding in girls within three years of menarche is most commonly attributed to an immature hypothalamic-pituitary-ovarian axis. Assuming this diagnosis may preclude the practitioner from performing more definitive studies and thereby diagnosing other, treatable causes of menstrual irregularities. A retrospective chart review of 178 girls presenting to an inner-city hospital-based adolescent clinic within three years of menarche was performed. Personal and family medical and menarcheal history was assessed, and findings on physical and laboratory examination performed were evaluated. Of the 178 girls still perimenarcheal at presentation, 47 were the focus of this study. Of these, 39 had no significant findings on physical examination, while 3 had signs of functional ovarian hyperandrogenism (FOH) including obesity, hirsutism, and moderate acne with corresponding LH/FSH ratios>3, although pelvic ultrasound examination revealed normal ovaries. Four of the 39 patients with normal physical exams had LH/FSH testing done, and 1 of the 4 had an abnormal LH/FSH ratio, indicating possible FOH. Two of the 47 patients were pregnant. Other laboratory abnormalities included microcytic, hypochromic anemia in patients, and an elevated Erythrocyte Sedimentation Rate in a patient later diagnosed with a rheumatologic disorder. Those perimenarcheal girls presenting with irregular menses and findings including obesity, acne, or pallor, were likely to have treatable causes of menstrual irregularities. In one of the four girls with a normal physical examination, hormonal testing indicated possible FOH, thus suggesting that hormonal evaluation of perimenarcheal girls with menstrual irregularities may be justified, as it may reveal previously unsuspected pathology.

  12. Research on making reactor buildings of irregular plan and elevation forms aseismatic

    International Nuclear Information System (INIS)

    Okawa, Izuru; Yamauchi, Yasuyuki

    1997-01-01

    The necessity of pursuing the possibility of irregular form buildings as the condition of location for construction is limited, and the rational and economical arrangement of equipment and piping is considered. In order to know the effect that irregular forms exert to the aseismatic ability of buildings, it is indispensable to develop the program for precision three-dimensional elastoplastic analysis at the time of earthquakes. As the means of solving the problem, the introduction of seismic insulation structure is conceivable. The investigation of seismic insulator and its modeling and the analysis of earthquake response were carried out, and the irregular form and the effect of seismic insulation were investigated, and the results of vibration test using test specimens were summarized. The concrete items of investigation were the characteristics of input earthquake motion, the techniques of analysis, the parametric study taking the input and various characteristics of buildings in consideration, and the synthetic assessment. The vibration table experiment and the static loading experiment for the purpose of grasping the response behavior in the case of irregular form of wall type and seismic insulation type structures were carried out, and the results are reported. (K.I.)

  13. Irregular analytical errors in diagnostic testing - a novel concept.

    Science.gov (United States)

    Vogeser, Michael; Seger, Christoph

    2018-02-23

    In laboratory medicine, routine periodic analyses for internal and external quality control measurements interpreted by statistical methods are mandatory for batch clearance. Data analysis of these process-oriented measurements allows for insight into random analytical variation and systematic calibration bias over time. However, in such a setting, any individual sample is not under individual quality control. The quality control measurements act only at the batch level. Quantitative or qualitative data derived for many effects and interferences associated with an individual diagnostic sample can compromise any analyte. It is obvious that a process for a quality-control-sample-based approach of quality assurance is not sensitive to such errors. To address the potential causes and nature of such analytical interference in individual samples more systematically, we suggest the introduction of a new term called the irregular (individual) analytical error. Practically, this term can be applied in any analytical assay that is traceable to a reference measurement system. For an individual sample an irregular analytical error is defined as an inaccuracy (which is the deviation from a reference measurement procedure result) of a test result that is so high it cannot be explained by measurement uncertainty of the utilized routine assay operating within the accepted limitations of the associated process quality control measurements. The deviation can be defined as the linear combination of the process measurement uncertainty and the method bias for the reference measurement system. Such errors should be coined irregular analytical errors of the individual sample. The measurement result is compromised either by an irregular effect associated with the individual composition (matrix) of the sample or an individual single sample associated processing error in the analytical process. Currently, the availability of reference measurement procedures is still highly limited, but LC

  14. Rocket observation of electron density irregularities in the lower E region

    International Nuclear Information System (INIS)

    Watanabe, Yuzo; Nakamura, Yoshiharu; Amemiya, Hiroshi.

    1990-01-01

    Local ionospheric electron density irregularities in the scale size of 3 m to 300 m have been measured on the ascending path from 74 km to 93 km by a fix biased Langmuir probe on board the S-310-16 sounding rocket. The rocket was launched at 22:40:00 on February 1, 1986 from Kagoshima Space Center in Japan. It is found from frequency analysis of the data that the spectral index of the irregularities is 0.9 to 1.8 and the irregularity amplitude is 1 to 15 %. The altitude where the amplitude reaches its maximum is 88 km. The generation mechanism of these irregularities is explained by the neutral turbulence theory, which indicates that the spectral index is 5/3 and has been confirmed by a chemical release experiment using rockets over India to be valid up to about 110 km. From frequency analysis of the data observed during the descent in the lower E region, we have found that the rocket-wake effect becomes larger when the probe is situated near the edge of the rocket-wake, and that this is also the case even when the rocket-wake effect does not clearly appear in the DC current signal which approximately changes in proportion to the electron density, where the probe is completely situated inside the rocket-wake region. (author)

  15. On Pecuniary Resiliency, Early Warning, and Market Imitation under Unrestricted Warfare

    Science.gov (United States)

    2015-09-17

    combatants, and civilians. The term was first used by American analysts in 1989 as Lind et . al . [37] to describe the return of warfare to a decentralized...Century. New York: Free, 1988 . Print. [22] Gould , Stephen, and Eldredge Niles. “Punctuated Equilibria: The Tempo and Mode of Evolution Reconsidered...able to take a punch.” He specifically argues that Al Qaeda and other terrorist organizations have limited resources to plan and carry out attacks and

  16. Dominant Land Forces for 21st Century Warfare

    National Research Council Canada - National Science Library

    Degen, Edmund J

    2007-01-01

    The most likely threats over the near and mid terms are irregular forces operating predominantly on the ground in complex urban environments, with the potential of being equipped with weapons of mass destruction...

  17. An Empirical Examination of the Warfare Metaphor with Respect to Pre-Service Elementary Teachers

    Science.gov (United States)

    Cobern, William W.; Loving, Cathleen C.; Davis, Edward B.; Terpstra, Jeff

    2013-01-01

    Since its origination in the late nineteenth century, the warfare metaphor has been used to characterize the relationship between science and religion, especially orthodox Christianity. Though thoroughly discredited by historians of science, the ideological descendants of Thomas Huxley, who spoke of science in quasi-religious terms, have kept the…

  18. Reactive skin decontamination lotion (RSDL) for the decontamination of chemical warfare agent (CWA) dermal exposure.

    Science.gov (United States)

    Schwartz, M D; Hurst, C G; Kirk, M A; Reedy, S J D; Braue, E H

    2012-08-01

    Rapid decontamination of the skin is the single most important action to prevent dermal absorption of chemical contaminants in persons exposed to chemical warfare agents (CWA) and toxic industrial chemicals (TICs) as a result of accidental or intentional release. Chemicals on the skin may be removed by mechanical means through the use of dry sorbents or water. Recent interest in decontamination systems which both partition contaminants away from the skin and actively neutralize the chemical has led to the development of several reactive decontamination solutions. This article will review the recently FDA-approved Reactive Skin Decontamination Lotion (RSDL) and will summarize the toxicity and efficacy studies conducted to date. Evidence of RSDL's superior performance against vesicant and organophosphorus chemical warfare agents compared to water, bleach, and dry sorbents, suggests that RSDL may have a role in mass human exposure chemical decontamination in both the military and civilian arenas.

  19. Irregular Polyomino-Shaped Subarrays for Space-Based Active Arrays

    Directory of Open Access Journals (Sweden)

    R. J. Mailloux

    2009-01-01

    Full Text Available This paper presents new results showing the application of polyomino-based subarrays to limited field of view and wideband, wide-angle scanning. This technology can reduce the number of phase controls in arrays used for limited sector coverage or the number of time delay devices for wideband radar or communications, and so can reduce the cost of space-based active arrays. We concentrate on the wideband application. Results are presented by comparing the gain and peak sidelobe results of irregular polyomino subarray-based arrays with those of rectangular subarrays. It is shown that using irregular polyomino subarrays can result in a major decrease in sidelobes while presenting, in most cases, only a few tenths of a dB gain reduction compared to rectangular subarrays.

  20. Third-order theory for multi-directional irregular waves

    DEFF Research Database (Denmark)

    Madsen, Per A.; Fuhrman, David R.

    2012-01-01

    A new third-order solution for multi-directional irregular water waves in finite water depth is presented. The solution includes explicit expressions for the surface elevation, the amplitude dispersion and the vertical variation of the velocity potential. Expressions for the velocity potential at...