WorldWideScience

Sample records for network command munition

  1. 2007 Armaments Technology Seminar and Exhibition - Joint Munitions and Lethality Life Cycle Management Command

    Science.gov (United States)

    2007-06-13

    Launcher Grenades Non Lethal Ammo - MCCM - 40 mm - 12 gauge - NL Grenades - Mk19 Munitions Special Projects - RAMS - MI RAMS - GDS - TD -SYDET - SOF Demo Kit...M303) MI RAMS Transmitter XM27 Type “A” Receiver XM39 MI RAMS Transmitter w/ Auxiliary Battery Pack (M6) Type “B” Receiver XM40 GDS TD SYDET...Precision Armaments Technology Directorate AMSRD -AAR- AEP W. Smith Explosive Ordnance Disposal Technology Directorate AMSRD-AAR-AEX J. Wu

  2. The Arecibo Remote Command Center Network

    Science.gov (United States)

    Crawford, Fronefield; Jenet, Fredrick; Christy, Brian; Dolch, Timothy; Guerreo-Miller, Alma; Quetschke, Volker; Siemens, Xavier; Smith, Tristan L.; Stovall, Kevin; Wade, Leslie; Wade, Madeline

    2017-01-01

    The Arecibo Remote Command Center (ARCC) network is an education, research, and training program for undergraduates, graduate students, and postdocs spanning multiple institutions. ARCC members use the Arecibo 305-m radio telescope to remotely conduct pulsar survey and timing observations, and they search the data collected to find new radio pulsars using a custom pulsar candidate viewer. Timing data are used in the ongoing NANOGrav search for gravitational waves using pulsar timing arrays. The ARCC program also serves as an effective introduction for students to radio pulsar research. Currently ARCC has seven institutional members and dozens of participants. Our poster provides some general background about the ARCC program at Franklin and Marshall College and serves as a catalyst for in-person conversations and discussions about ARCC, including the benefits of joining the ARCC network and some specifics on how to join.

  3. NVESD's battlefield simulation of unattended sensors and munitions

    Science.gov (United States)

    Harkrider, Susan; Self, Mid; Martinez, Ivan

    2005-05-01

    This paper describes the Comprehensive Munitions and Sensor Server (CMS2) simulation software, its representation of Unattended Ground Sensors (UGS), Intelligent Munition Systems (IMS) and mines, and its application to high visibility US Army programs. The Comprehensive Munitions and Sensor Server (CMS2) provides a high-fidelity representation of mines, Intelligent Munitions Systems (IMS), and Unattended Ground Sensors (UGS) to support a broad range of engineering and operational simulation applications. Mine types modeled by CMS2 include conventional anti-personnel and anti-tank, side attack, command activated and individual and networked smart munitions. Sensor technologies modeled include, but are not limited to, imaging IR, acoustic, seismic, and magnetic. Since the CMS2 software is predominantly implemented as parametric models and plug-in libraries, the sensors, munitions, mines and their components can be configured or even added at run time. CMS2 interfaces with an imaging sensor simulation and a Human-In-The-Loop (HITL) controller application that allows for the control of IMS and UGS systems simulated by CMS2. The controller, in conjunction with the imaging sensor simulation, provides static visible and infrared (IR) images of the target area of interest to the operator. CMS2 typically complements the OneSAF Testbed within force-on-force simulations. Because of its modularity and software reuse, the CMS2 simulation is utilized extensively to support programs such as TRADOC"s Unit of Action experimentation, Intelligent Munitions System (IMS), Tactical Unattended Ground Sensor (T-UGS), Networked Sensors for the Future Force (NSFF) program and the Future Combat Systems (FCS). This paper will describe how some of these programs are using CMS2 to support the development and acquisition of UGS and IMS technologies.

  4. Remotely Exploiting AT Command Attacks on ZigBee Networks

    Directory of Open Access Journals (Sweden)

    Ivan Vaccari

    2017-01-01

    Full Text Available Internet of Things networks represent an emerging phenomenon bringing connectivity to common sensors. Due to the limited capabilities and to the sensitive nature of the devices, security assumes a crucial and primary role. In this paper, we report an innovative and extremely dangerous threat targeting IoT networks. The attack is based on Remote AT Commands exploitation, providing a malicious user with the possibility of reconfiguring or disconnecting IoT sensors from the network. We present the proposed attack and evaluate its efficiency by executing tests on a real IoT network. Results demonstrate how the threat can be successfully executed and how it is able to focus on the targeted nodes, without affecting other nodes of the network.

  5. Network Enabled Operations: The Experiences of Senior Canadian Commanders

    Science.gov (United States)

    2006-03-31

    réseaux technologiques, et leur valeur les uns par rapport aux autres. Les commandants interrogés reconnaissent que les opérations actuelles nécessitent à...the best basis for CF transformation to build upon? • How does one go about creating an effective social network in joint and multinational...environments? • Is the presence or absence of an effective social network a factor in the success of an operation? • Was there any confusion evident

  6. Precision-Guided Munitions Effects Representation

    Science.gov (United States)

    2017-01-03

    Training Intervention Model IGT Iowa Gambling Task TRAC Training and Doctrine Command Analysis Center WCST Wisconsin Card Sorting Test F-1 ...requirements estimate generation, especially for high-cost low-density munitions like Excalibur. 15. SUBJECT TERMS Training intervention, cognitive...state, regret, neurophysiological measures, Wisconsin Card Sorting Test, Iowa Gambling Task 16. SECURITY CLASSIFICATION OF: Unclassified 17

  7. Network Centric Warfare, Command, and the Nature of War

    Science.gov (United States)

    2009-05-21

    80 Consequently, Frederick‘s army was the first into Silesia in 1740 and first into Saxony 1756.81 Preemption provided Frederick a great advantage in...refinement, of what is developing into a clearer picture of the essence of command. Eisenhower‘s circumstances are again unique; therefore, the analysis...differences, and construct a common picture ,‖ the advantages are unlikely to be that pronounced because understanding is not the same as developing a

  8. Munition Expenditure Model Verification: KWIK. Phase I.

    Science.gov (United States)

    1981-12-01

    environmental , and smoke plume behavior for each trial. 3. To compare and evaluate smoke munition expenditure calculations of the KWIK model from...Equipment Center ATTN: Technical Information Center Dr. Eugene W. Bierly Orlando, FL 32813 Director, Division of Atmos Sciences National Scinece Foundation...Meteorology Division Fort Monmouth, NJ 07703 AFGL/LY Hanscom AFB, MA 01731 Commander US Army Satellite Comm Agency The Environmental Research ATTN

  9. Using LTE Networks for UAV Command and Control Link: A Rural-Area Coverage Analysis

    DEFF Research Database (Denmark)

    Nguyen, Huan Cong; Amorim, Rafhael Medeiros de; Wigard, Jeroen

    2017-01-01

    In this paper we investigate the ability of Long-Term Evolution (LTE) network to provide coverage for Unmanned Aerial Vehicles (UAVs) in a rural area, in particular for the Command and Control (C2) downlink. The study takes into consideration the dependency of the large-scale path loss on the hei......In this paper we investigate the ability of Long-Term Evolution (LTE) network to provide coverage for Unmanned Aerial Vehicles (UAVs) in a rural area, in particular for the Command and Control (C2) downlink. The study takes into consideration the dependency of the large-scale path loss...

  10. Information Superiority/Battle Command (Network Centric Warfare Environment)

    Science.gov (United States)

    2004-06-01

    on the Move (BCOTM). To this end a multiplicity of subtasks have been articulated to include: 1) Evaluate future data radio, wireless , personal...Multinational Communcations Systems. Requirement for Dedicated All Weather Communications Relay platforms. Requirement for Higher level of Networking

  11. Insensitive Munitions Testing

    Data.gov (United States)

    Federal Laboratory Consortium — Insensitive Munitions Testing at RTC is conducted (IAW MILSTD-2105) at Test Area 4. Our engineers and technicians obtain data for hazards classification and safety...

  12. Traffic Command Gesture Recognition for Virtual Urban Scenes Based on a Spatiotemporal Convolution Neural Network

    Directory of Open Access Journals (Sweden)

    Chunyong Ma

    2018-01-01

    Full Text Available Intelligent recognition of traffic police command gestures increases authenticity and interactivity in virtual urban scenes. To actualize real-time traffic gesture recognition, a novel spatiotemporal convolution neural network (ST-CNN model is presented. We utilized Kinect 2.0 to construct a traffic police command gesture skeleton (TPCGS dataset collected from 10 volunteers. Subsequently, convolution operations on the locational change of each skeletal point were performed to extract temporal features, analyze the relative positions of skeletal points, and extract spatial features. After temporal and spatial features based on the three-dimensional positional information of traffic police skeleton points were extracted, the ST-CNN model classified positional information into eight types of Chinese traffic police gestures. The test accuracy of the ST-CNN model was 96.67%. In addition, a virtual urban traffic scene in which real-time command tests were carried out was set up, and a real-time test accuracy rate of 93.0% was achieved. The proposed ST-CNN model ensured a high level of accuracy and robustness. The ST-CNN model recognized traffic command gestures, and such recognition was found to control vehicles in virtual traffic environments, which enriches the interactive mode of the virtual city scene. Traffic command gesture recognition contributes to smart city construction.

  13. Command Filtered Adaptive Fuzzy Neural Network Backstepping Control for Marine Power System

    Directory of Open Access Journals (Sweden)

    Xin Zhang

    2014-01-01

    Full Text Available In order to retrain chaotic oscillation of marine power system which is excited by periodic electromagnetism perturbation, a novel command-filtered adaptive fuzzy neural network backstepping control method is designed. First, the mathematical model of marine power system is established based on the two parallel nonlinear model. Then, main results of command-filtered adaptive fuzzy neural network backstepping control law are given. And the Lyapunov stability theory is applied to prove that the system can remain closed-loop asymptotically stable with this controller. Finally, simulation results indicate that the designed controller can suppress chaotic oscillation with fast convergence speed that makes the system return to the equilibrium point quickly; meanwhile, the parameter which induces chaotic oscillation can also be discriminated.

  14. Missile/Munition Integration Facility

    Data.gov (United States)

    Federal Laboratory Consortium — A large complex contained within approximately 600 acres with security fencing, controlled access gates, and a munitions convoy access road. The complex is capable...

  15. Non-linear commands of DC to DC converters based on neural networks; Commandes non-lineaires des convertisseurs continu-continus a base de reseaux de neurones

    Energy Technology Data Exchange (ETDEWEB)

    Jammes, B. [Centre National de la Recherche Scientifique (CNRS), 31 - Toulouse (France). Laboratoire d`Analyse et d`Architecture des Systemes; Dragos, A. [Bucharest Univ. Politechnica (Romania)

    1998-11-01

    In this paper, artificial neural networks are used to elaborate non-linear control of the average output voltage of Buck and Boost converters. The training of the regulator is based on the adjustment technique used by indirect adaptative command structures. These techniques require a system model and performances of inputs/outputs and state models are compared. It is shown that this approach allows to generate non-linear regulators for the converters under study, but it is preferable to introduce some modifications in order to facilitate the training of the regulator. (J.S.) 4 refs.

  16. Mission Command in the Age of Network-Enabled Operations: Social Network Analysis of Information Sharing and Situation Awareness.

    Science.gov (United States)

    Buchler, Norbou; Fitzhugh, Sean M; Marusich, Laura R; Ungvarsky, Diane M; Lebiere, Christian; Gonzalez, Cleotilde

    2016-01-01

    A common assumption in organizations is that information sharing improves situation awareness and ultimately organizational effectiveness. The sheer volume and rapid pace of information and communications received and readily accessible through computer networks, however, can overwhelm individuals, resulting in data overload from a combination of diverse data sources, multiple data formats, and large data volumes. The current conceptual framework of network enabled operations (NEO) posits that robust networking and information sharing act as a positive feedback loop resulting in greater situation awareness and mission effectiveness in military operations (Alberts and Garstka, 2004). We test this assumption in a large-scale, 2-week military training exercise. We conducted a social network analysis of email communications among the multi-echelon Mission Command staff (one Division and two sub-ordinate Brigades) and assessed the situational awareness of every individual. Results from our exponential random graph models challenge the aforementioned assumption, as increased email output was associated with lower individual situation awareness. It emerged that higher situation awareness was associated with a lower probability of out-ties, so that broadly sending many messages decreased the likelihood of attaining situation awareness. This challenges the hypothesis that increased information sharing improves situation awareness, at least for those doing the bulk of the sharing. In addition, we observed two trends that reflect a compartmentalizing of networked information sharing as email links were more commonly formed among members of the command staff with both similar functions and levels of situation awareness, than between two individuals with dissimilar functions and levels of situation awareness; both those findings can be interpreted to reflect effects of homophily. Our results have major implications that challenge the current conceptual framework of NEO. In

  17. An Appraisal of Asia-Pacific Cities as Control and Command Centres Embedded in World City Network

    Directory of Open Access Journals (Sweden)

    Z. Li

    2017-08-01

    Full Text Available Since the globalization trend is proliferating at a staggering rate, world cities have emerged as the most dominant vanguard incorporated into global economy. Control and command function is one of the robust integral parts of world city formation, which is closely associated with the corporate headquarter status of some dominant multinational companies. Previous research works on this topic tend to concentrate on the Western Europe and North American arenas neglecting the Asia-Pacific region. Hence, the objective of this paper is to explore control and command functions of Asia-Pacific cities with reference to headquarters’ locations of multinational companies. The methodology will utilize the Forbes global 2000 dataset from the seminal study of GaWC research group, and apply the control and command center model and the interlocking city network model to discover the control and command index, as well as network connectivity of Asia-Pacific cities. Based upon the empirical study of this research, we could identify the hierarchical structure and spatial structure of Asia-Pacific world cities to emerge as some control and command centers embedded in world city network.

  18. Explosives Removal from Munitions Wastewaters

    Science.gov (United States)

    1975-01-01

    Rohm and Haas Company, Philadelphia, Pa., 19105 2 Background Generally, pollation in munitions plant waste water stems from washing and steam cleaning...290131 EXPLOSIVES REMOVAL FROM MUNITIONS WST- WATERS B. W. STEVENS, R. P. MCDONNELL ROHM. AND HAAS CO?*ANY, PHILAD2ELPHIA, PENNSYLVANIA R. K. PXDREN...operations. Waste water from a typical TNT manufacturing J21 plant may contain from 40 to 120 ppm of TNT and lesser aimounts of 2,4, DNT. K. Waste

  19. Human-Systems Integration (HSI) and the Network Integration Evaluations (NIEs), Part 3: Mitigating Cognitive Load in Network-Enabled Mission Command

    Science.gov (United States)

    2016-06-01

    in NIE CPs primarily involve ICTs . Levy and Murnane (2012) argue that the increasing use of ...require higher levels of mental ability as well as higher levels of education , training, and experience for effective use . In short, ICT insertions such...key aspects of cognitive load in mission command and network/S6 operations. ARL/HRED personnel also used this SME after the fact to assist in

  20. The Commanding Officer’s Perspective on Protecting Shipboard IT Networks

    Science.gov (United States)

    2014-09-01

    Position on WIFI for ships in port. ..................................................................31 Table 8. How/when to implement a cyber...States Cyber Command USN United States Navy VADM vice admiral WCS Weapons Control System WEPS weapons officer WIFI wireless fidelity XO...While the AWS is extremely critical and could prove the most dangerous if infiltrated by adversaries, other shipboard systems (e.g., navigation

  1. Munitions Constituents (MC) and the Military Munitions Response Program (MMRP)

    Science.gov (United States)

    2011-03-29

    Initiator for high explosives Mercury Fulminate * Initiator for high explosives Diazodinitrophenol (DDNP) Priming compositions, commercial blasting...1.5 ppm  RSLs (residential soil) ► 3.9e-01 23 Mercury (Hg)  Occurrence in munitions ► Present in some primer mixtures ( mercury fulminate ; used...EPA 7471B Mercury in Solid or Semisolid Waste (Manual Cold- Vapor Technique) 12 3/25/2011 5 Fate & Transport BUILDING STRONG®13 It’s complicated

  2. Joint Direct Attack Munition (JDAM)

    Science.gov (United States)

    2015-12-01

    Selected Acquisition Report (SAR) RCS: DD-A&T(Q&A)823-503 Joint Direct Attack Munition (JDAM) As of FY 2017 President’s Budget Defense Acquisition...Mission and Description 6 Executive Summary 7 Threshold Breaches 8 Schedule 9 Performance 12 Track to Budget 14 Cost and Funding...15 Low Rate Initial Production 26 Foreign Military Sales 27 Nuclear Costs 29 Unit Cost 30 Cost Variance 33 Contracts 36

  3. Chemical munitions dumped at sea

    Science.gov (United States)

    Edwards, Margo; Bełdowski, Jacek

    2016-06-01

    Modern chemical warfare is a byproduct of the industrial revolution, which created factories capable of rapidly producing artillery shells that could be filled with toxic chemicals such as chlorine, phosgene and mustard agent. The trench warfare of World War I inaugurated extensive deployments of modern chemical weapons in 1915. Concomitantly, the need arose to dispose of damaged, captured or excess chemical munitions and their constituents. Whereas today chemical warfare agents (CWA) are destroyed via chemical neutralization processes or high-temperature incineration in tandem with environmental monitoring, in the early to middle 20th century the options for CWA disposal were limited to open-air burning, burial and disposal at sea. The latter option was identified as the least likely of the three to impact mankind, and sea dumping of chemical munitions commenced. Eventually, the potential impacts of sea dumping human waste were recognized, and in 1972 an international treaty, the Convention on the Prevention of Marine Pollution by Dumping of Wastes and Other Matter, was developed to protect the marine environment from pollution caused by the dumping of wastes and other matter into the ocean. By the time this treaty, referred to as the London Convention, was signed by a majority of nations, millions of tons of munitions were known to have been disposed throughout the world's oceans.

  4. 2007 Munitions Executive Summit

    Science.gov (United States)

    2007-02-07

    ASTAMIDS* Aardvark Med Flail Berm Sifter Hydrema Flail EOD Equipment Networked/ Demolitions Doreen Chaplin Networked/ Demolitions Doreen... Chaplin PM IMS LTC J. Winbush Joe Pelino DPM PM IMS LTC J. Winbush Joe Pelino DPM PM IED Defeat LTC Karl Borjes R. Gullifer DPM PM IED Defeat LTC Karl...Lankler (USAF) • SASC: Michael McCord Greg Kiley • SAC-D: Charlie Houy Sid Ashworth – PSMs: Nicole Di Resta Brian Wilson Some new faces with little ammo

  5. The Unspoken Consequence of Command, Control Communications Technology: Enhanced Micromanagement by Risk-Averse Commanders

    National Research Council Canada - National Science Library

    Carozza, John

    2004-01-01

    .... However, along with its benefits, this command, control and communications (C3) network includes the dangerous consequence of eroding the autonomy of tactical command through enhanced micromanagement by risk-averse operational commanders...

  6. Joint Networking Command and Control (C2) Communications Among Distributed Operations, JCAS, and Joint Fires

    Science.gov (United States)

    2007-06-01

    Law . Metcalfe’s Law observes that although the cost of deploying a network increases linearly with the number of nodes in the network, the potential...fasteners. Enviromental Spec Storage Temperature: -26 to 160 °F, Operating Temperature: -22 to 160 °F, Operating Humidity Range: 5% to 100% Non...Accessories Double 90° tongue and groove case design, with anti-tamper fasteners. Enviromental Spec Storage Temperature: -26 to 160 °F, Operating

  7. Building a Capabilities Network to Improve Disaster Preparation Efforts in the Southern Command (SOUTHCOM) Area of Responsibility (AOR)

    Science.gov (United States)

    2013-11-14

    SOUTHCOM, Pacific Command (PACOM), European Command (EUCOM), African Command (AFRICOM), and Central Command (CENTCOM). Two other projects, by Daniels...excellence, rooted in the utmost integrity and moral practice. Consistent with its spiritual foundation, Baptist Health is dedicated to providing high...potential for ethnic, tribal , religious, gang, and other conflict. Flexibility is at the core of our programming, and the conflict mitigation team employs

  8. A Legal Reasoning Component of a Network Security Command and Control System

    Science.gov (United States)

    2010-03-01

    systems for controlling the remote management of firewalls, intrusion detection systems (IDS), and other network components and subsystems cannot...regulatory team is also logged in to C3IOS either directly or indirectly via remote management software. The legal database is also available to all

  9. Applied Knowledge Management to Mitigate Cognitive Load in Network-Enabled Mission Command

    Science.gov (United States)

    2017-11-22

    system performance is often referred to as the “brittleness problem of automata” (Hollnagel and Woods 2005). These cautions from the flight management ... perspectives . IEEE Int Sys. 2006;21(4):70–73. Leistner F. Managing organizational knowledge flow: how to make knowledge sharing work. Hoboken (NJ...ARL-TN-0859 ● NOV 2017 US Army Research Laboratory Applied Knowledge Management to Mitigate Cognitive Load in Network-Enabled

  10. Distributed Agent-Based Networks in Support of Advanced Marine Corps Command and Control Concept

    Science.gov (United States)

    2012-09-01

    DRAMA Dynamic Re-addressing and Management for the Army DTCS Distributed Tactical Communications System ECA Event-Condition-Action ECO Enhanced...Company Operations EM Electro-Magnetic EMO Enhanced MAGTF Operations GPA Group Policy Agent GUI Graphic User Interface JIFX Joint Interagency...support monitoring of the network and automatically enforce appropriate actions. In general, policies are defined as Event-Condition-Action ( ECA ) clauses

  11. New Methodology for Simulating Fragmentation Munitions

    National Research Council Canada - National Science Library

    Gold, V

    2001-01-01

    This document on New Methodology for Simulating Fragmentation Munitions consists of the 17 presentation slides that were presented at the Proceedings of the 36th Annual Gun and Ammunition Symposium...

  12. Building a Capabilities Network to Improve Disaster Preparation Efforts in the Southern Command (SOUTHCOM) Area of Responsibility (AOR)

    OpenAIRE

    Harper, Terry D.; Koelkebeck, Lance; Fitz-Gerald, Timothy

    2013-01-01

    Approved for public release; distribution is unlimited. The U.S. Southern Command (SOUTHCOM) area of responsibility (AOR) encompasses 31 countries and 15 areas of special sovereignty, and represents about one-sixth of the landmass of the world assigned to regional unified commands. To provide rapid and effective disaster relief in an area this large, a commander requires identification of available resources and effective coordination with those who can provide these resources. This resear...

  13. Mission Command in the Age of Network-Enabled Operations: Social Network Analysis of Information Sharing and Situation Awareness

    Science.gov (United States)

    2016-06-22

    2012). Social Network Analysis. Los Angeles, CA: Sage. Snijders, C., Matzat, U., Reips, U. (2012). “ Big data ”: big gaps of knowledge in the field...ORIGINAL RESEARCH published: 22 June 2016 doi: 10.3389/fpsyg.2016.00937 Frontiers in Psychology | www.frontiersin.org 1 June 2016 | Volume 7...journal Frontiers in Psychology Received: 01 December 2015 Accepted: 07 June 2016 Published: 22 June 2016 Citation: Buchler N, Fitzhugh SM, Marusich LR

  14. 19 CFR 145.53 - Firearms and munitions of war.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Firearms and munitions of war. 145.53 Section 145.53 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF... munitions of war. Importations of firearms, munitions of war, and related articles are subject to the import...

  15. Military Munitions Waste Working Group report

    Energy Technology Data Exchange (ETDEWEB)

    1993-11-30

    This report presents the findings of the Military Munitions Waste Working Group in its effort to achieve the goals directed under the Federal Advisory Committee to Develop On-Site Innovative Technologies (DOIT Committee) for environmental restoration and waste management. The Military Munitions Waste Working Group identified the following seven areas of concern associated with the ordnance (energetics) waste stream: unexploded ordnance; stockpiled; disposed -- at known locations, i.e., disposal pits; discharged -- impact areas, unknown disposal sites; contaminated media; chemical sureties/weapons; biological weapons; munitions production; depleted uranium; and rocket motor and fuel disposal (open burn/open detonation). Because of time constraints, the Military Munitions Waste Working Group has focused on unexploded ordnance and contaminated media with the understanding that remaining waste streams will be considered as time permits. Contents of this report are as follows: executive summary; introduction; Military Munitions Waste Working Group charter; description of priority waste stream problems; shortcomings of existing approaches, processes and technologies; innovative approaches, processes and technologies, work force planning, training, and education issues relative to technology development and cleanup; criteria used to identify and screen potential demonstration projects; list of potential candidate demonstration projects for the DOIT committee decision/recommendation and appendices.

  16. Miniature Munitions: Is The US Military Prepared to Support Major Combat Operations

    Science.gov (United States)

    2016-08-01

    US Air Force Air Combat Command identified an operational 5 requirement for a new munition capable of increasing the number of kills per pass...the aircraft. The BRU-61/A allows aircraft to carry up to four times as many PGMs thus significantly increasing the kill per pass ratio. The SDB...years.29 The SDB is being tested for integration on the F-35 Joint Strike Fighter, the F-18E/F Super Hornet and the F-15E Strike Eagle aircraft.30

  17. The Compass Paradigm for the Systematic Evaluation of U.S. Army Command and Control Systems Using Neural Network and Discrete Event Computer Simulation

    Science.gov (United States)

    2005-11-01

    operation, maintenance, repair or storage, such as: Acoustic energy, toxic substances (biological and chemical), oxygen deficiency, radiation...Informant Relationships in Urban Ethnography. American Journal of Occupational Therapy , 55(2), 147-154. LeCompte, M. D., & Goetz, J. P. (1982...TSCD Targeting Station Control And Display TSFO Training Set Fire Observation TMD Tactical Munitions Dispenser TSG The Surgeon General TMD

  18. Remote Machining and Evaluation of Explosively Filled Munitions

    Data.gov (United States)

    Federal Laboratory Consortium — This facility is used for remote machining of explosively loaded ammunition. Munition sizes from small arms through 8-inch artillery can be accommodated. Sectioning,...

  19. High Energy Computed Tomographic Inspection of Munitions

    Science.gov (United States)

    2016-11-01

    Picatinny scientists test body armor integrity, protect Soldiers’ lives,” http://www.army.mil/ article /94448, Picatinny Arsenal, NJ, 2013. 2. Youngberg, J...The citation in this report of the names of commercial firms or commercially available products or services does not constitute official endorsement by...munitions and weapon systems. In many cases, the use of CT is overlooked or discounted due to its lack of use in high throughput production settings

  20. Meshfree Modeling of Munitions Penetration in Soils

    Science.gov (United States)

    2017-04-01

    triaxial extension (Alejano, 2012) and being unable to model soil compaction at high mean stresses. The original and modified Cam-Clay models (Roscoe...Three-invariant Soil Constitutive Model To capture the transition from dilation to compaction , tensile behavior, rate dependence, and triaxialiaty of...FINAL REPORT Meshfree Modeling of Munitions Penetration in Soils SERDP Project MR-2628 APRIL 2017 Dr. Sheng-Wei Chi University of

  1. Designing A Robust Command, Communications and Data Acquisition System For Autonomous Sensor Platforms Using The Data Transport Network

    Science.gov (United States)

    Valentic, T. A.

    2012-12-01

    The Data Transport Network is designed for the delivery of data from scientific instruments located at remote field sites with limited or unreliable communications. Originally deployed at the Sondrestrom Research Facility in Greenland over a decade ago, the system supports the real-time collection and processing of data from large instruments such as incoherent scatter radars and lidars. In recent years, the Data Transport Network has been adapted to small, low-power embedded systems controlling remote instrumentation platforms deployed throughout the Arctic. These projects include multiple buoys from the O-Buoy, IceLander and IceGoat programs, renewable energy monitoring at the Imnavait Creek and Ivotuk field sites in Alaska and remote weather observation stations in Alaska and Greenland. This presentation will discuss the common communications controller developed for these projects. Although varied in their application, each of these systems share a number of common features. Multiple instruments are attached, each of which needs to be power controlled, data sampled and files transmitted offsite. In addition, the power usage of the overall system must be minimized to handle the limited energy available from sources such as solar, wind and fuel cells. The communications links are satellite based. The buoys and weather stations utilize Iridium, necessitating the need to handle the common drop outs and high-latency, low-bandwidth nature of the link. The communications controller is an off-the-shelf, low-power, single board computer running a customized version of the Linux operating system. The Data Transport Network provides a Python-based software framework for writing individual data collection programs and supplies a number of common services for configuration, scheduling, logging, data transmission and resource management. Adding a new instrument involves writing only the necessary code for interfacing to the hardware. Individual programs communicate with the

  2. Chemical Munitions Dumped at Sea near the Hawaiian Islands

    Science.gov (United States)

    Edwards, M.; Bissonnette, M. C.; Briggs, C. W.; Shjegstad, S. M.

    2016-12-01

    Sea disposal was once internationally accepted as an appropriate method for disposal of excess, obsolete, and unserviceable conventional and chemical munitions. The past decade has seen an increase in the number and complexity of studies to assess the effects of historical munitions disposal in the oceans. The Hawai`i Undersea Military Munitions Assessment (HUMMA) is a comprehensive deep-water (300-600 meter) investigation designed to determine the potential impact of sea-disposed munitions on the ocean environment, and vice versa, at a disposal site south of Pearl Harbor, Oahu, Hawaii. Historical records indicated that as many as 16,000 mustard-filled bombs were disposed in this area following World War II. A secondary objective of HUMMA is to determine best practices and technologies for mapping and sampling sea-disposed munitions. The overarching result from five HUMMA field programs conducted over a decade is that the greatest risk from munitions derives from direct contact; there is little evidence that leakage from munitions into the surrounding environment has a direct pathway to affect human health and the impact on the surrounding environment in Hawaii is detectable only at trace levels. This finding should be modulated based on the quantity of physical samples, which were collected around vehicle (ROV) directly sampled the internal constituents of bombs, distilled mustard was recovered. Additionally, inconsistent with results from the 2009 and 2012 HUMMA sampling programs, during the ROV-based 2014 field program trace amounts of mustard agent and its breakdown products were detected at control sites. Both findings support a hypothesis that the impacts of sea-disposed munitions change over time. This presentation will describe the technical approach and results of the 2014 HUMMA field program using Jason 2.

  3. 19 CFR 4.73 - Neutrality; exportation of arms and munitions.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Neutrality; exportation of arms and munitions. 4...; exportation of arms and munitions. (a) Clearance shall not be granted to any vessel if the port director has... and about to depart from the United States with a cargo consisting principally of arms and munitions...

  4. 32 CFR Appendix A to Part 179 - Tables of the Munitions Response Site Prioritization Protocol

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Tables of the Munitions Response Site... OF DEFENSE CLOSURES AND REALIGNMENT MUNITIONS RESPONSE SITE PRIORITIZATION PROTOCOL (MRSPP) Pt. 179, App. A Appendix A to Part 179—Tables of the Munitions Response Site Prioritization Protocol The tables...

  5. Locating and Evaluating Sea-Disposed Munitions--Examples from the Hawaii Undersea Military Munitions Assessment (HUMMA) Project

    Science.gov (United States)

    Edwards, M.; Wilkens, R. H.; Kelley, C.; de Carlo, E. H.; MacDonald, K.; Garcia, S.; Vanwoerkom, M.; Payne, Z.; Dupra, V.; Rosete, M.; Cox, M.; Fineran, S.; King, J. C.; Carton, G.

    2009-12-01

    The Army, under its Environmental Quality Technology (EQT) Program funded the HUMMA Project to assess the location of, and potential risk to human health posed by, sea disposed munitions (discarded military munitions (DMM)) at a study site south of Pearl Harbor, Hawai‘i known as HI-05. These conventional and chemical munitions are believed to have been exposed to undersea biochemical and mechanical erosion since the late 1940’s. To locate water samples within 1 and 2 meters of high-interest DMM as well as comparative background sites. The Edgewood Chemical and Biological Center supported dive operations to ensure crew personnel were not exposed to chemical agents (CA) and processed samples on board to determine if CA was present. The processed samples were then packaged and shipped to various shore-based laboratories to determine the presence of energetics and metals. Upon completion of the diving program, various species of locally consumed snapper and shrimp were collected near several of the sediment and water sample sites for analogous laboratory analyses. Our approach proved to be highly successful, identifying in a 5-day long IMI-120 survey the location of dozens of munitions trails containing ~2,000 munitions. At the 0.5m grid cell size for the backscatter data, it is even possible to identify trails of different types of munitions. Backscatter maps were critical for directing PISCES operations during sampling, including returning to specific 1-m long munitions on separate dives. These maps now serve as the foundation of a database that will allow near-bottom instruments including submersibles to operate more safely in the 69 km2 field area. At the time of this abstract preparation, sample analysis is still underway, but it will be completed in time to present the results at the December meeting.

  6. Cluster munitions: public health and international humanitarian law perspectives.

    Science.gov (United States)

    Freckelton, Ian

    2008-02-01

    As a result of civilian deaths in Vietnam, Cambodia, Laos, Chechnya, Kosovo, Afghanistan, Iraq and Lebanon, cluster munitions have been recognised to pose a grave threat to civilian populations because of their limited precision and problematically high rate of initial failure to explode. Efforts are intensifying to ban cluster munitions and to mandate those who have discharged them to defuse them effectively so as to reduce the risks to civilians. This editorial reviews these efforts and identifies a need for them to be actively supported by both the legal and medical communities.

  7. AMCCOM (Army Armament, Munitions and Chemical Command) Management Study of Procurement Work Directive (PWD) Processing Costs

    Science.gov (United States)

    1988-05-23

    UNIT ELEMENT NO. NO. NO. ACCESSION NO. 22898. KAOO I i 11. TITLE (Include Security Classification) Procurement Work Directive (PWD) Processing Cost Study...8217. ’C Accession For NT IS GRA&I DTIC TAB QUALITY Uitnnounced 2C’ Jutification D" ...- sD T IC"" Availi~dlity Codes ELECTC AVf1and/or I’, ’A’i:, d/r...FLOW PROCESS CHART i r- "F N IO 1. 0 F A.P OtIc S. SUMMARY 0O PERATION 7. CHART BrGINS A. CHART ENDS TRANSPORTAIONS INSETIONS I 9. CHIART D my

  8. Detonation command and control

    Science.gov (United States)

    Mace, Jonathan L.; Seitz, Gerald J.; Echave, John A.; Le Bas, Pierre-Yves

    2016-05-31

    The detonation of one or more explosive charges and propellant charges by a detonator in response to a fire control signal from a command and control system comprised of a command center and instrumentation center with a communications link there between. The fire control signal is selectively provided to the detonator from the instrumentation center if plural detonation control switches at the command center are in a fire authorization status, and instruments, and one or more interlocks, if included, are in a ready for firing status. The instrumentation and command centers are desirably mobile, such as being respective vehicles.

  9. Detonation command and control

    Energy Technology Data Exchange (ETDEWEB)

    Mace, Jonathan L.; Seitz, Gerald J.; Echave, John A.; Le Bas, Pierre-Yves

    2015-11-10

    The detonation of one or more explosive charges and propellant charges by a detonator in response to a fire control signal from a command and control system comprised of a command center and instrumentation center with a communications link therebetween. The fire control signal is selectively provided to the detonator from the instrumentation center if plural detonation control switches at the command center are in a fire authorization status, and instruments, and one or more interlocks, if included, are in a ready for firing status. The instrumentation and command centers are desirably mobile, such as being respective vehicles.

  10. Detonation command and control

    Energy Technology Data Exchange (ETDEWEB)

    Mace, Jonathan Lee; Seitz, Gerald J.; Echave, John A.; Le Bas, Pierre-Yves

    2017-12-05

    The detonation of one or more explosive charges and propellant charges by a detonator in response to a fire control signal from a command and control system comprised of a command center and instrumentation center with a communications link therebetween. The fire control signal is selectively provided to the detonator from the instrumentation center if plural detonation control switches at the command center are in a fire authorization status, and instruments, and one or more interlocks, if included, are in a ready for firing status. The instrumentation and command centers are desirably mobile, such as being respective vehicles.

  11. REMOTE SENSING IN DETECTING BURIED MUNITIONS FROM WORLD WAR I

    Science.gov (United States)

    During World War I, The American University in Washington D.C. was used by the U.S. Army as an experiment station for the development and testing of a variety of battlefield munitions including chemical weapons such as Mustard Gas, Phosgene, Ricin and Lewisite, among othe...

  12. An Overview of Novel Power Sources for Advanced Munitions

    Science.gov (United States)

    2009-04-27

    led by Mr. Boris Flyash , Mr. Mauricio Guevara and Mr. Lam Vo; and senior advisors Mr. Chris Janow and Ms. Maria Allende of US Army ARDEC. NOTES...conduct tradeoff of lens in Semi-Active Laser and power selection in thermal battery for Precision Guided Mortar Munition, to identify alternative concepts

  13. Defense Industrial Base (DIB): Munitions Realignment for 2020

    Science.gov (United States)

    2013-03-01

    ammunition continued until WWII. Technological improvements in weapons and ammunition design , doctrinal changes, and growing supplies of obsolete...munitions DIB by companies like Coca Cola , Quaker Oats, and Eastman Kodak. As industrial mobilization quickly increased, the requirements decreased...between 2014 and 2020 should enable planners to predict future demands while measuring the effects of growing transportation costs. The increased

  14. The Role of Friendship within Social Networks of Divisions at Recruit Training Command and its Effect on the Resilience of Naval Recruits

    Science.gov (United States)

    2017-06-01

    37  viii 5.  QAP Correlation between Friendship and Venting Networks...38  Figure 8.  Friendship and Venting Network QAP Correlation Scores. ......................40  Figure 9.  Division 1...Venting Network Reciprocity Values and Ranking ...................................37  Table 9.  Friendship and Venting Network QAP Correlation Scores

  15. A Method for Predicting Fragmentation Characteristics of Natural and Performed Explosive Fragmentation Munitions

    National Research Council Canada - National Science Library

    Gold, Vladimir

    2001-01-01

    New methodology for simulating performance of explosive fragmentation munitions presented in this work integrates three-dimensional axisymmetric hydrocode analyses with analytical fragmentation modeling...

  16. Robot Task Commander with Extensible Programming Environment

    Science.gov (United States)

    Hart, Stephen W (Inventor); Yamokoski, John D. (Inventor); Wightman, Brian J (Inventor); Dinh, Duy Paul (Inventor); Gooding, Dustin R (Inventor)

    2014-01-01

    A system for developing distributed robot application-level software includes a robot having an associated control module which controls motion of the robot in response to a commanded task, and a robot task commander (RTC) in networked communication with the control module over a network transport layer (NTL). The RTC includes a script engine(s) and a GUI, with a processor and a centralized library of library blocks constructed from an interpretive computer programming code and having input and output connections. The GUI provides access to a Visual Programming Language (VPL) environment and a text editor. In executing a method, the VPL is opened, a task for the robot is built from the code library blocks, and data is assigned to input and output connections identifying input and output data for each block. A task sequence(s) is sent to the control module(s) over the NTL to command execution of the task.

  17. Joint Mission Command Implementation

    Science.gov (United States)

    2016-01-22

    1 AIR WAR COLLEGE AIR UNIVERSITY JOINT MISSION COMMAND IMPLEMENTATION by Michael Dane Acord, COL, US Army A Research Report Submitted to...assigned to the Air War College, Air University, Maxwell Air Force Base (AFB), AL. Following the Army Command and General Staff College and School...holds a Bachelor’s Degree in Biology and two Masters Degrees, a Masters in Management from Troy University and a Master of Military Arts and Sciences

  18. Understanding Command and Control

    Science.gov (United States)

    2006-01-01

    UNDERSTANDING COMMAND AND CONTROL David S. Alberts Richard E. Hayes THE FUTURE OF COMMAND AND CONTROL Report Documentation Page Form ApprovedOMB No...comprehensive C2 Conceptual Reference Model. We benefited greatly from participating in that activity. 1 The members of SAS-050 included: Dr. David Alberts...Sinclair (US), M.Sc. Mink Spaans (NL), Ms. Kristi Sugarman (US), LTC (Ret) Klaus Titze (GE), Mr. Rick van der Kleij (NL) W vi We were also fortunate to

  19. On Cyber Warfare Command and Control Systems

    Science.gov (United States)

    2004-06-01

    network defense management system are sometimes used to describe systems that are used for the remote management of firewalls, intrusion detection...different. Certainly, the remote management of firewalls and intrusion detection systems, etc. should be part of a cyber warfare command and control

  20. Guidelines for Testing Various Weapons/Munitions Against MOBA structures

    Science.gov (United States)

    1979-10-01

    CLASSIFICATtON OF THIS PAGE msn Data Mlemq) MUNITIONS AGAINST MOBA STRUCTURES REPOPTDOCUMENTATION PAGE 𔃻. REPORT NUMBER 12. GOVT ACCESSION NO...l Note 6-79 GUIDELINES FOR TESTING VARIOUS wEAPoNS/MUNITIONS AGAINST MOBA STRUCTURES Brenda K. Thein Glenn P. B e i c h l e r US Army M a t e...c t i v e n e s s t e s t i n g f o r M i l i t a r y O p e r a t i o n s i n Built-up Areas ( MOBA ). It is based p r imar i l y on e x p e r

  1. Hybrid analysis of multiaxis electromagnetic data for discrimination of munitions and explosives of concern

    Science.gov (United States)

    Friedel, M.J.; Asch, T.H.; Oden, C.

    2012-01-01

    The remediation of land containing munitions and explosives of concern, otherwise known as unexploded ordnance, is an ongoing problem facing the U.S. Department of Defense and similar agencies worldwide that have used or are transferring training ranges or munitions disposal areas to civilian control. The expense associated with cleanup of land previously used for military training and war provides impetus for research towards enhanced discrimination of buried unexploded ordnance. Towards reducing that expense, a multiaxis electromagnetic induction data collection and software system, called ALLTEM, was designed and tested with support from the U.S. Department of Defense Environmental Security Technology Certification Program. ALLTEM is an on-time time-domain system that uses a continuous triangle-wave excitation to measure the target-step response rather than traditional impulse response. The system cycles through three orthogonal transmitting loops and records a total of 19 different transmitting and receiving loop combinations with a nominal spatial data sampling interval of 20 cm. Recorded data are pre-processed and then used in a hybrid discrimination scheme involving both data-driven and numerical classification techniques. The data-driven classification scheme is accomplished in three steps. First, field observations are used to train a type of unsupervised artificial neural network, a self-organizing map (SOM). Second, the SOM is used to simultaneously estimate target parameters (depth, azimuth, inclination, item type and weight) by iterative minimization of the topographic error vectors. Third, the target classification is accomplished by evaluating histograms of the estimated parameters. The numerical classification scheme is also accomplished in three steps. First, the Biot–Savart law is used to model the primary magnetic fields from the transmitter coils and the secondary magnetic fields generated by currents induced in the target materials in the

  2. Hybrid analysis of multiaxis electromagnetic data for discrimination of munitions and explosives of concern

    Science.gov (United States)

    Friedel, M. J.; Asch, T. H.; Oden, C.

    2012-08-01

    The remediation of land containing munitions and explosives of concern, otherwise known as unexploded ordnance, is an ongoing problem facing the U.S. Department of Defense and similar agencies worldwide that have used or are transferring training ranges or munitions disposal areas to civilian control. The expense associated with cleanup of land previously used for military training and war provides impetus for research towards enhanced discrimination of buried unexploded ordnance. Towards reducing that expense, a multiaxis electromagnetic induction data collection and software system, called ALLTEM, was designed and tested with support from the U.S. Department of Defense Environmental Security Technology Certification Program. ALLTEM is an on-time time-domain system that uses a continuous triangle-wave excitation to measure the target-step response rather than traditional impulse response. The system cycles through three orthogonal transmitting loops and records a total of 19 different transmitting and receiving loop combinations with a nominal spatial data sampling interval of 20 cm. Recorded data are pre-processed and then used in a hybrid discrimination scheme involving both data-driven and numerical classification techniques. The data-driven classification scheme is accomplished in three steps. First, field observations are used to train a type of unsupervised artificial neural network, a self-organizing map (SOM). Second, the SOM is used to simultaneously estimate target parameters (depth, azimuth, inclination, item type and weight) by iterative minimization of the topographic error vectors. Third, the target classification is accomplished by evaluating histograms of the estimated parameters. The numerical classification scheme is also accomplished in three steps. First, the Biot-Savart law is used to model the primary magnetic fields from the transmitter coils and the secondary magnetic fields generated by currents induced in the target materials in the

  3. Incorporating advanced EMI technologies in operational munitions characterization surveys

    Science.gov (United States)

    Miller, Jonathan S.; Shubiditze, Fridon; Pasion, Leonard; Schultz, Gregory; Chung, Heesoo

    2011-06-01

    The presence of unexploded ordnance (UXO), discarded military munitions (DMM), and munitions constituents (MC) at both active and formerly used defense sites (FUDS) has created a necessity for production-level efforts to remove these munitions and explosives of concern (MEC). Ordnance and explosives (OE) and UXO removal operations typically employ electromagnetic induction (EMI) or magnetometer surveys to identify potential MEC hazards in previously determined areas of interest. A major cost factor in these operations is the significant allocation of resources for the excavation of harmless objects associated with fragmentation, scrap, or geological clutter. Recent advances in classification and discrimination methodologies, as well as the development of sensor technologies that fully exploit physics-based analysis, have demonstrated promise for significantly reducing the false alarm rate due to MEC related clutter. This paper identifies some of the considerations for and the challenges associated with implementing these discrimination methodologies and advanced sensor technologies in production-level surveys. Specifically, we evaluate the implications of deploying an advanced multi-axis EMI sensor at a variety of MEC sites, the discrimination methodologies that leverage the data produced by this sensor, and the potential for productivity increase that could be realized by incorporating this advanced technology as part of production protocol.

  4. Communication for command and control systems

    CERN Document Server

    Morris, D J

    1983-01-01

    Communication for Command and Control Systems provides a thorough exposition of the basic theoretical and practical features involved in the design of communication networks for command and control systems. This book focuses primarily on the practical side of computer-controlled communication. This text concentrates on the communication sides of the subject by surveying the means of transferring data between the various processing points and by appraising their potential advantages and possible defects in implementation. In this respect, this book should prove useful for the practicing enginee

  5. Validation of Passive Sampling Devices for Monitoring of Munitions Constituents in Underwater Environments

    Science.gov (United States)

    2017-09-01

    Director ADMINISTRATIVE INFORMATION The work described in this report was performed for the DoD Environmental Security Technology Certification Program...coastal ranges, many of which have underwater sites that are known to contain underwater military munitions (UWMM), such as discarded military ...munitions (DMM) and unexploded ordnance (UXO), as a result of historic military activities. In addition to explosive blast (safety) considerations

  6. 28 CFR 0.89 - Authority to seize arms and munitions of war.

    Science.gov (United States)

    2010-07-01

    ... war. 0.89 Section 0.89 Judicial Administration DEPARTMENT OF JUSTICE ORGANIZATION OF THE DEPARTMENT OF JUSTICE Federal Bureau of Investigation § 0.89 Authority to seize arms and munitions of war. The Director... arms and munitions of war, and other articles, pursuant to section 1 of title VI of the act of June 15...

  7. Cost efficient command management

    Science.gov (United States)

    Brandt, Theresa; Murphy, C. W.; Kuntz, Jon; Barlett, Tom

    1996-01-01

    The design and implementation of a command management system (CMS) for a NASA control center, is described. The technology innovations implemented in the CMS provide the infrastructure required for operations cost reduction and future development cost reduction through increased operational efficiency and reuse in future missions. The command management design facilitates error-free operations which enables the automation of the routine control center functions and allows for the distribution of scheduling responsibility to the instrument teams. The reusable system was developed using object oriented methodologies.

  8. MILITARY COMMANDERS OF

    African Journals Online (AJOL)

    who first saw active service in the Ashanti. Campaign. (1873-74), was employed as an instructor of musketry prior to his promotion to. Captain in October 1878. In the following year he was present at the Battle of Ulundi and took part in the expedition against Sekukuni (1879). During the First Anglo-Boer War he commanded.

  9. SOA approach to battle command: simulation interoperability

    Science.gov (United States)

    Mayott, Gregory; Self, Mid; Miller, Gordon J.; McDonnell, Joseph S.

    2010-04-01

    NVESD is developing a Sensor Data and Management Services (SDMS) Service Oriented Architecture (SOA) that provides an innovative approach to achieve seamless application functionality across simulation and battle command systems. In 2010, CERDEC will conduct a SDMS Battle Command demonstration that will highlight the SDMS SOA capability to couple simulation applications to existing Battle Command systems. The demonstration will leverage RDECOM MATREX simulation tools and TRADOC Maneuver Support Battle Laboratory Virtual Base Defense Operations Center facilities. The battle command systems are those specific to the operation of a base defense operations center in support of force protection missions. The SDMS SOA consists of four components that will be discussed. An Asset Management Service (AMS) will automatically discover the existence, state, and interface definition required to interact with a named asset (sensor or a sensor platform, a process such as level-1 fusion, or an interface to a sensor or other network endpoint). A Streaming Video Service (SVS) will automatically discover the existence, state, and interfaces required to interact with a named video stream, and abstract the consumers of the video stream from the originating device. A Task Manager Service (TMS) will be used to automatically discover the existence of a named mission task, and will interpret, translate and transmit a mission command for the blue force unit(s) described in a mission order. JC3IEDM data objects, and software development kit (SDK), will be utilized as the basic data object definition for implemented web services.

  10. Dumped Munitions in the Baltic Sea - Evaluation of the Problem

    Science.gov (United States)

    Beldowski, J.; Jakacki, J.; Vanninen, P.; Lang, T.

    2016-12-01

    Dumped Chemical Weapons pose an actual environmental and security hazard in the Baltic Sea Region. Their actual position is unknown, and pollution originating from corroded munitions is only roughly estimated. Several research projects were devoted to evaluate the magnitude of the problem. During three international projects, roughly 2000 km2 were surveyed, and more than 200 ROV missions were performed to investigate found objects. . Results suggest that munitions containing CWAs are more scattered on the seafloor than suspected, and previously undocumented dumpsite was discovered in Gdansk Deep. Chemical Warfare Agents (CWA) degradation products were found in the sediments in immediate vicinity of the objects, and sediment pollution was observed even at 40m distance. Analysis of CWA degradation products in the sediments showed widespread contamination in Bornholm Deep area, and more variable pattern of local hotspots in the Gotland and Gdansk Deeps. The latter seem to contain several contaminated areas, which identifies it rather as an unofficial dumping ground than only containing munitions originating from en-route dumping. Bottom currents observed in the dumpsites were strong enough for sediment re-suspension, and contributed to the transport of polluted sediments. Spreading of CWA was modelled using POP3 hydrodynamic model augmented with sediment erosion and benthic boundary layer modules. It follows from the models, that depending on wind conditions, resuspended contaminated sediemnts may remain in the water column for several days up to few weeks, and be transported over the distances up to 15 km. Biomarkers of environmental stress were measured in fish from the dumpsites and caged mussels, and indicated environmental stress in organisms from dumpsites as compared to control. Toxicity of found CWA degradation products was examined in laboratory studies. . Nonetheless, both species showed significantly elevated molecular and cellular level responses at

  11. Ada (Trade Name) Foundation Technology. Volume 9. Software Requirements for WIS (WWMCCS (World Wide Military Command and Control System) Information System) Network Protocol Prototypes.

    Science.gov (United States)

    1986-12-01

    Communications, January 1977. [ GAVI 83] Gavish, B., and S. L. Hantler, "An Algorithm for Optimal Route Selection in SNA Networks," IEEE Transactons on...can be found in [SCHW 80.1 Two works that deal with non-bifurcated flows are [COUR 8 11 and [ GAVI 83]. 4.3 Description of the Algorithm Problem 4.3.1

  12. Command and motivation

    DEFF Research Database (Denmark)

    Jacobsen, Christian Bøtcher; Hvidtved, Johan; Andersen, Lotte Bøgh

    2014-01-01

    Motivated employees are crucial to organizations, but external interventions such as command systems and financial incentives may decrease motivation. If these external interventions are perceived to be controlling, they are expected to crowd out intrinsic motivation, and this may also apply...... to other types of autonomous motivation such as public service motivation. The perception of external interventions is thus expected to be vital. This article investigates how the perception of a specific command system (obligatory student plans) is associated with intrinsic motivation and public service...... motivation. Using a dataset with 3,230 school teachers in Denmark, a structural equation model shows that the perception of obligatory student plans as controlling is negatively associated with all of the investigated types of employee motivation, supporting that motivation crowding can occur....

  13. The joint DoD/DOE Munitions Technology Development Program

    Energy Technology Data Exchange (ETDEWEB)

    Repa, J.V. Jr.

    1994-08-01

    The joint Department of Defense (DoD)/Department of Energy (DOE) Munitions Technology Development Program is a cooperative, jointly funded effort of research and development to improve nonnuclear munitions technology across all service mission areas. This program is enabled under a Memorandum of Understanding, approved in 1985 between the DoD and the DOE, that tasks the nuclear weapons laboratories of the DOE to solve problems in conventional defense. The selection of the technical areas to be investigated is based on their importance to the military services, the needs that are common to the conventional and nuclear weapons programs, the expertise of the performing organization, and the perceived benefit to the overall national defense efforts. The research benefits both DoD and DOE programs; therefore, funding, planning, and monitoring are joint activities. Technology Coordination Groups (TCGs), organized by topical areas, serve as technology liaisons between the DoD and DOE for the exchange of information. The members of the TCGs are technical experts who meet semiannually in an informal workshop format to coordinate multiagency requirements, establish project plans, monitor technical activity, and develop classification guidance. A technical advisory committee of senior DoD and DOE managers administers the program and provides guidance on policy and strategy. The abstracts in this volume were collected from the technical progress report for fiscal year 1993. The annual report is organized by major technology areas. Telephone and fax numbers for the principal contacts are provided with each abstract.

  14. Evaluation of ingredients for the development of new insensitive munitions.

    Energy Technology Data Exchange (ETDEWEB)

    Maharrey, Sean P.; Johnston, Lois A.; Behrens, Richard, Jr.; Wiese-Smith, Deneille

    2004-12-01

    Several ingredients being considered by the U.S. Army for the development of new insensitive munitions have been examined. One set of ingredients consists of 2,4-dinitrophenylhydrazine (DNPH) and hexahydro-1,3,5-trinitro-s-triazine (RDX). In this set, the decomposition of the mixture was examined to determine whether adding DNPH to RDX would generate a sufficient quantity of gas to rupture the case of a munition prior to the onset of the rapid reaction of RDX, thus mitigating the violence of reaction. The second set of ingredients consists of three different reduced sensitivity RDX (RS-RDX) powders manufactured by SNPE and Dyno-Nobel. In this set, the objective was to determine properties of RS-RDX powders that may distinguish them from normal RDX powder and may account for their reduced shock sensitivity. The decomposition reactions and sublimation properties of these materials were examined using two unique instruments: the simultaneous thermogravimetric modulated beam mass spectrometry (STMBMS) instrument and the Fourier Transform ion cyclotron resonance (FTICR) mass spectrometry instrument. These instruments provide the capability to examine the details of decomposition reactions in energetic materials. DNPH does not appear to be a good candidate to mitigate the violence of the RDX reaction in a munition. DNPH decomposes between 170 C and 180 C. When mixed with RDX it decomposes between 155 C and 170 C. It decomposes to form 1,3-dintrobenzene (DNB), ammonia, water and nitrogen. Of these compounds only nitrogen and ammonia are capable of generating high pressures within a munition. When DNPH is mixed with RDX, the DNB formed in the decomposition of DNPH interacts with RDX on the surface of the RDX powder leading to a higher rate of formation of CH2O and N2O. The CH2O is consumed by reaction with DNPH to form 2-methylene-1-(2,4-dintrophenyl)hydrazine. As a result, DNPH does not generate a large quantity of gas that will lead to rupture of a munition case. Another

  15. Cross Directorate Proposal: Nanostructured Materials for Munitions and Propellants-Production, Modeling, and Characterization

    Science.gov (United States)

    2016-07-15

    AFRL-RW-EG-TR-2016-036 Cross Directorate Proposal: Nanostructured Materials for Munitions and Propellants – Production, Modeling , and...Directorate Proposal: Nanostructured Materials for Munitions and Propellants – Production, Modeling , and Characterization 5a. CONTRACT NUMBER 5b...BLOCK 12 OF THIS FORM. 14. ABSTRACT Over the past few years RWME has been investigating the use of the liquid helium droplet beam technique to

  16. Investigation of the Use of Geobags to Immobilize Submerged Munitions: A Report on the Concept, Development, and Testing

    Science.gov (United States)

    2013-09-01

    with hooks corresponding to locations of geobag lifting straps connect the frame to the geobag. When the frame was lifted, it would raise the...enabling the hooks to slip out of the geobag straps, thereby releasing the frame from the geobag. Dry Land Tests – Horizontal Munition Dry land...disturbing the adjacent bed, Figure 21. Once the munition was in place a geobag was hoisted and placed directly above the munition. The geobag was slowly

  17. Expanding the Lessons Learned Program to Include Corps Support Command Commanders and Theater Army Area Command Commanders

    Science.gov (United States)

    1989-03-10

    INTRODUCTION The Oral History Program’s purpose is to supplement oFficial histories , to isolate successful command, leadership and managerial...of -the program is to capture the experience of senior leaders in the areas of command, leadership , and management . The individual is interviewed...used to gain insight into command and management techniques and to further research in military history . In June of 1984, the Chief of Staff, General

  18. Bioinspired polarization navigation sensor for autonomous munitions systems

    Science.gov (United States)

    Giakos, G. C.; Quang, T.; Farrahi, T.; Deshpande, A.; Narayan, C.; Shrestha, S.; Li, Y.; Agarwal, M.

    2013-05-01

    Small unmanned aerial vehicles UAVs (SUAVs), micro air vehicles (MAVs), Automated Target Recognition (ATR), and munitions guidance, require extreme operational agility and robustness which can be partially offset by efficient bioinspired imaging sensor designs capable to provide enhanced guidance, navigation and control capabilities (GNC). Bioinspired-based imaging technology can be proved useful either for long-distance surveillance of targets in a cluttered environment, or at close distances limited by space surroundings and obstructions. The purpose of this study is to explore the phenomenology of image formation by different insect eye architectures, which would directly benefit the areas of defense and security, on the following four distinct areas: a) fabrication of the bioinspired sensor b) optical architecture, c) topology, and d) artificial intelligence. The outcome of this study indicates that bioinspired imaging can impact the areas of defense and security significantly by dedicated designs fitting into different combat scenarios and applications.

  19. Application of composite materials to impact-insensitive munitions

    Science.gov (United States)

    Neradka, Vincent F.; Chang, Yale; Grady, Joseph E.; Trowbridge, Daniel A.

    1992-01-01

    An approach is outlined for developing bullet-impact-insensitive munitions based on composite materials that provide rapid venting of the rocket-motor case. Impact experiments are conducted with test specimens of hybrid laminates of graphite/epoxy and epoxy reinforcing with woven glass fibers. The dynamic strain response and initial impact force are measured with strain gauges, and perforation damage is examined in the plates. The results show that impact damage can be designed by means of parametric variations of the fiber, matrix, and ply orientations. It is suggested that rocket-motor cases can be designed with composite materials to provide rapid venting during the failure mode. The experimental ballistic testing performed provides data that can be used comparatively with analytical data on composite materials.

  20. Innovation for integrated command environments

    Science.gov (United States)

    Perry, Amie A.; McKneely, Jennifer A.

    2000-11-01

    Command environments have rarely been able to easily accommodate rapid changes in technology and mission. Yet, command personnel, by their selection criteria, experience, and very nature, tend to be extremely adaptive and flexible, and able to learn new missions and address new challenges fairly easily. Instead, the hardware and software components of the systems do no provide the needed flexibility and scalability for command personnel. How do we solve this problem? In order to even dream of keeping pace with a rapidly changing world, we must begin to think differently about the command environment and its systems. What is the correct definition of the integrated command environment system? What types of tasks must be performed in this environment, and how might they change in the next five to twenty-five years? How should the command environment be developed, maintained, and evolved to provide needed flexibility and scalability? The issues and concepts to be considered as new Integrated Command/Control Environments (ICEs) are designed following a human-centered process. A futuristic model, the Dream Integrated Command Environment (DICE) will be described which demonstrates specific ICE innovations. The major paradigm shift required to be able to think differently about this problem is to center the DICE around the command personnel from its inception. Conference participants may not agree with every concept or idea presented, but will hopefully come away with a clear understanding that to radically improve future systems, designers must focus on the end users.

  1. Identification of Brigade Command Competencies

    Science.gov (United States)

    2011-06-01

    that may exist. 15. SUBJECT TERMS Brigade Command, competency model , army leadership , leadership development, leadership training, command...that focused on leadership , commandership, competency modeling , and training was completed. To support this research base with experiential...climate, creating an ethical climate, modeling the Army Values and Warrior Ethos, decision making ability, managing risk, critical thinking skills

  2. Chemical Warfare Materiel in Sediment at a Deep-Water Discarded Military Munitions Site

    Science.gov (United States)

    Briggs, C. W.; Bissonnette, M. C.; Edwards, M.; Shjegstad, S. M.

    2016-12-01

    Understanding the release and transformation of chemical agent (CA) at underwater discarded military munitions (DMM) sites is essential to determine the potential risk to human health and impact on the ocean environment; yet few studies have been conducted at sites in excess of 250 m, the depth at which most U.S. CA munitions were disposed. Maritime construction workers installing cables or pipelines at a CA DMM site, as well as fishermen and scientific researchers deploying bottom-contact gear, represent possible exposure pathways to human receptors. The Hawai`i Undersea Military Munitions Assessment (HUMMA) sought to characterize a historic munitions sea-disposal site at depths between 400-650 m. During the 2014 HUMMA Sampling Survey, the Jason 2 remotely operated vehicle was used to collect sediments within two meters of suspected World War II chemical munitions, confirmed to be 100-lb M47 series bombs containing sulfur mustard. When environmental media was brought to the surface, samples were screened for distilled sulfur mustard (HD) and related agent breakdown products (ABP) (collectively referred to as chemical warfare materiel [CWM]). Detectable concentrations of HD and/or its ABP 1,4-dithiane were found in sediments collected at all CA DMM sites; HD was also detected at two control sites. The location and extent of munitions casing deterioration strongly influenced the distribution and level of CWM in sediment. The interior of the casing contained levels of CWM orders of magnitudes higher than that observed in the surrounding sediment at one meter distance, indicating the majority of the CWM is hydrolyzed as it is released from the munitions casing and a fraction of the fill materiel persists in the environment for decades following disposal. Although the potential for future site users to become exposed to CWA in recovered sediments and debris exists, the level of risk is significantly mitigated by the depth and location of the sea-disposal site.

  3. Assessing Contract Management Maturity: U.S. Army Joint Munitions and Lethality Contracting Center, Army Contracting Command, Picatinny Arsenal

    Science.gov (United States)

    2009-09-01

    employee retention at the journeyman level; and internal friction. 69 Leadership/Management being the last category received 8% of the response. In...examples of this category’s responses include: employee retention at the journeyman level; and Internal friction. Leadership/Management being the last

  4. Legacy in the Sand: The United States Army Armament, Munitions and Chemical Command in Operations Desert Shield and Desert Storm

    Science.gov (United States)

    1992-12-21

    time-consuming market surveys continued to gamer the attention of of the Procurement and Production Policy and Management Directorate even after the...December 1991’s AMC News observed: You can’t do what was done with Kelly Girls . The requisite structure didn’t suddenly spring up overnight. It’s only

  5. Implementing Network-Centric Command and Control

    National Research Council Canada - National Science Library

    Curtis, Raymond J; Frizzell, Joseph P

    2005-01-01

    ..., processes, and products remain to be addressed. We begin by examining current developments in net-centric, service oriented and effects based operations as part of the changing nature of the U.S...

  6. Tools virtualization for command and control systems

    Science.gov (United States)

    Piszczek, Marek; Maciejewski, Marcin; Pomianek, Mateusz; Szustakowski, Mieczysław

    2017-10-01

    Information management is an inseparable part of the command process. The result is that the person making decisions at the command post interacts with data providing devices in various ways. Tools virtualization process can introduce a number of significant modifications in the design of solutions for management and command. The general idea involves replacing physical devices user interface with their digital representation (so-called Virtual instruments). A more advanced level of the systems "digitalization" is to use the mixed reality environments. In solutions using Augmented reality (AR) customized HMI is displayed to the operator when he approaches to each device. Identification of device is done by image recognition of photo codes. Visualization is achieved by (optical) see-through head mounted display (HMD). Control can be done for example by means of a handheld touch panel. Using the immersive virtual environment, the command center can be digitally reconstructed. Workstation requires only VR system (HMD) and access to information network. Operator can interact with devices in such a way as it would perform in real world (for example with the virtual hands). Because of their procedures (an analysis of central vision, eye tracking) MR systems offers another useful feature of reducing requirements for system data throughput. Due to the fact that at the moment we focus on the single device. Experiments carried out using Moverio BT-200 and SteamVR systems and the results of experimental application testing clearly indicate the ability to create a fully functional information system with the use of mixed reality technology.

  7. Ubuntu Linux Toolbox 1000 + Commands for Ubuntu and Debian Power Users

    CERN Document Server

    Negus, Christopher

    2008-01-01

    In this handy, compact guide, you'll explore a ton of powerful Ubuntu Linux commands while you learn to use Ubuntu Linux as the experts do: from the command line. Try out more than 1,000 commands to find and get software, monitor system health and security, and access network resources. Then, apply the skills you learn from this book to use and administer desktops and servers running Ubuntu, Debian, and KNOPPIX or any other Linux distribution.

  8. Simulating the Commander's Decision Process

    National Research Council Canada - National Science Library

    Kovalchik, Joseph G; Labin, Jonathan W; Rosenlof, Eric R

    2007-01-01

    ... * Commander Federate simulates the human decision process by employing -- A fuzzy expert system to set warfare priorities either by time or event and provides inter-warfare area conflict resolution...

  9. Garrison Command Skills for Success

    Science.gov (United States)

    2008-01-01

    Leadership” in Leadership: Theory and Practice, third edition, by Peter G. Northouse (Thousand Oaks, CA.: Sage) 2006, pp. 206-210 11. From Garrison Commander briefing received via personal e-mail, Oct. 3, 2007.

  10. Identification of Company Command Competencies

    Science.gov (United States)

    2013-06-01

    45 Virtual role plays ( VRPs ) could be used to measure many of the company command competencies identified in this project. In a VRP , the user...could play the role of a Company Commander who must deal with myriad crises, challenges, and potential opportunities. In a web- enabled VRP , the user...to be concerned about. Future research should create VRPs or other engaging assessments to determine proficiency levels on the identified company

  11. Company Command: The Bottom Line

    Science.gov (United States)

    1990-11-20

    34 Separation from the Militar. -Alcohol and Drug Abuse -Unsatisfactory Performance -Overweight Problem - Homosexuality -Civil Conviction -Acts or Patterns of...cases-such as drug abusers, homosexuals , and thieves. New company commanders often choose administra- tive elimination proceedings over court-martial...opportunity goal is to create a command cli- mate that nurtures fair treatment for all soldiers. 98 Personnel and Administration Shortly after you

  12. Command Process Modeling & Risk Analysis

    Science.gov (United States)

    Meshkat, Leila

    2011-01-01

    Commanding Errors may be caused by a variety of root causes. It's important to understand the relative significance of each of these causes for making institutional investment decisions. One of these causes is the lack of standardized processes and procedures for command and control. We mitigate this problem by building periodic tables and models corresponding to key functions within it. These models include simulation analysis and probabilistic risk assessment models.

  13. Eksplozivne materije za neosetljiva ubojna sredstva / Explosive substances for insensitive munitions

    Directory of Open Access Journals (Sweden)

    Radun Jeremić

    2005-03-01

    Full Text Available U skladu sa sve strožim zahtevima za očuvanje životne sredine i većom bezbednošću, tendencije u razvoju suvremenih ubojnih sredstava (UbS, pored povećanja pouzdanosti i efikasnosti, usmerene su i na povećanje sigurnosti pri njihovoj proizvodnji, skladištenju, manipulaciji i upotrebi. Na taj način dobijena je nova kategorija UbS, tzv. neosetljiva UbS, kod kojih je verovatnoća neželjenog aktiviranja pod dejstvom spoljnih impulsa svedena na minimum. Suština rešavanja ovog problema je primena eksplozivnih materija koje su mnogo manje osetljive na spoljne uticaje u odnosu na standardne. Osnovni zahtev koji se pri tome postavlja je da taktičko-tehničke karakteristike ostanu na nivou ili budu bolje u odnosu na postojeća UbS. U radu je ukratko objašnjen koncept razvoja neosetljivih UbS i dat pregled najznačajnijih rezultata istraživanja u oblasti eksplozivnih materija koje zadovoljavaju zahteve za primenu u neosetljivim UbS. / According to severe environment protection and safety requirements, tendencies in development of modern munitions, besides of increasing reliability and efficiency, are directed to decreasing of danger during their processing, storing, handling and operating. In that manner the new category of munitions has been obtained, named insensitive munitions, with a minimum probability of unplanned activating. The best method for solving this problem is using of explosive substances that are more insensitive according to standard ones. The main requirement is the tactical and technical characteristics stay at the level or to be better according to the existing munitions. In this paper the developing concept of insensitive munitions is shortly explained and presented a review of most important research results of explosive materials that fulfill requirements for applying in insensitive munitions.

  14. The Double Love Commandment

    Directory of Open Access Journals (Sweden)

    Francois P. Viljoen

    2015-03-01

    Full Text Available The Gospel of Matthew was written during a period of dispute between the Matthean community and their fellow Jews, with the Pharisees playing a leading role. The Matthean community was heir to the same scriptures as its opponents. They continued to have a firm commitment to the Torah, but they developed a distinctive understanding of it based on Jesus’ teaching. The formation of this community is investigated in this article, considering the Mediterranean perspectives of group-oriented societies prevalent in the first century. Such a group provided a sense of self and an interactive support system, where love functioned to bind the group together. The subordinates showed their undivided loyalty towards their superiors because of the favours they received from them, whilst they supported and cared for other members within the group as they care for themselves. Reading the double love commandment of Matthew 22:34−40 from this perspective reveals significant aspects of the community’s identity with regard to their commitment to God and their view of their neighbours. Die Dubbele Liefdesgebod. Die Matteusevangelie is gedurende ’n periode van konfliktussen die Matteusgemeenskap en mede-Jode geskryf met die Fariseërs in ’n leidende rol. Die Matteusgemeenskap het van dieselfde geskrifte as hulle opponente gebruik gemaak. Hulle was steeds aan die Torah lojaal, maar het ’n unieke interpretasie daarvan gehuldig, gebaseer op die onderrig van Jesus. In hierdie artikel word die vorming van die Matteusgemeenskap ondersoek met inagneming van die Mediterreense beskouing van die groepgeoriënteerde gemeenskappe wat tipies van die eerste eeu was. So ’n groep het aan individue ’n bewustheid van eie waarde verskaf te midde van ’n interaktiewe ondersteuningsisteem waarin liefde as samebindende faktor gefunksioneer het. Ondergeskiktes het onverdeelde lojaliteit teenoor hulle meerderes betoon vanweë die gunste wat hulle van die meerderes geniet het

  15. The Double Love Commandment

    Directory of Open Access Journals (Sweden)

    Francois P. Viljoen

    2015-03-01

    Full Text Available The Gospel of Matthew was written during a period of dispute between the Matthean community and their fellow Jews, with the Pharisees playing a leading role. The Matthean community was heir to the same scriptures as its opponents. They continued to have a firm commitment to the Torah, but they developed a distinctive understanding of it based on Jesus’ teaching. The formation of this community is investigated in this article, considering the Mediterranean perspectives of group-oriented societies prevalent in the first century. Such a group provided a sense of self and an interactive support system, where love functioned to bind the group together. The subordinates showed their undivided loyalty towards their superiors because of the favours they received from them, whilst they supported and cared for other members within the group as they care for themselves. Reading the double love commandment of Matthew 22:34−40 from this perspective reveals significant aspects of the community’s identity with regard to their commitment to God and their view of their neighbours.Die Dubbele Liefdesgebod. Die Matteusevangelie is gedurende ’n periode van konfliktussen die Matteusgemeenskap en mede-Jode geskryf met die Fariseërs in ’n leidende rol. Die Matteusgemeenskap het van dieselfde geskrifte as hulle opponente gebruik gemaak. Hulle was steeds aan die Torah lojaal, maar het ’n unieke interpretasie daarvan gehuldig, gebaseer op die onderrig van Jesus. In hierdie artikel word die vorming van die Matteusgemeenskap ondersoek met inagneming van die Mediterreense beskouing van die groepgeoriënteerde gemeenskappe wat tipies van die eerste eeu was. So ’n groep het aan individue ’n bewustheid van eie waarde verskaf te midde van ’n interaktiewe ondersteuningsisteem waarin liefde as samebindende faktor gefunksioneer het. Ondergeskiktes het onverdeelde lojaliteit teenoor hulle meerderes betoon vanweë die gunste wat hulle van die meerderes geniet het

  16. Strategic Global Climate Command?

    Science.gov (United States)

    Long, J. C. S.

    2016-12-01

    Researchers have been exploring geoengineering because Anthropogenic GHG emissions could drive the globe towards unihabitability for people, wildlife and vegetation. Potential global deployment of these technologies is inherently strategic. For example, solar radiation management to reflect more sunlight might be strategically useful during a period of time where the population completes an effort to cease emissions and carbon removal technologies might then be strategically deployed to move the atmospheric concentrations back to a safer level. Consequently, deployment of these global technologies requires the ability to think and act strategically on the part of the planet's governments. Such capacity most definitely does not exist today but it behooves scientists and engineers to be involved in thinking through how global command might develop because the way they do the research could support the development of a capacity to deploy intervention rationally -- or irrationally. Internationalizing research would get countries used to working together. Organizing the research in a step-wise manner where at each step scientists become skilled at explaining what they have learned, the quality of the information they have, what they don't know and what more they can do to reduce or handle uncertainty, etc. Such a process can increase societal confidence in being able to make wise decisions about deployment. Global capacity will also be enhanced if the sceintific establishment reinvents misssion driven research so that the programs will identify the systemic issues invovled in any proposed technology and systematically address them with research while still encouraging individual creativity. Geoengineering will diverge from climate science in that geoengineering research needs to design interventions for some publically desirable goal and investigates whether a proposed intervention will acheive desired outcomes. The effort must be a systems-engineering design problem

  17. Nitroaromatic munition compounds: environmental effects and screening values.

    Science.gov (United States)

    Talmage, S S; Opresko, D M; Maxwell, C J; Welsh, C J; Cretella, F M; Reno, P H; Daniel, F B

    1999-01-01

    Available data on the occurrence, transport, transformation, and toxicity of eight nitroaromatic munition compounds and their degradation products, TNT, TNB, DNB, DNA, 2-ADNT, RDX, HMX, and tetryl were used to identify potential fate in the environment and to calculate screening benchmarks or safe environmental levels for aquatic and terrestrial organisms. Results of monitoring studies revealed that some of these compounds persist at sites where they were produced or processed. Most of the compounds are present in soil, sediment, and surface water or groundwater at military sites. Soil adsorption coefficients indicate that these chemicals are only moderately adsorbed to soil and may leach to groundwater. Most of these compounds are transformed by abiotic or biotic mechanisms in environmental media. Primary transformation mechanisms involve photolysis (TNT, RDX, HMX, tetryl), hydrolysis (tetryl), and microbial degradation (TNT, TNB, DNB, DNA, 2-ADNT, and HMX). Microbial degradation for both nitro and nitramine aromatic compounds involves rapid reduction of nitro groups to amino groups, but further metabolism is slow. With the exception of DNB, complete mineralization did not usually occur under the conditions of the studies. RDX was resistant to microbial degradation. Available ecotoxicological data on acute and chronic studies with freshwater fish and invertebrates were summarized, and water quality criteria or ecotoxicological screening benchmarks were developed. Depending on the available data, criteria/benchmarks were calculated according to USEPA Tier I or Tier II guidelines. The munitions chemicals are moderately to highly toxic to freshwater organisms, with chronic screening values humans are based on studies with laboratory animals, reference doses or screening benchmarks for wildlife may also be calculated by extrapolation among mammalian species. Chronic NOAELs for the compounds of interest were determined from available laboratory studies. Endpoints

  18. Acoustic Resonance Spectroscopy (ARS) Munition Classification System enhancements. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Vela, O.A.; Huggard, J.C.

    1997-09-18

    Acoustic Resonance Spectroscopy (ARS) is a non-destructive evaluation technology developed at the Los Alamos National Laboratory (LANL). This technology has resulted in three generations of instrumentation, funded by the Defense Special Weapons Agency (DSWA), specifically designed for field identification of chemical weapon (CW) munitions. Each generation of ARS instrumentation was developed with a specific user in mind. The ARS1OO was built for use by the U.N. Inspection Teams going into Iraq immediately after the Persian Gulf War. The ARS200 was built for use in the US-Russia Bilateral Chemical Weapons Treaty (the primary users for this system are the US Onsite Inspection Agency (OSIA) and their Russian counterparts). The ARS300 was built with the requirements of the Organization for the Prohibition of Chemical Weapons (OPCW) in mind. Each successive system is an improved version of the previous system based on learning the weaknesses of each and, coincidentally, on the fact that more time was available to do a requirements analysis and the necessary engineering development. The ARS300 is at a level of development that warrants transferring the technology to a commercial vendor. Since LANL will supply the computer software to the selected vendor, it is possible for LANL to continue to improve the decision algorithms, add features where necessary, and adjust the user interface before the final transfer occurs. This paper describes the current system, ARS system enhancements, and software enhancements. Appendices contain the Operations Manual (software Version 3.01), and two earlier reports on enhancements.

  19. The ergonomics of command and control

    OpenAIRE

    Stanton, NA; Baber, C

    2006-01-01

    Since its inception, just after the Second World War, ergonomics research has paid special attention to the issues surrounding human control of systems. Command and Control environments continue to represent a challenging domain for Ergonomics research. We take a broad view of Command and Control research, to include C2 (Command and Control), C3 (Command, Control and Communication), and C4 (Command, Control, Communication and Computers) as well as human supervisory control paradigms. This spe...

  20. Network Centric Warfare Case Study: U.S. V Corps and 3rd Infantry Division (Mechanized) During Operation Iraqi Freedom Combat Operations (Mar-Apr 2003). Volume 2: Command, Control, Communications and Computer Architectures

    Science.gov (United States)

    2003-01-01

    such as the Multi-Channel (MC) and Single Channel (SC) Tactical Satelite TACSAT) systems. Even with supporting the 270 separate command posts, MSE and...IMACTS/IPL DISN LES/disk/ tape Binary SECRET Imagery Other Govt. LANDSAT LANDSAT Disk Binary SECRET SPOT SPOT Disk Binary SECRET Imagery Allied French

  1. New command centre of the Lech Power Works. Planning and execution of command and control technology

    Energy Technology Data Exchange (ETDEWEB)

    Marschall, J.

    1985-10-28

    On February 25, 1985 the Lech Electricity Works in Augsburg took into service their new control centre for the operational control of the entire maximum, high and low voltage networks. As the replacement for the now outpaced old control centre it was installed along the most modern lines under retention of the remote control substations. The total of eight combined operation process computer AEG 80-30 charaterise the scope of the network command technology, whereby in several subsectors completely new paths were trodden for the first time. So for example the design of light technology, the monitor display illumination and the graphical system Gradas which controls the medium voltage network, operation using digitizer and the operation telecommunications system. (orig.).

  2. Acute toxicity of sea-dumped chemical munitions: Luminating the environmental toxicity of legacy compounds

    DEFF Research Database (Denmark)

    Mohammed Abdullah Christensen, Ilias; Sanderson, Hans; Baatrup, Erik

    2016-01-01

    As a result of the disarmament of Germany after the Second World War, 65,000 tons of chemical munitions were dumped in the Baltic Sea. Approximately 13,000 tons containing chemical warfare agents (CWAs) of which 11,000 tons were dumped in the Bornholm Basin east of Bornholm. This paper addresses...

  3. Finite Element Modeling of Scattering from Underwater Proud and Buried Military Munitions

    Science.gov (United States)

    2017-02-28

    FINAL REPORT Finite Element Modeling of Scattering from Underwater Proud and Buried Military Munitions SERDP Project MR-2408 JULY 2017...solution and the red dash-dot line repre- sents the coupled finite -boundary element solution. . . . . . . . . . . . . . . . . . 11 3 The scattering...dot line represents the coupled finite -boundary element solution. . . . . . . . 11 i 4 The scattering amplitude as a function of the receiver angle for

  4. Dimensions of operational stress and forms of unacceptable risk taking with small arms and munitions.

    Science.gov (United States)

    Ben-Shalom, Uzi

    2015-01-01

    Accidents with small arms and munitions during deployment is a significant safety concern for leaders and safety specialists in combat units. Operational stress may lead to forms of unacceptable risk taking with small arms that may underlie some of these accidents. The present research studied the correlation between two dimensions of operational stress, two forms of risk taking with small arms among combat unit soldiers and possible mediators. The dimensions of operational threat, negative affect and personality profile from the EPQ-R-S were predictors; "exaggerated preparedness" and "risky games with small arms and munitions" were dependent variables; safety climate of the platoon served as a mediator variable. The participants were 461 compulsory service combat soldiers in 31 companies. This field study was conducted during period of top security alert. The results reveal that perceived threat is indeed correlated with exaggerated operational preparedness whereas general emotional state was correlated with risky games with small arms. Safety climate mediated only the correlation between general emotional state and risky games with small arms and munitions. Preparedness and risky games were predicted by the interaction of Psychoticism and the Lie Scale from the EPQ-R-S. The results may enhance the efforts in reducing risk taking and prevention of accidents with small arms and munitions during and following deployment.

  5. Dissolution of NTO, DNAN, and Insensitive Munitions Formulations and Their Fates in Soils

    Science.gov (United States)

    2014-09-01

    A. Hayes. 2001. Transformation of TNT in an aerobic compost : Structure and reactivity effects in the covalent binding of aromatic amines to organic... Effects of outdoor weathering and dissolution on three insensitive munitions formulations after 17 days (top) and 1 year (bottom). Approved for...bars are smaller than the symbols ............................................................................................ 33 22 Effect of

  6. Estimating Grass-Soil Bioconcentration of Munitions Compounds from Molecular Structure.

    Science.gov (United States)

    Torralba Sanchez, Tifany L; Liang, Yuzhen; Di Toro, Dominic M

    2017-10-03

    A partitioning-based model is presented to estimate the bioconcentration of five munitions compounds and two munition-like compounds in grasses. The model uses polyparameter linear free energy relationships (pp-LFERs) to estimate the partition coefficients between soil organic carbon and interstitial water and between interstitial water and the plant cuticle, a lipid-like plant component. Inputs for the pp-LFERs are a set of numerical descriptors computed from molecular structure only that characterize the molecular properties that determine the interaction with soil organic carbon, interstitial water, and plant cuticle. The model is validated by predicting concentrations measured in the whole plant during independent uptake experiments with a root-mean-square error (log predicted plant concentration-log observed plant concentration) of 0.429. This highlights the dominant role of partitioning between the exposure medium and the plant cuticle in the bioconcentration of these compounds. The pp-LFERs can be used to assess the environmental risk of munitions compounds and munition-like compounds using only their molecular structure as input.

  7. Disposal of chemical agents and munitions stored at Pine Bluff Arsenal, Pine Bluff, Arkansas

    Energy Technology Data Exchange (ETDEWEB)

    Ensminger, J.T.; Hillsman, E.L.; Johnson, R.D.; Morrisey, J.A.; Staub, W.P.; Boston, C.R.; Hunsaker, D.B.; Leibsch, E.; Rickert, L.W.; Tolbert, V.R.; Zimmerman, G.P.

    1991-09-01

    The Pine Bluff Arsenal (PBA) near Pine Bluff, Arkansas, is one of eight continental United States (CONUS) Army installations where lethal unitary chemical agents and munitions are stored and where destruction of agents and munitions is proposed under the Chemical Stockpile Disposal Program (CSDP). The chemical agent inventory at PBA consists of approximately 12%, by weight, of the total US stockpile. The destruction of the stockpile is necessary to eliminate the risk to the public from continued storage and to dispose of obsolete and leaking munitions. In 1988 the US Army issued a Final Programmatic Environmental Impact Statement (FPEIS) for the CSDP that identified on-site disposal of agents and munitions as the environmentally preferred alternative (i.e., the alternative with the least potential to cause significant adverse impacts). The purpose of this report is to examine the proposed implementation of on-site disposal at PBA in light of more recent and more detailed data than those on which the FPEIS is based. New population data were used to compute fatalities using the same computation methods and values for all other parameters as in the FPEIS. Results indicate that all alternatives are indistinguishable when the potential health impacts to the PBA community are considered. However, risks from on-site disposal are in all cases equal to or less than risks from other alternatives. Furthermore, no unique resources with the potential to prevent or delay implementation of on-site disposal at PBA have been identified.

  8. Issues in Afloat Command Control: The Computer-Commander Interface

    Science.gov (United States)

    1979-03-01

    Officer on watch, who all along had been more than a little worried, was becoming gravely uneasy. The lights of that distant steamer were looking " queer ...T.T.T., p. 3-4, 21-36, Houghton Mifflin Company, 1927. 10. Lawson, J.S., A Unified Theory of Command Control, paper presented at Military operations

  9. Ready...Set... Command! Rethinking Training for Squadron Commanders

    Science.gov (United States)

    2016-02-16

    current environment and develop future outcomes.53 Squadron commanders must learn how to harness critical thinking and promote its benefits through the...building a culture of innovation, critical thinking , and strategic alignment. 40 Gen Stephen R... critical . Critical Thinking 44 David Magellan Horth and Jonathan Vehar, “Innovation

  10. Apollo 11 Command Service Module

    Science.gov (United States)

    1969-01-01

    A close-up view of the Apollo 11 command service module ready to be mated with the spacecraft LEM adapter of the third stage. The towering 363-foot Saturn V was a multi-stage, multi-engine launch vehicle standing taller than the Statue of Liberty. Altogether, the Saturn V engines produced as much power as 85 Hoover Dams.

  11. Experiences as Deputy Commander Air

    NARCIS (Netherlands)

    Freek Meulman

    2009-01-01

    In the period January 2007-February 2008 I was sent out to Afghanistan as Deputy Commander Air/Director Air Coordination Element. I worked at the International Security Assistance Force (ISAF) X Headquarters in Kabul. ISAF is a United Nations (UN) mandated mission led by the North Atlantic Treaty

  12. 32 CFR 724.405 - Commandant of the Marine Corps or the Commander, Naval Military Personnel Command.

    Science.gov (United States)

    2010-07-01

    ..., Naval Military Personnel Command. 724.405 Section 724.405 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY PERSONNEL NAVAL DISCHARGE REVIEW BOARD Principal Elements of the Navy Department Discharge Review System § 724.405 Commandant of the Marine Corps or the Commander, Naval Military...

  13. Applying the Combatant Command Construct to the DHS Command Structure

    Science.gov (United States)

    2012-06-17

    Furthermore, this type of cooperation does nothing to cure the organizational myopathy or component protectionism that exists within DHS. The...organizations and their past and present challenges in the joint effort. These shared challenges include unity of command, service protectionism , mission...DRO). Even industry is not immune from this confusion. If a shipping company has questions regarding import, export , or tariffs, they would have

  14. Command Decision-Making: Experience Counts

    National Research Council Canada - National Science Library

    Wolgast, Kelly A

    2005-01-01

    Decision-making is the mainstay of military leadership and command. Due to the changed nature of the current military environment, military commanders can no longer rely solely on the traditional Military Decision-making Process (MDMP...

  15. Command and Control in Littoral Operations

    Science.gov (United States)

    2016-05-13

    littoral environment, a co-equal command model is likely to fail as the interests of the CATF and CLF diverge. A capable commander leading an...headquarters with the JFMCC or JTF commander would also reduce turnaround time. Finally, the integrated staff model enhances cooperation and...successful accomplishment of his mission.” 25 Giving overall command of the Amphibious Force to an officer who is physically present and leading

  16. Company Command: The Bottom Line

    Science.gov (United States)

    1990-01-01

    PHILOSOPHY-After you publish your command philosophy (your overall modus operandi ), publish your training philosophy. It will estab- lish your guidelines... killer for the soldier and damages unit mo- rale. A good first sergeant will handle PLDC preparation for Vou. 126 Trraii ig Develop, where necessary. an...by serial numbers. Sub-hand receipt all weapons to your unit armorer. En- sure no soldier in your unit can draw a weapon from the arms room unless he

  17. On Preparing for Squadron Command

    Science.gov (United States)

    1988-04-01

    Management Control System (AINCS) Briefing 19, Records Management Briefing 20. PCS Funding e.nd PCS Policy Changes Briefing 21. Channels for Assignment...Parsonnel (Dr) S.1 A3signment Policy Changes 2. Civilian Performance Appraisals and Awards 3, Enllisted Retention and Recruitment Programs 4, Family...3. Officer Force Manangement 14. Quality Control (QC) for Enlisted Personnel on Assignment 10. Rated Officer Retention 11. Squadron Commander

  18. Windows Command Line Administration Instant Reference

    CERN Document Server

    Mueller, John Paul

    2010-01-01

    The perfect companion to any book on Windows Server 2008 or Windows 7, and the quickest way to access critical information. Focusing just on the essentials of command-line interface (CLI), Windows Command-Line Administration Instant Reference easily shows how to quickly perform day-to-day tasks of Windows administration without ever touching the graphical user interface (GUI). Specifically designed for busy administrators, Windows Command-Line Administration Instant Reference replaces many tedious GUI steps with just one command at the command-line, while concise, easy to access answers provid

  19. Munitions Response Projects Shallow Water Marine UXO Detection Survey - Underwater Survey of Camp Lejeune

    Science.gov (United States)

    2011-03-01

    task helped to minimize production losses during the technology demonstration by anticipating potential equipment failure and/or system integration...Investigator David Lynch Range Development MCIEAST Operations & Training, MCB Camp Lejeune, North Carolina (910) 451-5772 MC Project Lead Herb Nelson...SERDP & ESTCP Washington DC 703-696-8726 ( Voice ) 202-215-4844 (Cell) Munitions Management Program Manager Raye Lahti AMEC Earth

  20. Improving post-detonation energetics residues estimations for the Life Cycle Environmental Assessment process for munitions.

    Science.gov (United States)

    Walsh, Michael; Gullett, Brian; Walsh, Marianne; Bigl, Matthew; Aurell, Johanna

    2018-03-01

    The Life Cycle Environmental Assessment (LCEA) process for military munitions tracks possible environmental impacts incurred during all phases of the life of a munition. The greatest energetics-based emphasis in the current LCEA process is on manufacturing. A review of recent LCEAs indicates that energetics deposition on ranges from detonations and disposal during training is only peripherally examined through assessment of combustion products derived from closed-chamber testing or models. These assessments rarely report any measurable energetic residues. Field-testing of munitions for energetics residues deposition has demonstrated that over 30% of some energetic compounds remain after detonation, which conflicts with the LCEA findings. A study was conducted in the open environment to determine levels of energetics residue deposition and if combustion product results can be correlated with empirical deposition results. Energetics residues deposition, post-detonation combustion products, and fine aerosolized energetics particles following open-air detonation of blocks of Composition C4 (510 g RDX/block) were quantified. The deposited residues amounted to 3.6 mg of energetic per block of C4, or less than 0.001% of the original energetics. Aerial emissions of energetics were about 7% of the amount of deposited energetics. This research indicates that aerial combustion products analysis can provide a valuable supplement to energetics deposition data in the LCEA process but is insufficient alone to account for total residual energetics. This study demonstrates a need for the environmental testing of munitions to quantify energetics residues from live-fire training. Published by Elsevier Ltd.

  1. Disposal of chemical agents and munitions stored at Umatilla Depot Activity, Hermiston, Oregon

    Energy Technology Data Exchange (ETDEWEB)

    Zimmerman, G.P.; Hillsman, E.L.; Johnson, R.O.; Miller, R.L.; Patton, T.G.; Schoepfle, G.M.; Tolbert, V.R.; Feldman, D.L.; Hunsaker, D.B. Jr.; Kroodsma, R.L.; Morrissey, J.; Rickert, L.W.; Staub, W.P.; West, D.C.

    1993-02-01

    The Umatilla Depot Activity (UMDA) near Hermiston, Oregon, is one of eight US Army installations in the continental United States where lethal unitary chemical agents and munitions are stored, and where destruction of agents and munitions is proposed under the Chemical Stockpile Disposal Program (CSDP). The chemical agent inventory at UMDA consists of 11.6%, by weight, of the total US stockpile. The destruction of the stockpile is necessary to eliminate the risk to the public from continued storage and to dispose of obsolete and leaking munitions. In 1988 the US Army issued a Final Programmatic Environmental Impact Statement (FPEIS) for the CSDP that identified on-site disposal of agents and munitions as the environmentally preferred alternative (i.e., the alternative with the least potential to cause significant adverse impacts), using a method based on five measures of risk for potential human health and ecosystem/environmental effects; the effectiveness and adequacy of emergency preparedness capabilities also played a key role in the FPEIS selection methodology. In some instances, the FPEIS included generic data and assumptions that were developed to allow a consistent comparison of potential impacts among programmatic alternatives and did not include detailed conditions at each of the eight installations. The purpose of this Phase 1 report is to examine the proposed implementation of on-site disposal at UMDA in light of more recent and more detailed data than those included in the FPEIS. Specifically, this Phase 1 report is intended to either confirm or reject the validity of on-site disposal for the UMDA stockpile. Using the same computation methods as in the FPEIS, new population data were used to compute potential fatalities from hypothetical disposal accidents. Results indicate that onsite disposal is clearly preferable to either continued storage at UMDA or transportation of the UMDA stockpile to another depot for disposal.

  2. Determining Detection and Classification Potential of Munitions using Advanced EMI Sensors in the Underwater Environment

    Science.gov (United States)

    2016-11-01

    proposed to detect and characterize Unexploded Ordnances (UXO) and discarded military munitions (DMM) in the underwater environment including acoustic ...campaign. A diver placed the 105 mm projec- tile at each of the test locations and background measurements were collected before and after each...USBL) acoustics are not always accurate. 4) For operation in a cued mode, there are significant challenges associated with relocating the anomaly of

  3. Safety and Suitability for Service Assessment Testing for Aircraft Launched Munitions

    Science.gov (United States)

    2013-07-01

    nitro- glycerine based propellants). b. Nine days of testing at 71 °C has been calculated (using the Arrhenius relationship) to give a similar...intended to aggravate those thermally induced degradation mechanisms associated with elevated skin temperatures and thermal gradients within the...munitions only installed on fixed wing aircraft. Furthermore, consideration should be made to the likelihood of high speed impact with sand and dust

  4. Safety and Suitability for Service Assessment Testing for Shoulder Launched Munitions

    Science.gov (United States)

    2014-11-07

    glycerine based propellants). The 60 ºC temperature will require a longer test duration of 19 days. If it can be demonstrated that the hot stream...1, Paragraph 5). This test is intended to aggravate those thermally induced degradation mechanisms associated with elevated skin temperatures and...300, Method 308 is used to determine if mould growth will occur and, if so, how it may degrade/ impact the use of the munition. Twenty- eight days

  5. Innovative permeable cover system to reduce risks at a chemical munitions burial site

    Energy Technology Data Exchange (ETDEWEB)

    Powels, C.C. [Army Garrison, Aberdeen Proving Ground, MD (United States); Bon, I. [Army Corps. of Engineers, Aberdeen Proving Ground, MD (United States); Okusu, N.M. [ICF Kaiser Engineering, Savannah, GA (United States)

    1997-12-31

    An innovative permeable sand cover with various integrated systems has been designed to contain and treat the Old O-Field chemical munitions landfill at Aberdeen Proving Ground, Maryland. The 18,200 m{sup 2} (4.5 acre) landfill was used from the mid 1930s to the mid 1950s for the disposal of chemical, incendiary, and explosive munitions from domestic and foreign origins, together with contaminated wastes associated with the development and production of chemical warfare agents (CWA). The site is suspected to be contaminated with white phosphorous (WP) (which when dry, spontaneously burns when exposed to air), shock sensitive picric acid fuses and has the potential to contain large quantities of CWA-filled munitions. Historically, one to three explosions or fires occurred per ten-year period at the landfill. Such events have the potential to cause a CWA release to the environment, which could potentially affect densely populated areas. Recovery and decontamination projects conducted at the site in the late 1940s and early 1950s used large amounts of decontamination chemicals (containing solvents) and fuels which further contaminated the area. The groundwater downgradient of the landfill is contaminated with volatile organic compounds, metals, explosives and CWA degradation compounds and is currently being contained by a groundwater extraction and treatment system. This report describes a remedial action program for the site.

  6. 10 commandments of smile esthetics

    OpenAIRE

    Andre Wilson Machado

    2014-01-01

    The search for esthetic treatment has persisted in the routine of dental professionals. Following this trend, dental patients have sought treatment with the primary aim of improving smile esthetics. The aim of this article is to present a protocol to assess patient's smile: The 10 Commandments of smile esthetics. Pacientes em busca de tratamentos estéticos são uma constante na rotina de todos os profissionais que oferecem este tipo de serviço. Seguindo esta tendência, os pacientes odontoló...

  7. ART OF THE POSSIBLE: SECURING AIR FORCE SPACE COMMAND MISSION SYSTEMS FOR THE WARFIGHTER

    Science.gov (United States)

    2016-10-23

    AU/ACSC/2016 AIR COMMAND STAFF COLLEGE AIR UNIVERSITY ART OF THE POSSIBLE: SECURING AIR FORCE SPACE COMMAND MISSION SYSTEMS FOR THE...24th Air Force provides Tier II CSSP support for both non-secure and secret network but not for any of the nearly 250 spaced based mission systems...objectives that specifically map to the four primary concerns and issues. Therefore the 250 AFSPC mission systems supporting DOD warfighters from a space

  8. Blossom Point Satellite Tracking and Command Station

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: The Blossom Point Satellite Command and Tracking Facility (BP) provides engineering and operational support to several complex space systems for the Navy...

  9. Command and Control of Special Operations Forces Missions in the US Northern Command Area of Responsibility

    National Research Council Canada - National Science Library

    McGregor, Ottis W., III

    2005-01-01

    The need for a well thought out, planned, and rehearsed command and control organization to conduct special operations in the US Northern Command Area of Responsibility is vital to success in defending the Homeland...

  10. Capturing a Commander's decision making style

    Science.gov (United States)

    Santos, Eugene; Nguyen, Hien; Russell, Jacob; Kim, Keumjoo; Veenhuis, Luke; Boparai, Ramnjit; Stautland, Thomas Kristoffer

    2017-05-01

    A Commander's decision making style represents how he weighs his choices and evaluates possible solutions with regards to his goals. Specifically, in the naval warfare domain, it relates the way he processes a large amount of information in dynamic, uncertain environments, allocates resources, and chooses appropriate actions to pursue. In this paper, we describe an approach to capture a Commander's decision style by creating a cognitive model that captures his decisionmaking process and evaluate this model using a set of scenarios using an online naval warfare simulation game. In this model, we use the Commander's past behaviors and generalize Commander's actions across multiple problems and multiple decision making sequences in order to recommend actions to a Commander in a manner that he may have taken. Our approach builds upon the Double Transition Model to represent the Commander's focus and beliefs to estimate his cognitive state. Each cognitive state reflects a stage in a Commander's decision making process, each action reflects the tasks that he has taken to move himself closer to a final decision, and the reward reflects how close he is to achieving his goal. We then use inverse reinforcement learning to compute a reward for each of the Commander's actions. These rewards and cognitive states are used to compare between different styles of decision making. We construct a set of scenarios in the game where rational, intuitive and spontaneous decision making styles will be evaluated.

  11. XTCE. XML Telemetry and Command Exchange Tutorial

    Science.gov (United States)

    Rice, Kevin; Kizzort, Brad; Simon, Jerry

    2010-01-01

    An XML Telemetry Command Exchange (XTCE) tutoral oriented towards packets or minor frames is shown. The contents include: 1) The Basics; 2) Describing Telemetry; 3) Describing the Telemetry Format; 4) Commanding; 5) Forgotten Elements; 6) Implementing XTCE; and 7) GovSat.

  12. Precede-and-command revisited revisited

    NARCIS (Netherlands)

    Zwart, Cornelius

    2015-01-01

    Basing his argumentation on an analysis of condition C effects, Bruening (2014) proposes to replace the familiar notion of c-command underlying dependency relations with a precede-and-command condition, which defines dependency relations as precedence relations within a local domain (phase). In this

  13. 32 CFR 700.702 - Responsibility and authority of commanders.

    Science.gov (United States)

    2010-07-01

    ... responsibility throughout their commands. (c) Subject to orders of higher authority, and subject to the... 32 National Defense 5 2010-07-01 2010-07-01 false Responsibility and authority of commanders. 700... Commanders In Chief and Other Commanders Titles and Duties of Commanders § 700.702 Responsibility and...

  14. Social Networks and Network Structures

    Science.gov (United States)

    2006-11-01

    Research in Command & Control • Latent Semantic Analysis – Team communication – Emergent team dynamics – Shared situation awareness • Dynamic Network...requirements – Information technology requirements 28 LSA Essentials of Latent Semantic Analysis 29 Communication Analysis • Goal: Automatically monitor and

  15. Implementing the Hospital Emergency Incident Command System: an integrated delivery system's experience.

    Science.gov (United States)

    Zane, Richard D; Prestipino, Ann L

    2004-01-01

    Hospital disaster manuals and response plans often lack formal command structure; instead, they rely on the presence of key individuals who are familiar with hospital operations, or who are in leadership positions during routine, day-to-day operations. Although this structure occasionally may prove to be successful, it is unreliable, as this leadership may be unavailable at the time of the crisis, and may not be sustainable during a prolonged event. The Hospital Emergency Incident Command System (HEICS) provides a command structure that does not rely on specific individuals, is flexible and expandable, and is ubiquitous in the fire service, emergency medical services, military, and police agencies, thus allowing for ease of communication during event management. A descriptive report of the implementation of the HEICS throughout a large healthcare network is reviewed. Implementation of the HEICS provides a consistent command structure for hospitals that enables consistency and commonality with other hospitals and disaster response entities.

  16. Classical command of quantum systems.

    Science.gov (United States)

    Reichardt, Ben W; Unger, Falk; Vazirani, Umesh

    2013-04-25

    Quantum computation and cryptography both involve scenarios in which a user interacts with an imperfectly modelled or 'untrusted' system. It is therefore of fundamental and practical interest to devise tests that reveal whether the system is behaving as instructed. In 1969, Clauser, Horne, Shimony and Holt proposed an experimental test that can be passed by a quantum-mechanical system but not by a system restricted to classical physics. Here we extend this test to enable the characterization of a large quantum system. We describe a scheme that can be used to determine the initial state and to classically command the system to evolve according to desired dynamics. The bipartite system is treated as two black boxes, with no assumptions about their inner workings except that they obey quantum physics. The scheme works even if the system is explicitly designed to undermine it; any misbehaviour is detected. Among its applications, our scheme makes it possible to test whether a claimed quantum computer is truly quantum. It also advances towards a goal of quantum cryptography: namely, the use of 'untrusted' devices to establish a shared random key, with security based on the validity of quantum physics.

  17. Development and Validation of Nigerian Army Commanding Officers ...

    African Journals Online (AJOL)

    The factors depicted eight core functions of the commanding officer namely: general, command and training, administration, welfare, security, communication, liaison, and miscellaneous. The commanding officers' job description index constituted psychological constructs, which had implications for appointment, training and ...

  18. GBU-X bounding requirements for highly flexible munitions

    Science.gov (United States)

    Bagby, Patrick T.; Shaver, Jonathan; White, Reed; Cafarelli, Sergio; Hébert, Anthony J.

    2017-04-01

    This paper will present the results of an investigation into requirements for existing software and hardware solutions for open digital communication architectures that support weapon subsystem integration. The underlying requirements of such a communication architecture would be to achieve the lowest latency possible at a reasonable cost point with respect to the mission objective of the weapon. The determination of the latency requirements of the open architecture software and hardware were derived through the use of control system and stability margins analyses. Studies were performed on the throughput and latency of different existing communication transport methods. The two architectures that were tested in this study include Data Distribution Service (DDS) and Modular Open Network Architecture (MONARCH). This paper defines what levels of latency can be achieved with current technology and how this capability may translate to future weapons. The requirements moving forward within communications solutions are discussed.

  19. THE ROLE OF REMOTE SENSING IN IDENTIFYING BURIED WORLD WAR I MUNITIONS AT THE AMERICAN UNIVERSITY, WASHINGTON, D.C.

    Science.gov (United States)

    During World War 1, The American University in Washington D.C. was used by the U.S. Army as an experiment station for the development and testing of a variety of battlefield munitions including chemical weapons such as Mustard Gas, Phosgene, Ricin and Lewisite, among others. Afte...

  20. THE ROLE OF REMOTE SENSING IN IDENTIFYING BURIED WORLD WAR 1 MUNITIONS AT THE AMERICAN UNIVERSITY, WASHINGTON, D.C.

    Science.gov (United States)

    During World War 1, The American University in Washington D.C. was used by the U.S. Army as an experiment station for the development and testing of a variety of battlefield munitions including chemical weapons such as Mustard Gas, Phosgene, Ricin and Lewisite, among others. Afte...

  1. THE ROLE OF REMOTE SENSING AND GIS IN IDENTIFYING BURIED WORLD WAR I MUNITIONS AT THE AMERICAN UNIVERSITY, WASHINGTON, DC

    Science.gov (United States)

    During World War 1, The American University in Washington D.C. was used by the U.S. Army as an experiment station for the development and testing of a variety of battlefield munitions including chemical weapons such as Mustard Gas, Phosgene, Ricin and Lewisite, among others. Afte...

  2. Disposal of chemical agents and munitions stored at Pine Bluff Arsenal, Pine Bluff, Arkansas. Final phase 1, Environmental report

    Energy Technology Data Exchange (ETDEWEB)

    Ensminger, J.T.; Hillsman, E.L.; Johnson, R.D.; Morrisey, J.A.; Staub, W.P.; Boston, C.R.; Hunsaker, D.B.; Leibsch, E.; Rickert, L.W.; Tolbert, V.R.; Zimmerman, G.P.

    1991-09-01

    The Pine Bluff Arsenal (PBA) near Pine Bluff, Arkansas, is one of eight continental United States (CONUS) Army installations where lethal unitary chemical agents and munitions are stored and where destruction of agents and munitions is proposed under the Chemical Stockpile Disposal Program (CSDP). The chemical agent inventory at PBA consists of approximately 12%, by weight, of the total US stockpile. The destruction of the stockpile is necessary to eliminate the risk to the public from continued storage and to dispose of obsolete and leaking munitions. In 1988 the US Army issued a Final Programmatic Environmental Impact Statement (FPEIS) for the CSDP that identified on-site disposal of agents and munitions as the environmentally preferred alternative (i.e., the alternative with the least potential to cause significant adverse impacts). The purpose of this report is to examine the proposed implementation of on-site disposal at PBA in light of more recent and more detailed data than those on which the FPEIS is based. New population data were used to compute fatalities using the same computation methods and values for all other parameters as in the FPEIS. Results indicate that all alternatives are indistinguishable when the potential health impacts to the PBA community are considered. However, risks from on-site disposal are in all cases equal to or less than risks from other alternatives. Furthermore, no unique resources with the potential to prevent or delay implementation of on-site disposal at PBA have been identified.

  3. In-Flight Self-Alignment Method Aided by Geomagnetism for Moving Basement of Guided Munitions

    Directory of Open Access Journals (Sweden)

    Shuang-biao Zhang

    2015-01-01

    Full Text Available Due to power-after-launch mode of guided munitions of high rolling speed, initial attitude of munitions cannot be determined accurately, and this makes it difficult for navigation and control system to work effectively and validly. An in-flight self-alignment method aided by geomagnetism that includes a fast in-flight coarse alignment method and an in-flight alignment model based on Kalman theory is proposed in this paper. Firstly a fast in-flight coarse alignment method is developed by using gyros, magnetic sensors, and trajectory angles. Then, an in-flight alignment model is derived by investigation of the measurement errors and attitude errors, which regards attitude errors as state variables and geomagnetic components in navigation frame as observed variables. Finally, fight data of a spinning projectile is used to verify the performance of the in-flight self-alignment method. The satisfying results show that (1 the precision of coarse alignment can attain below 5°; (2 the attitude errors by in-flight alignment model converge to 24′ at early of the latter half of the flight; (3 the in-flight alignment model based on Kalman theory has better adaptability, and show satisfying performance.

  4. Interactions between ingredients in IMX-101: Reactive Chemical Processes Control Insensitive Munitions Properties

    Energy Technology Data Exchange (ETDEWEB)

    Maharrey, Sean P.; Wiese-Smith, Deneille; Highley, Aaron M.; Behrens, Richard,; Kay, Jeffrey J

    2014-03-01

    Simultaneous Thermogravimetric Modulated Beam Mass Spectrometry (STMBMS) measurements have been conducted on a new Insensitive Munitions (IM) formulation. IMX-101 is the first explosive to be fully IM qualified under new NATO STANAG guidelines for fielded munitions. The formulation uses dinitroanisole (DNAN) as a new melt cast material to replace TNT, and shows excellent IM performance when formulated with other energetic ingredients. The scope of this work is to explain this superior IM performance by investigating the reactive processes occurring in the material when subjected to a well-controlled thermal environment. The dominant reactive processes observed were a series of complex chemical interactions between the three main ingredients (DNAN, NQ, and NTO) that occurs well below the onset of the normal decomposition process of any of the individual ingredients. This process shifts the thermal response of the formulations to a much lower temperature, where the kinetically controlled reaction processes are much slower. This low temperature shift has the effect of allowing the reactions to consume the reactive solids (NQ, NTO) well before the reaction rates increase and reach thermal runaway, resulting in a relatively benign response to the external stimuli. The main findings on the interaction processes are presented.

  5. Disruptive Effects of Net-Centricity on Command and Control

    National Research Council Canada - National Science Library

    Bay, John S

    2008-01-01

    .... The military command hierarchy must therefore get accustomed to issuing orders to "nobody in particular," and commanders will lack an individual subordinate with whom to attribute the responsibility...

  6. Using an integrated methods approach to analyse the emergent properties of military command and control.

    Science.gov (United States)

    Walker, Guy H; Stanton, Neville A; Stewart, Rebecca; Jenkins, Daniel; Wells, Linda; Salmon, Paul; Baber, Chris

    2009-07-01

    This paper applies the event analysis for systemic teamwork (EAST) method to an example of military command and control. EAST offers a way to describe system level emergent properties that arise from the complex interactions of system components (human and technical). These are described using an integrated methods approach and modelled using Task, Social and Propositional networks. The current article is divided into three parts: a brief description of the military command and control context, a brief description of the EAST method, and a more in depth presentation of the analysis outcomes. The emergent properties of the military scenario relate to the degree of system reconfigurability, systems level situational awareness and the role of mediating technology. The findings are compared with similar analyses undertaken in civilian domains, in which the latest developments in command and control, under the aegis of Network Enabled Capability (NEC), are already in place.

  7. Introduction to the Bash Command Line

    Directory of Open Access Journals (Sweden)

    Ian Milligan

    2014-09-01

    Full Text Available This lesson uses a Unix shell, which is a command-line interpreter that provides a user interface for the Unix operating system and for Unix-like systems. This lesson will cover a small number of basic commands. By the end of this tutorial you will be able to navigate through your file system and find files, open them, perform basic data manipulation tasks such as combining and copying files, as well as both reading them and making relatively simple edits. These commands constitute the building blocks upon which more complex commands can be constructed to fit your research data or project. Readers wanting a reference guide that goes beyond this lesson are recommended to read Deborah S. Ray and Eric J. Ray, Unix and Linux: Visual Quickstart Guide, 4th edition (2009.

  8. Spacecraft command and control using expert systems

    Science.gov (United States)

    Norcross, Scott; Grieser, William H.

    1994-11-01

    This paper describes a product called the Intelligent Mission Toolkit (IMT), which was created to meet the changing demands of the spacecraft command and control market. IMT is a command and control system built upon an expert system. Its primary functions are to send commands to the spacecraft and process telemetry data received from the spacecraft. It also controls the ground equipment used to support the system, such as encryption gear, and telemetry front-end equipment. Add-on modules allow IMT to control antennas and antenna interface equipment. The design philosophy for IMT is to utilize available commercial products wherever possible. IMT utilizes Gensym's G2 Real-time Expert System as the core of the system. G2 is responsible for overall system control, spacecraft commanding control, and spacecraft telemetry analysis and display. Other commercial products incorporated into IMT include the SYBASE relational database management system and Loral Test and Integration Systems' System 500 for telemetry front-end processing.

  9. Schema for Spacecraft-Command Dictionary

    Science.gov (United States)

    Laubach, Sharon; Garcia, Celina; Maxwell, Scott; Wright, Jesse

    2008-01-01

    An Extensible Markup Language (XML) schema was developed as a means of defining and describing a structure for capturing spacecraft command- definition and tracking information in a single location in a form readable by both engineers and software used to generate software for flight and ground systems. A structure defined within this schema is then used as the basis for creating an XML file that contains command definitions.

  10. Functions within the Naval Air Training Command

    Science.gov (United States)

    1984-02-15

    number. For X = N: Chief of Naval Air Training (CNATRA) Staff W: Training Air Wing ( TRAWING ) A: Naval Air Station (NAS) 3; Training Squadron...Provide assistance as required to TRAWING commands in preparation and execution of budget within the framework of guidance provided by CNATRA and...higher authority, WOO-69 Establish monetary controls as required to effectively monitor budget execution for TRAWING commands. WOO-70 Maintain

  11. The Combat Cloud: Enabling Multi-Domain Command and Control Across the Range of Military Operations

    Science.gov (United States)

    2017-03-01

    connectivity, such as that of a Long Term Evolution ( LTE ) network. As the user transitions out of the area of LTE coverage, the connectivity then...detection LTE : Long Term Evolution MADL: Multifunctional Advanced Data Link MDC2: Multi-Domain Command and Control MEF: Marine Expeditionary Force

  12. Bioaccumulation of chemical warfare agents, energetic materials, and metals in deep-sea shrimp from discarded military munitions sites off Pearl Harbor

    Science.gov (United States)

    Koide, Shelby; Silva, Jeff A. K.; Dupra, Vilma; Edwards, Margo

    2016-06-01

    The bioaccumulation of munitions-related chemicals at former military deep-water disposal sites is poorly understood. This paper presents the results of human-food-item biota sampling to assess the potential for bioaccumulation of chemical warfare agents, energetic materials, arsenic, and additional munitions-related metals in deep-sea shrimp tissue samples collected during the Hawai'i Undersea Military Munitions Assessment (HUMMA) project to date. The HUMMA investigation area is located within a former munitions sea-disposal site located south of Pearl Harbor on the island of O'ahu, Hawai'i, designated site Hawaii-05 (HI-05) by the United States Department of Defense. Indigenous deep-sea shrimp (Heterocarpus ensifer) were caught adjacent to discarded military munitions (DMM) and at control sites where munitions were absent. Tissue analysis results showed that chemical warfare agents and their degradation products were not present within the edible portions of these samples at detectable concentrations, and energetic materials and their degradation products were detected in only a few samples at concentrations below the laboratory reporting limits. Likewise, arsenic, copper, and lead concentrations were below the United States Food and Drug Administration's permitted concentrations of metals in marine biota tissue (if defined), and their presence within these samples could not be attributed to the presence of DMM within the study area based on a comparative analysis of munitions-adjacent and control samples collected. Based on this current dataset, it can be concluded that DMM existing within the HUMMA study area is not contributing to the bioaccumulation of munitions-related chemicals for the biota species investigated to date.

  13. Developing Methods for Detection of Munitions and Explosives of Concern in Offshore Wind Energy Areas

    Science.gov (United States)

    DuVal, C.; Trembanis, A. C.; Miller, J. K.; Carton, G.

    2016-12-01

    Munitions and Explosives of Concern (MEC) have been acknowledged globally as a topic of concern. Increasing use of coastal and continental shelf environments for renewable energy development and other activities has and continues to place humans in contact with legacy military munitions. The Bureau of Ocean Energy Management (BOEM) recognized the need to develop guidance concerning methods for MEC detection in the case of offshore energy development. The study was designed to identify the most likely MEC to be encountered in the Atlantic Outer Continental Shelf (OCS) Wind Energy Areas (WEA), review available technologies and develop a process for selecting appropriate technologies and methodologies for their detection. The process for selecting and optimizing technologies and methods for detection of MEC in BOEM OCS WEAs was developed and tested through the synthesis of historical research, physical site characterization, remote sensing technology review, and in-field trials. To test the selected approach, designated personnel were tasked with seeding a portion of the Delaware WEA with munitions surrogates, while a second group of researchers not privy to the surrogate locations, tested and optimized the selected methodology. The effectiveness of a methodology will be related to ease of detection and other associated parameters. The approach for the in-field trial consists of a combination of wide-area assessment surveying by vessel mounted 230/550 kHz Edgetech 6205 Phase Measuring sonar and near-seafloor surveying using a Teledyne Gavia autonomous underwater vehicle (AUV) equipped with high-resolution 900/1800 kHz Marine Sonics side-scan sonar, Geometrics G880-AUV cesium-vapor magnetometer, and 2 megapixel Point Grey color camera. Survey parameters (e.g. track-line spacing, coverage overlap, AUV altitude) were varied to determine the optimal survey methods, as well as simulate MEC burial to test magnetometer range performance. Preliminary results indicate the

  14. 32 CFR 536.3 - Command and organizational relationships.

    Science.gov (United States)

    2010-07-01

    ... potentially compensable events (PCEs) occurring within the command's geographic area of responsibility, in other areas for which the command is assigned claims responsibility, and during the course of the... supervision of the senior JA of each command in the area of responsibility of a command claims service so...

  15. Digital intelligent booster for DCC miniature train networks

    Science.gov (United States)

    Ursu, M. P.; Condruz, D. A.

    2017-08-01

    Modern miniature trains are now driven by means of the DCC (Digital Command and Control) system, which allows the human operator or a personal computer to launch commands to each individual train or even to control different features of the same train. The digital command station encodes these commands and sends them to the trains by means of electrical pulses via the rails of the railway network. Due to the development of the miniature railway network, it may happen that the power requirement of the increasing number of digital locomotives, carriages and accessories exceeds the nominal output power of the digital command station. This digital intelligent booster relieves the digital command station from powering the entire railway network all by itself, and it automatically handles the multiple powered sections of the network. This electronic device is also able to detect and process short-circuits and overload conditions, without the intervention of the digital command station.

  16. Linux Networking Cookbook

    CERN Document Server

    Schroder, Carla

    2008-01-01

    If you want a book that lays out the steps for specific Linux networking tasks, one that clearly explains the commands and configurations, this is the book for you. Linux Networking Cookbook is a soup-to-nuts collection of recipes that covers everything you need to know to perform your job as a Linux network administrator. You'll dive straight into the gnarly hands-on work of building and maintaining a computer network

  17. Advanced MicroObserver UGS integration with and cueing of the BattleHawk squad level loitering munition and UAV

    Science.gov (United States)

    Steadman, Bob; Finklea, John; Kershaw, James; Loughman, Cathy; Shaffner, Patti; Frost, Dean; Deller, Sean

    2014-06-01

    Textron's Advanced MicroObserver(R) is a next generation remote unattended ground sensor system (UGS) for border security, infrastructure protection, and small combat unit security. The original MicroObserver(R) is a sophisticated seismic sensor system with multi-node fusion that supports target tracking. This system has been deployed in combat theaters. The system's seismic sensor nodes are uniquely able to be completely buried (including antennas) for optimal covertness. The advanced version adds a wireless day/night Electro-Optic Infrared (EOIR) system, cued by seismic tracking, with sophisticated target discrimination and automatic frame capture features. Also new is a field deployable Gateway configurable with a variety of radio systems and flexible networking, an important upgrade that enabled the research described herein. BattleHawkTM is a small tube launched Unmanned Air Vehicle (UAV) with a warhead. Using transmitted video from its EOIR subsystem an operator can search for and acquire a target day or night, select a target for attack, and execute terminal dive to destroy the target. It is designed as a lightweight squad level asset carried by an individual infantryman. Although BattleHawk has the best loiter time in its class, it's still relatively short compared to large UAVs. Also it's a one-shot asset in its munition configuration. Therefore Textron Defense Systems conducted research, funded internally, to determine if there was military utility in having the highly persistent MicroObserver(R) system cue BattleHawk's launch and vector it to beyond visual range targets for engagement. This paper describes that research; the system configuration implemented, and the results of field testing that was performed on a government range early in 2013. On the integrated system that was implemented, MicroObserver(R) seismic detections activated that system's camera which then automatically captured images of the target. The geo-referenced and time-tagged Micro

  18. Evaluation of the metabolic fate of munitions material (TNT & RDX) in plant systems and initial assessment of material interaction with plant genetic material. Validation of the metabolic fate of munitions materials (TNT, RDX) in mature crops

    Energy Technology Data Exchange (ETDEWEB)

    Fellows, R.J.; Harvey, S.D.; Cataldo, D.A.

    1995-09-01

    The goals of this effort were to confirm and expand data related to the behavior and impacts of munitions residues upon human food chain components. Plant species employed included corn (Zea mays), alfalfa (Medicago sativa). spinach (Spinacea oleraceae), and carrot (Daucus carota). Plants were grown from seed to maturity (70 to 120 days) in a low-fertility soil (Burbank) amended with either {sup 14}C-TNT or {sup 14}C-RDX at which time they were harvested and analyzed for munitions uptake, partitioning, and chemical form of the munition or munition-metabolite. All four of the plant species used in this study accumulated the {sup 14}C-TNT- and RDX-derived label. The carrot, alfalfa, and corn demonstrated a higher percentage of label retained in the roots (62, 73, and 83% respectively). The spinach contained less activity in its root (36%) but also contained the highest TNT specific activity observed (>4600 jig TNT equivalents/g dry wt.). The specific uptake values of RDX for the spinach and alfalfa were comparable to those previously reported for wheat and bean (314 to 590 {mu}g RDX-equivalents/g dry wt. respectively). An exception to this may be the carrot where the specific activity was found to exceed 4200 {mu}g RDX-equivalents/g dry wt. in the shoot. The total accumulation of TNT by the plants ranged from 1.24% for the spinach to 2.34% for the carrot. The RDX plants ranging from 15% for the spinach to 37% for the carrot. There was no identifiable TNT or amino dinitrotoluene (ADNT) isomers present in the plants however, the parent RDX compound was found at significant levels in the shoot of alfalfa (> 1 80 {mu}g/g) and corn (>18 {mu}g/g).

  19. Linux command line and shell scripting bible

    CERN Document Server

    Blum, Richard

    2014-01-01

    Talk directly to your system for a faster workflow with automation capability Linux Command Line and Shell Scripting Bible is your essential Linux guide. With detailed instruction and abundant examples, this book teaches you how to bypass the graphical interface and communicate directly with your computer, saving time and expanding capability. This third edition incorporates thirty pages of new functional examples that are fully updated to align with the latest Linux features. Beginning with command line fundamentals, the book moves into shell scripting and shows you the practical application

  20. Disposal of chemical agents and munitions stored at Umatilla Depot Activity, Hermiston, Oregon. Final Phase 1 environmental report

    Energy Technology Data Exchange (ETDEWEB)

    Zimmerman, G.P.; Hillsman, E.L.; Johnson, R.O.; Miller, R.L.; Patton, T.G.; Schoepfle, G.M.; Tolbert, V.R.; Feldman, D.L.; Hunsaker, D.B. Jr.; Kroodsma, R.L.; Morrissey, J.; Rickert, L.W.; Staub, W.P.; West, D.C.

    1993-02-01

    The Umatilla Depot Activity (UMDA) near Hermiston, Oregon, is one of eight US Army installations in the continental United States where lethal unitary chemical agents and munitions are stored, and where destruction of agents and munitions is proposed under the Chemical Stockpile Disposal Program (CSDP). The chemical agent inventory at UMDA consists of 11.6%, by weight, of the total US stockpile. The destruction of the stockpile is necessary to eliminate the risk to the public from continued storage and to dispose of obsolete and leaking munitions. In 1988 the US Army issued a Final Programmatic Environmental Impact Statement (FPEIS) for the CSDP that identified on-site disposal of agents and munitions as the environmentally preferred alternative (i.e., the alternative with the least potential to cause significant adverse impacts), using a method based on five measures of risk for potential human health and ecosystem/environmental effects; the effectiveness and adequacy of emergency preparedness capabilities also played a key role in the FPEIS selection methodology. In some instances, the FPEIS included generic data and assumptions that were developed to allow a consistent comparison of potential impacts among programmatic alternatives and did not include detailed conditions at each of the eight installations. The purpose of this Phase 1 report is to examine the proposed implementation of on-site disposal at UMDA in light of more recent and more detailed data than those included in the FPEIS. Specifically, this Phase 1 report is intended to either confirm or reject the validity of on-site disposal for the UMDA stockpile. Using the same computation methods as in the FPEIS, new population data were used to compute potential fatalities from hypothetical disposal accidents. Results indicate that onsite disposal is clearly preferable to either continued storage at UMDA or transportation of the UMDA stockpile to another depot for disposal.

  1. Joint Ordnance Test Procedure (JOTP)-010 Safety and Suitability for Service Assessment Testing for Shoulder Launched Munitions

    Science.gov (United States)

    2013-01-08

    generate unrealistic degradation (e.g. for nitro-cellulose + nitro- glycerine based propellants). The 60 ºC temperature will require a longer test...degradation mechanisms associated with elevated skin temperatures and thermal gradients within the weapon, that are induced due to solar radiation. Since...degrade/ impact the use of the munition. Twenty- eight days is the minimum test period to allow for mould germination, breakdown of carbon- containing

  2. A Bayesian Model for the Identification of Differentially Expressed Genes in Daphnia Magna Exposed to Munition Pollutants

    OpenAIRE

    Cassese, Alberto; Guindani, Michele; Antczak, Philipp; Falciani, Francesco; Vannucci, Marina

    2015-01-01

    In this paper we propose a Bayesian hierarchical model for the identification of differentially expressed genes in Daphnia Magna organisms exposed to chemical compounds, specifically munition pollutants in water. The model we propose constitutes one of the very first attempts at a rigorous modeling of the biological effects of water purification. We have data acquired from a purification system that comprises four consecutive purification stages, which we refer to as “ponds”, of progressively...

  3. Joint Ordnance Test Procedure (JOTP)-010 Safety and Suitability for Service Assessment Testing for Shoulder Launched Munitions

    Science.gov (United States)

    2016-05-09

    after melting of the ice. The principal sources of ice are frosting , freezing rain, refreezing of thawing snow, and freezing of condensation. The...predetermined time or distance. An impact sensor is not involved and configuration modification is complicated by designs that typically preclude any type...cameras, radars, or infrared sensors . Record fire control and ground signals. Obtain air burst data, munition position and velocity data and, as

  4. Analysis of Biota to Evaluate the Risks Associated with Chemical Warfare Materiel Present in Sea-Disposed Military Munitions to Human Health and the Environment

    Science.gov (United States)

    Briggs, C. W.; Bissonnette, M. C.; Edwards, M.; Shjegstad, S. M.

    2016-12-01

    Thousands of 100-lb M47A series bombs containing sulfur mustard were disposed in the ocean following World War II yet few studies have been conducted at sites in excess of 250 m, the depth where most discarded military munitions (DMM) were disposed. The Hawai`i Undersea Military Munitions Assessment (HUMMA) project was conducted to evaluate the risk from chemical warfare materiel (CWM) in DMM to human health, measuring ecological differences between the disposal area and nearby but otherwise similar areas, and evaluating the most efficient platforms for surveying DMM sea-disposal sites located at depths between 400-650 m. During the 2014 HUMMA Sampling Survey, the Jason 2 remotely operated vehicle was used to collect data. Shrimp were collected and analyzed to assess the potential for bioaccumulation of CWM, energetics and metals from munitions. No CWM was detected in H. ensifer tissue samples, indicating bioaccumulation is not occurring. Low levels of 2,4,6-trinitrotoluene, 4-amino-2,6-­dinitrotoluene, 1,3,5-trinitrobenzene, nitrobenzene, arsenic, copper, and lead were detected and the concentrations were not significantly different at DMM and control sites. No visible deformities, eroded fins, lesions, or tumors were observed on the shrimp living in the vicinity of M47A bombs. Given these results and under current and potential future uses of the HUMMA study area, health risks to likely receptors are within EPA acceptable levels. Photographic data and benthic infauna analysis were used to study benthic organisms that lived on or near munitions. There was no statistically distinguishable difference between organism distributions in dense and sparse munitions fields. Conventional munitions were found to have the greatest number of benthic infauna individuals, with control sites generally having the least number of individuals. This is consistent with the benthic macro-fauna analysis, which shows that munitions provide habitat.

  5. Influence of carbon and metal oxide nanomaterials on aqueous concentrations of the munition constituents cyclotrimethylenetrinitramine (RDX) and tungsten.

    Science.gov (United States)

    Brame, Jonathon A; Kennedy, Alan J; Lounds, Christopher D; Bednar, Anthony J; Alvarez, Pedro J J; Scott, Andrea M; Stanley, Jacob K

    2014-05-01

    There is an increasing likelihood of interactions between nanomaterials and munitions constituents in the environment resulting from the use of nanomaterials as additives to energetic formulations and potential contact in waste streams from production facilities and runoff from training ranges. The purpose of the present research was to determine the ability of nano-aluminum oxide (Al(2)O(3)) and multiwalled carbon nanotubes (MWCNTs) to adsorb the munitions constituents cyclotrimethylenetrinitramine (RDX) and tungsten (W) from aqueous solution as a first step in determining the long-term exposure, transport, and bioavailability implications of such interactions. The results indicate significant adsorption of RDX by MWCNTs and of W by nano-Al(2)O(3) (but not between W and MWCNT or RDX and nano-Al(2)O(3)). Kinetic sorption and desorption investigations indicated that the most sorption occurs nearly instantaneously (nanomaterials following environmental release are likely. Time-dependent binding has implications for the bioavailability, migration, transport, and fate of munitions constituents in the environment. © 2014 SETAC.

  6. Command and Data Handling Branch Internship

    Science.gov (United States)

    Billings, Rachel Mae

    2016-01-01

    planes, layer stacks, and other specified design rules such as plane clearance and hole size. Multiple consultation sessions were held with Hester Yim, the technical discipline lead for the Command and Data Handling Branch, and Christy Herring, the lead PCB layout designer in the Electronic Design and Manufacturing Branch in order to ensure proper configuration. At themoment, the PCB is awaiting revision by the latter-mentioned branch. Afterwards, the board will begin to undergo the manufacturing and testing process.Throughout the internship at Johnson Space Center, I gained several technical and professional skills. I gained proficiency in Altium Designer and experience using subversion clients, as well as knowledge in PSpice with OrCAD and battery design for spaceflight from on-site. I also gained networking, organization, and communication skills throughout meetings with coworkers and other interns. This internship at Johnson Space Center has impacted my future aspirations by further inspiring me to follow a career path into space rated engineering technology and human spaceflight applications. After graduation, I plan to attend graduate school for a master's or doctorate degree in electrical or computer engineering.

  7. Joint Force Cyberspace Component Command: Establishing Cyberspace Operations Unity of Effort for the Joint Force Commander

    Science.gov (United States)

    2015-05-01

    strengths, the United States and DoD knowledge of cyberspace combined with the United States technical prowess and spirit of entrepreneurship provide us...similar to “command of the sea,” translating it to “command of the air.”45 The first to utter this concept, according to David MacIsaac, was British...called for his commanders to “inflict maximum damage on [the] enemy by employing strong attrition tactics,” which, as Morison notes, translated to

  8. Smart command recognizer (SCR) - For development, test, and implementation of speech commands

    Science.gov (United States)

    Simpson, Carol A.; Bunnell, John W.; Krones, Robert R.

    1988-01-01

    The SCR, a rapid prototyping system for the development, testing, and implementation of speech commands in a flight simulator or test aircraft, is described. A single unit performs all functions needed during these three phases of system development, while the use of common software and speech command data structure files greatly reduces the preparation time for successive development phases. As a smart peripheral to a simulation or flight host computer, the SCR interprets the pilot's spoken input and passes command codes to the simulation or flight computer.

  9. iTOUGH2 Command Reference

    Energy Technology Data Exchange (ETDEWEB)

    Finsterle, Stefan

    2002-06-18

    iTOUGH2 is a program for parameter estimation, sensitivity analysis, and uncertainty propagation analysis. It is based on the TOUGH2 simulator for non-isothermal multiphase flow in fractured and porous media. This report contains a detailed description of all iTOUGH2 commands.

  10. Commandants' Managerial Capacity and Workers Productivity in ...

    African Journals Online (AJOL)

    The purpose of this study is to evaluate the commandant's managerial capacity as if relates to workers productivity with a view to determining whether their calling to the education terrain has been justified and to correct certain areas in need of improvement in the Nigeria Police Education set up. In doing this, the study took ...

  11. Air Command and Control in Small Wars

    Science.gov (United States)

    2011-12-01

    doctrinally established for all types of operations. The Air Force doctrine of centralized control and decentralized execution drives the makeup of C2...organizations were able to provide “continuous combined control of operations” within the operational command posts.77 The beauty of this organizational

  12. Interface Concepts for Command & Control Tasks

    NARCIS (Netherlands)

    Delft, J.H. van; Passenier, P.O.

    2000-01-01

    This paper addresses new interface concepts for information visualisation and manipulation in Command and Control. These concepts focus on the use of multiple views on the tactical situation to enhance situational awareness and to improve situation assessment. Topics covered include the application

  13. Command, control and communications | Shaw | Scientia Militaria ...

    African Journals Online (AJOL)

    Scientia Militaria: South African Journal of Military Studies. Journal Home · ABOUT · Advanced Search · Current Issue · Archives · Journal Home > Vol 10, No 3 (1980) >. Log in or Register to get access to full text downloads. Username, Password, Remember me, or Register. Command, control and communications.

  14. Command-And-Control or Taxation?

    DEFF Research Database (Denmark)

    Oh, Christina; Svendsen, Gert Tinggaard

    2015-01-01

    an ineffective command-and-control (CAC) tool, whereas Denmark has chosen the effective tool of taxation. One main explanation for this variation in policy choice is the variation in institutional setups, namely the corporatist route in Denmark versus the pluralistic route in California....

  15. APOLLO 11 COMMANDER NEIL ARMSTRONG IN SIMULATOR

    Science.gov (United States)

    1969-01-01

    Apollo 11 commander Neil Armstrong is going through flight training in the lunar module simulator situated in the flight crew training building at KSC. Armstrong will pilot the lunar module to a moon landing on July 20, following launch from KSC on July 16.

  16. CSS Teams -- Effective Practice of Mission Command

    Science.gov (United States)

    2013-04-01

    their supporting Standard Army Information Management System and further enhance the practice of mission command. As one Soldier commented, “ VSAT is...communications up and running] and get combat ready faster. During lulls, they can order what they’ll need during the fight. 17 We’re using VSAT

  17. Intelligence: A Personal, Inherent, Function of Command

    Science.gov (United States)

    1992-06-01

    intelligence in general, and DSE !RT STORN in particular-" If one measure6 tbe. ’gap t .r ren comm~anders and intelligence ofticers by what is ~un ii p...intelligence process, or "cycle," is not a rigid procedural checklist , blindly adhered to under all circum- stances; it is simply a description of sequential

  18. Leadership in Command Under the Sea

    Science.gov (United States)

    2009-04-01

    America,” 133 70 Heifetz , Leadership without easy answers, 14 71 Navy Personnel Command, “Community Status Brief,” http://www.npc.navy.mil/Officer...Studies, 1973. Heifetz , R. A. Leadership without easy answers. Cambridge, MA: Belknap Press, 1994. Hinkle, David Randall, Harry Harrison Caldwell

  19. Human Systems Integration Assessment of Network Centric Command and Control

    National Research Council Canada - National Science Library

    Quashnock, Dee; Kelly, Richard T; Dunaway, John; Smillie, Robert J

    2004-01-01

    .... The Chat system was limited by the synchronous nature of the system that required constant attention to monitor communications, by the number of participants that could be accommodated and recognized...

  20. Defense Headquarters: Geographic Combatant Commands Rely on Subordinate Commands for Mission Management and Execution

    Science.gov (United States)

    2016-06-30

    its mission to manage the detention facility at Guantanamo Bay , Cuba to Joint Task Force Guantanamo (JTF-GTMO). However, the extent to which each...unified commands, and joint task forces. For example, U.S. Southern Command has delegated its mission to manage the detention facility at Guantanamo Bay ...facility located at Naval Station Guantanamo Bay , Cuba. • Joint Task Force Bravo, located at Soto Cano Air Base in Honduras, supports regional security

  1. Collaborative air/ground command and control for responsive persistent ISR operations using unmanned systems

    Science.gov (United States)

    Ordower, Rick; Dixon, Lee; Lynch, Nick

    2010-04-01

    "The foundation for integrating ISR planning and direction is the information network, including the appropriate ISR services and applications oriented toward the [commanders] needs. By combining global visibility of available information and intelligence needs with the tools to maximize platform/sensor/target management, the network will improve efficiency and maximize persistence. Inherent within this concept is the idea of integrating and synchronizing a mix of sensing systems and platforms rather than relying on a single system. The second concept embedded within this concept is the ability to capture the activity/information as it occurs rather than forensically reconstructing after the fact. This requires the ability for the [commander] to adjust collection priorities of the entire collection suite to a level appropriate to the activity of interest. Individual sensors, platforms and exploitation nodes will become more efficient as part of an integrated system. Implementing this fully integrated ISR Enterprise will result in improved persistence, and ultimately better ISR for the warfighter."[3] Over the last 6 years, SAIC has been working with CERDEC and AMRDEC to introduce Battle Command aids supporting (semi) autonomous execution and collaboration of unmanned assets. This paper presents an operational context and a distributed command and control architecture aiming to reduce workload and increase Persistent ISR effectiveness. This architecture has been implemented and demonstrated in field tests and as part of FY'09 C4ISR OTM testbed.

  2. Photochemical transformation of the insensitive munitions compound 2,4-dinitroanisole

    Energy Technology Data Exchange (ETDEWEB)

    Rao, Balaji, E-mail: anandharaob@ornl.gov [Environmental Sciences Division, Oak Ridge National Laboratory, Oak Ridge, TN (United States); Wang, Wei [Environmental Sciences Division, Oak Ridge National Laboratory, Oak Ridge, TN (United States); Cai, Qingsong; Anderson, Todd [Department of Environmental Toxicology, The Institute of Environment and Human Health, Texas Tech University, Lubbock, TX (United States); Gu, Baohua, E-mail: gub1@ornl.gov [Environmental Sciences Division, Oak Ridge National Laboratory, Oak Ridge, TN (United States)

    2013-01-15

    The insensitive munitions compound 2,4-dinitroanisole (DNAN) is increasingly being used as a replacement for traditional, sensitive munitions compounds (e.g., trinitrotoluene [TNT]), but the environmental fate and photo-transformation of DNAN in natural water systems are currently unknown. In this study, we investigated the photo-transformation rates of DNAN with both ultraviolet (UV) and sunlight irradiation under different environmentally relevant conditions. Sunlight photo-transformation of DNAN in water was found to follow predominantly pseudo-first-order decay kinetics with an average half-life (t{sub 1/2}) of approximately 0.70 d and activation energy (E{sub a}) of 53 kJ mol{sup −1}. Photo-transformation rates of DNAN were dependent on the wavelength of the light source: irradiation with UV-B light (280–315 nm) resulted in a greater quantum yield of transformation (ϕ{sub UV-B} = 3.7 × 10{sup −4}) than rates obtained with UV-A light (ϕ{sub UV-A} = 2.9 × 10{sup −4} at 316–400 nm) and sunlight (ϕ{sub sun} = 1.1 × 10{sup −4}). Photo-oxidation was the dominant mechanism for DNAN photo-transformation, based on the formation of nitrite (NO{sub 2}{sup −}) and nitrate (NO{sub 3}{sup −}) as major N species and 2,4-dinitrophenol as the minor species. Environmental factors (e.g., temperature, pH, and the presence or absence of naturally dissolved organic matter) displayed modest to little effects on the rate of DNAN photo-transformation. These observations indicate that sunlight-induced photo-transformation of DNAN may represent a significant abiotic degradation pathway in surface water, which may have important implications in evaluating the potential impacts and risks of DNAN in the environment. - Highlights: ► DNAN photo-transformation kinetics was dependent on light source and temperature. ► Photolysis produced harmful by-products that included dinitrophenol and nitrate. ► Photo-oxidation was determined to be the likely pathway of DNAN

  3. Intelligent Tutoring System for Teaching Battlefield Command Reasoning Skills

    National Research Council Canada - National Science Library

    Domeshek, Eric

    2002-01-01

    .... Achieving expert levels of proficiency in high-level command reasoning skills-whether for battlefield commanders or for executives in industry-requires extensive practice, coaching, and feedback...

  4. U.S. Africa Command: Shaping Africa for the Future

    National Research Council Canada - National Science Library

    Sholley, Hans

    2006-01-01

    .... It is argued the current Unified Command Plan is ill designed to address the complexities of the continent of Africa and that a proposed United States Africa Command would be better positioned...

  5. Airborne Network Camera Standard

    Science.gov (United States)

    2015-06-01

    Optical Systems Group Document 466-15 AIRBORNE NETWORK CAMERA STANDARD DISTRIBUTION A: APPROVED FOR PUBLIC RELEASE...Airborne Network Camera Standard 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER...without the focus of standardization for interoperable command and control, storage, and data streaming has been the airborne network camera systems used

  6. Development of a generic activities model of command and control

    OpenAIRE

    Stanton, NA; Baber, C; Walker, GH; Houghton, RJ; McMaster, R; Stewart, R.; D.; Harris; Jenkins, DP; Young, MS; Salmon, PM

    2008-01-01

    This paper reports on five different models of command and control. Four different models are reviewed: a process model, a contextual control model, a decision ladder model and a functional model. Further to this, command and control activities are analysed in three distinct domains: armed forces, emergency services and civilian services. From this analysis, taxonomies of command and control activities are developed that give rise to an activities model of command and control. This model w...

  7. 76 FR 1975 - Disestablishment of United States Joint Forces Command

    Science.gov (United States)

    2011-01-11

    ... Memorandum of January 6, 2011--Disestablishment of United States Joint Forces Command #0; #0; #0... of United States Joint Forces Command Memorandum for the Secretary of Defense Pursuant to my... States Joint Forces Command, effective on a date to be determined by the Secretary of Defense. I direct...

  8. Commande adaptive d'une machine asynchrone

    OpenAIRE

    Slama-Belkhodja, I.; De Fornel, B.

    1996-01-01

    Cat article décrit une stratégie de commande adaptive indirecte à Placement de Pôles (PP), appliquée à la commande en vitesse d'une machine asynchrone alimentée par un ensemble hacheur-filtre-onduleur de tension. L'algorithme des Moindres Carrés Récursifs (MCR) est utilisé pour l'identification des modèles de comportement type entrées/sorties. Un intérêt particulier est porté à la mise en oeuvre de cet algorithme et à la discussion de ses résultats, tenant compte des erreurs de modélisation e...

  9. Metadata Analysis at the Command-Line

    Directory of Open Access Journals (Sweden)

    Mark Phillips

    2013-01-01

    Full Text Available Over the past few years the University of North Texas Libraries' Digital Projects Unit (DPU has developed a set of metadata analysis tools, processes, and methodologies aimed at helping to focus limited quality control resources on the areas of the collection where they might have the most benefit. The key to this work lies in its simplicity: records harvested from OAI-PMH-enabled digital repositories are transformed into a format that makes them easily parsable using traditional Unix/Linux-based command-line tools. This article describes the overall methodology, introduces two simple open-source tools developed to help with the aforementioned harvesting and breaking, and provides example commands to demonstrate some common metadata analysis requests. All software tools described in the article are available with an open-source license via the author's GitHub account.

  10. Coalitions: Organizational, Political, Command & Control Challenges

    Science.gov (United States)

    2009-05-01

    assessment of their evolution with regard to advances in technology. The Command & Control (C2) structure of coalitions is detailed, including decision...assessment of the effects of technology on their evolution . Coalitions with equal and unequal partners are distinguished and their functioning...Gaulle is said to have remarked, “Dans toute association de deux hommes , il y en a toujours un qui se fait porter par l’autre.2” Throughout history

  11. Command and Control for War and Peace

    Science.gov (United States)

    1992-01-01

    losing some of their autonomy -the time when advances in communications technology 17 Li _I COMMAND AND CONTROL FOR WAR AND PF.ACE were strengthening the...balances; Information and action, another, One of the most important-and most sen- sitive-is the balance between control and the com- mander’s autonomy ...89, 9, Cajus Bekker , Angriffshohe 4000 (1964); republished as The Ltuf•wffe War Diaries, trans, Frank Ziegler (New York: Bal- lantine Books, 1966

  12. Command Philosophy: Is It Transportable and Universal?

    Science.gov (United States)

    1992-03-20

    Burt Nanus book, Leaders: The Strategies for Taking Charge. Of particular note is what Bennis and Nanus have to say about vision, even though they...16. Colonel Michael T. Plummer, "Winning in Command," Military Review, March 1987, p. 80. 17. Warren Bennis and Burt Nanus , Leaders: Strategies for...Garden City Park, NY, 1988, pp. 18-19, 173-174. BIBLIOGRAPHY Bennis , Warren; and Nanus , Burt. Leaders: The Strategies for Taking Charge. New York: Harper

  13. The Impact of Command Likelihood on Commitment

    Science.gov (United States)

    1994-06-03

    Cincinnati, OH: South-Western, 1979), Appendix Table N. 4 Richard A. Lippa , Introduction to Social PsvcholoQy, (Belmont, CA: Wadsworth, 1990), 243. 5...Huston, New York: Academic Press, 1979. Lippa , Richard A. Introdugcion To Social Psycholocrv. Belmont, CA: Wadsworth, 1990. McNally, Jeffery A. The...command opportunities. 41 Endnotes iLeonard Wong and Richard Bullis, "Downsizing the Army: Two Types of Commitment in the Survivors," Unpub- lished

  14. Command History, 1969. Volume 2. Sanitized

    Science.gov (United States)

    1969-01-01

    performed third and fourth echelon main- tenance. Evacuation of equipment requiring higher echelon maintenance was the reverse of supply distribution...strengths of both systems adopted (See Chapter IV). (C) The VNN Logistcal Support Command was established on 1 Oct. Although key person- rnel had been...was to be reversed . The authorization was passed down to province level againfor the drafting of titles and arranging of transfer ceremonies. (U) As

  15. Naval command and control for future UAVs

    OpenAIRE

    Majewski, Stephen E.

    1999-01-01

    Approved for public release; distribution is unlimited The primary purpose of this thesis is to examine the requirements of naval command and control for future Unmanned Aerial Vehicles (UAV) and to propose solutions for current limitations. Currently, UAVs co-exist as a collection of independent systems that have poor interoperability and limited functionality beyond strategic reconnaissance. As UAVs mature, they will increasingly be deployed at the unit level and employed tactically, inc...

  16. Naval Meteorology and Oceanography Command exhibit entrance

    Science.gov (United States)

    2000-01-01

    StenniSphere at NASA's John C. Stennis Space Center in Hancock County, Miss., invites visitors to discover why America comes to Stennis Space Center before going into space. Designed to entertain while educating, StenniSphere includes informative displays and exhibits from NASA and other agencies located at Stennis, such as this one from the Naval Meteorology and Oceanography Command. Visitors can 'travel' three-dimensionally under the sea and check on the weather back home in the Weather Center.

  17. Naval Meteorology and Oceanography Command exhibit

    Science.gov (United States)

    2000-01-01

    Designed to entertain while educating, StenniSphere at the John C. Stennis Space Center in Hancock County, Miss., includes informative displays and exhibits from NASA and other agencies located at Stennis, such as this one from the Naval Meteorology and Oceanography Command. Visitors can 'travel' three-dimensionally under the sea and check on the weather back home in the Weather Center. StenniSphere is open free of charge from 9 a.m. to 5 p.m. daily.

  18. How Technology and Data Affect Mission Command

    Science.gov (United States)

    2016-05-17

    simply transition stand- alone legacy systems to web-based platforms and integrate those pro - grams as applications on common How Technology and Data...initiative within the commander’s intent to empower ag- ile and adaptive leaders in the con - duct of unified land operations.” This first part is...synchronize actions across all war- fighting functions in time and space to support the decision cycle of the commander. Technology supports and

  19. Commanders’ Perception of Risk: Enabling Boldness

    Science.gov (United States)

    2008-04-01

    Concerning temperament, even in the epic wars of our past, commanders who were well known to countenance high losses to accomplish the mission were...constantly recalls epic battles won at hard cost is less likely to balk at present hardships. However, this association with the past also 12 engenders...go home and write poetry . He learned the art of glass blowing because it seemed interesting and built a computer with only a magazine as his guide

  20. Digital Device Architecture and the Safe Use of Flash Devices in Munitions

    Science.gov (United States)

    Katz, Richard B.; Flowers, David; Bergevin, Keith

    2017-01-01

    Flash technology is being utilized in fuzed munition applications and, based on the development of digital logic devices in the commercial world, usage of flash technology will increase. Digital devices of interest to designers include flash-based microcontrollers and field programmable gate arrays (FPGAs). Almost a decade ago, a study was undertaken to determine if flash-based microcontrollers could be safely used in fuzes and, if so, how should such devices be applied. The results were documented in the Technical Manual for the Use of Logic Devices in Safety Features. This paper will first review the Technical Manual and discuss the rationale behind the suggested architectures for microcontrollers and a brief review of the concern about data retention in flash cells. An architectural feature in the microcontroller under study will be discussed and its use will show how to screen for weak or failed cells during manufacture, storage, or immediately prior to use. As was done for microcontrollers a decade ago, architectures for a flash-based FPGA will be discussed, showing how it can be safely used in fuzes. Additionally, architectures for using non-volatile (including flash-based) storage will be discussed for SRAM-based FPGAs.

  1. Analysis of the aerodynamic impact of the dispenser stance for the separation of cluster munitions

    Directory of Open Access Journals (Sweden)

    Jinlong Wang

    2016-01-01

    Full Text Available In order to analyze the effect on the dynamic characteristics of the submunitions when subject to different separation conditions during cluster munitions separation, the separation processes are simulated by combining compressible unsteady Arbitrary Lagrange-Euler equations with a six degree-of-freedom parallel calculation program. The separation dynamic characteristics are calculated for six sets of separation conditions: with initial separation velocities of 8 m/s and 16 m/s, and separation angles of 3°, 5° and 7°. The aerodynamic interaction processes of the shock wave and the nonlinear aerodynamic characteristics are also analyzed. To verify the accuracy of the simulation, supersonic wind tunnel experiments were also carried out, the results of which agreed well with the numerical results. The results reveal that the projectile shock wave acting on the submunition serves to provide the pitching moment for the separation motion and causes a sharp change in the dynamic characteristics. The nonlinear dynamic features are characterized by the shock wave interference process in the different separation options.

  2. Formulation development and characterization of cellulose acetate nitrate based propellants for improved insensitive munitions properties

    Directory of Open Access Journals (Sweden)

    Thelma Manning

    2014-06-01

    Full Text Available Cellulose acetate nitrate (CAN was used as an insensitive energetic binder to improve the insensitive munitions (IM properties of gun propellants to replace the M1 propellant used in 105 mm artillery charges. CAN contains the energetic nitro groups found in nitrocellulose (NC, but also acetyl functionalities, which lowered the polymer's sensitivity to heat and shock, and therefore improved its IM properties relative to NC. The formulation, development and small-scale characterization testing of several CAN-based propellants were done. The formulations, using insensitive energetic solid fillers and high-nitrogen modifiers in place of nitramine were completed. The small scale characterization testing, such as closed bomb testing, small scale sensitivity, thermal stability, and chemical compatibility were done. The mechanical response of the propellants under high-rate uni-axial compression at, hot, cold, and ambient temperatures were also completed. Critical diameter testing, hot fragment conductive ignition (HFCI tests were done to evaluate the propellants' responses to thermal and shock stimuli. Utilizing the propellant chemical composition, theoretical predictions of erosivity were completed. All the small scale test results were utilized to down-select the promising CAN based formulations for large scale demonstration testing such as the ballistic performance and fragment impact testing in the 105 mm M67 artillery charge configurations. The test results completed in the small and large scale testing are discussed.

  3. A smooth multimode waveform command shaping control with selectable command length

    Science.gov (United States)

    Masoud, Ziyad N.; Alhazza, Khaled A.

    2017-06-01

    Input and command shapers are great open-loop control strategies in reducing residual vibration in rest-to-rest maneuvers. The generation of such command usually contains multiple impulses and jerks. Multiple impulses usually degrade the performance due to actuation delay and mismatch timing while jerks reduce the life expectancy of actuator and increase maintenance. In this work, a smooth single multimode command shaping control is proposed and tested numerically and experimentally to eliminate residual vibration in rest-to-rest maneuvers. The advantages of the technique are summarized as, the proposed technique has an adjustable maneuvering time, can eliminate all vibration modes regardless of the number, the required parameters are found analytically which eliminate the need of complex or lengthy calculation needed for most multimode shaper, smooth command profile to eliminate jerks i.e. inrush current, and it is continuous with single actuation to eliminate inaccurate timing and delay. The technique performance is validated numerically and experimentally. Numerical simulations prove that the shaped commands are capable of completely eliminating residual vibrations of multimode systems. Furthermore, the proposed technique is utilized to reduce the sensitivity of the shaper to modeling errors. Unlike other shaper the proposed reduction in the sensitivity can be implemented for all modes with no added complexity.

  4. Glossary of Terms and Definitions Concerning the Safety and Suitability for Service of Munitions, Explosives and Related Products (Glossaire de Termes et Definitions sur la Securite et L’Aptitude au Service de Munitions, Matieres Explosives et Produits Associes)

    Science.gov (United States)

    2002-04-01

    life cycle, storage life] environnement de stockage Ensemble de toutes les conditions physiques et chimiques auxquelles un matériel est exposé...d’approvisionnement - y compris les matières et produits explosifs - dans des conditions de stockage spécifiées, est supposé rester sûr et apte au service. (AAP-6...DEFINITIONS SUR LA SECURITE ET L’APTITUDE AU SERVICE DE MUNITIONS, MATIERES EXPLOSIVES ET PRODUITS ASSOCIES AOP-38 APRIL 2002

  5. IT Security Support for the Spaceport Command Control System Development

    Science.gov (United States)

    Varise, Brian

    2014-01-01

    My job title is IT Security support for the Spaceport Command & Control System Development. As a cyber-security analyst it is my job to ensure NASA's information stays safe from cyber threats, such as, viruses, malware and denial-of-service attacks by establishing and enforcing system access controls. Security is very important in the world of technology and it is used everywhere from personal computers to giant networks ran by Government agencies worldwide. Without constant monitoring analysis, businesses, public organizations and government agencies are vulnerable to potential harmful infiltration of their computer information system. It is my responsibility to ensure authorized access by examining improper access, reporting violations, revoke access, monitor information request by new programming and recommend improvements. My department oversees the Launch Control System and networks. An audit will be conducted for the LCS based on compliance with the Federal Information Security Management Act (FISMA) and The National Institute of Standards and Technology (NIST). I recently finished analyzing the SANS top 20 critical controls to give cost effective recommendations on various software and hardware products for compliance. Upon my completion of this internship, I will have successfully completed my duties as well as gain knowledge that will be helpful to my career in the future as a Cyber Security Analyst.

  6. Leadership and Command on the Battlefield. Operation JUST CAUSE and DESERT STORM

    Science.gov (United States)

    1992-01-01

    Ladership and Command on the Bautlkfield The command sergeant major was a key player in assisting the commander on the battlefield. Most commanders had... Ladership and Command on the Battlfield Battlefield leadership incorporates more than rehearsals, commander’s intent, briefbacks, position on the

  7. 24 Command Fire Improvement Action Program Plan

    Energy Technology Data Exchange (ETDEWEB)

    GRIFFIN, G.B.

    2000-12-01

    Fluor Hanford (FH) is responsible for providing support to the Department of Energy Richland Operations Office (RL) in the implementation of the Hanford Emergency Preparedness (EP) program. During fiscal year 2000, a number of program improvements were identified from various sources including a major range fire (24 Command Fire). Evaluations of the emergency preparedness program have confirmed that it currently meets all requirements and that performance of personnel involved is good, however the desire to effect continuous improvement resulted in the development of this improvement program plan. This program plan defines the activities that will be performed in order to achieve the desired performance improvements.

  8. Spaceport Command and Control System Automated Testing

    Science.gov (United States)

    Stein, Meriel

    2017-01-01

    The Spaceport Command and Control System (SCCS) is the National Aeronautics and Space Administrations (NASA) launch control system for the Orion capsule and Space Launch System, the next generation manned rocket currently in development. This large system requires high quality testing that will properly measure the capabilities of the system. Automating the test procedures would save the project time and money. Therefore, the Electrical Engineering Division at Kennedy Space Center (KSC) has recruited interns for the past two years to work alongside full-time engineers to develop these automated tests, as well as innovate upon the current automation process.

  9. Spaceport Command and Control System Automation Testing

    Science.gov (United States)

    Plano, Tom

    2017-01-01

    The goal of automated testing is to create and maintain a cohesive infrastructure of robust tests that could be run independently on a software package in its entirety. To that end, the Spaceport Command and Control System (SCCS) project at the National Aeronautics and Space Administration's (NASA) Kennedy Space Center (KSC) has brought in a large group of interns to work side-by-side with full time employees to do just this work. Thus, our job is to implement the tests that will put SCCS through its paces.

  10. Apollo command module land impact tests

    Science.gov (United States)

    Mccullough, J. E.; Lands, J. F., Jr.

    1972-01-01

    Full-scale-model and actual spacecraft were impact tested to define the emergency land-landing capability of the Apollo command module. Structural accelerations and strains were recorded on analog instrumentation, and a summary to these data is included. The landing kinematics were obtained from high-speed photography. Photographs of the structural damage caused during the tests are included. Even though extensive damage can be expected, the crew will receive nothing more than minor injuries during the majority of the probable landing conditions.

  11. Command and Control: The Literature and Commentaries

    Science.gov (United States)

    1993-09-01

    to apply them efficiently and eftcclivoly, or to prevent then) fronm firing on each other, At the strategic level, failure in command and control may...Collinwid (i/id Mir V21 VOper’ational decisions, about how to act. The three C Sess ions5 thatI flol lowv this one I will explot re each of HIC ies three...the career of a British Army officer, including duty as a general officer during tale First World War.] Marshall, Samuel Lyman Atweed. Men Against Fire

  12. In Search of Command and Staff Doctrine.

    Science.gov (United States)

    1987-05-01

    something else. % R0 .6 42 In a short but ccnpelling ccmpanion dissenting opinion, Judge Lewis asked in the Socratic fashion what was A’s job after he...main theme of Nye’s superb book is that good commanders are good readers.) 15. Query whether Socrates ’ question applies: "How can a man understand the...name of anything, when he does not know the nature of it?" Plato , "Theaetetus," The Dialogues of Plato , in 7 Great Books of the Western World 515

  13. The Battalion Commander’s Handbook 1984

    Science.gov (United States)

    1984-06-01

    I want my men to* *talk to their counterparts frequently even if only to chat about the weather. That way, when a problem needs to be ironed out, a...should I fail. I have seen the face of terror, felt the stinging • cold of fear; and enjoyed the sweet taste of a moment’s love. I have cried , pained...them and the company commanders. Quickly stamp out any "we-they" syndrome . * Make them pull their fair share of the load in headquarters company

  14. Command/response protocols and concurrent software

    Science.gov (United States)

    Bynum, W. L.

    1987-01-01

    A version of the program to control the parallel jaw gripper is documented. The parallel jaw end-effector hardware and the Intel 8031 processor that is used to control the end-effector are briefly described. A general overview of the controller program is given and a complete description of the program's structure and design are contained. There are three appendices: a memory map of the on-chip RAM, a cross-reference listing of the self-scheduling routines, and a summary of the top-level and monitor commands.

  15. Data compression for command and control

    Science.gov (United States)

    Litow, Bruce

    1993-08-01

    Software, both source and executable versions, designed using LR parser generator technology offers superior data compression characteristics both with respect to the compression ratio, which is essentially optimal, and computational resources efficiency. Ten-fold compression should make possible highly sophisticated command and control systems for use during a space mission, on route and at the target. Carrying source in compressed form on manned missions will mean that significant modifications and even redesign of large systems can be accomplished. Basic aspects of this compression scheme are described in the paper.

  16. Modeling midwave infrared muzzle flash spectra from unsuppressed and flash-suppressed large caliber munitions

    Science.gov (United States)

    Steward, Bryan J.; Perram, Glen P.; Gross, Kevin C.

    2012-07-01

    Time-resolved infrared spectra of firings from a 152 mm howitzer were acquired over an 1800-6000 cm-1 spectral range using a Fourier-transform spectrometer. The instrument collected primarily at 32 cm-1 spectral and 100 Hz temporal resolutions. Munitions included unsuppressed and chemically flash suppressed propellants. Secondary combustion occurred with unsuppressed propellants resulting in flash emissions lasting ˜100 ms and dominated by H2O and CO2 spectral structure. Non-combusting plume emissions were one-tenth as intense and approached background levels within 20-40 ms. A low-dimensional phenomenological model was used to reduce the data to temperatures, soot absorbances, and column densities of H2O, CO2, CH4, and CO. The combusting plumes exhibit peak temperatures of ˜1400 K, areas of greater than 32 m2, low soot emissivity of ˜0.04, with nearly all the CO converted to CO2. The non-combusting plumes exhibit lower temperatures of ˜1000 K, areas of ˜5 m2, soot emissivity of greater than 0.38 and CO as the primary product. Maximum fit residual relative to peak intensity are 14% and 8.9% for combusting and non-combusting plumes, respectively. The model was generalized to account for turbulence-induced variations in the muzzle plumes. Distributions of temperature and concentration in 1-2 spatial regions demonstrate a reduction in maximum residuals by 40%. A two-region model of combusting plumes provides a plausible interpretation as a ˜1550 K, optically thick plume core and ˜2550 K, thin, surface-layer flame-front. Temperature rate of change was used to characterize timescales and energy release for plume emissions. Heat of combustion was estimated to be ˜5 MJ/kg.

  17. Next Generation Munitions Handler: Human-Machine Interface and Preliminary Performance Evaluation

    Energy Technology Data Exchange (ETDEWEB)

    Draper, J.V.; Jansen, J.F.; Pin, F.G.; Rowe, J.C.

    1999-04-25

    The Next Generation Munitions Handler/Advanced Technology Demonstrator (NGMI-VATTD) is a technology demonstrator for the application of an advanced robotic device for re-arming U.S. Air Force (USAF) and U.S. Navy (USN) tactical fighters. It comprises two key hardware components: a heavy-lift dexterous manipulator (HDM) and a nonholonomic mobility platform. The NGMWATTD is capable of lifting weapons up to 4400 kg (2000 lb) and placing them on any weapons rack on existing fighters (including the F-22 Raptor). This report describes the NGMH mission with particular reference to human-machine interfaces. It also describes preliminary testing to garner feedback about the heavy-lift manipulator arm from experienced fighter load crewmen. The purpose of the testing was to provide preliminary information about control system parameters and to gather feed- back from users about manipulator arm functionality. To that end, the Air Force load crewmen interacted with the NGMWATTD in an informal testing session and provided feedback about the performance of the system. Certain con- trol system parameters were changed during the course of the testing and feedback from the participants was used to make a rough estimate of "good" initial operating parameters. Later, formal testing will concentrate within this range to identify optimal operating parameters. User reactions to the HDM were generally positive, All of the USAF personnel were favorably impressed with the capabilities of the system. Fine-tuning operating parameters created a system even more favorably regarded by the load crews. Further adjustment to control system parameters will result in a system that is operationally efficient, easy to use, and well accepted by users.

  18. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    Directory of Open Access Journals (Sweden)

    Peng Xun

    2017-10-01

    Full Text Available A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1 the command sequence is disordered and (2 disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  19. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    Science.gov (United States)

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  20. An Analysis of Special Operations Command - South’s Distributive Command and Control Concept

    Science.gov (United States)

    2007-12-01

    Special Ops aviation unit traverses Bermuda Triangle en route to new home”, News Service Release Number 03082525 (August 2003), http://news.soc.mil...7, 2007). U.S. Army Special Operations Command. “Special Ops Aviation Unit Traverses Bermuda Triangle En Route to New Home.” News Service Release

  1. On Command: An Illustrative Study of Command and Control in the Army of Northern Virginia, 1863.

    Science.gov (United States)

    1991-05-20

    flowing behind him, came jangling up and vaulted quickly off his horse to join Lee and Jackson. He brought electrifying news. "Fitz" Lee, one of his...in intellectual gymnastics . It is, rather, at the heart of the question of Lee’s poor command and control, for if he was, as it seems, unsure of what

  2. Mission Command in an Age of Persistent Conflict: Historical And Theoretical Approaches to Developing Mission Command

    Science.gov (United States)

    2014-04-01

    Egyptians, Yigal Allon, was the archetypical IDF commander who embodied the approach to operations that the Haganah and Palmach trained so expertly...2011): 288. 31 Ibid., 288. 32 Littlejohn, Theories of Human Communication, 3. 33 Franklin Fearing, “Toward a Psychological Theory of Human

  3. Acquisition management of the Global Transportation Network

    Science.gov (United States)

    2001-08-02

    This report discusses the acquisition management of the Global transportation Network by the U.S. Transportation Command. This report is one in a series of audit reports addressing DoD acquisition management of information technology systems. The Glo...

  4. THE ROLE OF THE REMOTE SENSING IN IDENTIFYING BURIED WORLD WAR I MUNITIONS AT THE AMERICAN UNIVERSITY, WASHINGTON, D.C.

    Science.gov (United States)

    During World War 1, The American University in Washington D.C. was used by the U.S. Army as an experiment station for the development and testing of a variety of battlefield munitions including chemical weapons such as Mustard Gas, Phosgene, Ricin and Lewisite, among othe...

  5. THER ROLE OF REMOTE SENSING AND GIS IN IDENTIFYING AND REMOVING BURIED WORLD WAR I MUNITIONS AT THE AMERICAN UNIVERSITY, WASHINGTON, DC

    Science.gov (United States)

    During World War I, The American University in Washington D.C. was used by the U.S. Am1y as an experiment station for the development and testing of a variety of battlefield munitions including chemical weapons such as Mustard Gas, Phosgene, Ricin and Lewisite, among others. Afte...

  6. GENE EXPRESSION CHANGES IN ARABIDOPSIS THALIANA SEEDLING ROOTS EXPOSED TO THE MUNITION HEXAHYDRO-1,3,5-TRINITRO-1,3,5-TRIAZINE

    Science.gov (United States)

    Arabidopsis thaliana root transcriptome responses to the munition, hexahydro-1,3,5-trinitro-1,3,5-triazine (RDX), were assessed using serial analysis of gene expression (SAGE). Comparison of the transcriptional profile for the RDX response to a profile previously described for Ar...

  7. Monitoring and sustainable management of oil polluting wrecks and chemical munitions dump sites in the Baltic Sea

    Science.gov (United States)

    Hassellöv, Ida-Maja; Tengberg, Anders

    2017-04-01

    The Baltic Sea region contains a dark legacy of about 100 000 tons of dumped chemical warfare agents. As time passes the gun shells corrode and the risks of release of contaminants increase. A major goal of the EU-flagship project Daimon is to support governmental organisations with case-to-case adapted methods for sustainable management of dumped toxic munitions. At the Chalmers University of Technology, a partner of Daimon, a unique ISO 31000 adapted method was developed to provide decision support regarding potentially oilpolluting shipwrecks. The method is called VRAKA and is based on probability calculations. It includes site-specific information as well as expert knowledge. VRAKA is now being adapted to dumped chemical munitions. To estimate corrosion potential of gun shells and ship wrecks along with sediment re-suspension and transport multiparameter instruments are deployed at dump sites. Parameters measured include Currents, Salinity, Temperature, Oxygen, Depth, Waves and Suspended particles. These measurements have revealed how trawling at dump sites seems to have large implications in spreading toxic substances (Arsenic) over larger areas. This presentation will shortly describe the decision support model, the used instrumentation and discuss some of the obtain results.

  8. Transport and Diffusion Solutions for Obscuration using the XM-825 Smoke Munition.

    Science.gov (United States)

    1981-11-01

    32813 Director, Division of Atmos Sciences National Scinece Foundation Technical Ubrary 1800 G Street, N.W. Chemical Systems Laboratory Washington...Commander US Army Satellite Comm Agency The Environmental Research ATTN: DRCPM-SC-3 Institute of MI Fort Monmouth, NJ 07703 ATTN: IRIA Library PO Box...Griffiss AFB, NY 13441 ATTN: DRXST-IS1 220 7th Street, NE Environmental Protection Agency Charlottesville, VA 22901 Meteorology Laboratory, MD 80

  9. An Analysis of Munitions Support to the U.S. Air Forces during the Vietnam War

    Science.gov (United States)

    1988-09-01

    educated in France and Moscow and was a member of the communist party. He was recognized by the Vietnamese people as their ’ liberator * from foreign...1-4 LUjO - =3 LAJ A%0 CD=-4 cp LU mO iI= CT% kD qw CN ’*C V"=U~ 83~_L rather than Vietnam manning. In the Strategic Air Command, manning dropped from

  10. Africa Command: U.S. Strategic Interests and the Role of the U.S. Military in Africa

    National Research Council Canada - National Science Library

    Ploch, Lauren

    2008-01-01

    .... military involvement on the continent has been divided among three commands: U.S. European Command (EUCOM), U.S. Central Command (CENTCOM), and U.S. Pacific Command (PACOM). The new command's area of responsibility...

  11. The Anthrax Vaccine Debate: A Medical Review for Commanders

    Science.gov (United States)

    2001-04-01

    confidence at all levels of the chain of command. The anthrax vaccine debate should not be used as a test of leadership . 5 - DoD should continue...THE ANTHRAX VACCINE DEBATE : A MEDICAL REVIEW FOR COMMANDERS by Richard A. Hersack, Col, USAF, MC, CFS The Counterproliferation Papers Future...Report Date 01APR2001 Report Type N/A Dates Covered (from... to) - Title and Subtitle The Anthrax Vaccine Debate : A Medical Review for Commanders

  12. Command and Control Across Space and Cyberspace Domains

    Science.gov (United States)

    2016-02-16

    control, communications, computers, and intelligence (C4I) on the Expeditionary Strike Group SEVEN ( ESG 7) staff. Ashore, Parish served as...groups ( ESGs ) operate in all five domains. The strike group commander has command and control at the operational level and delegates command and...the plug” on space or cyberspace services. The ESG example is just one of many. Maj Gen Zabel used the ICBM example to highlight C2 challenges and

  13. XTCE: XML Telemetry and Command Exchange Tutorial, XTCE Version 1

    Science.gov (United States)

    Rice, Kevin; Kizzort, Brad

    2008-01-01

    These presentation slides are a tutorial on XML Telemetry and Command Exchange (XTCE). The goal of XTCE is to provide an industry standard mechanism for describing telemetry and command streams (particularly from satellites.) it wiill lower cost and increase validation over traditional formats, and support exchange or native format.XCTE is designed to describe bit streams, that are typical of telemetry and command in the historic space domain.

  14. A Command Language Processor for Flexible Interface Design

    Science.gov (United States)

    1974-09-01

    33 Service Description 34 Introduction to Multiple Langauge Forms Service Functional Module Specification Contexts 35 34 35 v...framework for expressing the syntactic and semantic structure of a computer language. The CLP’s dialogue grammar has as its domain an entire terminal...collection of commands. The domain of the command language designer includes only the design of individual commands. The language designer has no

  15. Defining Command, Leadership, and Management Success Factors Within Stability Operations

    Science.gov (United States)

    2011-06-01

    OPERATIONS So far, pure definitions of command, leadership , and management have been presented, but we have not explored at what levels these ways of getting...PKSOI Papers DEFINING COMMAND, LEADERSHIP , AND MANAGEMENT SUCCESS FACTORS WITHIN STABILITY OPERATIONS Dave Fielder Visit our website for other...00-00-2011 to 00-00-2011 4. TITLE AND SUBTITLE Defining Command, Leadership , and Management Success Factors Within Stability Operations 5a

  16. Commander's Decision Aid for Predictive Battlespace Awareness (CDA4PBA)

    National Research Council Canada - National Science Library

    Calhoun, Christopher S; Fitzhugh, Elisabeth W; Klinger, David W

    2006-01-01

    ...), was to develop and demonstrate human-centered decision-making technologies to improve processes, performance, tools, and training to support a commander's predictive battlespace awareness ability...

  17. Contractor Support on the Battlefield -- Increased Reliance Requires Commander's Attention

    National Research Council Canada - National Science Library

    Maloney, Kathy J

    2006-01-01

    .... Department of Defense initiatives to adopt a leaner business strategy, increase efficiency, and reduce expenditures have exposed the battlefield commander to additional operational risk centered...

  18. Distress, omnipotence, and responsibility beliefs in command hallucinations.

    Science.gov (United States)

    Ellett, Lyn; Luzon, Olga; Birchwood, Max; Abbas, Zarina; Harris, Abi; Chadwick, Paul

    2017-09-01

    Command hallucinations are considered to be one of the most distressing and disturbing symptoms of schizophrenia. Building on earlier studies, we compare key attributes in the symptomatic, affective, and cognitive profiles of people diagnosed with schizophrenia and hearing voices that do (n = 77) or do not (n = 74) give commands. The study employed a cross-sectional design, in which we assessed voice severity, distress and control (PSYRATs), anxiety and depression (HADS), beliefs about voices (BAVQ-R), and responsibility beliefs (RIQ). Clinical and demographic variables were also collected. Command hallucinations were found to be more distressing and controlling, perceived as more omnipotent and malevolent, linked to higher anxiety and depression, and resisted more than hallucinations without commands. Commanding voices were also associated with higher conviction ratings for being personally responsible for preventing harm. The findings suggest key differences in the affective and cognitive profiles of people who hear commanding voices, which have important implications for theory and psychological interventions. Command hallucinations are associated with higher distress, malevolence, and omnipotence. Command hallucinations are associated with higher responsibility beliefs for preventing harm. Responsibility beliefs are associated with voice-related distress. Future psychological interventions for command hallucinations might benefit from focussing not only on omnipotence, but also on responsibility beliefs, as is done in psychological therapies for obsessive compulsive disorder. Limitations The cross-sectional design does not assess issues of causality. We did not measure the presence or severity of delusions. © 2017 The British Psychological Society.

  19. EvoCommander: A Novel Game Based on Evolving and Switching Between Artificial Brains

    DEFF Research Database (Denmark)

    Jallov, D.; Risi, S.; Togelius, J.

    2016-01-01

    Neuroevolution (i.e. evolving artificial neural networks (ANNs) through evolutionary algorithms) has shown promise in evolving agents and robot controllers, which display complex behaviours and can adapt to their environments. These properties are also relevant to video games, since they can...... increase their longevity and replayability. However, the design of most current games precludes the use of any techniques which might yield unpredictable or even open-ended results. This article describes the game EvoCommander, with the goal to further demonstrate the potential of neuroevolution in games....... In EvoCommander the player incrementally evolves an arsenal of ANN-controlled behaviors (e.g. ranged attack, flee, etc.) for a simple robot that has to battle other player and computer controlled robots. The game introduces the novel game mechanic of “brain switching”, selecting which evolved neural...

  20. Collins named First Woman Shuttle Commander

    Science.gov (United States)

    Showstack, Randy

    Just a few hours after NASA revealed that there is water ice on the Moon, U.S. First Lady Hillary Rodham Clinton introduced Air Force Lieutenant Colonel Eileen Collins to a packed auditorium at Dunbar Senior High School in Washington, D.C., as the first woman who will command a NASA space shuttle mission. With students at this school, which is noted for its pre-engineering program, cheering, Clinton said that Collins' selection “is one big step forward for women and one giant step for humanity.” Clinton added, “It doesn't matter if you are a boy or a girl, you can be an astronaut or a pilot, if you get a first-rate education in math and science.”

  1. The Arecibo Remote Command Center Program

    Science.gov (United States)

    Crawford, Fronefield; Jenet, Fredrick; Siemens, Xavier; Dolch, Timothy; Stovall, Kevin

    2016-07-01

    The Arecibo Remote Command Center (ARCC) is a multi-institution research and education program that introduces undergraduates to the field of pulsar research. Specifically, the program trains students to work in small teams to operate several of the world's largest radio telescopes (both Arecibo and the Green Bank Telescope). Students conduct survey observations for the PALFA Galactic plane pulsar survey and conduct timing observations of millisecond pulsars (MSPs) for the NANOGrav search for gravitational waves using these telescopes. In addition, ARCC students search pulsar candidates generated from processed survey data in order to find both new radio MSPs and non-recycled pulsars. The ARCC program currently operates at four U.S. institutions and involves more than 50 undergraduate students each year. To date, ARCC students have discovered 64 new pulsars in this program.

  2. Command Structure for Theater Warfare: The Quest for Unity of Command

    Science.gov (United States)

    1984-09-01

    managership ot airpowet under the an component commander isdcnm! liom pi.icl-c.il experience and history In North Attica m 1442 to I’M*. American airmen...easy decision. The Navy and Marine Corps viewed single managership of air assets difterently than the Army and the Air Force. We made some false starts...The Marine Corps contended that the ground war should determine the airstrikes and that single managership would force them to increase their staff

  3. Mission Command and Antiaccess/Area-Denial: Implications for Joint Command and Control

    Science.gov (United States)

    2013-05-20

    ballistic missile are contributing to this perception. 5 This deployment however, still does not answer basic questions of whether the technology in...intensity AA/AD problem a centralized national priority. Mission Command is not Enough Van Creveld argues that "from Plato to NATO, the history of...such as who has the best information, who has the most robust communication capability, and at what level risk decisions are made all contribute to

  4. The Unified Command Plan and Combatant Commands: Background and Issues for Congress

    Science.gov (United States)

    2013-01-03

    along with the Indian Ocean islands of Comoros, Madagascar , Mauritius, and Seychelles. U.S. Central Command maintains its traditional relationship...Ocean, the Caribbean Sea, and the waters around Central and South America extending into the Pacific to the Galapagos Island . Marine Corps Forces U.S...responsible for U.S. military relations with 54 African countries including the islands of Cape Verde, Equatorial Guinea, and Sao Tome and Principe

  5. 14 CFR 91.531 - Second in command requirements.

    Science.gov (United States)

    2010-01-01

    ...-Powered Multiengine Airplanes and Fractional Ownership Program Aircraft § 91.531 Second in command...-powered multiengine airplane for which two pilots are required under the type certification requirements... the qualifications for second in command prescribed in § 61.55 of this chapter. (d) No person may...

  6. U.S. Northern Command Counterterrorism Response Force Requirement

    Science.gov (United States)

    2016-06-10

    Response ......................................................................................................... 48 Dedicated Air and Sustainment ...bombers struck near the Stade de France in Saint-Denis, followed by suicide bombings and mass shootings at cafes, restaurants , and the Bataclan Concert...deploying within the United Sates with organic command and control, air, and sustainment for a catastrophic event. Serving as the combatant command

  7. Turn-based gaming for convoy commander training

    NARCIS (Netherlands)

    Boonekamp, R.C.; Muller, T.J.; Vrijer, J.C. de

    2015-01-01

    With the increasing complexity of current-day military operations, effective education and training of military commanders is of vital importance. Commanders need to perform within a broader range of conflicts; unpredictable threats and civil-military interaction place a great demand on their

  8. The impact of new technologies on shipboard command and control

    OpenAIRE

    Oats, Trey D.; Erickson, Matthew C.

    2003-01-01

    Approved for public release, distribution is unlimited An investigation of how fuel cells, an integrated power system, and directed energy weapons will affect the shipboard command and control process. The focus is on the implementation of the new technologies onboard near-term and far-term destroyer variants and the resulting changes to the command and control process. Ensign, United States Naval Reserve

  9. Land impact test of the Apollo Command Module at MSC

    Science.gov (United States)

    1968-01-01

    Technicians and engineers gather to monitor a land impact test of the Apollo Command Module (Airframe 009) in a test area at Manned Spacecraft Center (MSC). In this view, the Command Module test vehicle is released from the tower to fall to the ground.

  10. Program Funding Guide for Air Force Systems Command Space Programs

    Science.gov (United States)

    1975-11-01

    Robert O’Shaughnessy, USN. My special thanks are also due Major Lawrence J. Hildebrand, Headquarters, Air Force Systems Command/ SDSD , for providing in...and Engineering. Washington, D.C., May 1974. 14. Hildebrand, Lawrence J., MAJ USAF., Interview conducted at Air Force Systems Command, AFSC/ SDSD . 12 August 1975. C-2 I

  11. 32 CFR 761.9 - Entry Control Commanders.

    Science.gov (United States)

    2010-07-01

    ... Guantanamo Bay Naval Defensive Sea Area and the Guantanamo Naval Airspace Reservation. (This authority delegated to Commander U.S. Naval Base, Guantanamo Bay.) (e) Commander U.S. Naval Base, Guantanamo Bay. Authorization for all persons, ships, and aircraft to enter the Guantanamo Bay Naval Defensive Sea Area and the...

  12. Apollo 9 Command/Service Modules photographed from Lunar Module

    Science.gov (United States)

    1969-01-01

    The Apollo 9 Command/Service Modules photographed from the Lunar Module, 'Spider', on the fifth day of the Apollo 9 earth-orbital mission. Docking mechanism is visible in nose of the Command Module, 'Gumdrop'. Object jutting out from the Service Module aft bulkhead is the high-gain S-Band antenna.

  13. Benefits Of Mission Command: Balance Of Philosophy And System

    Science.gov (United States)

    2016-05-26

    entered the US Army vocabulary in Field Manual (FM) 6-0 in August 2003 under “the premise that commanders exercise C2 (command and control) over...of its kind since World War II. On September 11, 2001, terrorists used commercial airliners as bombs to attack the World Trade Center in New York

  14. 32 CFR 536.7 - Responsibilities of the Commander USARCS.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Responsibilities of the Commander USARCS. 536.7... ACCOUNTS CLAIMS AGAINST THE UNITED STATES The Army Claims System § 536.7 Responsibilities of the Commander...) geographic areas of claims responsibility. (g) Recommend action to be taken by the SA, TJAG or the U.S...

  15. Strategies for Transporting Data Between Classified and Unclassified Networks

    Science.gov (United States)

    2016-03-01

    Sustainment Logistics CPC System mission command (S2MC) 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR 18...analyze the national enterprise data portal (NEDP), a foundational component of the sustainment system mission command. The analysis focused on...Taps,” Network Performance Channel GmbH, Langen, Germany , July 2011. 7. United States Navy, “Tactical Command System – MIP,” Defense Technical

  16. On the Impacts and Benefits of Implementing Full-Duplex Communications Links in an Underwater Acoustic Network

    National Research Council Canada - National Science Library

    Gibson, J; Larraza, A; Rice, J; Smith, K; Xie, G

    2002-01-01

    .... These networks may provide command and control for autonomous underwater vehicles, forward reporting by arrays of sensor grids, ad hoc communications links to covert forces, or positive control...

  17. Coalition command and control: a Canadian perspective

    Science.gov (United States)

    Charpentier, Robert; Demers, David; Gouin, Denis; McCann, Carol; Nourry, Gerard; Pigeau, Ross; Smith, Donald L.; Vezina, Guy; Walker, Robert S.

    1998-08-01

    Canada has been, and remains, committed to participating in coalition operations to promote peace and stability in the post-Cold War world. However, coalition operations challenge traditional command and control concepts, from both the technological and the human perspectives. In the short term, Canada is working closely with traditional NATO and ABCA allies to ensure that the next generation of automated C2 information systems are able to exchange information effectively through structured messages, gateways and standardized data models. Canada is also conducting R&D, and participating in collaborative experiments, to evolve the next generation of systems to permit richer, more dynamic information sharing, along the lines of the Internet and World Wide Web. However, information technology alone will not solve the problems of coalition operations. Research needs to be undertaken to understand task assignment and information flow among coalition partners at the process or operational level. Research is also required at the human level, where differences between coalition partners in culture, personal values, military expectations, religions, and societal values are proving to be less tractable than differences in message formats and communication protocols.

  18. Function Activation on Intelligent Buildings Using Mobile Devices through Voice Commands

    Directory of Open Access Journals (Sweden)

    Moumtadi Fatima

    2014-04-01

    Full Text Available Development of information and communication technologies has allowed the incorporation into different areas of human activity of apps that control electrical and electronic devices through voice commands. With these apps, in telemedicine people affected by some temporary decrease in their physical capacities have improved their level of autonomy; utilities have been added to educational environments to facilitate the use of IT applications to users with physical disability; finally, home automated solutions have made possible to any person with permanent limited mobility to take control over home devices using voice commands. In this article a home automated solution, developed over a client-server principle is presented. As the client device a MIDP 2.0 cell phone with a Java MicroEdition application loaded was used; as server a web server PC was used serving also as gateway towards a Konnex network, added with a speech recognizer engine. Fully functional prototype developed allowed take control over 3 devices with 87% success of the speech recognizer reliability, this percentage improved after the use of a drop-down menu of commands displayed over the monitor.

  19. Reviewing Command and Control for a Heavy Brigade: Tweaking the Design of the Forward Command Posts

    Science.gov (United States)

    1992-12-19

    Armored Division then became the spearhead for General George Patton’s Third Army. 1 2 4 At 0500 hours on August 1st, Colonel Clarke received orders from...116Ibid. 1 1 7 1bid. 1 1 8 ibid. 1 1 9 John L. Romjue, "From Active Defense to AirLand Battle: The Development of Army Doctrine 1973-1982," Tradoc...Key to Winning," Military Review, (July 1990), 65. 162Richard P. Geier , "Battalion Command and Control", Armor 94, no.2 (September-October 1985), 9

  20. Arsenal of democracy in the face of change: Precision Guided Munitions (PGMs), their evolution and some economic considerations, Working Paper No. 4

    Energy Technology Data Exchange (ETDEWEB)

    Chester, C.V.

    1990-08-01

    A brief study was made of some of the forces driving the move to Precision Guided Munitions (PGMs), including the quest for military effectiveness, combat experience, and logistic compression. PGMs cost from a few hundred to a few thousand dollars per Kg but are tens to hundreds of times more effective than conventional munitions. A year's peacetime plateau production of each US PGM can be carried by a few C-5 aircraft. Surge quantities of PGMs are within US airlift capabilities, taking some of the risk out of off-shore procurement. The improving capability of antiaircraft PGMs and the escalating cost of combat aircraft (50 to 100-fold in constant dollars since WW II) may bring into question the economic viability of manned attack aircraft. The same may be true to a slightly lesser degree for heavy armored vehicles. 14 refs., 5 tabs.

  1. Simulating Mission Command for Planning and Analysis

    Science.gov (United States)

    2015-06-01

    Path on Task Network Box Diagram ...................................... 18 Figure 15. Slack Time on a Gantt Chart...slack time is illustrated on a Gantt chart for an example. Figure 15. Slack Time on a Gantt Chart There are two effective scheduling and

  2. Command and Control of Space Assets Through Internet-Based Technologies Demonstrated

    Science.gov (United States)

    Foltz, David A.

    2002-01-01

    The NASA Glenn Research Center successfully demonstrated a transmission-control-protocol/ Internet-protocol- (TCP/IP) based approach to the command and control of onorbit assets over a secure network. This is a significant accomplishment because future NASA missions will benefit by using Internet-standards-based protocols. Benefits of this Internet-based space command and control system architecture include reduced mission costs and increased mission efficiency. The demonstration proved that this communications architecture is viable for future NASA missions. This demonstration was a significant feat involving multiple NASA organizations and industry. Phillip Paulsen, from Glenn's Project Development and Integration Office, served as the overall project lead, and David Foltz, from Glenn's Satellite Networks and Architectures Branch, provided the hybrid networking support for the required Internet connections. The goal was to build a network that would emulate a connection between a space experiment on the International Space Station and a researcher accessing the experiment from anywhere on the Internet, as shown. The experiment was interfaced to a wireless 802.11 network inside the demonstration area. The wireless link provided connectivity to the Tracking and Data Relay Satellite System (TDRSS) Internet Link Terminal (TILT) satellite uplink terminal located 300 ft away in a parking lot on top of a panel van. TILT provided a crucial link in this demonstration. Leslie Ambrose, NASA Goddard Space Flight Center, provided the TILT/TDRSS support. The TILT unit transmitted the signal to TDRS 6 and was received at the White Sands Second TDRSS Ground Station. This station provided the gateway to the Internet. Coordination also took place at the White Sands station to install a Veridian Firewall and automated security incident measurement (ASIM) system to the Second TDRSS Ground Station Internet gateway. The firewall provides a trusted network for the simulated space

  3. IT Security Support for Spaceport Command and Control System

    Science.gov (United States)

    McLain, Jeffrey

    2013-01-01

    During the fall 2013 semester, I worked at the Kennedy Space Center as an IT Security Intern in support of the Spaceport Command and Control System under the guidance of the IT Security Lead Engineer. Some of my responsibilities included assisting with security plan documentation collection, system hardware and software inventory, and malicious code and malware scanning. Throughout the semester, I had the opportunity to work on a wide range of security related projects. However, there are three projects in particular that stand out. The first project I completed was updating a large interactive spreadsheet that details the SANS Institutes Top 20 Critical Security Controls. My task was to add in all of the new commercial of the shelf (COTS) software listed on the SANS website that can be used to meet their Top 20 controls. In total, there are 153 unique security tools listed by SANS that meet one or more of their 20 controls. My second project was the creation of a database that will allow my mentor to keep track of the work done by the contractors that report to him in a more efficient manner by recording events as they occur throughout the quarter. Lastly, I expanded upon a security assessment of the Linux machines being used on center that I began last semester. To do this, I used a vulnerability and configuration tool that scans hosts remotely through the network and presents the user with an abundance of information detailing each machines configuration. The experience I gained from working on each of these projects has been invaluable, and I look forward to returning in the spring semester to continue working with the IT Security team.

  4. Bioaccumulation kinetics of the conventional energetics TNT and RDX relative to insensitive munitions constituents DNAN and NTO in Rana pipiens tadpoles.

    Science.gov (United States)

    Lotufo, Guilherme R; Biedenbach, James M; Sims, Jerre G; Chappell, Pornsawan; Stanley, Jacob K; Gust, Kurt A

    2015-04-01

    The manufacturing of explosives and their loading, assembling, and packing into munitions for use in testing on training sites or battlefields has resulted in contamination of terrestrial and aquatic sites that may pose risk to populations of sensitive species. The bioaccumulative potential of the conventional explosives 2,4,6-trinitrotoluene (TNT) and hexahydro-1,3,5-trinitro-1,3,5-triazine (RDX) and of the insensitive munitions (i.e., less shock sensitive) compound 2,4-dinitroanisole (DNAN) were assessed using the Northern leopard frog, Rana pipiens. Trinitrotoluene entering the organism was readily biotransformed to aminodinitrotoluenes, whereas no transformation products were measured for RDX or DNAN. Uptake clearance rates were relatively slow and similar among compounds (1.32-2.19 L kg(-1) h(-1) ). Upon transfer to uncontaminated water, elimination rate was very fast, resulting in the prediction of fast time to approach steady state (5 h or less) and short elimination half-lives (1.2 h or less). A preliminary bioconcentration factor of 0.25 L kg(-1) was determined for the insensitive munitions compound 3-nitro-1,2,4-trizole-5-one (NTO) indicating negligible bioaccumulative potential. Because of the rapid elimination rate for explosives, tadpoles inhabiting contaminated areas are expected to experience harmful effects only if under constant exposure conditions given that body burdens can rapidly depurate preventing tissue concentrations from persisting at levels that may cause detrimental biological effects. © 2014 SETAC.

  5. Distributed Command/Control Impacts on NAS Operations Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Command and Control (C2) activities abound in the NAS, and significantly influence daily operations and overall NAS efficiency. Since C2 effects are so prominent,...

  6. Command and Control Planning and Teamwork: Exploring the Future

    National Research Council Canada - National Science Library

    Sterling, Bruce S; Lickteig, Carl W

    2000-01-01

    .... This paper examines how participant ratings of command and control planning and observer assessments of teamwork were related in a series of futuristic missions conducted by the Mounted Maneuver...

  7. Detecting malware based on expired command-and-control traffic

    National Research Council Canada - National Science Library

    Zou, Futai; Zhang, Siyu; Li, Linsen; Pan, Li; Li, Jianhua

    2017-01-01

    In this article, we analyze the behavioral characteristics of domain name service queries produced by programs and then design an algorithm to detect malware with expired command-and-control domains...

  8. Implementing UPDM to develop command and control systems

    CSIR Research Space (South Africa)

    Oosthuizen, R

    2016-09-01

    Full Text Available Systems engineering is an established approach to develop systems, including complex sociotechnical systems such as Command and Control (C2) Systems. These systems often occur through introduction of a new technology into an existing system...

  9. Architecting Joint Command and Control System of System Capability Certifications

    National Research Council Canada - National Science Library

    Acosta, Jacob; Hoesly, Scot; Huseth, Scott; Krider, Steven; Lamb, Jeremy; Martin, Calvin; Medina, Vince; Medina, Jorge; Nguyen, Michael; Patel, Jaykant

    2007-01-01

    Command, Control, Communications, Computers, and Intelligence (C4I) systems, each originally designed to address a single warfighting function, have been assembled into an interdependent C4I System of Systems (SoS...

  10. Africa Command: Building a Foundation of Operational Interagency Cooperation

    National Research Council Canada - National Science Library

    Piacenti, Chad E

    2007-01-01

    Interagency cooperation has been a recognized deficiency for many years. The National Security Act of 1947 and the Goldwater-Nichols Act of 1986 helped to streamline military operations and chains of command...

  11. Gesture Commanding of a Robot with EVA Gloves Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Gesture commanding can be applied and evaluated with NASA robot systems. Application of this input modality can improve the way crewmembers interact with robots...

  12. Position Command Shaping for Vibration Suppression Considering Target Position Correction

    Science.gov (United States)

    Yamamoto, Masafumi; Ito, Kazuaki; Iwasaki, Makoto; Matsui, Nobuyuki

    This paper presents a command shaping technique based on a minimum jerk control approach considering a target position correction during motion, for the fast and precise positioning in vibratory mechatronic systems. The positioning controller is designed by a 2-degrees-of-freedom control: a feedback compensator is synthesized by H∞ control design to ensure the robust stability, while a feedforward compensator suppresses the vibration in response based on a coprime factorization expression of the plant mechanism. The command shaping, on the other hand, eliminates the corresponding vibration components of the primary and secondary modes in the position command, where the continuity of jerk component in the command can be ensured against the target position correction. The effectiveness of the proposed shaping technique has been verified by experiments using a table drive system on machine stand.

  13. Mission Command In A Communications Denied Environment

    Science.gov (United States)

    2017-02-16

    the subordinate is able to learn and able to apply the lessons learned from those mistakes, and they do not indicate a lack of capability, mistakes...best support and supervise his subordinates. This position might be his office with all the modern technology available and video feeds to every...the network vulnerable to enemy exploitation. The effects of cyber-attacks can be categorized into six different classes . a) Interruption: part

  14. Command History, 1971. Volume 1. Sanitized

    Science.gov (United States)

    1971-01-01

    of resupply, the trucks moving down the Laotian logistcs corridor, as well as the road and trail network over which they move, and the associate...However, the improvement in security following TET reversed this trend and since 1969 agricultural production has increased in almost all areas. In...refusal of the US Senate to approve foreign aid in October 1971 created great concern among the GKR. but the subsequent reversal of that vote in November

  15. Automatic-Control Challenges in Future Urban Vehicles: A Blend of Chassis, Energy and Networking Management Les défis de la commande automatique dans les futurs véhicules urbains : un mélange de gestion de châssis, d’énergie et du réseau

    Directory of Open Access Journals (Sweden)

    Savaresi S.M.

    2012-10-01

    Full Text Available The topic of this paper is the discussion of new challenges that the scientific field of automatic-control will face in the next decades, in the area of vehicles control. The focus is on urban vehicles for personal mobility, since this type of vehicles will be subject to the biggest changes in the next decades. The paper is articulated in three sections – in a top-down framework – briefly addressing and discussing the following items: the main drivers, which will force a change in urban personal mobility; the main types of vehicles, which are expected to address at best such drivers; the main automatic-control challenges on such type of vehicles. The scope of this paper is purposely non-technical. Its aim is mainly to discuss the emerging new challenges from the perspective of the automatic-control scientists and practitioners. The goal of the paper is to establish a discussion framework on the problems and opportunities, which will arise in this field, in the near future. Le sujet du présent article est une discussion sur les nouveaux défis auxquels le domaine scientifique de la commande automatique des véhicules va faire face dans les prochaines décennies. L’accent est mis sur les véhicules urbains destinés à une mobilité individuelle, puisque c’est ce type de véhicules qui va faire l’objet des plus grands changements dans les prochaines décennies. Le présent article s’articule, selon une démarche descendante, en trois sections abordant et discutant brièvement les éléments suivants : les principaux moteurs qui vont imposer un changement en matière de mobilité individuelle; les principaux types de véhicules qui sont attendus pour répondre au mieux à de tels moteurs et les principaux défis de la commande automatique sur un tel type de véhicules. À dessein, la portée du présent article est non technique. Son but est principalement de discuter les nouveaux défis émergeants, à partir de perspectives des

  16. What It Takes. Air Force Command of Joint Operations

    Science.gov (United States)

    2009-01-01

    Operations Center DNA Defense Nuclear Agency DoD Department of Defense DRAT Disaster Response Assessment Team ENGR engineer EPOC (United States...USEUCOM Training Transformation in Support of C2 Transformation,” briefing, September 2003, p. 6. Command Concepts 35 Center ( EPOC ).35 Contrary to...most expectations of how the SJFHQ (CE) will work, the EPOC plans to deploy only around 20 of its staff to JTF headquarters. U.S. Pacific Command

  17. Assessment of Army Contracting Command’s Contract Management Processes

    Science.gov (United States)

    2010-06-16

    D. M., Clouse, A., & Turner, R. (2001). CMMI , distilled. Boston: Addison- Wesley. Army Aviation and Missile Command (AMCOM)(2009). AMCOM Fact Sheet...organizational culture at naval air systems command (Master’s Thesis ). Monterey, CA: Naval Postgraduate School. Kraljic, P. (1983, September...J. (2008, January). Analysis of the contracting processes and ethical culture at Ogden Air Logistics Center, Hill AFB, UT (Master’s Thesis

  18. The Law of War and the Operational Commander

    Science.gov (United States)

    1994-02-08

    Every member of the military is bound by oath to discharge his or her duties in accordance with the law of war. This paper examines the influence of... the law of war on the operational commander and includes legal planning considerations for campaigns. It does not list all laws of armed conflict or...history clearly indicate that operational commanders who have adhered to the law of war emerged victorious in their respective campaigns. Analysis of these

  19. The Exercise of Control by Joint Force Commanders

    Science.gov (United States)

    2006-05-25

    consituted a decentralization of control – from one commander to several commanders and staffs – was the development of doctrine to enable them to...joint doctrine is fulfilling this purpose with regard to control. Prussian military reformers Scharnhorst and Moltke instituted common education...from a long-standing military alliance such as NATO, US- Japan or US-ROK, this will mean significant interoperability challenges which the CJTF and

  20. Overhead cost allocation at Military Sealift Command, Pacific

    OpenAIRE

    Hale, Katharine A.

    1994-01-01

    Approved for public release, distribution unlimited The purpose of this thesis is to examine overhead costs and allocation methods at the Military Sealift Command (MSC). The command's overhead expenses from Fiscal Year 1988 through 1994 are reviewed and followed by a description of MSC's current method of allocating overhead to specific shipping arrangements. Possible sources of information distortion involved in indirect overhead allocation are discussed, and an alternative method of allo...

  1. Introduction to Command, Control, and Communications: A Primer

    Science.gov (United States)

    1995-06-01

    CSSE Combat Service Support Element CSSOC Combat Service Support Operations Center CTAPS Contingency TACS Air Planning System CTE Commander Task Element...maker. b. C2 Analogy To illustrate the C2 process, Coakley uses the analogy of a head coach of a football team and compares it to that of a commander...Program Activity (DMPA) Office of Economic Adjustment (OEA) Dept. of Defense Dependent Schools (DODDS) American Forces Information Service (AFIS) Defense

  2. Measuring Command Post Operations in a Decisive Action Training Environment

    Science.gov (United States)

    2017-05-01

    ATTP 5-0.1, Commander and Staff Officer Guide, and FM 6-0, Commander and Staff Organization. The CP Operations Checklist was developed by the WLC...the CP Operations Checklist may have resulted from not having a Standard Operating Procedure (SOP) for such tasks. There were significant...appreciation to U.S. Amy Research Institute’s former Senior Military Research Liaison Officer , SMA(R) Julius W. Gates. SMA(R) Gates provided

  3. Air Mobility Command Financial Reporting of Property, Plant, and Equipment.

    Science.gov (United States)

    1997-03-19

    This is the first in a series of reports from our audit of the Property, Plant, and Equipment Accounts in the FY 1996 Financial Statements of the...Transportation Command’s $4 billion in expected revenue. In the beginning balance for FY 1996 Defense Business Operations Fund financial statements, the Air...Mobility Command reported $ 1.1 billion of Property, Plant, and Equipment. The objective of this part of the audit was to determine whether the Air

  4. Afloat surface line commanding officer leadership : a comprehensive study

    OpenAIRE

    Provencher, Jerome R.

    1992-01-01

    CIVINS (Civilian Institutions) Thesis document This thesis explored the leadership styles of Navy commanding officers of afloat commands to determine if there were any differences in leadership styles and the effect, if any, of rank, age, commissioning source, education, ethnicity, location, and ship community type that influenced that leadership style. A review of the literature indicated that the Navy adopted the Situational Leadership Model in 1976. The Navy concurred with the philosoph...

  5. Arsenic and Old Mustard: Chemical Problems of Old Arsenical and 'Mustard' Munitions (Joseph F. Bunnett and Marian Mikotajczyk, Eds.)

    Science.gov (United States)

    Garrett, Benjamin

    1999-10-01

    What do Knute Rockne, Notre Dame's famed football coach, and Lewisite, a chemical warfare agent dubbed "the dew of death", have in common? Both owe their discovery to Father Julius Arthur Nieuwland.1 Rockne's legacy lives on in the Fighting Irish and their tradition of excellence on the gridiron. Lewisite, together with other arsenical- and mustard-type chemical warfare agents, provide a legacy that lives on, too, but with less cheerful consequences. The book Arsenic and Old Mustard: Chemical Problems of Old Arsenical and 'Mustard' Munitions makes clear the challenges faced in dealing with those consequences. This book documents the proceedings of a workshop devoted to arsenical- and mustard-type chemical warfare agents and their associated munitions. The workshop, held in Poland in 1996, included nine lectures, eight posters, and three discussion groups; and the contents of all these are presented. Major support for the workshop came from the Scientific Affairs Division of NATO as part of on ongoing series of meetings, cooperative research projects, and related efforts dealing with problems leftover from the Cold War and, in the case of the arsenicals and mustards, from conflicts dating to World War I. These problems can be seen in contemporary accounts, including a January 1999 news report that the U.S. Department of Defense intends to survey Washington, DC, areas near both American University and the Catholic University of America (CUA), site of the original synthesis of Lewisite, for chemical warfare agents and other materials disposed at the end of World War I.2 The first nine chapters of the book present the workshop's lectures. Of these, readers interested in chemical weapon destruction might find especially useful the first chapter, in which Ron Mansley of the Organisation for the Prohibition of Chemical Weapons presents a scholarly overview covering historical aspects of the arsenicals and mustards; their production and use; prospective destruction

  6. Command and Control of Private Security Contractors: Are They a Viable Force Option for the Combatant Commander?

    Science.gov (United States)

    2008-10-31

    operating locations, such PSDs will comply with (MNC-I) recommendations to alter routes or abort missions.”19 Though the nature of the mission would...to serve as part of that Chain-of-Command ( CoC ) would require qualification. Using the current conflict in Iraq as an example, limiting C2...contractual CoC . These planning actions can identify which type of commanders require training as Contracting Officers and CORs and will also ensure that

  7. Indonesian Automatic Speech Recognition For Command Speech Controller Multimedia Player

    Directory of Open Access Journals (Sweden)

    Vivien Arief Wardhany

    2014-12-01

    Full Text Available The purpose of multimedia devices development is controlling through voice. Nowdays voice that can be recognized only in English. To overcome the issue, then recognition using Indonesian language model and accousticc model and dictionary. Automatic Speech Recognizier is build using engine CMU Sphinx with modified english language to Indonesian Language database and XBMC used as the multimedia player. The experiment is using 10 volunteers testing items based on 7 commands. The volunteers is classifiedd by the genders, 5 Male & 5 female. 10 samples is taken in each command, continue with each volunteer perform 10 testing command. Each volunteer also have to try all 7 command that already provided. Based on percentage clarification table, the word “Kanan” had the most recognize with percentage 83% while “pilih” is the lowest one. The word which had the most wrong clarification is “kembali” with percentagee 67%, while the word “kanan” is the lowest one. From the result of Recognition Rate by male there are several command such as “Kembali”, “Utama”, “Atas “ and “Bawah” has the low Recognition Rate. Especially for “kembali” cannot be recognized as the command in the female voices but in male voice that command has 4% of RR this is because the command doesn’t have similar word in english near to “kembali” so the system unrecognize the command. Also for the command “Pilih” using the female voice has 80% of RR but for the male voice has only 4% of RR. This problem is mostly because of the different voice characteristic between adult male and female which male has lower voice frequencies (from 85 to 180 Hz than woman (165 to 255 Hz.The result of the experiment showed that each man had different number of recognition rate caused by the difference tone, pronunciation, and speed of speech. For further work needs to be done in order to improving the accouracy of the Indonesian Automatic Speech Recognition system

  8. Communications for unattended sensor networks

    Science.gov (United States)

    Nemeroff, Jay L.; Angelini, Paul; Orpilla, Mont; Garcia, Luis; DiPierro, Stefano

    2004-07-01

    The future model of the US Army's Future Combat Systems (FCS) and the Future Force reflects a combat force that utilizes lighter armor protection than the current standard. Survival on the future battlefield will be increased by the use of advanced situational awareness provided by unattended tactical and urban sensors that detect, identify, and track enemy targets and threats. Successful implementation of these critical sensor fields requires the development of advanced sensors, sensor and data-fusion processors, and a specialized communications network. To ensure warfighter and asset survivability, the communications must be capable of near real-time dissemination of the sensor data using robust, secure, stealthy, and jam resistant links so that the proper and decisive action can be taken. Communications will be provided to a wide-array of mission-specific sensors that are capable of processing data from acoustic, magnetic, seismic, and/or Chemical, Biological, Radiological, and Nuclear (CBRN) sensors. Other, more powerful, sensor node configurations will be capable of fusing sensor data and intelligently collect and process data images from infrared or visual imaging cameras. The radio waveform and networking protocols being developed under the Soldier Level Integrated Communications Environment (SLICE) Soldier Radio Waveform (SRW) and the Networked Sensors for the Future Force Advanced Technology Demonstration are part of an effort to develop a common waveform family which will operate across multiple tactical domains including dismounted soldiers, ground sensor, munitions, missiles and robotics. These waveform technologies will ultimately be transitioned to the JTRS library, specifically the Cluster 5 requirement.

  9. 32 CFR 700.1026 - Authority of an officer who succeeds to command.

    Science.gov (United States)

    2010-07-01

    ... authority and responsibility as the officer whom he or she succeeds. (b) An officer who succeeds to command... 32 National Defense 5 2010-07-01 2010-07-01 false Authority of an officer who succeeds to command... Precedence, Authority and Command Authority § 700.1026 Authority of an officer who succeeds to command. (a...

  10. Design of a local area network and a wide area network to connect the US Navy's training organization

    OpenAIRE

    Hill, Kevin Carlos

    1994-01-01

    US Navy training commands use a local area and a wide area network known as the Versatile Training System II (VTS). VTS furnishes word processing, electronic mail, and data base functions, all of which can be transferred throughout the network. Enabling this rather old system is a mainframe at each training site with user terminals dispersed throughout the command. The system was installed and is maintained by civilian contractors. VTS does not have the capabilities to ...

  11. Extension to distributed annotation system: Summary and summaryplot commands.

    Science.gov (United States)

    Chrysostomou, Charalambos; Brookes, Anthony J

    2015-01-01

    In recent years, the development of high-throughput sequencing technologies provided an effective way to generate data from entire genomes and test variants from thousands of individuals. The information acquired from analysing the data generated from high-throughput sequencing technologies provided useful insights into applications like whole-exome sequencing and targeted sequencing to discover the genetic cause of complex diseases and drug responses. The Distributed Annotation System (DAS) is one of the proposed solution developed to share and unify biological data from multiple local and remote DAS annotation servers. The researchers can use DAS to request data from federated or centralised databases and integrate them into a unified view. Furthermore, with the use of Reference DAS servers, structural and sequence data can be used to accompany annotation data, for the pursue of new knowledge for a particular feature or region. In this paper, two additional commands, summary and summary-plot commands, to the existing DAS protocol are proposed and implemented. The proposed commands were created in order to give the users the capabilities to request a summary of features for a particular region of interest. The summary command was created in order to extend the capabilities of the current DAS protocol, while the summaryplot command was created to provide a more user-friendly alternative to standard XML DAS responses. Finally, three examples are presented based on the GENCODE annotation data.

  12. Expression in grasses of multiple transgenes for degradation of munitions compounds on live-fire training ranges.

    Science.gov (United States)

    Zhang, Long; Routsong, Ryan; Nguyen, Quyen; Rylott, Elizabeth L; Bruce, Neil C; Strand, Stuart E

    2017-05-01

    The deposition of toxic munitions compounds, such as hexahydro-1, 3, 5-trinitro-1, 3, 5-triazine (RDX), on soils around targets in live-fire training ranges is an important source of groundwater contamination. Plants take up RDX but do not significantly degrade it. Reported here is the transformation of two perennial grass species, switchgrass (Panicum virgatum) and creeping bentgrass (Agrostis stolonifera), with the genes for degradation of RDX. These species possess a number of agronomic traits making them well equipped for the uptake and removal of RDX from root zone leachates. Transformation vectors were constructed with xplA and xplB, which confer the ability to degrade RDX, and nfsI, which encodes a nitroreductase for the detoxification of the co-contaminating explosive 2, 4, 6-trinitrotoluene (TNT). The vectors were transformed into the grass species using Agrobacterium tumefaciens infection. All transformed grass lines showing high transgene expression levels removed significantly more RDX from hydroponic solutions and retained significantly less RDX in their leaf tissues than wild-type plants. Soil columns planted with the best-performing switchgrass line were able to prevent leaching of RDX through a 0.5-m root zone. These plants represent a promising plant biotechnology to sustainably remove RDX from training range soil, thus preventing contamination of groundwater. © 2016 The Authors. Plant Biotechnology Journal published by Society for Experimental Biology and The Association of Applied Biologists and John Wiley & Sons Ltd.

  13. Disposal of chemical agents and munitions stored at Pueblo Depot Activity, Colorado. Final, Phase 1: Environmental report

    Energy Technology Data Exchange (ETDEWEB)

    Terry, J.W.; Blasing, T.J.; Ensminger, J.T.; Johnson, R.O.; Schexnayder, S.M.; Shor, J.T.; Staub, W.P.; Tolbert, V.R.; Zimmerman, G.P.

    1995-04-01

    Under the Chemical Stockpile Disposal Program (CSDP), the US Army proposes to dispose of lethal chemical agents and munitions stored at eight existing Army installations in the continental United States. In 1988, the US Army issued the final programmatic environmental impact statement (FPEIS) for the CSDP. The FPEIS and the subsequent Record of Decision (ROD) identified an on-site disposal process as the preferred method for destruction of the stockpile. That is, the FPEIS determined the environmentally preferred alternative to be on-site disposal in high-temperature incinerators, while the ROD selected this alternative for implementation as the preferred method for destruction of the stockpile. In this Phase I report, the overall CSDP decision regarding disposal of the PUDA Stockpile is subjected to further analyses, and its validity at PUDA is reviewed with newer, more detailed data than those providing the basis for the conclusions in the FPEIS. The findings of this Phase I report will be factored into the scope of a site-specific environmental impact statement to be prepared for the destruction of the PUDA stockpile. The focus of this Phase I report is on those data identified as having the potential to alter the Army`s previous decision regarding disposal of the PUDA stockpile; however, several other factors beyond the scope of this Phase I report must also be acknowledged to have the potential to change or modify the Army`s decisions regarding PUDA.

  14. Sequential anaerobic-aerobic biodegradation of emerging insensitive munitions compound 3-nitro-1,2,4-triazol-5-one (NTO)

    Science.gov (United States)

    Madeira, Camila L.; Speet, Samuel A.; Nieto, Cristina A.; Abrell, Leif; Chorover, Jon; Sierra-Alvarez, Reyes; Field, Jim A.

    2017-01-01

    Insensitive munitions, such as 3-nitro-1,2,4-triazol-5-one (NTO), are being considered by the U.S. Army as replacements for conventional explosives. Environmental emissions of NTO are expected to increase as its use becomes widespread; but only a few studies have considered the remediation of NTO-contaminated sites. In this study, sequential anaerobic-aerobic biodegradation of NTO was investigated in bioreactors using soil as inoculum. Batch bioassays confirmed microbial reduction of NTO under anaerobic conditions to 3-amino-1,2,4-triazol-5-one (ATO) using pyruvate as electron-donating cosubstrate. However, ATO biodegradation was only observed after the redox condition was switched to aerobic. This study also demonstrated that the high-rate removal of NTO in contaminated water can be attained in a continuous-flow aerated bioreactor. The reactor was first fed ATO as sole energy and nitrogen source prior to NTO addition. After few days, ATO was removed in a sustained fashion by 100%. When NTO was introduced together with electron-donor (pyruvate), NTO degradation increased progressively, reaching a removal efficiency of 93.5%. Mineralization of NTO was evidenced by the partial release of inorganic nitrogen species in the effluent and lack of ATO accumulation. A plausible hypothesis for these findings is that NTO reduction occurred in anaerobic zones of the biofilm whereas ATO was mineralized in the bulk aerobic zones of the reactor. PMID:27750172

  15. Reliability Analysis and Standardization of Spacecraft Command Generation Processes

    Science.gov (United States)

    Meshkat, Leila; Grenander, Sven; Evensen, Ken

    2011-01-01

    center dot In order to reduce commanding errors that are caused by humans, we create an approach and corresponding artifacts for standardizing the command generation process and conducting risk management during the design and assurance of such processes. center dot The literature review conducted during the standardization process revealed that very few atomic level human activities are associated with even a broad set of missions. center dot Applicable human reliability metrics for performing these atomic level tasks are available. center dot The process for building a "Periodic Table" of Command and Control Functions as well as Probabilistic Risk Assessment (PRA) models is demonstrated. center dot The PRA models are executed using data from human reliability data banks. center dot The Periodic Table is related to the PRA models via Fault Links.

  16. Mission operations and command assurance - Automating an operations TQM task

    Science.gov (United States)

    Welz, Linda; Kazz, Sheri; Potts, Sherrill; Witkowski, Mona; Bruno, Kristin

    1993-01-01

    A long-term program is in progress at JPL to reduce cost and risk of mission operations through defect prevention and error management. A major element of this program, Mission Operations and Command Assurance (MO&CA), provides a system level function on flight projects to instill quality in mission operations. MO&CA embodies the total quality management TQM principle of continuous process improvement (CPI) and uses CPI in applying automation to mission operations to reduce risk and costs. MO&CA has led efforts to apply and has implemented automation in areas that impact the daily flight project work environment including Incident Surprise Anomaly tracking and reporting; command data verification, tracking and reporting; and command support data usage. MO&CA's future work in automation will take into account that future mission operations systems must be designed to avoid increasing error through the introduction of automation, while adapting to the demands of smaller flight teams.

  17. Swing-Free Cranes via Input Shaping of Operator Commands

    Energy Technology Data Exchange (ETDEWEB)

    Groom, Kenneth N.; Parker, Gordon G.; Robinett, Rush D.; Leban, Frank

    1999-08-25

    This paper presents an open-loop control method for suppressing payload oscillation or swing caused by operator commanded maneuvers in rotary boom cranes and the method is experimentally verified on a one-sixteenth scale model of a Hagglunds shipboard crane. The crane configuration consists of a payload mass that swings like a spherical pendulum on the end of a lift-line which is attached to a boom capable of hub rotation (slewing) and elevation (luffing). Positioning of the payload is accomplished through the hub and boom angles and the load-line length. Since the configuration of the crane affects the excitation and response of the payload, the swing control scheme must account for the varying geometry of the system. Adaptive forward path command filters are employed to remove components of the command signal which induce payload swing.

  18. Comparison between a classical command law and a new advanced recovery command law in a MCB-ARS boost

    Science.gov (United States)

    Petit, Pierre; Saint-Eve, Frédéric; Sawicki, Jean-Paul; Aillerie, Michel

    2017-02-01

    This paper focuses on an original performed command on DC-DC boosts developed for applications in the LMOPS lab for the photovoltaic energy conversion and more specifically the Photovoltaic panels connected to HVDC smart grids. This boost, commonly named MCB-ARS (Magnetically Coupled Boost with Active Recovery Switch) presents great advantages concerning the simplicity of the command on the single constitutive switch, the global efficiency and the voltage conversion ratio. A fine analysis of the losses all over the entire converter shows that losses are not distributed uniformly in the constituting components. So a previous modification described in a previous paper consisting in the conducting assistance on the power flowing intermediate diode, performed advantageously the global efficiency. The present analysis takes into account the fact that the new configuration obtained after this important improvement looks like a classical half-bridge push-pull stage and may be controlled by a twice complementary command. In that way, a comparison has been done between a natural commutation recovery diode and an assisted switch commutation driven in a push-pull mode. As attempted, the switching command laws in charge to assume the energy transfer has been compared to the classical previous system described in anterior papers, and we demonstrate in this publication that a commutation based on a push-pull command mode within the two switches of the MCB-ARS converter is possible and increases the power transfer.

  19. A MANAGEMENT INFORMATION SYSTEM FOR MEDICAL SERVICES AT COMMAND HEADQUARTERS.

    Science.gov (United States)

    Gulati, H L; Sandhu, H S

    1995-01-01

    Management information system (MIS) is increasingly being used for information storage, handling, processing and retrieval of data for improving the services provided by any organisation. It allows quick decision making for overall functional improvement. Headquarters Central Command (Medical) Lucknow has developed software for data capturing in respect of six important functional areas. These include employability and availability of specialist officers, assessment of hospital services through functional update and monitoring team (FUMTs), patient satisfaction survey, user commanders opinion, state of critical items of hospital clothing and modernisation of hospitals. This automation has resulted in quick and scientific decision making for improving the medicare services to the clientele.

  20. Oracle Enterprise Manager 12c command-line interface

    CERN Document Server

    Pot'Vin, Kellyn; Smith, Ray

    2014-01-01

    Oracle Enterprise Manager 12c Command-Line Interface shows how to use Enterprise Manager's powerful scripting language to automate your database administration work and save time by scripting routine tasks, and then executing those scripts across collections of databases and instances in your environment. This book is chock full of ready-made scripting examples contributed by the authors and leading members of the community. For example, you'll find scripts and examples of commands to: Remove an Enterprise Manager agent and its related targetsQuickly create administrator accounts that are ful

  1. Three dimensional visualization to support command and control

    Energy Technology Data Exchange (ETDEWEB)

    Van Slambrook, G.A.

    1997-04-01

    Virtual reality concepts are changing the way one thinks about and with computers. The concepts have already proven their potential usefulness in a broad range of applications. This research was concerned with exploring and demonstrating the utility of virtual reality in robotics and satellite command and control applications. The robotics work addressed the need to quickly build accurate graphical models of physical environments by allowing a user to interactively build a model of a remote environment by superimposing stereo graphics onto live stereo video. The satellite work addressed the fusion of multiple data sets or models into one synergistic display for more effective training, design, and command and control of satellite systems.

  2. Commander’s Critical Information Requirements (CCIR): Reality Versus Perception

    Science.gov (United States)

    1992-01-01

    early in his life. The sport of football enabled him to practice decision making under the stress of victory or defeat 70 in games filled with...Executive Officer of Combat Command A, 4th Armored Division, during WWII, Mail Interview, 14 October 1992, and BG 49 Albin F. Irzyk (Retired), Commander of...79. Ibid, 149. 80. Weigley, 173. 81. Ibid, 177-178. 82. Ibid, 178. 83. BG Albin F. Irzyk (Retired), "The "Name Enough" Division," Armor Magazine, Vol

  3. Implementing Internet of Things in a military command and control environment

    Science.gov (United States)

    Raglin, Adrienne; Metu, Somiya; Russell, Stephen; Budulas, Peter

    2017-05-01

    While the term Internet of Things (IoT) has been coined relatively recently, it has deep roots in multiple other areas of research including cyber-physical systems, pervasive and ubiquitous computing, embedded systems, mobile ad-hoc networks, wireless sensor networks, cellular networks, wearable computing, cloud computing, big data analytics, and intelligent agents. As the Internet of Things, these technologies have created a landscape of diverse heterogeneous capabilities and protocols that will require adaptive controls to effect linkages and changes that are useful to end users. In the context of military applications, it will be necessary to integrate disparate IoT devices into a common platform that necessarily must interoperate with proprietary military protocols, data structures, and systems. In this environment, IoT devices and data will not be homogeneous and provenance-controlled (i.e. single vendor/source/supplier owned). This paper presents a discussion of the challenges of integrating varied IoT devices and related software in a military environment. A review of contemporary commercial IoT protocols is given and as a practical example, a middleware implementation is proffered that provides transparent interoperability through a proactive message dissemination system. The implementation is described as a framework through which military applications can integrate and utilize commercial IoT in conjunction with existing military sensor networks and command and control (C2) systems.

  4. Evaluation of oleoresin capsicum of Capsicum frutescenes var. Nagahari containing various percentages of capsaicinoids following inhalation as an active ingredient for tear gas munitions.

    Science.gov (United States)

    Kumar, Pravin; Deb, Utsab; Kaushik, M P

    2012-08-01

    Comparative efficacy as peripheral sensory irritant, oral and inhalation exposure studies were carried out on oleoresin capsicum (OC) of Capsicum frutescence var. Nagahari containing various percentages of capsaicinoids and two synthetic isomers of capsaicin in Swiss albino male mouse model to come up with a suitable active ingredient from natural source for tear gas munitions. The compounds screened were OC having varying percentages of capsaicinoids (20, 40 and 80%, respectively) and synthetic isomers (E and Z) of capsaicin (8-methyl-N-vanillyl-6-nonenamide). Mice were exposed to pyrotechnically generated smoke of the compounds in an all glass static exposure chamber for 15 min to determine acute inhalation toxicity (LC₅₀) and quantitative sensory irritation potential (RD₅₀). Acute oral median lethal dose (LD₅₀) was also evaluated. Safety index of tear gas (SITG), a ratio of lethal concentration 50% (LC₅₀) and the concentration which depresses respiration by 50% (RD₅₀) due to peripheral sensory irritation is also proposed. The compound having highest SITG is considered as the most suitable to be used for tear gas munitions. The study revealed that oleoresin capsicum containing 40% capsaicinoids had the highest SITG among the compounds studied. The oral dosage versus mortality pattern of some compounds did not follow a true dose-response curve (DRC); however, following inhalation, all the compounds followed DRC. It was concluded that oleoresin capsicum (40% capsaicinoids) may be considered as the most suitable and environmental friendly compound from natural source to be used as an active ingredient for tear gas munitions.

  5. Reusable Reentry Satellite (RRS): Telemetry, Tracking, and Command (TT/C) Coverage Tradeoff Study

    Science.gov (United States)

    1991-01-01

    The Reusable Reentry Satellite (RRS) Telemetry, Tracking & Command (TT&C) Coverage Tradeoff Study described herein was performed during Part 1 of the RRS Phase B contract. This report is one of several that describes the results of various trade studies performed to arrive at a recommended design for the RRS satellite system. The overall RRS Phase B Study objective is to design a relatively inexpensive satellite to access space for extended periods of time, with eventual recovery of experiments on Earth. The RRS will be capable of: (1) being launched by a variety of expendable launch vehicles; (2) operating in low earth orbit as a free flying unmanned laboratory; and (3) executing an independent atmospheric reentry and soft landing. The RRS will be designed to be refurbished and reused up to three times a year for a period of 10 years. The expected principal use for such a system is research on the effects of variable gravity (0 to 1.5 g) and radiation on small animals, plants, lower life forms, tissue samples, and materials processes. This Summary Report provides a description of the RRS Telemetry, Tracking & Command Analysis performed to study the ground station coverage available to meet RRS requirements. Concepts were considered that used off-the-shelf technology, had generous margins of capability, and high reliability, were easily maintained, cost effective, and were compatible with existing support networks. From this study, a recommended RRS TT&C configuration will be developed.

  6. Apostle Battery Table Bay Fire Command | Croock | Scientia Militaria ...

    African Journals Online (AJOL)

    Scientia Militaria: South African Journal of Military Studies. Journal Home · ABOUT · Advanced Search · Current Issue · Archives · Journal Home > Vol 20, No 3 (1990) >. Log in or Register to get access to full text downloads. Username, Password, Remember me, or Register. Apostle Battery Table Bay Fire Command.

  7. United States Joint Forces Command Joint Frequency Management Office

    Science.gov (United States)

    2011-03-01

    Ukraine 1 7 Latin American Nations at U.S. Fleet Forces Command - 7 Representatives Argentina 1 Brazil 1 Chile 1 Ecuador 1 Mexico 1 Peru 1 Colombia 1...Representative for the GEMSIS program. GEMSIS UNCLASSIFIED 14 USJFCOM J683 JFMO Major Issues/Concerns • Listen to the Operational Spectrum Managers  Too often

  8. 14 CFR 125.281 - Pilot-in-command qualifications.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Pilot-in-command qualifications. 125.281... (CONTINUED) AIR CARRIERS AND OPERATORS FOR COMPENSATION OR HIRE: CERTIFICATION AND OPERATIONS CERTIFICATION... CAPACITY OF 6,000 POUNDS OR MORE; AND RULES GOVERNING PERSONS ON BOARD SUCH AIRCRAFT Flight Crewmember...

  9. 14 CFR 125.283 - Second-in-command qualifications.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Second-in-command qualifications. 125.283... (CONTINUED) AIR CARRIERS AND OPERATORS FOR COMPENSATION OR HIRE: CERTIFICATION AND OPERATIONS CERTIFICATION... CAPACITY OF 6,000 POUNDS OR MORE; AND RULES GOVERNING PERSONS ON BOARD SUCH AIRCRAFT Flight Crewmember...

  10. 14 CFR 135.243 - Pilot in command qualifications.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Pilot in command qualifications. 135.243... (CONTINUED) AIR CARRIERS AND OPERATORS FOR COMPENSATION OR HIRE: CERTIFICATION AND OPERATIONS OPERATING REQUIREMENTS: COMMUTER AND ON DEMAND OPERATIONS AND RULES GOVERNING PERSONS ON BOARD SUCH AIRCRAFT Flight...

  11. 14 CFR 135.245 - Second in command qualifications.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Second in command qualifications. 135.245... (CONTINUED) AIR CARRIERS AND OPERATORS FOR COMPENSATION OR HIRE: CERTIFICATION AND OPERATIONS OPERATING REQUIREMENTS: COMMUTER AND ON DEMAND OPERATIONS AND RULES GOVERNING PERSONS ON BOARD SUCH AIRCRAFT Flight...

  12. Battlespace awareness and the Australian Army battlefield command support system

    Science.gov (United States)

    Gaertner, Paul S.; Slade, Mark; Bowden, Fred; Stagg, Bradley; Huf, Samuel

    2000-08-01

    Effective battlespace awareness is essential for any defence operation; this is especially true in the increasingly complex and dynamic land component of the military environment. Because of its relatively small force size dispersed piece-wise across a large and largely vacant landmass, the Defence of Australia presents a somewhat unique challenge for the development of systems that support command decision-making. The intent of this paper is to first examine the digitisation effort under way in Australia and describe the Army Battlefield Command Support System (BCSS) being developed for use in the tactical arena. BCSS is essentially a suite of commercial-off-the-shelf and government-off-the-shelf software components provided via a standard operating environment to aid decision-making. Then, we present the development of a Tactical Land C4I Assessment Capability (TLCAC) synthetic environment which is being used to undertake controlled performance evaluations of the various elements of the BCSS suite and provide impact assessments of new technological advances. The TLCAC provides a capacity to assess in near real-time Brigade and below level command post exercise activities. That is, when deployed it provides a mechanism to automatically collect command and control and manoeuvre data, which can aid in the after action review process.

  13. RAPID: Collaborative Commanding and Monitoring of Lunar Assets

    Science.gov (United States)

    Torres, Recaredo J.; Mittman, David S.; Powell, Mark W.; Norris, Jeffrey S.; Joswig, Joseph C.; Crockett, Thomas M.; Abramyan, Lucy; Shams, Khawaja S.; Wallick, Michael; Allan, Mark; hide

    2011-01-01

    RAPID (Robot Application Programming Interface Delegate) software utilizes highly robust technology to facilitate commanding and monitoring of lunar assets. RAPID provides the ability for intercenter communication, since these assets are developed in multiple NASA centers. RAPID is targeted at the task of lunar operations; specifically, operations that deal with robotic assets, cranes, and astronaut spacesuits, often developed at different NASA centers. RAPID allows for a uniform way to command and monitor these assets. Commands can be issued to take images, and monitoring is done via telemetry data from the asset. There are two unique features to RAPID: First, it allows any operator from any NASA center to control any NASA lunar asset, regardless of location. Second, by abstracting the native language for specific assets to a common set of messages, an operator may control and monitor any NASA lunar asset by being trained only on the use of RAPID, rather than the specific asset. RAPID is easier to use and more powerful than its predecessor, the Astronaut Interface Device (AID). Utilizing the new robust middleware, DDS (Data Distribution System), developing in RAPID has increased significantly over the old middleware. The API is built upon the Java Eclipse Platform, which combined with DDS, provides platform-independent software architecture, simplifying development of RAPID components. As RAPID continues to evolve and new messages are being designed and implemented, operators for future lunar missions will have a rich environment for commanding and monitoring assets.

  14. A Cyberspace Command and Control Model (Maxwell Paper, Number 47)

    Science.gov (United States)

    2009-08-01

    Business and Management (New York: Routledge, 2003). 28. Mark Skinner Watson. Chief of Staff: Prewar Plans and Preparations (Washington. DC: Center...from the Practice ojCommand and Control ( Mon - terey, CA: National Defense Research Institute, RAND Corporation, 1999). 53. Ibid., xiv. 54. Ibid

  15. The Squadron Commander’s Responsibility for Officer Professional Development

    Science.gov (United States)

    2014-02-13

    competency Tactical Expertise Personal Embodies Airman Culture - Ethical Leadership -Followership -Warrior Ethos -Develops Self Communicating ...AIR WAR COLLEGE AIR UNIVERSITY THE SQUADRON COMMANDER’S RESPONSIBILITY FOR OFFICER PROFESSIONAL DEVELOPMENT by Patrick/Sutherland...wing. 4 Abstract Squadron commanders (Sq/CCs), as Air Force leaders, have a duty to help create future leaders. While officer professional

  16. Cognitive Systems Modeling and Analysis of Command and Control Systems

    Science.gov (United States)

    Norlander, Arne

    2012-01-01

    Military operations, counter-terrorism operations and emergency response often oblige operators and commanders to operate within distributed organizations and systems for safe and effective mission accomplishment. Tactical commanders and operators frequently encounter violent threats and critical demands on cognitive capacity and reaction time. In the future they will make decisions in situations where operational and system characteristics are highly dynamic and non-linear, i.e. minor events, decisions or actions may have serious and irreversible consequences for the entire mission. Commanders and other decision makers must manage true real time properties at all levels; individual operators, stand-alone technical systems, higher-order integrated human-machine systems and joint operations forces alike. Coping with these conditions in performance assessment, system development and operational testing is a challenge for both practitioners and researchers. This paper reports on research from which the results led to a breakthrough: An integrated approach to information-centered systems analysis to support future command and control systems research development. This approach integrates several areas of research into a coherent framework, Action Control Theory (ACT). It comprises measurement techniques and methodological advances that facilitate a more accurate and deeper understanding of the operational environment, its agents, actors and effectors, generating new and updated models. This in turn generates theoretical advances. Some good examples of successful approaches are found in the research areas of cognitive systems engineering, systems theory, and psychophysiology, and in the fields of dynamic, distributed decision making and naturalistic decision making.

  17. The Role of the NCO Inside the BCT Command Post

    Science.gov (United States)

    2016-11-22

    execute complex tactical tasks, train junior enlisted Soldiers on military occupational skills and drills at the individual and team level. NCOs...formation. Doctrine 2015 introduced the importance of mission command doctrine into operations at all levels of leadership , and in the last five

  18. Warfighter Associate: Decision Aiding and Metrics for Mission Command

    Science.gov (United States)

    2012-01-23

    Distributions: highlights the Pareto Principle -- the top 20% of the mission-command staff is heavily involved in collaborations. • Our...1999999999 • status: unsalisfied • isActive: 1 FSO 12-03-2011 11:59:48 - ongoing Active Activity Based P ... • lnstanceld: lED Cross Border Transport

  19. US Africa Command (AFRICOM) and Nigeria's National Security ...

    African Journals Online (AJOL)

    The US decision to establish a unified combatant command (AFRICOM) in African has raised numerous questions, particularly in Africa, regarding its possible security implications for the continent. The article narrows itself to the concern for unraveling the national security implications of Nigeria's opposition to the location of

  20. EEG signal classification to detect left and right command using ...

    African Journals Online (AJOL)

    In this study, the right and left commands explored are based on the actual movement of lifting either left or right hand and the imaginary movement of lifting either left or right hand. For this initial study, EEG signals recorded based on the actual physical movements will be collected as the raw data, as well as the EEG signals ...

  1. Measures of Similarity for Command and Control Situation Analysis

    Science.gov (United States)

    2011-06-01

    CBR cycle (Figure 1), termed the four Rs in Aamodt and Plaza[2]: 1. Retrieve similar cases to the problem description, 2. Reuse a solution suggested by...Irandoust and A. Benaskeur. Political, Cultural and Command & Control Challenges in Coalitions. Canadian Defence Academy Press, In Press 2011. [2] A. Aamodt

  2. Airborne Intelligence, Surveillance, and Reconnaissance: Mission Command and Centralized Control

    Science.gov (United States)

    2014-12-10

    Ewell was the new commander of the Confederate Second Corps, having replaced the fallen Stonewall Jackson . Before the...mass of traffic moving south on the roads in the vicinity of Brehal, Gavray, and Percy . In places transport was moving bumper to bumper…the damage

  3. Satellite Telemetry and Command using Big LEO Mobile Telecommunications Systems

    Science.gov (United States)

    Huegel, Fred

    1998-01-01

    Various issues associated with satellite telemetry and command using Big LEO mobile telecommunications systems are presented in viewgraph form. Specific topics include: 1) Commercial Satellite system overviews: Globalstar, ICO, and Iridium; 2) System capabilities and cost reduction; 3) Satellite constellations and contact limitations; 4) Capabilities of Globalstar, ICO and Iridium with emphasis on Globalstar; and 5) Flight transceiver issues and security.

  4. 'The Danger of Divided Command': British civil and military disputes ...

    African Journals Online (AJOL)

    Westminster, as well as to that of the Commander-in-Chiefat the Horse Guards. When Lt-Gen Lord Chelmsford ... that they should assist by making diversionary raids across the border into Zululand.2°. Bulwer refused ..... armed intervention has now got beyond the power of colonial or civil forces to cope with'. He therefore ...

  5. United States Special Operations Command History, 15th Anniversary

    Science.gov (United States)

    2002-04-01

    entering the Canal from the Caribbean side and patrolled the shipping channel near Colon , preventing the PDF from commandeering boats and...boarded a German merchant ship, Asian Senator, in Cristobal . Once at the pier, the SEALs saw men in civilian clothes running down the Asian

  6. Technical Standards for Command and Control Information Systems (CCISs)

    Science.gov (United States)

    1992-01-01

    Naval Data Auo i Command USsC ACOC S1 system kItegratio Standards WutCDC., a g Ceniter Requiremnts H(.C (C412)0 D v PSI Plaratiii and Intaroperabity...PDTR 10167, ISO/IEC JTC1 SC21 (SC21 N 3252), February 1989. [Perez 1991] Personal communication with Sandra Perez, Concept Technology, Inc., (703) 425

  7. Command and Control during Security Incidents/Emergencies

    Energy Technology Data Exchange (ETDEWEB)

    Knipper, W. [NSTec

    2013-10-16

    This presentation builds on our response to events that pose, or have the potential to pose, a serious security or law enforcement risk and must be responded to and controlled in a clear a decisive fashion. We will examine some common concepts in the command and control of security-centric events.

  8. A Psychodynamic Systems Perspective on Command Relationship during Combat Operations

    Science.gov (United States)

    2017-06-09

    and Group Psychology and Wilfred Bion Experiences in Groups and Other Papers. The objective of this paragraph is to introduce the reader to tangible...not related. 52 Questionnaire from Leader 4, Copenhagen 2016, paragraph 12. 53 Jørgensen...54 Questionnaire from Leader 3, Copenhagen 2016, paragraph 8. 55 Commanders gathering, is a meeting

  9. 32 CFR Appendix A to Part 192 - Checklist for Commanders

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Checklist for Commanders A Appendix A to Part 192 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) MISCELLANEOUS EQUAL OPPORTUNITY IN OFF-BASE HOUSING Pt. 192, App. A Appendix A to Part 192—Checklist for...

  10. Commander in chief : FDR's battle with Churchill, 1943

    NARCIS (Netherlands)

    Hamilton, Charles Nigel

    2016-01-01

    Commander in Chief is een deelbiografie van president Franklin Delano Roosevelt waarin Roosevelts rol als opperbevelhebber van de gewapende strijdkrachten van de Verenigde Staten in de Tweede Wereldoorlog het hoofdthema is. Het boek concentreert zich op het jaar 1943: een jaar waaraan biografen van

  11. An easily extendable interpreter comprising MCA and CAMAC commands

    NARCIS (Netherlands)

    Bakkum, E. L.; Elsenaar, R.J.

    1984-01-01

    A BASIC interpreter is a useful tool for writing small programs in a quick and easy way. For the control of experiments, however, it lacks a number of essential features. A BASIC-like command interpreter BACO has therefore been developed. It runs on PDP-11 computers with the RSX-11M operating

  12. Forest Service patrol captain and patrol commanders report: nationwide study

    Science.gov (United States)

    Deborah J. Chavez; Joanne F. Tynon

    2007-01-01

    This is the third in a series of studies to evaluate perceptions of USDA Forest Service law enforcement personnel of the roles, responsibilities, and issues entailed in their jobs. An e-mail survey was administered to the 79 Forest Service patrol captains and patrol commanders (PCs) across the United States. Seventy completed and returned the questionnaire....

  13. A Bayesian model for the identification of differentially expressed genes in Daphnia magna exposed to munition pollutants.

    Science.gov (United States)

    Cassese, Alberto; Guindani, Michele; Antczak, Philipp; Falciani, Francesco; Vannucci, Marina

    2015-09-01

    In this article we propose a Bayesian hierarchical model for the identification of differentially expressed genes in Daphnia magna organisms exposed to chemical compounds, specifically munition pollutants in water. The model we propose constitutes one of the very first attempts at a rigorous modeling of the biological effects of water purification. We have data acquired from a purification system that comprises four consecutive purification stages, which we refer to as "ponds," of progressively more contaminated water. We model the expected expression of a gene in a pond as the sum of the mean of the same gene in the previous pond plus a gene-pond specific difference. We incorporate a variable selection mechanism for the identification of the differential expressions, with a prior distribution on the probability of a change that accounts for the available information on the concentration of chemical compounds present in the water. We carry out posterior inference via MCMC stochastic search techniques. In the application, we reduce the complexity of the data by grouping genes according to their functional characteristics, based on the KEGG pathway database. This also increases the biological interpretability of the results. Our model successfully identifies a number of pathways that show differential expression between consecutive purification stages. We also find that changes in the transcriptional response are more strongly associated to the presence of certain compounds, with the remaining contributing to a lesser extent. We discuss the sensitivity of these results to the model parameters that measure the influence of the prior information on the posterior inference. © 2015, The International Biometric Society.

  14. Cyber Security for the Spaceport Command and Control System: Vulnerability Management and Compliance Analysis

    Science.gov (United States)

    Gunawan, Ryan A.

    2016-01-01

    With the rapid development of the Internet, the number of malicious threats to organizations is continually increasing. In June of 2015, the United States Office of Personnel Management (OPM) had a data breach resulting in the compromise of millions of government employee records. The National Aeronautics and Space Administration (NASA) is not exempt from these attacks. Cyber security is becoming a critical facet to the discussion of moving forward with projects. The Spaceport Command and Control System (SCCS) project at the Kennedy Space Center (KSC) aims to develop the launch control system for the next generation launch vehicle in the coming decades. There are many ways to increase the security of the network it uses, from vulnerability management to ensuring operating system images are compliant with securely configured baselines recommended by the United States Government.

  15. The control and the command of the Vivitron, a system managed with an OODBMS

    Science.gov (United States)

    Bauman, R.; Diaz, T.; Jbil, A.; Kapps, E.; Knaebel, R.; Marsaudon, J. C.; Michel, L.; Persigpy, J.; Prevot, G.; Stamm, Y.

    1998-08-01

    The architecture of the control system of the Vivitron is distributed. Thirteen VME crates, equipped with MC68040 boards, working at a potential from 0 to 20 MV, concentrate the measurements and the commands. These concentrators and the control room are federated in a private optical Ethernet network. The intelligence of the system is shared between the concentrators. 4 workstations inside the control room are strictly dedicated to the animation of the graphical user interface, managed with SL-GMS. The mechanisms of communication are only based on industrial standards. The whole system is described in an object oriented database. Each element, hardware device or software module, is represented in the database by numerical values such as addresses, calibrations or thresholds and a specific C function describing its behavior. The database generates automatically the code exclusively from this description.

  16. Insensitive Munitions (Les Munitions a Risque Attenue)

    Science.gov (United States)

    1992-07-01

    8217~ I ..-..... ,-.--..----IS PCCA CT - _-. r V OUTET IGUE 4. DJUTABE UPERELCAAýTRODE 1 4 TL(’ 0 . PRPC KI 1101 ENSDCTO TEST :HAMBD ERCTO PQ ’A -_otrLE...Replacement of the polybutadiene with alternativesubsequent damage when subjected to unplanned stimuli polymeric backbones has yielded more extinguishable...1) the use of metal perchlorate oxidizers to enhance thermal stability, 2) alternative polymeric A number of PSAN based Class 1.3 minimum smoke

  17. Lunar Reconnaissance Orbiter (LRO) Command and Data Handling Flight Electronics Subsystem

    Science.gov (United States)

    Nguyen, Quang; Yuknis, William; Haghani, Noosha; Pursley, Scott; Haddad, Omar

    2012-01-01

    A document describes a high-performance, modular, and state-of-the-art Command and Data Handling (C&DH) system developed for use on the Lunar Reconnaissance Orbiter (LRO) mission. This system implements a complete hardware C&DH subsystem in a single chassis enclosure that includes a processor card, 48 Gbytes of solid-state recorder memory, data buses including MIL-STD-1553B, custom RS-422, SpaceWire, analog collection, switched power services, and interfaces to the Ka-Band and S-Band RF communications systems. The C&DH team capitalized on extensive experience with hardware and software with PCI bus design, SpaceWire networking, Actel FPGA design, digital flight design techniques, and the use of VxWorks for the real-time operating system. The resulting hardware architecture was implemented to meet the LRO mission requirements. The C&DH comprises an enclosure, a backplane, a low-voltage power converter, a single-board computer, a communications interface board, four data storage boards, a housekeeping and digital input/output board, and an analog data acquisition board. The interfaces between the C&DH and the instruments and avionics are connected through a SpaceWire network, a MIL-STD-1553 bus, and a combination of synchronous and asynchronous serial data transfers over RS-422 and LVDS (low-voltage differential-signaling) electrical interfaces. The C&DH acts as the spacecraft data system with an instrument data manager providing all software and internal bus scheduling, ingestion of science data, distribution of commands, and performing science operations in real time.

  18. Research of ad hoc network based on SINCGARS network

    Science.gov (United States)

    Nie, Hao; Cai, Xiaoxia; Chen, Hong; Chen, Jian; Weng, Pengfei

    2016-03-01

    In today's world, science and technology make a spurt of progress, so society has entered the era of information technology, network. Only the comprehensive use of electronic warfare and network warfare means can we maximize their access to information and maintain the information superiority. Combined with the specific combat mission and operational requirements, the research design and construction in accordance with the actual military which are Suitable for the future of information technology needs of the tactical Adhoc network, tactical internet, will greatly improve the operational efficiency of the command of the army. Through the study of the network of the U.S. military SINCGARS network, it can explore the routing protocol and mobile model, to provide a reference for the research of our army network.

  19. The Deep Space Network: A Radio Communications Instrument for Deep Space Exploration

    Science.gov (United States)

    Renzetti, N. A.; Stelzried, C. T.; Noreen, G. K.; Slobin, S. D.; Petty, S. M.; Trowbridge, D. L.; Donnelly, H.; Kinman, P. W.; Armstrong, J. W.; Burow, N. A.

    1983-01-01

    The primary purpose of the Deep Space Network (DSN) is to serve as a communications instrument for deep space exploration, providing communications between the spacecraft and the ground facilities. The uplink communications channel provides instructions or commands to the spacecraft. The downlink communications channel provides command verification and spacecraft engineering and science instrument payload data.

  20. Evaluation of the metabolic fate of munitions material (TNT & RDX) in plant systems. Initial assessment of plant DNA mutation spectra as a biomarker

    Energy Technology Data Exchange (ETDEWEB)

    Leung, F.; Cataldo, D.A.; Fellows, R.J.; Jarrell, A.E.; Harvey, S.D.

    1995-09-01

    Munitions material can enter the environment as a result of manufacturing activities and field usage. Predictor methodologies, or biomarkers would enhance evaluation of environmental impacts. The goal of this exploratory study deoxyribonucleic acid (DNA) mutation frequency as a biomarker for munitions exposure. The approach e resolution of an effective repetitive sequence probe for the identification of characteristic mutations, and (2) the development of a testing media [a clonal cell line of carrot (Daucus carota) spension cells]. Commercially available probes demonstrated marginal resolution therefore a low-C{sub o}t library was then constructed. Three colonies from the low-C{sub o}t DNA library were screened and the DNA isolates sequenced. A suspension culture of carrot (Daucus carota) was developed. A mutation spectra experiment was initiated at a 10-mg TNT/L exposure concentration with the attempt to clone over 1500 single TNT-exposed cells. Over the following six months greater than 98% of the initially isolated cells were unable to survive and produce micro calluses. The remaining calli were too few to be statistically significant and the experiment was terminated. The biomarker concept itself remains to be disproved, but the need for large numbers of uniform clones to differentiate true mutations suggest that more direct techniques using whole tissues need to be developed.

  1. Marine Tactical Command and Control System (MTACCS), Field Development System-1 (FDS-1) assessment: Volume 2

    Energy Technology Data Exchange (ETDEWEB)

    Avery, L W; Hunt, S T; Savage, S F [Pacific Northwest Lab., Richland, WA (United States); McLaughlin, P D; Shepard, A P; Worl, J C [Battelle Seattle Research Center, Seattle, WA (United States)

    1992-04-01

    The following appendices contain the detailed analysis data for the questionnaires and various FDS-1 after action reports submitted to the Marine Corps Systems Command (MARCORSYSCOM) Marine Tactical Command and Control System (MTACCS) Systems' Engineer.

  2. Confronting the Mortal Enemy of Military Justice: New Developments in Unlawful Command Influence

    National Research Council Canada - National Science Library

    Mark L Johnson

    2007-01-01

    ...) to the area of unlawful command influence.1 They serve as a reminder that unlawful command influence is still the mortal enemy of military justice,2 and that all military justice practitioners must be vigilant to prevent even the appearance...

  3. Should the Department of Defense Establish a Unified U.S. Logistics Command?

    National Research Council Canada - National Science Library

    Wenzel, Frank

    2008-01-01

    This monograph asserts that DoD should establish a Unified Combatant Command (COCOM)-level U.S. Logistics Command (USLOGCOM). DoD should begin a deliberate 10-20 year process to establish a USLOGCOM...

  4. The Knowledge Structure of the Commander in Asymmetric Battlefield: The Six Sights and Sensemaking Process

    National Research Council Canada - National Science Library

    Ntuen, Celestine A

    2006-01-01

    .... While there are availability of information technology to help the commander in data processing and analysis, it is not surprising that in real time operations, the commander falls back on what has...

  5. PEACEKEEPING OPERATIONS MANAGEMENT. AN ANALYSIS OF CHALLENGES, CHANGES IN COMMAND ACTION AND TRAINING NEEDS

    National Research Council Canada - National Science Library

    Ünsal SIĞRI; Ufuk BAŞAR

    2015-01-01

    The aim of this paper is to uncover emerging challenges of peacekeeping operations, determine the changes in command actions and its effects on the professional preparation of commanders by analyzing...

  6. Analysis of Recruit Attrition from the Navy's Delayed Entry Program and Recruit Training Command

    National Research Council Canada - National Science Library

    Neuhalfen, Jon K

    2007-01-01

    .... The analysis uses the PRIDE database, provided by Commander, Navy Recruiting Command. Trend analyses are used to identify significant changes in enlistment and attrition behavior for recruits who joined from fiscal years 1998 through 2005...

  7. Digital Gunnery: How Combat Vehicle Gunnery Training Creates a Model for Training the Mission Command System.

    Science.gov (United States)

    2017-06-09

    xi CHAPTER 1 INTRODUCTION .........................................................................................1 Introduction ...33 Mission Command Doctrine: Philosophy and Warfighting Function .......................... 36 Literature Review Conclusion...39 Introduction

  8. SPECIAL RESPONSIBILITY OF SUPERIORS (COMMANDERS)IN THE INTERNATIONAL CRIMINAL LAW

    OpenAIRE

    Ferenc SÁNTHA

    2013-01-01

    The article deals with the responsibility for a crime committed by command. In international criminal law exists two types of responsibilities. The first is the so called direct or active command responsibility, when the commander displays an active behavior in regards of the crime committed by subordinates, for example, by ordering them to commit a crime. These cases should be judged based on the traditional individual responsibility and the commander should be considered as a perpetrator ba...

  9. Financial Audit: Financial Reporting and Internal Controls at the Air Force Systems Command

    Science.gov (United States)

    1991-01-01

    United States General Accounting Office GAO Report 1,o, the Commander, Air Force -A0 Systems Command Janar 191FINANCI-AL AUDTFI Financial Reporting ...20332 Dear General Yates: This report presents the results of our review of the Air Force Systems Command’s financial management operations. It addresses...internal control and financial reporting improvements needed within the Air Force Systems Command. The report resulted from our examination of the

  10. 14 CFR 61.57 - Recent flight experience: Pilot in command.

    Science.gov (United States)

    2010-01-01

    ... command must hold at least a commercial pilot certificate with the appropriate category, class, and type... to the month of the flight. (ii) The pilot in command must hold at least a commercial pilot... 14 Aeronautics and Space 2 2010-01-01 2010-01-01 false Recent flight experience: Pilot in command...

  11. Air Force Commanders and Barriers to Entry into a Doctoral Business Program

    Science.gov (United States)

    Williams, Tony; LeMire, Steven D.

    2011-01-01

    The authors examined professionally qualified Air Force commanders' barriers to entry into a business doctoral degree program related to the factors of time, financial means, academics, and motivation. Of the 116 present commanders, 63% were interested in pursuing a doctorate in business. For the commanders interested in obtaining a doctorate…

  12. Enhancement of the Logistics Battle Command Model: Architecture Upgrades and Attrition Module Development

    Science.gov (United States)

    2017-01-05

    Battle Command Model Architecture Upgrades and Attrition Module Development U.S. Army TRADOC Analysis Center-Monterey 700 Dyer...17-010 January 2017 Enhancement of the Logistics Battle Command Model Architecture Upgrades and Attrition Module Development Nathan Parker...Logistics Battle Command Model Architecture Upgrades and Attrition Module Development 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT

  13. The Naval Plant Representative Office Organization Transition into the Defense Contract Management Command; Impacts on Customers

    Science.gov (United States)

    1992-06-01

    Representative Office organization transition into the Defense Contract Management Command: impacts on customers Tiffany, Murray L., III Monterey, California...1 TITLE (Include Security Classification) The Naval Plant Representative Office Organization Transition into the Defense Contract Management Command...public release; distribution is unlimited. The Naval Plant Representative Office Organization Transition into the Defense Contract Managagement Command

  14. 32 CFR 536.8 - Responsibilities and operations of command claims services.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Responsibilities and operations of command claims... responsibility. (12) Appoint FCCs. (b) Operations of command claims services. The SJA of the command shall... CLAIMS AND ACCOUNTS CLAIMS AGAINST THE UNITED STATES The Army Claims System § 536.8 Responsibilities and...

  15. 14 CFR 91.3 - Responsibility and authority of the pilot in command.

    Science.gov (United States)

    2010-01-01

    ... § 91.3 Responsibility and authority of the pilot in command. (a) The pilot in command of an aircraft is... 14 Aeronautics and Space 2 2010-01-01 2010-01-01 false Responsibility and authority of the pilot in command. 91.3 Section 91.3 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF...

  16. The Impact of Technology on the Command, Control, and Organizational Structure of Insurgent Groups

    Science.gov (United States)

    2005-06-17

    THE IMPACT OF TECHNOLOGY ON THE COMMAND, CONTROL, AND ORGANIZATIONAL STRUCTURE OF INSURGENT GROUPS A thesis presented to the...CONTRACT NUMBER 5b. GRANT NUMBER 4. TITLE AND SUBTITLE THE IMPACT OF TECHNOLOGY ON THE COMMAND, CONTROL, AND ORGANIZATIONAL STRUCTURE OF...Kevin C. Leahy Thesis Title: The Impact of Technology on the Command, Control, and Organizational Structure of Insurgent Groups Approved by

  17. AFRL Commander's Challenge 2015: stopping the active shooter

    Science.gov (United States)

    McIntire, John P.; Boston, Jonathan; Smith, Brandon; Swartz, Pete; Whitney-Rawls, Amy; Martinez Calderon, Julian; Magin, Jonathan

    2017-05-01

    In this work, we describe a rapid-innovation challenge to combat and deal with the problem of internal, insider physical threats (e.g., active shooters) and associated first-responder situation awareness on military installations. Our team's research and development effort described within focused on several key tech development areas: (1) indoor acoustical gunshot detection, (2) indoor spatial tracking of first responders, (3) bystander safety and protection, (4) two-way mass alerting capability, and (5) spatial information displays for command and control. The technological solutions were specifically designed to be innovative, low-cost, and (relatively) easy-to-implement, and to provide support across the spectrum of possible users including potential victims/bystanders, first responders, dispatch, and incident command.

  18. Advances in Discrete-Event Simulation for MSL Command Validation

    Science.gov (United States)

    Patrikalakis, Alexander; O'Reilly, Taifun

    2013-01-01

    In the last five years, the discrete event simulator, SEQuence GENerator (SEQGEN), developed at the Jet Propulsion Laboratory to plan deep-space missions, has greatly increased uplink operations capacity to deal with increasingly complicated missions. In this paper, we describe how the Mars Science Laboratory (MSL) project makes full use of an interpreted environment to simulate change in more than fifty thousand flight software parameters and conditional command sequences to predict the result of executing a conditional branch in a command sequence, and enable the ability to warn users whenever one or more simulated spacecraft states change in an unexpected manner. Using these new SEQGEN features, operators plan more activities in one sol than ever before.

  19. Circuit de commande pour Anti Collision Lamps ACL

    OpenAIRE

    Gerber, Jérôme; Biner, Hans-Peter

    2008-01-01

    Objectif Les ACL sont des ampoules 28V/200W utilisés dans le domaine de l’éclairage professionnel. Habituellement, 8 ampoules sont branchées en série sur le réseau. Suite à ce montage, une commande individuelle de la luminosité n’est pas possible. L’appareil conçu dans ce projet met toutes les ampoules en parallèle sur un bus de tension continue à 28Vdc. La commande individuelle est maintenant possible. Une protection anti-courtcircuit est aussi conçue afin de sécuriser l’installation. Pour a...

  20. Joint Command, Control and Communications: An Army Perspective

    Science.gov (United States)

    1994-06-01

    This functional representation is presented in Figure 7. (Operational and Organizational Plan for Mobile Subscriber Equipment (MSE) System, 1986, p. 3...Typically a few gateway switches at -he DSN (located in CONUS, Europe and Pacific) are connected to a few major command gateways (AN/TTC-39s) in the AOR...SMechanized Infantry MECH INF SArmored Recon (CAV) ARC ; Armored ArWlAery (Self AARTY (SP) ___Propelled)m SlgnaVCommo SIG ; Transportation TRANS Psycologi c

  1. Transforming Airborne Command and Control and Intelligence, Surveillance, and Reconnaissance

    Science.gov (United States)

    2012-06-01

    Staff level. Lt Col Roger “Charlie” Brown offered key perspective at the Major Command level. Lt Col Herb “Weed” Maraman, Sqn Ldr Mike Lyttle...Other analysts say that the aircraft avionics and sensor equipment also rely on satellite connectivity for critical data and any loss of satellite...the battlefield could provide more redundant communications through various BLOS and LOS voice and data links. The requirements are broad in nature

  2. USN/USMC Commander’s Quick Reference Legal Handbook

    Science.gov (United States)

    2015-01-01

    stigma often associated with seeking mental health care. MENTAL HEALTH REFERALS: Commanders and appropriate supervisors who in good faith believe...COMMANDER’S RESPONSIBILITIES PRIOR TO MAKING A MHE REFERAL:  NON-EMERGENCY SITUATIONS: Advise the Servicemember that there is no stigma associated with...facilitate customs and immigration inspections and ensure proper immigration clearances for military and civilian passengers.  The CO must ensure that

  3. The Ten Commandments tra Vecchio e Nuovo Testamento

    Directory of Open Access Journals (Sweden)

    De Berti Raffaele

    2011-06-01

    Full Text Available Cecil B. DeMille adapted for the screen the biblical text of Exodus twice, and in both cases he devised sophisticated strategies for intersemiotic translation with the aim to create a great show for a popular Christian audience. This is the reason why The Ten Commandments cannot be considered a mere illustration of the biblical story but instead a complex fiction film, which uses the Bible only as a starting point.

  4. The Ten Commandments tra Vecchio e Nuovo Testamento

    OpenAIRE

    De Berti Raffaele; Tomaso Subini

    2011-01-01

    Cecil B. DeMille adapted for the screen the biblical text of Exodus twice, and in both cases he devised sophisticated strategies for intersemiotic translation with the aim to create a great show for a popular Christian audience. This is the reason why The Ten Commandments cannot be considered a mere illustration of the biblical story but instead a complex fiction film, which uses the Bible only as a starting point.

  5. Kesselring: An Analysis of the German Commander at Anzio.

    Science.gov (United States)

    1983-06-03

    When the British attack began on the night of 17-18 January, von Senger knew immediately that he was in trouble . As the extent of the British...the next section. In general, however, Kesselring as a com- mander deserves close attention, not only to plumb the depths of his command personalit ...of time and snace. I would like to take the opportunity to commend a few of these discussions for further research. One of the more troubling aspects

  6. Nuclear Command and Control: Current Programs and Issues

    Science.gov (United States)

    2006-05-03

    Altitude Electromagnetic Pulse ( HEMP ) and High Power Microwave (HPM) Devices: Threat Assessments, by Clay Wilson. 54 Dee Ann Divis, “Protection Not in...Some analysts argue that detonating a high altitude nuclear burst to generate EMP against the U.S. critical infrastructure might be one way that China...infrastructure, including command and control systems, through an electromagnetic pulse (EMP).53 A high altitude nuclear explosion generates an electrical

  7. The cuckoo clock syndrome : addicted to command, allergic to leadership

    OpenAIRE

    Grint, Keith

    2010-01-01

    This article considers the extent to which we are addicted to particular ways of configuring the world and responding in a culturally appropriate way. It suggests that the original Tame and Wicked problems typology of Rittell and Webber (1973) can be usefully expanded to provide a heuristic for explaining this addiction and then focuses upon the most common approach an addiction to Crisis and Command. Some likely explanations for this addiction are discussed and some illustrative examples pro...

  8. Senior Level Leadership and Commands: A Selected Bibliography.

    Science.gov (United States)

    1986-03-01

    and Executives. MA Thesis, US Naval Postgraduate School, 1981. Alexandria: Defense Technical Information Center, 1982. (V425 U5 TH A33) 2. Bennis ...Warren, and Nanus , Burt. Leaders: The Strategies for Taking Charge. New York: Harper & Row, 1985. (HD57.7 B46 1985) 3. Blanchard, Kenneth; Zigarmi...Davis, Bennie L. "Officership: A Profound Commitment." Air Force Policy Letter for Commanders Supplement, January 1981, pp. 24-29. 35. Denno, Bryce F

  9. Deja vu: The Unified Command Plan of the Future Revisited

    Science.gov (United States)

    2011-05-19

    Approved for Public Release; Distribution is Unlimited Déjà vu : The Unified Command Plan of the Future Revisited A Monograph by Lieutenant...DD-MM-YYYY) 19-05-2011 2. REPORT TYPE Monograph 3. DATES COVERED (From - To) JUL 2010 – MAY 2011 4. TITLE AND SUBTITLE Déjà vu : The Unified...i SCHOOL OF ADVANCED MILITARY STUDIES MONOGRAPH APPROVAL Lieutenant Colonel Edward Francis Martignetti Title of Monograph: Déjà vu : The Unified

  10. Command and Functional Analysis of the Intelligence Systems Architecture Assessment

    Science.gov (United States)

    1991-06-01

    requirements of the GCE. Currently, a de facto ACE CIC is formed on an ad hoc basis and is virtually imbedded in the Tactical Air Command Center (TACC). It...34w). Mo NSMoffe Cbp**c Sqqxtfaci~iy (MCSF orSdTCOM ltay ,j. for aeaw pia intlgkmmc Yoke ad/or dat oumu~ * AV Lm .R Sgweal Rq~ouwin ad Aula Chaik

  11. Evolution of the Air Component Commander Post Goldwater-Nichols

    Science.gov (United States)

    2013-06-01

    command of the air forces for the Normandy invasion never actually existed. Instead, Eisenhower was forced to deal with three separated entities...Saudi Ministry of Defense and Aviation ( MODA ) building, located in Riyadh, for CENTCOM Headquarters. He also chose the Royal Saudi Air Forces...fight. The fourth and final job of the CFACC was the actual combat role, including planning and tasking. The challenge for Moseley was to prepare

  12. Headquarters Air Force Material Command Customer Relationship Study

    Science.gov (United States)

    2006-03-01

    uses information about each customer to make each customer more valuable to the organization, and the organization more valuable to the customer , while...decreasing the cost of servicing the customer . However, an organization cannot conform to customer specifications if the needs of the customers as...well as what the customer values is not known. As a result, Headquarters (HQ) Air Force Materiel Command (AFMC) is taking the initiative to gain an

  13. Commanders Guidance and Campaign Planning - The Falkland Islands War 1982

    Science.gov (United States)

    2017-05-25

    Exacerbating this was an unanticipated shift in the timeline, which moved up the invasion date by six months. The fact that they were executed with...information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DD-MM...YYYY) 29-03-2017 2. REPORT TYPE Master’s Thesis 3. DATES COVERED (From - To) JUN2016 – MAY 2017 4. TITLE AND SUBTITLE Commanders Guidance and

  14. Commanding in Chief, Strategic Leader Relationships in the Civil War

    Science.gov (United States)

    2012-03-12

    the principle of a civilian leader rather than a uniformed officer at the head of the military. The framers of the Constitution most likely...such as video teleconferencing, is not a panacea for overcoming ineffective communication skills. It is imperative for a Commander in Chief to...C. Waugh, “Lincoln and McClellan,” Banner Lecture Series, Virginia Historical Society, Richmond, VA, May 12, 2011, video file. http://www.c

  15. Disagreement, Cognitive Command, and the Indexicality of Moral Truth

    Directory of Open Access Journals (Sweden)

    Reichardt Bastian

    2015-09-01

    Full Text Available Moral Relativism can be considered an attractive alternative to realism because relativists can make good sense of cultural and societal disagreements by seeing them as faultless. However, we can show that this advantage is made possible by systematically disagreeing with moral phenomenology. Relativists make a substantial distinction between intercultural and intracultural discourses which turns out to be incoherent. This can be shown by making use of Crispin Wright’s notion of Cognitive Command.

  16. A Work Domain Analysis of Shipboard Command and Control

    Science.gov (United States)

    2001-12-01

    lors d’événements imprévus ou de situations anormales. Évaluer une situation en cours et prendre des décisions exigent des efforts cognitifs importants... decision support. Tactical decisions require that the ship’s Command Team gain timely access to and comprehend the significance of large amounts of...active situation assessment and decision making, where benefits for performance improvements may be expected from incorporating advanced support tools like

  17. Internal Realignment of TAC (Tactical Air Command) Services Squadrons.

    Science.gov (United States)

    1985-04-01

    in the Tactical Air Command (TAC) are no exception. They are organized for their mission in a traditional fashion at first glance. However, there is...organizations as very traditional . However, there is little information available that evaluates how well this structure actually works, if it really complies...inflight and ground support carry out style meals are prepared, and pastry baking operations (10:12-13). 6 D. BILLETING: Manages transient quarters for

  18. Improving the Air Force Squadron Command Selection Process

    Science.gov (United States)

    2017-04-19

    is assigned to the Air War College, Air University, Maxwell AFB, AL. Lt Col Taylor is an Air Force Special Operations pilot whose experience spans a...within the military, there are almost infinite levels of application. This study will focus attention at the Air Force squadron level for several reasons...through the stages of professional military education that span an Air Force officer’s career, we are taught that the Air Force squadron commander

  19. Fit for Command: Military Leadership Attributes for Small Wars

    Science.gov (United States)

    2013-04-18

    Leadership Communications Skills Center for their excellent editing and support. Their valuable suggestions helped to improve the paper and eliminated...their subordinates. This requires sociability skills that enable military leaders to connect, relate, and communicate effectively with their troops. 16...very limited social skills. He was an introvert , not very approachable, and withdrawn. He was more a general staff officer than a battalion commander

  20. Spaceport Command and Control System User Interface Testing

    Science.gov (United States)

    Huesman, Jacob

    2016-01-01

    The Spaceport Command and Control System will be the National Aeronautics and Space Administration's newest system for launching commercial and government owned spacecraft. It's a large system with many parts all in need of testing. To improve upon testing already done by NASA engineers, the Engineering Directorate, Electrical Division (NE-E) of Kennedy Space Center has hired a group of interns each of the last few semesters to develop novel ways of improving the testing process.

  1. The Battle Command Sustainment Support System: Initial Analysis Report

    Science.gov (United States)

    2016-09-01

    Sustainment Sustainment System Mission Command (S2MC) 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR 18. NUMBER...Data (214A) 6 Global Air Transportation Execution System (GATES) 6 Radio-Frequency Identification ( RFID ) Detections, Level 6, and Interrogator...information. Logistics Support Activity (LOGSA)  Frequency: 2 or 6 hr  Format: direct database link or flat file via secure file transfer

  2. Intelligent Command and Control Demonstration Setup and Presentation Instructions

    Science.gov (United States)

    2017-12-01

    ARL-TR-8244 ● DEC 2017 US Army Research Laboratory Intelligent Command and Control Demonstration Setup and Presentation...and Control Demonstration Setup and Presentation Instructions by Laurel C Sadler and Somiya Metu Computational and Information Sciences...for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM

  3. Role Allocation and Team Structure in Command and Control Teams

    Science.gov (United States)

    2014-06-01

    tankers (FT), search units (S) and rescue units (R). Each unit is represented on the map by a numbered icon. Each type of unit is colour -coded and...experiences from command and control research with the C3Fire microworld. Cognition , Technology & Work, 5(3), 183-190. Hollenbeck, J. R. (2000). A...Alexandria, VA, June 2013. Jobidon, M.-E., Tremblay, S., Lafond, D., & Breton, R. (2006). The role of cognition in team functioning: A matter of

  4. Wargaming in support of command, control and communications experiments.

    OpenAIRE

    Sherfey, Linda M.

    1992-01-01

    Approved for public release; distribution is unlimited The purpose of this thesis is to provide information about wargaming to prospective users. An in depth discussion focussing on two primary components ofwargaming is presented. The first component is wargaming in general. A description is provided of wargaming features and a discussion concerning the limitations and hazards inherent to wargames. The second component is how to design a wargame experiment to support command, cont...

  5. General Curtis E. Lemay on Leadership and Command

    Science.gov (United States)

    2010-06-01

    2 Gary Yukl , Leadership in Organizations , 2nd Ed (Englewood Cliffs, NJ: Prentice-Hall, Inc., 1989), 267. As...130. 35 Yukl , Leadership , 130. 46 perspective, LeMay was constantly looking to make the organization more effective – constant improvement...Command to a resolute and capable organization , capable of providing the nation’s nuclear deterrence. LeMay on Leadership focuses on his development of

  6. THE FUTURE OF THE EUROPEAN AIR TRANSPORT COMMAND: AN ANALYSIS OF CAPABILITY ENHANCEMENTS FROM THE ITALIAN AIR FORCE AND AIR MOBILITY COMMAND

    Science.gov (United States)

    2016-02-15

    In 1992, the United States (US) re-organized the entire structure of the air transport system creating Air Mobility Command (AMC) as a part of a...Combat Command (ACC) and Air Mobility Command (AMC). AMC was designated as the lead for airlifts and tankers . Initially the main airplanes assigned...tasks to 18th AF that decides through the 618th AOC (TACC) (Air Operation Center - Tanker Airlift Control Center) which wing has to fly the mission in

  7. Imagining is not doing but involves specific motor commands: a review of experimental data related to motor inhibition

    Directory of Open Access Journals (Sweden)

    Aymeric eGuillot

    2012-09-01

    Full Text Available There is now compelling evidence that motor imagery (MI and actual movement share common neural substrate. However, the question of how MI inhibits the transmission of motor commands into the efferent pathways in order to prevent any movement is largely unresolved. Similarly, little is known about the nature of the electromyographic activity that is apparent during MI. In addressing these gaps in the literature, the present paper argues that MI includes motor execution commands for muscle contractions which are blocked at some level of the motor system by inhibitory mechanisms. We first assemble data from neuroimaging studies that demonstrate that the neural networks mediating MI and motor performance are not totally overlapping, thereby highlighting potential differences between MI and actual motor execution. We then review MI data indicating the presence of subliminal muscular activity reflecting the intrinsic characteristics of the motor command as well as increased corticomotor excitability. The third section not only considers the inhibitory mechanisms involved during MI but also examines how the brain resolves the problem of issuing the motor command for action while supervising motor inhibition when people engage in voluntary movement during MI. The last part of the paper draws on imagery research in clinical contexts to suggest that some patients move while imagining an action, although they are not aware of such movements. In particular, experimental data from amputees as well as from patients with Parkinson’s disease are discussed. We also review recent studies based on comparing brain activity in tetraplegic patients with that from healthy matched controls that provide insights into inhibitory processes during MI. We conclude by arguing that based on available evidence, a multifactorial explanation of motor inhibition during MI is warranted.

  8. Imagining is Not Doing but Involves Specific Motor Commands: A Review of Experimental Data Related to Motor Inhibition

    Science.gov (United States)

    Guillot, Aymeric; Di Rienzo, Franck; MacIntyre, Tadhg; Moran, Aidan; Collet, Christian

    2012-01-01

    There is now compelling evidence that motor imagery (MI) and actual movement share common neural substrate. However, the question of how MI inhibits the transmission of motor commands into the efferent pathways in order to prevent any movement is largely unresolved. Similarly, little is known about the nature of the electromyographic activity that is apparent during MI. In addressing these gaps in the literature, the present paper argues that MI includes motor execution commands for muscle contractions which are blocked at some level of the motor system by inhibitory mechanisms. We first assemble data from neuroimaging studies that demonstrate that the neural networks mediating MI and motor performance are not totally overlapping, thereby highlighting potential differences between MI and actual motor execution. We then review MI data indicating the presence of subliminal muscular activity reflecting the intrinsic characteristics of the motor command as well as increased corticomotor excitability. The third section not only considers the inhibitory mechanisms involved during MI but also examines how the brain resolves the problem of issuing the motor command for action while supervising motor inhibition when people engage in voluntary movement during MI. The last part of the paper draws on imagery research in clinical contexts to suggest that some patients move while imagining an action, although they are not aware of such movements. In particular, experimental data from amputees as well as from patients with Parkinson’s disease are discussed. We also review recent studies based on comparing brain activity in tetraplegic patients with that from healthy matched controls that provide insights into inhibitory processes during MI. We conclude by arguing that based on available evidence, a multifactorial explanation of motor inhibition during MI is warranted. PMID:22973214

  9. Army Warfighter Information NetworkTactical Increment 2 Procurement Quantity Not Supported for Future Army Forces (REDACTED)

    Science.gov (United States)

    2016-03-01

    Forces Visit us at www.dodig.mil Objective The WIN-T program is a network that distributes classified and unclassified information by voice , data, and...Background The WIN-T program is a network that distributes classified and unclassified information by voice , data, and real-time video and is the backbone...Mission Command network to identify gaps and excesses in the current and planned capabilities. (FOUO) If the Mission Command

  10. Managing the Civil-Military Relationship: A Study of Lincoln’s Management of the Army of the Potomac Within the Context of Mission Command

    Science.gov (United States)

    2017-06-09

    2015), vii. 9 Bruce Tap, Over Lincoln’s Shoulder (Lawrence: University Press of Kansas, 1998), 31. 20 networks, information systems, processes and...the rest of the principles of mission command leadership philosophy as trust defines amounts, methods, and limits of risk, initiative, and orders as...of understanding to be determinant upon the rest of his civil-military relationship. Shared understanding is essential to providing a shared view of

  11. Launch Control Network Engineer

    Science.gov (United States)

    Medeiros, Samantha

    2017-01-01

    The Spaceport Command and Control System (SCCS) is being built at the Kennedy Space Center in order to successfully launch NASA’s revolutionary vehicle that allows humans to explore further into space than ever before. During my internship, I worked with the Network, Firewall, and Hardware teams that are all contributing to the huge SCCS network project effort. I learned the SCCS network design and the several concepts that are running in the background. I also updated and designed documentation for physical networks that are part of SCCS. This includes being able to assist and build physical installations as well as configurations. I worked with the network design for vehicle telemetry interfaces to the Launch Control System (LCS); this allows the interface to interact with other systems at other NASA locations. This network design includes the Space Launch System (SLS), Interim Cryogenic Propulsion Stage (ICPS), and the Orion Multipurpose Crew Vehicle (MPCV). I worked on the network design and implementation in the Customer Avionics Interface Development and Analysis (CAIDA) lab.

  12. Artificial Intelligence Applied to the Command, Control, Communications, and Intelligence of the U.S. Central Command.

    Science.gov (United States)

    1983-06-06

    these components will be presented. 4.17 °°,. CHAPTER III FOOTNOTES 1. Arron Barr and Edward A. Feigenbaum, eds., Te Handbook gf Artificial Inteligence ol...RD-R137 205 ARTIFICIAL INTELLIGENCE APPLIED TO THE COMIMAND CONTROL i/i COMMUNICATIONS RND..(U) ARMY WAR COLL CARLISLE BARRACKS U PA J N ENVART 06...appropriate mlitary servic or *swesmment aency. ARTIFICIAL INTELLIGENCE APPLIED TO THE COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE OF THE U.S. CENTRAL

  13. The Data Warehouse in Service Oriented Architectures and Network Centric Warfare

    National Research Council Canada - National Science Library

    Lenahan, Jack

    2005-01-01

    Since Network Centric Warfare (NCW) theory stresses shared understanding, command dispersal, and improved situational awareness does it not follow then, that data availability, mining, and superior analytics must be available at all...

  14. From Cybercrime to Cyborg Crime: Botnets as Hybrid Criminal Actor-Networks

    NARCIS (Netherlands)

    van der Wagen, Wytske; Pieters, Wolter

    2015-01-01

    Botnets, networks of infected computers controlled by a commander, increasingly play a role in a broad range of cybercrimes. Although often studied from technological perspectives, a criminological perspective could elucidate the organizational structure of botnets and how to counteract them.

  15. From Cybercrime to Cyborg Crime : Botnets as Hybrid Criminal Actor-Networks

    NARCIS (Netherlands)

    van der Wagen, Wytske; Pieters, Wolter

    2015-01-01

    Botnets, networks of infected computers controlled by a commander, increasingly play a role in a broad range of cybercrimes. Although often studied from technological perspectives, a criminological perspective could elucidate the organizational structure of botnets and how to counteract them.

  16. THE PARTICULARITIES OF THE COST CALCULATION METHOD ON COMMANDS IN FURNITURE INDUSTRY

    Directory of Open Access Journals (Sweden)

    Felicia Sabou

    2014-10-01

    Full Text Available The paper present the importance of the method on commands in cost calculation and the particularities of the cost calculation method on commands in the furniture industry. This paper presents a hypotetical study on the method on commands, considering the observations made during 2013-2014, on how it is organized and managed accounts management using method on commands.By presenting this hypothetical model about the accounting in management accounting using the method on commands, the paper contributes to the correct application of this method in practice, specifically in management accounting in companies from the furniture industry. In my opinion the method on commands is an appropriate method for achieving management accounting for companies that have as main activity the production of furniture. When applying the method on commands in cost calculation and in management accounting, the companies must to consider the particularities of the cost calculation, in the furniture industry, like: technical and economic factors from this sector, the technical details of each command, the codification of the commands, planning materials and labor costs for each command, monitoring and recording production costs, registration of the direct costs, distribution of the indirect costs on commands, registration of the indirect costs and registration in management accounting.

  17. Network performance of a wireless sensor network for temperature monitoring in vineyards

    DEFF Research Database (Denmark)

    Liscano, Ramiro; Jacoub, John Khalil; Dersingh, Anand

    2011-01-01

    Wireless sensor networks (WSNs) are an emerging technology which can be used for outdoor environmental monitoring. This paper presents challenges that arose from the development and deployment of a WSN for environmental monitoring as well as network performance analysis of this network. Different...... components in our sensor network architecture are presented like the physical nodes, the sensor node code, and two messaging protocols; one for collecting sensor and network values and the other for sensor node commands. An information model for sensor nodes to support plug-and-play capabilities in sensor...

  18. Service Oriented Architecture for Coast Guard Command and Control

    Science.gov (United States)

    2007-03-01

    108 3. Public Key Infrastructure (PKI)........................................... 109 4. SNMP for Remote Management .......................................... 110...never touches the network and it stays protected until it reaches the destination. 4. SNMP for Remote Management If the network is the enabling

  19. Somatic surveillance: corporeal control through information networks

    OpenAIRE

    Monahan, Torin; Wall, Tyler

    2007-01-01

    Somatic surveillance is the increasingly invasive technological monitoring of and intervention into body functions. Within this type of surveillance regime, bodies are recast as nodes on vast information networks, enabling corporeal control through remote network commands, automated responses, or self-management practices. In this paper, we investigate three developments in somatic surveillance: nanotechnology systems for soldiers on the battlefield, commercial body-monitoring systems for hea...

  20. A Commander’s Strategy for Social Media

    Science.gov (United States)

    2011-01-01

    social media and new media, may prove as profound as any of these inventions. We must therefore observe and adjust our information strategies in order not to "go under." One of the challenges that commanders now face is to develop strategies that recognize the shifts in the nature of warfare resulting from social media . There are already examples of militaries that have ignored the realities and have suffered. The effective use of social media may have the potential to help the Armed Forces better understand the environment

  1. Investigating Visual Alerting in Maritime Command and Control

    Science.gov (United States)

    2008-12-01

    environnement, l’automatisation de certaine fonctions et tâches est nécessaire pour atténuer la charge de travail. À cette fin, le PC opérations comporte un bon...Psychophysics, 25, 345-347. 2. Cooper, R. (1998). Visual Dominance and the Control of Action. Proceedings of the 20th Annual Conference of the Cognitive ...Processes II: Attention and Consciousness, pp.78- 80. In Cognition : Sixth Edition. Crawfordsville: John Wiley & Sons. 7. Pigeau, R. (1992). Command

  2. A Cognitive Framework for Battlefield Commanders’ Situation Assessment

    Science.gov (United States)

    1994-07-01

    S eSTr -mJ’e0 -0 ~eaqe 1:9 i’oirr Per IPWOrIre. nCo ,r te time~ for reviewingn inttrrc. Crs ej~rce’, 9 s Orr , o W .r1c, gathe-e And meaintaining tne...for situation assessment, based on research in cognitive psychology and tactical planning and on interviews with command staff. The report describes... psychological framework and discussion lay the groundwork for better insights into the required skills of situation assessment. The value of a situation

  3. A model-based executive for commanding robot teams

    Science.gov (United States)

    Barrett, Anthony

    2005-01-01

    The paper presents a way to robustly command a system of systems as a single entity. Instead of modeling each component system in isolation and then manually crafting interaction protocols, this approach starts with a model of the collective population as a single system. By compiling the model into separate elements for each component system and utilizing a teamwork model for coordination, it circumvents the complexities of manually crafting robust interaction protocols. The resulting systems are both globally responsive by virtue of a team oriented interaction model and locally responsive by virtue of a distributed approach to model-based fault detection, isolation, and recovery.

  4. Operational Command and Control of Joint Task Force Cyberspace Operations

    Science.gov (United States)

    2008-05-27

    is the “coordination and cooperation towar objectives”55 which “can be achieved either through Unity of Command ( UoC ) or through cooperation.”56...According to Dr. Vego, “the highest degree of effectiveness is ensured by having UoE though UoC ” and “failure to establish UoC results in a state of...offers an adversary the ability to do the same to friendly forces. According to Dr. Vego, “without [ UoC ] the [JTF] cannot bring all available forces to

  5. C3I: Issues of Command and Control

    Science.gov (United States)

    1991-01-01

    commander the information he or she needs, in short, the CM area öfters many opportunities for honest men and women to disagree about what...thai will do anything from releasing 70 to 80 percent of our nuclear megatonnagc in one orgasmic whump, or just sil there and say. "Don’t do anything...bases or those of their allies. This is not to say that all men and women are power hungry, only that objectivity may be more apparent than real in

  6. Plant Habitat Telemetry / Command Interface and E-MIST

    Science.gov (United States)

    Walker, Uriae M.

    2013-01-01

    Plant Habitat (PH) is an experiment to be taken to the International Space Station (ISS) in 2016. It is critical that ground support computers have the ability to uplink commands to control PH, and that ISS computers have the ability to downlink PH telemetry data to ground support. This necessitates communication software that can send, receive, and process, PH specific commands and telemetry. The objective of the Plant Habitat Telemetry/ Command Interface is to provide this communication software, and to couple it with an intuitive Graphical User Interface (GUI). Initial investigation of the project objective led to the decision that code be written in C++ because of its compatibility with existing source code infrastructures and robustness. Further investigation led to a determination that multiple Ethernet packet structures would need to be created to effectively transmit data. Setting a standard for packet structures would allow us to distinguish these packets that would range from command type packets to sub categories of telemetry packets. In order to handle this range of packet types, the conclusion was made to take an object-oriented programming approach which complemented our decision to use the C++ programming language. In addition, extensive utilization of port programming concepts was required to implement the core functionality of the communication software. Also, a concrete understanding of a packet processing software was required in order to put aU the components of ISS-to-Ground Support Equipment (GSE) communication together and complete the objective. A second project discussed in this paper is Exposing Microbes to the Stratosphere (EMIST). This project exposes microbes into the stratosphere to observe how they are impacted by atmospheric effects. This paper focuses on the electrical and software expectations of the project, specifically drafting the printed circuit board, and programming the on-board sensors. The Eagle Computer-Aided Drafting

  7. The Role of a Commander in Military Lessons Learned Systems

    Directory of Open Access Journals (Sweden)

    Zenon Waliński

    2015-06-01

    Full Text Available The aim of the paper is to investigate the role of a commander in military Lessons Learned systems. In order to achieve the aim, the paper presents (1 the architecture of the Lessons Learned capabilities in the U.S. Army, NATO and the Polish Armed Forces, (2 the commander’s role in the Lessons Learned process (3 the commander’s role in fostering Lessons Learned organisation culture. The paper is based on multiple case study analysis including Lessons Learned systems in NATO, the U.S. Army and the Polish Armed Forces.

  8. Computers for Command and Control: An Airland Battle Requirement!

    Science.gov (United States)

    1984-05-01

    Systems management has been 7. Bernard L. Verdier and David P. Porreca, "The Command and Control Systems of the Future - Now," Military RevBiew November...September 1982, pp 45-49. 145 -r .- r r rr&r-- ’ . -. °- *° . * . - -’ - U 1 h -° - %-r- , . V !.t, V 7’" . .% V%- I. ’ ’ % ." . Verdier, Bernard L...Combat Organizations." Ph. D. dissertation, University of Michigan, 1980. Hilbert, Donald E. and Kidwell , Birtrun S. Jr. "Development of Army Tactical

  9. The Development of Strategic Air Command, 1946-1976

    Science.gov (United States)

    1976-03-21

    Etop flights from Carswell Air Force Base, Texas, to Hawaii. The B-36, assigned to the 7th Bomb Group and commanded by Major J. D. Bartlett, flew... flight of six B-29s to Rhein-Main Airfield, Germany. Two C-54s of the 1st Air Transport Unit, Roswell Field, New Mexico, accompanied the B-29s with spare...visited capitals of several free-European countries, and surveyed numerous airdromes for possible use by B-29s. This flight , which was planned and executed

  10. Network configuration management : paving the way to network agility.

    Energy Technology Data Exchange (ETDEWEB)

    Maestas, Joseph H.

    2007-08-01

    Sandia networks consist of nearly nine hundred routers and switches and nearly one million lines of command code, and each line ideally contributes to the capabilities of the network to convey information from one location to another. Sandia's Cyber Infrastructure Development and Deployment organizations recognize that it is therefore essential to standardize network configurations and enforce conformance to industry best business practices and documented internal configuration standards to provide a network that is agile, adaptable, and highly available. This is especially important in times of constrained budgets as members of the workforce are called upon to improve efficiency, effectiveness, and customer focus. Best business practices recommend using the standardized configurations in the enforcement process so that when root cause analysis results in recommended configuration changes, subsequent configuration auditing will improve compliance to the standard. Ultimately, this minimizes mean time to repair, maintains the network security posture, improves network availability, and enables efficient transition to new technologies. Network standardization brings improved network agility, which in turn enables enterprise agility, because the network touches all facets of corporate business. Improved network agility improves the business enterprise as a whole.

  11. Suitability of Agent Technology for Military Command and Control in the Future Combat System Environment

    Energy Technology Data Exchange (ETDEWEB)

    Potok, TE

    2003-02-13

    The U.S. Army is faced with the challenge of dramatically improving its war fighting capability through advanced technologies. Any new technology must provide significant improvement over existing technologies, yet be reliable enough to provide a fielded system. The focus of this paper is to assess the novelty and maturity of agent technology for use in the Future Combat System (FCS). The FCS concept represents the U.S. Army's ''mounted'' form of the Objective Force. This concept of vehicles, communications, and weaponry is viewed as a ''system of systems'' which includes net-centric command and control (C{sup 2}) capabilities. This networked C{sup 2} is an important transformation from the historically centralized, or platform-based, C{sup 2} function since a centralized command architecture may become a decision-making and execution bottleneck, particularly as the pace of war accelerates. A mechanism to ensure an effective network-centric C{sup 2} capacity (combining intelligence gathering and analysis available at lower levels in the military hierarchy) is needed. Achieving a networked C{sup 2} capability will require breakthroughs in current software technology. Many have proposed the use of agent technology as a potential solution. Agents are an emerging technology, and it is not yet clear whether it is suitable for addressing the networked C{sup 2} challenge, particularly in satisfying battlespace scalability, mobility, and security expectations. We have developed a set of software requirements for FCS based on military requirements for this system. We have then evaluated these software requirements against current computer science technology. This analysis provides a set of limitations in the current technology when applied to the FCS challenge. Agent technology is compared against this set of limitations to provide a means of assessing the novelty of agent technology in an FCS environment. From this analysis we

  12. STS-93 Commander Collins takes part in emergency egress training

    Science.gov (United States)

    1999-01-01

    STS-93 Commander Eileen M. Collins climbs into an M-113 armored personnel carrier at the launch pad to take part in emergency egress training. Collins is the first woman to serve as mission commander. In preparation for their mission, the STS-93 crew are participating in Terminal Countdown Demonstration Test activities that also include a launch-day dress rehearsal culminating with a simulated main engine cut-off. Others in the crew are Pilot Jeffrey S. Ashby and Mission Specialists Steven A. Hawley (Ph.D.), Catherine G. Coleman (Ph.D.), and Michel Tognini of France, who represents the Centre National d'Etudes Spatiales (CNES). The primary mission of STS-93 is the release of the Chandra X-ray Observatory, which will allow scientists from around the world to obtain unprecedented X-ray images of exotic environments in space to help understand the structure and evolution of the universe. Chandra is expected to provide unique and crucial information on the nature of objects ranging from comets in our solar system to quasars at the edge of the observable universe. Since X-rays are absorbed by the Earth's atmosphere, space-based observatories are necessary to study these phenomena and allow scientists to analyze some of the greatest mysteries of the universe. The targeted launch date for STS-93 is no earlier than July 20 at 12:36 a.m. EDT from Launch Pad 39B.

  13. ASCIIGenome: a command line genome browser for console terminals.

    Science.gov (United States)

    Beraldi, Dario

    2017-05-15

    Current genome browsers are designed to work via graphical user interfaces (GUIs), which, however intuitive, are not amenable to operate within console terminals and therefore are difficult to streamline or integrate in scripts. To circumvent these limitations, ASCIIGenome runs exclusively via command line interface to display genomic data directly in a terminal window. By following the same philosophy of UNIX tools, ASCIIGenome aims to be easily integrated with the command line, including batch processing of data, and therefore enables an effective exploration of the data. ASCIIGenome is written in Java. Consequently, it is a cross-platform tool and requires minimal or no installation. Some of the common genomic data types are supported and data access on remote ftp servers is possible. Speed and memory footprint are comparable to or better than those of common genome browsers. Software and source code (MIT License) are available at https://github.com/dariober/ASCIIGenome with detailed documentation at http://asciigenome.readthedocs.io . Dario.beraldi@cruk.cam.ac.uk. Supplementary data are available at Bioinformatics online.

  14. Commande vectorielle d'un moteur asynchrone sans capteur

    Science.gov (United States)

    Ourth, T.

    1993-06-01

    A field-oriented control strategy for induction machines which does not use mechanical sensors is presented. The rotor flux is observed by a reduced-order Luenberger-type observer based on a model using a stator-fixed reference frame. An estimate of the rotation speed is derived from the flux vector, the measured stator currents and the field orientation angle. Simulations demonstrate that this control strategy performs well even in the presence of parameter variations up to ± 50% (resistances). Ce papier présente la commande par flux orienté d'une machine asynchrone sans capteur de vitesse ou de position. Le flux rotorique est évalué grâce à un observateur d'ordre réduit d'un type voisin de Luenberger travaillant dans un repère fixe statorique. L'estimation de la vitesse est obtenue à partir du module du flux rotorique, des courants statoriques mesurés et de l'angle d'orientation du flux rotorique. Cette étude basée sur des simulations démontre un comportement acceptable de la commande malgré la variation des paramètres comme les résistances de la machine.

  15. A Virtual Information-Action Workspace for Command and Control

    Science.gov (United States)

    Lintern, Gavan; Naikar, Neelam

    2002-10-01

    Information overload has become a critical challenge within military Command and Control. However, the problem is not so much one of too much information but of abundant information that is poorly organized and poorly represented. In addition, the capabilities to test the effects of decisions before they are implemented and to monitor the progress of events after a decision is implemented are primitive. A virtual information-action workspace could be designed to resolve these issues. The design of such a space would require a detailed understanding of the specific information needed to support decision making in Command and Control. That information can be obtained with the use of knowledge acquisition and knowledge representation tools from the field of applied cognitive psychology. In addition, it will be necessary to integrate forms for perception and action into a virtual space that will support access to the information and that will provide means for testing and implementing decisions. This paper presents a rationale for a virtual information-action workspace and outlines an approach to its design.

  16. Your wish is my command programming by example

    CERN Document Server

    2001-01-01

    As user interface designers, software developers, and yes-as users, we all know the frustration that comes with using "one size fits all" software from off the shelf. Repeating the same commands over and over again, putting up with an unfriendly graphical interface, being unable to program a new application that you thought of yourself-these are all common complaints. The inflexibility of today''s computer interfaces makes many people feel like they are slaves to their computers. Shouldn''t it be the other way around? Why can''t technology give us more "custom-fitting" software? On the horizon is a new technology that promises to give ordinary users the power to create and modify their own programs. Programming by example (PBE) is a technique in which a software agent records a user''s behavior in an interactive graphical interface, then automatically writes a program that will perform that behavior for the user. Your Wish is My Command: Programming by Example takes a broad look at this new technology. In the...

  17. Electronic Control System Of Home Appliances Using Speech Command Words

    Directory of Open Access Journals (Sweden)

    Aye Min Soe

    2015-06-01

    Full Text Available Abstract The main idea of this paper is to develop a speech recognition system. By using this system smart home appliances are controlled by spoken words. The spoken words chosen for recognition are Fan On Fan Off Light On Light Off TV On and TV Off. The input of the system takes speech signals to control home appliances. The proposed system has two main parts speech recognition and smart home appliances electronic control system. Speech recognition is implemented in MATLAB environment. In this process it contains two main modules feature extraction and feature matching. Mel Frequency Cepstral Coefficients MFCC is used for feature extraction. Vector Quantization VQ approach using clustering algorithm is applied for feature matching. In electrical home appliances control system RF module is used to carry command signal from PC to microcontroller wirelessly. Microcontroller is connected to driver circuit for relay and motor. The input commands are recognized very well. The system is a good performance to control home appliances by spoken words.

  18. Data Analysis & Statistical Methods for Command File Errors

    Science.gov (United States)

    Meshkat, Leila; Waggoner, Bruce; Bryant, Larry

    2014-01-01

    This paper explains current work on modeling for managing the risk of command file errors. It is focused on analyzing actual data from a JPL spaceflight mission to build models for evaluating and predicting error rates as a function of several key variables. We constructed a rich dataset by considering the number of errors, the number of files radiated, including the number commands and blocks in each file, as well as subjective estimates of workload and operational novelty. We have assessed these data using different curve fitting and distribution fitting techniques, such as multiple regression analysis, and maximum likelihood estimation to see how much of the variability in the error rates can be explained with these. We have also used goodness of fit testing strategies and principal component analysis to further assess our data. Finally, we constructed a model of expected error rates based on the what these statistics bore out as critical drivers to the error rate. This model allows project management to evaluate the error rate against a theoretically expected rate as well as anticipate future error rates.

  19. Evaluation of the metabolic fate of munitions material (TNT & RDX) in plant systems and initial assessment of material interaction with plant genetic material (DNA). Initial assessment of plant DNA adducts as biomarkers

    Energy Technology Data Exchange (ETDEWEB)

    Harvey, S.D.; Clauss, T.W.; Fellows, R.J.; Cataldo, D.A.

    1995-08-01

    Genetic damage to deoxyribonucleic acid (DNA) has long been suspected of being a fundamental event leading to cancer. A variety of causal factors can result in DNA damage including photodimerization of base pairs, ionizing radiation, specific reaction of DNA with environmental pollutants, and nonspecific oxidative damage caused by the action of highly reactive oxidizing agents produced by metabolism. Because organisms depend on an unadulterated DNA template for reproduction, DNA repair mechanisms are an important defense for maintaining genomic integrity. The objective of this exploratory project was to evaluate the potential for TNT to form DNA adducts in plants. These adducts, if they exist in sufficient quantities, could be potential biomarkers of munitions exposure. The ultimate goal is to develop a simple analytical assay for the determination of blomarkers that is indicative of munitions contamination. DNA repair exists in dynamic equilibrium with DNA damage. Repair mechanisms are capable of keeping DNA damage at remarkably low concentrations provided that the repair capacity is not overwhelmed.

  20. Understanding Commanders’ Information Needs for Influence Operations

    Science.gov (United States)

    2009-01-01

    Dynamics, May 1999; and Dunia Lopez-Pintado, “Diffusion in Complex Social Networks,” WP-AD 2004-33, Instituto Valenciano de Investigaciones Economicas...1917. Lopez-Pintado, Dunia, “Diffusion in Complex Social Networks,” Working Paper WP-AD 2004-33, Instituto Valenciano de Investigaciones Economicas...107 E. Assessment of Social Network Analysis for Influence Operations

  1. General Nobile and the Airship Italia: No Second-In-Command

    Science.gov (United States)

    Bendrick, Gregg A.

    2017-01-01

    The airship Italia, commanded by General Umberto Nobile, crashed during its return flight from the North Pole in 1928. Prior work has demonstrated the possibility that this crash was fatigue-related, due to significant sleep-deprivation on the part of its Commander, and to resulting errors in cognition and judgment. However, the underlying cause of the fatigue was likely due to the fact that the Commander did not have a Second-In-Command on board to take over duties while the Commander was allowed to rest. At that time the Second-In-Command was a formally designated position, and according to Nobiles previous writings was considered to be a necessary crew member on an airship.

  2. Wireless Sensor Network Based Subsurface Contaminant Plume Monitoring

    Science.gov (United States)

    2012-04-16

    conventional WSN . VSN enabled closed loop system consumes more energy than the VSN only system, because of the commands that are send to the nodes. Energy ...predict future plume behavior. This proof-of-concept research aimed at demonstrating the use of an intelligent Wireless Sensor Network ( WSN ) to...Network ( WSN ) to monitor contaminant plume movement in naturally heterogeneous subsurface formations to advance the sensor networking based monitoring

  3. Squadron Commanders and the Air Force Personnel System: Key Partners in the Career Development Process.

    Science.gov (United States)

    1987-05-01

    personnel topics in an effort to establish a background of opinion on issues such as the r3ted supplement and professional military education . The authors...34unprepared." SUMMARY In general, the survey results indicate the typica squi - dron commander receives major air command directed orientition...positions. Th2 commanders basically confirm current Air Force policy on the timing of in-residence professional military education : Squadron Officer

  4. Modeling and simulating command and control for organizations under extreme situations

    CERN Document Server

    Moon, Il-Chul; Kim, Tag Gon

    2013-01-01

    Commanding and controlling organizations in extreme situations is a challenging task in military, intelligence, and disaster management. Such command and control must be quick, effective, and considerate when dealing with the changing, complex, and risky conditions of the situation. To enable optimal command and control under extremes, robust structures and efficient operations are required of organizations. This work discusses how to design and conduct virtual experiments on resilient organizational structures and operational practices using modeling and simulation. The work illustrates key a

  5. The Twenty-Four Month Command Tour: Is It the Optimum Length?

    Science.gov (United States)

    1990-05-15

    another. As Christina Maslach points out, "There is no single definition of burnout that is accepted as a standard." She offers some twenty or so...system, supporting the desire for former battalion commanders to serve in certain jobs, minimizing commander stress and burnout , and facilitating the...mentioned " burnout " 18 or some related term. Some used such words as "tired" or "stress." Others specifically discussed the toll the command tour takes

  6. 2006 Munitions Executive Summit

    Science.gov (United States)

    2006-02-09

    and Mobile Electric Power (MEP) Generation Equipment Pine Bluff Arsenal…Chemical & Biological Defense Equipment Red River Army Depot…Tactical Wheeled ...Fuze Safety Device Defect No epoxy on set screws – fuze failed critical safety requirement Correctly applied epoxy on set screws BE AMERICA’S...Increase through-put by transitioning to a continuous RDX drying and FEM grinding operation in one building (N-3) • 24 month period of performance

  7. Munitions Classification Library

    Science.gov (United States)

    2016-04-04

    and electronics components, but in differing quantities and configuration. Using a standardized modular approach, Geometrics is aiming to have a...also that the output data will be standardized and exported in the form of an HDF5 file [4]. UX-Analyze [5] is an add-on to Geosoft’s Oasis Montaj

  8. 2008 Munitions Executive Summit

    Science.gov (United States)

    2008-02-21

    Work Product • High impact core value streams are identified, mapped, and all applicable personnel are prepared to DMAIC • Accelerate Integration of...game planning & events) • Identify and clean legacy data bases for conversion to Navy ERP • High impact core value streams are DMAIC • Continuous

  9. 2009 Munitions Executive Summit

    Science.gov (United States)

    2009-02-05

    River Army Depot - Scranton Army Ammunition Plant ISO 14001 :2000 Environmental Management Systems - Lettermen Army Depot - Tobyhanna Army Depot - Iowa...Implementation - 277 projects (16% of total Army projects) completed - Financial benefit of $43.5M since Sep 05 - Self sustaining All JMC Installations are ISO ...Force • DRBs & OP Projects • Generating Force (11th ACR NTC; 1-509 IN (ABN) JRTC; 1-4 IN JMRC; NG IN BCT ISO Post-MOB) • Combat-load based RQMT • MCO

  10. The Predictive Factors of the Promotion of Physical Activity by Air Force Squadron Commanders

    National Research Council Canada - National Science Library

    Whelan, Dana

    2001-01-01

    This research examined the relationship between beliefs about physical activity, physical activity levels, age and the promotional practices for physical activity employed by Air Force squadron commanders...

  11. Developing Tactical Commanders at CGSOC for the Future AirLand Battlefield

    Science.gov (United States)

    1991-01-04

    and history. Airland BaLtLe Futr (ALB-F), sentor Army leaders and cu|rrent an thors ettIIaI sizL’ w LI tIpo rta|ce of these same c’ommniland cotlpoilets...cannot be great, but we still require good commanders. Both types of analysis include the commander’s assessment of the METT-T variables in conjunction...with the higher commander’s intent. The METT-T variable analysis essentially addresses all the key elements necessary to develop a commander’s vision

  12. Design and Implementation of the Automatic Assessment System for the Command and Control Specialty in Ships

    Directory of Open Access Journals (Sweden)

    Zhang Hao

    2017-01-01

    Full Text Available On the basis of analyzing the actual demand of automated assessment system for the command and control specialty in ships, the thought of the overall design of automated assessment system for the command and control specialty in ships is given, and the concrete realization methods of the user login module, test paper operation module and system maintenance module are studied and demonstrated. The proposed design idea and implementation method of automated assessment system for the command and control specialty in ships is scientific, efficient and practical, and provides reference for the exploitation of automated assessment system for the command and control specialty in ships.

  13. The Mac'OS X command line Unix under the hood

    CERN Document Server

    McElhearn, Kirk

    2006-01-01

    The Mac command line offers a faster, easier way to accomplish many tasks. It''s also the medium for many commands that aren''t accessible using the GUI. The Mac OS X Command Line is a clear, concise, tutorial-style introduction to all the major functionality provided by the command line. It''s also packed with information the experienced users need, including little-known shortcuts and several chapters devoted to advanced topics. This is a book to get you started, but also a book you won't soon outgrow.

  14. Space Command Sustainment Review: Improving the Balance Between Current and Future Capabilities

    National Research Council Canada - National Science Library

    Tripp, Robert S; Lynch, Kristin F; Harrison, Shawn; Drew, John G; Roll, Jr, Charles R

    2007-01-01

    .... Air Force space systems by evaluating the effectiveness and efficiency of current policies related to processes, force development, doctrine, information systems and tools, and organization form command perspective...

  15. U.S. Joint Theater Ballistic Missile Defense: Seeking Optimal Command and Control

    National Research Council Canada - National Science Library

    Kinslow, Kevin E

    2005-01-01

    .... The vision for this capability presents an interesting question on command organization since the conventional military structure is based on warfighting in distinct geographic areas of responsibility...

  16. PEACEKEEPING OPERATIONS MANAGEMENT. AN ANALYSIS OF CHALLENGES, CHANGES IN COMMAND ACTION AND TRAINING NEEDS

    Directory of Open Access Journals (Sweden)

    Ünsal SIĞRI

    2015-10-01

    Full Text Available The aim of this paper is to uncover emerging challenges of peacekeeping operations, determine the changes in command actions and its effects on the professional preparation of commanders by analyzing experiences of military officers. To that end the research data were collected by means of structured face-to- face interviews with voluntary participation of fourteen officers, who took charge in various peacekeeping operations. The collected data were analyzed based on the content analysis method. Findings indicate that peacekeeping operations pose specific challenges for peacekeepers, necessitate changes in command action in terms of flexibility and new precautions in terms of preparation of commanders.

  17. AMO EXPRESS: A Command and Control Experiment for Crew Autonomy

    Science.gov (United States)

    Stetson, Howard K.; Frank, Jeremy; Cornelius, Randy; Haddock, Angie; Wang, Lui; Garner, Larry

    2015-01-01

    NASA is investigating a range of future human spaceflight missions, including both Mars-distance and Near Earth Object (NEO) targets. Of significant importance for these missions is the balance between crew autonomy and vehicle automation. As distance from Earth results in increasing communication delays, future crews need both the capability and authority to independently make decisions. However, small crews cannot take on all functions performed by ground today, and so vehicles must be more automated to reduce the crew workload for such missions. NASA's Advanced Exploration Systems Program funded Autonomous Mission Operations (AMO) project conducted an autonomous command and control demonstration of intelligent procedures to automatically initialize a rack onboard the International Space Station (ISS) with power and thermal interfaces, and involving core and payload command and telemetry processing, without support from ground controllers. This autonomous operations capability is enabling in scenarios such as a crew medical emergency, and representative of other spacecraft autonomy challenges. The experiment was conducted using the Expedite the Processing of Experiments for Space Station (EXPRESS) rack 7, which was located in the Port 2 location within the U.S Laboratory onboard the International Space Station (ISS). Activation and deactivation of this facility is time consuming and operationally intensive, requiring coordination of three flight control positions, 47 nominal steps, 57 commands, 276 telemetry checks, and coordination of multiple ISS systems (both core and payload). The autonomous operations concept includes a reduction of the amount of data a crew operator is required to verify during activation or de-activation, as well as integration of procedure execution status and relevant data in a single integrated display. During execution, the auto-procedures provide a step-by-step messaging paradigm and a high level status upon termination. This

  18. Networked sensors for the combat forces

    Science.gov (United States)

    Klager, Gene

    2004-11-01

    Real-time and detailed information is critical to the success of ground combat forces. Current manned reconnaissance, surveillance, and target acquisition (RSTA) capabilities are not sufficient to cover battlefield intelligence gaps, provide Beyond-Line-of-Sight (BLOS) targeting, and the ambush avoidance information necessary for combat forces operating in hostile situations, complex terrain, and conducting military operations in urban terrain. This paper describes a current US Army program developing advanced networked unmanned/unattended sensor systems to survey these gaps and provide the Commander with real-time, pertinent information. Networked Sensors for the Combat Forces plans to develop and demonstrate a new generation of low cost distributed unmanned sensor systems organic to the RSTA Element. Networked unmanned sensors will provide remote monitoring of gaps, will increase a unit"s area of coverage, and will provide the commander organic assets to complete his Battlefield Situational Awareness (BSA) picture for direct and indirect fire weapons, early warning, and threat avoidance. Current efforts include developing sensor packages for unmanned ground vehicles, small unmanned aerial vehicles, and unattended ground sensors using advanced sensor technologies. These sensors will be integrated with robust networked communications and Battle Command tools for mission planning, intelligence "reachback", and sensor data management. The network architecture design is based on a model that identifies a three-part modular design: 1) standardized sensor message protocols, 2) Sensor Data Management, and 3) Service Oriented Architecture. This simple model provides maximum flexibility for data exchange, information management and distribution. Products include: Sensor suites optimized for unmanned platforms, stationary and mobile versions of the Sensor Data Management Center, Battle Command planning tools, networked communications, and sensor management software. Details

  19. Learning Networks, Networked Learning

    NARCIS (Netherlands)

    Sloep, Peter; Berlanga, Adriana

    2010-01-01

    Sloep, P. B., & Berlanga, A. J. (2011). Learning Networks, Networked Learning [Redes de Aprendizaje, Aprendizaje en Red]. Comunicar, XIX(37), 55-63. Retrieved from http://dx.doi.org/10.3916/C37-2011-02-05

  20. A New Node Deployment and Location Dispatch Algorithm for Underwater Sensor Networks

    Directory of Open Access Journals (Sweden)

    Peng Jiang

    2016-01-01

    Full Text Available Considering that deployment strategies for underwater sensor networks should contribute to fully connecting the networks, a Guaranteed Full Connectivity Node Deployment (GFCND algorithm is proposed in this study. The GFCND algorithm attempts to deploy the coverage nodes according to the greedy iterative strategy, after which the connectivity nodes are used to improve network connectivity and fully connect the whole network. Furthermore, a Location Dispatch Based on Command Nodes (LDBCN algorithm is proposed, which accomplishes the location adjustment of the common nodes with the help of the SINK node and the command nodes. The command nodes then dispatch the common nodes. Simulation results show that the GFCND algorithm achieves a comparatively large coverage percentage and a fully connected network; furthermore, the LDBCN algorithm helps the common nodes preserve more total energy when they reach their destination locations.

  1. Acquisition and control command system for power pulsed detectors

    CERN Document Server

    Cornat, R; Magniette, F

    2014-01-01

    A DAQ system is developed within the SiW-Ecal ILC collaboration. It provides a flexible and scalable architecture, compound of four parts. A detector interface (DIF) extracting data from front-end electronics and sending them as packets. Two levels of data concentration, control clock and fast command fanout. The two cards, named DCC and GDCC, use respectively FastEthernet and GigaEthernet. A software suite (named Calicoes) allows to control the DAQ and the detector chips and to acquire data from GigaEthernet. It also includes programs for decoding frontend readout to various formats, and also dispatching and aggregating data. Overall architecture, performance in test beam and prospects for use with hundreds of thousands channels are discussed.

  2. Spaceport Command and Control System - Support Software Development

    Science.gov (United States)

    Tremblay, Shayne

    2016-01-01

    The Information Architecture Support (IAS) Team, the component of the Spaceport Command and Control System (SCCS) that is in charge of all the pre-runtime data, was in need of some report features to be added to their internal web application, Information Architecture (IA). Development of these reports is crucial for the speed and productivity of the development team, as they are needed to quickly and efficiently make specific and complicated data requests against the massive IA database. These reports were being put on the back burner, as other development of IA was prioritized over them, but the need for them resulted in internships being created to fill this need. The creation of these reports required learning Ruby on Rails development, along with related web technologies, and they will continue to serve IAS and other support software teams and their IA data needs.

  3. Apollo 11 Commander Armstrong Presents President With Commemorative Plaque

    Science.gov (United States)

    1974-01-01

    On June 4, 1974, 5 years after the successful Apollo 11 lunar landing mission, commander Neil Armstrong (right) presented a plaque to U.S. President Richard Milhous Nixon (left) on behalf of all people who had taken part in the space program. In making the presentation, Armstrong said 'Mr. President, you have proclaimed this week to be United States Space week in conjunction with the fifth anniversary of our first successful landing on the Moon. It is my privilege to represent my colleagues, the crewmen of projects Mercury, Gemini, Apollo, and Skylab, and the men and women of NASA, and the hundreds of thousands of Americans from across the land who contributed so mightily to the success of our efforts in space in presenting this plaque which bears the names of each individual who has had the privilege of representing this country' in a space flight. The presentation was made at the California white house in San Clemente.

  4. Pulsar Search Results from the Arecibo Remote Command Center

    Science.gov (United States)

    Rodriguez, Miguel; Stovall, Kevin; Banaszak, Shawn A.; Becker, Alison; Biwer, Christopher M.; Boehler, Keith; Caballero, Keeisi; Christy, Brian; Cohen, Stephanie; Crawford, Fronefield; Cuellar, Andres; Danford, Andrew; Percy Dartez, Louis; Day, David; Flanigan, Joseph D.; Fonrouge, Aldo; Gonzalez, Adolfo; Gustavson, Kathy; Handzo, Emma; Hinojosa, Jesus; Jenet, Fredrick A.; Kaplan, David L. A.; Lommen, Andrea N.; Longoria, Chasity; Lopez, Janine; Lunsford, Grady; Mahany, Nicolas; Martinez, Jose; Mata, Alberto; Miller, Andy; Murray, James; Pankow, Chris; Ramirez, Ivan; Reser, Jackie; Rojas, Pablo; Rohr, Matthew; Rolph, Kristina; Rose, Caitlin; Rudnik, Philip; Siemens, Xavier; Tellez, Andrea; Tillman, Nicholas; Walker, Arielle; Wells, Bradley L.; Zaldivar, Jonathan; Zermeno, Adrienne; Gbncc Consortium, Palfa Consortium, Gbtdrift Consortium, Ao327 Consortium

    2015-01-01

    This poster presents the pulsar discoveries made by students in the Arecibo Remote Command Center (ARCC) program. The ARCC program was started at the University of Texas - Brownsville (UTB) within the Center for Advanced Radio Astronomy (CARA) as a group of scientists, faculty, graduate, undergraduate, and high school students interested in astrophysics. It has since expanded to form other ARCC programs at the University of Wisconsin-Milwaukee (UWM) and Franklin and Marshall College (F&M). The students in the ARCC group control the world's largest radio telescopes to search and discover pulsars. Pulsars are exotic neutron stars that emit beams of electromagnetic radiation. ARCC students use a web application to view and rate the images of radio pulsar candidates based on their signal characteristics. To date, ARCC students have searched through thousands of candidates and have discovered 61 pulsars to date.

  5. The Arecibo Remote Command Center at Franklin and Marshall College

    Science.gov (United States)

    Crawford, Fronefield; Jenet, Fredrick; Siemens, Xavier; Lommen, Andrea N.; Handzo, Emma; Mahany, Nicolas; Rolph, Kristina; Blazer, Sierra; Camuccio, Richard; Gebeyehu, Abel; Haylon, Christopher; Lederer, Mark; Lefebvre, Kathleen; Liang, Yaoyue; Mix, Daniel; McMahon, John; Morrow, Christopher; Munro, Jonathan; Nesselrodt, Ryan; Rose, Caitlin; TenBrook, Chase; Tibbetts, Matthew; Tran, Lam; Umberger, Rachel; Wilson, Emily; Wymer, Kristen

    2015-01-01

    We present an overview of the recently established Arecibo Remote Command Center (ARCC) program at Franklin and Marshall College. ARCC allows undergraduates to remotely use the Arecibo 305-m radio telescope for pulsar survey observations and to search the data collected for new radio pulsars using a custom pulsar candidate viewer. Students at Franklin and Marshall also have the opportunity to interact with and make research presentations via teleconference to other ARCC groups located at the University of Texas at Brownsville and the University of Wisconsin Milwaukee. This program serves as an effective introduction to radio pulsar research, and students develop skills that can be usefully employed in other pulsar research projects. A total of 22 Franklin and Marshall students have participated in ARCC since 2013. To date, one new pulsar has been found by the Franklin and Marshall ARCC group.

  6. Spaceport Command and Control System Automated Verification Software Development

    Science.gov (United States)

    Backus, Michael W.

    2017-01-01

    For as long as we have walked the Earth, humans have always been explorers. We have visited our nearest celestial body and sent Voyager 1 beyond our solar system1 out into interstellar space. Now it is finally time for us to step beyond our home and onto another planet. The Spaceport Command and Control System (SCCS) is being developed along with the Space Launch System (SLS) to take us on a journey further than ever attempted. Within SCCS are separate subsystems and system level software, each of which have to be tested and verified. Testing is a long and tedious process, so automating it will be much more efficient and also helps to remove the possibility of human error from mission operations. I was part of a team of interns and full-time engineers who automated tests for the requirements on SCCS, and with that was able to help verify that the software systems are performing as expected.

  7. Automation of Cassini Support Imaging Uplink Command Development

    Science.gov (United States)

    Ly-Hollins, Lisa; Breneman, Herbert H.; Brooks, Robert

    2010-01-01

    "Support imaging" is imagery requested by other Cassini science teams to aid in the interpretation of their data. The generation of the spacecraft command sequences for these images is performed by the Cassini Instrument Operations Team. The process initially established for doing this was very labor-intensive, tedious and prone to human error. Team management recognized this process as one that could easily benefit from automation. Team members were tasked to document the existing manual process, develop a plan and strategy to automate the process, implement the plan and strategy, test and validate the new automated process, and deliver the new software tools and documentation to Flight Operations for use during the Cassini extended mission. In addition to the goals of higher efficiency and lower risk in the processing of support imaging requests, an effort was made to maximize adaptability of the process to accommodate uplink procedure changes and the potential addition of new capabilities outside the scope of the initial effort.

  8. Command Center Training Tool (C2T2)

    Science.gov (United States)

    Jones, Phillip; Drucker, Nich; Mathews, Reejo; Stanton, Laura; Merkle, Ed

    2012-01-01

    This abstract presents the training approach taken to create a management-centered, experiential learning solution for the Virginia Port Authority's Port Command Center. The resultant tool, called the Command Center Training Tool (C2T2), follows a holistic approach integrated across the training management cycle and within a single environment. The approach allows a single training manager to progress from training design through execution and AAR. The approach starts with modeling the training organization, identifying the organizational elements and their individual and collective performance requirements, including organizational-specific performance scoring ontologies. Next, the developer specifies conditions, the problems, and constructs that compose exercises and drive experiential learning. These conditions are defined by incidents, which denote a single, multi-media datum, and scenarios, which are stories told by incidents. To these layered, modular components, previously developed meta-data is attached, including associated performance requirements. The components are then stored in a searchable library An event developer can create a training event by searching the library based on metadata and then selecting and loading the resultant modular pieces. This loading process brings into the training event all the previously associated task and teamwork material as well as AAR preparation materials. The approach includes tools within an integrated management environment that places these materials at the fingertips of the event facilitator such that, in real time, the facilitator can track training audience performance and resultantly modify the training event. The approach also supports the concentrated knowledge management requirements for rapid preparation of an extensive AAR. This approach supports the integrated training cycle and allows a management-based perspective and advanced tools, through which a complex, thorough training event can be developed.

  9. Command and Control (C2) in Joint Operations: Separate Functions, their Purpose, and Application to Battle Command in the 2lst Century

    National Research Council Canada - National Science Library

    Hampton, David

    1998-01-01

    The command and control function at the operational level is the most important operations function because it ties together the other functions at all levels of war across the range of military operations...

  10. Increasing operational command and control security by the implementation of device independent quantum key distribution

    Science.gov (United States)

    Bovino, Fabio Antonio; Messina, Angelo

    2016-10-01

    In a very simplistic way, the Command and Control functions can be summarized as the need to provide the decision makers with an exhaustive, real-time, situation picture and the capability to convey their decisions down to the operational forces. This two-ways data and information flow is vital to the execution of current operations and goes far beyond the border of military operations stretching to Police and disaster recovery as well. The availability of off-the shelf technology has enabled hostile elements to endanger the security of the communication networks by violating the traditional security protocols and devices and hacking sensitive databases. In this paper an innovative approach based to implementing Device Independent Quantum Key Distribution system is presented. The use of this technology would prevent security breaches due to a stolen crypto device placed in an end-to-end communication chain. The system, operating with attenuated laser, is practical and provides the increasing of the distance between the legitimate users.

  11. VNEC - A Virtual Network Experiment Controller

    Science.gov (United States)

    Gagnon, François; Dej, Tomas; Esfandiari, Babak

    This paper presents VNEC, a tool to specify and execute network experiments in a virtual environment. The user first formulates the network topology and then provides the tasks that should be performed by the computers together with their execution. Next, VNEC initializes the environment by powering up and configuring the virtual machines to match the desired network topology. Finally, commands are dispatched to the right virtual machines in the specified order. VNEC provides an environment for several types of research experiments such as virus propagation patterns and reactions of different targets against a given attack.

  12. Building a Capabilities Network to Improve Disaster Preparation Effort in the Pacific Command Area of Responsibility

    Science.gov (United States)

    2013-06-01

    in the following PACOM countries: East Asia, South Asia, and South Pacific (Adventist Development & Relief Agency, n.d.b) 3. Care International...Service “The Mission: Feed the hungry, clothe the naked, heal the sick, comfort the aged, shelter the homeless .” (Church World Service, n.d.a...involved in the following PACOM countries: Australia , Bangladesh, Cambodia, China, India, Indonesia, Japan, Laos, Myanmar, Nepal, Papa New Guinea, the

  13. Enhancing Command Communications and Innovation with SAINT:Semantics, Adaptation, and Influence in Networked Teams

    Science.gov (United States)

    2009-02-01

    many distinct solutions and comparisons should we present to a user. To answer this question our research involved exploring graph-theoretic measures...Groups, Open University of Catalonia , Barcelona, Spain, 2008. Transitions Meandre open source license approved. The Meandre infrastructure, an

  14. Time Series Modeling of Army Mission Command Communication Networks: An Event-Driven Analysis

    Science.gov (United States)

    2013-06-01

    rapidly occurring events followed by long periods of inactivity, which they argue arises from an internal priority queuing process (Barabási 2010...from a larger population, the sequence of observations represents one possible realization of a stochastic data generating process . The...increasingly influential technique. Monge and Contractor (2001) identify as many as nine theories and a multitude of mechanisms that have been used to

  15. Commanders and Cyber Chat: Should More Guidance be Provided for Social Networking Sites

    Science.gov (United States)

    2011-04-01

    revealing on Facebook his heavy drinking and fascination with female breasts; a Catholic school teacher was fired after posting on Facebook that he was gay ...www.rollingstone.com/politics/news/another-runaway-general-army-deploys-psy-ops-on- u -s-senators- 20110223 24 Ibid. 25 McMichael, W. "DoD may curb...Media and the Air Force" p. 7. 43 Ibid, p. 2. 44 Porterfield, Amy. Social Media Use Among Teens, Boomers and Moms : New Studies Reveal Great Insight

  16. Cooperative Interface Agents for Networked Command, Control, and Communications: Phase II

    Science.gov (United States)

    2006-04-01

    interaction notion of model-view-controller ( MVC ) where representational aids assist with viewing and 10 perceiving relevant aspects of the model...cooperative elements assist with controlling the system and manipulating the model, and cognitive tools assist with understanding the model. Following the MVC ...of the AAAI Spring Symposium on Computational Organization Design. Bradshaw, J. M., Dutfield, S., Benoit, P., & Woolley, J. D. (1997). KAoS: Toward an

  17. Using Hybrid Simulation/Analytical Queueing Networks to Capacitate USAF Air Mobility Command Passenger Terminals

    Science.gov (United States)

    2012-03-01

    798 0.8837 Levene 0.0599 798 0.8067 Bartlett 0.0009 1 0.9761 F Test 2-sided 1.0030 399 399 0.9761 I Welch’s Test Welch An ova testi1g Means Equal...0.0000 1 798 0.9995 Brown-Forsythe 0.0000 798 0.9985 Levene 0.0000 798 0.9991 Bartlett 0.0000 1 0.9983 F Test 2-sided 1.0002 399 399 0.9983 I...778 <.0001’ Brown-Forsythe 324.8684 778 <.0001’ Levene 391.2269 778 <.0001’ Bartlett 28831.514 1 <.0001’ F Test 2-sided 6.793e• 32 389 389 <.0001

  18. A network of networks.

    Science.gov (United States)

    Iedema, Rick; Verma, Raj; Wutzke, Sonia; Lyons, Nigel; McCaughan, Brian

    2017-04-10

    Purpose To further our insight into the role of networks in health system reform, the purpose of this paper is to investigate how one agency, the NSW Agency for Clinical Innovation (ACI), and the multiple networks and enabling resources that it encompasses, govern, manage and extend the potential of networks for healthcare practice improvement. Design/methodology/approach This is a case study investigation which took place over ten months through the first author's participation in network activities and discussions with the agency's staff about their main objectives, challenges and achievements, and with selected services around the state of New South Wales to understand the agency's implementation and large system transformation activities. Findings The paper demonstrates that ACI accommodates multiple networks whose oversight structures, self-organisation and systems change approaches combined in dynamic ways, effectively yield a diversity of network governances. Further, ACI bears out a paradox of "centralised decentralisation", co-locating agents of innovation with networks of implementation and evaluation expertise. This arrangement strengthens and legitimates the role of the strategic hybrid - the healthcare professional in pursuit of change and improvement, and enhances their influence and impact on the wider system. Research limitations/implications While focussing the case study on one agency only, this study is unique as it highlights inter-network connections. Contributing to the literature on network governance, this paper identifies ACI as a "network of networks" through which resources, expectations and stakeholder dynamics are dynamically and flexibly mediated and enhanced. Practical implications The co-location of and dynamic interaction among clinical networks may create synergies among networks, nurture "strategic hybrids", and enhance the impact of network activities on health system reform. Social implications Network governance requires more

  19. Bringing Benefits and Warding off Blights in Due Commandment (Analytic Study Compared with the Jordanian Law)

    Science.gov (United States)

    Al Etoum, Niebal Mohd Ibrahim; Mowafi, Hanan Sami Mohammad; Al Zubaidi, Faraj Hamad Salem

    2016-01-01

    The study aims to highlight the benefits and blights of the due commandment (intestate law) under Jordanian law for the year (2010) in the article (279). The study came in two sections, the first one dealt with the concept of due commandment, its legitimacy, verdict and terms; in the second section, I've dealt with the persons entitled to due…

  20. Air Force Space Command Satellite Orbit Predictor Using Parallel Virtual Machines

    Science.gov (United States)

    1993-12-01

    MASTER OF SCIENCE IN APPLIED MXTHZM& TICS from the NAVAL POSTGRADUATE SCHOOL December 1993 Author: 2/ Susan Kay (blatusiak) Brewer Approved by: \\L ’>C...School Montrey, Califomia 93943 4. Commander U.S. Naval Space Command Dahigtrn, VA 22448-5170 5. Profesor B. Neta, Code MA/Nd 2 Depwtment of

  1. USN/USMC Commander’s Quick Reference Manual for Legal Issues

    Science.gov (United States)

    2006-01-01

    aircraft or vessel; or on board military property. COMMAND CLIMATE: CO’s must not condone jokes, epithets or derogatory comments in their command...affirm) that the information you are about to provide is true to the best of your knowledge and belief, so help you God ?" C. What is the location

  2. Command Strategies for Balancing Respect and Authority in Undergraduate Expository Essays

    Science.gov (United States)

    Lee, Sook Hee

    2010-01-01

    The primary purpose of the paper is to examine how undergraduate writers adopt various commanding strategies of "shouldness" in their expository essays and the extent to which their adoptions relate to the success in the assessment of essay writing. The theoretical bases of the commands operating both within and across clause complexes are derived…

  3. 78 FR 70077 - Issuance of Materials License for U.S. Army Installation Management Command

    Science.gov (United States)

    2013-11-22

    ... COMMISSION Issuance of Materials License for U.S. Army Installation Management Command AGENCY: Nuclear... INFORMATION CONTACT: Dominick Orlando, Office of Federal and State Materials and Environmental Management... application is included in the SER. The U.S. Army, Installation Management Command's request for a materials...

  4. Hybrid EEG-fNIRS-Based Eight-Command Decoding for BCI: Application to Quadcopter Control.

    Science.gov (United States)

    Khan, Muhammad Jawad; Hong, Keum-Shik

    2017-01-01

    In this paper, a hybrid electroencephalography-functional near-infrared spectroscopy (EEG-fNIRS) scheme to decode eight active brain commands from the frontal brain region for brain-computer interface is presented. A total of eight commands are decoded by fNIRS, as positioned on the prefrontal cortex, and by EEG, around the frontal, parietal, and visual cortices. Mental arithmetic, mental counting, mental rotation, and word formation tasks are decoded with fNIRS, in which the selected features for classification and command generation are the peak, minimum, and mean ΔHbO values within a 2-s moving window. In the case of EEG, two eyeblinks, three eyeblinks, and eye movement in the up/down and left/right directions are used for four-command generation. The features in this case are the number of peaks and the mean of the EEG signal during 1 s window. We tested the generated commands on a quadcopter in an open space. An average accuracy of 75.6% was achieved with fNIRS for four-command decoding and 86% with EEG for another four-command decoding. The testing results show the possibility of controlling a quadcopter online and in real-time using eight commands from the prefrontal and frontal cortices via the proposed hybrid EEG-fNIRS interface.

  5. Hybrid EEG–fNIRS-Based Eight-Command Decoding for BCI: Application to Quadcopter Control

    Science.gov (United States)

    Khan, Muhammad Jawad; Hong, Keum-Shik

    2017-01-01

    In this paper, a hybrid electroencephalography–functional near-infrared spectroscopy (EEG–fNIRS) scheme to decode eight active brain commands from the frontal brain region for brain–computer interface is presented. A total of eight commands are decoded by fNIRS, as positioned on the prefrontal cortex, and by EEG, around the frontal, parietal, and visual cortices. Mental arithmetic, mental counting, mental rotation, and word formation tasks are decoded with fNIRS, in which the selected features for classification and command generation are the peak, minimum, and mean ΔHbO values within a 2-s moving window. In the case of EEG, two eyeblinks, three eyeblinks, and eye movement in the up/down and left/right directions are used for four-command generation. The features in this case are the number of peaks and the mean of the EEG signal during 1 s window. We tested the generated commands on a quadcopter in an open space. An average accuracy of 75.6% was achieved with fNIRS for four-command decoding and 86% with EEG for another four-command decoding. The testing results show the possibility of controlling a quadcopter online and in real-time using eight commands from the prefrontal and frontal cortices via the proposed hybrid EEG–fNIRS interface. PMID:28261084

  6. Methods, systems and apparatus for adjusting modulation index to improve linearity of phase voltage commands

    Science.gov (United States)

    Gallegos-Lopez, Gabriel; Perisic, Milun; Kinoshita, Michael H.

    2017-03-14

    Embodiments of the present invention relate to methods, systems and apparatus for controlling operation of a multi-phase machine in a motor drive system. The disclosed embodiments provide a mechanism for adjusting modulation index of voltage commands to improve linearity of the voltage commands.

  7. Page 1 216 R Ashiya et al command Selector switches any one of ...

    Indian Academy of Sciences (India)

    Set with address in the command console and transmitted with a single depression of the “GO' switch provided in the console. Seven banks of 5 key piano switches are provided to select any one of the 35 commands. The code is first converted into a decimal form and then it is displayed on the front panel. Subcarrier level ...

  8. Command and Running of an Experimental Model Vehicle for Covering a Labyrinth Type Runway

    Directory of Open Access Journals (Sweden)

    Eugen Răduca

    2014-09-01

    Full Text Available The paper presents the command and running of an autonomous vehicle - experimental model – for covering a labyrinth type runway. The command is realized with a Micro Arduino type platform and the running with two mini engines of continuous power, each coupled to a tire. The program has been written in C++.

  9. Distributed Decision and Communication Problems in Tactical USAF Command and Control

    Science.gov (United States)

    1983-07-30

    02139 DISTRIBUTED DECISION AND COMMUNICATION PROBLEMS IN TACTICAL USAF- COMMAND AND CONTROL Dr. Alexander H. Levis Prof. Michael Athans July 30, 1983...Decision and Communication Problems in Tactical USAF Command and Control 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  10. CCL: console command language, RSX11M V4. 0, V7. OC tutorial

    Energy Technology Data Exchange (ETDEWEB)

    Downward, J. G.

    1981-01-01

    The normal user interface to an RSX11M operating system is via MCR (Monitor Console Routine). If terminal input is not specifically requested by a task, all data or commands typed in at a user's terminal, are sent by the terminal driver to MCR for decoding. The MCR task (and its child ...SYS) decode user commands (ACT, ABORT,RUN, DEV, ETC.). Tasks installed with special names of the form ...XYZ are treated as an external MCR command. Hence if a user types, XYZ COMMANDLINE, the commandline in its entirety (or at least up to 79 characters) is sent as input to the task ...XYZ. This is the conventional way of supplying most system commands and controlling the operation of the RSX11M utility program. The limitations of this method are: (1) each task must be installed to get MCR command lines; (2) each installed task uses valuable POOL space; (3) only privileged users can INSTALL and REMOVE tasks; and (4) non-privileged users are restricted to RUNning non-installed tasks. To solve this problem, a user tailorable Console Command Language (CCL) has been implemented which allows each user to have a private task control language to pass command lines to tasks that are not installed in th system as external MCR commands.

  11. 32 CFR 643.5 - Responsibilities of major commands (MACOMS) and special staff agencies.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Responsibilities of major commands (MACOMS) and special staff agencies. 643.5 Section 643.5 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) REAL PROPERTY REAL ESTATE General § 643.5 Responsibilities of major commands...

  12. DATADRAW: A Command Language for Manipulating and Displaying Stacks, Queues, Lists and Trees.

    Science.gov (United States)

    Siklossy, L.; And Others

    DATADRAW is a command language, written in FORTRAN IV, to manipulate stacks, queues, lists and trees, and to display them on the CDC 252 scope system attached to a CDC 6600. A DATADRAW primer is given, and the algorithms for updating and displaying structures are described. It is noted that DATADRAW was designed to be a simple command language…

  13. 32 CFR Appendix E to Part 247 - DoD Command Newspaper and Magazine Review System

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false DoD Command Newspaper and Magazine Review System... OF DEFENSE (CONTINUED) MISCELLANEOUS DEPARTMENT OF DEFENSE NEWSPAPERS, MAGAZINES AND CIVILIAN ENTERPRISE PUBLICATIONS Pt. 247, App. E Appendix E to Part 247—DoD Command Newspaper and Magazine Review...

  14. Interdependent multi-layer networks: modeling and survivability analysis with applications to space-based networks.

    Science.gov (United States)

    Castet, Jean-Francois; Saleh, Joseph H

    2013-01-01

    This article develops a novel approach and algorithmic tools for the modeling and survivability analysis of networks with heterogeneous nodes, and examines their application to space-based networks. Space-based networks (SBNs) allow the sharing of spacecraft on-orbit resources, such as data storage, processing, and downlink. Each spacecraft in the network can have different subsystem composition and functionality, thus resulting in node heterogeneity. Most traditional survivability analyses of networks assume node homogeneity and as a result, are not suited for the analysis of SBNs. This work proposes that heterogeneous networks can be modeled as interdependent multi-layer networks, which enables their survivability analysis. The multi-layer aspect captures the breakdown of the network according to common functionalities across the different nodes, and it allows the emergence of homogeneous sub-networks, while the interdependency aspect constrains the network to capture the physical characteristics of each node. Definitions of primitives of failure propagation are devised. Formal characterization of interdependent multi-layer networks, as well as algorithmic tools for the analysis of failure propagation across the network are developed and illustrated with space applications. The SBN applications considered consist of several networked spacecraft that can tap into each other's Command and Data Handling subsystem, in case of failure of its own, including the Telemetry, Tracking and Command, the Control Processor, and the Data Handling sub-subsystems. Various design insights are derived and discussed, and the capability to perform trade-space analysis with the proposed approach for various network characteristics is indicated. The select results here shown quantify the incremental survivability gains (with respect to a particular class of threats) of the SBN over the traditional monolith spacecraft. Failure of the connectivity between nodes is also examined, and the

  15. Interdependent multi-layer networks: modeling and survivability analysis with applications to space-based networks.

    Directory of Open Access Journals (Sweden)

    Jean-Francois Castet

    Full Text Available This article develops a novel approach and algorithmic tools for the modeling and survivability analysis of networks with heterogeneous nodes, and examines their application to space-based networks. Space-based networks (SBNs allow the sharing of spacecraft on-orbit resources, such as data storage, processing, and downlink. Each spacecraft in the network can have different subsystem composition and functionality, thus resulting in node heterogeneity. Most traditional survivability analyses of networks assume node homogeneity and as a result, are not suited for the analysis of SBNs. This work proposes that heterogeneous networks can be modeled as interdependent multi-layer networks, which enables their survivability analysis. The multi-layer aspect captures the breakdown of the network according to common functionalities across the different nodes, and it allows the emergence of homogeneous sub-networks, while the interdependency aspect constrains the network to capture the physical characteristics of each node. Definitions of primitives of failure propagation are devised. Formal characterization of interdependent multi-layer networks, as well as algorithmic tools for the analysis of failure propagation across the network are developed and illustrated with space applications. The SBN applications considered consist of several networked spacecraft that can tap into each other's Command and Data Handling subsystem, in case of failure of its own, including the Telemetry, Tracking and Command, the Control Processor, and the Data Handling sub-subsystems. Various design insights are derived and discussed, and the capability to perform trade-space analysis with the proposed approach for various network characteristics is indicated. The select results here shown quantify the incremental survivability gains (with respect to a particular class of threats of the SBN over the traditional monolith spacecraft. Failure of the connectivity between nodes is also

  16. Identification of important nodes in directed biological networks: a network motif approach.

    Directory of Open Access Journals (Sweden)

    Pei Wang

    Full Text Available Identification of important nodes in complex networks has attracted an increasing attention over the last decade. Various measures have been proposed to characterize the importance of nodes in complex networks, such as the degree, betweenness and PageRank. Different measures consider different aspects of complex networks. Although there are numerous results reported on undirected complex networks, few results have been reported on directed biological networks. Based on network motifs and principal component analysis (PCA, this paper aims at introducing a new measure to characterize node importance in directed biological networks. Investigations on five real-world biological networks indicate that the proposed method can robustly identify actually important nodes in different networks, such as finding command interneurons, global regulators and non-hub but evolutionary conserved actually important nodes in biological networks. Receiver Operating Characteristic (ROC curves for the five networks indicate remarkable prediction accuracy of the proposed measure. The proposed index provides an alternative complex network metric. Potential implications of the related investigations include identifying network control and regulation targets, biological networks modeling and analysis, as well as networked medicine.

  17. Evidence against the facilitation of the vergence command during saccade-vergence interactions.

    Science.gov (United States)

    Hendel, Tal; Gur, Moshe

    2012-11-01

    Combined saccade-vergence movements result when gaze shifts are made to targets that differ both in direction and in depth from the momentary fixation point. Currently, there are two rivaling schemes to explain these eye movements. According to the first, such eye movements are due to a combination of a conjugate saccadic command and a symmetric vergence command; the two commands are not taken to be independent but instead are suggested to interact in a nonlinear manner, which leads to an intra-saccadic facilitation of the vergence command. According to the second scheme, the saccade generator is disconjugate, thus encoding vergence information in the saccadic commands themselves, and the remaining vergence requirement is provided by an asymmetric mechanism. Here, we test the scheme that suggests an intra-saccadic facilitation of the vergence command. We analyze this scheme and show that it has two fundamental properties. The first is that the vergence command is always symmetric, even during the intra-saccadic facilitation. The second is that the facilitated (and symmetric) vergence command sums linearly with the conjugate saccadic command at the final common pathway. Taking these properties together, this scheme predicts that the total magnitude of the saccadic component of combined saccade-vergence movements can be decomposed into a conjugate part and a symmetric part. When we tested this prediction in combined saccade-vergence movements of humans, we found that it was not confirmed. Thus, our results are incompatible with the facilitation of the vergence command hypothesis. Although these results do not directly verify the rivaling hypothesis, which suggests a disconjugate saccade generator, they do provide it with indirect support.

  18. A content analysis of military commander messages about tobacco and other health issues in military installation newspapers: what do military commanders say about tobacco?

    Science.gov (United States)

    Poston, Walker S C; Haddock, Christopher K; Jahnke, Sara A; Hyder, Melissa L; Jitnarin, Nattinee

    2015-06-01

    Military installation newspapers are a primary means used by military commanders to communicate information about topics important to military personnel including leadership, training issues, installation events, safety concerns, and vital health issues. We conducted a content analysis of military commanders' messages about health issues that were published in online military installation newspapers/newsfeeds. We identified a total of 75 publicly accessible installation newspapers/newsfeeds with commanders' messages (n = 39 Air Force, n = 19 Army, n = 7 Navy, n = 1 Marine, and n = 9 Joint Bases). Commander messages published from January 2012 to December 2012 were collected, screened, and coded. Coder inter-rater reliability was 98.9%. Among the 2,479 coded commanders' messages, 132 (5.3%) addressed a health topic as the primary focus. There were no significant differences between service branches in the percentage of health-oriented messages (χ(2) = 5.019, p = 0.285). The most commonly addressed health topics were exercise/fitness (23.5%), other mental health concerns (19.7%), alcohol/driving under the influence (13.6%), and suicide (12.1%). Tobacco use was directly addressed as a primary health aim in only two commanders' messages (1.5%). Health topics, and particularly tobacco-related content, are rarely written about by military commanders. The absence of tobacco-related health messages from line leadership contributes to the perception that tobacco control is a low priority. Reprint & Copyright © 2015 Association of Military Surgeons of the U.S.

  19. STS-103 Commander Brown DEPARTs PAFB for Houston

    Science.gov (United States)

    1999-01-01

    Amidst a flurry of activity, STS-103 Commander Curtis L. Brown Jr. disembarks from the bus which brought him to the runway at Patrick Air Force Base in Cocoa Beach, Fla. The STS-103 crew and their families are preparing to board an airplane that will return them to their home base at the Johnson Space Center in Houston following the successful completion of their mission. Discovery landed in darkness the previous evening, Dec. 27, on runway 33 at KSC's Shuttle Landing Facility at 7:00:47 p.m. EST. This was the first time that a Shuttle crew spent the Christmas holiday in space. The other STS-103 crew members are Pilot Scott J. Kelly and Mission Specialists Steven L. Smith, C. Michael Foale (Ph.D.), John M. Grunsfeld (Ph.D.), Claude Nicollier of Switzerland and Jean-Frangois Clervoy of France. The STS-103 mission accomplished outfitting the Hubble Space Telescope with six new gyroscopes, six new voltage/temperature improvement kits, a new onboard computer, a new solid state recorder and new data transmitter, a new fine guidance sensor along with new insulation on parts of the orbiting telescope. This was the 96th flight in the Space Shuttle program and the 27th for the orbiter Discovery.

  20. The pathology of command and control: a formal synthesis

    Directory of Open Access Journals (Sweden)

    Michael Cox

    2016-09-01

    Full Text Available One of the most important theories in the study of environmental governance and policy is the pathology of command and control, which describes the negative consequences of top-down, technocratic governance of social and ecological systems. However, to date, this theory has been expressed somewhat inconsistently and informally in the literature, even by the seminal works that have established its importance and popularized it. This presents a problem for the sustainability science community if it cannot be sure of the precise details of one of its most important theories. Without such precision, applications and tests of various elements of the theory cannot be conducted reliably to advance the knowledge of environmental governance. I address this problem by synthesizing several seminal works to formalize this theory. The formalization involves the identification of the individual elements of the theory and a diagrammatic description of their relationships with each other that unfold in a series of semi-independent causal paths. Ideally, with such a formalization, scholars can use this theory more reliably and more meaningfully in their future work. I conclude by discussing the implications this theory has for the governance of natural resources.

  1. STS-99 Commander Kregel returns to KSC for launch

    Science.gov (United States)

    2000-01-01

    STS-99 Commander Kevin Kregel arrives at Kennedy Space Center aboard a T-38 jet aircraft. He and the other five crew members are back at KSC to prepare for the second launch attempt of Endeavour Feb. 11 at 12:30 p.m. EST from Launch Pad 39A. The earlier launch scheduled for Jan. 31 was scrubbed due to poor weather and a faulty Enhanced Master Events Controller in the orbiter's aft compartment. The crew had returned to Houston after the scrubbed launch. Over the next few days, the crew will review mission procedures, conduct test flights in the Shuttle Training Aircraft and undergo routine preflight medical exams. STS-99 is the Shuttle Radar Topography Mission, which will produce unrivaled 3-D images of the Earth's surface. The result of the Shuttle Radar Topography Mission could be close to 1 trillion measurements of the Earth's topography. Landing is expected at KSC on Feb. 22 at 4:36 p.m. EST.

  2. Spaceport Command and Control System Support Software Development

    Science.gov (United States)

    Brunotte, Leonard

    2016-01-01

    The Spaceport Command and Control System (SCCS) is a project developed and used by NASA at Kennedy Space Center in order to control and monitor the Space Launch System (SLS) at the time of its launch. One integral subteam under SCCS is the one assigned to the development of a data set building application to be used both on the launch pad and in the Launch Control Center (LCC) at the time of launch. This web application was developed in Ruby on Rails, a web framework using the Ruby object-oriented programming language, by a 15 - employee team (approx.). Because this application is such a huge undertaking with many facets and iterations, there were a few areas in which work could be more easily organized and expedited. As an intern working with this team, I was charged with the task of writing web applications that fulfilled this need, creating a virtual and highly customizable whiteboard in order to allow engineers to keep track of build iterations and their status. Additionally, I developed a knowledge capture web application wherein any engineer or contractor within SCCS could ask a question, answer an existing question, or leave a comment on any question or answer, similar to Stack Overflow.

  3. An Experimental Analysis of Narrative Technology for Enhanced C4I (Computers, Communication, Command, Control and Intelligence)

    National Research Council Canada - National Science Library

    Cook, Malcolm

    2004-01-01

    This report considers critical issues in supporting command-team functions using an analysis of those tasks identified in transcripts of command-team members discussing critical incidents and issues...

  4. 32 CFR 770.31 - List of major naval installations in the State of Hawaii and cognizant commanders authorized to...

    Science.gov (United States)

    2010-07-01

    ... Fleet and Commander Naval Logistics Command Headquarters Areas, Johnson Circle Navy Exchange/Commissary... Reservoir Site; Sewage Treatment Plant; Fort Kam (tri-service); Utility Corridors, Lynch Park (Ohana Nui...

  5. Kimmel, Short, McVay: Case Studies in Executive Authority, Law and the Individual Rights of Military Commanders

    National Research Council Canada - National Science Library

    Scott, Roger

    1997-01-01

    .... The principle of civilian control of the military, by the civilian Commander in Chief and Congress, has prevailed whenever claims of individual rights by senior military commanders have contradicted...

  6. Thoughts turned into high-level commands: Proof-of-concept study of a vision-guided robot arm driven by functional MRI (fMRI) signals.

    Science.gov (United States)

    Minati, Ludovico; Nigri, Anna; Rosazza, Cristina; Bruzzone, Maria Grazia

    2012-06-01

    Previous studies have demonstrated the possibility of using functional MRI to control a robot arm through a brain-machine interface by directly coupling haemodynamic activity in the sensory-motor cortex to the position of two axes. Here, we extend this work by implementing interaction at a more abstract level, whereby imagined actions deliver structured commands to a robot arm guided by a machine vision system. Rather than extracting signals from a small number of pre-selected regions, the proposed system adaptively determines at individual level how to map representative brain areas to the input nodes of a classifier network. In this initial study, a median action recognition accuracy of 90% was attained on five volunteers performing a game consisting of collecting randomly positioned coloured pawns and placing them into cups. The "pawn" and "cup" instructions were imparted through four mental imaginery tasks, linked to robot arm actions by a state machine. With the current implementation in MatLab language the median action recognition time was 24.3s and the robot execution time was 17.7s. We demonstrate the notion of combining haemodynamic brain-machine interfacing with computer vision to implement interaction at the level of high-level commands rather than individual movements, which may find application in future fMRI approaches relevant to brain-lesioned patients, and provide source code supporting further work on larger command sets and real-time processing. Copyright © 2012 IPEM. Published by Elsevier Ltd. All rights reserved.

  7. Human Factors in Command-and-Control System Procurement,

    Science.gov (United States)

    1985-12-01

    Information Flow Diagrams 15 2.6 Operational Sequence Diagrams 20 2.7 Network Digrams 23 2.8 HIPO Charts 26 2.9 Job Process Charts 28 2.10 Process Control...diagrams (e) Operational sequence diagrams (f) Network diagrams (g) HIPO charts (h) Job process charts (I) Process control diagrams TABLE 2 - Types of...modelling of the effects of both stimulus uncertainty and consequence-of-action uncertainty on human performaInce. 2.8 HIPO Charts Hierarchical input

  8. Technology forecasting for space communication. [analysis of systems for application to Spacecraft Data and Tracking Network

    Science.gov (United States)

    1973-01-01

    A study was conducted to determine techniques for application to space communication. The subjects considered are as follows: (1) optical communication systems, (2) laser communications for data acquisition networks, (3) spacecraft data rate requirements, (4) telemetry, command, and data handling, (5) spacecraft tracking and data network antenna and preamplifier cost tradeoff study, and (6) spacecraft communication terminal evaluation.

  9. 32 CFR 700.847 - Responsibility of a master of an in-service ship of the Military Sealift Command.

    Science.gov (United States)

    2010-07-01

    ... REGULATIONS AND OFFICIAL RECORDS The Commanding Officer Commanding Officers Afloat § 700.847 Responsibility of... Military Sealift Command, the master's responsibility is absolute, except when, and to the extent, relieved... 32 National Defense 5 2010-07-01 2010-07-01 false Responsibility of a master of an in-service ship...

  10. Features of preparation of student collapsible commands of football to the short-term competitions

    Directory of Open Access Journals (Sweden)

    Balan В.A.

    2012-01-01

    Full Text Available It is considered determination of influence of the trainings loadings on the organism of sportsmen. Principal reasons of unsuccessful appearances of leading collapsible commands of universities in final tournaments are certain. In research information of the questionnaire questioning is utillized among the trainers of commands of student league. In a pedagogical experiment took part 18 sportsmen aged 18-21 years. The level of physical and technical preparedness of sportsmen is appraised. The basic tasks of trainer are set in preparation of student commands to appearance in short-term competitions. A necessity is well-proven planning of the trainings loadings on the phase of incomplete renewal.

  11. Air Force Command and Control: The Need for Increased Adaptability

    Science.gov (United States)

    2012-07-01

    that other services such as the Marines have already developed a deploy- able and scalable C2 capability. There may be economy of scales gained by...GDSS global decision support system GIG Global Information Grid GNO global network operations HOA Horn of Africa HQ headquarters ISAF International

  12. VIC (Vector-In-Commander) Input Preprocessor (VIP) Reference Manual.

    Science.gov (United States)

    1987-08-01

    ene in this block. 00 Form 1473 Istructions Reverse JUN U6 WA 60M~ OmN .... 1.04.-0."$ ACKNOWLEDGEMENTS The primary authors of the VIC Input...the data may be recorded. LOGISTC MENU Transfers from network menu for logistics data. Data input in logistic menu goes to the same file as the

  13. Commande optimale à flux libre des machines asynchrones

    Science.gov (United States)

    Biedinger, J. M.; Poullain, S.; Yvon, J. P.

    1992-01-01

    The subject of this paper is the optimal control with unconstrained flux of an induction motor being considered as a distributed parameter system described by a nonlinear diffusion equation. This approach allows to describe the electrodynamic state of the motor by taking into account, in a natural way, the influence of saturation and eddy-currents, as well as the nonlinearities due to the variable flux operation. Equations are approximated via a finite element formulation which leads to a finite dimensional dynamical system to which the techniques of optimal control may be applied. The generality of the methodology allows to treat various criteria. The objective aimed in this paper is to force the motor torque to follow a given input, especially under initially demagnetized conditions and with, naturally, constraints on the currents. For this purpose the criterion will be chosen as a norm of the difference between the electromagnetic torque and a given reference torque. Numerical simulations are presented for the case of a squirrel-cage rotor and for a solid iron rotor. Results are compared with those deduced from strategies based on lumped-parameter models. Torque responses obtained with field-oriented control method adapted to the case of flux-variable operation are also presented. Finally a modification of the criterion is proposed for identifying the command which allows to obtain the larger torque during transient states. Dans cet article on traite le problème du contrôle optimal à flux libre d'un moteur asynchrone considéré comme un système à paramètres répartis gouverné par une équation de diffusion non linéaire. Cette approche permet de décrire l'état électrodynamique de la machine en prenant naturellement en compte les effets de la saturation et des courants induits, ainsi que les non-linéarités liées au fonctionnement à flux variable. La formulation éléments finis est utilisée pour traduire le problème continu sous la forme d

  14. Generating Control Commands From Gestures Sensed by EMG

    Science.gov (United States)

    Wheeler, Kevin R.; Jorgensen, Charles

    2006-01-01

    An effort is under way to develop noninvasive neuro-electric interfaces through which human operators could control systems as diverse as simple mechanical devices, computers, aircraft, and even spacecraft. The basic idea is to use electrodes on the surface of the skin to acquire electromyographic (EMG) signals associated with gestures, digitize and process the EMG signals to recognize the gestures, and generate digital commands to perform the actions signified by the gestures. In an experimental prototype of such an interface, the EMG signals associated with hand gestures are acquired by use of several pairs of electrodes mounted in sleeves on a subject s forearm (see figure). The EMG signals are sampled and digitized. The resulting time-series data are fed as input to pattern-recognition software that has been trained to distinguish gestures from a given gesture set. The software implements, among other things, hidden Markov models, which are used to recognize the gestures as they are being performed in real time. Thus far, two experiments have been performed on the prototype interface to demonstrate feasibility: an experiment in synthesizing the output of a joystick and an experiment in synthesizing the output of a computer or typewriter keyboard. In the joystick experiment, the EMG signals were processed into joystick commands for a realistic flight simulator for an airplane. The acting pilot reached out into the air, grabbed an imaginary joystick, and pretended to manipulate the joystick to achieve left and right banks and up and down pitches of the simulated airplane. In the keyboard experiment, the subject pretended to type on a numerical keypad, and the EMG signals were processed into keystrokes. The results of the experiments demonstrate the basic feasibility of this method while indicating the need for further research to reduce the incidence of errors (including confusion among gestures). Topics that must be addressed include the numbers and arrangements

  15. Identification and Position Control of Marine Helm using Artificial Neural Network Neural Network

    Directory of Open Access Journals (Sweden)

    Hui ZHU

    2008-02-01

    Full Text Available If nonlinearities such as saturation of the amplifier gain and motor torque, gear backlash, and shaft compliances- just to name a few - are considered in the position control system of marine helm, traditional control methods are no longer sufficient to be used to improve the performance of the system. In this paper an alternative approach to traditional control methods - a neural network reference controller - is proposed to establish an adaptive control of the position of the marine helm to achieve the controlled variable at the command position. This neural network controller comprises of two neural networks. One is the plant model network used to identify the nonlinear system and the other the controller network used to control the output to follow the reference model. The experimental results demonstrate that this adaptive neural network reference controller has much better control performance than is obtained with traditional controllers.

  16. Neural-Network Control Of Prosthetic And Robotic Hands

    Science.gov (United States)

    Buckley, Theresa M.

    1991-01-01

    Electronic neural networks proposed for use in controlling robotic and prosthetic hands and exoskeletal or glovelike electromechanical devices aiding intact but nonfunctional hands. Specific to patient, who activates grasping motion by voice command, by mechanical switch, or by myoelectric impulse. Patient retains higher-level control, while lower-level control provided by neural network analogous to that of miniature brain. During training, patient teaches miniature brain to perform specialized, anthropomorphic movements unique to himself or herself.

  17. Autonomous Satellite Command and Control Through the World Wide Web. Phase 3

    Science.gov (United States)

    Cantwell, Brian; Twiggs, Robert

    1998-01-01

    The Automated Space System Experimental Testbed (ASSET) system is a simple yet comprehensive real-world operations network being developed. Phase 3 of the ASSET Project was January-December 1997 and is the subject of this report. This phase permitted SSDL and its project partners to expand the ASSET system in a variety of ways. These added capabilities included the advancement of ground station capabilities, the adaptation of spacecraft on-board software, and the expansion of capabilities of the ASSET management algorithms. Specific goals of Phase 3 were: (1) Extend Web-based goal-level commanding for both the payload PI and the spacecraft engineer. (2) Support prioritized handling of multiple (PIs) Principle Investigators as well as associated payload experimenters. (3) Expand the number and types of experiments supported by the ASSET system and its associated spacecraft. (4) Implement more advanced resource management, modeling and fault management capabilities that integrate the space and ground segments of the space system hardware. (5) Implement a beacon monitoring test. (6) Implement an experimental blackboard controller for space system management. (7) Further define typical ground station developments required for Internet-based remote control and for full system automation of the PI-to-spacecraft link. Each of those goals are examined. Significant sections of this report were also published as a conference paper. Several publications produced in support of this grant are included as attachments. Titles include: 1) Experimental Initiatives in Space System Operations; 2) The ASSET Client Interface: Balancing High Level Specification with Low Level Control; 3) Specifying Spacecraft Operations At The Product/Service Level; 4) The Design of a Highly Configurable, Reusable Operating System for Testbed Satellites; 5) Automated Health Operations For The Sapphire Spacecraft; 6) Engineering Data Summaries for Space Missions; and 7) Experiments In Automated Health

  18. Declarative Networking

    CERN Document Server

    Loo, Boon Thau

    2012-01-01

    Declarative Networking is a programming methodology that enables developers to concisely specify network protocols and services, which are directly compiled to a dataflow framework that executes the specifications. Declarative networking proposes the use of a declarative query language for specifying and implementing network protocols, and employs a dataflow framework at runtime for communication and maintenance of network state. The primary goal of declarative networking is to greatly simplify the process of specifying, implementing, deploying and evolving a network design. In addition, decla

  19. Development of the Macro Command Editing Executive System for Factory Workers-Oriented Programless Visual Inspection System

    Science.gov (United States)

    Anezaki, Takashi; Wakitani, Kouichi; Nakamura, Masatoshi; Kubo, Hiroyasu

    Because visual inspection systems are difficult to tune, they create many problems for the kaizen process. This results in increased development costs and time to assure that the inspection systems function properly. In order to improve inspection system development, we designed an easy-tuning system called a “Program-less” visual inspection system. The ROI macro command which consisted of eight kinds of shape recognition macro commands and decision, operation, control commands was built. Furthermore, the macro command editing executive system was developed by the operation of only the GUI without editing source program. The validity of the ROI macro command was proved by the application of 488 places.

  20. Knowledge Management for Distributed Tracking and the Next-Generation Command and Control

    National Research Council Canada - National Science Library

    Ceruti, Marion G; Wright, Tedd L

    2006-01-01

    Knowledge Management for Distributed-Tracking (KMDT) is an ongoing research and development project to improve military-information functions in the battle space, such as command, control, and decision support...