WorldWideScience

Sample records for network command munition

  1. Human Systems Integration Assessment of Network Centric Command and Control

    National Research Council Canada - National Science Library

    Quashnock, Dee; Kelly, Richard T; Dunaway, John; Smillie, Robert J

    2004-01-01

    .... FORCEnet is the operational construct and architectural framework for Naval Network Centric Warfare in the information age that integrates warriors, sensors, networks, command and control, platforms...

  2. A Commander in Chief's Network-Centric Odyssey

    National Research Council Canada - National Science Library

    Copley, E

    2002-01-01

    .... Each Armed Service has begun training and equipping its force using the tenets of Network-Centric Operations, but those forces come together for the first time under the combatant Commander-in-Chief...

  3. Legacy in the Sand: The United States Army Armament, Munitions and Chemical Command in Operations Desert Shield and Desert Storm

    Science.gov (United States)

    1992-12-21

    States Army Medical Department, over 1.5 million British-designed Small Box Respirator ( SBR ) masks, utilizing activated coconut charcoal as a filter, had...conflicts this nation will tfce-short in rjuration but of high intensity. In such a war, relance must bpp oaced upon the established stockpile and the...Supply System SAW squad automatic weapon SBA Small Business Administration SBR small box respirator SCR senior command representati’e SCRAM self-contained

  4. [Network Design of the Spaceport Command and Control System

    Science.gov (United States)

    Teijeiro, Antonio

    2017-01-01

    I helped the Launch Control System (LCS) hardware team sustain the network design of the Spaceport Command and Control System. I wrote the procedure that will be used to satisfy an official hardware test for the hardware carrying data from the Launch Vehicle. I installed hardware and updated design documents in support of the ongoing development of the Spaceport Command and Control System and applied firewall experience I gained during my spring 2017 semester to inspect and create firewall security policies as requested. Finally, I completed several online courses concerning networking fundamentals and Unix operating systems.

  5. Using LTE Networks for UAV Command and Control Link

    DEFF Research Database (Denmark)

    Nguyen, Huan Cong; Amorim, Rafhael Medeiros de; Wigard, Jeroen

    2017-01-01

    In this paper we investigate the ability of Long-Term Evolution (LTE) network to provide coverage for Unmanned Aerial Vehicles (UAVs) in a rural area, in particular for the Command and Control (C2) downlink. The study takes into consideration the dependency of the large-scale path loss on the hei......In this paper we investigate the ability of Long-Term Evolution (LTE) network to provide coverage for Unmanned Aerial Vehicles (UAVs) in a rural area, in particular for the Command and Control (C2) downlink. The study takes into consideration the dependency of the large-scale path loss...... on the height of the UAV, which is derived from actual measurements, and a real-world cellular network layout and configuration. The results indicate that interference is the dominant factor limiting the cellular coverage for UAVs in the downlink: outage level increases from 4.2% at 1.5 m height to 51.7% at 120...

  6. Considerations on command and response language features for a network of heterogeneous autonomous computers

    Science.gov (United States)

    Engelberg, N.; Shaw, C., III

    1984-01-01

    The design of a uniform command language to be used in a local area network of heterogeneous, autonomous nodes is considered. After examining the major characteristics of such a network, and after considering the profile of a scientist using the computers on the net as an investigative aid, a set of reasonable requirements for the command language are derived. Taking into account the possible inefficiencies in implementing a guest-layered network operating system and command language on a heterogeneous net, the authors examine command language naming, process/procedure invocation, parameter acquisition, help and response facilities, and other features found in single-node command languages, and conclude that some features may extend simply to the network case, others extend after some restrictions are imposed, and still others require modifications. In addition, it is noted that some requirements considered reasonable (user accounting reports, for example) demand further study before they can be efficiently implemented on a network of the sort described.

  7. Communication Delays in the Cooperative Control of Wide Area Search Munitions Via Iterative Network Flow

    National Research Council Canada - National Science Library

    Mitchell, Jason

    2003-01-01

    .... This model is used to study the effect of communication delays on the performance of an iteractive network flow optimization model that results in a sequence of linear programs for the optimal...

  8. Zenith-100 Microcomputer Network for Air Command and Staff College.

    Science.gov (United States)

    1987-04-01

    34 AD-A182 495 ZENI T-ipo ml CROCOMFUT E NET WOR( FOR AIR COMAND AND h SAFF CoLLG (U) AIl COMMAND ANDCSTAFF COLL MAX(WELL AFS "CAL W L GALWAY El AL...processing of documents by eliminating the time required to physically move the documents from one office to the next. Reproduction Savings. Information

  9. 2008 Munitions Executive Summit

    Science.gov (United States)

    2008-02-21

    Improvement Initiative • Problem : • Ballistic performance • Parts Obsolescence • Producibility Issues • Solution: • Flight telemetry • Results...Reduced Manufacturing Costs, Increased reliability, Better understanding, Reduced complexity, Reduced touch labor, Reduced material costs • SATISFIED...Rocket Motor Demil R&D Technology •Munitions parts make-up: Munitions Items Disposition Action System ( MIDAS ) Training Directorate •Ammunition

  10. Applied Knowledge Management to Mitigate Cognitive Load in Network-Enabled Mission Command

    Science.gov (United States)

    2017-11-22

    ARL-TN-0859 ● NOV 2017 US Army Research Laboratory Applied Knowledge Management to Mitigate Cognitive Load in Network-Enabled...Applied Knowledge Management to Mitigate Cognitive Load in Network-Enabled Mission Command by John K Hawley Human Research and Engineering...REPORT TYPE Technical Note 3. DATES COVERED (From - To) 1 May 2016–20 April 2017 4. TITLE AND SUBTITLE Applied Knowledge Management to Mitigate

  11. A distributed command governor strategy for the operational control of drinking water networks

    OpenAIRE

    Tedesco, Francesco; Ocampo-Martínez, Carlos; Casavola, Alessandro; Puig Cayuela, Vicenç

    2014-01-01

    This paper proposes the application of a distributed command governor (DCG) strategy for the operational control of drinking water networks (DWN). This approach is very suitable to this kind of management problems given the large-scale and complex nature of DWNs, the relevant effect of persistent disturbances (water demands) over the network evolutions and their marginal stability feature. The performance improvement offered by DCG is compared with the consideration of two non-centralized mod...

  12. Insensitive Munitions Testing

    Data.gov (United States)

    Federal Laboratory Consortium — Insensitive Munitions Testing at RTC is conducted (IAW MILSTD-2105) at Test Area 4. Our engineers and technicians obtain data for hazards classification and safety...

  13. Traffic Command Gesture Recognition for Virtual Urban Scenes Based on a Spatiotemporal Convolution Neural Network

    Directory of Open Access Journals (Sweden)

    Chunyong Ma

    2018-01-01

    Full Text Available Intelligent recognition of traffic police command gestures increases authenticity and interactivity in virtual urban scenes. To actualize real-time traffic gesture recognition, a novel spatiotemporal convolution neural network (ST-CNN model is presented. We utilized Kinect 2.0 to construct a traffic police command gesture skeleton (TPCGS dataset collected from 10 volunteers. Subsequently, convolution operations on the locational change of each skeletal point were performed to extract temporal features, analyze the relative positions of skeletal points, and extract spatial features. After temporal and spatial features based on the three-dimensional positional information of traffic police skeleton points were extracted, the ST-CNN model classified positional information into eight types of Chinese traffic police gestures. The test accuracy of the ST-CNN model was 96.67%. In addition, a virtual urban traffic scene in which real-time command tests were carried out was set up, and a real-time test accuracy rate of 93.0% was achieved. The proposed ST-CNN model ensured a high level of accuracy and robustness. The ST-CNN model recognized traffic command gestures, and such recognition was found to control vehicles in virtual traffic environments, which enriches the interactive mode of the virtual city scene. Traffic command gesture recognition contributes to smart city construction.

  14. Optimization of Munitions Storage.

    Science.gov (United States)

    1979-12-01

    zones of land around each facility place a significant economic cost on the storage of munitions (Schreyer, 1970: 1). Munitions storage is a subject...ADDTOT, BTOTAL 353 REAL MPH,MW ,MPD, MPU ,4,MPNEW,MCD 354 IF (SW2.NE.0) GO TO 1 355 SW2 - 1 356 WRITE (6,2) 357 GO TO 3 358 1 IF (REC.EQ.0) GO TO 4 359 IF

  15. Web-Based Interface for Command and Control of Network Sensors

    Science.gov (United States)

    Wallick, Michael N.; Doubleday, Joshua R.; Shams, Khawaja S.

    2010-01-01

    This software allows for the visualization and control of a network of sensors through a Web browser interface. It is currently being deployed for a network of sensors monitoring Mt. Saint Helen s volcano; however, this innovation is generic enough that it can be deployed for any type of sensor Web. From this interface, the user is able to fully control and monitor the sensor Web. This includes, but is not limited to, sending "test" commands to individual sensors in the network, monitoring for real-world events, and reacting to those events

  16. Discrete event command and control for networked teams with multiple missions

    Science.gov (United States)

    Lewis, Frank L.; Hudas, Greg R.; Pang, Chee Khiang; Middleton, Matthew B.; McMurrough, Christopher

    2009-05-01

    During mission execution in military applications, the TRADOC Pamphlet 525-66 Battle Command and Battle Space Awareness capabilities prescribe expectations that networked teams will perform in a reliable manner under changing mission requirements, varying resource availability and reliability, and resource faults. In this paper, a Command and Control (C2) structure is presented that allows for computer-aided execution of the networked team decision-making process, control of force resources, shared resource dispatching, and adaptability to change based on battlefield conditions. A mathematically justified networked computing environment is provided called the Discrete Event Control (DEC) Framework. DEC has the ability to provide the logical connectivity among all team participants including mission planners, field commanders, war-fighters, and robotic platforms. The proposed data management tools are developed and demonstrated on a simulation study and an implementation on a distributed wireless sensor network. The results show that the tasks of multiple missions are correctly sequenced in real-time, and that shared resources are suitably assigned to competing tasks under dynamically changing conditions without conflicts and bottlenecks.

  17. Command Filtered Adaptive Fuzzy Neural Network Backstepping Control for Marine Power System

    Directory of Open Access Journals (Sweden)

    Xin Zhang

    2014-01-01

    Full Text Available In order to retrain chaotic oscillation of marine power system which is excited by periodic electromagnetism perturbation, a novel command-filtered adaptive fuzzy neural network backstepping control method is designed. First, the mathematical model of marine power system is established based on the two parallel nonlinear model. Then, main results of command-filtered adaptive fuzzy neural network backstepping control law are given. And the Lyapunov stability theory is applied to prove that the system can remain closed-loop asymptotically stable with this controller. Finally, simulation results indicate that the designed controller can suppress chaotic oscillation with fast convergence speed that makes the system return to the equilibrium point quickly; meanwhile, the parameter which induces chaotic oscillation can also be discriminated.

  18. Tele command and network automation: strategy and results; Telecomando e automacao de redes: estrategia e resultados

    Energy Technology Data Exchange (ETDEWEB)

    Bargigia, Angelo; Cerreti, Alberto; Lembo, Giorgio di; Rogai, Sergio; Veglio, Gianfranco [Enel Distribuzione Spa, Rome (Italy)

    2004-02-01

    This article presents the adopted by the ENEL Distribuzione, Italy, for the tele command and automation in the distribution line. The article describes the medium term implementation program, based on the installation of remote terminal unities, with communication through cell phone GMS for transmission of collected data to the control centers of the network. A cost versus benefit analysis conducted and the obtained results are also evaluated.

  19. Munitions Classification Library

    Science.gov (United States)

    2016-04-04

    members of the community to make their own additions to any, or all, of the classification libraries . The next phase entailed data collection over less......Include area code) 04/04/2016 Final Report August 2014 - August 2015 MUNITIONS CLASSIFICATION LIBRARY Mr. Craig Murray, Parsons Dr. Thomas H. Bell, Leidos

  20. Missile/Munition Integration Facility

    Data.gov (United States)

    Federal Laboratory Consortium — A large complex contained within approximately 600 acres with security fencing, controlled access gates, and a munitions convoy access road. The complex is capable...

  1. Improved head direction command classification using an optimised Bayesian neural network.

    Science.gov (United States)

    Nguyen, Son T; Nguyen, Hung T; Taylor, Philip B; Middleton, James

    2006-01-01

    Assistive technologies have recently emerged to improve the quality of life of severely disabled people by enhancing their independence in daily activities. Since many of those individuals have limited or non-existing control from the neck downward, alternative hands-free input modalities have become very important for these people to access assistive devices. In hands-free control, head movement has been proved to be a very effective user interface as it can provide a comfortable, reliable and natural way to access the device. Recently, neural networks have been shown to be useful not only for real-time pattern recognition but also for creating user-adaptive models. Since multi-layer perceptron neural networks trained using standard back-propagation may cause poor generalisation, the Bayesian technique has been proposed to improve the generalisation and robustness of these networks. This paper describes the use of Bayesian neural networks in developing a hands-free wheelchair control system. The experimental results show that with the optimised architecture, classification Bayesian neural networks can detect head commands of wheelchair users accurately irrespective to their levels of injuries.

  2. A Wide Area Risk Assessment Framework for Underwater Military Munitions Response

    Science.gov (United States)

    Holland, K. T.; Calantoni, J.

    2017-12-01

    Our objective was to develop a prototype statistical framework supporting Wide Area Assessment and Remedial Investigation decisions relating to the risk of unexploded ordnance and other military munitions concentrated in underwater environments. Decision making involving underwater munitions is inherently complex due to the high degree of uncertainty in the environmental conditions that force munitions responses (burial, decay, migration, etc.) and associated risks to the public. The prototype framework provides a consistent approach to accurately delineating contaminated areas at underwater munitions sites through the estimation of most probable concentrations. We adapted existing deterministic models and environmental data services for use within statistical modules that allowed the estimation of munition concentration given historic site information and environmental attributes. Ultimately this risk surface can be used to evaluate costs associated with various remediation approaches (e.g. removal, monitoring, etc.). Unfortunately, evaluation of the assessment framework was limited due to the lack of enduser data services from munition site managers. Of the 450 U.S. sites identified as having potential contamination with underwater munitions, assessment of available munitions information (including historic firing or disposal records, and recent ground-truth munitions samples) indicated very limited information in the databases. Example data types include the most probable munition types, approximate firing / disposal dates and locations, and any supportive munition survey or sampling results. However the overall technical goal to integrate trained statistical belief networks with detailed geophysical knowledge of sites, of sensors and of the underwater environment was demonstrated and should allow probabilistic estimates of the most likely outcomes and tradeoffs while managing uncertainty associated with military munitions response.

  3. Mission Command in the Age of Network-Enabled Operations: Social Network Analysis of Information Sharing and Situation Awareness.

    Science.gov (United States)

    Buchler, Norbou; Fitzhugh, Sean M; Marusich, Laura R; Ungvarsky, Diane M; Lebiere, Christian; Gonzalez, Cleotilde

    2016-01-01

    A common assumption in organizations is that information sharing improves situation awareness and ultimately organizational effectiveness. The sheer volume and rapid pace of information and communications received and readily accessible through computer networks, however, can overwhelm individuals, resulting in data overload from a combination of diverse data sources, multiple data formats, and large data volumes. The current conceptual framework of network enabled operations (NEO) posits that robust networking and information sharing act as a positive feedback loop resulting in greater situation awareness and mission effectiveness in military operations (Alberts and Garstka, 2004). We test this assumption in a large-scale, 2-week military training exercise. We conducted a social network analysis of email communications among the multi-echelon Mission Command staff (one Division and two sub-ordinate Brigades) and assessed the situational awareness of every individual. Results from our exponential random graph models challenge the aforementioned assumption, as increased email output was associated with lower individual situation awareness. It emerged that higher situation awareness was associated with a lower probability of out-ties, so that broadly sending many messages decreased the likelihood of attaining situation awareness. This challenges the hypothesis that increased information sharing improves situation awareness, at least for those doing the bulk of the sharing. In addition, we observed two trends that reflect a compartmentalizing of networked information sharing as email links were more commonly formed among members of the command staff with both similar functions and levels of situation awareness, than between two individuals with dissimilar functions and levels of situation awareness; both those findings can be interpreted to reflect effects of homophily. Our results have major implications that challenge the current conceptual framework of NEO. In

  4. An Appraisal of Asia-Pacific Cities as Control and Command Centres Embedded in World City Network

    Directory of Open Access Journals (Sweden)

    Z. Li

    2017-08-01

    Full Text Available Since the globalization trend is proliferating at a staggering rate, world cities have emerged as the most dominant vanguard incorporated into global economy. Control and command function is one of the robust integral parts of world city formation, which is closely associated with the corporate headquarter status of some dominant multinational companies. Previous research works on this topic tend to concentrate on the Western Europe and North American arenas neglecting the Asia-Pacific region. Hence, the objective of this paper is to explore control and command functions of Asia-Pacific cities with reference to headquarters’ locations of multinational companies. The methodology will utilize the Forbes global 2000 dataset from the seminal study of GaWC research group, and apply the control and command center model and the interlocking city network model to discover the control and command index, as well as network connectivity of Asia-Pacific cities. Based upon the empirical study of this research, we could identify the hierarchical structure and spatial structure of Asia-Pacific world cities to emerge as some control and command centers embedded in world city network.

  5. On the comparison of predictive control and command governor approaches for operational control of drinking water networks: A case study

    OpenAIRE

    Tedesco, Francesco; Ocampo-Martinez, Carlos; Cassavola, Alessandro; Puig, Vicenç

    2014-01-01

    This paper evaluates the application of command governor (CG) strategy for the operational control of drinking water networks (DWN) given their large-scale and complex nature, the permanent and relevant effect of the disturbances (water demands) and their marginal stability feature. Moreover, the performance improvement offered by CG is compared with the application of model predictive control for the same management purposes and in the same context. The paper also discusses the effectiveness...

  6. Network, system, and status software enhancements for the autonomously managed electrical power system breadboard. Volume 3: Commands specification

    Science.gov (United States)

    Mckee, James W.

    1990-01-01

    This volume (3 of 4) contains the specification for the command language for the AMPS system. The volume contains a requirements specification for the operating system and commands and a design specification for the operating system and command. The operating system and commands sits on top of the protocol. The commands are an extension of the present set of AMPS commands in that the commands are more compact, allow multiple sub-commands to be bundled into one command, and have provisions for identifying the sender and the intended receiver. The commands make no change to the actual software that implement the commands.

  7. The Positive Aspects of Network Centric Command. The Ties Between Behavioral Doctrine and Technology

    National Research Council Canada - National Science Library

    Baldree, Steven

    1999-01-01

    .... Centralizing execution at the operational level due to "informational" superiority will be a step back in terms of war-fighting effectiveness and will be detrimental to commanders participating...

  8. Network Centric Warfare and Its Effect on Unit of Employmentx (UEx) Use of Mission Command

    National Research Council Canada - National Science Library

    Hannon, Jeffery A

    2005-01-01

    The 2002 NSS call for "transformING to meet the challenges and opportunities of the twenty-first century", and the Army's leadership elected to concentrate the service's transformation efforts on battle command...

  9. OPTIMAL CONFIGURATION OF A COMMAND AND CONTROL NETWORK: BALANCING PERFORMANCE AND RECONFIGURATION CONSTRAINTS

    Energy Technology Data Exchange (ETDEWEB)

    L. DOWELL

    1999-08-01

    The optimization of the configuration of communications and control networks is important for assuring the reliability and performance of the networks. This paper presents techniques for determining the optimal configuration for such a network in the presence of communication and connectivity constraints. reconfiguration to restore connectivity to a data-fusion network following the failure of a network component.

  10. Beyond command and control: USSOUTHCOM's use of social networking to 'connect and collaborate' during Haiti relief operations

    Science.gov (United States)

    Arias, Ricardo

    2011-06-01

    On 12 January 2010, a magnitude 7.0 earthquake devastated Haiti killing over 230,000 unsuspecting victims, injuring tens of thousands more and displacing over 1.1 million people. The physical damage was so severe that over 50 percent of buildings in and near the affected areas were completely destroyed or damaged. After struggling for decades with adversity, and besieged by a myriad of social, economic and political challenges, Haiti, its government, and its people were by most accounts already in a state of crisis. The earthquake's devastation and its aftermath shocked the world and prompted a global response. Over 800 institutions and organizations representing the whole of society - governments and their militaries, international organizations, nongovernmental organizations, public institutions, academia, corporations, and private citizens - mobilized to provide aid and relief. However, coordinating and managing their activities seemed a daunting, if not impossible, task. How could a global response achieve "unity of effort" when "unity of command" was not feasible? To provide a solution, US Southern Command (USSOUTHCOM) looked beyond traditional Command and Control systems for collaboration with non-traditional partners and implemented the All Partners Access Network (APAN) in order to "Connect and Collaborate."

  11. OPTIMAL CONFIGURATION OF A COMMAND AND CONTROL NETWORK: BALANCING PERFORMANCE AND RECONFIGURATION CONSTRAINTS

    Energy Technology Data Exchange (ETDEWEB)

    L. DOWELL

    1999-07-01

    The optimization of the configuration of communications and control networks is important for assuring the reliability and performance of the networks. This paper presents techniques for determining the optimal configuration for such a network in the presence of communication and connectivity constraints.

  12. The Unspoken Consequence of Command, Control Communications Technology: Enhanced Micromanagement by Risk-Averse Commanders

    National Research Council Canada - National Science Library

    Carozza, John

    2004-01-01

    .... However, along with its benefits, this command, control and communications (C3) network includes the dangerous consequence of eroding the autonomy of tactical command through enhanced micromanagement by risk-averse operational commanders...

  13. Preventing Network Centric Overload (End State Education for the Operational Commander/Staff)

    National Research Council Canada - National Science Library

    Beck, John

    2001-01-01

    .... An end state education system must be devised that prepares our senior leaders to operate a newly formed network centric task force with equipment, organizations and theory of use that most likely...

  14. Commanders and Cyber Chat: Should More Guidance be Provided for Social Networking Sites

    Science.gov (United States)

    2011-04-01

    networks. On one hand, the perception is there should be rules of etiquette for friending someone related to social norms of endorsing that person...agreed.. Reasons given in free text by lieutenants were as follows: - “Plenty of briefings were given on basic protocol regarding what goes on

  15. Neural networks applied to inverters control; Les reseaux de neurones appliques a la commande des convertisseurs

    Energy Technology Data Exchange (ETDEWEB)

    Jammes, B; Marpinard, J C

    1996-12-31

    Neural networks are scarcely applied to power electronics. This attempt includes two different topics: optimal control and computerized simulation. The learning has been performed through output error feedback. For implementation, a buck converter has been used as a voltage pulse generator. (D.L.) 7 refs.

  16. Command World

    National Research Council Canada - National Science Library

    Wong, Leah Y; Lange, Douglas S; Sebastyn, Jerome T; Roof, William H

    2006-01-01

    .... The Command World scenario was expressly designed as a crisis action planning exercise in order to replicate the communications, collaboration, and information requirements inherent in a military...

  17. Design and Implementation of a MAC Protocol for Timely and Reliable Delivery of Command and Data in Dynamic Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Phan Van Vinh

    2013-09-01

    Full Text Available This paper proposes and implements a new TDMA-based MAC protocol for providing timely and reliable delivery of data and command for monitoring and control networks. In this kind of network, sensor nodes are required to sense data from the monitoring environment periodically and then send the data to a sink. The sink determines whether the environment is safe or not by analyzing the acquired data. Sometimes, a command or control message is sent from the sink to a particular node or a group of nodes to execute the services or request further interested data. The proposed MAC protocol enables bidirectional communication, controls active and sleep modes of a sensor node to conserve energy, and addresses the problem of load unbalancing between the nodes near a sink and the other nodes. It can improve reliability of communication significantly while extending network lifetime. These claims are supported by the experimental results.

  18. Mission Command in the Age of Network-Enabled Operations: Social Network Analysis of Information Sharing and Situation Awareness

    Science.gov (United States)

    2016-06-22

    socio-technical limitations that restrict the free flow of information and communications (e.g., Bateman , 1996). The flow of information among the...networks. Phys. A Stat. Mech. Appl. 272, 173–187. doi: 10.1016/S0378- 4371(99)00291-5 Bateman , R. L. (1996). Force XXI and the death of

  19. The Environmental Challenge of Military Munitions and Federal Facilities

    Science.gov (United States)

    EPA and the Department of Defense (DoD) must address the contamination legacy left by military munitions and explosives of concern (MEC) and other hazardous munitions materials from military live-fire training or testing.

  20. 19 CFR 145.53 - Firearms and munitions of war.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Firearms and munitions of war. 145.53 Section 145.53 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF... munitions of war. Importations of firearms, munitions of war, and related articles are subject to the import...

  1. Defense Industrial Base (DIB): Munitions Realignment for 2020

    Science.gov (United States)

    2013-03-01

    munitions DIB by companies like Coca Cola , Quaker Oats, and Eastman Kodak. As industrial mobilization quickly increased, the requirements decreased...industry and the munitions DIB. This report documented the volatility associated with the production of munitions and financial risks to which

  2. Enablers of Self-Synchronization for Network-Centric Operations: Design of a Complex Command and Control Experiment

    National Research Council Canada - National Science Library

    Hutchins, Susan G; Kleinman, David L; Hocevar, Susan P; Kemple, William G; Porter, Gary R

    2001-01-01

    ... that is shorter than an adversary"s. Self synchronization is viewed as an essential process within military organizations that can increase speed of command and thus accelerate execution of the mission...

  3. Communications and Information: Strategic Automated Command Control System-Data Transmission Subsystem (SACCS-DTS) Network Security Program. Volume 2

    National Research Council Canada - National Science Library

    1997-01-01

    ...) Systems, and 33-2, Information Protection. This instruction prescribes the requirements, responsibilities and procedures for the security program for the Strategic Automated Command Control System-Data Transmission Subsystem (SACCS-DTS...

  4. Military Munitions Waste Working Group report

    International Nuclear Information System (INIS)

    1993-01-01

    This report presents the findings of the Military Munitions Waste Working Group in its effort to achieve the goals directed under the Federal Advisory Committee to Develop On-Site Innovative Technologies (DOIT Committee) for environmental restoration and waste management. The Military Munitions Waste Working Group identified the following seven areas of concern associated with the ordnance (energetics) waste stream: unexploded ordnance; stockpiled; disposed -- at known locations, i.e., disposal pits; discharged -- impact areas, unknown disposal sites; contaminated media; chemical sureties/weapons; biological weapons; munitions production; depleted uranium; and rocket motor and fuel disposal (open burn/open detonation). Because of time constraints, the Military Munitions Waste Working Group has focused on unexploded ordnance and contaminated media with the understanding that remaining waste streams will be considered as time permits. Contents of this report are as follows: executive summary; introduction; Military Munitions Waste Working Group charter; description of priority waste stream problems; shortcomings of existing approaches, processes and technologies; innovative approaches, processes and technologies, work force planning, training, and education issues relative to technology development and cleanup; criteria used to identify and screen potential demonstration projects; list of potential candidate demonstration projects for the DOIT committee decision/recommendation and appendices

  5. Military Munitions Waste Working Group report

    Energy Technology Data Exchange (ETDEWEB)

    1993-11-30

    This report presents the findings of the Military Munitions Waste Working Group in its effort to achieve the goals directed under the Federal Advisory Committee to Develop On-Site Innovative Technologies (DOIT Committee) for environmental restoration and waste management. The Military Munitions Waste Working Group identified the following seven areas of concern associated with the ordnance (energetics) waste stream: unexploded ordnance; stockpiled; disposed -- at known locations, i.e., disposal pits; discharged -- impact areas, unknown disposal sites; contaminated media; chemical sureties/weapons; biological weapons; munitions production; depleted uranium; and rocket motor and fuel disposal (open burn/open detonation). Because of time constraints, the Military Munitions Waste Working Group has focused on unexploded ordnance and contaminated media with the understanding that remaining waste streams will be considered as time permits. Contents of this report are as follows: executive summary; introduction; Military Munitions Waste Working Group charter; description of priority waste stream problems; shortcomings of existing approaches, processes and technologies; innovative approaches, processes and technologies, work force planning, training, and education issues relative to technology development and cleanup; criteria used to identify and screen potential demonstration projects; list of potential candidate demonstration projects for the DOIT committee decision/recommendation and appendices.

  6. Hawaii Munitions Monitoring Station and Natural Laboratory

    Science.gov (United States)

    Edwards, M.; Trimble, A. Z.; Rognstad, M. R.

    2017-12-01

    Hundreds of thousands of tons of conventional munitions were fired into the ocean at military ranges or deliberately disposed at sea during the twentieth century. Potential contaminants from munitions and explosives of concern (MEC) affect virtually every coast in the United States, including Alaska, the Hawaiian Islands, Guam, American Samoa and other U.S. territories as well as inland waterways. It is necessary to develop methods to assess the concentrations of munitions constituents present at a site to address concerns about the presence of environmentally relevant concentrations and their potential impacts. Having a well-characterized site to test instruments and methods is important for continued development and refinement of technology. Most sites are too big to characterize comprehensively in three dimensions over time periods lasting days or longer. We are working to develop a monitoring station and natural laboratory near Oahu, Hawaii to create a cost-effective demonstration and validation natural laboratory where emerging technologies can be evaluated and compared. Ordnance Reef (OR) is an ideal location to establish a munitions monitoring station for historical, logistical and environmental reasons. OR is an area of shallow fringing reef measuring approximately 4.2 km by 2.2 km along the Waianae coast of Oahu that was used as a disposal area for military munitions following World War II. OR has been the subject of multiple investigations including an inventory of munitions conducted by the U.S. Army Corps of Engineers in 2002 and a screening-level risk investigation conducted by the National Oceanic and Atmospheric Administration and the University of Hawaii in 2006. As a result, there are multiple datasets collected over the past fifteen years that can be leveraged to serve as a baseline for the natural laboratory. These extant datasets are being supplemented with data from integrated unmanned systems deployed at OR to characterize and visualize the

  7. Remote Machining and Evaluation of Explosively Filled Munitions

    Data.gov (United States)

    Federal Laboratory Consortium — This facility is used for remote machining of explosively loaded ammunition. Munition sizes from small arms through 8-inch artillery can be accommodated. Sectioning,...

  8. High-power VCSELs for smart munitions

    Science.gov (United States)

    Geske, Jon; MacDougal, Michael; Cole, Garrett; Snyder, Donald

    2006-08-01

    The next generation of low-cost smart munitions will be capable of autonomously detecting and identifying targets aided partly by the ability to image targets with compact and robust scanning rangefinder and LADAR capabilities. These imaging systems will utilize arrays of high performance, low-cost semiconductor diode lasers capable of achieving high peak powers in pulses ranging from 5 to 25 nanoseconds in duration. Aerius Photonics is developing high-power Vertical-Cavity Surface-Emitting Lasers (VCSELs) to meet the needs of these smart munitions applications. The authors will report the results of Aerius' development program in which peak pulsed powers exceeding 60 Watts were demonstrated from single VCSEL emitters. These compact packaged emitters achieved pulse energies in excess of 1.5 micro-joules with multi kilo-hertz pulse repetition frequencies. The progress of the ongoing effort toward extending this performance to arrays of VCSEL emitters and toward further improving laser slope efficiency will be reported.

  9. Chemical Munitions Dumped at Sea near the Hawaiian Islands

    Science.gov (United States)

    Edwards, M.; Bissonnette, M. C.; Briggs, C. W.; Shjegstad, S. M.

    2016-12-01

    Sea disposal was once internationally accepted as an appropriate method for disposal of excess, obsolete, and unserviceable conventional and chemical munitions. The past decade has seen an increase in the number and complexity of studies to assess the effects of historical munitions disposal in the oceans. The Hawai`i Undersea Military Munitions Assessment (HUMMA) is a comprehensive deep-water (300-600 meter) investigation designed to determine the potential impact of sea-disposed munitions on the ocean environment, and vice versa, at a disposal site south of Pearl Harbor, Oahu, Hawaii. Historical records indicated that as many as 16,000 mustard-filled bombs were disposed in this area following World War II. A secondary objective of HUMMA is to determine best practices and technologies for mapping and sampling sea-disposed munitions. The overarching result from five HUMMA field programs conducted over a decade is that the greatest risk from munitions derives from direct contact; there is little evidence that leakage from munitions into the surrounding environment has a direct pathway to affect human health and the impact on the surrounding environment in Hawaii is detectable only at trace levels. This finding should be modulated based on the quantity of physical samples, which were collected around detected at control sites. Both findings support a hypothesis that the impacts of sea-disposed munitions change over time. This presentation will describe the technical approach and results of the 2014 HUMMA field program using Jason 2.

  10. Human-Systems Integration (HSI) and the Network Integration Evaluations (NIEs), Part 3: Mitigating Cognitive Load in Network-Enabled Mission Command

    Science.gov (United States)

    2016-06-01

    require higher levels of mental ability as well as higher levels of education , training, and experience for effective use . In short, ICT insertions such...the people using the gizmos” (Wallace 2005, p. 20). Personnel, training, and organization are important aspects of overall mission command system...organizational learning is important with respect to how well a test unit will use new equipment suites during an exercise such as the NIEs (Alberts

  11. Commanders' Survey: School for Command Preparation Feedback

    National Research Council Canada - National Science Library

    Frame, Adela

    1997-01-01

    .... All command designees attend the PreCommand Course (PCC). PCC provides common understanding of current doctrine, and up-to-date information on Army-wide policy, programs and special items of interest...

  12. Design of a hybrid command and control mobile botnet

    CSIR Research Space (South Africa)

    Pieterse, H

    2013-05-01

    Full Text Available and control mobile botnet. The hybrid design explores the efficiency of multiple command and control channels against the following objectives: no single point of failure within the topology, low cost for command dissemination, limited network activities...

  13. Building a Capabilities Network to Improve Disaster Preparation Efforts in the European Command (EUCOM) Area of Responsibility

    Science.gov (United States)

    2012-12-01

    She planned and executed a wedding, worked full time and withstood many lonely days and nights as I traversed my way through a master’s degree. For...We believe God has equipped the church - the most diverse social network on the planet - to be at the center of these stories, leveraging time

  14. Underwater Munitions Expert System: Preliminary Design Report

    Science.gov (United States)

    2015-08-21

    analysis  would  usually  be  performed,   where  separation  by   sieving  results  in  the  PMF  of  sand  grain...locations  they  might  potentially   aggregate .    Furthermore,  given  knowledge  of  the  types  of   munitions...feature  that   Netica  provides  is  the  ability  to  do  sensitivity   analysis ,

  15. Design of a hybrid command and control mobile botnet: Presentation

    CSIR Research Space (South Africa)

    Pieterse, H

    2013-03-01

    Full Text Available smartphones controlled by a botmaster through a command and control network to serve a malicious purpose. This study presents the design of a hybrid command and control mobile botnet. It describes the propagation vectors, command and control channels...

  16. Optimal Control of Sensor Threshold for Autonomous Wide Area Search Munitions

    National Research Council Canada - National Science Library

    Kish, Brian A; Jacques, David R; Pachter, Meir

    2005-01-01

    The optimal employment of autonomous wide area search munitions is addressed. The scenario considered involves an airborne munition searching a battle space for stationary targets in the presence of false targets...

  17. NDIA 2018 IM and EM Technology Symposium: Innovative Insensitive Munition Solutions for Enhanced Warfighter Effectiveness

    Science.gov (United States)

    2018-04-26

    2018 IM & EM TECHNOLOGY SYMPOSIUM INNOVATIVE INSENSITIVE MUNITION SOLUTIONS FOR ENHANCED WARFIGHTER EFFECTIVENESS April 23 – 26, 2018 Doubletree by...IM & EM TECHNOLOGY SYMPOSIUM On behalf of the Insensitive Munitions and Energetic Materials Committee and our MSIAC partner, I would like to...welcome you to the 2018 Insensitive Munitions and Energetic Materials Technology Symposium. This international gathering of the top chemists, system

  18. US command improvements and command vulnerability

    International Nuclear Information System (INIS)

    Ball, D.; Bethe, H.A.; Blair, B.G.; Bracken, P.; Carter, A.B.; Dickinson, H.; Garwin, R.L.; Holloway, D.; Kendall, H.W.

    1988-01-01

    In essence, the United States still relies on the strategic command system erected during the 1960s and 1970s, but as we have seen, this system suffers from a number of serious weaknesses. Among these the authors emphasized the vulnerability of vital communications even before any warheads impact directly on U.S. targets, as well as the systems; heavy reliance on a relatively small number of limited-endurance aircraft as command posts and radio relays. This paper focuses on the committed improvement program, assess its impact on command vulnerability, and offer suggestions for further command improvements designed to enhance crisis stability and to facilitate ware termination should deterrence fail. The reader should note that this chapter is rather more technical than the remainder of this book

  19. Sea-dumped CW munitions - the European component

    International Nuclear Information System (INIS)

    Hart, J.; Stock, T.

    2009-01-01

    The purpose of this contribution is to outline the European magnitude of sea-dumped CW munitions. Hereby the paper attempts to provide an overview on historical dumping activities, both for conventional and chemical munitions. The potential dangers which might result from these dumping activities are discussed in brief. Among others the differences in deep sea dumping and dumping in shallow waters are evaluated. Further, the presentation will outline and discuss the different technology steps: (a) identification, (b) recovery, (c) transportation and (d) destruction (on- or off-shore), necessary for possible cleaning of dumping sites. Thereafter an evaluation of the different technologies available/applied is performed, in particular on the destruction part. Hereby the already practised experience is displayed. Based upon existing treaty regimes an actual judgment of possible application of treaty provisions for demanding cleaning up operations is discussed. The question if treaty obligations can be used to force cleaning operations is debated. A possible match of the technology package available with the scope/magnitude of the munitions dumping problem is discussed. Hereby the gaps between the size of the problem and the most suitable technologies for recovery and destruction are illustrated. The resulting answers should be regarded as possible technical guidelines for future development activities as well existing limitations to solve the problems. The papers will result in some general guidelines for future prospect on the issues of dumped munitions, in particular chemical munitions under the European context.(author)

  20. Distributed computing environment for Mine Warfare Command

    OpenAIRE

    Pritchard, Lane L.

    1993-01-01

    Approved for public release; distribution is unlimited. The Mine Warfare Command in Charleston, South Carolina has been converting its information systems architecture from a centralized mainframe based system to a decentralized network of personal computers over the past several years. This thesis analyzes the progress Of the evolution as of May of 1992. The building blocks of a distributed architecture are discussed in relation to the choices the Mine Warfare Command has made to date. Ar...

  1. Observations of Munitions Mobility During a Nor'easter at Wallops Island

    Science.gov (United States)

    Swann, C.; Frank, D. P.; Braithwaite, E. F., III; Hagg, R. K.; Calantoni, J.

    2017-12-01

    Unexploded ordnance (or munitions) may migrate, bury, or become exposed over time, and may pose a hazard to both humans and environment. Understanding the behavior of munitions under various wave and current conditions is central to management and remediation of contaminated underwater sites. We embedded Inertial Measurement Units (IMUs) into inert replicas of large caliber munitions (81 mm - 155 mm), herein referred to as `smart munitions'. Several smart munitions were deployed in the field with IMUs logging at 16 Hz continuously. Simultaneously the local hydrodynamic conditions were monitored to correlate any resulting munitions mobility. Here, we present the response of the smart munitions to wave and current conditions observed during a nor'easter off the coast of Wallops Island, Virginia USA in about 10 m water depth. During the nor'easter, peak significant wave heights of 2.8 m were observed in 10 m water depth. Over a roughly 10-hour period, an 81 mm smart munition migrated approximately 206 ft in a net onshore direction. Displacement and heading of the migrated smart munition were estimated by divers during the recovery. Integration of the trajectory of motion for the smart munition using a custom signal processing algorithm was in good agreement with the diver measurements. Discussion will focus on the relationship of the local sediment type and the potential for munitions mobility.

  2. Cluster munitions: public health and international humanitarian law perspectives.

    Science.gov (United States)

    Freckelton, Ian

    2008-02-01

    As a result of civilian deaths in Vietnam, Cambodia, Laos, Chechnya, Kosovo, Afghanistan, Iraq and Lebanon, cluster munitions have been recognised to pose a grave threat to civilian populations because of their limited precision and problematically high rate of initial failure to explode. Efforts are intensifying to ban cluster munitions and to mandate those who have discharged them to defuse them effectively so as to reduce the risks to civilians. This editorial reviews these efforts and identifies a need for them to be actively supported by both the legal and medical communities.

  3. Using waterjet in reverse logistic operations in discarded munitions processing

    Czech Academy of Sciences Publication Activity Database

    Hloch, S.; Tozan, H.; Yagimli, M.; Valíček, Jan; Rokosz, K.

    2011-01-01

    Roč. 18, č. 2 (2011), s. 267-271 ISSN 1330-3651 Institutional research plan: CEZ:AV0Z30860518 Keywords : abrasive waterjet * anti tank bullet * automatic line Subject RIV: JQ - Machines ; Tools Impact factor: 0.347, year: 2011 http://hrcak.srce.hr/search/?q=Using+waterjet+in+reverse+logistic+operations+in+discarded+munitions+processing

  4. REMOTE SENSING IN DETECTING BURIED MUNITIONS FROM WORLD WAR I

    Science.gov (United States)

    During World War I, The American University in Washington D.C. was used by the U.S. Army as an experiment station for the development and testing of a variety of battlefield munitions including chemical weapons such as Mustard Gas, Phosgene, Ricin and Lewisite, among othe...

  5. Underwater Munitions Expert System to Predict Mobility and Burial

    Science.gov (United States)

    2017-11-14

    for predicting the location and possible burial of underwater munitions is required to advise site managers as they plan...that region above the given UXO relative density, which is defined as the UXO density divided by the sand grain density, ( nominally 2650 g...0.0 + 2.5*dsed ; % nominal bed roughness if no burial % (Potentially in future version, ripple height

  6. Computational Modeling of Hydrodynamics and Scour around Underwater Munitions

    Science.gov (United States)

    Liu, X.; Xu, Y.

    2017-12-01

    Munitions deposited in water bodies are a big threat to human health, safety, and environment. It is thus imperative to predict the motion and the resting status of the underwater munitions. A multitude of physical processes are involved, which include turbulent flows, sediment transport, granular material mechanics, 6 degree-of-freedom motion of the munition, and potential liquefaction. A clear understanding of this unique physical setting is currently lacking. Consequently, it is extremely hard to make reliable predictions. In this work, we present the computational modeling of two importance processes, i.e., hydrodynamics and scour, around munition objects. Other physical processes are also considered in our comprehensive model. However, they are not shown in this talk. To properly model the dynamics of the deforming bed and the motion of the object, an immersed boundary method is implemented in the open source CFD package OpenFOAM. Fixed bed and scour cases are simulated and compared with laboratory experiments. The future work of this project will implement the coupling between all the physical processes.

  7. Service life determination of munition during expeditionary missions

    NARCIS (Netherlands)

    Klerk, W.P.C. de; Heijden, A.E.D.M. van der

    2012-01-01

    For a more in-depth understanding of the aging processes of munitions in expeditionary operations, research is performed with respect to the influence of transport, storage and use on the safety of ammunition. Within this programme the influences of parameters like temperature, humidity, vibrations,

  8. A Framework for Architecture-Based Planning and Assessment to Support Modeling and Simulation of Network-Centric Command and Control

    Science.gov (United States)

    2006-02-17

    included system-unique specifications derived to counter these threats. But the international security environment has changed --- and it will continue... Netowrk -Centric Command and Control 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK...contains color images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 20 19a. NAME

  9. Depleted uranium munitions - where are we now?

    International Nuclear Information System (INIS)

    Spratt, Brian G.

    2002-01-01

    There are very different views on the health hazards of DU munitions. Most of the concerns of veterans and their advisors focus on the radiological effects of DU and consequently these are the focus of this editorial. Effects on the kidney and environmental consequences are, however, considered in the second of the Royal Society reports and the main conclusions of both of the reports are outlined in the summary document published in this issue of the journal. The main radiological concerns focus on the irradiation of lung tissues from inhaled DU particles and irradiation resulting from the translocation of inhaled particles to the thoracic lymph nodes.The overwhelming scientific view, presented in the two Royal Society reports and in other independent reviews, is that the main risks of exposure to DU aerosols are an increase in lung cancer and (from chemical toxicity) damage to the kidney, although these are likely to be evident only following substantial intakes. The equivalent doses to the thoracic lymph nodes following inhalation of DU particles are about ten times greater than those to the lung, but the former tissue is considered to be relatively insensitive to radiation-induced cancers. So far, large-scale epidemiological studies of UK and US Gulf War veterans have shown no increase in mortality from cancer, or kidney disease, but these studies need to be continued to see if any significant excess mortality from these causes appears. As mentioned previously, more sensitive epidemiological studies should be possible if groups of soldiers who have known exposures to DU can be identified. Adverse reproductive effects have been observed in rodents exposed to uranium although most of these effects are evident after relatively large daily intakes of uranium. The possibility of effects on reproductive health (from DU or other toxic exposures) is being studied in both UK and US Gulf War veterans. Results from the UK epidemiological study are not yet available but

  10. Robot Task Commander with Extensible Programming Environment

    Science.gov (United States)

    Hart, Stephen W (Inventor); Yamokoski, John D. (Inventor); Wightman, Brian J (Inventor); Dinh, Duy Paul (Inventor); Gooding, Dustin R (Inventor)

    2014-01-01

    A system for developing distributed robot application-level software includes a robot having an associated control module which controls motion of the robot in response to a commanded task, and a robot task commander (RTC) in networked communication with the control module over a network transport layer (NTL). The RTC includes a script engine(s) and a GUI, with a processor and a centralized library of library blocks constructed from an interpretive computer programming code and having input and output connections. The GUI provides access to a Visual Programming Language (VPL) environment and a text editor. In executing a method, the VPL is opened, a task for the robot is built from the code library blocks, and data is assigned to input and output connections identifying input and output data for each block. A task sequence(s) is sent to the control module(s) over the NTL to command execution of the task.

  11. Validation of Passive Sampling Devices for Monitoring of Munitions Constituents in Underwater Environments

    Science.gov (United States)

    2017-09-01

    TNT TOC TSS Low Order Detonation Munitions constituents Munitions Debris Method Detection Limit Munitions and explosives of concern Mean low...Total organic carbon ( TOC ) and grain size distribution from stations A1, T10, T11, and T12 at BSS...16 syringes/stn) TNT, ADNTs, DNTs, RDX 4 locations in BSS based on positive POCIS results Sediment 5 TOC , grain size 4, co-located with sediment

  12. Munitions in the Underwater Environment: State of the Science and Knowledge Gaps

    Science.gov (United States)

    2010-06-01

    the Munitions Items Disposition Action System ( MIDAS ). Munitions constituents (MCs) can be identified through the known munitions type. The MIDAS and...physical damage to the casing, adjacent or touching metals, and water or substrate qualities such as temperature, pH, or Redox potential. The...environments, little is known on modeling the fate of MCs in the underwater environment. One of the anticipated problems in predicting the fate and

  13. Safety and vulnerability simulation of munitions; Modelisation du comportement de munitions en securite et vulnerabilite

    Energy Technology Data Exchange (ETDEWEB)

    Desailly, D.; Briquet, B.; Brunet, P.; Guegant, Y.; Houdusse, D.; Prost, M. [Groupe SNPE Propulsion/ Centre de Recherches du Boucher, 91 - Vert le Petit (France)

    2002-09-01

    Vulnerability of new weapon systems to accidental and hostile environments is a major concern for military operations and many research programs have been so investigated of SNPE Propulsion. Before they were accepted as being safe and suitable for introduction into military inventories systems underwent a wide range of expensive type qualification trials. There was a need therefore, to develop a greater understanding of the reaction mechanisms that affect the behaviour of confined energetic materials when subjected to external stimuli and computer models to control the resulting hazard. As part of this program SNPE Propulsion has developed a method for modelling Cook-off response in order to master the design of insensitive munitions (IM). The behavior of energetic materials when they are submitted to a thermal threat is complex and follows two different time scales: thermochemical processes, counted in minutes even hours whereas pyrotechnic reaction may require a few microseconds. It was shown that the reaction level is ruled by the competition between pressure generated from the cook-off reaction and stress release resulting from break-up confinement. After self-ignition phenomenon and under some confinement and thermal conditions burning can accelerate to deflagration and lead to a deflagration to detonation transition (DDT) event. The method requires'modular tools describing each physical phenomenon. Works have been first focused on the development of experimental facilities to characterise thermal chemical properties and reactivity of thermally damaged energetic material. Consequently the first part of the model describing self-heating and pyrolysis processes has been implemented in an implicit solver. Simulations have shown quite accurate predictions (ignition temperature, time to event) and proved the effectiveness of this approach. Recent developments are.thus concentrated on the numerical modelling of the reaction violence level prediction hence a

  14. Army Aviation and the Mission Command Warfighting Function

    Science.gov (United States)

    2017-06-09

    information systems , processes and procedures, optimize facilities and equipment, and build understanding of the networks that link the headquarters...however further publication or sale of copyrighted images is not permissible. ii REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188...Command System , Mission Command Information Systems , Training, Mission Training Complex 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT

  15. Network technology for depot modernization

    Energy Technology Data Exchange (ETDEWEB)

    Hostick, C.J.

    1990-12-01

    This report was prepared by the Pacific Northwest Laboratory to summarize existing and emerging information system technology and standards applicable to Depot System Command (DESCOM) modernization efforts. The intent of this summarization is to provide the Revitalization of Army Depots for the Year 2000 (READY 2000) team a clear understanding of the enabling information system technologies required to support effective modernization activities. Much of the information contained in this report was acquired during the last year in support of the US Army Armament, Munitions, and Chemical Command (AMCCOM) Facility Integrated Manufacturing Management System (FIMMS) project at PNL, which is targeting the modernization of plant-wide information systems at Army Ammunition Plants. The objective of information system modernization is to improve the effectiveness of an organization in performing its mission. Information system modernization strives to meet this objective by creating an environment where data is electronically captured near the source and readily available to all areas of the organization. Advanced networks, together with related information system technology, are the enabling mechanisms that make modern information system infrastructures possible. The intent of this paper is to present an overview of advanced information system network technology to support depot modernization planners in making technology management decisions. Existing and emerging Open System Interconnection (OSI) and Government Open System Interconnection Profile (GOSIP) standards are explained, as well as a brief assessment of existing products compliant with these standards. Finally, recommendations for achieving plant-wide integration using existing products are presented, and migration strategies for full OSI compliance are introduced. 5 refs., 16 figs. (JF)

  16. AFRICOM: Combatant Command for the 21st Century

    National Research Council Canada - National Science Library

    Juergens, Jr., Richard A

    2008-01-01

    ...: European Command, Southern Command, Northern Command, Central Command, and Pacific Command, as the Department of Defense's unified command structure responsible for specific geographical regions of the world...

  17. Hybrid analysis of multiaxis electromagnetic data for discrimination of munitions and explosives of concern

    Science.gov (United States)

    Friedel, M. J.; Asch, T. H.; Oden, C.

    2012-08-01

    The remediation of land containing munitions and explosives of concern, otherwise known as unexploded ordnance, is an ongoing problem facing the U.S. Department of Defense and similar agencies worldwide that have used or are transferring training ranges or munitions disposal areas to civilian control. The expense associated with cleanup of land previously used for military training and war provides impetus for research towards enhanced discrimination of buried unexploded ordnance. Towards reducing that expense, a multiaxis electromagnetic induction data collection and software system, called ALLTEM, was designed and tested with support from the U.S. Department of Defense Environmental Security Technology Certification Program. ALLTEM is an on-time time-domain system that uses a continuous triangle-wave excitation to measure the target-step response rather than traditional impulse response. The system cycles through three orthogonal transmitting loops and records a total of 19 different transmitting and receiving loop combinations with a nominal spatial data sampling interval of 20 cm. Recorded data are pre-processed and then used in a hybrid discrimination scheme involving both data-driven and numerical classification techniques. The data-driven classification scheme is accomplished in three steps. First, field observations are used to train a type of unsupervised artificial neural network, a self-organizing map (SOM). Second, the SOM is used to simultaneously estimate target parameters (depth, azimuth, inclination, item type and weight) by iterative minimization of the topographic error vectors. Third, the target classification is accomplished by evaluating histograms of the estimated parameters. The numerical classification scheme is also accomplished in three steps. First, the Biot-Savart law is used to model the primary magnetic fields from the transmitter coils and the secondary magnetic fields generated by currents induced in the target materials in the

  18. Hybrid analysis of multiaxis electromagnetic data for discrimination of munitions and explosives of concern

    Science.gov (United States)

    Friedel, M.J.; Asch, T.H.; Oden, C.

    2012-01-01

    The remediation of land containing munitions and explosives of concern, otherwise known as unexploded ordnance, is an ongoing problem facing the U.S. Department of Defense and similar agencies worldwide that have used or are transferring training ranges or munitions disposal areas to civilian control. The expense associated with cleanup of land previously used for military training and war provides impetus for research towards enhanced discrimination of buried unexploded ordnance. Towards reducing that expense, a multiaxis electromagnetic induction data collection and software system, called ALLTEM, was designed and tested with support from the U.S. Department of Defense Environmental Security Technology Certification Program. ALLTEM is an on-time time-domain system that uses a continuous triangle-wave excitation to measure the target-step response rather than traditional impulse response. The system cycles through three orthogonal transmitting loops and records a total of 19 different transmitting and receiving loop combinations with a nominal spatial data sampling interval of 20 cm. Recorded data are pre-processed and then used in a hybrid discrimination scheme involving both data-driven and numerical classification techniques. The data-driven classification scheme is accomplished in three steps. First, field observations are used to train a type of unsupervised artificial neural network, a self-organizing map (SOM). Second, the SOM is used to simultaneously estimate target parameters (depth, azimuth, inclination, item type and weight) by iterative minimization of the topographic error vectors. Third, the target classification is accomplished by evaluating histograms of the estimated parameters. The numerical classification scheme is also accomplished in three steps. First, the Biot–Savart law is used to model the primary magnetic fields from the transmitter coils and the secondary magnetic fields generated by currents induced in the target materials in the

  19. Strategic Munitions Planning in Non-Conventional Asymmetric Operations

    Science.gov (United States)

    2010-04-01

    Conventional Asymmetric Operations RTO-MP-SAS-081 16 - 3 with a clearly structured, sized and located military force. The principles of Lanchester ...stockpiles and calculated munitions requirements. REFERENCES [1] Prague Summit Declaration, November 2002. [2] J. Fletcher, The Lanchester Legacy... Lanchester battles, Journal of the Operational Research Society, Vol. 50 No. 3, March 1999. [13] W. Freeman, A Study of Ammunition Consumption, Master of

  20. The Political Economy of the Munitions Supply Program

    Science.gov (United States)

    2014-05-01

    advantage in production, and further identified which munitions products can be procured offshore with only limited effects on operational liabilities...comparative advantage and access to global supply chains. A few options exist: fixed-price contracts may be indexed to exogenously-given input prices and... franchisees bid their true costs.47 Third, once supply is forthcoming, the franchisee has an incentive to minimize costs unless the franchiser is known

  1. Trauma-related infections due to cluster munitions.

    Science.gov (United States)

    Fares, Youssef; El-Zaatari, Mohamad; Fares, Jawad; Bedrosian, Nora; Yared, Nadine

    2013-12-01

    Trauma-related infections remain a concerning and potentially avoidable complication of conflict-related injuries. During the Israeli conflict in South Lebanon, more than four million sub-munitions were dropped over South Lebanese soil. In this study, we will explore the different types of infection caused by sub-munitions and penetrating agents. This prospective study took place from 2006 to 2012 at the Lebanese University within the Faculty of Medical Sciences' departments. This study sample consisted of 350 injured casualties. Patients suffered from blast injuries with fragmentations targeting the head, face, torso, abdomen, pelvis and extremities. Of the 350 causalities studied, 326 (93.1%) were males, and 24 (6.9%) were females. Ages varied between 10 and 70 years, with the average age being 27 years. Of the 350 patients studied, 68 (19.4%) developed infections. Infections varied between pseudomonas, Escherichia coli, Candida and fungus and sometimes led to necrosis. Vaccinations, antibiotic therapies and proper wound irrigation must be performed at appropriate emergency units. Excision and complete debridement of necrotic and contaminated tissue should also be performed. The Convention on Cluster Munitions of 2008 should be adhered to, as these weapons indiscriminately and disproportionately harm civilians, thereby violating the well-established international principles governing conflict. Copyright © 2013 King Saud Bin Abdulaziz University for Health Sciences. Published by Elsevier Ltd. All rights reserved.

  2. Communication for command and control systems

    CERN Document Server

    Morris, D J

    1983-01-01

    Communication for Command and Control Systems provides a thorough exposition of the basic theoretical and practical features involved in the design of communication networks for command and control systems. This book focuses primarily on the practical side of computer-controlled communication. This text concentrates on the communication sides of the subject by surveying the means of transferring data between the various processing points and by appraising their potential advantages and possible defects in implementation. In this respect, this book should prove useful for the practicing enginee

  3. The Role of Friendship within Social Networks of Divisions at Recruit Training Command and its Effect on the Resilience of Naval Recruits

    Science.gov (United States)

    2017-06-01

    Review, 2(3), 538–555. doi: 10.2307/259141 Luthar, S. S., Cicchetti, D., & Becker , B. (2000). The construct of resilience: a critical evaluation and...Friendship Network at T2 . Integrated Division–Received No Intervention...54  Figure 11.  Division 1 Venting Network at T2 . Integrated Division–Received No Intervention

  4. 40 CFR 266.203 - Standards applicable to the transportation of solid waste military munitions.

    Science.gov (United States)

    2010-07-01

    ... transportation of solid waste military munitions. 266.203 Section 266.203 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID WASTES (CONTINUED) STANDARDS FOR THE MANAGEMENT OF SPECIFIC HAZARDOUS... applicable to the transportation of solid waste military munitions. (a) Criteria for hazardous waste...

  5. 40 CFR 266.205 - Standards applicable to the storage of solid waste military munitions.

    Science.gov (United States)

    2010-07-01

    ... solid waste military munitions. 266.205 Section 266.205 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID WASTES (CONTINUED) STANDARDS FOR THE MANAGEMENT OF SPECIFIC HAZARDOUS... applicable to the storage of solid waste military munitions. (a) Criteria for hazardous waste regulation of...

  6. 28 CFR 0.89 - Authority to seize arms and munitions of war.

    Science.gov (United States)

    2010-07-01

    ... war. 0.89 Section 0.89 Judicial Administration DEPARTMENT OF JUSTICE ORGANIZATION OF THE DEPARTMENT OF JUSTICE Federal Bureau of Investigation § 0.89 Authority to seize arms and munitions of war. The Director... arms and munitions of war, and other articles, pursuant to section 1 of title VI of the act of June 15...

  7. Validation of Passive Sampling Devices for Monitoring of Munitions Constituents in Underwater Environments

    Science.gov (United States)

    2017-06-30

    Research and Development Program [SERDP] project #ER-2542) into the canister would provide enhancement of the quantitative estimation of the TWA...Department of Defense EOD Explosive Ordnance Disposal EPA United States Environmental Protection Agency EQL Environmental Quantitation Limit EST...Laboratory Quantitation Limit MC Munitions Constituents mL Milliliter MR Munitions Response NESDI Navy’s Environmental Security Development to

  8. Command History for 1990

    Science.gov (United States)

    1991-05-01

    Marine Corps Tiaining Systems (CBESS) memorization training Inteligence Center, Dam Neck Threat memorization training Commander Tactical Wings, Atlantic...News Shipbuilding Technical training AEGIS Training Center, Dare Artificial Intelligence (Al) Tools Computerized firm-end analysis tools NETSCPAC...Technology Department and provides computational and electronic mail support for research in areas of artificial intelligence, computer-assisted instruction

  9. Command Home Page

    Science.gov (United States)

    Inclusion And Diversity Navy Standard Integrated Personnel System (NSIPS) My Navy Portal Board of One Source USA.gov U.S. Office of Special Counsel Social Media Directory and Policy US Navy App Locker Navy Personnel Command (NPC) Navy SAPR Navy EEO Inclusion And Diversity Navy Standard Integrated

  10. SOA approach to battle command: simulation interoperability

    Science.gov (United States)

    Mayott, Gregory; Self, Mid; Miller, Gordon J.; McDonnell, Joseph S.

    2010-04-01

    NVESD is developing a Sensor Data and Management Services (SDMS) Service Oriented Architecture (SOA) that provides an innovative approach to achieve seamless application functionality across simulation and battle command systems. In 2010, CERDEC will conduct a SDMS Battle Command demonstration that will highlight the SDMS SOA capability to couple simulation applications to existing Battle Command systems. The demonstration will leverage RDECOM MATREX simulation tools and TRADOC Maneuver Support Battle Laboratory Virtual Base Defense Operations Center facilities. The battle command systems are those specific to the operation of a base defense operations center in support of force protection missions. The SDMS SOA consists of four components that will be discussed. An Asset Management Service (AMS) will automatically discover the existence, state, and interface definition required to interact with a named asset (sensor or a sensor platform, a process such as level-1 fusion, or an interface to a sensor or other network endpoint). A Streaming Video Service (SVS) will automatically discover the existence, state, and interfaces required to interact with a named video stream, and abstract the consumers of the video stream from the originating device. A Task Manager Service (TMS) will be used to automatically discover the existence of a named mission task, and will interpret, translate and transmit a mission command for the blue force unit(s) described in a mission order. JC3IEDM data objects, and software development kit (SDK), will be utilized as the basic data object definition for implemented web services.

  11. 32 CFR 724.406 - Commander, Naval Medical Command.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Commander, Naval Medical Command. 724.406 Section 724.406 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY PERSONNEL NAVAL DISCHARGE REVIEW BOARD Principal Elements of the Navy Department Discharge Review System § 724.406 Commander...

  12. Combatant Commanders Informational Series, USEUCOM

    National Research Council Canada - National Science Library

    Burton, Steven

    1996-01-01

    ...) and the diverse challenges it faces require it to maintain one of the highest operational and personnel tempos of the combatant command, are limited in the opportunity of personnel new to the command...

  13. Network-Centric Applications and Tactical Networks

    National Research Council Canada - National Science Library

    Krout, Timothy; Durbano, Steven; Shearer, Ruth

    2003-01-01

    .... Command and control applications will always require communications capabilities. There are numerous examples of command and control applications that have been developed without adequate attention to the realities of tactical networks...

  14. Command and motivation

    DEFF Research Database (Denmark)

    Jacobsen, Christian Bøtcher; Hvidtved, Johan; Andersen, Lotte Bøgh

    2014-01-01

    Motivated employees are crucial to organizations, but external interventions such as command systems and financial incentives may decrease motivation. If these external interventions are perceived to be controlling, they are expected to crowd out intrinsic motivation, and this may also apply...... to other types of autonomous motivation such as public service motivation. The perception of external interventions is thus expected to be vital. This article investigates how the perception of a specific command system (obligatory student plans) is associated with intrinsic motivation and public service...... motivation. Using a dataset with 3,230 school teachers in Denmark, a structural equation model shows that the perception of obligatory student plans as controlling is negatively associated with all of the investigated types of employee motivation, supporting that motivation crowding can occur....

  15. Joint Mission Command Implementation

    Science.gov (United States)

    2016-01-22

    choose. The paper finds that trust is strongly influenced by the subconscious brain and treating it like a tool ignores biology and results in... bias for action and empowerment.14 Since then, the services have evaluated their own concepts of command assessing them against Dempsey’s vision. Lt...understanding, intent, and trust, only trust is strongly influenced by the subconscious brain. Treating trust like it can be taught, or a behavior that

  16. Spread, Behavior, and Ecosystem Consequences of Conventional Munitions Compounds in Coastal Marine Waters

    Directory of Open Access Journals (Sweden)

    Aaron J. Beck

    2018-04-01

    Full Text Available Coastal marine environments are contaminated globally with a vast quantity of unexploded ordnance and munitions from intentional disposal. These munitions contain organic explosive compounds as well as a variety of metals, and represent point sources of chemical pollution to marine waters. Most underwater munitions originate from World Wars at the beginning of the twentieth century, and metal munitions housings have been impacted by extensive corrosion over the course of the following decades. As a result, the risk of munitions-related contaminant release to the water column is increasing. The behavior of munitions compounds is well-characterized in terrestrial systems and groundwater, but is only poorly understood in marine systems. Organic explosive compounds, primarily nitroaromatics and nitramines, can be degraded or transformed by a variety of biotic and abiotic mechanisms. These reaction products exhibit a range in biogeochemical characteristics such as sorption by particles and sediments, and variable environmental behavior as a result. The reaction products often exhibit increased toxicity to biological receptors and geochemical controls like sorption can limit this exposure. Environmental samples typically show low concentrations of munitions compounds in water and sediments (on the order of ng/L and μg/kg, respectively, and ecological risk appears generally low. Nonetheless, recent work demonstrates the possibility of sub-lethal genetic and metabolic effects. This review evaluates the state of knowledge on the occurrence, fate, and effect of munition-related chemical contaminants in the marine environment. There remain a number of knowledge gaps that limit our understanding of munitions-related contaminant spread and effect, and the need for additional work is made all the more urgent by increasing risk of release to the environment.

  17. Force Protection and Command Relationships: Who's Responsible

    National Research Council Canada - National Science Library

    Moller, James

    1998-01-01

    .... This monograph analyzes the joint force protection program by investigating the terms: command, chain of command, command relationship, and how these terms authorize and empower a commander to implement this program across the joint force...

  18. Depleted uranium instead of lead in munitions: the lesser evil.

    Science.gov (United States)

    Jargin, Sergei V

    2014-03-01

    Uranium has many similarities to lead in its exposure mechanisms, metabolism and target organs. However, lead is more toxic, which is reflected in the threshold limit values. The main potential hazard associated with depleted uranium is inhalation of the aerosols created when a projectile hits an armoured target. A person can be exposed to lead in similar ways. Accidental dangerous exposures can result from contact with both substances. Encountering uranium fragments is of minor significance because of the low penetration depth of alpha particles emitted by uranium: they are unable to penetrate even the superficial keratin layer of human skin. An additional cancer risk attributable to the uranium exposure might be significant only in case of prolonged contact of the contaminant with susceptible tissues. Lead intoxication can be observed in the wounded, in workers manufacturing munitions etc; moreover, lead has been documented to have a negative impact on the intellectual function of children at very low blood concentrations. It is concluded on the basis of the literature overview that replacement of lead by depleted uranium in munitions would be environmentally beneficial or largely insignificant because both lead and uranium are present in the environment.

  19. Depleted uranium instead of lead in munitions: the lesser evil

    International Nuclear Information System (INIS)

    Jargin, Sergei V

    2014-01-01

    Uranium has many similarities to lead in its exposure mechanisms, metabolism and target organs. However, lead is more toxic, which is reflected in the threshold limit values. The main potential hazard associated with depleted uranium is inhalation of the aerosols created when a projectile hits an armoured target. A person can be exposed to lead in similar ways. Accidental dangerous exposures can result from contact with both substances. Encountering uranium fragments is of minor significance because of the low penetration depth of alpha particles emitted by uranium: they are unable to penetrate even the superficial keratin layer of human skin. An additional cancer risk attributable to the uranium exposure might be significant only in case of prolonged contact of the contaminant with susceptible tissues. Lead intoxication can be observed in the wounded, in workers manufacturing munitions etc; moreover, lead has been documented to have a negative impact on the intellectual function of children at very low blood concentrations. It is concluded on the basis of the literature overview that replacement of lead by depleted uranium in munitions would be environmentally beneficial or largely insignificant because both lead and uranium are present in the environment. (opinion)

  20. 20000G shock energy harvesters for gun-fired munition

    International Nuclear Information System (INIS)

    Willemin, J.; Boisseau, S.; Olmos, L.; Gallardo, M.; Despesse, G.; Robert, T.

    2016-01-01

    This paper presents a 20000G shock energy harvester dedicated to gun-fired munitions and based on a mass-spring resonant structure coupled to a coil-magnet electromagnetic converter. The 20000G shock energy is firstly stored in the spring as elastic potential energy, released as mass-spring mechanical oscillations right after the shock and finally converted into electricity thanks to the coil-magnet transducer. The device has been modeled, sized to generate 200mJ in 150ms, manufactured and tested in a gun-fired munition. The prototype sizes 117cm 3 and weighs 370g. 210mJ have been generated in a test bench and 140mJ in real conditions; this corresponds to a mean output power of 0.93W (7.9mW/cm 3 ) and a maximum output power of 4.83W (41.3mW/cm 3 ) right after the shock. (paper)

  1. 20000G shock energy harvesters for gun-fired munition

    Science.gov (United States)

    Willemin, J.; Boisseau, S.; Olmos, L.; Gallardo, M.; Despesse, G.; Robert, T.

    2016-11-01

    This paper presents a 20000G shock energy harvester dedicated to gun-fired munitions and based on a mass-spring resonant structure coupled to a coil-magnet electromagnetic converter. The 20000G shock energy is firstly stored in the spring as elastic potential energy, released as mass-spring mechanical oscillations right after the shock and finally converted into electricity thanks to the coil-magnet transducer. The device has been modeled, sized to generate 200mJ in 150ms, manufactured and tested in a gun-fired munition. The prototype sizes 117cm3 and weighs 370g. 210mJ have been generated in a test bench and 140mJ in real conditions; this corresponds to a mean output power of 0.93W (7.9mW/cm3) and a maximum output power of 4.83W (41.3mW/cm3) right after the shock.

  2. Command History, 1993.

    Science.gov (United States)

    1994-04-01

    his space capsule. The ()CUILAR COtJNTI:,RROI,.L I)FVICI" was built by the Naval Air Rework Facility, NAS Pensacola. tfor NAMRI, in the early 1960s...Dunwoody, GA Kevin G. Singleton, ENS USNR Naval Aviation Schools Command Kyle W M. Taylor, ENS USNR U.S. Naval Academy Jason A. Temple, ENS USNR Auburn...Pensacola, 13-15 Oct 93. Pokorski, T.L., LICDR MSC USN, attended Aircrew Modified IEquipment for Ladies in Aviation (AMELIA) Fri -service Long-range Planning

  3. Recommendations on Future Operational Environments Command Control and Cyber Security

    OpenAIRE

    Goztepe, Kerim

    2015-01-01

    It is a well-known fact that today a nation's telecommunication networks, critical infrastructure, and information systems are vulnerable to growing number of attacks in cyberspace. Cyber space contains very different problems involving various sets of threats, targets and costs. Cyber security is not only problem of banking, communication or transportation. It also threatens core systems of army as command control. Some significant recommendations on command control (C2) and cyber security h...

  4. Optimization of Intelligent Munition Warfare Using Agent-Based Simulation Software and Design of Experiments Methodology

    National Research Council Canada - National Science Library

    Floersheim, Bruce; Hou, Gene

    2006-01-01

    ... mechanism for a number of vehicles caught in the killzone. Thus, it is useful to study and attempt to model through equations and simulation the interaction between enemy agents and these new munitions...

  5. National Security Strategy and the Munitions' Paradox: Self-Sufficiency or Maximum Efficiency

    National Research Council Canada - National Science Library

    McChesney, Michael

    1998-01-01

    ... that the United States military strategy may not be credible to likely regional aggressors. Conversely, DoD acquisition leadership believes industry consolidation should continue and the munitions base should be expanded to include US allies...

  6. U.S. Army Training and Testing Area Carrying Capacity (ATTACC) for Munitions (AFM)

    Science.gov (United States)

    2006-11-01

    Army Training Support Center USDA United States Department of Agriculture USGS United States Geological Survey USLE Universal Soil Loss Equation...Range condition is a function of climate, soil , and hydrology. The munitions impact, constituent load, and range condition are modeled using AFM...For ArcGIS v2 to attain expected concentrations of munitions constituents and corresponding risk due to exposure through soil - and water-related

  7. Bioinspired polarization navigation sensor for autonomous munitions systems

    Science.gov (United States)

    Giakos, G. C.; Quang, T.; Farrahi, T.; Deshpande, A.; Narayan, C.; Shrestha, S.; Li, Y.; Agarwal, M.

    2013-05-01

    Small unmanned aerial vehicles UAVs (SUAVs), micro air vehicles (MAVs), Automated Target Recognition (ATR), and munitions guidance, require extreme operational agility and robustness which can be partially offset by efficient bioinspired imaging sensor designs capable to provide enhanced guidance, navigation and control capabilities (GNC). Bioinspired-based imaging technology can be proved useful either for long-distance surveillance of targets in a cluttered environment, or at close distances limited by space surroundings and obstructions. The purpose of this study is to explore the phenomenology of image formation by different insect eye architectures, which would directly benefit the areas of defense and security, on the following four distinct areas: a) fabrication of the bioinspired sensor b) optical architecture, c) topology, and d) artificial intelligence. The outcome of this study indicates that bioinspired imaging can impact the areas of defense and security significantly by dedicated designs fitting into different combat scenarios and applications.

  8. The health hazards of depleted uranium munitions. Part 1

    International Nuclear Information System (INIS)

    2001-01-01

    Depleted uranium is a toxic and weakly radioactive metal used for a variety of purposes. Perhaps its most controversial use is in battlefield munitions, where it can be widely dispersed in the form of fine particles and shrapnel that may enter the bodies of combatants and others through inhalation, ingestion or wounding. It is a matter of legitimate public concern whether the use of this material in this way could create unacceptable health hazards or damage to the environment. The objective of our study has been to provide the best scientific understanding of the ways in which the material may be distributed, how it may be taken up by humans, and the potential implications for health. For politicians, any hazards to health have to be balanced against the military advantages that the use of these munitions confers. We have not tried to reach a judgment on these political issues, but we believe that a better scientific understanding of the extent of the hazards will make it easier for these wider questions to be addressed in a more objective way. This report is the first of two, and addresses the likely levels of exposure to depleted uranium, the resulting radiological risks, and the lessons to be learned from epidemiological studies. Our second report will address toxicological risks and environmental issues. So far, we conclude that risks from radiation are low for most soldiers on the battlefield, and for civilians who later return to the area. However, there are uncertainties about the maximal levels of exposure to depleted uranium on the battlefield, and there may be circumstances in which a few soldiers are exposed to levels of depleted uranium that result in a significant risk to health. Further studies are needed to determine the levels of exposure to depleted uranium that might occur on the battlefield and to judge whether such higher risks are likely to occur in practice

  9. Chemical Warfare Materiel in Sediment at a Deep-Water Discarded Military Munitions Site

    Science.gov (United States)

    Briggs, C. W.; Bissonnette, M. C.; Edwards, M.; Shjegstad, S. M.

    2016-12-01

    Understanding the release and transformation of chemical agent (CA) at underwater discarded military munitions (DMM) sites is essential to determine the potential risk to human health and impact on the ocean environment; yet few studies have been conducted at sites in excess of 250 m, the depth at which most U.S. CA munitions were disposed. Maritime construction workers installing cables or pipelines at a CA DMM site, as well as fishermen and scientific researchers deploying bottom-contact gear, represent possible exposure pathways to human receptors. The Hawai`i Undersea Military Munitions Assessment (HUMMA) sought to characterize a historic munitions sea-disposal site at depths between 400-650 m. During the 2014 HUMMA Sampling Survey, the Jason 2 remotely operated vehicle was used to collect sediments within two meters of suspected World War II chemical munitions, confirmed to be 100-lb M47 series bombs containing sulfur mustard. When environmental media was brought to the surface, samples were screened for distilled sulfur mustard (HD) and related agent breakdown products (ABP) (collectively referred to as chemical warfare materiel [CWM]). Detectable concentrations of HD and/or its ABP 1,4-dithiane were found in sediments collected at all CA DMM sites; HD was also detected at two control sites. The location and extent of munitions casing deterioration strongly influenced the distribution and level of CWM in sediment. The interior of the casing contained levels of CWM orders of magnitudes higher than that observed in the surrounding sediment at one meter distance, indicating the majority of the CWM is hydrolyzed as it is released from the munitions casing and a fraction of the fill materiel persists in the environment for decades following disposal. Although the potential for future site users to become exposed to CWA in recovered sediments and debris exists, the level of risk is significantly mitigated by the depth and location of the sea-disposal site.

  10. Paramount Interest: Command Relationships in Amphibious Warfare

    National Research Council Canada - National Science Library

    Peabody, Hitch

    2004-01-01

    In 2001, U.S. amphibious forces abandoned sixty years of established command and control doctrine, replacing the traditional senior-subordinate relationship between Navy and Marine commanders with coequal command. Why did it change...

  11. Command in a field hospital.

    Science.gov (United States)

    Bricknell, M C M

    2003-03-01

    This paper examines the challenges involved in commanding a field hospital. There are frequent, dynamic tensions between the military culture that is based on a task-focussed, hierarchical structure and the clinical culture that is based on flat, process-focussed, multidisciplinary teams. The paper outlines the cultural environment of the field hospital and then examines the deployment sequence whereby a functioning clinical facility may be created from a group of disparate individuals. There are a number of tools that may assist with this including the personality of the Commanding Officer, individual skills, the creation of an organizational identity and the choice of command structure.

  12. Command and Control of Joint Air Operations through Mission Command

    Science.gov (United States)

    2016-06-01

    and outlines the C2 architecture systems, processes, and philosophy of com- mand required to enable mission command effectively. Mission Command...General Dempsey highlights the fact that “trust is the moral sinew that binds the distributed Joint Force 2020 together” and observes that “unless...con- fident about how their subordinates will make decisions and adapt to the dynamic battlespace environment. Processes, Systems, and Philosophy of

  13. Tools virtualization for command and control systems

    Science.gov (United States)

    Piszczek, Marek; Maciejewski, Marcin; Pomianek, Mateusz; Szustakowski, Mieczysław

    2017-10-01

    Information management is an inseparable part of the command process. The result is that the person making decisions at the command post interacts with data providing devices in various ways. Tools virtualization process can introduce a number of significant modifications in the design of solutions for management and command. The general idea involves replacing physical devices user interface with their digital representation (so-called Virtual instruments). A more advanced level of the systems "digitalization" is to use the mixed reality environments. In solutions using Augmented reality (AR) customized HMI is displayed to the operator when he approaches to each device. Identification of device is done by image recognition of photo codes. Visualization is achieved by (optical) see-through head mounted display (HMD). Control can be done for example by means of a handheld touch panel. Using the immersive virtual environment, the command center can be digitally reconstructed. Workstation requires only VR system (HMD) and access to information network. Operator can interact with devices in such a way as it would perform in real world (for example with the virtual hands). Because of their procedures (an analysis of central vision, eye tracking) MR systems offers another useful feature of reducing requirements for system data throughput. Due to the fact that at the moment we focus on the single device. Experiments carried out using Moverio BT-200 and SteamVR systems and the results of experimental application testing clearly indicate the ability to create a fully functional information system with the use of mixed reality technology.

  14. Assessing Contract Management Maturity: U.S. Army Joint Munitions and Lethality Contracting Center, Army Contracting Command, Picatinny Arsenal

    Science.gov (United States)

    2009-09-01

    demonstrate competence” ( Jones , 2006). Most organizations conduct performance management for their employees with actions such as, setting goals...take the 14 form of comprehensive questionnaires, SWOT analyses or diagnostic models and include a comparison of results to various best practices...procnet.pica.army.mil/ Jones , R. (2006). CIDA Organizational Assessment Guide. Retrieved on March 1, 2009 from: http://www.acdi-cida.gc.ca/CIDAWEB

  15. 48 CFR 225.770 - Prohibition on acquisition of United States Munitions List items from Communist Chinese military...

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Prohibition on acquisition of United States Munitions List items from Communist Chinese military companies. 225.770 Section 225... of United States Munitions List items from Communist Chinese military companies. This section...

  16. 48 CFR 252.225-7007 - Prohibition on Acquisition of United States Munitions List Items from Communist Chinese Military...

    Science.gov (United States)

    2010-10-01

    ... of United States Munitions List Items from Communist Chinese Military Companies. 252.225-7007 Section... Chinese Military Companies. As prescribed in 225.1103(4), use the following clause: Prohibition On Acquisition of United States Munitions List Items From Communist Chinese Military Companies (SEP 2006) (a...

  17. Global Command and Control Management Structure

    National Research Council Canada - National Science Library

    1995-01-01

    This instruction establishes: responsibilities for the Joint Staff, Services, Defense agencies, combatant and functional unified commands, and other activities regarding management of Global Command and Control (GCC...

  18. Ubuntu Linux Toolbox 1000 + Commands for Ubuntu and Debian Power Users

    CERN Document Server

    Negus, Christopher

    2008-01-01

    In this handy, compact guide, you'll explore a ton of powerful Ubuntu Linux commands while you learn to use Ubuntu Linux as the experts do: from the command line. Try out more than 1,000 commands to find and get software, monitor system health and security, and access network resources. Then, apply the skills you learn from this book to use and administer desktops and servers running Ubuntu, Debian, and KNOPPIX or any other Linux distribution.

  19. Command in the Objective Force

    National Research Council Canada - National Science Library

    Wilbeck, Christopher

    2003-01-01

    This paper seeks to answer what type of command will best serve the Army's Objective Force in gaining the initiative, building momentum, and exploiting success to achieve land dominance in the future...

  20. Combatant Commanders Informational Series: USPACOM

    National Research Council Canada - National Science Library

    Comnick, Michael

    1996-01-01

    ...) introducing potential joint staff officers to their specific command. Inbound staff officers, prepared by reviewing this product, arrive on station ready to receive specialized training without needing background indoctrination...

  1. Strategic Global Climate Command?

    Science.gov (United States)

    Long, J. C. S.

    2016-12-01

    Researchers have been exploring geoengineering because Anthropogenic GHG emissions could drive the globe towards unihabitability for people, wildlife and vegetation. Potential global deployment of these technologies is inherently strategic. For example, solar radiation management to reflect more sunlight might be strategically useful during a period of time where the population completes an effort to cease emissions and carbon removal technologies might then be strategically deployed to move the atmospheric concentrations back to a safer level. Consequently, deployment of these global technologies requires the ability to think and act strategically on the part of the planet's governments. Such capacity most definitely does not exist today but it behooves scientists and engineers to be involved in thinking through how global command might develop because the way they do the research could support the development of a capacity to deploy intervention rationally -- or irrationally. Internationalizing research would get countries used to working together. Organizing the research in a step-wise manner where at each step scientists become skilled at explaining what they have learned, the quality of the information they have, what they don't know and what more they can do to reduce or handle uncertainty, etc. Such a process can increase societal confidence in being able to make wise decisions about deployment. Global capacity will also be enhanced if the sceintific establishment reinvents misssion driven research so that the programs will identify the systemic issues invovled in any proposed technology and systematically address them with research while still encouraging individual creativity. Geoengineering will diverge from climate science in that geoengineering research needs to design interventions for some publically desirable goal and investigates whether a proposed intervention will acheive desired outcomes. The effort must be a systems-engineering design problem

  2. Resolving the Role of the Dynamic Pressure in the Burial, Exposure, Scour, and Mobility of Underwater Munitions

    Science.gov (United States)

    Gilooly, S.; Foster, D. L.

    2017-12-01

    In nearshore environments, the motion of munitions results from a mixture of sediment transport conditions including sheet flow, scour, bedform migration, and momentary liquefaction. Incipient motion can be caused by disruptive shear stresses and pressure gradients. Foster et al. (2006) incorporated both processes into a single parameter, indicating incipient motion as a function of the bed state. This research looks to evaluate the role of the pressure gradient in positional state changes such as burial, exposure, and mobility. In the case of munitions, this may include pressure gradients induced by vortex shedding or the passing wave. Pressure-mapped model munitions are being developed to measure the orientation, rotation, and surface pressure of the munitions during threshold events leading to a new positional state. These munitions will be deployed in inner surf zone and estuary environments along with acoustic Doppler velocimeters (ADVs), pore water pressure sensors, a laser grid, and a pencil beam sonar with an azimuth drive. The additional instruments allow for near bed and far field water column and sediment bed sampling. Currently preliminary assessments of various pressure sensors and munition designs are underway. Two pressure sensors were selected; the thin FlexiForce A201 sensors will be used to indicate munition rolling during threshold events and diaphragm sensors will be used to understand changes in surrounding pore water pressure as the munition begins to bury/unbury. Both sensors are expected to give quantitative measurements of dynamic pressure gradients in the flow field surrounding the munition. Resolving the role of this process will give insight to an improved incipient motion parameter and allow for better munition motion predictions.

  3. Optimal path planning for video-guided smart munitions via multitarget tracking

    Science.gov (United States)

    Borkowski, Jeffrey M.; Vasquez, Juan R.

    2006-05-01

    An advent in the development of smart munitions entails autonomously modifying target selection during flight in order to maximize the value of the target being destroyed. A unique guidance law can be constructed that exploits both attribute and kinematic data obtained from an onboard video sensor. An optimal path planning algorithm has been developed with the goals of obstacle avoidance and maximizing the value of the target impacted by the munition. Target identification and classification provides a basis for target value which is used in conjunction with multi-target tracks to determine an optimal waypoint for the munition. A dynamically feasible trajectory is computed to provide constraints on the waypoint selection. Results demonstrate the ability of the autonomous system to avoid moving obstacles and revise target selection in flight.

  4. Trust: The Key to the Success of Mission Command in the Joint Force

    Science.gov (United States)

    2015-05-18

    Malaysia , Kuala Lumpur: International Conference on ISO9000. Schmidt, Todd A. “Design, Mission Command and the Network: Enabling Organization...trust.pdf. Steele , Dennis. “Setting the Azimuth for Joint Force 2020: Globally Integrated Operations and Mission Command.” Army Magazine, November

  5. Eksplozivne materije za neosetljiva ubojna sredstva / Explosive substances for insensitive munitions

    Directory of Open Access Journals (Sweden)

    Radun Jeremić

    2005-03-01

    Full Text Available U skladu sa sve strožim zahtevima za očuvanje životne sredine i većom bezbednošću, tendencije u razvoju suvremenih ubojnih sredstava (UbS, pored povećanja pouzdanosti i efikasnosti, usmerene su i na povećanje sigurnosti pri njihovoj proizvodnji, skladištenju, manipulaciji i upotrebi. Na taj način dobijena je nova kategorija UbS, tzv. neosetljiva UbS, kod kojih je verovatnoća neželjenog aktiviranja pod dejstvom spoljnih impulsa svedena na minimum. Suština rešavanja ovog problema je primena eksplozivnih materija koje su mnogo manje osetljive na spoljne uticaje u odnosu na standardne. Osnovni zahtev koji se pri tome postavlja je da taktičko-tehničke karakteristike ostanu na nivou ili budu bolje u odnosu na postojeća UbS. U radu je ukratko objašnjen koncept razvoja neosetljivih UbS i dat pregled najznačajnijih rezultata istraživanja u oblasti eksplozivnih materija koje zadovoljavaju zahteve za primenu u neosetljivim UbS. / According to severe environment protection and safety requirements, tendencies in development of modern munitions, besides of increasing reliability and efficiency, are directed to decreasing of danger during their processing, storing, handling and operating. In that manner the new category of munitions has been obtained, named insensitive munitions, with a minimum probability of unplanned activating. The best method for solving this problem is using of explosive substances that are more insensitive according to standard ones. The main requirement is the tactical and technical characteristics stay at the level or to be better according to the existing munitions. In this paper the developing concept of insensitive munitions is shortly explained and presented a review of most important research results of explosive materials that fulfill requirements for applying in insensitive munitions.

  6. Observation of Burial and Migration of Instrumented Surrogate Munitions Deployed in the Swash Zone

    Science.gov (United States)

    Cristaudo, D.; Puleo, J. A.; Bruder, B. L.

    2017-12-01

    Munitions (also known as unexploded ordnance; UXO) in the nearshore environment due to past military activities, may be found on the beach, constituting a risk for beach users. Munitions may be transported from offshore to shallower water and/or migrate along the coast. In addition, munitions may bury in place or be exhumed due to hydrodynamic forcing. Observations on munitions mobility have generally been collected offshore, while observations in the swash zone are scarce. The swash zone is the region of the beach alternately covered by wave runup where hydrodynamic processes may be intense. Studies of munitions mobility require the use of realistic surrogates to quantify mobility/burial and hydrodynamic forcing conditions. Four surrogates (BLU-61 Cluster Bomb, 81 mm Mortar, M151-70 Hydra Rocket and M107 155 mm High Explosive Howitzer) were developed and tested during large-scale laboratory and field studies. Surrogates house sensors that measure different components of motion. Errors between real munitions and surrogate parameters (mass, center of gravity and axial moment of inertia) are all within an absolute error of 20%. Internal munitions sensors consist of inertial motion units (for acceleration and angular velocity in and around the three directions and orientation), pressure transducers (for water depth above surrogate), shock recorders (for high frequency acceleration to detect wave impact on the surrogate), and an in-house designed array of optical sensors (for burial/exposure and rolling). An in situ array of sensors to measure hydrodynamics, bed morphology and sediment concentrations, was deployed in the swash zone, aligned with the surrogate deployment. Data collected during the studies will be shown highlighting surrogate sensor capabilities. Sensors response will be compared with GPS measurements and imagery from cameras overlooking the study sites of surrogate position as a function of time. Examples of burial/exposure and migration of surrogates

  7. The ergonomics of command and control

    OpenAIRE

    Stanton, NA; Baber, C

    2006-01-01

    Since its inception, just after the Second World War, ergonomics research has paid special attention to the issues surrounding human control of systems. Command and Control environments continue to represent a challenging domain for Ergonomics research. We take a broad view of Command and Control research, to include C2 (Command and Control), C3 (Command, Control and Communication), and C4 (Command, Control, Communication and Computers) as well as human supervisory control paradigms. This spe...

  8. Filtering and Trust as Tools for the Operational Commander in the Information Age

    National Research Council Canada - National Science Library

    Davis, Alan D

    2006-01-01

    ... has. An analysis of this environment points to the impact of network centric warfare, information superiority, shared situational awareness, adaptability, and transparency on the commander's decision-making process...

  9. Acoustic Resonance Spectroscopy (ARS) Munition Classification System enhancements. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Vela, O.A.; Huggard, J.C.

    1997-09-18

    Acoustic Resonance Spectroscopy (ARS) is a non-destructive evaluation technology developed at the Los Alamos National Laboratory (LANL). This technology has resulted in three generations of instrumentation, funded by the Defense Special Weapons Agency (DSWA), specifically designed for field identification of chemical weapon (CW) munitions. Each generation of ARS instrumentation was developed with a specific user in mind. The ARS1OO was built for use by the U.N. Inspection Teams going into Iraq immediately after the Persian Gulf War. The ARS200 was built for use in the US-Russia Bilateral Chemical Weapons Treaty (the primary users for this system are the US Onsite Inspection Agency (OSIA) and their Russian counterparts). The ARS300 was built with the requirements of the Organization for the Prohibition of Chemical Weapons (OPCW) in mind. Each successive system is an improved version of the previous system based on learning the weaknesses of each and, coincidentally, on the fact that more time was available to do a requirements analysis and the necessary engineering development. The ARS300 is at a level of development that warrants transferring the technology to a commercial vendor. Since LANL will supply the computer software to the selected vendor, it is possible for LANL to continue to improve the decision algorithms, add features where necessary, and adjust the user interface before the final transfer occurs. This paper describes the current system, ARS system enhancements, and software enhancements. Appendices contain the Operations Manual (software Version 3.01), and two earlier reports on enhancements.

  10. The health hazards of depleted uranium munitions. Part 1

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-05-01

    There has been a substantial amount of public discussion on the health effects of the use of depleted uranium (DU), especially on the battlefield. The RoyaI Society therefore convened an independent expert Working Group to review the present state of scientific knowledge about the health and environmental effects of DU, in order to inform public debate. This is the first of two reports. It deals with the amounts of DU to which soldiers could be exposed on the battlefield, the risks from radiation, and what we know from epidemiological studies. We consider past and potential future exposures, the most likely exposures and the 'worst-case' exposures that cannot be excluded. Our second report, to be published later this year, will address the risks from toxic poisoning and environmental issues including risks to civilian populations. The group has consulted widely. It has focused on what is known scientifically about aspects that are relevant to health and has not considered the merits of using DU in munitions. Nor does this report analyse Gulf War syndrome, which has been the subject of other reports. DU is a toxic and weakly radioactive heavy metal that may have adverse consequences to human health, particularly if it enters the body through inhalation, ingestion or wounding. On the battlefield it is used in kinetic energy weapons designed to penetrate the armour of tanks and other vehicles. On impact substantial amounts of DU may be dispersed as particles that can be inhaled and as shrapnel. Our approach has been to estimate the typical levels of exposure on the battlefield over a wide range of scenarios, and the worst-case exposures that individuals are unlikely to exceed. From these we calculate the potential health risks from radiation. We have also considered epidemiological studies of occupational exposures to uranium in other situations as an independent source of information on the risks of inhaling DU particles, although we recognise that the

  11. The health hazards of depleted uranium munitions. Part 1

    International Nuclear Information System (INIS)

    2001-01-01

    There has been a substantial amount of public discussion on the health effects of the use of depleted uranium (DU), especially on the battlefield. The RoyaI Society therefore convened an independent expert Working Group to review the present state of scientific knowledge about the health and environmental effects of DU, in order to inform public debate. This is the first of two reports. It deals with the amounts of DU to which soldiers could be exposed on the battlefield, the risks from radiation, and what we know from epidemiological studies. We consider past and potential future exposures, the most likely exposures and the 'worst-case' exposures that cannot be excluded. Our second report, to be published later this year, will address the risks from toxic poisoning and environmental issues including risks to civilian populations. The group has consulted widely. It has focused on what is known scientifically about aspects that are relevant to health and has not considered the merits of using DU in munitions. Nor does this report analyse Gulf War syndrome, which has been the subject of other reports. DU is a toxic and weakly radioactive heavy metal that may have adverse consequences to human health, particularly if it enters the body through inhalation, ingestion or wounding. On the battlefield it is used in kinetic energy weapons designed to penetrate the armour of tanks and other vehicles. On impact substantial amounts of DU may be dispersed as particles that can be inhaled and as shrapnel. Our approach has been to estimate the typical levels of exposure on the battlefield over a wide range of scenarios, and the worst-case exposures that individuals are unlikely to exceed. From these we calculate the potential health risks from radiation. We have also considered epidemiological studies of occupational exposures to uranium in other situations as an independent source of information on the risks of inhaling DU particles, although we recognise that the parallels may

  12. Decision Support Tools for Munitions Response Performance Prediction and Risk Assessment

    Science.gov (United States)

    2016-09-01

    Oldenburg. A discrimination algorithm for UXO using time domain electromagnetic induction . Journal of Environmental and Engineering Geophysics, 6:91...the course of a munitions response project. Unexploded ordnance (UXO), electromagnetic (EM), sensors, electromagnetic induction (EMI), data...approach defines a detection channel that is a linear combination of received channels. The weightings of received channels comprising the optimized

  13. A two-stage extraction procedure for insensitive munition (IM) explosive compounds in soils.

    Science.gov (United States)

    Felt, Deborah; Gurtowski, Luke; Nestler, Catherine C; Johnson, Jared; Larson, Steven

    2016-12-01

    The Department of Defense (DoD) is developing a new category of insensitive munitions (IMs) that are more resistant to detonation or promulgation from external stimuli than traditional munition formulations. The new explosive constituent compounds are 2,4-dinitroanisole (DNAN), nitroguanidine (NQ), and nitrotriazolone (NTO). The production and use of IM formulations may result in interaction of IM component compounds with soil. The chemical properties of these IM compounds present unique challenges for extraction from environmental matrices such as soil. A two-stage extraction procedure was developed and tested using several soil types amended with known concentrations of IM compounds. This procedure incorporates both an acidified phase and an organic phase to account for the chemical properties of the IM compounds. The method detection limits (MDLs) for all IM compounds in all soil types were regulatory risk-based Regional Screening Level (RSL) criteria for soil proposed by the U.S. Army Public Health Center. At defined environmentally relevant concentrations, the average recovery of each IM compound in each soil type was consistent and greater than 85%. The two-stage extraction method decreased the influence of soil composition on IM compound recovery. UV analysis of NTO established an isosbestic point based on varied pH at a detection wavelength of 341 nm. The two-stage soil extraction method is equally effective for traditional munition compounds, a potentially important point when examining soils exposed to both traditional and insensitive munitions. Copyright © 2016 Elsevier Ltd. All rights reserved.

  14. Progressing Insensitive Munitions: Benefits and Techniques for Proactively Addressing Environmental Regulations

    Science.gov (United States)

    2012-05-01

    X Worm Tubifex tubifex X X X Black worm Lumbriculus X Asiatic clam Corbicula fluminea X Estuarine/marine water column Mysid shrimp Americamysis...Objective: Characterize traditional and insensitive munitions (IMs) impacts on amphibian larvae to manage a candidate for T&E status that inhabit

  15. Dissolution of NTO, DNAN, and Insensitive Munitions Formulations and Their Fates in Soils

    Science.gov (United States)

    2014-09-01

    plastic bags to save the (a) (b) ERDC/CRREL TR-14-23 10 sample even if the bottle should break from ice formation. During each collection, we...Bacillus sp. Biodegradation 23 (2): 287–295. Prak, D.L., and D. O’Sullivan. 2012. Photochemical Transformation of Munitions Constituents in Marine

  16. Acute toxicity of sea-dumped chemical munitions: Luminating the environmental toxicity of legacy compounds

    DEFF Research Database (Denmark)

    Mohammed Abdullah Christensen, Ilias; Sanderson, Hans; Baatrup, Erik

    2016-01-01

    As a result of the disarmament of Germany after the Second World War, 65,000 tons of chemical munitions were dumped in the Baltic Sea. Approximately 13,000 tons containing chemical warfare agents (CWAs) of which 11,000 tons were dumped in the Bornholm Basin east of Bornholm. This paper addresses...

  17. Disposal of chemical agents and munitions stored at Pine Bluff Arsenal, Pine Bluff, Arkansas

    Energy Technology Data Exchange (ETDEWEB)

    Ensminger, J.T.; Hillsman, E.L.; Johnson, R.D.; Morrisey, J.A.; Staub, W.P.; Boston, C.R.; Hunsaker, D.B.; Leibsch, E.; Rickert, L.W.; Tolbert, V.R.; Zimmerman, G.P.

    1991-09-01

    The Pine Bluff Arsenal (PBA) near Pine Bluff, Arkansas, is one of eight continental United States (CONUS) Army installations where lethal unitary chemical agents and munitions are stored and where destruction of agents and munitions is proposed under the Chemical Stockpile Disposal Program (CSDP). The chemical agent inventory at PBA consists of approximately 12%, by weight, of the total US stockpile. The destruction of the stockpile is necessary to eliminate the risk to the public from continued storage and to dispose of obsolete and leaking munitions. In 1988 the US Army issued a Final Programmatic Environmental Impact Statement (FPEIS) for the CSDP that identified on-site disposal of agents and munitions as the environmentally preferred alternative (i.e., the alternative with the least potential to cause significant adverse impacts). The purpose of this report is to examine the proposed implementation of on-site disposal at PBA in light of more recent and more detailed data than those on which the FPEIS is based. New population data were used to compute fatalities using the same computation methods and values for all other parameters as in the FPEIS. Results indicate that all alternatives are indistinguishable when the potential health impacts to the PBA community are considered. However, risks from on-site disposal are in all cases equal to or less than risks from other alternatives. Furthermore, no unique resources with the potential to prevent or delay implementation of on-site disposal at PBA have been identified.

  18. Acoustic Scattering from Munitions in the Underwater Environment: Measurements and Modeling

    Science.gov (United States)

    Williams, K.; Kargl, S. G.; Espana, A.

    2017-12-01

    Acoustical scattering from elastic targets has been a subject of research for several decades. However, the introduction of those targets into the ocean environment brings new complexities to quantitative prediction of that scattering. The goal of our work has been to retain as much of the target physics as possible while also handling the propagation to and from the target in the multi-path ocean environment. Testing of the resulting predictions has been carried out via ocean experiments in which munitions are deployed on and within the sediment. We will present the overall philosophy used in the modeling and then compare model results to measurements. A 60 cm long 30 cd diameter aluminum cylinder will be used as a canonical example and then a sample of results for a variety of munitions will be shown. Finally, we will discuss the use of both the models and measurements in assessing the ability of sonar to discriminate munitions from other man-made targets. The difficulty of this challenge will be made apparent via results from a recent experiment in which both munitions and man-made "clutter" were deployed on a rippled sand interface.

  19. 10 commandments of smile esthetics

    Science.gov (United States)

    Machado, Andre Wilson

    2014-01-01

    The search for esthetic treatment has persisted in the routine of dental professionals. Following this trend, dental patients have sought treatment with the primary aim of improving smile esthetics. The aim of this article is to present a protocol to assess patient's smile: The 10 Commandments of smile esthetics. PMID:25279532

  20. United States Southern Command * Home

    Science.gov (United States)

    or concerns please email or call us at 305-437-2287. Testing The USAG- Miami Joint Education Testing the Air Force | The Air University | US Air Force Academy Army: Army Continued Education System | Army Marine Corps Institute | US Marine Corps Training and Education Command | US Marine Corps University Navy

  1. Apollo 11 Command Service Module

    Science.gov (United States)

    1969-01-01

    A close-up view of the Apollo 11 command service module ready to be mated with the spacecraft LEM adapter of the third stage. The towering 363-foot Saturn V was a multi-stage, multi-engine launch vehicle standing taller than the Statue of Liberty. Altogether, the Saturn V engines produced as much power as 85 Hoover Dams.

  2. 32 CFR 700.1053 - Commander of a task force.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Commander of a task force. 700.1053 Section 700... Command Detail to Duty § 700.1053 Commander of a task force. (a) A geographic fleet commander, and any other naval commander, may detail in command of a task force, or other task command, any eligible...

  3. Screening Level Ecological Risk Assessments of Some Military Munitions and Obscurant-related Compounds for Selected Threatened and Endangered Species

    National Research Council Canada - National Science Library

    Von Stackleberg, Katherine; Amos, Craig; Butler, C; Smith, Thomas; Famely, J; McArdle, M; Southworth, B; Steevens, Jeffrey

    2006-01-01

    ...) associated with munitions. This study evaluates the potential long-term impacts on selected threatened and endangered species resulting from dispersion and deposition of vapors and particles found in the fog oils...

  4. Ready...Set... Command! Rethinking Training for Squadron Commanders

    Science.gov (United States)

    2016-02-16

    commander faces many difficult challenges. When discussing the Air Force’s troubling trend in suicide rates, Airmen “blame being overworked ...Air Forces total suicides despite making up only 16 percent of the service.3 Three years later the Air Force Times reveals continued challenges in...23 challenges. They must address complex issues facing the Air Force, such as troubling suicide rates, manning shortfalls, decreasing resources

  5. 76 FR 19893 - Unified Command Plan 2011

    Science.gov (United States)

    2011-04-08

    ... Plan 2011 Memorandum for the Secretary of Defense Pursuant to my authority as Commander in Chief, I hereby approve and direct the implementation of the revised Unified Command Plan. Consistent with title...

  6. Issues and Solutions for Command Post Simulations

    National Research Council Canada - National Science Library

    Stytz, Martin R; Banks, Sheila B

    2006-01-01

    .... Unfortunately, the modeling of joint command post teams is still very much in its infancy and this lack of foundational research hinders our ability to assess the performance of command post teams...

  7. Command Decision-Making: Experience Counts

    National Research Council Canada - National Science Library

    Wolgast, Kelly A

    2005-01-01

    Decision-making is the mainstay of military leadership and command. Due to the changed nature of the current military environment, military commanders can no longer rely solely on the traditional Military Decision-making Process (MDMP...

  8. Distribution of chemical warfare agent, energetics, and metals in sediments at a deep-water discarded military munitions site

    Science.gov (United States)

    Briggs, Christian; Shjegstad, Sonia M.; Silva, Jeff A. K.; Edwards, Margo H.

    2016-06-01

    There is a strong need to understand the behavior of chemical warfare agent (CWA) at underwater discarded military munitions (DMM) sites to determine the potential threat to human health or the environment, yet few studies have been conducted at sites in excess of 250 m, the depth at which most U.S. chemical munitions were disposed. As part of the Hawai'i Undersea Military Munitions Assessment (HUMMA), sediments adjacent to chemical and conventional DMM at depths of 400-650 m were sampled using human occupied vehicles (HOVs) in order to quantify the distribution of CWA, energetics, and select metals. Sites in the same general area, with no munitions within 50 m in any direction were sampled as a control. Sulfur mustard (HD) and its degradation product 1,4-dithiane were detected at each CWA DMM site, as well as a single sample with the HD degradation product 1,4-thioxane. An energetic compound was detected in sediment to a limited extent at one CWA DMM site. Metals common in munitions casings (i.e., Fe, Cu, and Pb) showed similar trends at the regional and site-wide scales, likely reflecting changes in marine sediment deposition and composition. This study shows HD and its degradation products can persist in the deep-marine environment for decades following munitions disposal.

  9. On Preparing for Squadron Command

    Science.gov (United States)

    1988-04-01

    Gortler, Majur Gordon D. "Management Development---Could the Air Force Be Doing More?" Resear,;h Study, Air Command and Staff College. 1 07:3. 20...ABSTRACT (Continue on reverse If necessary and identify by block number) -This study addresses the broad issue of preparing Air Force officers for...are obsolete. SECURITY CLASSIFICATION OF THIS PAGE UNCLASSIFIED - - PREFACE This study addresses the broad Issue of preparing Air Force officers to

  10. Command and Control : faster decisions

    CSIR Research Space (South Africa)

    Venter, C

    2012-10-01

    Full Text Available Decisions 4th Biennial Conference Presented by Cobus Venter 10 October 2012 ? CSIR 2012 Slide 2 Command and Control Planning TaskingControl Assessment Si tu at io n DPSS Objective Ends Increase the Defence Capability of South Africa Ways... Supported by SAAB THALES Global CommsDPSS DDSI ERGOTECH Cooperation to make it work Example 1: Future SA Army Strategy and Joint Operations Support Campus Experiment Example 1: Future SA Army Strategy and Joint Operations Support Campus Experiment...

  11. Munition Burial by Local Scour and Sandwaves: large-scale laboratory experiments

    Science.gov (United States)

    Garcia, M. H.

    2017-12-01

    Our effort has been the direct observation and monitoring of the burial process of munitions induced by the combined action of waves, currents and pure oscillatory flows. The experimental conditions have made it possible to observe the burial process due to both local scour around model munitions as well as the passage of sandwaves. One experimental facility is the Large Oscillating Water Sediment Tunnel (LOWST) constructed with DURIP support. LOWST can reproduce field-like conditions near the sea bed. The second facility is a multipurpose wave-current flume which is 4 feet (1.20 m) deep, 6 feet (1.8 m) wide, and 161 feet (49.2 m) long. More than two hundred experiments were carried out in the wave-current flume. The main task completed within this effort has been the characterization of the burial process induced by local scour as well in the presence of dynamic sandwaves with superimposed ripples. It is found that the burial of a finite-length model munition (cylinder) is determined by local scour around the cylinder and by a more global process associated with the formation and evolution of sandwaves having superimposed ripples on them. Depending on the ratio of the amplitude of these features and the body's diameter (D), a model munition can progressively get partially or totally buried as such bedforms migrate. Analysis of the experimental data indicates that existing semi-empirical formulae for prediction of equilibrium-burial-depth, geometry of the scour hole around a cylinder, and time-scales developed for pipelines are not suitable for the case of a cylinder of finite length. Relative burial depth (Bd / D) is found to be mainly a function of two parameters. One is the Keulegan-Carpenter number, KC, and the Shields parameter, θ. Munition burial under either waves or combined flow, is influenced by two different processes. One is related to the local scour around the object, which takes place within the first few hundred minutes of flow action (i.e. short

  12. Munitions having an insensitive detonator system for initiating large failure diameter explosives

    Science.gov (United States)

    Perry, III, William Leroy

    2015-08-04

    A munition according to a preferred embodiment can include a detonator system having a detonator that is selectively coupled to a microwave source that functions to selectively prime, activate, initiate, and/or sensitize an insensitive explosive material for detonation. The preferred detonator can include an explosive cavity having a barrier within which an insensitive explosive material is disposed and a waveguide coupled to the explosive cavity. The preferred system can further include a microwave source coupled to the waveguide such that microwaves enter the explosive cavity and impinge on the insensitive explosive material to sensitize the explosive material for detonation. In use the preferred embodiments permit the deployment and use of munitions that are maintained in an insensitive state until the actual time of use, thereby substantially preventing unauthorized or unintended detonation thereof.

  13. Disposal of chemical agents and munitions stored at Umatilla Depot Activity, Hermiston, Oregon

    Energy Technology Data Exchange (ETDEWEB)

    Zimmerman, G.P.; Hillsman, E.L.; Johnson, R.O.; Miller, R.L.; Patton, T.G.; Schoepfle, G.M.; Tolbert, V.R.; Feldman, D.L.; Hunsaker, D.B. Jr.; Kroodsma, R.L.; Morrissey, J.; Rickert, L.W.; Staub, W.P.; West, D.C.

    1993-02-01

    The Umatilla Depot Activity (UMDA) near Hermiston, Oregon, is one of eight US Army installations in the continental United States where lethal unitary chemical agents and munitions are stored, and where destruction of agents and munitions is proposed under the Chemical Stockpile Disposal Program (CSDP). The chemical agent inventory at UMDA consists of 11.6%, by weight, of the total US stockpile. The destruction of the stockpile is necessary to eliminate the risk to the public from continued storage and to dispose of obsolete and leaking munitions. In 1988 the US Army issued a Final Programmatic Environmental Impact Statement (FPEIS) for the CSDP that identified on-site disposal of agents and munitions as the environmentally preferred alternative (i.e., the alternative with the least potential to cause significant adverse impacts), using a method based on five measures of risk for potential human health and ecosystem/environmental effects; the effectiveness and adequacy of emergency preparedness capabilities also played a key role in the FPEIS selection methodology. In some instances, the FPEIS included generic data and assumptions that were developed to allow a consistent comparison of potential impacts among programmatic alternatives and did not include detailed conditions at each of the eight installations. The purpose of this Phase 1 report is to examine the proposed implementation of on-site disposal at UMDA in light of more recent and more detailed data than those included in the FPEIS. Specifically, this Phase 1 report is intended to either confirm or reject the validity of on-site disposal for the UMDA stockpile. Using the same computation methods as in the FPEIS, new population data were used to compute potential fatalities from hypothetical disposal accidents. Results indicate that onsite disposal is clearly preferable to either continued storage at UMDA or transportation of the UMDA stockpile to another depot for disposal.

  14. Cost Of Compliance On Munitions Consolidation From Lualualei To West Loch

    Science.gov (United States)

    2017-12-01

    well as the opportunity to drastically reduce the transportation of ordnance to and from the Lualualei Annex through local community roads and areas...single road and the availability of CULT trucks and/or drivers that could impede an expeditious response in a contingency operation. This project...to distribute munitions to the fleet. This consolidation plan will also reduce the infrastructure costs for ordnance storage, maintenance , and

  15. Validation of Passive Sampling Devices for Monitoring of Munitions Constituents in Underwater Environments

    Science.gov (United States)

    2017-09-01

    and explosives of concern (MEC) corroding, breaching, and leaking MC into the water column (Darrach, Chutjian, and Plett, 1998; GMI, 2007; Lewis et...underwater UWMM have the potential to corrode, breach, and leak munitions constituents (MCs) such as 2,4,6-trinitrotoluene (TNT) and hexahydro-1,3,5...Wang et al., 2013), a number of challenges prevent accurate assessment of environmental exposure using traditional water , sediment, and tissue

  16. Environmental Assessment: Demolition of Munitions Storage Area Facilities at Ellsworth AFB, South Dakota

    Science.gov (United States)

    2009-11-01

    CEQ Council on Environmental Quality CFR Code of Federal Regulations CO Carbon Monoxide cpm Counts per Minute CRM Cultural Resource Manager...newspaper advertisement in the Rapid City Journal announcing the availability of the Draft EA for a 30-day public and agency review to facilitate...Ellsworth Air Force Base Munitions Storage Area Environmental Assessment Page 2-5 public involvement in the project. This advertisement was published one

  17. Network Centric Warfare Case Study: U.S. V Corps and 3rd Infantry Division (Mechanized) During Operation Iraqi Freedom Combat Operations (Mar-Apr 2003). Volume 2: Command, Control, Communications and Computer Architectures

    National Research Council Canada - National Science Library

    Cogan, Kevin J; De Lucio, Ray

    2003-01-01

    ...), which hypothesizes that a robustly networked force improves information sharing, collaboration, quality of information, and shared situational awareness resulting in significantly increased mission effectiveness...

  18. Commanders of the Great Victory

    Directory of Open Access Journals (Sweden)

    Anatoly Dmitriyevich Borshchov

    2015-01-01

    Full Text Available The honorary title of «commander» as well as the «admiral» is granted to a military or naval figure on the basis of public recognition of his personal contribution to the success of actions. Generals are usually individuals with creative thinking, the ability to foresee the development of military events. Generals usually have such personality traits as a strong will and determination, rich combat experience, credibility and high organizational skills. In an article dedicated to the 70th anniversary of the Soviet victory in the Great War examines the experience of formation and practice of the most talent-ed Soviet military leaders.

  19. Health and environmental problems of using antiarmour munitions containing depleted uranium core

    International Nuclear Information System (INIS)

    Matousek, J.

    2006-01-01

    In the 1970s, core of depleted uranium commenced to be introduced into the breakthrough antitank munitions of various calibers and types in order to considerably enhance their effectiveness due to extremely high density in comparison with steel. The health and environmental threats of using this munitions and other weaponry where depleted uranium has been utilised as counterbalance stem from the pyrophoric character of uranium, burnt due to material deformation and friction when penetrating armour targets creating thus highly respirable aerosol of uranium oxides that are deposited in alveoli after being inhaled or in other tissues after being ingested. Composition and main properties of depleted uranium are presented. Chronic effects of deposited particles of uranium oxides are due to internal irradiation of sensitive organs at proceeding radioactive decay accompanied with alpha irradiation. Long-term internal irradiation by radionuclides producing alpha-rays leads to proved risk of increased incidence of carcinoma and leukaemia not to speak on chronic chemical toxicity of uranium, independent of its isotopic composition. Environmental impact of extensive use of munitions with depleted uranium in the recent armed conflicts is assessed. (authors)

  20. Innovative permeable cover system to reduce risks at a chemical munitions burial site

    International Nuclear Information System (INIS)

    Powels, C.C.; Bon, I.; Okusu, N.M.

    1997-01-01

    An innovative permeable sand cover with various integrated systems has been designed to contain and treat the Old O-Field chemical munitions landfill at Aberdeen Proving Ground, Maryland. The 18,200 m 2 (4.5 acre) landfill was used from the mid 1930s to the mid 1950s for the disposal of chemical, incendiary, and explosive munitions from domestic and foreign origins, together with contaminated wastes associated with the development and production of chemical warfare agents (CWA). The site is suspected to be contaminated with white phosphorous (WP) (which when dry, spontaneously burns when exposed to air), shock sensitive picric acid fuses and has the potential to contain large quantities of CWA-filled munitions. Historically, one to three explosions or fires occurred per ten-year period at the landfill. Such events have the potential to cause a CWA release to the environment, which could potentially affect densely populated areas. Recovery and decontamination projects conducted at the site in the late 1940s and early 1950s used large amounts of decontamination chemicals (containing solvents) and fuels which further contaminated the area. The groundwater downgradient of the landfill is contaminated with volatile organic compounds, metals, explosives and CWA degradation compounds and is currently being contained by a groundwater extraction and treatment system. This report describes a remedial action program for the site

  1. DolphinAtack: Inaudible Voice Commands

    OpenAIRE

    Zhang, Guoming; Yan, Chen; Ji, Xiaoyu; Zhang, Taimin; Zhang, Tianchen; Xu, Wenyuan

    2017-01-01

    Speech recognition (SR) systems such as Siri or Google Now have become an increasingly popular human-computer interaction method, and have turned various systems into voice controllable systems(VCS). Prior work on attacking VCS shows that the hidden voice commands that are incomprehensible to people can control the systems. Hidden voice commands, though hidden, are nonetheless audible. In this work, we design a completely inaudible attack, DolphinAttack, that modulates voice commands on ultra...

  2. Scale-free Enterprise Command & Control

    National Research Council Canada - National Science Library

    Bayne, Jay; Paul, Raymond

    2005-01-01

    ...) services that provide allied teams of commanders, planners and operations personnel with collaborative, grid-based and realtime situation assessment, plan generation, and plan execution services...

  3. Blossom Point Satellite Tracking and Command Station

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: The Blossom Point Satellite Command and Tracking Facility (BP) provides engineering and operational support to several complex space systems for the Navy...

  4. Structured multi-stream command language

    International Nuclear Information System (INIS)

    Glad, A.S.

    1982-12-01

    A multi-stream command language was implemented to provide the sequential and decision-making operations necessary to run the neutral-beam ion sources connected to the Doublet III tokamak fusion device. A multi-stream command language was implemented in Pascal on a Classic 7870 running under MAX IV. The purpose of this paper is threefold. First, to provide a brief description of the programs comprising the command language including the operating system interaction. Second, to give a description of the language syntax and commands necessary to develop a procedure stream. Third, to provide a description of the normal operating procedures for executing either the sequential or interactive streams

  5. Command and Control for Homeland Security

    National Research Council Canada - National Science Library

    Greene, Marjorie

    2007-01-01

    ... Analysis of the Toronto SARS Outbreak, Vertical Integration, Vertical Integration in a Military Command Hierarchy, Information flows for a domestic incident, C2 for Homeland Security will benefit...

  6. Mission Command: Elasticity, Equilibrium, Culture, and Intent

    National Research Council Canada - National Science Library

    Stewart, Keith G

    2006-01-01

    .... It is enabled by decentralization of authority and responsibility that allows subordinate commanders the latitude to plan and conduct operations based upon their understanding of the local situation...

  7. Employing a secure Virtual Private Network (VPN) infrastructure as a global command and control gateway to dynamically connect and disconnect diverse forces on a task-force-by-task-force basis

    OpenAIRE

    Kilcrease, Patrick N.

    2009-01-01

    Approved for public release, distribution unlimited GHOSTNet is a secure and anonymous Virtual Private Network (VPN) service. Coupling Ethernet tunneling and proxy services to provide users safe and anonymous Internet access, GHOSTNet utilizes TLS (SSL) protocol with AES-256 encryption to secure the network along with PKI certificates and HMAC protection from replay attacks and UDP flooding. This thesis will be a system level test and evaluation of the GHOSTNet infrastructure. The primary...

  8. Command and Service Module Communications

    Science.gov (United States)

    Interbartolo, Michael

    2009-01-01

    This viewgraph presentation examines Command and Service Module (CSM) Communications. The communication system's capabilities are defined, including CSM-Earth, CSM-Lunar Module and CSM-Extravehicular crewman communications. An overview is provided for S-band communications, including data transmission and receiving rates, operating frequencies and major system components (pre-modulation processors, unified S-band electronics, S-band power amplifier and S-band antennas). Additionally, data transmission rates, operating frequencies and the capabilities of VHF communications are described. Major VHF components, including transmitters and receivers, and the VHF multiplexer and antennas are also highlighted. Finally, communications during pre-launch, ascent, in-flight and entry are discussed. Overall, the CSM communication system was rated highly by flight controllers and crew. The system was mostly autonomous for both crew and flight controllers and no major issues were encountered during flight.

  9. Command and Control Software Development

    Science.gov (United States)

    Wallace, Michael

    2018-01-01

    The future of the National Aeronautics and Space Administration (NASA) depends on its innovation and efficiency in the coming years. With ambitious goals to reach Mars and explore the vast universe, correct steps must be taken to ensure our space program reaches its destination safely. The interns in the Exploration Systems and Operations Division at the Kennedy Space Center (KSC) have been tasked with building command line tools to ease the process of managing and testing the data being produced by the ground control systems while its recording system is not in use. While working alongside full-time engineers, we were able to create multiple programs that reduce the cost and time it takes to test the subsystems that launch rockets to outer space.

  10. Detection of Botnet Command and Control Traffic by the Multistage Trust Evaluation of Destination Identifiers

    Directory of Open Access Journals (Sweden)

    Pieter Burghouwt

    2015-10-01

    Full Text Available Network-based detection of botnet Command and Control communication is a difficult task if the traffic has a relatively low volume and if popular protocols, such as HTTP, are used to resemble normal traffic. We present a new network-based detection approach that is capable of detecting this type of Command and Control traffic in an enterprise network by estimating the trustworthiness of the traffic destinations. If the destination identifier of a traffic flow origins directly from: human input, prior traffic from a trusted destination, or a defined set of legitimate applications, the destination is trusted and its associated traffic is classified as normal. Advantages of this approach are: the ability of zero day malicious traffic detection, low exposure to malware by passive host-external traffic monitoring, and the applicability for real-time filtering. Experimental evaluation demonstrates successful detection of diverse types of Command and Control Traffic.

  11. 32 CFR 215.7 - Command relationships.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Command relationships. 215.7 Section 215.7 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) MISCELLANEOUS EMPLOYMENT OF MILITARY RESOURCES IN THE EVENT OF CIVIL DISTURBANCES § 215.7 Command relationships...

  12. The Marihuana Dilemma: Challenge to Commanders.

    Science.gov (United States)

    The marihuana dilemma poses a major challenge to commanders in the US Army today. The problem was analyzed as to the characteristics of the drug...available to commanders to meet the challenge. The essay concludes that marihuana should not be legalized; drug users or former drug users should not be

  13. XTCE. XML Telemetry and Command Exchange Tutorial

    Science.gov (United States)

    Rice, Kevin; Kizzort, Brad; Simon, Jerry

    2010-01-01

    An XML Telemetry Command Exchange (XTCE) tutoral oriented towards packets or minor frames is shown. The contents include: 1) The Basics; 2) Describing Telemetry; 3) Describing the Telemetry Format; 4) Commanding; 5) Forgotten Elements; 6) Implementing XTCE; and 7) GovSat.

  14. Capturing a Commander's decision making style

    Science.gov (United States)

    Santos, Eugene; Nguyen, Hien; Russell, Jacob; Kim, Keumjoo; Veenhuis, Luke; Boparai, Ramnjit; Stautland, Thomas Kristoffer

    2017-05-01

    A Commander's decision making style represents how he weighs his choices and evaluates possible solutions with regards to his goals. Specifically, in the naval warfare domain, it relates the way he processes a large amount of information in dynamic, uncertain environments, allocates resources, and chooses appropriate actions to pursue. In this paper, we describe an approach to capture a Commander's decision style by creating a cognitive model that captures his decisionmaking process and evaluate this model using a set of scenarios using an online naval warfare simulation game. In this model, we use the Commander's past behaviors and generalize Commander's actions across multiple problems and multiple decision making sequences in order to recommend actions to a Commander in a manner that he may have taken. Our approach builds upon the Double Transition Model to represent the Commander's focus and beliefs to estimate his cognitive state. Each cognitive state reflects a stage in a Commander's decision making process, each action reflects the tasks that he has taken to move himself closer to a final decision, and the reward reflects how close he is to achieving his goal. We then use inverse reinforcement learning to compute a reward for each of the Commander's actions. These rewards and cognitive states are used to compare between different styles of decision making. We construct a set of scenarios in the game where rational, intuitive and spontaneous decision making styles will be evaluated.

  15. 32 CFR 552.65 - Command supervision.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Command supervision. 552.65 Section 552.65 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY MILITARY RESERVATIONS AND NATIONAL CEMETERIES REGULATIONS AFFECTING MILITARY RESERVATIONS Solicitation on Military Reservations § 552.65 Command supervision. (a) All insurance...

  16. 2007 Insensitive Munitions and Energetic Materials Technology Symposium

    Science.gov (United States)

    2007-10-18

    Assessment – EIPT chair rotates each calendar year between NAVAIR and NAVSEA Page 9 Networks for collaboration Technology Oriented: Energetic Materials...Analysis IM Explosive Fill for 120mm and/or 155mm Arena Test & Qualificationr t lifi ti Must Show Improvement Review of Filter 1 Data for 3...Arena Test & Qualificationr t lifi ti Must Show Improvement PM-CAS Common Low-cost IM Explosives Program “Funnel” framework to progressively screen

  17. Computer Network Attack Versus Operational Maneuver from the Sea

    National Research Council Canada - National Science Library

    Herdegen, Dale

    2000-01-01

    ...) vulnerable to computer network attack (CNA). Mission command and control can reduce the impact of the loss of command and control, but it can not overcome the vast and complex array of threats...

  18. A Biography of the Trousered Munitions Women’s Uniform of World War 1

    OpenAIRE

    Roberts, Jennifer

    2017-01-01

    Ce chapitre fournit une vue d’ensemble de la recherche pour un exemple survivant de l’uniforme de pantalons des « munitionettes », alors que les travailleurs dans les usines de munitions dans la Première Guerre Mondiale étaient reconnus. Si nous examinons la réaction sur les femmes qui portent un vêtement d’homme et les discussions d’émancipation de cet uniforme, ces recherches ont étudié considérablement les archives jadis moins utilisées dans l’histoire des vêtements. Comme il n’existe plus...

  19. Message network simulation

    OpenAIRE

    Shih, Kuo-Tung

    1990-01-01

    Approved for public release, distribution is unlimited This thesis presents a computer simulation of a multinode data communication network using a virtual network model to determine the effects of various system parameters on overall network performance. Lieutenant Commander, Republic of China (Taiwan) Navy

  20. ASC Addresses Unit Commanders' Concerns through LBE and Reset Programs

    National Research Council Canada - National Science Library

    Young, Mark E

    2008-01-01

    .... Army Sustainment Command (ASC), part of the U.S. Army Materiel Command (AMC) team, is available to assist, identify, and resolve equipment and maintenance problems as well as materiel readiness issues for combatant commanders...

  1. Unity of Command in Afghanistan: A Forsaken Principle of War

    National Research Council Canada - National Science Library

    Hope, Ian

    2008-01-01

    ... in the evolution of military command for Afghanistan. It examines how there was an unprecedented departure from the principle of unity of command in Afghanistan in 2006, when Combined Forces Command-Afghanistan (CFC...

  2. Unity of Command in Afghanistan: A Forsaken Principle of War

    National Research Council Canada - National Science Library

    Hope, Ian

    2008-01-01

    ... of military command for Afghanistan. It examines the unprecedented departure from the principle of unity of command in Afghanistan in 2006, when Combined Forces Command-Afghanistan passed control of the ground fight to the International...

  3. Astronaut John Young in Command Module Simulator during Apollo Simulation

    Science.gov (United States)

    1968-01-01

    Astronaut John W. Young, command module pilot, inside the Command Module Simulator in bldg 5 during an Apollo Simulation. Astronauts Thomas P. Stafford, commander and Eugene A. Cernan, lunar module pilot are out of the view.

  4. Three astronauts inside Command Module Simulator during Apollo Simulation

    Science.gov (United States)

    1968-01-01

    Three astronauts inside the Command Module Simulator in bldg 5 during an Apollo Simulation. Left to right are Astronauts Thomas P. Stafford, commander; John W. Young, command module pilot; and Eugene A. Cernan, lunar module pilot.

  5. Literature review on medical incident command.

    Science.gov (United States)

    Rimstad, Rune; Braut, Geir Sverre

    2015-04-01

    It is not known what constitutes the optimal emergency management system, nor is there a consensus on how effectiveness and efficiency in emergency response should be measured or evaluated. Literature on the role and tasks of commanders in the prehospital emergency services in the setting of mass-casualty incidents has not been summarized and published. This comprehensive literature review addresses some of the needs for future research in emergency management through three research questions: (1) What are the basic assumptions underlying incident command systems (ICSs)? (2) What are the tasks of ambulance and medical commanders in the field? And (3) How can field commanders' performances be measured and assessed? A systematic literature search in MEDLINE, PubMed, PsycINFO, Embase, Cochrane Central Register of Controlled Trials, Cochrane Library, ISI Web of Science, Scopus, International Security & Counter Terrorism Reference Center, Current Controlled Trials, and PROSPERO covering January 1, 1990 through March 1, 2014 was conducted. Reference lists of included literature were hand searched. Included papers were analyzed using Framework synthesis. The literature search identified 6,049 unique records, of which, 76 articles and books where included in qualitative synthesis. Most ICSs are described commonly as hierarchical, bureaucratic, and based on military principles. These assumptions are contested strongly, as is the applicability of such systems. Linking of the chains of command in cooperating agencies is a basic difficulty. Incident command systems are flexible in the sense that the organization may be expanded as needed. Commanders may command by direction, by planning, or by influence. Commanders' tasks may be summarized as: conducting scene assessment, developing an action plan, distributing resources, monitoring operations, and making decisions. There is considerable variation between authors in nomenclature and what tasks are included or highlighted

  6. Linux Command Line and Shell Scripting Bible

    CERN Document Server

    Blum, Richard

    2011-01-01

    The authoritative guide to Linux command line and shell scripting?completely updated and revised [it's not a guide to Linux as a whole ? just to scripting] The Linux command line allows you to type specific Linux commands directly to the system so that you can easily manipulate files and query system resources, thereby permitting you to automate commonly used functions and even schedule those programs to run automatically. This new edition is packed with new and revised content, reflecting the many changes to new Linux versions, including coverage of alternative shells to the default bash shel

  7. The Linux command line a complete introduction

    CERN Document Server

    Shotts, William E

    2012-01-01

    You've experienced the shiny, point-and-click surface of your Linux computer—now dive below and explore its depths with the power of the command line. The Linux Command Line takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell. Along the way you'll learn the timeless skills handed down by generations of gray-bearded, mouse-shunning gurus: file navigation, environment configuration, command chaining, pattern matching with regular expressions, and more.

  8. Command and Control of Private Security Contractors: Are They a Viable Force Option for the Combatant Commander?

    National Research Council Canada - National Science Library

    Sherard, Scott H

    2008-01-01

    If a Combatant Commander (CCDR) or Joint Force Commander (JFC) were to take command of the approximately 25,000 security contractors in Iraq, a force of such size and capability would prove to be a valuable operational asset...

  9. Toward Unity of Command for Multinational Air Forces

    National Research Council Canada - National Science Library

    Asjes, David

    1998-01-01

    To assure unity of command in future multinational air operations, combatant commanders must embrace the necessity of multinational air forces, maximize the integration of allied officers within air...

  10. Disposal of chemical agents and munitions stored at Pine Bluff Arsenal, Pine Bluff, Arkansas. Final phase 1, Environmental report

    Energy Technology Data Exchange (ETDEWEB)

    Ensminger, J.T.; Hillsman, E.L.; Johnson, R.D.; Morrisey, J.A.; Staub, W.P.; Boston, C.R.; Hunsaker, D.B.; Leibsch, E.; Rickert, L.W.; Tolbert, V.R.; Zimmerman, G.P.

    1991-09-01

    The Pine Bluff Arsenal (PBA) near Pine Bluff, Arkansas, is one of eight continental United States (CONUS) Army installations where lethal unitary chemical agents and munitions are stored and where destruction of agents and munitions is proposed under the Chemical Stockpile Disposal Program (CSDP). The chemical agent inventory at PBA consists of approximately 12%, by weight, of the total US stockpile. The destruction of the stockpile is necessary to eliminate the risk to the public from continued storage and to dispose of obsolete and leaking munitions. In 1988 the US Army issued a Final Programmatic Environmental Impact Statement (FPEIS) for the CSDP that identified on-site disposal of agents and munitions as the environmentally preferred alternative (i.e., the alternative with the least potential to cause significant adverse impacts). The purpose of this report is to examine the proposed implementation of on-site disposal at PBA in light of more recent and more detailed data than those on which the FPEIS is based. New population data were used to compute fatalities using the same computation methods and values for all other parameters as in the FPEIS. Results indicate that all alternatives are indistinguishable when the potential health impacts to the PBA community are considered. However, risks from on-site disposal are in all cases equal to or less than risks from other alternatives. Furthermore, no unique resources with the potential to prevent or delay implementation of on-site disposal at PBA have been identified.

  11. In-Flight Self-Alignment Method Aided by Geomagnetism for Moving Basement of Guided Munitions

    Directory of Open Access Journals (Sweden)

    Shuang-biao Zhang

    2015-01-01

    Full Text Available Due to power-after-launch mode of guided munitions of high rolling speed, initial attitude of munitions cannot be determined accurately, and this makes it difficult for navigation and control system to work effectively and validly. An in-flight self-alignment method aided by geomagnetism that includes a fast in-flight coarse alignment method and an in-flight alignment model based on Kalman theory is proposed in this paper. Firstly a fast in-flight coarse alignment method is developed by using gyros, magnetic sensors, and trajectory angles. Then, an in-flight alignment model is derived by investigation of the measurement errors and attitude errors, which regards attitude errors as state variables and geomagnetic components in navigation frame as observed variables. Finally, fight data of a spinning projectile is used to verify the performance of the in-flight self-alignment method. The satisfying results show that (1 the precision of coarse alignment can attain below 5°; (2 the attitude errors by in-flight alignment model converge to 24′ at early of the latter half of the flight; (3 the in-flight alignment model based on Kalman theory has better adaptability, and show satisfying performance.

  12. New Global Missions for Strategic Command

    National Research Council Canada - National Science Library

    Graham, David

    2002-01-01

    .... The focus of this White Paper is on the external decisions that will be needed to provide the Command with a clear mission, and the authority, resources and organizational support necessary to perform the mission...

  13. U.S. Pacific Command > Leadership

    Science.gov (United States)

    USPACOM U.S. Pacific Command Search USPACOM: Search Search Search USPACOM: Search Home Leadership Directory Media Inquiries Home : Leadership Admiral Harry B. Harris, Jr., U.S. Navy Read the full biography

  14. The Road to a New Unified Command

    Science.gov (United States)

    2008-01-01

    The Directorate of Command, Control, Communications, and Computers (C4) Systems is chartered with information architecture (including in Africa...Friday afternoon cinema presentations where a documentary or feature film covering an African historic event was played, followed by dialogue

  15. Spacecraft command and control using expert systems

    Science.gov (United States)

    Norcross, Scott; Grieser, William H.

    1994-01-01

    This paper describes a product called the Intelligent Mission Toolkit (IMT), which was created to meet the changing demands of the spacecraft command and control market. IMT is a command and control system built upon an expert system. Its primary functions are to send commands to the spacecraft and process telemetry data received from the spacecraft. It also controls the ground equipment used to support the system, such as encryption gear, and telemetry front-end equipment. Add-on modules allow IMT to control antennas and antenna interface equipment. The design philosophy for IMT is to utilize available commercial products wherever possible. IMT utilizes Gensym's G2 Real-time Expert System as the core of the system. G2 is responsible for overall system control, spacecraft commanding control, and spacecraft telemetry analysis and display. Other commercial products incorporated into IMT include the SYBASE relational database management system and Loral Test and Integration Systems' System 500 for telemetry front-end processing.

  16. Unit Testing for Command and Control Systems

    Science.gov (United States)

    Alexander, Joshua

    2018-01-01

    Unit tests were created to evaluate the functionality of a Data Generation and Publication tool for a command and control system. These unit tests are developed to constantly evaluate the tool and ensure it functions properly as the command and control system grows in size and scope. Unit tests are a crucial part of testing any software project and are especially instrumental in the development of a command and control system. They save resources, time and costs associated with testing, and catch issues before they become increasingly difficult and costly. The unit tests produced for the Data Generation and Publication tool to be used in a command and control system assure the users and stakeholders of its functionality and offer assurances which are vital in the launching of spacecraft safely.

  17. Basic interrupt and command structures and applications

    International Nuclear Information System (INIS)

    Davies, R.C.

    1974-01-01

    Interrupt and command structures of a real-time system are described through specific examples. References to applications of a real-time system and programing development references are supplied. (auth)

  18. An Operational Commander's Guide to the Media

    National Research Council Canada - National Science Library

    McCartney, Michael

    2005-01-01

    ... of the embedded reporter . The Operational Commander is wise to review media relations and the successes and pitfalls of past conflicts, and to examine closely the results of Operation Iraqi Freedom so as to...

  19. Focused Logistics: Time for Functional Command

    National Research Council Canada - National Science Library

    Mintzlaff, Jeffrey G

    2005-01-01

    .... Military's distribution system -- the parts of the Department of Defense (DoD) that manage and execute the storage and movement of supplies to military customers -- consists of multiple entities and agencies made up of separate Services and commands...

  20. Graph Theoretical Analysis of Network Centric Operations Using Multi-Layer Models

    National Research Council Canada - National Science Library

    Wong-Jiru, Ann

    2006-01-01

    .... The research incorporates the importance of understanding network topology for evaluating an environment for net-centricity and using network characteristics to help commanders assess the effects...

  1. Schema for Spacecraft-Command Dictionary

    Science.gov (United States)

    Laubach, Sharon; Garcia, Celina; Maxwell, Scott; Wright, Jesse

    2008-01-01

    An Extensible Markup Language (XML) schema was developed as a means of defining and describing a structure for capturing spacecraft command- definition and tracking information in a single location in a form readable by both engineers and software used to generate software for flight and ground systems. A structure defined within this schema is then used as the basis for creating an XML file that contains command definitions.

  2. Control of automated system with voice commands

    OpenAIRE

    Švara, Denis

    2012-01-01

    In smart houses contemporary achievements in the fields of automation, communications, security and artificial intelligence, increase comfort and improve the quality of user's lifes. For the purpose of this thesis we developed a system for managing a smart house with voice commands via smart phone. We focused at voice commands most. We want move from communication with fingers - touches, to a more natural, human relationship - speech. We developed the entire chain of communication, by which t...

  3. Defense or Diplomacy Geographic Combatant Commands

    Science.gov (United States)

    2011-06-01

    originally ruled by 1 Priest, Dana , The Mission: Waging War and Keeping Peace with America’s Military...events. US Central Command. Dana Priest describes General Zinni‟s experience as a GCC commander, wherein General Zinni found that in many ways...ignored altogether. Dr. James Forsyth and Lt Col Chance Saltzman make this argument in their Air and Space Power Journal article “Stay Out —Why

  4. An Advanced Commanding and Telemetry System

    Science.gov (United States)

    Hill, Maxwell G. G.

    The Loral Instrumentation System 500 configured as an Advanced Commanding and Telemetry System (ACTS) supports the acquisition of multiple telemetry downlink streams, and simultaneously supports multiple uplink command streams for today's satellite vehicles. By using industry and federal standards, the system is able to support, without relying on a host computer, a true distributed dataflow architecture that is complemented by state-of-the-art RISC-based workstations and file servers.

  5. Investigation of a new passive sampler for the detection of munitions compounds in marine and freshwater systems.

    Science.gov (United States)

    Warren, Joseph K; Vlahos, Penny; Smith, Richard; Tobias, Craig

    2018-07-01

    Over the last century, unexploded ordnances have been disposed of in marine shelf systems because of a lack of cost-effective alternatives. Underwater unexploded ordnances have the potential to leak 2,4,6-trinitrotoluene (TNT) and 1,3,5-trinitro-1,3,5-triazine (RDX), commonly used chemical munitions, and contaminate local waters, biota, and sediments. The rate at which this contamination occurs in the environment is relatively unknown, and the cost- and time-prohibitive nature of sampling across sites makes mapping difficult. In the present study we assessed the efficacy of ethylene-vinyl acetate (EVA) for sampling relatively soluble munitions compounds over a range of environmental conditions (i.e., changes in temperature and salinity) and optimized the composition of the passive sampling polymer. The EVA sampler was able to successfully detect ambient concentrations of lingering munitions compounds from field sites containing unexploded ordnances. The sampler affinity for the munitions in terms of an EVA-water partition coefficient was greater than the standard octanol water values for each target compound. Partitioning of compounds onto EVA over the natural ranges of salinity did not change significantly, although uptake varied consistently and predictably with temperature. Increasing the vinyl acetate to ethylene ratio of the polymer corresponded to an increase in uptake capacity, consistent with enhanced dipole-dipole interactions between the munitions and the polymer. This sampler provides a cost-effective means to map and track leakage of unexploded ordnances both spatially and temporally. Environ Toxicol Chem 2018;37:1990-1997. © 2018 SETAC. © 2018 SETAC.

  6. Test Telemetry And Command System (TTACS)

    Science.gov (United States)

    Fogel, Alvin J.

    1994-01-01

    The Jet Propulsion Laboratory has developed a multimission Test Telemetry and Command System (TTACS) which provides a multimission telemetry and command data system in a spacecraft test environment. TTACS reuses, in the spacecraft test environment, components of the same data system used for flight operations; no new software is developed for the spacecraft test environment. Additionally, the TTACS is transportable to any spacecraft test site, including the launch site. The TTACS is currently operational in the Galileo spacecraft testbed; it is also being provided to support the Cassini and Mars Surveyor Program projects. Minimal personnel data system training is required in the transition from pre-launch spacecraft test to post-launch flight operations since test personnel are already familiar with the data system's operation. Additionally, data system components, e.g. data display, can be reused to support spacecraft software development; and the same data system components will again be reused during the spacecraft integration and system test phases. TTACS usage also results in early availability of spacecraft data to data system development and, as a result, early data system development feedback to spacecraft system developers. The TTACS consists of a multimission spacecraft support equipment interface and components of the multimission telemetry and command software adapted for a specific project. The TTACS interfaces to the spacecraft, e.g., Command Data System (CDS), support equipment. The TTACS telemetry interface to the CDS support equipment performs serial (RS-422)-to-ethernet conversion at rates between 1 bps and 1 mbps, telemetry data blocking and header generation, guaranteed data transmission to the telemetry data system, and graphical downlink routing summary and control. The TTACS command interface to the CDS support equipment is nominally a command file transferred in non-real-time via ethernet. The CDS support equipment is responsible for

  7. Networking

    OpenAIRE

    Rauno Lindholm, Daniel; Boisen Devantier, Lykke; Nyborg, Karoline Lykke; Høgsbro, Andreas; Fries, de; Skovlund, Louise

    2016-01-01

    The purpose of this project was to examine what influencing factor that has had an impact on the presumed increasement of the use of networking among academics on the labour market and how it is expressed. On the basis of the influence from globalization on the labour market it can be concluded that the globalization has transformed the labour market into a market based on the organization of networks. In this new organization there is a greater emphasis on employees having social qualificati...

  8. Tracking and Interception of Ground-Based RF Sources Using Autonomous Guided Munitions with Passive Bearings-Only Sensors and Tracking Algorithms

    National Research Council Canada - National Science Library

    Ezal, Kenan; Agate, Craig

    2006-01-01

    This paper considers the problem of tracking and intercepting a potentially moving ground-based RF source with an autonomous guided munition that has a passive bearings-only sensor located on its nose...

  9. Operation Iraqi Freedom: DOD Should Apply Lessons Learned Concerning the Need for Security over Conventional Munitions Storage Sites to Future Operations Planning

    National Research Council Canada - National Science Library

    D'Agostino, Davi M

    2007-01-01

    The Government Accountability Office (GAO) is releasing a report today on lessons learned concerning the need for security over conventional munitions storage sites that provides the basis for this testimony...

  10. 32 CFR 700.1054 - Command of a naval base.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Command of a naval base. 700.1054 Section 700.1054 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY... Command Detail to Duty § 700.1054 Command of a naval base. The officer detailed to command a naval base...

  11. The Battle Command Sustainment Support System: Initial Analysis Report

    Science.gov (United States)

    2016-09-01

    products including jet fuels, distillate fuels, residual fuels, automotive gasoline , specified bulk lubricating oils, aircraft engine oils, fuel...contained within this report. 15. SUBJECT TERMS Mission command Software Tactical applications (TacApps) Command post ...computing environment (CPCE) Command post client Battle command sustainment support System (BCS3) Logistics

  12. Bioaccumulation of chemical warfare agents, energetic materials, and metals in deep-sea shrimp from discarded military munitions sites off Pearl Harbor

    Science.gov (United States)

    Koide, Shelby; Silva, Jeff A. K.; Dupra, Vilma; Edwards, Margo

    2016-06-01

    The bioaccumulation of munitions-related chemicals at former military deep-water disposal sites is poorly understood. This paper presents the results of human-food-item biota sampling to assess the potential for bioaccumulation of chemical warfare agents, energetic materials, arsenic, and additional munitions-related metals in deep-sea shrimp tissue samples collected during the Hawai'i Undersea Military Munitions Assessment (HUMMA) project to date. The HUMMA investigation area is located within a former munitions sea-disposal site located south of Pearl Harbor on the island of O'ahu, Hawai'i, designated site Hawaii-05 (HI-05) by the United States Department of Defense. Indigenous deep-sea shrimp (Heterocarpus ensifer) were caught adjacent to discarded military munitions (DMM) and at control sites where munitions were absent. Tissue analysis results showed that chemical warfare agents and their degradation products were not present within the edible portions of these samples at detectable concentrations, and energetic materials and their degradation products were detected in only a few samples at concentrations below the laboratory reporting limits. Likewise, arsenic, copper, and lead concentrations were below the United States Food and Drug Administration's permitted concentrations of metals in marine biota tissue (if defined), and their presence within these samples could not be attributed to the presence of DMM within the study area based on a comparative analysis of munitions-adjacent and control samples collected. Based on this current dataset, it can be concluded that DMM existing within the HUMMA study area is not contributing to the bioaccumulation of munitions-related chemicals for the biota species investigated to date.

  13. Digital intelligent booster for DCC miniature train networks

    Science.gov (United States)

    Ursu, M. P.; Condruz, D. A.

    2017-08-01

    Modern miniature trains are now driven by means of the DCC (Digital Command and Control) system, which allows the human operator or a personal computer to launch commands to each individual train or even to control different features of the same train. The digital command station encodes these commands and sends them to the trains by means of electrical pulses via the rails of the railway network. Due to the development of the miniature railway network, it may happen that the power requirement of the increasing number of digital locomotives, carriages and accessories exceeds the nominal output power of the digital command station. This digital intelligent booster relieves the digital command station from powering the entire railway network all by itself, and it automatically handles the multiple powered sections of the network. This electronic device is also able to detect and process short-circuits and overload conditions, without the intervention of the digital command station.

  14. STS-37 Commander Nagel in commanders seat on OV-104's flight deck

    Science.gov (United States)

    1991-01-01

    STS-37 Commander Steven R. Nagel, wearing launch and entry suit (LES), sits at commanders station on the forward flight deck of Atlantis, Orbiter Vehicle (OV) 104. Surrounding Nagel are the seat headrest, control panels, checklists, forward flight deck windows, and three drinking water containers with straws attached to forward panel F2.

  15. Linux Networking Cookbook

    CERN Document Server

    Schroder, Carla

    2008-01-01

    If you want a book that lays out the steps for specific Linux networking tasks, one that clearly explains the commands and configurations, this is the book for you. Linux Networking Cookbook is a soup-to-nuts collection of recipes that covers everything you need to know to perform your job as a Linux network administrator. You'll dive straight into the gnarly hands-on work of building and maintaining a computer network

  16. Reticulospinal Systems for Tuning Motor Commands

    Directory of Open Access Journals (Sweden)

    Robert M. Brownstone

    2018-04-01

    Full Text Available The pontomedullary reticular formation (RF is a key site responsible for integrating descending instructions to execute particular movements. The indiscrete nature of this region has led not only to some inconsistencies in nomenclature, but also to difficulties in understanding its role in the control of movement. In this review article, we first discuss nomenclature of the RF, and then examine the reticulospinal motor command system through evolution. These command neurons have direct monosynaptic connections with spinal interneurons and motoneurons. We next review their roles in postural adjustments, walking and sleep atonia, discussing their roles in movement activation or inhibition. We propose that knowledge of the internal organization of the RF is necessary to understand how the nervous system tunes motor commands, and that this knowledge will underlie strategies for motor functional recovery following neurological injuries or diseases.

  17. Opinion on the examination of the control-command general architecture of the Flamanville 3 EPR reactor and of its associated platforms

    International Nuclear Information System (INIS)

    2009-06-01

    This report first recalls the different technical and hardware elements and components discussed by the ISRN (Nuclear Radioprotection and Safety Institute) in front of the Expert Permanent Group for nuclear reactors. These elements and components are concerning the control-command architecture as a whole, and the technical ability of networks, computers, and robots. It outlines the main principles which the control-and-command must comply with: compliance of each component of the retained technological solution with the design requirements corresponding to the safety classification, robustness of the whole control-command architecture. Then, it comments and sometimes criticizes the status of the various components of the control-command platforms with respect to this compliance. Eight recommendations are given for the SPPA T2000 control-command platform and for the robustness of the control-command architecture

  18. Advanced MicroObserver UGS integration with and cueing of the BattleHawk squad level loitering munition and UAV

    Science.gov (United States)

    Steadman, Bob; Finklea, John; Kershaw, James; Loughman, Cathy; Shaffner, Patti; Frost, Dean; Deller, Sean

    2014-06-01

    Textron's Advanced MicroObserver(R) is a next generation remote unattended ground sensor system (UGS) for border security, infrastructure protection, and small combat unit security. The original MicroObserver(R) is a sophisticated seismic sensor system with multi-node fusion that supports target tracking. This system has been deployed in combat theaters. The system's seismic sensor nodes are uniquely able to be completely buried (including antennas) for optimal covertness. The advanced version adds a wireless day/night Electro-Optic Infrared (EOIR) system, cued by seismic tracking, with sophisticated target discrimination and automatic frame capture features. Also new is a field deployable Gateway configurable with a variety of radio systems and flexible networking, an important upgrade that enabled the research described herein. BattleHawkTM is a small tube launched Unmanned Air Vehicle (UAV) with a warhead. Using transmitted video from its EOIR subsystem an operator can search for and acquire a target day or night, select a target for attack, and execute terminal dive to destroy the target. It is designed as a lightweight squad level asset carried by an individual infantryman. Although BattleHawk has the best loiter time in its class, it's still relatively short compared to large UAVs. Also it's a one-shot asset in its munition configuration. Therefore Textron Defense Systems conducted research, funded internally, to determine if there was military utility in having the highly persistent MicroObserver(R) system cue BattleHawk's launch and vector it to beyond visual range targets for engagement. This paper describes that research; the system configuration implemented, and the results of field testing that was performed on a government range early in 2013. On the integrated system that was implemented, MicroObserver(R) seismic detections activated that system's camera which then automatically captured images of the target. The geo-referenced and time-tagged Micro

  19. Linux command line and shell scripting bible

    CERN Document Server

    Blum, Richard

    2014-01-01

    Talk directly to your system for a faster workflow with automation capability Linux Command Line and Shell Scripting Bible is your essential Linux guide. With detailed instruction and abundant examples, this book teaches you how to bypass the graphical interface and communicate directly with your computer, saving time and expanding capability. This third edition incorporates thirty pages of new functional examples that are fully updated to align with the latest Linux features. Beginning with command line fundamentals, the book moves into shell scripting and shows you the practical application

  20. Evaluation of the metabolic fate of munitions material (TNT & RDX) in plant systems and initial assessment of material interaction with plant genetic material. Validation of the metabolic fate of munitions materials (TNT, RDX) in mature crops

    Energy Technology Data Exchange (ETDEWEB)

    Fellows, R.J.; Harvey, S.D.; Cataldo, D.A.

    1995-09-01

    The goals of this effort were to confirm and expand data related to the behavior and impacts of munitions residues upon human food chain components. Plant species employed included corn (Zea mays), alfalfa (Medicago sativa). spinach (Spinacea oleraceae), and carrot (Daucus carota). Plants were grown from seed to maturity (70 to 120 days) in a low-fertility soil (Burbank) amended with either {sup 14}C-TNT or {sup 14}C-RDX at which time they were harvested and analyzed for munitions uptake, partitioning, and chemical form of the munition or munition-metabolite. All four of the plant species used in this study accumulated the {sup 14}C-TNT- and RDX-derived label. The carrot, alfalfa, and corn demonstrated a higher percentage of label retained in the roots (62, 73, and 83% respectively). The spinach contained less activity in its root (36%) but also contained the highest TNT specific activity observed (>4600 jig TNT equivalents/g dry wt.). The specific uptake values of RDX for the spinach and alfalfa were comparable to those previously reported for wheat and bean (314 to 590 {mu}g RDX-equivalents/g dry wt. respectively). An exception to this may be the carrot where the specific activity was found to exceed 4200 {mu}g RDX-equivalents/g dry wt. in the shoot. The total accumulation of TNT by the plants ranged from 1.24% for the spinach to 2.34% for the carrot. The RDX plants ranging from 15% for the spinach to 37% for the carrot. There was no identifiable TNT or amino dinitrotoluene (ADNT) isomers present in the plants however, the parent RDX compound was found at significant levels in the shoot of alfalfa (> 1 80 {mu}g/g) and corn (>18 {mu}g/g).

  1. A Novel wave-form command shaper for overhead cranes

    Directory of Open Access Journals (Sweden)

    KHALED ALHAZZA

    2013-12-01

    Full Text Available In this work, a novel command shaping control strategy for oscillation reduction of simple harmonic oscillators is proposed, and validated experimentally. A wave-form acceleration command shaper is derived analytically. The performance of the proposed shaper is simulated numerically, and validated experimentally on a scaled model of an overhead crane. Amplitude modulation is used to enhance the shaper performance, which results in a modulated wave-form command shaper. It is determined that the proposed wave-form and modulated wave-form command shaper profiles are capable of eliminating travel and residual oscillations. Furthermore, unlike traditional impulse and step command shapers, the proposed command shaper has piecewise smoother acceleration, velocity, and displacement profiles. Experimental results using continuous and discrete commands are presented. Experiments with discrete commands involved embedding a saturation model-based feedback in the algorithm of the command shaper.

  2. Command and Data Handling Branch Internship

    Science.gov (United States)

    Billings, Rachel Mae

    2016-01-01

    planes, layer stacks, and other specified design rules such as plane clearance and hole size. Multiple consultation sessions were held with Hester Yim, the technical discipline lead for the Command and Data Handling Branch, and Christy Herring, the lead PCB layout designer in the Electronic Design and Manufacturing Branch in order to ensure proper configuration. At themoment, the PCB is awaiting revision by the latter-mentioned branch. Afterwards, the board will begin to undergo the manufacturing and testing process.Throughout the internship at Johnson Space Center, I gained several technical and professional skills. I gained proficiency in Altium Designer and experience using subversion clients, as well as knowledge in PSpice with OrCAD and battery design for spaceflight from on-site. I also gained networking, organization, and communication skills throughout meetings with coworkers and other interns. This internship at Johnson Space Center has impacted my future aspirations by further inspiring me to follow a career path into space rated engineering technology and human spaceflight applications. After graduation, I plan to attend graduate school for a master's or doctorate degree in electrical or computer engineering.

  3. Enhancing network centric operations doctrine to support civil military cooperation in disaster management

    NARCIS (Netherlands)

    Wolbers, J.J.; Beeres, R.; Bakx, G.; de Waard, E.; Rietjens, S.

    2016-01-01

    Network Centric Operations is a promising command doctrine in both military operations and during civil disaster management. As both sectors started intensifying their joint operational capacity through civil-military collaboration, it becomes increasingly relevant to address the different command

  4. Disposal of chemical agents and munitions stored at Umatilla Depot Activity, Hermiston, Oregon. Final Phase 1 environmental report

    Energy Technology Data Exchange (ETDEWEB)

    Zimmerman, G.P.; Hillsman, E.L.; Johnson, R.O.; Miller, R.L.; Patton, T.G.; Schoepfle, G.M.; Tolbert, V.R.; Feldman, D.L.; Hunsaker, D.B. Jr.; Kroodsma, R.L.; Morrissey, J.; Rickert, L.W.; Staub, W.P.; West, D.C.

    1993-02-01

    The Umatilla Depot Activity (UMDA) near Hermiston, Oregon, is one of eight US Army installations in the continental United States where lethal unitary chemical agents and munitions are stored, and where destruction of agents and munitions is proposed under the Chemical Stockpile Disposal Program (CSDP). The chemical agent inventory at UMDA consists of 11.6%, by weight, of the total US stockpile. The destruction of the stockpile is necessary to eliminate the risk to the public from continued storage and to dispose of obsolete and leaking munitions. In 1988 the US Army issued a Final Programmatic Environmental Impact Statement (FPEIS) for the CSDP that identified on-site disposal of agents and munitions as the environmentally preferred alternative (i.e., the alternative with the least potential to cause significant adverse impacts), using a method based on five measures of risk for potential human health and ecosystem/environmental effects; the effectiveness and adequacy of emergency preparedness capabilities also played a key role in the FPEIS selection methodology. In some instances, the FPEIS included generic data and assumptions that were developed to allow a consistent comparison of potential impacts among programmatic alternatives and did not include detailed conditions at each of the eight installations. The purpose of this Phase 1 report is to examine the proposed implementation of on-site disposal at UMDA in light of more recent and more detailed data than those included in the FPEIS. Specifically, this Phase 1 report is intended to either confirm or reject the validity of on-site disposal for the UMDA stockpile. Using the same computation methods as in the FPEIS, new population data were used to compute potential fatalities from hypothetical disposal accidents. Results indicate that onsite disposal is clearly preferable to either continued storage at UMDA or transportation of the UMDA stockpile to another depot for disposal.

  5. Command History. 1968. Volume 1. Sanitized.

    Science.gov (United States)

    1968-01-01

    battalions. Additionally, a diary captured on 19 December, Z1 kilometers southwest of Song Cau, revealed that on 19 November the author. a cadre member...the 306th and 312th ( AYA 308th) Bns. This reorga- nization was an apparent attempt by the headquarters of MR 3 to tighten its command and con- trol. (C

  6. Commandants' Managerial Capacity and Workers Productivity in ...

    African Journals Online (AJOL)

    The purpose of this study is to evaluate the commandant's managerial capacity as if relates to workers productivity with a view to determining whether their calling to the education terrain has been justified and to correct certain areas in need of improvement in the Nigeria Police Education set up. In doing this, the study took ...

  7. Command and Control in Littoral Operations

    Science.gov (United States)

    2016-05-13

    at the graphics on the wall displaying the position of the various forces under his command. Only a few of his 14 ships were in formation with him...Mainz, 2d MEB Lead Planner (November 11, 2014). Moskowitz, Michael, and Nolan Noble. Dawn Blitz 2015- Observations and Analysis. Exercise

  8. RELATIONSHIP BETWEEN LINGUISTIC UNITS AND MOTOR COMMANDS.

    Science.gov (United States)

    FROMKIN, VICTORIA A.

    ASSUMING THAT SPEECH IS THE RESULT OF A NUMBER OF DISCRETE NEUROMUSCULAR EVENTS AND THAT THE BRAIN CAN STORE ONLY A LIMITED NUMBER OF MOTOR COMMANDS WITH WHICH TO CONTROL THESE EVENTS, THE RESEARCH REPORTED IN THIS PAPER WAS DIRECTED TO A DETERMINATION OF THE SIZE AND NATURE OF THE STORED ITEMS AND AN EXPLANATION OF HOW SPEAKERS ENCODE A SEQUENCE…

  9. APOLLO 11 COMMANDER NEIL ARMSTRONG IN SIMULATOR

    Science.gov (United States)

    1969-01-01

    Apollo 11 commander Neil Armstrong is going through flight training in the lunar module simulator situated in the flight crew training building at KSC. Armstrong will pilot the lunar module to a moon landing on July 20, following launch from KSC on July 16.

  10. Command-And-Control or Taxation?

    DEFF Research Database (Denmark)

    Oh, Christina; Svendsen, Gert Tinggaard

    2015-01-01

    an ineffective command-and-control (CAC) tool, whereas Denmark has chosen the effective tool of taxation. One main explanation for this variation in policy choice is the variation in institutional setups, namely the corporatist route in Denmark versus the pluralistic route in California....

  11. Analysis of Biota to Evaluate the Risks Associated with Chemical Warfare Materiel Present in Sea-Disposed Military Munitions to Human Health and the Environment

    Science.gov (United States)

    Briggs, C. W.; Bissonnette, M. C.; Edwards, M.; Shjegstad, S. M.

    2016-12-01

    Thousands of 100-lb M47A series bombs containing sulfur mustard were disposed in the ocean following World War II yet few studies have been conducted at sites in excess of 250 m, the depth where most discarded military munitions (DMM) were disposed. The Hawai`i Undersea Military Munitions Assessment (HUMMA) project was conducted to evaluate the risk from chemical warfare materiel (CWM) in DMM to human health, measuring ecological differences between the disposal area and nearby but otherwise similar areas, and evaluating the most efficient platforms for surveying DMM sea-disposal sites located at depths between 400-650 m. During the 2014 HUMMA Sampling Survey, the Jason 2 remotely operated vehicle was used to collect data. Shrimp were collected and analyzed to assess the potential for bioaccumulation of CWM, energetics and metals from munitions. No CWM was detected in H. ensifer tissue samples, indicating bioaccumulation is not occurring. Low levels of 2,4,6-trinitrotoluene, 4-amino-2,6-­dinitrotoluene, 1,3,5-trinitrobenzene, nitrobenzene, arsenic, copper, and lead were detected and the concentrations were not significantly different at DMM and control sites. No visible deformities, eroded fins, lesions, or tumors were observed on the shrimp living in the vicinity of M47A bombs. Given these results and under current and potential future uses of the HUMMA study area, health risks to likely receptors are within EPA acceptable levels. Photographic data and benthic infauna analysis were used to study benthic organisms that lived on or near munitions. There was no statistically distinguishable difference between organism distributions in dense and sparse munitions fields. Conventional munitions were found to have the greatest number of benthic infauna individuals, with control sites generally having the least number of individuals. This is consistent with the benthic macro-fauna analysis, which shows that munitions provide habitat.

  12. An integrated theoretical and experimental investigation of insensitive munition compounds adsorption on cellulose, cellulose triacetate, chitin and chitosan surfaces.

    Science.gov (United States)

    Gurtowski, Luke A; Griggs, Chris S; Gude, Veera G; Shukla, Manoj K

    2018-02-01

    This manuscript reports results of combined computational chemistry and batch adsorption investigation of insensitive munition compounds, 2,4-dinitroanisole (DNAN), triaminotrinitrobenzene (TATB), 1,1-diamino-2,2-dinitroethene (FOX-7) and nitroguanidine (NQ), and traditional munition compound 2,4,6-trinitrotoluene (TNT) on the surfaces of cellulose, cellulose triacetate, chitin and chitosan biopolymers. Cellulose, cellulose triacetate, chitin and chitosan were modeled as trimeric form of the linear chain of 4 C 1 chair conformation of β-d-glucopyranos, its triacetate form, β-N-acetylglucosamine and D-glucosamine, respectively, in the 1➔4 linkage. Geometries were optimized at the M062X functional level of the density functional theory (DFT) using the 6-31G(d,p) basis set in the gas phase and in the bulk water solution using the conductor-like polarizable continuum model (CPCM) approach. The nature of potential energy surfaces of the optimized geometries were ascertained through the harmonic vibrational frequency analysis. The basis set superposition error (BSSE) corrected interaction energies were obtained using the 6-311G(d,p) basis set at the same theoretical level. The computed BSSE in the gas phase was used to correct interaction energy in the bulk water solution. Computed and experimental results regarding the ability of considered surfaces in adsorbing the insensitive munitions compounds are discussed. Copyright © 2017. Published by Elsevier B.V.

  13. Patch models and their applications to multivehicle command and control.

    Science.gov (United States)

    Rao, Venkatesh G; D'Andrea, Raffaello

    2007-06-01

    We introduce patch models, a computational modeling formalism for multivehicle combat domains, based on spatiotemporal abstraction methods developed in the computer science community. The framework yields models that are expressive enough to accommodate nontrivial controlled vehicle dynamics while being within the representational capabilities of common artificial intelligence techniques used in the construction of autonomous systems. The framework allows several key design requirements of next-generation network-centric command and control systems, such as maintenance of shared situation awareness, to be achieved. Major features include support for multiple situation models at each decision node and rapid mission plan adaptation. We describe the formal specification of patch models and our prototype implementation, i.e., Patchworks. The capabilities of patch models are validated through a combat mission simulation in Patchworks, which involves two defending teams protecting a camp from an enemy attacking team.

  14. Discrete Event Command & Control for Networked Teams with Multiple Missions

    Science.gov (United States)

    2009-03-16

    Architecture for Unmanned Ground Systems ( JAUGS )10, and is an efficient means to realize the high-level OODA loops (observe, orient, decide, act) of 4D...for Unmanned Ground systems ( JAUGS )10, and is an efficient means to realize the OODA loops (observe, orient, decide, act) of 4D/RCS11. DEC is able to

  15. Intelligent Tutoring System for Teaching Battlefield Command Reasoning Skills

    National Research Council Canada - National Science Library

    Domeshek, Eric

    2002-01-01

    .... Achieving expert levels of proficiency in high-level command reasoning skills-whether for battlefield commanders or for executives in industry-requires extensive practice, coaching, and feedback...

  16. 'The Danger of Divided Command': British civil and military disputes ...

    African Journals Online (AJOL)

    Commander-in-Chief of the Indian Army, Lord Kitchener, which culminated in Curzon's ... and the officers commanding forces would have no doubt as to their .... but assuming financial responsibility for its own defence would have been ...

  17. Maritime Coalitions: When is Unity of Command Required

    National Research Council Canada - National Science Library

    Gahlinger, Gregory J

    2007-01-01

    .... The concepts of Unity of Command, Unity of Effort and Parallel, Lead Nation, or Integrated coalition command structures are viable across a broad spectrum of maritime coalition operations but do have...

  18. GPS and the Joint Force Commander: Critical Asset, Critical Vulnerability

    National Research Council Canada - National Science Library

    McPherson, Michael

    2001-01-01

    Joint Force Commanders (JFCs) have become over reliant on military and commercial satellite systems for intelligence gathering and dissemination, weather, command, control, communications, and navigation/guidance functions, to name a few...

  19. U.S. Africa Command: Shaping Africa for the Future

    National Research Council Canada - National Science Library

    Sholley, Hans

    2006-01-01

    .... It is argued the current Unified Command Plan is ill designed to address the complexities of the continent of Africa and that a proposed United States Africa Command would be better positioned...

  20. The Warfighting Capacity of Air Combat Command's Numbered Air Forces

    National Research Council Canada - National Science Library

    Hanser, Lawrence

    2000-01-01

    ...) of the Air Combat Command (ACC), General Richard E. Hawley, the ACC Commander, asked if RAND could offer an analysis of the number of NAFs that were needed by ACC to meet warfighting requirements...

  1. Incorrect Responses to Locative Commands: A Case Study.

    Science.gov (United States)

    Duchan, Judith; Siegel, Leo

    1979-01-01

    A six-year-old with a language problem responded consistently to 100 locative commands by putting objects in containers and on flat surfaces regardless of the preposition or order of the nouns in the commands. (Author/CL)

  2. Soviet command and control in a historical context

    OpenAIRE

    Kern, Jeffrey A.

    1981-01-01

    Approved for public release; distribution is unlimited An examination is made of the historical antecedents of present day command and control doctrine in the Soviet Union. The continuity of principal characteristics is demonstrated. The ideological determinants shaping the command and control system are first developed. These include centralism, collective decision-making, unity of command, and redundancy. Practical consequences of these are explored. The functioning of Soviet command...

  3. Photochemical transformation of the insensitive munitions compound 2,4-dinitroanisole

    Energy Technology Data Exchange (ETDEWEB)

    Rao, Balaji, E-mail: anandharaob@ornl.gov [Environmental Sciences Division, Oak Ridge National Laboratory, Oak Ridge, TN (United States); Wang, Wei [Environmental Sciences Division, Oak Ridge National Laboratory, Oak Ridge, TN (United States); Cai, Qingsong; Anderson, Todd [Department of Environmental Toxicology, The Institute of Environment and Human Health, Texas Tech University, Lubbock, TX (United States); Gu, Baohua, E-mail: gub1@ornl.gov [Environmental Sciences Division, Oak Ridge National Laboratory, Oak Ridge, TN (United States)

    2013-01-15

    The insensitive munitions compound 2,4-dinitroanisole (DNAN) is increasingly being used as a replacement for traditional, sensitive munitions compounds (e.g., trinitrotoluene [TNT]), but the environmental fate and photo-transformation of DNAN in natural water systems are currently unknown. In this study, we investigated the photo-transformation rates of DNAN with both ultraviolet (UV) and sunlight irradiation under different environmentally relevant conditions. Sunlight photo-transformation of DNAN in water was found to follow predominantly pseudo-first-order decay kinetics with an average half-life (t{sub 1/2}) of approximately 0.70 d and activation energy (E{sub a}) of 53 kJ mol{sup −1}. Photo-transformation rates of DNAN were dependent on the wavelength of the light source: irradiation with UV-B light (280–315 nm) resulted in a greater quantum yield of transformation (ϕ{sub UV-B} = 3.7 × 10{sup −4}) than rates obtained with UV-A light (ϕ{sub UV-A} = 2.9 × 10{sup −4} at 316–400 nm) and sunlight (ϕ{sub sun} = 1.1 × 10{sup −4}). Photo-oxidation was the dominant mechanism for DNAN photo-transformation, based on the formation of nitrite (NO{sub 2}{sup −}) and nitrate (NO{sub 3}{sup −}) as major N species and 2,4-dinitrophenol as the minor species. Environmental factors (e.g., temperature, pH, and the presence or absence of naturally dissolved organic matter) displayed modest to little effects on the rate of DNAN photo-transformation. These observations indicate that sunlight-induced photo-transformation of DNAN may represent a significant abiotic degradation pathway in surface water, which may have important implications in evaluating the potential impacts and risks of DNAN in the environment. - Highlights: ► DNAN photo-transformation kinetics was dependent on light source and temperature. ► Photolysis produced harmful by-products that included dinitrophenol and nitrate. ► Photo-oxidation was determined to be the likely pathway of DNAN

  4. Bioconcentration factors and plant-water partition coefficients of munitions compounds in barley.

    Science.gov (United States)

    Torralba-Sanchez, Tifany L; Kuo, Dave T F; Allen, Herbert E; Di Toro, Dominic M

    2017-12-01

    Plants growing in the soils at military ranges and surrounding locations are exposed, and potentially able to uptake, munitions compounds (MCs). The extent to which a compound is transferred from the environment into organisms such as plants, referred to as bioconcentration, is conventionally measured through uptake experiments with field/synthetic soils. Multiple components/phases that vary among different soil types and affect the bioavailability of the MC, however, hinder the ability to separate the effects of soil characteristics from the MC chemical properties on the resulting plant bioconcentration. To circumvent the problem, this work presents a protocol to measure steady state bioconcentration factors (BCFs) for MCs in barley (Hordeum vulgare L.) using inert laboratory sand rather than field/synthetic soils. Three MCs: 2,4,6-trinitrotoluene (TNT), 2,4-dinitrotoluene (2,4-DNT), and 2,4-dinitroanisole (2,4-DNAN), and two munition-like compounds (MLCs): 4-nitroanisole (4-NAN) and 2-methoxy-5-nitropyridine (2-M-5-NPYNE) were evaluated. Approximately constant plant biomass and exposure concentrations were achieved within a one-month period that produced steady state log BCF values: 0.62 ± 0.02, 0.70 ± 0.03, 1.30 ± 0.06, 0.52 ± 0.03, and 0.40 ± 0.05 L kg plant dwt -1 for TNT, 2,4-DNT, 2,4-DNAN, 4-NAN, and 2-M-5-NPYNE, respectively. Furthermore, results suggest that the upper-bounds of the BCFs can be estimated within an order of magnitude by measuring the partitioning of the compounds between barley biomass and water. This highlights the importance of partition equilibrium as a mechanism for the uptake of MCs and MLCs by barley from interstitial water. The results from this work provide chemically meaningful data for prediction models able to estimate the bioconcentration of these contaminants in plants. Copyright © 2017 Elsevier Ltd. All rights reserved.

  5. 32 CFR 700.1056 - Command of a ship.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Command of a ship. 700.1056 Section 700.1056 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY REGULATIONS AND OFFICIAL RECORDS UNITED STATES NAVY REGULATIONS AND OFFICIAL RECORDS Precedence, Authority and Command Detail to Duty § 700.1056 Command of a...

  6. U.S. Pacific Command > About USPACOM > History

    Science.gov (United States)

    USPACOM U.S. Pacific Command Search USPACOM: Search Search Search USPACOM: Search Home Leadership People's Republic of China, the Democratic People's Republic of Korea, Mongolia, and the Republic of its surrounding waters under the leadership of one commander, providing a unity of command absent from

  7. ARAC: A unique command and control resource

    International Nuclear Information System (INIS)

    Bradley, M.M.; Baskett, R.L.; Ellis, J.S.

    1996-04-01

    The Atmospheric Release Advisory Capability (ARAC) at Lawrence Livermore National Laboratory (LLNL) is a centralized federal facility designed to provide real-time, world-wide support to military and civilian command and control centers by predicting the impacts of inadvertent or intentional releases of nuclear, biological, or chemical materials into the atmosphere. ARAC is a complete response system consisting of highly trained and experienced personnel, continually updated computer models, redundant data collection systems, and centralized and remote computer systems. With over 20 years of experience responding to domestic and international incidents, strong linkages with the Department of Defense, and the ability to conduct classified operations, ARAC is a unique command and control resource

  8. ARAC: A unique command and control resource

    Energy Technology Data Exchange (ETDEWEB)

    Bradley, M.M.; Baskett, R.L.; Ellis, J.S. [and others

    1996-04-01

    The Atmospheric Release Advisory Capability (ARAC) at Lawrence Livermore National Laboratory (LLNL) is a centralized federal facility designed to provide real-time, world-wide support to military and civilian command and control centers by predicting the impacts of inadvertent or intentional releases of nuclear, biological, or chemical materials into the atmosphere. ARAC is a complete response system consisting of highly trained and experienced personnel, continually updated computer models, redundant data collection systems, and centralized and remote computer systems. With over 20 years of experience responding to domestic and international incidents, strong linkages with the Department of Defense, and the ability to conduct classified operations, ARAC is a unique command and control resource.

  9. Automated constraint checking of spacecraft command sequences

    Science.gov (United States)

    Horvath, Joan C.; Alkalaj, Leon J.; Schneider, Karl M.; Spitale, Joseph M.; Le, Dang

    1995-01-01

    Robotic spacecraft are controlled by onboard sets of commands called "sequences." Determining that sequences will have the desired effect on the spacecraft can be expensive in terms of both labor and computer coding time, with different particular costs for different types of spacecraft. Specification languages and appropriate user interface to the languages can be used to make the most effective use of engineering validation time. This paper describes one specification and verification environment ("SAVE") designed for validating that command sequences have not violated any flight rules. This SAVE system was subsequently adapted for flight use on the TOPEX/Poseidon spacecraft. The relationship of this work to rule-based artificial intelligence and to other specification techniques is discussed, as well as the issues that arise in the transfer of technology from a research prototype to a full flight system.

  10. Operational Maneuver from the Sea and Amphibious Command Relationships: Is It time for a Joint Force Amphibious Component Commander?

    National Research Council Canada - National Science Library

    Bennett, Michael

    2004-01-01

    .... In a joint community that is becoming increasingly dependant on the use of functional component commanders in the execution of major operations, the need for a Joint Force Amphibious Component Commander (JFAMCC...

  11. Local area networking handbook

    OpenAIRE

    O'Hara, Patricia A.

    1990-01-01

    Approved for public release; distribution is unlimited. This thesis provides Navy shore based commands with sufficient information on local area networking to (1) decide if they need a LAN, (2) determine what their networking requirements are, and (3) select a LAN that satisfies their requirements. LAN topologies, transmission media, and medium access methods are described. In addition, the OSI reference model for computer networking and the IEEE 802 LAN standards are explained in detail. ...

  12. Commanders’ Perception of Risk: Enabling Boldness

    Science.gov (United States)

    2008-04-01

    individual. Soldiers are trained over time to employ their weapon systems tinder a variety of conditions in, realistic simulations and scenarios, thus...from ground combat the specialty is, where th~ leader provides the same support in combat that he would in garrison with no direct relationship to an...34 safety paperwork and activities. 73 Senior commanders must aggressively search for means to communicate their intent and the relationship between

  13. Command and Control for Distributed Lethality

    Science.gov (United States)

    2017-06-01

    extended communications between the AFP CDR and the CCDR are required. As shown in Figure 20, the principle command relationships are between...frequency (RF) communications are limited by maximum antenna height of each surface platform without an airborne relay. LOS is estimated with an online ...documents the interconnections and relationship of information flow and the system requirements for maintaining the interconnection links during a

  14. Jimmy Doolittle: The Commander behind the Legend

    Science.gov (United States)

    2015-02-01

    was 35 percent and that, although luxury items were cheap, food and other necessities were expensive. He speculated that everyone in Germany...British Spitfire groups, one troop-carrier group, one light-bombardment group, and three medium-bombardment groups.123 He later observed, “I was a brand ...a very popular commander, Ira Eaker, was perhaps the first. Eaker had served in the Eighth since its incep- tion and led its first independent attack

  15. Auftragstaktik: The Basis for Modern Military Command?

    Science.gov (United States)

    2012-12-06

    Pauli’s Nachf, 1892. Showalter, Dennis. The Wars of German Unification. London: Hodder Education , 2004. Simpkin, Richard. Race to the Swift. London...to the bourgeois class again, making education , not social position, the deciding factor for obtaining a commission.15 The army created a system of...only reflected the increased education and capability of the new officer corps, but also the reality of commanding an army in the Napoleonic era

  16. Mission Command In A Communications Denied Environment

    Science.gov (United States)

    2017-02-16

    the mutual trust between the echelons.8 In the United States armed forces, the Joint Chiefs have understood the value of...without being over controlling or micromanaging.12 During the execution phase the commander is the free to choose his position on the battlefield to... the Air Force Association Convention, National Harbor, MD, September 16, 2009, accessed at http://www.defenselink.mil/ speeches

  17. Naval Meteorology and Oceanography Command exhibit entrance

    Science.gov (United States)

    2000-01-01

    StenniSphere at NASA's John C. Stennis Space Center in Hancock County, Miss., invites visitors to discover why America comes to Stennis Space Center before going into space. Designed to entertain while educating, StenniSphere includes informative displays and exhibits from NASA and other agencies located at Stennis, such as this one from the Naval Meteorology and Oceanography Command. Visitors can 'travel' three-dimensionally under the sea and check on the weather back home in the Weather Center.

  18. Naval Meteorology and Oceanography Command exhibit

    Science.gov (United States)

    2000-01-01

    Designed to entertain while educating, StenniSphere at the John C. Stennis Space Center in Hancock County, Miss., includes informative displays and exhibits from NASA and other agencies located at Stennis, such as this one from the Naval Meteorology and Oceanography Command. Visitors can 'travel' three-dimensionally under the sea and check on the weather back home in the Weather Center. StenniSphere is open free of charge from 9 a.m. to 5 p.m. daily.

  19. Network device interface for digitally interfacing data channels to a controller via a network

    Science.gov (United States)

    Ellerbrock, Philip J. (Inventor); Grant, Robert L. (Inventor); Konz, Daniel W. (Inventor); Winkelmann, Joseph P. (Inventor)

    2009-01-01

    A communications system and method are provided for digitally connecting a plurality of data channels, such as sensors, actuators, and subsystems, to a controller using a network bus. The network device interface interprets commands and data received from the controller and polls the data channels in accordance with these commands. Specifically, the network device interface receives digital commands and data from the controller, and based on these commands and data, communicates with the data channels to either retrieve data in the case of a sensor or send data to activate an actuator. Data retrieved from the sensor is converted into digital signals and transmitted to the controller. Network device interfaces associated with different data channels can coordinate communications with the other interfaces based on either a transition in a command message sent by the bus controller or a synchronous clock signal.

  20. Designed to Win: An Agile Approach to Air Force Command and Control of Cyberspace

    Science.gov (United States)

    2010-06-01

    capabilities and limitations of technology with a level of control that synchronizes operations, yet allows independent action to take advantage of...was during the Roman Empire. With the exception of the semaphore telegraph and an improved road network, the same methods of communication used by...48 To provide information quickly to the ground commanders, the Aviation Section of the US Signal Corps installed primitive wireless radio sets in

  1. The Combat Cloud: Enabling Multi-Domain Command and Control Across the Range of Military Operations

    Science.gov (United States)

    2017-03-01

    fire support coordination measures , its potential to enhance the close air support and personnel recovery missions, interagency coordination...connectivity, such as that of a Long Term Evolution ( LTE ) network. As the user transitions out of the area of LTE coverage, the connectivity then...improving the flexibility and use of fire support coordination measures (FSCM). Joint doctrine defines a FSCM as, “A measure employed by commanders to

  2. Formulation development and characterization of cellulose acetate nitrate based propellants for improved insensitive munitions properties

    Directory of Open Access Journals (Sweden)

    Thelma Manning

    2014-06-01

    Full Text Available Cellulose acetate nitrate (CAN was used as an insensitive energetic binder to improve the insensitive munitions (IM properties of gun propellants to replace the M1 propellant used in 105 mm artillery charges. CAN contains the energetic nitro groups found in nitrocellulose (NC, but also acetyl functionalities, which lowered the polymer's sensitivity to heat and shock, and therefore improved its IM properties relative to NC. The formulation, development and small-scale characterization testing of several CAN-based propellants were done. The formulations, using insensitive energetic solid fillers and high-nitrogen modifiers in place of nitramine were completed. The small scale characterization testing, such as closed bomb testing, small scale sensitivity, thermal stability, and chemical compatibility were done. The mechanical response of the propellants under high-rate uni-axial compression at, hot, cold, and ambient temperatures were also completed. Critical diameter testing, hot fragment conductive ignition (HFCI tests were done to evaluate the propellants' responses to thermal and shock stimuli. Utilizing the propellant chemical composition, theoretical predictions of erosivity were completed. All the small scale test results were utilized to down-select the promising CAN based formulations for large scale demonstration testing such as the ballistic performance and fragment impact testing in the 105 mm M67 artillery charge configurations. The test results completed in the small and large scale testing are discussed.

  3. Digital Device Architecture and the Safe Use of Flash Devices in Munitions

    Science.gov (United States)

    Katz, Richard B.; Flowers, David; Bergevin, Keith

    2017-01-01

    Flash technology is being utilized in fuzed munition applications and, based on the development of digital logic devices in the commercial world, usage of flash technology will increase. Digital devices of interest to designers include flash-based microcontrollers and field programmable gate arrays (FPGAs). Almost a decade ago, a study was undertaken to determine if flash-based microcontrollers could be safely used in fuzes and, if so, how should such devices be applied. The results were documented in the Technical Manual for the Use of Logic Devices in Safety Features. This paper will first review the Technical Manual and discuss the rationale behind the suggested architectures for microcontrollers and a brief review of the concern about data retention in flash cells. An architectural feature in the microcontroller under study will be discussed and its use will show how to screen for weak or failed cells during manufacture, storage, or immediately prior to use. As was done for microcontrollers a decade ago, architectures for a flash-based FPGA will be discussed, showing how it can be safely used in fuzes. Additionally, architectures for using non-volatile (including flash-based) storage will be discussed for SRAM-based FPGAs.

  4. IT Security Support for the Spaceport Command Control System Development

    Science.gov (United States)

    Varise, Brian

    2014-01-01

    My job title is IT Security support for the Spaceport Command & Control System Development. As a cyber-security analyst it is my job to ensure NASA's information stays safe from cyber threats, such as, viruses, malware and denial-of-service attacks by establishing and enforcing system access controls. Security is very important in the world of technology and it is used everywhere from personal computers to giant networks ran by Government agencies worldwide. Without constant monitoring analysis, businesses, public organizations and government agencies are vulnerable to potential harmful infiltration of their computer information system. It is my responsibility to ensure authorized access by examining improper access, reporting violations, revoke access, monitor information request by new programming and recommend improvements. My department oversees the Launch Control System and networks. An audit will be conducted for the LCS based on compliance with the Federal Information Security Management Act (FISMA) and The National Institute of Standards and Technology (NIST). I recently finished analyzing the SANS top 20 critical controls to give cost effective recommendations on various software and hardware products for compliance. Upon my completion of this internship, I will have successfully completed my duties as well as gain knowledge that will be helpful to my career in the future as a Cyber Security Analyst.

  5. Penetrating injury to the chest by an attenuated energy projectile: a case report and literature review of thoracic injuries caused by "less-lethal" munitions

    Directory of Open Access Journals (Sweden)

    Porto Leonardo BO

    2009-06-01

    Full Text Available Abstract We present the case of a patient who sustained a penetrating injury to the chest caused by an attenuated energy rubber bullet and review the literature on thoracic injuries caused by plastic and rubber "less-lethal" munitions. The patient of this report underwent a right thoracotomy to extract the projectile as well as a wedge resection of the injured lung parenchyma. This case demonstrates that even supposedly safe riot control munition fired at close range, at the torso, can provoke serious injury. Therefore a thorough investigation and close clinical supervision are justified.

  6. Penetrating injury to the chest by an attenuated energy projectile: a case report and literature review of thoracic injuries caused by "less-lethal" munitions.

    Science.gov (United States)

    Rezende-Neto, Joao; Silva, Fabriccio Df; Porto, Leonardo Bo; Teixeira, Luiz C; Tien, Homer; Rizoli, Sandro B

    2009-06-26

    We present the case of a patient who sustained a penetrating injury to the chest caused by an attenuated energy rubber bullet and review the literature on thoracic injuries caused by plastic and rubber "less-lethal" munitions. The patient of this report underwent a right thoracotomy to extract the projectile as well as a wedge resection of the injured lung parenchyma. This case demonstrates that even supposedly safe riot control munition fired at close range, at the torso, can provoke serious injury. Therefore a thorough investigation and close clinical supervision are justified.

  7. Apparatus and method for data communication in an energy distribution network

    Science.gov (United States)

    Hussain, Mohsin; LaPorte, Brock; Uebel, Udo; Zia, Aftab

    2014-07-08

    A system for communicating information on an energy distribution network is disclosed. In one embodiment, the system includes a local supervisor on a communication network, wherein the local supervisor can collect data from one or more energy generation/monitoring devices. The system also includes a command center on the communication network, wherein the command center can generate one or more commands for controlling the one or more energy generation devices. The local supervisor can periodically transmit a data signal indicative of the data to the command center via a first channel of the communication network at a first interval. The local supervisor can also periodically transmit a request for a command to the command center via a second channel of the communication network at a second interval shorter than the first interval. This channel configuration provides effective data communication without a significant increase in the use of network resources.

  8. OFFICER AND COMMANDER IN ASYMMETRIC WARFARE OPERATIONS

    Directory of Open Access Journals (Sweden)

    Giuseppe CAFORIO

    2013-01-01

    Full Text Available Starting from the data of a field research conducted among soldiers with asymmetric warfare experiences from nine different countries, the author seeks to identify and shed light on the various problems that officers with command responsibilities had to face during their missions. A picture emerges of feelings and experiences relating to their first impression upon arriving in the theatre, relations with local armed forces, relations with the local population and local authorities, relations with NGOs, relations with other armies, the impact of the rules of engagement (ROEs, training and education, and operational experiences. The paper ends with a discussion of the lessons learned.

  9. Incident Command System - Environmental Unit responsibilities

    International Nuclear Information System (INIS)

    Hillman, S. O.

    1997-01-01

    The Incident Command System (ICS) for crisis management, used for response to oil spills by the Alyeska Pipeline Service Company throughout its facilities, including the Trans Alaska Pipeline and the Valdez Marine Terminal, was described. Special attention was given to the Environmental Unit within the ICS which functions as a primary support unit for the Incident Operations Section. Details of the Unit's function were provided. These include the collection, evaluation and dissemination of information on all environmental issues concerning the crisis, provision of advice and direction on environmental aspects, and up-front agency interaction. A checklist of tasks is included. 7 refs

  10. Spaceport Command and Control System Automation Testing

    Science.gov (United States)

    Hwang, Andrew

    2017-01-01

    The Spaceport Command and Control System (SCCS) is the National Aeronautics and Space Administrations (NASA) launch control system for the Orion capsule and Space Launch System, the next generation manned rocket currently in development. This large system requires high quality testing that will properly measure the capabilities of the system. Automating the test procedures would save the project time and money. Therefore, the Electrical Engineering Division at Kennedy Space Center (KSC) has recruited interns for the past two years to work alongside full-time engineers to develop these automated tests, as well as innovate upon the current automation process.

  11. 24 Command Fire Improvement Action Program Plan

    International Nuclear Information System (INIS)

    GRIFFIN, G.B.

    2000-01-01

    Fluor Hanford (FH) is responsible for providing support to the Department of Energy Richland Operations Office (RL) in the implementation of the Hanford Emergency Preparedness (EP) program. During fiscal year 2000, a number of program improvements were identified from various sources including a major range fire (24 Command Fire). Evaluations of the emergency preparedness program have confirmed that it currently meets all requirements and that performance of personnel involved is good, however the desire to effect continuous improvement resulted in the development of this improvement program plan. This program plan defines the activities that will be performed in order to achieve the desired performance improvements

  12. Spaceport Command and Control System Automation Testing

    Science.gov (United States)

    Plano, Tom

    2017-01-01

    The goal of automated testing is to create and maintain a cohesive infrastructure of robust tests that could be run independently on a software package in its entirety. To that end, the Spaceport Command and Control System (SCCS) project at the National Aeronautics and Space Administration's (NASA) Kennedy Space Center (KSC) has brought in a large group of interns to work side-by-side with full time employees to do just this work. Thus, our job is to implement the tests that will put SCCS through its paces.

  13. Spaceport Command and Control System Automated Testing

    Science.gov (United States)

    Stein, Meriel

    2017-01-01

    The Spaceport Command and Control System (SCCS) is the National Aeronautics and Space Administrations (NASA) launch control system for the Orion capsule and Space Launch System, the next generation manned rocket currently in development. This large system requires high quality testing that will properly measure the capabilities of the system. Automating the test procedures would save the project time and money. Therefore, the Electrical Engineering Division at Kennedy Space Center (KSC) has recruited interns for the past two years to work alongside full-time engineers to develop these automated tests, as well as innovate upon the current automation process.

  14. Mammalian Toxicity of Munition Compounds. Phase II. Effects of Multiple Doses. Part III. 2,6-Dinitrotoluene

    Science.gov (United States)

    1976-07-01

    and the neuromuscular effects in these dogs were not due to hypocalcemia . The lowest serum calcium concen- tration in these dogs was 4.2 meq/liter...motor end plate might produce a local hypocalcemia . Such a mechanism is purely speculative. Qualitatively and quantitavely, most of the effects of 2,6...I ýNw,- -MIM I/ MIDWEST RESEARCH INS14ITUTE H0q .3L I LU -_ MAMMALIAN TOXICITY OF MUNITIONS COMPOUlNDSPHASE II: EFFECTS OF MiULTIPLE DOSES C* •PART

  15. Post-traumatic stress disorder in adult victims of cluster munitions in Lebanon: a 10-year longitudinal study.

    Science.gov (United States)

    Fares, Jawad; Gebeily, Souheil; Saad, Mohamad; Harati, Hayat; Nabha, Sanaa; Said, Najwane; Kanso, Mohamad; Abdel Rassoul, Ronza; Fares, Youssef

    2017-08-18

    This study aims to explore the short-term and long-term prevalence and effects of post-traumatic stress disorder (PTSD) among victims of cluster munitions. A prospective 10-year longitudinal study that took place in Lebanon. Two-hundred-and-forty-four Lebanese civilian victims of submunition blasts, who were injured in 2006 and were over 18 years old, were interviewed. Included were participants who had been diagnosed with PTSD according to the Diagnostic and Statistical Manual of Mental Disorders, 5th Edition (DSM-5) and the PTSD Checklist - Civilian Version in 2006. Interviewees were present for the 10-year follow-up. PTSD prevalence rates of participants in 2006 and 2016 were compared. Analysis of the demographical data pertaining to the association of long-term PTSD with other variables was performed. p Values <0.05 were considered statistically significant for all analyses (95% CI). All the 244 civilians injured by cluster munitions in 2006 responded, and were present for long-term follow-up in 2016. The prevalence of PTSD decreased significantly from 98% to 43% after 10 years (p<0.001). A lower long-term prevalence was significantly associated with male sex (p<0.001), family support (p<0.001) and religion (p<0.001). Hospitalisation (p=0.005) and severe functional impairment (p<0.001) post-trauma were significantly associated with increased prevalence of long-term PTSD. Symptoms of negative cognition and mood were more common in the long run. In addition, job instability was the most frequent socioeconomic repercussion among the participants (88%). Psychological symptoms, especially PTSD, remain high in war-affected populations many years after the war; this is particularly evident for Lebanese civilians who were victimised by cluster munitions. Screening programmes and psychological interventions need to be implemented in vulnerable populations exposed to war traumas. Officials and public health advocates should consider the socioeconomic implications, and

  16. Computer-based test system for the Tactical Airfield Attack Munition (TAAM) safing, arming, and fuzing system

    International Nuclear Information System (INIS)

    Warhus, J.; Castleton, R.; Lanning, S.

    1981-12-01

    Testing and quality assurance of large numbers of firing systems are an essential part of the development of the Tactical Airfield Attack Munition (TAAM). A computerized test and data acquisition system has been developed to make the testing and quality assurance workload manageable. The system hardware utilizes an LSI-11/23 computer, a Tektronix 7612 transient digitizer, and various other programmable instruments and power supplies. The system is capable of measuring and analyzing mechanical shock and fireset transient waveforms, automating testing sequences, and making records and comparisons of the test results. The system architecture is flexible for general purpose firing system development work

  17. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    Directory of Open Access Journals (Sweden)

    Peng Xun

    2017-10-01

    Full Text Available A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1 the command sequence is disordered and (2 disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  18. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    Science.gov (United States)

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  19. Command Structure for Theater Warfare: The Quest for Unity of Command

    Science.gov (United States)

    1984-09-01

    that trryfari tail forth thr htst from iti—Btturki Major General« Pern M Smith. USAF. and Hark) A Hughe«. USAF. contributed more to the rndertaking...an air. ground, and sea component. These arc generic commands which control all combat operations in the media of the air. ground, and sea. There

  20. Modeling midwave infrared muzzle flash spectra from unsuppressed and flash-suppressed large caliber munitions

    Science.gov (United States)

    Steward, Bryan J.; Perram, Glen P.; Gross, Kevin C.

    2012-07-01

    Time-resolved infrared spectra of firings from a 152 mm howitzer were acquired over an 1800-6000 cm-1 spectral range using a Fourier-transform spectrometer. The instrument collected primarily at 32 cm-1 spectral and 100 Hz temporal resolutions. Munitions included unsuppressed and chemically flash suppressed propellants. Secondary combustion occurred with unsuppressed propellants resulting in flash emissions lasting ˜100 ms and dominated by H2O and CO2 spectral structure. Non-combusting plume emissions were one-tenth as intense and approached background levels within 20-40 ms. A low-dimensional phenomenological model was used to reduce the data to temperatures, soot absorbances, and column densities of H2O, CO2, CH4, and CO. The combusting plumes exhibit peak temperatures of ˜1400 K, areas of greater than 32 m2, low soot emissivity of ˜0.04, with nearly all the CO converted to CO2. The non-combusting plumes exhibit lower temperatures of ˜1000 K, areas of ˜5 m2, soot emissivity of greater than 0.38 and CO as the primary product. Maximum fit residual relative to peak intensity are 14% and 8.9% for combusting and non-combusting plumes, respectively. The model was generalized to account for turbulence-induced variations in the muzzle plumes. Distributions of temperature and concentration in 1-2 spatial regions demonstrate a reduction in maximum residuals by 40%. A two-region model of combusting plumes provides a plausible interpretation as a ˜1550 K, optically thick plume core and ˜2550 K, thin, surface-layer flame-front. Temperature rate of change was used to characterize timescales and energy release for plume emissions. Heat of combustion was estimated to be ˜5 MJ/kg.

  1. The network communication of BEPC control system

    International Nuclear Information System (INIS)

    Xu Jingwei

    1997-01-01

    The author introduces the application of network communication of BEPC control system. The authors use non-transparent communication to transfer the data and command information from node VAX750 to VAX4500

  2. Acquisition management of the Global Transportation Network

    Science.gov (United States)

    2001-08-02

    This report discusses the acquisition management of the Global transportation Network by the U.S. Transportation Command. This report is one in a series of audit reports addressing DoD acquisition management of information technology systems. The Glo...

  3. Engagement Skills Trainer: The Commander’s Perspective

    Science.gov (United States)

    2017-06-09

    CBRN Chemical Biological Radiological and Nuclear CGSOC Command and General Staff Officers Course DMG Digital Master Gunner EST Engagement Skills...commanders always emphasized SHARP ( Sexual Harassment and Response Program) training, the battery commander may vividly recall those events but not the range...soldiers in the EST generally do worse at weapons safety and orientation .26 Indicators from research show that EST results predict live fire results. The

  4. Command vector memory systems: high performance at low cost

    OpenAIRE

    Corbal San Adrián, Jesús; Espasa Sans, Roger; Valero Cortés, Mateo

    1998-01-01

    The focus of this paper is on designing both a low cost and high performance, high bandwidth vector memory system that takes advantage of modern commodity SDRAM memory chips. To successfully extract the full bandwidth from SDRAM parts, we propose a new memory system organization based on sending commands to the memory system as opposed to sending individual addresses. A command specifies, in a few bytes, a request for multiple independent memory words. A command is similar to a burst found in...

  5. XTCE: XML Telemetry and Command Exchange Tutorial, XTCE Version 1

    Science.gov (United States)

    Rice, Kevin; Kizzort, Brad

    2008-01-01

    These presentation slides are a tutorial on XML Telemetry and Command Exchange (XTCE). The goal of XTCE is to provide an industry standard mechanism for describing telemetry and command streams (particularly from satellites.) it wiill lower cost and increase validation over traditional formats, and support exchange or native format.XCTE is designed to describe bit streams, that are typical of telemetry and command in the historic space domain.

  6. GENE EXPRESSION CHANGES IN ARABIDOPSIS THALIANA SEEDLING ROOTS EXPOSED TO THE MUNITION HEXAHYDRO-1,3,5-TRINITRO-1,3,5-TRIAZINE

    Science.gov (United States)

    Arabidopsis thaliana root transcriptome responses to the munition, hexahydro-1,3,5-trinitro-1,3,5-triazine (RDX), were assessed using serial analysis of gene expression (SAGE). Comparison of the transcriptional profile for the RDX response to a profile previously described for Ar...

  7. Terrain Commander: Unattended Ground-Based Surveillance System

    National Research Council Canada - National Science Library

    Steadman, Bob

    2000-01-01

    .... Terrain Commander OASIS provides next generation target detection, classification, and tracking through smart sensor fusion of beamforming acoustic, seismic, passive infrared, and magnetic sensors...

  8. Deductive Sensemaking Principles Using Personal Constructs of the Field Commanders

    National Research Council Canada - National Science Library

    Ntuen, Celestine A; Leedom, Dennis

    2007-01-01

    .... It is assumed that the expert commander constructs diverse and asynchronous sensemaking models when confronted with asymmetric situations-evolving and changing dynamics of the battlefield information...

  9. Contractor Support on the Battlefield -- Increased Reliance Requires Commander's Attention

    National Research Council Canada - National Science Library

    Maloney, Kathy J

    2006-01-01

    .... Department of Defense initiatives to adopt a leaner business strategy, increase efficiency, and reduce expenditures have exposed the battlefield commander to additional operational risk centered...

  10. U.S. Special Operations Command Training and Education Program

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1996-01-01

    .... Special Operations Command (USCINCSOC), to train assigned forces to meet special operations mission taskings and to ensure interoperability with conventional forces and other special operations forces (SOF...

  11. When Contractors Deploy: A Guide for the Operational Commander

    National Research Council Canada - National Science Library

    Buhler, Carl

    2000-01-01

    .... Furthermore, this paper also lists four recommendations for operational commanders and the military on how to better integrate contractors into the military effort, especially during hostile combat situations...

  12. Apollo 16 astronauts in Apollo Command Module Mission Simulator

    Science.gov (United States)

    1972-01-01

    Astronaut Thomas K. Mattingly II, command module pilot of the Apollo 16 lunar landing mission, participates in extravehicular activity (EVA) training in bldg 5 at the Manned Spacecraft Center (MSC). In the right background is Astronaut Charles M. Duke Jr., lunar module pilot. They are inside the Apollo Command Module Mission Simulator (31046); Mattingly (right foreground) and Duke (right backgroung) in the Apollo Command Module Mission Simulator for EVA simulation and training. Astronaut John W. Young, commander, can be seen in the left background (31047).

  13. Commande adaptive d'une machine asynchrone

    Science.gov (United States)

    Slama-Belkhodja, I.; de Fornel, B.

    1996-06-01

    The paper deals with an indirect self-tuning speed control for an induction motor supplied by a chopper-filter-inverter system. Input/Output models are identified with the recursive least squares algorithm and the controller adaptation is based on a pole assignement strategy. Emphasis is put on the evaluation of the parameter identification in order to avoid instabilities because of disturbances or insufficient excitations. This is especially of importance when the adaptive control is carried out in closed loop systems and without additional test signals. Simulation results show the improvement of the dynamic responses and the robustness against load variations or parameters variations (rotor resistance, inertia). Cat article décrit une stratégie de commande adaptive indirecte à Placement de Pôles (PP), appliquée à la commande en vitesse d'une machine asynchrone alimentée par un ensemble hacheur-filtre-onduleur de tension. L'algorithme des Moindres Carrés Récursifs (MCR) est utilisé pour l'identification des modèles de comportement type entrées/sorties. Un intérêt particulier est porté à la mise en oeuvre de cet algorithme et à la discussion de ses résultats, tenant compte des erreurs de modélisation et de la nature peu riche en excitations des entrées du processus. Différents régimes transitoires ont été simulés pour apprécier l'apport de cette association (MCR-PP) : démarrages et inversion des sens de rotation, à vide et en charges, applications d'échelons de couple résistant, variations paramétriques. Les résultats permettent d'illustrer, tant au niveau des performances que de la robustesse, l'apport d'une telle commande adaptive pour des entraînements électriques avec une machine asynchrone.

  14. A spacecraft computer repairable via command.

    Science.gov (United States)

    Fimmel, R. O.; Baker, T. E.

    1971-01-01

    The MULTIPAC is a central data system developed for deep-space probes with the distinctive feature that it may be repaired during flight via command and telemetry links by reprogramming around the failed unit. The computer organization uses pools of identical modules which the program organizes into one or more computers called processors. The interaction of these modules is dynamically controlled by the program rather than hardware. In the event of a failure, new programs are entered which reorganize the central data system with a somewhat reduced total processing capability aboard the spacecraft. Emphasis is placed on the evolution of the system architecture and the final overall system design rather than the specific logic design.

  15. Post-Soviet nuclear command and security

    International Nuclear Information System (INIS)

    Garwin, R.L.

    1992-01-01

    Traditionally, any nuclear command system must reckon with conflicting requirements. The system must ensure that weapons will be launched reliably when ordered, a goal known as positive control. But negative control, ensuring that the weapons will not be used without an authentic order, is also essential. These goals are often in tension; steps to make it more difficult to launch without authorization can make it less certain that weapons will be launched when desired, and vice versa. The balance struck between the two naturally shifts, with increased emphasis on negative control in peacetime, and on positive control in a major crisis. Under present circumstances, with virtually no threat of deliberate nuclear attack, both the US and Russia should be putting their emphasis overwhelmingly on ensuring negative control

  16. Is There a Need For a Joint Reserve Components Command?

    Science.gov (United States)

    2013-03-01

    Bravo Zulu ”. If these words were heard by a Soldier, it might be interpreted as poor performance. By having one organization as a single source for...Commander, Joint Reserve Components Command. Creation of the JRCC would, in time, strengthen partnerships between the reserve components of each

  17. COMMAND-AND-CONTROL AND MANAGEMENT DECISION MAKING,

    Science.gov (United States)

    Reports that the development of command-and-con trol systems in support of decision making and action taking has been accomplished by military...methods applicable to management systems. Concludes that the command-and-control type system for top management decision making is a man-machine system having as its core an on going, dynamic operation. (Author)

  18. The use of augmented reality in command and control situation ...

    African Journals Online (AJOL)

    This study identifies possible uses of augmented reality in command and control applications with specific attention to situation awareness in the South African context. Applications across the different command and control functions, as well as at the different levels of military operations are considered. The article concludes ...

  19. 32 CFR 809a.10 - Military commanders' responsibilities.

    Science.gov (United States)

    2010-07-01

    ... authorities as soon as possible. (c) Military forces will ordinarily exercise police powers previously... 32 National Defense 6 2010-07-01 2010-07-01 false Military commanders' responsibilities. 809a.10... Disturbance Intervention and Disaster Assistance § 809a.10 Military commanders' responsibilities. (a...

  20. Fit for Command: Military Leadership Attributes for Small Wars

    Science.gov (United States)

    2013-04-18

    Corps Command and StaffCollege Marine Corps University 2076 outh Street Marine Corps Combat Development Command Quantico, Virgin ia?? 134-5068...by the local imam to join him in the celebration of a religious Shi’a holiday .79 Just before departure to the mosque his translator informed him

  1. Development and Validation of Nigerian Army Commanding Officers ...

    African Journals Online (AJOL)

    The research adopted an ex-post-facto design based on a qualitative and quantitative analysis of data. Focus Group Discussions (FGDs) and In-Depth Interviews (IDIs) were conducted with commanding officers. The FGDs were conducted with officers purposively drawn from incumbent commanding officers in the Nigerian ...

  2. Doublet III neutral beam multi-stream command language system

    International Nuclear Information System (INIS)

    Campbell, L.; Garcia, J.R.

    1983-01-01

    A multi-stream command language system was developed to provide control of the dual source neutral beam injectors on the Doublet III experiment at GA Technologies Inc. The Neutral Beam command language system consists of three parts: compiler, sequencer, and interactive task. The command language, which was derived from the Doublet III tokamak command language, POPS, is compiled, using a recursive descent compiler, into reverse polish notation instructions which then can be executed by the sequencer task. The interactive task accepts operator commands via a keyboard. The interactive task directs the operation of three input streams, creating commands which are then executed by the sequencer. The streams correspond to the two sources within a Doublet III neutral beam, plus an interactive stream. The sequencer multiplexes the execution of instructions from these three streams. The instructions include reads and writes to an operator terminal, arithmetic computations, intrinsic functions such as CAMAC input and output, and logical instructions. The neutral beam command language system was implemented using Modular Computer Systems (ModComp) Pascal and consists of two tasks running on a ModComp Classic IV computer. The two tasks, the interactive and the sequencer, run independently and communicate using shared memory regions. The compiler runs as an overlay to the interactive task when so directed by operator commands. The system is succesfully being used to operate the three neutral beams on Doublet III

  3. 14 CFR 417.303 - Command control system requirements.

    Science.gov (United States)

    2010-01-01

    ... system must transmit a command signal that has the radio frequency characteristics and power needed for.... (c) Reliability prediction. A command control system must have a predicted reliability of 0.999 at... for each launch. Any demonstration of the system's predicted reliability must satisfy § 417.309(b). (d...

  4. Warfighter Associate: Decision Aiding and Metrics for Mission Command

    Science.gov (United States)

    2012-01-23

    Distributions: highlights the Pareto Principle -- the top 20% of the mission-command staff is heavily involved in collaborations. • Our...developing “Command Web”, a web service to support thin- client functionality (Intelligent Presentation Services enables this) Thank you

  5. Turn-based gaming for convoy commander training

    NARCIS (Netherlands)

    Boonekamp, R.C.; Muller, T.J.; Vrijer, J.C. de

    2015-01-01

    With the increasing complexity of current-day military operations, effective education and training of military commanders is of vital importance. Commanders need to perform within a broader range of conflicts; unpredictable threats and civil-military interaction place a great demand on their

  6. Irrigation and crop management in Gandak Canal command of India

    International Nuclear Information System (INIS)

    Singh, S.S.; Khan, A.R.

    2002-05-01

    The Gandak Project is one of the biggest irrigation projects in India, covering a culturable command area (CCA) of 4.44 lakh ha in U.P., 9.6 lakh ha CCA in Bihar and 0.44 lakh ha in Nepal (Singh and Khan, 2002). The total culturable command areas are 14.44 lakh hectares. The command area is located in between latitude 25 deg 40' to 27 deg 25' and longitude between 83 deg 15' to 85 deg 15'. It is a diversion project through construction of a barrage on the river Gandak. This project area covers up to five districts in the Command of Tirhut Main Canal (TMC) and 3 districts in the Saran Main Canal (SMC) command. The length of main canal is usually long (990 and 650 R.D.'s in eastern and western side, respectively) and the channels are unlined and seepage loss is quite high. (author)

  7. Defense Resource Planning Under Uncertainty: An Application of Robust Decision Making to Munitions Mix Planning

    Science.gov (United States)

    2016-02-01

    Radiation Guided Missile ATACMS Army Tactical Missile System BDA bomb damage assessment C2 command and control CALCM Conventional Air-Launched Cruise Missile...University of Michigan (undated). Figure A.1 Target Selection in WoT 5 6 7 8 9 10 8 6 8 9 10 5 6 7 8 9 10 RAND RR1112-A.1 8 9 10 2 3 3 4 5 6 7 8 9 1 10 BDA ...Follow-on strikesBDA Follow-on strikesBDA Initial strikes Targets in order of priority Follow-on strikes BDA Time Live target Killed

  8. On the Impacts and Benefits of Implementing Full-Duplex Communications Links in an Underwater Acoustic Network

    National Research Council Canada - National Science Library

    Gibson, J; Larraza, A; Rice, J; Smith, K; Xie, G

    2002-01-01

    .... These networks may provide command and control for autonomous underwater vehicles, forward reporting by arrays of sensor grids, ad hoc communications links to covert forces, or positive control...

  9. Function Activation on Intelligent Buildings Using Mobile Devices through Voice Commands

    Directory of Open Access Journals (Sweden)

    Moumtadi Fatima

    2014-04-01

    Full Text Available Development of information and communication technologies has allowed the incorporation into different areas of human activity of apps that control electrical and electronic devices through voice commands. With these apps, in telemedicine people affected by some temporary decrease in their physical capacities have improved their level of autonomy; utilities have been added to educational environments to facilitate the use of IT applications to users with physical disability; finally, home automated solutions have made possible to any person with permanent limited mobility to take control over home devices using voice commands. In this article a home automated solution, developed over a client-server principle is presented. As the client device a MIDP 2.0 cell phone with a Java MicroEdition application loaded was used; as server a web server PC was used serving also as gateway towards a Konnex network, added with a speech recognizer engine. Fully functional prototype developed allowed take control over 3 devices with 87% success of the speech recognizer reliability, this percentage improved after the use of a drop-down menu of commands displayed over the monitor.

  10. Estimation of the potential leakage of the chemical munitions based on two hydrodynamical models implemented for the Baltic Sea

    Science.gov (United States)

    Jakacki, Jaromir; Golenko, Mariya

    2014-05-01

    Two hydrodynamical models (Princeton Ocean Model (POM) and Parallel Ocean Program (POP)) have been implemented for the Baltic Sea area that consists of locations of the dumped chemical munitions during II War World. The models have been configured based on similar data source - bathymetry, initial conditions and external forces were implemented based on identical data. The horizontal resolutions of the models are also very similar. Several simulations with different initial conditions have been done. Comparison and analysis of the bottom currents from both models have been performed. Based on it estimating of the dangerous area and critical time have been done. Also lagrangian particle tracking and passive tracer were implemented and based on these results probability of the appearing dangerous doses and its time evolution have been presented. This work has been performed in the frame of the MODUM project financially supported by NATO.

  11. [The detector, the command neuron and plastic convergence].

    Science.gov (United States)

    Sokolov, E N

    1977-01-01

    The paper deals with the structure of detectors, the function of commanding neurones and the problem of relationship between detectors and commanding neurons. An example of hierarchial organization of detectors is provided by the colour analyser in which a layer of receptors, a layer of opponent neurones and a layer of colour-selective detectors are singled out. The colour detector is selectively sensitive to a certain combination of excitations at the input. If the detector is selectively activated by a certain combination of excitations at the input, the selective activation of the commanding neurone through a pool of motoneurones brings about a reaction at the output, specific in its organization. The reflexogenic zone of the reaction is determined by the detectors which converge on the commanding neurone controlling the given reaction. The plasticity of the reaction results from a plastic convergence of the detectors on the commanding neurone which controls the reaction. This comprises selective switching off the detectors from the commanding neurone (habituation) and connecting the detectors to the commanding neurone (facilitation).

  12. Doublet III neutral beam multi-stream command language system

    International Nuclear Information System (INIS)

    Campbell, L.; Garcia, J.R.

    1983-12-01

    A multi-stream command language system was developed to provide control of the dual source neutral beam injectors on the Doublet III experiment at GA Technologies Inc. The Neutral Beam command language system consists of three parts: compiler, sequencer, and interactive task. The command language, which was derived from the Doublet III tokamak command language, POPS, is compiled, using a recursive descent compiler, into reverse polish notation instructions which then can be executed by the sequencer task. The interactive task accepts operator commands via a keyboard. The interactive task directs the operation of three input streams, creating commands which are then executed by the sequencer. The streams correspond to the two sources within a Doublet III neutral beam, plus an interactive stream. The sequencer multiplexes the execution of instructions from these three streams. The instructions include reads and writes to an operator terminal, arithmetic computations, intrinsic functions such as CAMAC input and output, and logical instructions. The neutral beam command language system was implemented using Modular Computer Systems (ModComp) Pascal and consists of two tasks running on a ModComp Classic IV computer

  13. Centralized Command and Control of Theater Missile Defense: The Joint Force Missile Defense Component Coordinator

    National Research Council Canada - National Science Library

    Bucey, William H

    2006-01-01

    .... The numerous commands, decentralized command and control, and limited and expensive resources involved in TMD require changes to the joint doctrine in order to provide unity of command and economy of force...

  14. Commander manipulator scoops prestigious mulit-million pound BNFL contract

    International Nuclear Information System (INIS)

    Bailey, Andrew.

    1997-01-01

    Twenty-one Commander robotic arms are on order from INBIS (formerly Ricardo Hitec) and BNFL Engineering Limited (''BEL'', the engineering arm of parent company BNFL). The multi-million pound contract was won amid fierce competition from other well-known names in robotic engineering. The specially designed Commander manipulators will be engaged in remotely handling Intermediate Level Waste (ILW) in a suite of four BNFL ILW plants, which are currently either under construction or planned at Sellafield. The first Commander will delivered to BNFL's Sellafield Silo Emptying Project in January 1998. (Author)

  15. Remodeling Air Force Cyber Command and Control

    Science.gov (United States)

    2017-10-10

    Internet, telecommunications networks, computer systems , and embedded processors and controllers .” That last phrase includes processors and controllers ...embedded” into weapons systems , including aircraft and spacecraft. Many weapon systems were built and connected before cyberspace became a...problems for systemic improvement of mission assurance. The benefit of a centralized environment could also extend to improving enterprise-level patch

  16. Full Spectrum Operations: An Analysis of Course Content at the Command and General Staff College

    National Research Council Canada - National Science Library

    Turner, II, Frank L

    2008-01-01

    .... This monograph examined the Intermediate Level Education, the Advanced Military Studies Program, and the Tactical Commanders Development Program curricula at the Command and General Staff College...

  17. Command and Control of Space Assets Through Internet-Based Technologies Demonstrated

    Science.gov (United States)

    Foltz, David A.

    2002-01-01

    The NASA Glenn Research Center successfully demonstrated a transmission-control-protocol/ Internet-protocol- (TCP/IP) based approach to the command and control of onorbit assets over a secure network. This is a significant accomplishment because future NASA missions will benefit by using Internet-standards-based protocols. Benefits of this Internet-based space command and control system architecture include reduced mission costs and increased mission efficiency. The demonstration proved that this communications architecture is viable for future NASA missions. This demonstration was a significant feat involving multiple NASA organizations and industry. Phillip Paulsen, from Glenn's Project Development and Integration Office, served as the overall project lead, and David Foltz, from Glenn's Satellite Networks and Architectures Branch, provided the hybrid networking support for the required Internet connections. The goal was to build a network that would emulate a connection between a space experiment on the International Space Station and a researcher accessing the experiment from anywhere on the Internet, as shown. The experiment was interfaced to a wireless 802.11 network inside the demonstration area. The wireless link provided connectivity to the Tracking and Data Relay Satellite System (TDRSS) Internet Link Terminal (TILT) satellite uplink terminal located 300 ft away in a parking lot on top of a panel van. TILT provided a crucial link in this demonstration. Leslie Ambrose, NASA Goddard Space Flight Center, provided the TILT/TDRSS support. The TILT unit transmitted the signal to TDRS 6 and was received at the White Sands Second TDRSS Ground Station. This station provided the gateway to the Internet. Coordination also took place at the White Sands station to install a Veridian Firewall and automated security incident measurement (ASIM) system to the Second TDRSS Ground Station Internet gateway. The firewall provides a trusted network for the simulated space

  18. IT Security Support for Spaceport Command and Control System

    Science.gov (United States)

    McLain, Jeffrey

    2013-01-01

    During the fall 2013 semester, I worked at the Kennedy Space Center as an IT Security Intern in support of the Spaceport Command and Control System under the guidance of the IT Security Lead Engineer. Some of my responsibilities included assisting with security plan documentation collection, system hardware and software inventory, and malicious code and malware scanning. Throughout the semester, I had the opportunity to work on a wide range of security related projects. However, there are three projects in particular that stand out. The first project I completed was updating a large interactive spreadsheet that details the SANS Institutes Top 20 Critical Security Controls. My task was to add in all of the new commercial of the shelf (COTS) software listed on the SANS website that can be used to meet their Top 20 controls. In total, there are 153 unique security tools listed by SANS that meet one or more of their 20 controls. My second project was the creation of a database that will allow my mentor to keep track of the work done by the contractors that report to him in a more efficient manner by recording events as they occur throughout the quarter. Lastly, I expanded upon a security assessment of the Linux machines being used on center that I began last semester. To do this, I used a vulnerability and configuration tool that scans hosts remotely through the network and presents the user with an abundance of information detailing each machines configuration. The experience I gained from working on each of these projects has been invaluable, and I look forward to returning in the spring semester to continue working with the IT Security team.

  19. Arsenal of democracy in the face of change: Precision Guided Munitions (PGMs), their evolution and some economic considerations, Working Paper No. 4

    Energy Technology Data Exchange (ETDEWEB)

    Chester, C.V.

    1990-08-01

    A brief study was made of some of the forces driving the move to Precision Guided Munitions (PGMs), including the quest for military effectiveness, combat experience, and logistic compression. PGMs cost from a few hundred to a few thousand dollars per Kg but are tens to hundreds of times more effective than conventional munitions. A year's peacetime plateau production of each US PGM can be carried by a few C-5 aircraft. Surge quantities of PGMs are within US airlift capabilities, taking some of the risk out of off-shore procurement. The improving capability of antiaircraft PGMs and the escalating cost of combat aircraft (50 to 100-fold in constant dollars since WW II) may bring into question the economic viability of manned attack aircraft. The same may be true to a slightly lesser degree for heavy armored vehicles. 14 refs., 5 tabs.

  20. Architecting Joint Command and Control System of System Capability Certifications

    National Research Council Canada - National Science Library

    Acosta, Jacob; Hoesly, Scot; Huseth, Scott; Krider, Steven; Lamb, Jeremy; Martin, Calvin; Medina, Vince; Medina, Jorge; Nguyen, Michael; Patel, Jaykant

    2007-01-01

    Command, Control, Communications, Computers, and Intelligence (C4I) systems, each originally designed to address a single warfighting function, have been assembled into an interdependent C4I System of Systems (SoS...

  1. Acquisition and Development of System Command (SYSCOM) Technical Manuals

    National Research Council Canada - National Science Library

    2003-01-01

    ... (NAVSEA) and Space and Naval Warfare Systems Command (SPAWAR). TMs are the primary information source for technical training, installation, operation, testing, maintenance, and repair associated with NAVSEA/SPAWAR systems or equipment...

  2. The Big Issue: Command and Combat in the Information Age

    National Research Council Canada - National Science Library

    Potts, David

    2003-01-01

    This Occasional Paper considers command and combat in the information age. A small team in the British Army's conceptual "think tank," the Directorate General Development and Doctrine, worked together on this issue for 18 months...

  3. Implementing UPDM to develop command and control systems

    CSIR Research Space (South Africa)

    Oosthuizen, R

    2016-09-01

    Full Text Available Systems engineering is an established approach to develop systems, including complex sociotechnical systems such as Command and Control (C2) Systems. These systems often occur through introduction of a new technology into an existing system...

  4. U.S. Pacific Command > Organization > Organization Chart

    Science.gov (United States)

    Responsibility USPACOM Previous Commanders Organization Organization Chart Media News Flickr Photos Video Directory Media Inquiries Home : Organization : Organization Chart About DoD DoD Careers Join the Military

  5. Contract Claims Experience at the Naval Air Systems Command

    National Research Council Canada - National Science Library

    Carty, John

    1999-01-01

    ...) experienced at the Naval Air Systems Command (NAVAIR) between January 1997 and December 1998 as a means to identify areas of potential improvement in management practices which could result in reduced numbers of claims being submitted...

  6. Measuring, Monitoring, and Managing Knowledge in Command and Control Organizations

    National Research Council Canada - National Science Library

    Freeman, Jared; Weil, Shawn A; Hess, Kathleen P

    2006-01-01

    .... Iconography and interaction standards for such displays are well defined. Less attention has been paid to representing non-geographical information, such as information about the state of knowledge and decision making in a command staff...

  7. Intelligent Tutoring System for Teaching Battlefield Command Reasoning Skills

    National Research Council Canada - National Science Library

    Domeshek, Eric

    2002-01-01

    ... (ITS) for high-level battlefield command reasoning skills. The ultimate goal of this research is to develop new ITS techniques and technology for teaching skills that cannot he taught as simple methods and procedures to he followed...

  8. From Sensory Space to Motor Commands: Lessons from Saccades

    National Research Council Canada - National Science Library

    Optican, L

    2001-01-01

    .... We conclude that intrinsic brain signals might represent non-physical signals, such as desired sensory states, approximate motor drives, and distributed motor commands, rather than physical signals (e.g...

  9. Command and Control Planning and Teamwork: Exploring the Future

    National Research Council Canada - National Science Library

    Sterling, Bruce S; Lickteig, Carl W

    2000-01-01

    .... This paper examines how participant ratings of command and control planning and observer assessments of teamwork were related in a series of futuristic missions conducted by the Mounted Maneuver...

  10. Opening the Aperture... Ending Service "Branding" of US Unified Commands

    National Research Council Canada - National Science Library

    Handy, Russell

    2003-01-01

    .... It asserts that over tine, the defense establishment runs the risk of establishing a cultural identity in the command that limits perspectives to aground-, sea-, or air and space-centric viewpoint...

  11. The International Criminal Court: Considerations for the Joint Force Commander

    National Research Council Canada - National Science Library

    Sutton, Michael

    2003-01-01

    An analysis of the issues and remedies a Joint Force Commander should be concerned about because of the relationship between the United States and the newly-created International Criminal Court (ICC...

  12. Gesture Commanding of a Robot with EVA Gloves

    Data.gov (United States)

    National Aeronautics and Space Administration — Gestures commands allow a human operator to directly interact with a robot without the use of intermediary hand controllers. There are two main types of hand gesture...

  13. Should the Department of Defense Establish a Joint Corrections Command

    National Research Council Canada - National Science Library

    Evans, Thomas P

    2008-01-01

    ... and control element at the combatant command level. The military and the Coalition Provisional Authority's ability to establish a national penal system, conduct standardized training and effective prison operations to rebuild the Iraqi penal system...

  14. Joint Forward Operating Base Elements of Command and Control

    National Research Council Canada - National Science Library

    Summers, William

    2002-01-01

    ... and its associated leadership, command of air assets at a joint forward operating base lacks guidance. Today, the United States prosecutes an air war over Afghanistan from bases in Uzbekistan, Pakistan, and Afghanistan...

  15. Software and commands on VAX CERN. User's guide

    International Nuclear Information System (INIS)

    Balashov, V.K.; Trofimov, V.V.

    1990-01-01

    This guide describes a structure of applications software, which is available at VAX-type computers in JINR. The software includes program libraries, scientific programs and commands developed at CERN. 20 refs

  16. Systems Engineering Management Training at Naval Air Systems Command

    National Research Council Canada - National Science Library

    Rebel, James

    2000-01-01

    Within the past few years, the Naval Air Systems Command (NAVAIR) has undergone several major changes including an engineering reorganization from a matrix organization to an Integrated Program Team/Competency Aligned Organization (IPT/CAO...

  17. Public Affairs Capacity Building: A Soft Tool for Combatant Commanders

    National Research Council Canada - National Science Library

    Salata, Jason P

    2008-01-01

    Public affairs capacity building is a valuable soft component of the Combatant Commander's Theater Campaign Plan that builds habitual relationships, fosters transparency, and enhances the ability to shape the AOR...

  18. Comparative Research of Navy Voluntary Education at Operational Commands

    Science.gov (United States)

    2017-03-01

    into a national and international market. This is especially effects land-grant institutions who can educate the citizens within their state by...RESEARCH OF NAVY VOLUNTARY EDUCATION AT OPERATIONAL COMMANDS by Christopher B. Veenhuis March 2017 Thesis Co-Advisors: William Hatch Chad...COVERED Master’s thesis 4. TITLE AND SUBTITLE COMPARATIVE RESEARCH OF NAVY VOLUNTARY EDUCATION AT OPERATIONAL COMMANDS 5. FUNDING NUMBERS 6. AUTHOR(S

  19. The Role of the NCO Inside the BCT Command Post

    Science.gov (United States)

    2016-11-22

    formation. Doctrine 2015 introduced the importance of mission command doctrine into operations at all levels of leadership, and in the last five...utilizing tents is crucial to support the combined arms maneuver of the brigade. Physical layout of the command post can promote or hinder the ability to...equipment when a printer starting printing or a coffee maker was turned on? Understanding how PDISE configurations distribute loads in order to maintain

  20. Command Leadership DEOCS 4.1 Construct Validity Summary

    Science.gov (United States)

    2017-08-01

    Command Leadership DEOCS 4.1 Construct Validity Summary DEFENSE EQUAL OPPORTUNITY MANAGEMENT INSTITUTE...Report #15-18 1 Command Leadership DEOCS 4.1 Construct Validity Summary Background In 2014, DEOMI released DEOCS 4.0 for Department of Defense...individual items on the DEOCS. The following paper details the work conducted to modify the factor of Leadership Cohesion so that it focuses more

  1. Environmental Licensing: an Instrument of Command and Control by Exception?

    OpenAIRE

    Sleman Chams, Juliette; Gestión Ambiental de la Corporación Autónoma Regional del Atlántico-CRA, autoridad ambiental del Departamento del Atlántico,; Velásquez Muñoz, Carlos Javier; Universidad del Norte (Barranquilla)

    2016-01-01

    This article analyzes the situation of the most important instrument of command and control existing in the Colombian environmental legislation: the environmental license. Since its first formal regulation, on behalf of Decree 1753 of August 3, 1994, has received several modifications which, apparently, have made, in spite of its importance, in an instrument of command and control by exception. The article revises on the scope of each of the modifications and the justifications put forward by...

  2. Scenario design : adaptive architecture for command and control experiment eight

    OpenAIRE

    Clark, Frankie J.

    2002-01-01

    Approved for public release; distribution is unlimited. The Adaptive Architectures for Command and Control (A2C2) project is an ongoing research effort sponsored by the Office of Naval Research to explore adaptation in joint command and control. The objective of the project's eighth experiment is to study the adjustments that organizations make when they are confronted with a scenario for which their organizational is ill-suited. To accomplish this, teams will each be in one of two fundame...

  3. An analysis of Navy Recruiting Command's officer goaling models

    OpenAIRE

    Senter, Robert R.

    1990-01-01

    Approved for public release; distribution unlimited. This study examines the goaling models used by the Navy Recruiting Command for the Nurse Corps and Nuclear Propulsion Officer Candidate (NUPOC) programs. These two programs serve as representative samples for the numerous officer recruitment programs administered by the Navy Recruiting Command. The intent of the study is to analyze and validate the accuracy of the current goaling models, to ascertain factors which could improve the accur...

  4. Commands for financial data management and portfolio optimization

    OpenAIRE

    C. Alberto Dorantes

    2013-01-01

    Several econometric software offer portfolio management tools for practitioners and researchers. For example, MatLab and R offer a great variety of tools for the simulation, optimization, and analysis of financial time series. Stata, together with Mata, offers powerful programming tools for the simulation, optimization, and analysis of financial data. However, related user commands are scarce. In this presentation, commands for online market data collection, data manipulation, and financial a...

  5. Automatic-Control Challenges in Future Urban Vehicles: A Blend of Chassis, Energy and Networking Management Les défis de la commande automatique dans les futurs véhicules urbains : un mélange de gestion de châssis, d’énergie et du réseau

    Directory of Open Access Journals (Sweden)

    Savaresi S.M.

    2012-10-01

    Full Text Available The topic of this paper is the discussion of new challenges that the scientific field of automatic-control will face in the next decades, in the area of vehicles control. The focus is on urban vehicles for personal mobility, since this type of vehicles will be subject to the biggest changes in the next decades. The paper is articulated in three sections – in a top-down framework – briefly addressing and discussing the following items: the main drivers, which will force a change in urban personal mobility; the main types of vehicles, which are expected to address at best such drivers; the main automatic-control challenges on such type of vehicles. The scope of this paper is purposely non-technical. Its aim is mainly to discuss the emerging new challenges from the perspective of the automatic-control scientists and practitioners. The goal of the paper is to establish a discussion framework on the problems and opportunities, which will arise in this field, in the near future. Le sujet du présent article est une discussion sur les nouveaux défis auxquels le domaine scientifique de la commande automatique des véhicules va faire face dans les prochaines décennies. L’accent est mis sur les véhicules urbains destinés à une mobilité individuelle, puisque c’est ce type de véhicules qui va faire l’objet des plus grands changements dans les prochaines décennies. Le présent article s’articule, selon une démarche descendante, en trois sections abordant et discutant brièvement les éléments suivants : les principaux moteurs qui vont imposer un changement en matière de mobilité individuelle; les principaux types de véhicules qui sont attendus pour répondre au mieux à de tels moteurs et les principaux défis de la commande automatique sur un tel type de véhicules. À dessein, la portée du présent article est non technique. Son but est principalement de discuter les nouveaux défis émergeants, à partir de perspectives des

  6. Rapid Response Command and Control (R2C2): a systems engineering analysis of scaleable communications for Regional Combatant Commanders

    OpenAIRE

    Sullivan, Lisa; Cannon, Lennard; Reyes, Ronel; Bae, Kitan; Colgary, James; Minerowicz, Nick; Leong, Chris; Lim, Harry; Lim, Hang Sheng; Ng, Chin Chin; Neo, Tiong Tien; Tan, Guan Chye; Ng, Yu Loon; Wong, Eric; Wong, Heng Yue

    2006-01-01

    Includes supplementary material. Disaster relief operations, such as the 2005 Tsunami and Hurricane Katrina, and wartime operations, such as Operation Enduring Freedom and Operation Iraqi Freedom, have identified the need for a standardized command and control system interoperable among Joint, Coalition, and Interagency entities. The Systems Engineering Analysis Cohort 9 (SEA-9) Rapid Response Command and Control (R2C2) integrated project team completed a systems engineering (SE) ...

  7. Arsenic and Old Mustard: Chemical Problems of Old Arsenical and 'Mustard' Munitions (Joseph F. Bunnett and Marian Mikotajczyk, Eds.)

    Science.gov (United States)

    Garrett, Benjamin

    1999-10-01

    What do Knute Rockne, Notre Dame's famed football coach, and Lewisite, a chemical warfare agent dubbed "the dew of death", have in common? Both owe their discovery to Father Julius Arthur Nieuwland.1 Rockne's legacy lives on in the Fighting Irish and their tradition of excellence on the gridiron. Lewisite, together with other arsenical- and mustard-type chemical warfare agents, provide a legacy that lives on, too, but with less cheerful consequences. The book Arsenic and Old Mustard: Chemical Problems of Old Arsenical and 'Mustard' Munitions makes clear the challenges faced in dealing with those consequences. This book documents the proceedings of a workshop devoted to arsenical- and mustard-type chemical warfare agents and their associated munitions. The workshop, held in Poland in 1996, included nine lectures, eight posters, and three discussion groups; and the contents of all these are presented. Major support for the workshop came from the Scientific Affairs Division of NATO as part of on ongoing series of meetings, cooperative research projects, and related efforts dealing with problems leftover from the Cold War and, in the case of the arsenicals and mustards, from conflicts dating to World War I. These problems can be seen in contemporary accounts, including a January 1999 news report that the U.S. Department of Defense intends to survey Washington, DC, areas near both American University and the Catholic University of America (CUA), site of the original synthesis of Lewisite, for chemical warfare agents and other materials disposed at the end of World War I.2 The first nine chapters of the book present the workshop's lectures. Of these, readers interested in chemical weapon destruction might find especially useful the first chapter, in which Ron Mansley of the Organisation for the Prohibition of Chemical Weapons presents a scholarly overview covering historical aspects of the arsenicals and mustards; their production and use; prospective destruction

  8. Indonesian Automatic Speech Recognition For Command Speech Controller Multimedia Player

    Directory of Open Access Journals (Sweden)

    Vivien Arief Wardhany

    2014-12-01

    Full Text Available The purpose of multimedia devices development is controlling through voice. Nowdays voice that can be recognized only in English. To overcome the issue, then recognition using Indonesian language model and accousticc model and dictionary. Automatic Speech Recognizier is build using engine CMU Sphinx with modified english language to Indonesian Language database and XBMC used as the multimedia player. The experiment is using 10 volunteers testing items based on 7 commands. The volunteers is classifiedd by the genders, 5 Male & 5 female. 10 samples is taken in each command, continue with each volunteer perform 10 testing command. Each volunteer also have to try all 7 command that already provided. Based on percentage clarification table, the word “Kanan” had the most recognize with percentage 83% while “pilih” is the lowest one. The word which had the most wrong clarification is “kembali” with percentagee 67%, while the word “kanan” is the lowest one. From the result of Recognition Rate by male there are several command such as “Kembali”, “Utama”, “Atas “ and “Bawah” has the low Recognition Rate. Especially for “kembali” cannot be recognized as the command in the female voices but in male voice that command has 4% of RR this is because the command doesn’t have similar word in english near to “kembali” so the system unrecognize the command. Also for the command “Pilih” using the female voice has 80% of RR but for the male voice has only 4% of RR. This problem is mostly because of the different voice characteristic between adult male and female which male has lower voice frequencies (from 85 to 180 Hz than woman (165 to 255 Hz.The result of the experiment showed that each man had different number of recognition rate caused by the difference tone, pronunciation, and speed of speech. For further work needs to be done in order to improving the accouracy of the Indonesian Automatic Speech Recognition system

  9. Command History. 1967. Volume 2. Sanitized

    Science.gov (United States)

    1967-01-01

    PAGE 636 OF 1340 PAGES 4" R. E-T- th• US Mission agencies engaged in PSYOP. Soni ot thesv A’ýr,. in- cwude’ in the orijinal terms of reference, and...GVN radio and television network, which was supported jointly by MACV and USAID, was used for entertain - ment and education, and for PSYWAR as well...programs and a variety of music features (jazz, popular, country and western, and classical). 120 Television (U) In December 1965 SECDEF had approved

  10. Effective Response to Attacks On Department of Defense Computer Networks

    National Research Council Canada - National Science Library

    Shaha, Patrick

    2001-01-01

    .... For the Commanders-in-Chief (CINCs), computer networking has proven especially useful in maintaining contact and sharing data with elements forward deployed as well as with host nation governments and agencies...

  11. Munitions and Explosives of Concern Survey Methodology and In-field Testing for Wind Energy Areas on the Atlantic Outer Continental Shelf

    Science.gov (United States)

    DuVal, C.; Carton, G.; Trembanis, A. C.; Edwards, M.; Miller, J. K.

    2017-12-01

    Munitions and explosives of concern (MEC) are present in U.S. waters as a result of past and ongoing live-fire testing and training, combat operations, and sea disposal. To identify MEC that may pose a risk to human safety during development of offshore wind facilities on the Atlantic Outer Continental Shelf (OCS), the Bureau of Ocean Energy Management (BOEM) is preparing to develop guidance on risk analysis and selection processes for methods and technologies to identify MEC in Wind Energy Areas (WEA). This study developed a process for selecting appropriate technologies and methodologies for MEC detection using a synthesis of historical research, physical site characterization, remote sensing technology review, and in-field trials. Personnel were tasked with seeding a portion of the Delaware WEA with munitions surrogates, while a second group of researchers not privy to the surrogate locations tested and optimized the selected methodology to find and identify the placed targets. This in-field trial, conducted in July 2016, emphasized the use of multiple sensors for MEC detection, and led to further guidance for future MEC detection efforts on the Atlantic OCS. An April 2017 follow on study determined the fate of the munitions surrogates after the Atlantic storm season had passed. Using regional hydrodynamic models and incorporating the recommendations from the 2016 field trial, the follow on study examined the fate of the MEC and compared the findings to existing research on munitions mobility, as well as models developed as part of the Office of Naval Research Mine-Burial Program. Focus was given to characterizing the influence of sediment type on surrogate munitions behavior and the influence of mophodynamics and object burial on MEC detection. Supporting Mine-Burial models, ripple bedforms were observed to impede surrogate scour and burial in coarse sediments, while surrogate burial was both predicted and observed in finer sediments. Further, incorporation of

  12. Managing resources through stakeholder networks

    NARCIS (Netherlands)

    Ogada, Job Ochieng; Krhoda, George Okoye; Veen, Van Der Anne; Marani, Martin; Oel, van Pieter Richards

    2017-01-01

    Stakeholder analysis and social network analysis were used to analyze stakeholders’ social and structural characteristics based on their interests, influence and interactions in Lake Naivasha basin, Kenya. Even though the Kenyan government and its agencies seem to command higher influence and

  13. Communications for unattended sensor networks

    Science.gov (United States)

    Nemeroff, Jay L.; Angelini, Paul; Orpilla, Mont; Garcia, Luis; DiPierro, Stefano

    2004-07-01

    The future model of the US Army's Future Combat Systems (FCS) and the Future Force reflects a combat force that utilizes lighter armor protection than the current standard. Survival on the future battlefield will be increased by the use of advanced situational awareness provided by unattended tactical and urban sensors that detect, identify, and track enemy targets and threats. Successful implementation of these critical sensor fields requires the development of advanced sensors, sensor and data-fusion processors, and a specialized communications network. To ensure warfighter and asset survivability, the communications must be capable of near real-time dissemination of the sensor data using robust, secure, stealthy, and jam resistant links so that the proper and decisive action can be taken. Communications will be provided to a wide-array of mission-specific sensors that are capable of processing data from acoustic, magnetic, seismic, and/or Chemical, Biological, Radiological, and Nuclear (CBRN) sensors. Other, more powerful, sensor node configurations will be capable of fusing sensor data and intelligently collect and process data images from infrared or visual imaging cameras. The radio waveform and networking protocols being developed under the Soldier Level Integrated Communications Environment (SLICE) Soldier Radio Waveform (SRW) and the Networked Sensors for the Future Force Advanced Technology Demonstration are part of an effort to develop a common waveform family which will operate across multiple tactical domains including dismounted soldiers, ground sensor, munitions, missiles and robotics. These waveform technologies will ultimately be transitioned to the JTRS library, specifically the Cluster 5 requirement.

  14. ITOUGH2 command reference. Version 3.1

    International Nuclear Information System (INIS)

    Finsterle, S.

    1997-04-01

    This report contains a detailed description of all ITOUGH2 commands. It complements the ITOUGH2 User's Guide and the collection of ITOUGH2 sample problems. ITOUGH2 is a program for parameter estimation, sensitivity analysis, and uncertainty propagation analysis. It is based on the TOUGH2 simulator for non-isothermal multiphase flow in fractured and porous media. Extensive experience in using TOUGH2 is a prerequisite for using ITOUGH2. The preparation of an input file for TOUGH2 or its derivatives is described in separate manuals and is not part of this report. The ITOUGH2 user's guide summarizes the inverse modeling theory pertaining to ITOUGH2, and describes the program output. Furthermore, information about code architecture and installation are given. In Chapter 2 of this report, a brief summary of inverse modeling theory is given to restate the main concepts implemented in ITOUGH2 and to introduce certain definitions. Chapter 3 introduces the basic concepts of the ITHOUGH2 input language and the main structure of an ITOUGH2 input file. Chapter 4, the main part of this report, provides detailed descriptions of each ITOUGH2 command in alphabetical order. It is complemented by a command index in Appendix B in which the commands are given in logical order. The content of Chapter 4 is also available on-line using command it2help. Chapter 5 describes the usage of the UNIX script files for executing, checking, and terminating ITOUGH2 simulations

  15. 106-17 Telemetry Standards Recorder and Reproducer Command and Control Chapter 6

    Science.gov (United States)

    2017-07-01

    block identifiers (any ASCII text , one identifier per line) from the drive. A .BBLIST command is only valid following a declassify command. The type ... Processor Device Using IEEE 1394b ..... 6-49 6.5.6 Additional Mandatory Commands When Using Ethernet ........................... 6-54 6.5.7 Additional Non...state or magnetic disk). Not all commands (CLI or discrete) may be applicable to all types of R/R implementations. Commands are used to a) control the

  16. STS-93 Commander Collins suits up for launch

    Science.gov (United States)

    1999-01-01

    During the third launch preparations in the Operations and Checkout Building, STS-93 Commander Eileen M. Collins waves while having her launch and entry suit checked. After Space Shuttle Columbia's July 20 and 22 launch attempts were scrubbed, the launch was again rescheduled for Friday, July 23, at 12:24 a.m. EDT. STS-93 is a five-day mission primarily to release the Chandra X-ray Observatory, which will allow scientists from around the world to study some of the most distant, powerful and dynamic objects in the universe. The STS-93 crew numbers five: Commander Collins, Pilot Jeffrey S. Ashby, and Mission Specialists Stephen A. Hawley (Ph.D.), Catherine G. Coleman (Ph.D.) and Michel Tognini of France, with the Centre National d'Etudes Spatiales (CNES). Collins is the first woman to serve as commander of a shuttle mission.

  17. STS-93 Commander Eileen Collins waves to her family

    Science.gov (United States)

    1999-01-01

    STS-93 Commander Eileen M. Collins waves to her family nearby, a last meeting before launch of mission STS-93 on July 20. Liftoff is scheduled for 12:36 a.m. EDT. The primary mission of STS-93 is the release of the Chandra X-ray Observatory, which will allow scientists from around the world to study some of the most distant, powerful and dynamic objects in the universe. The new telescope is 20 to 50 times more sensitive than any previous X- ray telescope and is expected to unlock the secrets of supernovae, quasars and black holes. The STS-93 crew numbers five: Commander Collins, Pilot Jeffrey S. Ashby, and Mission Specialists Steven A. Hawley (Ph.D.), Catherine G. Coleman (Ph.D.) and Michel Tognini of France, with the Centre National d'Etudes Spatiales (CNES). Collins is the first woman to serve as commander of a shuttle mission.

  18. STS-93 Commander Eileen Collins suits up for launch

    Science.gov (United States)

    1999-01-01

    For the third time, in the Operations and Checkout Building, STS- 93 Commander Eileen M. Collins tries on her helmet with her launch and entry suit. After Space Shuttle Columbia's July 20 and 22 launch attempts were scrubbed, the launch was again rescheduled for Friday, July 23, at 12:24 a.m. EDT. STS-93 is a five-day mission primarily to release the Chandra X-ray Observatory, which will allow scientists from around the world to study some of the most distant, powerful and dynamic objects in the universe. The STS-93 crew numbers five: Commander Collins, Pilot Jeffrey S. Ashby, and Mission Specialists Stephen A. Hawley (Ph.D.), Catherine G. Coleman (Ph.D.) and Michel Tognini of France, with the Centre National d'Etudes Spatiales (CNES). Collins is the first woman to serve as commander of a shuttle mission.

  19. Modular code supervisor. Automatic generation of command language

    International Nuclear Information System (INIS)

    Dumas, M.; Thomas, J.B.

    1988-01-01

    It is shown how, starting from a problem formulated by the user, to generate the adequate calculation procedure in the command code, and acquire the data necessary for the calculation while verifying their validity. Modular codes are used, because of their flexibility and wide utilisation. Modules are written in Fortran, and calculations are done in batches according to an algorithm written in the GIBIANE command language. The action plans are based on the STRIPS and WARPLAN families. Elementary representation of a module and special instructions are illustrated. Dynamic construction macro-actions, and acquisition of the specification (which allows users to express the goal of a program without indicating which algorithm is used to reach the goal) are illustrated. The final phase consists in translating the algorithm into the command language [fr

  20. Research into command, control, and communications in space construction

    Science.gov (United States)

    Davis, Randal

    1990-01-01

    Coordinating and controlling large numbers of autonomous or semi-autonomous robot elements in a space construction activity will present problems that are very different from most command and control problems encountered in the space business. As part of our research into the feasibility of robot constructors in space, the CSC Operations Group is examining a variety of command, control, and communications (C3) issues. Two major questions being asked are: can we apply C3 techniques and technologies already developed for use in space; and are there suitable terrestrial solutions for extraterrestrial C3 problems? An overview of the control architectures, command strategies, and communications technologies that we are examining is provided and plans for simulations and demonstrations of our concepts are described.

  1. Comparison between a classical command law and a new advanced recovery command law in a MCB-ARS boost

    Science.gov (United States)

    Petit, Pierre; Saint-Eve, Frédéric; Sawicki, Jean-Paul; Aillerie, Michel

    2017-02-01

    This paper focuses on an original performed command on DC-DC boosts developed for applications in the LMOPS lab for the photovoltaic energy conversion and more specifically the Photovoltaic panels connected to HVDC smart grids. This boost, commonly named MCB-ARS (Magnetically Coupled Boost with Active Recovery Switch) presents great advantages concerning the simplicity of the command on the single constitutive switch, the global efficiency and the voltage conversion ratio. A fine analysis of the losses all over the entire converter shows that losses are not distributed uniformly in the constituting components. So a previous modification described in a previous paper consisting in the conducting assistance on the power flowing intermediate diode, performed advantageously the global efficiency. The present analysis takes into account the fact that the new configuration obtained after this important improvement looks like a classical half-bridge push-pull stage and may be controlled by a twice complementary command. In that way, a comparison has been done between a natural commutation recovery diode and an assisted switch commutation driven in a push-pull mode. As attempted, the switching command laws in charge to assume the energy transfer has been compared to the classical previous system described in anterior papers, and we demonstrate in this publication that a commutation based on a push-pull command mode within the two switches of the MCB-ARS converter is possible and increases the power transfer.

  2. Penetration Evaluation of Explosively Formed Projectiles Through Air and Water Using Insensitive Munition: Simulative and Experimental Studies

    Directory of Open Access Journals (Sweden)

    M. Ahmed

    2016-02-01

    Full Text Available The process of formation, flying, penetration of explosively-formed projectiles (EFP and the effect of water on performance of the charge for underwater applications is simulated by Ansysis Autodyn 2D-Hydro code. The main objective of an explosively formed projectile designed for underwater applications is to disintegrate the target at longer standoff distances. In this paper we have simulated the explosively formed projectile from OFHC-Copper liner for 1200 conical angle. The Affect of water on the penetration of EFP is determined by simulations from Ansysis Autodyn 2-D Hydrocode and by varying depth of water from 1CD-5CD. The depth of penetration against steel target is measured experimentally. Flash X-Ray Radiography (FXR is used to capture EFP jet formation and its penetration against target is measured by depth of penetration experiments. Simulation results are compared with experimental results. The difference in simulated and experimental results for depth of penetration is about 7 mm, which lies within favorable range of error. The jet formation captured from FXR is quite clear and jet velocity determined from Flash X-ray radiography is the same as the ones obtained by using other high explosives. Therefore, it is indicated that Insensitive Munition (8701 can be utilized instead of Polymer Bonded Explosives (PBX for air and underwater environments with great reliability and without any hazard.

  3. Benthic communities in chemical munitions dumping site areas within the Baltic deeps with special focus on nematodes

    Science.gov (United States)

    Kotwicki, Lech; Grzelak, Katarzyna; Bełdowski, Jacek

    2016-06-01

    Assessment of biological effects of chemical warfare agents (CWAs) dumped in the Baltic Sea has been one of the tasks of the Chemical Munitions Search & Assessment (CHEMSEA) project. Three sites have been selected for investigation: Bornholm Deep, Gotland Deep and Gdansk Deep. Fauna collected from these locations were compared with the reference area located between the studied regions at similar depths below 70 m. In total, four scientific cruises occurred in different seasons between 2011 and 2013. The total lack of any representatives of macrozoobenthos in all of the investigated dumping sites was noted. As a practical matter, the Baltic deeps were inhabited by nematodes as the only meiofauna representatives. Therefore, nematodes were used as a key group to explore the faunal communities inhabiting chemical dumping sites in the Baltic deeps. In total, 42 nematode genera belonging to 18 families were identified, and the dominant genus was Sabatieria (Comesomatidae), which constituted 37.6% of the overall nematode community. There were significant differences in nematode community structure (abundance and taxa composition) between the dumping areas and the reference site (Kruskal-Wallis H=30.96, pnematode assemblages could mirror the environmental conditions.

  4. Disposal of chemical agents and munitions stored at Pueblo Depot Activity, Colorado. Final, Phase 1: Environmental report

    Energy Technology Data Exchange (ETDEWEB)

    Terry, J.W.; Blasing, T.J.; Ensminger, J.T.; Johnson, R.O.; Schexnayder, S.M.; Shor, J.T.; Staub, W.P.; Tolbert, V.R.; Zimmerman, G.P.

    1995-04-01

    Under the Chemical Stockpile Disposal Program (CSDP), the US Army proposes to dispose of lethal chemical agents and munitions stored at eight existing Army installations in the continental United States. In 1988, the US Army issued the final programmatic environmental impact statement (FPEIS) for the CSDP. The FPEIS and the subsequent Record of Decision (ROD) identified an on-site disposal process as the preferred method for destruction of the stockpile. That is, the FPEIS determined the environmentally preferred alternative to be on-site disposal in high-temperature incinerators, while the ROD selected this alternative for implementation as the preferred method for destruction of the stockpile. In this Phase I report, the overall CSDP decision regarding disposal of the PUDA Stockpile is subjected to further analyses, and its validity at PUDA is reviewed with newer, more detailed data than those providing the basis for the conclusions in the FPEIS. The findings of this Phase I report will be factored into the scope of a site-specific environmental impact statement to be prepared for the destruction of the PUDA stockpile. The focus of this Phase I report is on those data identified as having the potential to alter the Army`s previous decision regarding disposal of the PUDA stockpile; however, several other factors beyond the scope of this Phase I report must also be acknowledged to have the potential to change or modify the Army`s decisions regarding PUDA.

  5. Circuit of synchronous logic for the transmission of safety commands

    International Nuclear Information System (INIS)

    Uberschlag, J.

    1969-01-01

    The author reports the development of a control-command circuit for the transmission of binary commands related to the safety of nuclear reactors. He presents the main design criteria (operation safety, provided safety level, flexibility, technical adaptation), the definition of the operation principle (inputs, logical outputs), the properties of a logic system. He evokes redundancy issues, and presents the system structure, proposes a possible sketch of the logic circuit. He describes the possible options for intermediate circuits and logic outputs, and tests to be performed

  6. Incident command linkup: the vital key for CBRN response

    International Nuclear Information System (INIS)

    Smith, D.

    2009-01-01

    The most vital element for responding emergency personnel to a CBRN attack is the incident command linkup and dissemination of information. Incident Command, the basic foundation of the National Incident Management System (NIMS), is the first thing that must be effectively established when a response is required in any emergency. When initial evaluation of the scene determines that the incident involves CBRN, specialized resources from a wide array of assets must be activated quickly to mitigate the hazards. In this paper, we examine the information that the Incident Commander must be prepared to convey to those specialized assets responding. We will also look at what questions those specialized resources may ask while en route and upon arrival. Another key element that will be discussed is the placement of those resources in the hierarchy of the National Incident Management System. The information that the Incident Commander (IC) must be prepared to convey to those specialized assets responding is crucial for an efficient response and effective deployment. What questions might those specialized CBRN resources ask while en route and upon arrival? At a bare minimum, the four basic questions of who is in charge of the incident, where is the incident located, what transpired to trigger a response, and when did the incident occur must be answered. These questions should be answered while en route to the scene so that the Commander of the responding CBRN unit can formulate a plan on the move and prepare his response accordingly. While in transit, the CBRN responders should maintain contact with a representative of the Incident Command at the scene so that the latest information is available. Discussions should include anticipated logistical requirements such as personal protective equipment (PPE), decon requirements, communications protocols, and medical care issues. The CBRN Commander will need to know if the site is secure, has it been cleared of explosive hazards

  7. Three dimensional visualization to support command and control

    International Nuclear Information System (INIS)

    Van Slambrook, G.A.

    1997-04-01

    Virtual reality concepts are changing the way one thinks about and with computers. The concepts have already proven their potential usefulness in a broad range of applications. This research was concerned with exploring and demonstrating the utility of virtual reality in robotics and satellite command and control applications. The robotics work addressed the need to quickly build accurate graphical models of physical environments by allowing a user to interactively build a model of a remote environment by superimposing stereo graphics onto live stereo video. The satellite work addressed the fusion of multiple data sets or models into one synergistic display for more effective training, design, and command and control of satellite systems

  8. Command injection attacks, continuations, and the Lambek calculus

    Directory of Open Access Journals (Sweden)

    Hayo Thielecke

    2016-06-01

    Full Text Available This paper shows connections between command injection attacks, continuations, and the Lambek calculus: certain command injections, such as the tautology attack on SQL, are shown to be a form of control effect that can be typed using the Lambek calculus, generalizing the double-negation typing of continuations. Lambek's syntactic calculus is a logic with two implicational connectives taking their arguments from the left and right, respectively. These connectives describe how strings interact with their left and right contexts when building up syntactic structures. The calculus is a form of propositional logic without structural rules, and so a forerunner of substructural logics like Linear Logic and Separation Logic.

  9. APOLLO 16 COMMANDER JOHN YOUNG ENTERS ALTITUDE CHAMBER FOR TESTS

    Science.gov (United States)

    1971-01-01

    Apollo 16 commander John W. Young prepares to enter the lunar module in an altitude chamber in the Manned Spacecraft Operations Building at the spaceport prior to an altitude run. During the altitude run, in which Apollo 16 lunar module pilot Charles M. Duke also participated, the chamber was pumped down to simulate pressure at an altitude in excess of 200,000 feet. Young, Duke and command module pilot Thomas K. Mattingly II, are training at the Kennedy Space Center for the Apollo 16 mission. Launch is scheduled from Pad 39A, March 17, 1972.

  10. Oracle Enterprise Manager 12c command-line interface

    CERN Document Server

    Pot'Vin, Kellyn; Smith, Ray

    2014-01-01

    Oracle Enterprise Manager 12c Command-Line Interface shows how to use Enterprise Manager's powerful scripting language to automate your database administration work and save time by scripting routine tasks, and then executing those scripts across collections of databases and instances in your environment. This book is chock full of ready-made scripting examples contributed by the authors and leading members of the community. For example, you'll find scripts and examples of commands to: Remove an Enterprise Manager agent and its related targetsQuickly create administrator accounts that are ful

  11. Implementing Internet of Things in a military command and control environment

    Science.gov (United States)

    Raglin, Adrienne; Metu, Somiya; Russell, Stephen; Budulas, Peter

    2017-05-01

    While the term Internet of Things (IoT) has been coined relatively recently, it has deep roots in multiple other areas of research including cyber-physical systems, pervasive and ubiquitous computing, embedded systems, mobile ad-hoc networks, wireless sensor networks, cellular networks, wearable computing, cloud computing, big data analytics, and intelligent agents. As the Internet of Things, these technologies have created a landscape of diverse heterogeneous capabilities and protocols that will require adaptive controls to effect linkages and changes that are useful to end users. In the context of military applications, it will be necessary to integrate disparate IoT devices into a common platform that necessarily must interoperate with proprietary military protocols, data structures, and systems. In this environment, IoT devices and data will not be homogeneous and provenance-controlled (i.e. single vendor/source/supplier owned). This paper presents a discussion of the challenges of integrating varied IoT devices and related software in a military environment. A review of contemporary commercial IoT protocols is given and as a practical example, a middleware implementation is proffered that provides transparent interoperability through a proactive message dissemination system. The implementation is described as a framework through which military applications can integrate and utilize commercial IoT in conjunction with existing military sensor networks and command and control (C2) systems.

  12. US Africa Command (AFRICOM) and Nigeria's National Security ...

    African Journals Online (AJOL)

    The US decision to establish a unified combatant command (AFRICOM) in African has raised numerous questions, particularly in Africa, regarding its possible security implications for the continent. The article narrows itself to the concern for unraveling the national security implications of Nigeria's opposition to the location of

  13. Commander in chief : FDR's battle with Churchill, 1943

    NARCIS (Netherlands)

    Hamilton, Charles Nigel

    2016-01-01

    Commander in Chief is een deelbiografie van president Franklin Delano Roosevelt waarin Roosevelts rol als opperbevelhebber van de gewapende strijdkrachten van de Verenigde Staten in de Tweede Wereldoorlog het hoofdthema is. Het boek concentreert zich op het jaar 1943: een jaar waaraan biografen van

  14. Interagency Cooperation for Irregular Warfare at the Combatant Command

    Science.gov (United States)

    2009-01-01

    enemy’s command capability.16 Salamoni argued that the term “irregular warfare” belies an ethnocentric perspective of conflict that will limit military...duty military staffing to form the nucleus of the organization, which would receive augmentation from additional assigned reservists and interagency

  15. NET: an inter-computer file transfer command

    International Nuclear Information System (INIS)

    Burris, R.D.

    1978-05-01

    The NET command was defined and supported in order to facilitate file transfer between computers. Among the goals of the implementation were greatest possible ease of use, maximum power (i.e., support of a diversity of equipment and operations), and protection of the operating system

  16. Commander’s Handbook on Military and Civilian Law. Revision

    Science.gov (United States)

    1992-01-01

    Cuminal Law Divio 23-8 Commander’s Handbook The accused’s possession must be knowing and conscious. Therefore, if the accused didn’t know he or she...of violence and neglect in families, for example, experiencing or witnessing abuse as a child or the stress a family experiences due to the member’s

  17. Principles of Mission Command Applied to Civil Military Relationships

    Science.gov (United States)

    2017-05-25

    to prevent tension and promote cohesive teams. While historians trace civil-military theory to Sun Tzu and Carl von Clausewitz, the beginning of...Conclusion – A Mission Command Approach .............................................................................. 34 Bibliography ...Civil-Military Relations,” Monograph, (School of Advanced Military Studies, Fort Leavenworth, KS, 2010): 3. 64 Bennett, 3. 36 Bibliography

  18. Satellite Telemetry and Command using Big LEO Mobile Telecommunications Systems

    Science.gov (United States)

    Huegel, Fred

    1998-01-01

    Various issues associated with satellite telemetry and command using Big LEO mobile telecommunications systems are presented in viewgraph form. Specific topics include: 1) Commercial Satellite system overviews: Globalstar, ICO, and Iridium; 2) System capabilities and cost reduction; 3) Satellite constellations and contact limitations; 4) Capabilities of Globalstar, ICO and Iridium with emphasis on Globalstar; and 5) Flight transceiver issues and security.

  19. Command and Control Across Space and Cyberspace Domains

    Science.gov (United States)

    2016-02-16

    debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.”16).17 From Joint...Third, push control (if not command) to the theater or operational level. Returning to the inbound ICBM scenario proposed by Maj Gen Zabel and detailed

  20. TGIN language reference manual: NAMMU and MATDIF commands

    International Nuclear Information System (INIS)

    Cliffe, K.A.; Herbert, A.W.

    1992-03-01

    NAMMU is a finite-element program for modelling groundwater flow and transport. The matrix diffusion option models the transport of radionuclides including the effects of rock-matrix diffusion. It uses the free-format structured-input TGIN. This report describes the commands in the TGIN language for running the NAMMU and MATDIF package. (author)

  1. Teaching Bibliometric Analysis and MS/DOS Commands.

    Science.gov (United States)

    Dou, Henri; And Others

    1988-01-01

    Outlines the steps involved in bibliometric studies, and demonstrates the ability to execute simple studies on microcomputers by downloading files using only the capability of MS/DOS. Detailed illustrations of the MS/DOS commands used are provided. (eight references) (CLB)

  2. STS-32 Commander Brandenstein adjusts IMAX camera during training session

    Science.gov (United States)

    1989-01-01

    STS-32 Commander Daniel C. Brandenstein adjusts IMAX camera setting during briefing and training session as technician looks on. The session was conducted in the JSC Mockup and Integration Laboratory (MAIL) Bldg 9B. The IMAX camera will be used onboard Columbia, Orbiter Vehicle (OV) 102, during the STS-32 mission.

  3. Cognitive Systems Modeling and Analysis of Command and Control Systems

    Science.gov (United States)

    Norlander, Arne

    2012-01-01

    Military operations, counter-terrorism operations and emergency response often oblige operators and commanders to operate within distributed organizations and systems for safe and effective mission accomplishment. Tactical commanders and operators frequently encounter violent threats and critical demands on cognitive capacity and reaction time. In the future they will make decisions in situations where operational and system characteristics are highly dynamic and non-linear, i.e. minor events, decisions or actions may have serious and irreversible consequences for the entire mission. Commanders and other decision makers must manage true real time properties at all levels; individual operators, stand-alone technical systems, higher-order integrated human-machine systems and joint operations forces alike. Coping with these conditions in performance assessment, system development and operational testing is a challenge for both practitioners and researchers. This paper reports on research from which the results led to a breakthrough: An integrated approach to information-centered systems analysis to support future command and control systems research development. This approach integrates several areas of research into a coherent framework, Action Control Theory (ACT). It comprises measurement techniques and methodological advances that facilitate a more accurate and deeper understanding of the operational environment, its agents, actors and effectors, generating new and updated models. This in turn generates theoretical advances. Some good examples of successful approaches are found in the research areas of cognitive systems engineering, systems theory, and psychophysiology, and in the fields of dynamic, distributed decision making and naturalistic decision making.

  4. 78 FR 24694 - Family Advocacy Command Assistance Team (FACAT)

    Science.gov (United States)

    2013-04-26

    ... be composed of personnel from appropriate disciplines, including, medicine, psychology, and child... in all allegations of child abuse and neglect. DATES: Comments must be received by June 25, 2013... multi-disciplinary Family Advocacy Command Assistant Team to respond to allegations of child sexual...

  5. 32 CFR 536.7 - Responsibilities of the Commander USARCS.

    Science.gov (United States)

    2010-07-01

    .... (s) Serve as proponent for the database management systems for torts, personnel and affirmative... ACCOUNTS CLAIMS AGAINST THE UNITED STATES The Army Claims System § 536.7 Responsibilities of the Commander... Department of Justice (DOJ) and the SA's designee is authorized. (h) Operate the “receiving State office” for...

  6. Computer-assisted command and control for Chooz B

    International Nuclear Information System (INIS)

    Anon.

    1995-01-01

    A new type of command and control system has been installed at the Chooz B nuclear power plant. A key feature of the system is a man/machine interface designed to provide operators with on-screen assistance more quickly than ever. (Author)

  7. Company Level Commander Development In The US Army

    Science.gov (United States)

    2013-12-01

    pedagogy and andragogy in instruction can have a significant positive impact on developing combat arms officers to be successful company level commanders...Recommendations to achieve these improvements using andragogy are discussed. In the United States (US) Army, when an officer...use Malcom Knowles’ andragogy framework for understanding adults as learners in order to analyze the trainees and maximize the training outcomes for

  8. 32 CFR 884.17 - Commander's instruction letter to member.

    Science.gov (United States)

    2010-07-01

    ... instruction letter to member. Subject: Instructions in Case of Release on Bail or Personal Recognizance 1. You... 32 National Defense 6 2010-07-01 2010-07-01 false Commander's instruction letter to member. 884.17... civilian custody on bail or on your own recognizance, report immediately in person or by telephone to the...

  9. Naval Sea Systems Command > Home > Warfare Centers > NSWC Corona

    Science.gov (United States)

    . Richard A. Braunbeck III Capt. Stephen H. Murray, left, salutes his relief, Capt. Richard A. Braunbeck III -321 NORCO, Calif. (Dec. 7, 2016) Capt. Stephen H. Murray, commanding officer of Naval Surface... https ): Dewin Andujar (Virtual Reality); Nicholas Manning (Maritime Capture the Flag); Stephen O'Grady

  10. Command and Control during Security Incidents/Emergencies

    Energy Technology Data Exchange (ETDEWEB)

    Knipper, W. [NSTec

    2013-10-16

    This presentation builds on our response to events that pose, or have the potential to pose, a serious security or law enforcement risk and must be responded to and controlled in a clear a decisive fashion. We will examine some common concepts in the command and control of security-centric events.

  11. 32 CFR 536.3 - Command and organizational relationships.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Command and organizational relationships. 536.3 Section 536.3 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY CLAIMS AND... relationships. (a) The Secretary of the Army. The Secretary of the Army (SA) heads the Army Claims System and...

  12. Cyber Security for the Spaceport Command and Control System: Vulnerability Management and Compliance Analysis

    Science.gov (United States)

    Gunawan, Ryan A.

    2016-01-01

    With the rapid development of the Internet, the number of malicious threats to organizations is continually increasing. In June of 2015, the United States Office of Personnel Management (OPM) had a data breach resulting in the compromise of millions of government employee records. The National Aeronautics and Space Administration (NASA) is not exempt from these attacks. Cyber security is becoming a critical facet to the discussion of moving forward with projects. The Spaceport Command and Control System (SCCS) project at the Kennedy Space Center (KSC) aims to develop the launch control system for the next generation launch vehicle in the coming decades. There are many ways to increase the security of the network it uses, from vulnerability management to ensuring operating system images are compliant with securely configured baselines recommended by the United States Government.

  13. Network performance of a wireless sensor network for temperature monitoring in vineyards

    DEFF Research Database (Denmark)

    Liscano, Ramiro; Jacoub, John Khalil; Dersingh, Anand

    2011-01-01

    Wireless sensor networks (WSNs) are an emerging technology which can be used for outdoor environmental monitoring. This paper presents challenges that arose from the development and deployment of a WSN for environmental monitoring as well as network performance analysis of this network. Different...... components in our sensor network architecture are presented like the physical nodes, the sensor node code, and two messaging protocols; one for collecting sensor and network values and the other for sensor node commands. An information model for sensor nodes to support plug-and-play capabilities in sensor...... networks is also presented....

  14. Joint Force Headquarters - Global Strike: Preserving, Advancing, and Accelerating Operational Art for the Joint Force Commander

    National Research Council Canada - National Science Library

    Kruse, Jeffrey

    2004-01-01

    ... combatant commanders. It can be viewed as infringing upon theater unity of command, a potential avenue for increased national level control and interference, and a competitor for finite warfighting resources...

  15. Global Missile Defense: The Case for a New Operational Command Structure

    National Research Council Canada - National Science Library

    Galazin, Jared J

    2005-01-01

    ...), violates the principle of unity of command. Placing components of the BMDS under the control of different combatant commanders creates unnecessary friction in a process where speed of execution is measured in seconds...

  16. American Joint Helicopter Command: Addressing a Lack of Operational Control of Rotary Assets

    National Research Council Canada - National Science Library

    Marsowicz, Brandon

    2007-01-01

    ... to achieve unity of effort. Based on the tenets of operational command and control by Milan Vego, across all services, the United States helicopter forces fare lacking operational command and control...

  17. Analysis of Recruit Attrition from the Navy's Delayed Entry Program and Recruit Training Command

    National Research Council Canada - National Science Library

    Neuhalfen, Jon K

    2007-01-01

    .... The analysis uses the PRIDE database, provided by Commander, Navy Recruiting Command. Trend analyses are used to identify significant changes in enlistment and attrition behavior for recruits who joined from fiscal years 1998 through 2005...

  18. Apollo 10 astronauts in space suits in front of Command Module

    Science.gov (United States)

    1968-01-01

    Three astronauts named as the prime crew of the Apollo 10 space mission. Left to right, are Eugene A. Cernan, lunar module pilot; John W. Young, command module pilot; and Thomas P. Stafford, commander.

  19. Should the Department of Defense Establish a Unified U.S. Logistics Command?

    National Research Council Canada - National Science Library

    Wenzel, Frank

    2008-01-01

    This monograph asserts that DoD should establish a Unified Combatant Command (COCOM)-level U.S. Logistics Command (USLOGCOM). DoD should begin a deliberate 10-20 year process to establish a USLOGCOM...

  20. Insensitive Munitions (Les Munitions a Risque Attenue)

    Science.gov (United States)

    1992-07-01

    82176talonnage des tests d’IAD, qui ont U6 calibr~s iium~riquement et exp&imentalement k laide de jauges pi~zo-r~sistives. La figure 1 donne ces courbes d...tests siont instrumnentks avec des jauges de sitions B 2214 et B 3017, malgr6 Vaecroissement ,ýurpression "irienne. des came6ras rapides (500 1 30

  1. Exploring Mechanisms Underlying Impaired Brain Function in Gulf War Illness through Advanced Network Analysis

    Science.gov (United States)

    2017-10-01

    networks of the brain responsible for visual processing, mood regulation, motor coordination, sensory processing, and language command, but increased...4    For each subject, the rsFMRI voxel time-series were temporally shifted to account for differences in slice acquisition times...responsible for visual processing, mood regulation, motor coordination, sensory processing, and language command, but increased connectivity in

  2. High Bandwidth Communications Links Between Heterogeneous Autonomous Vehicles Using Sensor Network Modeling and Extremum Control Approaches

    Science.gov (United States)

    2008-12-01

    In future network-centric warfare environments, teams of autonomous vehicles will be deployed in a coorperative manner to conduct wide-area...of data back to the command station, autonomous vehicles configured with high bandwidth communication system are positioned between the command

  3. Command and Control of the U.S. Tenth Army During the Battle of Okinawa

    Science.gov (United States)

    2009-06-12

    Army‘s XXIV Corps, commanded by Major General John R . Hodge, and the U.S. Marine Corps‘ III Amphibious Corps, commanded by Major General Roy S. Geiger...Watanabe, was activated in April 1944. Ushijima assumed command in August 1944, after Watanabe was bedridden and sent back to Japan due to chronic...great success and combat experience during the war in the Pacific. Army Major General John R . Hodge commanded the XXIV Corps. Hodge was commissioned

  4. Africa Command: U.S. Strategic Interests and the Role of the U.S. Military in Africa

    National Research Council Canada - National Science Library

    ploch, Lauren

    2007-01-01

    .... national security objectives in Africa and in its surrounding waters. U.S. military involvement on the continent is currently divided among three commands: European Command (EUCOM), Central Command (CENTCOM...

  5. Mobile infostation network technology

    Science.gov (United States)

    Rajappan, Gowri; Acharya, Joydeep; Liu, Hongbo; Mandayam, Narayan; Seskar, Ivan; Yates, Roy

    2006-05-01

    Inefficient use of network resources on the battlefield is a serious liability: if an asset communicates with the network command for data-a terrain map, for instance-it ties up the end-to-end network resources. When many such assets contend for data simultaneously, traffic is limited by the slowest link along the path from the network command to the asset. A better approach is for a local server, known as an infostation, to download data on an anticipated-need basis when the network load is low. The infostation can then dump data when needed to the assets over a high-speed wireless connection. The infostation serves the local assets over an OFDM-based wireless data link that has MIMO enhancements for high data rate and robustness. We aim for data rate in excess of 100 Mbps, spectral efficiency in excess of 5 bits/sec/Hz, and robustness to poor channel conditions and jammers. We propose an adaptive physical layer that determines power levels, modulation schemes, and the MIMO enhancements to use based on the channel state and the level of interference in the system. We also incorporate the idea of superuser: a user who is allowed preferential use of the high data rate link. We propose a MAC that allows for this priority-based bandwidth allocation scheme. The proposed infostation MAC is integrated tightly with the physical layer through a cross-layer design. We call the proposed infostation PHY, MAC, and network technology, collectively, as the Mobile Infostation Network Technology (MINT).

  6. Evaluation of the metabolic fate of munitions material (TNT & RDX) in plant systems. Initial assessment of plant DNA mutation spectra as a biomarker

    Energy Technology Data Exchange (ETDEWEB)

    Leung, F.; Cataldo, D.A.; Fellows, R.J.; Jarrell, A.E.; Harvey, S.D.

    1995-09-01

    Munitions material can enter the environment as a result of manufacturing activities and field usage. Predictor methodologies, or biomarkers would enhance evaluation of environmental impacts. The goal of this exploratory study deoxyribonucleic acid (DNA) mutation frequency as a biomarker for munitions exposure. The approach e resolution of an effective repetitive sequence probe for the identification of characteristic mutations, and (2) the development of a testing media [a clonal cell line of carrot (Daucus carota) spension cells]. Commercially available probes demonstrated marginal resolution therefore a low-C{sub o}t library was then constructed. Three colonies from the low-C{sub o}t DNA library were screened and the DNA isolates sequenced. A suspension culture of carrot (Daucus carota) was developed. A mutation spectra experiment was initiated at a 10-mg TNT/L exposure concentration with the attempt to clone over 1500 single TNT-exposed cells. Over the following six months greater than 98% of the initially isolated cells were unable to survive and produce micro calluses. The remaining calli were too few to be statistically significant and the experiment was terminated. The biomarker concept itself remains to be disproved, but the need for large numbers of uniform clones to differentiate true mutations suggest that more direct techniques using whole tissues need to be developed.

  7. Increasing Classroom Compliance: Using a High-Probability Command Sequence with Noncompliant Students

    Science.gov (United States)

    Axelrod, Michael I.; Zank, Amber J.

    2012-01-01

    Noncompliance is one of the most problematic behaviors within the school setting. One strategy to increase compliance of noncompliant students is a high-probability command sequence (HPCS; i.e., a set of simple commands in which an individual is likely to comply immediately prior to the delivery of a command that has a lower probability of…

  8. Advances in Discrete-Event Simulation for MSL Command Validation

    Science.gov (United States)

    Patrikalakis, Alexander; O'Reilly, Taifun

    2013-01-01

    In the last five years, the discrete event simulator, SEQuence GENerator (SEQGEN), developed at the Jet Propulsion Laboratory to plan deep-space missions, has greatly increased uplink operations capacity to deal with increasingly complicated missions. In this paper, we describe how the Mars Science Laboratory (MSL) project makes full use of an interpreted environment to simulate change in more than fifty thousand flight software parameters and conditional command sequences to predict the result of executing a conditional branch in a command sequence, and enable the ability to warn users whenever one or more simulated spacecraft states change in an unexpected manner. Using these new SEQGEN features, operators plan more activities in one sol than ever before.

  9. An extended SPSS extension command for generating random data

    Directory of Open Access Journals (Sweden)

    Harding, Bradley

    2015-10-01

    Full Text Available The GRD extension command for SPSS (Harding & Cousineau, 2014 has been used in a variety of applications since its inception. Ranging from a teaching tool to demonstrate statistical analyses, to an inferential tool used to find critical values instead of looking into a z-table, GRD has been very well received. However, some users have requested other data generation components that would make GRD a more complete extension command: the possibility to add contaminants to the generated dataset as well as the ability to generate correlated variables. Another component we added is a graphical user interface (or GUI that makes GRD accessible through the drop-down menus in the SPSS Data Editor window. This GUI allows users to generate a simple dataset by entering parameters in dedicated fields rather than writing out the full script. Finally, we devised a small series of exercises to help users get acquainted with the new subcommands and GUI.

  10. Plann: A command-line application for annotating plastome sequences.

    Science.gov (United States)

    Huang, Daisie I; Cronk, Quentin C B

    2015-08-01

    Plann automates the process of annotating a plastome sequence in GenBank format for either downstream processing or for GenBank submission by annotating a new plastome based on a similar, well-annotated plastome. Plann is a Perl script to be executed on the command line. Plann compares a new plastome sequence to the features annotated in a reference plastome and then shifts the intervals of any matching features to the locations in the new plastome. Plann's output can be used in the National Center for Biotechnology Information's tbl2asn to create a Sequin file for GenBank submission. Unlike Web-based annotation packages, Plann is a locally executable script that will accurately annotate a plastome sequence to a locally specified reference plastome. Because it executes from the command line, it is ready to use in other software pipelines and can be easily rerun as a draft plastome is improved.

  11. The Supreme Allied Commander’s Operational Approach

    Science.gov (United States)

    2014-05-22

    the Seine below Paris , and then began converging toward the northern line of march just below the first. A third line broke off from the second in a...toward the Seine Basin and Paris .” Therefore, in the aftermath of Goodwood Eisenhower felt both disappointed and deceived. After Goodwood, Eisenhower...command. Simultaneously, Bradley’s armies were to “[capture] Brest , [protect] the southern flank of the

  12. Spaceport Command and Control System User Interface Testing

    Science.gov (United States)

    Huesman, Jacob

    2016-01-01

    The Spaceport Command and Control System will be the National Aeronautics and Space Administration's newest system for launching commercial and government owned spacecraft. It's a large system with many parts all in need of testing. To improve upon testing already done by NASA engineers, the Engineering Directorate, Electrical Division (NE-E) of Kennedy Space Center has hired a group of interns each of the last few semesters to develop novel ways of improving the testing process.

  13. Deception Recognition: Rethinking the Operational Commander’s Approach

    Science.gov (United States)

    2010-10-27

    Understanding this cultural relativism gives us insight into intent. Social norms tend to be tacitly established and maintained through body...the concept of ―face‖ in dealing with people in a personal or professional relationship is first and foremost in the Chinese culture . The western... morality ,‖5 the operational commander can be and usually is directly affected by both political deception and MILDEC and must be able to recognize and

  14. Unified Medical Command and Control in the Department of Defense

    Science.gov (United States)

    2012-03-22

    This is the Joint Task Force – Capital Medical (JTF CAPMED ) model, in which organizations, resources, and personnel are aligned under a single...This was demonstrated in the formation of the JTF- CAPMED , designed as a 3-star level command controlling military medical activities in the National...used ground vehicles, helicopters and fixed wing aircraft for strategic casualty evacuation (CASEVAC). Enroute care is standard and critical in

  15. Manual command component with tactile and/or kinesthetic feedback

    International Nuclear Information System (INIS)

    Foumier, R.

    1995-01-01

    The invention concerns a manual command component designed to be use by a human hand in order to control a slave system, with a tactile and/or kinesthetic feedback. It is composed by a handle and by piece(s) for the feedback. The handle contains a captor to signalize the move and the speed. The signals are transmitted to the slave system. The later send feedbacks which are transformed in a couple for the handle. (TEC)

  16. Measuring Command Post Operations in a Decisive Action Training Environment

    Science.gov (United States)

    2017-05-01

    constantly changing information requirements. Having established procedures in place to handle these challenges would seem requisite for units...maintain the continuous and rapid execution of command post operations. According to FM 3-90.2, the SOPs established and rehearsed for each CP...a rehearsed plan for a possible attack on the CP, and a rehearsed plan to move the CP. The Follow Up section emphasized the necessity of debriefing

  17. Mission Command: Making it work at Battalion Level

    Science.gov (United States)

    2013-04-01

    National Training Center, CA, February 2012. 29 Litwin, G.H., and R.A.Stringer, Motivation & Organizational Climate , Harvard University Press...for Joint Land Operations, Washington, DC: Joint Staff, 29 June 2010. Litwin, George H., and Robert A. Stringer Jr., Motivation & Organizational ...interact with one another, and develop leadership competencies that strengthen the organization. Mission command as a philosophy, a system and a

  18. Benefits Of Mission Command: Balance Of Philosophy And System

    Science.gov (United States)

    2016-05-26

    Seminar Leader Charles T. Lombardo, COL ___________________________________, Director, School of Advanced Military Studies Henry A. Arnold III...Battle of Tora Bora was convoluted. Hank Crumpton, Berntsen’s supervisor at the CIA recalls speaking to Berntsen daily and to the specific request...science of mission command in execution. It has expanded to fifteen total problems with thirteen recommended solutions being material based, while twenty

  19. Empowering Globally Integrated Operations and Mission Command: Revisiting Key West

    Science.gov (United States)

    2013-03-01

    depended on coordination between commanders. Examples include Captain Thomas McDonough’s 4 U.S...Hedgehog Concept In his book, Good to Great, which describes how good organizations become great ones, Jim Collins borrows an example from an Isaiah ...that it executes with perfection—curling into a ball with its spikes outward. 62 In the words of Archilochus (first line in quotes), Isaiah Berlin

  20. A chemical reaction in the movie The Ten Commandments

    Directory of Open Access Journals (Sweden)

    López Pérez, José Pedro;

    2012-04-01

    Full Text Available The study of natural sciences in the second year of Secondary Education must be complemented with a visit to the laboratory, where experiments should be permormed. The curriculum emphasizes the initial basis of Chemistry and the study of reactions. In this paper we describe a laboratory experience, useful for understanding the concept of chemical change. Also, we present the hypothesis that a chemical reaction was used in the classic movie The Ten Commandments.

  1. Airborne Intelligence, Surveillance, and Reconnaissance: Mission Command and Centralized Control

    Science.gov (United States)

    2014-12-10

    short stint in Texas, Stuart reported to Fort Leavenworth, where he began his career as a cavalryman and found himself confronted with the torrent of...found themselves back at the War Department in a meeting with Secretary Floyd and President James Buchanan.50 The Secretary of War placed Lee in command...and Aldie. Those fights were tactical victories for the Union cavalry and Stuart had lost 500 men , but his cavalry had served its operational

  2. Headquarters, Special Operations Command, Africa Stuttgart, Germany (redacted)

    Science.gov (United States)

    2016-08-09

    make sure the boss is not stepping over the line in te1ms of reprisal." - documented that conversation on November 4, 2011, in an MFR. stated that...play nice and wait until I’m gone. Smile . Act like you’re going to work ... but ifyou continue to unde1mine my authority as a commander, I’m going to

  3. Deja vu: The Unified Command Plan of the Future Revisited

    Science.gov (United States)

    2011-05-19

    Approved for Public Release; Distribution is Unlimited Déjà vu : The Unified Command Plan of the Future Revisited A Monograph by Lieutenant...DD-MM-YYYY) 19-05-2011 2. REPORT TYPE Monograph 3. DATES COVERED (From - To) JUL 2010 – MAY 2011 4. TITLE AND SUBTITLE Déjà vu : The Unified...i SCHOOL OF ADVANCED MILITARY STUDIES MONOGRAPH APPROVAL Lieutenant Colonel Edward Francis Martignetti Title of Monograph: Déjà vu : The Unified

  4. One Among Many: Building Partner Capacity in a Multinational Command

    Science.gov (United States)

    2012-03-20

    initiative-life/ (accessed March 10, 2012). UNESCO defines literacy as “The ability to read and write with understanding a simple statement related...Nations Educational, Scientific, and Cultural Organization, “ UNESCO Institute for Statistics Glossary,” 2006, http://glossary.uis.unesco.org/glossary...Command Brief, briefing slides, Fort Polk, LA , February 8, 2012 and MAJ John A. Redford, Brigade Operations Officer, 162d Infantry Brigade, Fort

  5. Disagreement, Cognitive Command, and the Indexicality of Moral Truth

    Directory of Open Access Journals (Sweden)

    Reichardt Bastian

    2015-09-01

    Full Text Available Moral Relativism can be considered an attractive alternative to realism because relativists can make good sense of cultural and societal disagreements by seeing them as faultless. However, we can show that this advantage is made possible by systematically disagreeing with moral phenomenology. Relativists make a substantial distinction between intercultural and intracultural discourses which turns out to be incoherent. This can be shown by making use of Crispin Wright’s notion of Cognitive Command.

  6. Imagining is Not Doing but Involves Specific Motor Commands: A Review of Experimental Data Related to Motor Inhibition.

    Science.gov (United States)

    Guillot, Aymeric; Di Rienzo, Franck; Macintyre, Tadhg; Moran, Aidan; Collet, Christian

    2012-01-01

    There is now compelling evidence that motor imagery (MI) and actual movement share common neural substrate. However, the question of how MI inhibits the transmission of motor commands into the efferent pathways in order to prevent any movement is largely unresolved. Similarly, little is known about the nature of the electromyographic activity that is apparent during MI. In addressing these gaps in the literature, the present paper argues that MI includes motor execution commands for muscle contractions which are blocked at some level of the motor system by inhibitory mechanisms. We first assemble data from neuroimaging studies that demonstrate that the neural networks mediating MI and motor performance are not totally overlapping, thereby highlighting potential differences between MI and actual motor execution. We then review MI data indicating the presence of subliminal muscular activity reflecting the intrinsic characteristics of the motor command as well as increased corticomotor excitability. The third section not only considers the inhibitory mechanisms involved during MI but also examines how the brain resolves the problem of issuing the motor command for action while supervising motor inhibition when people engage in voluntary movement during MI. The last part of the paper draws on imagery research in clinical contexts to suggest that some patients move while imagining an action, although they are not aware of such movements. In particular, experimental data from amputees as well as from patients with Parkinson's disease are discussed. We also review recent studies based on comparing brain activity in tetraplegic patients with that from healthy matched controls that provide insights into inhibitory processes during MI. We conclude by arguing that based on available evidence, a multifactorial explanation of motor inhibition during MI is warranted.

  7. Imagining is not doing but involves specific motor commands: a review of experimental data related to motor inhibition

    Directory of Open Access Journals (Sweden)

    Aymeric eGuillot

    2012-09-01

    Full Text Available There is now compelling evidence that motor imagery (MI and actual movement share common neural substrate. However, the question of how MI inhibits the transmission of motor commands into the efferent pathways in order to prevent any movement is largely unresolved. Similarly, little is known about the nature of the electromyographic activity that is apparent during MI. In addressing these gaps in the literature, the present paper argues that MI includes motor execution commands for muscle contractions which are blocked at some level of the motor system by inhibitory mechanisms. We first assemble data from neuroimaging studies that demonstrate that the neural networks mediating MI and motor performance are not totally overlapping, thereby highlighting potential differences between MI and actual motor execution. We then review MI data indicating the presence of subliminal muscular activity reflecting the intrinsic characteristics of the motor command as well as increased corticomotor excitability. The third section not only considers the inhibitory mechanisms involved during MI but also examines how the brain resolves the problem of issuing the motor command for action while supervising motor inhibition when people engage in voluntary movement during MI. The last part of the paper draws on imagery research in clinical contexts to suggest that some patients move while imagining an action, although they are not aware of such movements. In particular, experimental data from amputees as well as from patients with Parkinson’s disease are discussed. We also review recent studies based on comparing brain activity in tetraplegic patients with that from healthy matched controls that provide insights into inhibitory processes during MI. We conclude by arguing that based on available evidence, a multifactorial explanation of motor inhibition during MI is warranted.

  8. An incident command system in practice and reality

    International Nuclear Information System (INIS)

    Spitzer, J.D.

    1992-01-01

    The basic organizational problems and options for forming a pollution response organization are described. Problems with multi-agency response organizations include poor coordination and lack of accountability. Alternatives to autonomous organizations operating with minimal coordination are the multi-agency/organization teams working under a controlling organization, and organizations formed into a single response organization (the incident command system or ICS). Design criteria for an ICS include flexibility as to the jurisdiction and agency, adaptable organizational structure, capability to expand in a logical manner, and uniform elements in terminology, organization, and procedures. ICS in practice is illustrated both by the CANUSLAK exercise undertaken in August 1990 and a real incident that occurred several days after the exercise was finished. CANUSLAK involved the US Coast Guard and its Canadian and Michigan counterparts in a simulated incident in the St. Clair river. The real incident was the explosion of the gasoline-carrying tank vessel Jupiter in the Saginaw River. In both instances, ICS combined many organizations into one team with a single incident commander. The eight basic components of ICS are common terminology, modular organization, integrated communications, unified command structure, consolidated action plan, manageable span of control, designated incident facilities, and comprehensive resource management. ICS has been tailored to a wide range of applications and is not only used in major disasters but as a part of routine operations. 18 refs., 5 figs

  9. STS-93 Commander Collins suits up before launch

    Science.gov (United States)

    1999-01-01

    In the Operations and Checkout Building, STS-93 Commander Eileen M. Collins gets help donning her launch and entry suit. After Space Shuttle Columbia's July 20 launch attempt was scrubbed at the T-7 second mark in the countdown, the launch was rescheduled for Thursday, July 22, at 12:28 a.m. EDT. The target landing date is July 26, 1999, at 11:24 p.m. EDT. STS-93 is a five-day mission primarily to release the Chandra X-ray Observatory, which will allow scientists from around the world to study some of the most distant, powerful and dynamic objects in the universe. The new telescope is 20 to 50 times more sensitive than any previous X- ray telescope and is expected unlock the secrets of supernovae, quasars and black holes. The STS-93 crew numbers five: Commander Collins, Pilot Jeffrey S. Ashby, and Mission Specialists Stephen A. Hawley (Ph.D.), Catherine G. Coleman (Ph.D.) and Michel Tognini of France, with the Centre National d'Etudes Spatiales (CNES). Collins is the first woman to serve as commander of a shuttle mission.

  10. STS-93 Commander Collins waves after suiting up before launch

    Science.gov (United States)

    1999-01-01

    During final launch preparations in the Operations and Checkout Building, STS-93 Commander Eileen M. Collins waves after donning her launch and entry suit. After Space Shuttle Columbia's July 20 launch attempt was scrubbed at the T-7 second mark in the countdown, the launch was rescheduled for Thursday, July 22, at 12:28 a.m. EDT. The target landing date is July 26, 1999, at 11:24 p.m. EDT. STS-93 is a five-day mission primarily to release the Chandra X-ray Observatory, which will allow scientists from around the world to study some of the most distant, powerful and dynamic objects in the universe. The new telescope is 20 to 50 times more sensitive than any previous X-ray telescope and is expected unlock the secrets of supernovae, quasars and black holes. The STS-93 crew numbers five: Commander Collins, Pilot Jeffrey S. Ashby, and Mission Specialists Stephen A. Hawley (Ph.D.), Catherine G. Coleman (Ph.D.) and Michel Tognini of France, with the Centre National d'Etudes Spatiales (CNES). Collins is the first woman to serve as commander of a shuttle mission.

  11. Environmental risk assessment of white phosphorus from the use of munitions - a probabilistic approach.

    Science.gov (United States)

    Voie, Øyvind Albert; Johnsen, Arnt; Strømseng, Arnljot; Longva, Kjetil Sager

    2010-03-15

    White phosphorus (P(4)) is a highly toxic compound used in various pyrotechnic products. Ammunitions containing P(4) are widely used in military training areas where the unburned products of P(4) contaminate soil and local ponds. Traditional risk assessment methods presuppose a homogeneous spatial distribution of pollutants. The distribution of P(4) in military training areas is heterogeneous, which reduces the probability of potential receptors being exposed to the P(4) by ingestion, for example. The current approach to assess the environmental risk from the use of P(4) suggests a Bayesian network (Bn) as a risk assessment tool. The probabilistic reasoning supported by a Bn allows us to take into account the heterogeneous distribution of P(4). Furthermore, one can combine empirical data and expert knowledge, which allows the inclusion of all kinds of data that are relevant to the problem. The current work includes an example of the use of the Bn as a risk assessment tool where the risk for P(4) poisoning in humans and grazing animals at a military shooting range in Northern Norway was calculated. P(4) was detected in several craters on the range at concentrations up to 5.7g/kg. The risk to human health was considered acceptable under the current land use. The risk for grazing animals such as sheep, however, was higher, suggesting that precautionary measures may be advisable.

  12. Implications of a Non-Unified Command System and the Need for a Unified Command System in Zambia

    Science.gov (United States)

    2015-06-12

    aspects. It has been found that Zambia’s two attempts to unify its system happened during the one party participatory democracy era. Since the coming...and its Implication for Democracy ,” in Ourselves to Know: Civil Military Relations and Defence Transformation in Southern Africa, eds. Rocky Williams...adopted a multiparty system of government under the Movement for Multi-Party Democracy (MMD) which decided to revert to independent commands. As

  13. Artificial Intelligence Applied to the Command, Control, Communications, and Intelligence of the U.S. Central Command.

    Science.gov (United States)

    1983-06-06

    these components will be presented. 4.17 °°,. CHAPTER III FOOTNOTES 1. Arron Barr and Edward A. Feigenbaum, eds., Te Handbook gf Artificial Inteligence ol...RD-R137 205 ARTIFICIAL INTELLIGENCE APPLIED TO THE COMIMAND CONTROL i/i COMMUNICATIONS RND..(U) ARMY WAR COLL CARLISLE BARRACKS U PA J N ENVART 06...appropriate mlitary servic or *swesmment aency. ARTIFICIAL INTELLIGENCE APPLIED TO THE COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE OF THE U.S. CENTRAL

  14. Study and realisation of cabled interfaces for the control and command of the Saturne cyclotron

    International Nuclear Information System (INIS)

    Devailly, Jean

    1975-01-01

    This research thesis addressed the assessment of needs, design and realisation of some hardware used by the Saturne cyclotron to solve problems of command and control while using connections developed for the Saturne's computer. After some generalities (description of Saturne, requirements and constraints, general statements about acquisitions and commands, selection of the acquisition and command system, codes), the author presents the different hardware for analog acquisitions, digital acquisitions, analog commands, digital commands, all-or-none control, simulators, amplifiers and memories. He reports some examples: magnetic measurements, control of ejection currents, programs. He finally presents the developed hardware

  15. A local network integrated into a balloon-borne apparatus

    Science.gov (United States)

    Imori, Masatosi; Ueda, Ikuo; Shimamura, Kotaro; Maeno, Tadashi; Murata, Takahiro; Sasaki, Makoto; Matsunaga, Hiroyuki; Matsumoto, Hiroshi; Shikaze, Yoshiaki; Anraku, Kazuaki; Matsui, Nagataka; Yamagami, Takamasa

    A local network is incorporated into an apparatus for a balloon-borne experiment. A balloon-borne system implemented in the apparatus is composed of subsystems interconnected through a local network, which introduces modular architecture into the system. The network decomposes the balloon-borne system into subsystems, which are similarly structured from the point of view that the systems is kept under the control of a ground station. The subsystem is functionally self-contained and electrically independent. A computer is integrated into a subsystem, keeping the subsystem under the control. An independent group of batteries, being dedicated to a subsystem, supplies the whole electricity of the subsystem. The subsystem could be turned on and off independently of the other subsystems. So communication among the subsystems needs to be based on such a protocol that could guarantee the independence of the individual subsystems. An Omninet protocol is employed to network the subsystems. A ground station sends commands to the balloon-borne system. The command is received and executed at the system, then results of the execution are returned to the ground station. Various commands are available so that the system borne on a balloon could be controlled and monitored remotely from the ground station. A subsystem responds to a specific group of commands. A command is received by a transceiver subsystem and then transferred through the network to the subsystem to which the command is addressed. Then the subsystem executes the command and returns results to the transceiver subsystem, where the results are telemetered to the ground station. The network enhances independence of the individual subsystems, which enables programs of the individual subsystems to be coded independently. Independence facilitates development and debugging of programs, improving the quality of the system borne on a balloon.

  16. THE PARTICULARITIES OF THE COST CALCULATION METHOD ON COMMANDS IN FURNITURE INDUSTRY

    Directory of Open Access Journals (Sweden)

    Felicia Sabou

    2014-10-01

    Full Text Available The paper present the importance of the method on commands in cost calculation and the particularities of the cost calculation method on commands in the furniture industry. This paper presents a hypotetical study on the method on commands, considering the observations made during 2013-2014, on how it is organized and managed accounts management using method on commands.By presenting this hypothetical model about the accounting in management accounting using the method on commands, the paper contributes to the correct application of this method in practice, specifically in management accounting in companies from the furniture industry. In my opinion the method on commands is an appropriate method for achieving management accounting for companies that have as main activity the production of furniture. When applying the method on commands in cost calculation and in management accounting, the companies must to consider the particularities of the cost calculation, in the furniture industry, like: technical and economic factors from this sector, the technical details of each command, the codification of the commands, planning materials and labor costs for each command, monitoring and recording production costs, registration of the direct costs, distribution of the indirect costs on commands, registration of the indirect costs and registration in management accounting.

  17. From Cybercrime to Cyborg Crime: Botnets as Hybrid Criminal Actor-Networks

    NARCIS (Netherlands)

    van der Wagen, Wytske; Pieters, Wolter

    2015-01-01

    Botnets, networks of infected computers controlled by a commander, increasingly play a role in a broad range of cybercrimes. Although often studied from technological perspectives, a criminological perspective could elucidate the organizational structure of botnets and how to counteract them.

  18. Complexity in the governance of tourism networks : Balancing between external pressure and internal expectations

    NARCIS (Netherlands)

    van der Zee, Egbert; Gerrets, Anne-Mara; Vanneste, Dominique

    2017-01-01

    Tourism destinations are complex systems of interrelated entities without a hierarchical chain of command. In order to enhance the ability of destinations to create a high quality, authentic tourism experience, a management perspective based on networks, personal relationships, trust, and

  19. From Cybercrime to Cyborg Crime : Botnets as Hybrid Criminal Actor-Networks

    NARCIS (Netherlands)

    van der Wagen, Wytske; Pieters, Wolter

    2015-01-01

    Botnets, networks of infected computers controlled by a commander, increasingly play a role in a broad range of cybercrimes. Although often studied from technological perspectives, a criminological perspective could elucidate the organizational structure of botnets and how to counteract them.

  20. Man/terminal interaction evaluation of computer operating system command and control service concepts. [in Spacelab

    Science.gov (United States)

    Dodson, D. W.; Shields, N. L., Jr.

    1978-01-01

    The Experiment Computer Operating System (ECOS) of the Spacelab will allow the onboard Payload Specialist to command experiment devices and display information relative to the performance of experiments. Three candidate ECOS command and control service concepts were reviewed and laboratory data on operator performance was taken for each concept. The command and control service concepts evaluated included a dedicated operator's menu display from which all command inputs were issued, a dedicated command key concept with which command inputs could be issued from any display, and a multi-display concept in which command inputs were issued from several dedicated function displays. Advantages and disadvantages are discussed in terms of training, operational errors, task performance time, and subjective comments of system operators.

  1. Launch Control Network Engineer

    Science.gov (United States)

    Medeiros, Samantha

    2017-01-01

    The Spaceport Command and Control System (SCCS) is being built at the Kennedy Space Center in order to successfully launch NASA’s revolutionary vehicle that allows humans to explore further into space than ever before. During my internship, I worked with the Network, Firewall, and Hardware teams that are all contributing to the huge SCCS network project effort. I learned the SCCS network design and the several concepts that are running in the background. I also updated and designed documentation for physical networks that are part of SCCS. This includes being able to assist and build physical installations as well as configurations. I worked with the network design for vehicle telemetry interfaces to the Launch Control System (LCS); this allows the interface to interact with other systems at other NASA locations. This network design includes the Space Launch System (SLS), Interim Cryogenic Propulsion Stage (ICPS), and the Orion Multipurpose Crew Vehicle (MPCV). I worked on the network design and implementation in the Customer Avionics Interface Development and Analysis (CAIDA) lab.

  2. Searching LOGIN, the Local Government Information Network.

    Science.gov (United States)

    Jack, Robert F.

    1984-01-01

    Describes a computer-based information retrieval and electronic messaging system produced by Control Data Corporation now being used by government agencies and other organizations. Background of Local Government Information Network (LOGIN), database structure, types of LOGIN units, searching LOGIN (intersect, display, and list commands), and how…

  3. Public Affairs Capacity Building: A Soft Tool for Combatant Commanders

    National Research Council Canada - National Science Library

    Salata, Jason P

    2008-01-01

    .... This paper examines the soft power application of public affairs capacity building, and the resultant cultivation of a public affairs social network through the lens of social network theory (nodes and ties...

  4. Somatic surveillance: corporeal control through information networks

    OpenAIRE

    Monahan, Torin; Wall, Tyler

    2007-01-01

    Somatic surveillance is the increasingly invasive technological monitoring of and intervention into body functions. Within this type of surveillance regime, bodies are recast as nodes on vast information networks, enabling corporeal control through remote network commands, automated responses, or self-management practices. In this paper, we investigate three developments in somatic surveillance: nanotechnology systems for soldiers on the battlefield, commercial body-monitoring systems for hea...

  5. The Role of a Commander in Military Lessons Learned Systems

    Directory of Open Access Journals (Sweden)

    Zenon Waliński

    2015-06-01

    Full Text Available The aim of the paper is to investigate the role of a commander in military Lessons Learned systems. In order to achieve the aim, the paper presents (1 the architecture of the Lessons Learned capabilities in the U.S. Army, NATO and the Polish Armed Forces, (2 the commander’s role in the Lessons Learned process (3 the commander’s role in fostering Lessons Learned organisation culture. The paper is based on multiple case study analysis including Lessons Learned systems in NATO, the U.S. Army and the Polish Armed Forces.

  6. Command History. 1972-1973. Volume 2. Sanitized

    Science.gov (United States)

    1973-07-15

    was de - ing processing Army DEROS flights, transporting veloped to handle the anticipated large number of baggage to and from the flight lines, and...VOLUME 11 B CIA IFIED CY 1 PAC F0 IG D EMN 0 EXE TED IF AMA NERA DE LASSIF A N EXEM E SY CINC CC \\’ opy ot󈨤 Cop~ies Iys BTAG pT ’’, 00- d 6,,’ 83-6 6-24...it nocoaam7 &WE Identity by black aiimiiw) Logistica , Support of RVNAF. Communications-Electronics, VNAF Support, Command Activities, The New Agencies

  7. Location of Microbial Ecology Evaluation Device in Apollo Command Module

    Science.gov (United States)

    1971-01-01

    The location of the Microbial Ecology Evaluation Device (MEED) installed on the open hatch of the Apollo Command Module is illustrated in this photograph. The MEED, equipment of the Microbial Response in Space Environment experiment, will house a selection of microbial systems. The MEED will be deployed during the extravehicular activity on the transearth coast phase of the Aopllo 16 lunar landing mission. The purpose of the experiment will be to measure the effects of certain space environmental parameters on the microbial test systems.

  8. India's nuclear command and control: perspectives from organisation theory

    International Nuclear Information System (INIS)

    Sasikumar, Shanmugasundaram

    2010-01-01

    Command and control of nuclear weapons was the edifice upon which great power nuclear strategy was based. Empirical Cold War research later proved that this edifice was, in fact, only a power keg. Therefore, US non-proliferation-minded analysts propounded logical reasons for their claim that new nuclear nations will be unable to demonstrate prudence in nuclear weapons management. The unique Indian case, pronounced from the organisation theory perspective, proves to the contrary. India's nuclear organisation is not a static entity; its unique strategic culture together with a political standard operating procedure for nuclear weapons management reduces the exaggerated possibility of any catastrophe. (author)

  9. Transforming Airborne Command and Control and Intelligence, Surveillance, and Reconnaissance

    Science.gov (United States)

    2012-06-01

    the US Government, Department of Defense, the United States Air Force, or Air University. In accordance with Air Force Instruction 51-303, it is not...Staff level. Lt Col Roger “Charlie” Brown offered key perspective at the Major Command level. Lt Col Herb “Weed” Maraman, Sqn Ldr Mike Lyttle...studied the feasibility of using space-based radar (SBR) platforms as well as large manned aircraft like the E-10A to meet USAF C2 and ISR operational

  10. Plant Habitat Telemetry / Command Interface and E-MIST

    Science.gov (United States)

    Walker, Uriae M.

    2013-01-01

    Plant Habitat (PH) is an experiment to be taken to the International Space Station (ISS) in 2016. It is critical that ground support computers have the ability to uplink commands to control PH, and that ISS computers have the ability to downlink PH telemetry data to ground support. This necessitates communication software that can send, receive, and process, PH specific commands and telemetry. The objective of the Plant Habitat Telemetry/ Command Interface is to provide this communication software, and to couple it with an intuitive Graphical User Interface (GUI). Initial investigation of the project objective led to the decision that code be written in C++ because of its compatibility with existing source code infrastructures and robustness. Further investigation led to a determination that multiple Ethernet packet structures would need to be created to effectively transmit data. Setting a standard for packet structures would allow us to distinguish these packets that would range from command type packets to sub categories of telemetry packets. In order to handle this range of packet types, the conclusion was made to take an object-oriented programming approach which complemented our decision to use the C++ programming language. In addition, extensive utilization of port programming concepts was required to implement the core functionality of the communication software. Also, a concrete understanding of a packet processing software was required in order to put aU the components of ISS-to-Ground Support Equipment (GSE) communication together and complete the objective. A second project discussed in this paper is Exposing Microbes to the Stratosphere (EMIST). This project exposes microbes into the stratosphere to observe how they are impacted by atmospheric effects. This paper focuses on the electrical and software expectations of the project, specifically drafting the printed circuit board, and programming the on-board sensors. The Eagle Computer-Aided Drafting

  11. Suitability of Agent Technology for Military Command and Control in the Future Combat System Environment

    Energy Technology Data Exchange (ETDEWEB)

    Potok, TE

    2003-02-13

    The U.S. Army is faced with the challenge of dramatically improving its war fighting capability through advanced technologies. Any new technology must provide significant improvement over existing technologies, yet be reliable enough to provide a fielded system. The focus of this paper is to assess the novelty and maturity of agent technology for use in the Future Combat System (FCS). The FCS concept represents the U.S. Army's ''mounted'' form of the Objective Force. This concept of vehicles, communications, and weaponry is viewed as a ''system of systems'' which includes net-centric command and control (C{sup 2}) capabilities. This networked C{sup 2} is an important transformation from the historically centralized, or platform-based, C{sup 2} function since a centralized command architecture may become a decision-making and execution bottleneck, particularly as the pace of war accelerates. A mechanism to ensure an effective network-centric C{sup 2} capacity (combining intelligence gathering and analysis available at lower levels in the military hierarchy) is needed. Achieving a networked C{sup 2} capability will require breakthroughs in current software technology. Many have proposed the use of agent technology as a potential solution. Agents are an emerging technology, and it is not yet clear whether it is suitable for addressing the networked C{sup 2} challenge, particularly in satisfying battlespace scalability, mobility, and security expectations. We have developed a set of software requirements for FCS based on military requirements for this system. We have then evaluated these software requirements against current computer science technology. This analysis provides a set of limitations in the current technology when applied to the FCS challenge. Agent technology is compared against this set of limitations to provide a means of assessing the novelty of agent technology in an FCS environment. From this analysis we

  12. Investigation on network utilization efficiency and image transmission time for the PACS network

    International Nuclear Information System (INIS)

    Tawara, K.; Nishihara, E.; Komatsu, K.I.

    1987-01-01

    The authors investigated the following features of a PACS network: (1) network utilization efficiency and (2) image transmission time. They changed the following parameters, which the two items shown above depend on: (1) transfer rate between imaging equipment and network (10 kB/econd-8 MB/second), (2) network transmission speed (100 kB/second-50 MB/second), (3) packet length (10 kB-4 MB), and (4) message length (image data) (64 kB-4 MB). As a result, a conventional-type network cannot meet a need for PACS. To solve this problem, the authors propose a multiplexed network that consists of the high-speed network for image transmission and the conventional speed of control network for commands and shorter messages. If the packet length of the image network is designed to be variable, they can choose an optimum packet length for image transmission

  13. STS-93 Commander Collins poses in front of Columbia

    Science.gov (United States)

    1999-01-01

    STS-93 Commander Eileen Collins poses in front of the Space Shuttle orbiter Columbia following her textbook landing on runway 33 at the Shuttle Landing Facility. Main gear touchdown occurred at 11:20:35 p.m. EDT on July 27. On this mission, Collins became the first woman to serve as a Shuttle commander. Also on board were her fellow STS-93 crew members: Pilot Jeffrey S. Ashby and Mission Specialists Stephen A. Hawley (Ph.D.), Catherine G. Coleman (Ph.D.) and Michel Tognini of France, with the Centre National d'Etudes Spatiales (CNES). The mission's primary objective was to deploy the Chandra X-ray Observatory, which will allow scientists from around the world to study some of the most distant, powerful and dynamic objects in the universe. This was the 95th flight in the Space Shuttle program and the 26th for Columbia. The landing was the 19th consecutive Shuttle landing in Florida and the 12th night landing in Shuttle program history.

  14. Your wish is my command programming by example

    CERN Document Server

    2001-01-01

    As user interface designers, software developers, and yes-as users, we all know the frustration that comes with using "one size fits all" software from off the shelf. Repeating the same commands over and over again, putting up with an unfriendly graphical interface, being unable to program a new application that you thought of yourself-these are all common complaints. The inflexibility of today''s computer interfaces makes many people feel like they are slaves to their computers. Shouldn''t it be the other way around? Why can''t technology give us more "custom-fitting" software? On the horizon is a new technology that promises to give ordinary users the power to create and modify their own programs. Programming by example (PBE) is a technique in which a software agent records a user''s behavior in an interactive graphical interface, then automatically writes a program that will perform that behavior for the user. Your Wish is My Command: Programming by Example takes a broad look at this new technology. In the...

  15. Data Analysis & Statistical Methods for Command File Errors

    Science.gov (United States)

    Meshkat, Leila; Waggoner, Bruce; Bryant, Larry

    2014-01-01

    This paper explains current work on modeling for managing the risk of command file errors. It is focused on analyzing actual data from a JPL spaceflight mission to build models for evaluating and predicting error rates as a function of several key variables. We constructed a rich dataset by considering the number of errors, the number of files radiated, including the number commands and blocks in each file, as well as subjective estimates of workload and operational novelty. We have assessed these data using different curve fitting and distribution fitting techniques, such as multiple regression analysis, and maximum likelihood estimation to see how much of the variability in the error rates can be explained with these. We have also used goodness of fit testing strategies and principal component analysis to further assess our data. Finally, we constructed a model of expected error rates based on the what these statistics bore out as critical drivers to the error rate. This model allows project management to evaluate the error rate against a theoretically expected rate as well as anticipate future error rates.

  16. Do domestic dogs interpret pointing as a command?

    Science.gov (United States)

    Scheider, Linda; Kaminski, Juliane; Call, Josep; Tomasello, Michael

    2013-05-01

    Domestic dogs comprehend human gestural communication flexibly, particularly the pointing gesture. Here, we examine whether dogs interpret pointing informatively, that is, as simply providing information, or rather as a command, for example, ordering them to move to a particular location. In the first study a human pointed toward an empty cup. In one manipulation, the dog either knew or did not know that the designated cup was empty (and that the other cup actually contained the food). In another manipulation, the human (as authority) either did or did not remain in the room after pointing. Dogs ignored the human's gesture if they had better information, irrespective of the authority's presence. In the second study, we varied the level of authority of the person pointing. Sometimes this person was an adult, and sometimes a young child. Dogs followed children's pointing just as frequently as they followed adults' pointing (and ignored the dishonest pointing of both), suggesting that the level of authority did not affect their behavior. Taken together these studies suggest that dogs do not see pointing as an imperative command ordering them to a particular location. It is still not totally clear, however, if they interpret it as informative or in some other way.

  17. Electronic Control System Of Home Appliances Using Speech Command Words

    Directory of Open Access Journals (Sweden)

    Aye Min Soe

    2015-06-01

    Full Text Available Abstract The main idea of this paper is to develop a speech recognition system. By using this system smart home appliances are controlled by spoken words. The spoken words chosen for recognition are Fan On Fan Off Light On Light Off TV On and TV Off. The input of the system takes speech signals to control home appliances. The proposed system has two main parts speech recognition and smart home appliances electronic control system. Speech recognition is implemented in MATLAB environment. In this process it contains two main modules feature extraction and feature matching. Mel Frequency Cepstral Coefficients MFCC is used for feature extraction. Vector Quantization VQ approach using clustering algorithm is applied for feature matching. In electrical home appliances control system RF module is used to carry command signal from PC to microcontroller wirelessly. Microcontroller is connected to driver circuit for relay and motor. The input commands are recognized very well. The system is a good performance to control home appliances by spoken words.

  18. Successful emergency operations and the Incident Command System

    International Nuclear Information System (INIS)

    Montgomery, M.

    1994-01-01

    The Incident Command System (ICS) was developed to provide an ''all-risk'' system of effective emergency scene management. The Cy-Fair Volunteer Fire Department (CFVFD) has made ICS an integral part of their operations since 1987. On January 26, 1993, CFVFD was called to investigate a petroleum odor and possible spill near State Highway 6 and Jackrabbit Road in northwest Harris County. Over the next six-hour period, the dispatch center received over 100 calls an hour regarding this incident. Personnel from CFVFD, the oil company, mutual aid fire departments, and private contractors worked around the dock to successfully contain, clean and reduce the effects of a 25,000 gallon crude oil spill next to a 141-foot diameter oil storage tank at the Satsuma Station. Among the keys to success was proper use of the Incident Command System (ICS). Problems overcome included the lack of a readily available water source, limited foam supplies, time of day, and incident duration

  19. The command to love the neighbour in Paul and the Synoptics

    Directory of Open Access Journals (Sweden)

    Heinz A. Hiestermann

    2016-03-01

    Full Text Available When sayings of Jesus are compared between the Pauline letters and the Synoptic Gospels in an attempt to locate parallels, Galatians 5:14 and Romans 13:8�10 have frequently been put forward as possible parallels to the Synoptic renditions of the great commandment of Mark 12:28�34 (Mt 22:34�40; Lk 10:25�28. These Pauline and Synoptic texts all contain the command to love the neighbour, but the Synoptic texts have added the command to love God to the command to love the neighbour. Paul never quoted the great commandment. Consequently, a relationship between the verses is normally rejected. However, not all possibilities have been explored. In the search for parallels between Pauline and Synoptic Jesus traditions it has been overlooked that Paul and Matthew render the command to love the neighbour more than once. Matthew delivers the command to love the neighbour three times. Only once he has connected it to the command to love God. Matthew renders the single command to love the neighbour twice, resembling the Pauline use of the command. Using the criteria for validating parallels between Pauline and Synoptic Jesus traditions, including verbal agreement and the unique use of the command to love the neighbour by Paul and Matthew, it is argued that a connection between Romans 13:9 and Matthew 19:18�19 is likely.Intradisciplinary and/or interdisciplinary implications: The research explores the use of Leviticus 19:18b by the New Testament authors. It is argued that the command to love the neighbour was given high prominence in the early church, as it was used by the Synoptic authors and by Paul to summarise Jesus� ethical teachings.

  20. Mission Command and JC41: Managing Chaos in a Dynamic World

    Science.gov (United States)

    2018-04-20

    doubly so, but perhaps not solely for the reasons expected. History has seen the progression of technology enable commanders and staffs to extend their...highlights the degree to which each Service embraces and codifies the mission command concept. Chapter 3 covers the history of the technologies ...Abstract Executing effective mission command has always been a challenge and in today’s technologically saturated joint operating environment is

  1. Education Requirements of Command Positions in the U.S. Border Patrol

    Science.gov (United States)

    2015-06-12

    commander. Degrees in Culinary Arts , Fashion Design, or Film Studies are thus considered as relevant and valuable for command as degrees in Border...Command and General Staff College in partial fulfillment of the requirements for the degree MASTER OF MILITARY ART AND SCIENCE Homeland Security...Z39.18 iii MASTER OF MILITARY ART AND SCIENCE THESIS APPROVAL PAGE Name of Candidate: Julio C. Peña Thesis Title: Education Requirements of

  2. Modeling and simulating command and control for organizations under extreme situations

    CERN Document Server

    Moon, Il-Chul; Kim, Tag Gon

    2013-01-01

    Commanding and controlling organizations in extreme situations is a challenging task in military, intelligence, and disaster management. Such command and control must be quick, effective, and considerate when dealing with the changing, complex, and risky conditions of the situation. To enable optimal command and control under extremes, robust structures and efficient operations are required of organizations. This work discusses how to design and conduct virtual experiments on resilient organizational structures and operational practices using modeling and simulation. The work illustrates key a

  3. PEACEKEEPING OPERATIONS MANAGEMENT. AN ANALYSIS OF CHALLENGES, CHANGES IN COMMAND ACTION AND TRAINING NEEDS

    Directory of Open Access Journals (Sweden)

    Ünsal SIĞRI

    2015-10-01

    Full Text Available The aim of this paper is to uncover emerging challenges of peacekeeping operations, determine the changes in command actions and its effects on the professional preparation of commanders by analyzing experiences of military officers. To that end the research data were collected by means of structured face-to- face interviews with voluntary participation of fourteen officers, who took charge in various peacekeeping operations. The collected data were analyzed based on the content analysis method. Findings indicate that peacekeeping operations pose specific challenges for peacekeepers, necessitate changes in command action in terms of flexibility and new precautions in terms of preparation of commanders.

  4. Leader Behavior in a Police Command Bureaucracy: A Closer Look at the Quasi-Military Model.

    Science.gov (United States)

    Jermier, John M.; Berkes, Leslie J.

    1979-01-01

    Relationships among instrumental, supportive, and participative leader behaviors, task variability and task interdependence, and job satisfaction and organizational commitment were examined in a police command bureaucracy. (Author)

  5. Joint Force Headquarters - Global Strike: Preserving, Advancing, and Accelerating Operational Art for the Joint Force Commander

    National Research Council Canada - National Science Library

    Kruse, Jeffrey

    2004-01-01

    .... While streamlining the nation's crisis planning and execution capabilities, this innovative change to the Unified Command Plan presents several organizational and cultural challenges for the regional...

  6. Multinational Logistics: Can U.S. Commanders Continue to Function Efficiently Without It?

    National Research Council Canada - National Science Library

    Mathis, Darrell

    2003-01-01

    In today's world of terrorism, failing states, and standing possibilities of simultaneous multiple-front confrontations and peacekeeping operations, combatant commanders have not sufficiently ensured...

  7. ASTP crewmen in Apollo Command Module Trainer during training session at JSC

    Science.gov (United States)

    1975-01-01

    The three members of the American ASTP prime crew are photographed inside the Apollo Command Module (CM) trainer in a water tank in bldg 260 during water egress training at JSC. They are, left to right, Astronauts Thomas P. Stafford, commander; Vance D. Brand, command module pilot; and Donald K. Slayton, docking module pilot (23430); Slayton attaches his life preserver as he egresses an Apollo Command Module trainer in a water tank in bldg 260 during water egresss training at JSC. Astronauts Brand (on left) and Stafford have already egressed the trainer and are seated in a three-man life raft.

  8. Design and Implementation of the Automatic Assessment System for the Command and Control Specialty in Ships

    Directory of Open Access Journals (Sweden)

    Zhang Hao

    2017-01-01

    Full Text Available On the basis of analyzing the actual demand of automated assessment system for the command and control specialty in ships, the thought of the overall design of automated assessment system for the command and control specialty in ships is given, and the concrete realization methods of the user login module, test paper operation module and system maintenance module are studied and demonstrated. The proposed design idea and implementation method of automated assessment system for the command and control specialty in ships is scientific, efficient and practical, and provides reference for the exploitation of automated assessment system for the command and control specialty in ships.

  9. Predicting compliance with command hallucinations: anger, impulsivity and appraisals of voices' power and intent.

    Science.gov (United States)

    Bucci, Sandra; Birchwood, Max; Twist, Laura; Tarrier, Nicholas; Emsley, Richard; Haddock, Gillian

    2013-06-01

    Command hallucinations are experienced by 33-74% of people who experience voices, with varying levels of compliance reported. Compliance with command hallucinations can result in acts of aggression, violence, suicide and self-harm; the typical response however is non-compliance or appeasement. Two factors associated with such dangerous behaviours are anger and impulsivity, however few studies have examined their relationship with compliance to command hallucinations. The current study aimed to examine the roles of anger and impulsivity on compliance with command hallucinations in people diagnosed with a psychotic disorder. The study was a cross-sectional design and included individuals who reported auditory hallucinations in the past month. Subjects completed a variety of self-report questionnaire measures. Thirty-two people experiencing command hallucinations, from both in-patient and community settings, were included. The tendency to appraise the voice as powerful, to be impulsive, to experience anger and to regulate anger were significantly associated with compliance with command hallucinations to do harm. Two factors emerged as significant independent predictors of compliance with command hallucinations; omnipotence and impulsivity. An interaction between omnipotence and compliance with commands, via a link with impulsivity, is considered and important clinical factors in the assessment of risk when working with clients experiencing command hallucinations are recommended. The data is highly suggestive and warrants further investigation with a larger sample. Copyright © 2013 Elsevier B.V. All rights reserved.

  10. The Mac'OS X command line Unix under the hood

    CERN Document Server

    McElhearn, Kirk

    2006-01-01

    The Mac command line offers a faster, easier way to accomplish many tasks. It''s also the medium for many commands that aren''t accessible using the GUI. The Mac OS X Command Line is a clear, concise, tutorial-style introduction to all the major functionality provided by the command line. It''s also packed with information the experienced users need, including little-known shortcuts and several chapters devoted to advanced topics. This is a book to get you started, but also a book you won't soon outgrow.

  11. MAFFS and Military Support to Civil Authority: A Case Study in Command and Control

    National Research Council Canada - National Science Library

    Lindsey, Brian W

    2004-01-01

    .... Through the reconstruction of the Command and Control structure during the planning and execution phases of the Modular Airborne Fire Fighting System employment during the 2003 Southern California...

  12. Command and Control in a Joint Operational Environment: The Hybrid Control Maxim

    National Research Council Canada - National Science Library

    Becker, Mark

    2000-01-01

    Will the technology of netcentricity affect the organizational structure of joint military organizations such that the organizational hierarchy becomes flattened and the command, control, coordination...

  13. The Predictive Factors of the Promotion of Physical Activity by Air Force Squadron Commanders

    National Research Council Canada - National Science Library

    Whelan, Dana

    2001-01-01

    This research examined the relationship between beliefs about physical activity, physical activity levels, age and the promotional practices for physical activity employed by Air Force squadron commanders...

  14. Evaluation of the metabolic fate of munitions material (TNT & RDX) in plant systems and initial assessment of material interaction with plant genetic material (DNA). Initial assessment of plant DNA adducts as biomarkers

    Energy Technology Data Exchange (ETDEWEB)

    Harvey, S.D.; Clauss, T.W.; Fellows, R.J.; Cataldo, D.A.

    1995-08-01

    Genetic damage to deoxyribonucleic acid (DNA) has long been suspected of being a fundamental event leading to cancer. A variety of causal factors can result in DNA damage including photodimerization of base pairs, ionizing radiation, specific reaction of DNA with environmental pollutants, and nonspecific oxidative damage caused by the action of highly reactive oxidizing agents produced by metabolism. Because organisms depend on an unadulterated DNA template for reproduction, DNA repair mechanisms are an important defense for maintaining genomic integrity. The objective of this exploratory project was to evaluate the potential for TNT to form DNA adducts in plants. These adducts, if they exist in sufficient quantities, could be potential biomarkers of munitions exposure. The ultimate goal is to develop a simple analytical assay for the determination of blomarkers that is indicative of munitions contamination. DNA repair exists in dynamic equilibrium with DNA damage. Repair mechanisms are capable of keeping DNA damage at remarkably low concentrations provided that the repair capacity is not overwhelmed.

  15. Command Interface ASIC - Analog Interface ASIC Chip Set

    Science.gov (United States)

    Ruiz, Baldes; Jaffe, Burton; Burke, Gary; Lung, Gerald; Pixler, Gregory; Plummer, Joe; Katanyoutanant,, Sunant; Whitaker, William

    2003-01-01

    A command interface application-specific integrated circuit (ASIC) and an analog interface ASIC have been developed as a chip set for remote actuation and monitoring of a collection of switches, which can be used to control generic loads, pyrotechnic devices, and valves in a high-radiation environment. The command interface ASIC (CIA) can be used alone or in combination with the analog interface ASIC (AIA). Designed primarily for incorporation into spacecraft control systems, they are also suitable for use in high-radiation terrestrial environments (e.g., in nuclear power plants and facilities that process radioactive materials). The primary role of the CIA within a spacecraft or other power system is to provide a reconfigurable means of regulating the power bus, actuating all valves, firing all pyrotechnic devices, and controlling the switching of power to all switchable loads. The CIA is a mixed-signal (analog and digital) ASIC that includes an embedded microcontroller with supporting fault-tolerant switch control and monitoring circuitry that is capable of connecting to a redundant set of interintegrated circuit (I(sup 2)C) buses. Commands and telemetry requests are communicated to the CIA. Adherence to the I(sup 2)C bus standard helps to reduce development costs by facilitating the use of previously developed, commercially available components. The AIA is a mixed-signal ASIC that includes the analog circuitry needed to connect the CIA to a custom higher powered version of the I(sup 2)C bus. The higher-powered version is designed to enable operation with bus cables longer than those contemplated in the I(sup 2)C standard. If there are multiple higher-power I(sup 2)C-like buses, then there must an AIA between the CIA and each such bus. The AIA includes two identical interface blocks: one for the side-A I(sup 2)C clock and data buses and the other for the side B buses. All the AIAs on each side are powered from a common power converter module (PCM). Sides A and B

  16. AMO EXPRESS: A Command and Control Experiment for Crew Autonomy

    Science.gov (United States)

    Stetson, Howard K.; Frank, Jeremy; Cornelius, Randy; Haddock, Angie; Wang, Lui; Garner, Larry

    2015-01-01

    NASA is investigating a range of future human spaceflight missions, including both Mars-distance and Near Earth Object (NEO) targets. Of significant importance for these missions is the balance between crew autonomy and vehicle automation. As distance from Earth results in increasing communication delays, future crews need both the capability and authority to independently make decisions. However, small crews cannot take on all functions performed by ground today, and so vehicles must be more automated to reduce the crew workload for such missions. NASA's Advanced Exploration Systems Program funded Autonomous Mission Operations (AMO) project conducted an autonomous command and control demonstration of intelligent procedures to automatically initialize a rack onboard the International Space Station (ISS) with power and thermal interfaces, and involving core and payload command and telemetry processing, without support from ground controllers. This autonomous operations capability is enabling in scenarios such as a crew medical emergency, and representative of other spacecraft autonomy challenges. The experiment was conducted using the Expedite the Processing of Experiments for Space Station (EXPRESS) rack 7, which was located in the Port 2 location within the U.S Laboratory onboard the International Space Station (ISS). Activation and deactivation of this facility is time consuming and operationally intensive, requiring coordination of three flight control positions, 47 nominal steps, 57 commands, 276 telemetry checks, and coordination of multiple ISS systems (both core and payload). The autonomous operations concept includes a reduction of the amount of data a crew operator is required to verify during activation or de-activation, as well as integration of procedure execution status and relevant data in a single integrated display. During execution, the auto-procedures provide a step-by-step messaging paradigm and a high level status upon termination. This

  17. AN/VRC 118 Mid-Tier Networking Vehicular Radio (MNVR) and Joint Enterprise Network Manager (JENM) Early Fielding Report

    Science.gov (United States)

    2017-01-18

    requirements. The Army intends to conduct the MNVR Initial Operational Test and Evaluation ( IOT &E) with the new radio in FY21 to support a fielding decision...improve the commander’s ability to conduct mission command over the MNVR WNW mid-tier network. Network Usage During the 2016 MNVR Operational...its reliability requirement in a loaded network simulating full brigade usage . Based on the results of developmental test, the Army made

  18. The evolution of Soviet forces, strategy, and command

    International Nuclear Information System (INIS)

    Ball, D.; Bethe, H.A.; Blair, B.G.; Bracken, P.; Carter, A.B.; Dickinson, H.; Garwin, R.L.; Holloway, D.; Kendall, H.W.

    1988-01-01

    This paper reports on the evolution of Soviet forces, strategy and command. Soviet leaders have repeatedly emphasized that it would be tantamount to suicide to start a nuclear war. Mutual deterrence, however, does not make nuclear was impossible. The danger remains that a large-scale nuclear was could start inadvertently in an intense crisis, or by escalation out of a conventional war, or as an unforeseen combination of these. For these reasons crisis management has become a central issue in the United States, but the standard Soviet response to this Western interest has been to say that what is needed is crisis avoidance, not recipes for brinkmanship masquerading under another name. There is much sense in this view. Nevertheless, this demeanor does not mean that the Soviet Union has given no thought to the danger that a crisis might lead to nuclear war, only that Soviet categories for thinking about such matters differ from those employed in the United States

  19. Counting addressing method: Command addressable element and extinguishing module

    Directory of Open Access Journals (Sweden)

    Ristić Jovan D.

    2009-01-01

    Full Text Available The specific requirements that appear in addressable fire detection and alarm systems and the shortcomings of the existing addressing methods were discussed. A new method of addressing of detectors was proposed. The basic principles of addressing and responding of a called element are stated. Extinguishing module is specific subsystem in classic fire detection and alarm systems. Appearing of addressable fire detection and alarm systems didn't caused essential change in the concept of extinguishing module because of long calling period of such systems. Addressable fire security system based on counting addressing method reaches high calling rates and enables integrating of the extinguishing module in addressable system. Solutions for command addressable element and integrated extinguishing module are given in this paper. The counting addressing method was developed for specific requirements in fire detection and alarm systems, yet its speed and reliability justifies its use in the acquisition of data on slowly variable parameters under industrial conditions. .

  20. Command of active matter by topological defects and patterns

    Science.gov (United States)

    Peng, Chenhui; Turiv, Taras; Guo, Yubing; Wei, Qi-Huo; Lavrentovich, Oleg D.

    2016-11-01

    Self-propelled bacteria are marvels of nature with a potential to power dynamic materials and microsystems of the future. The challenge lies in commanding their chaotic behavior. By dispersing swimming Bacillus subtilis in a liquid crystalline environment with spatially varying orientation of the anisotropy axis, we demonstrate control over the distribution of bacterial concentration, as well as the geometry and polarity of their trajectories. Bacteria recognize subtle differences in liquid crystal deformations, engaging in bipolar swimming in regions of pure splay and bend but switching to unipolar swimming in mixed splay-bend regions. They differentiate topological defects, heading toward defects of positive topological charge and avoiding negative charges. Sensitivity of bacteria to preimposed orientational patterns represents a previously unknown facet of the interplay between hydrodynamics and topology of active matter.

  1. BASIC overlay for CAMAC data and command handling

    Energy Technology Data Exchange (ETDEWEB)

    Ciftcioglu, O [Istanbul Technical Univ. (Turkey). Inst. for Nuclear Energy

    1979-11-15

    A BASIC overlay has been developed for the BASIC language run in the PDP-11 series of computers. The overlay has particularly been wirtten for a dedicated Camac Crate Controller DC-011 from Ortec. By means of the overlay, any command comprising C, N, A, F information can easily be issued by the host system to communicate with the peripherals connected to the CAMAC system, through the CAMAC interface. The overlay is particularly useful for rather slow control systems and data handling between two different operating systems with incompatible formats for the data files having the CAMAC system as a mutual system component controllable by each of the operating systems individually. The overlay can easily be modified to be used for a Standard controller (type A-1) or any other type of dedicated controller.

  2. Motor-commands decoding using peripheral nerve signals: a review

    Science.gov (United States)

    Hong, Keum-Shik; Aziz, Nida; Ghafoor, Usman

    2018-06-01

    During the last few decades, substantial scientific and technological efforts have been focused on the development of neuroprostheses. The major emphasis has been on techniques for connecting the human nervous system with a robotic prosthesis via natural-feeling interfaces. The peripheral nerves provide access to highly processed and segregated neural command signals from the brain that can in principle be used to determine user intent and control muscles. If these signals could be used, they might allow near-natural and intuitive control of prosthetic limbs with multiple degrees of freedom. This review summarizes the history of neuroprosthetic interfaces and their ability to record from and stimulate peripheral nerves. We also discuss the types of interfaces available and their applications, the kinds of peripheral nerve signals that are used, and the algorithms used to decode them. Finally, we explore the prospects for future development in this area.

  3. Parsley: a Command-Line Parser for Astronomical Applications

    Science.gov (United States)

    Deich, William

    Parsley is a sophisticated keyword + value parser, packaged as a library of routines that offers an easy method for providing command-line arguments to programs. It makes it easy for the user to enter values, and it makes it easy for the programmer to collect and validate the user's entries. Parsley is tuned for astronomical applications: for example, dates entered in Julian, Modified Julian, calendar, or several other formats are all recognized without special effort by the user or by the programmer; angles can be entered using decimal degrees or dd:mm:ss; time-like intervals as decimal hours, hh:mm:ss, or a variety of other units. Vectors of data are accepted as readily as scalars.

  4. Spaceport Command and Control System Automated Verification Software Development

    Science.gov (United States)

    Backus, Michael W.

    2017-01-01

    For as long as we have walked the Earth, humans have always been explorers. We have visited our nearest celestial body and sent Voyager 1 beyond our solar system1 out into interstellar space. Now it is finally time for us to step beyond our home and onto another planet. The Spaceport Command and Control System (SCCS) is being developed along with the Space Launch System (SLS) to take us on a journey further than ever attempted. Within SCCS are separate subsystems and system level software, each of which have to be tested and verified. Testing is a long and tedious process, so automating it will be much more efficient and also helps to remove the possibility of human error from mission operations. I was part of a team of interns and full-time engineers who automated tests for the requirements on SCCS, and with that was able to help verify that the software systems are performing as expected.

  5. Spaceport Command and Control System - Support Software Development

    Science.gov (United States)

    Tremblay, Shayne

    2016-01-01

    The Information Architecture Support (IAS) Team, the component of the Spaceport Command and Control System (SCCS) that is in charge of all the pre-runtime data, was in need of some report features to be added to their internal web application, Information Architecture (IA). Development of these reports is crucial for the speed and productivity of the development team, as they are needed to quickly and efficiently make specific and complicated data requests against the massive IA database. These reports were being put on the back burner, as other development of IA was prioritized over them, but the need for them resulted in internships being created to fill this need. The creation of these reports required learning Ruby on Rails development, along with related web technologies, and they will continue to serve IAS and other support software teams and their IA data needs.

  6. Automation of Cassini Support Imaging Uplink Command Development

    Science.gov (United States)

    Ly-Hollins, Lisa; Breneman, Herbert H.; Brooks, Robert

    2010-01-01

    "Support imaging" is imagery requested by other Cassini science teams to aid in the interpretation of their data. The generation of the spacecraft command sequences for these images is performed by the Cassini Instrument Operations Team. The process initially established for doing this was very labor-intensive, tedious and prone to human error. Team management recognized this process as one that could easily benefit from automation. Team members were tasked to document the existing manual process, develop a plan and strategy to automate the process, implement the plan and strategy, test and validate the new automated process, and deliver the new software tools and documentation to Flight Operations for use during the Cassini extended mission. In addition to the goals of higher efficiency and lower risk in the processing of support imaging requests, an effort was made to maximize adaptability of the process to accommodate uplink procedure changes and the potential addition of new capabilities outside the scope of the initial effort.

  7. Apollo 11 Commander Armstrong Presents President With Commemorative Plaque

    Science.gov (United States)

    1974-01-01

    On June 4, 1974, 5 years after the successful Apollo 11 lunar landing mission, commander Neil Armstrong (right) presented a plaque to U.S. President Richard Milhous Nixon (left) on behalf of all people who had taken part in the space program. In making the presentation, Armstrong said 'Mr. President, you have proclaimed this week to be United States Space week in conjunction with the fifth anniversary of our first successful landing on the Moon. It is my privilege to represent my colleagues, the crewmen of projects Mercury, Gemini, Apollo, and Skylab, and the men and women of NASA, and the hundreds of thousands of Americans from across the land who contributed so mightily to the success of our efforts in space in presenting this plaque which bears the names of each individual who has had the privilege of representing this country' in a space flight. The presentation was made at the California white house in San Clemente.

  8. A neural command circuit for grooming movement control.

    Science.gov (United States)

    Hampel, Stefanie; Franconville, Romain; Simpson, Julie H; Seeds, Andrew M

    2015-09-07

    Animals perform many stereotyped movements, but how nervous systems are organized for controlling specific movements remains unclear. Here we use anatomical, optogenetic, behavioral, and physiological techniques to identify a circuit in Drosophila melanogaster that can elicit stereotyped leg movements that groom the antennae. Mechanosensory chordotonal neurons detect displacements of the antennae and excite three different classes of functionally connected interneurons, which include two classes of brain interneurons and different parallel descending neurons. This multilayered circuit is organized such that neurons within each layer are sufficient to specifically elicit antennal grooming. However, we find differences in the durations of antennal grooming elicited by neurons in the different layers, suggesting that the circuit is organized to both command antennal grooming and control its duration. As similar features underlie stimulus-induced movements in other animals, we infer the possibility of a common circuit organization for movement control that can be dissected in Drosophila.

  9. 2009 Munitions Executive Summit

    Science.gov (United States)

    2009-02-05

    ACTIVITIES Brazil: 30 - UH-60L, Blackhawk Colombia : 15 - UH-60L, Blackhawks 360 - Assorted small arms (Numerous Cases) 214 - NVDs Chile: Avenger M109A5...187.3M ISRAEL $59.3M JAPAN $35.9M UNITED ARAB EMIRATES $27.0M IRAQ $136.8M NETHERLANDS $19.5M COLOMBIA $25.3M AFGHANISTAN $593.5M Top Ten...New Systems Fielding New Non-Developmental Capabilities Modernizing Production Ammunition Protect Force (Non-lethal Non-Ammo) VLAD TASER Shoulder

  10. 2011 Munitions Executive Summit

    Science.gov (United States)

    2011-02-04

    Industrial Base • Global Competitiveness of NTIB • OSD Efficiency and Cost Reduction Initiatives • AMC Quality of Work Environment Initiative ( QWE ...USG – Industry Partnering • Industry / GOCO QWE efforts • Procurement & Contracting Timelines • IBAT / Minimum Sustaining Rates • ICAP is the

  11. Modeling and control of magnetorheological fluid dampers using neural networks

    Science.gov (United States)

    Wang, D. H.; Liao, W. H.

    2005-02-01

    Due to the inherent nonlinear nature of magnetorheological (MR) fluid dampers, one of the challenging aspects for utilizing these devices to achieve high system performance is the development of accurate models and control algorithms that can take advantage of their unique characteristics. In this paper, the direct identification and inverse dynamic modeling for MR fluid dampers using feedforward and recurrent neural networks are studied. The trained direct identification neural network model can be used to predict the damping force of the MR fluid damper on line, on the basis of the dynamic responses across the MR fluid damper and the command voltage, and the inverse dynamic neural network model can be used to generate the command voltage according to the desired damping force through supervised learning. The architectures and the learning methods of the dynamic neural network models and inverse neural network models for MR fluid dampers are presented, and some simulation results are discussed. Finally, the trained neural network models are applied to predict and control the damping force of the MR fluid damper. Moreover, validation methods for the neural network models developed are proposed and used to evaluate their performance. Validation results with different data sets indicate that the proposed direct identification dynamic model using the recurrent neural network can be used to predict the damping force accurately and the inverse identification dynamic model using the recurrent neural network can act as a damper controller to generate the command voltage when the MR fluid damper is used in a semi-active mode.

  12. Contribution to the automatic command in robotics - Application to the command by microprocessors of the articulated systems; Contribution a la commande automatique en robotique. Application a la commande par microprocesseurs des manipulateurs articules

    Energy Technology Data Exchange (ETDEWEB)

    Al Mouhamed, Mayez

    1982-01-29

    The first part of the present paper deals with the main methods of changing the coordinates for a general articulated system. After a definition of the coordinates changing, we propose a coordination system designed for easy programming of the movements. Its characteristic is to permit the action anywhere on the manipulated object. The second part deals with the force regulation problem. For this purpose we have developed a general force sensor. The informations delivered by the sensor are used by force regulators which are intended for the automatic assembly of subsystems. In the third part the dynamic problem of the articulated systems is exposed. We present a new method which allows to determine dynamic parameters from appropriate motions of the robot. These parameters are then used to implement the dynamic control. Several applications, using the powerful microprocessor INTEL 8086 and its arithmetic coprocessor 8087, are presented, in order to demonstrate the performances gained. (author) [French] Dans la premiere partie de ce memoire, nous exposons les principales methodes de changement de coordonnees pour un systeme articule general. Apres une definition adequate de ce dernier, nous proposons un systeme de coordination permettant une programmation facile des mouvements. Sa caracteristique est de prendre comme centre d'action un point quelconque de l'objet manipule. Dans la deuxieme partie, nous etudions la regulation en effort. Pour cela nous avons developpe un capteur de forces general. Les informations que delivre ce dernier sont utilisees par des regulateurs d'effort adaptes au contexte de l'assemblage automatique des pieces. Dans la troisieme partie, nous exposons une nouvelle methode de commande dynamique des systemes articules. Nous obtenons des parametres dynamiques du robot a partir de mouvements appropries. Ces derniers sont ensuite utilises dans l'elaboration des commandes. Des applications utilisant le microprocesseur INTEL 8086 avec son

  13. Networked sensors for the combat forces

    Science.gov (United States)

    Klager, Gene

    2004-11-01

    Real-time and detailed information is critical to the success of ground combat forces. Current manned reconnaissance, surveillance, and target acquisition (RSTA) capabilities are not sufficient to cover battlefield intelligence gaps, provide Beyond-Line-of-Sight (BLOS) targeting, and the ambush avoidance information necessary for combat forces operating in hostile situations, complex terrain, and conducting military operations in urban terrain. This paper describes a current US Army program developing advanced networked unmanned/unattended sensor systems to survey these gaps and provide the Commander with real-time, pertinent information. Networked Sensors for the Combat Forces plans to develop and demonstrate a new generation of low cost distributed unmanned sensor systems organic to the RSTA Element. Networked unmanned sensors will provide remote monitoring of gaps, will increase a unit"s area of coverage, and will provide the commander organic assets to complete his Battlefield Situational Awareness (BSA) picture for direct and indirect fire weapons, early warning, and threat avoidance. Current efforts include developing sensor packages for unmanned ground vehicles, small unmanned aerial vehicles, and unattended ground sensors using advanced sensor technologies. These sensors will be integrated with robust networked communications and Battle Command tools for mission planning, intelligence "reachback", and sensor data management. The network architecture design is based on a model that identifies a three-part modular design: 1) standardized sensor message protocols, 2) Sensor Data Management, and 3) Service Oriented Architecture. This simple model provides maximum flexibility for data exchange, information management and distribution. Products include: Sensor suites optimized for unmanned platforms, stationary and mobile versions of the Sensor Data Management Center, Battle Command planning tools, networked communications, and sensor management software. Details

  14. Command and Control (C2) in Joint Operations: Separate Functions, their Purpose, and Application to Battle Command in the 2lst Century

    National Research Council Canada - National Science Library

    Hampton, David

    1998-01-01

    The command and control function at the operational level is the most important operations function because it ties together the other functions at all levels of war across the range of military operations...

  15. Learning Networks, Networked Learning

    NARCIS (Netherlands)

    Sloep, Peter; Berlanga, Adriana

    2010-01-01

    Sloep, P. B., & Berlanga, A. J. (2011). Learning Networks, Networked Learning [Redes de Aprendizaje, Aprendizaje en Red]. Comunicar, XIX(37), 55-63. Retrieved from http://dx.doi.org/10.3916/C37-2011-02-05

  16. Enhancing Command Communications and Innovation with SAINT:Semantics, Adaptation, and Influence in Networked Teams

    Science.gov (United States)

    2009-02-01

    can be quickly reused to face new analytic tasks. Other humanities projects like Monk and Nema have also recently adopted Meandre. The evolutionary...keynote], Congresso Mexicano dc Com- putation Evolutiva (CONCEV), Aguas Calientes, Mexico, May, 2005. Evolutionary Tools for Human-Innovation and

  17. Building a Capabilities Network to Improve Disaster Preparation Effort in the Pacific Command Area of Responsibility

    Science.gov (United States)

    2013-06-01

    Korea, North Korea, Laos, Malaysia , the Maldives, Micronesia, Mongolia, Myanmar, Nepal, New Zealand, Palau, Papua New Guinea, the Philippines...Bangladesh, Cambodia, China, India, Indonesia, Japan, Laos, Malaysia , Mongolia, Myanmar, Nepal, North Korea, the Philippines, Singapore, South Korea...people in under- developed communities. It emphasizes proper nutrition by training families on how to eat balanced diets and the importance of

  18. Planning of Combat Operations and Command of Troops with the Aid of Network Graphs,

    Science.gov (United States)

    1985-01-14

    84033705 PAGE Bew€. e oemuse, 3. 3II. M 0o 5) 1e. cr Porn ..V . o.m 2ujrnP Vflp dot, CrnPcJ1. 816. crnP 21 .(6 6 1 7 to0 flpopepmo Imp "+ Fig. 55...following reference number 2 to first order event and we write/record with its arabic numeral inside the circle, which indicates first order event. We

  19. Time Series Modeling of Army Mission Command Communication Networks: An Event-Driven Analysis

    Science.gov (United States)

    2013-06-01

    Lehmann, D. R. (1984). How advertising affects sales: Meta- analysis of econometric results. Journal of Marketing Research , 21, 65-74. Barabási, A. L...317-357. Leone, R. P. (1983). Modeling sales-advertising relationships: An integrated time series- econometric approach. Journal of Marketing ... Research , 20, 291-295. McGrath, J. E., & Kravitz, D. A. (1982). Group research. Annual Review of Psychology, 33, 195- 230. Monge, P. R., & Contractor

  20. The Commanding Officer’s Perspective on Protecting Shipboard IT Networks

    Science.gov (United States)

    2014-09-01

    38 John Markus and Paul J. DeLia, “Jamming,” AccessScience , accessed March 22, 2014, http://accessscience.com/content/Jamming/358300. 39 Sean M...www.infoworld.com/d/security-central/fbi-worried-DOD-sold-counterfeit- cisco-gear-266. Markus, John and Paul J. DeLia. “Jamming.” AccessScience