WorldWideScience

Sample records for network command munition

  1. A Wide Area Risk Assessment Framework for Underwater Military Munitions Response

    Science.gov (United States)

    Holland, K. T.; Calantoni, J.

    2017-12-01

    Our objective was to develop a prototype statistical framework supporting Wide Area Assessment and Remedial Investigation decisions relating to the risk of unexploded ordnance and other military munitions concentrated in underwater environments. Decision making involving underwater munitions is inherently complex due to the high degree of uncertainty in the environmental conditions that force munitions responses (burial, decay, migration, etc.) and associated risks to the public. The prototype framework provides a consistent approach to accurately delineating contaminated areas at underwater munitions sites through the estimation of most probable concentrations. We adapted existing deterministic models and environmental data services for use within statistical modules that allowed the estimation of munition concentration given historic site information and environmental attributes. Ultimately this risk surface can be used to evaluate costs associated with various remediation approaches (e.g. removal, monitoring, etc.). Unfortunately, evaluation of the assessment framework was limited due to the lack of enduser data services from munition site managers. Of the 450 U.S. sites identified as having potential contamination with underwater munitions, assessment of available munitions information (including historic firing or disposal records, and recent ground-truth munitions samples) indicated very limited information in the databases. Example data types include the most probable munition types, approximate firing / disposal dates and locations, and any supportive munition survey or sampling results. However the overall technical goal to integrate trained statistical belief networks with detailed geophysical knowledge of sites, of sensors and of the underwater environment was demonstrated and should allow probabilistic estimates of the most likely outcomes and tradeoffs while managing uncertainty associated with military munitions response.

  2. A Commander in Chief's Network-Centric Odyssey

    National Research Council Canada - National Science Library

    Copley, E

    2002-01-01

    .... Each Armed Service has begun training and equipping its force using the tenets of Network-Centric Operations, but those forces come together for the first time under the combatant Commander-in-Chief...

  3. Human Systems Integration Assessment of Network Centric Command and Control

    National Research Council Canada - National Science Library

    Quashnock, Dee; Kelly, Richard T; Dunaway, John; Smillie, Robert J

    2004-01-01

    .... FORCEnet is the operational construct and architectural framework for Naval Network Centric Warfare in the information age that integrates warriors, sensors, networks, command and control, platforms...

  4. Considerations on command and response language features for a network of heterogeneous autonomous computers

    Science.gov (United States)

    Engelberg, N.; Shaw, C., III

    1984-01-01

    The design of a uniform command language to be used in a local area network of heterogeneous, autonomous nodes is considered. After examining the major characteristics of such a network, and after considering the profile of a scientist using the computers on the net as an investigative aid, a set of reasonable requirements for the command language are derived. Taking into account the possible inefficiencies in implementing a guest-layered network operating system and command language on a heterogeneous net, the authors examine command language naming, process/procedure invocation, parameter acquisition, help and response facilities, and other features found in single-node command languages, and conclude that some features may extend simply to the network case, others extend after some restrictions are imposed, and still others require modifications. In addition, it is noted that some requirements considered reasonable (user accounting reports, for example) demand further study before they can be efficiently implemented on a network of the sort described.

  5. [Network Design of the Spaceport Command and Control System

    Science.gov (United States)

    Teijeiro, Antonio

    2017-01-01

    I helped the Launch Control System (LCS) hardware team sustain the network design of the Spaceport Command and Control System. I wrote the procedure that will be used to satisfy an official hardware test for the hardware carrying data from the Launch Vehicle. I installed hardware and updated design documents in support of the ongoing development of the Spaceport Command and Control System and applied firewall experience I gained during my spring 2017 semester to inspect and create firewall security policies as requested. Finally, I completed several online courses concerning networking fundamentals and Unix operating systems.

  6. Discrete event command and control for networked teams with multiple missions

    Science.gov (United States)

    Lewis, Frank L.; Hudas, Greg R.; Pang, Chee Khiang; Middleton, Matthew B.; McMurrough, Christopher

    2009-05-01

    During mission execution in military applications, the TRADOC Pamphlet 525-66 Battle Command and Battle Space Awareness capabilities prescribe expectations that networked teams will perform in a reliable manner under changing mission requirements, varying resource availability and reliability, and resource faults. In this paper, a Command and Control (C2) structure is presented that allows for computer-aided execution of the networked team decision-making process, control of force resources, shared resource dispatching, and adaptability to change based on battlefield conditions. A mathematically justified networked computing environment is provided called the Discrete Event Control (DEC) Framework. DEC has the ability to provide the logical connectivity among all team participants including mission planners, field commanders, war-fighters, and robotic platforms. The proposed data management tools are developed and demonstrated on a simulation study and an implementation on a distributed wireless sensor network. The results show that the tasks of multiple missions are correctly sequenced in real-time, and that shared resources are suitably assigned to competing tasks under dynamically changing conditions without conflicts and bottlenecks.

  7. Using LTE Networks for UAV Command and Control Link

    DEFF Research Database (Denmark)

    Nguyen, Huan Cong; Amorim, Rafhael Medeiros de; Wigard, Jeroen

    2017-01-01

    In this paper we investigate the ability of Long-Term Evolution (LTE) network to provide coverage for Unmanned Aerial Vehicles (UAVs) in a rural area, in particular for the Command and Control (C2) downlink. The study takes into consideration the dependency of the large-scale path loss on the hei......In this paper we investigate the ability of Long-Term Evolution (LTE) network to provide coverage for Unmanned Aerial Vehicles (UAVs) in a rural area, in particular for the Command and Control (C2) downlink. The study takes into consideration the dependency of the large-scale path loss...... on the height of the UAV, which is derived from actual measurements, and a real-world cellular network layout and configuration. The results indicate that interference is the dominant factor limiting the cellular coverage for UAVs in the downlink: outage level increases from 4.2% at 1.5 m height to 51.7% at 120...

  8. 2008 Munitions Executive Summit

    Science.gov (United States)

    2008-02-21

    Improvement Initiative • Problem : • Ballistic performance • Parts Obsolescence • Producibility Issues • Solution: • Flight telemetry • Results...Reduced Manufacturing Costs, Increased reliability, Better understanding, Reduced complexity, Reduced touch labor, Reduced material costs • SATISFIED...Rocket Motor Demil R&D Technology •Munitions parts make-up: Munitions Items Disposition Action System ( MIDAS ) Training Directorate •Ammunition

  9. Optimization of Munitions Storage.

    Science.gov (United States)

    1979-12-01

    zones of land around each facility place a significant economic cost on the storage of munitions (Schreyer, 1970: 1). Munitions storage is a subject...ADDTOT, BTOTAL 353 REAL MPH,MW ,MPD, MPU ,4,MPNEW,MCD 354 IF (SW2.NE.0) GO TO 1 355 SW2 - 1 356 WRITE (6,2) 357 GO TO 3 358 1 IF (REC.EQ.0) GO TO 4 359 IF

  10. Defense Industrial Base (DIB): Munitions Realignment for 2020

    Science.gov (United States)

    2013-03-01

    munitions DIB by companies like Coca Cola , Quaker Oats, and Eastman Kodak. As industrial mobilization quickly increased, the requirements decreased...industry and the munitions DIB. This report documented the volatility associated with the production of munitions and financial risks to which

  11. Military Munitions Waste Working Group report

    International Nuclear Information System (INIS)

    1993-01-01

    This report presents the findings of the Military Munitions Waste Working Group in its effort to achieve the goals directed under the Federal Advisory Committee to Develop On-Site Innovative Technologies (DOIT Committee) for environmental restoration and waste management. The Military Munitions Waste Working Group identified the following seven areas of concern associated with the ordnance (energetics) waste stream: unexploded ordnance; stockpiled; disposed -- at known locations, i.e., disposal pits; discharged -- impact areas, unknown disposal sites; contaminated media; chemical sureties/weapons; biological weapons; munitions production; depleted uranium; and rocket motor and fuel disposal (open burn/open detonation). Because of time constraints, the Military Munitions Waste Working Group has focused on unexploded ordnance and contaminated media with the understanding that remaining waste streams will be considered as time permits. Contents of this report are as follows: executive summary; introduction; Military Munitions Waste Working Group charter; description of priority waste stream problems; shortcomings of existing approaches, processes and technologies; innovative approaches, processes and technologies, work force planning, training, and education issues relative to technology development and cleanup; criteria used to identify and screen potential demonstration projects; list of potential candidate demonstration projects for the DOIT committee decision/recommendation and appendices

  12. Military Munitions Waste Working Group report

    Energy Technology Data Exchange (ETDEWEB)

    1993-11-30

    This report presents the findings of the Military Munitions Waste Working Group in its effort to achieve the goals directed under the Federal Advisory Committee to Develop On-Site Innovative Technologies (DOIT Committee) for environmental restoration and waste management. The Military Munitions Waste Working Group identified the following seven areas of concern associated with the ordnance (energetics) waste stream: unexploded ordnance; stockpiled; disposed -- at known locations, i.e., disposal pits; discharged -- impact areas, unknown disposal sites; contaminated media; chemical sureties/weapons; biological weapons; munitions production; depleted uranium; and rocket motor and fuel disposal (open burn/open detonation). Because of time constraints, the Military Munitions Waste Working Group has focused on unexploded ordnance and contaminated media with the understanding that remaining waste streams will be considered as time permits. Contents of this report are as follows: executive summary; introduction; Military Munitions Waste Working Group charter; description of priority waste stream problems; shortcomings of existing approaches, processes and technologies; innovative approaches, processes and technologies, work force planning, training, and education issues relative to technology development and cleanup; criteria used to identify and screen potential demonstration projects; list of potential candidate demonstration projects for the DOIT committee decision/recommendation and appendices.

  13. Observations of Munitions Mobility During a Nor'easter at Wallops Island

    Science.gov (United States)

    Swann, C.; Frank, D. P.; Braithwaite, E. F., III; Hagg, R. K.; Calantoni, J.

    2017-12-01

    Unexploded ordnance (or munitions) may migrate, bury, or become exposed over time, and may pose a hazard to both humans and environment. Understanding the behavior of munitions under various wave and current conditions is central to management and remediation of contaminated underwater sites. We embedded Inertial Measurement Units (IMUs) into inert replicas of large caliber munitions (81 mm - 155 mm), herein referred to as `smart munitions'. Several smart munitions were deployed in the field with IMUs logging at 16 Hz continuously. Simultaneously the local hydrodynamic conditions were monitored to correlate any resulting munitions mobility. Here, we present the response of the smart munitions to wave and current conditions observed during a nor'easter off the coast of Wallops Island, Virginia USA in about 10 m water depth. During the nor'easter, peak significant wave heights of 2.8 m were observed in 10 m water depth. Over a roughly 10-hour period, an 81 mm smart munition migrated approximately 206 ft in a net onshore direction. Displacement and heading of the migrated smart munition were estimated by divers during the recovery. Integration of the trajectory of motion for the smart munition using a custom signal processing algorithm was in good agreement with the diver measurements. Discussion will focus on the relationship of the local sediment type and the potential for munitions mobility.

  14. Web-Based Interface for Command and Control of Network Sensors

    Science.gov (United States)

    Wallick, Michael N.; Doubleday, Joshua R.; Shams, Khawaja S.

    2010-01-01

    This software allows for the visualization and control of a network of sensors through a Web browser interface. It is currently being deployed for a network of sensors monitoring Mt. Saint Helen s volcano; however, this innovation is generic enough that it can be deployed for any type of sensor Web. From this interface, the user is able to fully control and monitor the sensor Web. This includes, but is not limited to, sending "test" commands to individual sensors in the network, monitoring for real-world events, and reacting to those events

  15. Chemical Munitions Dumped at Sea near the Hawaiian Islands

    Science.gov (United States)

    Edwards, M.; Bissonnette, M. C.; Briggs, C. W.; Shjegstad, S. M.

    2016-12-01

    Sea disposal was once internationally accepted as an appropriate method for disposal of excess, obsolete, and unserviceable conventional and chemical munitions. The past decade has seen an increase in the number and complexity of studies to assess the effects of historical munitions disposal in the oceans. The Hawai`i Undersea Military Munitions Assessment (HUMMA) is a comprehensive deep-water (300-600 meter) investigation designed to determine the potential impact of sea-disposed munitions on the ocean environment, and vice versa, at a disposal site south of Pearl Harbor, Oahu, Hawaii. Historical records indicated that as many as 16,000 mustard-filled bombs were disposed in this area following World War II. A secondary objective of HUMMA is to determine best practices and technologies for mapping and sampling sea-disposed munitions. The overarching result from five HUMMA field programs conducted over a decade is that the greatest risk from munitions derives from direct contact; there is little evidence that leakage from munitions into the surrounding environment has a direct pathway to affect human health and the impact on the surrounding environment in Hawaii is detectable only at trace levels. This finding should be modulated based on the quantity of physical samples, which were collected around detected at control sites. Both findings support a hypothesis that the impacts of sea-disposed munitions change over time. This presentation will describe the technical approach and results of the 2014 HUMMA field program using Jason 2.

  16. An Appraisal of Asia-Pacific Cities as Control and Command Centres Embedded in World City Network

    Directory of Open Access Journals (Sweden)

    Z. Li

    2017-08-01

    Full Text Available Since the globalization trend is proliferating at a staggering rate, world cities have emerged as the most dominant vanguard incorporated into global economy. Control and command function is one of the robust integral parts of world city formation, which is closely associated with the corporate headquarter status of some dominant multinational companies. Previous research works on this topic tend to concentrate on the Western Europe and North American arenas neglecting the Asia-Pacific region. Hence, the objective of this paper is to explore control and command functions of Asia-Pacific cities with reference to headquarters’ locations of multinational companies. The methodology will utilize the Forbes global 2000 dataset from the seminal study of GaWC research group, and apply the control and command center model and the interlocking city network model to discover the control and command index, as well as network connectivity of Asia-Pacific cities. Based upon the empirical study of this research, we could identify the hierarchical structure and spatial structure of Asia-Pacific world cities to emerge as some control and command centers embedded in world city network.

  17. 19 CFR 145.53 - Firearms and munitions of war.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Firearms and munitions of war. 145.53 Section 145.53 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF... munitions of war. Importations of firearms, munitions of war, and related articles are subject to the import...

  18. Insensitive Munitions Testing

    Data.gov (United States)

    Federal Laboratory Consortium — Insensitive Munitions Testing at RTC is conducted (IAW MILSTD-2105) at Test Area 4. Our engineers and technicians obtain data for hazards classification and safety...

  19. Command Filtered Adaptive Fuzzy Neural Network Backstepping Control for Marine Power System

    Directory of Open Access Journals (Sweden)

    Xin Zhang

    2014-01-01

    Full Text Available In order to retrain chaotic oscillation of marine power system which is excited by periodic electromagnetism perturbation, a novel command-filtered adaptive fuzzy neural network backstepping control method is designed. First, the mathematical model of marine power system is established based on the two parallel nonlinear model. Then, main results of command-filtered adaptive fuzzy neural network backstepping control law are given. And the Lyapunov stability theory is applied to prove that the system can remain closed-loop asymptotically stable with this controller. Finally, simulation results indicate that the designed controller can suppress chaotic oscillation with fast convergence speed that makes the system return to the equilibrium point quickly; meanwhile, the parameter which induces chaotic oscillation can also be discriminated.

  20. Applied Knowledge Management to Mitigate Cognitive Load in Network-Enabled Mission Command

    Science.gov (United States)

    2017-11-22

    ARL-TN-0859 ● NOV 2017 US Army Research Laboratory Applied Knowledge Management to Mitigate Cognitive Load in Network-Enabled...Applied Knowledge Management to Mitigate Cognitive Load in Network-Enabled Mission Command by John K Hawley Human Research and Engineering...REPORT TYPE Technical Note 3. DATES COVERED (From - To) 1 May 2016–20 April 2017 4. TITLE AND SUBTITLE Applied Knowledge Management to Mitigate

  1. The Unspoken Consequence of Command, Control Communications Technology: Enhanced Micromanagement by Risk-Averse Commanders

    National Research Council Canada - National Science Library

    Carozza, John

    2004-01-01

    .... However, along with its benefits, this command, control and communications (C3) network includes the dangerous consequence of eroding the autonomy of tactical command through enhanced micromanagement by risk-averse operational commanders...

  2. Sea-dumped CW munitions - the European component

    International Nuclear Information System (INIS)

    Hart, J.; Stock, T.

    2009-01-01

    The purpose of this contribution is to outline the European magnitude of sea-dumped CW munitions. Hereby the paper attempts to provide an overview on historical dumping activities, both for conventional and chemical munitions. The potential dangers which might result from these dumping activities are discussed in brief. Among others the differences in deep sea dumping and dumping in shallow waters are evaluated. Further, the presentation will outline and discuss the different technology steps: (a) identification, (b) recovery, (c) transportation and (d) destruction (on- or off-shore), necessary for possible cleaning of dumping sites. Thereafter an evaluation of the different technologies available/applied is performed, in particular on the destruction part. Hereby the already practised experience is displayed. Based upon existing treaty regimes an actual judgment of possible application of treaty provisions for demanding cleaning up operations is discussed. The question if treaty obligations can be used to force cleaning operations is debated. A possible match of the technology package available with the scope/magnitude of the munitions dumping problem is discussed. Hereby the gaps between the size of the problem and the most suitable technologies for recovery and destruction are illustrated. The resulting answers should be regarded as possible technical guidelines for future development activities as well existing limitations to solve the problems. The papers will result in some general guidelines for future prospect on the issues of dumped munitions, in particular chemical munitions under the European context.(author)

  3. Missile/Munition Integration Facility

    Data.gov (United States)

    Federal Laboratory Consortium — A large complex contained within approximately 600 acres with security fencing, controlled access gates, and a munitions convoy access road. The complex is capable...

  4. The Environmental Challenge of Military Munitions and Federal Facilities

    Science.gov (United States)

    EPA and the Department of Defense (DoD) must address the contamination legacy left by military munitions and explosives of concern (MEC) and other hazardous munitions materials from military live-fire training or testing.

  5. Hawaii Munitions Monitoring Station and Natural Laboratory

    Science.gov (United States)

    Edwards, M.; Trimble, A. Z.; Rognstad, M. R.

    2017-12-01

    Hundreds of thousands of tons of conventional munitions were fired into the ocean at military ranges or deliberately disposed at sea during the twentieth century. Potential contaminants from munitions and explosives of concern (MEC) affect virtually every coast in the United States, including Alaska, the Hawaiian Islands, Guam, American Samoa and other U.S. territories as well as inland waterways. It is necessary to develop methods to assess the concentrations of munitions constituents present at a site to address concerns about the presence of environmentally relevant concentrations and their potential impacts. Having a well-characterized site to test instruments and methods is important for continued development and refinement of technology. Most sites are too big to characterize comprehensively in three dimensions over time periods lasting days or longer. We are working to develop a monitoring station and natural laboratory near Oahu, Hawaii to create a cost-effective demonstration and validation natural laboratory where emerging technologies can be evaluated and compared. Ordnance Reef (OR) is an ideal location to establish a munitions monitoring station for historical, logistical and environmental reasons. OR is an area of shallow fringing reef measuring approximately 4.2 km by 2.2 km along the Waianae coast of Oahu that was used as a disposal area for military munitions following World War II. OR has been the subject of multiple investigations including an inventory of munitions conducted by the U.S. Army Corps of Engineers in 2002 and a screening-level risk investigation conducted by the National Oceanic and Atmospheric Administration and the University of Hawaii in 2006. As a result, there are multiple datasets collected over the past fifteen years that can be leveraged to serve as a baseline for the natural laboratory. These extant datasets are being supplemented with data from integrated unmanned systems deployed at OR to characterize and visualize the

  6. Munitions Classification Library

    Science.gov (United States)

    2016-04-04

    members of the community to make their own additions to any, or all, of the classification libraries . The next phase entailed data collection over less......Include area code) 04/04/2016 Final Report August 2014 - August 2015 MUNITIONS CLASSIFICATION LIBRARY Mr. Craig Murray, Parsons Dr. Thomas H. Bell, Leidos

  7. A distributed command governor strategy for the operational control of drinking water networks

    OpenAIRE

    Tedesco, Francesco; Ocampo-Martínez, Carlos; Casavola, Alessandro; Puig Cayuela, Vicenç

    2014-01-01

    This paper proposes the application of a distributed command governor (DCG) strategy for the operational control of drinking water networks (DWN). This approach is very suitable to this kind of management problems given the large-scale and complex nature of DWNs, the relevant effect of persistent disturbances (water demands) over the network evolutions and their marginal stability feature. The performance improvement offered by DCG is compared with the consideration of two non-centralized mod...

  8. Optimal Control of Sensor Threshold for Autonomous Wide Area Search Munitions

    National Research Council Canada - National Science Library

    Kish, Brian A; Jacques, David R; Pachter, Meir

    2005-01-01

    The optimal employment of autonomous wide area search munitions is addressed. The scenario considered involves an airborne munition searching a battle space for stationary targets in the presence of false targets...

  9. Spread, Behavior, and Ecosystem Consequences of Conventional Munitions Compounds in Coastal Marine Waters

    Directory of Open Access Journals (Sweden)

    Aaron J. Beck

    2018-04-01

    Full Text Available Coastal marine environments are contaminated globally with a vast quantity of unexploded ordnance and munitions from intentional disposal. These munitions contain organic explosive compounds as well as a variety of metals, and represent point sources of chemical pollution to marine waters. Most underwater munitions originate from World Wars at the beginning of the twentieth century, and metal munitions housings have been impacted by extensive corrosion over the course of the following decades. As a result, the risk of munitions-related contaminant release to the water column is increasing. The behavior of munitions compounds is well-characterized in terrestrial systems and groundwater, but is only poorly understood in marine systems. Organic explosive compounds, primarily nitroaromatics and nitramines, can be degraded or transformed by a variety of biotic and abiotic mechanisms. These reaction products exhibit a range in biogeochemical characteristics such as sorption by particles and sediments, and variable environmental behavior as a result. The reaction products often exhibit increased toxicity to biological receptors and geochemical controls like sorption can limit this exposure. Environmental samples typically show low concentrations of munitions compounds in water and sediments (on the order of ng/L and μg/kg, respectively, and ecological risk appears generally low. Nonetheless, recent work demonstrates the possibility of sub-lethal genetic and metabolic effects. This review evaluates the state of knowledge on the occurrence, fate, and effect of munition-related chemical contaminants in the marine environment. There remain a number of knowledge gaps that limit our understanding of munitions-related contaminant spread and effect, and the need for additional work is made all the more urgent by increasing risk of release to the environment.

  10. Computational Modeling of Hydrodynamics and Scour around Underwater Munitions

    Science.gov (United States)

    Liu, X.; Xu, Y.

    2017-12-01

    Munitions deposited in water bodies are a big threat to human health, safety, and environment. It is thus imperative to predict the motion and the resting status of the underwater munitions. A multitude of physical processes are involved, which include turbulent flows, sediment transport, granular material mechanics, 6 degree-of-freedom motion of the munition, and potential liquefaction. A clear understanding of this unique physical setting is currently lacking. Consequently, it is extremely hard to make reliable predictions. In this work, we present the computational modeling of two importance processes, i.e., hydrodynamics and scour, around munition objects. Other physical processes are also considered in our comprehensive model. However, they are not shown in this talk. To properly model the dynamics of the deforming bed and the motion of the object, an immersed boundary method is implemented in the open source CFD package OpenFOAM. Fixed bed and scour cases are simulated and compared with laboratory experiments. The future work of this project will implement the coupling between all the physical processes.

  11. Munitions in the Underwater Environment: State of the Science and Knowledge Gaps

    Science.gov (United States)

    2010-06-01

    the Munitions Items Disposition Action System ( MIDAS ). Munitions constituents (MCs) can be identified through the known munitions type. The MIDAS and...physical damage to the casing, adjacent or touching metals, and water or substrate qualities such as temperature, pH, or Redox potential. The...environments, little is known on modeling the fate of MCs in the underwater environment. One of the anticipated problems in predicting the fate and

  12. Improved head direction command classification using an optimised Bayesian neural network.

    Science.gov (United States)

    Nguyen, Son T; Nguyen, Hung T; Taylor, Philip B; Middleton, James

    2006-01-01

    Assistive technologies have recently emerged to improve the quality of life of severely disabled people by enhancing their independence in daily activities. Since many of those individuals have limited or non-existing control from the neck downward, alternative hands-free input modalities have become very important for these people to access assistive devices. In hands-free control, head movement has been proved to be a very effective user interface as it can provide a comfortable, reliable and natural way to access the device. Recently, neural networks have been shown to be useful not only for real-time pattern recognition but also for creating user-adaptive models. Since multi-layer perceptron neural networks trained using standard back-propagation may cause poor generalisation, the Bayesian technique has been proposed to improve the generalisation and robustness of these networks. This paper describes the use of Bayesian neural networks in developing a hands-free wheelchair control system. The experimental results show that with the optimised architecture, classification Bayesian neural networks can detect head commands of wheelchair users accurately irrespective to their levels of injuries.

  13. Validation of Passive Sampling Devices for Monitoring of Munitions Constituents in Underwater Environments

    Science.gov (United States)

    2017-09-01

    TNT TOC TSS Low Order Detonation Munitions constituents Munitions Debris Method Detection Limit Munitions and explosives of concern Mean low...Total organic carbon ( TOC ) and grain size distribution from stations A1, T10, T11, and T12 at BSS...16 syringes/stn) TNT, ADNTs, DNTs, RDX 4 locations in BSS based on positive POCIS results Sediment 5 TOC , grain size 4, co-located with sediment

  14. Mission Command in the Age of Network-Enabled Operations: Social Network Analysis of Information Sharing and Situation Awareness.

    Science.gov (United States)

    Buchler, Norbou; Fitzhugh, Sean M; Marusich, Laura R; Ungvarsky, Diane M; Lebiere, Christian; Gonzalez, Cleotilde

    2016-01-01

    A common assumption in organizations is that information sharing improves situation awareness and ultimately organizational effectiveness. The sheer volume and rapid pace of information and communications received and readily accessible through computer networks, however, can overwhelm individuals, resulting in data overload from a combination of diverse data sources, multiple data formats, and large data volumes. The current conceptual framework of network enabled operations (NEO) posits that robust networking and information sharing act as a positive feedback loop resulting in greater situation awareness and mission effectiveness in military operations (Alberts and Garstka, 2004). We test this assumption in a large-scale, 2-week military training exercise. We conducted a social network analysis of email communications among the multi-echelon Mission Command staff (one Division and two sub-ordinate Brigades) and assessed the situational awareness of every individual. Results from our exponential random graph models challenge the aforementioned assumption, as increased email output was associated with lower individual situation awareness. It emerged that higher situation awareness was associated with a lower probability of out-ties, so that broadly sending many messages decreased the likelihood of attaining situation awareness. This challenges the hypothesis that increased information sharing improves situation awareness, at least for those doing the bulk of the sharing. In addition, we observed two trends that reflect a compartmentalizing of networked information sharing as email links were more commonly formed among members of the command staff with both similar functions and levels of situation awareness, than between two individuals with dissimilar functions and levels of situation awareness; both those findings can be interpreted to reflect effects of homophily. Our results have major implications that challenge the current conceptual framework of NEO. In

  15. Traffic Command Gesture Recognition for Virtual Urban Scenes Based on a Spatiotemporal Convolution Neural Network

    Directory of Open Access Journals (Sweden)

    Chunyong Ma

    2018-01-01

    Full Text Available Intelligent recognition of traffic police command gestures increases authenticity and interactivity in virtual urban scenes. To actualize real-time traffic gesture recognition, a novel spatiotemporal convolution neural network (ST-CNN model is presented. We utilized Kinect 2.0 to construct a traffic police command gesture skeleton (TPCGS dataset collected from 10 volunteers. Subsequently, convolution operations on the locational change of each skeletal point were performed to extract temporal features, analyze the relative positions of skeletal points, and extract spatial features. After temporal and spatial features based on the three-dimensional positional information of traffic police skeleton points were extracted, the ST-CNN model classified positional information into eight types of Chinese traffic police gestures. The test accuracy of the ST-CNN model was 96.67%. In addition, a virtual urban traffic scene in which real-time command tests were carried out was set up, and a real-time test accuracy rate of 93.0% was achieved. The proposed ST-CNN model ensured a high level of accuracy and robustness. The ST-CNN model recognized traffic command gestures, and such recognition was found to control vehicles in virtual traffic environments, which enriches the interactive mode of the virtual city scene. Traffic command gesture recognition contributes to smart city construction.

  16. Eksplozivne materije za neosetljiva ubojna sredstva / Explosive substances for insensitive munitions

    Directory of Open Access Journals (Sweden)

    Radun Jeremić

    2005-03-01

    Full Text Available U skladu sa sve strožim zahtevima za očuvanje životne sredine i većom bezbednošću, tendencije u razvoju suvremenih ubojnih sredstava (UbS, pored povećanja pouzdanosti i efikasnosti, usmerene su i na povećanje sigurnosti pri njihovoj proizvodnji, skladištenju, manipulaciji i upotrebi. Na taj način dobijena je nova kategorija UbS, tzv. neosetljiva UbS, kod kojih je verovatnoća neželjenog aktiviranja pod dejstvom spoljnih impulsa svedena na minimum. Suština rešavanja ovog problema je primena eksplozivnih materija koje su mnogo manje osetljive na spoljne uticaje u odnosu na standardne. Osnovni zahtev koji se pri tome postavlja je da taktičko-tehničke karakteristike ostanu na nivou ili budu bolje u odnosu na postojeća UbS. U radu je ukratko objašnjen koncept razvoja neosetljivih UbS i dat pregled najznačajnijih rezultata istraživanja u oblasti eksplozivnih materija koje zadovoljavaju zahteve za primenu u neosetljivim UbS. / According to severe environment protection and safety requirements, tendencies in development of modern munitions, besides of increasing reliability and efficiency, are directed to decreasing of danger during their processing, storing, handling and operating. In that manner the new category of munitions has been obtained, named insensitive munitions, with a minimum probability of unplanned activating. The best method for solving this problem is using of explosive substances that are more insensitive according to standard ones. The main requirement is the tactical and technical characteristics stay at the level or to be better according to the existing munitions. In this paper the developing concept of insensitive munitions is shortly explained and presented a review of most important research results of explosive materials that fulfill requirements for applying in insensitive munitions.

  17. Resolving the Role of the Dynamic Pressure in the Burial, Exposure, Scour, and Mobility of Underwater Munitions

    Science.gov (United States)

    Gilooly, S.; Foster, D. L.

    2017-12-01

    In nearshore environments, the motion of munitions results from a mixture of sediment transport conditions including sheet flow, scour, bedform migration, and momentary liquefaction. Incipient motion can be caused by disruptive shear stresses and pressure gradients. Foster et al. (2006) incorporated both processes into a single parameter, indicating incipient motion as a function of the bed state. This research looks to evaluate the role of the pressure gradient in positional state changes such as burial, exposure, and mobility. In the case of munitions, this may include pressure gradients induced by vortex shedding or the passing wave. Pressure-mapped model munitions are being developed to measure the orientation, rotation, and surface pressure of the munitions during threshold events leading to a new positional state. These munitions will be deployed in inner surf zone and estuary environments along with acoustic Doppler velocimeters (ADVs), pore water pressure sensors, a laser grid, and a pencil beam sonar with an azimuth drive. The additional instruments allow for near bed and far field water column and sediment bed sampling. Currently preliminary assessments of various pressure sensors and munition designs are underway. Two pressure sensors were selected; the thin FlexiForce A201 sensors will be used to indicate munition rolling during threshold events and diaphragm sensors will be used to understand changes in surrounding pore water pressure as the munition begins to bury/unbury. Both sensors are expected to give quantitative measurements of dynamic pressure gradients in the flow field surrounding the munition. Resolving the role of this process will give insight to an improved incipient motion parameter and allow for better munition motion predictions.

  18. Network technology for depot modernization

    Energy Technology Data Exchange (ETDEWEB)

    Hostick, C.J.

    1990-12-01

    This report was prepared by the Pacific Northwest Laboratory to summarize existing and emerging information system technology and standards applicable to Depot System Command (DESCOM) modernization efforts. The intent of this summarization is to provide the Revitalization of Army Depots for the Year 2000 (READY 2000) team a clear understanding of the enabling information system technologies required to support effective modernization activities. Much of the information contained in this report was acquired during the last year in support of the US Army Armament, Munitions, and Chemical Command (AMCCOM) Facility Integrated Manufacturing Management System (FIMMS) project at PNL, which is targeting the modernization of plant-wide information systems at Army Ammunition Plants. The objective of information system modernization is to improve the effectiveness of an organization in performing its mission. Information system modernization strives to meet this objective by creating an environment where data is electronically captured near the source and readily available to all areas of the organization. Advanced networks, together with related information system technology, are the enabling mechanisms that make modern information system infrastructures possible. The intent of this paper is to present an overview of advanced information system network technology to support depot modernization planners in making technology management decisions. Existing and emerging Open System Interconnection (OSI) and Government Open System Interconnection Profile (GOSIP) standards are explained, as well as a brief assessment of existing products compliant with these standards. Finally, recommendations for achieving plant-wide integration using existing products are presented, and migration strategies for full OSI compliance are introduced. 5 refs., 16 figs. (JF)

  19. NDIA 2018 IM and EM Technology Symposium: Innovative Insensitive Munition Solutions for Enhanced Warfighter Effectiveness

    Science.gov (United States)

    2018-04-26

    2018 IM & EM TECHNOLOGY SYMPOSIUM INNOVATIVE INSENSITIVE MUNITION SOLUTIONS FOR ENHANCED WARFIGHTER EFFECTIVENESS April 23 – 26, 2018 Doubletree by...IM & EM TECHNOLOGY SYMPOSIUM On behalf of the Insensitive Munitions and Energetic Materials Committee and our MSIAC partner, I would like to...welcome you to the 2018 Insensitive Munitions and Energetic Materials Technology Symposium. This international gathering of the top chemists, system

  20. Cluster munitions: public health and international humanitarian law perspectives.

    Science.gov (United States)

    Freckelton, Ian

    2008-02-01

    As a result of civilian deaths in Vietnam, Cambodia, Laos, Chechnya, Kosovo, Afghanistan, Iraq and Lebanon, cluster munitions have been recognised to pose a grave threat to civilian populations because of their limited precision and problematically high rate of initial failure to explode. Efforts are intensifying to ban cluster munitions and to mandate those who have discharged them to defuse them effectively so as to reduce the risks to civilians. This editorial reviews these efforts and identifies a need for them to be actively supported by both the legal and medical communities.

  1. Acoustic Scattering from Munitions in the Underwater Environment: Measurements and Modeling

    Science.gov (United States)

    Williams, K.; Kargl, S. G.; Espana, A.

    2017-12-01

    Acoustical scattering from elastic targets has been a subject of research for several decades. However, the introduction of those targets into the ocean environment brings new complexities to quantitative prediction of that scattering. The goal of our work has been to retain as much of the target physics as possible while also handling the propagation to and from the target in the multi-path ocean environment. Testing of the resulting predictions has been carried out via ocean experiments in which munitions are deployed on and within the sediment. We will present the overall philosophy used in the modeling and then compare model results to measurements. A 60 cm long 30 cd diameter aluminum cylinder will be used as a canonical example and then a sample of results for a variety of munitions will be shown. Finally, we will discuss the use of both the models and measurements in assessing the ability of sonar to discriminate munitions from other man-made targets. The difficulty of this challenge will be made apparent via results from a recent experiment in which both munitions and man-made "clutter" were deployed on a rippled sand interface.

  2. Observation of Burial and Migration of Instrumented Surrogate Munitions Deployed in the Swash Zone

    Science.gov (United States)

    Cristaudo, D.; Puleo, J. A.; Bruder, B. L.

    2017-12-01

    Munitions (also known as unexploded ordnance; UXO) in the nearshore environment due to past military activities, may be found on the beach, constituting a risk for beach users. Munitions may be transported from offshore to shallower water and/or migrate along the coast. In addition, munitions may bury in place or be exhumed due to hydrodynamic forcing. Observations on munitions mobility have generally been collected offshore, while observations in the swash zone are scarce. The swash zone is the region of the beach alternately covered by wave runup where hydrodynamic processes may be intense. Studies of munitions mobility require the use of realistic surrogates to quantify mobility/burial and hydrodynamic forcing conditions. Four surrogates (BLU-61 Cluster Bomb, 81 mm Mortar, M151-70 Hydra Rocket and M107 155 mm High Explosive Howitzer) were developed and tested during large-scale laboratory and field studies. Surrogates house sensors that measure different components of motion. Errors between real munitions and surrogate parameters (mass, center of gravity and axial moment of inertia) are all within an absolute error of 20%. Internal munitions sensors consist of inertial motion units (for acceleration and angular velocity in and around the three directions and orientation), pressure transducers (for water depth above surrogate), shock recorders (for high frequency acceleration to detect wave impact on the surrogate), and an in-house designed array of optical sensors (for burial/exposure and rolling). An in situ array of sensors to measure hydrodynamics, bed morphology and sediment concentrations, was deployed in the swash zone, aligned with the surrogate deployment. Data collected during the studies will be shown highlighting surrogate sensor capabilities. Sensors response will be compared with GPS measurements and imagery from cameras overlooking the study sites of surrogate position as a function of time. Examples of burial/exposure and migration of surrogates

  3. Trauma-related infections due to cluster munitions.

    Science.gov (United States)

    Fares, Youssef; El-Zaatari, Mohamad; Fares, Jawad; Bedrosian, Nora; Yared, Nadine

    2013-12-01

    Trauma-related infections remain a concerning and potentially avoidable complication of conflict-related injuries. During the Israeli conflict in South Lebanon, more than four million sub-munitions were dropped over South Lebanese soil. In this study, we will explore the different types of infection caused by sub-munitions and penetrating agents. This prospective study took place from 2006 to 2012 at the Lebanese University within the Faculty of Medical Sciences' departments. This study sample consisted of 350 injured casualties. Patients suffered from blast injuries with fragmentations targeting the head, face, torso, abdomen, pelvis and extremities. Of the 350 causalities studied, 326 (93.1%) were males, and 24 (6.9%) were females. Ages varied between 10 and 70 years, with the average age being 27 years. Of the 350 patients studied, 68 (19.4%) developed infections. Infections varied between pseudomonas, Escherichia coli, Candida and fungus and sometimes led to necrosis. Vaccinations, antibiotic therapies and proper wound irrigation must be performed at appropriate emergency units. Excision and complete debridement of necrotic and contaminated tissue should also be performed. The Convention on Cluster Munitions of 2008 should be adhered to, as these weapons indiscriminately and disproportionately harm civilians, thereby violating the well-established international principles governing conflict. Copyright © 2013 King Saud Bin Abdulaziz University for Health Sciences. Published by Elsevier Ltd. All rights reserved.

  4. 28 CFR 0.89 - Authority to seize arms and munitions of war.

    Science.gov (United States)

    2010-07-01

    ... war. 0.89 Section 0.89 Judicial Administration DEPARTMENT OF JUSTICE ORGANIZATION OF THE DEPARTMENT OF JUSTICE Federal Bureau of Investigation § 0.89 Authority to seize arms and munitions of war. The Director... arms and munitions of war, and other articles, pursuant to section 1 of title VI of the act of June 15...

  5. Optimal path planning for video-guided smart munitions via multitarget tracking

    Science.gov (United States)

    Borkowski, Jeffrey M.; Vasquez, Juan R.

    2006-05-01

    An advent in the development of smart munitions entails autonomously modifying target selection during flight in order to maximize the value of the target being destroyed. A unique guidance law can be constructed that exploits both attribute and kinematic data obtained from an onboard video sensor. An optimal path planning algorithm has been developed with the goals of obstacle avoidance and maximizing the value of the target impacted by the munition. Target identification and classification provides a basis for target value which is used in conjunction with multi-target tracks to determine an optimal waypoint for the munition. A dynamically feasible trajectory is computed to provide constraints on the waypoint selection. Results demonstrate the ability of the autonomous system to avoid moving obstacles and revise target selection in flight.

  6. Chemical Warfare Materiel in Sediment at a Deep-Water Discarded Military Munitions Site

    Science.gov (United States)

    Briggs, C. W.; Bissonnette, M. C.; Edwards, M.; Shjegstad, S. M.

    2016-12-01

    Understanding the release and transformation of chemical agent (CA) at underwater discarded military munitions (DMM) sites is essential to determine the potential risk to human health and impact on the ocean environment; yet few studies have been conducted at sites in excess of 250 m, the depth at which most U.S. CA munitions were disposed. Maritime construction workers installing cables or pipelines at a CA DMM site, as well as fishermen and scientific researchers deploying bottom-contact gear, represent possible exposure pathways to human receptors. The Hawai`i Undersea Military Munitions Assessment (HUMMA) sought to characterize a historic munitions sea-disposal site at depths between 400-650 m. During the 2014 HUMMA Sampling Survey, the Jason 2 remotely operated vehicle was used to collect sediments within two meters of suspected World War II chemical munitions, confirmed to be 100-lb M47 series bombs containing sulfur mustard. When environmental media was brought to the surface, samples were screened for distilled sulfur mustard (HD) and related agent breakdown products (ABP) (collectively referred to as chemical warfare materiel [CWM]). Detectable concentrations of HD and/or its ABP 1,4-dithiane were found in sediments collected at all CA DMM sites; HD was also detected at two control sites. The location and extent of munitions casing deterioration strongly influenced the distribution and level of CWM in sediment. The interior of the casing contained levels of CWM orders of magnitudes higher than that observed in the surrounding sediment at one meter distance, indicating the majority of the CWM is hydrolyzed as it is released from the munitions casing and a fraction of the fill materiel persists in the environment for decades following disposal. Although the potential for future site users to become exposed to CWA in recovered sediments and debris exists, the level of risk is significantly mitigated by the depth and location of the sea-disposal site.

  7. High-power VCSELs for smart munitions

    Science.gov (United States)

    Geske, Jon; MacDougal, Michael; Cole, Garrett; Snyder, Donald

    2006-08-01

    The next generation of low-cost smart munitions will be capable of autonomously detecting and identifying targets aided partly by the ability to image targets with compact and robust scanning rangefinder and LADAR capabilities. These imaging systems will utilize arrays of high performance, low-cost semiconductor diode lasers capable of achieving high peak powers in pulses ranging from 5 to 25 nanoseconds in duration. Aerius Photonics is developing high-power Vertical-Cavity Surface-Emitting Lasers (VCSELs) to meet the needs of these smart munitions applications. The authors will report the results of Aerius' development program in which peak pulsed powers exceeding 60 Watts were demonstrated from single VCSEL emitters. These compact packaged emitters achieved pulse energies in excess of 1.5 micro-joules with multi kilo-hertz pulse repetition frequencies. The progress of the ongoing effort toward extending this performance to arrays of VCSEL emitters and toward further improving laser slope efficiency will be reported.

  8. Remote Machining and Evaluation of Explosively Filled Munitions

    Data.gov (United States)

    Federal Laboratory Consortium — This facility is used for remote machining of explosively loaded ammunition. Munition sizes from small arms through 8-inch artillery can be accommodated. Sectioning,...

  9. 40 CFR 266.203 - Standards applicable to the transportation of solid waste military munitions.

    Science.gov (United States)

    2010-07-01

    ... transportation of solid waste military munitions. 266.203 Section 266.203 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID WASTES (CONTINUED) STANDARDS FOR THE MANAGEMENT OF SPECIFIC HAZARDOUS... applicable to the transportation of solid waste military munitions. (a) Criteria for hazardous waste...

  10. 40 CFR 266.205 - Standards applicable to the storage of solid waste military munitions.

    Science.gov (United States)

    2010-07-01

    ... solid waste military munitions. 266.205 Section 266.205 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID WASTES (CONTINUED) STANDARDS FOR THE MANAGEMENT OF SPECIFIC HAZARDOUS... applicable to the storage of solid waste military munitions. (a) Criteria for hazardous waste regulation of...

  11. Design of a hybrid command and control mobile botnet: Presentation

    CSIR Research Space (South Africa)

    Pieterse, H

    2013-03-01

    Full Text Available smartphones controlled by a botmaster through a command and control network to serve a malicious purpose. This study presents the design of a hybrid command and control mobile botnet. It describes the propagation vectors, command and control channels...

  12. Validation of Passive Sampling Devices for Monitoring of Munitions Constituents in Underwater Environments

    Science.gov (United States)

    2017-06-30

    Research and Development Program [SERDP] project #ER-2542) into the canister would provide enhancement of the quantitative estimation of the TWA...Department of Defense EOD Explosive Ordnance Disposal EPA United States Environmental Protection Agency EQL Environmental Quantitation Limit EST...Laboratory Quantitation Limit MC Munitions Constituents mL Milliliter MR Munitions Response NESDI Navy’s Environmental Security Development to

  13. Munition Burial by Local Scour and Sandwaves: large-scale laboratory experiments

    Science.gov (United States)

    Garcia, M. H.

    2017-12-01

    Our effort has been the direct observation and monitoring of the burial process of munitions induced by the combined action of waves, currents and pure oscillatory flows. The experimental conditions have made it possible to observe the burial process due to both local scour around model munitions as well as the passage of sandwaves. One experimental facility is the Large Oscillating Water Sediment Tunnel (LOWST) constructed with DURIP support. LOWST can reproduce field-like conditions near the sea bed. The second facility is a multipurpose wave-current flume which is 4 feet (1.20 m) deep, 6 feet (1.8 m) wide, and 161 feet (49.2 m) long. More than two hundred experiments were carried out in the wave-current flume. The main task completed within this effort has been the characterization of the burial process induced by local scour as well in the presence of dynamic sandwaves with superimposed ripples. It is found that the burial of a finite-length model munition (cylinder) is determined by local scour around the cylinder and by a more global process associated with the formation and evolution of sandwaves having superimposed ripples on them. Depending on the ratio of the amplitude of these features and the body's diameter (D), a model munition can progressively get partially or totally buried as such bedforms migrate. Analysis of the experimental data indicates that existing semi-empirical formulae for prediction of equilibrium-burial-depth, geometry of the scour hole around a cylinder, and time-scales developed for pipelines are not suitable for the case of a cylinder of finite length. Relative burial depth (Bd / D) is found to be mainly a function of two parameters. One is the Keulegan-Carpenter number, KC, and the Shields parameter, θ. Munition burial under either waves or combined flow, is influenced by two different processes. One is related to the local scour around the object, which takes place within the first few hundred minutes of flow action (i.e. short

  14. U.S. Army Training and Testing Area Carrying Capacity (ATTACC) for Munitions (AFM)

    Science.gov (United States)

    2006-11-01

    Army Training Support Center USDA United States Department of Agriculture USGS United States Geological Survey USLE Universal Soil Loss Equation...Range condition is a function of climate, soil , and hydrology. The munitions impact, constituent load, and range condition are modeled using AFM...For ArcGIS v2 to attain expected concentrations of munitions constituents and corresponding risk due to exposure through soil - and water-related

  15. Design of a hybrid command and control mobile botnet

    CSIR Research Space (South Africa)

    Pieterse, H

    2013-05-01

    Full Text Available and control mobile botnet. The hybrid design explores the efficiency of multiple command and control channels against the following objectives: no single point of failure within the topology, low cost for command dissemination, limited network activities...

  16. Tele command and network automation: strategy and results; Telecomando e automacao de redes: estrategia e resultados

    Energy Technology Data Exchange (ETDEWEB)

    Bargigia, Angelo; Cerreti, Alberto; Lembo, Giorgio di; Rogai, Sergio; Veglio, Gianfranco [Enel Distribuzione Spa, Rome (Italy)

    2004-02-01

    This article presents the adopted by the ENEL Distribuzione, Italy, for the tele command and automation in the distribution line. The article describes the medium term implementation program, based on the installation of remote terminal unities, with communication through cell phone GMS for transmission of collected data to the control centers of the network. A cost versus benefit analysis conducted and the obtained results are also evaluated.

  17. Design and Implementation of a MAC Protocol for Timely and Reliable Delivery of Command and Data in Dynamic Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Phan Van Vinh

    2013-09-01

    Full Text Available This paper proposes and implements a new TDMA-based MAC protocol for providing timely and reliable delivery of data and command for monitoring and control networks. In this kind of network, sensor nodes are required to sense data from the monitoring environment periodically and then send the data to a sink. The sink determines whether the environment is safe or not by analyzing the acquired data. Sometimes, a command or control message is sent from the sink to a particular node or a group of nodes to execute the services or request further interested data. The proposed MAC protocol enables bidirectional communication, controls active and sleep modes of a sensor node to conserve energy, and addresses the problem of load unbalancing between the nodes near a sink and the other nodes. It can improve reliability of communication significantly while extending network lifetime. These claims are supported by the experimental results.

  18. Service life determination of munition during expeditionary missions

    NARCIS (Netherlands)

    Klerk, W.P.C. de; Heijden, A.E.D.M. van der

    2012-01-01

    For a more in-depth understanding of the aging processes of munitions in expeditionary operations, research is performed with respect to the influence of transport, storage and use on the safety of ammunition. Within this programme the influences of parameters like temperature, humidity, vibrations,

  19. Distribution of chemical warfare agent, energetics, and metals in sediments at a deep-water discarded military munitions site

    Science.gov (United States)

    Briggs, Christian; Shjegstad, Sonia M.; Silva, Jeff A. K.; Edwards, Margo H.

    2016-06-01

    There is a strong need to understand the behavior of chemical warfare agent (CWA) at underwater discarded military munitions (DMM) sites to determine the potential threat to human health or the environment, yet few studies have been conducted at sites in excess of 250 m, the depth at which most U.S. chemical munitions were disposed. As part of the Hawai'i Undersea Military Munitions Assessment (HUMMA), sediments adjacent to chemical and conventional DMM at depths of 400-650 m were sampled using human occupied vehicles (HOVs) in order to quantify the distribution of CWA, energetics, and select metals. Sites in the same general area, with no munitions within 50 m in any direction were sampled as a control. Sulfur mustard (HD) and its degradation product 1,4-dithiane were detected at each CWA DMM site, as well as a single sample with the HD degradation product 1,4-thioxane. An energetic compound was detected in sediment to a limited extent at one CWA DMM site. Metals common in munitions casings (i.e., Fe, Cu, and Pb) showed similar trends at the regional and site-wide scales, likely reflecting changes in marine sediment deposition and composition. This study shows HD and its degradation products can persist in the deep-marine environment for decades following munitions disposal.

  20. Robot Task Commander with Extensible Programming Environment

    Science.gov (United States)

    Hart, Stephen W (Inventor); Yamokoski, John D. (Inventor); Wightman, Brian J (Inventor); Dinh, Duy Paul (Inventor); Gooding, Dustin R (Inventor)

    2014-01-01

    A system for developing distributed robot application-level software includes a robot having an associated control module which controls motion of the robot in response to a commanded task, and a robot task commander (RTC) in networked communication with the control module over a network transport layer (NTL). The RTC includes a script engine(s) and a GUI, with a processor and a centralized library of library blocks constructed from an interpretive computer programming code and having input and output connections. The GUI provides access to a Visual Programming Language (VPL) environment and a text editor. In executing a method, the VPL is opened, a task for the robot is built from the code library blocks, and data is assigned to input and output connections identifying input and output data for each block. A task sequence(s) is sent to the control module(s) over the NTL to command execution of the task.

  1. Army Aviation and the Mission Command Warfighting Function

    Science.gov (United States)

    2017-06-09

    information systems , processes and procedures, optimize facilities and equipment, and build understanding of the networks that link the headquarters...however further publication or sale of copyrighted images is not permissible. ii REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188...Command System , Mission Command Information Systems , Training, Mission Training Complex 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT

  2. Bioaccumulation of chemical warfare agents, energetic materials, and metals in deep-sea shrimp from discarded military munitions sites off Pearl Harbor

    Science.gov (United States)

    Koide, Shelby; Silva, Jeff A. K.; Dupra, Vilma; Edwards, Margo

    2016-06-01

    The bioaccumulation of munitions-related chemicals at former military deep-water disposal sites is poorly understood. This paper presents the results of human-food-item biota sampling to assess the potential for bioaccumulation of chemical warfare agents, energetic materials, arsenic, and additional munitions-related metals in deep-sea shrimp tissue samples collected during the Hawai'i Undersea Military Munitions Assessment (HUMMA) project to date. The HUMMA investigation area is located within a former munitions sea-disposal site located south of Pearl Harbor on the island of O'ahu, Hawai'i, designated site Hawaii-05 (HI-05) by the United States Department of Defense. Indigenous deep-sea shrimp (Heterocarpus ensifer) were caught adjacent to discarded military munitions (DMM) and at control sites where munitions were absent. Tissue analysis results showed that chemical warfare agents and their degradation products were not present within the edible portions of these samples at detectable concentrations, and energetic materials and their degradation products were detected in only a few samples at concentrations below the laboratory reporting limits. Likewise, arsenic, copper, and lead concentrations were below the United States Food and Drug Administration's permitted concentrations of metals in marine biota tissue (if defined), and their presence within these samples could not be attributed to the presence of DMM within the study area based on a comparative analysis of munitions-adjacent and control samples collected. Based on this current dataset, it can be concluded that DMM existing within the HUMMA study area is not contributing to the bioaccumulation of munitions-related chemicals for the biota species investigated to date.

  3. 48 CFR 225.770 - Prohibition on acquisition of United States Munitions List items from Communist Chinese military...

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Prohibition on acquisition of United States Munitions List items from Communist Chinese military companies. 225.770 Section 225... of United States Munitions List items from Communist Chinese military companies. This section...

  4. Beyond command and control: USSOUTHCOM's use of social networking to 'connect and collaborate' during Haiti relief operations

    Science.gov (United States)

    Arias, Ricardo

    2011-06-01

    On 12 January 2010, a magnitude 7.0 earthquake devastated Haiti killing over 230,000 unsuspecting victims, injuring tens of thousands more and displacing over 1.1 million people. The physical damage was so severe that over 50 percent of buildings in and near the affected areas were completely destroyed or damaged. After struggling for decades with adversity, and besieged by a myriad of social, economic and political challenges, Haiti, its government, and its people were by most accounts already in a state of crisis. The earthquake's devastation and its aftermath shocked the world and prompted a global response. Over 800 institutions and organizations representing the whole of society - governments and their militaries, international organizations, nongovernmental organizations, public institutions, academia, corporations, and private citizens - mobilized to provide aid and relief. However, coordinating and managing their activities seemed a daunting, if not impossible, task. How could a global response achieve "unity of effort" when "unity of command" was not feasible? To provide a solution, US Southern Command (USSOUTHCOM) looked beyond traditional Command and Control systems for collaboration with non-traditional partners and implemented the All Partners Access Network (APAN) in order to "Connect and Collaborate."

  5. A two-stage extraction procedure for insensitive munition (IM) explosive compounds in soils.

    Science.gov (United States)

    Felt, Deborah; Gurtowski, Luke; Nestler, Catherine C; Johnson, Jared; Larson, Steven

    2016-12-01

    The Department of Defense (DoD) is developing a new category of insensitive munitions (IMs) that are more resistant to detonation or promulgation from external stimuli than traditional munition formulations. The new explosive constituent compounds are 2,4-dinitroanisole (DNAN), nitroguanidine (NQ), and nitrotriazolone (NTO). The production and use of IM formulations may result in interaction of IM component compounds with soil. The chemical properties of these IM compounds present unique challenges for extraction from environmental matrices such as soil. A two-stage extraction procedure was developed and tested using several soil types amended with known concentrations of IM compounds. This procedure incorporates both an acidified phase and an organic phase to account for the chemical properties of the IM compounds. The method detection limits (MDLs) for all IM compounds in all soil types were regulatory risk-based Regional Screening Level (RSL) criteria for soil proposed by the U.S. Army Public Health Center. At defined environmentally relevant concentrations, the average recovery of each IM compound in each soil type was consistent and greater than 85%. The two-stage extraction method decreased the influence of soil composition on IM compound recovery. UV analysis of NTO established an isosbestic point based on varied pH at a detection wavelength of 341 nm. The two-stage soil extraction method is equally effective for traditional munition compounds, a potentially important point when examining soils exposed to both traditional and insensitive munitions. Copyright © 2016 Elsevier Ltd. All rights reserved.

  6. 20000G shock energy harvesters for gun-fired munition

    International Nuclear Information System (INIS)

    Willemin, J.; Boisseau, S.; Olmos, L.; Gallardo, M.; Despesse, G.; Robert, T.

    2016-01-01

    This paper presents a 20000G shock energy harvester dedicated to gun-fired munitions and based on a mass-spring resonant structure coupled to a coil-magnet electromagnetic converter. The 20000G shock energy is firstly stored in the spring as elastic potential energy, released as mass-spring mechanical oscillations right after the shock and finally converted into electricity thanks to the coil-magnet transducer. The device has been modeled, sized to generate 200mJ in 150ms, manufactured and tested in a gun-fired munition. The prototype sizes 117cm 3 and weighs 370g. 210mJ have been generated in a test bench and 140mJ in real conditions; this corresponds to a mean output power of 0.93W (7.9mW/cm 3 ) and a maximum output power of 4.83W (41.3mW/cm 3 ) right after the shock. (paper)

  7. 20000G shock energy harvesters for gun-fired munition

    Science.gov (United States)

    Willemin, J.; Boisseau, S.; Olmos, L.; Gallardo, M.; Despesse, G.; Robert, T.

    2016-11-01

    This paper presents a 20000G shock energy harvester dedicated to gun-fired munitions and based on a mass-spring resonant structure coupled to a coil-magnet electromagnetic converter. The 20000G shock energy is firstly stored in the spring as elastic potential energy, released as mass-spring mechanical oscillations right after the shock and finally converted into electricity thanks to the coil-magnet transducer. The device has been modeled, sized to generate 200mJ in 150ms, manufactured and tested in a gun-fired munition. The prototype sizes 117cm3 and weighs 370g. 210mJ have been generated in a test bench and 140mJ in real conditions; this corresponds to a mean output power of 0.93W (7.9mW/cm3) and a maximum output power of 4.83W (41.3mW/cm3) right after the shock.

  8. Communication for command and control systems

    CERN Document Server

    Morris, D J

    1983-01-01

    Communication for Command and Control Systems provides a thorough exposition of the basic theoretical and practical features involved in the design of communication networks for command and control systems. This book focuses primarily on the practical side of computer-controlled communication. This text concentrates on the communication sides of the subject by surveying the means of transferring data between the various processing points and by appraising their potential advantages and possible defects in implementation. In this respect, this book should prove useful for the practicing enginee

  9. 48 CFR 252.225-7007 - Prohibition on Acquisition of United States Munitions List Items from Communist Chinese Military...

    Science.gov (United States)

    2010-10-01

    ... of United States Munitions List Items from Communist Chinese Military Companies. 252.225-7007 Section... Chinese Military Companies. As prescribed in 225.1103(4), use the following clause: Prohibition On Acquisition of United States Munitions List Items From Communist Chinese Military Companies (SEP 2006) (a...

  10. Health and environmental problems of using antiarmour munitions containing depleted uranium core

    International Nuclear Information System (INIS)

    Matousek, J.

    2006-01-01

    In the 1970s, core of depleted uranium commenced to be introduced into the breakthrough antitank munitions of various calibers and types in order to considerably enhance their effectiveness due to extremely high density in comparison with steel. The health and environmental threats of using this munitions and other weaponry where depleted uranium has been utilised as counterbalance stem from the pyrophoric character of uranium, burnt due to material deformation and friction when penetrating armour targets creating thus highly respirable aerosol of uranium oxides that are deposited in alveoli after being inhaled or in other tissues after being ingested. Composition and main properties of depleted uranium are presented. Chronic effects of deposited particles of uranium oxides are due to internal irradiation of sensitive organs at proceeding radioactive decay accompanied with alpha irradiation. Long-term internal irradiation by radionuclides producing alpha-rays leads to proved risk of increased incidence of carcinoma and leukaemia not to speak on chronic chemical toxicity of uranium, independent of its isotopic composition. Environmental impact of extensive use of munitions with depleted uranium in the recent armed conflicts is assessed. (authors)

  11. Distributed computing environment for Mine Warfare Command

    OpenAIRE

    Pritchard, Lane L.

    1993-01-01

    Approved for public release; distribution is unlimited. The Mine Warfare Command in Charleston, South Carolina has been converting its information systems architecture from a centralized mainframe based system to a decentralized network of personal computers over the past several years. This thesis analyzes the progress Of the evolution as of May of 1992. The building blocks of a distributed architecture are discussed in relation to the choices the Mine Warfare Command has made to date. Ar...

  12. Disposal of chemical agents and munitions stored at Pine Bluff Arsenal, Pine Bluff, Arkansas

    Energy Technology Data Exchange (ETDEWEB)

    Ensminger, J.T.; Hillsman, E.L.; Johnson, R.D.; Morrisey, J.A.; Staub, W.P.; Boston, C.R.; Hunsaker, D.B.; Leibsch, E.; Rickert, L.W.; Tolbert, V.R.; Zimmerman, G.P.

    1991-09-01

    The Pine Bluff Arsenal (PBA) near Pine Bluff, Arkansas, is one of eight continental United States (CONUS) Army installations where lethal unitary chemical agents and munitions are stored and where destruction of agents and munitions is proposed under the Chemical Stockpile Disposal Program (CSDP). The chemical agent inventory at PBA consists of approximately 12%, by weight, of the total US stockpile. The destruction of the stockpile is necessary to eliminate the risk to the public from continued storage and to dispose of obsolete and leaking munitions. In 1988 the US Army issued a Final Programmatic Environmental Impact Statement (FPEIS) for the CSDP that identified on-site disposal of agents and munitions as the environmentally preferred alternative (i.e., the alternative with the least potential to cause significant adverse impacts). The purpose of this report is to examine the proposed implementation of on-site disposal at PBA in light of more recent and more detailed data than those on which the FPEIS is based. New population data were used to compute fatalities using the same computation methods and values for all other parameters as in the FPEIS. Results indicate that all alternatives are indistinguishable when the potential health impacts to the PBA community are considered. However, risks from on-site disposal are in all cases equal to or less than risks from other alternatives. Furthermore, no unique resources with the potential to prevent or delay implementation of on-site disposal at PBA have been identified.

  13. Investigation of a new passive sampler for the detection of munitions compounds in marine and freshwater systems.

    Science.gov (United States)

    Warren, Joseph K; Vlahos, Penny; Smith, Richard; Tobias, Craig

    2018-07-01

    Over the last century, unexploded ordnances have been disposed of in marine shelf systems because of a lack of cost-effective alternatives. Underwater unexploded ordnances have the potential to leak 2,4,6-trinitrotoluene (TNT) and 1,3,5-trinitro-1,3,5-triazine (RDX), commonly used chemical munitions, and contaminate local waters, biota, and sediments. The rate at which this contamination occurs in the environment is relatively unknown, and the cost- and time-prohibitive nature of sampling across sites makes mapping difficult. In the present study we assessed the efficacy of ethylene-vinyl acetate (EVA) for sampling relatively soluble munitions compounds over a range of environmental conditions (i.e., changes in temperature and salinity) and optimized the composition of the passive sampling polymer. The EVA sampler was able to successfully detect ambient concentrations of lingering munitions compounds from field sites containing unexploded ordnances. The sampler affinity for the munitions in terms of an EVA-water partition coefficient was greater than the standard octanol water values for each target compound. Partitioning of compounds onto EVA over the natural ranges of salinity did not change significantly, although uptake varied consistently and predictably with temperature. Increasing the vinyl acetate to ethylene ratio of the polymer corresponded to an increase in uptake capacity, consistent with enhanced dipole-dipole interactions between the munitions and the polymer. This sampler provides a cost-effective means to map and track leakage of unexploded ordnances both spatially and temporally. Environ Toxicol Chem 2018;37:1990-1997. © 2018 SETAC. © 2018 SETAC.

  14. Strategic Munitions Planning in Non-Conventional Asymmetric Operations

    Science.gov (United States)

    2010-04-01

    Conventional Asymmetric Operations RTO-MP-SAS-081 16 - 3 with a clearly structured, sized and located military force. The principles of Lanchester ...stockpiles and calculated munitions requirements. REFERENCES [1] Prague Summit Declaration, November 2002. [2] J. Fletcher, The Lanchester Legacy... Lanchester battles, Journal of the Operational Research Society, Vol. 50 No. 3, March 1999. [13] W. Freeman, A Study of Ammunition Consumption, Master of

  15. Underwater Munitions Expert System: Preliminary Design Report

    Science.gov (United States)

    2015-08-21

    analysis  would  usually  be  performed,   where  separation  by   sieving  results  in  the  PMF  of  sand  grain...locations  they  might  potentially   aggregate .    Furthermore,  given  knowledge  of  the  types  of   munitions...feature  that   Netica  provides  is  the  ability  to  do  sensitivity   analysis ,

  16. Ubuntu Linux Toolbox 1000 + Commands for Ubuntu and Debian Power Users

    CERN Document Server

    Negus, Christopher

    2008-01-01

    In this handy, compact guide, you'll explore a ton of powerful Ubuntu Linux commands while you learn to use Ubuntu Linux as the experts do: from the command line. Try out more than 1,000 commands to find and get software, monitor system health and security, and access network resources. Then, apply the skills you learn from this book to use and administer desktops and servers running Ubuntu, Debian, and KNOPPIX or any other Linux distribution.

  17. REMOTE SENSING IN DETECTING BURIED MUNITIONS FROM WORLD WAR I

    Science.gov (United States)

    During World War I, The American University in Washington D.C. was used by the U.S. Army as an experiment station for the development and testing of a variety of battlefield munitions including chemical weapons such as Mustard Gas, Phosgene, Ricin and Lewisite, among othe...

  18. Disposal of chemical agents and munitions stored at Umatilla Depot Activity, Hermiston, Oregon

    Energy Technology Data Exchange (ETDEWEB)

    Zimmerman, G.P.; Hillsman, E.L.; Johnson, R.O.; Miller, R.L.; Patton, T.G.; Schoepfle, G.M.; Tolbert, V.R.; Feldman, D.L.; Hunsaker, D.B. Jr.; Kroodsma, R.L.; Morrissey, J.; Rickert, L.W.; Staub, W.P.; West, D.C.

    1993-02-01

    The Umatilla Depot Activity (UMDA) near Hermiston, Oregon, is one of eight US Army installations in the continental United States where lethal unitary chemical agents and munitions are stored, and where destruction of agents and munitions is proposed under the Chemical Stockpile Disposal Program (CSDP). The chemical agent inventory at UMDA consists of 11.6%, by weight, of the total US stockpile. The destruction of the stockpile is necessary to eliminate the risk to the public from continued storage and to dispose of obsolete and leaking munitions. In 1988 the US Army issued a Final Programmatic Environmental Impact Statement (FPEIS) for the CSDP that identified on-site disposal of agents and munitions as the environmentally preferred alternative (i.e., the alternative with the least potential to cause significant adverse impacts), using a method based on five measures of risk for potential human health and ecosystem/environmental effects; the effectiveness and adequacy of emergency preparedness capabilities also played a key role in the FPEIS selection methodology. In some instances, the FPEIS included generic data and assumptions that were developed to allow a consistent comparison of potential impacts among programmatic alternatives and did not include detailed conditions at each of the eight installations. The purpose of this Phase 1 report is to examine the proposed implementation of on-site disposal at UMDA in light of more recent and more detailed data than those included in the FPEIS. Specifically, this Phase 1 report is intended to either confirm or reject the validity of on-site disposal for the UMDA stockpile. Using the same computation methods as in the FPEIS, new population data were used to compute potential fatalities from hypothetical disposal accidents. Results indicate that onsite disposal is clearly preferable to either continued storage at UMDA or transportation of the UMDA stockpile to another depot for disposal.

  19. The Political Economy of the Munitions Supply Program

    Science.gov (United States)

    2014-05-01

    advantage in production, and further identified which munitions products can be procured offshore with only limited effects on operational liabilities...comparative advantage and access to global supply chains. A few options exist: fixed-price contracts may be indexed to exogenously-given input prices and... franchisees bid their true costs.47 Third, once supply is forthcoming, the franchisee has an incentive to minimize costs unless the franchiser is known

  20. Network-Centric Applications and Tactical Networks

    National Research Council Canada - National Science Library

    Krout, Timothy; Durbano, Steven; Shearer, Ruth

    2003-01-01

    .... Command and control applications will always require communications capabilities. There are numerous examples of command and control applications that have been developed without adequate attention to the realities of tactical networks...

  1. Munitions having an insensitive detonator system for initiating large failure diameter explosives

    Science.gov (United States)

    Perry, III, William Leroy

    2015-08-04

    A munition according to a preferred embodiment can include a detonator system having a detonator that is selectively coupled to a microwave source that functions to selectively prime, activate, initiate, and/or sensitize an insensitive explosive material for detonation. The preferred detonator can include an explosive cavity having a barrier within which an insensitive explosive material is disposed and a waveguide coupled to the explosive cavity. The preferred system can further include a microwave source coupled to the waveguide such that microwaves enter the explosive cavity and impinge on the insensitive explosive material to sensitize the explosive material for detonation. In use the preferred embodiments permit the deployment and use of munitions that are maintained in an insensitive state until the actual time of use, thereby substantially preventing unauthorized or unintended detonation thereof.

  2. Underwater Munitions Expert System to Predict Mobility and Burial

    Science.gov (United States)

    2017-11-14

    for predicting the location and possible burial of underwater munitions is required to advise site managers as they plan...that region above the given UXO relative density, which is defined as the UXO density divided by the sand grain density, ( nominally 2650 g...0.0 + 2.5*dsed ; % nominal bed roughness if no burial % (Potentially in future version, ripple height

  3. National Security Strategy and the Munitions' Paradox: Self-Sufficiency or Maximum Efficiency

    National Research Council Canada - National Science Library

    McChesney, Michael

    1998-01-01

    ... that the United States military strategy may not be credible to likely regional aggressors. Conversely, DoD acquisition leadership believes industry consolidation should continue and the munitions base should be expanded to include US allies...

  4. Trust: The Key to the Success of Mission Command in the Joint Force

    Science.gov (United States)

    2015-05-18

    Malaysia , Kuala Lumpur: International Conference on ISO9000. Schmidt, Todd A. “Design, Mission Command and the Network: Enabling Organization...trust.pdf. Steele , Dennis. “Setting the Azimuth for Joint Force 2020: Globally Integrated Operations and Mission Command.” Army Magazine, November

  5. Network device interface for digitally interfacing data channels to a controller via a network

    Science.gov (United States)

    Ellerbrock, Philip J. (Inventor); Grant, Robert L. (Inventor); Konz, Daniel W. (Inventor); Winkelmann, Joseph P. (Inventor)

    2009-01-01

    A communications system and method are provided for digitally connecting a plurality of data channels, such as sensors, actuators, and subsystems, to a controller using a network bus. The network device interface interprets commands and data received from the controller and polls the data channels in accordance with these commands. Specifically, the network device interface receives digital commands and data from the controller, and based on these commands and data, communicates with the data channels to either retrieve data in the case of a sensor or send data to activate an actuator. Data retrieved from the sensor is converted into digital signals and transmitted to the controller. Network device interfaces associated with different data channels can coordinate communications with the other interfaces based on either a transition in a command message sent by the bus controller or a synchronous clock signal.

  6. Progressing Insensitive Munitions: Benefits and Techniques for Proactively Addressing Environmental Regulations

    Science.gov (United States)

    2012-05-01

    X Worm Tubifex tubifex X X X Black worm Lumbriculus X Asiatic clam Corbicula fluminea X Estuarine/marine water column Mysid shrimp Americamysis...Objective: Characterize traditional and insensitive munitions (IMs) impacts on amphibian larvae to manage a candidate for T&E status that inhabit

  7. Hybrid analysis of multiaxis electromagnetic data for discrimination of munitions and explosives of concern

    Science.gov (United States)

    Friedel, M. J.; Asch, T. H.; Oden, C.

    2012-08-01

    The remediation of land containing munitions and explosives of concern, otherwise known as unexploded ordnance, is an ongoing problem facing the U.S. Department of Defense and similar agencies worldwide that have used or are transferring training ranges or munitions disposal areas to civilian control. The expense associated with cleanup of land previously used for military training and war provides impetus for research towards enhanced discrimination of buried unexploded ordnance. Towards reducing that expense, a multiaxis electromagnetic induction data collection and software system, called ALLTEM, was designed and tested with support from the U.S. Department of Defense Environmental Security Technology Certification Program. ALLTEM is an on-time time-domain system that uses a continuous triangle-wave excitation to measure the target-step response rather than traditional impulse response. The system cycles through three orthogonal transmitting loops and records a total of 19 different transmitting and receiving loop combinations with a nominal spatial data sampling interval of 20 cm. Recorded data are pre-processed and then used in a hybrid discrimination scheme involving both data-driven and numerical classification techniques. The data-driven classification scheme is accomplished in three steps. First, field observations are used to train a type of unsupervised artificial neural network, a self-organizing map (SOM). Second, the SOM is used to simultaneously estimate target parameters (depth, azimuth, inclination, item type and weight) by iterative minimization of the topographic error vectors. Third, the target classification is accomplished by evaluating histograms of the estimated parameters. The numerical classification scheme is also accomplished in three steps. First, the Biot-Savart law is used to model the primary magnetic fields from the transmitter coils and the secondary magnetic fields generated by currents induced in the target materials in the

  8. Hybrid analysis of multiaxis electromagnetic data for discrimination of munitions and explosives of concern

    Science.gov (United States)

    Friedel, M.J.; Asch, T.H.; Oden, C.

    2012-01-01

    The remediation of land containing munitions and explosives of concern, otherwise known as unexploded ordnance, is an ongoing problem facing the U.S. Department of Defense and similar agencies worldwide that have used or are transferring training ranges or munitions disposal areas to civilian control. The expense associated with cleanup of land previously used for military training and war provides impetus for research towards enhanced discrimination of buried unexploded ordnance. Towards reducing that expense, a multiaxis electromagnetic induction data collection and software system, called ALLTEM, was designed and tested with support from the U.S. Department of Defense Environmental Security Technology Certification Program. ALLTEM is an on-time time-domain system that uses a continuous triangle-wave excitation to measure the target-step response rather than traditional impulse response. The system cycles through three orthogonal transmitting loops and records a total of 19 different transmitting and receiving loop combinations with a nominal spatial data sampling interval of 20 cm. Recorded data are pre-processed and then used in a hybrid discrimination scheme involving both data-driven and numerical classification techniques. The data-driven classification scheme is accomplished in three steps. First, field observations are used to train a type of unsupervised artificial neural network, a self-organizing map (SOM). Second, the SOM is used to simultaneously estimate target parameters (depth, azimuth, inclination, item type and weight) by iterative minimization of the topographic error vectors. Third, the target classification is accomplished by evaluating histograms of the estimated parameters. The numerical classification scheme is also accomplished in three steps. First, the Biot–Savart law is used to model the primary magnetic fields from the transmitter coils and the secondary magnetic fields generated by currents induced in the target materials in the

  9. Using waterjet in reverse logistic operations in discarded munitions processing

    Czech Academy of Sciences Publication Activity Database

    Hloch, S.; Tozan, H.; Yagimli, M.; Valíček, Jan; Rokosz, K.

    2011-01-01

    Roč. 18, č. 2 (2011), s. 267-271 ISSN 1330-3651 Institutional research plan: CEZ:AV0Z30860518 Keywords : abrasive waterjet * anti tank bullet * automatic line Subject RIV: JQ - Machines ; Tools Impact factor: 0.347, year: 2011 http://hrcak.srce.hr/search/?q=Using+waterjet+in+reverse+logistic+operations+in+discarded+munitions+processing

  10. US command improvements and command vulnerability

    International Nuclear Information System (INIS)

    Ball, D.; Bethe, H.A.; Blair, B.G.; Bracken, P.; Carter, A.B.; Dickinson, H.; Garwin, R.L.; Holloway, D.; Kendall, H.W.

    1988-01-01

    In essence, the United States still relies on the strategic command system erected during the 1960s and 1970s, but as we have seen, this system suffers from a number of serious weaknesses. Among these the authors emphasized the vulnerability of vital communications even before any warheads impact directly on U.S. targets, as well as the systems; heavy reliance on a relatively small number of limited-endurance aircraft as command posts and radio relays. This paper focuses on the committed improvement program, assess its impact on command vulnerability, and offer suggestions for further command improvements designed to enhance crisis stability and to facilitate ware termination should deterrence fail. The reader should note that this chapter is rather more technical than the remainder of this book

  11. Network, system, and status software enhancements for the autonomously managed electrical power system breadboard. Volume 3: Commands specification

    Science.gov (United States)

    Mckee, James W.

    1990-01-01

    This volume (3 of 4) contains the specification for the command language for the AMPS system. The volume contains a requirements specification for the operating system and commands and a design specification for the operating system and command. The operating system and commands sits on top of the protocol. The commands are an extension of the present set of AMPS commands in that the commands are more compact, allow multiple sub-commands to be bundled into one command, and have provisions for identifying the sender and the intended receiver. The commands make no change to the actual software that implement the commands.

  12. Innovative permeable cover system to reduce risks at a chemical munitions burial site

    International Nuclear Information System (INIS)

    Powels, C.C.; Bon, I.; Okusu, N.M.

    1997-01-01

    An innovative permeable sand cover with various integrated systems has been designed to contain and treat the Old O-Field chemical munitions landfill at Aberdeen Proving Ground, Maryland. The 18,200 m 2 (4.5 acre) landfill was used from the mid 1930s to the mid 1950s for the disposal of chemical, incendiary, and explosive munitions from domestic and foreign origins, together with contaminated wastes associated with the development and production of chemical warfare agents (CWA). The site is suspected to be contaminated with white phosphorous (WP) (which when dry, spontaneously burns when exposed to air), shock sensitive picric acid fuses and has the potential to contain large quantities of CWA-filled munitions. Historically, one to three explosions or fires occurred per ten-year period at the landfill. Such events have the potential to cause a CWA release to the environment, which could potentially affect densely populated areas. Recovery and decontamination projects conducted at the site in the late 1940s and early 1950s used large amounts of decontamination chemicals (containing solvents) and fuels which further contaminated the area. The groundwater downgradient of the landfill is contaminated with volatile organic compounds, metals, explosives and CWA degradation compounds and is currently being contained by a groundwater extraction and treatment system. This report describes a remedial action program for the site

  13. Recommendations on Future Operational Environments Command Control and Cyber Security

    OpenAIRE

    Goztepe, Kerim

    2015-01-01

    It is a well-known fact that today a nation's telecommunication networks, critical infrastructure, and information systems are vulnerable to growing number of attacks in cyberspace. Cyber space contains very different problems involving various sets of threats, targets and costs. Cyber security is not only problem of banking, communication or transportation. It also threatens core systems of army as command control. Some significant recommendations on command control (C2) and cyber security h...

  14. On the comparison of predictive control and command governor approaches for operational control of drinking water networks: A case study

    OpenAIRE

    Tedesco, Francesco; Ocampo-Martinez, Carlos; Cassavola, Alessandro; Puig, Vicenç

    2014-01-01

    This paper evaluates the application of command governor (CG) strategy for the operational control of drinking water networks (DWN) given their large-scale and complex nature, the permanent and relevant effect of the disturbances (water demands) and their marginal stability feature. Moreover, the performance improvement offered by CG is compared with the application of model predictive control for the same management purposes and in the same context. The paper also discusses the effectiveness...

  15. Analysis of Biota to Evaluate the Risks Associated with Chemical Warfare Materiel Present in Sea-Disposed Military Munitions to Human Health and the Environment

    Science.gov (United States)

    Briggs, C. W.; Bissonnette, M. C.; Edwards, M.; Shjegstad, S. M.

    2016-12-01

    Thousands of 100-lb M47A series bombs containing sulfur mustard were disposed in the ocean following World War II yet few studies have been conducted at sites in excess of 250 m, the depth where most discarded military munitions (DMM) were disposed. The Hawai`i Undersea Military Munitions Assessment (HUMMA) project was conducted to evaluate the risk from chemical warfare materiel (CWM) in DMM to human health, measuring ecological differences between the disposal area and nearby but otherwise similar areas, and evaluating the most efficient platforms for surveying DMM sea-disposal sites located at depths between 400-650 m. During the 2014 HUMMA Sampling Survey, the Jason 2 remotely operated vehicle was used to collect data. Shrimp were collected and analyzed to assess the potential for bioaccumulation of CWM, energetics and metals from munitions. No CWM was detected in H. ensifer tissue samples, indicating bioaccumulation is not occurring. Low levels of 2,4,6-trinitrotoluene, 4-amino-2,6-­dinitrotoluene, 1,3,5-trinitrobenzene, nitrobenzene, arsenic, copper, and lead were detected and the concentrations were not significantly different at DMM and control sites. No visible deformities, eroded fins, lesions, or tumors were observed on the shrimp living in the vicinity of M47A bombs. Given these results and under current and potential future uses of the HUMMA study area, health risks to likely receptors are within EPA acceptable levels. Photographic data and benthic infauna analysis were used to study benthic organisms that lived on or near munitions. There was no statistically distinguishable difference between organism distributions in dense and sparse munitions fields. Conventional munitions were found to have the greatest number of benthic infauna individuals, with control sites generally having the least number of individuals. This is consistent with the benthic macro-fauna analysis, which shows that munitions provide habitat.

  16. 32 CFR 724.406 - Commander, Naval Medical Command.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Commander, Naval Medical Command. 724.406 Section 724.406 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY PERSONNEL NAVAL DISCHARGE REVIEW BOARD Principal Elements of the Navy Department Discharge Review System § 724.406 Commander...

  17. Commanders' Survey: School for Command Preparation Feedback

    National Research Council Canada - National Science Library

    Frame, Adela

    1997-01-01

    .... All command designees attend the PreCommand Course (PCC). PCC provides common understanding of current doctrine, and up-to-date information on Army-wide policy, programs and special items of interest...

  18. Depleted uranium instead of lead in munitions: the lesser evil.

    Science.gov (United States)

    Jargin, Sergei V

    2014-03-01

    Uranium has many similarities to lead in its exposure mechanisms, metabolism and target organs. However, lead is more toxic, which is reflected in the threshold limit values. The main potential hazard associated with depleted uranium is inhalation of the aerosols created when a projectile hits an armoured target. A person can be exposed to lead in similar ways. Accidental dangerous exposures can result from contact with both substances. Encountering uranium fragments is of minor significance because of the low penetration depth of alpha particles emitted by uranium: they are unable to penetrate even the superficial keratin layer of human skin. An additional cancer risk attributable to the uranium exposure might be significant only in case of prolonged contact of the contaminant with susceptible tissues. Lead intoxication can be observed in the wounded, in workers manufacturing munitions etc; moreover, lead has been documented to have a negative impact on the intellectual function of children at very low blood concentrations. It is concluded on the basis of the literature overview that replacement of lead by depleted uranium in munitions would be environmentally beneficial or largely insignificant because both lead and uranium are present in the environment.

  19. Depleted uranium instead of lead in munitions: the lesser evil

    International Nuclear Information System (INIS)

    Jargin, Sergei V

    2014-01-01

    Uranium has many similarities to lead in its exposure mechanisms, metabolism and target organs. However, lead is more toxic, which is reflected in the threshold limit values. The main potential hazard associated with depleted uranium is inhalation of the aerosols created when a projectile hits an armoured target. A person can be exposed to lead in similar ways. Accidental dangerous exposures can result from contact with both substances. Encountering uranium fragments is of minor significance because of the low penetration depth of alpha particles emitted by uranium: they are unable to penetrate even the superficial keratin layer of human skin. An additional cancer risk attributable to the uranium exposure might be significant only in case of prolonged contact of the contaminant with susceptible tissues. Lead intoxication can be observed in the wounded, in workers manufacturing munitions etc; moreover, lead has been documented to have a negative impact on the intellectual function of children at very low blood concentrations. It is concluded on the basis of the literature overview that replacement of lead by depleted uranium in munitions would be environmentally beneficial or largely insignificant because both lead and uranium are present in the environment. (opinion)

  20. Digital intelligent booster for DCC miniature train networks

    Science.gov (United States)

    Ursu, M. P.; Condruz, D. A.

    2017-08-01

    Modern miniature trains are now driven by means of the DCC (Digital Command and Control) system, which allows the human operator or a personal computer to launch commands to each individual train or even to control different features of the same train. The digital command station encodes these commands and sends them to the trains by means of electrical pulses via the rails of the railway network. Due to the development of the miniature railway network, it may happen that the power requirement of the increasing number of digital locomotives, carriages and accessories exceeds the nominal output power of the digital command station. This digital intelligent booster relieves the digital command station from powering the entire railway network all by itself, and it automatically handles the multiple powered sections of the network. This electronic device is also able to detect and process short-circuits and overload conditions, without the intervention of the digital command station.

  1. Detection of Botnet Command and Control Traffic by the Multistage Trust Evaluation of Destination Identifiers

    Directory of Open Access Journals (Sweden)

    Pieter Burghouwt

    2015-10-01

    Full Text Available Network-based detection of botnet Command and Control communication is a difficult task if the traffic has a relatively low volume and if popular protocols, such as HTTP, are used to resemble normal traffic. We present a new network-based detection approach that is capable of detecting this type of Command and Control traffic in an enterprise network by estimating the trustworthiness of the traffic destinations. If the destination identifier of a traffic flow origins directly from: human input, prior traffic from a trusted destination, or a defined set of legitimate applications, the destination is trusted and its associated traffic is classified as normal. Advantages of this approach are: the ability of zero day malicious traffic detection, low exposure to malware by passive host-external traffic monitoring, and the applicability for real-time filtering. Experimental evaluation demonstrates successful detection of diverse types of Command and Control Traffic.

  2. SOA approach to battle command: simulation interoperability

    Science.gov (United States)

    Mayott, Gregory; Self, Mid; Miller, Gordon J.; McDonnell, Joseph S.

    2010-04-01

    NVESD is developing a Sensor Data and Management Services (SDMS) Service Oriented Architecture (SOA) that provides an innovative approach to achieve seamless application functionality across simulation and battle command systems. In 2010, CERDEC will conduct a SDMS Battle Command demonstration that will highlight the SDMS SOA capability to couple simulation applications to existing Battle Command systems. The demonstration will leverage RDECOM MATREX simulation tools and TRADOC Maneuver Support Battle Laboratory Virtual Base Defense Operations Center facilities. The battle command systems are those specific to the operation of a base defense operations center in support of force protection missions. The SDMS SOA consists of four components that will be discussed. An Asset Management Service (AMS) will automatically discover the existence, state, and interface definition required to interact with a named asset (sensor or a sensor platform, a process such as level-1 fusion, or an interface to a sensor or other network endpoint). A Streaming Video Service (SVS) will automatically discover the existence, state, and interfaces required to interact with a named video stream, and abstract the consumers of the video stream from the originating device. A Task Manager Service (TMS) will be used to automatically discover the existence of a named mission task, and will interpret, translate and transmit a mission command for the blue force unit(s) described in a mission order. JC3IEDM data objects, and software development kit (SDK), will be utilized as the basic data object definition for implemented web services.

  3. Decision Support Tools for Munitions Response Performance Prediction and Risk Assessment

    Science.gov (United States)

    2016-09-01

    Oldenburg. A discrimination algorithm for UXO using time domain electromagnetic induction . Journal of Environmental and Engineering Geophysics, 6:91...the course of a munitions response project. Unexploded ordnance (UXO), electromagnetic (EM), sensors, electromagnetic induction (EMI), data...approach defines a detection channel that is a linear combination of received channels. The weightings of received channels comprising the optimized

  4. Evaluation of the metabolic fate of munitions material (TNT & RDX) in plant systems and initial assessment of material interaction with plant genetic material. Validation of the metabolic fate of munitions materials (TNT, RDX) in mature crops

    Energy Technology Data Exchange (ETDEWEB)

    Fellows, R.J.; Harvey, S.D.; Cataldo, D.A.

    1995-09-01

    The goals of this effort were to confirm and expand data related to the behavior and impacts of munitions residues upon human food chain components. Plant species employed included corn (Zea mays), alfalfa (Medicago sativa). spinach (Spinacea oleraceae), and carrot (Daucus carota). Plants were grown from seed to maturity (70 to 120 days) in a low-fertility soil (Burbank) amended with either {sup 14}C-TNT or {sup 14}C-RDX at which time they were harvested and analyzed for munitions uptake, partitioning, and chemical form of the munition or munition-metabolite. All four of the plant species used in this study accumulated the {sup 14}C-TNT- and RDX-derived label. The carrot, alfalfa, and corn demonstrated a higher percentage of label retained in the roots (62, 73, and 83% respectively). The spinach contained less activity in its root (36%) but also contained the highest TNT specific activity observed (>4600 jig TNT equivalents/g dry wt.). The specific uptake values of RDX for the spinach and alfalfa were comparable to those previously reported for wheat and bean (314 to 590 {mu}g RDX-equivalents/g dry wt. respectively). An exception to this may be the carrot where the specific activity was found to exceed 4200 {mu}g RDX-equivalents/g dry wt. in the shoot. The total accumulation of TNT by the plants ranged from 1.24% for the spinach to 2.34% for the carrot. The RDX plants ranging from 15% for the spinach to 37% for the carrot. There was no identifiable TNT or amino dinitrotoluene (ADNT) isomers present in the plants however, the parent RDX compound was found at significant levels in the shoot of alfalfa (> 1 80 {mu}g/g) and corn (>18 {mu}g/g).

  5. Apparatus and method for data communication in an energy distribution network

    Science.gov (United States)

    Hussain, Mohsin; LaPorte, Brock; Uebel, Udo; Zia, Aftab

    2014-07-08

    A system for communicating information on an energy distribution network is disclosed. In one embodiment, the system includes a local supervisor on a communication network, wherein the local supervisor can collect data from one or more energy generation/monitoring devices. The system also includes a command center on the communication network, wherein the command center can generate one or more commands for controlling the one or more energy generation devices. The local supervisor can periodically transmit a data signal indicative of the data to the command center via a first channel of the communication network at a first interval. The local supervisor can also periodically transmit a request for a command to the command center via a second channel of the communication network at a second interval shorter than the first interval. This channel configuration provides effective data communication without a significant increase in the use of network resources.

  6. Disposal of chemical agents and munitions stored at Pine Bluff Arsenal, Pine Bluff, Arkansas. Final phase 1, Environmental report

    Energy Technology Data Exchange (ETDEWEB)

    Ensminger, J.T.; Hillsman, E.L.; Johnson, R.D.; Morrisey, J.A.; Staub, W.P.; Boston, C.R.; Hunsaker, D.B.; Leibsch, E.; Rickert, L.W.; Tolbert, V.R.; Zimmerman, G.P.

    1991-09-01

    The Pine Bluff Arsenal (PBA) near Pine Bluff, Arkansas, is one of eight continental United States (CONUS) Army installations where lethal unitary chemical agents and munitions are stored and where destruction of agents and munitions is proposed under the Chemical Stockpile Disposal Program (CSDP). The chemical agent inventory at PBA consists of approximately 12%, by weight, of the total US stockpile. The destruction of the stockpile is necessary to eliminate the risk to the public from continued storage and to dispose of obsolete and leaking munitions. In 1988 the US Army issued a Final Programmatic Environmental Impact Statement (FPEIS) for the CSDP that identified on-site disposal of agents and munitions as the environmentally preferred alternative (i.e., the alternative with the least potential to cause significant adverse impacts). The purpose of this report is to examine the proposed implementation of on-site disposal at PBA in light of more recent and more detailed data than those on which the FPEIS is based. New population data were used to compute fatalities using the same computation methods and values for all other parameters as in the FPEIS. Results indicate that all alternatives are indistinguishable when the potential health impacts to the PBA community are considered. However, risks from on-site disposal are in all cases equal to or less than risks from other alternatives. Furthermore, no unique resources with the potential to prevent or delay implementation of on-site disposal at PBA have been identified.

  7. Optimization of Intelligent Munition Warfare Using Agent-Based Simulation Software and Design of Experiments Methodology

    National Research Council Canada - National Science Library

    Floersheim, Bruce; Hou, Gene

    2006-01-01

    ... mechanism for a number of vehicles caught in the killzone. Thus, it is useful to study and attempt to model through equations and simulation the interaction between enemy agents and these new munitions...

  8. Legacy in the Sand: The United States Army Armament, Munitions and Chemical Command in Operations Desert Shield and Desert Storm

    Science.gov (United States)

    1992-12-21

    States Army Medical Department, over 1.5 million British-designed Small Box Respirator ( SBR ) masks, utilizing activated coconut charcoal as a filter, had...conflicts this nation will tfce-short in rjuration but of high intensity. In such a war, relance must bpp oaced upon the established stockpile and the...Supply System SAW squad automatic weapon SBA Small Business Administration SBR small box respirator SCR senior command representati’e SCRAM self-contained

  9. Safety and vulnerability simulation of munitions; Modelisation du comportement de munitions en securite et vulnerabilite

    Energy Technology Data Exchange (ETDEWEB)

    Desailly, D.; Briquet, B.; Brunet, P.; Guegant, Y.; Houdusse, D.; Prost, M. [Groupe SNPE Propulsion/ Centre de Recherches du Boucher, 91 - Vert le Petit (France)

    2002-09-01

    Vulnerability of new weapon systems to accidental and hostile environments is a major concern for military operations and many research programs have been so investigated of SNPE Propulsion. Before they were accepted as being safe and suitable for introduction into military inventories systems underwent a wide range of expensive type qualification trials. There was a need therefore, to develop a greater understanding of the reaction mechanisms that affect the behaviour of confined energetic materials when subjected to external stimuli and computer models to control the resulting hazard. As part of this program SNPE Propulsion has developed a method for modelling Cook-off response in order to master the design of insensitive munitions (IM). The behavior of energetic materials when they are submitted to a thermal threat is complex and follows two different time scales: thermochemical processes, counted in minutes even hours whereas pyrotechnic reaction may require a few microseconds. It was shown that the reaction level is ruled by the competition between pressure generated from the cook-off reaction and stress release resulting from break-up confinement. After self-ignition phenomenon and under some confinement and thermal conditions burning can accelerate to deflagration and lead to a deflagration to detonation transition (DDT) event. The method requires'modular tools describing each physical phenomenon. Works have been first focused on the development of experimental facilities to characterise thermal chemical properties and reactivity of thermally damaged energetic material. Consequently the first part of the model describing self-heating and pyrolysis processes has been implemented in an implicit solver. Simulations have shown quite accurate predictions (ignition temperature, time to event) and proved the effectiveness of this approach. Recent developments are.thus concentrated on the numerical modelling of the reaction violence level prediction hence a

  10. Cost Of Compliance On Munitions Consolidation From Lualualei To West Loch

    Science.gov (United States)

    2017-12-01

    well as the opportunity to drastically reduce the transportation of ordnance to and from the Lualualei Annex through local community roads and areas...single road and the availability of CULT trucks and/or drivers that could impede an expeditious response in a contingency operation. This project...to distribute munitions to the fleet. This consolidation plan will also reduce the infrastructure costs for ordnance storage, maintenance , and

  11. Dissolution of NTO, DNAN, and Insensitive Munitions Formulations and Their Fates in Soils

    Science.gov (United States)

    2014-09-01

    plastic bags to save the (a) (b) ERDC/CRREL TR-14-23 10 sample even if the bottle should break from ice formation. During each collection, we...Bacillus sp. Biodegradation 23 (2): 287–295. Prak, D.L., and D. O’Sullivan. 2012. Photochemical Transformation of Munitions Constituents in Marine

  12. Zenith-100 Microcomputer Network for Air Command and Staff College.

    Science.gov (United States)

    1987-04-01

    34 AD-A182 495 ZENI T-ipo ml CROCOMFUT E NET WOR( FOR AIR COMAND AND h SAFF CoLLG (U) AIl COMMAND ANDCSTAFF COLL MAX(WELL AFS "CAL W L GALWAY El AL...processing of documents by eliminating the time required to physically move the documents from one office to the next. Reproduction Savings. Information

  13. Filtering and Trust as Tools for the Operational Commander in the Information Age

    National Research Council Canada - National Science Library

    Davis, Alan D

    2006-01-01

    ... has. An analysis of this environment points to the impact of network centric warfare, information superiority, shared situational awareness, adaptability, and transparency on the commander's decision-making process...

  14. Disposal of chemical agents and munitions stored at Umatilla Depot Activity, Hermiston, Oregon. Final Phase 1 environmental report

    Energy Technology Data Exchange (ETDEWEB)

    Zimmerman, G.P.; Hillsman, E.L.; Johnson, R.O.; Miller, R.L.; Patton, T.G.; Schoepfle, G.M.; Tolbert, V.R.; Feldman, D.L.; Hunsaker, D.B. Jr.; Kroodsma, R.L.; Morrissey, J.; Rickert, L.W.; Staub, W.P.; West, D.C.

    1993-02-01

    The Umatilla Depot Activity (UMDA) near Hermiston, Oregon, is one of eight US Army installations in the continental United States where lethal unitary chemical agents and munitions are stored, and where destruction of agents and munitions is proposed under the Chemical Stockpile Disposal Program (CSDP). The chemical agent inventory at UMDA consists of 11.6%, by weight, of the total US stockpile. The destruction of the stockpile is necessary to eliminate the risk to the public from continued storage and to dispose of obsolete and leaking munitions. In 1988 the US Army issued a Final Programmatic Environmental Impact Statement (FPEIS) for the CSDP that identified on-site disposal of agents and munitions as the environmentally preferred alternative (i.e., the alternative with the least potential to cause significant adverse impacts), using a method based on five measures of risk for potential human health and ecosystem/environmental effects; the effectiveness and adequacy of emergency preparedness capabilities also played a key role in the FPEIS selection methodology. In some instances, the FPEIS included generic data and assumptions that were developed to allow a consistent comparison of potential impacts among programmatic alternatives and did not include detailed conditions at each of the eight installations. The purpose of this Phase 1 report is to examine the proposed implementation of on-site disposal at UMDA in light of more recent and more detailed data than those included in the FPEIS. Specifically, this Phase 1 report is intended to either confirm or reject the validity of on-site disposal for the UMDA stockpile. Using the same computation methods as in the FPEIS, new population data were used to compute potential fatalities from hypothetical disposal accidents. Results indicate that onsite disposal is clearly preferable to either continued storage at UMDA or transportation of the UMDA stockpile to another depot for disposal.

  15. Acute toxicity of sea-dumped chemical munitions: Luminating the environmental toxicity of legacy compounds

    DEFF Research Database (Denmark)

    Mohammed Abdullah Christensen, Ilias; Sanderson, Hans; Baatrup, Erik

    2016-01-01

    As a result of the disarmament of Germany after the Second World War, 65,000 tons of chemical munitions were dumped in the Baltic Sea. Approximately 13,000 tons containing chemical warfare agents (CWAs) of which 11,000 tons were dumped in the Bornholm Basin east of Bornholm. This paper addresses...

  16. Tools virtualization for command and control systems

    Science.gov (United States)

    Piszczek, Marek; Maciejewski, Marcin; Pomianek, Mateusz; Szustakowski, Mieczysław

    2017-10-01

    Information management is an inseparable part of the command process. The result is that the person making decisions at the command post interacts with data providing devices in various ways. Tools virtualization process can introduce a number of significant modifications in the design of solutions for management and command. The general idea involves replacing physical devices user interface with their digital representation (so-called Virtual instruments). A more advanced level of the systems "digitalization" is to use the mixed reality environments. In solutions using Augmented reality (AR) customized HMI is displayed to the operator when he approaches to each device. Identification of device is done by image recognition of photo codes. Visualization is achieved by (optical) see-through head mounted display (HMD). Control can be done for example by means of a handheld touch panel. Using the immersive virtual environment, the command center can be digitally reconstructed. Workstation requires only VR system (HMD) and access to information network. Operator can interact with devices in such a way as it would perform in real world (for example with the virtual hands). Because of their procedures (an analysis of central vision, eye tracking) MR systems offers another useful feature of reducing requirements for system data throughput. Due to the fact that at the moment we focus on the single device. Experiments carried out using Moverio BT-200 and SteamVR systems and the results of experimental application testing clearly indicate the ability to create a fully functional information system with the use of mixed reality technology.

  17. Message network simulation

    OpenAIRE

    Shih, Kuo-Tung

    1990-01-01

    Approved for public release, distribution is unlimited This thesis presents a computer simulation of a multinode data communication network using a virtual network model to determine the effects of various system parameters on overall network performance. Lieutenant Commander, Republic of China (Taiwan) Navy

  18. Environmental Assessment: Demolition of Munitions Storage Area Facilities at Ellsworth AFB, South Dakota

    Science.gov (United States)

    2009-11-01

    CEQ Council on Environmental Quality CFR Code of Federal Regulations CO Carbon Monoxide cpm Counts per Minute CRM Cultural Resource Manager...newspaper advertisement in the Rapid City Journal announcing the availability of the Draft EA for a 30-day public and agency review to facilitate...Ellsworth Air Force Base Munitions Storage Area Environmental Assessment Page 2-5 public involvement in the project. This advertisement was published one

  19. A local network integrated into a balloon-borne apparatus

    Science.gov (United States)

    Imori, Masatosi; Ueda, Ikuo; Shimamura, Kotaro; Maeno, Tadashi; Murata, Takahiro; Sasaki, Makoto; Matsunaga, Hiroyuki; Matsumoto, Hiroshi; Shikaze, Yoshiaki; Anraku, Kazuaki; Matsui, Nagataka; Yamagami, Takamasa

    A local network is incorporated into an apparatus for a balloon-borne experiment. A balloon-borne system implemented in the apparatus is composed of subsystems interconnected through a local network, which introduces modular architecture into the system. The network decomposes the balloon-borne system into subsystems, which are similarly structured from the point of view that the systems is kept under the control of a ground station. The subsystem is functionally self-contained and electrically independent. A computer is integrated into a subsystem, keeping the subsystem under the control. An independent group of batteries, being dedicated to a subsystem, supplies the whole electricity of the subsystem. The subsystem could be turned on and off independently of the other subsystems. So communication among the subsystems needs to be based on such a protocol that could guarantee the independence of the individual subsystems. An Omninet protocol is employed to network the subsystems. A ground station sends commands to the balloon-borne system. The command is received and executed at the system, then results of the execution are returned to the ground station. Various commands are available so that the system borne on a balloon could be controlled and monitored remotely from the ground station. A subsystem responds to a specific group of commands. A command is received by a transceiver subsystem and then transferred through the network to the subsystem to which the command is addressed. Then the subsystem executes the command and returns results to the transceiver subsystem, where the results are telemetered to the ground station. The network enhances independence of the individual subsystems, which enables programs of the individual subsystems to be coded independently. Independence facilitates development and debugging of programs, improving the quality of the system borne on a balloon.

  20. Munitions and Explosives of Concern Survey Methodology and In-field Testing for Wind Energy Areas on the Atlantic Outer Continental Shelf

    Science.gov (United States)

    DuVal, C.; Carton, G.; Trembanis, A. C.; Edwards, M.; Miller, J. K.

    2017-12-01

    Munitions and explosives of concern (MEC) are present in U.S. waters as a result of past and ongoing live-fire testing and training, combat operations, and sea disposal. To identify MEC that may pose a risk to human safety during development of offshore wind facilities on the Atlantic Outer Continental Shelf (OCS), the Bureau of Ocean Energy Management (BOEM) is preparing to develop guidance on risk analysis and selection processes for methods and technologies to identify MEC in Wind Energy Areas (WEA). This study developed a process for selecting appropriate technologies and methodologies for MEC detection using a synthesis of historical research, physical site characterization, remote sensing technology review, and in-field trials. Personnel were tasked with seeding a portion of the Delaware WEA with munitions surrogates, while a second group of researchers not privy to the surrogate locations tested and optimized the selected methodology to find and identify the placed targets. This in-field trial, conducted in July 2016, emphasized the use of multiple sensors for MEC detection, and led to further guidance for future MEC detection efforts on the Atlantic OCS. An April 2017 follow on study determined the fate of the munitions surrogates after the Atlantic storm season had passed. Using regional hydrodynamic models and incorporating the recommendations from the 2016 field trial, the follow on study examined the fate of the MEC and compared the findings to existing research on munitions mobility, as well as models developed as part of the Office of Naval Research Mine-Burial Program. Focus was given to characterizing the influence of sediment type on surrogate munitions behavior and the influence of mophodynamics and object burial on MEC detection. Supporting Mine-Burial models, ripple bedforms were observed to impede surrogate scour and burial in coarse sediments, while surrogate burial was both predicted and observed in finer sediments. Further, incorporation of

  1. Screening Level Ecological Risk Assessments of Some Military Munitions and Obscurant-related Compounds for Selected Threatened and Endangered Species

    National Research Council Canada - National Science Library

    Von Stackleberg, Katherine; Amos, Craig; Butler, C; Smith, Thomas; Famely, J; McArdle, M; Southworth, B; Steevens, Jeffrey

    2006-01-01

    ...) associated with munitions. This study evaluates the potential long-term impacts on selected threatened and endangered species resulting from dispersion and deposition of vapors and particles found in the fog oils...

  2. Validation of Passive Sampling Devices for Monitoring of Munitions Constituents in Underwater Environments

    Science.gov (United States)

    2017-09-01

    and explosives of concern (MEC) corroding, breaching, and leaking MC into the water column (Darrach, Chutjian, and Plett, 1998; GMI, 2007; Lewis et...underwater UWMM have the potential to corrode, breach, and leak munitions constituents (MCs) such as 2,4,6-trinitrotoluene (TNT) and hexahydro-1,3,5...Wang et al., 2013), a number of challenges prevent accurate assessment of environmental exposure using traditional water , sediment, and tissue

  3. Post-traumatic stress disorder in adult victims of cluster munitions in Lebanon: a 10-year longitudinal study.

    Science.gov (United States)

    Fares, Jawad; Gebeily, Souheil; Saad, Mohamad; Harati, Hayat; Nabha, Sanaa; Said, Najwane; Kanso, Mohamad; Abdel Rassoul, Ronza; Fares, Youssef

    2017-08-18

    This study aims to explore the short-term and long-term prevalence and effects of post-traumatic stress disorder (PTSD) among victims of cluster munitions. A prospective 10-year longitudinal study that took place in Lebanon. Two-hundred-and-forty-four Lebanese civilian victims of submunition blasts, who were injured in 2006 and were over 18 years old, were interviewed. Included were participants who had been diagnosed with PTSD according to the Diagnostic and Statistical Manual of Mental Disorders, 5th Edition (DSM-5) and the PTSD Checklist - Civilian Version in 2006. Interviewees were present for the 10-year follow-up. PTSD prevalence rates of participants in 2006 and 2016 were compared. Analysis of the demographical data pertaining to the association of long-term PTSD with other variables was performed. p Values <0.05 were considered statistically significant for all analyses (95% CI). All the 244 civilians injured by cluster munitions in 2006 responded, and were present for long-term follow-up in 2016. The prevalence of PTSD decreased significantly from 98% to 43% after 10 years (p<0.001). A lower long-term prevalence was significantly associated with male sex (p<0.001), family support (p<0.001) and religion (p<0.001). Hospitalisation (p=0.005) and severe functional impairment (p<0.001) post-trauma were significantly associated with increased prevalence of long-term PTSD. Symptoms of negative cognition and mood were more common in the long run. In addition, job instability was the most frequent socioeconomic repercussion among the participants (88%). Psychological symptoms, especially PTSD, remain high in war-affected populations many years after the war; this is particularly evident for Lebanese civilians who were victimised by cluster munitions. Screening programmes and psychological interventions need to be implemented in vulnerable populations exposed to war traumas. Officials and public health advocates should consider the socioeconomic implications, and

  4. An integrated theoretical and experimental investigation of insensitive munition compounds adsorption on cellulose, cellulose triacetate, chitin and chitosan surfaces.

    Science.gov (United States)

    Gurtowski, Luke A; Griggs, Chris S; Gude, Veera G; Shukla, Manoj K

    2018-02-01

    This manuscript reports results of combined computational chemistry and batch adsorption investigation of insensitive munition compounds, 2,4-dinitroanisole (DNAN), triaminotrinitrobenzene (TATB), 1,1-diamino-2,2-dinitroethene (FOX-7) and nitroguanidine (NQ), and traditional munition compound 2,4,6-trinitrotoluene (TNT) on the surfaces of cellulose, cellulose triacetate, chitin and chitosan biopolymers. Cellulose, cellulose triacetate, chitin and chitosan were modeled as trimeric form of the linear chain of 4 C 1 chair conformation of β-d-glucopyranos, its triacetate form, β-N-acetylglucosamine and D-glucosamine, respectively, in the 1➔4 linkage. Geometries were optimized at the M062X functional level of the density functional theory (DFT) using the 6-31G(d,p) basis set in the gas phase and in the bulk water solution using the conductor-like polarizable continuum model (CPCM) approach. The nature of potential energy surfaces of the optimized geometries were ascertained through the harmonic vibrational frequency analysis. The basis set superposition error (BSSE) corrected interaction energies were obtained using the 6-311G(d,p) basis set at the same theoretical level. The computed BSSE in the gas phase was used to correct interaction energy in the bulk water solution. Computed and experimental results regarding the ability of considered surfaces in adsorbing the insensitive munitions compounds are discussed. Copyright © 2017. Published by Elsevier B.V.

  5. In-Flight Self-Alignment Method Aided by Geomagnetism for Moving Basement of Guided Munitions

    Directory of Open Access Journals (Sweden)

    Shuang-biao Zhang

    2015-01-01

    Full Text Available Due to power-after-launch mode of guided munitions of high rolling speed, initial attitude of munitions cannot be determined accurately, and this makes it difficult for navigation and control system to work effectively and validly. An in-flight self-alignment method aided by geomagnetism that includes a fast in-flight coarse alignment method and an in-flight alignment model based on Kalman theory is proposed in this paper. Firstly a fast in-flight coarse alignment method is developed by using gyros, magnetic sensors, and trajectory angles. Then, an in-flight alignment model is derived by investigation of the measurement errors and attitude errors, which regards attitude errors as state variables and geomagnetic components in navigation frame as observed variables. Finally, fight data of a spinning projectile is used to verify the performance of the in-flight self-alignment method. The satisfying results show that (1 the precision of coarse alignment can attain below 5°; (2 the attitude errors by in-flight alignment model converge to 24′ at early of the latter half of the flight; (3 the in-flight alignment model based on Kalman theory has better adaptability, and show satisfying performance.

  6. Command and Control of Space Assets Through Internet-Based Technologies Demonstrated

    Science.gov (United States)

    Foltz, David A.

    2002-01-01

    The NASA Glenn Research Center successfully demonstrated a transmission-control-protocol/ Internet-protocol- (TCP/IP) based approach to the command and control of onorbit assets over a secure network. This is a significant accomplishment because future NASA missions will benefit by using Internet-standards-based protocols. Benefits of this Internet-based space command and control system architecture include reduced mission costs and increased mission efficiency. The demonstration proved that this communications architecture is viable for future NASA missions. This demonstration was a significant feat involving multiple NASA organizations and industry. Phillip Paulsen, from Glenn's Project Development and Integration Office, served as the overall project lead, and David Foltz, from Glenn's Satellite Networks and Architectures Branch, provided the hybrid networking support for the required Internet connections. The goal was to build a network that would emulate a connection between a space experiment on the International Space Station and a researcher accessing the experiment from anywhere on the Internet, as shown. The experiment was interfaced to a wireless 802.11 network inside the demonstration area. The wireless link provided connectivity to the Tracking and Data Relay Satellite System (TDRSS) Internet Link Terminal (TILT) satellite uplink terminal located 300 ft away in a parking lot on top of a panel van. TILT provided a crucial link in this demonstration. Leslie Ambrose, NASA Goddard Space Flight Center, provided the TILT/TDRSS support. The TILT unit transmitted the signal to TDRS 6 and was received at the White Sands Second TDRSS Ground Station. This station provided the gateway to the Internet. Coordination also took place at the White Sands station to install a Veridian Firewall and automated security incident measurement (ASIM) system to the Second TDRSS Ground Station Internet gateway. The firewall provides a trusted network for the simulated space

  7. Penetrating injury to the chest by an attenuated energy projectile: a case report and literature review of thoracic injuries caused by "less-lethal" munitions.

    Science.gov (United States)

    Rezende-Neto, Joao; Silva, Fabriccio Df; Porto, Leonardo Bo; Teixeira, Luiz C; Tien, Homer; Rizoli, Sandro B

    2009-06-26

    We present the case of a patient who sustained a penetrating injury to the chest caused by an attenuated energy rubber bullet and review the literature on thoracic injuries caused by plastic and rubber "less-lethal" munitions. The patient of this report underwent a right thoracotomy to extract the projectile as well as a wedge resection of the injured lung parenchyma. This case demonstrates that even supposedly safe riot control munition fired at close range, at the torso, can provoke serious injury. Therefore a thorough investigation and close clinical supervision are justified.

  8. Opinion on the examination of the control-command general architecture of the Flamanville 3 EPR reactor and of its associated platforms

    International Nuclear Information System (INIS)

    2009-06-01

    This report first recalls the different technical and hardware elements and components discussed by the ISRN (Nuclear Radioprotection and Safety Institute) in front of the Expert Permanent Group for nuclear reactors. These elements and components are concerning the control-command architecture as a whole, and the technical ability of networks, computers, and robots. It outlines the main principles which the control-and-command must comply with: compliance of each component of the retained technological solution with the design requirements corresponding to the safety classification, robustness of the whole control-command architecture. Then, it comments and sometimes criticizes the status of the various components of the control-command platforms with respect to this compliance. Eight recommendations are given for the SPPA T2000 control-command platform and for the robustness of the control-command architecture

  9. Tracking and Interception of Ground-Based RF Sources Using Autonomous Guided Munitions with Passive Bearings-Only Sensors and Tracking Algorithms

    National Research Council Canada - National Science Library

    Ezal, Kenan; Agate, Craig

    2006-01-01

    This paper considers the problem of tracking and intercepting a potentially moving ground-based RF source with an autonomous guided munition that has a passive bearings-only sensor located on its nose...

  10. The Positive Aspects of Network Centric Command. The Ties Between Behavioral Doctrine and Technology

    National Research Council Canada - National Science Library

    Baldree, Steven

    1999-01-01

    .... Centralizing execution at the operational level due to "informational" superiority will be a step back in terms of war-fighting effectiveness and will be detrimental to commanders participating...

  11. The ergonomics of command and control

    OpenAIRE

    Stanton, NA; Baber, C

    2006-01-01

    Since its inception, just after the Second World War, ergonomics research has paid special attention to the issues surrounding human control of systems. Command and Control environments continue to represent a challenging domain for Ergonomics research. We take a broad view of Command and Control research, to include C2 (Command and Control), C3 (Command, Control and Communication), and C4 (Command, Control, Communication and Computers) as well as human supervisory control paradigms. This spe...

  12. Command and Control of Joint Air Operations through Mission Command

    Science.gov (United States)

    2016-06-01

    and outlines the C2 architecture systems, processes, and philosophy of com- mand required to enable mission command effectively. Mission Command...General Dempsey highlights the fact that “trust is the moral sinew that binds the distributed Joint Force 2020 together” and observes that “unless...con- fident about how their subordinates will make decisions and adapt to the dynamic battlespace environment. Processes, Systems, and Philosophy of

  13. Penetrating injury to the chest by an attenuated energy projectile: a case report and literature review of thoracic injuries caused by "less-lethal" munitions

    Directory of Open Access Journals (Sweden)

    Porto Leonardo BO

    2009-06-01

    Full Text Available Abstract We present the case of a patient who sustained a penetrating injury to the chest caused by an attenuated energy rubber bullet and review the literature on thoracic injuries caused by plastic and rubber "less-lethal" munitions. The patient of this report underwent a right thoracotomy to extract the projectile as well as a wedge resection of the injured lung parenchyma. This case demonstrates that even supposedly safe riot control munition fired at close range, at the torso, can provoke serious injury. Therefore a thorough investigation and close clinical supervision are justified.

  14. AFRICOM: Combatant Command for the 21st Century

    National Research Council Canada - National Science Library

    Juergens, Jr., Richard A

    2008-01-01

    ...: European Command, Southern Command, Northern Command, Central Command, and Pacific Command, as the Department of Defense's unified command structure responsible for specific geographical regions of the world...

  15. The health hazards of depleted uranium munitions. Part 1

    International Nuclear Information System (INIS)

    2001-01-01

    Depleted uranium is a toxic and weakly radioactive metal used for a variety of purposes. Perhaps its most controversial use is in battlefield munitions, where it can be widely dispersed in the form of fine particles and shrapnel that may enter the bodies of combatants and others through inhalation, ingestion or wounding. It is a matter of legitimate public concern whether the use of this material in this way could create unacceptable health hazards or damage to the environment. The objective of our study has been to provide the best scientific understanding of the ways in which the material may be distributed, how it may be taken up by humans, and the potential implications for health. For politicians, any hazards to health have to be balanced against the military advantages that the use of these munitions confers. We have not tried to reach a judgment on these political issues, but we believe that a better scientific understanding of the extent of the hazards will make it easier for these wider questions to be addressed in a more objective way. This report is the first of two, and addresses the likely levels of exposure to depleted uranium, the resulting radiological risks, and the lessons to be learned from epidemiological studies. Our second report will address toxicological risks and environmental issues. So far, we conclude that risks from radiation are low for most soldiers on the battlefield, and for civilians who later return to the area. However, there are uncertainties about the maximal levels of exposure to depleted uranium on the battlefield, and there may be circumstances in which a few soldiers are exposed to levels of depleted uranium that result in a significant risk to health. Further studies are needed to determine the levels of exposure to depleted uranium that might occur on the battlefield and to judge whether such higher risks are likely to occur in practice

  16. Linux Networking Cookbook

    CERN Document Server

    Schroder, Carla

    2008-01-01

    If you want a book that lays out the steps for specific Linux networking tasks, one that clearly explains the commands and configurations, this is the book for you. Linux Networking Cookbook is a soup-to-nuts collection of recipes that covers everything you need to know to perform your job as a Linux network administrator. You'll dive straight into the gnarly hands-on work of building and maintaining a computer network

  17. Force Protection and Command Relationships: Who's Responsible

    National Research Council Canada - National Science Library

    Moller, James

    1998-01-01

    .... This monograph analyzes the joint force protection program by investigating the terms: command, chain of command, command relationship, and how these terms authorize and empower a commander to implement this program across the joint force...

  18. Bioinspired polarization navigation sensor for autonomous munitions systems

    Science.gov (United States)

    Giakos, G. C.; Quang, T.; Farrahi, T.; Deshpande, A.; Narayan, C.; Shrestha, S.; Li, Y.; Agarwal, M.

    2013-05-01

    Small unmanned aerial vehicles UAVs (SUAVs), micro air vehicles (MAVs), Automated Target Recognition (ATR), and munitions guidance, require extreme operational agility and robustness which can be partially offset by efficient bioinspired imaging sensor designs capable to provide enhanced guidance, navigation and control capabilities (GNC). Bioinspired-based imaging technology can be proved useful either for long-distance surveillance of targets in a cluttered environment, or at close distances limited by space surroundings and obstructions. The purpose of this study is to explore the phenomenology of image formation by different insect eye architectures, which would directly benefit the areas of defense and security, on the following four distinct areas: a) fabrication of the bioinspired sensor b) optical architecture, c) topology, and d) artificial intelligence. The outcome of this study indicates that bioinspired imaging can impact the areas of defense and security significantly by dedicated designs fitting into different combat scenarios and applications.

  19. Structured multi-stream command language

    International Nuclear Information System (INIS)

    Glad, A.S.

    1982-12-01

    A multi-stream command language was implemented to provide the sequential and decision-making operations necessary to run the neutral-beam ion sources connected to the Doublet III tokamak fusion device. A multi-stream command language was implemented in Pascal on a Classic 7870 running under MAX IV. The purpose of this paper is threefold. First, to provide a brief description of the programs comprising the command language including the operating system interaction. Second, to give a description of the language syntax and commands necessary to develop a procedure stream. Third, to provide a description of the normal operating procedures for executing either the sequential or interactive streams

  20. Operation Iraqi Freedom: DOD Should Apply Lessons Learned Concerning the Need for Security over Conventional Munitions Storage Sites to Future Operations Planning

    National Research Council Canada - National Science Library

    D'Agostino, Davi M

    2007-01-01

    The Government Accountability Office (GAO) is releasing a report today on lessons learned concerning the need for security over conventional munitions storage sites that provides the basis for this testimony...

  1. Computer Network Attack Versus Operational Maneuver from the Sea

    National Research Council Canada - National Science Library

    Herdegen, Dale

    2000-01-01

    ...) vulnerable to computer network attack (CNA). Mission command and control can reduce the impact of the loss of command and control, but it can not overcome the vast and complex array of threats...

  2. Command and Control of Private Security Contractors: Are They a Viable Force Option for the Combatant Commander?

    National Research Council Canada - National Science Library

    Sherard, Scott H

    2008-01-01

    If a Combatant Commander (CCDR) or Joint Force Commander (JFC) were to take command of the approximately 25,000 security contractors in Iraq, a force of such size and capability would prove to be a valuable operational asset...

  3. Function Activation on Intelligent Buildings Using Mobile Devices through Voice Commands

    Directory of Open Access Journals (Sweden)

    Moumtadi Fatima

    2014-04-01

    Full Text Available Development of information and communication technologies has allowed the incorporation into different areas of human activity of apps that control electrical and electronic devices through voice commands. With these apps, in telemedicine people affected by some temporary decrease in their physical capacities have improved their level of autonomy; utilities have been added to educational environments to facilitate the use of IT applications to users with physical disability; finally, home automated solutions have made possible to any person with permanent limited mobility to take control over home devices using voice commands. In this article a home automated solution, developed over a client-server principle is presented. As the client device a MIDP 2.0 cell phone with a Java MicroEdition application loaded was used; as server a web server PC was used serving also as gateway towards a Konnex network, added with a speech recognizer engine. Fully functional prototype developed allowed take control over 3 devices with 87% success of the speech recognizer reliability, this percentage improved after the use of a drop-down menu of commands displayed over the monitor.

  4. Networked sensors for the combat forces

    Science.gov (United States)

    Klager, Gene

    2004-11-01

    Real-time and detailed information is critical to the success of ground combat forces. Current manned reconnaissance, surveillance, and target acquisition (RSTA) capabilities are not sufficient to cover battlefield intelligence gaps, provide Beyond-Line-of-Sight (BLOS) targeting, and the ambush avoidance information necessary for combat forces operating in hostile situations, complex terrain, and conducting military operations in urban terrain. This paper describes a current US Army program developing advanced networked unmanned/unattended sensor systems to survey these gaps and provide the Commander with real-time, pertinent information. Networked Sensors for the Combat Forces plans to develop and demonstrate a new generation of low cost distributed unmanned sensor systems organic to the RSTA Element. Networked unmanned sensors will provide remote monitoring of gaps, will increase a unit"s area of coverage, and will provide the commander organic assets to complete his Battlefield Situational Awareness (BSA) picture for direct and indirect fire weapons, early warning, and threat avoidance. Current efforts include developing sensor packages for unmanned ground vehicles, small unmanned aerial vehicles, and unattended ground sensors using advanced sensor technologies. These sensors will be integrated with robust networked communications and Battle Command tools for mission planning, intelligence "reachback", and sensor data management. The network architecture design is based on a model that identifies a three-part modular design: 1) standardized sensor message protocols, 2) Sensor Data Management, and 3) Service Oriented Architecture. This simple model provides maximum flexibility for data exchange, information management and distribution. Products include: Sensor suites optimized for unmanned platforms, stationary and mobile versions of the Sensor Data Management Center, Battle Command planning tools, networked communications, and sensor management software. Details

  5. MATREX: A Unifying Modeling and Simulation Architecture for Live-Virtual-Constructive Applications

    Science.gov (United States)

    2007-05-23

    Deployment Systems Acquisition Operations & Support B C Sustainment FRP Decision Review FOC LRIP/IOT& ECritical Design Review Pre-Systems...CMS2 – Comprehensive Munitions & Sensor Server • CSAT – C4ISR Static Analysis Tool • C4ISR – Command & Control, Communications, Computers

  6. DolphinAtack: Inaudible Voice Commands

    OpenAIRE

    Zhang, Guoming; Yan, Chen; Ji, Xiaoyu; Zhang, Taimin; Zhang, Tianchen; Xu, Wenyuan

    2017-01-01

    Speech recognition (SR) systems such as Siri or Google Now have become an increasingly popular human-computer interaction method, and have turned various systems into voice controllable systems(VCS). Prior work on attacking VCS shows that the hidden voice commands that are incomprehensible to people can control the systems. Hidden voice commands, though hidden, are nonetheless audible. In this work, we design a completely inaudible attack, DolphinAttack, that modulates voice commands on ultra...

  7. Literature review on medical incident command.

    Science.gov (United States)

    Rimstad, Rune; Braut, Geir Sverre

    2015-04-01

    It is not known what constitutes the optimal emergency management system, nor is there a consensus on how effectiveness and efficiency in emergency response should be measured or evaluated. Literature on the role and tasks of commanders in the prehospital emergency services in the setting of mass-casualty incidents has not been summarized and published. This comprehensive literature review addresses some of the needs for future research in emergency management through three research questions: (1) What are the basic assumptions underlying incident command systems (ICSs)? (2) What are the tasks of ambulance and medical commanders in the field? And (3) How can field commanders' performances be measured and assessed? A systematic literature search in MEDLINE, PubMed, PsycINFO, Embase, Cochrane Central Register of Controlled Trials, Cochrane Library, ISI Web of Science, Scopus, International Security & Counter Terrorism Reference Center, Current Controlled Trials, and PROSPERO covering January 1, 1990 through March 1, 2014 was conducted. Reference lists of included literature were hand searched. Included papers were analyzed using Framework synthesis. The literature search identified 6,049 unique records, of which, 76 articles and books where included in qualitative synthesis. Most ICSs are described commonly as hierarchical, bureaucratic, and based on military principles. These assumptions are contested strongly, as is the applicability of such systems. Linking of the chains of command in cooperating agencies is a basic difficulty. Incident command systems are flexible in the sense that the organization may be expanded as needed. Commanders may command by direction, by planning, or by influence. Commanders' tasks may be summarized as: conducting scene assessment, developing an action plan, distributing resources, monitoring operations, and making decisions. There is considerable variation between authors in nomenclature and what tasks are included or highlighted

  8. Capturing a Commander's decision making style

    Science.gov (United States)

    Santos, Eugene; Nguyen, Hien; Russell, Jacob; Kim, Keumjoo; Veenhuis, Luke; Boparai, Ramnjit; Stautland, Thomas Kristoffer

    2017-05-01

    A Commander's decision making style represents how he weighs his choices and evaluates possible solutions with regards to his goals. Specifically, in the naval warfare domain, it relates the way he processes a large amount of information in dynamic, uncertain environments, allocates resources, and chooses appropriate actions to pursue. In this paper, we describe an approach to capture a Commander's decision style by creating a cognitive model that captures his decisionmaking process and evaluate this model using a set of scenarios using an online naval warfare simulation game. In this model, we use the Commander's past behaviors and generalize Commander's actions across multiple problems and multiple decision making sequences in order to recommend actions to a Commander in a manner that he may have taken. Our approach builds upon the Double Transition Model to represent the Commander's focus and beliefs to estimate his cognitive state. Each cognitive state reflects a stage in a Commander's decision making process, each action reflects the tasks that he has taken to move himself closer to a final decision, and the reward reflects how close he is to achieving his goal. We then use inverse reinforcement learning to compute a reward for each of the Commander's actions. These rewards and cognitive states are used to compare between different styles of decision making. We construct a set of scenarios in the game where rational, intuitive and spontaneous decision making styles will be evaluated.

  9. Network Centric Warfare and Its Effect on Unit of Employmentx (UEx) Use of Mission Command

    National Research Council Canada - National Science Library

    Hannon, Jeffery A

    2005-01-01

    The 2002 NSS call for "transformING to meet the challenges and opportunities of the twenty-first century", and the Army's leadership elected to concentrate the service's transformation efforts on battle command...

  10. Combatant Commanders Informational Series, USEUCOM

    National Research Council Canada - National Science Library

    Burton, Steven

    1996-01-01

    ...) and the diverse challenges it faces require it to maintain one of the highest operational and personnel tempos of the combatant command, are limited in the opportunity of personnel new to the command...

  11. Network performance of a wireless sensor network for temperature monitoring in vineyards

    DEFF Research Database (Denmark)

    Liscano, Ramiro; Jacoub, John Khalil; Dersingh, Anand

    2011-01-01

    Wireless sensor networks (WSNs) are an emerging technology which can be used for outdoor environmental monitoring. This paper presents challenges that arose from the development and deployment of a WSN for environmental monitoring as well as network performance analysis of this network. Different...... components in our sensor network architecture are presented like the physical nodes, the sensor node code, and two messaging protocols; one for collecting sensor and network values and the other for sensor node commands. An information model for sensor nodes to support plug-and-play capabilities in sensor...... networks is also presented....

  12. STS-37 Commander Nagel in commanders seat on OV-104's flight deck

    Science.gov (United States)

    1991-01-01

    STS-37 Commander Steven R. Nagel, wearing launch and entry suit (LES), sits at commanders station on the forward flight deck of Atlantis, Orbiter Vehicle (OV) 104. Surrounding Nagel are the seat headrest, control panels, checklists, forward flight deck windows, and three drinking water containers with straws attached to forward panel F2.

  13. 32 CFR 700.1053 - Commander of a task force.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Commander of a task force. 700.1053 Section 700... Command Detail to Duty § 700.1053 Commander of a task force. (a) A geographic fleet commander, and any other naval commander, may detail in command of a task force, or other task command, any eligible...

  14. Command World

    National Research Council Canada - National Science Library

    Wong, Leah Y; Lange, Douglas S; Sebastyn, Jerome T; Roof, William H

    2006-01-01

    .... The Command World scenario was expressly designed as a crisis action planning exercise in order to replicate the communications, collaboration, and information requirements inherent in a military...

  15. Command Decision-Making: Experience Counts

    National Research Council Canada - National Science Library

    Wolgast, Kelly A

    2005-01-01

    Decision-making is the mainstay of military leadership and command. Due to the changed nature of the current military environment, military commanders can no longer rely solely on the traditional Military Decision-making Process (MDMP...

  16. Photochemical transformation of the insensitive munitions compound 2,4-dinitroanisole

    Energy Technology Data Exchange (ETDEWEB)

    Rao, Balaji, E-mail: anandharaob@ornl.gov [Environmental Sciences Division, Oak Ridge National Laboratory, Oak Ridge, TN (United States); Wang, Wei [Environmental Sciences Division, Oak Ridge National Laboratory, Oak Ridge, TN (United States); Cai, Qingsong; Anderson, Todd [Department of Environmental Toxicology, The Institute of Environment and Human Health, Texas Tech University, Lubbock, TX (United States); Gu, Baohua, E-mail: gub1@ornl.gov [Environmental Sciences Division, Oak Ridge National Laboratory, Oak Ridge, TN (United States)

    2013-01-15

    The insensitive munitions compound 2,4-dinitroanisole (DNAN) is increasingly being used as a replacement for traditional, sensitive munitions compounds (e.g., trinitrotoluene [TNT]), but the environmental fate and photo-transformation of DNAN in natural water systems are currently unknown. In this study, we investigated the photo-transformation rates of DNAN with both ultraviolet (UV) and sunlight irradiation under different environmentally relevant conditions. Sunlight photo-transformation of DNAN in water was found to follow predominantly pseudo-first-order decay kinetics with an average half-life (t{sub 1/2}) of approximately 0.70 d and activation energy (E{sub a}) of 53 kJ mol{sup −1}. Photo-transformation rates of DNAN were dependent on the wavelength of the light source: irradiation with UV-B light (280–315 nm) resulted in a greater quantum yield of transformation (ϕ{sub UV-B} = 3.7 × 10{sup −4}) than rates obtained with UV-A light (ϕ{sub UV-A} = 2.9 × 10{sup −4} at 316–400 nm) and sunlight (ϕ{sub sun} = 1.1 × 10{sup −4}). Photo-oxidation was the dominant mechanism for DNAN photo-transformation, based on the formation of nitrite (NO{sub 2}{sup −}) and nitrate (NO{sub 3}{sup −}) as major N species and 2,4-dinitrophenol as the minor species. Environmental factors (e.g., temperature, pH, and the presence or absence of naturally dissolved organic matter) displayed modest to little effects on the rate of DNAN photo-transformation. These observations indicate that sunlight-induced photo-transformation of DNAN may represent a significant abiotic degradation pathway in surface water, which may have important implications in evaluating the potential impacts and risks of DNAN in the environment. - Highlights: ► DNAN photo-transformation kinetics was dependent on light source and temperature. ► Photolysis produced harmful by-products that included dinitrophenol and nitrate. ► Photo-oxidation was determined to be the likely pathway of DNAN

  17. Paramount Interest: Command Relationships in Amphibious Warfare

    National Research Council Canada - National Science Library

    Peabody, Hitch

    2004-01-01

    In 2001, U.S. amphibious forces abandoned sixty years of established command and control doctrine, replacing the traditional senior-subordinate relationship between Navy and Marine commanders with coequal command. Why did it change...

  18. GENE EXPRESSION CHANGES IN ARABIDOPSIS THALIANA SEEDLING ROOTS EXPOSED TO THE MUNITION HEXAHYDRO-1,3,5-TRINITRO-1,3,5-TRIAZINE

    Science.gov (United States)

    Arabidopsis thaliana root transcriptome responses to the munition, hexahydro-1,3,5-trinitro-1,3,5-triazine (RDX), were assessed using serial analysis of gene expression (SAGE). Comparison of the transcriptional profile for the RDX response to a profile previously described for Ar...

  19. Test Telemetry And Command System (TTACS)

    Science.gov (United States)

    Fogel, Alvin J.

    1994-01-01

    The Jet Propulsion Laboratory has developed a multimission Test Telemetry and Command System (TTACS) which provides a multimission telemetry and command data system in a spacecraft test environment. TTACS reuses, in the spacecraft test environment, components of the same data system used for flight operations; no new software is developed for the spacecraft test environment. Additionally, the TTACS is transportable to any spacecraft test site, including the launch site. The TTACS is currently operational in the Galileo spacecraft testbed; it is also being provided to support the Cassini and Mars Surveyor Program projects. Minimal personnel data system training is required in the transition from pre-launch spacecraft test to post-launch flight operations since test personnel are already familiar with the data system's operation. Additionally, data system components, e.g. data display, can be reused to support spacecraft software development; and the same data system components will again be reused during the spacecraft integration and system test phases. TTACS usage also results in early availability of spacecraft data to data system development and, as a result, early data system development feedback to spacecraft system developers. The TTACS consists of a multimission spacecraft support equipment interface and components of the multimission telemetry and command software adapted for a specific project. The TTACS interfaces to the spacecraft, e.g., Command Data System (CDS), support equipment. The TTACS telemetry interface to the CDS support equipment performs serial (RS-422)-to-ethernet conversion at rates between 1 bps and 1 mbps, telemetry data blocking and header generation, guaranteed data transmission to the telemetry data system, and graphical downlink routing summary and control. The TTACS command interface to the CDS support equipment is nominally a command file transferred in non-real-time via ethernet. The CDS support equipment is responsible for

  20. A Biography of the Trousered Munitions Women’s Uniform of World War 1

    OpenAIRE

    Roberts, Jennifer

    2017-01-01

    Ce chapitre fournit une vue d’ensemble de la recherche pour un exemple survivant de l’uniforme de pantalons des « munitionettes », alors que les travailleurs dans les usines de munitions dans la Première Guerre Mondiale étaient reconnus. Si nous examinons la réaction sur les femmes qui portent un vêtement d’homme et les discussions d’émancipation de cet uniforme, ces recherches ont étudié considérablement les archives jadis moins utilisées dans l’histoire des vêtements. Comme il n’existe plus...

  1. U.S. Pacific Command > About USPACOM > History

    Science.gov (United States)

    USPACOM U.S. Pacific Command Search USPACOM: Search Search Search USPACOM: Search Home Leadership People's Republic of China, the Democratic People's Republic of Korea, Mongolia, and the Republic of its surrounding waters under the leadership of one commander, providing a unity of command absent from

  2. Neural network application to aircraft control system design

    Science.gov (United States)

    Troudet, Terry; Garg, Sanjay; Merrill, Walter C.

    1991-01-01

    The feasibility of using artificial neural network as control systems for modern, complex aerospace vehicles is investigated via an example aircraft control design study. The problem considered is that of designing a controller for an integrated airframe/propulsion longitudinal dynamics model of a modern fighter aircraft to provide independent control of pitch rate and airspeed responses to pilot command inputs. An explicit model following controller using H infinity control design techniques is first designed to gain insight into the control problem as well as to provide a baseline for evaluation of the neurocontroller. Using the model of the desired dynamics as a command generator, a multilayer feedforward neural network is trained to control the vehicle model within the physical limitations of the actuator dynamics. This is achieved by minimizing an objective function which is a weighted sum of tracking errors and control input commands and rates. To gain insight in the neurocontrol, linearized representations of the nonlinear neurocontroller are analyzed along a commanded trajectory. Linear robustness analysis tools are then applied to the linearized neurocontroller models and to the baseline H infinity based controller. Future areas of research identified to enhance the practical applicability of neural networks to flight control design.

  3. Neural network application to aircraft control system design

    Science.gov (United States)

    Troudet, Terry; Garg, Sanjay; Merrill, Walter C.

    1991-01-01

    The feasibility of using artificial neural networks as control systems for modern, complex aerospace vehicles is investigated via an example aircraft control design study. The problem considered is that of designing a controller for an integrated airframe/propulsion longitudinal dynamics model of a modern fighter aircraft to provide independent control of pitch rate and airspeed responses to pilot command inputs. An explicit model following controller using H infinity control design techniques is first designed to gain insight into the control problem as well as to provide a baseline for evaluation of the neurocontroller. Using the model of the desired dynamics as a command generator, a multilayer feedforward neural network is trained to control the vehicle model within the physical limitations of the actuator dynamics. This is achieved by minimizing an objective function which is a weighted sum of tracking errors and control input commands and rates. To gain insight in the neurocontrol, linearized representations of the nonlinear neurocontroller are analyzed along a commanded trajectory. Linear robustness analysis tools are then applied to the linearized neurocontroller models and to the baseline H infinity based controller. Future areas of research are identified to enhance the practical applicability of neural networks to flight control design.

  4. Global Command and Control Management Structure

    National Research Council Canada - National Science Library

    1995-01-01

    This instruction establishes: responsibilities for the Joint Staff, Services, Defense agencies, combatant and functional unified commands, and other activities regarding management of Global Command and Control (GCC...

  5. A Novel wave-form command shaper for overhead cranes

    Directory of Open Access Journals (Sweden)

    KHALED ALHAZZA

    2013-12-01

    Full Text Available In this work, a novel command shaping control strategy for oscillation reduction of simple harmonic oscillators is proposed, and validated experimentally. A wave-form acceleration command shaper is derived analytically. The performance of the proposed shaper is simulated numerically, and validated experimentally on a scaled model of an overhead crane. Amplitude modulation is used to enhance the shaper performance, which results in a modulated wave-form command shaper. It is determined that the proposed wave-form and modulated wave-form command shaper profiles are capable of eliminating travel and residual oscillations. Furthermore, unlike traditional impulse and step command shapers, the proposed command shaper has piecewise smoother acceleration, velocity, and displacement profiles. Experimental results using continuous and discrete commands are presented. Experiments with discrete commands involved embedding a saturation model-based feedback in the algorithm of the command shaper.

  6. Enablers of Self-Synchronization for Network-Centric Operations: Design of a Complex Command and Control Experiment

    National Research Council Canada - National Science Library

    Hutchins, Susan G; Kleinman, David L; Hocevar, Susan P; Kemple, William G; Porter, Gary R

    2001-01-01

    ... that is shorter than an adversary"s. Self synchronization is viewed as an essential process within military organizations that can increase speed of command and thus accelerate execution of the mission...

  7. Local area networking handbook

    OpenAIRE

    O'Hara, Patricia A.

    1990-01-01

    Approved for public release; distribution is unlimited. This thesis provides Navy shore based commands with sufficient information on local area networking to (1) decide if they need a LAN, (2) determine what their networking requirements are, and (3) select a LAN that satisfies their requirements. LAN topologies, transmission media, and medium access methods are described. In addition, the OSI reference model for computer networking and the IEEE 802 LAN standards are explained in detail. ...

  8. Arsenal of democracy in the face of change: Precision Guided Munitions (PGMs), their evolution and some economic considerations, Working Paper No. 4

    Energy Technology Data Exchange (ETDEWEB)

    Chester, C.V.

    1990-08-01

    A brief study was made of some of the forces driving the move to Precision Guided Munitions (PGMs), including the quest for military effectiveness, combat experience, and logistic compression. PGMs cost from a few hundred to a few thousand dollars per Kg but are tens to hundreds of times more effective than conventional munitions. A year's peacetime plateau production of each US PGM can be carried by a few C-5 aircraft. Surge quantities of PGMs are within US airlift capabilities, taking some of the risk out of off-shore procurement. The improving capability of antiaircraft PGMs and the escalating cost of combat aircraft (50 to 100-fold in constant dollars since WW II) may bring into question the economic viability of manned attack aircraft. The same may be true to a slightly lesser degree for heavy armored vehicles. 14 refs., 5 tabs.

  9. Command in a field hospital.

    Science.gov (United States)

    Bricknell, M C M

    2003-03-01

    This paper examines the challenges involved in commanding a field hospital. There are frequent, dynamic tensions between the military culture that is based on a task-focussed, hierarchical structure and the clinical culture that is based on flat, process-focussed, multidisciplinary teams. The paper outlines the cultural environment of the field hospital and then examines the deployment sequence whereby a functioning clinical facility may be created from a group of disparate individuals. There are a number of tools that may assist with this including the personality of the Commanding Officer, individual skills, the creation of an organizational identity and the choice of command structure.

  10. Soviet command and control in a historical context

    OpenAIRE

    Kern, Jeffrey A.

    1981-01-01

    Approved for public release; distribution is unlimited An examination is made of the historical antecedents of present day command and control doctrine in the Soviet Union. The continuity of principal characteristics is demonstrated. The ideological determinants shaping the command and control system are first developed. These include centralism, collective decision-making, unity of command, and redundancy. Practical consequences of these are explored. The functioning of Soviet command...

  11. Mammalian Toxicity of Munition Compounds. Phase II. Effects of Multiple Doses. Part III. 2,6-Dinitrotoluene

    Science.gov (United States)

    1976-07-01

    and the neuromuscular effects in these dogs were not due to hypocalcemia . The lowest serum calcium concen- tration in these dogs was 4.2 meq/liter...motor end plate might produce a local hypocalcemia . Such a mechanism is purely speculative. Qualitatively and quantitavely, most of the effects of 2,6...I ýNw,- -MIM I/ MIDWEST RESEARCH INS14ITUTE H0q .3L I LU -_ MAMMALIAN TOXICITY OF MUNITIONS COMPOUlNDSPHASE II: EFFECTS OF MiULTIPLE DOSES C* •PART

  12. [The detector, the command neuron and plastic convergence].

    Science.gov (United States)

    Sokolov, E N

    1977-01-01

    The paper deals with the structure of detectors, the function of commanding neurones and the problem of relationship between detectors and commanding neurons. An example of hierarchial organization of detectors is provided by the colour analyser in which a layer of receptors, a layer of opponent neurones and a layer of colour-selective detectors are singled out. The colour detector is selectively sensitive to a certain combination of excitations at the input. If the detector is selectively activated by a certain combination of excitations at the input, the selective activation of the commanding neurone through a pool of motoneurones brings about a reaction at the output, specific in its organization. The reflexogenic zone of the reaction is determined by the detectors which converge on the commanding neurone controlling the given reaction. The plasticity of the reaction results from a plastic convergence of the detectors on the commanding neurone which controls the reaction. This comprises selective switching off the detectors from the commanding neurone (habituation) and connecting the detectors to the commanding neurone (facilitation).

  13. Graph Theoretical Analysis of Network Centric Operations Using Multi-Layer Models

    National Research Council Canada - National Science Library

    Wong-Jiru, Ann

    2006-01-01

    .... The research incorporates the importance of understanding network topology for evaluating an environment for net-centricity and using network characteristics to help commanders assess the effects...

  14. The Battle Command Sustainment Support System: Initial Analysis Report

    Science.gov (United States)

    2016-09-01

    products including jet fuels, distillate fuels, residual fuels, automotive gasoline , specified bulk lubricating oils, aircraft engine oils, fuel...contained within this report. 15. SUBJECT TERMS Mission command Software Tactical applications (TacApps) Command post ...computing environment (CPCE) Command post client Battle command sustainment support System (BCS3) Logistics

  15. Modeling and control of magnetorheological fluid dampers using neural networks

    Science.gov (United States)

    Wang, D. H.; Liao, W. H.

    2005-02-01

    Due to the inherent nonlinear nature of magnetorheological (MR) fluid dampers, one of the challenging aspects for utilizing these devices to achieve high system performance is the development of accurate models and control algorithms that can take advantage of their unique characteristics. In this paper, the direct identification and inverse dynamic modeling for MR fluid dampers using feedforward and recurrent neural networks are studied. The trained direct identification neural network model can be used to predict the damping force of the MR fluid damper on line, on the basis of the dynamic responses across the MR fluid damper and the command voltage, and the inverse dynamic neural network model can be used to generate the command voltage according to the desired damping force through supervised learning. The architectures and the learning methods of the dynamic neural network models and inverse neural network models for MR fluid dampers are presented, and some simulation results are discussed. Finally, the trained neural network models are applied to predict and control the damping force of the MR fluid damper. Moreover, validation methods for the neural network models developed are proposed and used to evaluate their performance. Validation results with different data sets indicate that the proposed direct identification dynamic model using the recurrent neural network can be used to predict the damping force accurately and the inverse identification dynamic model using the recurrent neural network can act as a damper controller to generate the command voltage when the MR fluid damper is used in a semi-active mode.

  16. 32 CFR 700.1054 - Command of a naval base.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Command of a naval base. 700.1054 Section 700.1054 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY... Command Detail to Duty § 700.1054 Command of a naval base. The officer detailed to command a naval base...

  17. Designed to Win: An Agile Approach to Air Force Command and Control of Cyberspace

    Science.gov (United States)

    2010-06-01

    capabilities and limitations of technology with a level of control that synchronizes operations, yet allows independent action to take advantage of...was during the Roman Empire. With the exception of the semaphore telegraph and an improved road network, the same methods of communication used by...48 To provide information quickly to the ground commanders, the Aviation Section of the US Signal Corps installed primitive wireless radio sets in

  18. 32 CFR 215.7 - Command relationships.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Command relationships. 215.7 Section 215.7 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) MISCELLANEOUS EMPLOYMENT OF MILITARY RESOURCES IN THE EVENT OF CIVIL DISTURBANCES § 215.7 Command relationships...

  19. Human-Systems Integration (HSI) and the Network Integration Evaluations (NIEs), Part 3: Mitigating Cognitive Load in Network-Enabled Mission Command

    Science.gov (United States)

    2016-06-01

    require higher levels of mental ability as well as higher levels of education , training, and experience for effective use . In short, ICT insertions such...the people using the gizmos” (Wallace 2005, p. 20). Personnel, training, and organization are important aspects of overall mission command system...organizational learning is important with respect to how well a test unit will use new equipment suites during an exercise such as the NIEs (Alberts

  20. Schema for Spacecraft-Command Dictionary

    Science.gov (United States)

    Laubach, Sharon; Garcia, Celina; Maxwell, Scott; Wright, Jesse

    2008-01-01

    An Extensible Markup Language (XML) schema was developed as a means of defining and describing a structure for capturing spacecraft command- definition and tracking information in a single location in a form readable by both engineers and software used to generate software for flight and ground systems. A structure defined within this schema is then used as the basis for creating an XML file that contains command definitions.

  1. 32 CFR 552.65 - Command supervision.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Command supervision. 552.65 Section 552.65 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY MILITARY RESERVATIONS AND NATIONAL CEMETERIES REGULATIONS AFFECTING MILITARY RESERVATIONS Solicitation on Military Reservations § 552.65 Command supervision. (a) All insurance...

  2. Characteristics of the TRISTAN control computer network

    International Nuclear Information System (INIS)

    Kurokawa, Shinichi; Akiyama, Atsuyoshi; Katoh, Tadahiko; Kikutani, Eiji; Koiso, Haruyo; Oide, Katsunobu; Shinomoto, Manabu; Kurihara, Michio; Abe, Kenichi

    1986-01-01

    Twenty-four minicomputers forming an N-to-N token-ring network control the TRISTAN accelerator complex. The computers are linked by optical fiber cables with 10 Mbps transmission speed. The software system is based on NODAL, a multicomputer interpretive language developed at the CERN SPS. The high-level services offered to the users of the network are remote execution by the EXEC, EXEC-P and IMEX commands of NODAL and uniform file access throughout the system. The network software was designed to achieve the fast response of the EXEC command. The performance of the network is also reported. Tasks that overload the minicomputers are processed on the KEK central computers. One minicomputer in the network serves as a gateway to KEKNET, which connects the minicomputer network and the central computers. The communication with the central computers is managed within the framework of the KEK NODAL system. NODAL programs communicate with the central computers calling NODAL functions; functions for exchanging data between a data set on the central computers and a NODAL variable, submitting a batch job to the central computers, checking the status of the submitted job, etc. are prepared. (orig.)

  3. The Combat Cloud: Enabling Multi-Domain Command and Control Across the Range of Military Operations

    Science.gov (United States)

    2017-03-01

    fire support coordination measures , its potential to enhance the close air support and personnel recovery missions, interagency coordination...connectivity, such as that of a Long Term Evolution ( LTE ) network. As the user transitions out of the area of LTE coverage, the connectivity then...improving the flexibility and use of fire support coordination measures (FSCM). Joint doctrine defines a FSCM as, “A measure employed by commanders to

  4. Enhancing network centric operations doctrine to support civil military cooperation in disaster management

    NARCIS (Netherlands)

    Wolbers, J.J.; Beeres, R.; Bakx, G.; de Waard, E.; Rietjens, S.

    2016-01-01

    Network Centric Operations is a promising command doctrine in both military operations and during civil disaster management. As both sectors started intensifying their joint operational capacity through civil-military collaboration, it becomes increasingly relevant to address the different command

  5. Bioconcentration factors and plant-water partition coefficients of munitions compounds in barley.

    Science.gov (United States)

    Torralba-Sanchez, Tifany L; Kuo, Dave T F; Allen, Herbert E; Di Toro, Dominic M

    2017-12-01

    Plants growing in the soils at military ranges and surrounding locations are exposed, and potentially able to uptake, munitions compounds (MCs). The extent to which a compound is transferred from the environment into organisms such as plants, referred to as bioconcentration, is conventionally measured through uptake experiments with field/synthetic soils. Multiple components/phases that vary among different soil types and affect the bioavailability of the MC, however, hinder the ability to separate the effects of soil characteristics from the MC chemical properties on the resulting plant bioconcentration. To circumvent the problem, this work presents a protocol to measure steady state bioconcentration factors (BCFs) for MCs in barley (Hordeum vulgare L.) using inert laboratory sand rather than field/synthetic soils. Three MCs: 2,4,6-trinitrotoluene (TNT), 2,4-dinitrotoluene (2,4-DNT), and 2,4-dinitroanisole (2,4-DNAN), and two munition-like compounds (MLCs): 4-nitroanisole (4-NAN) and 2-methoxy-5-nitropyridine (2-M-5-NPYNE) were evaluated. Approximately constant plant biomass and exposure concentrations were achieved within a one-month period that produced steady state log BCF values: 0.62 ± 0.02, 0.70 ± 0.03, 1.30 ± 0.06, 0.52 ± 0.03, and 0.40 ± 0.05 L kg plant dwt -1 for TNT, 2,4-DNT, 2,4-DNAN, 4-NAN, and 2-M-5-NPYNE, respectively. Furthermore, results suggest that the upper-bounds of the BCFs can be estimated within an order of magnitude by measuring the partitioning of the compounds between barley biomass and water. This highlights the importance of partition equilibrium as a mechanism for the uptake of MCs and MLCs by barley from interstitial water. The results from this work provide chemically meaningful data for prediction models able to estimate the bioconcentration of these contaminants in plants. Copyright © 2017 Elsevier Ltd. All rights reserved.

  6. The Marihuana Dilemma: Challenge to Commanders.

    Science.gov (United States)

    The marihuana dilemma poses a major challenge to commanders in the US Army today. The problem was analyzed as to the characteristics of the drug...available to commanders to meet the challenge. The essay concludes that marihuana should not be legalized; drug users or former drug users should not be

  7. Issues and Solutions for Command Post Simulations

    National Research Council Canada - National Science Library

    Stytz, Martin R; Banks, Sheila B

    2006-01-01

    .... Unfortunately, the modeling of joint command post teams is still very much in its infancy and this lack of foundational research hinders our ability to assess the performance of command post teams...

  8. 76 FR 19893 - Unified Command Plan 2011

    Science.gov (United States)

    2011-04-08

    ... Plan 2011 Memorandum for the Secretary of Defense Pursuant to my authority as Commander in Chief, I hereby approve and direct the implementation of the revised Unified Command Plan. Consistent with title...

  9. Command and motivation

    DEFF Research Database (Denmark)

    Jacobsen, Christian Bøtcher; Hvidtved, Johan; Andersen, Lotte Bøgh

    2014-01-01

    Motivated employees are crucial to organizations, but external interventions such as command systems and financial incentives may decrease motivation. If these external interventions are perceived to be controlling, they are expected to crowd out intrinsic motivation, and this may also apply...... to other types of autonomous motivation such as public service motivation. The perception of external interventions is thus expected to be vital. This article investigates how the perception of a specific command system (obligatory student plans) is associated with intrinsic motivation and public service...... motivation. Using a dataset with 3,230 school teachers in Denmark, a structural equation model shows that the perception of obligatory student plans as controlling is negatively associated with all of the investigated types of employee motivation, supporting that motivation crowding can occur....

  10. 32 CFR 700.1056 - Command of a ship.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Command of a ship. 700.1056 Section 700.1056 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY REGULATIONS AND OFFICIAL RECORDS UNITED STATES NAVY REGULATIONS AND OFFICIAL RECORDS Precedence, Authority and Command Detail to Duty § 700.1056 Command of a...

  11. The Linux command line a complete introduction

    CERN Document Server

    Shotts, William E

    2012-01-01

    You've experienced the shiny, point-and-click surface of your Linux computer—now dive below and explore its depths with the power of the command line. The Linux Command Line takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell. Along the way you'll learn the timeless skills handed down by generations of gray-bearded, mouse-shunning gurus: file navigation, environment configuration, command chaining, pattern matching with regular expressions, and more.

  12. Mobile infostation network technology

    Science.gov (United States)

    Rajappan, Gowri; Acharya, Joydeep; Liu, Hongbo; Mandayam, Narayan; Seskar, Ivan; Yates, Roy

    2006-05-01

    Inefficient use of network resources on the battlefield is a serious liability: if an asset communicates with the network command for data-a terrain map, for instance-it ties up the end-to-end network resources. When many such assets contend for data simultaneously, traffic is limited by the slowest link along the path from the network command to the asset. A better approach is for a local server, known as an infostation, to download data on an anticipated-need basis when the network load is low. The infostation can then dump data when needed to the assets over a high-speed wireless connection. The infostation serves the local assets over an OFDM-based wireless data link that has MIMO enhancements for high data rate and robustness. We aim for data rate in excess of 100 Mbps, spectral efficiency in excess of 5 bits/sec/Hz, and robustness to poor channel conditions and jammers. We propose an adaptive physical layer that determines power levels, modulation schemes, and the MIMO enhancements to use based on the channel state and the level of interference in the system. We also incorporate the idea of superuser: a user who is allowed preferential use of the high data rate link. We propose a MAC that allows for this priority-based bandwidth allocation scheme. The proposed infostation MAC is integrated tightly with the physical layer through a cross-layer design. We call the proposed infostation PHY, MAC, and network technology, collectively, as the Mobile Infostation Network Technology (MINT).

  13. Three astronauts inside Command Module Simulator during Apollo Simulation

    Science.gov (United States)

    1968-01-01

    Three astronauts inside the Command Module Simulator in bldg 5 during an Apollo Simulation. Left to right are Astronauts Thomas P. Stafford, commander; John W. Young, command module pilot; and Eugene A. Cernan, lunar module pilot.

  14. Operational Maneuver from the Sea and Amphibious Command Relationships: Is It time for a Joint Force Amphibious Component Commander?

    National Research Council Canada - National Science Library

    Bennett, Michael

    2004-01-01

    .... In a joint community that is becoming increasingly dependant on the use of functional component commanders in the execution of major operations, the need for a Joint Force Amphibious Component Commander (JFAMCC...

  15. Unit Testing for Command and Control Systems

    Science.gov (United States)

    Alexander, Joshua

    2018-01-01

    Unit tests were created to evaluate the functionality of a Data Generation and Publication tool for a command and control system. These unit tests are developed to constantly evaluate the tool and ensure it functions properly as the command and control system grows in size and scope. Unit tests are a crucial part of testing any software project and are especially instrumental in the development of a command and control system. They save resources, time and costs associated with testing, and catch issues before they become increasingly difficult and costly. The unit tests produced for the Data Generation and Publication tool to be used in a command and control system assure the users and stakeholders of its functionality and offer assurances which are vital in the launching of spacecraft safely.

  16. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    Directory of Open Access Journals (Sweden)

    Peng Xun

    2017-10-01

    Full Text Available A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1 the command sequence is disordered and (2 disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  17. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    Science.gov (United States)

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  18. AN/VRC 118 Mid-Tier Networking Vehicular Radio (MNVR) and Joint Enterprise Network Manager (JENM) Early Fielding Report

    Science.gov (United States)

    2017-01-18

    requirements. The Army intends to conduct the MNVR Initial Operational Test and Evaluation ( IOT &E) with the new radio in FY21 to support a fielding decision...improve the commander’s ability to conduct mission command over the MNVR WNW mid-tier network. Network Usage During the 2016 MNVR Operational...its reliability requirement in a loaded network simulating full brigade usage . Based on the results of developmental test, the Army made

  19. Network protocol 'EPAP'; Network protokoru 'EPAP'

    Energy Technology Data Exchange (ETDEWEB)

    Kobori, T.; Fujita, F.; Iwamoto, S. [Fuji Electric Co. Ltd., Toyo (Japan)

    2000-10-10

    The Ethernet, a standard of information networks, has begun to be applied to the control local area network (LAN). To apply the Ethernet to the field level, Fuji Electric has newly developed the communication protocol 'Ethernet precision access protocol (EPAP)' in which a command/response method is structured on the user datagram protocol (UDP) to realize real time and high reliability. Further, we have implemented the EPAP on the bus interface module of the open PIO. This paper outlines the EPAP and its implementation. (author)

  20. Ready...Set... Command! Rethinking Training for Squadron Commanders

    Science.gov (United States)

    2016-02-16

    commander faces many difficult challenges. When discussing the Air Force’s troubling trend in suicide rates, Airmen “blame being overworked ...Air Forces total suicides despite making up only 16 percent of the service.3 Three years later the Air Force Times reveals continued challenges in...23 challenges. They must address complex issues facing the Air Force, such as troubling suicide rates, manning shortfalls, decreasing resources

  1. Communications and Information: Strategic Automated Command Control System-Data Transmission Subsystem (SACCS-DTS) Network Security Program. Volume 2

    National Research Council Canada - National Science Library

    1997-01-01

    ...) Systems, and 33-2, Information Protection. This instruction prescribes the requirements, responsibilities and procedures for the security program for the Strategic Automated Command Control System-Data Transmission Subsystem (SACCS-DTS...

  2. Engagement Skills Trainer: The Commander’s Perspective

    Science.gov (United States)

    2017-06-09

    CBRN Chemical Biological Radiological and Nuclear CGSOC Command and General Staff Officers Course DMG Digital Master Gunner EST Engagement Skills...commanders always emphasized SHARP ( Sexual Harassment and Response Program) training, the battery commander may vividly recall those events but not the range...soldiers in the EST generally do worse at weapons safety and orientation .26 Indicators from research show that EST results predict live fire results. The

  3. XTCE. XML Telemetry and Command Exchange Tutorial

    Science.gov (United States)

    Rice, Kevin; Kizzort, Brad; Simon, Jerry

    2010-01-01

    An XML Telemetry Command Exchange (XTCE) tutoral oriented towards packets or minor frames is shown. The contents include: 1) The Basics; 2) Describing Telemetry; 3) Describing the Telemetry Format; 4) Commanding; 5) Forgotten Elements; 6) Implementing XTCE; and 7) GovSat.

  4. Doublet III neutral beam multi-stream command language system

    International Nuclear Information System (INIS)

    Campbell, L.; Garcia, J.R.

    1983-01-01

    A multi-stream command language system was developed to provide control of the dual source neutral beam injectors on the Doublet III experiment at GA Technologies Inc. The Neutral Beam command language system consists of three parts: compiler, sequencer, and interactive task. The command language, which was derived from the Doublet III tokamak command language, POPS, is compiled, using a recursive descent compiler, into reverse polish notation instructions which then can be executed by the sequencer task. The interactive task accepts operator commands via a keyboard. The interactive task directs the operation of three input streams, creating commands which are then executed by the sequencer. The streams correspond to the two sources within a Doublet III neutral beam, plus an interactive stream. The sequencer multiplexes the execution of instructions from these three streams. The instructions include reads and writes to an operator terminal, arithmetic computations, intrinsic functions such as CAMAC input and output, and logical instructions. The neutral beam command language system was implemented using Modular Computer Systems (ModComp) Pascal and consists of two tasks running on a ModComp Classic IV computer. The two tasks, the interactive and the sequencer, run independently and communicate using shared memory regions. The compiler runs as an overlay to the interactive task when so directed by operator commands. The system is succesfully being used to operate the three neutral beams on Doublet III

  5. Managing resources through stakeholder networks

    NARCIS (Netherlands)

    Ogada, Job Ochieng; Krhoda, George Okoye; Veen, Van Der Anne; Marani, Martin; Oel, van Pieter Richards

    2017-01-01

    Stakeholder analysis and social network analysis were used to analyze stakeholders’ social and structural characteristics based on their interests, influence and interactions in Lake Naivasha basin, Kenya. Even though the Kenyan government and its agencies seem to command higher influence and

  6. Doublet III neutral beam multi-stream command language system

    International Nuclear Information System (INIS)

    Campbell, L.; Garcia, J.R.

    1983-12-01

    A multi-stream command language system was developed to provide control of the dual source neutral beam injectors on the Doublet III experiment at GA Technologies Inc. The Neutral Beam command language system consists of three parts: compiler, sequencer, and interactive task. The command language, which was derived from the Doublet III tokamak command language, POPS, is compiled, using a recursive descent compiler, into reverse polish notation instructions which then can be executed by the sequencer task. The interactive task accepts operator commands via a keyboard. The interactive task directs the operation of three input streams, creating commands which are then executed by the sequencer. The streams correspond to the two sources within a Doublet III neutral beam, plus an interactive stream. The sequencer multiplexes the execution of instructions from these three streams. The instructions include reads and writes to an operator terminal, arithmetic computations, intrinsic functions such as CAMAC input and output, and logical instructions. The neutral beam command language system was implemented using Modular Computer Systems (ModComp) Pascal and consists of two tasks running on a ModComp Classic IV computer

  7. Turn-based gaming for convoy commander training

    NARCIS (Netherlands)

    Boonekamp, R.C.; Muller, T.J.; Vrijer, J.C. de

    2015-01-01

    With the increasing complexity of current-day military operations, effective education and training of military commanders is of vital importance. Commanders need to perform within a broader range of conflicts; unpredictable threats and civil-military interaction place a great demand on their

  8. Apollo 16 astronauts in Apollo Command Module Mission Simulator

    Science.gov (United States)

    1972-01-01

    Astronaut Thomas K. Mattingly II, command module pilot of the Apollo 16 lunar landing mission, participates in extravehicular activity (EVA) training in bldg 5 at the Manned Spacecraft Center (MSC). In the right background is Astronaut Charles M. Duke Jr., lunar module pilot. They are inside the Apollo Command Module Mission Simulator (31046); Mattingly (right foreground) and Duke (right backgroung) in the Apollo Command Module Mission Simulator for EVA simulation and training. Astronaut John W. Young, commander, can be seen in the left background (31047).

  9. Computer-based test system for the Tactical Airfield Attack Munition (TAAM) safing, arming, and fuzing system

    International Nuclear Information System (INIS)

    Warhus, J.; Castleton, R.; Lanning, S.

    1981-12-01

    Testing and quality assurance of large numbers of firing systems are an essential part of the development of the Tactical Airfield Attack Munition (TAAM). A computerized test and data acquisition system has been developed to make the testing and quality assurance workload manageable. The system hardware utilizes an LSI-11/23 computer, a Tektronix 7612 transient digitizer, and various other programmable instruments and power supplies. The system is capable of measuring and analyzing mechanical shock and fireset transient waveforms, automating testing sequences, and making records and comparisons of the test results. The system architecture is flexible for general purpose firing system development work

  10. Linux Command Line and Shell Scripting Bible

    CERN Document Server

    Blum, Richard

    2011-01-01

    The authoritative guide to Linux command line and shell scripting?completely updated and revised [it's not a guide to Linux as a whole ? just to scripting] The Linux command line allows you to type specific Linux commands directly to the system so that you can easily manipulate files and query system resources, thereby permitting you to automate commonly used functions and even schedule those programs to run automatically. This new edition is packed with new and revised content, reflecting the many changes to new Linux versions, including coverage of alternative shells to the default bash shel

  11. The network communication of BEPC control system

    International Nuclear Information System (INIS)

    Xu Jingwei

    1997-01-01

    The author introduces the application of network communication of BEPC control system. The authors use non-transparent communication to transfer the data and command information from node VAX750 to VAX4500

  12. Toward Unity of Command for Multinational Air Forces

    National Research Council Canada - National Science Library

    Asjes, David

    1998-01-01

    To assure unity of command in future multinational air operations, combatant commanders must embrace the necessity of multinational air forces, maximize the integration of allied officers within air...

  13. Defense or Diplomacy Geographic Combatant Commands

    Science.gov (United States)

    2011-06-01

    originally ruled by 1 Priest, Dana , The Mission: Waging War and Keeping Peace with America’s Military...events. US Central Command. Dana Priest describes General Zinni‟s experience as a GCC commander, wherein General Zinni found that in many ways...ignored altogether. Dr. James Forsyth and Lt Col Chance Saltzman make this argument in their Air and Space Power Journal article “Stay Out —Why

  14. OPTIMAL CONFIGURATION OF A COMMAND AND CONTROL NETWORK: BALANCING PERFORMANCE AND RECONFIGURATION CONSTRAINTS

    Energy Technology Data Exchange (ETDEWEB)

    L. DOWELL

    1999-08-01

    The optimization of the configuration of communications and control networks is important for assuring the reliability and performance of the networks. This paper presents techniques for determining the optimal configuration for such a network in the presence of communication and connectivity constraints. reconfiguration to restore connectivity to a data-fusion network following the failure of a network component.

  15. Unity of Command in Afghanistan: A Forsaken Principle of War

    National Research Council Canada - National Science Library

    Hope, Ian

    2008-01-01

    ... in the evolution of military command for Afghanistan. It examines how there was an unprecedented departure from the principle of unity of command in Afghanistan in 2006, when Combined Forces Command-Afghanistan (CFC...

  16. Spacecraft command and control using expert systems

    Science.gov (United States)

    Norcross, Scott; Grieser, William H.

    1994-01-01

    This paper describes a product called the Intelligent Mission Toolkit (IMT), which was created to meet the changing demands of the spacecraft command and control market. IMT is a command and control system built upon an expert system. Its primary functions are to send commands to the spacecraft and process telemetry data received from the spacecraft. It also controls the ground equipment used to support the system, such as encryption gear, and telemetry front-end equipment. Add-on modules allow IMT to control antennas and antenna interface equipment. The design philosophy for IMT is to utilize available commercial products wherever possible. IMT utilizes Gensym's G2 Real-time Expert System as the core of the system. G2 is responsible for overall system control, spacecraft commanding control, and spacecraft telemetry analysis and display. Other commercial products incorporated into IMT include the SYBASE relational database management system and Loral Test and Integration Systems' System 500 for telemetry front-end processing.

  17. ASC Addresses Unit Commanders' Concerns through LBE and Reset Programs

    National Research Council Canada - National Science Library

    Young, Mark E

    2008-01-01

    .... Army Sustainment Command (ASC), part of the U.S. Army Materiel Command (AMC) team, is available to assist, identify, and resolve equipment and maintenance problems as well as materiel readiness issues for combatant commanders...

  18. Identification of important nodes in directed biological networks: a network motif approach.

    Directory of Open Access Journals (Sweden)

    Pei Wang

    Full Text Available Identification of important nodes in complex networks has attracted an increasing attention over the last decade. Various measures have been proposed to characterize the importance of nodes in complex networks, such as the degree, betweenness and PageRank. Different measures consider different aspects of complex networks. Although there are numerous results reported on undirected complex networks, few results have been reported on directed biological networks. Based on network motifs and principal component analysis (PCA, this paper aims at introducing a new measure to characterize node importance in directed biological networks. Investigations on five real-world biological networks indicate that the proposed method can robustly identify actually important nodes in different networks, such as finding command interneurons, global regulators and non-hub but evolutionary conserved actually important nodes in biological networks. Receiver Operating Characteristic (ROC curves for the five networks indicate remarkable prediction accuracy of the proposed measure. The proposed index provides an alternative complex network metric. Potential implications of the related investigations include identifying network control and regulation targets, biological networks modeling and analysis, as well as networked medicine.

  19. Maritime Coalitions: When is Unity of Command Required

    National Research Council Canada - National Science Library

    Gahlinger, Gregory J

    2007-01-01

    .... The concepts of Unity of Command, Unity of Effort and Parallel, Lead Nation, or Integrated coalition command structures are viable across a broad spectrum of maritime coalition operations but do have...

  20. Unity of Command in Afghanistan: A Forsaken Principle of War

    National Research Council Canada - National Science Library

    Hope, Ian

    2008-01-01

    ... of military command for Afghanistan. It examines the unprecedented departure from the principle of unity of command in Afghanistan in 2006, when Combined Forces Command-Afghanistan passed control of the ground fight to the International...

  1. An Advanced Commanding and Telemetry System

    Science.gov (United States)

    Hill, Maxwell G. G.

    The Loral Instrumentation System 500 configured as an Advanced Commanding and Telemetry System (ACTS) supports the acquisition of multiple telemetry downlink streams, and simultaneously supports multiple uplink command streams for today's satellite vehicles. By using industry and federal standards, the system is able to support, without relying on a host computer, a true distributed dataflow architecture that is complemented by state-of-the-art RISC-based workstations and file servers.

  2. Astronaut John Young in Command Module Simulator during Apollo Simulation

    Science.gov (United States)

    1968-01-01

    Astronaut John W. Young, command module pilot, inside the Command Module Simulator in bldg 5 during an Apollo Simulation. Astronauts Thomas P. Stafford, commander and Eugene A. Cernan, lunar module pilot are out of the view.

  3. Investigation on network utilization efficiency and image transmission time for the PACS network

    International Nuclear Information System (INIS)

    Tawara, K.; Nishihara, E.; Komatsu, K.I.

    1987-01-01

    The authors investigated the following features of a PACS network: (1) network utilization efficiency and (2) image transmission time. They changed the following parameters, which the two items shown above depend on: (1) transfer rate between imaging equipment and network (10 kB/econd-8 MB/second), (2) network transmission speed (100 kB/second-50 MB/second), (3) packet length (10 kB-4 MB), and (4) message length (image data) (64 kB-4 MB). As a result, a conventional-type network cannot meet a need for PACS. To solve this problem, the authors propose a multiplexed network that consists of the high-speed network for image transmission and the conventional speed of control network for commands and shorter messages. If the packet length of the image network is designed to be variable, they can choose an optimum packet length for image transmission

  4. Command Home Page

    Science.gov (United States)

    Inclusion And Diversity Navy Standard Integrated Personnel System (NSIPS) My Navy Portal Board of One Source USA.gov U.S. Office of Special Counsel Social Media Directory and Policy US Navy App Locker Navy Personnel Command (NPC) Navy SAPR Navy EEO Inclusion And Diversity Navy Standard Integrated

  5. Comparison between a classical command law and a new advanced recovery command law in a MCB-ARS boost

    Science.gov (United States)

    Petit, Pierre; Saint-Eve, Frédéric; Sawicki, Jean-Paul; Aillerie, Michel

    2017-02-01

    This paper focuses on an original performed command on DC-DC boosts developed for applications in the LMOPS lab for the photovoltaic energy conversion and more specifically the Photovoltaic panels connected to HVDC smart grids. This boost, commonly named MCB-ARS (Magnetically Coupled Boost with Active Recovery Switch) presents great advantages concerning the simplicity of the command on the single constitutive switch, the global efficiency and the voltage conversion ratio. A fine analysis of the losses all over the entire converter shows that losses are not distributed uniformly in the constituting components. So a previous modification described in a previous paper consisting in the conducting assistance on the power flowing intermediate diode, performed advantageously the global efficiency. The present analysis takes into account the fact that the new configuration obtained after this important improvement looks like a classical half-bridge push-pull stage and may be controlled by a twice complementary command. In that way, a comparison has been done between a natural commutation recovery diode and an assisted switch commutation driven in a push-pull mode. As attempted, the switching command laws in charge to assume the energy transfer has been compared to the classical previous system described in anterior papers, and we demonstrate in this publication that a commutation based on a push-pull command mode within the two switches of the MCB-ARS converter is possible and increases the power transfer.

  6. Reticulospinal Systems for Tuning Motor Commands

    Directory of Open Access Journals (Sweden)

    Robert M. Brownstone

    2018-04-01

    Full Text Available The pontomedullary reticular formation (RF is a key site responsible for integrating descending instructions to execute particular movements. The indiscrete nature of this region has led not only to some inconsistencies in nomenclature, but also to difficulties in understanding its role in the control of movement. In this review article, we first discuss nomenclature of the RF, and then examine the reticulospinal motor command system through evolution. These command neurons have direct monosynaptic connections with spinal interneurons and motoneurons. We next review their roles in postural adjustments, walking and sleep atonia, discussing their roles in movement activation or inhibition. We propose that knowledge of the internal organization of the RF is necessary to understand how the nervous system tunes motor commands, and that this knowledge will underlie strategies for motor functional recovery following neurological injuries or diseases.

  7. High Bandwidth Communications Links Between Heterogeneous Autonomous Vehicles Using Sensor Network Modeling and Extremum Control Approaches

    Science.gov (United States)

    2008-12-01

    In future network-centric warfare environments, teams of autonomous vehicles will be deployed in a coorperative manner to conduct wide-area...of data back to the command station, autonomous vehicles configured with high bandwidth communication system are positioned between the command

  8. Incorrect Responses to Locative Commands: A Case Study.

    Science.gov (United States)

    Duchan, Judith; Siegel, Leo

    1979-01-01

    A six-year-old with a language problem responded consistently to 100 locative commands by putting objects in containers and on flat surfaces regardless of the preposition or order of the nouns in the commands. (Author/CL)

  9. The command to love the neighbour in Paul and the Synoptics

    Directory of Open Access Journals (Sweden)

    Heinz A. Hiestermann

    2016-03-01

    Full Text Available When sayings of Jesus are compared between the Pauline letters and the Synoptic Gospels in an attempt to locate parallels, Galatians 5:14 and Romans 13:8�10 have frequently been put forward as possible parallels to the Synoptic renditions of the great commandment of Mark 12:28�34 (Mt 22:34�40; Lk 10:25�28. These Pauline and Synoptic texts all contain the command to love the neighbour, but the Synoptic texts have added the command to love God to the command to love the neighbour. Paul never quoted the great commandment. Consequently, a relationship between the verses is normally rejected. However, not all possibilities have been explored. In the search for parallels between Pauline and Synoptic Jesus traditions it has been overlooked that Paul and Matthew render the command to love the neighbour more than once. Matthew delivers the command to love the neighbour three times. Only once he has connected it to the command to love God. Matthew renders the single command to love the neighbour twice, resembling the Pauline use of the command. Using the criteria for validating parallels between Pauline and Synoptic Jesus traditions, including verbal agreement and the unique use of the command to love the neighbour by Paul and Matthew, it is argued that a connection between Romans 13:9 and Matthew 19:18�19 is likely.Intradisciplinary and/or interdisciplinary implications: The research explores the use of Leviticus 19:18b by the New Testament authors. It is argued that the command to love the neighbour was given high prominence in the early church, as it was used by the Synoptic authors and by Paul to summarise Jesus� ethical teachings.

  10. COMMAND-AND-CONTROL AND MANAGEMENT DECISION MAKING,

    Science.gov (United States)

    Reports that the development of command-and-con trol systems in support of decision making and action taking has been accomplished by military...methods applicable to management systems. Concludes that the command-and-control type system for top management decision making is a man-machine system having as its core an on going, dynamic operation. (Author)

  11. THE PARTICULARITIES OF THE COST CALCULATION METHOD ON COMMANDS IN FURNITURE INDUSTRY

    Directory of Open Access Journals (Sweden)

    Felicia Sabou

    2014-10-01

    Full Text Available The paper present the importance of the method on commands in cost calculation and the particularities of the cost calculation method on commands in the furniture industry. This paper presents a hypotetical study on the method on commands, considering the observations made during 2013-2014, on how it is organized and managed accounts management using method on commands.By presenting this hypothetical model about the accounting in management accounting using the method on commands, the paper contributes to the correct application of this method in practice, specifically in management accounting in companies from the furniture industry. In my opinion the method on commands is an appropriate method for achieving management accounting for companies that have as main activity the production of furniture. When applying the method on commands in cost calculation and in management accounting, the companies must to consider the particularities of the cost calculation, in the furniture industry, like: technical and economic factors from this sector, the technical details of each command, the codification of the commands, planning materials and labor costs for each command, monitoring and recording production costs, registration of the direct costs, distribution of the indirect costs on commands, registration of the indirect costs and registration in management accounting.

  12. ITOUGH2 command reference. Version 3.1

    International Nuclear Information System (INIS)

    Finsterle, S.

    1997-04-01

    This report contains a detailed description of all ITOUGH2 commands. It complements the ITOUGH2 User's Guide and the collection of ITOUGH2 sample problems. ITOUGH2 is a program for parameter estimation, sensitivity analysis, and uncertainty propagation analysis. It is based on the TOUGH2 simulator for non-isothermal multiphase flow in fractured and porous media. Extensive experience in using TOUGH2 is a prerequisite for using ITOUGH2. The preparation of an input file for TOUGH2 or its derivatives is described in separate manuals and is not part of this report. The ITOUGH2 user's guide summarizes the inverse modeling theory pertaining to ITOUGH2, and describes the program output. Furthermore, information about code architecture and installation are given. In Chapter 2 of this report, a brief summary of inverse modeling theory is given to restate the main concepts implemented in ITOUGH2 and to introduce certain definitions. Chapter 3 introduces the basic concepts of the ITHOUGH2 input language and the main structure of an ITOUGH2 input file. Chapter 4, the main part of this report, provides detailed descriptions of each ITOUGH2 command in alphabetical order. It is complemented by a command index in Appendix B in which the commands are given in logical order. The content of Chapter 4 is also available on-line using command it2help. Chapter 5 describes the usage of the UNIX script files for executing, checking, and terminating ITOUGH2 simulations

  13. Somatic surveillance: corporeal control through information networks

    OpenAIRE

    Monahan, Torin; Wall, Tyler

    2007-01-01

    Somatic surveillance is the increasingly invasive technological monitoring of and intervention into body functions. Within this type of surveillance regime, bodies are recast as nodes on vast information networks, enabling corporeal control through remote network commands, automated responses, or self-management practices. In this paper, we investigate three developments in somatic surveillance: nanotechnology systems for soldiers on the battlefield, commercial body-monitoring systems for hea...

  14. Implementing Internet of Things in a military command and control environment

    Science.gov (United States)

    Raglin, Adrienne; Metu, Somiya; Russell, Stephen; Budulas, Peter

    2017-05-01

    While the term Internet of Things (IoT) has been coined relatively recently, it has deep roots in multiple other areas of research including cyber-physical systems, pervasive and ubiquitous computing, embedded systems, mobile ad-hoc networks, wireless sensor networks, cellular networks, wearable computing, cloud computing, big data analytics, and intelligent agents. As the Internet of Things, these technologies have created a landscape of diverse heterogeneous capabilities and protocols that will require adaptive controls to effect linkages and changes that are useful to end users. In the context of military applications, it will be necessary to integrate disparate IoT devices into a common platform that necessarily must interoperate with proprietary military protocols, data structures, and systems. In this environment, IoT devices and data will not be homogeneous and provenance-controlled (i.e. single vendor/source/supplier owned). This paper presents a discussion of the challenges of integrating varied IoT devices and related software in a military environment. A review of contemporary commercial IoT protocols is given and as a practical example, a middleware implementation is proffered that provides transparent interoperability through a proactive message dissemination system. The implementation is described as a framework through which military applications can integrate and utilize commercial IoT in conjunction with existing military sensor networks and command and control (C2) systems.

  15. Intelligent Tutoring System for Teaching Battlefield Command Reasoning Skills

    National Research Council Canada - National Science Library

    Domeshek, Eric

    2002-01-01

    .... Achieving expert levels of proficiency in high-level command reasoning skills-whether for battlefield commanders or for executives in industry-requires extensive practice, coaching, and feedback...

  16. Acquisition management of the Global Transportation Network

    Science.gov (United States)

    2001-08-02

    This report discusses the acquisition management of the Global transportation Network by the U.S. Transportation Command. This report is one in a series of audit reports addressing DoD acquisition management of information technology systems. The Glo...

  17. Development of Information Technology for Smart Defense

    International Nuclear Information System (INIS)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun; Han, Sangcheol

    2014-01-01

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation

  18. Development of Information Technology for Smart Defense

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun [ETRI, Daejeon (Korea, Republic of); Han, Sangcheol [KEIT, Seoul (Korea, Republic of)

    2014-03-15

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation.

  19. The Mac'OS X command line Unix under the hood

    CERN Document Server

    McElhearn, Kirk

    2006-01-01

    The Mac command line offers a faster, easier way to accomplish many tasks. It''s also the medium for many commands that aren''t accessible using the GUI. The Mac OS X Command Line is a clear, concise, tutorial-style introduction to all the major functionality provided by the command line. It''s also packed with information the experienced users need, including little-known shortcuts and several chapters devoted to advanced topics. This is a book to get you started, but also a book you won't soon outgrow.

  20. Command Structure for Theater Warfare: The Quest for Unity of Command

    Science.gov (United States)

    1984-09-01

    that trryfari tail forth thr htst from iti—Btturki Major General« Pern M Smith. USAF. and Hark) A Hughe«. USAF. contributed more to the rndertaking...an air. ground, and sea component. These arc generic commands which control all combat operations in the media of the air. ground, and sea. There

  1. 32 CFR 809a.10 - Military commanders' responsibilities.

    Science.gov (United States)

    2010-07-01

    ... authorities as soon as possible. (c) Military forces will ordinarily exercise police powers previously... 32 National Defense 6 2010-07-01 2010-07-01 false Military commanders' responsibilities. 809a.10... Disturbance Intervention and Disaster Assistance § 809a.10 Military commanders' responsibilities. (a...

  2. OPTIMAL CONFIGURATION OF A COMMAND AND CONTROL NETWORK: BALANCING PERFORMANCE AND RECONFIGURATION CONSTRAINTS

    Energy Technology Data Exchange (ETDEWEB)

    L. DOWELL

    1999-07-01

    The optimization of the configuration of communications and control networks is important for assuring the reliability and performance of the networks. This paper presents techniques for determining the optimal configuration for such a network in the presence of communication and connectivity constraints.

  3. Arsenic and Old Mustard: Chemical Problems of Old Arsenical and 'Mustard' Munitions (Joseph F. Bunnett and Marian Mikotajczyk, Eds.)

    Science.gov (United States)

    Garrett, Benjamin

    1999-10-01

    What do Knute Rockne, Notre Dame's famed football coach, and Lewisite, a chemical warfare agent dubbed "the dew of death", have in common? Both owe their discovery to Father Julius Arthur Nieuwland.1 Rockne's legacy lives on in the Fighting Irish and their tradition of excellence on the gridiron. Lewisite, together with other arsenical- and mustard-type chemical warfare agents, provide a legacy that lives on, too, but with less cheerful consequences. The book Arsenic and Old Mustard: Chemical Problems of Old Arsenical and 'Mustard' Munitions makes clear the challenges faced in dealing with those consequences. This book documents the proceedings of a workshop devoted to arsenical- and mustard-type chemical warfare agents and their associated munitions. The workshop, held in Poland in 1996, included nine lectures, eight posters, and three discussion groups; and the contents of all these are presented. Major support for the workshop came from the Scientific Affairs Division of NATO as part of on ongoing series of meetings, cooperative research projects, and related efforts dealing with problems leftover from the Cold War and, in the case of the arsenicals and mustards, from conflicts dating to World War I. These problems can be seen in contemporary accounts, including a January 1999 news report that the U.S. Department of Defense intends to survey Washington, DC, areas near both American University and the Catholic University of America (CUA), site of the original synthesis of Lewisite, for chemical warfare agents and other materials disposed at the end of World War I.2 The first nine chapters of the book present the workshop's lectures. Of these, readers interested in chemical weapon destruction might find especially useful the first chapter, in which Ron Mansley of the Organisation for the Prohibition of Chemical Weapons presents a scholarly overview covering historical aspects of the arsenicals and mustards; their production and use; prospective destruction

  4. 106-17 Telemetry Standards Recorder and Reproducer Command and Control Chapter 6

    Science.gov (United States)

    2017-07-01

    block identifiers (any ASCII text , one identifier per line) from the drive. A .BBLIST command is only valid following a declassify command. The type ... Processor Device Using IEEE 1394b ..... 6-49 6.5.6 Additional Mandatory Commands When Using Ethernet ........................... 6-54 6.5.7 Additional Non...state or magnetic disk). Not all commands (CLI or discrete) may be applicable to all types of R/R implementations. Commands are used to a) control the

  5. Development and Validation of Nigerian Army Commanding Officers ...

    African Journals Online (AJOL)

    The research adopted an ex-post-facto design based on a qualitative and quantitative analysis of data. Focus Group Discussions (FGDs) and In-Depth Interviews (IDIs) were conducted with commanding officers. The FGDs were conducted with officers purposively drawn from incumbent commanding officers in the Nigerian ...

  6. Scale-free Enterprise Command & Control

    National Research Council Canada - National Science Library

    Bayne, Jay; Paul, Raymond

    2005-01-01

    ...) services that provide allied teams of commanders, planners and operations personnel with collaborative, grid-based and realtime situation assessment, plan generation, and plan execution services...

  7. U.S. Africa Command: Shaping Africa for the Future

    National Research Council Canada - National Science Library

    Sholley, Hans

    2006-01-01

    .... It is argued the current Unified Command Plan is ill designed to address the complexities of the continent of Africa and that a proposed United States Africa Command would be better positioned...

  8. 14 CFR 417.303 - Command control system requirements.

    Science.gov (United States)

    2010-01-01

    ... system must transmit a command signal that has the radio frequency characteristics and power needed for.... (c) Reliability prediction. A command control system must have a predicted reliability of 0.999 at... for each launch. Any demonstration of the system's predicted reliability must satisfy § 417.309(b). (d...

  9. NETS - A NEURAL NETWORK DEVELOPMENT TOOL, VERSION 3.0 (MACINTOSH VERSION)

    Science.gov (United States)

    Phillips, T. A.

    1994-01-01

    NETS, A Tool for the Development and Evaluation of Neural Networks, provides a simulation of Neural Network algorithms plus an environment for developing such algorithms. Neural Networks are a class of systems modeled after the human brain. Artificial Neural Networks are formed from hundreds or thousands of simulated neurons, connected to each other in a manner similar to brain neurons. Problems which involve pattern matching readily fit the class of problems which NETS is designed to solve. NETS uses the back propagation learning method for all of the networks which it creates. The nodes of a network are usually grouped together into clumps called layers. Generally, a network will have an input layer through which the various environment stimuli are presented to the network, and an output layer for determining the network's response. The number of nodes in these two layers is usually tied to some features of the problem being solved. Other layers, which form intermediate stops between the input and output layers, are called hidden layers. NETS allows the user to customize the patterns of connections between layers of a network. NETS also provides features for saving the weight values of a network during the learning process, which allows for more precise control over the learning process. NETS is an interpreter. Its method of execution is the familiar "read-evaluate-print" loop found in interpreted languages such as BASIC and LISP. The user is presented with a prompt which is the simulator's way of asking for input. After a command is issued, NETS will attempt to evaluate the command, which may produce more prompts requesting specific information or an error if the command is not understood. The typical process involved when using NETS consists of translating the problem into a format which uses input/output pairs, designing a network configuration for the problem, and finally training the network with input/output pairs until an acceptable error is reached. NETS

  10. Command vector memory systems: high performance at low cost

    OpenAIRE

    Corbal San Adrián, Jesús; Espasa Sans, Roger; Valero Cortés, Mateo

    1998-01-01

    The focus of this paper is on designing both a low cost and high performance, high bandwidth vector memory system that takes advantage of modern commodity SDRAM memory chips. To successfully extract the full bandwidth from SDRAM parts, we propose a new memory system organization based on sending commands to the memory system as opposed to sending individual addresses. A command specifies, in a few bytes, a request for multiple independent memory words. A command is similar to a burst found in...

  11. Exploring Mechanisms Underlying Impaired Brain Function in Gulf War Illness through Advanced Network Analysis

    Science.gov (United States)

    2017-10-01

    networks of the brain responsible for visual processing, mood regulation, motor coordination, sensory processing, and language command, but increased...4    For each subject, the rsFMRI voxel time-series were temporally shifted to account for differences in slice acquisition times...responsible for visual processing, mood regulation, motor coordination, sensory processing, and language command, but increased connectivity in

  12. Indonesian Automatic Speech Recognition For Command Speech Controller Multimedia Player

    Directory of Open Access Journals (Sweden)

    Vivien Arief Wardhany

    2014-12-01

    Full Text Available The purpose of multimedia devices development is controlling through voice. Nowdays voice that can be recognized only in English. To overcome the issue, then recognition using Indonesian language model and accousticc model and dictionary. Automatic Speech Recognizier is build using engine CMU Sphinx with modified english language to Indonesian Language database and XBMC used as the multimedia player. The experiment is using 10 volunteers testing items based on 7 commands. The volunteers is classifiedd by the genders, 5 Male & 5 female. 10 samples is taken in each command, continue with each volunteer perform 10 testing command. Each volunteer also have to try all 7 command that already provided. Based on percentage clarification table, the word “Kanan” had the most recognize with percentage 83% while “pilih” is the lowest one. The word which had the most wrong clarification is “kembali” with percentagee 67%, while the word “kanan” is the lowest one. From the result of Recognition Rate by male there are several command such as “Kembali”, “Utama”, “Atas “ and “Bawah” has the low Recognition Rate. Especially for “kembali” cannot be recognized as the command in the female voices but in male voice that command has 4% of RR this is because the command doesn’t have similar word in english near to “kembali” so the system unrecognize the command. Also for the command “Pilih” using the female voice has 80% of RR but for the male voice has only 4% of RR. This problem is mostly because of the different voice characteristic between adult male and female which male has lower voice frequencies (from 85 to 180 Hz than woman (165 to 255 Hz.The result of the experiment showed that each man had different number of recognition rate caused by the difference tone, pronunciation, and speed of speech. For further work needs to be done in order to improving the accouracy of the Indonesian Automatic Speech Recognition system

  13. Irrigation and crop management in Gandak Canal command of India

    International Nuclear Information System (INIS)

    Singh, S.S.; Khan, A.R.

    2002-05-01

    The Gandak Project is one of the biggest irrigation projects in India, covering a culturable command area (CCA) of 4.44 lakh ha in U.P., 9.6 lakh ha CCA in Bihar and 0.44 lakh ha in Nepal (Singh and Khan, 2002). The total culturable command areas are 14.44 lakh hectares. The command area is located in between latitude 25 deg 40' to 27 deg 25' and longitude between 83 deg 15' to 85 deg 15'. It is a diversion project through construction of a barrage on the river Gandak. This project area covers up to five districts in the Command of Tirhut Main Canal (TMC) and 3 districts in the Saran Main Canal (SMC) command. The length of main canal is usually long (990 and 650 R.D.'s in eastern and western side, respectively) and the channels are unlined and seepage loss is quite high. (author)

  14. Combatant Commanders Informational Series: USPACOM

    National Research Council Canada - National Science Library

    Comnick, Michael

    1996-01-01

    ...) introducing potential joint staff officers to their specific command. Inbound staff officers, prepared by reviewing this product, arrive on station ready to receive specialized training without needing background indoctrination...

  15. Effective Response to Attacks On Department of Defense Computer Networks

    National Research Council Canada - National Science Library

    Shaha, Patrick

    2001-01-01

    .... For the Commanders-in-Chief (CINCs), computer networking has proven especially useful in maintaining contact and sharing data with elements forward deployed as well as with host nation governments and agencies...

  16. Commander manipulator scoops prestigious mulit-million pound BNFL contract

    International Nuclear Information System (INIS)

    Bailey, Andrew.

    1997-01-01

    Twenty-one Commander robotic arms are on order from INBIS (formerly Ricardo Hitec) and BNFL Engineering Limited (''BEL'', the engineering arm of parent company BNFL). The multi-million pound contract was won amid fierce competition from other well-known names in robotic engineering. The specially designed Commander manipulators will be engaged in remotely handling Intermediate Level Waste (ILW) in a suite of four BNFL ILW plants, which are currently either under construction or planned at Sellafield. The first Commander will delivered to BNFL's Sellafield Silo Emptying Project in January 1998. (Author)

  17. Warfighter Associate: Decision Aiding and Metrics for Mission Command

    Science.gov (United States)

    2012-01-23

    Distributions: highlights the Pareto Principle -- the top 20% of the mission-command staff is heavily involved in collaborations. • Our...developing “Command Web”, a web service to support thin- client functionality (Intelligent Presentation Services enables this) Thank you

  18. The Influence of Future Command, Control, Communications, and Computers (C4) on Doctrine and the Operational Commander's Decision-Making Process

    Science.gov (United States)

    Mayer, Michael G.

    1996-01-01

    Future C4 systems will alter the traditional balance between force and information, having a profound influence on doctrine and the operational commander's decision making process. The Joint Staff's future vision of C4 is conceptualized in 'C4I for the Warrior' which envisions a joint C4I architecture providing timely sensor to shoot information direct to the warfighter. C4 system must manage and filter an overwhelming amount of information; deal with interoperability issues; overcome technological limitations; meet emerging security requirements; and protect against 'Information Warfare.' Severe budget constraints necessitate unified control of C4 systems under singular leadership for the common good of all the services. In addition, acquisition policy and procedures must be revamped to allow new technologies to be fielded quickly; and the commercial marketplace will become the preferred starting point for modernization. Flatter command structures are recommended in this environment where information is available instantaneously. New responsibilities for decision making at lower levels are created. Commanders will have to strike a balance between exerting greater control and allowing subordinates enough flexibility to maintain initiative. Clearly, the commander's intent remains the most important tool in striking this balance.

  19. U.S. Pacific Command > Leadership

    Science.gov (United States)

    USPACOM U.S. Pacific Command Search USPACOM: Search Search Search USPACOM: Search Home Leadership Directory Media Inquiries Home : Leadership Admiral Harry B. Harris, Jr., U.S. Navy Read the full biography

  20. XTCE: XML Telemetry and Command Exchange Tutorial, XTCE Version 1

    Science.gov (United States)

    Rice, Kevin; Kizzort, Brad

    2008-01-01

    These presentation slides are a tutorial on XML Telemetry and Command Exchange (XTCE). The goal of XTCE is to provide an industry standard mechanism for describing telemetry and command streams (particularly from satellites.) it wiill lower cost and increase validation over traditional formats, and support exchange or native format.XCTE is designed to describe bit streams, that are typical of telemetry and command in the historic space domain.

  1. NETS - A NEURAL NETWORK DEVELOPMENT TOOL, VERSION 3.0 (MACHINE INDEPENDENT VERSION)

    Science.gov (United States)

    Baffes, P. T.

    1994-01-01

    NETS, A Tool for the Development and Evaluation of Neural Networks, provides a simulation of Neural Network algorithms plus an environment for developing such algorithms. Neural Networks are a class of systems modeled after the human brain. Artificial Neural Networks are formed from hundreds or thousands of simulated neurons, connected to each other in a manner similar to brain neurons. Problems which involve pattern matching readily fit the class of problems which NETS is designed to solve. NETS uses the back propagation learning method for all of the networks which it creates. The nodes of a network are usually grouped together into clumps called layers. Generally, a network will have an input layer through which the various environment stimuli are presented to the network, and an output layer for determining the network's response. The number of nodes in these two layers is usually tied to some features of the problem being solved. Other layers, which form intermediate stops between the input and output layers, are called hidden layers. NETS allows the user to customize the patterns of connections between layers of a network. NETS also provides features for saving the weight values of a network during the learning process, which allows for more precise control over the learning process. NETS is an interpreter. Its method of execution is the familiar "read-evaluate-print" loop found in interpreted languages such as BASIC and LISP. The user is presented with a prompt which is the simulator's way of asking for input. After a command is issued, NETS will attempt to evaluate the command, which may produce more prompts requesting specific information or an error if the command is not understood. The typical process involved when using NETS consists of translating the problem into a format which uses input/output pairs, designing a network configuration for the problem, and finally training the network with input/output pairs until an acceptable error is reached. NETS

  2. The R Commander: A Basic-Statistics Graphical User Interface to R

    Directory of Open Access Journals (Sweden)

    John Fox

    2005-08-01

    Full Text Available Unlike S-PLUS, R does not incorporate a statistical graphical user interface (GUI, but it does include tools for building GUIs. Based on the tcltk package (which furnishes an interface to the Tcl/Tk GUI toolkit, the Rcmdr package provides a basic-statistics graphical user interface to R called the "R Commander." The design objectives of the R Commander were as follows: to support, through an easy-to-use, extensible, cross-platform GUI, the statistical functionality required for a basic-statistics course (though its current functionality has grown to include support for linear and generalized-linear models, and other more advanced features; to make it relatively difficult to do unreasonable things; and to render visible the relationship between choices made in the GUI and the R commands that they generate. The R Commander uses a simple and familiar menu/dialog-box interface. Top-level menus include File, Edit, Data, Statistics, Graphs, Models, Distributions, Tools, and Help, with the complete menu tree given in the paper. Each dialog box includes a Help button, which leads to a relevant help page. Menu and dialog-box selections generate R commands, which are recorded in a script window and are echoed, along with output, to an output window. The script window also provides the ability to edit, enter, and re-execute commands. Error messages, warnings, and some other information appear in a separate messages window. Data sets in the R Commander are simply R data frames, and can be read from attached packages or imported from files. Although several data frames may reside in memory, only one is "active" at any given time. There may also be an active statistical model (e.g., an R lm or glm ob ject. The purpose of this paper is to introduce and describe the use of the R Commander GUI; to describe the design and development of the R Commander; and to explain how the R Commander GUI can be extended. The second part of the paper (following a brief

  3. Control of automated system with voice commands

    OpenAIRE

    Švara, Denis

    2012-01-01

    In smart houses contemporary achievements in the fields of automation, communications, security and artificial intelligence, increase comfort and improve the quality of user's lifes. For the purpose of this thesis we developed a system for managing a smart house with voice commands via smart phone. We focused at voice commands most. We want move from communication with fingers - touches, to a more natural, human relationship - speech. We developed the entire chain of communication, by which t...

  4. Evaluation of the metabolic fate of munitions material (TNT & RDX) in plant systems. Initial assessment of plant DNA mutation spectra as a biomarker

    Energy Technology Data Exchange (ETDEWEB)

    Leung, F.; Cataldo, D.A.; Fellows, R.J.; Jarrell, A.E.; Harvey, S.D.

    1995-09-01

    Munitions material can enter the environment as a result of manufacturing activities and field usage. Predictor methodologies, or biomarkers would enhance evaluation of environmental impacts. The goal of this exploratory study deoxyribonucleic acid (DNA) mutation frequency as a biomarker for munitions exposure. The approach e resolution of an effective repetitive sequence probe for the identification of characteristic mutations, and (2) the development of a testing media [a clonal cell line of carrot (Daucus carota) spension cells]. Commercially available probes demonstrated marginal resolution therefore a low-C{sub o}t library was then constructed. Three colonies from the low-C{sub o}t DNA library were screened and the DNA isolates sequenced. A suspension culture of carrot (Daucus carota) was developed. A mutation spectra experiment was initiated at a 10-mg TNT/L exposure concentration with the attempt to clone over 1500 single TNT-exposed cells. Over the following six months greater than 98% of the initially isolated cells were unable to survive and produce micro calluses. The remaining calli were too few to be statistically significant and the experiment was terminated. The biomarker concept itself remains to be disproved, but the need for large numbers of uniform clones to differentiate true mutations suggest that more direct techniques using whole tissues need to be developed.

  5. Command in the Objective Force

    National Research Council Canada - National Science Library

    Wilbeck, Christopher

    2003-01-01

    This paper seeks to answer what type of command will best serve the Army's Objective Force in gaining the initiative, building momentum, and exploiting success to achieve land dominance in the future...

  6. Incident command linkup: the vital key for CBRN response

    International Nuclear Information System (INIS)

    Smith, D.

    2009-01-01

    The most vital element for responding emergency personnel to a CBRN attack is the incident command linkup and dissemination of information. Incident Command, the basic foundation of the National Incident Management System (NIMS), is the first thing that must be effectively established when a response is required in any emergency. When initial evaluation of the scene determines that the incident involves CBRN, specialized resources from a wide array of assets must be activated quickly to mitigate the hazards. In this paper, we examine the information that the Incident Commander must be prepared to convey to those specialized assets responding. We will also look at what questions those specialized resources may ask while en route and upon arrival. Another key element that will be discussed is the placement of those resources in the hierarchy of the National Incident Management System. The information that the Incident Commander (IC) must be prepared to convey to those specialized assets responding is crucial for an efficient response and effective deployment. What questions might those specialized CBRN resources ask while en route and upon arrival? At a bare minimum, the four basic questions of who is in charge of the incident, where is the incident located, what transpired to trigger a response, and when did the incident occur must be answered. These questions should be answered while en route to the scene so that the Commander of the responding CBRN unit can formulate a plan on the move and prepare his response accordingly. While in transit, the CBRN responders should maintain contact with a representative of the Incident Command at the scene so that the latest information is available. Discussions should include anticipated logistical requirements such as personal protective equipment (PPE), decon requirements, communications protocols, and medical care issues. The CBRN Commander will need to know if the site is secure, has it been cleared of explosive hazards

  7. Normalized Index of Synergy for Evaluating the Coordination of Motor Commands

    Science.gov (United States)

    Togo, Shunta; Imamizu, Hiroshi

    2015-01-01

    Humans perform various motor tasks by coordinating the redundant motor elements in their bodies. The coordination of motor outputs is produced by motor commands, as well properties of the musculoskeletal system. The aim of this study was to dissociate the coordination of motor commands from motor outputs. First, we conducted simulation experiments where the total elbow torque was generated by a model of a simple human right and left elbow with redundant muscles. The results demonstrated that muscle tension with signal-dependent noise formed a coordinated structure of trial-to-trial variability of muscle tension. Therefore, the removal of signal-dependent noise effects was required to evaluate the coordination of motor commands. We proposed a method to evaluate the coordination of motor commands, which removed signal-dependent noise from the measured variability of muscle tension. We used uncontrolled manifold analysis to calculate a normalized index of synergy. Simulation experiments confirmed that the proposed method could appropriately represent the coordinated structure of the variability of motor commands. We also conducted experiments in which subjects performed the same task as in the simulation experiments. The normalized index of synergy revealed that the subjects coordinated their motor commands to achieve the task. Finally, the normalized index of synergy was applied to a motor learning task to determine the utility of the proposed method. We hypothesized that a large part of the change in the coordination of motor outputs through learning was because of changes in motor commands. In a motor learning task, subjects tracked a target trajectory of the total torque. The change in the coordination of muscle tension through learning was dominated by that of motor commands, which supported the hypothesis. We conclude that the normalized index of synergy can be used to evaluate the coordination of motor commands independently from the properties of the

  8. Searching LOGIN, the Local Government Information Network.

    Science.gov (United States)

    Jack, Robert F.

    1984-01-01

    Describes a computer-based information retrieval and electronic messaging system produced by Control Data Corporation now being used by government agencies and other organizations. Background of Local Government Information Network (LOGIN), database structure, types of LOGIN units, searching LOGIN (intersect, display, and list commands), and how…

  9. Command Leadership DEOCS 4.1 Construct Validity Summary

    Science.gov (United States)

    2017-08-01

    Command Leadership DEOCS 4.1 Construct Validity Summary DEFENSE EQUAL OPPORTUNITY MANAGEMENT INSTITUTE...Report #15-18 1 Command Leadership DEOCS 4.1 Construct Validity Summary Background In 2014, DEOMI released DEOCS 4.0 for Department of Defense...individual items on the DEOCS. The following paper details the work conducted to modify the factor of Leadership Cohesion so that it focuses more

  10. A Multi-Vehicles, Wireless Testbed for Networked Control, Communications and Computing

    Science.gov (United States)

    Murray, Richard; Doyle, John; Effros, Michelle; Hickey, Jason; Low, Steven

    2002-03-01

    We have constructed a testbed consisting of 4 mobile vehicles (with 4 additional vehicles being completed), each with embedded computing and communications capability for use in testing new approaches for command and control across dynamic networks. The system is being used or is planned to be used for testing of a variety of communications-related technologies, including distributed command and control algorithms, dynamically reconfigurable network topologies, source coding for real-time transmission of data in lossy environments, and multi-network communications. A unique feature of the testbed is the use of vehicles that have second order dynamics. Requiring real-time feedback algorithms to stabilize the system while performing cooperative tasks. The testbed was constructed in the Caltech Vehicles Laboratory and consists of individual vehicles with PC-based computation and controls, and multiple communications devices (802.11 wireless Ethernet, Bluetooth, and infrared). The vehicles are freely moving, wheeled platforms propelled by high performance dotted fairs. The room contains an access points for an 802.11 network, overhead visual sensing (to allow emulation of CI'S signal processing), a centralized computer for emulating certain distributed computations, and network gateways to control and manipulate communications traffic.

  11. Communication Delays in the Cooperative Control of Wide Area Search Munitions Via Iterative Network Flow

    National Research Council Canada - National Science Library

    Mitchell, Jason

    2003-01-01

    .... This model is used to study the effect of communication delays on the performance of an iteractive network flow optimization model that results in a sequence of linear programs for the optimal...

  12. Rapid Response Command and Control (R2C2): a systems engineering analysis of scaleable communications for Regional Combatant Commanders

    OpenAIRE

    Sullivan, Lisa; Cannon, Lennard; Reyes, Ronel; Bae, Kitan; Colgary, James; Minerowicz, Nick; Leong, Chris; Lim, Harry; Lim, Hang Sheng; Ng, Chin Chin; Neo, Tiong Tien; Tan, Guan Chye; Ng, Yu Loon; Wong, Eric; Wong, Heng Yue

    2006-01-01

    Includes supplementary material. Disaster relief operations, such as the 2005 Tsunami and Hurricane Katrina, and wartime operations, such as Operation Enduring Freedom and Operation Iraqi Freedom, have identified the need for a standardized command and control system interoperable among Joint, Coalition, and Interagency entities. The Systems Engineering Analysis Cohort 9 (SEA-9) Rapid Response Command and Control (R2C2) integrated project team completed a systems engineering (SE) ...

  13. GPS and the Joint Force Commander: Critical Asset, Critical Vulnerability

    National Research Council Canada - National Science Library

    McPherson, Michael

    2001-01-01

    Joint Force Commanders (JFCs) have become over reliant on military and commercial satellite systems for intelligence gathering and dissemination, weather, command, control, communications, and navigation/guidance functions, to name a few...

  14. Parallel processing data network of master and slave transputers controlled by a serial control network

    Science.gov (United States)

    Crosetto, Dario B.

    1996-01-01

    The present device provides for a dynamically configurable communication network having a multi-processor parallel processing system having a serial communication network and a high speed parallel communication network. The serial communication network is used to disseminate commands from a master processor (100) to a plurality of slave processors (200) to effect communication protocol, to control transmission of high density data among nodes and to monitor each slave processor's status. The high speed parallel processing network is used to effect the transmission of high density data among nodes in the parallel processing system. Each node comprises a transputer (104), a digital signal processor (114), a parallel transfer controller (106), and two three-port memory devices. A communication switch (108) within each node (100) connects it to a fast parallel hardware channel (70) through which all high density data arrives or leaves the node.

  15. Launch Control Network Engineer

    Science.gov (United States)

    Medeiros, Samantha

    2017-01-01

    The Spaceport Command and Control System (SCCS) is being built at the Kennedy Space Center in order to successfully launch NASA’s revolutionary vehicle that allows humans to explore further into space than ever before. During my internship, I worked with the Network, Firewall, and Hardware teams that are all contributing to the huge SCCS network project effort. I learned the SCCS network design and the several concepts that are running in the background. I also updated and designed documentation for physical networks that are part of SCCS. This includes being able to assist and build physical installations as well as configurations. I worked with the network design for vehicle telemetry interfaces to the Launch Control System (LCS); this allows the interface to interact with other systems at other NASA locations. This network design includes the Space Launch System (SLS), Interim Cryogenic Propulsion Stage (ICPS), and the Orion Multipurpose Crew Vehicle (MPCV). I worked on the network design and implementation in the Customer Avionics Interface Development and Analysis (CAIDA) lab.

  16. Leaders in space: Mission commanders and crew on the International Space Station

    Science.gov (United States)

    Brcic, Jelena

    Understanding the relationship between leaders and their subordinates is important for building better interpersonal connections, improving group cohesion and cooperation, and increasing task success. This relationship has been examined in many types of groups but not a great amount of analysis has been applied to spaceflight crews. We specifically investigated differences between mission commanders and flight commanders during missions to the International Space Station (ISS). Astronauts and cosmonauts on the ISS participate in long-duration missions (2 to 6 months in length) in which they live and work in close proximity with their 2 or 3 member crews. The leaders are physically distant from their command centres which may result in delay of instructions or important advice. Therefore, the leaders must be able to make quick, sound decisions with unwavering certainty. Potential complications include that the leaders may not be able to exercise their power fully, since material reward or punishment of any one member affects the whole group, and that the leader's actions (or lack thereof) in this isolated, confined environment could create stress in members. To be effective, the mission commander must be able to prevent or alleviate any group conflict and be able to relate to members on an emotional level. Mission commanders and crew are equal in the competencies of spaceflight; therefore, what are the unique characteristics that enable the commanders to fulfill their role? To highlight the differences between commander and crew, astronaut journals, diaries, pre- flight interviews, NASA oral histories, and letters written to family from space were scored and analyzed for values and coping styles. During pre-flight, mission commanders scored higher than other crew members on the values of Stimulation, Security, Universalism, Conformity, Spirituality, and Benevolence, and more often used Self-Control as a coping style. During the long-duration mission on ISS, mission

  17. Fit for Command: Military Leadership Attributes for Small Wars

    Science.gov (United States)

    2013-04-18

    Corps Command and StaffCollege Marine Corps University 2076 outh Street Marine Corps Combat Development Command Quantico, Virgin ia?? 134-5068...by the local imam to join him in the celebration of a religious Shi’a holiday .79 Just before departure to the mosque his translator informed him

  18. Neural-Network Control Of Prosthetic And Robotic Hands

    Science.gov (United States)

    Buckley, Theresa M.

    1991-01-01

    Electronic neural networks proposed for use in controlling robotic and prosthetic hands and exoskeletal or glovelike electromechanical devices aiding intact but nonfunctional hands. Specific to patient, who activates grasping motion by voice command, by mechanical switch, or by myoelectric impulse. Patient retains higher-level control, while lower-level control provided by neural network analogous to that of miniature brain. During training, patient teaches miniature brain to perform specialized, anthropomorphic movements unique to himself or herself.

  19. The Warfighting Capacity of Air Combat Command's Numbered Air Forces

    National Research Council Canada - National Science Library

    Hanser, Lawrence

    2000-01-01

    ...) of the Air Combat Command (ACC), General Richard E. Hawley, the ACC Commander, asked if RAND could offer an analysis of the number of NAFs that were needed by ACC to meet warfighting requirements...

  20. Modular code supervisor. Automatic generation of command language

    International Nuclear Information System (INIS)

    Dumas, M.; Thomas, J.B.

    1988-01-01

    It is shown how, starting from a problem formulated by the user, to generate the adequate calculation procedure in the command code, and acquire the data necessary for the calculation while verifying their validity. Modular codes are used, because of their flexibility and wide utilisation. Modules are written in Fortran, and calculations are done in batches according to an algorithm written in the GIBIANE command language. The action plans are based on the STRIPS and WARPLAN families. Elementary representation of a module and special instructions are illustrated. Dynamic construction macro-actions, and acquisition of the specification (which allows users to express the goal of a program without indicating which algorithm is used to reach the goal) are illustrated. The final phase consists in translating the algorithm into the command language [fr

  1. Patch models and their applications to multivehicle command and control.

    Science.gov (United States)

    Rao, Venkatesh G; D'Andrea, Raffaello

    2007-06-01

    We introduce patch models, a computational modeling formalism for multivehicle combat domains, based on spatiotemporal abstraction methods developed in the computer science community. The framework yields models that are expressive enough to accommodate nontrivial controlled vehicle dynamics while being within the representational capabilities of common artificial intelligence techniques used in the construction of autonomous systems. The framework allows several key design requirements of next-generation network-centric command and control systems, such as maintenance of shared situation awareness, to be achieved. Major features include support for multiple situation models at each decision node and rapid mission plan adaptation. We describe the formal specification of patch models and our prototype implementation, i.e., Patchworks. The capabilities of patch models are validated through a combat mission simulation in Patchworks, which involves two defending teams protecting a camp from an enemy attacking team.

  2. Command History for 1990

    Science.gov (United States)

    1991-05-01

    Marine Corps Tiaining Systems (CBESS) memorization training Inteligence Center, Dam Neck Threat memorization training Commander Tactical Wings, Atlantic...News Shipbuilding Technical training AEGIS Training Center, Dare Artificial Intelligence (Al) Tools Computerized firm-end analysis tools NETSCPAC...Technology Department and provides computational and electronic mail support for research in areas of artificial intelligence, computer-assisted instruction

  3. Mission Command and JC41: Managing Chaos in a Dynamic World

    Science.gov (United States)

    2018-04-20

    doubly so, but perhaps not solely for the reasons expected. History has seen the progression of technology enable commanders and staffs to extend their...highlights the degree to which each Service embraces and codifies the mission command concept. Chapter 3 covers the history of the technologies ...Abstract Executing effective mission command has always been a challenge and in today’s technologically saturated joint operating environment is

  4. Commands for financial data management and portfolio optimization

    OpenAIRE

    C. Alberto Dorantes

    2013-01-01

    Several econometric software offer portfolio management tools for practitioners and researchers. For example, MatLab and R offer a great variety of tools for the simulation, optimization, and analysis of financial time series. Stata, together with Mata, offers powerful programming tools for the simulation, optimization, and analysis of financial data. However, related user commands are scarce. In this presentation, commands for online market data collection, data manipulation, and financial a...

  5. Linux command line and shell scripting bible

    CERN Document Server

    Blum, Richard

    2014-01-01

    Talk directly to your system for a faster workflow with automation capability Linux Command Line and Shell Scripting Bible is your essential Linux guide. With detailed instruction and abundant examples, this book teaches you how to bypass the graphical interface and communicate directly with your computer, saving time and expanding capability. This third edition incorporates thirty pages of new functional examples that are fully updated to align with the latest Linux features. Beginning with command line fundamentals, the book moves into shell scripting and shows you the practical application

  6. 'The Danger of Divided Command': British civil and military disputes ...

    African Journals Online (AJOL)

    Commander-in-Chief of the Indian Army, Lord Kitchener, which culminated in Curzon's ... and the officers commanding forces would have no doubt as to their .... but assuming financial responsibility for its own defence would have been ...

  7. Communications for unattended sensor networks

    Science.gov (United States)

    Nemeroff, Jay L.; Angelini, Paul; Orpilla, Mont; Garcia, Luis; DiPierro, Stefano

    2004-07-01

    The future model of the US Army's Future Combat Systems (FCS) and the Future Force reflects a combat force that utilizes lighter armor protection than the current standard. Survival on the future battlefield will be increased by the use of advanced situational awareness provided by unattended tactical and urban sensors that detect, identify, and track enemy targets and threats. Successful implementation of these critical sensor fields requires the development of advanced sensors, sensor and data-fusion processors, and a specialized communications network. To ensure warfighter and asset survivability, the communications must be capable of near real-time dissemination of the sensor data using robust, secure, stealthy, and jam resistant links so that the proper and decisive action can be taken. Communications will be provided to a wide-array of mission-specific sensors that are capable of processing data from acoustic, magnetic, seismic, and/or Chemical, Biological, Radiological, and Nuclear (CBRN) sensors. Other, more powerful, sensor node configurations will be capable of fusing sensor data and intelligently collect and process data images from infrared or visual imaging cameras. The radio waveform and networking protocols being developed under the Soldier Level Integrated Communications Environment (SLICE) Soldier Radio Waveform (SRW) and the Networked Sensors for the Future Force Advanced Technology Demonstration are part of an effort to develop a common waveform family which will operate across multiple tactical domains including dismounted soldiers, ground sensor, munitions, missiles and robotics. These waveform technologies will ultimately be transitioned to the JTRS library, specifically the Cluster 5 requirement.

  8. STS-93 Commander Collins suits up for launch

    Science.gov (United States)

    1999-01-01

    During the third launch preparations in the Operations and Checkout Building, STS-93 Commander Eileen M. Collins waves while having her launch and entry suit checked. After Space Shuttle Columbia's July 20 and 22 launch attempts were scrubbed, the launch was again rescheduled for Friday, July 23, at 12:24 a.m. EDT. STS-93 is a five-day mission primarily to release the Chandra X-ray Observatory, which will allow scientists from around the world to study some of the most distant, powerful and dynamic objects in the universe. The STS-93 crew numbers five: Commander Collins, Pilot Jeffrey S. Ashby, and Mission Specialists Stephen A. Hawley (Ph.D.), Catherine G. Coleman (Ph.D.) and Michel Tognini of France, with the Centre National d'Etudes Spatiales (CNES). Collins is the first woman to serve as commander of a shuttle mission.

  9. Education Requirements of Command Positions in the U.S. Border Patrol

    Science.gov (United States)

    2015-06-12

    commander. Degrees in Culinary Arts , Fashion Design, or Film Studies are thus considered as relevant and valuable for command as degrees in Border...Command and General Staff College in partial fulfillment of the requirements for the degree MASTER OF MILITARY ART AND SCIENCE Homeland Security...Z39.18 iii MASTER OF MILITARY ART AND SCIENCE THESIS APPROVAL PAGE Name of Candidate: Julio C. Peña Thesis Title: Education Requirements of

  10. IT Security Support for the Spaceport Command Control System Development

    Science.gov (United States)

    Varise, Brian

    2014-01-01

    My job title is IT Security support for the Spaceport Command & Control System Development. As a cyber-security analyst it is my job to ensure NASA's information stays safe from cyber threats, such as, viruses, malware and denial-of-service attacks by establishing and enforcing system access controls. Security is very important in the world of technology and it is used everywhere from personal computers to giant networks ran by Government agencies worldwide. Without constant monitoring analysis, businesses, public organizations and government agencies are vulnerable to potential harmful infiltration of their computer information system. It is my responsibility to ensure authorized access by examining improper access, reporting violations, revoke access, monitor information request by new programming and recommend improvements. My department oversees the Launch Control System and networks. An audit will be conducted for the LCS based on compliance with the Federal Information Security Management Act (FISMA) and The National Institute of Standards and Technology (NIST). I recently finished analyzing the SANS top 20 critical controls to give cost effective recommendations on various software and hardware products for compliance. Upon my completion of this internship, I will have successfully completed my duties as well as gain knowledge that will be helpful to my career in the future as a Cyber Security Analyst.

  11. Command and Control for Homeland Security

    National Research Council Canada - National Science Library

    Greene, Marjorie

    2007-01-01

    ... Analysis of the Toronto SARS Outbreak, Vertical Integration, Vertical Integration in a Military Command Hierarchy, Information flows for a domestic incident, C2 for Homeland Security will benefit...

  12. Command-And-Control or Taxation?

    DEFF Research Database (Denmark)

    Oh, Christina; Svendsen, Gert Tinggaard

    2015-01-01

    an ineffective command-and-control (CAC) tool, whereas Denmark has chosen the effective tool of taxation. One main explanation for this variation in policy choice is the variation in institutional setups, namely the corporatist route in Denmark versus the pluralistic route in California....

  13. A precise clock distribution network for MRPC-based experiments

    International Nuclear Information System (INIS)

    Wang, S.; Cao, P.; Shang, L.; An, Q.

    2016-01-01

    In high energy physics experiments, the MRPC (Multi-Gap Resistive Plate Chamber) detectors are widely used recently which can provide higher-resolution measurement for particle identification. However, the application of MRPC detectors leads to a series of challenges in electronics design with large number of front-end electronic channels, especially for distributing clock precisely. To deal with these challenges, this paper presents a universal scheme of clock transmission network for MRPC-based experiments with advantages of both precise clock distribution and global command synchronization. For precise clock distributing, the clock network is designed into a tree architecture with two stages: the first one has a point-to-multipoint long range bidirectional distribution with optical channels and the second one has a fan-out structure with copper link inside readout crates. To guarantee the precision of clock frequency or phase, the r-PTP (reduced Precision Time Protocol) and the DDMTD (digital Dual Mixer Time Difference) methods are used for frequency synthesis, phase measurement and adjustment, which is implemented by FPGA (Field Programmable Gate Array) in real-time. In addition, to synchronize global command execution, based upon this clock distribution network, synchronous signals are coded with clock for transmission. With technique of encoding/decoding and clock data recovery, signals such as global triggers or system control commands, can be distributed to all front-end channels synchronously, which greatly simplifies the system design. The experimental results show that both the clock jitter (RMS) and the clock skew can be less than 100 ps.

  14. Command History, 1993.

    Science.gov (United States)

    1994-04-01

    his space capsule. The ()CUILAR COtJNTI:,RROI,.L I)FVICI" was built by the Naval Air Rework Facility, NAS Pensacola. tfor NAMRI, in the early 1960s...Dunwoody, GA Kevin G. Singleton, ENS USNR Naval Aviation Schools Command Kyle W M. Taylor, ENS USNR U.S. Naval Academy Jason A. Temple, ENS USNR Auburn...Pensacola, 13-15 Oct 93. Pokorski, T.L., LICDR MSC USN, attended Aircrew Modified IEquipment for Ladies in Aviation (AMELIA) Fri -service Long-range Planning

  15. Increasing Classroom Compliance: Using a High-Probability Command Sequence with Noncompliant Students

    Science.gov (United States)

    Axelrod, Michael I.; Zank, Amber J.

    2012-01-01

    Noncompliance is one of the most problematic behaviors within the school setting. One strategy to increase compliance of noncompliant students is a high-probability command sequence (HPCS; i.e., a set of simple commands in which an individual is likely to comply immediately prior to the delivery of a command that has a lower probability of…

  16. ASTP crewmen in Apollo Command Module Trainer during training session at JSC

    Science.gov (United States)

    1975-01-01

    The three members of the American ASTP prime crew are photographed inside the Apollo Command Module (CM) trainer in a water tank in bldg 260 during water egress training at JSC. They are, left to right, Astronauts Thomas P. Stafford, commander; Vance D. Brand, command module pilot; and Donald K. Slayton, docking module pilot (23430); Slayton attaches his life preserver as he egresses an Apollo Command Module trainer in a water tank in bldg 260 during water egresss training at JSC. Astronauts Brand (on left) and Stafford have already egressed the trainer and are seated in a three-man life raft.

  17. Research into command, control, and communications in space construction

    Science.gov (United States)

    Davis, Randal

    1990-01-01

    Coordinating and controlling large numbers of autonomous or semi-autonomous robot elements in a space construction activity will present problems that are very different from most command and control problems encountered in the space business. As part of our research into the feasibility of robot constructors in space, the CSC Operations Group is examining a variety of command, control, and communications (C3) issues. Two major questions being asked are: can we apply C3 techniques and technologies already developed for use in space; and are there suitable terrestrial solutions for extraterrestrial C3 problems? An overview of the control architectures, command strategies, and communications technologies that we are examining is provided and plans for simulations and demonstrations of our concepts are described.

  18. Evaluation of the metabolic fate of munitions material (TNT & RDX) in plant systems and initial assessment of material interaction with plant genetic material (DNA). Initial assessment of plant DNA adducts as biomarkers

    Energy Technology Data Exchange (ETDEWEB)

    Harvey, S.D.; Clauss, T.W.; Fellows, R.J.; Cataldo, D.A.

    1995-08-01

    Genetic damage to deoxyribonucleic acid (DNA) has long been suspected of being a fundamental event leading to cancer. A variety of causal factors can result in DNA damage including photodimerization of base pairs, ionizing radiation, specific reaction of DNA with environmental pollutants, and nonspecific oxidative damage caused by the action of highly reactive oxidizing agents produced by metabolism. Because organisms depend on an unadulterated DNA template for reproduction, DNA repair mechanisms are an important defense for maintaining genomic integrity. The objective of this exploratory project was to evaluate the potential for TNT to form DNA adducts in plants. These adducts, if they exist in sufficient quantities, could be potential biomarkers of munitions exposure. The ultimate goal is to develop a simple analytical assay for the determination of blomarkers that is indicative of munitions contamination. DNA repair exists in dynamic equilibrium with DNA damage. Repair mechanisms are capable of keeping DNA damage at remarkably low concentrations provided that the repair capacity is not overwhelmed.

  19. A Proposal for the Merger of the U.S. Army Recruiting Command (USAREC) and the U.S. Army Cadet Command: One Recruiting Organization - "More Than a Partnership"

    National Research Council Canada - National Science Library

    Kleppinger, Tim

    2001-01-01

    ...) and the United States Army Cadet Command into one accessions organization. For the past five years both USAREC and Cadet Command have found greater difficulty in achieving their annual missions...

  20. Is There a Need For a Joint Reserve Components Command?

    Science.gov (United States)

    2013-03-01

    Bravo Zulu ”. If these words were heard by a Soldier, it might be interpreted as poor performance. By having one organization as a single source for...Commander, Joint Reserve Components Command. Creation of the JRCC would, in time, strengthen partnerships between the reserve components of each

  1. Global Missile Defense: The Case for a New Operational Command Structure

    National Research Council Canada - National Science Library

    Galazin, Jared J

    2005-01-01

    ...), violates the principle of unity of command. Placing components of the BMDS under the control of different combatant commanders creates unnecessary friction in a process where speed of execution is measured in seconds...

  2. Wireless Sensing Node Network Management for Monitoring Landslide Disaster

    International Nuclear Information System (INIS)

    Takayama, S; Akiyama, J; Fujiki, T; Mokhtar, N A B

    2013-01-01

    This paper shows the network management and operation to monitor landslide disaster at slop of mountain and hill. Natural disasters damage a measuring system easily. It is necessary for the measuring system to be flexible and robust. The measuring network proposed in this paper is the telemetry system consisted of host system (HS) and local sensing nodes network system (LSNNS). LSNNS operates autonomously and sometimes is controlled by commands from HS. HS collects data/information of landslide disaster from LSNNS, and controls LSNNS remotely. HS and LSNNS are communicated by using 'cloud' system. The dual communication is very effective and convenient to manage a network system operation

  3. Modeling and simulating command and control for organizations under extreme situations

    CERN Document Server

    Moon, Il-Chul; Kim, Tag Gon

    2013-01-01

    Commanding and controlling organizations in extreme situations is a challenging task in military, intelligence, and disaster management. Such command and control must be quick, effective, and considerate when dealing with the changing, complex, and risky conditions of the situation. To enable optimal command and control under extremes, robust structures and efficient operations are required of organizations. This work discusses how to design and conduct virtual experiments on resilient organizational structures and operational practices using modeling and simulation. The work illustrates key a

  4. Digital Device Architecture and the Safe Use of Flash Devices in Munitions

    Science.gov (United States)

    Katz, Richard B.; Flowers, David; Bergevin, Keith

    2017-01-01

    Flash technology is being utilized in fuzed munition applications and, based on the development of digital logic devices in the commercial world, usage of flash technology will increase. Digital devices of interest to designers include flash-based microcontrollers and field programmable gate arrays (FPGAs). Almost a decade ago, a study was undertaken to determine if flash-based microcontrollers could be safely used in fuzes and, if so, how should such devices be applied. The results were documented in the Technical Manual for the Use of Logic Devices in Safety Features. This paper will first review the Technical Manual and discuss the rationale behind the suggested architectures for microcontrollers and a brief review of the concern about data retention in flash cells. An architectural feature in the microcontroller under study will be discussed and its use will show how to screen for weak or failed cells during manufacture, storage, or immediately prior to use. As was done for microcontrollers a decade ago, architectures for a flash-based FPGA will be discussed, showing how it can be safely used in fuzes. Additionally, architectures for using non-volatile (including flash-based) storage will be discussed for SRAM-based FPGAs.

  5. Apollo 10 astronauts in space suits in front of Command Module

    Science.gov (United States)

    1968-01-01

    Three astronauts named as the prime crew of the Apollo 10 space mission. Left to right, are Eugene A. Cernan, lunar module pilot; John W. Young, command module pilot; and Thomas P. Stafford, commander.

  6. Man/terminal interaction evaluation of computer operating system command and control service concepts. [in Spacelab

    Science.gov (United States)

    Dodson, D. W.; Shields, N. L., Jr.

    1978-01-01

    The Experiment Computer Operating System (ECOS) of the Spacelab will allow the onboard Payload Specialist to command experiment devices and display information relative to the performance of experiments. Three candidate ECOS command and control service concepts were reviewed and laboratory data on operator performance was taken for each concept. The command and control service concepts evaluated included a dedicated operator's menu display from which all command inputs were issued, a dedicated command key concept with which command inputs could be issued from any display, and a multi-display concept in which command inputs were issued from several dedicated function displays. Advantages and disadvantages are discussed in terms of training, operational errors, task performance time, and subjective comments of system operators.

  7. The use of augmented reality in command and control situation ...

    African Journals Online (AJOL)

    This study identifies possible uses of augmented reality in command and control applications with specific attention to situation awareness in the South African context. Applications across the different command and control functions, as well as at the different levels of military operations are considered. The article concludes ...

  8. Comparative Research of Navy Voluntary Education at Operational Commands

    Science.gov (United States)

    2017-03-01

    into a national and international market. This is especially effects land-grant institutions who can educate the citizens within their state by...RESEARCH OF NAVY VOLUNTARY EDUCATION AT OPERATIONAL COMMANDS by Christopher B. Veenhuis March 2017 Thesis Co-Advisors: William Hatch Chad...COVERED Master’s thesis 4. TITLE AND SUBTITLE COMPARATIVE RESEARCH OF NAVY VOLUNTARY EDUCATION AT OPERATIONAL COMMANDS 5. FUNDING NUMBERS 6. AUTHOR(S

  9. United States Southern Command * Home

    Science.gov (United States)

    or concerns please email or call us at 305-437-2287. Testing The USAG- Miami Joint Education Testing the Air Force | The Air University | US Air Force Academy Army: Army Continued Education System | Army Marine Corps Institute | US Marine Corps Training and Education Command | US Marine Corps University Navy

  10. Predicting compliance with command hallucinations: anger, impulsivity and appraisals of voices' power and intent.

    Science.gov (United States)

    Bucci, Sandra; Birchwood, Max; Twist, Laura; Tarrier, Nicholas; Emsley, Richard; Haddock, Gillian

    2013-06-01

    Command hallucinations are experienced by 33-74% of people who experience voices, with varying levels of compliance reported. Compliance with command hallucinations can result in acts of aggression, violence, suicide and self-harm; the typical response however is non-compliance or appeasement. Two factors associated with such dangerous behaviours are anger and impulsivity, however few studies have examined their relationship with compliance to command hallucinations. The current study aimed to examine the roles of anger and impulsivity on compliance with command hallucinations in people diagnosed with a psychotic disorder. The study was a cross-sectional design and included individuals who reported auditory hallucinations in the past month. Subjects completed a variety of self-report questionnaire measures. Thirty-two people experiencing command hallucinations, from both in-patient and community settings, were included. The tendency to appraise the voice as powerful, to be impulsive, to experience anger and to regulate anger were significantly associated with compliance with command hallucinations to do harm. Two factors emerged as significant independent predictors of compliance with command hallucinations; omnipotence and impulsivity. An interaction between omnipotence and compliance with commands, via a link with impulsivity, is considered and important clinical factors in the assessment of risk when working with clients experiencing command hallucinations are recommended. The data is highly suggestive and warrants further investigation with a larger sample. Copyright © 2013 Elsevier B.V. All rights reserved.

  11. New Global Missions for Strategic Command

    National Research Council Canada - National Science Library

    Graham, David

    2002-01-01

    .... The focus of this White Paper is on the external decisions that will be needed to provide the Command with a clear mission, and the authority, resources and organizational support necessary to perform the mission...

  12. 10 commandments of smile esthetics

    Science.gov (United States)

    Machado, Andre Wilson

    2014-01-01

    The search for esthetic treatment has persisted in the routine of dental professionals. Following this trend, dental patients have sought treatment with the primary aim of improving smile esthetics. The aim of this article is to present a protocol to assess patient's smile: The 10 Commandments of smile esthetics. PMID:25279532

  13. Secure network for beamline control

    International Nuclear Information System (INIS)

    Ohata, T.; Fukui, T.; Ishii, M.; Furukawa, Y.; Nakatani, T.; Matsushita, T.; Takeuchi, M.; Tanaka, R.; Ishikawa, T.

    2001-01-01

    In SPring-8, beamline control system is constructed with a highly available distributed network system. The socket based communication protocol is used for the beamline control mainly. Beamline users can control the equipment by sending simple control commands to a server process, which is running on a beamline-managing computer (Ohata et al., SPring-8 beamline control system, ICALEPCS'99, Trieste, Italy, 1999). At the beginning the network was based on the shared topology at all beamlines. Consequently, it has a risk for misapplication of the user's program to access different machines on the network system cross over beamlines. It is serious problem for the SPring-8 beamline control system, because all beamlines controlled with unified software interfaces. We introduced the switching technology and the firewalls to support network access control. Also the virtual networking (VLAN: IEEE 802.1Q) and the gigabit Ethernet technology (IEEE 802.3ab) are introduced. Thus the network security and the reliability are guaranteed at the higher level in SPring-8 beamline

  14. A Cataloger’s Guide to the LMARS Report Number Authority File in Use at the Naval Underwater Systems Center.

    Science.gov (United States)

    1980-09-15

    FORCE CAMBRIDGE AFCRL-70-0018 RESEARCH LAB AFETR AIR FORCE EASTERN TEST RANGE APETR-TR-76-13 AFEWC AIR FORCE ELECTRONIC AFEWC-OP-1-77 WARFARE CENTER... EFFECTS TECHNOLOGY INC ETI-CR79-623 EUDAC EUROPEAN COMMAND DEFENSE EUDAC-DASJ-3-78 ANALYSIS EWIS (Electroniz Warfare EWIS-R-02-76 Inte 11 igence...AEO-76-066 JHU-APL-POR-1999. ..etc. JMEM (Joint Munitions Effectiveness JMEM-61JTCG/ME-1-2 Manual) jpl *See CIT-JPL (California Institute of Technology

  15. 2003 IDA Cost Research Symposium: Cost of Evolutionary Acquisition/Spiral Development

    Science.gov (United States)

    2003-08-01

    Management DASA(C&E)–2 ACEIT Help-Desk/Training DASA(C&E)–3 ACEIT Enhancements DASA(C&E)–4 Command, Control, Communications, Computers, Intelligence...Development DASA(C&E)–9 Standard Variable IDs for use in ACEIT DASA(C&E)–10 Tri-Service Missile and Smart Munitions Database Bluebook Update DASA(C&E...Data Collection, Database, Computer Model DASA-CE–2 Title: ACEIT Help-Desk/Training Summary: This project funds the Army dial up support for

  16. Which energy networks for tomorrow?

    International Nuclear Information System (INIS)

    Lenoir, D.; Couturier, Ch.; Batot, Ph.; Jedliczka, M.; Belon, D.; Goy, E.; Bureau, L.

    2010-01-01

    A set of brief articles outlines the importance of energy networks of all kinds for the future of energy conservation. Thus, all networks (communication, data, production command and control) will have a role to play to make all energy networks (electricity, gas, heat, cold, water, sewage, telecommunications) communicate with each other, and a new consumption/production model will have to be developed for each territory by taking into account its capacities to improve energy efficiency and valorize renewable energies. The authors also propose a historical perspective of network development and of their trend to become interconnected and complementary, comment the governance issue in terms of concession, evoke the supply of public networks with biogas (legal framework under development), discuss the value of the project of development of smart grids, suggest that a better electricity demand management could be an efficient alternative to grid development, comment the context and implications of the European directive Linky, outline that heat networks will contribute to the reduction of the environmental impact of buildings, evoke the issue of cold water networks and their impact on air conditioning, present the original heat network which is about to be built in Saint-Brieuc, etc.

  17. Terrain Commander: Unattended Ground-Based Surveillance System

    National Research Council Canada - National Science Library

    Steadman, Bob

    2000-01-01

    .... Terrain Commander OASIS provides next generation target detection, classification, and tracking through smart sensor fusion of beamforming acoustic, seismic, passive infrared, and magnetic sensors...

  18. From Cybercrime to Cyborg Crime: Botnets as Hybrid Criminal Actor-Networks

    NARCIS (Netherlands)

    van der Wagen, Wytske; Pieters, Wolter

    2015-01-01

    Botnets, networks of infected computers controlled by a commander, increasingly play a role in a broad range of cybercrimes. Although often studied from technological perspectives, a criminological perspective could elucidate the organizational structure of botnets and how to counteract them.

  19. From Cybercrime to Cyborg Crime : Botnets as Hybrid Criminal Actor-Networks

    NARCIS (Netherlands)

    van der Wagen, Wytske; Pieters, Wolter

    2015-01-01

    Botnets, networks of infected computers controlled by a commander, increasingly play a role in a broad range of cybercrimes. Although often studied from technological perspectives, a criminological perspective could elucidate the organizational structure of botnets and how to counteract them.

  20. An analysis of network traffic classification for botnet detection

    DEFF Research Database (Denmark)

    Stevanovic, Matija; Pedersen, Jens Myrup

    2015-01-01

    of detecting botnet network traffic using three methods that target protocols widely considered as the main carriers of botnet Command and Control (C&C) and attack traffic, i.e. TCP, UDP and DNS. We propose three traffic classification methods based on capable Random Forests classifier. The proposed methods...

  1. Hybrid EEG-fNIRS-Based Eight-Command Decoding for BCI: Application to Quadcopter Control.

    Science.gov (United States)

    Khan, Muhammad Jawad; Hong, Keum-Shik

    2017-01-01

    In this paper, a hybrid electroencephalography-functional near-infrared spectroscopy (EEG-fNIRS) scheme to decode eight active brain commands from the frontal brain region for brain-computer interface is presented. A total of eight commands are decoded by fNIRS, as positioned on the prefrontal cortex, and by EEG, around the frontal, parietal, and visual cortices. Mental arithmetic, mental counting, mental rotation, and word formation tasks are decoded with fNIRS, in which the selected features for classification and command generation are the peak, minimum, and mean ΔHbO values within a 2-s moving window. In the case of EEG, two eyeblinks, three eyeblinks, and eye movement in the up/down and left/right directions are used for four-command generation. The features in this case are the number of peaks and the mean of the EEG signal during 1 s window. We tested the generated commands on a quadcopter in an open space. An average accuracy of 75.6% was achieved with fNIRS for four-command decoding and 86% with EEG for another four-command decoding. The testing results show the possibility of controlling a quadcopter online and in real-time using eight commands from the prefrontal and frontal cortices via the proposed hybrid EEG-fNIRS interface.

  2. CCL: console command language, RSX11M V4. 0, V7. OC tutorial

    Energy Technology Data Exchange (ETDEWEB)

    Downward, J. G.

    1981-01-01

    The normal user interface to an RSX11M operating system is via MCR (Monitor Console Routine). If terminal input is not specifically requested by a task, all data or commands typed in at a user's terminal, are sent by the terminal driver to MCR for decoding. The MCR task (and its child ...SYS) decode user commands (ACT, ABORT,RUN, DEV, ETC.). Tasks installed with special names of the form ...XYZ are treated as an external MCR command. Hence if a user types, XYZ COMMANDLINE, the commandline in its entirety (or at least up to 79 characters) is sent as input to the task ...XYZ. This is the conventional way of supplying most system commands and controlling the operation of the RSX11M utility program. The limitations of this method are: (1) each task must be installed to get MCR command lines; (2) each installed task uses valuable POOL space; (3) only privileged users can INSTALL and REMOVE tasks; and (4) non-privileged users are restricted to RUNning non-installed tasks. To solve this problem, a user tailorable Console Command Language (CCL) has been implemented which allows each user to have a private task control language to pass command lines to tasks that are not installed in th system as external MCR commands.

  3. Imagining is Not Doing but Involves Specific Motor Commands: A Review of Experimental Data Related to Motor Inhibition.

    Science.gov (United States)

    Guillot, Aymeric; Di Rienzo, Franck; Macintyre, Tadhg; Moran, Aidan; Collet, Christian

    2012-01-01

    There is now compelling evidence that motor imagery (MI) and actual movement share common neural substrate. However, the question of how MI inhibits the transmission of motor commands into the efferent pathways in order to prevent any movement is largely unresolved. Similarly, little is known about the nature of the electromyographic activity that is apparent during MI. In addressing these gaps in the literature, the present paper argues that MI includes motor execution commands for muscle contractions which are blocked at some level of the motor system by inhibitory mechanisms. We first assemble data from neuroimaging studies that demonstrate that the neural networks mediating MI and motor performance are not totally overlapping, thereby highlighting potential differences between MI and actual motor execution. We then review MI data indicating the presence of subliminal muscular activity reflecting the intrinsic characteristics of the motor command as well as increased corticomotor excitability. The third section not only considers the inhibitory mechanisms involved during MI but also examines how the brain resolves the problem of issuing the motor command for action while supervising motor inhibition when people engage in voluntary movement during MI. The last part of the paper draws on imagery research in clinical contexts to suggest that some patients move while imagining an action, although they are not aware of such movements. In particular, experimental data from amputees as well as from patients with Parkinson's disease are discussed. We also review recent studies based on comparing brain activity in tetraplegic patients with that from healthy matched controls that provide insights into inhibitory processes during MI. We conclude by arguing that based on available evidence, a multifactorial explanation of motor inhibition during MI is warranted.

  4. Imagining is not doing but involves specific motor commands: a review of experimental data related to motor inhibition

    Directory of Open Access Journals (Sweden)

    Aymeric eGuillot

    2012-09-01

    Full Text Available There is now compelling evidence that motor imagery (MI and actual movement share common neural substrate. However, the question of how MI inhibits the transmission of motor commands into the efferent pathways in order to prevent any movement is largely unresolved. Similarly, little is known about the nature of the electromyographic activity that is apparent during MI. In addressing these gaps in the literature, the present paper argues that MI includes motor execution commands for muscle contractions which are blocked at some level of the motor system by inhibitory mechanisms. We first assemble data from neuroimaging studies that demonstrate that the neural networks mediating MI and motor performance are not totally overlapping, thereby highlighting potential differences between MI and actual motor execution. We then review MI data indicating the presence of subliminal muscular activity reflecting the intrinsic characteristics of the motor command as well as increased corticomotor excitability. The third section not only considers the inhibitory mechanisms involved during MI but also examines how the brain resolves the problem of issuing the motor command for action while supervising motor inhibition when people engage in voluntary movement during MI. The last part of the paper draws on imagery research in clinical contexts to suggest that some patients move while imagining an action, although they are not aware of such movements. In particular, experimental data from amputees as well as from patients with Parkinson’s disease are discussed. We also review recent studies based on comparing brain activity in tetraplegic patients with that from healthy matched controls that provide insights into inhibitory processes during MI. We conclude by arguing that based on available evidence, a multifactorial explanation of motor inhibition during MI is warranted.

  5. Oracle Enterprise Manager 12c command-line interface

    CERN Document Server

    Pot'Vin, Kellyn; Smith, Ray

    2014-01-01

    Oracle Enterprise Manager 12c Command-Line Interface shows how to use Enterprise Manager's powerful scripting language to automate your database administration work and save time by scripting routine tasks, and then executing those scripts across collections of databases and instances in your environment. This book is chock full of ready-made scripting examples contributed by the authors and leading members of the community. For example, you'll find scripts and examples of commands to: Remove an Enterprise Manager agent and its related targetsQuickly create administrator accounts that are ful

  6. 1 Commande multivariable du moteur asynchrone triphasé à cage ...

    African Journals Online (AJOL)

    AKA BOKO

    Correspondance, courriel : rabenarivo.michel@yahoo.fr. Résumé. La commande du moteur asynchrone triphasé à ... synthèse du système à l'aide du logiciel MATLAB. Mots-clés : commande, système multivariable, variation de ... of the system by MATLAB software. Keywords : control, MIMO system, frequency variation, ...

  7. Command and Control of the U.S. Tenth Army During the Battle of Okinawa

    Science.gov (United States)

    2009-06-12

    Army‘s XXIV Corps, commanded by Major General John R . Hodge, and the U.S. Marine Corps‘ III Amphibious Corps, commanded by Major General Roy S. Geiger...Watanabe, was activated in April 1944. Ushijima assumed command in August 1944, after Watanabe was bedridden and sent back to Japan due to chronic...great success and combat experience during the war in the Pacific. Army Major General John R . Hodge commanded the XXIV Corps. Hodge was commissioned

  8. STS-93 Commander Eileen Collins suits up for launch

    Science.gov (United States)

    1999-01-01

    For the third time, in the Operations and Checkout Building, STS- 93 Commander Eileen M. Collins tries on her helmet with her launch and entry suit. After Space Shuttle Columbia's July 20 and 22 launch attempts were scrubbed, the launch was again rescheduled for Friday, July 23, at 12:24 a.m. EDT. STS-93 is a five-day mission primarily to release the Chandra X-ray Observatory, which will allow scientists from around the world to study some of the most distant, powerful and dynamic objects in the universe. The STS-93 crew numbers five: Commander Collins, Pilot Jeffrey S. Ashby, and Mission Specialists Stephen A. Hawley (Ph.D.), Catherine G. Coleman (Ph.D.) and Michel Tognini of France, with the Centre National d'Etudes Spatiales (CNES). Collins is the first woman to serve as commander of a shuttle mission.

  9. Focused Logistics: Time for Functional Command

    National Research Council Canada - National Science Library

    Mintzlaff, Jeffrey G

    2005-01-01

    .... Military's distribution system -- the parts of the Department of Defense (DoD) that manage and execute the storage and movement of supplies to military customers -- consists of multiple entities and agencies made up of separate Services and commands...

  10. An analysis of Navy Recruiting Command's officer goaling models

    OpenAIRE

    Senter, Robert R.

    1990-01-01

    Approved for public release; distribution unlimited. This study examines the goaling models used by the Navy Recruiting Command for the Nurse Corps and Nuclear Propulsion Officer Candidate (NUPOC) programs. These two programs serve as representative samples for the numerous officer recruitment programs administered by the Navy Recruiting Command. The intent of the study is to analyze and validate the accuracy of the current goaling models, to ascertain factors which could improve the accur...

  11. ARAC: A unique command and control resource

    Energy Technology Data Exchange (ETDEWEB)

    Bradley, M.M.; Baskett, R.L.; Ellis, J.S. [and others

    1996-04-01

    The Atmospheric Release Advisory Capability (ARAC) at Lawrence Livermore National Laboratory (LLNL) is a centralized federal facility designed to provide real-time, world-wide support to military and civilian command and control centers by predicting the impacts of inadvertent or intentional releases of nuclear, biological, or chemical materials into the atmosphere. ARAC is a complete response system consisting of highly trained and experienced personnel, continually updated computer models, redundant data collection systems, and centralized and remote computer systems. With over 20 years of experience responding to domestic and international incidents, strong linkages with the Department of Defense, and the ability to conduct classified operations, ARAC is a unique command and control resource.

  12. ARAC: A unique command and control resource

    International Nuclear Information System (INIS)

    Bradley, M.M.; Baskett, R.L.; Ellis, J.S.

    1996-04-01

    The Atmospheric Release Advisory Capability (ARAC) at Lawrence Livermore National Laboratory (LLNL) is a centralized federal facility designed to provide real-time, world-wide support to military and civilian command and control centers by predicting the impacts of inadvertent or intentional releases of nuclear, biological, or chemical materials into the atmosphere. ARAC is a complete response system consisting of highly trained and experienced personnel, continually updated computer models, redundant data collection systems, and centralized and remote computer systems. With over 20 years of experience responding to domestic and international incidents, strong linkages with the Department of Defense, and the ability to conduct classified operations, ARAC is a unique command and control resource

  13. Mature data transport and command management services for the Space Station

    Science.gov (United States)

    Carper, R. D.

    1986-01-01

    The duplex space/ground/space data services for the Space Station are described. The need to separate the uplink data service functions from the command functions is discussed. Command management is a process shared by an operation control center and a command management system and consists of four functions: (1) uplink data communications, (2) management of the on-board computer, (3) flight resource allocation and management, and (4) real command management. The new data service capabilities provided by microprocessors, ground and flight nodes, and closed loop and open loop capabilities are studied. The need for and functions of a flight resource allocation management service are examined. The system is designed so only users can access the system; the problems encountered with open loop uplink access are analyzed. The procedures for delivery of operational, verification, computer, and surveillance and monitoring data directly to users are reviewed.

  14. Blossom Point Satellite Tracking and Command Station

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: The Blossom Point Satellite Command and Tracking Facility (BP) provides engineering and operational support to several complex space systems for the Navy...

  15. Joint Mission Command Implementation

    Science.gov (United States)

    2016-01-22

    choose. The paper finds that trust is strongly influenced by the subconscious brain and treating it like a tool ignores biology and results in... bias for action and empowerment.14 Since then, the services have evaluated their own concepts of command assessing them against Dempsey’s vision. Lt...understanding, intent, and trust, only trust is strongly influenced by the subconscious brain. Treating trust like it can be taught, or a behavior that

  16. STS-93 Commander Collins suits up before launch

    Science.gov (United States)

    1999-01-01

    In the Operations and Checkout Building, STS-93 Commander Eileen M. Collins gets help donning her launch and entry suit. After Space Shuttle Columbia's July 20 launch attempt was scrubbed at the T-7 second mark in the countdown, the launch was rescheduled for Thursday, July 22, at 12:28 a.m. EDT. The target landing date is July 26, 1999, at 11:24 p.m. EDT. STS-93 is a five-day mission primarily to release the Chandra X-ray Observatory, which will allow scientists from around the world to study some of the most distant, powerful and dynamic objects in the universe. The new telescope is 20 to 50 times more sensitive than any previous X- ray telescope and is expected unlock the secrets of supernovae, quasars and black holes. The STS-93 crew numbers five: Commander Collins, Pilot Jeffrey S. Ashby, and Mission Specialists Stephen A. Hawley (Ph.D.), Catherine G. Coleman (Ph.D.) and Michel Tognini of France, with the Centre National d'Etudes Spatiales (CNES). Collins is the first woman to serve as commander of a shuttle mission.

  17. Suitability of Agent Technology for Military Command and Control in the Future Combat System Environment

    Energy Technology Data Exchange (ETDEWEB)

    Potok, TE

    2003-02-13

    The U.S. Army is faced with the challenge of dramatically improving its war fighting capability through advanced technologies. Any new technology must provide significant improvement over existing technologies, yet be reliable enough to provide a fielded system. The focus of this paper is to assess the novelty and maturity of agent technology for use in the Future Combat System (FCS). The FCS concept represents the U.S. Army's ''mounted'' form of the Objective Force. This concept of vehicles, communications, and weaponry is viewed as a ''system of systems'' which includes net-centric command and control (C{sup 2}) capabilities. This networked C{sup 2} is an important transformation from the historically centralized, or platform-based, C{sup 2} function since a centralized command architecture may become a decision-making and execution bottleneck, particularly as the pace of war accelerates. A mechanism to ensure an effective network-centric C{sup 2} capacity (combining intelligence gathering and analysis available at lower levels in the military hierarchy) is needed. Achieving a networked C{sup 2} capability will require breakthroughs in current software technology. Many have proposed the use of agent technology as a potential solution. Agents are an emerging technology, and it is not yet clear whether it is suitable for addressing the networked C{sup 2} challenge, particularly in satisfying battlespace scalability, mobility, and security expectations. We have developed a set of software requirements for FCS based on military requirements for this system. We have then evaluated these software requirements against current computer science technology. This analysis provides a set of limitations in the current technology when applied to the FCS challenge. Agent technology is compared against this set of limitations to provide a means of assessing the novelty of agent technology in an FCS environment. From this analysis we

  18. Hybrid EEG–fNIRS-Based Eight-Command Decoding for BCI: Application to Quadcopter Control

    Science.gov (United States)

    Khan, Muhammad Jawad; Hong, Keum-Shik

    2017-01-01

    In this paper, a hybrid electroencephalography–functional near-infrared spectroscopy (EEG–fNIRS) scheme to decode eight active brain commands from the frontal brain region for brain–computer interface is presented. A total of eight commands are decoded by fNIRS, as positioned on the prefrontal cortex, and by EEG, around the frontal, parietal, and visual cortices. Mental arithmetic, mental counting, mental rotation, and word formation tasks are decoded with fNIRS, in which the selected features for classification and command generation are the peak, minimum, and mean ΔHbO values within a 2-s moving window. In the case of EEG, two eyeblinks, three eyeblinks, and eye movement in the up/down and left/right directions are used for four-command generation. The features in this case are the number of peaks and the mean of the EEG signal during 1 s window. We tested the generated commands on a quadcopter in an open space. An average accuracy of 75.6% was achieved with fNIRS for four-command decoding and 86% with EEG for another four-command decoding. The testing results show the possibility of controlling a quadcopter online and in real-time using eight commands from the prefrontal and frontal cortices via the proposed hybrid EEG–fNIRS interface. PMID:28261084

  19. U.S. Pacific Command > Organization > Organization Chart

    Science.gov (United States)

    Responsibility USPACOM Previous Commanders Organization Organization Chart Media News Flickr Photos Video Directory Media Inquiries Home : Organization : Organization Chart About DoD DoD Careers Join the Military

  20. Mission Command: Elasticity, Equilibrium, Culture, and Intent

    National Research Council Canada - National Science Library

    Stewart, Keith G

    2006-01-01

    .... It is enabled by decentralization of authority and responsibility that allows subordinate commanders the latitude to plan and conduct operations based upon their understanding of the local situation...

  1. Preventing Network Centric Overload (End State Education for the Operational Commander/Staff)

    National Research Council Canada - National Science Library

    Beck, John

    2001-01-01

    .... An end state education system must be devised that prepares our senior leaders to operate a newly formed network centric task force with equipment, organizations and theory of use that most likely...

  2. Apollo 11 Command Service Module

    Science.gov (United States)

    1969-01-01

    A close-up view of the Apollo 11 command service module ready to be mated with the spacecraft LEM adapter of the third stage. The towering 363-foot Saturn V was a multi-stage, multi-engine launch vehicle standing taller than the Statue of Liberty. Altogether, the Saturn V engines produced as much power as 85 Hoover Dams.

  3. Navigation Architecture for a Space Mobile Network

    Science.gov (United States)

    Valdez, Jennifer E.; Ashman, Benjamin; Gramling, Cheryl; Heckler, Gregory W.; Carpenter, Russell

    2016-01-01

    The Tracking and Data Relay Satellite System (TDRSS) Augmentation Service for Satellites (TASS) is a proposed beacon service to provide a global, space based GPS augmentation service based on the NASA Global Differential GPS (GDGPS) System. The TASS signal will be tied to the GPS time system and usable as an additional ranging and Doppler radiometric source. Additionally, it will provide data vital to autonomous navigation in the near Earth regime, including space weather information, TDRS ephemerides, Earth Orientation Parameters (EOP), and forward commanding capability. TASS benefits include enhancing situational awareness, enabling increased autonomy, and providing near real-time command access for user platforms. As NASA Headquarters' Space Communication and Navigation Office (SCaN) begins to move away from a centralized network architecture and towards a Space Mobile Network (SMN) that allows for user initiated services, autonomous navigation will be a key part of such a system. This paper explores how a TASS beacon service enables the Space Mobile Networking paradigm, what a typical user platform would require, and provides an in-depth analysis of several navigation scenarios and operations concepts. This paper provides an overview of the TASS beacon and its role within the SMN and user community. Supporting navigation analysis is presented for two user mission scenarios: an Earth observing spacecraft in low earth orbit (LEO), and a highly elliptical spacecraft in a lunar resonance orbit. These diverse flight scenarios indicate the breadth of applicability of the TASS beacon for upcoming users within the current network architecture and in the SMN.

  4. Making Wireless Networks Secure for NASA Mission Critical Applications Using Virtual Private Network (VPN) Technology

    Science.gov (United States)

    Nichols, Kelvin F.; Best, Susan; Schneider, Larry

    2004-01-01

    With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their off ices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (LAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing

  5. Equilibrium point control of a monkey arm simulator by a fast learning tree structured artificial neural network.

    Science.gov (United States)

    Dornay, M; Sanger, T D

    1993-01-01

    A planar 17 muscle model of the monkey's arm based on realistic biomechanical measurements was simulated on a Symbolics Lisp Machine. The simulator implements the equilibrium point hypothesis for the control of arm movements. Given initial and final desired positions, it generates a minimum-jerk desired trajectory of the hand and uses the backdriving algorithm to determine an appropriate sequence of motor commands to the muscles (Flash 1987; Mussa-Ivaldi et al. 1991; Dornay 1991b). These motor commands specify a temporal sequence of stable (attractive) equilibrium positions which lead to the desired hand movement. A strong disadvantage of the simulator is that it has no memory of previous computations. Determining the desired trajectory using the minimum-jerk model is instantaneous, but the laborious backdriving algorithm is slow, and can take up to one hour for some trajectories. The complexity of the required computations makes it a poor model for biological motor control. We propose a computationally simpler and more biologically plausible method for control which achieves the benefits of the backdriving algorithm. A fast learning, tree-structured network (Sanger 1991c) was trained to remember the knowledge obtained by the backdriving algorithm. The neural network learned the nonlinear mapping from a 2-dimensional cartesian planar hand position (x,y) to a 17-dimensional motor command space (u1, . . ., u17). Learning 20 training trajectories, each composed of 26 sample points [[x,y], [u1, . . ., u17] took only 20 min on a Sun-4 Sparc workstation. After the learning stage, new, untrained test trajectories as well as the original trajectories of the hand were given to the neural network as input. The network calculated the required motor commands for these movements. The resulting movements were close to the desired ones for both the training and test cases.

  6. On the Impacts and Benefits of Implementing Full-Duplex Communications Links in an Underwater Acoustic Network

    National Research Council Canada - National Science Library

    Gibson, J; Larraza, A; Rice, J; Smith, K; Xie, G

    2002-01-01

    .... These networks may provide command and control for autonomous underwater vehicles, forward reporting by arrays of sensor grids, ad hoc communications links to covert forces, or positive control...

  7. STS-93 Commander Eileen Collins waves to her family

    Science.gov (United States)

    1999-01-01

    STS-93 Commander Eileen M. Collins waves to her family nearby, a last meeting before launch of mission STS-93 on July 20. Liftoff is scheduled for 12:36 a.m. EDT. The primary mission of STS-93 is the release of the Chandra X-ray Observatory, which will allow scientists from around the world to study some of the most distant, powerful and dynamic objects in the universe. The new telescope is 20 to 50 times more sensitive than any previous X- ray telescope and is expected to unlock the secrets of supernovae, quasars and black holes. The STS-93 crew numbers five: Commander Collins, Pilot Jeffrey S. Ashby, and Mission Specialists Steven A. Hawley (Ph.D.), Catherine G. Coleman (Ph.D.) and Michel Tognini of France, with the Centre National d'Etudes Spatiales (CNES). Collins is the first woman to serve as commander of a shuttle mission.

  8. Centralized Command and Control of Theater Missile Defense: The Joint Force Missile Defense Component Coordinator

    National Research Council Canada - National Science Library

    Bucey, William H

    2006-01-01

    .... The numerous commands, decentralized command and control, and limited and expensive resources involved in TMD require changes to the joint doctrine in order to provide unity of command and economy of force...

  9. A Framework for Architecture-Based Planning and Assessment to Support Modeling and Simulation of Network-Centric Command and Control

    Science.gov (United States)

    2006-02-17

    included system-unique specifications derived to counter these threats. But the international security environment has changed --- and it will continue... Netowrk -Centric Command and Control 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK...contains color images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 20 19a. NAME

  10. Should the Department of Defense Establish a Unified U.S. Logistics Command?

    National Research Council Canada - National Science Library

    Wenzel, Frank

    2008-01-01

    This monograph asserts that DoD should establish a Unified Combatant Command (COCOM)-level U.S. Logistics Command (USLOGCOM). DoD should begin a deliberate 10-20 year process to establish a USLOGCOM...

  11. Basic interrupt and command structures and applications

    International Nuclear Information System (INIS)

    Davies, R.C.

    1974-01-01

    Interrupt and command structures of a real-time system are described through specific examples. References to applications of a real-time system and programing development references are supplied. (auth)

  12. Proposal of Non-Contact Type Interface of Command Input Using Lip Motion Features

    Science.gov (United States)

    Sato, Yoshiyuki; Kageyama, Yoichi; Nishida, Makoto

    Lip motion features are of practical use in identifying individuals. It is therefore important to develop non-contact type interface. For the interface using lip motion features, individual differences such as accents and dialects in commands should be accepted. In this paper, we propose a method to identify commands by analyzing three kinds of lip motion features. They are lip width, lip length, and ratio of width and length. The analysis is made on the basis of these features' relative values obtained from the primary and object frame. The proposed method has three steps. First, we extracted the lip motion features on the basis of both positions and shapes of lip in each frame of facial images. Second, standard patterns were created from features of six utterances per command. The standard pattern is able to reduce the relative difference in the lip motion features. Third, similarities among commands were computed by Dynamic-Programming (DP) matching. And then, the command with the largest similarity was selected as the target one. Our experimental results suggest that proposed method is useful to construct the non-contact type interface of command input using lip motion features.

  13. Study and realisation of cabled interfaces for the control and command of the Saturne cyclotron

    International Nuclear Information System (INIS)

    Devailly, Jean

    1975-01-01

    This research thesis addressed the assessment of needs, design and realisation of some hardware used by the Saturne cyclotron to solve problems of command and control while using connections developed for the Saturne's computer. After some generalities (description of Saturne, requirements and constraints, general statements about acquisitions and commands, selection of the acquisition and command system, codes), the author presents the different hardware for analog acquisitions, digital acquisitions, analog commands, digital commands, all-or-none control, simulators, amplifiers and memories. He reports some examples: magnetic measurements, control of ejection currents, programs. He finally presents the developed hardware

  14. Unification of Information Security Policies for Network Security Solutions

    Directory of Open Access Journals (Sweden)

    D.S. Chernyavskiy

    2012-03-01

    Full Text Available Diversity of command languages on network security solutions’ (NSS interfaces causes problems in a process of information security policy (ISP deployment. Unified model for security policy representation and implementation in NSS could aid to avoid such problems and consequently enhance efficiency of the process. The proposed solution is Unified language for network security policy (ULNSP. The language is based on formal languages theory, and being coupled with its translator, ULNSP makes it possible to formalize and implement ISP independently of particular NSS.

  15. Command injection attacks, continuations, and the Lambek calculus

    Directory of Open Access Journals (Sweden)

    Hayo Thielecke

    2016-06-01

    Full Text Available This paper shows connections between command injection attacks, continuations, and the Lambek calculus: certain command injections, such as the tautology attack on SQL, are shown to be a form of control effect that can be typed using the Lambek calculus, generalizing the double-negation typing of continuations. Lambek's syntactic calculus is a logic with two implicational connectives taking their arguments from the left and right, respectively. These connectives describe how strings interact with their left and right contexts when building up syntactic structures. The calculus is a form of propositional logic without structural rules, and so a forerunner of substructural logics like Linear Logic and Separation Logic.

  16. Multi-processor network implementations in Multibus II and VME

    International Nuclear Information System (INIS)

    Briegel, C.

    1992-01-01

    ACNET (Fermilab Accelerator Controls Network), a proprietary network protocol, is implemented in a multi-processor configuration for both Multibus II and VME. The implementations are contrasted by the bus protocol and software design goals. The Multibus II implementation provides for multiple processors running a duplicate set of tasks on each processor. For a network connected task, messages are distributed by a network round-robin scheduler. Further, messages can be stopped, continued, or re-routed for each task by user-callable commands. The VME implementation provides for multiple processors running one task across all processors. The process can either be fixed to a particular processor or dynamically allocated to an available processor depending on the scheduling algorithm of the multi-processing operating system. (author)

  17. The Role of the NCO Inside the BCT Command Post

    Science.gov (United States)

    2016-11-22

    formation. Doctrine 2015 introduced the importance of mission command doctrine into operations at all levels of leadership, and in the last five...utilizing tents is crucial to support the combined arms maneuver of the brigade. Physical layout of the command post can promote or hinder the ability to...equipment when a printer starting printing or a coffee maker was turned on? Understanding how PDISE configurations distribute loads in order to maintain

  18. The key network communication technology in large radiation image cooperative process system

    International Nuclear Information System (INIS)

    Li Zheng; Kang Kejun; Gao Wenhuan; Wang Jingjin

    1998-01-01

    Large container inspection system (LCIS) based on radiation imaging technology is a powerful tool for the customs to check the contents inside a large container without opening it. An image distributed network system is composed of operation manager station, image acquisition station, environment control station, inspection processing station, check-in station, check-out station, database station by using advanced network technology. Mass data, such as container image data, container general information, manifest scanning data, commands and status, must be on-line transferred between different stations. Advanced network communication technology is presented

  19. Mobility enhancements for LTE-Advanced Multilayer Networks with Inter-Site Carrier Aggregation

    DEFF Research Database (Denmark)

    Pedersen, Klaus I.; Michaelsen, Per Henrik; Rosa, Claudio

    2013-01-01

    In this article we first summarize some of the most recent HetNet mobility studies for LTE-Advanced, and use these to highlight the challenges that should be further addressed in theresearch community. A state-of-the-art HetNet scenario with macros and small cells deployed on different carriers...... decide small cell addition, removal, and change without any explicit signaling of Measurement events to the network or any signaling of hand-over commands from the network. Hence, the proposed solution effectively offloads the network from having to perform frequent small cell handoff decisions...

  20. Application and study of advanced network technology in large container inspection system

    International Nuclear Information System (INIS)

    Li Zheng; Kang Kejun; Gao Wenhuan; Wang Jingjin

    1996-01-01

    Large Container Inspection System (LCIS) based on radiation imaging technology is a powerful tool for the customs to check the contents inside a large container without opening it. An image distributed network system is composed of center manager station, image acquisition station, environment control station, inspection processing station, check-in station, check-out station, database station by using advanced network technology. Mass data, such as container image data, container general information, manifest scanning data, commands and status, must be on-line transferred between different stations. Advanced network technology and software programming technique are presented

  1. An Operational Commander's Guide to the Media

    National Research Council Canada - National Science Library

    McCartney, Michael

    2005-01-01

    ... of the embedded reporter . The Operational Commander is wise to review media relations and the successes and pitfalls of past conflicts, and to examine closely the results of Operation Iraqi Freedom so as to...

  2. Decrease in medical command errors with use of a "standing orders" protocol system.

    Science.gov (United States)

    Holliman, C J; Wuerz, R C; Meador, S A

    1994-05-01

    The purpose of this study was to determine the physician medical command error rates and paramedic error rates after implementation of a "standing orders" protocol system for medical command. These patient-care error rates were compared with the previously reported rates for a "required call-in" medical command system (Ann Emerg Med 1992; 21(4):347-350). A secondary aim of the study was to determine if the on-scene time interval was increased by the standing orders system. Prospectively conducted audit of prehospital advanced life support (ALS) trip sheets was made at an urban ALS paramedic service with on-line physician medical command from three local hospitals. All ALS run sheets from the start time of the standing orders system (April 1, 1991) for a 1-year period ending on March 30, 1992 were reviewed as part of an ongoing quality assurance program. Cases were identified as nonjustifiably deviating from regional emergency medical services (EMS) protocols as judged by agreement of three physician reviewers (the same methodology as a previously reported command error study in the same ALS system). Medical command and paramedic errors were identified from the prehospital ALS run sheets and categorized. Two thousand one ALS runs were reviewed; 24 physician errors (1.2% of the 1,928 "command" runs) and eight paramedic errors (0.4% of runs) were identified. The physician error rate was decreased from the 2.6% rate in the previous study (P < .0001 by chi 2 analysis). The on-scene time interval did not increase with the "standing orders" system.(ABSTRACT TRUNCATED AT 250 WORDS)

  3. Africa Command: U.S. Strategic Interests and the Role of the U.S. Military in Africa

    National Research Council Canada - National Science Library

    ploch, Lauren

    2007-01-01

    .... national security objectives in Africa and in its surrounding waters. U.S. military involvement on the continent is currently divided among three commands: European Command (EUCOM), Central Command (CENTCOM...

  4. U.S. Strategic Command Chief Talks Deterrence, Partnerships During Latest SGL

    OpenAIRE

    Ochoa, Victoria

    2017-01-01

    Today@NPS The Naval Postgraduate School (NPS) welcomed U.S. Air Force Gen. John E. Hyten, Commander, U.S. Strategic Command (USSTRATCOM), for its latest Secretary of the Navy Guest Lecture (SGL), May 18 in King Auditorium. Hyten spoke about the importance of maintaining strategic deterrence and NPS' inclusion into the USSTRATCOM's Academic Alliance.

  5. Command and Control in Littoral Operations

    Science.gov (United States)

    2016-05-13

    at the graphics on the wall displaying the position of the various forces under his command. Only a few of his 14 ships were in formation with him...Mainz, 2d MEB Lead Planner (November 11, 2014). Moskowitz, Michael, and Nolan Noble. Dawn Blitz 2015- Observations and Analysis. Exercise

  6. Acoustic Resonance Spectroscopy (ARS) Munition Classification System enhancements. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Vela, O.A.; Huggard, J.C.

    1997-09-18

    Acoustic Resonance Spectroscopy (ARS) is a non-destructive evaluation technology developed at the Los Alamos National Laboratory (LANL). This technology has resulted in three generations of instrumentation, funded by the Defense Special Weapons Agency (DSWA), specifically designed for field identification of chemical weapon (CW) munitions. Each generation of ARS instrumentation was developed with a specific user in mind. The ARS1OO was built for use by the U.N. Inspection Teams going into Iraq immediately after the Persian Gulf War. The ARS200 was built for use in the US-Russia Bilateral Chemical Weapons Treaty (the primary users for this system are the US Onsite Inspection Agency (OSIA) and their Russian counterparts). The ARS300 was built with the requirements of the Organization for the Prohibition of Chemical Weapons (OPCW) in mind. Each successive system is an improved version of the previous system based on learning the weaknesses of each and, coincidentally, on the fact that more time was available to do a requirements analysis and the necessary engineering development. The ARS300 is at a level of development that warrants transferring the technology to a commercial vendor. Since LANL will supply the computer software to the selected vendor, it is possible for LANL to continue to improve the decision algorithms, add features where necessary, and adjust the user interface before the final transfer occurs. This paper describes the current system, ARS system enhancements, and software enhancements. Appendices contain the Operations Manual (software Version 3.01), and two earlier reports on enhancements.

  7. Defense Science Board Task Force on Military Satellite Communication and Tactical Networking. Executive Summary

    Science.gov (United States)

    2017-03-01

    Interface Processor BCT Brigade Combat Team BFT Blue Force Tracking BLOS Beyond Line-of-Sight C2 Command And Control C2E Communications in...Satellite Communications and Tactical Networking Appendix D-2 GIG Global Information Grid GMR Ground Mobile Radio GPS Global Positioning System...System SIPRNet Secret Internet Protocol Router Network SITREPS Situational Reports SMART -T Secure Mobile Anti-Jam Reliable Tactical Terminal SMC Space

  8. American Joint Helicopter Command: Addressing a Lack of Operational Control of Rotary Assets

    National Research Council Canada - National Science Library

    Marsowicz, Brandon

    2007-01-01

    ... to achieve unity of effort. Based on the tenets of operational command and control by Milan Vego, across all services, the United States helicopter forces fare lacking operational command and control...

  9. The role of propriospinal neuronal network in transmitting the alternating muscular activities of flexor and extensor in parkinsonian tremor.

    Science.gov (United States)

    Hao, M; He, X; Lan, N

    2012-01-01

    It has been shown that normal cyclic movement of human arm and resting limb tremor in Parkinson's disease (PD) are associated with the oscillatory neuronal activities in different cerebral networks, which are transmitted to the antagonistic muscles via the same spinal pathway. There are mono-synaptic and multi-synaptic corticospinal pathways for conveying motor commands. This study investigates the plausible role of propriospinal neuronal (PN) network in the C3-C4 levels in multi-synaptic transmission of cortical commands for oscillatory movements. A PN network model is constructed based on known neurophysiological connections, and is hypothesized to achieve the conversion of cortical oscillations into alternating antagonistic muscle bursts. Simulations performed with a virtual arm (VA) model indicate that without the PN network, the alternating bursts of antagonistic muscle EMG could not be reliably generated, whereas with the PN network, the alternating pattern of bursts were naturally displayed in the three pairs of antagonist muscles. Thus, it is suggested that oscillations in the primary motor cortex (M1) of single and double tremor frequencies are processed at the PN network to compute the alternating burst pattern in the flexor and extensor muscles.

  10. A study of personality of leader and style of his co-operation in sporting command

    Directory of Open Access Journals (Sweden)

    Smolar I.I.

    2012-12-01

    Full Text Available The personality features of leader of sporting command and style of his co-operation are considered. The problems of adjusting and optimization of co-operation of leader and other players of command are selected in achievement of the set team purpose. 37 skilled sportsmen-handballers took part in research. An informal structure is exposed in commands, leaders and followers are certain. The quantitative indexes of personality features of leader, follower of sporting command are certain. Style of co-operation of leader and follower (prevailing and goodwill and quality is exposed personalities which will be realized by them in a sporting command. It is set that in interpersonality co-operation a leader will realize dominant style, and follower equal will realize dominant and benevolent styles.

  11. PEACEKEEPING OPERATIONS MANAGEMENT. AN ANALYSIS OF CHALLENGES, CHANGES IN COMMAND ACTION AND TRAINING NEEDS

    Directory of Open Access Journals (Sweden)

    Ünsal SIĞRI

    2015-10-01

    Full Text Available The aim of this paper is to uncover emerging challenges of peacekeeping operations, determine the changes in command actions and its effects on the professional preparation of commanders by analyzing experiences of military officers. To that end the research data were collected by means of structured face-to- face interviews with voluntary participation of fourteen officers, who took charge in various peacekeeping operations. The collected data were analyzed based on the content analysis method. Findings indicate that peacekeeping operations pose specific challenges for peacekeepers, necessitate changes in command action in terms of flexibility and new precautions in terms of preparation of commanders.

  12. Design of a covert RFID tag network for target discovery and target information routing.

    Science.gov (United States)

    Pan, Qihe; Narayanan, Ram M

    2011-01-01

    Radio frequency identification (RFID) tags are small electronic devices working in the radio frequency range. They use wireless radio communications to automatically identify objects or people without the need for line-of-sight or contact, and are widely used in inventory tracking, object location, environmental monitoring. This paper presents a design of a covert RFID tag network for target discovery and target information routing. In the design, a static or very slowly moving target in the field of RFID tags transmits a distinct pseudo-noise signal, and the RFID tags in the network collect the target information and route it to the command center. A map of each RFID tag's location is saved at command center, which can determine where a RFID tag is located based on each RFID tag's ID. We propose the target information collection method with target association and clustering, and we also propose the information routing algorithm within the RFID tag network. The design and operation of the proposed algorithms are illustrated through examples. Simulation results demonstrate the effectiveness of the design.

  13. Three dimensional visualization to support command and control

    International Nuclear Information System (INIS)

    Van Slambrook, G.A.

    1997-04-01

    Virtual reality concepts are changing the way one thinks about and with computers. The concepts have already proven their potential usefulness in a broad range of applications. This research was concerned with exploring and demonstrating the utility of virtual reality in robotics and satellite command and control applications. The robotics work addressed the need to quickly build accurate graphical models of physical environments by allowing a user to interactively build a model of a remote environment by superimposing stereo graphics onto live stereo video. The satellite work addressed the fusion of multiple data sets or models into one synergistic display for more effective training, design, and command and control of satellite systems

  14. 75 FR 67695 - U.S. Strategic Command Strategic Advisory Group Closed Meeting

    Science.gov (United States)

    2010-11-03

    ..., intelligence, and policy-related issues to the Commander, U.S. Strategic Command, during the development of the... Stockpile Assessment, Weapons of Mass Destruction, Intelligence Operations, Cyber Operations, Global Strike... these statements must be submitted no later than five business days prior to the meeting in question...

  15. Two Approaches to Developing a Multi-Agent System for Battle Command Simulation

    NARCIS (Netherlands)

    Løvlid, R.A.; Alstad, A.; Mevassvik, O.M.; Reus, N.M. de; Henderson, H.C.; Vecht, B.van der; Luik, T.T.

    2013-01-01

    In the military, Command and Control Information Systems (C2ISs) are used for issuing commands to subordinate units. In training or decision support, simulations are used instead of live military forces. The Coalition Battle Management Language (C-BML) is currently being developed as an interface

  16. Commande floue adaptative directe stable étendue appliquée à la ...

    African Journals Online (AJOL)

    Administrateur

    ... Machine asynchrone- Systèmes flous- Commande par logique floue- Commande adaptative- lois adaptative floue- analyse de stabilité- fonction de Lyapunov. Abstract. Today, as a result of significant progress in thearea of control of electrical machines, new techniques and approaches have emerged. In order nonlinear ...

  17. Automated constraint checking of spacecraft command sequences

    Science.gov (United States)

    Horvath, Joan C.; Alkalaj, Leon J.; Schneider, Karl M.; Spitale, Joseph M.; Le, Dang

    1995-01-01

    Robotic spacecraft are controlled by onboard sets of commands called "sequences." Determining that sequences will have the desired effect on the spacecraft can be expensive in terms of both labor and computer coding time, with different particular costs for different types of spacecraft. Specification languages and appropriate user interface to the languages can be used to make the most effective use of engineering validation time. This paper describes one specification and verification environment ("SAVE") designed for validating that command sequences have not violated any flight rules. This SAVE system was subsequently adapted for flight use on the TOPEX/Poseidon spacecraft. The relationship of this work to rule-based artificial intelligence and to other specification techniques is discussed, as well as the issues that arise in the transfer of technology from a research prototype to a full flight system.

  18. On Preparing for Squadron Command

    Science.gov (United States)

    1988-04-01

    Gortler, Majur Gordon D. "Management Development---Could the Air Force Be Doing More?" Resear,;h Study, Air Command and Staff College. 1 07:3. 20...ABSTRACT (Continue on reverse If necessary and identify by block number) -This study addresses the broad issue of preparing Air Force officers for...are obsolete. SECURITY CLASSIFICATION OF THIS PAGE UNCLASSIFIED - - PREFACE This study addresses the broad Issue of preparing Air Force officers to

  19. Environmental Licensing: an Instrument of Command and Control by Exception?

    OpenAIRE

    Sleman Chams, Juliette; Gestión Ambiental de la Corporación Autónoma Regional del Atlántico-CRA, autoridad ambiental del Departamento del Atlántico,; Velásquez Muñoz, Carlos Javier; Universidad del Norte (Barranquilla)

    2016-01-01

    This article analyzes the situation of the most important instrument of command and control existing in the Colombian environmental legislation: the environmental license. Since its first formal regulation, on behalf of Decree 1753 of August 3, 1994, has received several modifications which, apparently, have made, in spite of its importance, in an instrument of command and control by exception. The article revises on the scope of each of the modifications and the justifications put forward by...

  20. Major technological innovations introduced in the large antennas of the Deep Space Network

    Science.gov (United States)

    Imbriale, W. A.

    2002-01-01

    The NASA Deep Space Network (DSN) is the largest and most sensitive scientific, telecommunications and radio navigation network in the world. Its principal responsibilities are to provide communications, tracking, and science services to most of the world's spacecraft that travel beyond low Earth orbit. The network consists of three Deep Space Communications Complexes. Each of the three complexes consists of multiple large antennas equipped with ultra sensitive receiving systems. A centralized Signal Processing Center (SPC) remotely controls the antennas, generates and transmits spacecraft commands, and receives and processes the spacecraft telemetry.

  1. Cyber Security for the Spaceport Command and Control System: Vulnerability Management and Compliance Analysis

    Science.gov (United States)

    Gunawan, Ryan A.

    2016-01-01

    With the rapid development of the Internet, the number of malicious threats to organizations is continually increasing. In June of 2015, the United States Office of Personnel Management (OPM) had a data breach resulting in the compromise of millions of government employee records. The National Aeronautics and Space Administration (NASA) is not exempt from these attacks. Cyber security is becoming a critical facet to the discussion of moving forward with projects. The Spaceport Command and Control System (SCCS) project at the Kennedy Space Center (KSC) aims to develop the launch control system for the next generation launch vehicle in the coming decades. There are many ways to increase the security of the network it uses, from vulnerability management to ensuring operating system images are compliant with securely configured baselines recommended by the United States Government.

  2. The Road to a New Unified Command

    Science.gov (United States)

    2008-01-01

    The Directorate of Command, Control, Communications, and Computers (C4) Systems is chartered with information architecture (including in Africa...Friday afternoon cinema presentations where a documentary or feature film covering an African historic event was played, followed by dialogue

  3. Complexity in the governance of tourism networks : Balancing between external pressure and internal expectations

    NARCIS (Netherlands)

    van der Zee, Egbert; Gerrets, Anne-Mara; Vanneste, Dominique

    2017-01-01

    Tourism destinations are complex systems of interrelated entities without a hierarchical chain of command. In order to enhance the ability of destinations to create a high quality, authentic tourism experience, a management perspective based on networks, personal relationships, trust, and

  4. Development of the Macro Command Editing Executive System for Factory Workers-Oriented Programless Visual Inspection System

    Science.gov (United States)

    Anezaki, Takashi; Wakitani, Kouichi; Nakamura, Masatoshi; Kubo, Hiroyasu

    Because visual inspection systems are difficult to tune, they create many problems for the kaizen process. This results in increased development costs and time to assure that the inspection systems function properly. In order to improve inspection system development, we designed an easy-tuning system called a “Program-less” visual inspection system. The ROI macro command which consisted of eight kinds of shape recognition macro commands and decision, operation, control commands was built. Furthermore, the macro command editing executive system was developed by the operation of only the GUI without editing source program. The validity of the ROI macro command was proved by the application of 488 places.

  5. Teaching Bibliometric Analysis and MS/DOS Commands.

    Science.gov (United States)

    Dou, Henri; And Others

    1988-01-01

    Outlines the steps involved in bibliometric studies, and demonstrates the ability to execute simple studies on microcomputers by downloading files using only the capability of MS/DOS. Detailed illustrations of the MS/DOS commands used are provided. (eight references) (CLB)

  6. Commande adaptive d'une machine asynchrone

    Science.gov (United States)

    Slama-Belkhodja, I.; de Fornel, B.

    1996-06-01

    The paper deals with an indirect self-tuning speed control for an induction motor supplied by a chopper-filter-inverter system. Input/Output models are identified with the recursive least squares algorithm and the controller adaptation is based on a pole assignement strategy. Emphasis is put on the evaluation of the parameter identification in order to avoid instabilities because of disturbances or insufficient excitations. This is especially of importance when the adaptive control is carried out in closed loop systems and without additional test signals. Simulation results show the improvement of the dynamic responses and the robustness against load variations or parameters variations (rotor resistance, inertia). Cat article décrit une stratégie de commande adaptive indirecte à Placement de Pôles (PP), appliquée à la commande en vitesse d'une machine asynchrone alimentée par un ensemble hacheur-filtre-onduleur de tension. L'algorithme des Moindres Carrés Récursifs (MCR) est utilisé pour l'identification des modèles de comportement type entrées/sorties. Un intérêt particulier est porté à la mise en oeuvre de cet algorithme et à la discussion de ses résultats, tenant compte des erreurs de modélisation et de la nature peu riche en excitations des entrées du processus. Différents régimes transitoires ont été simulés pour apprécier l'apport de cette association (MCR-PP) : démarrages et inversion des sens de rotation, à vide et en charges, applications d'échelons de couple résistant, variations paramétriques. Les résultats permettent d'illustrer, tant au niveau des performances que de la robustesse, l'apport d'une telle commande adaptive pour des entraînements électriques avec une machine asynchrone.

  7. 76 FR 76035 - Amendment to the International Traffic in Arms Regulations: Additional Method of Electronic...

    Science.gov (United States)

    2011-12-06

    ... U.S.C. Chapter 35. List of Subjects in 22 CFR Parts 122 and 129 Arms and munitions, Exports... House (ACH) and Federal Reserve Wire Network (FedWire) are electronic networks used to process financial... electronic payment. Electronic payments must be in U.S. currency and must be payable through a U.S. financial...

  8. US Navy Transfers Research Vessel to Philippine Navy > U.S. Pacific Command

    Science.gov (United States)

    , 2016 EMAIL PRINT Photos 1 of 1 SAN DIEGO (April 27, 2016) - Vice Adm. Nora Tyson, left, commander of Philippines oceanographic research and study capabilities. SAN DIEGO (April 27, 2016) - Vice Adm. Nora Tyson part in that relationship," said Vice Adm. Nora Tyson, commander, U.S. 3rd Fleet. "Today, we

  9. Scenario design : adaptive architecture for command and control experiment eight

    OpenAIRE

    Clark, Frankie J.

    2002-01-01

    Approved for public release; distribution is unlimited. The Adaptive Architectures for Command and Control (A2C2) project is an ongoing research effort sponsored by the Office of Naval Research to explore adaptation in joint command and control. The objective of the project's eighth experiment is to study the adjustments that organizations make when they are confronted with a scenario for which their organizational is ill-suited. To accomplish this, teams will each be in one of two fundame...

  10. SciBox, an end-to-end automated science planning and commanding system

    Science.gov (United States)

    Choo, Teck H.; Murchie, Scott L.; Bedini, Peter D.; Steele, R. Josh; Skura, Joseph P.; Nguyen, Lillian; Nair, Hari; Lucks, Michael; Berman, Alice F.; McGovern, James A.; Turner, F. Scott

    2014-01-01

    SciBox is a new technology for planning and commanding science operations for Earth-orbital and planetary space missions. It has been incrementally developed since 2001 and demonstrated on several spaceflight projects. The technology has matured to the point that it is now being used to plan and command all orbital science operations for the MErcury Surface, Space ENvironment, GEochemistry, and Ranging (MESSENGER) mission to Mercury. SciBox encompasses the derivation of observing sequences from science objectives, the scheduling of those sequences, the generation of spacecraft and instrument commands, and the validation of those commands prior to uploading to the spacecraft. Although the process is automated, science and observing requirements are incorporated at each step by a series of rules and parameters to optimize observing opportunities, which are tested and validated through simulation and review. Except for limited special operations and tests, there is no manual scheduling of observations or construction of command sequences. SciBox reduces the lead time for operations planning by shortening the time-consuming coordination process, reduces cost by automating the labor-intensive processes of human-in-the-loop adjudication of observing priorities, reduces operations risk by systematically checking constraints, and maximizes science return by fully evaluating the trade space of observing opportunities to meet MESSENGER science priorities within spacecraft recorder, downlink, scheduling, and orbital-geometry constraints.

  11. A Formal Model and Verification Problems for Software Defined Networks

    Directory of Open Access Journals (Sweden)

    V. A. Zakharov

    2013-01-01

    Full Text Available Software-defined networking (SDN is an approach to building computer networks that separate and abstract data planes and control planes of these systems. In a SDN a centralized controller manages a distributed set of switches. A set of open commands for packet forwarding and flow-table updating was defined in the form of a protocol known as OpenFlow. In this paper we describe an abstract formal model of SDN, introduce a tentative language for specification of SDN forwarding policies, and set up formally model-checking problems for SDN.

  12. Command History. 1968. Volume 1. Sanitized.

    Science.gov (United States)

    1968-01-01

    battalions. Additionally, a diary captured on 19 December, Z1 kilometers southwest of Song Cau, revealed that on 19 November the author. a cadre member...the 306th and 312th ( AYA 308th) Bns. This reorga- nization was an apparent attempt by the headquarters of MR 3 to tighten its command and con- trol. (C

  13. Future command and control systems should combine decision support and personalization interface features

    NARCIS (Netherlands)

    Streefkerk, J.W.; Smets, N.; Varkevisser, M.; Hiemstra-Van Mastrigt, S.

    2014-01-01

    On future battlefields, increasingly more sensor information will become available for military commanders to support mission execution. To improve (shared) situational awareness, decision-making and communication in face of this increased amount of information, the design of command and control

  14. Network connectivity enhancement by exploiting all optical multicast in semiconductor ring laser

    Science.gov (United States)

    Siraj, M.; Memon, M. I.; Shoaib, M.; Alshebeili, S.

    2015-03-01

    The use of smart phone and tablet applications will provide the troops for executing, controlling and analyzing sophisticated operations with the commanders providing crucial documents directly to troops wherever and whenever needed. Wireless mesh networks (WMNs) is a cutting edge networking technology which is capable of supporting Joint Tactical radio System (JTRS).WMNs are capable of providing the much needed bandwidth for applications like hand held radios and communication for airborne and ground vehicles. Routing management tasks can be efficiently handled through WMNs through a central command control center. As the spectrum space is congested, cognitive radios are a much welcome technology that will provide much needed bandwidth. They can self-configure themselves, can adapt themselves to the user requirement, provide dynamic spectrum access for minimizing interference and also deliver optimal power output. Sometimes in the indoor environment, there are poor signal issues and reduced coverage. In this paper, a solution utilizing (CR WMNs) over optical network is presented by creating nanocells (PCs) inside the indoor environment. The phenomenon of four-wave mixing (FWM) is exploited to generate all-optical multicast using semiconductor ring laser (SRL). As a result same signal is transmitted at different wavelengths. Every PC is assigned a unique wavelength. By using CR technology in conjunction with PC will not only solve network coverage issue but will provide a good bandwidth to the secondary users.

  15. Software and commands on VAX CERN. User's guide

    International Nuclear Information System (INIS)

    Balashov, V.K.; Trofimov, V.V.

    1990-01-01

    This guide describes a structure of applications software, which is available at VAX-type computers in JINR. The software includes program libraries, scientific programs and commands developed at CERN. 20 refs

  16. Anti-social networking: crowdsourcing and the cyber defence of national critical infrastructures.

    Science.gov (United States)

    Johnson, Chris W

    2014-01-01

    We identify four roles that social networking plays in the 'attribution problem', which obscures whether or not cyber-attacks were state-sponsored. First, social networks motivate individuals to participate in Distributed Denial of Service attacks by providing malware and identifying potential targets. Second, attackers use an individual's social network to focus attacks, through spear phishing. Recipients are more likely to open infected attachments when they come from a trusted source. Third, social networking infrastructures create disposable architectures to coordinate attacks through command and control servers. The ubiquitous nature of these architectures makes it difficult to determine who owns and operates the servers. Finally, governments recruit anti-social criminal networks to launch attacks on third-party infrastructures using botnets. The closing sections identify a roadmap to increase resilience against the 'dark side' of social networking.

  17. Religious Expression or Religious Coercion: Commanders Caught in the Cross-Fire

    Science.gov (United States)

    2010-02-17

    ministers as chaplains with a rank of captain and a salary of $20 per month. With this action , the American government officially established the military...leadership and chaplains resulting in Airmen’s insidious harm or ruin? Are they being unconstitutionally raped of religious rights? Are groups like...military’s hierarchal command structure bears careful scrutiny of any potential coercive action created by a commander sharing his or her faith. Military

  18. Circuit of synchronous logic for the transmission of safety commands

    International Nuclear Information System (INIS)

    Uberschlag, J.

    1969-01-01

    The author reports the development of a control-command circuit for the transmission of binary commands related to the safety of nuclear reactors. He presents the main design criteria (operation safety, provided safety level, flexibility, technical adaptation), the definition of the operation principle (inputs, logical outputs), the properties of a logic system. He evokes redundancy issues, and presents the system structure, proposes a possible sketch of the logic circuit. He describes the possible options for intermediate circuits and logic outputs, and tests to be performed

  19. Learning and coding in biological neural networks

    Science.gov (United States)

    Fiete, Ila Rani

    How can large groups of neurons that locally modify their activities learn to collectively perform a desired task? Do studies of learning in small networks tell us anything about learning in the fantastically large collection of neurons that make up a vertebrate brain? What factors do neurons optimize by encoding sensory inputs or motor commands in the way they do? In this thesis I present a collection of four theoretical works: each of the projects was motivated by specific constraints and complexities of biological neural networks, as revealed by experimental studies; together, they aim to partially address some of the central questions of neuroscience posed above. We first study the role of sparse neural activity, as seen in the coding of sequential commands in a premotor area responsible for birdsong. We show that the sparse coding of temporal sequences in the songbird brain can, in a network where the feedforward plastic weights must translate the sparse sequential code into a time-varying muscle code, facilitate learning by minimizing synaptic interference. Next, we propose a biologically plausible synaptic plasticity rule that can perform goal-directed learning in recurrent networks of voltage-based spiking neurons that interact through conductances. Learning is based on the correlation of noisy local activity with a global reward signal; we prove that this rule performs stochastic gradient ascent on the reward. Thus, if the reward signal quantifies network performance on some desired task, the plasticity rule provably drives goal-directed learning in the network. To assess the convergence properties of the learning rule, we compare it with a known example of learning in the brain. Song-learning in finches is a clear example of a learned behavior, with detailed available neurophysiological data. With our learning rule, we train an anatomically accurate model birdsong network that drives a sound source to mimic an actual zebrafinch song. Simulation and

  20. NET: an inter-computer file transfer command

    International Nuclear Information System (INIS)

    Burris, R.D.

    1978-05-01

    The NET command was defined and supported in order to facilitate file transfer between computers. Among the goals of the implementation were greatest possible ease of use, maximum power (i.e., support of a diversity of equipment and operations), and protection of the operating system

  1. APOLLO 11 COMMANDER NEIL ARMSTRONG IN SIMULATOR

    Science.gov (United States)

    1969-01-01

    Apollo 11 commander Neil Armstrong is going through flight training in the lunar module simulator situated in the flight crew training building at KSC. Armstrong will pilot the lunar module to a moon landing on July 20, following launch from KSC on July 16.

  2. An incident command system in practice and reality

    International Nuclear Information System (INIS)

    Spitzer, J.D.

    1992-01-01

    The basic organizational problems and options for forming a pollution response organization are described. Problems with multi-agency response organizations include poor coordination and lack of accountability. Alternatives to autonomous organizations operating with minimal coordination are the multi-agency/organization teams working under a controlling organization, and organizations formed into a single response organization (the incident command system or ICS). Design criteria for an ICS include flexibility as to the jurisdiction and agency, adaptable organizational structure, capability to expand in a logical manner, and uniform elements in terminology, organization, and procedures. ICS in practice is illustrated both by the CANUSLAK exercise undertaken in August 1990 and a real incident that occurred several days after the exercise was finished. CANUSLAK involved the US Coast Guard and its Canadian and Michigan counterparts in a simulated incident in the St. Clair river. The real incident was the explosion of the gasoline-carrying tank vessel Jupiter in the Saginaw River. In both instances, ICS combined many organizations into one team with a single incident commander. The eight basic components of ICS are common terminology, modular organization, integrated communications, unified command structure, consolidated action plan, manageable span of control, designated incident facilities, and comprehensive resource management. ICS has been tailored to a wide range of applications and is not only used in major disasters but as a part of routine operations. 18 refs., 5 figs

  3. BGen: A UML Behavior Network Generator Tool

    Science.gov (United States)

    Huntsberger, Terry; Reder, Leonard J.; Balian, Harry

    2010-01-01

    BGen software was designed for autogeneration of code based on a graphical representation of a behavior network used for controlling automatic vehicles. A common format used for describing a behavior network, such as that used in the JPL-developed behavior-based control system, CARACaS ["Control Architecture for Robotic Agent Command and Sensing" (NPO-43635), NASA Tech Briefs, Vol. 32, No. 10 (October 2008), page 40] includes a graph with sensory inputs flowing through the behaviors in order to generate the signals for the actuators that drive and steer the vehicle. A computer program to translate Unified Modeling Language (UML) Freeform Implementation Diagrams into a legacy C implementation of Behavior Network has been developed in order to simplify the development of C-code for behavior-based control systems. UML is a popular standard developed by the Object Management Group (OMG) to model software architectures graphically. The C implementation of a Behavior Network is functioning as a decision tree.

  4. Receiver Operator Characteristic Tools Graphic User Interface Extension for R Commander

    Directory of Open Access Journals (Sweden)

    Daniel Corneliu LEUCUŢA

    2015-12-01

    Full Text Available Background: Receiver Operator Characteristic (ROC curve, is a graphical plot which presents the performance of a binary classifier when the discrimination cutoff is varied. The aim of this work was to create an extension for R Commander that offers a graphical user interface for Receiver Operator Characteristic tools provided by several existing command line accessible packages like pROC and ROCR. Material and Methods: The extension was built and tested with R version 3.2.0 and R Commander 2.1-7. Results: We built an extension called RcmdrPlugin.ROC that we uploaded on the CRAN servers. The extension adds a new menu called ROC, along with two submenus pROC and ROCR that broadly corresponds to commands available to access the functions of these packages. The pROC menu offers several commands: to plot a ROC curve for a dataset or for a logistic regression model, to compare paired and unpaired ROC curves, each providing the following tabs: General (to select the variables for the analysis, and options for switching cases with controls; Smoothing (allowing the user to select different types of smoothing – binominal, density, distributions like normal, lognormal, ...; AUC (to specify the partial area under the curve (AUC options, CI (to select the options of confidence intervals (CI – the level, computing method: DeLong, bootstrap, ...; Plot (for the plotting options. The ROCR dialogue window offers more options in choosing the performance measures for the plot. Conclusion: The RcmdrPlugin.ROC extension helps less advanced users of R accessing ROC tools in a friendly graphical user interface.

  5. Commande floue adaptative directe stable étendue appliquée à la ...

    African Journals Online (AJOL)

    Administrateur

    Commande floue adaptative directe stable étendue appliquée à la machine asynchrone. Stable direct adaptive fuzzy control extended applied to the asynchronous machine. Malika Fodil. 1. , Said Barkat. 1 et Djamel Boukhetala. 2. 1Université de M'sila, BP 166, rue Ichbillia, M'sila, Algérie. 2Laboratoire de Commande des ...

  6. Gesture Commanding of a Robot with EVA Gloves

    Data.gov (United States)

    National Aeronautics and Space Administration — Gestures commands allow a human operator to directly interact with a robot without the use of intermediary hand controllers. There are two main types of hand gesture...

  7. Cognitive Systems Modeling and Analysis of Command and Control Systems

    Science.gov (United States)

    Norlander, Arne

    2012-01-01

    Military operations, counter-terrorism operations and emergency response often oblige operators and commanders to operate within distributed organizations and systems for safe and effective mission accomplishment. Tactical commanders and operators frequently encounter violent threats and critical demands on cognitive capacity and reaction time. In the future they will make decisions in situations where operational and system characteristics are highly dynamic and non-linear, i.e. minor events, decisions or actions may have serious and irreversible consequences for the entire mission. Commanders and other decision makers must manage true real time properties at all levels; individual operators, stand-alone technical systems, higher-order integrated human-machine systems and joint operations forces alike. Coping with these conditions in performance assessment, system development and operational testing is a challenge for both practitioners and researchers. This paper reports on research from which the results led to a breakthrough: An integrated approach to information-centered systems analysis to support future command and control systems research development. This approach integrates several areas of research into a coherent framework, Action Control Theory (ACT). It comprises measurement techniques and methodological advances that facilitate a more accurate and deeper understanding of the operational environment, its agents, actors and effectors, generating new and updated models. This in turn generates theoretical advances. Some good examples of successful approaches are found in the research areas of cognitive systems engineering, systems theory, and psychophysiology, and in the fields of dynamic, distributed decision making and naturalistic decision making.

  8. Networks of Decision-Making and Communicating Agents: A New Methodology for Design and Evaluation of Organizational Strategies and Heterarchical Structures

    National Research Council Canada - National Science Library

    Levchuk, Georgiy M; Yu, Feili; Levchuk, Yuri; Pattipati, Krishna R

    2005-01-01

    In this paper, the authors explore the decomposition of organizational processes and decision-making, the coexistence of an organization's command and communication networks, and their effects on team performance...

  9. Joint Military Operations: Centers of Gravity and the War in Kosovo

    National Research Council Canada - National Science Library

    Milley, Mark

    2000-01-01

    ... and not throw the baby out with the bathwater. Even in this age of networked warfare, precision strike munitions and real time intelligence, Clausewitz's discussions of centers of gravity still provide fundamental insight into the conduct of war...

  10. APOLLO 16 COMMANDER JOHN YOUNG ENTERS ALTITUDE CHAMBER FOR TESTS

    Science.gov (United States)

    1971-01-01

    Apollo 16 commander John W. Young prepares to enter the lunar module in an altitude chamber in the Manned Spacecraft Operations Building at the spaceport prior to an altitude run. During the altitude run, in which Apollo 16 lunar module pilot Charles M. Duke also participated, the chamber was pumped down to simulate pressure at an altitude in excess of 200,000 feet. Young, Duke and command module pilot Thomas K. Mattingly II, are training at the Kennedy Space Center for the Apollo 16 mission. Launch is scheduled from Pad 39A, March 17, 1972.

  11. A database application for the Naval Command Physical Readiness Testing Program

    OpenAIRE

    Quinones, Frances M.

    1998-01-01

    Approved for public release; distribution is unlimited 1T21 envisions a Navy with tandardized, state-of-art computer systems. Based on this vision, Naval database management systems will also need to become standardized among Naval commands. Today most commercial off the shelf (COTS) database management systems provide a graphical user interface. Among the many Naval database systems currently in use, the Navy's Physical Readiness Program database has continued to exist at the command leve...

  12. Bayesian Computational Sensor Networks for Aircraft Structural Health Monitoring

    Science.gov (United States)

    2016-02-02

    Virginia 22203 Air Force Research Laboratory Air Force Materiel Command 1 Final Performance Report: AFOSR T.C. Henderson , V.J. Mathews, and D...AFRL-AFOSR-VA-TR-2016-0094 Bayesian Computational Sensor Networks for Aircraft Structural Health Monitoring. Thomas Henderson UNIVERSITY OF UTAH SALT...The people who worked on this project include: Thomas C. Henderson , John Mathews, Jingru Zhou, Daimei Zhij, Ahmad Zoubi, Sabita Nahata, Dan Adams

  13. Analysis of Recruit Attrition from the Navy's Delayed Entry Program and Recruit Training Command

    National Research Council Canada - National Science Library

    Neuhalfen, Jon K

    2007-01-01

    .... The analysis uses the PRIDE database, provided by Commander, Navy Recruiting Command. Trend analyses are used to identify significant changes in enlistment and attrition behavior for recruits who joined from fiscal years 1998 through 2005...

  14. Full Spectrum Operations: An Analysis of Course Content at the Command and General Staff College

    National Research Council Canada - National Science Library

    Turner, II, Frank L

    2008-01-01

    .... This monograph examined the Intermediate Level Education, the Advanced Military Studies Program, and the Tactical Commanders Development Program curricula at the Command and General Staff College...

  15. Command and Control : faster decisions

    CSIR Research Space (South Africa)

    Venter, C

    2012-10-01

    Full Text Available Decisions 4th Biennial Conference Presented by Cobus Venter 10 October 2012 ? CSIR 2012 Slide 2 Command and Control Planning TaskingControl Assessment Si tu at io n DPSS Objective Ends Increase the Defence Capability of South Africa Ways... Supported by SAAB THALES Global CommsDPSS DDSI ERGOTECH Cooperation to make it work Example 1: Future SA Army Strategy and Joint Operations Support Campus Experiment Example 1: Future SA Army Strategy and Joint Operations Support Campus Experiment...

  16. Economics of paternalism: the hidden costs of self-commanding strategies

    Directory of Open Access Journals (Sweden)

    Christophe Salvat

    2015-11-01

    Full Text Available The paper proposes an economic assessment of paternalism by comparing different alternative responses to dynamically inconsistent behaviors consecutive to hyperbolic discounting. Two main types of action are possible, self-commanding strategies and paternalism The first category includes personal rules and pre-commitment The second can be subcategorized between coercive and non-coercive forms of paternalism, which are respectively associated (although it is debatable with legal paternalism and with ‘nudges’. Despite being self-inflicted, self-commanding strategies are actually not cost free and can result in a dramatic cutback of people’s freedom of choice. Likewise, legal paternalism can, on occasion, be less harmful than personal rules or pre-commitment; similarly, nudges can be more invasive and less effective than their proponents want us to believe. The aim of this paper is not to propose any standardized form of response to irrational behavior (whatever that may mean but to argue, on the contrary, that every case should be individually appraised. Individual situations can be remedied by self-commanding strategies or by paternalistic policies, either in isolation or in combination.

  17. Tactical Command and Control in the Combined Arms Battalion Task Force,

    Science.gov (United States)

    1988-03-08

    described as [ •follows. -.. Acquire information in the basic categories of mission, enemy, terrain, and troops available on a * continual basis through a...became the basic unit." 55 A study by Dr. Gabel describes a wide range of organizational and -*"" control structures which were ultimately used to...FreLelonolSystell each orce evel Commander * Procedures/acioa otrlS a / eCommunication $ 0’ Automation/// _. Other Notion’$ Command *e Facilities ’/ a nd Control

  18. A self-learning rule base for command following in dynamical systems

    Science.gov (United States)

    Tsai, Wei K.; Lee, Hon-Mun; Parlos, Alexander

    1992-01-01

    In this paper, a self-learning Rule Base for command following in dynamical systems is presented. The learning is accomplished though reinforcement learning using an associative memory called SAM. The main advantage of SAM is that it is a function approximator with explicit storage of training samples. A learning algorithm patterned after the dynamic programming is proposed. Two artificially created, unstable dynamical systems are used for testing, and the Rule Base was used to generate a feedback control to improve the command following ability of the otherwise uncontrolled systems. The numerical results are very encouraging. The controlled systems exhibit a more stable behavior and a better capability to follow reference commands. The rules resulting from the reinforcement learning are explicitly stored and they can be modified or augmented by human experts. Due to overlapping storage scheme of SAM, the stored rules are similar to fuzzy rules.

  19. Mission Command in the Age of Network-Enabled Operations: Social Network Analysis of Information Sharing and Situation Awareness

    Science.gov (United States)

    2016-06-22

    socio-technical limitations that restrict the free flow of information and communications (e.g., Bateman , 1996). The flow of information among the...networks. Phys. A Stat. Mech. Appl. 272, 173–187. doi: 10.1016/S0378- 4371(99)00291-5 Bateman , R. L. (1996). Force XXI and the death of

  20. Command and Control for Distributed Lethality

    Science.gov (United States)

    2017-06-01

    extended communications between the AFP CDR and the CCDR are required. As shown in Figure 20, the principle command relationships are between...frequency (RF) communications are limited by maximum antenna height of each surface platform without an airborne relay. LOS is estimated with an online ...documents the interconnections and relationship of information flow and the system requirements for maintaining the interconnection links during a

  1. Advances in Discrete-Event Simulation for MSL Command Validation

    Science.gov (United States)

    Patrikalakis, Alexander; O'Reilly, Taifun

    2013-01-01

    In the last five years, the discrete event simulator, SEQuence GENerator (SEQGEN), developed at the Jet Propulsion Laboratory to plan deep-space missions, has greatly increased uplink operations capacity to deal with increasingly complicated missions. In this paper, we describe how the Mars Science Laboratory (MSL) project makes full use of an interpreted environment to simulate change in more than fifty thousand flight software parameters and conditional command sequences to predict the result of executing a conditional branch in a command sequence, and enable the ability to warn users whenever one or more simulated spacecraft states change in an unexpected manner. Using these new SEQGEN features, operators plan more activities in one sol than ever before.

  2. Network security with openSSL cryptography for secure communications

    CERN Document Server

    Viega, John; Chandra, Pravir

    2002-01-01

    Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version of SSL/TLS, which is the most widely used protocol for secure network communications.The OpenSSL library is seeing widespread adoption for web sites that require cryptographic functions to protect a broad range of sensitive information, such as credit card numbers and other financial transactions. The library is the only free, full-featured SSL implementation for C and C++, and it can be used programmatically or from the command line to secure most TCP-based network protocols.Network Security with OpenSSL enables developers to use this protocol much more effectively. Traditionally, getting something simple done in OpenSSL could easily take weeks. This concise book gives you the guidance you need to avoid pitfalls, while allowing you to take advantage of the library?s advanced features. And, inst...

  3. Command and Control during Security Incidents/Emergencies

    Energy Technology Data Exchange (ETDEWEB)

    Knipper, W. [NSTec

    2013-10-16

    This presentation builds on our response to events that pose, or have the potential to pose, a serious security or law enforcement risk and must be responded to and controlled in a clear a decisive fashion. We will examine some common concepts in the command and control of security-centric events.

  4. U.S. Special Operations Command Training and Education Program

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1996-01-01

    .... Special Operations Command (USCINCSOC), to train assigned forces to meet special operations mission taskings and to ensure interoperability with conventional forces and other special operations forces (SOF...

  5. Implementing UPDM to develop command and control systems

    CSIR Research Space (South Africa)

    Oosthuizen, R

    2016-09-01

    Full Text Available Systems engineering is an established approach to develop systems, including complex sociotechnical systems such as Command and Control (C2) Systems. These systems often occur through introduction of a new technology into an existing system...

  6. Artificial Intelligence Applied to the Command, Control, Communications, and Intelligence of the U.S. Central Command.

    Science.gov (United States)

    1983-06-06

    these components will be presented. 4.17 °°,. CHAPTER III FOOTNOTES 1. Arron Barr and Edward A. Feigenbaum, eds., Te Handbook gf Artificial Inteligence ol...RD-R137 205 ARTIFICIAL INTELLIGENCE APPLIED TO THE COMIMAND CONTROL i/i COMMUNICATIONS RND..(U) ARMY WAR COLL CARLISLE BARRACKS U PA J N ENVART 06...appropriate mlitary servic or *swesmment aency. ARTIFICIAL INTELLIGENCE APPLIED TO THE COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE OF THE U.S. CENTRAL

  7. 32 CFR 700.880 - Duties of the prospective commanding officer of a ship.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Duties of the prospective commanding officer of a ship. 700.880 Section 700.880 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY REGULATIONS AND OFFICIAL RECORDS UNITED STATES NAVY REGULATIONS AND OFFICIAL RECORDS The Commanding Officer Special...

  8. When Contractors Deploy: A Guide for the Operational Commander

    National Research Council Canada - National Science Library

    Buhler, Carl

    2000-01-01

    .... Furthermore, this paper also lists four recommendations for operational commanders and the military on how to better integrate contractors into the military effort, especially during hostile combat situations...

  9. Commanders and Cyber Chat: Should More Guidance be Provided for Social Networking Sites

    Science.gov (United States)

    2011-04-01

    networks. On one hand, the perception is there should be rules of etiquette for friending someone related to social norms of endorsing that person...agreed.. Reasons given in free text by lieutenants were as follows: - “Plenty of briefings were given on basic protocol regarding what goes on

  10. Air Force Global Weather Central System Architecture Study. Final System/Subsystem Summary Report. Volume 2. Requirements Compilation and Analysis. Part 3. Characteristics Summaries and Network Analysis

    Science.gov (United States)

    1976-03-01

    DB DC DCT DDB DET DF DFS DML DMS DMSP DOD DS DSARC DT EDB EDS EG ESSA ETAC EWO Control and Reporting Post Cathode Ray Tube...National and Aviation Meteorological Facsimile Network NC - Network Control NCA - National Command Authority NCAR - National Center for Atmospheric

  11. Military Assistance Command, Vietnam: The Imperative of Pol-Mil Unity. ACSC Quick-Look 05-12

    National Research Council Canada - National Science Library

    Weaver, Michael

    2005-01-01

    ...), when General William Westmoreland assumed command. The MAAG continued to assist the development of the South Vietnamese Armed Forces, but the command change fragmented its operational efforts among the MACV staff...

  12. The health hazards of depleted uranium munitions. Part 1

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-05-01

    There has been a substantial amount of public discussion on the health effects of the use of depleted uranium (DU), especially on the battlefield. The RoyaI Society therefore convened an independent expert Working Group to review the present state of scientific knowledge about the health and environmental effects of DU, in order to inform public debate. This is the first of two reports. It deals with the amounts of DU to which soldiers could be exposed on the battlefield, the risks from radiation, and what we know from epidemiological studies. We consider past and potential future exposures, the most likely exposures and the 'worst-case' exposures that cannot be excluded. Our second report, to be published later this year, will address the risks from toxic poisoning and environmental issues including risks to civilian populations. The group has consulted widely. It has focused on what is known scientifically about aspects that are relevant to health and has not considered the merits of using DU in munitions. Nor does this report analyse Gulf War syndrome, which has been the subject of other reports. DU is a toxic and weakly radioactive heavy metal that may have adverse consequences to human health, particularly if it enters the body through inhalation, ingestion or wounding. On the battlefield it is used in kinetic energy weapons designed to penetrate the armour of tanks and other vehicles. On impact substantial amounts of DU may be dispersed as particles that can be inhaled and as shrapnel. Our approach has been to estimate the typical levels of exposure on the battlefield over a wide range of scenarios, and the worst-case exposures that individuals are unlikely to exceed. From these we calculate the potential health risks from radiation. We have also considered epidemiological studies of occupational exposures to uranium in other situations as an independent source of information on the risks of inhaling DU particles, although we recognise that the

  13. The health hazards of depleted uranium munitions. Part 1

    International Nuclear Information System (INIS)

    2001-01-01

    There has been a substantial amount of public discussion on the health effects of the use of depleted uranium (DU), especially on the battlefield. The RoyaI Society therefore convened an independent expert Working Group to review the present state of scientific knowledge about the health and environmental effects of DU, in order to inform public debate. This is the first of two reports. It deals with the amounts of DU to which soldiers could be exposed on the battlefield, the risks from radiation, and what we know from epidemiological studies. We consider past and potential future exposures, the most likely exposures and the 'worst-case' exposures that cannot be excluded. Our second report, to be published later this year, will address the risks from toxic poisoning and environmental issues including risks to civilian populations. The group has consulted widely. It has focused on what is known scientifically about aspects that are relevant to health and has not considered the merits of using DU in munitions. Nor does this report analyse Gulf War syndrome, which has been the subject of other reports. DU is a toxic and weakly radioactive heavy metal that may have adverse consequences to human health, particularly if it enters the body through inhalation, ingestion or wounding. On the battlefield it is used in kinetic energy weapons designed to penetrate the armour of tanks and other vehicles. On impact substantial amounts of DU may be dispersed as particles that can be inhaled and as shrapnel. Our approach has been to estimate the typical levels of exposure on the battlefield over a wide range of scenarios, and the worst-case exposures that individuals are unlikely to exceed. From these we calculate the potential health risks from radiation. We have also considered epidemiological studies of occupational exposures to uranium in other situations as an independent source of information on the risks of inhaling DU particles, although we recognise that the parallels may

  14. Command and Control Planning and Teamwork: Exploring the Future

    National Research Council Canada - National Science Library

    Sterling, Bruce S; Lickteig, Carl W

    2000-01-01

    .... This paper examines how participant ratings of command and control planning and observer assessments of teamwork were related in a series of futuristic missions conducted by the Mounted Maneuver...

  15. From Sensory Space to Motor Commands: Lessons from Saccades

    National Research Council Canada - National Science Library

    Optican, L

    2001-01-01

    .... We conclude that intrinsic brain signals might represent non-physical signals, such as desired sensory states, approximate motor drives, and distributed motor commands, rather than physical signals (e.g...

  16. Command and Control (C2) in Joint Operations: Separate Functions, their Purpose, and Application to Battle Command in the 2lst Century

    National Research Council Canada - National Science Library

    Hampton, David

    1998-01-01

    The command and control function at the operational level is the most important operations function because it ties together the other functions at all levels of war across the range of military operations...

  17. A Concept of Operations for the Use of Emergent Open Internet Technologies as the Basis for a Network-Centric Environment

    National Research Council Canada - National Science Library

    O'Sullivan, Joshua D

    2006-01-01

    .... With the dawn of the Information Age a similar revolution has begun, with the realization of the science of networks and their effects on complex systems, such as command and control and sharing...

  18. Design and Implementation of the Automatic Assessment System for the Command and Control Specialty in Ships

    Directory of Open Access Journals (Sweden)

    Zhang Hao

    2017-01-01

    Full Text Available On the basis of analyzing the actual demand of automated assessment system for the command and control specialty in ships, the thought of the overall design of automated assessment system for the command and control specialty in ships is given, and the concrete realization methods of the user login module, test paper operation module and system maintenance module are studied and demonstrated. The proposed design idea and implementation method of automated assessment system for the command and control specialty in ships is scientific, efficient and practical, and provides reference for the exploitation of automated assessment system for the command and control specialty in ships.

  19. STS-26 Commander Hauck in fixed based (FB) shuttle mission simulator (SMS)

    Science.gov (United States)

    1988-01-01

    STS-26 Discovery, Orbiter Vehicle (OV) 103, Commander Frederick H. Hauck, wearing comunications kit assembly headset and seated in the commanders seat on forward flight deck, looks over his shoulder toward the aft flight deck. A flight data file (FDF) notebook rests on his lap. The STS-26 crew is training in the fixed base (FB) shuttle mission simulator (SMS) located in JSC Mission Simulation and Training Facility Bldg 5.

  20. Estimation of the potential leakage of the chemical munitions based on two hydrodynamical models implemented for the Baltic Sea

    Science.gov (United States)

    Jakacki, Jaromir; Golenko, Mariya

    2014-05-01

    Two hydrodynamical models (Princeton Ocean Model (POM) and Parallel Ocean Program (POP)) have been implemented for the Baltic Sea area that consists of locations of the dumped chemical munitions during II War World. The models have been configured based on similar data source - bathymetry, initial conditions and external forces were implemented based on identical data. The horizontal resolutions of the models are also very similar. Several simulations with different initial conditions have been done. Comparison and analysis of the bottom currents from both models have been performed. Based on it estimating of the dangerous area and critical time have been done. Also lagrangian particle tracking and passive tracer were implemented and based on these results probability of the appearing dangerous doses and its time evolution have been presented. This work has been performed in the frame of the MODUM project financially supported by NATO.

  1. Former Military Networks a Threat to Peace? The Demobilisation and Remobilization of Renamo in Central Mozambique

    Directory of Open Access Journals (Sweden)

    Nikkie Wiegink

    2015-11-01

    Full Text Available Renamo’s recent upsurge against the Mozambican Frelimo-led government after 22 years of relative stability has challenged the country’s often celebrated disarmament, demobilization and reintegration process (1992 to 1994. Drawing on ethnographic fieldwork conducted in Maringue (Sofala province, the location of the rebels’ wartime headquarters and a post-war Renamo stronghold, this paper shows that while the DDR program supposedly ended Renamo’s command and control structure, the former rebel network continued to be a central feature of ex-combatants’ social worlds. Former Renamo combatants spend most of their time in the company of their ‘colleagues of the trenches’ and engaged in relationships of dependency with political Renamo leaders and former commanders. These relationships were not only shaped by the former military structure, but also by friendship, marriage, and patronage dynamics, providing ex-Renamo combatants with physical and economic safety, a sense of belonging and economic possibilities. Recent events in Mozambique suggest that the post-conflict continuation of informal wartime networks is a threat to peace and a failure of demobilization. Nevertheless, the fieldwork conducted in Maringue reveals that the dismantling of the command and control structure is often in vain, as it may be worthwhile for ex-combatants to maintain ties with their former military group for various reasons. Therefore, I argue that it may be useful to consider these networks based on the former armed group in processes of violence reduction, also in the development of DDR programs, as these may offer possibilities for the re-positioning and transformation of (former armed actors.

  2. Commanding Generation Y: How Generation X Military Leaders Can Better Utilize Generational Tendencies

    Science.gov (United States)

    2013-03-21

    generation ( Baby Boomers ). Although the profession of arms is a time-honored tradition steeped in discipline...senior leadership generational tendencies. Command; Leadership; Generation ; Baby Boomer ; Generation X; Generation Y Unclass Unclass Unclass UU 32 USMC...enable commanders to better lead Generation Y within the U.S. military. Discussion: Baby Boomers , Generation X, and Generation Y are

  3. Plant Habitat Telemetry / Command Interface and E-MIST

    Science.gov (United States)

    Walker, Uriae M.

    2013-01-01

    Plant Habitat (PH) is an experiment to be taken to the International Space Station (ISS) in 2016. It is critical that ground support computers have the ability to uplink commands to control PH, and that ISS computers have the ability to downlink PH telemetry data to ground support. This necessitates communication software that can send, receive, and process, PH specific commands and telemetry. The objective of the Plant Habitat Telemetry/ Command Interface is to provide this communication software, and to couple it with an intuitive Graphical User Interface (GUI). Initial investigation of the project objective led to the decision that code be written in C++ because of its compatibility with existing source code infrastructures and robustness. Further investigation led to a determination that multiple Ethernet packet structures would need to be created to effectively transmit data. Setting a standard for packet structures would allow us to distinguish these packets that would range from command type packets to sub categories of telemetry packets. In order to handle this range of packet types, the conclusion was made to take an object-oriented programming approach which complemented our decision to use the C++ programming language. In addition, extensive utilization of port programming concepts was required to implement the core functionality of the communication software. Also, a concrete understanding of a packet processing software was required in order to put aU the components of ISS-to-Ground Support Equipment (GSE) communication together and complete the objective. A second project discussed in this paper is Exposing Microbes to the Stratosphere (EMIST). This project exposes microbes into the stratosphere to observe how they are impacted by atmospheric effects. This paper focuses on the electrical and software expectations of the project, specifically drafting the printed circuit board, and programming the on-board sensors. The Eagle Computer-Aided Drafting

  4. Computer-assisted command and control for Chooz B

    International Nuclear Information System (INIS)

    Anon.

    1995-01-01

    A new type of command and control system has been installed at the Chooz B nuclear power plant. A key feature of the system is a man/machine interface designed to provide operators with on-screen assistance more quickly than ever. (Author)

  5. Acquisition and Development of System Command (SYSCOM) Technical Manuals

    National Research Council Canada - National Science Library

    2003-01-01

    ... (NAVSEA) and Space and Naval Warfare Systems Command (SPAWAR). TMs are the primary information source for technical training, installation, operation, testing, maintenance, and repair associated with NAVSEA/SPAWAR systems or equipment...

  6. FRONT COMMANDS IN WINTER OF 1917 IN COMBATING CRISIS OF FOOD SUPPLY TO FIELD FORCES

    Directory of Open Access Journals (Sweden)

    Максим Викторович Оськин

    2015-12-01

    Full Text Available This article considers the problem of food supply to the Eastern front in the winter of 1917 during World War I. In the conditions of the food supply crisis the military authorities managed to avoid the famine in the army. The Front Command and the Supreme Command took some measures to resolve this problem. Attracting extra workers for harvesting, clarity of the resources allocation, calculations of the government funds allocation- all these actions bolstered the army's efforts on the home front. A considerable role in this work was played by Emperor Nicholas II, who timely and positively reacted to the suggestions of the military commanders on the issue. Overall, the Russian military command coped with this problem in the conditions of the general crisis of supplies.

  7. Driver-centred vehicle automation: using network analysis for agent-based modelling of the driver in highly automated driving systems.

    Science.gov (United States)

    Banks, Victoria A; Stanton, Neville A

    2016-11-01

    To the average driver, the concept of automation in driving infers that they can become completely 'hands and feet free'. This is a common misconception, however, one that has been shown through the application of Network Analysis to new Cruise Assist technologies that may feature on our roads by 2020. Through the adoption of a Systems Theoretic approach, this paper introduces the concept of driver-initiated automation which reflects the role of the driver in highly automated driving systems. Using a combination of traditional task analysis and the application of quantitative network metrics, this agent-based modelling paper shows how the role of the driver remains an integral part of the driving system implicating the need for designers to ensure they are provided with the tools necessary to remain actively in-the-loop despite giving increasing opportunities to delegate their control to the automated subsystems. Practitioner Summary: This paper describes and analyses a driver-initiated command and control system of automation using representations afforded by task and social networks to understand how drivers remain actively involved in the task. A network analysis of different driver commands suggests that such a strategy does maintain the driver in the control loop.

  8. Implications of a Non-Unified Command System and the Need for a Unified Command System in Zambia

    Science.gov (United States)

    2015-06-12

    aspects. It has been found that Zambia’s two attempts to unify its system happened during the one party participatory democracy era. Since the coming...and its Implication for Democracy ,” in Ourselves to Know: Civil Military Relations and Defence Transformation in Southern Africa, eds. Rocky Williams...adopted a multiparty system of government under the Movement for Multi-Party Democracy (MMD) which decided to revert to independent commands. As

  9. STS-93 Commander Collins waves after suiting up before launch

    Science.gov (United States)

    1999-01-01

    During final launch preparations in the Operations and Checkout Building, STS-93 Commander Eileen M. Collins waves after donning her launch and entry suit. After Space Shuttle Columbia's July 20 launch attempt was scrubbed at the T-7 second mark in the countdown, the launch was rescheduled for Thursday, July 22, at 12:28 a.m. EDT. The target landing date is July 26, 1999, at 11:24 p.m. EDT. STS-93 is a five-day mission primarily to release the Chandra X-ray Observatory, which will allow scientists from around the world to study some of the most distant, powerful and dynamic objects in the universe. The new telescope is 20 to 50 times more sensitive than any previous X-ray telescope and is expected unlock the secrets of supernovae, quasars and black holes. The STS-93 crew numbers five: Commander Collins, Pilot Jeffrey S. Ashby, and Mission Specialists Stephen A. Hawley (Ph.D.), Catherine G. Coleman (Ph.D.) and Michel Tognini of France, with the Centre National d'Etudes Spatiales (CNES). Collins is the first woman to serve as commander of a shuttle mission.

  10. The on scene command and control system (OSC2) : an integrated incident command system (ICS) forms-database management system and oil spill trajectory and fates model

    International Nuclear Information System (INIS)

    Anderson, E.; Galagan, C.; Howlett, E.

    1998-01-01

    The On Scene Command and Control (OSC 2 ) system is an oil spill modeling tool which was developed to combine Incident Command System (ICS) forms, an underlying database, an integrated geographical information system (GIS) and an oil spill trajectory and fate model. The first use of the prototype OSC 2 system was at a PREP drill conducted at the U.S. Coast Guard Marine Safety Office, San Diego, in April 1998. The goal of the drill was to simulate a real-time response over a 36-hour period using the Unified Command System. The simulated spill was the result of a collision between two vessels inside San Diego Bay that caused the release of 2,000 barrels of fuel oil. The hardware component of the system which was tested included three notebook computers, two laser printers, and a poster printer. The field test was a success but it was not a rigorous test of the system's capabilities. The map display was useful in quickly setting up the ICS divisions and groups and in deploying resources. 6 refs., 1 tab., 5 figs

  11. The Operations Intent and Effects Model: A Command and Control Methodology for Increased Automation

    Science.gov (United States)

    2013-06-01

    Command and Control Process (Curts and Cambell , 2006), in that an order describes Actions that cause Effects. The Effects in turn change the Current...Interoperability Workshop. Orlando, FL, USA, IEEE CS Press. Curts, R. J., Dr. & Cambell , D. E., Dr. (2006) “Rethinking Command & Control”. Paper 005

  12. Using Arm and Hand Gestures to Command Robots during Stealth Operations

    Science.gov (United States)

    Stoica, Adrian; Assad, Chris; Wolf, Michael; You, Ki Sung; Pavone, Marco; Huntsberger, Terry; Iwashita, Yumi

    2012-01-01

    Command of support robots by the warfighter requires intuitive interfaces to quickly communicate high degree-of-freedom (DOF) information while leaving the hands unencumbered. Stealth operations rule out voice commands and vision-based gesture interpretation techniques, as they often entail silent operations at night or in other low visibility conditions. Targeted at using bio-signal inputs to set navigation and manipulation goals for the robot (say, simply by pointing), we developed a system based on an electromyography (EMG) "BioSleeve", a high density sensor array for robust, practical signal collection from forearm muscles. The EMG sensor array data is fused with inertial measurement unit (IMU) data. This paper describes the BioSleeve system and presents initial results of decoding robot commands from the EMG and IMU data using a BioSleeve prototype with up to sixteen bipolar surface EMG sensors. The BioSleeve is demonstrated on the recognition of static hand positions (e.g. palm facing front, fingers upwards) and on dynamic gestures (e.g. hand wave). In preliminary experiments, over 90% correct recognition was achieved on five static and nine dynamic gestures. We use the BioSleeve to control a team of five LANdroid robots in individual and group/squad behaviors. We define a gesture composition mechanism that allows the specification of complex robot behaviors with only a small vocabulary of gestures/commands, and we illustrate it with a set of complex orders.

  13. Commandants' Managerial Capacity and Workers Productivity in ...

    African Journals Online (AJOL)

    The purpose of this study is to evaluate the commandant's managerial capacity as if relates to workers productivity with a view to determining whether their calling to the education terrain has been justified and to correct certain areas in need of improvement in the Nigeria Police Education set up. In doing this, the study took ...

  14. Introduction to Command, Control and Communications (C3) through comparative case analysis

    OpenAIRE

    Berg, Scott A.

    1990-01-01

    Approved for public rerlease; distribution is unlimited This thesis contains material for the course, Introduction to Command, Control and Communications (C3). The first part of the thesis describes selected principles and concepts of C3 related to communication management, interoperability, command structure and standardization. The Crisis Action System is described emphasizing the roles and functions of the Joint Chiefs of Staff and the Office of the Secretary of Defense. A discussion of...

  15. 99th Regional Support Command Uses LED Lighting to Capture Significant Savings

    Energy Technology Data Exchange (ETDEWEB)

    None

    2016-11-03

    Case study describes how the Army Reserve 99th Regional Support Command (RSC) cut its energy consumption in half at the Support Command's Technical Sergeant Vernon McGarity Army Reserve Center by replacing more than 1,200 fluorescent troffers with 46 W and 61 W LED troffers with dimmers. The site achieved annual savings of more than 180,000 kWh and more than $20,000 in energy cost savings.

  16. Operator-generated command language for computer control of Doublet III

    International Nuclear Information System (INIS)

    Drobnis, D.; Petersen, P.

    1982-02-01

    The Control System for Doublet III consists of a medium-sized minicomputer system, with several keyboards and color alphanumeric CRTs for interactive operator interface to a large distributed CAMAC I/O system. Under normal operating conditions, however, all of the sequential and decision-making operations necessary to prepare each tokamak shot are performed directly by the computer, executing a set of Procedures coded in a convenient command language. Most of these Procedures have been developed by the Doublet III operators themselves, and are maintained, altered, and augmented as required without programmer attention. In effect, the Procedures have become a high-level tokamak Command Language

  17. Thoughts turned into high-level commands: Proof-of-concept study of a vision-guided robot arm driven by functional MRI (fMRI) signals.

    Science.gov (United States)

    Minati, Ludovico; Nigri, Anna; Rosazza, Cristina; Bruzzone, Maria Grazia

    2012-06-01

    Previous studies have demonstrated the possibility of using functional MRI to control a robot arm through a brain-machine interface by directly coupling haemodynamic activity in the sensory-motor cortex to the position of two axes. Here, we extend this work by implementing interaction at a more abstract level, whereby imagined actions deliver structured commands to a robot arm guided by a machine vision system. Rather than extracting signals from a small number of pre-selected regions, the proposed system adaptively determines at individual level how to map representative brain areas to the input nodes of a classifier network. In this initial study, a median action recognition accuracy of 90% was attained on five volunteers performing a game consisting of collecting randomly positioned coloured pawns and placing them into cups. The "pawn" and "cup" instructions were imparted through four mental imaginery tasks, linked to robot arm actions by a state machine. With the current implementation in MatLab language the median action recognition time was 24.3s and the robot execution time was 17.7s. We demonstrate the notion of combining haemodynamic brain-machine interfacing with computer vision to implement interaction at the level of high-level commands rather than individual movements, which may find application in future fMRI approaches relevant to brain-lesioned patients, and provide source code supporting further work on larger command sets and real-time processing. Copyright © 2012 IPEM. Published by Elsevier Ltd. All rights reserved.

  18. Commander in chief : FDR's battle with Churchill, 1943

    NARCIS (Netherlands)

    Hamilton, Charles Nigel

    2016-01-01

    Commander in Chief is een deelbiografie van president Franklin Delano Roosevelt waarin Roosevelts rol als opperbevelhebber van de gewapende strijdkrachten van de Verenigde Staten in de Tweede Wereldoorlog het hoofdthema is. Het boek concentreert zich op het jaar 1943: een jaar waaraan biografen van

  19. Joint Forward Operating Base Elements of Command and Control

    National Research Council Canada - National Science Library

    Summers, William

    2002-01-01

    ... and its associated leadership, command of air assets at a joint forward operating base lacks guidance. Today, the United States prosecutes an air war over Afghanistan from bases in Uzbekistan, Pakistan, and Afghanistan...

  20. Systems Engineering Management Training at Naval Air Systems Command

    National Research Council Canada - National Science Library

    Rebel, James

    2000-01-01

    Within the past few years, the Naval Air Systems Command (NAVAIR) has undergone several major changes including an engineering reorganization from a matrix organization to an Integrated Program Team/Competency Aligned Organization (IPT/CAO...

  1. Features of preparation of student collapsible commands of football to the short-term competitions

    Directory of Open Access Journals (Sweden)

    Balan В.A.

    2012-01-01

    Full Text Available It is considered determination of influence of the trainings loadings on the organism of sportsmen. Principal reasons of unsuccessful appearances of leading collapsible commands of universities in final tournaments are certain. In research information of the questionnaire questioning is utillized among the trainers of commands of student league. In a pedagogical experiment took part 18 sportsmen aged 18-21 years. The level of physical and technical preparedness of sportsmen is appraised. The basic tasks of trainer are set in preparation of student commands to appearance in short-term competitions. A necessity is well-proven planning of the trainings loadings on the phase of incomplete renewal.

  2. Depleted uranium munitions - where are we now?

    International Nuclear Information System (INIS)

    Spratt, Brian G.

    2002-01-01

    There are very different views on the health hazards of DU munitions. Most of the concerns of veterans and their advisors focus on the radiological effects of DU and consequently these are the focus of this editorial. Effects on the kidney and environmental consequences are, however, considered in the second of the Royal Society reports and the main conclusions of both of the reports are outlined in the summary document published in this issue of the journal. The main radiological concerns focus on the irradiation of lung tissues from inhaled DU particles and irradiation resulting from the translocation of inhaled particles to the thoracic lymph nodes.The overwhelming scientific view, presented in the two Royal Society reports and in other independent reviews, is that the main risks of exposure to DU aerosols are an increase in lung cancer and (from chemical toxicity) damage to the kidney, although these are likely to be evident only following substantial intakes. The equivalent doses to the thoracic lymph nodes following inhalation of DU particles are about ten times greater than those to the lung, but the former tissue is considered to be relatively insensitive to radiation-induced cancers. So far, large-scale epidemiological studies of UK and US Gulf War veterans have shown no increase in mortality from cancer, or kidney disease, but these studies need to be continued to see if any significant excess mortality from these causes appears. As mentioned previously, more sensitive epidemiological studies should be possible if groups of soldiers who have known exposures to DU can be identified. Adverse reproductive effects have been observed in rodents exposed to uranium although most of these effects are evident after relatively large daily intakes of uranium. The possibility of effects on reproductive health (from DU or other toxic exposures) is being studied in both UK and US Gulf War veterans. Results from the UK epidemiological study are not yet available but

  3. 76 FR 14950 - Closed Meeting of the U.S. Strategic Command Strategic Advisory Group

    Science.gov (United States)

    2011-03-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the U.S. Strategic Command Strategic Advisory Group AGENCY: Department of Defense. ACTION: Notice of advisory committee closed meeting.... Strategic Command Strategic Advisory Group. DATES: April 7, 2011, from 8 a.m. to 5 p.m. and April 8, 2011...

  4. Space-based Networking Technology Developments in the Interplanetary Network Directorate Information Technology Program

    Science.gov (United States)

    Clare, Loren; Clement, B.; Gao, J.; Hutcherson, J.; Jennings, E.

    2006-01-01

    Described recent development of communications protocols, services, and associated tools targeted to reduce risk, reduce cost and increase efficiency of IND infrastructure and supported mission operations. Space-based networking technologies developed were: a) Provide differentiated quality of service (QoS) that will give precedence to traffic that users have selected as having the greatest importance and/or time-criticality; b) Improve the total value of information to users through the use of QoS prioritization techniques; c) Increase operational flexibility and improve command-response turnaround; d) Enable new class of networked and collaborative science missions; e) Simplify applications interfaces to communications services; and f) Reduce risk and cost from a common object model and automated scheduling and communications protocols. Technologies are described in three general areas: communications scheduling, middleware, and protocols. Additionally developed simulation environment, which provides comprehensive, quantitative understanding of the technologies performance within overall, evolving architecture, as well as ability to refine & optimize specific components.

  5. Commix: Automating Evaluation and Exploitation of Command Injection Vulnerabilities in Web Applications

    OpenAIRE

    Stasinopoulos, Anastasios; Ntantogian, Christoforos; Xenakis, Christos

    2018-01-01

    Despite the prevalence and the high impact of command injection attacks, little attention has been given by the research community to this type of code injections. Although there are many software tools to detect and exploit other types of code injections, such as SQL injections or Cross Site Scripting, there is no dedicated and specialized software that detects and exploits, automatically, command injection vulnerabilities. This paper proposes an open source tool that automates the process o...

  6. US Africa Command (AFRICOM) and Nigeria's National Security ...

    African Journals Online (AJOL)

    The US decision to establish a unified combatant command (AFRICOM) in African has raised numerous questions, particularly in Africa, regarding its possible security implications for the continent. The article narrows itself to the concern for unraveling the national security implications of Nigeria's opposition to the location of

  7. Contractor Support on the Battlefield -- Increased Reliance Requires Commander's Attention

    National Research Council Canada - National Science Library

    Maloney, Kathy J

    2006-01-01

    .... Department of Defense initiatives to adopt a leaner business strategy, increase efficiency, and reduce expenditures have exposed the battlefield commander to additional operational risk centered...

  8. Joint Force Headquarters - Global Strike: Preserving, Advancing, and Accelerating Operational Art for the Joint Force Commander

    National Research Council Canada - National Science Library

    Kruse, Jeffrey

    2004-01-01

    ... combatant commanders. It can be viewed as infringing upon theater unity of command, a potential avenue for increased national level control and interference, and a competitor for finite warfighting resources...

  9. Successful emergency operations and the Incident Command System

    International Nuclear Information System (INIS)

    Montgomery, M.

    1994-01-01

    The Incident Command System (ICS) was developed to provide an ''all-risk'' system of effective emergency scene management. The Cy-Fair Volunteer Fire Department (CFVFD) has made ICS an integral part of their operations since 1987. On January 26, 1993, CFVFD was called to investigate a petroleum odor and possible spill near State Highway 6 and Jackrabbit Road in northwest Harris County. Over the next six-hour period, the dispatch center received over 100 calls an hour regarding this incident. Personnel from CFVFD, the oil company, mutual aid fire departments, and private contractors worked around the dock to successfully contain, clean and reduce the effects of a 25,000 gallon crude oil spill next to a 141-foot diameter oil storage tank at the Satsuma Station. Among the keys to success was proper use of the Incident Command System (ICS). Problems overcome included the lack of a readily available water source, limited foam supplies, time of day, and incident duration

  10. RELATIONSHIP BETWEEN LINGUISTIC UNITS AND MOTOR COMMANDS.

    Science.gov (United States)

    FROMKIN, VICTORIA A.

    ASSUMING THAT SPEECH IS THE RESULT OF A NUMBER OF DISCRETE NEUROMUSCULAR EVENTS AND THAT THE BRAIN CAN STORE ONLY A LIMITED NUMBER OF MOTOR COMMANDS WITH WHICH TO CONTROL THESE EVENTS, THE RESEARCH REPORTED IN THIS PAPER WAS DIRECTED TO A DETERMINATION OF THE SIZE AND NATURE OF THE STORED ITEMS AND AN EXPLANATION OF HOW SPEAKERS ENCODE A SEQUENCE…

  11. Mission Command In A Communications Denied Environment

    Science.gov (United States)

    2017-02-16

    the mutual trust between the echelons.8 In the United States armed forces, the Joint Chiefs have understood the value of...without being over controlling or micromanaging.12 During the execution phase the commander is the free to choose his position on the battlefield to... the Air Force Association Convention, National Harbor, MD, September 16, 2009, accessed at http://www.defenselink.mil/ speeches

  12. STS-29 Commander Coats in JSC fixed base (FB) shuttle mission simulator (SMS)

    Science.gov (United States)

    1986-01-01

    STS-29 Discovery, Orbiter Vehicle (OV) 103, Commander Michael L. Coats sits at commanders station forward flight deck controls in JSC fixed base (FB) shuttle mission simulator (SMS). Coats, wearing communications kit assembly headset and flight coveralls, looks away from forward control panels to aft flight deck. Pilots station seat back appears in foreground. FB-SMS is located in JSC Mission Simulation and Training Facility Bldg 5.

  13. Building oceanographic and atmospheric observation networks by composition: unmanned vehicles, communication networks, and planning and execution control frameworks

    Science.gov (United States)

    Sousa, J. T.; Pinto, J.; Martins, R.; Costa, M.; Ferreira, F.; Gomes, R.

    2014-12-01

    The problem of developing mobile oceanographic and atmospheric observation networks (MOAO) with coordinated air and ocean vehicles is discussed in the framework of the communications and control software tool chain developed at Underwater Systems and Technologies Laboratory (LSTS) from Porto University. This is done with reference to field experiments to illustrate key capabilities and to assess future MOAO operations. First, the motivation for building MOAO by "composition" of air and ocean vehicles, communication networks, and planning and execution control frameworks is discussed - in networked vehicle systems information and commands are exchanged among multiple vehicles and operators, and the roles, relative positions, and dependencies of these vehicles and operators change during operations. Second, the planning and execution control framework developed at LSTS for multi-vehicle systems is discussed with reference to key concepts such as autonomy, mixed-initiative interactions, and layered organization. Third, the LSTS tool software tool chain is presented to show how to develop MOAO by composition. The tool chain comprises the Neptus command and control framework for mixed initiative interactions, the underlying IMC messaging protocol, and the DUNE on-board software. Fourth, selected LSTS operational deployments illustrate MOAO capability building. In 2012 we demonstrated the use of UAS to "ferry" data from UUVs located beyond line of sight (BLOS). In 2013 we demonstrated coordinated observations of coastal fronts with small UAS and UUVs, "bent" BLOS through the use of UAS as communication relays, and UAS tracking of juvenile hammer-head sharks. In 2014 we demonstrated UUV adaptive sampling with the closed loop controller of the UUV residing on a UAS; this was done with the help of a Wave Glider ASV with a communications gateway. The results from these experiments provide a background for assessing potential future UAS operations in a compositional MOAO.

  14. 32 CFR 635.23 - DA Form 4833 (Commander's Report of Disciplinary or Administrative Action).

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true DA Form 4833 (Commander's Report of Disciplinary... Offense Reporting § 635.23 DA Form 4833 (Commander's Report of Disciplinary or Administrative Action). (a) Use. DA Form 4833 is used with DA Form 3975 to— (1) Record actions taken against identified offenders...

  15. Naval Meteorology and Oceanography Command exhibit

    Science.gov (United States)

    2000-01-01

    Designed to entertain while educating, StenniSphere at the John C. Stennis Space Center in Hancock County, Miss., includes informative displays and exhibits from NASA and other agencies located at Stennis, such as this one from the Naval Meteorology and Oceanography Command. Visitors can 'travel' three-dimensionally under the sea and check on the weather back home in the Weather Center. StenniSphere is open free of charge from 9 a.m. to 5 p.m. daily.

  16. Deductive Sensemaking Principles Using Personal Constructs of the Field Commanders

    National Research Council Canada - National Science Library

    Ntuen, Celestine A; Leedom, Dennis

    2007-01-01

    .... It is assumed that the expert commander constructs diverse and asynchronous sensemaking models when confronted with asymmetric situations-evolving and changing dynamics of the battlefield information...

  17. Contract Claims Experience at the Naval Air Systems Command

    National Research Council Canada - National Science Library

    Carty, John

    1999-01-01

    ...) experienced at the Naval Air Systems Command (NAVAIR) between January 1997 and December 1998 as a means to identify areas of potential improvement in management practices which could result in reduced numbers of claims being submitted...

  18. Why Was General Richard O’Connor’s Command in Northwest Europe Less Effective Than Expected?

    Science.gov (United States)

    2011-03-01

    Commander of 7 Division and Military Governor of Jerusalem , September 1938- August 1939. ______. Papers of General Sir Richard O’Connor KT, GCB, DSO, MC...Montgomery, Brian. A Field Marshall in the Family: A Personal Biography of Montgomery of Alamein. New York: Taplinger, 1973. Montgomery, Field...Commanders: A Composite Biography . Combat Studies Institute publications, Fort Leavenworth, Kansas: U.S. Army Command and General Staff College, 1989

  19. Command and Control Across Space and Cyberspace Domains

    Science.gov (United States)

    2016-02-16

    debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.”16).17 From Joint...Third, push control (if not command) to the theater or operational level. Returning to the inbound ICBM scenario proposed by Maj Gen Zabel and detailed

  20. Intelligent Tutoring System for Teaching Battlefield Command Reasoning Skills

    National Research Council Canada - National Science Library

    Domeshek, Eric

    2002-01-01

    ... (ITS) for high-level battlefield command reasoning skills. The ultimate goal of this research is to develop new ITS techniques and technology for teaching skills that cannot he taught as simple methods and procedures to he followed...

  1. 32 CFR 536.3 - Command and organizational relationships.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Command and organizational relationships. 536.3 Section 536.3 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY CLAIMS AND... relationships. (a) The Secretary of the Army. The Secretary of the Army (SA) heads the Army Claims System and...

  2. 32 CFR 770.31 - List of major naval installations in the State of Hawaii and cognizant commanders authorized to...

    Science.gov (United States)

    2010-07-01

    ... Fleet and Commander Naval Logistics Command Headquarters Areas, Johnson Circle Navy Exchange/Commissary... City Supply Area, and the Red Hill Fuel Storage Area). Contact: Commander, Naval Base, Pearl Harbor, HI... Shipyard, McGrew Point, Halawa, Hokulani, Manana, Pearl City Peninsula, Red Hill, Iroquois Point, Puuloa...

  3. Synchronous wearable wireless body sensor network composed of autonomous textile nodes.

    Science.gov (United States)

    Vanveerdeghem, Peter; Van Torre, Patrick; Stevens, Christiaan; Knockaert, Jos; Rogier, Hendrik

    2014-10-09

    A novel, fully-autonomous, wearable, wireless sensor network is presented, where each flexible textile node performs cooperative synchronous acquisition and distributed event detection. Computationally efficient situational-awareness algorithms are implemented on the low-power microcontroller present on each flexible node. The detected events are wirelessly transmitted to a base station, directly, as well as forwarded by other on-body nodes. For each node, a dual-polarized textile patch antenna serves as a platform for the flexible electronic circuitry. Therefore, the system is particularly suitable for comfortable and unobtrusive integration into garments. In the meantime, polarization diversity can be exploited to improve the reliability and energy-efficiency of the wireless transmission. Extensive experiments in realistic conditions have demonstrated that this new autonomous, body-centric, textile-antenna, wireless sensor network is able to correctly detect different operating conditions of a firefighter during an intervention. By relying on four network nodes integrated into the protective garment, this functionality is implemented locally, on the body, and in real time. In addition, the received sensor data are reliably transferred to a central access point at the command post, for more detailed and more comprehensive real-time visualization. This information provides coordinators and commanders with situational awareness of the entire rescue operation. A statistical analysis of measured on-body node-to-node, as well as off-body person-to-person channels is included, confirming the reliability of the communication system.

  4. A CONTENT ANALYSIS OF MILITARY COMMANDER MESSAGES ABOUT TOBACCO AND OTHER HEALTH ISSUES IN MILITARY INSTALLATION NEWSPAPERS: WHAT DO MILITARY COMMANDERS SAY ABOUT TOBACCO?

    Science.gov (United States)

    Poston, Walker S.C.; Haddock, Christopher K.; Jahnke, Sara A.; Hyder, Melissa L.; Jitnarin, Nattinee

    2014-01-01

    Military installation newspapers are a primary means used by military commanders to communicate information about topics important to military personnel including leadership, training issues, installation events, safety concerns, and vital health issues. We conducted a content analysis of military commanders’ messages about health issues that were published in online military installation newspapers/newsfeeds. We identified a total of 75 publicly accessible installation newspapers/newsfeeds with commanders’ messages (n=39 Air Force, n=19 Army, n=7 Navy, n=1 Marine, and n=9 Joint Bases). Commander messages published between January 2012–December 2012 were collected, screened, and coded. Coder inter-rater reliability was 98.9%. Among the 2,479 coded commanders’ messages, 132 (5.3%) addressed a health topic as the primary focus. There were no significant differences between service branches in the percentage of health-oriented messages (χ2=5.019, p=0.285). The most commonly addressed health topics were exercise/fitness (23.5%), other mental health concerns (19.7%), alcohol/DUI (13.6%), and suicide (12.1%). Tobacco use was directly addressed as a primary health aim in only two commanders’ messages (1.5%). Health topics, and particularly tobacco-related content, are rarely written about by military commanders. The absence of tobacco-related health messages from line leadership contributes to the perception that tobacco control is a low priority. PMID:26032388

  5. On Resource Description Capabilities of On-Board Tools for Resource Management in Cloud Networking and NFV Infrastructures

    OpenAIRE

    Tutschku, Kurt; Ahmadi Mehri, Vida; Carlsson, Anders; Chivukula, Krishna Varaynya; Johan, Christenson

    2016-01-01

    The rapid adoption of networks that are based on "cloudification" and Network Function Virtualisation (NFV) comes from the anticipated high cost savings of up to 70% in their build and operation. The high savings are founded in the use of general standard servers, instead of single-purpose hardware, and by efficiency resource sharing through virtualisation concepts. In this paper, we discuss the capabilities of resource description of "on-board" tools, i.e. using standard Linux commands, to e...

  6. A design proposal of a certain missile tactical command system based on Beidou satellite communication and GPS positioning techniques

    Science.gov (United States)

    Ma, Jian; Hao, Yongsheng; Miao, Jian; Zhang, Jianmao

    2007-11-01

    This paper introduced a design proposal of tactical command system that applied to a kind of anti-tank missile carriers. The tactical command system was made up of embedded computer system based on PC104 bus, Linux operating system, digital military map, Beidou satellite communication equipments and GPS positioning equipments. The geographic coordinates was measured by the GPS receiver, the positioning data, commands and information were transmitted real-time between tactical command systems, tactical command systems and command center, by the Beidou satellite communication systems. The Beidou satellite communication equipments and GPS positioning equipments were integrated to an independent module, exchanging data with embedded computer through RS232 serial ports and USB ports. The decision support system software based on information fusion, calculates positioning data, geography information and battle field information synthetically, shows the position of allies and the position of enemy on the military map, and assesses the various threats of different enemy objects, educes a situation assessment and threat assessment.

  7. Public Affairs Capacity Building: A Soft Tool for Combatant Commanders

    National Research Council Canada - National Science Library

    Salata, Jason P

    2008-01-01

    Public affairs capacity building is a valuable soft component of the Combatant Commander's Theater Campaign Plan that builds habitual relationships, fosters transparency, and enhances the ability to shape the AOR...

  8. TGIN language reference manual: NAMMU and MATDIF commands

    International Nuclear Information System (INIS)

    Cliffe, K.A.; Herbert, A.W.

    1992-03-01

    NAMMU is a finite-element program for modelling groundwater flow and transport. The matrix diffusion option models the transport of radionuclides including the effects of rock-matrix diffusion. It uses the free-format structured-input TGIN. This report describes the commands in the TGIN language for running the NAMMU and MATDIF package. (author)

  9. 32 CFR Appendix E to Part 247 - DoD Command Newspaper and Magazine Review System

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false DoD Command Newspaper and Magazine Review System... OF DEFENSE (CONTINUED) MISCELLANEOUS DEPARTMENT OF DEFENSE NEWSPAPERS, MAGAZINES AND CIVILIAN ENTERPRISE PUBLICATIONS Pt. 247, App. E Appendix E to Part 247—DoD Command Newspaper and Magazine Review...

  10. LABORATORY PROCESS CONTROLLER USING NATURAL LANGUAGE COMMANDS FROM A PERSONAL COMPUTER

    Science.gov (United States)

    Will, H.

    1994-01-01

    The complex environment of the typical research laboratory requires flexible process control. This program provides natural language process control from an IBM PC or compatible machine. Sometimes process control schedules require changes frequently, even several times per day. These changes may include adding, deleting, and rearranging steps in a process. This program sets up a process control system that can either run without an operator, or be run by workers with limited programming skills. The software system includes three programs. Two of the programs, written in FORTRAN77, record data and control research processes. The third program, written in Pascal, generates the FORTRAN subroutines used by the other two programs to identify the user commands with the user-written device drivers. The software system also includes an input data set which allows the user to define the user commands which are to be executed by the computer. To set the system up the operator writes device driver routines for all of the controlled devices. Once set up, this system requires only an input file containing natural language command lines which tell the system what to do and when to do it. The operator can make up custom commands for operating and taking data from external research equipment at any time of the day or night without the operator in attendance. This process control system requires a personal computer operating under MS-DOS with suitable hardware interfaces to all controlled devices. The program requires a FORTRAN77 compiler and user-written device drivers. This program was developed in 1989 and has a memory requirement of about 62 Kbytes.

  11. Reduction in respiratory motion artefacts on gadoxetate-enhanced MRI after training technicians to apply a simple and more patient-adapted breathing command

    International Nuclear Information System (INIS)

    Gutzeit, Andreas; Matoori, Simon; Weymarn, Constantin von; Reischauer, Carolin; Goyen, Matthias; Hergan, Klaus; Meissnitzer, Matthias; Forstner, Rosemarie; Froehlich, Johannes M.; Kolokythas, Orpheus; Soyka, Jan D.; Doert, Aleksis; Koh, Dow-Mu

    2016-01-01

    To investigate whether a trained group of technicians using a modified breathing command during gadoxetate-enhanced liver MRI reduces respiratory motion artefacts compared to non-trained technicians using a traditional breathing command. The gadoxetate-enhanced liver MR images of 30 patients acquired using the traditional breathing command and the subsequent 30 patients after training the technicians to use a modified breathing command were analyzed. A subgroup of patients (n = 8) underwent scans both by trained and untrained technicians. Images obtained using the traditional and modified breathing command were compared for the presence of breathing artefacts [respiratory artefact-based image quality scores from 1 (best) to 5 (non-diagnostic)]. There was a highly significant improvement in the arterial phase image quality scores in patients using the modified breathing command compared to the traditional one (P < 0.001). The percentage of patients with severe and extensive breathing artefacts in the arterial phase decreased from 33.3 % to 6.7 % after introducing the modified breathing command (P = 0.021). In the subgroup that underwent MRI using both breathing commands, arterial phase image quality improved significantly (P = 0.008) using the modified breathing command. Training technicians to use a modified breathing command significantly improved arterial phase image quality of gadoxetate-enhanced liver MRI. (orig.)

  12. Opening the Aperture... Ending Service "Branding" of US Unified Commands

    National Research Council Canada - National Science Library

    Handy, Russell

    2003-01-01

    .... It asserts that over tine, the defense establishment runs the risk of establishing a cultural identity in the command that limits perspectives to aground-, sea-, or air and space-centric viewpoint...

  13. The International Criminal Court: Considerations for the Joint Force Commander

    National Research Council Canada - National Science Library

    Sutton, Michael

    2003-01-01

    An analysis of the issues and remedies a Joint Force Commander should be concerned about because of the relationship between the United States and the newly-created International Criminal Court (ICC...

  14. Contribution to the automatic command in robotics - Application to the command by microprocessors of the articulated systems; Contribution a la commande automatique en robotique. Application a la commande par microprocesseurs des manipulateurs articules

    Energy Technology Data Exchange (ETDEWEB)

    Al Mouhamed, Mayez

    1982-01-29

    The first part of the present paper deals with the main methods of changing the coordinates for a general articulated system. After a definition of the coordinates changing, we propose a coordination system designed for easy programming of the movements. Its characteristic is to permit the action anywhere on the manipulated object. The second part deals with the force regulation problem. For this purpose we have developed a general force sensor. The informations delivered by the sensor are used by force regulators which are intended for the automatic assembly of subsystems. In the third part the dynamic problem of the articulated systems is exposed. We present a new method which allows to determine dynamic parameters from appropriate motions of the robot. These parameters are then used to implement the dynamic control. Several applications, using the powerful microprocessor INTEL 8086 and its arithmetic coprocessor 8087, are presented, in order to demonstrate the performances gained. (author) [French] Dans la premiere partie de ce memoire, nous exposons les principales methodes de changement de coordonnees pour un systeme articule general. Apres une definition adequate de ce dernier, nous proposons un systeme de coordination permettant une programmation facile des mouvements. Sa caracteristique est de prendre comme centre d'action un point quelconque de l'objet manipule. Dans la deuxieme partie, nous etudions la regulation en effort. Pour cela nous avons developpe un capteur de forces general. Les informations que delivre ce dernier sont utilisees par des regulateurs d'effort adaptes au contexte de l'assemblage automatique des pieces. Dans la troisieme partie, nous exposons une nouvelle methode de commande dynamique des systemes articules. Nous obtenons des parametres dynamiques du robot a partir de mouvements appropries. Ces derniers sont ensuite utilises dans l'elaboration des commandes. Des applications utilisant le microprocesseur INTEL 8086 avec son

  15. Interagency Cooperation for Irregular Warfare at the Combatant Command

    Science.gov (United States)

    2009-01-01

    enemy’s command capability.16 Salamoni argued that the term “irregular warfare” belies an ethnocentric perspective of conflict that will limit military...duty military staffing to form the nucleus of the organization, which would receive augmentation from additional assigned reservists and interagency

  16. 78 FR 24694 - Family Advocacy Command Assistance Team (FACAT)

    Science.gov (United States)

    2013-04-26

    ... be composed of personnel from appropriate disciplines, including, medicine, psychology, and child... in all allegations of child abuse and neglect. DATES: Comments must be received by June 25, 2013... multi-disciplinary Family Advocacy Command Assistant Team to respond to allegations of child sexual...

  17. Commanders of the Great Victory

    Directory of Open Access Journals (Sweden)

    Anatoly Dmitriyevich Borshchov

    2015-01-01

    Full Text Available The honorary title of «commander» as well as the «admiral» is granted to a military or naval figure on the basis of public recognition of his personal contribution to the success of actions. Generals are usually individuals with creative thinking, the ability to foresee the development of military events. Generals usually have such personality traits as a strong will and determination, rich combat experience, credibility and high organizational skills. In an article dedicated to the 70th anniversary of the Soviet victory in the Great War examines the experience of formation and practice of the most talent-ed Soviet military leaders.

  18. Commanders’ Perception of Risk: Enabling Boldness

    Science.gov (United States)

    2008-04-01

    individual. Soldiers are trained over time to employ their weapon systems tinder a variety of conditions in, realistic simulations and scenarios, thus...from ground combat the specialty is, where th~ leader provides the same support in combat that he would in garrison with no direct relationship to an...34 safety paperwork and activities. 73 Senior commanders must aggressively search for means to communicate their intent and the relationship between

  19. Auftragstaktik: The Basis for Modern Military Command?

    Science.gov (United States)

    2012-12-06

    Pauli’s Nachf, 1892. Showalter, Dennis. The Wars of German Unification. London: Hodder Education , 2004. Simpkin, Richard. Race to the Swift. London...to the bourgeois class again, making education , not social position, the deciding factor for obtaining a commission.15 The army created a system of...only reflected the increased education and capability of the new officer corps, but also the reality of commanding an army in the Napoleonic era

  20. A mobile-agent-based wireless sensing network for structural monitoring applications

    International Nuclear Information System (INIS)

    Taylor, Stuart G; Farinholt, Kevin M; Figueiredo, Eloi; Moro, Erik A; Park, Gyuhae; Farrar, Charles R; Flynn, Eric B; Mascarenas, David L; Todd, Michael D

    2009-01-01

    A new wireless sensing network paradigm is presented for structural monitoring applications. In this approach, both power and data interrogation commands are conveyed via a mobile agent that is sent to sensor nodes to perform intended interrogations, which can alleviate several limitations of the traditional sensing networks. Furthermore, the mobile agent provides computational power to make near real-time assessments on the structural conditions. This paper will discuss such prototype systems, which are used to interrogate impedance-based sensors for structural health monitoring applications. Our wireless sensor node is specifically designed to accept various energy sources, including wireless energy transmission, and to be wirelessly triggered on an as-needed basis by the mobile agent or other sensor nodes. The capabilities of this proposed sensing network paradigm are demonstrated in the laboratory and the field